際際滷shows by User: bz98 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: bz98 / Wed, 10 Apr 2024 09:03:59 GMT 際際滷Share feed for 際際滷shows by User: bz98 [ Hackersuli ] Privacy on the blockchain /slideshow/hackersuli-privacy-on-the-blockchain/267192589 ethmeetupv2-240410090359-6036fe82
[Hackersuli]Privacy on the blockchain]]>

[Hackersuli]Privacy on the blockchain]]>
Wed, 10 Apr 2024 09:03:59 GMT /slideshow/hackersuli-privacy-on-the-blockchain/267192589 bz98@slideshare.net(bz98) [ Hackersuli ] Privacy on the blockchain bz98 [Hackersuli]Privacy on the blockchain <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ethmeetupv2-240410090359-6036fe82-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> [Hackersuli]Privacy on the blockchain
[ Hackersuli ] Privacy on the blockchain from Zoltan Balazs
]]>
13 0 https://cdn.slidesharecdn.com/ss_thumbnails/ethmeetupv2-240410090359-6036fe82-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
MLSEC 2020 /slideshow/mlsec-2020/255105952 hitbmlsecnewtemplate-230102100433-36419e22
Machine Learning Security Evasion Competition 2020]]>

Machine Learning Security Evasion Competition 2020]]>
Mon, 02 Jan 2023 10:04:33 GMT /slideshow/mlsec-2020/255105952 bz98@slideshare.net(bz98) MLSEC 2020 bz98 Machine Learning Security Evasion Competition 2020 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hitbmlsecnewtemplate-230102100433-36419e22-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Machine Learning Security Evasion Competition 2020
MLSEC 2020 from Zoltan Balazs
]]>
28 0 https://cdn.slidesharecdn.com/ss_thumbnails/hitbmlsecnewtemplate-230102100433-36419e22-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web3 + scams = It's a match /slideshow/web3-scams-its-a-match/252762610 hitbzoltanbalazsweb3scams-220830142847-ec0e1118
Web3 + scams = It's a match]]>

Web3 + scams = It's a match]]>
Tue, 30 Aug 2022 14:28:47 GMT /slideshow/web3-scams-its-a-match/252762610 bz98@slideshare.net(bz98) Web3 + scams = It's a match bz98 Web3 + scams = It's a match <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hitbzoltanbalazsweb3scams-220830142847-ec0e1118-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Web3 + scams = It&#39;s a match
Web3 + scams = It's a match from Zoltan Balazs
]]>
37 0 https://cdn.slidesharecdn.com/ss_thumbnails/hitbzoltanbalazsweb3scams-220830142847-ec0e1118-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
MIPS-X /slideshow/mipsx/250443167 mips-xpresentation-211014083005
MIPS-X]]>

MIPS-X]]>
Thu, 14 Oct 2021 08:30:04 GMT /slideshow/mipsx/250443167 bz98@slideshare.net(bz98) MIPS-X bz98 MIPS-X <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mips-xpresentation-211014083005-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> MIPS-X
MIPS-X from Zoltan Balazs
]]>
131 0 https://cdn.slidesharecdn.com/ss_thumbnails/mips-xpresentation-211014083005-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to hide your browser 0-day @ Disobey /slideshow/how-to-hide-your-browser-0day-disobey-128055326/128055326 mrgdisobey-2019-ecdh-190115091928
How to hide your browser 0-day @ Disobey #IRONSQUIRREL]]>

How to hide your browser 0-day @ Disobey #IRONSQUIRREL]]>
Tue, 15 Jan 2019 09:19:28 GMT /slideshow/how-to-hide-your-browser-0day-disobey-128055326/128055326 bz98@slideshare.net(bz98) How to hide your browser 0-day @ Disobey bz98 How to hide your browser 0-day @ Disobey #IRONSQUIRREL <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mrgdisobey-2019-ecdh-190115091928-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to hide your browser 0-day @ Disobey #IRONSQUIRREL
How to hide your browser 0-day @ Disobey from Zoltan Balazs
]]>
474 2 https://cdn.slidesharecdn.com/ss_thumbnails/mrgdisobey-2019-ecdh-190115091928-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Explain Ethereum smart contract hacking like i am a five /slideshow/explain-ethereum-smart-contract-hacking-like-i-am-a-five/119492270 hacktivity2018ethereumsmartcontracthackingexplainlikeiamafivecopy-copy-181015145457
Hacktivity 2018 ]]>

