際際滷shows by User: kost / http://www.slideshare.net/images/logo.gif 際際滷shows by User: kost / Fri, 08 May 2015 05:20:50 GMT 際際滷Share feed for 際際滷shows by User: kost Porting your favourite cmdline tool to Android /slideshow/android-porting-47896523/47896523 androidporting-150508052050-lva1-app6891
Porting to Android - Porting your favourite cmdline tool to Android]]>

Porting to Android - Porting your favourite cmdline tool to Android]]>
Fri, 08 May 2015 05:20:50 GMT /slideshow/android-porting-47896523/47896523 kost@slideshare.net(kost) Porting your favourite cmdline tool to Android kost Porting to Android - Porting your favourite cmdline tool to Android <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/androidporting-150508052050-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Porting to Android - Porting your favourite cmdline tool to Android
Porting your favourite cmdline tool to Android from Vlatko Kosturjak
]]>
1318 1 https://cdn.slidesharecdn.com/ss_thumbnails/androidporting-150508052050-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Getting access to Lantronix devices: exploring treasures of 77FEh at Confidence 2014 /slideshow/vk-exploringtreasuresof77-fehlantronixconfidence2014/35299407 vk-exploring-treasures-of-77feh-lantronix-confidence-2014-140530063724-phpapp01
Presentation presented at Confidence 2014 - Getting access to Lantronix devices: exploring treasures of 77FEh at Confidence 2014]]>

Presentation presented at Confidence 2014 - Getting access to Lantronix devices: exploring treasures of 77FEh at Confidence 2014]]>
Fri, 30 May 2014 06:37:24 GMT /slideshow/vk-exploringtreasuresof77-fehlantronixconfidence2014/35299407 kost@slideshare.net(kost) Getting access to Lantronix devices: exploring treasures of 77FEh at Confidence 2014 kost Presentation presented at Confidence 2014 - Getting access to Lantronix devices: exploring treasures of 77FEh at Confidence 2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vk-exploring-treasures-of-77feh-lantronix-confidence-2014-140530063724-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation presented at Confidence 2014 - Getting access to Lantronix devices: exploring treasures of 77FEh at Confidence 2014
Getting access to Lantronix devices: exploring treasures of 77FEh at Confidence 2014 from Vlatko Kosturjak
]]>
5619 9 https://cdn.slidesharecdn.com/ss_thumbnails/vk-exploring-treasures-of-77feh-lantronix-confidence-2014-140530063724-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cryptography implementation weaknesses: based on true story /slideshow/fsec-2013cryptoimplementationsweaknesses/26427681 fsec-2013-crypto-implementations-weaknesses-130922063744-phpapp02
Cryptography implementation weaknesses: based on true story. It is story about Cisco password type 4 which was introduced recently. It supposed to be better than Cisco password type 5 (MD5), but due to implementation weaknesses, it ended up the other way... ]]>

Cryptography implementation weaknesses: based on true story. It is story about Cisco password type 4 which was introduced recently. It supposed to be better than Cisco password type 5 (MD5), but due to implementation weaknesses, it ended up the other way... ]]>
Sun, 22 Sep 2013 06:37:44 GMT /slideshow/fsec-2013cryptoimplementationsweaknesses/26427681 kost@slideshare.net(kost) Cryptography implementation weaknesses: based on true story kost Cryptography implementation weaknesses: based on true story. It is story about Cisco password type 4 which was introduced recently. It supposed to be better than Cisco password type 5 (MD5), but due to implementation weaknesses, it ended up the other way... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fsec-2013-crypto-implementations-weaknesses-130922063744-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cryptography implementation weaknesses: based on true story. It is story about Cisco password type 4 which was introduced recently. It supposed to be better than Cisco password type 5 (MD5), but due to implementation weaknesses, it ended up the other way...
Cryptography implementation weaknesses: based on true story from Vlatko Kosturjak
]]>
10120 6 https://cdn.slidesharecdn.com/ss_thumbnails/fsec-2013-crypto-implementations-weaknesses-130922063744-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wonderful world of (distributed) SCM or VCS /slideshow/wonderful-world-of-distributed-scm-or-vcs/25977947 balccon-2013-wonderful-world-of-distributed-scm-130907025425-
Talk given on BalCCon 2013 by Vlatko Kosturjak: Wonderful world of (distributed) SCM or VCS. Ripping and extracting useful info from CVS, Subversion (SVN) and GIT repositories publicly exposed on the web. ]]>

