Thursday, 22 March 2012

Improving controls using IPv6



Space is limited.
Reserve your Webinar seat now at:
https://www2.gotomeeting.com/register/398429674

In this session you will learn what the main security issues with the Internet Protocol version 6 (IPv6) iwill be. Understand the vulnerabilities causing security concerns, and learn methods used to protect networks against hacker attacks and tools. The session will cover the weaknesses in IPv6 that are key areas of focus.

IPv6 Security forms the basis of the coming protection measures for the next Internet Protocol. Learn what you can do in order to ensure that you remain on top of your sites security controls and ensure that you are prepared for the coming changes.

In this session, you will learn of the coming changes as well as where to get further Information. More you will learn to improve the security of your site whilst incorporating mobility and new technologies.

Title:
Improving controls using IPv6
Date:
Friday, April 20, 2012
Time:
12:30 PM - 1:30 PM AEST

After registering you will receive a confirmation email containing information about joining the Webinar.

System Requirements
PC-based attendees
Required: Windows® 7, Vista, XP or 2003 Server

Macintosh®-based attendees
Required: Mac OS® X 10.5 or newer

Wednesday, 21 March 2012

Latest malware article

My latest article in the series on reversing and understanding exploit creation is out in Hakin9.

 

Understanding conditionals in shellcode
By Craig Wright
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process. This is a precursor to the actual injection and hooking process to follow. You will investigate how you can determine code loops, the uses of loops as well as acting as an introduction into how you can reverse engineer assembly or shellcode into a higher level language and even pseudo-code, all of which forms an essential component of creating and executing one’s own exploit successfully. By gaining a deep understanding just how code works and to know where to find the fundamentals shellcode programming language you are going to be taken from a novice to being able to create and deploy their own shellcode and exploits.

 

Monday, 19 March 2012

Breaking into household appliances

Well, I see from a link shared by Dhillon Kannabhiran (HiTB) that the CIA wants to break into appliances.

Well, I have been doing silly reverse engineering and hacking exercises for years including things like finding vulnerabilities in an online coffee maker by Jura, and an insecure wireless toothbrush (yes this is real).

The not too distant future…

Disposable communication tablets.

Well actually these are already available.

The internet of things is here already.

The nature of IPv6 and the distributed architecture and advanced in mobile computing will make everything cloud based, even the computer on your desktop, that is, if you even have a desktop any more.

So, is expecting an attack against household appliances anything unexpected…?

Not really, but it is interesting that it has taken this long.