A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises.
First book is complete, second book is content complete and currently in technical review.
At JS Remote Conf: Kim examines and demonstrates a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today.
At NZ.JS: Kim examines and demonstrates a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today.
Kim will walk us through a collection of PowerShell delivery (RAM, not disk) techniques for a common reverse shellcode.
At WDCNZ: Kim discusses and demonstrates how JavaScript can be used for good and evil.
Redirects to legacy blog post.
It’s my intention that the following details will help you create a system that automates “Specification by Example”.
Redirects to legacy blog post.
Part two of a three part series.
Redirects to legacy blog post.
I’ve been working on a small project that shuts down machines attached by network and of course power feed to an APC Smart-UPS. The code that was shutting down the guests required authentication to be passed to the receiving services.