Blackhat Arsenal Vegas 2012 – In Progress
July 26th, 2012 | by NJ Ouchn
Well, we are again live from Blackhat Arsenal Floor. This year again is a complete Blast. We have great tools [&hellipJuly 26th, 2012 | by NJ Ouchn
Well, we are again live from Blackhat Arsenal Floor. This year again is a complete Blast. We have great tools [&hellipMarch 19th, 2012 | by NJ Ouchn
Javvad Malik is a well-seasoned information security consultant with well over a decades worth of experience in working with some [&hellipMarch 19th, 2012 | by NJ Ouchn
pastemon is a tool to monitor pastebin.com content for relevant information. Based on regular expressions, events are generated. Those can [&hellipMarch 19th, 2012 | by NJ Ouchn
Windbgshark is an open source network debugging tool, designed to assist in reverse engineering of unknown protocols, traffic manipulation and [&hellipMarch 19th, 2012 | by NJ Ouchn
Citrix ICA is a complex multi-layered protocol which uses multiplexed frames, compression and encryption over a single TCP connection. Rather [&hellipMarch 19th, 2012 | by NJ Ouchn
The presentation will discuss the vulnerability XPATH Injection in depth and we will cover advanced exploitation techniques. We will talk [&hellipMarch 19th, 2012 | by NJ Ouchn
The tools exploit xpath injection vulnerability in web applications and support advanced exploitation features. Both Xpath 1.0 and 2.0 are [&hellipMarch 19th, 2012 | by NJ Ouchn
Didier has released several free open source tools to help with the analysis of (malicious) PDF files. These tools are [&hellipMarch 19th, 2012 | by NJ Ouchn
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful [&hellipMarch 19th, 2012 | by NJ Ouchn
What is Seccubus? Seccubus automates regular vulnerability scans and provides delta reporting. The goal is to reduce the analysis time [&hellip