Hacktivity 2018 ]]>
Mon, 15 Oct 2018 14:54:57 GMT /slideshow/explain-ethereum-smart-contract-hacking-like-i-am-a-five/119492270 bz98@slideshare.net(bz98) Explain Ethereum smart contract hacking like i am a five bz98 Hacktivity 2018 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hacktivity2018ethereumsmartcontracthackingexplainlikeiamafivecopy-copy-181015145457-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Hacktivity 2018
Explain Ethereum smart contract hacking like i am a five from Zoltan Balazs
]]>
298 2 https://cdn.slidesharecdn.com/ss_thumbnails/hacktivity2018ethereumsmartcontracthackingexplainlikeiamafivecopy-copy-181015145457-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to hide your browser 0-days /slideshow/how-to-hide-your-browser-0days/79681790 ecdh-170912125631
Download the code from here: https://github.com/MRGEffitas/Ironsquirrel]]>

Download the code from here: https://github.com/MRGEffitas/Ironsquirrel]]>
Tue, 12 Sep 2017 12:56:31 GMT /slideshow/how-to-hide-your-browser-0days/79681790 bz98@slideshare.net(bz98) How to hide your browser 0-days bz98 Download the code from here: https://github.com/MRGEffitas/Ironsquirrel <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ecdh-170912125631-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Download the code from here: https://github.com/MRGEffitas/Ironsquirrel
How to hide your browser 0-days from Zoltan Balazs
]]>
2373 6 https://cdn.slidesharecdn.com/ss_thumbnails/ecdh-170912125631-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Test & Tea : ITSEC testing, manual vs automated /slideshow/test-tea-itsec-testing-manual-vs-automated/77179412 meetupitsectesting-170622151123
Test & Tea : ITSEC testing, manual vs automated]]>

Test & Tea : ITSEC testing, manual vs automated]]>
Thu, 22 Jun 2017 15:11:23 GMT /slideshow/test-tea-itsec-testing-manual-vs-automated/77179412 bz98@slideshare.net(bz98) Test & Tea : ITSEC testing, manual vs automated bz98 Test & Tea : ITSEC testing, manual vs automated <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/meetupitsectesting-170622151123-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Test &amp; Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated from Zoltan Balazs
]]>
449 4 https://cdn.slidesharecdn.com/ss_thumbnails/meetupitsectesting-170622151123-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hacking Windows 95 #33c3 /slideshow/hacking-windows-95-33c3/70565555 hackingwin9533c3-161231100815
Hacking Windows 95 #33c3 lightning talk]]>

Hacking Windows 95 #33c3 lightning talk]]>
Sat, 31 Dec 2016 10:08:15 GMT /slideshow/hacking-windows-95-33c3/70565555 bz98@slideshare.net(bz98) Hacking Windows 95 #33c3 bz98 Hacking Windows 95 #33c3 lightning talk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hackingwin9533c3-161231100815-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Hacking Windows 95 #33c3 lightning talk
Hacking Windows 95 #33c3 from Zoltan Balazs
]]>
609 5 https://cdn.slidesharecdn.com/ss_thumbnails/hackingwin9533c3-161231100815-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ransomware - what is it, how to protect against it /slideshow/ransomware-what-is-it-how-to-protect-against-it/69655038 ransomwareeng-161129212204
Ransomware - what is it, how to protect against it]]>

Ransomware - what is it, how to protect against it]]>
Tue, 29 Nov 2016 21:22:03 GMT /slideshow/ransomware-what-is-it-how-to-protect-against-it/69655038 bz98@slideshare.net(bz98) Ransomware - what is it, how to protect against it bz98 Ransomware - what is it, how to protect against it <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ransomwareeng-161129212204-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it from Zoltan Balazs
]]>
2198 6 https://cdn.slidesharecdn.com/ss_thumbnails/ransomwareeng-161129212204-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cameras through the cloud /slideshow/hacktivity-2016-the-real-risks-of-the-iot-securitynightmare-hacking-ip-cameras-through-the-cloud/67529777 alliotsecurityisterrible-161022132237
IoT]]>

