naopod.com.br
i sh0t the sheriff : O podcast de segurança da informação do Brasil
http://www.naopod.com.br/2012_10_01_archive.html
I sh0t the sheriff. O podcast de segurança da informação do Brasil luiz eduardo nelson murilo willian caprino. Edição 80 - 28.10.2012. Your browser does not support this audio. Protótipo do Nexus 4 perdido em um bar. Problemas de implementação do DKIM. Baixe o mp3 diretamente daqui. Compartilhar com o Pinterest. Assinar: Postagens ( Atom ). Edição 80 - 28.10.2012. Imagens de modelo por suprun.
greatscottgadgets.com
Great Scott Gadgets - Multiplexed Wired Attack Surfaces
http://www.greatscottgadgets.com/infiltrate2013
Throwing Star LAN Tap. Multiplexed Wired Attack Surfaces. Multiplexed Wired Attack Surfaces. Michael Ossmann and Kyle Osborn presented. This was a preview of our talk. Multiplexed Wired Attack Surfaces. Presented at Black Hat USA 2013. Black Hat/ToorCon presentation slides. Hardware designs for gflpc1343 (aka GreatFET) and TOAD. We configured it for 5 V, but not all phones are 5 V compatible.). Micro-USB plug breakout board. Galaxy S2 Hack Pack. Including FSA9280A data sheet. 5 V power supply.
n0where.org
n0where.org - Talks/Presentations
https://n0where.org/talks.html
TEAM JOCH 2.0 presents Android Hacking Basics. Back to the Kitchen: DLP Security Bakeoff, THE SEQUEL. Presented with Kelly Lum). API = Auth Poorly Implemented. OWASP AppSec California 2015. The Internet of Fails: Where IoT Has Gone Wrong and How We’re Making It Right. Presented with Mark Stanislav). Stay Out Of The Kitchen: A DLP Security Bake-off. Presented with Kelly Lum). The Internet of Things: We've Got To Chat. Presented with Mark Stanislav). Security B-Sides San Francisco 2014.
cybersecpolitics.blogspot.com
CyberSecPolitics: The Wierding Way
https://cybersecpolitics.blogspot.com/2016/12/the-wierding-way.html
Tuesday, December 20, 2016. You don't have to believe I know anything about cyber combat or science fiction, but if you read this blog, and haven't read Dune, you're missing out on the philosophy behind how cyber offense works. I want to teach the whole Policy World about the Weirding Way. I know that no policy lawyer can read Bratus's paper. On Weird Machines. I also know that even Halvar's INFILTRATE keynote. On the subject is probably too technical. The reason Scrippie is a better exploit writer than ...
naopod.com.br
i sh0t the sheriff : O podcast de segurança da informação do Brasil
http://www.naopod.com.br/2013_12_01_archive.html
I sh0t the sheriff. O podcast de segurança da informação do Brasil luiz eduardo nelson murilo willian caprino. Edição 81 - 01.12.2013. BayThreat http:/ baythreat.org. BlueHat http:/ technet.microsoft.com/en-us/security/dn456542. 30c3 http:/ www.ccc.de/en/. Shmoocon http:/ www.shmoocon.com. Infiltrate www.infiltratecon.com. Keynote http:/ infiltratecon.com/watt.html. You shot the sheriff www.ysts.org. Baixe o mp3 diretamente daqui. Compartilhar com o Pinterest. Assinar: Postagens ( Atom ).
tindertipsforgirls.blogspot.com
Tinder Tips for Girls: October 2015
https://tindertipsforgirls.blogspot.com/2015_10_01_archive.html
Tinder Tips for Girls. Friday, October 16, 2015. NYC is about extremes. This is one of those ones where if you match you are going to have to start off being super romantic. Air Hockey is always a winner. How can I spice this Tinder profile up? This next picture was poignant in a way that Tinder rarely is. I wonder if guys right swipe on really sad pictures". Tuesday, October 6, 2015. I'm not sure what girls want to see, but I've been posting some amazing shots of my pet turtle. Thursday, October 1, 2015.
securitybydefault.com
Enlaces de la SECmana - 287 ~ Security By Default
http://www.securitybydefault.com/2015/08/enlaces-de-la-secmana-287.html
Enlaces de la SECmana - 287. Autor: José A. Guasch. 02 agosto 2015 [ 9:53 ]. Disponibles los videos del congreso Infiltrate 2015. Celebrado en Miami. Además se han anunciado ya las fechas para la próxima edición de 2016: 7 y 8 de Abril. Es un framework para realizar ataques de Man-In-The-Middle modular, portable y fácilmente ampliable. Actualmente se encuentra en la versión 1.1.3. Entrevista a Hugo Teso en CIGTR. Tras finalizar las votaciones, disponible el conjunto total de charlas para la HITBGSEC.
2014.nuitduhack.com
Challenges | www.nuitduhack.com
http://2014.nuitduhack.com/challenges-nuit-du-hack%20.html
Challenges www.nuitduhack.com Nuit du Hack 2 0 1 4 - Fnord Edition. Plus d'information sur le CTF et le wargame à venir, restez à l'écoute via Twitter hashtag #ndh2k14! Lors de la nuit du hack un programme de bug bounty sur la société Qwant sera dévoilé lors de l'ouverture de la nuit du hack. Ce programme sera réservé uniquement aux participants de la nuit du hack et durant la nuit du hack. Un portefeuille de 5000 euros (ainsi que des bounty! Les lots seront les suivants:. Quals et Capture The Flag.