- Présentations
- Documents
- Infographies
CQURE_BHAsia19_Paula_Januszkiewicz_slides
ZuzannaKornecka
•
il y a 5 ans
How MITRE ATT&CK helps security operations
Sergey Soldatov
•
il y a 5 ans
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
il y a 8 ans
Getting root with benign app store apps
Csaba Fitzl
•
il y a 5 ans
Derbycon - The Unintended Risks of Trusting Active Directory
Will Schroeder
•
il y a 5 ans
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Directory
DirkjanMollema
•
il y a 5 ans
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
•
il y a 5 ans
black hat deephish
Alejandro Correa Bahnsen, PhD
•
il y a 5 ans
I Have the Power(View)
Will Schroeder
•
il y a 8 ans
App-o-Lockalypse now!
Oddvar Moe
•
il y a 5 ans
#Lolbins - Nothing to LOL about!
Oddvar Moe
•
il y a 5 ans
Beyond XP_CMDSHELL: Owning the Empire Through SQL Server
NetSPI
•
il y a 5 ans
Beyond xp_cmdshell: Owning the Empire through SQL Server
Scott Sutherland
•
il y a 6 ans
Continuous intrusion: Why CI tools are an attacker’s best friends
Nikhil Mittal
•
il y a 8 ans
Red Team Revenge - Attacking Microsoft ATA
Nikhil Mittal
•
il y a 6 ans
Prepare Yourself to Become Infosec Professional
M.Syarifudin, ST, OSCP, OSWP
•
il y a 7 ans
Building an Empire with PowerShell
Will Schroeder
•
il y a 8 ans
Hacking Microsoft Remote Desktop Services for Fun and Profit
Alisa Esage Шевченко
•
il y a 12 ans
NotaCon 2011 - Networking for Pentesters
Rob Fuller
•
il y a 10 ans
Hadoop Security
Timothy Spann
•
il y a 8 ans