Zach will be going over how he does research on exploiting embedded systems and his exploit development framework bowcaster. Zachary Cutlip is a security researcher with Tactical Network Solutions, in Columbia, MD. At TNS, Zach develops exploitation techniques targeting embedded systems and network infrastructure. Since 2003, Zach has worked either directly for or with the […]
Category: Technical Segment
After her presentation at Black Hat 2013, Allison is back in studio and will do a tech segment titled “Denying Service to DDOS Protection Services” Episode 341 Show Notes Tune in to Security Weekly TV, Hack Naked TV, and Hack Naked At Night episodes on our YouTube Channel or our Bliptv channel.
Ty Miller is CEO and Founder of Threat Intelligence , has had many TV appearances, radio interviews, print newspaper and magazine articles, and regular online commentary & BlackHat Trainings. Ty Miller’s experience not only covers penetration testing, it also expands into regulations like PCI, developing and running industry benchmark accreditations, performing forensic investigations, as well […]
If you’ve seen one of mine, or John Strand’s, presentations on offensive countermeasures, you know about Honeyports. If you’ve taken our class or read our book, you’ve seen this too! Just to recap: If you tell your host to listen for connections on a port, and make certain the client is making a full TCP […]
“Wireless enthusiasts have been repurposing satellite dishes for a couple years now. This summer the longest link ever was established over 125 miles using old 12 foot and 10 foot satellite dishes. Check out the image This is cool, can’t wait to build one. They state that they can grab wireless networks from 8 miles […]
sudo (superuser do) is a program in Unix, Linux, and similar operating systems such as Mac OS X that allows users to run programs in the guise of another user (normally in the guise of the system’s superuser). Try to treat local exploits seriously, when combined with some of the new PHP app server vulnerabilities […]
“Attackers could exploit a vulnerability in a security protocol widely used in VPNs to cause a denial of service or buffer overflows, or to launch malicious code.” If a buffer overflow were released for any given number of VPN platforms this could spell trouble for those who rely on these systems to protect the wireless […]