All public logs
From BruCON 2017
Combined display of all available logs of BruCON 2017. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)- 20:07, 5 July 2017 Tom.Gilis (talk | contribs) protected Building a cheap, robust, scaling, penetration testing/bug bounty super computer [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 23:25, 1 July 2017 Larry (talk | contribs) automatically marked revision 5601 of page Schedule patrolled
- 23:22, 1 July 2017 Larry (talk | contribs) deleted page May the data stay with you Network Data Exfiltration Techniques (content was: "Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection. During this workshop (..." (and the only contributor was "Larry"))
- 23:22, 1 July 2017 Larry (talk | contribs) automatically marked revision 5600 of page May the data stay with you - Network Data Exfiltration Techniques. patrolled
- 23:20, 1 July 2017 Larry (talk | contribs) deleted page Building a cheap robust scaling penetration testing/bug bounty super computer (content was: "Are you confronted with huge amounts of IP addresses you need to scan or penetration test against? Are you ready to go into bug bounty hunting on a large scale? Do yo..." (and the only contributor was "Larry"))
- 23:20, 1 July 2017 Larry (talk | contribs) automatically marked revision 5599 of page Building a cheap, robust, scaling, penetration testing/bug bounty super computer patrolled
- 23:18, 1 July 2017 Larry (talk | contribs) automatically marked revision 5598 of page Programming Wireshark With Lua patrolled
- 22:47, 1 July 2017 Larry (talk | contribs) automatically marked revision 5597 of page Browser Exploits? Grab them by the collar! patrolled
- 22:44, 1 July 2017 Larry (talk | contribs) restored page Evading Microsoft ATA for Active Directory Domination (1 revision restored)
- 22:43, 1 July 2017 Larry (talk | contribs) deleted page Evading Microsoft ATA for Active Directory Domination (content was: "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Control..." (and the only contributor was "Larry"))
- 22:43, 1 July 2017 Larry (talk | contribs) automatically marked revision 5596 of page Evading Microsoft ATA for Active Directory Domination patrolled
- 22:42, 1 July 2017 Larry (talk | contribs) automatically marked revision 5595 of page Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis patrolled
- 22:39, 1 July 2017 Larry (talk | contribs) deleted page Josh Schwartz (content was: "FuzzyNop and ceyx were raised by computerized wolves with a penchant for fine art and rum based cocktails. While technically from different mothers and also sides of..." (and the only contributor was "Larry"))
- 22:39, 1 July 2017 Larry (talk | contribs) deleted page John Cramb (content was: "FuzzyNop and ceyx were raised by computerized wolves with a penchant for fine art and rum based cocktails. While technically from different mothers and also sides of..." (and the only contributor was "Larry"))
- 22:39, 1 July 2017 Larry (talk | contribs) deleted page František Střasák (content was: "František Střasák is a student of the Bachelor program of Computer Science at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in t..." (and the only contributor was "Larry"))
- 22:39, 1 July 2017 Larry (talk | contribs) deleted page Sebastian Garcia (content was: "František Střasák is a student of the Bachelor program of Computer Science at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in t..." (and the only contributor was "Larry"))
- 22:39, 1 July 2017 Larry (talk | contribs) automatically marked revision 5594 of page Sebastian Garcia patrolled
- 22:39, 1 July 2017 Larry (talk | contribs) automatically marked revision 5593 of page František Střasák patrolled
- 22:37, 1 July 2017 Larry (talk | contribs) automatically marked revision 5592 of page John Cramb patrolled
- 22:37, 1 July 2017 Larry (talk | contribs) automatically marked revision 5591 of page Josh Schwartz patrolled
- 22:36, 1 July 2017 Larry (talk | contribs) deleted page MEATPISTOL, A Modular Malware Implant Framework. (content was: "Attention Red Teamers, Penetration Testers, and Offensive Security Operators, isn’t the overhead of fighting attribution, spinning up infrastructure, and having to..." (and the only contributor was "Larry"))
- 22:36, 1 July 2017 Larry (talk | contribs) automatically marked revision 5590 of page MEATPISTOL, A Modular Malware Implant Framework patrolled
- 22:36, 1 July 2017 Larry (talk | contribs) deleted page Josh Schwartz - John Cramb (content was: "FuzzyNop and ceyx were raised by computerized wolves with a penchant for fine art and rum based cocktails. While technically from different mothers and also sides of..." (and the only contributor was "Larry"))
