Presentaciones y vídeos de DefCamp #6
Pues para que no nos aburramos durante las vacaciones, aquí tenéis material nuevo. En este caso de DefCamp #6.
- A new Hope - CTF stories & IoT Hacking - Slide - Video
- Game of Hacks: Play, Hack & Track - Slide - Video
- (In)Security of Embedded Devices' Firmware – Fast and Furious at Large Scale - Slide - Video
- IoT Security - Slide - Video
- IoT Security - Slide - Video
- From Hype Hangover to Happy Hacking: Shaping the World through Shaping Actions - Slide - Video
- A new Hope - CTF stories & IoT Hacking - Slide - Video
- What's in a name? DNS use for exfiltration, and monitoring for detection - Slide - Video
- Finding media bugs in Android using file format fuzzing - Slide - Video
- White hat hacker bounty program to improve online environment security - Slide - Video
- ELK stack for Hackers - Slide - Video
- When Steganography Stops Being Cool - Slide - Video
- Integrating Mobile Devices into Your Penetration Testing Program - Slide - Video
- Toward large-scale vulnerability discovery using Machine Learning - Slide - Video
- Breaking in Bad (I'm the one who doesn't knock) - Slide - Video
- Modern approaches to Wi-Fi attacks - Slide - Video
- Building a Weaponized Honeybot (part I) - Slide - Video
- Building a Weaponized Honeybot (part II) - Slide - Video
- Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts - Slide - Video
- Defending the Enterprise Against Network Infrastructure Threats - Slide - Video
- Challenges on Reversing Layered Malware - Slide - Video
- How to mess with Android Intents - Slide - Video
- Cryptography – our weapon in the 21st century - Slide - Video
- Luke 8:17 – Misleading implementations that compromise the privacy and information security - Slide - Video
- Building a Cyber Security Operations Center - Slide - Video
- Pentesting Android Applications - Workshop - Slide - Video
- What's in a name? DNS use for exfiltration, and monitoring for detection - Slide - Video
- IDS Evasion Techniques - Slide - Video
- Untrusted Mobile Applications. State of Art of Security App-Apocalypse - Slide - Video
- IoT Village Awards - Slide - Video
- Hacking and Securing Network Monitoring Systems: End-to-end walkthrough example on Ganglia - Slide - Video
- Orange about Bug Bounty and Innovation Labs 2016 - Slide - Video
- Abstract Apoc@lypse Technique - Slide - Video
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec