❌

Normal view

Indecent Exposure: Your Secrets are ShowingΒ 

By: BHIS
9 January 2025 at 15:09

by moth Hard-coded cryptographic secrets? In my commercially purchased, closed-source software? It’s more likely than you think. Like, a lot more likely.Β  This blog post details a true story of […]

The post Indecent Exposure: Your Secrets are ShowingΒ  appeared first on Black Hills Information Security, Inc..

How to Hack Hardware using UART

By: BHIS
3 September 2019 at 19:21

Raymond Felch // Preface: I began my exploration of reverse-engineering firmware a few weeks back (see β€œJTAG – Micro-Controller Debuggingβ€œ), and although I made considerable progress finding and identifying the […]

The post How to Hack Hardware using UART appeared first on Black Hills Information Security, Inc..

Malware Analysis, Threat Intelligence and Reverse Engineering: workshop slides

By: Bart
8 February 2018 at 21:31

Last month I gave a workshop for a group of 20-25 enthusiastic women, all either starting in infosec, or with an interest to start in this field.

For that purpose, I had created a full workshop: slides or a presentation introducing the concepts ofΒ Malware Analysis, Threat Intelligence and Reverse Engineering.

The idea was to convey these topics in a clear and approachableΒ manner, both theory and in practice; for the latter, I had set up a custom VM, with Labs, including my own created applications, some with simple obfuscation.

All participants were very enthusiastic, and I hope to have sparkled most, if not some of them to pursue a career in this field. For this exact same reason, I am now releasing the presentation to the public - the VM and recordings however will not be published, as I created these solely for CWF.

You may however download the LAB material from Github below:
https://github.com/bartblaze/MaTiRe

Without any further ado, you may find the slides below, on SlideShare:


Any feedback is always appreciated.

I would also like to thank Nathalie for putting me in touch with Rosanna, the organiser of the CyberWayFinder program. And of course, my gratitude to all the attendees for making it!

Mind the disclaimer for the slides.Β License: CC Attribution-NonCommercial-NoDerivs License

Lawrence’s List 081916

By: BHIS
19 August 2016 at 19:35

Lawrence Hoffman // So Microsoft is open sourcing PowerShell and putting it on Linux. Realistically Linux already has a full suite of administrative tools and some very powerful scripting languages […]

The post Lawrence’s List 081916 appeared first on Black Hills Information Security, Inc..

❌