All public logs
From BruCON 2017
Combined display of all available logs of BruCON 2017. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)- 20:10, 5 July 2017 Tom.Gilis (talk | contribs) protected See no evil, hear no evil: Hacking invisibly and silently with light and sound [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected Yannick Wellens [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected Anto Joseph [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected Georges Bossert [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected Slawomir Jasek [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected Leszek Mis [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected Emmanuel Nicaise [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected Sergei Frankoff [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected Steven Wierckx [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:09, 5 July 2017 Tom.Gilis (talk | contribs) protected David Szili [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:08, 5 July 2017 Tom.Gilis (talk | contribs) protected Didier Stevens [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:08, 5 July 2017 Tom.Gilis (talk | contribs) protected Debasish Mandal [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:08, 5 July 2017 Tom.Gilis (talk | contribs) protected Nikhil Mittal [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:08, 5 July 2017 Tom.Gilis (talk | contribs) protected Gregory Pickett [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:08, 5 July 2017 Tom.Gilis (talk | contribs) protected Sander Demeester [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:08, 5 July 2017 Tom.Gilis (talk | contribs) protected Damien Cauquil [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:08, 5 July 2017 Tom.Gilis (talk | contribs) protected Sampada Nandedkar [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:08, 5 July 2017 Tom.Gilis (talk | contribs) protected Swaroop Yermalkar [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:07, 5 July 2017 Tom.Gilis (talk | contribs) protected Anna Shirokova [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:07, 5 July 2017 Tom.Gilis (talk | contribs) protected Balazs Bucsay [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:07, 5 July 2017 Tom.Gilis (talk | contribs) protected Matt Wixey [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:07, 5 July 2017 Tom.Gilis (talk | contribs) protected Building a cheap, robust, scaling, penetration testing/bug bounty super computer [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 23:25, 1 July 2017 Larry (talk | contribs) automatically marked revision 5601 of page Schedule patrolled
- 23:22, 1 July 2017 Larry (talk | contribs) deleted page May the data stay with you Network Data Exfiltration Techniques (content was: "Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection. During this workshop (..." (and the only contributor was "Larry"))
- 23:22, 1 July 2017 Larry (talk | contribs) automatically marked revision 5600 of page May the data stay with you - Network Data Exfiltration Techniques. patrolled
- 23:20, 1 July 2017 Larry (talk | contribs) deleted page Building a cheap robust scaling penetration testing/bug bounty super computer (content was: "Are you confronted with huge amounts of IP addresses you need to scan or penetration test against? Are you ready to go into bug bounty hunting on a large scale? Do yo..." (and the only contributor was "Larry"))
- 23:20, 1 July 2017 Larry (talk | contribs) automatically marked revision 5599 of page Building a cheap, robust, scaling, penetration testing/bug bounty super computer patrolled
- 23:18, 1 July 2017 Larry (talk | contribs) automatically marked revision 5598 of page Programming Wireshark With Lua patrolled
- 22:47, 1 July 2017 Larry (talk | contribs) automatically marked revision 5597 of page Browser Exploits? Grab them by the collar! patrolled
- 22:44, 1 July 2017 Larry (talk | contribs) restored page Evading Microsoft ATA for Active Directory Domination (1 revision restored)
- 22:43, 1 July 2017 Larry (talk | contribs) deleted page Evading Microsoft ATA for Active Directory Domination (content was: "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Control..." (and the only contributor was "Larry"))
- 22:43, 1 July 2017 Larry (talk | contribs) automatically marked revision 5596 of page Evading Microsoft ATA for Active Directory Domination patrolled
- 22:42, 1 July 2017 Larry (talk | contribs) automatically marked revision 5595 of page Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis patrolled
- 22:39, 1 July 2017 Larry (talk | contribs) deleted page Josh Schwartz (content was: "FuzzyNop and ceyx were raised by computerized wolves with a penchant for fine art and rum based cocktails. While technically from different mothers and also sides of..." (and the only contributor was "Larry"))
- 22:39, 1 July 2017 Larry (talk | contribs) deleted page John Cramb (content was: "FuzzyNop and ceyx were raised by computerized wolves with a penchant for fine art and rum based cocktails. While technically from different mothers and also sides of..." (and the only contributor was "Larry"))
- 22:39, 1 July 2017 Larry (talk | contribs) deleted page František Střasák (content was: "František Střasák is a student of the Bachelor program of Computer Science at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in t..." (and the only contributor was "Larry"))
- 22:39, 1 July 2017 Larry (talk | contribs) deleted page Sebastian Garcia (content was: "František Střasák is a student of the Bachelor program of Computer Science at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in t..." (and the only contributor was "Larry"))
- 22:39, 1 July 2017 Larry (talk | contribs) automatically marked revision 5594 of page Sebastian Garcia patrolled
- 22:39, 1 July 2017 Larry (talk | contribs) automatically marked revision 5593 of page František Střasák patrolled
- 22:37, 1 July 2017 Larry (talk | contribs) automatically marked revision 5592 of page John Cramb patrolled
- 22:37, 1 July 2017 Larry (talk | contribs) automatically marked revision 5591 of page Josh Schwartz patrolled
- 22:36, 1 July 2017 Larry (talk | contribs) deleted page MEATPISTOL, A Modular Malware Implant Framework. (content was: "Attention Red Teamers, Penetration Testers, and Offensive Security Operators, isn’t the overhead of fighting attribution, spinning up infrastructure, and having to..." (and the only contributor was "Larry"))
- 22:36, 1 July 2017 Larry (talk | contribs) automatically marked revision 5590 of page MEATPISTOL, A Modular Malware Implant Framework patrolled
- 22:36, 1 July 2017 Larry (talk | contribs) deleted page Josh Schwartz - John Cramb (content was: "FuzzyNop and ceyx were raised by computerized wolves with a penchant for fine art and rum based cocktails. While technically from different mothers and also sides of..." (and the only contributor was "Larry"))
- 22:35, 1 July 2017 Larry (talk | contribs) automatically marked revision 5589 of page Sander Demeester patrolled
- 22:34, 1 July 2017 Larry (talk | contribs) automatically marked revision 5588 of page Secure channels: Building real world crypto systems patrolled
- 22:33, 1 July 2017 Larry (talk | contribs) automatically marked revision 5587 of page Secure channels: Building real world crypto systems patrolled
- 22:33, 1 July 2017 Larry (talk | contribs) deleted page Secure channels: Building real world crypto systems. (content was: "Secure communication is one of the most common, most important real world application of cryptography today. But besides being one of the most important requirements..." (and the only contributor was "Larry"))
- 22:31, 1 July 2017 Larry (talk | contribs) deleted page Sampada Nandedkar - Rushikesh Nandedkar (content was: "Sampada is a programmer transformed to security researcher. Her passion lies in logical vulnerabilities and algorithmic enhancements towards systems security. Her are..." (and the only contributor was "Larry"))
- 22:31, 1 July 2017 Larry (talk | contribs) automatically marked revision 5586 of page Rushikesh Nandedkar patrolled