Vídeos de Derbycon 2016
- September 26, 2016
- tuxotron
- Key Note - Jeffrey Snover, Lee Holmes
- Carlos Perez - Thinking Purple
- Ed Skoudis - Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S.
- David Maloney, James Lee, Brent Cook, Tod Beardsley, Lance Sanchez - Metasploit Townhall
- Parker Schmitt - Data Obfuscation: How to hide data and payloads to make them "not exist"
- Jason Smith - Go with the Flow
- Devon Greene - Abusing RTF: Evasion, Exploitation and Counter Measures
- Mubix "Rob" Fuller - Writing malware while the blue team is staring at you
- Christopher Hadnagy - Mind Reading for Fun and Profit using DISC
- JDuck - Stagefright: An Android Exploitation Case Study
- Arian J Evans & James Pleger - Top 10 2015-2016 compromise patterns observed & how to use non-traditional Internet datasets to detect & avoid them
- Aaron Lafferty - Information Security Proposed Solutions Series - 1. Talent
- Alfredo Ramirez - DNSSUX
- Tyler Halfpop , Jacob Soo - Macs Get Sick Too
- Joe Desimone - Hunting for Exploit Kits
- Stephen Breen, Chris Mallz - Rotten Potato - Privilege Escalation from Service Accounts to SYSTEM
- Nick Cano - +1,000,000 -0: Cloning a Game Using Game Hacking and Terabytes of Data
- Wartortell and Aaron Bayles - Nose Breathing 101: A Guide to Infosec Interviewing
- William McLaughlin - Android Patchwork
- Will Schroeder, Matt Nelson - A Year in the Empire
- Kevin Johnson and Jason Gillam - Next Gen Web Pen Testing: Handling modern applications in a penetration test
- Ken Johnson, Chris Gates - DevOops Redux
- Ryan Voloch and Peter Giannoutsos - To Catch a Penetration Tester: Top SIEM Use Cases
- Spencer McIntyre - Is that a penguin in my Windows?
- Brent White && Tim Roberts - Real World Attacks VS Check-box Security
- Ben0xA - PowerShell Secrets and Tactics
- Michael Allen - Beyond The ?Cript: Practical iOS Reverse Engineering
- Jayson E. Street - .... and bad mistakes I've made a few.....
- Matthew Dunwoody, Nick Carr - No Easy Breach: Challenges and Lessons from an Epic Investigation
- Natalie Vanatta - ARRR Maties! A map to the legal hack-back
- Michael Wharton, Project MVP - Hacking and Protecting SharePoint
- Marcello Salvati - CrackMapExec - Owning Active Directory by using Active Directory
- Rockie Brockway & Adam Hogan - Adaptation of the Security Sub-Culture
- Zach Grace, Brian Genz - Better Network Defense Through Threat Injection and Hunting
- nyxgeek - Hacking Lync (or, 'The Weakest Lync')
- Kevin Gennuso - Responder for Purple Teams
- Ken Toler - Metaprogramming in Ruby and doing it wrong.
- Paul Coggin - Exploiting First Hop Protocols to Own the Network
- Nick Landers - Outlook and Exchange for the Bad Guys
- Valerie Thomas and Harry Regan - It's Never So Bad That It Can't Get Worse
- Nathan Clark - AWSh*t. Pay-as-you-go Mobile Penetration Testing
- Nancy Snoke - Evolving your Office's Security Culture
- Michael Schearer - Confronting Obesity in Infosec
- Mark Mager - Defeating The Latest Advances in Script Obfuscation
- Michael Gough - From Commodity to Advanced (APT) malware, are automated malware analysis sandboxes as useful as your own basic manual analysis?
- Tim MalcomVetter - Breaking Credit Card Tokenization Without Cryptanalysis
- Bill V – Privileged Access Workstations (PAWs)
- Scott Lyons and Joshua Marpet - Business Developement: The best non-four letter dirty word in infosec.
- Scot Berner, Jason Lang - Tool Drop 2.0 - Free As In Pizza
- Joseph Tegg - We're a Shooting Gallery, Now What?
- Doug Burns - Malicious Office Doc Analysis for EVERYONE!
- Sean Metcalf & Will Schroeder - Attacking EvilCorp: Anatomy of a Corporate Hack
- Matt Graeber, Jared Atkinson - Living Off the Land 2: A Minimalist's Guide to Windows Defense
- Kyle Wilhoit - Point of Sale Voyuer- Threat Actor Attribution Through POS Honeypots
- Jeremy Mio, David Lauer, Mike Woolard - The Art of War, Attacking the Organization and Raising the Defense
- Justin Herman & Anna-Jeannine Herman - The 1337 Gods of Geek Mythology
- Josh Huff - Open Source Intelligence - What I learned by being an OSINT creeper
- Jay Beale - Phishing without Failure and Frustration
- Larry Pesce - I don't give one IoTA: Introducing the Internet of Things Attack Methodology.
