SlideShare a Scribd company logo
1 of 9
Download to read offline
‫ﻣﺠﺘﻤﻊ اﻟﻘﺒﻌﺎت اﻟﺒﯿﻀﺎء…ﻷﻣﻦ اﻟﻤﻌﻠﻮﻣﺎت‬

       ‫اﻹﺟﺘﻤﺎع اﻷول - ٣٢-ﻓﺒﺮاﯾﺮ-٠١٠٢‬
‫اﻟﻤﺤﺘﻮى‬
                      ‫ﺗﻌﺎرف وﺗﺮﺣﯿﺐ‬

    ‫اﻟﻔﻘﺮة اﻷﺧﺒﺎرﯾﺔ ‪News Segment‬‬
‫أﺧﺒﺎر اﻟﻤﺠﻤﻮﻋﺔ ‪White Hats News‬‬
      ‫أﺧﺒﺎر أﻣﻨﯿﺔ ‪Security News‬‬

  ‫اﻟﻔﻘﺮة اﻟﺘﻘﻨﯿﺔ ‪Technical Segment‬‬
      ‫ﺑﺮوﺗﻮﻛﻮل ‪ HTTPS‬واﺧﺘﺮاﻗﻪ‬

                            ‫اﻟﺨﺎﺗﻤﺔ‬
‫اﻟﻔﻘﺮة اﻷﺧﺒﺎرﯾﺔ ‪News Segment‬‬

                                 ‫اﺧﺒﺎر اﻟﻤﺠﻤﻮﻋﺔ‬

                   ‫ﻛﺘﺎﺑﺔ اﻟﻤﻮاﺿﯿﻊ ﻓﻲ اﻟﻤﺪوﻧﺔ.‬


‫ﻣﺸﺎرﻛﺔ اﻟﻤﺠﻤﻮﻋﺔ ﻓﻲ ﻣﺴﺎﺑﻘﺔ اﻟﺘﻘﺎط اﻷﻋﻼم ‪CTF‬‬


                          ‫اﻟﻤﺠﻤﻮﻋﺔ واﻟﺠﺮاﺋﺪ‬
News Segment ‫اﻟﻔﻘﺮة اﻷﺧﺒﺎرﯾﺔ‬
                                                           ‫اﺧﺒﺎر أﻣﻨﯿﺔ‬

           Black Hat Conf. Abu Dhabi 2010: May 30 - Jun 2
http://www.blackhat.com/html/bh-ad-10/bh-ad-10-home.html

                     iSecur1ty.org ‫ ﻣﻦ‬iScanner 0.3 ‫ﺑﺮﻧﺎﻣﺞ‬
/http://iscanner.isecur1ty.org

             Offensive-Security.com: AWE ‫ﻛﻮرس ﺟﺪﯾﺪ ﻣﻦ‬
http://www.offensive-security.com/advanced-windows-
exploitation.php
                      ..Milw0rm‫اﺧﺮ اﻟﺜﻐﺮات ﻓﻲ اﻟﻤﻮﻗﻊ اﻟﺒﺪﯾﻞ ﻟـ‬
http://www.exploit-db.com/
News Segment ‫اﻟﻔﻘﺮة اﻷﺧﺒﺎرﯾﺔ‬
                                                         ‫اﺧﺒﺎر أﻣﻨﯿﺔ‬

           Information ‫ اﻟﺮاﺋﺪ ﻓﻲ ﺟﻤﻊ اﻟﻤﻌﻠﻮﻣﺎت‬Maltego ‫ﺑﺮﻧﺎﻣﺞ‬
                                                  Gathering
http://www.paterva.com/web4/index.php/maltego
                  Cisco Networkers 2010 Bahrain ‫ﻣﺆﺗﻤﺮ‬
http://www.cisco.com/web/emergingmarkets/cisco-
networkers/bahrain/index.html
‫اﻟﻔﻘﺮة اﻟﺘﻘﻨﯿﺔ ‪Technical Segment‬‬
      ‫ﺑﺮوﺗﻮﻛﻮل ‪ HTTPS‬واﺧﺘﺮاﻗﻪ‬

