HackDig : Dig high-quality web security articles for hackers

The importance of logs: You won’t see what you don’t log

Presentation on logging and auditing strategies (as given at Secure South West 11). Building on my blog post on Cisco’s security blog entitled The Importance of Logs, I put together a presentation that picks apart some of the practical aspects of building a successful logging capability focusing on the need to document “good” and curate 
Publish At:2019-09-19 17:35 | Read:879 | Comments:0 | Tags:Presentations blue team hardening red team SecureSouthWest t

Where 2 worlds collide: Bringing Mimikatz et al to UNIX

Presentation on Active Directory integration solutions for UNIX (as given at Black Hat Europe 2018). Over the past fifteen years there’s been an uptick in “interesting” UNIX infrastructures being integrated into customers’ existing AD forests. Whilst the threat models enabled by this should be quite familiar to anyone securing a heter
Publish At:2019-09-19 17:35 | Read:973 | Comments:0 | Tags:Presentations analysis auditing Black Hat Europe blue team c

An offensive introduction to Active Directory on UNIX

By way of an introduction to our talk at Black Hat Europe, Security Advisory EMEAR would like to share the background on our recent research into some common Active Directory integration solutions. Just as with Windows, these solutions can be utilized to join UNIX infrastructure to enterprises’ Active Directory forests. Background to Active Directory i
Publish At:2019-09-19 17:35 | Read:1127 | Comments:0 | Tags:Blog analysis auditing Black Hat Europe blue team conference

Security Engineering – A manifesto for defensive security

Presentation on the need to re-examine how we engineer systems (taking service providers as an example) and the implications on how we quantify cyber risk if we want to take this message into the board room (as given at BT’s SnoopCon 2019 and Cisco’s June 2019 Knowledge Network webinar for service providers). Having delivered security consultancy
Publish At:2019-09-19 17:35 | Read:1043 | Comments:0 | Tags:Presentations C-Suite conference CRQ cyber risk quantificati

Diving into EMET

Table of Contents Overall Structure Configuration Tools Service Agent EMET Implementation DLLs Previous EMET Bypasses Last week, we decided to take a look onto the EMET library provided by Microsoft. This library is intended to introduce several security features to applications which are not explicitly compiled to use them. It also adds an additional
Publish At:2016-09-26 18:15 | Read:5679 | Comments:0 | Tags:Hardening Security analysis EMET Windows

Files Your Webserver Shouldn’t Deliver

During penetration tests, we often find interesting files on web servers. Almost as often, those files enable us to carry out further attacks with much higher impact. Inspired by Chris Gate’s great series From Low to Pwned, we decided to share the following small piece. The web server under test did not deliver directory listings. However, the directo
Publish At:2016-09-19 03:20 | Read:3480 | Comments:0 | Tags:Hardening Security hacking

Chrome picks up bonus security features on Windows 10

The Windows 10 November update (version 1511, build 10586) included a handful of new security features to provide protection against some security issues that have kept on popping up in Windows for a number of years. Google yesterday added source code support for these features to the Chrome browser, making Windows 10 the best version of Windows to use with
Publish At:2016-02-05 03:25 | Read:3938 | Comments:0 | Tags:Risk Assessment Technology Lab chrome hardening microsoft se


Share high-quality web security related articles with you:)