Search results for DEF CON 25 Hacker Conference CON 25/DEF CON 25 presentations/DEF$ python c2960-lanbasek9-m-12.2 ... DEF CON 25 Hacker ... Subject: DEF CON 25 Presentation Keywords: DEF CON Conference,

Explore all categories to find your favorite topic

Cisco Catalyst Exploitation Artem Kondratenko Whoami -Penetration tester @ Kaspersky Lab -Hacker -OSC(P|E) -Skydiver ;) Cisco advisory Cisco advisory • The Cluster Management…

WEAPONIZING THE BBC MICRO:BIT DAMIEN " " CAUQUILVIRTUALABS DEF CON 25 - JULY 28, 2017 https://twitter.com/virtualabs /ME Head of R&D, Econocom Digital Security…

Teaching Old Shellcode New Tricks DEF CON 2017 @midnite_runr Whoami • US Marine out in 2001 • Wrote BDFBDFProxy • Co-Authored Ebowla • Found OnionDuke • Work @…

HUNT @jhaddix @swagnetow @FatihEgbatan @digitalwoot @_Sha128 @bugcrowd Data Driven Web Hacking & Manual Testing Contribs Motley crew at @bugcrowd ➔ SecOps & Security…

Untrustworthy Hardware And How to Fix It Seeking Hardware Transparency PRESENT DAY PRESENT TIME ⌷ - ##FPGA ##crypto and #openRISC on Freenode - Shorne and Olofk from #openRISC…

Ghost Telephonist Impersonates You Through LTE CSFB Yuwei ZHENG Lin HUANG Qing YANG Haoqi SHAN Jun LI UnicornTeam 360 Technology July 30 017 Who We Are •  360 Technology…

Building AppSec Automation with python Abhay Bhargav - CTO, we45 A Gentle Introduction to DevOps • What is DevOps? • Where does Security !t in? What is DevOps? • Key…

DEF CON 25 Hacker Conference@professor__plum Disclaimer The views expressed herein do not necessarily state or reflect the views of my current or former employers. I am not

Starting the Avalanche: Application DoS In Microservice Architectures Scott Behrens Jeremy Heffner Jeremy Heffner ● Senior Security Software Engineer ● Developing and…

Secure Tokin’ Doobiekeys: How to roll your own counterfeit hardware security devices @sercurelyfitz, @r00tkillah $whoami Michael* @r00tkillah has done hard-time in real-time.…

1 The Tor Project Our mission is to be the global resource for technology advocacy research and education in the ongoing pursuit of freedom of speech privacy rights online…

25 Years of Program Analysis Zardus Program Analysis Specification What should hold about the program? Technique How will we achieve the goal? Goal What do we want to achieve…

WSUSpendu ANSSI Romain Coltel RomainColtel@Alsideu Yves Le Provost YvesLe-Provost@ssigouvfr 2 WSUSpendu Contents Introduction 5 WSUS and network architecture 7 11 Architectures…

Ghost in the Droid Possessing Android Applications with ParaSpectre Jeff Dileo chaosdata DEFCON 25 Hi! I’m Jeff, and I have a problem. I like to do bad things to worse…

Hacking travel routers like it’s 1999 Mikhail Sosonkin Mikhail Sosonkin “Synack leverages the best combination of humans and technology to discover security vulnerabilities…

Hacking the Cloud Gerald Steere – Microsoft C+E Red Team @Darkpawh Sean Metcalf – CTO Trimarc @pyrotek3 Gerald Steere - @darkpawh 10+ years experience as a penetration…

Untrustworthy Hardware And How to Fix It PRESENT DAY. PRESENT TIME ⌷ - ##FPGA, ##crypto and #openRISC on Freenode - Shorne and Olofk from #openRISC (hardware and cross-compilation…

Revoke-Obfuscation PowerShell Obfuscation Detection Using Science Daniel Bohannon - @danielhbohannon Lee Holmes - @Lee_Holmes 0.000 Whois 0.000 - MANDIANT Senior Applied…

PUBLICPersisting with Microsoft Office:Abusing Extensibility OptionsWilliam KnowlesPUBLICObligatory $whoami William Knowles Security Consultant at MWR InfoSecurity @william_knows1PUBLICAgenda…

Unboxing Android Everything you wanted to know about Android packers Slava Makkaveev Avi Bashan Who Are We @Avi Founder at myDRO former Mobile RD Team Leader at Check Point…