      ‫ﻛﯿﻒ ﯾﻌﻤﻞ ﺑﺮوﺗﻮﻛﻮل ‪HTTPS‬‬
Technical Segment ‫اﻟﻔﻘﺮة اﻟﺘﻘﻨﯿﺔ‬
HTTPS ‫ واﺧﺘﺮاق ﺑﺮوﺗﻮﻛﻮل‬sslstrip
Technical Segment ‫اﻟﻔﻘﺮة اﻟﺘﻘﻨﯿﺔ‬
                               sslstrip ‫ﺗﻄﺒﯿﻖ ﻋﻤﻠﻲ ﺑﺈﺳﺘﺨﺪام‬
http://www.thoughtcrime.org/software/sslstrip/



                  HACKING TIME, ph33r
‫اﻟﺨﺎﺗﻤﺔ‬

   ‫اﻹﺟﺘﻤﺎع اﻟﻘﺎدم‬

‫اﻗﺘﺮاﺣﺎﺗﻜﻢ واراﺋﻜﻢ‬

More Related Content

Viewers also liked

Black Hats to White Hats: Changing the Brand Image of Parks and Recreation Th...
Black Hats to White Hats: Changing the Brand Image of Parks and Recreation Th...Black Hats to White Hats: Changing the Brand Image of Parks and Recreation Th...
Black Hats to White Hats: Changing the Brand Image of Parks and Recreation Th...BrandAidConference
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White HatsVladimir Jirasek
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
SEO Reseller India - White Hat SEO by BrainShakers Interactive
SEO Reseller India - White Hat SEO by BrainShakers InteractiveSEO Reseller India - White Hat SEO by BrainShakers Interactive
SEO Reseller India - White Hat SEO by BrainShakers InteractiveBrainshakers Interactive
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Abdulkarim Zakaria
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
19 Growth Hacker Quotes: Thoughts on the Future of Marketing
19 Growth Hacker Quotes: Thoughts on the Future of Marketing19 Growth Hacker Quotes: Thoughts on the Future of Marketing
19 Growth Hacker Quotes: Thoughts on the Future of MarketingRyan Holiday
 
The Growth Hacker Wake Up Call
The Growth Hacker Wake Up CallThe Growth Hacker Wake Up Call
The Growth Hacker Wake Up CallRyan Holiday
 

Viewers also liked (20)

Spam spyware (2)
Spam spyware (2)Spam spyware (2)
Spam spyware (2)
 
Hacking
HackingHacking
Hacking
 
Black Hats to White Hats: Changing the Brand Image of Parks and Recreation Th...
Black Hats to White Hats: Changing the Brand Image of Parks and Recreation Th...Black Hats to White Hats: Changing the Brand Image of Parks and Recreation Th...
Black Hats to White Hats: Changing the Brand Image of Parks and Recreation Th...
 
Week12 final
Week12 finalWeek12 final
Week12 final
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
SEO Reseller India - White Hat SEO by BrainShakers Interactive
SEO Reseller India - White Hat SEO by BrainShakers InteractiveSEO Reseller India - White Hat SEO by BrainShakers Interactive
SEO Reseller India - White Hat SEO by BrainShakers Interactive
 
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
19 Growth Hacker Quotes: Thoughts on the Future of Marketing
19 Growth Hacker Quotes: Thoughts on the Future of Marketing19 Growth Hacker Quotes: Thoughts on the Future of Marketing
19 Growth Hacker Quotes: Thoughts on the Future of Marketing
 
The Growth Hacker Wake Up Call
The Growth Hacker Wake Up CallThe Growth Hacker Wake Up Call
The Growth Hacker Wake Up Call
 

