際際滷shows by User: iphonepentest / http://www.slideshare.net/images/logo.gif 際際滷shows by User: iphonepentest / Thu, 20 Nov 2014 06:51:48 GMT 際際滷Share feed for 際際滷shows by User: iphonepentest 44Con 2014: GreedyBTS - Hacking Adventures in GSM /slideshow/44con-2014-greedybts-hacking-adventures-in-gsm-41802508/41802508 44con-greedybts-141120065148-conversion-gate02
This presentation examines insecurities in the 2.5G GSM protocol and demonstrates GreedyBTS; a platform for fingerprinting and exploiting cellular devices, including interception of SMS and voice data.]]>

This presentation examines insecurities in the 2.5G GSM protocol and demonstrates GreedyBTS; a platform for fingerprinting and exploiting cellular devices, including interception of SMS and voice data.]]>
Thu, 20 Nov 2014 06:51:48 GMT /slideshow/44con-2014-greedybts-hacking-adventures-in-gsm-41802508/41802508 iphonepentest@slideshare.net(iphonepentest) 44Con 2014: GreedyBTS - Hacking Adventures in GSM iphonepentest This presentation examines insecurities in the 2.5G GSM protocol and demonstrates GreedyBTS; a platform for fingerprinting and exploiting cellular devices, including interception of SMS and voice data. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/44con-greedybts-141120065148-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation examines insecurities in the 2.5G GSM protocol and demonstrates GreedyBTS; a platform for fingerprinting and exploiting cellular devices, including interception of SMS and voice data.
44Con 2014: GreedyBTS - Hacking Adventures in GSM from iphonepentest
]]>
20343 7 https://cdn.slidesharecdn.com/ss_thumbnails/44con-greedybts-141120065148-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Breaking Secure Mobile Applications - Hack In The Box 2014 KL /slideshow/breaking-secure-mobile-applications-hack-in-the-box-2014-kl/40454538 hitb2014bsmav0-141019100815-conversion-gate02
Dominic Chell presents "Breaking Secure Mobile Applications" at Hack In The Box 2014. This presentation details common vulnerabilities that can be found in supposedly secure applications, including BYOD and MDM apps. It also provides an overview of the binary protections that can be implemented to complicate these types of attacks.]]>

Dominic Chell presents "Breaking Secure Mobile Applications" at Hack In The Box 2014. This presentation details common vulnerabilities that can be found in supposedly secure applications, including BYOD and MDM apps. It also provides an overview of the binary protections that can be implemented to complicate these types of attacks.]]>
Sun, 19 Oct 2014 10:08:15 GMT /slideshow/breaking-secure-mobile-applications-hack-in-the-box-2014-kl/40454538 iphonepentest@slideshare.net(iphonepentest) Breaking Secure Mobile Applications - Hack In The Box 2014 KL iphonepentest Dominic Chell presents "Breaking Secure Mobile Applications" at Hack In The Box 2014. This presentation details common vulnerabilities that can be found in supposedly secure applications, including BYOD and MDM apps. It also provides an overview of the binary protections that can be implemented to complicate these types of attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hitb2014bsmav0-141019100815-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Dominic Chell presents &quot;Breaking Secure Mobile Applications&quot; at Hack In The Box 2014. This presentation details common vulnerabilities that can be found in supposedly secure applications, including BYOD and MDM apps. It also provides an overview of the binary protections that can be implemented to complicate these types of attacks.
Breaking Secure Mobile Applications - Hack In The Box 2014 KL from iphonepentest
]]>
2007 5 https://cdn.slidesharecdn.com/ss_thumbnails/hitb2014bsmav0-141019100815-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
44cafe heart bleed /slideshow/44cafe-heart-bleed/34172655 44cafe-heartbleed-140501110015-phpapp02
]]>

]]>
Thu, 01 May 2014 11:00:15 GMT /slideshow/44cafe-heart-bleed/34172655 iphonepentest@slideshare.net(iphonepentest) 44cafe heart bleed iphonepentest <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/44cafe-heartbleed-140501110015-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
44cafe heart bleed from iphonepentest
]]>
11485 5 https://cdn.slidesharecdn.com/ss_thumbnails/44cafe-heartbleed-140501110015-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Practical Attacks Against Encrypted VoIP Communications /slideshow/practical-attacks-against-encrypted-voip/27454540 voipattacksfinal-131022100903-phpapp01
The slides from MDSec's presentation at HackInTheBox KUL 2013. The presentation describes attacks that can be used to deduce spoken conversations from encrypted VoIP communications. The presentation uses Skype as a case study.]]>

