User contributions
From BruCON 2017
- 22:07, 2 October 2017 (diff | hist) . . (+20) . . Schedule (→General Information)
- 11:26, 7 September 2017 (diff | hist) . . (0) . . m From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program (Protected "From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 11:25, 7 September 2017 (diff | hist) . . (+1,884) . . N From Weakest Link to Retaliation Weapon: Building Efficient Anti-Social Engineering Awareness Program (Created page with "As many infosec practitioners, early in my career I tended to disregard security awareness. People can't change, I thought, and the evidence was there. No matter what we, as s...")
- 11:25, 7 September 2017 (diff | hist) . . (0) . . m Volodymyr Styran (Protected "Volodymyr Styran" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 11:25, 7 September 2017 (diff | hist) . . (+497) . . N Volodymyr Styran (Created page with "Security professional with the main focus on Application Security and Social Engineering. Building offensive security teams for almost 10 years, currently in my own company. S...")
- 11:24, 7 September 2017 (diff | hist) . . (+28) . . Schedule (→General Information)
- 16:18, 31 August 2017 (diff | hist) . . (-21) . . Schedule (→General Information)
- 15:46, 31 August 2017 (diff | hist) . . (-2,266) . . Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) (Replaced content with "In this talk we will be discussing anatomy of race conditions, various forms of race conditions, properties viz. concurrency, atomicity, shared object property, change sta...") (current)
- 11:07, 23 August 2017 (diff | hist) . . (-4) . . Volunteers (→Helping out during BruCON 0x09) (current)
- 11:07, 23 August 2017 (diff | hist) . . (+2) . . Volunteers (→Helping out during BruCON 0x09)
- 11:06, 23 August 2017 (diff | hist) . . (-2) . . Volunteers (→Helping out during BruCON 0x09)
- 11:06, 23 August 2017 (diff | hist) . . (-4) . . Volunteers
- 11:06, 23 August 2017 (diff | hist) . . (0) . . m Volunteers (Protected "Volunteers" ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite)))
- 11:06, 23 August 2017 (diff | hist) . . (+1,059) . . Volunteers (→Helping out during BruCON)
- 09:14, 23 August 2017 (diff | hist) . . (0) . . m How hackers changed the security industry and how we need to keep changing it. (Protected "How hackers changed the security industry and how we need to keep changing it." ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 09:14, 23 August 2017 (diff | hist) . . (+932) . . N How hackers changed the security industry and how we need to keep changing it. (Created page with "Before hackers got involved in cybersecurity the industry was focused on products and compliance. Security was security features: firewalls, authentication, encryption. Little...")
- 09:11, 23 August 2017 (diff | hist) . . (0) . . m Chris Wysopal (Protected "Chris Wysopal" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 09:11, 23 August 2017 (diff | hist) . . (+644) . . N Chris Wysopal (Created page with "Chris Wysopal is Veracode's CTO and co-founder. He is one of the original vulnerability researchers and an early member of L0pht Heavy Industries, which he joined in 1992. He...")
- 09:10, 23 August 2017 (diff | hist) . . (+8) . . Schedule (→General Information)
- 18:36, 31 July 2017 (diff | hist) . . (+60) . . Main Page (→General information)
- 18:30, 31 July 2017 (diff | hist) . . (+61) . . Main Page (→General information)
- 17:42, 20 July 2017 (diff | hist) . . (0) . . m Vinnie Vanhoecke (Protected "Vinnie Vanhoecke" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:42, 20 July 2017 (diff | hist) . . (+363) . . N Vinnie Vanhoecke (Created page with "Vinnie is a penetration tester of web application & mobile application working for EY. During college he wrote a thesis about RFID and now he using his experience to provide a...")
- 17:42, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:36, 20 July 2017 (diff | hist) . . (0) . . m František Střasák (Protected "František Střasák" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:36, 20 July 2017 (diff | hist) . . (+294) . . N František Střasák (Created page with "František Střasák is a student of the Master program of Artificial Intelligence at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in this...")
- 17:36, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:17, 20 July 2017 (diff | hist) . . (0) . . m The cyber short. A market solution for product safety and corporate governance. (Protected "The cyber short. A market solution for product safety and corporate governance." ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:17, 20 July 2017 (diff | hist) . . (+630) . . N The cyber short. A market solution for product safety and corporate governance. (Created page with "The Bug Short: What I learned on the way to Wall Street. Justine Bone presents the world's first ever cyber security-backed short position. As CEO of MedSec, Justine and he...")
- 17:17, 20 July 2017 (diff | hist) . . (+2) . . Schedule
- 17:16, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:14, 20 July 2017 (diff | hist) . . (0) . . m Justine Bone (Protected "Justine Bone" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:14, 20 July 2017 (diff | hist) . . (+1,228) . . N Justine Bone (Created page with "Justine is a recovering vulnerability researcher and security executive with background in software security research, risk management, information security governance, and id...")
