Reading time:
~17 min
Posted
by Rogan Dawes
on
08 June 2018
Thanks to IoT and other developments, we’re having to review more and more non-HTTP protocols these days. While the hardware...
Reading time:
~5 min
Posted
by frans
on
16 October 2017
This post assumes a passing familiarity with what a Distinguishing Attack on a cryptographic hash is, as well as the...
Reading time:
~21 min
Posted
by saif
on
29 July 2017
Exploiting MS17-017 EoP Using Color Palettes This post is an accompaniment to the Defcon 25 talk given by Saif. One...
Reading time:
~10 min
Posted
by saif
on
06 April 2017
Whilst on a Red Team assessment back in 2015, we were faced with a tough Data Leak Protection (DLP) and...
Reading time:
~1 min
Posted
by Paul
on
09 June 2015
Transport layer security has had a rough ride recently, with a number of vulnerabilities being reported. At a time when...
Reading time:
Less than a minute
Posted
by glenn
on
10 April 2015
Recently there were revelations about a GHCQ initiative called ‘Lovely Horses’ to monitor certain hackers’ Twitter handles. The guys over...
Reading time:
~6 min
Posted
by glenn
on
06 June 2014
This blog post is about the process we went through trying to better interpret the masses of scan results that...
Reading time:
~8 min
Posted
by Rogan Dawes
on
05 June 2014
This is a tool that I have wanted to build for at least 5 years. Checking my archives, the earliest...
Reading time:
~8 min
Posted
by behrang
on
12 April 2013
A cloud storage service such as Microsoft SkyDrive requires building data centers as well as operational and maintenance costs. An alternative approach...
Reading time:
~1 min
Posted
by behrang
on
10 September 2012
Today’s smart cards such as banking cards and smart corporate badges are capable of running multiple tiny applications which are...
Reading time:
~4 min
Posted
by behrang
on
24 May 2012
There has been a healthy reaction to our initial post on our research into the RSA SecureID Software Token. A...
Reading time:
~7 min
Posted
by behrang
on
17 May 2012
Widespread use of smart phones by employees to perform work related activities has introduced the idea of using these devices...
Reading time:
~2 min
Posted
by glenn
on
13 September 2011
I gave an updated version of my ‘Hacking Online Auctions’ talk at UnCon in London last week. The talk gave...