- Anti-Forensics AF int0x80 (of Dual Core)
- Deral Heiland, Matthew Kienow - Managed to Mangled: Exploitation of Enterprise Network Management Systems
- Joey Maresca - Finding Your Balance
- EvilMog - Hashcat State of the Union
- egypt - New Shiny in Metasploit Framework
- Hacking with Ham Radios: What I have learned in 25 years of being a ham.
- John Strand - Penetration Testing Trends
- Ellen Hartstack and Matthew Sullivan - Garbage in, garbage out
- Casey Smith - Establishing A Foothold With JavaScript
- Jesika McEvoy - Overcoming Imposter Syndrome (even if you're totally faking it)
- FuzzyNop - Embrace the Bogeyman: Tactical Fear Mongering for Those Who Penetrate
- Eric Conrad - Introducing DeepBlueCLI, a PowerShell module for hunt teaming via Windows event logs
- Dr. Jared DeMott & Mr. Josh Stroschein - Using Binary Ninja for Modern Malware Analysis
- Scott M - Fuzzing basics...how to break software
- Craig Bowser - Security v. Ops: Bridging the Gap
- Chris "Lopi" Spehn - From Gaming to Hacking The Planet
- Jason Blanchard - How to Social Engineer your way into your dream job!
- Lee Holmes - Attackers Hunt Sysadmins - It's time to fight back
- Adam Compton, Austin Lane - Scripting Myself Out of a Job - Automating the Penetration Test with APT2
- Branden Miller - Hacking for Homeschoolers: STEM projects for under $20
- Scott Sutherland - SQL Server Hacking on Scale using PowerShell
- Brian Marks, Andrea Sancho Silgado - Dive into DSL: Digital Response Analysis with Elasticsearch
- David Schwartzberg and Chris Sistrunk - Make STEHM Great Again
- Charles L. Yost - Python 3: It's Time
- Philip Martin - DNS in Enterprise IR: Collection, Analysis and Response
- Drew Branch - Need More Sleep? REST Could Help
- Bill Gardner - Making Our Profession More Professional
- Abe Miller - How are tickets paid for?
- Bill Sempf - Breaking Android Apps for Fun and Profit
- Amanda Berlin & Lee Brotherston - So You've Inherited a Security Department, Now What?
- Brandon Young - Reverse engineering all the malware... and why you should stop.
- Nathan Magniez - Body Hacking 101 (or a Healthy Lifestyle for Security Pros)
- Jimmy Byrd - Security Automation in your Continuous Integration Pipeline
- Chad M. Dewey - Cruise Ship Security OR Hacking the High Seas
- Karl Fosaaen - Attacking ADFS Endpoints with PowerShell
- Stephen Hilt - The 90's called, they want their technology back
- Lee Neely - Web Security for Dummies
- Kirk Hayes - I Love myBFF (Brute Force Framework)
- Cameron Craig, Keith Conway - Nobody gets fired by choosing IBM... but maybe they should.
- Mirovengi - Shackles, Shims, and Shivs - Understanding Bypass Techniques
- Jared Haight - Introducing PowerShell into your Arsenal with PS>Attack
- James Jardine - Recharging Penetration Testing to Maximize Value
- hypervista - Poetically Opaque (or other John Updike Quotes)
- David Boyd - Hack Yourself: Building A Pentesting Lab
- Ronnie Flathers - Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features
- Salvador Mendoza - Samsung Pay: Tokenized Numbers, Flaws and Issues
- Andrew Krug & Alex McCormack - Hardening AWS Environments and Automating Incident Response
- Andrew Plunkett - Yara Rule QA: Can't I Write Code to do This for Me?
- Anthony Kasza - Java RATS: Not even your Macs are safe
- Beau Bullock, Derek Banks, Joff Thyer - The Advanced Persistent Pentester (All Your Networks Are Belong 2 Us)
- Russell Butturini - Fire Away! Sinking the Next Gen Firewall
- Daniel Bohannon - Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em'
- Dav Wilson - Mobile Device Forensics
- Casey Cammilleri & Hans Lakhan - Hashview, a new tool aimed to improve your password cracking endeavors.