- 00:25, 2 July 2017 (diff | hist) . . (+97) . . Schedule
- 00:22, 2 July 2017 (diff | hist) . . (+571) . . N May the data stay with you - Network Data Exfiltration Techniques. (Created page with "Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection. During this workshop (2 hours)...")
- 00:20, 2 July 2017 (diff | hist) . . (+1,357) . . N Building a cheap, robust, scaling, penetration testing/bug bounty super computer (Created page with "Are you confronted with huge amounts of IP addresses you need to scan or penetration test against? Are you ready to go into bug bounty hunting on a large scale? Do you need to...")
- 00:18, 2 July 2017 (diff | hist) . . (+832) . . N Programming Wireshark With Lua (Created page with "In this 2 hour workshop, you will learn how to program Wireshark with the Lua programming language. Wireshark can be extended using the C and Lua programming languages. In...")
- 23:47, 1 July 2017 (diff | hist) . . (+1,311) . . N Browser Exploits? Grab them by the collar! (Created page with "APT has become a hot topic in enterprise IT today. One of the softwares that we see becomes victim of APT attack more often is web browsers and the attack surface is becoming...")
- 23:43, 1 July 2017 (diff | hist) . . (+1,074) . . N Evading Microsoft ATA for Active Directory Domination (Created page with "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Controller, Wind...")
- 23:42, 1 July 2017 (diff | hist) . . (+2,393) . . N Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis (Created page with "With the increasing amount of malware HTTPS traffic, it is a challenge to discover new features and methods to detect malware without decrypting the traffic. A detection metho...")
- 23:36, 1 July 2017 (diff | hist) . . (+873) . . N MEATPISTOL, A Modular Malware Implant Framework (Created page with "Attention Red Teamers, Penetration Testers, and Offensive Security Operators, isn’t the overhead of fighting attribution, spinning up infrastructure, and having to constantl...")
- 23:35, 1 July 2017 (diff | hist) . . (-1) . . Sander Demeester
- 23:34, 1 July 2017 (diff | hist) . . (+3) . . Secure channels: Building real world crypto systems
- 23:33, 1 July 2017 (diff | hist) . . (+1,410) . . N Secure channels: Building real world crypto systems (Created page with "Secure communication is one of the most common, most important real world application of cryptography today. But besides being one of the most important requirements of modern...")
- 23:31, 1 July 2017 (diff | hist) . . (+426) . . N Rushikesh Nandedkar (Created page with "Rushikesh is a security analyst. Having more than six years of experience under his belt, his assignments have always been pointed towards reducing the state of insecurity for...")
- 23:31, 1 July 2017 (diff | hist) . . (+256) . . N Sampada Nandedkar (Created page with "Sampada is a programmer transformed to security researcher. Her passion lies in logical vulnerabilities and algorithmic enhancements towards systems security. Her area of stud...")
- 23:23, 1 July 2017 (diff | hist) . . (+6) . . Swaroop Yermalkar
- 23:21, 1 July 2017 (diff | hist) . . (+787) . . N Veronica Valeros (Created page with "Veronica Valeros is a hacker, researcher and intelligence analyst from Argentina. Her research has a strong focus on helping people and involves different areas from wireless...")
- 23:21, 1 July 2017 (diff | hist) . . (+356) . . N Anna Shirokova (Created page with "Anna Shirokova is a threat researcher at Cisco. Her passion for all things relating to malware eventually grew into a career as an information security analyst. As of 2017 she...")
- 23:20, 1 July 2017 (diff | hist) . . (+2,662) . . N XFLTReaT: a new dimension in tunnelling (Created page with "This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to block ex...")
- 23:19, 1 July 2017 (diff | hist) . . (+1,510) . . N See no evil, hear no evil: Hacking invisibly and silently with light and sound (Created page with "Traditional techniques for C2 channels, exfiltration, surveillance, and exploitation are often frustrated by the growing sophistication and prevalence of security protections,...")
- 23:18, 1 July 2017 (diff | hist) . . (+122) . . Schedule (→General Information)
- 23:01, 1 July 2017 (diff | hist) . . (+1,583) . . N Getting the Most Out of Windows Event Logs (Created page with "A typical mistake repeatedly made by many security teams is that they collect such large amount of events that at the end their Security Information and Event Management (SIEM...")
- 22:59, 1 July 2017 (diff | hist) . . (+825) . . N Practical iOS App Exploitation and Defense using iGoat (Created page with "iOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applic...")
- 22:57, 1 July 2017 (diff | hist) . . (+1,763) . . N Malware Triage: Malscripts Are The New Exploit Kit (Created page with "Malware triage is an important function in any mature incident response program; the process of quickly analyzing potentially malicious files or URLs to determine if your orga...")
