DeepSec 2018 „I like to mov &6974,%bx“
took place Nov. 27, 2018 through Nov. 30, 2018 (6 years, 7 months ago) at an unknown location.
Presentations
Unknown date
-
New Attack Vectors for the Mobile Core Networks
-
Malware Analysis Intro
-
Hunting with OSSEC
-
Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation
-
Opening DeepSec 2018
-
IoD - Internet of Dildos, a Long Way to a Vibrant Future
-
Without a Trace - Cybercrime, Who are the Offenders?
-
Suricata and XDP, Performance with an S like Security
-
SS7 for INFOSEC
-
Offpath Attacks Against PKI
-
Open Source Network Monitoring
-
Everything is connected: how to hack Bank Account using Instagram
-
Information, Threat Intelligence, and Human Factors
-
DNS Exfiltration and Out-of-Band Attacks
-
Global Deep Scans - Measuring Vulnerability Levels across Organizations, Industries, and Countries
-
Manipulating Human Memory for Fun and Profit
-
Mapping and Tracking WiFi Networks / Devices without Being Connected
-
Fundamentals of Routing and Switching for Blue and Red Team
-
Advanced Infrastructure Hacking
-
Keynote: We're All Gonna Die
-
Moving Money: Inside the Global Watchlist for Banking across Borders
-
The Swift Language from a Reverse Engineering Perspective
-
How Android's UI Security is Undermined by Accessibility
-
RFID Chip Inside the Body: Reflecting the Current State of Usage, Triggers, and Ethical Issues
-
Drones, the New Threat from the Sky
-
Leveraging Endpoints to Boost Incident Response Capabilities
-
Attacking Internet of Things with Software Defined Radio
-
Mobile App Attack 2.0 (closed)
-
Advanced Penetration Testing in the Real World
-
ERP Security: Assess, Exploit and Defend SAP Platforms
-
Keynote: Automatic Exploitation - The DARPA Cyber Grand Challenge, what came after, and what is next
-
Library and Function Identification by Optimized Pattern Matching on Compressed Databases
-
Security Response Survival Skills
-
Attacks on Mobile Operators
-
A Tour of Office 365, Azure & SharePoint, through the Eyes of a Bug Hunter
-
Discussion: Mobile Network Security
-
Anomaly Detection of Host Roles in Computer Networks
-
Defense Informs Offense Improves Defense: How to Compromise an ICS Network and How to Defend It
-
Security Risks in Cellular Networks: Phone, RAN, and Core (closed)
-
Uncovering Vulnerabilities in Secure Coding Guidelines
-
Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests
-
Efail and other Failures with Encryption and E-Mail
-
Kernel-Assisted Debugging of Linux Applications
-
Injecting Security Controls into Software Applications
-
Blinding the Watchers: The Growing Tension between Privacy Concerns and Information Security
-
How to Communicate about IT Security without Getting the Cybers
-
Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering
-
Project Introduction: Data over Sound - Risks and Chances of an emerging Communication Channel
-
Building your Own WAF as a Service and Forgetting about False Positives
-
Pure In-Memory (Shell)Code Injection in Linux Userland
-
Orchestrating Security Tools with AWS Step Functions
-
Security as a Community Healthcare: Helping Small Non-Profit Organisations Stay Secure
-
Can not See the Wood for the Trees - Too Many Security Standards for Automation Industry