This blogpost contains summaries of talks from this year’s TROOPERS18 Next Generation Internet Event.
Continue reading “#TR18 Next Generation Internet (NGI) Summaries”
Continue readingBold Statements
This blogpost contains summaries of talks from this year’s TROOPERS18 Next Generation Internet Event.
Continue reading “#TR18 Next Generation Internet (NGI) Summaries”
Continue readingThis is the first post discussing talks of the Active Directory Security Track of this year’s Troopers which took place last week in Heidelberg (like in the last nine years ;-). It featured, amongst others, a new track focused on Microsoft AD and its security properties & implications. This was the agenda.
Continue reading “#TR18 Active Directory Security Track, Part 1”
Continue readingBirk an me basically fully disclosed a 0day in Squirrelmail yesterday. This is a short Q&A to answer the most common questions about the issue to calm you all down a little bit. 😉
Continue reading “Squirrelmail Full Disclosure – TROOPERS18”
Continue readingTROOPERS has a long history of theming the conference every year. Usually we pick a surreal topic, a fun story which we think is worth to pick up on. Some of it starts as a crazy thought, others have been the result of long discussions. Most of them are online, only our master piece from 2016 is securely stored in the company’s vaults.
Continue reading “The Hackers‘ Sanctuary City”
Continue readingRelated to our new TROOPERS workshop “Jump-Starting Public Cloud Security”, this post is going to describe some relevant components which need to be taken care of when constructing and auditing an Amazon Web Services (AWS) cloud environment. Those include amongst others the general AWS account structure, Identity and Access Management (IAM), Auditing and Logging (CloudTrail and CloudWatch), Virtual Private Cloud (VPC) networks, as well as S3 buckets.
Continue reading “Auditing AWS Environments”
Continue readingWe have the next set of selected talks being announced here. I am super excited about the variety of applications we had this year. Here are some of the talks we will have.
Title:Â From LoRa technology to deployment within Orange affiliates
Continue reading “TelcoSecDay 2018 – Talks Part2”
Continue readingERNW has a new baby, so please say “hello” to the new ERNW SecTools GmbH ;-).
But why another ERNW company? Short answer: Because we want to contribute to changing the way how software is built today: insecure, focused on profit and sometimes made by people who ignore lessons from history. So how can we contribute in this space? Start changing it ;-).
Continue reading “printf(“Hello World!”)”
Continue readingIn various scenarios it might be helpful or even required to have a statically compiled version of Nmap available. This applies to e.g. scenarios where only limited user privileges are available and installing anything to the system might not be desirable.
Continue reading “Creating Static Binaries for Nmap, Socat and other Tools”
Continue readingOur new workshop about TLS/SSL in the enterprise will be held for the 1st time at Troopers 2018. So I would like to take the opportunity and post a short teaser about stuff we will cover in this workshop.
Continue reading “TLS in the Enterprise: Is Heartbleed still a Problem?”
Continue readingThis is a guest blog post by Salvador Mendoza.
During years, many different researches and attacks against digital and physical payment methods have been discussed. New security techniques and methodologies such as tokenization process attempts to reduce or prevent fraudulent transactions.
Continue reading “Extracting data from an EMV (Chip-And-Pin) Card with NFC technology”
Continue reading