Network Penetration

Title Speakers Conference Tags
Dropsmack: How cloud synchronization services render your corporate firewall worthless Jacob Williams BlackHat EU-2013 - Amsterdam, Netherlands Network Penetration Dropbox
Hacking Huawei VRP Felix ( FX ) Lindner HITBSecConf Malaysia-2012 - KL, Malaysia Network Penetration Attack Huawei
How to hack a telecom and stay alive 2. Owning a billing Sergey Gordeychik Positive Hack Days-2012 - Moscow, Russia Network Penetration
Pushing In, And Pulling Out Slowly Without Anyone Paying Attention Iftach Ian Amit Berlinsides-2010 - Berlin, Germany Network Penetration Data Exfiltration
Attacking Is Easy, Defending Is Hard Walter Belgers OWASP BeNelux-2010 - Netherlands Security Computer Forensics Network Penetration Analysis
Constricting The Web: Offensive Python For Web Hackers Anonymous Speaker OWASP Appsec-2010 - Washington DC, USA Security Web Network Penetration
0Wning The Datacenter Using The Cisco 7000-Series Switch - Nx-Os Insecurity George Hedfors t2-2010 - Helsinki, Finland Web Network Penetration
Protecting Network Services Using Kernel Modules And Iptables Mark Schejtman BugCon-2010 - Mexico Security Infrastructure Risk Network Penetration
Network Authentication Across Closed Ports Mark Schejtman BugCon-2010 - Mexico Network Penetration
Advanced Sql Injection Joseph Mccray BugCon-2010 - Mexico Security Network Penetration
Port Knocking Gonzalo Gonzalez BugCon-2010 - Mexico Security Network Penetration
Selenium – A New Look Into Web Application Reconnaissance Jurgens Van der merwe ZaCon-2 - Johannesburg, South Africa Security Web Network Penetration
Snmp - Simple Network Mediated (Cisco) Pwnage Georg Christian Pranschke ZaCon-2 - Johannesburg, South Africa Security Infrastructure Access Network Penetration
Powershell.. What Every Hax0R Needs To Know Jameel Haffejee ZaCon-2 - Johannesburg, South Africa Security Exploitation Network Penetration
You Spent All That Money And You Still Got Owned... Joseph Mccray BruCON-2010 - Brussels, Belgium Security Risk Reverse Engineering Network Penetration
Finding Backdoors In Code Matias Madou BruCON-2010 - Brussels, Belgium Security Exploitation Network Penetration
Nokia Nfc Malicious Content Sharing Roel Verdult , Fkooman Fkooman BruCON-2010 - Brussels, Belgium Mobile Security Network Penetration
The Monkey Steals The Berries Tyler ( Txs ) Shields BruCON-2010 - Brussels, Belgium Security Network Penetration
Gsm Security: Fact And Fiction Fabian Van den broek BruCON-2010 - Brussels, Belgium Mobile Security Security Network Penetration
Building An Architecture Of Trust: The Network’S Role In Securing Cyberspace Don Proctor CyberSec -2010 - Brussels, Belgium Security Network Penetration Cyberwar Development
Using Recursive Incentives To Win The Darpa Network Challenge Galen Pickard CollSec-2010 - Washington DC, USA Security Computer Forensics Infrastructure Computer Forensics Network Penetration
Is Bluetooth The Right Technology For Mhealth? David Kotz , Shrirang Mare HealthSec-2010 - Washington DC, USA Security Wireless Network Penetration
On Usable Authentication For Wireless Body Area Networks David Kotz , Cory Cornelius HealthSec-2010 - Washington DC, USA Security Wireless Network Penetration
Crash Course In Penetration Testing Oliver Roeschke NinjaCon-2010 - Vienna, Austria Security Others Network Penetration
Payload Already Inside: Data Re-Use For Rop Exploits Long De dinh NinjaCon-2010 - Vienna, Austria Security Network Penetration
Owned Live On Stage Niels Teusink HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Wireless Exploitation Network Penetration
Xprobe Fyodor Yarochkin HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Network Penetration
