All public logs
From BruCON 2017
Combined display of all available logs of BruCON 2017. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)- 22:31, 1 July 2017 Larry (talk | contribs) automatically marked revision 5586 of page Rushikesh Nandedkar patrolled
- 22:31, 1 July 2017 Larry (talk | contribs) automatically marked revision 5585 of page Sampada Nandedkar patrolled
- 22:23, 1 July 2017 Larry (talk | contribs) automatically marked revision 5584 of page Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE patrolled
- 22:23, 1 July 2017 Larry (talk | contribs) deleted page Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE. (content was: "With arrival of new smart devices every day, Internet of Things is one of the most upcoming trends in technology. Most of these devices have component to communicate..." (and the only contributor was "Larry"))
- 22:23, 1 July 2017 Larry (talk | contribs) automatically marked revision 5583 of page Swaroop Yermalkar patrolled
- 22:21, 1 July 2017 Larry (talk | contribs) deleted page Anna Shirokova - Veronica Valeros (content was: "Anna Shirokova is a threat researcher at Cisco. Her passion for all things relating to malware eventually grew into a career as an information security analyst. As of..." (and the only contributor was "Larry"))
- 22:21, 1 July 2017 Larry (talk | contribs) automatically marked revision 5582 of page Veronica Valeros patrolled
- 22:21, 1 July 2017 Larry (talk | contribs) automatically marked revision 5581 of page Anna Shirokova patrolled
- 22:20, 1 July 2017 Larry (talk | contribs) automatically marked revision 5580 of page XFLTReaT: a new dimension in tunnelling patrolled
- 22:20, 1 July 2017 Larry (talk | contribs) deleted page XFLTReaT: A new dimension in tunnelling. (content was: "This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to..." (and the only contributor was "Larry"))
- 22:19, 1 July 2017 Larry (talk | contribs) automatically marked revision 5579 of page See no evil, hear no evil: Hacking invisibly and silently with light and sound patrolled
- 22:18, 1 July 2017 Larry (talk | contribs) deleted page See no evil, hear no evil: Hacking invisibly and silently with light and sound. (content was: "Traditional techniques for C2 channels, exfiltration, surveillance, and exploitation are often frustrated by the growing sophistication and prevalence of security pro..." (and the only contributor was "Larry"))
- 22:18, 1 July 2017 Larry (talk | contribs) automatically marked revision 5578 of page Schedule patrolled
- 22:01, 1 July 2017 Larry (talk | contribs) automatically marked revision 5577 of page Getting the Most Out of Windows Event Logs patrolled
- 22:00, 1 July 2017 Larry (talk | contribs) automatically marked revision 5576 of page Building a cheap robust scaling penetration testing/bug bounty super computer patrolled
- 21:59, 1 July 2017 Larry (talk | contribs) automatically marked revision 5575 of page Building a cheap robust scaling penetration testing/bug bounty super computer patrolled
- 21:59, 1 July 2017 Larry (talk | contribs) automatically marked revision 5574 of page Practical iOS App Exploitation and Defense using iGoat patrolled
- 21:57, 1 July 2017 Larry (talk | contribs) automatically marked revision 5573 of page Malware Triage: Malscripts Are The New Exploit Kit patrolled
- 21:57, 1 July 2017 Larry (talk | contribs) automatically marked revision 5572 of page Jedi's trick to convince your boss and colleagues patrolled
- 21:56, 1 July 2017 Larry (talk | contribs) automatically marked revision 5571 of page May the data stay with you Network Data Exfiltration Techniques patrolled
- 21:56, 1 July 2017 Larry (talk | contribs) automatically marked revision 5570 of page Hacking Bluetooth Smart locks patrolled
