Difference between revisions of "User:M3m0r3x"
m |
|||
| Line 12: | Line 12: | ||
==== Talks (Live or Recording)==== | ==== Talks (Live or Recording)==== | ||
===== Friday ===== | ===== Friday ===== | ||
| − | https://program.sha2017.org/events/251.html <br /> | + | [https://program.sha2017.org/events/251.html SHA2017 Opening] <br /> |
| − | https://program.sha2017.org/events/169.html <br /> | + | [https://program.sha2017.org/events/169.html Attacking OpenSSL using Side-channel Attacks] <br /> |
| − | https://program.sha2017.org/events/288.html <br /> | + | [https://program.sha2017.org/events/288.html Computer crime and criminal law 101]<br /> |
| − | https://program.sha2017.org/events/315.html <br /> | + | [https://program.sha2017.org/events/315.html Famous C&C servers from inside to outside]<br /> |
| − | https://program.sha2017.org/events/209.html <br /> | + | [https://program.sha2017.org/events/209.html Blockchain beyond the buzz and hype]<br /> |
| − | https://program.sha2017.org/events/314.html <br /> | + | [https://program.sha2017.org/events/314.html icibici workshop: a brain-computer interface for your phone/tablet/etc]<br /> |
===== Saturday ===== | ===== Saturday ===== | ||
| − | https://program.sha2017.org/events/268.html <br /> | + | [https://program.sha2017.org/events/268.html Android Application Pentesting 101]<br /> |
| − | https://program.sha2017.org/events/102.html <br /> | + | [https://program.sha2017.org/events/102.html Tor de-anonymization techniques]<br /> |
| − | https://program.sha2017.org/events/316.html<-- <br /> | + | [https://program.sha2017.org/events/316.html An academic's view to incident response]<-- <br /> |
| − | + | [https://program.sha2017.org/events/56.html Smart Home Security with Tor]<br /> | |
| − | https://program.sha2017.org/events/56.html <br /> | + | [https://program.sha2017.org/events/20.html Network concepts introduction & wireshark workshop]<br /> |
| − | https://program.sha2017.org/events/20.html <br /> | + | [https://program.sha2017.org/events/380.html Modern Digital Forensics analysis, where to find evidence]<br /> |
| − | https://program.sha2017.org/events/380.html <br /> | ||
===== Sunday ===== | ===== Sunday ===== | ||
| − | https://program.sha2017.org/events/267.html <br /> | + | [https://program.sha2017.org/events/267.html Data Exploitation]<br /> |
| − | https://program.sha2017.org/events/10.html <br /> | + | [https://program.sha2017.org/events/10.html TLS Pool: Security orthogonal to Applications]<br /> |
| − | https://program.sha2017.org/events/176.html <-- <br /> | + | [https://program.sha2017.org/events/176.html A look at TR-06FAIL and other CPE Configuration Management Disasters]<-- <br /> |
| − | https://program.sha2017.org/events/289.html <br /> | + | [https://program.sha2017.org/events/289.html Anonymous, secure and easy. You can have them all]<br /> |
| − | https://program.sha2017.org/events/328.html <br /> | + | [https://program.sha2017.org/events/328.html An introduction into next generation computing using Field Programmable Gate Arrays (FPGA)]<br /> |
| − | https://program.sha2017.org/events/85.html <br /> | + | [https://program.sha2017.org/events/85.html Making bombs]<br /> |
| − | https://program.sha2017.org/events/384.html <br /> | + | [https://program.sha2017.org/events/384.html Secure communications hardware]<br /> |
===== Monday ===== | ===== Monday ===== | ||
| − | https://program.sha2017.org/events/342.html <br /> | + | [https://program.sha2017.org/events/342.html Blockchains for a Better World]<br /> |
| − | https://program.sha2017.org/events/24.html <br /> | + | [https://program.sha2017.org/events/24.html Physical Penetration Testing]<br /> |
| − | https://program.sha2017.org/events/378.html <br /> | + | [https://program.sha2017.org/events/378.html Windows forensics]<br /> |
| − | https://program.sha2017.org/events/221.html <br /> | + | [https://program.sha2017.org/events/221.html FaceDancer 2.0]<br /> |
===== Tuesday ===== | ===== Tuesday ===== | ||
| − | https://program.sha2017.org/events/269.html <br /> | + | [https://program.sha2017.org/events/269.html Exploiting Twitter with Tinfoleak for investigative purposes]<br /> |
| − | https://program.sha2017.org/events/174.html <br /> | + | [https://program.sha2017.org/events/174.html DDoS attack and defense]<br /> |
| − | https://program.sha2017.org/events/186.html <br /> | + | [https://program.sha2017.org/events/186.html Exploiting Twitter with Tinfoleak for investigative purposes]<br /> |
| − | https://program.sha2017.org/events/338.html <br /> | + | [https://program.sha2017.org/events/338.html Infrastructure review]<br /> |
| − | https://program.sha2017.org/events/252.html <br /> | + | [https://program.sha2017.org/events/252.html SHA2017 Closing]<br /> |
