User contributions
From BruCON 2017
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 17:36, 20 July 2017 (diff | hist) . . (+294) . . N František Střasák (Created page with "František Střasák is a student of the Master program of Artificial Intelligence at Faculty of Electrical Engineering, CTU in Prague, Czech Republic. His supervisor in this...")
- 17:36, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:17, 20 July 2017 (diff | hist) . . (0) . . m The cyber short. A market solution for product safety and corporate governance. (Protected "The cyber short. A market solution for product safety and corporate governance." ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:17, 20 July 2017 (diff | hist) . . (+630) . . N The cyber short. A market solution for product safety and corporate governance. (Created page with "The Bug Short: What I learned on the way to Wall Street. Justine Bone presents the world's first ever cyber security-backed short position. As CEO of MedSec, Justine and he...")
- 17:17, 20 July 2017 (diff | hist) . . (+2) . . Schedule
- 17:16, 20 July 2017 (diff | hist) . . (+4) . . Schedule (→General Information)
- 17:14, 20 July 2017 (diff | hist) . . (0) . . m Justine Bone (Protected "Justine Bone" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) (current)
- 17:14, 20 July 2017 (diff | hist) . . (+1,228) . . N Justine Bone (Created page with "Justine is a recovering vulnerability researcher and security executive with background in software security research, risk management, information security governance, and id...")
- 00:25, 2 July 2017 (diff | hist) . . (+97) . . Schedule
- 00:22, 2 July 2017 (diff | hist) . . (+571) . . N May the data stay with you - Network Data Exfiltration Techniques. (Created page with "Data exfiltration is the process of transmitting data from pwned or infected networks back to the attacker while trying to minimize detection. During this workshop (2 hours)...")
- 00:20, 2 July 2017 (diff | hist) . . (+1,357) . . N Building a cheap, robust, scaling, penetration testing/bug bounty super computer (Created page with "Are you confronted with huge amounts of IP addresses you need to scan or penetration test against? Are you ready to go into bug bounty hunting on a large scale? Do you need to...")
- 00:18, 2 July 2017 (diff | hist) . . (+832) . . N Programming Wireshark With Lua (Created page with "In this 2 hour workshop, you will learn how to program Wireshark with the Lua programming language. Wireshark can be extended using the C and Lua programming languages. In...")
- 23:47, 1 July 2017 (diff | hist) . . (+1,311) . . N Browser Exploits? Grab them by the collar! (Created page with "APT has become a hot topic in enterprise IT today. One of the softwares that we see becomes victim of APT attack more often is web browsers and the attack surface is becoming...")
- 23:43, 1 July 2017 (diff | hist) . . (+1,074) . . N Evading Microsoft ATA for Active Directory Domination (Created page with "Microsoft Advanced Threat Analytics (ATA) is a defense platform which reads information from multiple sources like traffic for certain protocols to the Domain Controller, Wind...")
- 23:42, 1 July 2017 (diff | hist) . . (+2,393) . . N Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis (Created page with "With the increasing amount of malware HTTPS traffic, it is a challenge to discover new features and methods to detect malware without decrypting the traffic. A detection metho...")
- 23:36, 1 July 2017 (diff | hist) . . (+873) . . N MEATPISTOL, A Modular Malware Implant Framework (Created page with "Attention Red Teamers, Penetration Testers, and Offensive Security Operators, isn’t the overhead of fighting attribution, spinning up infrastructure, and having to constantl...")
- 23:35, 1 July 2017 (diff | hist) . . (-1) . . Sander Demeester
- 23:34, 1 July 2017 (diff | hist) . . (+3) . . Secure channels: Building real world crypto systems
- 23:33, 1 July 2017 (diff | hist) . . (+1,410) . . N Secure channels: Building real world crypto systems (Created page with "Secure communication is one of the most common, most important real world application of cryptography today. But besides being one of the most important requirements of modern...")
- 23:31, 1 July 2017 (diff | hist) . . (+426) . . N Rushikesh Nandedkar (Created page with "Rushikesh is a security analyst. Having more than six years of experience under his belt, his assignments have always been pointed towards reducing the state of insecurity for...")
- 23:31, 1 July 2017 (diff | hist) . . (+256) . . N Sampada Nandedkar (Created page with "Sampada is a programmer transformed to security researcher. Her passion lies in logical vulnerabilities and algorithmic enhancements towards systems security. Her area of stud...")
- 23:23, 1 July 2017 (diff | hist) . . (+6) . . Swaroop Yermalkar
- 23:21, 1 July 2017 (diff | hist) . . (+787) . . N Veronica Valeros (Created page with "Veronica Valeros is a hacker, researcher and intelligence analyst from Argentina. Her research has a strong focus on helping people and involves different areas from wireless...")
- 23:21, 1 July 2017 (diff | hist) . . (+356) . . N Anna Shirokova (Created page with "Anna Shirokova is a threat researcher at Cisco. Her passion for all things relating to malware eventually grew into a career as an information security analyst. As of 2017 she...")
- 23:20, 1 July 2017 (diff | hist) . . (+2,662) . . N XFLTReaT: a new dimension in tunnelling (Created page with "This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to block ex...")
- 23:19, 1 July 2017 (diff | hist) . . (+1,510) . . N See no evil, hear no evil: Hacking invisibly and silently with light and sound (Created page with "Traditional techniques for C2 channels, exfiltration, surveillance, and exploitation are often frustrated by the growing sophistication and prevalence of security protections,...")
