際際滷shows by User: PawelRzepa / http://www.slideshare.net/images/logo.gif 際際滷shows by User: PawelRzepa / Fri, 06 Dec 2019 10:47:23 GMT 際際滷Share feed for 際際滷shows by User: PawelRzepa Attacking aws workshops - teaser /slideshow/attacking-aws-workshops-teaser/202253251 attackingawsworkshopstrailer-191206104723
Little teaser of what you can expect from the workshop]]>

Little teaser of what you can expect from the workshop]]>
Fri, 06 Dec 2019 10:47:23 GMT /slideshow/attacking-aws-workshops-teaser/202253251 PawelRzepa@slideshare.net(PawelRzepa) Attacking aws workshops - teaser PawelRzepa Little teaser of what you can expect from the workshop <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/attackingawsworkshopstrailer-191206104723-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Little teaser of what you can expect from the workshop
Attacking aws workshops - teaser from Pawel Rzepa
]]>
104 1 https://cdn.slidesharecdn.com/ss_thumbnails/attackingawsworkshopstrailer-191206104723-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hunting for the secrets in a cloud forest /slideshow/hunting-for-the-secrets-in-a-cloud-forest-101306075/101306075 huntingforthesecretsinacloudforestreduced-180608113050
Have you ever wonder if the access to your cloud kingdom is secure? Have you ever thought how cyber criminals are hunting for your secrets? How can you be sure that your secret is not "mistakenly" available to the public? In my presentation I'm going to present you hackish methods used by cyber criminals to find access keys, credentials and other secrets in the public Internet. How can Shannon Entropy help you to do that? This is a presentation about my tool the DumpsterDiver (https://github.com/securing/DumpsterDiver) and the BucketScanner (https://github.com/securing/BucketScanner).]]>

Have you ever wonder if the access to your cloud kingdom is secure? Have you ever thought how cyber criminals are hunting for your secrets? How can you be sure that your secret is not "mistakenly" available to the public? In my presentation I'm going to present you hackish methods used by cyber criminals to find access keys, credentials and other secrets in the public Internet. How can Shannon Entropy help you to do that? This is a presentation about my tool the DumpsterDiver (https://github.com/securing/DumpsterDiver) and the BucketScanner (https://github.com/securing/BucketScanner).]]>
Fri, 08 Jun 2018 11:30:50 GMT /slideshow/hunting-for-the-secrets-in-a-cloud-forest-101306075/101306075 PawelRzepa@slideshare.net(PawelRzepa) Hunting for the secrets in a cloud forest PawelRzepa Have you ever wonder if the access to your cloud kingdom is secure? Have you ever thought how cyber criminals are hunting for your secrets? How can you be sure that your secret is not "mistakenly" available to the public? In my presentation I'm going to present you hackish methods used by cyber criminals to find access keys, credentials and other secrets in the public Internet. How can Shannon Entropy help you to do that? This is a presentation about my tool the DumpsterDiver (https://github.com/securing/DumpsterDiver) and the BucketScanner (https://github.com/securing/BucketScanner). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/huntingforthesecretsinacloudforestreduced-180608113050-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Have you ever wonder if the access to your cloud kingdom is secure? Have you ever thought how cyber criminals are hunting for your secrets? How can you be sure that your secret is not &quot;mistakenly&quot; available to the public? In my presentation I&#39;m going to present you hackish methods used by cyber criminals to find access keys, credentials and other secrets in the public Internet. How can Shannon Entropy help you to do that? This is a presentation about my tool the DumpsterDiver (https://github.com/securing/DumpsterDiver) and the BucketScanner (https://github.com/securing/BucketScanner).
Hunting for the secrets in a cloud forest from Pawel Rzepa
]]>
85 2 https://cdn.slidesharecdn.com/ss_thumbnails/huntingforthesecretsinacloudforestreduced-180608113050-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Aws(in)security - the devil is in the detail /slideshow/awsinsecurity-the-devil-is-in-the-detail/82207478 awsinsecuritybeta-171117111023
Presentation about most common fails related with AWS S3 and EC2 services]]>

Presentation about most common fails related with AWS S3 and EC2 services]]>
Fri, 17 Nov 2017 11:10:23 GMT /slideshow/awsinsecurity-the-devil-is-in-the-detail/82207478 PawelRzepa@slideshare.net(PawelRzepa) Aws(in)security - the devil is in the detail PawelRzepa Presentation about most common fails related with AWS S3 and EC2 services <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/awsinsecuritybeta-171117111023-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation about most common fails related with AWS S3 and EC2 services
Aws(in)security - the devil is in the detail from Pawel Rzepa
]]>
1769 3 https://cdn.slidesharecdn.com/ss_thumbnails/awsinsecuritybeta-171117111023-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Owasp for testing_mobile_apps_opd /slideshow/owasp-for-testingmobileappsopd/82206412 owaspfortestingmobileappsopd-171117104040
Presentation of OWASP MSTG, MASVS and Hacker Playground projects.]]>

Presentation of OWASP MSTG, MASVS and Hacker Playground projects.]]>
Fri, 17 Nov 2017 10:40:40 GMT /slideshow/owasp-for-testingmobileappsopd/82206412 PawelRzepa@slideshare.net(PawelRzepa) Owasp for testing_mobile_apps_opd PawelRzepa Presentation of OWASP MSTG, MASVS and Hacker Playground projects. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owaspfortestingmobileappsopd-171117104040-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation of OWASP MSTG, MASVS and Hacker Playground projects.
Owasp for testing_mobile_apps_opd from Pawel Rzepa
]]>
423 3 https://cdn.slidesharecdn.com/ss_thumbnails/owaspfortestingmobileappsopd-171117104040-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fuzzing underestimated method of finding hidden bugs /slideshow/fuzzing-underestimated-methodoffindinghiddenbugs-66168507/66168507 fuzzingunderestimatedmethodoffindinghiddenbugs-160919125231
A brief introduction to fuzzing and how to start using it.]]>

