Reading time:
~6 min
Posted
by Michael Kruger
on
04 November 2020
Something I have found myself doing more and more often is using Exchange Web Services (EWS) to bypass 2FA. I...
Reading time:
~5 min
Posted
by glenn
on
13 June 2014
Friday the 13th seemed like as good a date as any to release Snoopy 2.0 (aka snoopy-ng). For those in...
Reading time:
~15 min
Posted
by behrang
on
04 June 2013
Introduction: New types of mobile applications based on Trusted Execution Environments (TEE) and most notably ARM TrustZone micro-kernels are emerging which...
Reading time:
~3 min
Posted
by inaki
on
04 March 2013
A few days ago, during one of those nights with the baby crying at 2:00 am and the only thing...
Reading time:
~4 min
Posted
by glenn
on
06 December 2012
We blogged a little while back about the Snoopy demonstration given at 44Con London. A similar talk was given at...
Reading time:
~2 min
Posted
by glenn
on
13 September 2011
I gave an updated version of my ‘Hacking Online Auctions’ talk at UnCon in London last week. The talk gave...
Reading time:
Less than a minute
Posted
by marco
on
07 August 2011
On this past Thursday we spoke at BlackHat USA on Python Pickle. In the presentation, we covered approaches for implementing...
Reading time:
~8 min
Posted
by marco
on
15 November 2010
[This is the third in a series of posts on Pickle. Link to part one and two.] Thanks for stopping...
Reading time:
~12 min
Posted
by marco
on
09 November 2010
[This is the second in a series of posts on Pickle. Link to part one.] In the previous post I...
Reading time:
~6 min
Posted
by marco
on
09 November 2010
In our recent memcached investigations (a blog post is still in the wings) we came across numerous caches storing serialized...