Confidence 2009.02 – Fusing 3rd party threat feeds to obtain better threat...
Eddie started with a good overview of why feeds are available from D-Shield to Bluetack and U.S Department of Treasury and the properties of them, good/bad and why. The he showed us how you can...
View ArticleConfidence 2009.02 – Router Exploitation – Felix “FX” Lindner
Unlike the last time I was actually on time for Felix’ talk. Due to last nights activity I was surprised that he was on time himself. Again his slides included the Blackhat-O-Meter. The first part of...
View ArticleSeccubus the new name for AutoNessus
Since it became apparent that the next version of AutoNessus was going to outgrow the reference to Nessus, Tennable’s Network Security Scanner, due to the inclusion of other scanners such as OpenVAS,...
View ArticleConfidence 2009.02 – My Seccubus slide deck
Here are the slides of my presentation. Slide deck “Seccubus Confidence 2009.02 v0.1″
View ArticleConfidence 2009.02 – My TLS renegotiation vulnerability slides
Today I presented about the TLS regenotiation vulnerability I blogged about earlier. You can download the slides below: TLS renegotiation authentication GAP v1.1 pdf TLS renegotiation authentication...
View ArticleConfidence 2009.02 – Mifare Classic anaysis – Pavol Luptak
Pavol started by showing the cards he cracked that same day at the conference. Two Polish public transport cards, one Slovacian public transport card and, by coincidence, a Dutch Public Transport Card....
View ArticleConfidence 2009.02 – Power Hungy People – Nick DePetrillo
Subtitle of the talk: Making sense of new critical infrastructure threats The talk is about the “Smart Grid”. The key components are and advanced metering infrastructure, Transmission and distribution...
View ArticleConfidence 2009.02 – The Tor Project – Jacob Appelbaum
The Tor project is a non-profit organization that has a full documented network that provides anonymity and privacy by design and is fully documented. Tor is funded by both the US DoD, EFF, Voice of...
View ArticleConfidence 2009.02 – Underground economy – Raoul Chiesa
Subtitle: Why we should be fully-updated on this topic: InfoSec players, Finance world, citizens Raoul is a member of UNICRI (http://www.unicri.it/), a United Nations crime and justice research...
View ArticleConfidence2010: Anonymity, Privacy, and Circumvention with Tor in the Real World
By Jacob Applebaum (@ioerror) Jacob had to start his talk without slides due to technical difficulties, but he did alright. First off he talks about some treats against our privacy. Political plans for...
View ArticleConfidence 2010: Security Sucks
By Eddie Schwartz (@eddieschwartz and LinkedIn) Security today is sold by three may motivations. FUD: Fear, Uncertainty and Doubt. Security sucks because there are certain factors that you cannot do...
View ArticleConfidence 2010: Well known vulnerabilities in human brain and behavior –...
By Wojciech Bojdol Wojciech started his talk by explaining the basic principles of social engineering. The his talk highlights three bugs in human behaviour Bug #1: We want to trust the world We are...
View ArticleConfidence 2010: The Four Horsemen – Malware for mobile
By Axelle Apvrille Axelle talk discusses four examples of mobile malware iPhoneOS/Eeki.B Symbian/Yxes WinCE/Redoc Jaa/GameSat While mallware for mobile phones is far less nuomerous then malware for...
View ArticleMobile attacks and preventions – how security will change the mobile market
By Tam Hanna I had the opportunity to meet Tam at SigInt earlier, so I simply had to attend his talk at Confidence. The security of mobile systems is often weak because users are not willing to accept...
View ArticleConfidence 2010: Microsoft Patch Analysis – Patch Tuesday – Exploit Wednessday
By Yaniv Miron lolcat adaptation #3, a Creative Commons Attribution No-Derivative-Works (2.0) image from kevinsteele’s photostream Exploit wednessday ois the day after patch Tuesday, the second Tuesday...
View Article
More Pages to Explore .....