- 22:57, 1 July 2017 (diff | hist) . . (+1,437) . . N Jedi's trick to convince your boss and colleagues (Created page with "Social engineering techniques can be used to hack into companies and help the dark side reach their targets. They can also be used by the light side to help you achieve your o...")
- 22:56, 1 July 2017 (diff | hist) . . (+11) . . Hacking Bluetooth Smart locks
- 22:54, 1 July 2017 (diff | hist) . . (+1,737) . . N Hacking Bluetooth Smart locks (Created page with "Recently it seems our home/car/bicycle locks have started to follow a new trend: to include a BLE chip inside to make them "smart". Unlike smart toothbrushes, socks or kettle...")
- 22:53, 1 July 2017 (diff | hist) . . (+2) . . Defeating Proprietary Protocols the Smart Way
- 22:52, 1 July 2017 (diff | hist) . . (+1,895) . . N Defeating Proprietary Protocols the Smart Way (Created page with "Started six years ago, the project Netzob [www.netzob.org] aims at providing state-of-the-art algorithms for protocol reverse engineering in an open source framework. In this...")
- 22:51, 1 July 2017 (diff | hist) . . (+2,131) . . N Practical Machine Learning in InfoSecurity (Created page with "This lab session is designed to give attendees a quick introduction to ML concepts and gets up and running with the popular machine learning library, sci-kit learn. We first...")
- 22:50, 1 July 2017 (diff | hist) . . (+582) . . N Anto Joseph (Created page with "Anto Joseph is a Security Engineer at Intel. He has 4 years of corporate experience in developing and advocating security in Mobile and Web Platforms. Machine Learning is one...")
- 22:50, 1 July 2017 (diff | hist) . . (+2) . . Clarence Chio
- 22:49, 1 July 2017 (diff | hist) . . (+1,014) . . N Clarence Chio (Created page with "Clarence Chio graduated with a B.S. and M.S. in Computer Science from Stanford within 4 n data mining and artificial intelligence. He is in the process of authoring the O’Re...")
- 22:48, 1 July 2017 (diff | hist) . . (+508) . . N Playing with RFID workshop (Created page with "This is a workshop about Radio-frequency Identification (RFID), including a basic introduction and a set of practical hands-on challenges. We will start with explaining the th...")
- 22:47, 1 July 2017 (diff | hist) . . (+1,206) . . N Windows malware development: A JMP in the dark (Created page with "Malware development has always been a subject that has been frowned upon, however it is a valuable skill to possess for Security Specialists as it will help them acquire a bet...")
- 22:43, 1 July 2017 (diff | hist) . . (+766) . . N Yannick Wellens (Created page with "Yannick Wellens is a Security Specialist and researcher at Nynox, focusing on host and network penetration testing, exploit development and malware research. He started his ca...")
- 22:41, 1 July 2017 (diff | hist) . . (+284) . . N Frédéric Guihéry (Created page with "Frédéric Guihéry is an IT security engineer and head of Amossys R&D lab. He has specialized in reverse engineering of protocols and software, Trusted Computing, system secu...")
- 22:41, 1 July 2017 (diff | hist) . . (+430) . . N Georges Bossert (Created page with "Georges Bossert, is an Innovation Leader and a security auditor at Sekoia. His main fields of interest are the reverse engineering of communication protocols, architecture har...")
- 22:40, 1 July 2017 (diff | hist) . . (+1,026) . . N Slawomir Jasek (Created page with "IT security consultant with over 10 years of experience. He participated in many assessments of systems' and applications' security for leading financial companies and public...")
- 22:39, 1 July 2017 (diff | hist) . . (+1,637) . . N Leszek Mis (Created page with "Leszek Miś has over 11 years of experience in IT security technology supporting the largest companies and institutions for implementation, consulting and technical training....")
- 22:37, 1 July 2017 (diff | hist) . . (+746) . . N Emmanuel Nicaise (Created page with "Emmanuel is a seasoned advisor & manager with more than 25 years of experience in IT and in corporate security (Information, cyber, operational and physical security). He firs...")
- 22:37, 1 July 2017 (diff | hist) . . (+273) . . N Sergei Frankoff (Created page with "Sergei Frankoff volunteers with OpenAnalysis as a malware researcher. When he is not reverse engineering malware Sergei is focused on building open source tools for malware an...")
- 22:36, 1 July 2017 (diff | hist) . . (+215) . . N Sean Wilson (Created page with "Sean Wilson volunteers with OpenAnalysis as a malware researcher. He splits his time between reverse engineering malware and building open source tools for incident response....")