- 23:18, 1 July 2017 (diff | hist) . . (+122) . . Schedule (→General Information)
- 23:01, 1 July 2017 (diff | hist) . . (+1,583) . . N Getting the Most Out of Windows Event Logs (Created page with "A typical mistake repeatedly made by many security teams is that they collect such large amount of events that at the end their Security Information and Event Management (SIEM...")
- 22:59, 1 July 2017 (diff | hist) . . (+825) . . N Practical iOS App Exploitation and Defense using iGoat (Created page with "iOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applic...")
- 22:57, 1 July 2017 (diff | hist) . . (+1,763) . . N Malware Triage: Malscripts Are The New Exploit Kit (Created page with "Malware triage is an important function in any mature incident response program; the process of quickly analyzing potentially malicious files or URLs to determine if your orga...")
- 22:57, 1 July 2017 (diff | hist) . . (+1,437) . . N Jedi's trick to convince your boss and colleagues (Created page with "Social engineering techniques can be used to hack into companies and help the dark side reach their targets. They can also be used by the light side to help you achieve your o...")
- 22:56, 1 July 2017 (diff | hist) . . (+11) . . Hacking Bluetooth Smart locks
- 22:54, 1 July 2017 (diff | hist) . . (+1,737) . . N Hacking Bluetooth Smart locks (Created page with "Recently it seems our home/car/bicycle locks have started to follow a new trend: to include a BLE chip inside to make them "smart". Unlike smart toothbrushes, socks or kettle...")
- 22:53, 1 July 2017 (diff | hist) . . (+2) . . Defeating Proprietary Protocols the Smart Way
- 22:52, 1 July 2017 (diff | hist) . . (+1,895) . . N Defeating Proprietary Protocols the Smart Way (Created page with "Started six years ago, the project Netzob [www.netzob.org] aims at providing state-of-the-art algorithms for protocol reverse engineering in an open source framework. In this...")
- 22:51, 1 July 2017 (diff | hist) . . (+2,131) . . N Practical Machine Learning in InfoSecurity (Created page with "This lab session is designed to give attendees a quick introduction to ML concepts and gets up and running with the popular machine learning library, sci-kit learn. We first...")
- 22:50, 1 July 2017 (diff | hist) . . (+582) . . N Anto Joseph (Created page with "Anto Joseph is a Security Engineer at Intel. He has 4 years of corporate experience in developing and advocating security in Mobile and Web Platforms. Machine Learning is one...")
- 22:50, 1 July 2017 (diff | hist) . . (+2) . . Clarence Chio
- 22:49, 1 July 2017 (diff | hist) . . (+1,014) . . N Clarence Chio (Created page with "Clarence Chio graduated with a B.S. and M.S. in Computer Science from Stanford within 4 n data mining and artificial intelligence. He is in the process of authoring the O’Re...")
- 22:48, 1 July 2017 (diff | hist) . . (+508) . . N Playing with RFID workshop (Created page with "This is a workshop about Radio-frequency Identification (RFID), including a basic introduction and a set of practical hands-on challenges. We will start with explaining the th...")
- 22:47, 1 July 2017 (diff | hist) . . (+1,206) . . N Windows malware development: A JMP in the dark (Created page with "Malware development has always been a subject that has been frowned upon, however it is a valuable skill to possess for Security Specialists as it will help them acquire a bet...")
- 22:43, 1 July 2017 (diff | hist) . . (+766) . . N Yannick Wellens (Created page with "Yannick Wellens is a Security Specialist and researcher at Nynox, focusing on host and network penetration testing, exploit development and malware research. He started his ca...")
- 22:41, 1 July 2017 (diff | hist) . . (+284) . . N Frédéric Guihéry (Created page with "Frédéric Guihéry is an IT security engineer and head of Amossys R&D lab. He has specialized in reverse engineering of protocols and software, Trusted Computing, system secu...")
- 22:41, 1 July 2017 (diff | hist) . . (+430) . . N Georges Bossert (Created page with "Georges Bossert, is an Innovation Leader and a security auditor at Sekoia. His main fields of interest are the reverse engineering of communication protocols, architecture har...")
- 22:40, 1 July 2017 (diff | hist) . . (+1,026) . . N Slawomir Jasek (Created page with "IT security consultant with over 10 years of experience. He participated in many assessments of systems' and applications' security for leading financial companies and public...")
- 22:39, 1 July 2017 (diff | hist) . . (+1,637) . . N Leszek Mis (Created page with "Leszek Miś has over 11 years of experience in IT security technology supporting the largest companies and institutions for implementation, consulting and technical training....")
- 22:37, 1 July 2017 (diff | hist) . . (+746) . . N Emmanuel Nicaise (Created page with "Emmanuel is a seasoned advisor & manager with more than 25 years of experience in IT and in corporate security (Information, cyber, operational and physical security). He firs...")
- 22:37, 1 July 2017 (diff | hist) . . (+273) . . N Sergei Frankoff (Created page with "Sergei Frankoff volunteers with OpenAnalysis as a malware researcher. When he is not reverse engineering malware Sergei is focused on building open source tools for malware an...")
- 22:36, 1 July 2017 (diff | hist) . . (+215) . . N Sean Wilson (Created page with "Sean Wilson volunteers with OpenAnalysis as a malware researcher. He splits his time between reverse engineering malware and building open source tools for incident response....")
- 22:35, 1 July 2017 (diff | hist) . . (+1) . . Steven Wierckx
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)