User contributions
From BruCON 2017
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)
- 23:19, 1 July 2017 (diff | hist) . . (+1,510) . . N See no evil, hear no evil: Hacking invisibly and silently with light and sound (Created page with "Traditional techniques for C2 channels, exfiltration, surveillance, and exploitation are often frustrated by the growing sophistication and prevalence of security protections,...")
- 23:18, 1 July 2017 (diff | hist) . . (+122) . . Schedule (→General Information)
- 23:01, 1 July 2017 (diff | hist) . . (+1,583) . . N Getting the Most Out of Windows Event Logs (Created page with "A typical mistake repeatedly made by many security teams is that they collect such large amount of events that at the end their Security Information and Event Management (SIEM...")
- 22:59, 1 July 2017 (diff | hist) . . (+825) . . N Practical iOS App Exploitation and Defense using iGoat (Created page with "iOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applic...")
- 22:57, 1 July 2017 (diff | hist) . . (+1,763) . . N Malware Triage: Malscripts Are The New Exploit Kit (Created page with "Malware triage is an important function in any mature incident response program; the process of quickly analyzing potentially malicious files or URLs to determine if your orga...")
- 22:57, 1 July 2017 (diff | hist) . . (+1,437) . . N Jedi's trick to convince your boss and colleagues (Created page with "Social engineering techniques can be used to hack into companies and help the dark side reach their targets. They can also be used by the light side to help you achieve your o...")
- 22:56, 1 July 2017 (diff | hist) . . (+11) . . Hacking Bluetooth Smart locks
- 22:54, 1 July 2017 (diff | hist) . . (+1,737) . . N Hacking Bluetooth Smart locks (Created page with "Recently it seems our home/car/bicycle locks have started to follow a new trend: to include a BLE chip inside to make them "smart". Unlike smart toothbrushes, socks or kettle...")
- 22:53, 1 July 2017 (diff | hist) . . (+2) . . Defeating Proprietary Protocols the Smart Way
- 22:52, 1 July 2017 (diff | hist) . . (+1,895) . . N Defeating Proprietary Protocols the Smart Way (Created page with "Started six years ago, the project Netzob [www.netzob.org] aims at providing state-of-the-art algorithms for protocol reverse engineering in an open source framework. In this...")
- 22:51, 1 July 2017 (diff | hist) . . (+2,131) . . N Practical Machine Learning in InfoSecurity (Created page with "This lab session is designed to give attendees a quick introduction to ML concepts and gets up and running with the popular machine learning library, sci-kit learn. We first...")
- 22:50, 1 July 2017 (diff | hist) . . (+582) . . N Anto Joseph (Created page with "Anto Joseph is a Security Engineer at Intel. He has 4 years of corporate experience in developing and advocating security in Mobile and Web Platforms. Machine Learning is one...")
- 22:50, 1 July 2017 (diff | hist) . . (+2) . . Clarence Chio
- 22:49, 1 July 2017 (diff | hist) . . (+1,014) . . N Clarence Chio (Created page with "Clarence Chio graduated with a B.S. and M.S. in Computer Science from Stanford within 4 n data mining and artificial intelligence. He is in the process of authoring the O’Re...")
- 22:48, 1 July 2017 (diff | hist) . . (+508) . . N Playing with RFID workshop (Created page with "This is a workshop about Radio-frequency Identification (RFID), including a basic introduction and a set of practical hands-on challenges. We will start with explaining the th...")
- 22:47, 1 July 2017 (diff | hist) . . (+1,206) . . N Windows malware development: A JMP in the dark (Created page with "Malware development has always been a subject that has been frowned upon, however it is a valuable skill to possess for Security Specialists as it will help them acquire a bet...")
- 22:43, 1 July 2017 (diff | hist) . . (+766) . . N Yannick Wellens (Created page with "Yannick Wellens is a Security Specialist and researcher at Nynox, focusing on host and network penetration testing, exploit development and malware research. He started his ca...")
- 22:41, 1 July 2017 (diff | hist) . . (+284) . . N Frédéric Guihéry (Created page with "Frédéric Guihéry is an IT security engineer and head of Amossys R&D lab. He has specialized in reverse engineering of protocols and software, Trusted Computing, system secu...")
- 22:41, 1 July 2017 (diff | hist) . . (+430) . . N Georges Bossert (Created page with "Georges Bossert, is an Innovation Leader and a security auditor at Sekoia. His main fields of interest are the reverse engineering of communication protocols, architecture har...")
- 22:40, 1 July 2017 (diff | hist) . . (+1,026) . . N Slawomir Jasek (Created page with "IT security consultant with over 10 years of experience. He participated in many assessments of systems' and applications' security for leading financial companies and public...")
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)