Insinuator


Some outright rants from a bunch of infosec practitioners.

Jul/15

1

The patient’s last words: I am not a target!

Last week I gave a short interview for Süddeutsche Zeitung on the security of medical devices. You can find it here. Unfortunately it is in German so I decided to sum up some of my key points that made it into the article and some that didn’t in this blog post. (more…)

No tags | Post your comment here.

Jun/15

29

BT SnoopCon

I had the honour to be invited to BT‘s SnoopCon, which is their annual internal conference for people involved with security at BT. There were several external and internal speakers and I was stunned by the quality of the talks and the collaborative atmosphere. Since this event is somewhat internal (even though I’m obviously allowed to talk about it), I won’t go into details, however there were two particularly great talks about military war games (which I personally enjoyed very much given my history in CTF contests) and PoS security.

I was presenting on our progress in the area of Connected Car security and presented the lessons we learned from our lab and the Troopers Connected Car Roundtable (which we will have again for TR16) and how they will influence our traditional pentesting approach when it comes to cars (slides can be found here).

Best,

Matthias

No tags | Post your comment here.

Jun/15

28

CSA.no Nordic Summit

Flo and I had the pleasure to present at the CSA Nordic Summit in Norway. Being in Oslo for the first time, we enjoyed the conference (small, familiar atmosphere) very much and want to thank Lars and Kai for putting together such a good event & having us there!

Our slides can be found here:

Hacking Medical Devices

Tools of the Trade: Lessons Learned from the (C)ISO’s Desk

 

best,

Matthias

No tags | Post your comment here.

Jun/15

26

NANOG64

I recently had the pleasure to join the 64th NANOG (North American Network Operators’ Group) meeting in San Francisco, which can be understood as one of the largest Internet engineering conferences at all. It takes place three times a year at different locations in North America.

What I personally like about NANOG is its strong collaborative and cooperative character. It is not about single persons and also not too much about spectacular projects but more about discussing technologies, ideas, challenges and numbers. Every talk has a comparatively large time slot reserved for discussion, which is often more than fully used. Discussion is typically actively focused and is more time-consuming (and even more relevant) than the talk itself. Which often is intended by the community. The climate of discussion is almost always impressively polite and constructive, even for controversially discussed topics.

(more…)

, , | Post your comment here.

Jun/15

26

Internet Information Service 7.5 Hardening Guide

Internet Information Services (IIS) contains several components that perform important functions for the application and Web server roles in Windows Server. As it is designed to be used in an enterprise environment, the security of this system must be kept at a high level.

By default IIS implements a lot of basic security measures, but are these the relevant ones to protect your business? (more…)

No tags | Post your comment here.

Jun/15

16

IPv6 Adress Planning / Some Notes

In the course of a customer project I recently documented some thoughts and general objectives of IPv6 address planning, expanding on stuff I wrote a while ago in the series on “Address Plan Considerations”. An excerpt of that (newer) document can be found here. Due to the context it originates from it’s in German, still I hope it’s useful for some readers.
If you’re interested in the topic it might be a good idea to listen to Tom Coffeen‘s talk at the upcoming IPv6 Business Conference, too.

Everybody have a great day

Enno

| Post your comment here.

Jun/15

12

An unpacker for Alcatel TiMOS images

Hi,

I wrote a small python script that extracts the content from Alcatel .tim firmware files. It took some time staring at hex values, as well as a fair amount of guess work to figure out the file format.
(more…)

, | Post your comment here.

Jun/15

10

TACACS+ module for loki

There has been, again, some development within the loki domain. Today I’m going to write about the latest module added to the suite, a module for decoding and cracking Cisco’s TACACS+.

(more…)

, , | Post your comment here.

Jun/15

9

ERNW @PHDays V in Moscow

Здравствуйте Insinuator Followers,

End of May eight ERNW members were travelling to Moscow (Russia) to visit the PHDays V conference. It was a very nice trip because we met a lot of gentle people, ate some great food and had quite some fun in this exciting and history-charged metropole, and we were able to get around using hands and feet (and Google translate ;-)).

The remainder of this post contains summaries of some of the most interesting talks at PHD V:

(more…)

, , | Post your comment here.

Hi,

I’m back from London where I gave a talk about security evaluation of proprietary network protocols. I had a great time at InfoSecurity Intelligent Defence and BSides London, many thanks for inviting me and giving me the opportunity to speak to so much nice people.

Find the abstract and the download link to the slides after the break.

(more…)

, | Post your comment here.

Older posts >>

Contact


Mail | Twitter | Imprint

©2010-2013 ERNW GmbH
To top