From BruCON 2015
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 20:44, 9 September 2014 (diff | hist) . . (+564) . . N Daan Raman (Created page with "Daan Raman works at NVISO, where he is responsible for R&D. His core activities consist of technical research with a current focus on application security for mobile systems....") (current)
- 20:43, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 20:43, 9 September 2014 (diff | hist) . . (+898) . . N The dirty secrets of client-side exploitation and protection (Created page with "It’s no secret that client-side attacks are what gets attackers a foothold on the network, allowing them to wreak havoc and exfiltrate precious business data. Performing cli...") (current)
- 20:42, 9 September 2014 (diff | hist) . . (+146) . . N Daniela Zapata (Created page with "Daniela is a computer engineering student which from an early age has been interested in computer security, hacking stuff and messing in troubles.") (current)
- 20:42, 9 September 2014 (diff | hist) . . (+1,119) . . N Wim Remes (Created page with "As a Managing Consultant at IOActive, Wim Remes leverages his 15 years of security leadership experience to advise clients on reducing their risk posture by solving complex se...") (current)
- 20:42, 9 September 2014 (diff | hist) . . (+17) . . Schedule (→BruCON 0x06 Line-Up)
- 20:40, 9 September 2014 (diff | hist) . . (+75) . . N Snare (Created page with "A lawyer for the mayor's office and also the world's strongest millionaire.") (current)
- 20:39, 9 September 2014 (diff | hist) . . (+607) . . N Thunderbolts and Lightning / Very, Very Frightening (Created page with "People keep talking about Thunderbolt DMA attacks as though they're a foregone conclusion. Prior to doing this research, we hadn't seen one that didn't involve using a Thunder...") (current)
- 20:39, 9 September 2014 (diff | hist) . . (+12) . . Schedule (→BruCON 0x06 Line-Up)
- 20:37, 9 September 2014 (diff | hist) . . (+590) . . N Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft. (Created page with "Everyone knows you ought to threat model, but in practical reality it turns out to be tricky. If past efforts to threat model haven't panned out, perhaps part of the problem i...") (current)
- 20:37, 9 September 2014 (diff | hist) . . (+4) . . Schedule (→BruCON 0x06 Line-Up)
- 20:36, 9 September 2014 (diff | hist) . . (+21) . . Xavier Mertens (current)
- 20:35, 9 September 2014 (diff | hist) . . (+2) . . Xavier Mertens
- 20:35, 9 September 2014 (diff | hist) . . (+420) . . N Network device forensics (Created page with "Memory forensics is the next step the forensic community has taken. In this workshop, you can learn memory forensics for Cisco IOS. Learn how to use the Network Appliance For...") (current)
- 20:34, 9 September 2014 (diff | hist) . . (+876) . . N Xavier Mertens (Created page with "Xavier Mertens is an independent security consultant. His job focuses mainly on protecting his customer's resources by applying "offensive" (pentesting) as well as "defensive"...")
- 20:34, 9 September 2014 (diff | hist) . . (+344) . . N Didier Stevens (Created page with "Didier Stevens (Security Consultant, Didier Stevens Labs, Contraste Europe NV) is an IT security professional well known for his security and forensic tools, like the Network...") (current)
- 20:33, 9 September 2014 (diff | hist) . . (+2,127) . . N Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android (Created page with "In today’s day and age, there are literally hundreds of presentations, blogs, and trainings on how to hack an Android application. Unfortunately, most talks tend to fall sho...") (current)
- 20:33, 9 September 2014 (diff | hist) . . (+892) . . N Jake Valletta (Created page with "Jake is a consultant at Mandiant in their New York office. His areas of interest include mobile security, application security, penetration testing, and incident response. His...") (current)
- 20:33, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 20:31, 9 September 2014 (diff | hist) . . (+1,484) . . N Stealing a Mobile Identity Using Wormholes (Created page with "Authentication in mobile networks is usually done using a secure element which is commonly a SIM-Card. It is a tamper resistant device that should prevent cloning of mobile id...") (current)
- 20:29, 9 September 2014 (diff | hist) . . (+402) . . N Markus Vervier (Created page with "Markus Vervier is a security researcher working at LSE Leading Security Experts GmbH in Germany. Having more than 10 years of experience in penetration testing, source code au...") (current)
- 20:29, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 20:25, 9 September 2014 (diff | hist) . . (+411) . . Schedule (→BruCON 0x06 Line-Up)
- 20:11, 9 September 2014 (diff | hist) . . (+1,138) . . N Let's help law enforcement more to drag malware actors into the law (Created page with "To overcome the above facts. In this presentation we stress the importance to stop every abuse described above by making effort with helping in intelligence of to drag the act...") (current)
- 20:10, 9 September 2014 (diff | hist) . . (+1,748) . . N Hendrik Adrian (Created page with "Hendrik Adrian was a bachelor of Electrical Engineering when received Master of Science in Computer & Information Sciences & Support Services at University of California, Los...") (current)
- 20:09, 9 September 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 23:36, 26 August 2014 (diff | hist) . . (+1,118) . . N Solomon Sonya (Created page with "Solomon Sonya (@Carpenter1010) is a passionate reverse engineer and software developer focusing on the analysis of malware, steganography, covert channels, botnets, computer n...") (current)
- 23:36, 26 August 2014 (diff | hist) . . (+1,198) . . N Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network (Created page with "Amassing a large multi-node botnet is no trivial task, but is possible if you know how to do so. Many techniques are used to exploit computer systems and join them to user co...") (current)
- 23:35, 26 August 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 23:35, 26 August 2014 (diff | hist) . . (+811) . . N Michael Sikorski (Created page with "Michael Sikorski is a Technical Director and Manager of the FireEye Labs Advanced Reverse Engineering (FLARE) Team. He leads the Malware Analysis Team through reverse engineer...") (current)
- 23:34, 26 August 2014 (diff | hist) . . (+1,202) . . N Counterfeiting the Pipes with FakeNet 2.0 (Created page with "Successful dynamic analysis of malware is dependent on your ability to “Fake the Network”. Tricking malware into thinking it is connected to the Internet allows you effici...") (current)
- 23:34, 26 August 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 23:33, 26 August 2014 (diff | hist) . . (+456) . . N Adam Shostack (Created page with "Adam is a technologist, entrepreneur, author and game designer. He's a member of the BlackHat Review Board and a principal program manager at Microsoft. He helped found the CV...")