IoT]]>
Sat, 22 Oct 2016 13:22:36 GMT /slideshow/hacktivity-2016-the-real-risks-of-the-iot-securitynightmare-hacking-ip-cameras-through-the-cloud/67529777 bz98@slideshare.net(bz98) Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cameras through the cloud bz98 IoT <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/alliotsecurityisterrible-161022132237-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IoT
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cameras through the cloud from Zoltan Balazs
]]>
3807 5 https://cdn.slidesharecdn.com/ss_thumbnails/alliotsecurityisterrible-161022132237-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IoT security is a nightmare. But what is the real risk? /slideshow/iot-security-is-a-nightmare-but-what-is-the-real-risk/65213457 alliotsecurityisterrible-160821194034
IoT security is a nightmare. But what is the real risk?]]>

IoT security is a nightmare. But what is the real risk?]]>
Sun, 21 Aug 2016 19:40:34 GMT /slideshow/iot-security-is-a-nightmare-but-what-is-the-real-risk/65213457 bz98@slideshare.net(bz98) IoT security is a nightmare. But what is the real risk? bz98 IoT security is a nightmare. But what is the real risk? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/alliotsecurityisterrible-160821194034-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk? from Zoltan Balazs
]]>
8033 7 https://cdn.slidesharecdn.com/ss_thumbnails/alliotsecurityisterrible-160821194034-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sandboxes /bz98/sandboxes sandboxes-151227224508
A collection of screenshots from malware analysis sandboxes]]>

A collection of screenshots from malware analysis sandboxes]]>
Sun, 27 Dec 2015 22:45:07 GMT /bz98/sandboxes bz98@slideshare.net(bz98) Sandboxes bz98 A collection of screenshots from malware analysis sandboxes <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sandboxes-151227224508-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A collection of screenshots from malware analysis sandboxes
Sandboxes from Zoltan Balazs
]]>
1277 5 https://cdn.slidesharecdn.com/ss_thumbnails/sandboxes-151227224508-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sandbox detection: 鐃leak, abuse, test - Hacktivity 2015 /slideshow/sandbox-detection-leak-abuse-test-hacktivity-2015/53762011 sandboxmappingred-151010051406-lva1-app6891
Sandbox detection: leak, abuse, test - Hacktivity 2015]]>

Sandbox detection: leak, abuse, test - Hacktivity 2015]]>
Sat, 10 Oct 2015 05:14:06 GMT /slideshow/sandbox-detection-leak-abuse-test-hacktivity-2015/53762011 bz98@slideshare.net(bz98) Sandbox detection: 鐃leak, abuse, test - Hacktivity 2015 bz98 Sandbox detection: 鐃leak, abuse, test - Hacktivity 2015 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sandboxmappingred-151010051406-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Sandbox detection: 鐃leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015 from Zoltan Balazs
]]>
3704 12 https://cdn.slidesharecdn.com/ss_thumbnails/sandboxmappingred-151010051406-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops in 20 seconds /slideshow/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds/37829226 highsechackredact-140809110411-phpapp01
In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is. Imagine a scenario, where you have deployed a malware on a users workstation, but the target information is on a secure server accessed via two-factor authentication, with screen access only (e.g. RDP, Citrix, etc.). On top of that, the server runs application white-listing, and only the inbound port to the screen server (e.g. 3389) is allowed through the hardware firewall. But you also need persistent interactive C&C communication (e.g. Netcat, Meterpreter, RAT) to this server through the users workstation. I developed (and will publish) two tools that help you in these situations. The first tool can drop malware to the server through the screen while the user is logged in. The second tool can help you to circumvent the hardware firewall after we can execute code on the server with admin privileges (using a signed kernel driver). My tools are generic meaning that they work against Windows server 2012 and Windows 8, and they work with RDP or other remote desktops. The number of problems you can solve with them are endless, e.g., communicating with bind-shell on webserver behind restricted DMZ. Beware, live demo and fun included!]]>