The slides from MDSec's presentation at HackInTheBox KUL 2013. The presentation describes attacks that can be used to deduce spoken conversations from encrypted VoIP communications. The presentation uses Skype as a case study.]]>
Tue, 22 Oct 2013 10:09:03 GMT /slideshow/practical-attacks-against-encrypted-voip/27454540 iphonepentest@slideshare.net(iphonepentest) Practical Attacks Against Encrypted VoIP Communications iphonepentest The slides from MDSec's presentation at HackInTheBox KUL 2013. The presentation describes attacks that can be used to deduce spoken conversations from encrypted VoIP communications. The presentation uses Skype as a case study. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/voipattacksfinal-131022100903-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The slides from MDSec&#39;s presentation at HackInTheBox KUL 2013. The presentation describes attacks that can be used to deduce spoken conversations from encrypted VoIP communications. The presentation uses Skype as a case study.
Practical Attacks Against Encrypted VoIP Communications from iphonepentest
]]>
8191 8 https://cdn.slidesharecdn.com/ss_thumbnails/voipattacksfinal-131022100903-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Beyond the OWASP Top 10 /slideshow/beyond-the-owasp-top-10/12254380 mdsec-beyondtheowasptop10-120402032750-phpapp01
Beyond the OWASP Top 10 - Presented at OWASP Ireland, March 2012]]>

Beyond the OWASP Top 10 - Presented at OWASP Ireland, March 2012]]>
Mon, 02 Apr 2012 03:27:48 GMT /slideshow/beyond-the-owasp-top-10/12254380 iphonepentest@slideshare.net(iphonepentest) Beyond the OWASP Top 10 iphonepentest Beyond the OWASP Top 10 - Presented at OWASP Ireland, March 2012 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mdsec-beyondtheowasptop10-120402032750-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Beyond the OWASP Top 10 - Presented at OWASP Ireland, March 2012
Beyond the OWASP Top 10 from iphonepentest
]]>
3481 5 https://cdn.slidesharecdn.com/ss_thumbnails/mdsec-beyondtheowasptop10-120402032750-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
iOS application (in)security /slideshow/ios-application-insecurity/12254282 iosapplicationinsecurity-final-120402031834-phpapp02
iOS Application (in)Security, presented at OWASP Ireland - Google]]>

iOS Application (in)Security, presented at OWASP Ireland - Google]]>
Mon, 02 Apr 2012 03:18:31 GMT /slideshow/ios-application-insecurity/12254282 iphonepentest@slideshare.net(iphonepentest) iOS application (in)security iphonepentest iOS Application (in)Security, presented at OWASP Ireland - Google <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iosapplicationinsecurity-final-120402031834-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> iOS Application (in)Security, presented at OWASP Ireland - Google
iOS application (in)security from iphonepentest
]]>
9125 5 https://cdn.slidesharecdn.com/ss_thumbnails/iosapplicationinsecurity-final-120402031834-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Evaluating iOS Applications /slideshow/evaluating-ios-applications/11390394 evaluatingiosapplications-120202124831-phpapp02
The MDSec "Evaluating iOS Applications" slides presented at OWASP Manchester in Feb 2012.]]>

The MDSec "Evaluating iOS Applications" slides presented at OWASP Manchester in Feb 2012.]]>
Thu, 02 Feb 2012 12:48:27 GMT /slideshow/evaluating-ios-applications/11390394 iphonepentest@slideshare.net(iphonepentest) Evaluating iOS Applications iphonepentest The MDSec "Evaluating iOS Applications" slides presented at OWASP Manchester in Feb 2012. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/evaluatingiosapplications-120202124831-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The MDSec &quot;Evaluating iOS Applications&quot; slides presented at OWASP Manchester in Feb 2012.
Evaluating iOS Applications from iphonepentest
]]>
6447 9 https://cdn.slidesharecdn.com/ss_thumbnails/evaluatingiosapplications-120202124831-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png www.mdsec.co.uk https://cdn.slidesharecdn.com/ss_thumbnails/44con-greedybts-141120065148-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/44con-2014-greedybts-hacking-adventures-in-gsm-41802508/41802508 44Con 2014: GreedyBTS ... https://cdn.slidesharecdn.com/ss_thumbnails/hitb2014bsmav0-141019100815-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/breaking-secure-mobile-applications-hack-in-the-box-2014-kl/40454538 Breaking Secure Mobile... https://cdn.slidesharecdn.com/ss_thumbnails/44cafe-heartbleed-140501110015-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/44cafe-heart-bleed/34172655 44cafe heart bleed