SlideShare a Scribd company logo
The Less Hacked Path
Samy Kamkar
1
720 HOURS
“In my experience, once data
becomes invisible, something
magical happens: they forget
about security”
- Adam "Major Malfunction" Laurie
Ref: http://adamsblog.aperturelabs.com/2013_03_01_archive.html
TEMPEST
Ref: http://dev.inversepath.com/download/tempest/tempest_2009.pdf
http://samy.pl/magspoof
http://samy.pl/magspoofhttp://samy.pl/magspoof
http://samy.pl/magspoof
Ref: http://www.cs.tau.ac.il/~tromer/acoustic/
Ref: http://newsoffice.mit.edu/2014/algorithm-recovers-speech-from-vibrations-0804
https://www.dropbox.com/s/
2js7jjchvm7uzs7/Screenshot
%202014-11-22%2021.31.55.png?dl=0
Ref: http://www.theguardian.com/technology/2014/nov/21/e-cigarettes-malware-computers
Ref: http://proxclone.com/pdfs/HID_bioCLASS-Enhanced_Security_or_Costly_Placebo.pdf
http://samy.pl/combobreaker
http://samy.pl/combobreaker
http://samy.pl/keysweeper
84http://samy.pl/keysweeper
Ref: http://sdrsharp.com/
Ref: http://ossmann.blogspot.fi/2010/03/16-pocket-spectrum-analyzer.html
Ref: http://dev.inversepath.com/download/tempest/tempest_2009.pdf
Thank you!
You can reach me at:
@SamyKamkar
https://samy.pl

More Related Content

What's hot

Brain drain by Caroline Cordell
Brain drain by Caroline CordellBrain drain by Caroline Cordell
Brain drain by Caroline Cordell
carolinecordell
 
Chlamydia song
Chlamydia songChlamydia song
Chlamydia song
walkermw77
 
Ganceres ppp
Ganceres pppGanceres ppp
Ganceres ppp
Anthony Ganceres
 
jQuery Sparklines
jQuery SparklinesjQuery Sparklines
jQuery Sparklines
JStoikov
 
The Wacom Tablet Gps Presentation.Pptx 4
The Wacom Tablet Gps Presentation.Pptx 4The Wacom Tablet Gps Presentation.Pptx 4
The Wacom Tablet Gps Presentation.Pptx 4
Linda Stevenson
 
Submiter + backlink
Submiter + backlinkSubmiter + backlink
Submiter + backlink
Bustanil BUsha
 
Handshake101
Handshake101Handshake101
Handshake101
Max Karlz
 
Hse sites
Hse sitesHse sites
Don't Just Think There, Make Something
Don't Just Think There, Make SomethingDon't Just Think There, Make Something
Don't Just Think There, Make Something
Leigh Reyes
 
Human cruisecontrol
Human cruisecontrolHuman cruisecontrol
Human cruisecontrol
leirym
 
I時代的工作術
I時代的工作術I時代的工作術
I時代的工作術
Vista Cheng
 
Allie Brock - Making training serious fun
Allie Brock  - Making training serious funAllie Brock  - Making training serious fun
Allie Brock - Making training serious fun
AgileCymru
 
Optical Illusions
Optical IllusionsOptical Illusions
Optical Illusions
teganr4
 
Prototípus-fejlesztés 3D nyomtatással (Balássy György és Takács Péter)
Prototípus-fejlesztés 3D nyomtatással (Balássy György és Takács Péter)Prototípus-fejlesztés 3D nyomtatással (Balássy György és Takács Péter)
Prototípus-fejlesztés 3D nyomtatással (Balássy György és Takács Péter)
György Balássy
 
20120416 3年後のeラーニング予想大会 小室
20120416 3年後のeラーニング予想大会 小室20120416 3年後のeラーニング予想大会 小室
20120416 3年後のeラーニング予想大会 小室
Visso株式会社
 
