March 19th, 2012 | by NJ Ouchn
Javvad Malik is a well-seasoned information security consultant with well over a decades worth of experience in working with some [&hellip
March 19th, 2012 | by NJ Ouchn
pastemon is a tool to monitor pastebin.com content for relevant information. Based on regular expressions, events are generated. Those can [&hellip
March 19th, 2012 | by NJ Ouchn
Windbgshark is an open source network debugging tool, designed to assist in reverse engineering of unknown protocols, traffic manipulation and [&hellip
March 19th, 2012 | by NJ Ouchn
Citrix ICA is a complex multi-layered protocol which uses multiplexed frames, compression and encryption over a single TCP connection. Rather [&hellip
March 19th, 2012 | by NJ Ouchn
The presentation will discuss the vulnerability XPATH Injection in depth and we will cover advanced exploitation techniques. We will talk [&hellip
March 19th, 2012 | by NJ Ouchn
The tools exploit xpath injection vulnerability in web applications and support advanced exploitation features. Both Xpath 1.0 and 2.0 are [&hellip
March 19th, 2012 | by NJ Ouchn
Didier has released several free open source tools to help with the analysis of (malicious) PDF files. These tools are [&hellip
March 19th, 2012 | by NJ Ouchn
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful [&hellip
March 19th, 2012 | by NJ Ouchn
What is Seccubus? Seccubus automates regular vulnerability scans and provides delta reporting. The goal is to reduce the analysis time [&hellip
March 18th, 2012 | by NJ Ouchn
This is my mandatory, “look at me I’m at BlackHat Europe” post. Usually I’ll hide myself away at conferences in [&hellip