際際滷shows by User: the_netlocksmith / http://www.slideshare.net/images/logo.gif 際際滷shows by User: the_netlocksmith / Tue, 31 Jul 2012 23:14:27 GMT 際際滷Share feed for 際際滷shows by User: the_netlocksmith DHS - Recommendations for Securing Zigbee Networks in Process Control Systems /the_netlocksmith/dhs-recommended-practices-for-securing-zigbee-networks-in-ics securingzigbeewirelessnetworks-120731231429-phpapp02
]]>

]]>
Tue, 31 Jul 2012 23:14:27 GMT /the_netlocksmith/dhs-recommended-practices-for-securing-zigbee-networks-in-ics the_netlocksmith@slideshare.net(the_netlocksmith) DHS - Recommendations for Securing Zigbee Networks in Process Control Systems the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securingzigbeewirelessnetworks-120731231429-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DHS - Recommendations for Securing Zigbee Networks in Process Control Systems from Michael Smith
]]>
1938 4 https://cdn.slidesharecdn.com/ss_thumbnails/securingzigbeewirelessnetworks-120731231429-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper) /slideshow/blackhat-2011-exploiting-siemens-simatic-s7-plcs/13821957 bhus11beresfords7plcswp-120731230902-phpapp01
]]>

]]>
Tue, 31 Jul 2012 23:08:59 GMT /slideshow/blackhat-2011-exploiting-siemens-simatic-s7-plcs/13821957 the_netlocksmith@slideshare.net(the_netlocksmith) BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper) the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bhus11beresfords7plcswp-120731230902-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper) from Michael Smith
]]>
6406 10 https://cdn.slidesharecdn.com/ss_thumbnails/bhus11beresfords7plcswp-120731230902-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides) /slideshow/blackhat-2011-exploiting-siemens-simatic-s7-plcs-slides/13821948 bhus11beresfords7plcsslides-120731230738-phpapp02
]]>

]]>
Tue, 31 Jul 2012 23:07:36 GMT /slideshow/blackhat-2011-exploiting-siemens-simatic-s7-plcs-slides/13821948 the_netlocksmith@slideshare.net(the_netlocksmith) BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides) the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bhus11beresfords7plcsslides-120731230738-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (slides) from Michael Smith
]]>
7567 5 https://cdn.slidesharecdn.com/ss_thumbnails/bhus11beresfords7plcsslides-120731230738-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smart Meters /slideshow/blackhat-2010-electricity-for-free-the-dirty-underbelly-of-scada-and-smart-meters/13821926 blackhat-usa-2010-pollet-cummings-rts-electricity-for-free-wp-120731230252-phpapp02
]]>

]]>
Tue, 31 Jul 2012 23:02:49 GMT /slideshow/blackhat-2010-electricity-for-free-the-dirty-underbelly-of-scada-and-smart-meters/13821926 the_netlocksmith@slideshare.net(the_netlocksmith) BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smart Meters the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/blackhat-usa-2010-pollet-cummings-rts-electricity-for-free-wp-120731230252-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
BlackHat 2010 - Electricity for Free - The Dirty Underbelly of SCADA and Smart Meters from Michael Smith
]]>
2192 3 https://cdn.slidesharecdn.com/ss_thumbnails/blackhat-usa-2010-pollet-cummings-rts-electricity-for-free-wp-120731230252-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
BlackHat 2009 - Hacking Zigbee Chips (slides) /slideshow/blackhat-2009-hacking-zigbee-chips-slides/13821814 blackhat2009-hackingzigbeechipsslides-120731224137-phpapp02
]]>

]]>
Tue, 31 Jul 2012 22:41:35 GMT /slideshow/blackhat-2009-hacking-zigbee-chips-slides/13821814 the_netlocksmith@slideshare.net(the_netlocksmith) BlackHat 2009 - Hacking Zigbee Chips (slides) the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/blackhat2009-hackingzigbeechipsslides-120731224137-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
BlackHat 2009 - Hacking Zigbee Chips (slides) from Michael Smith
]]>
1597 4 https://cdn.slidesharecdn.com/ss_thumbnails/blackhat2009-hackingzigbeechipsslides-120731224137-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Sub-1 GHz Radio Frequency Security /slideshow/defcon-2012-sub1-ghz-radio-frequency-security/13821538 defcon2012-sub-1ghzradiofrequencysecurity-120731215524-phpapp02
Includes power meters, medical devices, cell phones, and cordless phones.]]>

