1 |
 |
Xss In Skype For Ios |
12 years, 2 months |
Netinfinity |
skype, XSS, attack, hacking, server, shell, base64, phonebook, Iphone, apple |
5198 |
1 |
2 |
 |
Android Vulnerabilities |
12 years, 2 months |
Netinfinity |
android, smartphone, root, vulnerability, device, exploit, mobile security |
7105 |
3 |
3 |
 |
Beast Vs Https |
12 years, 2 months |
Netinfinity |
https, encryption, cracking, beast, security, SSL |
9347 |
4 |
4 |
 |
Wifi Jamming Via Deauthentication Packets |
12 years, 2 months |
Netinfinity |
WIFI, Jammer, deauthentication, packet, security |
7525 |
2 |
5 |
 |
Welcome To Derbycon 2011 – Introduction |
12 years, 2 months |
Netinfinity |
DerbyCon, conference, security, speaker |
4172 |
None |
6 |
 |
Hackers For Charity Update Derbycon 2011 |
12 years, 2 months |
Netinfinity |
Hackers for Charity, hackers, conference, update, security, charity |
4607 |
None |
7 |
 |
Acoustic Intrusions - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
acoustic, intrusion, phones, hacking, hotel, HD Moore, security, analysis |
4677 |
None |
8 |
 |
Adaptive Penetration Testing - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
penetration testing, security, controls, unauthorized, access |
5823 |
3 |
9 |
 |
The Penetration Testing Execution Standard (Ptes) Panel - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
penetration testing, standard, derbycon 2011, security, execution |
5002 |
2 |
10 |
 |
The Details Don’T Matter - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
IT, security, derbycon 2011, business, community, firewall |
4128 |
None |
11 |
 |
Compliance: An Assault On Reason - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, compilance, PCI, HIPPA, SOX, ISO, FISMA, GLBA, audit, assessments, code, review, security, testing, application |
5093 |
None |
12 |
 |
Hook, Line And Syncer: The Liar For Hire’S Ultimate Tacklebox - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, presentation, exploration, tools, social engineering, security |
4136 |
None |
13 |
 |
Jason Scott’S Shareware Calvacade - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, shareware, data, software, security, hacking, discs |
4068 |
None |
14 |
 |
Atlas – Sploit Me If You Can - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, programming, reversing, randomization, vftsable, security |
4491 |
None |
15 |
 |
Mining Sensitive Information From Images Using Command-Line Ocr - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, command-line, OCR, programming, tools, security, strings |
4523 |
None |
16 |
 |
Beat To 1337: Creating A Successful University Cyber Defense Organization - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, information, security, knowledge, technical, organization, students, competitions |
4625 |
1 |
17 |
 |
Paul Asadoorian And John Strand:Offensive Countermeasures: Still Trying To Bring Sexy Back - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, offensive, security, countermeasures, attacker, hacking, penetration testers, box |
4429 |
None |
18 |
 |
When Fuzzers Miss: The No Hanging Fruit - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, fuzzing, vulnerablity, discovery, memory, security, code fuzzers |
4377 |
None |
19 |
 |
You’Re Going To Need A Bigger Shovel: A Critical Look At Software Security Assurance - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, OWASP, software, security, organization, strategy |
3815 |
None |
20 |
 |
Osint Beyond The Basics - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, OSINT, community, infosec, security, networks, storage, information |
5293 |
1 |
21 |
 |
Anti-Forensics For The Louise - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, security, anti-forensic, techniques, forensic, hacking |
5217 |
None |
22 |
 |
Tomorrow You Can Patch That 0day: But Your Users Will Still Get You P0wn3d - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, patch, 0day, vulnerability, networks, corporations, research, linux, debian |
4499 |
None |
23 |
 |
Data Mining For (Neuro) Hackers - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, hackers, data, mining, track, security, collect, biomining |
4884 |
None |
24 |
 |
Win32 Exploit Development With Mona And The Metasploit Framework - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
mona, exploit, development |
4824 |
None |
25 |
 |
Collecting Underpants To Win Your Network - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, packets, network, security, sniffing, metasploit, traffic, information, hacking |
4324 |
1 |
26 |
 |
Infectious Media – Bypassing Autorun Once And For All - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, bypass, autorun, hasking, binaries, windows, hex, conversion, execute, emulation, kexboard, drivers |
4065 |
None |
27 |
 |
Desktop Betrayal: Exploiting Clients Through The Features They Demand - Derbycon 2011 |
12 years, 2 months |
Netinfinity |
derbycon 2011, javascript, HTML5, pdf, files, firefox, BeFF, metasploit, attack, hacking, security |
5209 |
None |