In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is. Imagine a scenario, where you have deployed a malware on a users workstation, but the target information is on a secure server accessed via two-factor authentication, with screen access only (e.g. RDP, Citrix, etc.). On top of that, the server runs application white-listing, and only the inbound port to the screen server (e.g. 3389) is allowed through the hardware firewall. But you also need persistent interactive C&C communication (e.g. Netcat, Meterpreter, RAT) to this server through the users workstation. I developed (and will publish) two tools that help you in these situations. The first tool can drop malware to the server through the screen while the user is logged in. The second tool can help you to circumvent the hardware firewall after we can execute code on the server with admin privileges (using a signed kernel driver). My tools are generic meaning that they work against Windows server 2012 and Windows 8, and they work with RDP or other remote desktops. The number of problems you can solve with them are endless, e.g., communicating with bind-shell on webserver behind restricted DMZ. Beware, live demo and fun included!]]>
Sat, 09 Aug 2014 11:04:11 GMT /slideshow/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds/37829226 bz98@slideshare.net(bz98) DEFCON 22: Bypass firewalls, application white lists, secure remote desktops in 20 seconds bz98 In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is. Imagine a scenario, where you have deployed a malware on a users workstation, but the target information is on a secure server accessed via two-factor authentication, with screen access only (e.g. RDP, Citrix, etc.). On top of that, the server runs application white-listing, and only the inbound port to the screen server (e.g. 3389) is allowed through the hardware firewall. But you also need persistent interactive C&C communication (e.g. Netcat, Meterpreter, RAT) to this server through the users workstation. I developed (and will publish) two tools that help you in these situations. The first tool can drop malware to the server through the screen while the user is logged in. The second tool can help you to circumvent the hardware firewall after we can execute code on the server with admin privileges (using a signed kernel driver). My tools are generic meaning that they work against Windows server 2012 and Windows 8, and they work with RDP or other remote desktops. The number of problems you can solve with them are endless, e.g., communicating with bind-shell on webserver behind restricted DMZ. Beware, live demo and fun included! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/highsechackredact-140809110411-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is. Imagine a scenario, where you have deployed a malware on a users workstation, but the target information is on a secure server accessed via two-factor authentication, with screen access only (e.g. RDP, Citrix, etc.). On top of that, the server runs application white-listing, and only the inbound port to the screen server (e.g. 3389) is allowed through the hardware firewall. But you also need persistent interactive C&amp;C communication (e.g. Netcat, Meterpreter, RAT) to this server through the users workstation. I developed (and will publish) two tools that help you in these situations. The first tool can drop malware to the server through the screen while the user is logged in. The second tool can help you to circumvent the hardware firewall after we can execute code on the server with admin privileges (using a signed kernel driver). My tools are generic meaning that they work against Windows server 2012 and Windows 8, and they work with RDP or other remote desktops. The number of problems you can solve with them are endless, e.g., communicating with bind-shell on webserver behind restricted DMZ. Beware, live demo and fun included!
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops in 20 seconds from Zoltan Balazs
]]>
10195 5 https://cdn.slidesharecdn.com/ss_thumbnails/highsechackredact-140809110411-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hacking with Remote Admin Tools (RAT) /bz98/hacking-with-remote-admin-tools-rat rat-140114032008-phpapp02
This presentation is a fun introduction to the tools used by script kiddies, namely the Remote Admin Tools (or Remote Access Trojans). These GUI based hacking tools include a lot of funny and scary features. ]]>

This presentation is a fun introduction to the tools used by script kiddies, namely the Remote Admin Tools (or Remote Access Trojans). These GUI based hacking tools include a lot of funny and scary features. ]]>
Tue, 14 Jan 2014 03:20:08 GMT /bz98/hacking-with-remote-admin-tools-rat bz98@slideshare.net(bz98) Hacking with Remote Admin Tools (RAT) bz98 This presentation is a fun introduction to the tools used by script kiddies, namely the Remote Admin Tools (or Remote Access Trojans). These GUI based hacking tools include a lot of funny and scary features. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rat-140114032008-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation is a fun introduction to the tools used by script kiddies, namely the Remote Admin Tools (or Remote Access Trojans). These GUI based hacking tools include a lot of funny and scary features.
Hacking with Remote Admin Tools (RAT) from Zoltan Balazs
]]>
49826 7 https://cdn.slidesharecdn.com/ss_thumbnails/rat-140114032008-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
[ENG] Hacktivity 2013 - Alice in eXploitland /slideshow/alice-in-exploitland/27357306 exploitland-131019060054-phpapp02
[ENG] Hacktivity 2013 - Alice in eXploitland - attack and defense evolution]]>

