This blogpost contains summaries of talks from this year’s TROOPERS18 Attack & Research Track.
Continue reading “#TR18 Attack & Research Summaries”
Continue readingBold Statements
This blogpost contains summaries of talks from this year’s TROOPERS18 Attack & Research Track.
Continue reading “#TR18 Attack & Research Summaries”
Continue readingThis blogpost contains summaries of talks from this year’s TROOPERS18 SAP Security Track.
Continue reading “#TR18 SAP Security Summaries”
Continue readingThis blogpost contains summaries of talks from this year’s TROOPERS18 Next Generation Internet Event.
Continue reading “#TR18 Next Generation Internet (NGI) Summaries”
Continue readingThis is the first post discussing talks of the Active Directory Security Track of this year’s Troopers which took place last week in Heidelberg (like in the last nine years ;-). It featured, amongst others, a new track focused on Microsoft AD and its security properties & implications. This was the agenda.
Continue reading “#TR18 Active Directory Security Track, Part 1”
Continue readingBirk an me basically fully disclosed a 0day in Squirrelmail yesterday. This is a short Q&A to answer the most common questions about the issue to calm you all down a little bit. 😉
Continue reading “Squirrelmail Full Disclosure – TROOPERS18”
Continue readingTROOPERS has a long history of theming the conference every year. Usually we pick a surreal topic, a fun story which we think is worth to pick up on. Some of it starts as a crazy thought, others have been the result of long discussions. Most of them are online, only our master piece from 2016 is securely stored in the company’s vaults.
Continue reading “The Hackers‘ Sanctuary City”
Continue readingRelated to our new TROOPERS workshop “Jump-Starting Public Cloud Security”, this post is going to describe some relevant components which need to be taken care of when constructing and auditing an Amazon Web Services (AWS) cloud environment. Those include amongst others the general AWS account structure, Identity and Access Management (IAM), Auditing and Logging (CloudTrail and CloudWatch), Virtual Private Cloud (VPC) networks, as well as S3 buckets.
Continue reading “Auditing AWS Environments”
Continue readingWe have the next set of selected talks being announced here. I am super excited about the variety of applications we had this year. Here are some of the talks we will have.
Title: From LoRa technology to deployment within Orange affiliates
Continue reading “TelcoSecDay 2018 – Talks Part2”
Continue readingERNW has a new baby, so please say “hello” to the new ERNW SecTools GmbH ;-).
But why another ERNW company? Short answer: Because we want to contribute to changing the way how software is built today: insecure, focused on profit and sometimes made by people who ignore lessons from history. So how can we contribute in this space? Start changing it ;-).
Continue reading “printf(“Hello World!”)”
Continue readingIn various scenarios it might be helpful or even required to have a statically compiled version of Nmap available. This applies to e.g. scenarios where only limited user privileges are available and installing anything to the system might not be desirable.
Continue reading “Creating Static Binaries for Nmap, Socat and other Tools”
Continue reading