If you are anything like me, when you hear "Hacking in the Year 2030" you immediately visualize hacking robot armies and UFOs to take them down with lazers and ultrasonic USB attachments via your PlayStation 10 using only changes in pupil dilation to read mental instructions of what hacking tools to launch.
Well this technology may very well be around in 2030, but unfortunately most of you are more likely to still be exploiting Cross Site Scripting (XSS) vulnerabilities in the web interface of the killer robots.
Pure Hacking's CTO, Ty Miller was invited to present at Black Hat 2012 for his third appearance as an official trainer at the world’s most high profile security event. Ty originally presented his development of “Reverse DNS Tunneling Shellcode” at Black Hat 2008 and has been an official part of the program with "The Shellcode Lab" since 2011.
Ty Miller, CTO of Pure Hacking, Australia’s leading specialist information security consultancy has been confirmed as an international speaker at the upcoming Hack in the Box security conference, 8 - 11 October, Kuala Lumpur, Malaysia. Miller will be running his internationally renowned "The Shellcode Lab" training course for penetration testers, security officers and auditors, system administrators and managers wanting to improve their shellcoding security skills. This is the first time that "The Shellcode Lab" will be available to Hack in the Box participants.
Lets say that at some point you decided to adhere to security best practices and set a password on your iPhone backups so that they are encrypted. A year or two later you have upgraded your iPhone to a new version and you want to transfer all of your data across to the new phone. You attempt to restore from your backup and, doh, you need to remember the password you set. You try every password you could have set but none of them work.
SMS 2-factor authentication has been implemented by a number of security conscious organisations, including banks, to secure online transactions. SMS 2-factor authentication has had a major impact in reducing online fraud. This is because an attacker most not only capture the victim's username and password to login to their bank account, but they must now also have the victim's phone to receive the SMS 2-factor authentication token. This restricts the number of possible attackers dramatically.