Home
Explore
Submit Search
Upload
Login
Signup
Advertisement
Check these out next
Hping Kullanarak TCP/IP Paketleriyle Oynama
BGA Cyber Security
z/OS Encryption Readiness Technology (zERT)
zOSCommserver
What Shazam doesn't want you to know
Roy van Rijn
IMS Registration Flow
Kent Loh
Configurar firewall de windows para permitir el acceso a sql server
Jesus Garcia Guevara
IMS Authentication with AKAv1 and AKAv2
mohammad norozzudegan
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
La nueva FOCA 2.7
Eventos Creativos
1
of
43
Top clipped slide
Defcon 18: FOCA 2
Aug. 1, 2010
•
0 likes
11 likes
×
Be the first to like this
Show More
•
14,082 views
views
×
Total views
0
On Slideshare
0
From embeds
0
Number of embeds
0
Download Now
Download to read offline
Report
Slides used by Jose Palazon PALAKO and Chema Alonso to present FOCA 2 in Defcon 18
Chema Alonso
Follow
Security Professional
Advertisement
Advertisement
Advertisement
Recommended
Hacking SIP Like a Boss!
Fatih Ozavci
22K views
•
35 slides
Windows 7 forensics event logs-dtl-r3
CTIN
7.8K views
•
49 slides
OSINT: analisi dei metadati ed acquisizione da fonti aperte con FOCA e Shodan
Danilo De Rogatis
8.4K views
•
28 slides
Ble android
kudo1048
10.3K views
•
28 slides
Manual de cobol
CARLOS VILLARROEL PALOMINO
676 views
•
68 slides
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
guest66dc5f
993 views
•
44 slides
More Related Content
Slideshows for you
(7)
Hping Kullanarak TCP/IP Paketleriyle Oynama
BGA Cyber Security
•
30.1K views
z/OS Encryption Readiness Technology (zERT)
zOSCommserver
•
2.7K views
What Shazam doesn't want you to know
Roy van Rijn
•
13.6K views
IMS Registration Flow
Kent Loh
•
22.7K views
Configurar firewall de windows para permitir el acceso a sql server
Jesus Garcia Guevara
•
2K views
IMS Authentication with AKAv1 and AKAv2
mohammad norozzudegan
•
522 views
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
•
41K views
Similar to Defcon 18: FOCA 2
(20)
La nueva FOCA 2.7
Eventos Creativos
•
830 views
Pentesting drivenbyfoca slides
BIT Technologies
•
840 views
Foca training hackcon6
Chema Alonso
•
3.6K views
FOCA 2.5.5 Training
Chema Alonso
•
3.3K views
4055-841_Project_ShailendraSadh
Shailendra Sadh - CISSP
•
331 views
HoneyNet SOTM 32 - Windows Malware Analysis
Chetan Ganatra
•
34 views
Extreme Scripting July 2009
Ian Foster
•
451 views
Penetration Testing Boot CAMP
Shaikh Jamal Uddin l CISM, QRadar, Hack Card Recovery Expert
•
1.1K views
Introduction P2p
Davide Carboni
•
935 views
IIIF & Digital Humanities
Jean-Philippe Moreux
•
24 views
Who pulls the strings?
Ronny
•
1.6K views
PRESENTATION of CEH Tools.pptx
AadityaSaxena12
•
24 views
Hackerworkshop exercises
Henrik Kramshøj
•
240 views
FAIR Projector Builder
Mark Wilkinson
•
512 views
Datasets and tools_from_ncbi_and_elsewhere_for_microbiome_research_v_62817
Ben Busby
•
184 views
Open Security Operations Center - OpenSOC
Sheetal Dolas
•
4.6K views
Apache Spark Workshop, Apr. 2016, Euangelos Linardos
Euangelos Linardos
•
403 views
Eedc.apache.pig last
Francesc Lordan Gomis
•
514 views
2015 moloch recipes
Geoffrey Crespin
•
356 views
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk
•
2.1K views
Advertisement
More from Chema Alonso
(20)
CyberCamp 2015: Low Hanging Fruit
Chema Alonso
•
42K views
Índice Pentesting con Kali 2.0
Chema Alonso
•
48.2K views
Configurar y utilizar Latch en Magento
Chema Alonso
•
16K views
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Chema Alonso
•
3.5K views
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Chema Alonso
•
19.9K views
CritoReto 4: Buscando una aguja en un pajar
Chema Alonso
•
16K views
Dorking & Pentesting with Tacyt
Chema Alonso
•
10.7K views
Pentesting con PowerShell: Libro de 0xWord
Chema Alonso
•
23.5K views
Foca API v0.1
Chema Alonso
•
2.2K views
Recuperar dispositivos de sonido en Windows Vista y Windows 7
Chema Alonso
•
35.1K views
It's a Kind of Magic
Chema Alonso
•
2K views
Ingenieros y hackers
Chema Alonso
•
17.4K views
Cuarta Edición del Curso Online de Especialización en Seguridad Informática p...
Chema Alonso
•
14.3K views
Auditoría de TrueCrypt: Informe final fase II
Chema Alonso
•
26.4K views
El juego es el mismo
Chema Alonso
•
2.3K views
El Hardware en Apple ¿Es tan bueno?
Chema Alonso
•
8.1K views
Latch en Linux (Ubuntu): El cerrojo digital
Chema Alonso
•
33K views
Hacking con Python
Chema Alonso
•
46.4K views
Shuabang Botnet
Chema Alonso
•
37.5K views
Tu iPhone es tan (in)seguro como tu Windows
Chema Alonso
•
24.2K views
Defcon 18: FOCA 2
FOCA 2.5 Chema
Alonso José Palazón «PALAKO»
What our FOCA
is not
What our FOCA
is not
What’s a FOCA?
FOCA on Linux?
Previously on FOCA….
FOCA 0.X
What can be
found?
Pictures with GPS
info..
Demo: Single files
Sample: mda.mil Total:
1075 files
Sample: FBI.gov Total:
4841 files
DNS Prediction
Google Sets
Prediction
Sample: Printer info
found in odf files returned by Google
Demo: Whitehouse.gov
Yes, we can!
FOCA 2.0
FOCA 2.5: Exalead
PTR Scannig
Bing IP
FOCA 2.5 &
Shodan
FOCA 2.5 URL
Analysis
FOCA 2.5 URL
Analysis
Demo: Whitehouse.gov
Yes, we can!
DNS Cache Snooping
FOCA Reporting Module
FOCA Reporting Module
Demo: DNS Cache
Snooping
FOCA Online http://www.informatica64.com/FOCA
IIS MetaShield Protector
http://www.metashieldprotector.com
… and
Tomorrow here at 19:00
Demo: US
Army
Advertisement