2009

EDoS is the new DDoS ?

Over at [Rational Survivability] beaker as coined the term EDoS. To describe how “the utility and agility of the cloud computing models such as Amazon AWS (EC2/S3) and the pricing models that go along with them can actually pose a very nasty risk to those who use the cloud to provide service” Of course, this has kicked off the flurry of responses from “How is this different to soaking up the bandwidth of people who pay per gig” to “OMG! thats the new thing.. Cloud Computing is bad”.

RFP Spotting..

Not the boring pile of papers kind.. the shiny pants and sunglasses kind: Turns out you can find him blogging these days at [http://research.zscaler.com/] PS. if you dont know who RFP is, you are too young, and probably think w00w00 is leetspeak for a siren..

QoW: Software Reversing and Exploitation

I’ve developed a FTP like multi-threaded server application as a target for this challenge of the month. It has been coded in c and compiled by VC++ 2008. This is a three step challenge: Step 1- Find the correct “passphrase” format to logon to the server and get the “Access Granted” message. (You may use a debugger like Ollydbg to do Live RE for this step). Step 2- Do vulnerability research on the server software. There is at least one exploitable bug but there could be more bugs or error conditions. Try to spot a memory corruption bug and write a denial of service exploit for it.

When missing a good hire works out well..

A few years ago, Mohamed Nanabhay was considering joining SensePost and i was trying hard to convince him it was the way and the light. He had been a KPMG auditor in a past life (but i promised not to hold that against him). We were not sure what he would do at SP, since he was kinda moving away from hardcore tech, but we always said that we would take quality people, even if we didnt have a niche for them, cause quality people will make a new niche.

So so senseless…

haroon :(

ITWeb Security Summit 2009 – CFP Deadline

I just wanted to remind everyone that the CFP for the 2009 ITWeb Security Summit closes on 26 Jan. We’re hoping to see much more in the way of submissions from local infosec people (especially from corporates) but there’s also still room for international submissions. So far I know of 11 ‘international’ submissions. ITWeb is really good to its international speakers so non- South Africans shouldn’t be put off by the long distances. The conference is at an excellent location, South Africa is beautiful at that time of year, you’ll stay in a swanky hotel (this is the one they used last), the food and beer are cheap and ITWeb will take good care of you. You can check out the conference home page and CFP here.

BiDiBLAH 2.0 Released!

Yup, that’s right, BiDIBLAH 2.0 has finally been released and is available for purchase at an incredibly low US$500!! You can get BiDiBLAH here. Users who would like to try it out first, can download the evaluation copy, which is limited to a 60 minute runtime. Also, check out the FAQ page for some common / technical questions and answers. ./frankieg

SensePost Training @ Black Hat DC

So… Black Hat DC is rushing at us like a speeding big… speeding thing. This is just a friendly a reminder about the show (Hyatt Regency Crystal City • February 16-19). We have two courses on offer at the DC show this year – Bootcamp (a highly practical course that teaches method-based hacker thinking, skills and techniques) and Combat (all hack, no talk – our flagship course). One small change to our usual approach this time is that we’re requesting Combat students to bring their own laptops. On Bootcamp and our other courses we provide pre-configured XP boxes but Combat participants are generally already quite experienced and comfortable on their own platforms.

“Hooker” approach to break-in!

Interesting post on cost/benefit analysis of hacker and hooker attacks…. behrang

Hacking By Numbers Online – your thoughts?

We often get asked by students of our Hacking By Numbers courses if the course environments or at least the VMWare images are available after the training is over. As a result we’ve started to experiment with a model for offering our courses in an online environment. The idea would be to maintain the full numbers of labs and technical work, maintain the high standard of trainers and materials, but make the training available via the internet to people at various diverse locations. The approach we’ve been testing appears to show some promise, so we’re hoping to ask some of you for your input and opinions.