My Non-Tech Reading Recomendations
Recently I was talking with a friend about my favorite books in the areas of fun hacking fiction and books that have impacted the way I work and think so I decided to compile this list and share it.
Read MoreWhen getting shell is only the start of the journey.
Recently I was talking with a friend about my favorite books in the areas of fun hacking fiction and books that have impacted the way I work and think so I decided to compile this list and share it.
Read MoreI would like to define my plan of self improvement for this year. The plan is a simple one:
> Good Karma == Good Karma
Now what do I mean by it, as I participate more and more in the local and in the global security community in general I have noticed that I have lost energy in petty debates and spent to much time wasting energy in areas I should not and on people who I should not waste time with.
Read MoreAfter I posted in Twitter that I was building a second ESXi server for my lab I got quite a large number of replies and direct messages on what I used as a lab. Based on the interest I decided to write a blog post on why I choose the gear I did and where do I see upgrading it in the near future.
I have to say we need to start with the needs first since this will dictate what hardware I will need, what hypervisor is best for the work I will do and will also have an impact on my budget.
I need a lab where I can run:
The Enhance Mitigation Experience Toolkit (EMET) has to be one of the Microsoft security tools that I recommend the most to organizations of all sizes, friends and family do to that it helps curve in many cases the window of exploitation for many client side attacks when configured right on client machines in the network. EMET also provides protection for known vulnerabilities that have not been tailored to bypass it and against 0 day client side exploits for known software.
Many other people have written about the capabilities of EMET so I will not cover all the new features added and new capabilities in 4.0, in fact the documentation from Microsoft is great http://www.microsoft.com/en-us/download/details.aspx?id=39273 it covers how to deploy EMET via Group Policy and how to deploy it using System Center Configuration Manager. The documentation also cover all the features in great detail so I will not bore you regurgitating that information from there.
Now for this blog post it will part from some pre-conceived notions:
On September 25 and 26 I will be teaching at Derbycon my class on Introduction to PowerShell for Security Professionals https://www.derbycon.com/training-courses/#intropower . To give a bit of background on it I have since 2007 been using PowerShell since version 1 for automating, managing, securing and breaking Exchange, Windows, VMware, NetApp and even Cisco for several customers in the Caribbean, Central and South America. I have to admit of all the command shells I have used PowerShell has to be my favorite, it is truly a very powerful shell. I have coded several thousands of lines of PowerShell, in modules both in PowerShell and C#, I have also written several blog posts on it, all of this leading me to the creation of these class. Microsoft is evolving its technologies at a more rapid pace and PowerShell has become a critical pillar of its Management Framework for Windows and Server products. In the class targeted at security professionals, to me these are:
The first day it will be a fast paced introduction to PowerShell and its philosophy, Covering:
The second day will cover: