By Chris Crowley "What is a DDD report?" you're wondering. That's my pet name for a Daily DNS Delta. You see, human beings are creatures of habit. Some have excellent habits, some have gross habits, some actually wear habits, but whatever works for you, we all are creatures of habit. We can use this feature … Continue reading DNS Anomaly Analysis Tips: Did you put a new cover sheet on that DDD report?
By Joshua Wright Introduction In the last installment of this article, we looked at the IsItDown application, and how it is designed not to run in the Android Emulator, and to include a super-annoying banner ad. We showed how the Apktool utility can be used to decompile an Android APK file, and how we can … Continue reading Modifying Android Apps: A SEC575 Hands-on Exercise, Part 2
By Joshua Wright Introduction As a security professional, I'm called on to evaluate the security of Android applications on a regular basis. This evaluation process usually takes on one of two forms: Evaluate app security from an end-user perspective Evaluate app security from a publisher perspective While there is a lot of overlap between the … Continue reading Modifying Android Apps: A SEC575 Hands-on Exercise, Part 1
By Joshua Wright When the Counter Hack team started building the SEC562: CyberCity Hands-on Kinetic Cyber Range class, I knew I wanted to develop a mission that involved the Industrial Control protocol Modbus/TCP and traffic lights. Because CyberCity is 1:87 scale, I needed to build my own traffic light controller using Modbus/TCP with model-sized traffic … Continue reading Traffic Lights and Modbus/TCP - A SEC562 CyberCity Hacking Adventure
By Mark Baggett Hello Security Pros! Many of you have noticed that SANS has included a challenge in this year's brochure for the Orlando conference. We had 79 people submit correct answers to the puzzle. From those names, we chose one name as the grand prize winner and that grand prize winner will receive four … Continue reading SANS Orlando 2015 Brochure Challenge Answers and Winner