Bulletin Board Code
Copy and paste the following code into your bulletin board post.
DIGITAL COMBAT SIMULATOR
FAR CRY 5
FOOD & DRINK
FORTNITE BATTLE ROYALE
FREEDOM OF SPEECH
GOD OF WAR
HEALTH & WELLNESS
RED DEAD REDEMPTION
WORLD WAR 2
'Fighting the Previous War - Attacking and Defending in the Cloud Era Part 1 '
#early AWS AMI ID attack
early AWS AMI ID attack
Early AWS AMI ID, so a simple attack was to generate a low enough one to get it pushed to the top.
#AWS virtual machine bomb
AWS virtual machine bomb
#SendGrid bug bounty from Uber
SendGrid bug bounty from Uber
illustrates microservices security problems.
#Canarytokens are a modernization on honey tokens
Canarytokens are a modernization on honey tokens
#How to tell if SalesForce accounts are compromised using Canarytokens
How to tell if SalesForce accounts are compromised using Canarytokens
#Common shared library attack
Common shared library attack
in open source software
#Malicious Atom editor plugin
Malicious Atom editor plugin
#Advertising in Minimap plugin
Advertising in Minimap plugin
after plugin purchased and taken in a new direction.
#Post exploitation honeytokens in Slack
Post exploitation honeytokens in Slack
#Persistence in AWS
Persistence in AWS
#Self XSS to achieve persistence in IaaS
Self XSS to achieve persistence in IaaS
#AWS specific attacks
AWS specific attacks
#Amazon's recommended deployment for WordPress showing complexity
Amazon's recommended deployment for WordPress showing complexity
#AWS explosed code complexity vs GNU LibC
AWS explosed code complexity vs GNU LibC
#Reconnaissance in AWS
Reconnaissance in AWS
#Bruteforcing AWS Account IDs
Bruteforcing AWS Account IDs
#Account IDs are often posted public
Account IDs are often posted public
#S3 bucket username logging to get account ID
S3 bucket username logging to get account ID
#S3 bucket discovery
S3 bucket discovery
#Queue names are often posted public
Queue names are often posted public
#AWS credential compromise
AWS credential compromise
#Authenticating through AWS Identity Documents
Authenticating through AWS Identity Documents
does not have source validation.
#AWS Permission enumeration
AWS Permission enumeration
#Lateral movement in AWS
Lateral movement in AWS
Fighting the Previous War - Attacking and Defending in the Cloud Era Part 1
Fighting the Previous War - Attacking and Defending in the Cloud Era. Marco Slaviero. Thinkst. AWS.
Another Intel Vuln Lets Attackers in Your computer
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
by Tom Nipravsky Malware developers are constantly looking for new ways to evade the detection and prevention capabilities of security solutions.
PoisonTap USB operation and feature overview
PDF File Format Attacks -- OMG WTF PDF [27C3]
OMG WTF PDF What you didn't know about Acrobat Ambiguities in the PDF specification means that no two PDF parsers will see a file in the same way.
Radar Jamming: "Defensive Electronic Countermeasures" May 1962 US Navy Training Film
Hacking Democracy - the beginning
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings
Numerous botnets employ domain generation algorithms (DGA) to dynamically generate a large number of random domain names from which a small subset
USB Killer vs iPhone 7 Plus - Instant Death?
What Happens If You Plug a USB Killer v2.0 Into iPhone 7 Plus? or Note 7? The Fastest Way To Kill a Computer!
Hunting rogue WiFi devices using the HackRF SDR - Part 1 of 2
Mike Davis talking on: "Hunting rogue WiFi devices using the HackRF SDR". Hacking, Wifi hacking, HackRF, Wireless basics. Part 2:
Enterprise security: A new hope, Haroon Meer (Thinkst)
The frequency and impact of recent high-profile breaches has been positively depressing. Besides the increasing number of incidents themselves,
TechForce PROTECT partner - Thinkst Canary tools demo
OpenCanary: a new Python-based honeypot
Self-Defense Lessons with a Former CIA Agent | Rachael Ray Show
Haroon Meer / keynote - Time to play "D"
Haroon Meer 1
Differential Cryptanalysis: an Introduction for Humans
Keith Makan talks about differential cryptanalysis which is one of the most fundamental attacks ever developed in the history of security. The talk
[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction
Canary Token Cyber Security Honeypot
Hunting rogue WiFi devices using the HackRF SDR - Part 2 of 2
Mike Davis talking on: "Hunting rogue WiFi devices using the HackRF SDR". Hacking, Wifi hacking, HackRF, Wireless basics.
[LIVE]: Jones Cup 2019 /Mighty Sports Philippines vs Korea
2019 Jones Cup Men's Group Day 5 : 7/16/13:00 - Canada vs Iran 7/16/15:00 - Japan vs Indonesia 7/16/17:00 - Korea vs Philippines 7/16/19:00 -