Similar to White Hats 1st Meeting

Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
GraphConnect Europe 2016 - Securely Deploying Neo4j into AWS - Benjamin Nussbaum
GraphConnect Europe 2016 - Securely Deploying Neo4j into AWS - Benjamin NussbaumGraphConnect Europe 2016 - Securely Deploying Neo4j into AWS - Benjamin Nussbaum
GraphConnect Europe 2016 - Securely Deploying Neo4j into AWS - Benjamin NussbaumNeo4j
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Bounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC editionBounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC editionSandro Gauci
 
Wecon HMI PI Series Q&A
Wecon HMI PI Series Q&AWecon HMI PI Series Q&A
Wecon HMI PI Series Q&ALily Zheng
 
Comandos AT Para Celulares
Comandos AT Para CelularesComandos AT Para Celulares
Comandos AT Para CelularesVictpr Sanchez
 
Comandos AT para Celulares
Comandos AT para CelularesComandos AT para Celulares
Comandos AT para Celularesguest5b41fb
 
Cognex In-Sight - PROFINET Communications.pdf
Cognex In-Sight - PROFINET Communications.pdfCognex In-Sight - PROFINET Communications.pdf
Cognex In-Sight - PROFINET Communications.pdfDiogoCampezatto
 
TDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux EmbarcadoTDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux Embarcadotdc-globalcode
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkPriyanka Aash
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaHamilton Oliveira
 
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSXTECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSXSymantec
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure spherePushkar Saraf
 
INFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docxINFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docxjaggernaoma
 
600.412.Lecture05
600.412.Lecture05600.412.Lecture05
600.412.Lecture05ragibhasan
 

Similar to White Hats 1st Meeting (20)

Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
GraphConnect Europe 2016 - Securely Deploying Neo4j into AWS - Benjamin Nussbaum
GraphConnect Europe 2016 - Securely Deploying Neo4j into AWS - Benjamin NussbaumGraphConnect Europe 2016 - Securely Deploying Neo4j into AWS - Benjamin Nussbaum
GraphConnect Europe 2016 - Securely Deploying Neo4j into AWS - Benjamin Nussbaum
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
Bounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC editionBounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC edition
 
Wecon HMI PI Series Q&A
Wecon HMI PI Series Q&AWecon HMI PI Series Q&A
Wecon HMI PI Series Q&A
 
Comandos AT Para Celulares
Comandos AT Para CelularesComandos AT Para Celulares
Comandos AT Para Celulares
 
Comandos AT para Celulares
Comandos AT para CelularesComandos AT para Celulares
Comandos AT para Celulares
 
Cognex In-Sight - PROFINET Communications.pdf
Cognex In-Sight - PROFINET Communications.pdfCognex In-Sight - PROFINET Communications.pdf
Cognex In-Sight - PROFINET Communications.pdf
 
Butler
ButlerButler
Butler
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
 
TDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux EmbarcadoTDC2016SP - Trilha Linux Embarcado
TDC2016SP - Trilha Linux Embarcado
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSXTECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure sphere
 
INFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docxINFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docx
 
600.412.Lecture05
600.412.Lecture05600.412.Lecture05
600.412.Lecture05
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

