-
Slides for
@ms_s3c and my talk on fuzzing at#BHEU are now available: https://hexgolems.com/2019/12/hotfuzz/ … -
My final presentation of HTTP Desync Attacks will be at Black Hat Europe next week. New content includes a novel desync technique, major automation improvements, a defensive case-study, and updated bounty figures
#BHEU https://www.blackhat.com/eu-19/briefings/schedule/#http-desync-attacks-request-smuggling-reborn-18313 … -
That’s a wrap: The best hacks from Black Hat Europe 2019 //
#BHEU https://portswigger.net/daily-swig/the-best-hacks-from-black-hat-europe-2019 …Show this thread -
Next up... I want to be James Kettle
@albinowax when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.#BHEU pic.twitter.com/BxjEgKRDW7
Show this thread -
It was an honor to present our research at
#BHEU. Thanks everyone for attending. It was a pleasure to see the interest of the community and we promise to keep the progress going. For everyone who missed the talk: https://alephsecurity.com/2019/06/25/xnu-qemu-arm64-2/ …pic.twitter.com/r3UiYi5QMr
-
#oletools 0.55 is finally out, just in time for#BHEU! Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection More info: https://github.com/decalage2/oletools/releases/tag/v0.55 … How to install/update: pip install -U oletoolspic.twitter.com/zGEJqoQRUy
-
Representing
@THREAT_CON at@BlackHatEvents#BHEU 2019. So glad to be attending this. It was a good Day1. Looking forward for tomorrow as well. pic.twitter.com/8DWFgvnEof
-
Security engineer Mohammed Aldoub (
@Voulnet) discusses Barq – a post-exploitation framework for performing attacks on running AWS infrastructure#BHEU https://portswigger.net/daily-swig/barq-post-exploitation-framework-plays-havoc-with-aws-infrastructure … -
Thanks to all of the
#BHEU 2019 Arsenal Presenters, Attendees and of course the@ToolsWatch Team for a great showing of open-source tools!https://twitter.com/ToolsWatch/status/1202629316737208320 …
-
Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: https://www.decalage.info/bheu2019 Featuring
#oletools/olevba, ViperMonkey, MacroRaptor, EvilClippy#BHEU#BHEU2019pic.twitter.com/iT8iqvIM8E
-
The security industry needs more people with breadth of knowledge.
@malwareunicorn#BHEU pic.twitter.com/WTYt0z0wsA – at ExCeL London
-
Want to chat about Industrial Control Systems? See you in the attendee lounge on level 3 at 4.30pm! Don’t be late, it’s going to be a short 20 minutes lightning feature!
@BlackHatEvents#BHEU https://www.blackhat.com/eu-19/features/schedule/index.html#industrial-control-systems-hosted-by-stefano-zanero-18912 … -
Great talk by
@infernosec and@halbecaf on fuzzing at scale with ClusterFuzz.#BHEU pic.twitter.com/IFnRJg7A2q
-
I'm sure when I look back at Black Hat Europe 2019, one of my favorite moments will be "That time
@MalwareJake cosplayed as China."
#bheu#blackhatpic.twitter.com/yRqMPM9CpY
-
Presenting our research "iOS on QEMU" at
#BHEU this December! Will talk about the journey we went through to get an unpatched iOS kernel to boot on QEMU running an interactive bash shell with a full kernel debugger attached.@alephsecurity@BlackHatEvents -
Interesting presentation on fuzzing at scale with Google’s ClusterFuzz
#BHEU pic.twitter.com/wnhyEJ3G2T
-
Slides and material from our talk on attacking container build systems from
#BHEU are now online: https://github.com/heroku/bheu19-attacking-cloud-builds … And so is Terrier, the CI-oriented container integrity verification tool (mainly due to the amazing effort of the@brompwnie):https://github.com/heroku/terrier/ -
If you deployed Windows Hello for Business, you should definitely read Microsoft's Security Advisory ADV190026. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190026 … And I am not saying it just because I reported that issue and had a talk about it at Black Hat Europe.
https://www.blackhat.com/eu-19/briefings/schedule/index.html#exploiting-windows-hello-for-business-17260 … #BHEU pic.twitter.com/BUKgzAc33b
-
I am excited to present my vulnerability research this Saturday at
#36C3! I will show three different RCEs that I discovered on Ruckus Wireless access points. I hope#BHEU check for updates often :) pic.twitter.com/BEfZpofJjn
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.