User contributions
From BruCON 2017
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)
- 18:30, 31 July 2017 (diff | hist) . . (+61) . . Main Page (→General information)
- 17:42, 20 July 2017 (diff | hist) . . (0) . . m Vinnie Vanhoecke (Protected "Vinnie Vanhoecke" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:42, 20 July 2017 (diff | hist) . . (+363) . . N Vinnie Vanhoecke (Created page with "Vinnie is a penetration tester of web application & mobile application working for EY. During college he wrote a thesis about RFID and now he using his experience to provide a...")
- 17:42, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:36, 20 July 2017 (diff | hist) . . (0) . . m František Střasák (Protected "František Střasák" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:36, 20 July 2017 (diff | hist) . . (+294) . . N František Střasák (Created page with "František Střasák is a student of the Master program of Artificial Intelligence at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in this...")
- 17:36, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:17, 20 July 2017 (diff | hist) . . (0) . . m The cyber short. A market solution for product safety and corporate governance. (Protected "The cyber short. A market solution for product safety and corporate governance." ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:17, 20 July 2017 (diff | hist) . . (+630) . . N The cyber short. A market solution for product safety and corporate governance. (Created page with "The Bug Short: What I learned on the way to Wall Street. Justine Bone presents the world's first ever cyber security-backed short position. As CEO of MedSec, Justine and he...")
- 17:17, 20 July 2017 (diff | hist) . . (+2) . . Schedule
- 17:16, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:14, 20 July 2017 (diff | hist) . . (0) . . m Justine Bone (Protected "Justine Bone" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:14, 20 July 2017 (diff | hist) . . (+1,228) . . N Justine Bone (Created page with "Justine is a recovering vulnerability researcher and security executive with background in software security research, risk management, information security governance, and id...")
- 00:25, 2 July 2017 (diff | hist) . . (+97) . . Schedule
- 00:22, 2 July 2017 (diff | hist) . . (+571) . . N May the data stay with you - Network Data Exfiltration Techniques. (Created page with "Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection. During this workshop (2 hours)...")
- 00:20, 2 July 2017 (diff | hist) . . (+1,357) . . N Building a cheap, robust, scaling, penetration testing/bug bounty super computer (Created page with "Are you confronted with huge amounts of IP addresses you need to scan or penetration test against? Are you ready to go into bug bounty hunting on a large scale? Do you need to...")
- 00:18, 2 July 2017 (diff | hist) . . (+832) . . N Programming Wireshark With Lua (Created page with "In this 2 hour workshop, you will learn how to program Wireshark with the Lua programming language. Wireshark can be extended using the C and Lua programming languages. In...")
- 23:47, 1 July 2017 (diff | hist) . . (+1,311) . . N Browser Exploits? Grab them by the collar! (Created page with "APT has become a hot topic in enterprise IT today. One of the softwares that we see becomes victim of APT attack more often is web browsers and the attack surface is becoming...")
- 23:43, 1 July 2017 (diff | hist) . . (+1,074) . . N Evading Microsoft ATA for Active Directory Domination (Created page with "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Controller, Wind...")
- 23:42, 1 July 2017 (diff | hist) . . (+2,393) . . N Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis (Created page with "With the increasing amount of malware HTTPS traffic, it is a challenge to discover new features and methods to detect malware without decrypting the traffic. A detection metho...")
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)