White Hats 1st Meeting

  • 1. ‫ﻣﺠﺘﻤﻊ اﻟﻘﺒﻌﺎت اﻟﺒﯿﻀﺎء…ﻷﻣﻦ اﻟﻤﻌﻠﻮﻣﺎت‬ ‫اﻹﺟﺘﻤﺎع اﻷول - ٣٢-ﻓﺒﺮاﯾﺮ-٠١٠٢‬
  • 2. ‫اﻟﻤﺤﺘﻮى‬ ‫ﺗﻌﺎرف وﺗﺮﺣﯿﺐ‬ ‫اﻟﻔﻘﺮة اﻷﺧﺒﺎرﯾﺔ ‪News Segment‬‬ ‫أﺧﺒﺎر اﻟﻤﺠﻤﻮﻋﺔ ‪White Hats News‬‬ ‫أﺧﺒﺎر أﻣﻨﯿﺔ ‪Security News‬‬ ‫اﻟﻔﻘﺮة اﻟﺘﻘﻨﯿﺔ ‪Technical Segment‬‬ ‫ﺑﺮوﺗﻮﻛﻮل ‪ HTTPS‬واﺧﺘﺮاﻗﻪ‬ ‫اﻟﺨﺎﺗﻤﺔ‬
  • 3. ‫اﻟﻔﻘﺮة اﻷﺧﺒﺎرﯾﺔ ‪News Segment‬‬ ‫اﺧﺒﺎر اﻟﻤﺠﻤﻮﻋﺔ‬ ‫ﻛﺘﺎﺑﺔ اﻟﻤﻮاﺿﯿﻊ ﻓﻲ اﻟﻤﺪوﻧﺔ.‬ ‫ﻣﺸﺎرﻛﺔ اﻟﻤﺠﻤﻮﻋﺔ ﻓﻲ ﻣﺴﺎﺑﻘﺔ اﻟﺘﻘﺎط اﻷﻋﻼم ‪CTF‬‬ ‫اﻟﻤﺠﻤﻮﻋﺔ واﻟﺠﺮاﺋﺪ‬
  • 4. News Segment ‫اﻟﻔﻘﺮة اﻷﺧﺒﺎرﯾﺔ‬ ‫اﺧﺒﺎر أﻣﻨﯿﺔ‬ Black Hat Conf. Abu Dhabi 2010: May 30 - Jun 2 http://www.blackhat.com/html/bh-ad-10/bh-ad-10-home.html iSecur1ty.org ‫ ﻣﻦ‬iScanner 0.3 ‫ﺑﺮﻧﺎﻣﺞ‬ /http://iscanner.isecur1ty.org Offensive-Security.com: AWE ‫ﻛﻮرس ﺟﺪﯾﺪ ﻣﻦ‬ http://www.offensive-security.com/advanced-windows- exploitation.php ..Milw0rm‫اﺧﺮ اﻟﺜﻐﺮات ﻓﻲ اﻟﻤﻮﻗﻊ اﻟﺒﺪﯾﻞ ﻟـ‬ http://www.exploit-db.com/
  • 5. News Segment ‫اﻟﻔﻘﺮة اﻷﺧﺒﺎرﯾﺔ‬ ‫اﺧﺒﺎر أﻣﻨﯿﺔ‬ Information ‫ اﻟﺮاﺋﺪ ﻓﻲ ﺟﻤﻊ اﻟﻤﻌﻠﻮﻣﺎت‬Maltego ‫ﺑﺮﻧﺎﻣﺞ‬ Gathering http://www.paterva.com/web4/index.php/maltego Cisco Networkers 2010 Bahrain ‫ﻣﺆﺗﻤﺮ‬ http://www.cisco.com/web/emergingmarkets/cisco- networkers/bahrain/index.html
  • 6. ‫اﻟﻔﻘﺮة اﻟﺘﻘﻨﯿﺔ ‪Technical Segment‬‬ ‫ﺑﺮوﺗﻮﻛﻮل ‪ HTTPS‬واﺧﺘﺮاﻗﻪ‬ ‫ﻛﯿﻒ ﯾﻌﻤﻞ ﺑﺮوﺗﻮﻛﻮل ‪HTTPS‬‬
  • 7. Technical Segment ‫اﻟﻔﻘﺮة اﻟﺘﻘﻨﯿﺔ‬ HTTPS ‫ واﺧﺘﺮاق ﺑﺮوﺗﻮﻛﻮل‬sslstrip
  • 8. Technical Segment ‫اﻟﻔﻘﺮة اﻟﺘﻘﻨﯿﺔ‬ sslstrip ‫ﺗﻄﺒﯿﻖ ﻋﻤﻠﻲ ﺑﺈﺳﺘﺨﺪام‬ http://www.thoughtcrime.org/software/sslstrip/ HACKING TIME, ph33r
  • 9. ‫اﻟﺨﺎﺗﻤﺔ‬ ‫اﻹﺟﺘﻤﺎع اﻟﻘﺎدم‬ ‫اﻗﺘﺮاﺣﺎﺗﻜﻢ واراﺋﻜﻢ‬