Modern Post-Exploitation Strategies
Main 44con channel | 11 views | 2019-08-06
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012 in London.
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012 in London.
Speakers: Juergen Pabel Everything to hide This is not a hacking presentation, no vulnerabilities are presented. It's a crash-course in full-disk-encryption ("FDE") concepts, products and implementation aspects. An overview of both commercia...
Building an anonymous Internet within the Internet OnionCat manages to build a complete IP transparent VPN based on Tor's hidden services, provides a simple well-known interface and has the potential to create an anonymous global network which ...
Hacking And Forensics On The Go. Phil Polstra at 44CON 2012.
Software Security Austerity - Software Security Debt In Modern Software Development. Ollie Whitehouse at 44CON 2012 in London.
Surveillance Cameras: The Real-World Has Them Everywhere, Why Not The Computer? Michael Viscuso at 44CON 2012 in London.
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012 in London.
Robert Weiss & Ben Gatti present the Cryptanalysis Of The Enigma Machine at 44CON 2012 in London.
I'm The Butcher, Would You Like Some Beef? Thomas Mackenzie & Michele Orru at 44CON 2012 in London
Securing The Internet: You're Doing It Wrong (An Infosec Intervention) presented by Jayson E Street at 44CON 2012 in London. 44CON will return in 2013, subscribe to our announcements mailing list at http://eepurl.com/f4PUX for more information ...
An Idiot Abroad. Don A. Bailey at 44CON 2012 in London. 44CON will return in 2013, subscribe to our announcements mailing list at http://eepurl.com/f4PUX for more information on the event as it is released. You can also purchase the 44CON ...
Terrorism, Tracking, Privacy And Human Interactions. Daniel Cuthbert and Glenn Wilkinson, SensePost at 4CON 2012 in London. 44CON will return in 2013, subscribe to our announcements mailing list at http://eepurl.com/f4PUX for more information o...
Snippet from a video from the Chinnyvision YouTube channel played inside an ANSI terminal! Auto converted with my latest project.
44CON 2011 Technical Track, Haroon Meer of thinkst presentation tittled Penetration Testing Considered Harmful.
44CON 2011 Technical Track, Alex Plaskett of MWR presentation tittled Windows Pwn 7 OEM - Owned Every Mobile?.
44CON 2011 Technical Track, Philip Polstra presentation tittled USB Flash Drive Forensics.
44CON 2011 Technical Track, Ian De Villiers of SensePost presentation tittled Systems Applications Proxy Pwnage.
44CON 2011 Business Track presentation by Steve Armstrong, titled Communicating with the Boss - don't talk S, it's BS that the C's understand Or how to talk to your Executives.
Unbiased Review of Trusteer Rapport, Neil Kettle at 44CON London September 2011.
Companies nowadays are choosing between on-premise, cloud and hybrid deployment models. The common factor across all of these scenarios is the underlying platform, used in the background to run all on-premise and cloud-based applications developed...
Presented By Kevin O’Reilly Within the fields of malware research and threat intelligence, one of the biggest challenges faced by the security industry is the significant time and skill required to reverse engineer new malware samples. This has l...
That cyber-crime has driven the rise of malware during the last decade is not in doubt; how large that increase has been most certainly is. This measurement has, I would argue, been more speculative than evidential. The problem being that attempts...
This talk aims to provide the fundamental architectural knowledge and resources for a security research interested in misuse of the x86 platform to conduct their own research with less “boiler-plate”. Covering the privileges and architectural even...
“A good exploit is one that is delivered with style”. Stegosploit creates a new way to encode “drive-by” browser exploits and deliver them through image files. These payloads are undetectable using current means. This paper discusses two broad un...