- 21:54, 1 July 2017 Larry (talk | contribs) automatically marked revision 5569 of page Hacking Bluetooth Smart locks patrolled
- 21:53, 1 July 2017 Larry (talk | contribs) automatically marked revision 5568 of page Defeating Proprietary Protocols the Smart Way patrolled
- 21:52, 1 July 2017 Larry (talk | contribs) automatically marked revision 5567 of page Defeating Proprietary Protocols the Smart Way patrolled
- 21:51, 1 July 2017 Larry (talk | contribs) automatically marked revision 5566 of page Practical Machine Learning in InfoSecurity patrolled
- 21:50, 1 July 2017 Larry (talk | contribs) automatically marked revision 5565 of page Anto Joseph patrolled
- 21:50, 1 July 2017 Larry (talk | contribs) automatically marked revision 5564 of page Clarence Chio patrolled
- 21:49, 1 July 2017 Larry (talk | contribs) automatically marked revision 5563 of page Clarence Chio patrolled
- 21:48, 1 July 2017 Larry (talk | contribs) automatically marked revision 5562 of page Playing with RFID workshop patrolled
- 21:47, 1 July 2017 Larry (talk | contribs) automatically marked revision 5561 of page Windows malware development: A JMP in the dark patrolled
- 21:43, 1 July 2017 Larry (talk | contribs) automatically marked revision 5560 of page Yannick Wellens patrolled
- 21:41, 1 July 2017 Larry (talk | contribs) automatically marked revision 5559 of page Frédéric Guihéry patrolled
- 21:41, 1 July 2017 Larry (talk | contribs) automatically marked revision 5558 of page Georges Bossert patrolled
- 21:40, 1 July 2017 Larry (talk | contribs) automatically marked revision 5557 of page Slawomir Jasek patrolled
- 21:39, 1 July 2017 Larry (talk | contribs) automatically marked revision 5556 of page Leszek Mis patrolled
- 21:37, 1 July 2017 Larry (talk | contribs) automatically marked revision 5555 of page Emmanuel Nicaise patrolled
- 21:37, 1 July 2017 Larry (talk | contribs) automatically marked revision 5554 of page Sergei Frankoff patrolled
- 21:36, 1 July 2017 Larry (talk | contribs) automatically marked revision 5553 of page Sean Wilson patrolled
- 21:35, 1 July 2017 Larry (talk | contribs) automatically marked revision 5552 of page Steven Wierckx patrolled
- 21:34, 1 July 2017 Larry (talk | contribs) automatically marked revision 5551 of page Andy Deweirt patrolled
- 21:34, 1 July 2017 Larry (talk | contribs) automatically marked revision 5550 of page Steven Wierckx patrolled
- 21:33, 1 July 2017 Larry (talk | contribs) deleted page Steven Wierckx - Andy Deweirt (content was: "Steven Wierckx: I’m a Software and Security Tester with 15 years of experience in programming, security testing, source code review, test automation, functional and..." (and the only contributor was "Larry"))
- 21:32, 1 July 2017 Larry (talk | contribs) automatically marked revision 5549 of page Steven Wierckx - Andy Deweirt patrolled
- 21:30, 1 July 2017 Larry (talk | contribs) automatically marked revision 5548 of page David Szili patrolled
- 21:29, 1 July 2017 Larry (talk | contribs) automatically marked revision 5547 of page Didier Stevens patrolled
- 14:05, 1 July 2017 Tom.Gilis (talk | contribs) automatically marked revision 5546 of page Training 2017 - Windows Kernel Exploitation patrolled
- 18:39, 26 June 2017 Larry (talk | contribs) automatically marked revision 5545 of page See no evil, hear no evil: Hacking invisibly and silently with light and sound. patrolled
- 18:38, 26 June 2017 Larry (talk | contribs) automatically marked revision 5544 of page XFLTReaT: A new dimension in tunnelling. patrolled
- 18:32, 26 June 2017 Larry (talk | contribs) automatically marked revision 5543 of page Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape. patrolled
- 18:31, 26 June 2017 Larry (talk | contribs) automatically marked revision 5542 of page Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE. patrolled