際際滷shows by User: difezza / http://www.slideshare.net/images/logo.gif 際際滷shows by User: difezza / Fri, 07 Aug 2015 12:04:11 GMT 際際滷Share feed for 際際滷shows by User: difezza The End of Anonymity on Anonymous Networks /slideshow/phdaysgarnaevamakrushin-150604084740lva1app6892/51383411 phdaysgarnaevamakrushin-150604084740-lva1-app6892-150807120411-lva1-app6892
The problem of user de-anonymization on the Darknet becomes more and more popular. The report will cover a variety of exploits for vulnerabilities in .onion resources and configuration flaws that can be utilized to obtain information on Tor users.]]>

The problem of user de-anonymization on the Darknet becomes more and more popular. The report will cover a variety of exploits for vulnerabilities in .onion resources and configuration flaws that can be utilized to obtain information on Tor users.]]>
Fri, 07 Aug 2015 12:04:11 GMT /slideshow/phdaysgarnaevamakrushin-150604084740lva1app6892/51383411 difezza@slideshare.net(difezza) The End of Anonymity on Anonymous Networks difezza The problem of user de-anonymization on the Darknet becomes more and more popular. The report will cover a variety of exploits for vulnerabilities in .onion resources and configuration flaws that can be utilized to obtain information on Tor users. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/phdaysgarnaevamakrushin-150604084740-lva1-app6892-150807120411-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The problem of user de-anonymization on the Darknet becomes more and more popular. The report will cover a variety of exploits for vulnerabilities in .onion resources and configuration flaws that can be utilized to obtain information on Tor users.
The End of Anonymity on Anonymous Networks from Denis Makrushin
]]>
990 7 https://cdn.slidesharecdn.com/ss_thumbnails/phdaysgarnaevamakrushin-150604084740-lva1-app6892-150807120411-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Parcomagic: Security analysis of public terminals /slideshow/parcomagic-security-analysis-of-public-terminals/41744244 parcomagic-141119034023-conversion-gate02
A video game called Watch Dogs offers a realistic view on our near future our surroundings filled to the brim with digital devices, machines which accept and dispense cash, and a variety of other connected things ridden with all sorts of vulnerabilities, which a hacker can exploit. In the game, the main character successfully compromises a video surveillance system using a smartphone, gaining the ability to conduct surveillance and obtain additional information. The games fans are divided: some say this is too dystopian taking a smartphone and hacking into everything around you. Others are somewhat skeptical, saying that things really arent that great and the game world is in many ways a reflection of real life. Below, we argue that devices in parks and other public spaces, which we often pass without giving them a second thought, may be vulnerable and therefore dangerous, at least for our personal finances. ZeroNights 2014 is an international conference dedicated to the practical side of information security.]]>

A video game called Watch Dogs offers a realistic view on our near future our surroundings filled to the brim with digital devices, machines which accept and dispense cash, and a variety of other connected things ridden with all sorts of vulnerabilities, which a hacker can exploit. In the game, the main character successfully compromises a video surveillance system using a smartphone, gaining the ability to conduct surveillance and obtain additional information. The games fans are divided: some say this is too dystopian taking a smartphone and hacking into everything around you. Others are somewhat skeptical, saying that things really arent that great and the game world is in many ways a reflection of real life. Below, we argue that devices in parks and other public spaces, which we often pass without giving them a second thought, may be vulnerable and therefore dangerous, at least for our personal finances. ZeroNights 2014 is an international conference dedicated to the practical side of information security.]]>
Wed, 19 Nov 2014 03:40:23 GMT /slideshow/parcomagic-security-analysis-of-public-terminals/41744244 difezza@slideshare.net(difezza) Parcomagic: Security analysis of public terminals difezza A video game called Watch Dogs offers a realistic view on our near future our surroundings filled to the brim with digital devices, machines which accept and dispense cash, and a variety of other connected things ridden with all sorts of vulnerabilities, which a hacker can exploit. In the game, the main character successfully compromises a video surveillance system using a smartphone, gaining the ability to conduct surveillance and obtain additional information. The games fans are divided: some say this is too dystopian taking a smartphone and hacking into everything around you. Others are somewhat skeptical, saying that things really arent that great and the game world is in many ways a reflection of real life. Below, we argue that devices in parks and other public spaces, which we often pass without giving them a second thought, may be vulnerable and therefore dangerous, at least for our personal finances. ZeroNights 2014 is an international conference dedicated to the practical side of information security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/parcomagic-141119034023-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A video game called Watch Dogs offers a realistic view on our near future our surroundings filled to the brim with digital devices, machines which accept and dispense cash, and a variety of other connected things ridden with all sorts of vulnerabilities, which a hacker can exploit. In the game, the main character successfully compromises a video surveillance system using a smartphone, gaining the ability to conduct surveillance and obtain additional information. The games fans are divided: some say this is too dystopian taking a smartphone and hacking into everything around you. Others are somewhat skeptical, saying that things really arent that great and the game world is in many ways a reflection of real life. Below, we argue that devices in parks and other public spaces, which we often pass without giving them a second thought, may be vulnerable and therefore dangerous, at least for our personal finances. ZeroNights 2014 is an international conference dedicated to the practical side of information security.
Parcomagic: Security analysis of public terminals from Denis Makrushin
]]>
667 2 https://cdn.slidesharecdn.com/ss_thumbnails/parcomagic-141119034023-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Domnatio ad bestias: Crowd-filter as a panacea for DDoS (PHDays 2014) /slideshow/domnatio-ad-bestias-crowdfilter-as-a-panacea-for-ddos-phdays-2014/35645267 phdays2014makrushin-140609060152-phpapp01
Author: Denis Makrushin Positive Hack Days 2014 http://defec.ru/ http://twitter.com/difezza]]>