Why e learning
Why e learningWhy e learning
Why e learning
Denayu Group
 
jQuery Pie Chart
jQuery Pie ChartjQuery Pie Chart
jQuery Pie Chart
JStoikov
 
E-safety
E-safetyE-safety
E-safety
mohamed selim
 
Sen título 1
Sen título 1Sen título 1
Sen título 1
mttq
 
Intro to Semantic Web for Work & Co
Intro to Semantic Web for Work & CoIntro to Semantic Web for Work & Co
Intro to Semantic Web for Work & Co
Rodrigo Senra
 

What's hot (20)

Brain drain by Caroline Cordell
Brain drain by Caroline CordellBrain drain by Caroline Cordell
Brain drain by Caroline Cordell
 
Chlamydia song
Chlamydia songChlamydia song
Chlamydia song
 
Ganceres ppp
Ganceres pppGanceres ppp
Ganceres ppp
 
jQuery Sparklines
jQuery SparklinesjQuery Sparklines
jQuery Sparklines
 
The Wacom Tablet Gps Presentation.Pptx 4
The Wacom Tablet Gps Presentation.Pptx 4The Wacom Tablet Gps Presentation.Pptx 4
The Wacom Tablet Gps Presentation.Pptx 4
 
Submiter + backlink
Submiter + backlinkSubmiter + backlink
Submiter + backlink
 
Handshake101
Handshake101Handshake101
Handshake101
 
Hse sites
Hse sitesHse sites
Hse sites
 
Don't Just Think There, Make Something
Don't Just Think There, Make SomethingDon't Just Think There, Make Something
Don't Just Think There, Make Something
 
Human cruisecontrol
Human cruisecontrolHuman cruisecontrol
Human cruisecontrol
 
I時代的工作術
I時代的工作術I時代的工作術
I時代的工作術
 
Allie Brock - Making training serious fun
Allie Brock  - Making training serious funAllie Brock  - Making training serious fun
Allie Brock - Making training serious fun
 
Optical Illusions
Optical IllusionsOptical Illusions
Optical Illusions
 
Prototípus-fejlesztés 3D nyomtatással (Balássy György és Takács Péter)
Prototípus-fejlesztés 3D nyomtatással (Balássy György és Takács Péter)Prototípus-fejlesztés 3D nyomtatással (Balássy György és Takács Péter)
Prototípus-fejlesztés 3D nyomtatással (Balássy György és Takács Péter)
 
20120416 3年後のeラーニング予想大会 小室
20120416 3年後のeラーニング予想大会 小室20120416 3年後のeラーニング予想大会 小室
20120416 3年後のeラーニング予想大会 小室
 
Why e learning
Why e learningWhy e learning
Why e learning
 
jQuery Pie Chart
jQuery Pie ChartjQuery Pie Chart
jQuery Pie Chart
 
E-safety
E-safetyE-safety
E-safety
 
Sen título 1
Sen título 1Sen título 1
Sen título 1
 
Intro to Semantic Web for Work & Co
Intro to Semantic Web for Work & CoIntro to Semantic Web for Work & Co
Intro to Semantic Web for Work & Co
 

Viewers also liked

Security a New Era in Computing: Acceleration using the Supply Chain Principl...
Security a New Era in Computing: Acceleration using the Supply Chain Principl...Security a New Era in Computing: Acceleration using the Supply Chain Principl...
Security a New Era in Computing: Acceleration using the Supply Chain Principl...
EC-Council
 
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
EC-Council
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
EC-Council
 
How to Get into ICS Security byChris Sistrunk
How to Get into ICS Security byChris SistrunkHow to Get into ICS Security byChris Sistrunk
How to Get into ICS Security byChris Sistrunk
EC-Council
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
EC-Council
 
Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon Creekmore
EC-Council
 
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo VienEvolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
EC-Council
 
It walks, It talks and it will conduct economic espionage by Greg Carpenter
It walks, It talks and it will conduct economic espionage by Greg CarpenterIt walks, It talks and it will conduct economic espionage by Greg Carpenter
It walks, It talks and it will conduct economic espionage by Greg Carpenter
EC-Council
 
