9 november 2016

NDN - nästa steg för Internet?

Fokusering på data och distribuerad leverans, mindre fokus på TCP/IP kanaler.

http://named-data.net/

.

11 april 2016

15 mars 2016

Bypassing Local Windows Authentication To Defeat Full Disk Encryption

Använda DC (domain controller) för att lura en klient PC som har bitlocker påslagen i "transparent" bitlocker mode dvs utan PIN kod eller liknande vid uppstart.



Genom att lura PCn att användare vid nästa inlogg måste byta lösenord, kan autenticering gås förbi.

Mer info i nedan video från BlackHat.



Bypassing Local Windows Authentication To Defeat Full Disk Encryption - YouTube

20 februari 2016

LIGO Detected Gravitational Waves from Black Holes

Som jag väntat på detta! :-)
Detection | LIGO Lab | Caltech

NSA TAO Chief on Disrupting Nation State Hackers

Nothing new but still interesting.

USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers - YouTube

From his role as the Chief of NSA's Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks.


7 februari 2016

3 februari 2016

Obtaining and Detecting Domain Persistence

Ta över en domain controller. Beskriver flera sätt att bibehålla access till en domain controller. Beskriver även hur en försvarare kan se händelser i loggarna. Mycket bra presentation.


DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain Persistence - YouTube


28 januari 2016

NSA Hacker Chief Explains How to Keep Him Out of Your System

How to Keep the NSA Out

If you really want to make the NSA’s life hard, he ticked off a list of things to do: limit access privileges for important systems to those who really need them; segment networks and important data to make it harder for hackers to reach your jewels; patch systems and implement application whitelisting; remove hardcoded passwords and legacy protocols that transmit passwords in the clear...

....Another nightmare for the NSA? An “out-of-band network tap”—a device that monitors network activity and produces logs that can record anomalous activity—plus a smart system administrator who actually reads the logs and pays attention to what they say.....

NSA Hacker Chief Explains How to Keep Him Out of Your System | WIRED


US CYBERCOM and the NSA: A Strategic Look with ADM Michael S. Rogers

• How cybersecurity and defense fit into the country's national security strategy;
• The response to cyberattacks, how to deter them, and stability escalation;
• What the future of cyber conflict and cyber power will look like.



US CYBERCOM and the NSA: A Strategic Look with ADM Michael S. Rogers


(intro by John from SAAB Northamerica...)