- Presentations
- Documents
- Infographics
CQURE_BHAsia19_Paula_Januszkiewicz_slides
ZuzannaKornecka
•
5 years ago
How MITRE ATT&CK helps security operations
Sergey Soldatov
•
5 years ago
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show True Risk
Beau Bullock
•
8 years ago
Getting root with benign app store apps
Csaba Fitzl
•
5 years ago
Derbycon - The Unintended Risks of Trusting Active Directory
Will Schroeder
•
5 years ago
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Directory
DirkjanMollema
•
5 years ago
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
•
5 years ago
black hat deephish
Alejandro Correa Bahnsen, PhD
•
5 years ago
I Have the Power(View)
Will Schroeder
•
8 years ago
App-o-Lockalypse now!
Oddvar Moe
•
5 years ago
#Lolbins - Nothing to LOL about!
Oddvar Moe
•
5 years ago
Beyond XP_CMDSHELL: Owning the Empire Through SQL Server
NetSPI
•
6 years ago
Beyond xp_cmdshell: Owning the Empire through SQL Server
Scott Sutherland
•
6 years ago
Continuous intrusion: Why CI tools are an attacker’s best friends
Nikhil Mittal
•
8 years ago
Red Team Revenge - Attacking Microsoft ATA
Nikhil Mittal
•
6 years ago
Prepare Yourself to Become Infosec Professional
M.Syarifudin, ST, OSCP, OSWP
•
7 years ago
Building an Empire with PowerShell
Will Schroeder
•
8 years ago
Hacking Microsoft Remote Desktop Services for Fun and Profit
Alisa Esage Шевченко
•
12 years ago
NotaCon 2011 - Networking for Pentesters
Rob Fuller
•
10 years ago
Hadoop Security
Timothy Spann
•
8 years ago