Good morning Amsterdam, good morning readers, welcome to the second day of the Hack In The Box conference. The speaker for the first keynote didnβt show up, Β so weβll jump right into the next keynote. Jennifer starts her keynote by explaining that sheβs fortunate to be able to travel to a lot of conferences and [β¦]
The post HITB2014AMS β Day 2 β Keynote 4: Hack It Forward first appeared on Corelan Cybersecurity Research.-
Corelan Cybersecurity Research
- HITB2014AMS β Day 2 β Exploring and Exploiting iOS Web BrowsersPeter Van Eeckhoutte (corelanc0d3r)
HITB2014AMS β Day 2 β Exploring and Exploiting iOS Web Browsers
iOS Browsers & UIWebview iOS is very popular (according to StatCounter, itβs the 3rd most popular platform used). Β Mobile browsers take about 20% to 25% of the market share. iOS offers integration with desktop browsers and cloud (so the same data is available to an attacker). Β Many 3rd party IOS browsers have similar weaknesses which [β¦]
The post HITB2014AMS β Day 2 β Exploring and Exploiting iOS Web Browsers first appeared on Corelan Cybersecurity Research.-
Corelan Cybersecurity Research
- HITB2014AMS β Day 2 β On Her Majestyβs Secret Service: GRX & A Spy AgencyPeter Van Eeckhoutte (corelanc0d3r)
HITB2014AMS β Day 2 β On Her Majestyβs Secret Service: GRX & A Spy Agency
Last year, Belgacom got hacked by an intelligence service (GCHQ?), Rob says. βWhat is so interesting about this hack, why did they hack into Belgacom, what would or could be the purpose of a similar hack?β Β Before answering those questions, we need to take a quick look on how mobile networks work and how mobile [β¦]
The post HITB2014AMS β Day 2 β On Her Majestyβs Secret Service: GRX & A Spy Agency first appeared on Corelan Cybersecurity Research.-
Corelan Cybersecurity Research
- CSO : Common Sense Operator/OperationsPeter Van Eeckhoutte (corelanc0d3r)
CSO : Common Sense Operator/Operations
As the CSO/CISO/person responsible for Information Security, your job is toβ¦Β well β¦ do you even know?Β Does upper management know?Β "Our crappy CSO β¦" and "Our stupid CSO β¦" are statements commonly used by various (techie) people, throwing their hands up in despair, attempting to prove that their CSO doesnβt understand technology and has [β¦]
The post CSO : Common Sense Operator/Operations first appeared on Corelan Cybersecurity Research.-
Corelan Cybersecurity Research
- Analyzing heap objects with mona.pyPeter Van Eeckhoutte (corelanc0d3r)
Analyzing heap objects with mona.py
Introduction Hi all, While preparing for my Advanced exploit dev course at Derbycon, Iβve been playing with heap allocation primitives in IE.Β One of the things that causes some frustration (or, at least, tends to slow me down during the research) is the ability to quickly identify objects that may be useful. After all, Iβm [β¦]
The post Analyzing heap objects with mona.py first appeared on Corelan Cybersecurity Research.How to become a pentester
Intro I receive a lot of emails. Β (Please donβt make it worse, thanks!) Β Unfortunately I donβt have as much spare time as I used to, or would like to, so I often have no other choice than to redirect questions to our forums or our IRC channel (#corelan on freenode), hoping that other members [β¦]
The post How to become a pentester first appeared on Corelan Cybersecurity Research.-
Corelan Cybersecurity Research
- Crypto in the box, stone age editionPeter Van Eeckhoutte (corelanc0d3r)
Crypto in the box, stone age edition
Introduction First of all, Happy New Year to everyone! I hope 2016 will be a fantastic and healthy year, filled with fun, joy, energy, and lots of pleasant surprises. I remember when all of my data would fit on a single floppy disk. 10 times. The first laptops looked like (and felt like) mainframes on [β¦]
The post Crypto in the box, stone age edition first appeared on Corelan Cybersecurity Research.-
Corelan Cybersecurity Research
- EncFSGui β GUI Wrapper around encfs for OSXPeter Van Eeckhoutte (corelanc0d3r)
EncFSGui β GUI Wrapper around encfs for OSX
Introduction 3 weeks ago, I posted a rant about my frustration/concern related with crypto tools, more specifically the lack of tools to implement crypto-based protection for files on OSX, in a point-&-click user-friendly way. Β I listed my personal functional and technical criteria for such tools and came to the conclusion that the industry seem to [β¦]
The post EncFSGui β GUI Wrapper around encfs for OSX first appeared on Corelan Cybersecurity Research.-
Corelan Cybersecurity Research
- Windows 10 x86/wow64 Userland heapPeter Van Eeckhoutte (corelanc0d3r)
Windows 10 x86/wow64 Userland heap
Introduction Hi all, Over the course of the past few weeks ago, I received a number of "emergency" calls from some relatives, asking me to look at their computer because "things were broken", "things looked different" and "I think my computer got hacked".Β I quickly realized that their computers got upgraded to Windows 10. We [β¦]
The post Windows 10 x86/wow64 Userland heap first appeared on Corelan Cybersecurity Research.-
Corelan Cybersecurity Research
- Windows 10 egghunter (wow64) and morePeter Van Eeckhoutte (corelanc0d3r)
Windows 10 egghunter (wow64) and more
Introduction Ok, I have a confession to make, I have always been somewhat intrigued by egghunters. That doesnβt mean that I like to use (or abuse) an egghunter just because I fancy what it does. In fact, I believe itβs a good practise to try to avoid egghunters if you can, as they tend to [β¦]
The post Windows 10 egghunter (wow64) and more first appeared on Corelan Cybersecurity Research.