Quantcast
Channel: Cupfighter.net » Confidence
Browsing all 15 articles
Browse latest View live

Confidence 2009.02 – Fusing 3rd party threat feeds to obtain better threat...

Eddie started with a good overview of why feeds are available from D-Shield to Bluetack and U.S Department of Treasury and the properties of them, good/bad and why. The he showed us how you can...

View Article



Confidence 2009.02 – Router Exploitation – Felix “FX” Lindner

Unlike the last time I was actually on time for Felix’ talk. Due to last nights activity I was surprised that he was on time himself. Again his slides included the Blackhat-O-Meter. The first part of...

View Article

Seccubus the new name for AutoNessus

Since it became apparent that the next version of AutoNessus was going to outgrow the reference to Nessus, Tennable’s Network Security Scanner, due to the inclusion of other scanners such as OpenVAS,...

View Article

Confidence 2009.02 – My Seccubus slide deck

Here are the slides of my presentation. Slide deck “Seccubus Confidence 2009.02 v0.1″

View Article

Confidence 2009.02 – My TLS renegotiation vulnerability slides

Today I presented about the TLS regenotiation vulnerability I blogged about earlier. You can download the slides below: TLS renegotiation authentication GAP v1.1 pdf TLS renegotiation authentication...

View Article


Confidence 2009.02 – Mifare Classic anaysis – Pavol Luptak

Pavol started by showing the cards he cracked that same day at the conference. Two Polish public transport cards, one Slovacian public transport card and, by coincidence, a Dutch Public Transport Card....

View Article

Confidence 2009.02 – Power Hungy People – Nick DePetrillo

Subtitle of the talk: Making sense of new critical infrastructure threats The talk is about the “Smart Grid”. The key components are and advanced metering infrastructure, Transmission and distribution...

View Article

Confidence 2009.02 – The Tor Project – Jacob Appelbaum

The Tor project is a non-profit organization that has a full documented network that provides anonymity and privacy by design and is fully documented. Tor is funded by both the US DoD, EFF, Voice of...

View Article


Confidence 2009.02 – Underground economy – Raoul Chiesa

Subtitle: Why we should be fully-updated on this topic: InfoSec players, Finance world, citizens Raoul is a member of UNICRI (http://www.unicri.it/), a United Nations crime and justice research...

View Article


Image may be NSFW.
Clik here to view.

Confidence2010: Anonymity, Privacy, and Circumvention with Tor in the Real World

By Jacob Applebaum (@ioerror) Jacob had to start his talk without slides due to technical difficulties, but he did alright. First off he talks about some treats against our privacy. Political plans for...

View Article

Confidence 2010: Security Sucks

By Eddie Schwartz  (@eddieschwartz and LinkedIn) Security today is sold by three may motivations. FUD: Fear, Uncertainty and Doubt. Security sucks because there are certain factors that you cannot do...

View Article

Image may be NSFW.
Clik here to view.

Confidence 2010: Well known vulnerabilities in human brain and behavior –...

By Wojciech Bojdol Wojciech started his talk by explaining the basic principles of social engineering. The his talk highlights three bugs in human behaviour Bug #1: We want to trust the world We are...

View Article

Confidence 2010: The Four Horsemen – Malware for mobile

By Axelle Apvrille Axelle talk discusses four examples of mobile malware iPhoneOS/Eeki.B Symbian/Yxes WinCE/Redoc Jaa/GameSat While mallware for mobile phones is far less nuomerous then malware for...

View Article


Mobile attacks and preventions – how security will change the mobile market

By Tam Hanna I had the opportunity to meet Tam at SigInt earlier, so I simply had to attend his talk at Confidence. The security of mobile systems is often weak because users are not willing to accept...

View Article

Image may be NSFW.
Clik here to view.

Confidence 2010: Microsoft Patch Analysis – Patch Tuesday – Exploit Wednessday

By Yaniv Miron lolcat adaptation #3, a Creative Commons Attribution No-Derivative-Works (2.0) image from kevinsteele’s photostream Exploit wednessday ois the day after patch Tuesday, the second Tuesday...

View Article

Browsing all 15 articles
Browse latest View live




Latest Images