User contributions
From BruCON 2017
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)
- 21:39, 9 September 2014 (diff | hist) . . (+12) . . Schedule (→BruCON 0x06 Line-Up)
- 21:37, 9 September 2014 (diff | hist) . . (+590) . . N Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft. (Created page with "Everyone knows you ought to threat model, but in practical reality it turns out to be tricky. If past efforts to threat model haven't panned out, perhaps part of the problem i...") (current)
- 21:37, 9 September 2014 (diff | hist) . . (+4) . . Schedule (→BruCON 0x06 Line-Up)
- 21:36, 9 September 2014 (diff | hist) . . (+21) . . Xavier Mertens (current)
- 21:35, 9 September 2014 (diff | hist) . . (+2) . . Xavier Mertens
- 21:35, 9 September 2014 (diff | hist) . . (+420) . . N Network device forensics (Created page with "Memory forensics is the next step the forensic community has taken. In this workshop, you can learn memory forensics for Cisco IOS. Learn how to use the Network Appliance For...") (current)
- 21:34, 9 September 2014 (diff | hist) . . (+876) . . N Xavier Mertens (Created page with "Xavier Mertens is an independent security consultant. His job focuses mainly on protecting his customer's resources by applying "offensive" (pentesting) as well as "defensive"...")
- 21:34, 9 September 2014 (diff | hist) . . (+344) . . N Didier Stevens (Created page with "Didier Stevens (Security Consultant, Didier Stevens Labs, Contraste Europe NV) is an IT security professional well known for his security and forensic tools, like the Network...")
- 21:33, 9 September 2014 (diff | hist) . . (+2,127) . . N Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android (Created page with "In today’s day and age, there are literally hundreds of presentations, blogs, and trainings on how to hack an Android application. Unfortunately, most talks tend to fall sho...") (current)
- 21:33, 9 September 2014 (diff | hist) . . (+892) . . N Jake Valletta (Created page with "Jake is a consultant at Mandiant in their New York office. His areas of interest include mobile security, application security, penetration testing, and incident response. His...") (current)
- 21:33, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 21:31, 9 September 2014 (diff | hist) . . (+1,484) . . N Stealing a Mobile Identity Using Wormholes (Created page with "Authentication in mobile networks is usually done using a secure element which is commonly a SIM-Card. It is a tamper resistant device that should prevent cloning of mobile id...") (current)
- 21:29, 9 September 2014 (diff | hist) . . (+402) . . N Markus Vervier (Created page with "Markus Vervier is a security researcher working at LSE Leading Security Experts GmbH in Germany. Having more than 10 years of experience in penetration testing, source code au...") (current)
- 21:29, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 21:25, 9 September 2014 (diff | hist) . . (+411) . . Schedule (→BruCON 0x06 Line-Up)
- 21:11, 9 September 2014 (diff | hist) . . (+1,138) . . N Let's help law enforcement more to drag malware actors into the law (Created page with "To overcome the above facts. In this presentation we stress the importance to stop every abuse described above by making effort with helping in intelligence of to drag the act...") (current)
- 21:10, 9 September 2014 (diff | hist) . . (+1,748) . . N Hendrik Adrian (Created page with "Hendrik Adrian was a bachelor of Electrical Engineering when received Master of Science in Computer & Information Sciences & Support Services at University of California, Los...") (current)
- 21:09, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 00:36, 27 August 2014 (diff | hist) . . (+1,118) . . N Solomon Sonya (Created page with "Solomon Sonya (@Carpenter1010) is a passionate reverse engineer and software developer focusing on the analysis of malware, steganography, covert channels, botnets, computer n...") (current)
- 00:36, 27 August 2014 (diff | hist) . . (+1,198) . . N Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network (Created page with "Amassing a large multi-node botnet is no trivial task, but is possible if you know how to do so. Many techniques are used to exploit computer systems and join them to user co...") (current)
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)