User contributions
From BruCON 2017
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 22:07, 2 October 2017 (diff | hist) . . (+20) . . Schedule (→General Information)
- 11:26, 7 September 2017 (diff | hist) . . (0) . . m From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program (Protected "From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 11:25, 7 September 2017 (diff | hist) . . (+1,884) . . N From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program (Created page with "As many infosec practitioners, early in my career I tended to disregard security awareness. People can't change, I thought, and the evidence was there. No matter what we, as s...")
- 11:25, 7 September 2017 (diff | hist) . . (0) . . m Volodymyr Styran (Protected "Volodymyr Styran" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 11:25, 7 September 2017 (diff | hist) . . (+497) . . N Volodymyr Styran (Created page with "Security professional with the main focus on Application Security and Social Engineering. Building offensive security teams for almost 10 years, currently in my own company. S...")
- 11:24, 7 September 2017 (diff | hist) . . (+28) . . Schedule (→General Information)
- 16:18, 31 August 2017 (diff | hist) . . (-21) . . Schedule (→General Information)
- 15:46, 31 August 2017 (diff | hist) . . (-2,266) . . Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) (Replaced content with "In this talk we will be discussing anatomy of race conditions, various forms of race conditions, properties viz. concurrency, atomicity, shared object property, change sta...") (current)
- 11:07, 23 August 2017 (diff | hist) . . (-4) . . Volunteers (→Helping out during BruCON 0x09) (current)
- 11:07, 23 August 2017 (diff | hist) . . (+2) . . Volunteers (→Helping out during BruCON 0x09)
- 11:06, 23 August 2017 (diff | hist) . . (-2) . . Volunteers (→Helping out during BruCON 0x09)
- 11:06, 23 August 2017 (diff | hist) . . (-4) . . Volunteers
- 11:06, 23 August 2017 (diff | hist) . . (0) . . m Volunteers (Protected "Volunteers" ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite)))
- 11:06, 23 August 2017 (diff | hist) . . (+1,059) . . Volunteers (→Helping out during BruCON)
- 09:14, 23 August 2017 (diff | hist) . . (0) . . m How hackers changed the security industry and how we need to keep changing it. (Protected "How hackers changed the security industry and how we need to keep changing it." ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 09:14, 23 August 2017 (diff | hist) . . (+932) . . N How hackers changed the security industry and how we need to keep changing it. (Created page with "Before hackers got involved in cybersecurity the industry was focused on products and compliance. Security was security features: firewalls, authentication, encryption. Little...")
- 09:11, 23 August 2017 (diff | hist) . . (0) . . m Chris Wysopal (Protected "Chris Wysopal" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 09:11, 23 August 2017 (diff | hist) . . (+644) . . N Chris Wysopal (Created page with "Chris Wysopal is Veracode's CTO and co-founder. He is one of the original vulnerability researchers and an early member of L0pht Heavy Industries, which he joined in 1992. He...")
- 09:10, 23 August 2017 (diff | hist) . . (+8) . . Schedule (→General Information)
- 18:36, 31 July 2017 (diff | hist) . . (+60) . . Main Page (→General information)
- 18:30, 31 July 2017 (diff | hist) . . (+61) . . Main Page (→General information)
- 17:42, 20 July 2017 (diff | hist) . . (0) . . m Vinnie Vanhoecke (Protected "Vinnie Vanhoecke" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:42, 20 July 2017 (diff | hist) . . (+363) . . N Vinnie Vanhoecke (Created page with "Vinnie is a penetration tester of web application & mobile application working for EY. During college he wrote a thesis about RFID and now he using his experience to provide a...")
- 17:42, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:36, 20 July 2017 (diff | hist) . . (0) . . m František Střasák (Protected "František Střasák" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:36, 20 July 2017 (diff | hist) . . (+294) . . N František Střasák (Created page with "František Střasák is a student of the Master program of Artificial Intelligence at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in this...")
- 17:36, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:17, 20 July 2017 (diff | hist) . . (0) . . m The cyber short. A market solution for product safety and corporate governance. (Protected "The cyber short. A market solution for product safety and corporate governance." ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:17, 20 July 2017 (diff | hist) . . (+630) . . N The cyber short. A market solution for product safety and corporate governance. (Created page with "The Bug Short: What I learned on the way to Wall Street. Justine Bone presents the world's first ever cyber security-backed short position. As CEO of MedSec, Justine and he...")
