by Doc | Jun 11, 2019 | Blogs, News
CIRCO – [Cisco Implant Raspberry Controlled Operations] Emilio Couto, eKio Security Designed under Raspberry Pi and aimed for Red Team Ops, we take advantage of “Sec/Net/Dev/Ops” enterprise tools to capture network credentials in a stealth mode. Using a low...
by Doc | May 10, 2019 | Blogs, News
Bestsellers in the Underground Economy – Measuring Malware Popularity by Forum Winnona DeSombre, Threat Intelligence Researcher at Recorded Future While you can patch against malware infecting your tech stack or targeting your competitors, what about malware...
by Doc | Jun 21, 2018 | Blogs, News
Friday, August 10th Saturday, August 11th Sunday, August 12th 10:00 Mallet: A Proxy for Arbitrary TrafficRogan Dawes Ducky-in-the-Middle: Injecting Keystrokes into Plaintext ProtocolsEsteban Rodriguez CLOSED 10:30 How to Tune Automation to Avoid False PositivesGita...
by Doc | May 3, 2018 | Blogs, News
Car Infotainment Hacking Methodology and Attack Surface Scenarios Jay Turla, Application Security Engineer at Bugcrowd The battle for supremacy for the control of the dashboard display or infotainment systems has always been a race. Most of these systems run on Linux,...
by Doc | Apr 27, 2018 | Blogs, News
Capturing in Hard to Reach Places Silas Cutler, Senior Security Researcher at CrowdStrike It’s easy for us to take for granted when tools allow us to start capturing network traffic without any real hardships. However, what happens when the data you want...