From Security Weekly Wiki
Jump to navigationJump to search
220 bytes added ,  20:14, 23 May 2017
= Episode Media =
[ MP3] < Not yet published!
= Announcements =
= Guest Interview: Paul Coggin =
# Pick two celebrities to be your parents.
= Stories =
= Stories =<center>{{#ev:youtube|V3U-8ZkWgpM"}}</center>
== Sponsors ==
== Paul's Stories ==
You can find all of [ Paul's RSS Feeds Here].
#[ "Guest diary: Detecting Suspicious Devices On-The-Fly]
#[ Bugtraq: WordPress 3 persistent script injection]
#[ Reversing Industrial firmware for fun and backdoors I] - Some updates posted here, I wonder if everyone has updated their firmware? Likely not... We seem to lack adequate testing tools, given the nature of embedded systems and how each one is unique. How does your enterprise ensure firmware updates across devices?
#[ Reversing DELL's DRAC firmware] - Turns out, this firmware does not use /etc/shadow. This means the backdoor found is not accessible remotely. Oh well. This happens when you are reverse engineering firmware. You find artifacts, but sometimes they are not used in the production environment. Maybe it was only used in a test environment or another hardware revision. Or sometimes the firmware is copied from a different hardware device and some features are not implemented.
== Larry's Stories ==
== Jack's Stories ==
Stories? You want stories? I'll tell ya stories. Why, when I was your age one time I... <br>No, wait, that wasn't me.<br><br>== Joff's musings from down under ==Oh, yeah. Have a CISSP or other (ISC)2 cert? VOTE. The Board elections are open. Vote. Just do it.


Navigation menu