Monday, April 29, 2013

Think like a hacker, write secure code!

Each program as a target for a security pen tester can be viewed as a new experience. But beyond the special characteristics of each target, I always see the big mistake that causes most of the vulnerabilities discovered:
"The programmers do not think as a hacker". Unfortunately most of the programmers write the code in a way that is suitable for a utopia. In such utopia, no one wants to bypass the guards, everyone is honest and respects the rules...
Perhaps the most important role of a programmer in the security program is to learn the art of thinking like a hacker.

Sunday, April 7, 2013

Windows Forensics (2)

I am collecting the tools and useful information on windows forensics. Thanks to Microsoft and the security community, there are amazing free tools, guideline, blog posts, etc. around the topic.
For the first post, I recommend this:
Use PowerShell to Perform Offline Analysis of Security Logs

Friday, April 5, 2013

Windows forensics (1)

Windows Forensics Toolchest (WFT) is an interesting and easy to use set of forensics tools that are suitable for use in a live windows system. You should prepare the tools for each windows version separately, as well as the common tools such as sysinternals suit.  The native windows tools such as cmd.exe is better to be copied from a trusted source other than the target system. The features set are available here.