SEARCH
TOOLBOX
LANGUAGES
User contributions

User contributions

From BruCON 2017

Jump to: navigation, search
Search for contributions
 
 
     
  

(newest | oldest) View ( | older 250) (20 | 50 | 100 | 250 | 500)

  • 22:19, 1 July 2017 (diff | hist) . . (+1,510). . N See no evil, hear no evil: Hacking invisibly and silently with light and sound(Created page with "Traditional techniques for C2 channels, exfiltration, surveillance, and exploitation are often frustrated by the growing sophistication and prevalence of security protections,...")
  • 22:18, 1 July 2017 (diff | hist) . . (+122). . Schedule(General Information)
  • 22:01, 1 July 2017 (diff | hist) . . (+1,583). . N Getting the Most Out of Windows Event Logs(Created page with "A typical mistake repeatedly made by many security teams is that they collect such large amount of events that at the end their Security Information and Event Management (SIEM...")
  • 21:59, 1 July 2017 (diff | hist) . . (+825). . N Practical iOS App Exploitation and Defense using iGoat(Created page with "iOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applic...")
  • 21:57, 1 July 2017 (diff | hist) . . (+1,763). . N Malware Triage: Malscripts Are The New Exploit Kit(Created page with "Malware triage is an important function in any mature incident response program; the process of quickly analyzing potentially malicious files or URLs to determine if your orga...")
  • 21:57, 1 July 2017 (diff | hist) . . (+1,437). . N Jedi's trick to convince your boss and colleagues(Created page with "Social engineering techniques can be used to hack into companies and help the dark side reach their targets. They can also be used by the light side to help you achieve your o...")
  • 21:56, 1 July 2017 (diff | hist) . . (+11). . Hacking Bluetooth Smart locks
  • 21:54, 1 July 2017 (diff | hist) . . (+1,737). . N Hacking Bluetooth Smart locks(Created page with "Recently it seems our home/car/bicycle locks have started to follow a new trend: to include a BLE chip inside to make them "smart". Unlike smart toothbrushes, socks or kettle...")
  • 21:53, 1 July 2017 (diff | hist) . . (+2). . Defeating Proprietary Protocols the Smart Way
  • 21:52, 1 July 2017 (diff | hist) . . (+1,895). . N Defeating Proprietary Protocols the Smart Way(Created page with "Started six years ago, the project Netzob [www.netzob.org] aims at providing state-of-the-art algorithms for protocol reverse engineering in an open source framework. In this...")
  • 21:51, 1 July 2017 (diff | hist) . . (+2,131). . N Practical Machine Learning in InfoSecurity(Created page with "This lab session is designed to give attendees a quick introduction to ML concepts and gets up and running with the popular machine learning library, sci-kit learn. We first...")
  • 21:50, 1 July 2017 (diff | hist) . . (+582). . N Anto Joseph(Created page with "Anto Joseph is a Security Engineer at Intel. He has 4 years of corporate experience in developing and advocating security in Mobile and Web Platforms. Machine Learning is one...")
  • 21:50, 1 July 2017 (diff | hist) . . (+2). . Clarence Chio
  • 21:49, 1 July 2017 (diff | hist) . . (+1,014). . N Clarence Chio(Created page with "Clarence Chio graduated with a B.S. and M.S. in Computer Science from Stanford within 4 n data mining and artificial intelligence. He is in the process of authoring the O’Re...")
  • 21:48, 1 July 2017 (diff | hist) . . (+508). . N Playing with RFID workshop(Created page with "This is a workshop about Radio-frequency Identification (RFID), including a basic introduction and a set of practical hands-on challenges. We will start with explaining the th...")
  • 21:47, 1 July 2017 (diff | hist) . . (+1,206). . N Windows malware development: A JMP in the dark(Created page with "Malware development has always been a subject that has been frowned upon, however it is a valuable skill to possess for Security Specialists as it will help them acquire a bet...")
  • 21:43, 1 July 2017 (diff | hist) . . (+766). . N Yannick Wellens(Created page with "Yannick Wellens is a Security Specialist and researcher at Nynox, focusing on host and network penetration testing, exploit development and malware research. He started his ca...")
  • 21:41, 1 July 2017 (diff | hist) . . (+284). . N Frédéric Guihéry(Created page with "Frédéric Guihéry is an IT security engineer and head of Amossys R&D lab. He has specialized in reverse engineering of protocols and software, Trusted Computing, system secu...")
  • 21:41, 1 July 2017 (diff | hist) . . (+430). . N Georges Bossert(Created page with "Georges Bossert, is an Innovation Leader and a security auditor at Sekoia. His main fields of interest are the reverse engineering of communication protocols, architecture har...")
  • 21:40, 1 July 2017 (diff | hist) . . (+1,026). . N Slawomir Jasek(Created page with "IT security consultant with over 10 years of experience. He participated in many assessments of systems' and applications' security for leading financial companies and public...")
  • 21:39, 1 July 2017 (diff | hist) . . (+1,637). . N Leszek Mis(Created page with "Leszek Miś has over 11 years of experience in IT security technology supporting the largest companies and institutions for implementation, consulting and technical training....")
  • 21:37, 1 July 2017 (diff | hist) . . (+746). . N Emmanuel Nicaise(Created page with "Emmanuel is a seasoned advisor & manager with more than 25 years of experience in IT and in corporate security (Information, cyber, operational and physical security). He firs...")
  • 21:37, 1 July 2017 (diff | hist) . . (+273). . N Sergei Frankoff(Created page with "Sergei Frankoff volunteers with OpenAnalysis as a malware researcher. When he is not reverse engineering malware Sergei is focused on building open source tools for malware an...")
