Penetration Testing Considered Harmful, Haroon Meer - 44CON 2011
Main 44con channel | 0 views | 2019-07-15
44CON 2011 Technical Track, Haroon Meer of thinkst presentation tittled Penetration Testing Considered Harmful.
44CON 2011 Technical Track, Haroon Meer of thinkst presentation tittled Penetration Testing Considered Harmful.
44CON 2011 Technical Track, Alex Plaskett of MWR presentation tittled Windows Pwn 7 OEM - Owned Every Mobile?.
44CON 2011 Technical Track, Philip Polstra presentation tittled USB Flash Drive Forensics.
44CON 2011 Technical Track, Ian De Villiers of SensePost presentation tittled Systems Applications Proxy Pwnage.
44CON 2011 Business Track presentation by Steve Armstrong, titled Communicating with the Boss - don't talk S, it's BS that the C's understand Or how to talk to your Executives.
Unbiased Review of Trusteer Rapport, Neil Kettle at 44CON London September 2011.
In this video, we are explaining and showing how you can create dynamic and automatic custom certificates for all your students in Moodle thanks to the custom certificate plugin.
In this video, we are explaining how to design a certificate in Inkscape or at least what are the main elements composing it. A useful video for people who never heard about Inkscape and who are coming from GIMP.
In this video, we are explaining how to create a theme / template for the brand image of your company / organization in Matomo. We are tackling several things in this video: the title of the website, the icon, the favicon, the colours and the fonts.
If you are wondering how a search engine decide to rank your results, this video is for you. In this video we are explaining how search engines are ranking the results of a website thanks to some criterias. We are taking here the example of YaCy, ...
In this video, we are briefly showing what is Matomo Analytics and how it differ from other analytics proprietary solutions.
In this video, we are briefly introducing the YaCy Open Source search engine.
This video explains briefly what is pĥpList and what are its advantages over emailing and newsletter proprietary technologies.
A brief introduction to Revive showing quickly the reasons why this ad server solution may be valuable compared to proprietary solutions.
In this video, we are explaining how you can easily integrate some ads from Revive Open Source Ad Server in order to integrate them within the YaCy search engine results page. This example will help you understand how search engine advertising is ...
When you play with Revive you are often suprise to see that your ads are not shown as expected. That's typically the case when you are using delivery options. In this video we are explaining how is it possible and how you can fix this by cleaning ...
In this video, we are showing how you can create and publish your own ad with the Revive ad server network. You will need to go through all those different steps: 1 - Create an advertiser. 2 - Add a campaign. 3 - Add a banner. 4 - Add a websit...
Experiments with tokio’s lines() function, fold(), and a custom multi-stage future with inner futures and the try_ready macro. With this episode, we are now up to four sub-optimal ways to count the number of lines in a file.
In this video, we are showing how you can easily add RSS feeds to your dashboard in Matomo / Piwik Analytics in order to know what your competitors are doing in terms of content. This technique is simple to use and will require only a couple of ch...
Companies nowadays are choosing between on-premise, cloud and hybrid deployment models. The common factor across all of these scenarios is the underlying platform, used in the background to run all on-premise and cloud-based applications developed...
Presented By Kevin O’Reilly Within the fields of malware research and threat intelligence, one of the biggest challenges faced by the security industry is the significant time and skill required to reverse engineer new malware samples. This has l...
That cyber-crime has driven the rise of malware during the last decade is not in doubt; how large that increase has been most certainly is. This measurement has, I would argue, been more speculative than evidential. The problem being that attempts...
This talk aims to provide the fundamental architectural knowledge and resources for a security research interested in misuse of the x86 platform to conduct their own research with less “boiler-plate”. Covering the privileges and architectural even...
“A good exploit is one that is delivered with style”. Stegosploit creates a new way to encode “drive-by” browser exploits and deliver them through image files. These payloads are undetectable using current means. This paper discusses two broad un...