Talk given on BalCCon 2013 by Vlatko Kosturjak: Wonderful world of (distributed) SCM or VCS. Ripping and extracting useful info from CVS, Subversion (SVN) and GIT repositories publicly exposed on the web. ]]>
Sat, 07 Sep 2013 02:54:25 GMT /slideshow/wonderful-world-of-distributed-scm-or-vcs/25977947 kost@slideshare.net(kost) Wonderful world of (distributed) SCM or VCS kost Talk given on BalCCon 2013 by Vlatko Kosturjak: Wonderful world of (distributed) SCM or VCS. Ripping and extracting useful info from CVS, Subversion (SVN) and GIT repositories publicly exposed on the web. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/balccon-2013-wonderful-world-of-distributed-scm-130907025425--thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talk given on BalCCon 2013 by Vlatko Kosturjak: Wonderful world of (distributed) SCM or VCS. Ripping and extracting useful info from CVS, Subversion (SVN) and GIT repositories publicly exposed on the web.
Wonderful world of (distributed) SCM or VCS from Vlatko Kosturjak
]]>
3848 6 https://cdn.slidesharecdn.com/ss_thumbnails/balccon-2013-wonderful-world-of-distributed-scm-130907025425--thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ripping web accessible .git files /kost/ripping-web-accessible-git-files rip-git-121104050644-phpapp01
Ripping web accessible .git files (or how to get the source when its not open source)]]>

Ripping web accessible .git files (or how to get the source when its not open source)]]>
Sun, 04 Nov 2012 05:06:40 GMT /kost/ripping-web-accessible-git-files kost@slideshare.net(kost) Ripping web accessible .git files kost Ripping web accessible .git files (or how to get the source when its not open source) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rip-git-121104050644-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ripping web accessible .git files (or how to get the source when its not open source)
Ripping web accessible .git files from Vlatko Kosturjak
]]>
2987 3 https://cdn.slidesharecdn.com/ss_thumbnails/rip-git-121104050644-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Perl Usage In Security and Penetration testing /slideshow/perl-usage-in-security-and-penetration-testing/423353 perlusageinpentestspub-1211522424553959-9
Held at Croatian Perl Workshop 2008 in Zagreb, 15th May 2008.]]>

Held at Croatian Perl Workshop 2008 in Zagreb, 15th May 2008.]]>
Thu, 22 May 2008 22:57:58 GMT /slideshow/perl-usage-in-security-and-penetration-testing/423353 kost@slideshare.net(kost) Perl Usage In Security and Penetration testing kost Held at Croatian Perl Workshop 2008 in Zagreb, 15th May 2008. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/perlusageinpentestspub-1211522424553959-9-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Held at Croatian Perl Workshop 2008 in Zagreb, 15th May 2008.
Perl Usage In Security and Penetration testing from Vlatko Kosturjak
]]>
3216 4 https://cdn.slidesharecdn.com/ss_thumbnails/perlusageinpentestspub-1211522424553959-9-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png Something kost.com.hr https://cdn.slidesharecdn.com/ss_thumbnails/androidporting-150508052050-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/android-porting-47896523/47896523 Porting your favourite... https://cdn.slidesharecdn.com/ss_thumbnails/vk-exploring-treasures-of-77feh-lantronix-confidence-2014-140530063724-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/vk-exploringtreasuresof77-fehlantronixconfidence2014/35299407 Getting access to Lant... https://cdn.slidesharecdn.com/ss_thumbnails/fsec-2013-crypto-implementations-weaknesses-130922063744-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/fsec-2013cryptoimplementationsweaknesses/26427681 Cryptography implement...