- 22:35, 1 July 2017 (diff | hist) . . (+1) . . Steven Wierckx
- 22:34, 1 July 2017 (diff | hist) . . (+588) . . N Andy Deweirt (Created page with "I’m a security consultant with over 10 year of experience in infosecurity. My main focus has mostly been network security ranging from the implementation to the design and a...")
- 22:34, 1 July 2017 (diff | hist) . . (+649) . . N Steven Wierckx (Created page with "I’m a Software and Security Tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, deve...")
- 22:30, 1 July 2017 (diff | hist) . . (+485) . . N David Szili (Created page with "David Szili is a freelancer IT Security Consultant with penetration testing, security monitoring and incident response background, previously working for companies like POST T...")
- 22:29, 1 July 2017 (diff | hist) . . (+4) . . Didier Stevens
- 19:32, 26 June 2017 (diff | hist) . . (+2,668) . . N Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape. (Created page with "With more than 18M websites on the internet using WordPress [1] and hundreds of known vulnerabilities reported [2], this and other well known Content Management Systems (CMS)...")
- 19:30, 26 June 2017 (diff | hist) . . (+2,504) . . N Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) (Created page with "In this talk we will be discussing anatomy of race conditions, various forms of race conditions (userland and kernel land), properties viz. concurrency, shared object property...")
- 19:29, 26 June 2017 (diff | hist) . . (+1,132) . . N Weaponizing the BBC Micro:Bit (Created page with "In 2015, BBC sponsored Micro:Bit was launched and offered to one million students in the United Kingdom to teach them how to code. This device is affordable and have a lot of...")
- 19:11, 26 June 2017 (diff | hist) . . (+1,591) . . N Open Source Security Orchestration (Created page with "My original question was “How do I share a Fail2ban jail?” But there are many other questions aren’t there? How do we get to threats in time? How do we make sure that th...")
- 19:10, 26 June 2017 (diff | hist) . . (+2,392) . . N Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis. (Created page with "With the increasing amount of malware HTTPS traffic, it is a challenge to discover new features and methods to detect malware without decrypting the traffic. A detection metho...") (current)
- 19:09, 26 June 2017 (diff | hist) . . (+1,074) . . N Evading Microsoft ATA for Active Directory Domination. (Created page with "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Controller, Wind...") (current)
- 19:09, 26 June 2017 (diff | hist) . . (+1,311) . . N Browser Exploits. Grab them by the collar! (Created page with "APT has become a hot topic in enterprise IT today. One of the softwares that we see becomes victim of APT attack more often is web browsers and the attack surface is becoming...") (current)
- 18:43, 26 June 2017 (diff | hist) . . (+792) . . N Debasish Mandal (Created page with "Debasish Mandal is a security researcher and currently working in Intel Security (McAfee) IPS Vulnerability Research Team. He has been working in information security industry...")
- 18:42, 26 June 2017 (diff | hist) . . (+992) . . N Nikhil Mittal (Created page with "Nikhil Mittal is a hacker, infosec researcher, speaker and enthusiast. His area of interest includes penetration testing, attack research, defence strategies and post exploita...")
- 18:42, 26 June 2017 (diff | hist) . . (+241) . . N František Střasák - Sebastian Garcia (Created page with "František Střasák is a student of the Bachelor program of Computer Science at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in this thesi...") (current)
- 18:41, 26 June 2017 (diff | hist) . . (+693) . . N Gregory Pickett (Created page with "Gregory Pickett CISSP, GCIA, GPEN has a background in intrusion analysis for Fortune 100 companies but now heads up Hellfire Security’s Managed Security Services efforts and...")
- 18:40, 26 June 2017 (diff | hist) . . (+295) . . N Sander Demeester (Created page with "Sander Demeester is a Technical Expert within the Technology Consulting department of PwC | As a technical expert, Sander has a strong focus on formal security & cryptographic...")
- 18:40, 26 June 2017 (diff | hist) . . (+363) . . N Damien Cauquil (Created page with "Damien Cauquil is a senior security researcher at Digital Security (CERT-UBIK), a French security company focused on IoT and related ground breaking technologies. He spoke at...")
- 18:38, 26 June 2017 (diff | hist) . . (+1,294) . . N Swaroop Yermalkar (Created page with "Swaroop Yermalkar works as a Senior Security Engineer at Philips and his work includes threat modelling, security research and the assessment of IoT devices, healthcare produc...")
- 18:34, 26 June 2017 (diff | hist) . . (+837) . . N Balazs Bucsay (Created page with "Balazs Bucsay (@xoreipeip) is a Security Consultant at NCC Group in the United Kingdom who does research and penetration testing for various companies. He has presented at man...")
- 18:34, 26 June 2017 (diff | hist) . . (+320) . . N Matt Wixey (Created page with "Matt Wixey is a penetration tester on PwC's Threat and Vulnerability Management team in the UK, and leads the team's research function. Prior to joining PwC, he led a technica...")