際際滷shows by User: pprathan / http://www.slideshare.net/images/logo.gif 際際滷shows by User: pprathan / Wed, 29 Jan 2020 15:49:53 GMT 際際滷Share feed for 際際滷shows by User: pprathan Mobile Defense-in-Dev (Depth) /pprathan/mobile-defenseindev-depth mobileconf19-200129154953
Due to the fast-growing on mobile application trends along with business competition, the lack of security concern on mobile development become critical issues which may lead to reputation damage, financial loss and non-compliance (e.g. Privacy and Cybersecurity laws). It's time to focus on Mobile Defense-in-Dev(Depth) !! The talk will provide the real-world case-studies on mobile application threats in conjunction with the cybersecurity risk mitigation using Secure development standard and guideline which should be integrated into the development process.]]>

Due to the fast-growing on mobile application trends along with business competition, the lack of security concern on mobile development become critical issues which may lead to reputation damage, financial loss and non-compliance (e.g. Privacy and Cybersecurity laws). It's time to focus on Mobile Defense-in-Dev(Depth) !! The talk will provide the real-world case-studies on mobile application threats in conjunction with the cybersecurity risk mitigation using Secure development standard and guideline which should be integrated into the development process.]]>
Wed, 29 Jan 2020 15:49:53 GMT /pprathan/mobile-defenseindev-depth pprathan@slideshare.net(pprathan) Mobile Defense-in-Dev (Depth) pprathan Due to the fast-growing on mobile application trends along with business competition, the lack of security concern on mobile development become critical issues which may lead to reputation damage, financial loss and non-compliance (e.g. Privacy and Cybersecurity laws). It's time to focus on Mobile Defense-in-Dev(Depth) !! The talk will provide the real-world case-studies on mobile application threats in conjunction with the cybersecurity risk mitigation using Secure development standard and guideline which should be integrated into the development process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobileconf19-200129154953-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Due to the fast-growing on mobile application trends along with business competition, the lack of security concern on mobile development become critical issues which may lead to reputation damage, financial loss and non-compliance (e.g. Privacy and Cybersecurity laws). It&#39;s time to focus on Mobile Defense-in-Dev(Depth) !! The talk will provide the real-world case-studies on mobile application threats in conjunction with the cybersecurity risk mitigation using Secure development standard and guideline which should be integrated into the development process.
Mobile Defense-in-Dev (Depth) from Prathan Phongthiproek
]]>
182 0 https://cdn.slidesharecdn.com/ss_thumbnails/mobileconf19-200129154953-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The CARzyPire - Another Red Team Operation /slideshow/the-carzypire-another-red-team-operation/153996192 carzypire-190706150602
Raspberry Pi Zero W + Crazyradio PA + PowerShell Empire in the Radio-controlled car !!]]>

Raspberry Pi Zero W + Crazyradio PA + PowerShell Empire in the Radio-controlled car !!]]>
Sat, 06 Jul 2019 15:06:02 GMT /slideshow/the-carzypire-another-red-team-operation/153996192 pprathan@slideshare.net(pprathan) The CARzyPire - Another Red Team Operation pprathan Raspberry Pi Zero W + Crazyradio PA + PowerShell Empire in the Radio-controlled car !! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/carzypire-190706150602-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Raspberry Pi Zero W + Crazyradio PA + PowerShell Empire in the Radio-controlled car !!
The CARzyPire - Another Red Team Operation from Prathan Phongthiproek
]]>
212 1 https://cdn.slidesharecdn.com/ss_thumbnails/carzypire-190706150602-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Kill Chain: Web Application Exploitation /slideshow/cyber-kill-chain-web-application-exploitation-150923832/150923832 cyberkillchain-webapp-190620164702
Ex Sec: Exploitation on Web application (Beginner Level)]]>

