SEARCH
TOOLBOX
LANGUAGES
User contributions

User contributions

From BruCON 2017

Jump to: navigation, search
Search for contributions
 
 
     
  

(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)

  • 21:47, 1 July 2017 (diff | hist) . . (+1,206). . N Windows malware development: A JMP in the dark(Created page with "Malware development has always been a subject that has been frowned upon, however it is a valuable skill to possess for Security Specialists as it will help them acquire a bet...")
  • 21:43, 1 July 2017 (diff | hist) . . (+766). . N Yannick Wellens(Created page with "Yannick Wellens is a Security Specialist and researcher at Nynox, focusing on host and network penetration testing, exploit development and malware research. He started his ca...")
  • 21:41, 1 July 2017 (diff | hist) . . (+284). . N Frédéric Guihéry(Created page with "Frédéric Guihéry is an IT security engineer and head of Amossys R&D lab. He has specialized in reverse engineering of protocols and software, Trusted Computing, system secu...")
  • 21:41, 1 July 2017 (diff | hist) . . (+430). . N Georges Bossert(Created page with "Georges Bossert, is an Innovation Leader and a security auditor at Sekoia. His main fields of interest are the reverse engineering of communication protocols, architecture har...")
  • 21:40, 1 July 2017 (diff | hist) . . (+1,026). . N Slawomir Jasek(Created page with "IT security consultant with over 10 years of experience. He participated in many assessments of systems' and applications' security for leading financial companies and public...")
  • 21:39, 1 July 2017 (diff | hist) . . (+1,637). . N Leszek Mis(Created page with "Leszek Miś has over 11 years of experience in IT security technology supporting the largest companies and institutions for implementation, consulting and technical training....")
  • 21:37, 1 July 2017 (diff | hist) . . (+746). . N Emmanuel Nicaise(Created page with "Emmanuel is a seasoned advisor & manager with more than 25 years of experience in IT and in corporate security (Information, cyber, operational and physical security). He firs...")
  • 21:37, 1 July 2017 (diff | hist) . . (+273). . N Sergei Frankoff(Created page with "Sergei Frankoff volunteers with OpenAnalysis as a malware researcher. When he is not reverse engineering malware Sergei is focused on building open source tools for malware an...")
  • 21:36, 1 July 2017 (diff | hist) . . (+215). . N Sean Wilson(Created page with "Sean Wilson volunteers with OpenAnalysis as a malware researcher. He splits his time between reverse engineering malware and building open source tools for incident response....")
  • 21:35, 1 July 2017 (diff | hist) . . (+1). . Steven Wierckx
  • 21:34, 1 July 2017 (diff | hist) . . (+588). . N Andy Deweirt(Created page with "I’m a security consultant with over 10 year of experience in infosecurity. My main focus has mostly been network security ranging from the implementation to the design and a...")
  • 21:34, 1 July 2017 (diff | hist) . . (+649). . N Steven Wierckx(Created page with "I’m a Software and Security Tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, deve...")
  • 21:30, 1 July 2017 (diff | hist) . . (+485). . N David Szili(Created page with "David Szili is a freelancer IT Security Consultant with penetration testing, security monitoring and incident response background, previously working for companies like POST T...")
  • 21:29, 1 July 2017 (diff | hist) . . (+4). . Didier Stevens
  • 18:32, 26 June 2017 (diff | hist) . . (+2,668). . N Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.(Created page with "With more than 18M websites on the internet using WordPress [1] and hundreds of known vulnerabilities reported [2], this and other well known Content Management Systems (CMS)...")
  • 18:30, 26 June 2017 (diff | hist) . . (+2,504). . N Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)(Created page with "In this talk we will be discussing anatomy of race conditions, various forms of race conditions (userland and kernel land), properties viz. concurrency, shared object property...")
  • 18:29, 26 June 2017 (diff | hist) . . (+1,132). . N Weaponizing the BBC Micro:Bit(Created page with "In 2015, BBC sponsored Micro:Bit was launched and offered to one million students in the United Kingdom to teach them how to code. This device is affordable and have a lot of...")
  • 18:11, 26 June 2017 (diff | hist) . . (+1,591). . N Open Source Security Orchestration(Created page with "My original question was “How do I share a Fail2ban jail?” But there are many other questions aren’t there? How do we get to threats in time? How do we make sure that th...")
  • 18:10, 26 June 2017 (diff | hist) . . (+2,392). . N Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis.(Created page with "With the increasing amount of malware HTTPS traffic, it is a challenge to discover new features and methods to detect malware without decrypting the traffic. A detection metho...") (current)
  • 18:09, 26 June 2017 (diff | hist) . . (+1,074). . N Evading Microsoft ATA for Active Directory Domination.(Created page with "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Controller, Wind...") (current)

(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)