Systems Applications Proxy Pwnage, Ian De Villiers - 44CON 2011
Main 44con channel | 0 views | 2019-07-15
44CON 2011 Technical Track, Ian De Villiers of SensePost presentation tittled Systems Applications Proxy Pwnage.
44CON 2011 Technical Track, Ian De Villiers of SensePost presentation tittled Systems Applications Proxy Pwnage.
44CON 2011 Business Track presentation by Steve Armstrong, titled Communicating with the Boss - don't talk S, it's BS that the C's understand Or how to talk to your Executives.
Unbiased Review of Trusteer Rapport, Neil Kettle at 44CON London September 2011.
Companies nowadays are choosing between on-premise, cloud and hybrid deployment models. The common factor across all of these scenarios is the underlying platform, used in the background to run all on-premise and cloud-based applications developed...
“A good exploit is one that is delivered with style”. Stegosploit creates a new way to encode “drive-by” browser exploits and deliver them through image files. These payloads are undetectable using current means. This paper discusses two broad un...
Presented By Kevin O’Reilly Within the fields of malware research and threat intelligence, one of the biggest challenges faced by the security industry is the significant time and skill required to reverse engineer new malware samples. This has l...
That cyber-crime has driven the rise of malware during the last decade is not in doubt; how large that increase has been most certainly is. This measurement has, I would argue, been more speculative than evidential. The problem being that attempts...
This talk aims to provide the fundamental architectural knowledge and resources for a security research interested in misuse of the x86 platform to conduct their own research with less “boiler-plate”. Covering the privileges and architectural even...
In the face of clear & present threats to Body, Mind & Soul from our accelerating adoption of technology into our society it is clear: The Cavalry Isn’t Coming… it falls to us… the willing & able… and we have to try to have impact. Over the past y...
Antivirus software is a common component of today’s computer systems ranging from home users to corporate and government servers. However, security issues related to the AV software itself are not usually considered when deploying such security so...
There are over 2.9 BILLION subscribers on GSM networks today. How many of these subscribers are susceptible to trivial attacks that can leave phone calls, text messages and web surfing habits accessible to an attacker? This talk intends to discuss...
In the last few years, Android has become the world’s leading smart phone operating system. Unfortunately, the diversity and sheer number of devices in the ecosystem represent a significant challenge to security researchers. Primarily, auditing an...
Let’s take a quick trip across the sea to the halls of Black Hat. What made the training network tick? How was it created, who was attacking the network, and how was it defended? How do you keep the wired training network up and reliable when you ...
Tired of managing countless scripts for automating your Man-In-The-Middle attacks? Have a cool idea for a MITM attack, but don't want to spend hours writing a script from scratch? Tired of bashing your head against the wall trying to figure ...
I have been researching DDoS attacks and mitigation techniques for the past three years and worked with industry leaders on testing their systems, providing them with cutting edge, and even never-seen-before attacks. I was amazed (actually stil...
The use of smart meters and their associated technologies is becoming more widespread as utility providers struggle to deal with ever growing demand and scarcer resources. The European Union has deployed over 46 million smart meters to date, with ...
Separate your IRPs from your IRQLs, people, it’s time to learn about Windows drivers. Turns out they’re not magic. Who knew?
Continuing the topic from yesterdays Live stream. This time I bring you a real world example of what the general public sees us as. I go over this damning video on YouTube that shows us how the public views us in the Web3, crypto currency, socia...
Today I got a little riled up. Not gonna lie, it was a lot. I'm sick & tired of hearing about Hive's on boarding problem when absolutely nobody wants to address the problem. So I blew my top and dropped more than my fair share of F-bombs. So if ba...
I heard about this distro on The Linux Cast's YouTube channel and tried it out. I am in love with this! I have it installed on 2 machines already and been daily driving it both at play & the day job. The only problem I've ran into is a weird bug...
The Hive social media front end Ecency released the best update I've seen in the almost 3 yrs I've been on it. This is outstanding and I check it in this video. Post about this update: https://ecency.com/hive-125125/@ecency/introducing-decks-and...
I gave Ubuntu 23.04 a good try and I like it. IMO it's the best one so far. You dont have to use the snaps if you dont want. Just install Flatpak and boom. Get your work done. The new flutter installer worked like a charm on my machine except for...
A quick tutorial on how to live stream to CastGarden. ***This video was imported from YouTube using CastGardens 'import from url" option.*** CastGarden is Peertube instance that utilizes the Hive-Tube plugin for podcasters and to monetize th...
CastGarden is now on #Lokinet! Lokinet is similar to Tor only it works at the network layer and the result is you can use any browser and many desktop apps anonymously. More about Lokinet - https://lokinet.org/ CastGarden is Peertube inst...