  • 21:36, 1 July 2017 (diff | hist) . . (+215). . N Sean Wilson(Created page with "Sean Wilson volunteers with OpenAnalysis as a malware researcher. He splits his time between reverse engineering malware and building open source tools for incident response....")
  • 21:35, 1 July 2017 (diff | hist) . . (+1). . Steven Wierckx
  • 21:34, 1 July 2017 (diff | hist) . . (+588). . N Andy Deweirt(Created page with "I’m a security consultant with over 10 year of experience in infosecurity. My main focus has mostly been network security ranging from the implementation to the design and a...")
  • 21:34, 1 July 2017 (diff | hist) . . (+649). . N Steven Wierckx(Created page with "I’m a Software and Security Tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, deve...")
  • 21:30, 1 July 2017 (diff | hist) . . (+485). . N David Szili(Created page with "David Szili is a freelancer IT Security Consultant with penetration testing, security monitoring and incident response background, previously working for companies like POST T...")
  • 21:29, 1 July 2017 (diff | hist) . . (+4). . Didier Stevens
  • 18:32, 26 June 2017 (diff | hist) . . (+2,668). . N Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape.(Created page with "With more than 18M websites on the internet using WordPress [1] and hundreds of known vulnerabilities reported [2], this and other well known Content Management Systems (CMS)...")
  • 18:30, 26 June 2017 (diff | hist) . . (+2,504). . N Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited)(Created page with "In this talk we will be discussing anatomy of race conditions, various forms of race conditions (userland and kernel land), properties viz. concurrency, shared object property...")
  • 18:29, 26 June 2017 (diff | hist) . . (+1,132). . N Weaponizing the BBC Micro:Bit(Created page with "In 2015, BBC sponsored Micro:Bit was launched and offered to one million students in the United Kingdom to teach them how to code. This device is affordable and have a lot of...")
  • 18:11, 26 June 2017 (diff | hist) . . (+1,591). . N Open Source Security Orchestration(Created page with "My original question was “How do I share a Fail2ban jail?” But there are many other questions aren’t there? How do we get to threats in time? How do we make sure that th...")
  • 18:10, 26 June 2017 (diff | hist) . . (+2,392). . N Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis.(Created page with "With the increasing amount of malware HTTPS traffic, it is a challenge to discover new features and methods to detect malware without decrypting the traffic. A detection metho...") (current)
  • 18:09, 26 June 2017 (diff | hist) . . (+1,074). . N Evading Microsoft ATA for Active Directory Domination.(Created page with "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Controller, Wind...") (current)
  • 18:09, 26 June 2017 (diff | hist) . . (+1,311). . N Browser Exploits. Grab them by the collar!(Created page with "APT has become a hot topic in enterprise IT today. One of the softwares that we see becomes victim of APT attack more often is web browsers and the attack surface is becoming...") (current)
  • 17:43, 26 June 2017 (diff | hist) . . (+792). . N Debasish Mandal(Created page with "Debasish Mandal is a security researcher and currently working in Intel Security (McAfee) IPS Vulnerability Research Team. He has been working in information security industry...")
  • 17:42, 26 June 2017 (diff | hist) . . (+992). . N Nikhil Mittal(Created page with "Nikhil Mittal is a hacker, infosec researcher, speaker and enthusiast. His area of interest includes penetration testing, attack research, defence strategies and post exploita...")
  • 17:42, 26 June 2017 (diff | hist) . . (+241). . N František Střasák - Sebastian Garcia(Created page with "František Střasák is a student of the Bachelor program of Computer Science at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in this thesi...") (current)
  • 17:41, 26 June 2017 (diff | hist) . . (+693). . N Gregory Pickett(Created page with "Gregory Pickett CISSP, GCIA, GPEN has a background in intrusion analysis for Fortune 100 companies but now heads up Hellfire Security’s Managed Security Services efforts and...")
  • 17:40, 26 June 2017 (diff | hist) . . (+295). . N Sander Demeester(Created page with "Sander Demeester is a Technical Expert within the Technology Consulting department of PwC | As a technical expert, Sander has a strong focus on formal security & cryptographic...")
  • 17:40, 26 June 2017 (diff | hist) . . (+363). . N Damien Cauquil(Created page with "Damien Cauquil is a senior security researcher at Digital Security (CERT-UBIK), a French security company focused on IoT and related ground breaking technologies. He spoke at...")
  • 17:38, 26 June 2017 (diff | hist) . . (+1,294). . N Swaroop Yermalkar(Created page with "Swaroop Yermalkar works as a Senior Security Engineer at Philips and his work includes threat modelling, security research and the assessment of IoT devices, healthcare produc...")
  • 17:34, 26 June 2017 (diff | hist) . . (+837). . N Balazs Bucsay(Created page with "Balazs Bucsay (@xoreipeip) is a Security Consultant at NCC Group in the United Kingdom who does research and penetration testing for various companies. He has presented at man...")
  • 17:34, 26 June 2017 (diff | hist) . . (+320). . N Matt Wixey(Created page with "Matt Wixey is a penetration tester on PwC's Threat and Vulnerability Management team in the UK, and leads the team's research function. Prior to joining PwC, he led a technica...")

(newest | oldest) View ( | older 250) (20 | 50 | 100 | 250 | 500)