Solomon Sonya [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
802.11 Leakage: How passive interception leads to active exploitation Brucon-2016 - brussels,belgium
WiFi Exploitation: How passive interception leads to active exploitation hacklu-2016 - parchotel,luxembourg
What’s Hot – Wifi Data Leakage: How your phone, laptop, and smart device can reveal where you live, work, and places you’ve visted via 802.11 inception, HackerHalted-2016 - atlanta,usa
Keynote -WiFi Data Leakage: How your phone, laptop, and smart device can reveal where you live, work, and places you’ve visited via 802.11 interception, Takedowncon-2016 - huntsville,usa
What’s Hot – Incorporating Threat Intelligence into Your Enterprise Communications Systems, HackerHalted-2015 - atlanta,usa
Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network BruCon-2014 - brussels,belgium
SPLINTER THE RAT ATTACK: CREATE YOUR OWN BOTNET TO EXPLOIT THE NETWORK HackInParis-2014 - Paris,France
Exploiting the Zero'th Hour: Developing your Advanced Persistent Threat to Pwn the Network SECtor-2013 - Toronto,Canada
Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to Pwn the Network DerbyCon-2013 - Louisville,Kentucky
Advanced Persistent Threats (APT) and Botnets HackerHalted-2013 - Atlanta,USA
SNSCAT: WHAT YOU DON'T KNOW ABOUT SOMETIMES HURTS THE MOST BlackHat USA-2012 - Las Vegas, USA Data Exfiltration Social Media Covert