cryptosec

Biais cognitifs et organisationnels

Le support de ma présentation au #FIC2019 : "Biais cognitifs et organisationnels : comment réussir sa sécurité (enfin, essayer)" http://cryptosec.org/docs/FIC2019/FIC2019_Masterclass_BiaisCognitifs.pdf

 
 

Cours Master 2 « Introduction à la cybersécurité » - Version 3

Version 3 de mon support de cours « Introduction à la cybersécurité », donné (pour la troisième année) en Master 2 Informatique Programmation et logiciels sûrs de l’Institut Galilée, dirigé par Pierre Boudes. 12 heures de cours à l’Université Paris XIII, des étudiants développeurs motivés, une fac qui bouge, d’autres cours de sécu et TP sécurité assurés par les excellents Virginie Galindo et Guillaume Rousse… Support de cours sous licence Creative Commons (BY – NC –SA). Si vous êtes intéressé par de telles interventions, contactez-moi. http://www.cryptosec.org/docs/CoursMaster2018/CoursCyberSecuriteMaster_2018_v3.pdf

 
 

Introduction à la cryptographie

Le support de ma conférence à la Fête de la science le 6 octobre 2018 à Montreuil, « La cryptographie, comment ça marche ? » http://cryptosec.org/docs/IntroCrypto2018

 
 

Risk assessment and security testing

Some weeks ago I wrote a short paper on the following topic : "Risk assessment and security testing : two sides of the same coin ?" Abstract - In this short essay we will examine how close risk assessments and security tests are, their differences and the potential benefits of bringing these activities closer. Full paper here : Risk assessment and security testing : two sides of the same coin ?

 
 

DCSync and DCShadow

I had recently a chat with Benjamin Delpy, the father of Mimikatz about his last findings (with Vincent Le Toux), DCSync and DCShadow – first presented at the Bluehat IL 2018 conference – now included in his tool. Context | Domain controllers often talk with each other, and the protocol they use is MS-DRSR (apparently not very well documented) DCSync | When a DC wants to update its data requesting another DC, it calls an API, using domain admin or DC$ creds. What if this API is called by something which is not a DC ? Among all the available methods, one is very interesting : DRSGetNCChanges. It is used “To obtain all change of the targeted object (using its GUID)”. This allows for (...)

 
 

Phished

Great farewell gifts from a great cybersec team ! Many tanks to them for this year !

 
 

Policies / real-life attacks, a healthy dialectic

“Policies / real-life attacks, a healthy dialectic”, a presentation I made in November 2017 during a security conference (not public) in Buenos Aires. While it is obvious that security policies can affect the attack surface of an organization, I try in this short presentation to identify some lessons we can take away from real-life attacks regarding… security policies and standards. http://www.cryptosec.org/docs/PoliciesAttacks/Policies_real-life_attacks_08112017.pdf

 
 

Seguridad de la seguridad, un método empírico - Paper & Prez

"Seguridad de la seguridad, un método empírico", el artículo presentado en el "IX Congreso Iberoamericano de Seguridad Informática - CIBSI 2017" : http://cryptosec.org/docs/CIBSI2017/Seguridad_Seguridad_Metodo_Empirico_v4.pdf Mi presentación del 3 de noviembre 2017, Buenos Aires : http://cryptosec.org/docs/CIBSI2017/Seguridad_Seguridad_Prez_CIBSI.pdf

 
 

0 | 8 | 16 | 24 | 32

Creative Commons - BY - NC - ND

Tous les textes, images et sons de cryptosec sont publiés selon les termes de la licence Creative Commons - Attribution - Pas d’Utilisation Commerciale - Pas de Modification - 3.0