Top results
1. it's okay to touch yourself! derbycon 2013 ben ten (@ben0xa) 2. about me ● 12+ years experience in health care information systems ● vice president & security…
powerpoint presentation marketers are friends, not food kara drapala 1 agenda about me/intro nlprank case study communications 101 help us help you how to not go crazy while…
stealthier attacks & smarter defending with tls fingerprinting lee brotherston @synackpse #tlsfp … a “zero math, (almost) zero crypto”, tls talk lee brotherston…
1. 1 stealth servers need stealth packets stealth servers need stealth packets jaime sanchez (@segofensiva) www.seguridadofensiva.com 2. 2 stealth servers need stealth packets…
1. regular expressions (regex) overview september 24, 2017 matt scheurer @c3rkah slides: https://www.slideshare.net/cerkah ((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9]).(25[0-5]|2[0-4]…
11fall 2020 no 2 vol 2 romanian cyber security journal rocys 2020 rocysiciro securely transferring data from badusb devices marian ticu university politehnica of bucharest…
1. practical powershell programming for professional people ben ten (@ben0xa) slides: http://www.slideshare.net/benten0xa derbycon 2014 2. practical powe rshell programming…
1. thomas richards10/2/2012 2. thomas richards security consultant at cigital twitter: @g13net website: www.g13net.com oscp, oswp, security+, gpen hacking…
1. rawr rapid assessment of web resources https://www.bitbucket.org/al14s/rawr 2. introduction adam byers [@al14s] started with basic – antic mag… the…
badusb 2.0: exploring usb man-in-the-middle attacks by david kierznowski msc (royal holloway, 2015) and keith mayes, isg, royal holloway y u r y k o /f o to li a badusb 2.0:…
1.patching windows executables with the backdoor factory joshua pitts derbycon 2013 2. other potential titles • i’m down with apt (yeah you know me) • lassie, did timmy…
security b-sides: atlanta strategic penetration testingtime machine • zero exploits will be shown • not demoing lab projects that fail irl • security isn’t
1. the internet of insecure things:10 most wanted list!paul asadoorianfounder & ceohttp://securityweekly.com 2. things about paulhttp://securityweekly.com copyright…
hello asm world: a painless and contextual introduction to x86 assembly hello asm world: a painless and contextual introduction to x86 assembly rogueclown derbycon 3.0 september…
1. steve werby derbycon 2014 bad advice, unintended consequences, and broken paradigms: think and act different 1 2. bad advice, unintended consequences, and broken paradigms:…
ransomware on the mainframe checkmate! chad rikansrud about me • speaker at conferences – def con derbycon share rsa 2017 others • mainframe security consultant •…
derbycon 2012 penetration testing from a hot tub time machine presented by: eric smith chris gates about us • senior partners – lares consulting • penetration testers…
industrial cyber security ammar alzaher april 18 2019 usbs behaving badly how to control usb usage in operational networks honeywell confidential - © 2019 by honeywell international…
www.bertin-it.com badusb, an unpatchable flaw? bertin it, cnim group. 10 bis avenue ampère, fr – 78180 montigny t. +3301 39 30 62 50 e. [email protected] @bertin_it…
defending against malicious peripherals with cinch presented by avesta hojjati cs598 computer security in the physical world university of illinois based on slides by sebastian…