Ex Sec: Exploitation on Web application (Beginner Level)]]>
Thu, 20 Jun 2019 16:47:02 GMT /slideshow/cyber-kill-chain-web-application-exploitation-150923832/150923832 pprathan@slideshare.net(pprathan) Cyber Kill Chain: Web Application Exploitation pprathan Ex Sec: Exploitation on Web application (Beginner Level) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberkillchain-webapp-190620164702-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ex Sec: Exploitation on Web application (Beginner Level)
Cyber Kill Chain: Web Application Exploitation from Prathan Phongthiproek
]]>
735 4 https://cdn.slidesharecdn.com/ss_thumbnails/cyberkillchain-webapp-190620164702-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mobile App Hacking In A Nutshell /slideshow/mobile-app-hacking-in-a-nutshell/111488672 mobileconf18-180825125803
The session will provide the risk of insecure mobile application development in various types with demonstration; Client-side, Communication channel and Server side. The presentation includes case study of insecure development practice which lead attacker to abuse the vulnerable application (e.g. Coin/Gem cheating on gaming app, Bypassing security control on client-side and server-side).]]>

The session will provide the risk of insecure mobile application development in various types with demonstration; Client-side, Communication channel and Server side. The presentation includes case study of insecure development practice which lead attacker to abuse the vulnerable application (e.g. Coin/Gem cheating on gaming app, Bypassing security control on client-side and server-side).]]>
Sat, 25 Aug 2018 12:58:03 GMT /slideshow/mobile-app-hacking-in-a-nutshell/111488672 pprathan@slideshare.net(pprathan) Mobile App Hacking In A Nutshell pprathan The session will provide the risk of insecure mobile application development in various types with demonstration; Client-side, Communication channel and Server side. The presentation includes case study of insecure development practice which lead attacker to abuse the vulnerable application (e.g. Coin/Gem cheating on gaming app, Bypassing security control on client-side and server-side). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobileconf18-180825125803-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The session will provide the risk of insecure mobile application development in various types with demonstration; Client-side, Communication channel and Server side. The presentation includes case study of insecure development practice which lead attacker to abuse the vulnerable application (e.g. Coin/Gem cheating on gaming app, Bypassing security control on client-side and server-side).
Mobile App Hacking In A Nutshell from Prathan Phongthiproek
]]>
238 2 https://cdn.slidesharecdn.com/ss_thumbnails/mobileconf18-180825125803-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Jump-Start The MASVS /slideshow/jumpstart-the-masvs/111488497 missconf-180825125415
OWASP - Mobile application security verification standard ]]>

OWASP - Mobile application security verification standard ]]>
Sat, 25 Aug 2018 12:54:15 GMT /slideshow/jumpstart-the-masvs/111488497 pprathan@slideshare.net(pprathan) Jump-Start The MASVS pprathan OWASP - Mobile application security verification standard <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/missconf-180825125415-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> OWASP - Mobile application security verification standard
Jump-Start The MASVS from Prathan Phongthiproek
]]>
388 2 https://cdn.slidesharecdn.com/ss_thumbnails/missconf-180825125415-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OWASP Mobile Top 10 Deep-Dive /slideshow/owasp-mobile-top-10-deepdive/107678902 owasptop10new-180727040629
The presentation contains the OWASP Mobile Top 10 2016 information including case study and remediation measures.]]>

The presentation contains the OWASP Mobile Top 10 2016 information including case study and remediation measures.]]>
Fri, 27 Jul 2018 04:06:29 GMT /slideshow/owasp-mobile-top-10-deepdive/107678902 pprathan@slideshare.net(pprathan) OWASP Mobile Top 10 Deep-Dive pprathan The presentation contains the OWASP Mobile Top 10 2016 information including case study and remediation measures. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owasptop10new-180727040629-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The presentation contains the OWASP Mobile Top 10 2016 information including case study and remediation measures.
OWASP Mobile Top 10 Deep-Dive from Prathan Phongthiproek
]]>
1453 4 https://cdn.slidesharecdn.com/ss_thumbnails/owasptop10new-180727040629-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Hookshot: Runtime Exploitation /slideshow/the-hookshot-runtime-exploitation/80326318 redpill17-171001032956
TL;DR Motivation Dynamic binary instrumentation FRIDA DBI without rooting / jailbreaking Unleash the power of Frida Case study for runtime exploitation Countermeasure References]]>