| − | https://program.sha2017.org/events/247.html <br /> | + | [https://program.sha2017.org/events/247.html SHA2017 Closing Simulcast]<br /> |
==== Self organized sessions ==== | ==== Self organized sessions ==== | ||
| − | https://wiki.sha2017.org/w/Session:Flamethrowers_101<br /> | + | [https://wiki.sha2017.org/w/Session:Flamethrowers_101 Flamethrowers_101]<br /> |
| − | https://wiki.sha2017.org/w/Session:The_One_Ring_Workshop <br /> | + | [https://wiki.sha2017.org/w/Session:The_One_Ring_Workshop The_One_Ring_Workshop] <br /> |
| − | https://wiki.sha2017.org/w/Session:Open_Molecular_Cooking_Night <br /> | + | [https://wiki.sha2017.org/w/Session:Open_Molecular_Cooking_Night Open_Molecular_Cooking_Night] <br /> |
| − | https://wiki.sha2017.org/w/Session:Pimp_your_Android(-fork)_with_the_best_Free_Software_apps_(live_%2B_interactive) <br /> | + | [https://wiki.sha2017.org/w/Session:Pimp_your_Android(-fork)_with_the_best_Free_Software_apps_(live_%2B_interactive) Pimp_your_Android(-fork)_with_the_best_Free_Software_apps_(live_&_interactive)] <br /> |
| − | https://wiki.sha2017.org/w/Session:FPGAs_for_Newbies <br /> | + | [https://wiki.sha2017.org/w/Session:FPGAs_for_Newbies FPGAs_for_Newbies] <br /> |
| − | https://wiki.sha2017.org/w/Session:LearnToSolder <br /> | + | [https://wiki.sha2017.org/w/Session:LearnToSolder LearnToSolder] <br /> |
| − | https://wiki.sha2017.org/w/Session:Monitoring_Government_Surveillance_Capabilities_by_means_of_Transparency_tools <br /> | + | [https://wiki.sha2017.org/w/Session:Monitoring_Government_Surveillance_Capabilities_by_means_of_Transparency_tools Monitoring_Government_Surveillance_Capabilities_by_means_of_Transparency_tools] <br /> |
| − | https://wiki.sha2017.org/w/Session:Secure_communications_hardware <br /> | + | [https://wiki.sha2017.org/w/Session:Secure_communications_hardware Secure_communications_hardware] <br /> |
| − | https://wiki.sha2017.org/w/Session:Modern_Digital_Forensics_analysis,_where_to_find_evidences <br /> | + | [https://wiki.sha2017.org/w/Session:Modern_Digital_Forensics_analysis,_where_to_find_evidences Modern_Digital_Forensics_analysis,_where_to_find_evidences] <br /> |
| − | https://wiki.sha2017.org/w/Session:Windows_forensics <br /> | + | [https://wiki.sha2017.org/w/Session:Windows_forensics Windows_forensics] <br /> |
==== Projects ==== | ==== Projects ==== | ||
| − | https://wiki.sha2017.org/w/Projects:KillerBee <br /> | + | [https://wiki.sha2017.org/w/Projects:KillerBee KillerBee] <br /> |
| − | https://wiki.sha2017.org/w/Projects:RaZberry <br /> | + | [https://wiki.sha2017.org/w/Projects:RaZberry RaZberry] <br /> |
Revision as of 21:41, 2 August 2017
| m3m0r3x | |
|---|---|
| | |
| Generated SHA Flag with Name (experiment here) | |
| Arrival | 2017/08/03 00:00 |
| Departure | 2017/08/09 10:00 |
| BuildupVehicle | Car, Transporter |
| Bringing | Arduinos, Raspies, LTE-Router, Switch, Powercoard, some soldering stuff, Hacking Gadgets, UpriBox, FruityWiFiPi |
| Village | Village:1838, Village:Foodhackingbase |
| Working on | |
| Contributions | |
| Contact | |
| @_m3m0r3x_
| |
Contents
Orga
Things I want to visit
Talks (Live or Recording)
Friday
SHA2017 Opening
Attacking OpenSSL using Side-channel Attacks
Computer crime and criminal law 101
Famous C&C servers from inside to outside
Blockchain beyond the buzz and hype
icibici workshop: a brain-computer interface for your phone/tablet/etc
Saturday
Android Application Pentesting 101
Tor de-anonymization techniques
An academic's view to incident response<--
Smart Home Security with Tor
Network concepts introduction & wireshark workshop
Modern Digital Forensics analysis, where to find evidence
Sunday
Data Exploitation
TLS Pool: Security orthogonal to Applications
A look at TR-06FAIL and other CPE Configuration Management Disasters<--
Anonymous, secure and easy. You can have them all
An introduction into next generation computing using Field Programmable Gate Arrays (FPGA)
Making bombs
Secure communications hardware
Monday
Blockchains for a Better World
Physical Penetration Testing
Windows forensics
FaceDancer 2.0
Tuesday
Exploiting Twitter with Tinfoleak for investigative purposes
DDoS attack and defense
Exploiting Twitter with Tinfoleak for investigative purposes
Infrastructure review
SHA2017 Closing
SHA2017 Closing Simulcast
Self organized sessions
Flamethrowers_101
The_One_Ring_Workshop
Open_Molecular_Cooking_Night
Pimp_your_Android(-fork)_with_the_best_Free_Software_apps_(live_&_interactive)
FPGAs_for_Newbies
LearnToSolder
Monitoring_Government_Surveillance_Capabilities_by_means_of_Transparency_tools
Secure_communications_hardware
Modern_Digital_Forensics_analysis,_where_to_find_evidences
Windows_forensics