際際滷shows by User: rossja / http://www.slideshare.net/images/logo.gif 際際滷shows by User: rossja / Tue, 17 Jan 2017 18:16:17 GMT 際際滷Share feed for 際際滷shows by User: rossja Nodejs Security /slideshow/nodejs-security-71112461/71112461 nodejssecurity-nccformat-170117181617
An overview of the Node.JS platform from a security perspective. Offers guidance on how to secure node apps, as well as ways to test them as an infosec professional. Presented at Rochester Security Summit 2015.]]>

An overview of the Node.JS platform from a security perspective. Offers guidance on how to secure node apps, as well as ways to test them as an infosec professional. Presented at Rochester Security Summit 2015.]]>
Tue, 17 Jan 2017 18:16:17 GMT /slideshow/nodejs-security-71112461/71112461 rossja@slideshare.net(rossja) Nodejs Security rossja An overview of the Node.JS platform from a security perspective. Offers guidance on how to secure node apps, as well as ways to test them as an infosec professional. Presented at Rochester Security Summit 2015. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nodejssecurity-nccformat-170117181617-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An overview of the Node.JS platform from a security perspective. Offers guidance on how to secure node apps, as well as ways to test them as an infosec professional. Presented at Rochester Security Summit 2015.
Nodejs Security from Jason Ross
]]>
305 2 https://cdn.slidesharecdn.com/ss_thumbnails/nodejssecurity-nccformat-170117181617-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tizen Security /slideshow/tizen-security/71112362 tizenmanningrossv1-170117181248
Provides an overview of the Tizen operating system, with a focus on security elements thereon. Covers securing apps on the Tizen platform as well, and ways to test them as an infosec professional. Co-pesented at DerbyCon 2103 with Mark Manning.]]>

Provides an overview of the Tizen operating system, with a focus on security elements thereon. Covers securing apps on the Tizen platform as well, and ways to test them as an infosec professional. Co-pesented at DerbyCon 2103 with Mark Manning.]]>
Tue, 17 Jan 2017 18:12:48 GMT /slideshow/tizen-security/71112362 rossja@slideshare.net(rossja) Tizen Security rossja Provides an overview of the Tizen operating system, with a focus on security elements thereon. Covers securing apps on the Tizen platform as well, and ways to test them as an infosec professional. Co-pesented at DerbyCon 2103 with Mark Manning. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tizenmanningrossv1-170117181248-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Provides an overview of the Tizen operating system, with a focus on security elements thereon. Covers securing apps on the Tizen platform as well, and ways to test them as an infosec professional. Co-pesented at DerbyCon 2103 with Mark Manning.
Tizen Security from Jason Ross
]]>
754 2 https://cdn.slidesharecdn.com/ss_thumbnails/tizenmanningrossv1-170117181248-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AC2DM For Security /slideshow/ac2dm-for-security/71112212 c2dmitm-170117180854
Talks about Google's Cloud to Device (C2D at the time this was written in 2012 - now known as Google Cloud Messaging) technology, and ways it can be misconfigured.]]>

Talks about Google's Cloud to Device (C2D at the time this was written in 2012 - now known as Google Cloud Messaging) technology, and ways it can be misconfigured.]]>
Tue, 17 Jan 2017 18:08:53 GMT /slideshow/ac2dm-for-security/71112212 rossja@slideshare.net(rossja) AC2DM For Security rossja Talks about Google's Cloud to Device (C2D at the time this was written in 2012 - now known as Google Cloud Messaging) technology, and ways it can be misconfigured. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/c2dmitm-170117180854-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talks about Google&#39;s Cloud to Device (C2D at the time this was written in 2012 - now known as Google Cloud Messaging) technology, and ways it can be misconfigured.
AC2DM For Security from Jason Ross
]]>
205 2 https://cdn.slidesharecdn.com/ss_thumbnails/c2dmitm-170117180854-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android malware analysis /slideshow/android-malware-analysis-71109948/71109948 androidmalwareanalysis-170117171256
Discusses how to perform malware analysis on Android devices. Initially presented at BSidesDE 2011 (in a much more fun format), the version here is as-presented at Rochester Security Summit 2011.]]>

Discusses how to perform malware analysis on Android devices. Initially presented at BSidesDE 2011 (in a much more fun format), the version here is as-presented at Rochester Security Summit 2011.]]>
Tue, 17 Jan 2017 17:12:56 GMT /slideshow/android-malware-analysis-71109948/71109948 rossja@slideshare.net(rossja) Android malware analysis rossja Discusses how to perform malware analysis on Android devices. Initially presented at BSidesDE 2011 (in a much more fun format), the version here is as-presented at Rochester Security Summit 2011. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/androidmalwareanalysis-170117171256-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Discusses how to perform malware analysis on Android devices. Initially presented at BSidesDE 2011 (in a much more fun format), the version here is as-presented at Rochester Security Summit 2011.
Android malware analysis from Jason Ross
]]>
1507 4 https://cdn.slidesharecdn.com/ss_thumbnails/androidmalwareanalysis-170117171256-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Alice and Bob are Eff'd /slideshow/alice-and-bob-are-effd/71109822 aliceandbobareeffd-170117171010
A talk discussing the Mallory TCP/IP proxy tool written by folks at Intrepidus Group. The talk discusses how to use the tool effectively, as well as outlining some known problems with the tool and how to get around them. Presented at DEF CON Skytalks 2011.]]>