The Shoulders of InfoSec Project by Jack Daniel
The Shoulders of InfoSec Project by Jack DanielThe Shoulders of InfoSec Project by Jack Daniel
The Shoulders of InfoSec Project by Jack Daniel
EC-Council
 
The Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George DobreaThe Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George Dobrea
EC-Council
 
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your NetworkLateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
EC-Council
 

Viewers also liked (11)

Security a New Era in Computing: Acceleration using the Supply Chain Principl...
Security a New Era in Computing: Acceleration using the Supply Chain Principl...Security a New Era in Computing: Acceleration using the Supply Chain Principl...
Security a New Era in Computing: Acceleration using the Supply Chain Principl...
 
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
 
How to Get into ICS Security byChris Sistrunk
How to Get into ICS Security byChris SistrunkHow to Get into ICS Security byChris Sistrunk
How to Get into ICS Security byChris Sistrunk
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Charity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon CreekmoreCharity: A Secret for Cyberspace by Jon Creekmore
Charity: A Secret for Cyberspace by Jon Creekmore
 
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo VienEvolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
 
It walks, It talks and it will conduct economic espionage by Greg Carpenter
It walks, It talks and it will conduct economic espionage by Greg CarpenterIt walks, It talks and it will conduct economic espionage by Greg Carpenter
It walks, It talks and it will conduct economic espionage by Greg Carpenter
 
The Shoulders of InfoSec Project by Jack Daniel
The Shoulders of InfoSec Project by Jack DanielThe Shoulders of InfoSec Project by Jack Daniel
The Shoulders of InfoSec Project by Jack Daniel
 
The Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George DobreaThe Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George Dobrea
 
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your NetworkLateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
 

Similar to The Less Hacked Path

FolioSpaces top 30 eLearning tools
FolioSpaces top 30 eLearning toolsFolioSpaces top 30 eLearning tools
FolioSpaces top 30 eLearning tools
FolioSpaces
 
Traditional symbols in literature
Traditional symbols in literatureTraditional symbols in literature
Traditional symbols in literature
kcurranlitlover
 
Traditional symbols in literature with music
Traditional symbols in literature with musicTraditional symbols in literature with music
Traditional symbols in literature with music
kcurranlitlover
 
SWONtech News for May, 2012
SWONtech News for May, 2012SWONtech News for May, 2012
SWONtech News for May, 2012
SWON Libraries Consortium
 
Thaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona ProjectThaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona Project
Terrill Marshall
 
Making a High Quality Presentation
Making a High Quality PresentationMaking a High Quality Presentation
Making a High Quality Presentation
Sarah Jones
 
Faster websites
Faster websitesFaster websites
Faster websites
marcoemrich
 
The startup of you : Build your digital identity
The startup of you : Build your digital identityThe startup of you : Build your digital identity
The startup of you : Build your digital identity
Francisco Jose Cordoba Otalora
 
PPP Presentation (final draft)
PPP Presentation (final draft)PPP Presentation (final draft)
PPP Presentation (final draft)
Andrew Rau
 
Reliability & Scale in AWS while letting you sleep through the night
Reliability & Scale in AWS while letting you sleep through the night Reliability & Scale in AWS while letting you sleep through the night
Reliability & Scale in AWS while letting you sleep through the night
Jos Boumans
 
Ferramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedorFerramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedor
Luciano Filho
 
Presentation tools for the classroom 2011
Presentation tools for the classroom 2011Presentation tools for the classroom 2011
Presentation tools for the classroom 2011
Karen Brooks
 
Robot moodboard
Robot moodboardRobot moodboard
Robot moodboard
adampatrickhughes
 
Sreckovic nick project3
Sreckovic nick project3Sreckovic nick project3
Sreckovic nick project3
Nick Sreckovic
 
Where did my layer come from? The semantics of data release
Where did my layer come from? The semantics of data releaseWhere did my layer come from? The semantics of data release
Where did my layer come from? The semantics of data release
Adam Leadbetter
 