- 22:35, 1 July 2017 Larry (talk | contribs) automatically marked revision 5589 of page Sander Demeester patrolled
- 22:34, 1 July 2017 Larry (talk | contribs) automatically marked revision 5588 of page Secure channels: Building real world crypto systems patrolled
- 22:33, 1 July 2017 Larry (talk | contribs) automatically marked revision 5587 of page Secure channels: Building real world crypto systems patrolled
- 22:33, 1 July 2017 Larry (talk | contribs) deleted page Secure channels: Building real world crypto systems. (content was: "Secure communication is one of the most common, most important real world application of cryptography today. But besides being one of the most important requirements..." (and the only contributor was "Larry"))
- 22:31, 1 July 2017 Larry (talk | contribs) deleted page Sampada Nandedkar - Rushikesh Nandedkar (content was: "Sampada is a programmer transformed to security researcher. Her passion lies in logical vulnerabilities and algorithmic enhancements towards systems security. Her are..." (and the only contributor was "Larry"))
- 22:31, 1 July 2017 Larry (talk | contribs) automatically marked revision 5586 of page Rushikesh Nandedkar patrolled
- 22:31, 1 July 2017 Larry (talk | contribs) automatically marked revision 5585 of page Sampada Nandedkar patrolled
- 22:23, 1 July 2017 Larry (talk | contribs) automatically marked revision 5584 of page Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE patrolled
- 22:23, 1 July 2017 Larry (talk | contribs) deleted page Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE. (content was: "With arrival of new smart devices every day, Internet of Things is one of the most upcoming trends in technology. Most of these devices have component to communicate..." (and the only contributor was "Larry"))
- 22:23, 1 July 2017 Larry (talk | contribs) automatically marked revision 5583 of page Swaroop Yermalkar patrolled
- 22:21, 1 July 2017 Larry (talk | contribs) deleted page Anna Shirokova - Veronica Valeros (content was: "Anna Shirokova is a threat researcher at Cisco. Her passion for all things relating to malware eventually grew into a career as an information security analyst. As of..." (and the only contributor was "Larry"))
- 22:21, 1 July 2017 Larry (talk | contribs) automatically marked revision 5582 of page Veronica Valeros patrolled
- 22:21, 1 July 2017 Larry (talk | contribs) automatically marked revision 5581 of page Anna Shirokova patrolled
- 22:20, 1 July 2017 Larry (talk | contribs) automatically marked revision 5580 of page XFLTReaT: a new dimension in tunnelling patrolled
- 22:20, 1 July 2017 Larry (talk | contribs) deleted page XFLTReaT: A new dimension in tunnelling. (content was: "This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to..." (and the only contributor was "Larry"))
- 22:19, 1 July 2017 Larry (talk | contribs) automatically marked revision 5579 of page See no evil, hear no evil: Hacking invisibly and silently with light and sound patrolled
- 22:18, 1 July 2017 Larry (talk | contribs) deleted page See no evil, hear no evil: Hacking invisibly and silently with light and sound. (content was: "Traditional techniques for C2 channels, exfiltration, surveillance, and exploitation are often frustrated by the growing sophistication and prevalence of security pro..." (and the only contributor was "Larry"))
- 22:18, 1 July 2017 Larry (talk | contribs) automatically marked revision 5578 of page Schedule patrolled
- 22:01, 1 July 2017 Larry (talk | contribs) automatically marked revision 5577 of page Getting the Most Out of Windows Event Logs patrolled
- 22:00, 1 July 2017 Larry (talk | contribs) automatically marked revision 5576 of page Building a cheap robust scaling penetration testing/bug bounty super computer patrolled
- 21:59, 1 July 2017 Larry (talk | contribs) automatically marked revision 5575 of page Building a cheap robust scaling penetration testing/bug bounty super computer patrolled
- 21:59, 1 July 2017 Larry (talk | contribs) automatically marked revision 5574 of page Practical iOS App Exploitation and Defense using iGoat patrolled
- 21:57, 1 July 2017 Larry (talk | contribs) automatically marked revision 5573 of page Malware Triage: Malscripts Are The New Exploit Kit patrolled
- 21:57, 1 July 2017 Larry (talk | contribs) automatically marked revision 5572 of page Jedi's trick to convince your boss and colleagues patrolled
- 21:56, 1 July 2017 Larry (talk | contribs) automatically marked revision 5571 of page May the data stay with you Network Data Exfiltration Techniques patrolled
- 21:56, 1 July 2017 Larry (talk | contribs) automatically marked revision 5570 of page Hacking Bluetooth Smart locks patrolled
- 21:54, 1 July 2017 Larry (talk | contribs) automatically marked revision 5569 of page Hacking Bluetooth Smart locks patrolled