TL;DR Motivation Dynamic binary instrumentation FRIDA DBI without rooting / jailbreaking Unleash the power of Frida Case study for runtime exploitation Countermeasure References]]>
Sun, 01 Oct 2017 03:29:56 GMT /slideshow/the-hookshot-runtime-exploitation/80326318 pprathan@slideshare.net(pprathan) The Hookshot: Runtime Exploitation pprathan TL;DR Motivation Dynamic binary instrumentation FRIDA DBI without rooting / jailbreaking Unleash the power of Frida Case study for runtime exploitation Countermeasure References <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/redpill17-171001032956-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> TL;DR Motivation Dynamic binary instrumentation FRIDA DBI without rooting / jailbreaking Unleash the power of Frida Case study for runtime exploitation Countermeasure References
The Hookshot: Runtime Exploitation from Prathan Phongthiproek
]]>
1439 4 https://cdn.slidesharecdn.com/ss_thumbnails/redpill17-171001032956-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding ransomware /slideshow/understanding-ransomware-76853937/76853937 understandingransomware-170612050649
Understanding ransomware and Key lessons from WannCry]]>

Understanding ransomware and Key lessons from WannCry]]>
Mon, 12 Jun 2017 05:06:49 GMT /slideshow/understanding-ransomware-76853937/76853937 pprathan@slideshare.net(pprathan) Understanding ransomware pprathan Understanding ransomware and Key lessons from WannCry <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/understandingransomware-170612050649-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Understanding ransomware and Key lessons from WannCry
Understanding ransomware from Prathan Phongthiproek
]]>
376 4 https://cdn.slidesharecdn.com/ss_thumbnails/understandingransomware-170612050649-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OWASP Day - OWASP Day - Lets secure! /slideshow/owasp-day-owasp-day-lets-secure/68800330 owasptop10-2016-161113033853
OWASP Day - Lets secure! ]]>

OWASP Day - Lets secure! ]]>
Sun, 13 Nov 2016 03:38:53 GMT /slideshow/owasp-day-owasp-day-lets-secure/68800330 pprathan@slideshare.net(pprathan) OWASP Day - OWASP Day - Lets secure! pprathan OWASP Day - Lets secure! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owasptop10-2016-161113033853-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! from Prathan Phongthiproek
]]>
1800 4 https://cdn.slidesharecdn.com/ss_thumbnails/owasptop10-2016-161113033853-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Don't Trust, And Verify - Mobile Application Attacks /slideshow/dont-trust-and-verify-mobile-application-attacks/67572608 cdic2016-mobileattackpdf-161024092504
Don't Trust, And Verify - Mobile Application Attacks]]>

Don't Trust, And Verify - Mobile Application Attacks]]>
Mon, 24 Oct 2016 09:25:04 GMT /slideshow/dont-trust-and-verify-mobile-application-attacks/67572608 pprathan@slideshare.net(pprathan) Don't Trust, And Verify - Mobile Application Attacks pprathan Don't Trust, And Verify - Mobile Application Attacks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cdic2016-mobileattackpdf-161024092504-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Don&#39;t Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks from Prathan Phongthiproek
]]>
382 4 https://cdn.slidesharecdn.com/ss_thumbnails/cdic2016-mobileattackpdf-161024092504-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Owasp Top 10 Mobile Risks /slideshow/owasp-top-10-mobile-risks-58738796/58738796 owaspmobiletop10-160226040555
OWASP Top 10 Mobile Risks]]>

