Submit Search
Upload
DefCamp 2011 @Iasi
•
Download as PPT, PDF
•
0 likes
•
677 views
DefCamp
Follow
Technology
Report
Share
Report
Share
1 of 27
Download now
Recommended
DefCamp 2011 - call 2 action
DefCamp 2011 - call 2 action
DefCamp
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
Bitdefender
Atac asupra Sim Toolkit
Atac asupra Sim Toolkit
DefCamp
How does a 0day work? - DefCamp 2012
How does a 0day work? - DefCamp 2012
DefCamp
Detecting and Defending against Advanced Persistent Threats - DefCamp 2012
Detecting and Defending against Advanced Persistent Threats - DefCamp 2012
DefCamp
The importance of logs - DefCamp 2012
The importance of logs - DefCamp 2012
DefCamp
Protejarea calculatoarelor împotriva aplica țiilor malițioase
Protejarea calculatoarelor împotriva aplica țiilor malițioase
National Library of Republic of Moldova
Human brain, friend or foe? - DefCamp 2012
Human brain, friend or foe? - DefCamp 2012
DefCamp
Recommended
DefCamp 2011 - call 2 action
DefCamp 2011 - call 2 action
DefCamp
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
Bitdefender
Atac asupra Sim Toolkit
Atac asupra Sim Toolkit
DefCamp
How does a 0day work? - DefCamp 2012
How does a 0day work? - DefCamp 2012
DefCamp
Detecting and Defending against Advanced Persistent Threats - DefCamp 2012
Detecting and Defending against Advanced Persistent Threats - DefCamp 2012
DefCamp
The importance of logs - DefCamp 2012
The importance of logs - DefCamp 2012
DefCamp
Protejarea calculatoarelor împotriva aplica țiilor malițioase
Protejarea calculatoarelor împotriva aplica țiilor malițioase
National Library of Republic of Moldova
Human brain, friend or foe? - DefCamp 2012
Human brain, friend or foe? - DefCamp 2012
DefCamp
Remote Yacht Hacking
Remote Yacht Hacking
DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
The Charter of Trust
The Charter of Trust
DefCamp
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp
Building application security with 0 money down
Building application security with 0 money down
DefCamp
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
Connect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp
The lions and the watering hole
The lions and the watering hole
DefCamp
More Related Content
More from DefCamp
Remote Yacht Hacking
Remote Yacht Hacking
DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
The Charter of Trust
The Charter of Trust
DefCamp
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp
Building application security with 0 money down
Building application security with 0 money down
DefCamp
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
Connect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp
The lions and the watering hole
The lions and the watering hole
DefCamp
More from DefCamp
(20)
Remote Yacht Hacking
Remote Yacht Hacking
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
The Charter of Trust
The Charter of Trust
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
Building application security with 0 money down
Building application security with 0 money down
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
Connect & Inspire Cyber Security
Connect & Inspire Cyber Security
The lions and the watering hole
The lions and the watering hole
DefCamp 2011 @Iasi
1.
DefCamp 2011 @Iași
Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
2.
DefCamp 2011
@Iași - bine aţi venit!
3.
De ce DefCamp?
4.
Să cercetăm puțin
5.
Domeniul INFOSEC se
bucură de multă pasiune (uită-te în spatele tău)
6.
Cercetare se face
în domeniu descoperă, crează POC-uri, raportează (sau nu?)
7.
Ne confruntam cu
atacuri informatice! /.*/sm
8.
DAR
9.
Nu avem locul
nostru de joacă!
10.
Dar nu e
ilegal?
11.
12.
Așa NU! :(
Surse : Libertatea, EVZ, Google
13.
14.
Unde se prezintă
studii din domeniul INFOSEC?
15.
La ei ...
16.
La noi ...
17.
Dar, totuși...
18.
19.
DefCamp @Iasi 2011
în cifre
20.
21.
Infografic Vaslui Suceava
Neamt Iasi Galati Bucuresti Botosani
22.
23.
24.
Briz, briz...
25.
26.
Questions?
27.
Download now