Location: A security area with access control. Two pentesters need to get (legitimate) access to the area, which requires three things: An authorisation token, your signature, and your identity card. The token is ready, the paper sheet signed and… access is granted. Wait, what about the identity card? The friendly security guard is stumped.
“Well, the [...]
23 Advisories advisory anniversary brucon brussels business cebit chiptan conference config ctf dect dfn eipsi english Firewire Fun Hacking hacklu jboss kensington linux new onlinebanking Paper pentest physical security pizza poc policy printer RedTeam release renegotiation security slides software security talk tv video web whitepaper wiretapping workshop