OWASP Top 10 Mobile Risks]]>
Fri, 26 Feb 2016 04:05:55 GMT /slideshow/owasp-top-10-mobile-risks-58738796/58738796 pprathan@slideshare.net(pprathan) Owasp Top 10 Mobile Risks pprathan OWASP Top 10 Mobile Risks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owaspmobiletop10-160226040555-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> OWASP Top 10 Mobile Risks
Owasp Top 10 Mobile Risks from Prathan Phongthiproek
]]>
2789 6 https://cdn.slidesharecdn.com/ss_thumbnails/owaspmobiletop10-160226040555-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Point-Of-Sale Hacking - 2600Thailand#20 /slideshow/pointofsale-hacking-2600thailand20/51391667 poshacking-150807161608-lva1-app6891
POS Hacking at 2600TH]]>

POS Hacking at 2600TH]]>
Fri, 07 Aug 2015 16:16:08 GMT /slideshow/pointofsale-hacking-2600thailand20/51391667 pprathan@slideshare.net(pprathan) Point-Of-Sale Hacking - 2600Thailand#20 pprathan POS Hacking at 2600TH <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/poshacking-150807161608-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> POS Hacking at 2600TH
Point-Of-Sale Hacking - 2600Thailand#20 from Prathan Phongthiproek
]]>
1476 5 https://cdn.slidesharecdn.com/ss_thumbnails/poshacking-150807161608-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OWASP Thailand-Beyond the Penetration Testing /slideshow/beyond-pentest/39479068 i6mpo0jqqrsjlxogdqme-signature-78cd823d92df3cc95e42bce296e9aa048143e6d00572e9a096b3f35deb44712e-poli-140924101215-phpapp01
]]>

]]>
Wed, 24 Sep 2014 10:12:15 GMT /slideshow/beyond-pentest/39479068 pprathan@slideshare.net(pprathan) OWASP Thailand-Beyond the Penetration Testing pprathan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/i6mpo0jqqrsjlxogdqme-signature-78cd823d92df3cc95e42bce296e9aa048143e6d00572e9a096b3f35deb44712e-poli-140924101215-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
OWASP Thailand-Beyond the Penetration Testing from Prathan Phongthiproek
]]>
1474 6 https://cdn.slidesharecdn.com/ss_thumbnails/i6mpo0jqqrsjlxogdqme-signature-78cd823d92df3cc95e42bce296e9aa048143e6d00572e9a096b3f35deb44712e-poli-140924101215-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mobile Application Pentest [Fast-Track] /slideshow/mobile-application-pentest-fasttrack-35167816/35167816 mobile1337-140527083940-phpapp02
]]>

]]>
Tue, 27 May 2014 08:39:40 GMT /slideshow/mobile-application-pentest-fasttrack-35167816/35167816 pprathan@slideshare.net(pprathan) Mobile Application Pentest [Fast-Track] pprathan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobile1337-140527083940-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Mobile Application Pentest [Fast-Track] from Prathan Phongthiproek
]]>
3947 6 https://cdn.slidesharecdn.com/ss_thumbnails/mobile1337-140527083940-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hack and Slash: Secure Coding /slideshow/hack-and-slash-secure-coding/22720388 owasp2600final-130609214636-phpapp01
OWASP and 2600 Thailand]]>

OWASP and 2600 Thailand]]>
Sun, 09 Jun 2013 21:46:36 GMT /slideshow/hack-and-slash-secure-coding/22720388 pprathan@slideshare.net(pprathan) Hack and Slash: Secure Coding pprathan OWASP and 2600 Thailand <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/owasp2600final-130609214636-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> OWASP and 2600 Thailand
Hack and Slash: Secure Coding from Prathan Phongthiproek
]]>
4511 5 https://cdn.slidesharecdn.com/ss_thumbnails/owasp2600final-130609214636-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CDIC 2013-Mobile Application Pentest Workshop /pprathan/cdic-2013mobile-application-pentest-workshop cdic2013mobile-130301224851-phpapp01
]]>

