Personal Information
Organization / Workplace
Brussels Belgium
Occupation
Freelance Cyber Security Consultant, SANS ISC Handler, Blogger
Industry
Technology / Software / Internet
Website
blog.rootshell.be
About
cat $HOME/.plan
Tags
security
siem
network
infosec
ossec
internet of things
iot
log management
dfir
tcpdump
docker
full packet capture
fpc
webshell http malicious php owasp belgium backdoor
sansfire
developers
python
malware
ioc
log
correlation
security firewalls siem correlation
brussels
fraud
brucon
conference
detection
packets
incident handling
socat
packet capture
sniffer
investigation
forensics
moloch
obfuscation
vulnerability
fsec
php
webshell
interconnection
protection
bsides
sdlc
threat landscape
spam
malware security
smart devices
mime
development
webmaster
developer
web
bro
cuckoo
ids
human hacking
social engineering
nsa
rmll
events
visualization
source
logs
configuration management
dublin
mobile device
byod
apps
mdm
mobile security byod
social networks security company business awarenes
ethical
hackers
pentest
hacking
isaca
b-sides london
ossec log management siem security
issa
See more
Presentations
(29)
See all
Likes
(14)
See all
Owasp AppSecEU 2015 - BeEF Session
Bart Leppens
•
8 years ago
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
•
8 years ago
Hacking with Pictures - Hack.LU 2014
Saumil Shah
•
8 years ago
Joue à la crypto ! (french)
Ange Albertini
•
8 years ago
Incident Response in the Cloud
Brian Honan
•
9 years ago
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
Saumil Shah
•
9 years ago
Advanced OSSEC Training: Integration Strategies for Open Source Security
AlienVault
•
9 years ago
If You Tolerate This, Your Child Processes Will Be Next
Bart Leppens
•
9 years ago
Distributed Denial Of Service Introduction
wremes
•
9 years ago
Best practises for log management
Brian Honan
•
11 years ago
Blackhat Workshop
wremes
•
12 years ago
"You Got That SIEM. Now What Do You Do?" by Dr. Anton Chuvakin
Anton Chuvakin
•
12 years ago
Exploit Delivery
Saumil Shah
•
12 years ago
Advanced SQL Injection
Joe McCray
•
14 years ago
Presentations
(29)
See all
Likes
(14)
See all
Owasp AppSecEU 2015 - BeEF Session
Bart Leppens
•
8 years ago
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
•
8 years ago
Hacking with Pictures - Hack.LU 2014
Saumil Shah
•
8 years ago
Joue à la crypto ! (french)
Ange Albertini
•
8 years ago
Incident Response in the Cloud
Brian Honan
•
9 years ago
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
Saumil Shah
•
9 years ago
Advanced OSSEC Training: Integration Strategies for Open Source Security
AlienVault
•
9 years ago
If You Tolerate This, Your Child Processes Will Be Next
Bart Leppens
•
9 years ago
Distributed Denial Of Service Introduction
wremes
•
9 years ago
Best practises for log management
Brian Honan
•
11 years ago
Blackhat Workshop
wremes
•
12 years ago
"You Got That SIEM. Now What Do You Do?" by Dr. Anton Chuvakin
Anton Chuvakin
•
12 years ago
Exploit Delivery
Saumil Shah
•
12 years ago
Advanced SQL Injection
Joe McCray
•
14 years ago
Personal Information
Organization / Workplace
Brussels Belgium
Occupation
Freelance Cyber Security Consultant, SANS ISC Handler, Blogger
Industry
Technology / Software / Internet
Website
blog.rootshell.be
About
cat $HOME/.plan
Tags
security
siem
network
infosec
ossec
internet of things
iot
log management
dfir
tcpdump
docker
full packet capture
fpc
webshell http malicious php owasp belgium backdoor
sansfire
developers
python
malware
ioc
log
correlation
security firewalls siem correlation
brussels
fraud
brucon
conference
detection
packets
incident handling
socat
packet capture
sniffer
investigation
forensics
moloch
obfuscation
vulnerability
fsec
php
webshell
interconnection
protection
bsides
sdlc
threat landscape
spam
malware security
smart devices
mime
development
webmaster
developer
web
bro
cuckoo
ids
human hacking
social engineering
nsa
rmll
events
visualization
source
logs
configuration management
dublin
mobile device
byod
apps
mdm
mobile security byod
social networks security company business awarenes
ethical
hackers
pentest
hacking
isaca
b-sides london
ossec log management siem security
issa
See more