A talk discussing the Mallory TCP/IP proxy tool written by folks at Intrepidus Group. The talk discusses how to use the tool effectively, as well as outlining some known problems with the tool and how to get around them. Presented at DEF CON Skytalks 2011.]]>
Tue, 17 Jan 2017 17:10:10 GMT /slideshow/alice-and-bob-are-effd/71109822 rossja@slideshare.net(rossja) Alice and Bob are Eff'd rossja A talk discussing the Mallory TCP/IP proxy tool written by folks at Intrepidus Group. The talk discusses how to use the tool effectively, as well as outlining some known problems with the tool and how to get around them. Presented at DEF CON Skytalks 2011. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/aliceandbobareeffd-170117171010-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A talk discussing the Mallory TCP/IP proxy tool written by folks at Intrepidus Group. The talk discusses how to use the tool effectively, as well as outlining some known problems with the tool and how to get around them. Presented at DEF CON Skytalks 2011.
Alice and Bob are Eff'd from Jason Ross
]]>
133 2 https://cdn.slidesharecdn.com/ss_thumbnails/aliceandbobareeffd-170117171010-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WHOIS the Master /rossja/introducing-shonuff shonuff-170117170318
Presents a WHOIS database search engine tool I wrote to allow pentesters to access network information for specified targets. First presented at BSidesDE 2010]]>

Presents a WHOIS database search engine tool I wrote to allow pentesters to access network information for specified targets. First presented at BSidesDE 2010]]>
Tue, 17 Jan 2017 17:03:18 GMT /rossja/introducing-shonuff rossja@slideshare.net(rossja) WHOIS the Master rossja Presents a WHOIS database search engine tool I wrote to allow pentesters to access network information for specified targets. First presented at BSidesDE 2010 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/shonuff-170117170318-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presents a WHOIS database search engine tool I wrote to allow pentesters to access network information for specified targets. First presented at BSidesDE 2010
WHOIS the Master from Jason Ross
]]>
414 3 https://cdn.slidesharecdn.com/ss_thumbnails/shonuff-170117170318-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Malware Analysis For The Enterprise /slideshow/malware-analysis-awesomeedition/71109418 malwareanalysis-awesome-edition-170117170046
Covers building a malware analysis environment for enterprises that don't currently have a dedicated team for such purposes. Presented at Blackhat DC 2010.]]>

Covers building a malware analysis environment for enterprises that don't currently have a dedicated team for such purposes. Presented at Blackhat DC 2010.]]>
Tue, 17 Jan 2017 17:00:46 GMT /slideshow/malware-analysis-awesomeedition/71109418 rossja@slideshare.net(rossja) Malware Analysis For The Enterprise rossja Covers building a malware analysis environment for enterprises that don't currently have a dedicated team for such purposes. Presented at Blackhat DC 2010. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/malwareanalysis-awesome-edition-170117170046-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Covers building a malware analysis environment for enterprises that don&#39;t currently have a dedicated team for such purposes. Presented at Blackhat DC 2010.
Malware Analysis For The Enterprise from Jason Ross
]]>
346 9 https://cdn.slidesharecdn.com/ss_thumbnails/malwareanalysis-awesome-edition-170117170046-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Dev opsec killing-the_buzz /slideshow/dev-opsec-killingthebuzz/66873612 devopsec-killingthebuzz-161007195938
A not-very-technical look at some of the challenges facing organizations looking to integrate security into their devops cycles, along with some suggestions for meeting those challenges, and tools to help facilitate the process.]]>

A not-very-technical look at some of the challenges facing organizations looking to integrate security into their devops cycles, along with some suggestions for meeting those challenges, and tools to help facilitate the process.]]>
Fri, 07 Oct 2016 19:59:38 GMT /slideshow/dev-opsec-killingthebuzz/66873612 rossja@slideshare.net(rossja) Dev opsec killing-the_buzz rossja A not-very-technical look at some of the challenges facing organizations looking to integrate security into their devops cycles, along with some suggestions for meeting those challenges, and tools to help facilitate the process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/devopsec-killingthebuzz-161007195938-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A not-very-technical look at some of the challenges facing organizations looking to integrate security into their devops cycles, along with some suggestions for meeting those challenges, and tools to help facilitate the process.
Dev opsec killing-the_buzz from Jason Ross
]]>
207 2 https://cdn.slidesharecdn.com/ss_thumbnails/devopsec-killingthebuzz-161007195938-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-rossja-48x48.jpg?cb=1594243533 I've been performing ethical hacking and security incident response since 2005 & have been securing systems professionally since 1998. I've worked with sectors including telecommunications, finance, health care, and state governments. I spend my spare time tracking online criminal activity and malicious traffic patterns. freezion.com https://cdn.slidesharecdn.com/ss_thumbnails/nodejssecurity-nccformat-170117181617-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/nodejs-security-71112461/71112461 Nodejs Security https://cdn.slidesharecdn.com/ss_thumbnails/tizenmanningrossv1-170117181248-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/tizen-security/71112362 Tizen Security https://cdn.slidesharecdn.com/ss_thumbnails/c2dmitm-170117180854-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ac2dm-for-security/71112212 AC2DM For Security