- 17:17, 20 July 2017 (diff | hist) . . (+2) . . Schedule
- 17:16, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:14, 20 July 2017 (diff | hist) . . (0) . . m Justine Bone (Protected "Justine Bone" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:14, 20 July 2017 (diff | hist) . . (+1,228) . . N Justine Bone (Created page with "Justine is a recovering vulnerability researcher and security executive with background in software security research, risk management, information security governance, and id...")
- 00:25, 2 July 2017 (diff | hist) . . (+97) . . Schedule
- 00:22, 2 July 2017 (diff | hist) . . (+571) . . N May the data stay with you - Network Data Exfiltration Techniques. (Created page with "Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection. During this workshop (2 hours)...")
- 00:20, 2 July 2017 (diff | hist) . . (+1,357) . . N Building a cheap, robust, scaling, penetration testing/bug bounty super computer (Created page with "Are you confronted with huge amounts of IP addresses you need to scan or penetration test against? Are you ready to go into bug bounty hunting on a large scale? Do you need to...")
- 00:18, 2 July 2017 (diff | hist) . . (+832) . . N Programming Wireshark With Lua (Created page with "In this 2 hour workshop, you will learn how to program Wireshark with the Lua programming language. Wireshark can be extended using the C and Lua programming languages. In...")
- 23:47, 1 July 2017 (diff | hist) . . (+1,311) . . N Browser Exploits? Grab them by the collar! (Created page with "APT has become a hot topic in enterprise IT today. One of the softwares that we see becomes victim of APT attack more often is web browsers and the attack surface is becoming...")
- 23:43, 1 July 2017 (diff | hist) . . (+1,074) . . N Evading Microsoft ATA for Active Directory Domination (Created page with "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Controller, Wind...")
- 23:42, 1 July 2017 (diff | hist) . . (+2,393) . . N Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis (Created page with "With the increasing amount of malware HTTPS traffic, it is a challenge to discover new features and methods to detect malware without decrypting the traffic. A detection metho...")
- 23:36, 1 July 2017 (diff | hist) . . (+873) . . N MEATPISTOL, A Modular Malware Implant Framework (Created page with "Attention Red Teamers, Penetration Testers, and Offensive Security Operators, isn’t the overhead of fighting attribution, spinning up infrastructure, and having to constantl...")
- 23:35, 1 July 2017 (diff | hist) . . (-1) . . Sander Demeester
- 23:34, 1 July 2017 (diff | hist) . . (+3) . . Secure channels: Building real world crypto systems
- 23:33, 1 July 2017 (diff | hist) . . (+1,410) . . N Secure channels: Building real world crypto systems (Created page with "Secure communication is one of the most common, most important real world application of cryptography today. But besides being one of the most important requirements of modern...")
- 23:31, 1 July 2017 (diff | hist) . . (+426) . . N Rushikesh Nandedkar (Created page with "Rushikesh is a security analyst. Having more than six years of experience under his belt, his assignments have always been pointed towards reducing the state of insecurity for...")
- 23:31, 1 July 2017 (diff | hist) . . (+256) . . N Sampada Nandedkar (Created page with "Sampada is a programmer transformed to security researcher. Her passion lies in logical vulnerabilities and algorithmic enhancements towards systems security. Her area of stud...")
- 23:23, 1 July 2017 (diff | hist) . . (+6) . . Swaroop Yermalkar
- 23:21, 1 July 2017 (diff | hist) . . (+787) . . N Veronica Valeros (Created page with "Veronica Valeros is a hacker, researcher and intelligence analyst from Argentina. Her research has a strong focus on helping people and involves different areas from wireless...")
- 23:21, 1 July 2017 (diff | hist) . . (+356) . . N Anna Shirokova (Created page with "Anna Shirokova is a threat researcher at Cisco. Her passion for all things relating to malware eventually grew into a career as an information security analyst. As of 2017 she...")
- 23:20, 1 July 2017 (diff | hist) . . (+2,662) . . N XFLTReaT: a new dimension in tunnelling (Created page with "This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to block ex...")
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)