Author: Denis Makrushin Positive Hack Days 2014 http://defec.ru/ http://twitter.com/difezza]]>
Mon, 09 Jun 2014 06:01:52 GMT /slideshow/domnatio-ad-bestias-crowdfilter-as-a-panacea-for-ddos-phdays-2014/35645267 difezza@slideshare.net(difezza) Domnatio ad bestias: Crowd-filter as a panacea for DDoS (PHDays 2014) difezza Author: Denis Makrushin Positive Hack Days 2014 http://defec.ru/ http://twitter.com/difezza <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/phdays2014makrushin-140609060152-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Author: Denis Makrushin Positive Hack Days 2014 http://defec.ru/ http://twitter.com/difezza
Domnatio ad bestias: Crowd-filter as a panacea for DDoS (PHDays 2014) from Denis Makrushin
]]>
288 2 https://cdn.slidesharecdn.com/ss_thumbnails/phdays2014makrushin-140609060152-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web under pressure: DDoS as a Service /slideshow/web-under-pressure/28188191 webunderpressuremakrushin-131113010249-phpapp02
Any web project has one important efficiency metric: maximum load. This talk will utilize a nontrivial look at stress testing services: we will see how a harmless instrument can be turned into a DDoS tool.]]>

Any web project has one important efficiency metric: maximum load. This talk will utilize a nontrivial look at stress testing services: we will see how a harmless instrument can be turned into a DDoS tool.]]>
Wed, 13 Nov 2013 01:02:49 GMT /slideshow/web-under-pressure/28188191 difezza@slideshare.net(difezza) Web under pressure: DDoS as a Service difezza Any web project has one important efficiency metric: maximum load. This talk will utilize a nontrivial look at stress testing services: we will see how a harmless instrument can be turned into a DDoS tool. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webunderpressuremakrushin-131113010249-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Any web project has one important efficiency metric: maximum load. This talk will utilize a nontrivial look at stress testing services: we will see how a harmless instrument can be turned into a DDoS tool.
Web under pressure: DDoS as a Service from Denis Makrushin
]]>
11737 5 https://cdn.slidesharecdn.com/ss_thumbnails/webunderpressuremakrushin-131113010249-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
舒亞亰仂仆仂亠 亠亳仂于舒仆亳亠 亳仆仂仄舒亳仂仆仆 亳亠仄 /slideshow/ss-13514074/13514074 makrushindnphdays-120702045120-phpapp01
Author: Denis Makrushin Positive Hack Days 2012 http://defec.ru/ http://cload.ru]]>

Author: Denis Makrushin Positive Hack Days 2012 http://defec.ru/ http://cload.ru]]>
Mon, 02 Jul 2012 04:51:17 GMT /slideshow/ss-13514074/13514074 difezza@slideshare.net(difezza) 舒亞亰仂仆仂亠 亠亳仂于舒仆亳亠 亳仆仂仄舒亳仂仆仆 亳亠仄 difezza Author: Denis Makrushin Positive Hack Days 2012 http://defec.ru/ http://cload.ru <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/makrushindnphdays-120702045120-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Author: Denis Makrushin Positive Hack Days 2012 http://defec.ru/ http://cload.ru
舒亞亰仂仆仂亠 亠亳仂于舒仆亳亠 亳仆仂仄舒亳仂仆仆 亳亠仄 from Denis Makrushin
]]>
2932 4 https://cdn.slidesharecdn.com/ss_thumbnails/makrushindnphdays-120702045120-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png makrushin.com https://cdn.slidesharecdn.com/ss_thumbnails/phdaysgarnaevamakrushin-150604084740-lva1-app6892-150807120411-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/phdaysgarnaevamakrushin-150604084740lva1app6892/51383411 The End of Anonymity o... https://cdn.slidesharecdn.com/ss_thumbnails/parcomagic-141119034023-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/parcomagic-security-analysis-of-public-terminals/41744244 Parcomagic: Security a... https://cdn.slidesharecdn.com/ss_thumbnails/phdays2014makrushin-140609060152-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/domnatio-ad-bestias-crowdfilter-as-a-panacea-for-ddos-phdays-2014/35645267 Domnatio ad bestias: C...