Promon Testsuite: Client-Based Penetration Testing Tool Tom Lysemose Hansen , Folker Den braber OWASP Appsec-2010 - Stocholm, Sweden Security Application Security Network Penetration Auditing Testing
Schmitt Revisited: Computer Network Attack And The Use Of Force Thomas Wingfield , Eneken Tikk CCDCOE-2010 - Estonia Security Network Penetration
Chinese Cyber Warfare And Computer Network Exploitation Bryan Krekel , George Bakos CCDCOE-2010 - Estonia Security Network Penetration Cyberwar
Goal-Based Pen Testing Jabra SANS Pen Test Summit-2010 - Baltimore, USA Security Others Network Penetration
Beyond Exploits - Penetration Testing Automation Hd Moore SANS Pen Test Summit-2010 - Baltimore, USA Security Application Security Network Penetration
“Abusing Network Protocols” Fotis Hantzis AthCon-2010 - Athens, Greece Security Others Risk Network Penetration
“The Real Value Of Penetration Testing For The Enterprise” Notis Iliopoulos AthCon-2010 - Athens, Greece Security Others Network Penetration
Got Database Access? Own The Network!” Bernardo Damele A. g AthCon-2010 - Athens, Greece Security Network Penetration Intrusion Prevention
Advanced Mitm Techniques For Security Testers Rajendra Umadas , Aaron Rhodes , Mike Zusman OWASP FROC-2010 - Denver, USA Security Network Penetration
No Holds Barred Penetration Testing Jarrod Loidl Ruxcon-2010 - Melbourne, Austrailia Security Network Penetration Physical Pentesting
Mitigating Attacks With Existing Network Infrastructure Omar Santos CarolinaCon6-2010 - Raleigh, USA Security Infrastructure Network Penetration
Defeating Google'S Human Manual Review Team Rsnake Security B-Sides Austin-2010 - Austin, USA Security Network Penetration Hardware Reverse Engineering
Web App (In)Security On A Tight Budget Jason Jones Security B-Sides Austin-2010 - Austin, USA Web Application Security Exploitation Network Penetration
Layer 2 Hackery Todor Genov ZaCon-1 - Johannesburg, South Africa Security Others Network Penetration
Vulnerability Management Scoring Systems Evert Smith ZaCon-1 - Johannesburg, South Africa Security Infrastructure Network Penetration
Tcp Sorcery Barry Irwin ZaCon-1 - Johannesburg, South Africa Security Infrastructure Network Penetration
Fun With Tcp Packets Andrew Macpherson ZaCon-1 - Johannesburg, South Africa Security Network Penetration
Finding The Hotspots: Web-Security Testing With The Watcher Tool Chris Weber OWASP Appsec-2009 - Washington DC, USA Security Wireless Web Network Penetration
Injectable Exploits: Two New Tools For Pwning Web Apps And Browsers Kevin Johnson OWASP Appsec-2009 - Washington DC, USA Web Exploitation Network Penetration
Javascript From Hell - Advanced Client-Side Injection Techniques Of Tomorrow Mario Heiderich OWASP Appsec-2009 - Germany Security Deep Knowledge Network Penetration SQL
All Your Packets Are Belong To Us - Attacking Backbone Technologies Daniel Mende , Roger Klose BruCON-2009 - Brussels, Belgium Security Network Penetration
Red And Tiger Team Chris Nickerson BruCON-2009 - Brussels, Belgium Mobile Security Security Others Deep Knowledge Application Security Monitoring Social Engineering Reverse Engineering Network Penetration Physical Pentesting
Defending Against Next Generation Attacks Through Network/Endpoint Collaboration And Interaction Spiros Antonatos , Michael E. Locasto , Stelios Sidiroglou , Angelos D. Keromytis , Evangelos P. Markatos EC2ND-2007 - Heraklion, Greece Intrusion Detection Incident Response Network Penetration
Towards High Assurance Networks Of Virtual Machines Daniele Sgandurra , Fabrizio Baiardi EC2ND-2007 - Heraklion, Greece Security Network Penetration
Isi-Lana - A Secure Basic Architecture For Networks Connected To The Internet Thomas Haeberlen EC2ND-2007 - Heraklion, Greece Web Network Penetration