Why Hacking Isn't Always Bad
Why Hacking Isn't Always BadWhy Hacking Isn't Always Bad
Why Hacking Isn't Always Bad
Carrie Kelly
 
Experiments in Data Portability 2
Experiments in Data Portability 2Experiments in Data Portability 2
Experiments in Data Portability 2
Glenn Jones
 
Mehr Performance für WordPress - WPFra
Mehr Performance für WordPress - WPFraMehr Performance für WordPress - WPFra
Mehr Performance für WordPress - WPFra
Walter Ebert
 
Relato General
Relato GeneralRelato General
Relato General
rosit1
 
Placementsn 2005 to date - Part Ii
Placementsn 2005 to date - Part IiPlacementsn 2005 to date - Part Ii
Placementsn 2005 to date - Part Ii
rnewell1973
 

Similar to The Less Hacked Path (20)

FolioSpaces top 30 eLearning tools
FolioSpaces top 30 eLearning toolsFolioSpaces top 30 eLearning tools
FolioSpaces top 30 eLearning tools
 
Traditional symbols in literature
Traditional symbols in literatureTraditional symbols in literature
Traditional symbols in literature
 
Traditional symbols in literature with music
Traditional symbols in literature with musicTraditional symbols in literature with music
Traditional symbols in literature with music
 
SWONtech News for May, 2012
SWONtech News for May, 2012SWONtech News for May, 2012
SWONtech News for May, 2012
 
Thaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona ProjectThaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona Project
 
Making a High Quality Presentation
Making a High Quality PresentationMaking a High Quality Presentation
Making a High Quality Presentation
 
Faster websites
Faster websitesFaster websites
Faster websites
 
The startup of you : Build your digital identity
The startup of you : Build your digital identityThe startup of you : Build your digital identity
The startup of you : Build your digital identity
 
PPP Presentation (final draft)
PPP Presentation (final draft)PPP Presentation (final draft)
PPP Presentation (final draft)
 
Reliability & Scale in AWS while letting you sleep through the night
Reliability & Scale in AWS while letting you sleep through the night Reliability & Scale in AWS while letting you sleep through the night
Reliability & Scale in AWS while letting you sleep through the night
 
Ferramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedorFerramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedor
 
Presentation tools for the classroom 2011
Presentation tools for the classroom 2011Presentation tools for the classroom 2011
Presentation tools for the classroom 2011
 
Robot moodboard
Robot moodboardRobot moodboard
Robot moodboard
 
Sreckovic nick project3
Sreckovic nick project3Sreckovic nick project3
Sreckovic nick project3
 
Where did my layer come from? The semantics of data release
Where did my layer come from? The semantics of data releaseWhere did my layer come from? The semantics of data release
Where did my layer come from? The semantics of data release
 
Why Hacking Isn't Always Bad
Why Hacking Isn't Always BadWhy Hacking Isn't Always Bad
Why Hacking Isn't Always Bad
 
Experiments in Data Portability 2
Experiments in Data Portability 2Experiments in Data Portability 2
Experiments in Data Portability 2
 
Mehr Performance für WordPress - WPFra
Mehr Performance für WordPress - WPFraMehr Performance für WordPress - WPFra
Mehr Performance für WordPress - WPFra
 
Relato General
Relato GeneralRelato General
Relato General
 
Placementsn 2005 to date - Part Ii
Placementsn 2005 to date - Part IiPlacementsn 2005 to date - Part Ii
Placementsn 2005 to date - Part Ii
 

More from EC-Council

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
EC-Council
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
EC-Council
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
EC-Council
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
EC-Council
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
EC-Council
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
EC-Council
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
EC-Council
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
EC-Council
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
EC-Council
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
EC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
EC-Council
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
EC-Council
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
EC-Council
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
EC-Council
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
EC-Council
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
EC-Council
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
EC-Council
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
EC-Council
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
EC-Council
 

More from EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

The Less Hacked Path