Reading time:
~9 min
Posted
by Darryn Cull
on
08 December 2016
In this blog post we are going to describe some tools we created to find and exploit unauthenticated X Windows sessions....
Reading time:
~5 min
Posted
by glenn
on
13 June 2014
Friday the 13th seemed like as good a date as any to release Snoopy 2.0 (aka snoopy-ng). For those in...
Reading time:
~2 min
Posted
by etienne
on
17 December 2013
Botconf’13, the “First botnet fighting conference” took place in Nantes, France from 5-6 December 2013. Botconf aimed to bring together...
Reading time:
Less than a minute
Posted
by jeremy
on
22 November 2013
Hey all, So following on from my talk (slides, video) I am releasing the NMAP service probes and the Poison...
Reading time:
~3 min
Posted
by Dominic White
on
06 September 2013
We recently gave a talk at the ITWeb Security Summit entitled “Offense Oriented Defence”. The talk was targeted at defenders...
Reading time:
~1 min
Posted
by behrang
on
19 August 2013
We are publishing the research paper and tool for our BlackHat 2013 USA talk on the Z-Wave proprietary wireless protocol...
Reading time:
~7 min
Posted
by Charl van der Walt
on
01 June 2013
You’ve probably never thought of this, but the home automation market in the US was worth approximately $3.2 billion in...
Reading time:
~1 min
Posted
by behrang
on
10 September 2012
Today’s smart cards such as banking cards and smart corporate badges are capable of running multiple tiny applications which are...
Reading time:
~9 min
Posted
by Charl van der Walt
on
07 May 2012
As 44Con 2012 starts to gain momentum (we’ll be there again this time around) I was perusing some of the talks...