Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.
.NET Roulette: Exploiting Insecure Deserialization in Telerik UI
.Net Roulette Exploiting Insecure Deserialization in Telerik UI
DerpCon 2020 presentation reviews how .NET deserialization works and how to get shells on real applications.
Ham Hacks: Breaking into the world of software-defined radio
DerpCon 2020 presentation explores how to find, capture, and reverse-engineer RF signals.
Demystifying Capture the Flags (CTFs)
DerpCon 2020 presentation on CTF formats, the skills they require, and the experience they develop.
Expose Yourself Without Insecurity: Cloud Breach Patterns
Presentation from BSides Atlanta 2020 explores the unprecedented level of exposures in the Cloud and how they can be found.
Attacking the Data Before the Decision
Presentation from BSides Tampa 2020 explores the vulnerabilities of machine learning systems and how to mitigate them.
How to Write Like It's Your Job
Presentation from BSides San Francisco 2020 offers practical advice for security writers.
Zigbee Hacking: Smarter Home Invasion with ZigDiggity
Finding Secrets In Publicly Exposed EBS Volumes
ZigDiggity: ZigBee Hacking Toolkit
Presentation from Black Hat USA 2019 reveals an open-source pentest arsenal for Zigbee networks.
Ghost In The Browser - Broad-Scale Espionage With Bitsquatting
Presentation from Kapersky SAS 2019 on an unfortunate side effect to achieving HTTPS everywhere and learn what can be done to mitigate the risk.
Reverse Engineering Mobile Apps
Presentation from BSides Las Vegas 2019 demonstrates the successful exploitation of transit system mobile apps.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.