Exploit development June 27, 2011 Darren Dalasta Dave Aitel Reveals His Process for Security Research In our ongoing series of interviews, this week Dave Aitel answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for...
CISSP June 24, 2011 Kenneth Magee How to deal with and alleviate CISSP exam anxiety! As exam time approaches, everyone feels anxious about whether they’re ready to take the exam and to pass and thus to receive the CISSP certification. For...
Virtualization security June 23, 2011 Brian Greenberg Are your backup systems secure? All seemed well with backup operations at my company, until I got a visit from an operations center engineer. The lock already hanging open, he was holding...
Application security June 22, 2011 Skyler Onken Securing Software with the Application and Front Controller Patterns Securing software has always been an issue. Whether it be web, desktop or server applications, insecure coding practices can result in substantial data loss...
Application security June 17, 2011 Thomas Mackenzie Malicious SOAP Requests as Web Service Attacks The recent Application Security Europe conference (www.appseceu.org) was one of the better conferences I have had the pleasure to attend. The talks were interesting...
Exploit development June 17, 2011 Andrew Whitaker Writing SEH Exploits In these two videos, we will demonstrate how to write an exploit of the Structured Exception Handler. The video assumes you already understand how SEH and exploits...
Hacking June 17, 2011 Andrew Whitaker Cracking WPA2 Tutorial In this video we will demonstrate how to crack WPA2 using the Airmon-ng suite. We will do it by: Identifying an access point Capturing traffic from that...
Hacking June 16, 2011 Andrew Whitaker Adobe Vulnerability Tutorial In this video, we will demonstrate the adobe_utilprintf exploit. We will show how to set up a PDF within Metasploit that will deliver an exploit via an HTML...
Management, compliance & auditing June 15, 2011 Kenneth Magee ISO27002 Security Framework – Audit Program Template Several people have asked for an IT Audit Program Template for an audit based on the ISO/IEC 27002:2005(E) security standard. This template, which can be...
Reverse engineering June 13, 2011 Gary Golomb Mutexes, part two: Using WinDbg to Begin Reverse Engineering Unknown Malware from Memory Part Two in a multi-part series on holistic, multi-disciplinary analysis and reversing. You can read part one of this series here. The last post, "Mutex Analysis:...