]]>
Fri, 01 Mar 2013 22:48:51 GMT /pprathan/cdic-2013mobile-application-pentest-workshop pprathan@slideshare.net(pprathan) CDIC 2013-Mobile Application Pentest Workshop pprathan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cdic2013mobile-130301224851-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
CDIC 2013-Mobile Application Pentest Workshop from Prathan Phongthiproek
]]>
1991 6 https://cdn.slidesharecdn.com/ss_thumbnails/cdic2013mobile-130301224851-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Application Firewall: Suckseed or Succeed /slideshow/web-application-firewall-suckseed-or-succeed/16302908 waf-130201223525-phpapp01
Breach WAF with advanced techniques]]>

Breach WAF with advanced techniques]]>
Fri, 01 Feb 2013 22:35:25 GMT /slideshow/web-application-firewall-suckseed-or-succeed/16302908 pprathan@slideshare.net(pprathan) Web Application Firewall: Suckseed or Succeed pprathan Breach WAF with advanced techniques <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/waf-130201223525-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Breach WAF with advanced techniques
Web Application Firewall: Suckseed or Succeed from Prathan Phongthiproek
]]>
8898 11 https://cdn.slidesharecdn.com/ss_thumbnails/waf-130201223525-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Layer8 exploitation: Lock'n Load Target /slideshow/layer8-exploitation-lockn-load-target/12208704 layer8exploitation-120329084344-phpapp01
]]>

]]>
Thu, 29 Mar 2012 08:43:42 GMT /slideshow/layer8-exploitation-lockn-load-target/12208704 pprathan@slideshare.net(pprathan) Layer8 exploitation: Lock'n Load Target pprathan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/layer8exploitation-120329084344-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Layer8 exploitation: Lock'n Load Target from Prathan Phongthiproek
]]>
574 2 https://cdn.slidesharecdn.com/ss_thumbnails/layer8exploitation-120329084344-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Advanced Malware Analysis /slideshow/advanced-malware/12208231 advancedmalware-120329081630-phpapp02
]]>

]]>
Thu, 29 Mar 2012 08:16:28 GMT /slideshow/advanced-malware/12208231 pprathan@slideshare.net(pprathan) Advanced Malware Analysis pprathan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/advancedmalware-120329081630-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Advanced Malware Analysis from Prathan Phongthiproek
]]>
1900 3 https://cdn.slidesharecdn.com/ss_thumbnails/advancedmalware-120329081630-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tisa mobile forensic /slideshow/tisa-mobile-forensic/12195651 tisamobileforensic-120328120346-phpapp01
IOS Forensic]]>

IOS Forensic]]>
Wed, 28 Mar 2012 12:03:43 GMT /slideshow/tisa-mobile-forensic/12195651 pprathan@slideshare.net(pprathan) Tisa mobile forensic pprathan IOS Forensic <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tisamobileforensic-120328120346-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IOS Forensic
Tisa mobile forensic from Prathan Phongthiproek
]]>
1204 4 https://cdn.slidesharecdn.com/ss_thumbnails/tisamobileforensic-120328120346-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-pprathan-48x48.jpg?cb=1711641332 This site is created to keep track of my activities and place holder for sharing. vimeo.com/prathan https://cdn.slidesharecdn.com/ss_thumbnails/mobileconf19-200129154953-thumbnail.jpg?width=320&height=320&fit=bounds pprathan/mobile-defenseindev-depth Mobile Defense-in-Dev ... https://cdn.slidesharecdn.com/ss_thumbnails/carzypire-190706150602-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-carzypire-another-red-team-operation/153996192 The CARzyPire - Anothe... https://cdn.slidesharecdn.com/ss_thumbnails/cyberkillchain-webapp-190620164702-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-kill-chain-web-application-exploitation-150923832/150923832 Cyber Kill Chain: Web ...