- 23:32, 26 August 2014 (diff | hist) . . (+4) . . Schedule (→BruCON 0x06 Line-Up)
- 23:31, 26 August 2014 (diff | hist) . . (+768) . . N Adam Schoeman (Created page with "Adam Schoeman has been involved in security for several years, selling his soul early on as a consultant, but quickly reclaiming it by focusing on applied research, running th...") (current)
- 23:31, 26 August 2014 (diff | hist) . . (+871) . . N Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber (Created page with "What happens when you collect a bunch of good data, under good pretences only to realise that the findings that you were expecting are completely wrong? Before you quit infose...") (current)
- 23:31, 26 August 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 23:29, 26 August 2014 (diff | hist) . . (+1,049) . . N Hal Pomeranz (Created page with "Hal Pomeranz is an independent digital forensic investigator who has consulted on cases ranging from intellectual property theft, to employee sabotage, to organized cybercrime...") (current)
- 23:29, 26 August 2014 (diff | hist) . . (+420) . . N Linux Forensics Workshop (Created page with "This hands-on workshop is a rapid introduction to key artefacts and techniques for investigating compromised Linux systems using Linux tools. Part 1 covers collecting and ana...") (current)
- 23:28, 26 August 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 23:27, 26 August 2014 (diff | hist) . . (+699) . . N Autonomous Remote Hacking Drones (Created page with "This workshop will walk attendees through the process of creating their own remote hacking drones. Participants will start by loading The Deck, a special pentesting Linux dis...") (current)
- 23:27, 26 August 2014 (diff | hist) . . (+1,748) . . N Philip Polstra (Created page with "Dr. Philip Polstra (Dr. Phil) has been involved with technology since an early age. He and one of his brothers cleaned out their savings to purchase a TI-99/4a computer in the...") (current)
- 23:26, 26 August 2014 (diff | hist) . . (+8) . . Schedule (→BruCON 0x06 Line-Up)
- 23:25, 26 August 2014 (diff | hist) . . (+443) . . N Arne Swinnen (Created page with "Arne Swinnen works as a Security Consultant at NVISO, where he mostly performs penetration testing, source code reviews and lecturing security related training. Next to Captur...") (current)
- 23:25, 26 August 2014 (diff | hist) . . (+446) . . N Alaeddine Mesbahi (Created page with "Alaeddine Mesbahi works as a Security Consultant at Verizon Business specialized in penetration testing and security source code review. He is in his own words a Python addict...") (current)
- 23:25, 26 August 2014 (diff | hist) . . (+1,260) . . N One packer to rule them all: Empirical identification, comparison and circumvention of current Antivirus detection techniques (Created page with "Lately, many popular Antivirus solutions claim to be the most effective against unknown and obfuscated malware. Most of these solutions are rather vague about how they suppose...") (current)
- 23:24, 26 August 2014 (diff | hist) . . (+12) . . Schedule (→BruCON 0x06 Line-Up)
- 23:22, 26 August 2014 (diff | hist) . . (+1,395) . . N Windows Crash Dump Exploration (Created page with "The Microsoft Windows crash dump mechanism is perhaps one of the most crucial undocumented components to have survived the scrupulous eyes of reverse engineers and Windows int...") (current)
- 23:21, 26 August 2014 (diff | hist) . . (+4) . . Schedule (→BruCON 0x06 Line-Up)
- 23:21, 26 August 2014 (diff | hist) . . (+1,030) . . N Aaron Lemasters (Created page with "Aaron LeMasters is a Senior Security Researcher at CrowdStrike. He is currently contributing to the development of the company's flagship product and related research tasks....") (current)
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)