[ENG] Hacktivity 2013 - Alice in eXploitland - attack and defense evolution]]>
Sat, 19 Oct 2013 06:00:54 GMT /slideshow/alice-in-exploitland/27357306 bz98@slideshare.net(bz98) [ENG] Hacktivity 2013 - Alice in eXploitland bz98 [ENG] Hacktivity 2013 - Alice in eXploitland - attack and defense evolution <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/exploitland-131019060054-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> [ENG] Hacktivity 2013 - Alice in eXploitland - attack and defense evolution
[ENG] Hacktivity 2013 - Alice in eXploitland from Zoltan Balazs
]]>
1409 5 https://cdn.slidesharecdn.com/ss_thumbnails/exploitland-131019060054-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - /slideshow/ohm2013-eng-the-quest-for-the-clientside-elixir-against-zombie-browsers/25633632 ohmquest-130827053519-phpapp01
]]>

]]>
Tue, 27 Aug 2013 05:35:19 GMT /slideshow/ohm2013-eng-the-quest-for-the-clientside-elixir-against-zombie-browsers/25633632 bz98@slideshare.net(bz98) [ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - bz98 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ohmquest-130827053519-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - from Zoltan Balazs
]]>
5082 8 https://cdn.slidesharecdn.com/ss_thumbnails/ohmquest-130827053519-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
[HUN] V辿dtelen b旦ng辿szk - Ethical Hacking /bz98/vdtelen-bngszk-ethical-hacking sablonzombituzrokareloaded-130511045009-phpapp01
]]>

]]>
Sat, 11 May 2013 04:50:09 GMT /bz98/vdtelen-bngszk-ethical-hacking bz98@slideshare.net(bz98) [HUN] V辿dtelen b旦ng辿szk - Ethical Hacking bz98 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sablonzombituzrokareloaded-130511045009-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
[HUN] Vdtelen bngsz - Ethical Hacking from Zoltan Balazs
]]>
1009 3 https://cdn.slidesharecdn.com/ss_thumbnails/sablonzombituzrokareloaded-130511045009-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions /slideshow/hacker-halted-2012-zombie-browsers-spiced-with-rootkit-extensions/15079953 hhonlyfinal-121108030835-phpapp01
]]>

]]>
Thu, 08 Nov 2012 02:55:12 GMT /slideshow/hacker-halted-2012-zombie-browsers-spiced-with-rootkit-extensions/15079953 bz98@slideshare.net(bz98) [ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions bz98 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hhonlyfinal-121108030835-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions from Zoltan Balazs
]]>
792 3 https://cdn.slidesharecdn.com/ss_thumbnails/hhonlyfinal-121108030835-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-bz98-48x48.jpg?cb=1712739758 A non exhaustive list of technologies, programming languages, frameworks, operating systems, programs I have played with in my life: ASP, Acunetix, Aircrack-ng, Apache, Assembly, Autopsy, AWS EC2, Bash, Batch, Burp, C, C#, C++, Cain, CouchDB, Cygwin, CSS, Debian, Dsniff, Eclipse, Ettercap, Flash, Foremost, Git, Google Apps, GPG, Haskell, HTML, IDA, Immunity debugger, Iodine, JAD, Java, Javascript, John the ripper, jQuery, JSP, Kismet, Mathematica, Matlab, Metasploit, Mimikatz, Miredo, MySQL, NASM, Ncat, Nessus, Netbeans, Nikto, Nmap, NoSQL, OCLhashcat, Ollydbg, OS X, Pascal, Perl, PHP, PL/SQL, Powershell, Prolog, Python, R, Rails, Ruby, SML, SOAP, SQL, SQLMap, SSLStrip, Stunnel, Subversi JumpESPjump.blogspot.com https://cdn.slidesharecdn.com/ss_thumbnails/ethmeetupv2-240410090359-6036fe82-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/hackersuli-privacy-on-the-blockchain/267192589 [ Hackersuli ] Privacy... https://cdn.slidesharecdn.com/ss_thumbnails/hitbmlsecnewtemplate-230102100433-36419e22-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/mlsec-2020/255105952 MLSEC 2020 https://cdn.slidesharecdn.com/ss_thumbnails/hitbzoltanbalazsweb3scams-220830142847-ec0e1118-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/web3-scams-its-a-match/252762610 Web3 + scams = It&#39;s a ...