- Brian Fehrman - Hardware Hacking the Easyware Way
- Matthew Lichtenberger - PacketKO - Data Exfiltration Via Port Knocking
- Jamie Murdock - Ransomware: An overview
- Ben Stillman - MariaDB: Lock it down like a chastity belt
- Aaron Guzman - IoT Defenses - Software, Hardware, Wireless and Cloud
- Adam Cammack & Brent Cook - Static PIE: How and Why
- Braden Hollembaek, Adam Pond - Finding a Weak Link: Attacking Windows OEM Kernel Drivers
- Dan Bougere - The Beginner's Guide to ICS: How to Never Sleep Soundly Again
Ya tenemos disponibles los vídeos (faltan algunos) de una de las conferencias que más ha crecido en los últimos años: Derbycon. La edición de este año 2016 acaba de terminar y nos ha dejado un gran número de charlas interesantes:
RootedCON Valencia 2016
- September 7, 2016
- cybercaronte
El congreso RootedValencia se celebrará los días 9 y 10 de Septiembre. El viernes día 9 tendrá lugar un training llamado "RB16-1 Hacking ético" (pulsa aquí para más información) y durante el sábado día 10 se celebrarán conferencias desde las 10am hasta las 8pm. Nosotros estaremos por allí el sábado para saludar a viejos y nuevos amigos, disfrutar de las conferencias y además tomar algunas cervezas ;)
Lugar: ADEIT - Fundación Universidad - Plaza Virgen de la Paz, 3, 46001 Valencia (España)
Pwntools 3.0
- August 23, 2016
- tuxotron
pwnlib.adb— Android Debug Bridgepwnlib.asm— Assembler functionspwnlib.atexception— Callbacks on unhandled exceptionpwnlib.atexit— Replacement for atexitpwnlib.constants— Easy access to header file constantspwnlib.context— Setting runtime variablespwnlib.dynelf— Resolving remote functions using leakspwnlib.encoders— Encoding Shellcodepwnlib.elf— Working with ELF binariespwnlib.exception— Pwnlib exceptionspwnlib.fmtstr— Format string bug exploitation toolspwnlib.gdb— Working with GDBpwnlib.log— Logging stuffpwnlib.memleak— Helper class for leaking memorypwnlib.replacements— Replacements for various functionspwnlib.rop— Return Oriented Programmingpwnlib.rop.rop— Return Oriented Programmingpwnlib.rop.srop— Sigreturn Oriented Programmingpwnlib.runner— Running Shellcodepwnlib.shellcraft— Shellcode generationpwnlib.shellcraft.amd64— Shellcode for AMD64pwnlib.shellcraft.arm— Shellcode for ARMpwnlib.shellcraft.common— Shellcode common to all architecturepwnlib.shellcraft.i386— Shellcode for Intel 80386pwnlib.regsort— Register sortingpwnlib.shellcraft.thumb— Shellcode for Thumb Modepwnlib.term— Terminal handlingpwnlib.timeout— Timeout handlingpwnlib.tubes— Talking to the World!pwnlib.tubes.process— Processespwnlib.tubes.serialtube— Serial Portspwnlib.tubes.sock— Socketspwnlib.tubes.ssh— SSHpwnlib.ui— Functions for user interactionpwnlib.useragents— A database of useragent stringspwnlib.util.crc— Calculating CRC-sumspwnlib.util.cyclic— Generation of unique sequencespwnlib.util.fiddling— Utilities bit fiddlingpwnlib.util.hashes— Hashing functionspwnlib.util.iters— Extension of standard moduleitertoolspwnlib.util.lists— Operations on listspwnlib.util.misc— We could not fit it any other placepwnlib.util.net— Networking interfacespwnlib.util.packing— Packing and unpacking of stringspwnlib.util.proc— Working with/proc/pwnlib.util.safeeval— Safe evaluation of python codepwnlib.util.web— Utilities for working with the WWW
Los que seáis asiduos a participar en CTFs ya probablemente conozcáis el proyecto Pwntools.
Éste es un conjunto de utilidades, librerías o framework pensado para hacerte la vida más fácil a la hora de escribir tus exploits o soluciones en los dichos CTFs. Está escrito en Python y provee de una gran cantidad de módulos específicos para cada tarea:
$ apt-get install python2.7 python2.7-dev python-pip $ pip install --upgrade pwntoolsAunque Pwntools está desarrollado en sobre Ubuntu, debería de funcionar sin problemas en otras distribuciones Linux e incluso Mac OS X.
Para que te hagas una idea de como usar este framework, aquí tienes un repositorio con algunas soluciones a varios retos usando el mismo. El código fuente del proyecto se encuentra en Github y su documentación aquí.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec



