OPCDE/README.md
2019-04-21 06:56:35 +04:00

36 строки
2.4 KiB
Markdown
Исходник Ответственный История

Этот файл содержит неоднозначные символы Юникода

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# OPCDE
OPCDE Materials (2017-2019)
## 2019
* Automated Reverse Engineering of Industrial Control Systems Binaries - Mihalis Maniatakos (@realmomalab)
* Using Symbolic Execution to Root Routers - Mathy Vanhoef (@vanhoefm)
* Evolving Attacker Techniques in Account Takeover - Philip Martin (@securityguyphil)
* Lions at the watering hole - Andrei Boz (@dekeneas)
* Next Gen IoT Botnets - owning 450.000 devices from a single vendor - Alex "Jay" Balan (@jaymzu)
* Danger of using fully homomorphic encryptiona look at Microsoft SEAL - Zhiniang Peng (@edwardzpeng)
* (SAP) Gateway to Heaven - Mathieu Geli & Dmitry Chastuhin (@gelim, @_chipik)
* NTLM Relay Is Dead,NO, this is impossible - sanr, Yang Zhang (@by_sanr, @izykw)
* Modern Secure Boot Attacks: Bypassing Hardware Root of Trust from Software - Alex Matrosov (@matrosov)
* Practical Uses for Memory Visualization - Ulf Frisk (@UlfFrisk)
* Trade War: Shellcode's Wielding of Imports and Exports - Willi Ballenthin (@williballenthin)
* WhatsApp Digger - Deemah A Alotaibi, Lamyaa S Alsaleem, Malak F Aldakheel, Sarah A Alqhtani (@_Saraque @Lamya_Alsleem @DeemaAlotaibi5 @Malakfsd)
## 2017
* Keynote 1 - Revisiting the state - Maarten Van Horenbeeck (@maartenvhb)
* Keynote 2 - Wim Remes (@wimremes)
* The Blackbox of DPAPI: the gift that keeps on giving - Bartosz Inglot (@BartInglot)
* Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader's XSLT Engine - Abdul-Aziz Hariri (@abdhariri), Jasiel Spelman (@WanderingGlitch), Brian Gorence
* From mimikatz to kekeo, passing by new Microsoft security technologies - Benjamin Delpy (@gentilkiwi)
* Agentless Post Exploitation on Device Guarded Systems - Christopher Truncer (@ChrisTruncer)
* Security Research and Development with LLVM - Andrew Reiter (@andrew_opcde)
* Supply Chainsaw: Practical software supply chain attacks - Matt Weeks (@scriptjunkie1)
* Hacking wireless SCADA systems - Elena Feldman
* Exploring Your System Deeper - Oleksandr Bazhaniuk (@ABazhaniuk)
* Windows Operating System Archaeology - Matt Nelson (@enigma0x3)
* Blinded Random Block Corruption - Rodrigo Branco (@bsdaemon)
* Practical attacks against Digital Wallet - Loic Falletta (@zavidan)
* 15 ways to break RSA security - Renaud Lifchitz (@nono2357)
* Stranger Danger - Mohamed Saher (@halsten), Ahmed Garhy (@9ee1), Nikita Tarakanov (@NTarakanov)
* Lighting Talk
* Our Financial System is under Attack - Matt Suiche (@msuiche) & @x0rz