All public logs
From BruCON 2017
Combined display of all available logs of BruCON 2017. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
(newest | oldest) View (newer 20 | older 20) (20 | 50 | 100 | 250 | 500)- 23:31, 1 July 2017 Larry (talk | contribs) automatically marked revision 5586 of page Rushikesh Nandedkar patrolled
- 23:31, 1 July 2017 Larry (talk | contribs) automatically marked revision 5585 of page Sampada Nandedkar patrolled
- 23:23, 1 July 2017 Larry (talk | contribs) automatically marked revision 5584 of page Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE patrolled
- 23:23, 1 July 2017 Larry (talk | contribs) deleted page Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE. (content was: "With arrival of new smart devices every day, Internet of Things is one of the most upcoming trends in technology. Most of these devices have component to communicate..." (and the only contributor was "Larry"))
- 23:23, 1 July 2017 Larry (talk | contribs) automatically marked revision 5583 of page Swaroop Yermalkar patrolled
- 23:21, 1 July 2017 Larry (talk | contribs) deleted page Anna Shirokova - Veronica Valeros (content was: "Anna Shirokova is a threat researcher at Cisco. Her passion for all things relating to malware eventually grew into a career as an information security analyst. As of..." (and the only contributor was "Larry"))
- 23:21, 1 July 2017 Larry (talk | contribs) automatically marked revision 5582 of page Veronica Valeros patrolled
- 23:21, 1 July 2017 Larry (talk | contribs) automatically marked revision 5581 of page Anna Shirokova patrolled
- 23:20, 1 July 2017 Larry (talk | contribs) automatically marked revision 5580 of page XFLTReaT: a new dimension in tunnelling patrolled
- 23:20, 1 July 2017 Larry (talk | contribs) deleted page XFLTReaT: A new dimension in tunnelling. (content was: "This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to..." (and the only contributor was "Larry"))
- 23:19, 1 July 2017 Larry (talk | contribs) automatically marked revision 5579 of page See no evil, hear no evil: Hacking invisibly and silently with light and sound patrolled
- 23:18, 1 July 2017 Larry (talk | contribs) deleted page See no evil, hear no evil: Hacking invisibly and silently with light and sound. (content was: "Traditional techniques for C2 channels, exfiltration, surveillance, and exploitation are often frustrated by the growing sophistication and prevalence of security pro..." (and the only contributor was "Larry"))
- 23:18, 1 July 2017 Larry (talk | contribs) automatically marked revision 5578 of page Schedule patrolled
- 23:01, 1 July 2017 Larry (talk | contribs) automatically marked revision 5577 of page Getting the Most Out of Windows Event Logs patrolled
- 23:00, 1 July 2017 Larry (talk | contribs) automatically marked revision 5576 of page Building a cheap robust scaling penetration testing/bug bounty super computer patrolled
- 22:59, 1 July 2017 Larry (talk | contribs) automatically marked revision 5575 of page Building a cheap robust scaling penetration testing/bug bounty super computer patrolled
- 22:59, 1 July 2017 Larry (talk | contribs) automatically marked revision 5574 of page Practical iOS App Exploitation and Defense using iGoat patrolled
- 22:57, 1 July 2017 Larry (talk | contribs) automatically marked revision 5573 of page Malware Triage: Malscripts Are The New Exploit Kit patrolled
- 22:57, 1 July 2017 Larry (talk | contribs) automatically marked revision 5572 of page Jedi's trick to convince your boss and colleagues patrolled
- 22:56, 1 July 2017 Larry (talk | contribs) automatically marked revision 5571 of page May the data stay with you Network Data Exfiltration Techniques patrolled