Dear readers, what have you been doing? Yesterday, OCT/23, it happened the second day of the amazing Hacker to Hackers Conference (H2HC).
I had the opportunity of teaching a quick talk about Memory Analysis and a lecture about Malware Anti-Forensics. My attendees were amazing, very interested and we have a great moment. Few photos follow below:
I am extremely proud of taking part and, as I’ve already told previously, the H2HC is my second home.
Dear readers, yesterday (Saturday, OCT/22) I had the opportunity to meet one of the greatest malware researches around the world: Alex Mastrosov. He is an amazing, excellent and humble person. Few photos with Alex follow below:
Really, I have an outstanding time during my short conversation with him. Thank you for the attention so much, Alex.
Dear readers, how are you? Finally, yesterday the Hacker to Hackers 2016 started and, doubtless, it is my favorite event! During the first day, there were several amazing talks. Personally, I taught about “Malwares – Few tricks” during an one-hour talk. Few photos follow below:
During the day 2, I am talking during a workshop about Volatility (and other stuffs) and I am teaching another lecture about Malware Anti-Forensics techniques. Stay tuned!
It is usual reading no such good words on the complex and hard understanding of the Kerberos. Although my area is Malware Analysis, Reverse Engineering and Software Exploitation, I’ve written two articles for Oracle trying to mitigate this undesirable impression about the Kerberos. I used Oracle Linux 7.2 for implementing the solution.
The first article deeply explains Kerberos concepts and showss how to implementing it. At end, I show how to integrate SSH with it.
The second article has a more practical approach. It explain how to implement an IdM (Identity Manager Server), integrating the Kerberos with Active Directory and Samba.