Top results
reverse reverse engineering @rich0h richo ‣ rich-oh! ‣ computer jerk at stripe ‣ duck enthusiast ‣ co-owner of plausibly the world's most ridiculous cve ‣ wrongislandcon…
hunting asynchronous vulnerabilities james kettle ©portswigger ltd 2015 all rights reserved from: no-‐[email protected] to: james kettle subject:…
1 © copyright 2015 emc corporation. all rights reserved. inside terracotta vpn enabler of advanced threat anonymity 2 © copyright 2015 emc corporation. all rights reserved.…
ntfs analysis with powerforensics ntfs analysis with powershell jared atkinson veris groupâs adaptive threat division @jaredcatkinson jared atkinson hunt capability lead…
software defined networking security outline ● introduction ● what is sdn? ● sdn attack surface ● recent vulnerabilities ● security response ● defensive technologies…
attacking vxworks from stone age to interstellar 44con london 9/10/2015yannick formaggio, richard hsu & eric liu about me yannick formaggio security researcher at istuary…
how to drive a malware analyst crazy how to drive a malware analyst crazy michael boman, malware research institute about me 4th year speaking at 44con - 2012: malware as…
jtagsploitation 5 wires, 5 ways to get root • electrical engineering education with focus on cs and infosec • 10 years of fun with hardware o silicon debug o security…
15-minute linux live analysis dr. phil (polstra) bloomsburg university of pennsylvania what is this talk about? ● determining with some certainty if you have been hacked…
windows 10 2 steps forward, 1 step back james forshaw @tiraniddo 44con 2015 1 james forshaw @tiraniddo obligatory background slide 2 ● researcher in google’s project…
net-square keep calm��� and��� stegosploit saumil shah 44con 2015 net-square about me @therealsaumil saumilshah hacker, trainer, speaker, author, photographer…
from malware analysis to indications of compromise indicators of compromise: from malware analysis to eradication michael boman, malware research institute 1 about me 4th…
1. malware analysis reverse engineering workshop(44con 2013)siavosh zarrasvand & inaki rodriguez (44con) 2. grab a copy of the files• thumb drives being passed around–…
1. secquestinformation security44con 2012: toppling dominotesting security in a lotus notes environment written & presented by darren fuller secquest information security ltd. …
1. building a ctf ... actually kinda trickywednesday, 21 november 12 2. who me.. some times known as ‘skapp’, i do various things for 44con, security tester, breaker…
software defined networking security outline ● introduction ● what is sdn? ● sdn attack surface ● recent vulnerabilities ● security response ● defensive technologies…
1. breaking antivirus softwarejoxean koret, coseinc44con, 2014 2. breaking antivirus software introduction attacking antivirus engines finding vulnerabilities…
1. software security austeritysecurity debt in modern software developmentollie whitehouse, associate director, ncc group 2. agenda•introduction•software security debt•debt…
1. # big game hunting_simple techniques for bug hunting on big iron unix [email protected]:~$ ln s /important /tmp/backup.log [email protected]:~$ sudo ./backup.sh…
#44con 2016 netsquare 2016: the infosec crossroads > saumil shah - ceo,net-square 44con 2016 #44con 2016 netsquare about me @therealsaumil saumilshah hacker, trainer,…