A brief introduction to fuzzing and how to start using it.]]>
Mon, 19 Sep 2016 12:52:31 GMT /slideshow/fuzzing-underestimated-methodoffindinghiddenbugs-66168507/66168507 PawelRzepa@slideshare.net(PawelRzepa) Fuzzing underestimated method of finding hidden bugs PawelRzepa A brief introduction to fuzzing and how to start using it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fuzzingunderestimatedmethodoffindinghiddenbugs-160919125231-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A brief introduction to fuzzing and how to start using it.
Fuzzing underestimated method of finding hidden bugs from Pawel Rzepa
]]>
1874 4 https://cdn.slidesharecdn.com/ss_thumbnails/fuzzingunderestimatedmethodoffindinghiddenbugs-160919125231-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Owasp mobile top 10 /slideshow/owasp-mobile-top-10-58962730/58962730 owaspmobiletop10-160302113416
A basic guide how to look for OWASP mobile top 10 risks in Android applications using AppUse and opesource tools.]]>

A basic guide how to look for OWASP mobile top 10 risks in Android applications using AppUse and opesource tools.]]>
Wed, 02 Mar 2016 11:34:16 GMT /slideshow/owasp-mobile-top-10-58962730/58962730 PawelRzepa@slideshare.net(PawelRzepa) Owasp mobile top 10 PawelRzepa A basic guide how to look for OWASP mobile top 10 risks in Android applications using AppUse and opesource tools. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owaspmobiletop10-160302113416-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A basic guide how to look for OWASP mobile top 10 risks in Android applications using AppUse and opesource tools.
Owasp mobile top 10 from Pawel Rzepa
]]>
1610 8 https://cdn.slidesharecdn.com/ss_thumbnails/owaspmobiletop10-160302113416-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ataki po stronie klienta w publicznych punktach dostpowych /slideshow/ataki-po-stronie-klienta-w-publicznych-punktach-dostpowych/52924464 ataki-po-stronie-klienta-w-publicznych-punktach-dostpowychv2-150918083221-lva1-app6891
Ataki po stronie klienta w publicznych punktach dostpowych. Coraz wicej restauracji i hoteli decyduje si na otwarcie publicznych punkt坦w dostpowych. Wizja darmowego surfowania po Internecie wydaje si dla wielu atrakcyjna, ale czy na pewno bezpieczna? Czy mo甜na przechwyci dane przesyane do "bezpiecznej" aplikacji? Czy szyfrowanie to droga dla paranoik坦w, czy jedyne suszne rozwizanie?]]>

Ataki po stronie klienta w publicznych punktach dostpowych. Coraz wicej restauracji i hoteli decyduje si na otwarcie publicznych punkt坦w dostpowych. Wizja darmowego surfowania po Internecie wydaje si dla wielu atrakcyjna, ale czy na pewno bezpieczna? Czy mo甜na przechwyci dane przesyane do "bezpiecznej" aplikacji? Czy szyfrowanie to droga dla paranoik坦w, czy jedyne suszne rozwizanie?]]>
Fri, 18 Sep 2015 08:32:21 GMT /slideshow/ataki-po-stronie-klienta-w-publicznych-punktach-dostpowych/52924464 PawelRzepa@slideshare.net(PawelRzepa) Ataki po stronie klienta w publicznych punktach dostpowych PawelRzepa Ataki po stronie klienta w publicznych punktach dostpowych. Coraz wicej restauracji i hoteli decyduje si na otwarcie publicznych punkt坦w dostpowych. Wizja darmowego surfowania po Internecie wydaje si dla wielu atrakcyjna, ale czy na pewno bezpieczna? Czy mo甜na przechwyci dane przesyane do "bezpiecznej" aplikacji? Czy szyfrowanie to droga dla paranoik坦w, czy jedyne suszne rozwizanie? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ataki-po-stronie-klienta-w-publicznych-punktach-dostpowychv2-150918083221-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ataki po stronie klienta w publicznych punktach dostpowych. Coraz wicej restauracji i hoteli decyduje si na otwarcie publicznych punkt坦w dostpowych. Wizja darmowego surfowania po Internecie wydaje si dla wielu atrakcyjna, ale czy na pewno bezpieczna? Czy mo甜na przechwyci dane przesyane do &quot;bezpiecznej&quot; aplikacji? Czy szyfrowanie to droga dla paranoik坦w, czy jedyne suszne rozwizanie?
Ataki po stronie klienta w publicznych punktach dostowych from Pawel Rzepa
]]>
1072 4 https://cdn.slidesharecdn.com/ss_thumbnails/ataki-po-stronie-klienta-w-publicznych-punktach-dostpowychv2-150918083221-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-PawelRzepa-48x48.jpg?cb=1575626400 https://cdn.slidesharecdn.com/ss_thumbnails/attackingawsworkshopstrailer-191206104723-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/attacking-aws-workshops-teaser/202253251 Attacking aws workshop... https://cdn.slidesharecdn.com/ss_thumbnails/huntingforthesecretsinacloudforestreduced-180608113050-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/hunting-for-the-secrets-in-a-cloud-forest-101306075/101306075 Hunting for the secret... https://cdn.slidesharecdn.com/ss_thumbnails/awsinsecuritybeta-171117111023-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/awsinsecurity-the-devil-is-in-the-detail/82207478 Aws(in)security - the ...