Blackhat USA 2012: Interview with Andreas Schimdt about Watobo
August 13th, 2012 | by NJ Ouchn
Andreas Schmidt Siberas Andreas Schmidt started working as a security consultant in 1998. At the beginning he was involved with [&hellipAugust 13th, 2012 | by NJ Ouchn
Andreas Schmidt Siberas Andreas Schmidt started working as a security consultant in 1998. At the beginning he was involved with [&hellipAugust 13th, 2012 | by NJ Ouchn
Dan Cornell Denim Group Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads [&hellipAugust 13th, 2012 | by NJ Ouchn
Matt Bergin CORE SecurityAugust 13th, 2012 | by NJ Ouchn
Georgia Weidman Bulb Security LLC Georgia Weidman is a penetration tester, security researcher, and trainer. She holds a Master of [&hellipAugust 10th, 2012 | by NJ Ouchn
With over 70% of all attacks now carried out over the web application level, organisations need every help they can [&hellipAugust 7th, 2012 | by NJ Ouchn
The scale and variety of Amazon Web Servers (AWS) has created a constantly changing landscape. What was previously managed by [&hellipAugust 7th, 2012 | by NJ Ouchn
The analysis and reverse engineering of SAP GUI network traffic has been the subject of numerous research projects in the [&hellipAugust 7th, 2012 | by NJ Ouchn
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful [&hellipAugust 6th, 2012 | by NJ Ouchn
..cantor.dust.. is an interactive binary visualization tool, a radical evolution of the traditional hex editor. By translating binary information to [&hellipAugust 6th, 2012 | by NJ Ouchn
Kautilya is a toolkit and framework which allows usage of USB Human Interface Devices in Penetration Tests. The toolkit contains [&hellip