User contributions
From BruCON 2017
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)
- 23:36, 1 July 2017 (diff | hist) . . (+873) . . N MEATPISTOL, A Modular Malware Implant Framework (Created page with "Attention Red Teamers, Penetration Testers, and Offensive Security Operators, isn’t the overhead of fighting attribution, spinning up infrastructure, and having to constantl...")
- 23:35, 1 July 2017 (diff | hist) . . (-1) . . Sander Demeester
- 23:34, 1 July 2017 (diff | hist) . . (+3) . . Secure channels: Building real world crypto systems
- 23:33, 1 July 2017 (diff | hist) . . (+1,410) . . N Secure channels: Building real world crypto systems (Created page with "Secure communication is one of the most common, most important real world application of cryptography today. But besides being one of the most important requirements of modern...")
- 23:31, 1 July 2017 (diff | hist) . . (+426) . . N Rushikesh Nandedkar (Created page with "Rushikesh is a security analyst. Having more than six years of experience under his belt, his assignments have always been pointed towards reducing the state of insecurity for...")
- 23:31, 1 July 2017 (diff | hist) . . (+256) . . N Sampada Nandedkar (Created page with "Sampada is a programmer transformed to security researcher. Her passion lies in logical vulnerabilities and algorithmic enhancements towards systems security. Her area of stud...")
- 23:23, 1 July 2017 (diff | hist) . . (+6) . . Swaroop Yermalkar
- 23:21, 1 July 2017 (diff | hist) . . (+787) . . N Veronica Valeros (Created page with "Veronica Valeros is a hacker, researcher and intelligence analyst from Argentina. Her research has a strong focus on helping people and involves different areas from wireless...")
- 23:21, 1 July 2017 (diff | hist) . . (+356) . . N Anna Shirokova (Created page with "Anna Shirokova is a threat researcher at Cisco. Her passion for all things relating to malware eventually grew into a career as an information security analyst. As of 2017 she...")
- 23:20, 1 July 2017 (diff | hist) . . (+2,662) . . N XFLTReaT: a new dimension in tunnelling (Created page with "This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to block ex...")
- 23:19, 1 July 2017 (diff | hist) . . (+1,510) . . N See no evil, hear no evil: Hacking invisibly and silently with light and sound (Created page with "Traditional techniques for C2 channels, exfiltration, surveillance, and exploitation are often frustrated by the growing sophistication and prevalence of security protections,...")
- 23:18, 1 July 2017 (diff | hist) . . (+122) . . Schedule (→General Information)
- 23:01, 1 July 2017 (diff | hist) . . (+1,583) . . N Getting the Most Out of Windows Event Logs (Created page with "A typical mistake repeatedly made by many security teams is that they collect such large amount of events that at the end their Security Information and Event Management (SIEM...")
- 22:59, 1 July 2017 (diff | hist) . . (+825) . . N Practical iOS App Exploitation and Defense using iGoat (Created page with "iOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applic...")
- 22:57, 1 July 2017 (diff | hist) . . (+1,763) . . N Malware Triage: Malscripts Are The New Exploit Kit (Created page with "Malware triage is an important function in any mature incident response program; the process of quickly analyzing potentially malicious files or URLs to determine if your orga...")
- 22:57, 1 July 2017 (diff | hist) . . (+1,437) . . N Jedi's trick to convince your boss and colleagues (Created page with "Social engineering techniques can be used to hack into companies and help the dark side reach their targets. They can also be used by the light side to help you achieve your o...")
- 22:56, 1 July 2017 (diff | hist) . . (+11) . . Hacking Bluetooth Smart locks
- 22:54, 1 July 2017 (diff | hist) . . (+1,737) . . N Hacking Bluetooth Smart locks (Created page with "Recently it seems our home/car/bicycle locks have started to follow a new trend: to include a BLE chip inside to make them "smart". Unlike smart toothbrushes, socks or kettle...")
- 22:53, 1 July 2017 (diff | hist) . . (+2) . . Defeating Proprietary Protocols the Smart Way
- 22:52, 1 July 2017 (diff | hist) . . (+1,895) . . N Defeating Proprietary Protocols the Smart Way (Created page with "Started six years ago, the project Netzob [www.netzob.org] aims at providing state-of-the-art algorithms for protocol reverse engineering in an open source framework. In this...")
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)