Includes power meters, medical devices, cell phones, and cordless phones.]]>
Tue, 31 Jul 2012 21:55:22 GMT /slideshow/defcon-2012-sub1-ghz-radio-frequency-security/13821538 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Sub-1 GHz Radio Frequency Security the_netlocksmith Includes power meters, medical devices, cell phones, and cordless phones. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-sub-1ghzradiofrequencysecurity-120731215524-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Includes power meters, medical devices, cell phones, and cordless phones.
DefCon 2012 - Sub-1 GHz Radio Frequency Security from Michael Smith
]]>
2040 3 https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-sub-1ghzradiofrequencysecurity-120731215524-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller /slideshow/defcon-2012-nearfield-communicationrfid-hacking-miller/13821503 defcon2012near-fieldcommunication-rfidhacking-miller-120731214808-phpapp01
]]>

]]>
Tue, 31 Jul 2012 21:48:07 GMT /slideshow/defcon-2012-nearfield-communicationrfid-hacking-miller/13821503 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Near-Field Communication / RFID Hacking - Miller the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012near-fieldcommunication-rfidhacking-miller-120731214808-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Near-Field Communication / RFID Hacking - Miller from Michael Smith
]]>
4118 6 https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012near-fieldcommunication-rfidhacking-miller-120731214808-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee /slideshow/defcon-2012-nearfield-communication-rfid-hacking-lee/13821493 defcon2012-near-fieldcommunication-rfidhacking-120731214534-phpapp02
]]>

]]>
Tue, 31 Jul 2012 21:45:33 GMT /slideshow/defcon-2012-nearfield-communication-rfid-hacking-lee/13821493 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Near-Field Communication / RFID Hacking - Lee the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-near-fieldcommunication-rfidhacking-120731214534-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee from Michael Smith
]]>
2599 3 https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-near-fieldcommunication-rfidhacking-120731214534-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Hardware Backdooring (White Paper) /slideshow/defcon-2012-hardware-backdooring-white-paper/13821470 defcon2012-hardwarebackdooring-whitepaper-120731214217-phpapp01
]]>

]]>
Tue, 31 Jul 2012 21:42:15 GMT /slideshow/defcon-2012-hardware-backdooring-white-paper/13821470 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Hardware Backdooring (White Paper) the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-hardwarebackdooring-whitepaper-120731214217-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Hardware Backdooring (White Paper) from Michael Smith
]]>
455 2 https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-hardwarebackdooring-whitepaper-120731214217-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Hardware Backdooring (際際滷s) /slideshow/defcon-2012-hardware-backdooring-slides/13821467 defcon2012-hardwarebackdooring-slides-120731214121-phpapp02
]]>

]]>
Tue, 31 Jul 2012 21:41:20 GMT /slideshow/defcon-2012-hardware-backdooring-slides/13821467 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Hardware Backdooring (際際滷s) the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-hardwarebackdooring-slides-120731214121-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Hardware Backdooring (際際滷s) from Michael Smith
]]>
1059 3 https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-hardwarebackdooring-slides-120731214121-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Firmware Vulnerability Hunting with FRAK /slideshow/defcon-2012-firmware-vulnerability-hunting-with-frak/13821460 defcon2012-firmwarevulnerabilityhuntingwithfrak-120731214009-phpapp01
"Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole -- FRAK is a framework for unpacking, analyzing, modifying and repacking the firmware images of proprietary embedded devices. The FRAK framework provides a programmatic environment for the analysis of arbitrary embedded device firmware as well as an interactive environment for the disassembly, manipulation and re-assembly of such binary images. We demonstrate the automated analysis of Cisco IOS, Cisco IP phone and HP LaserJet printer firmware images. We show how FRAK can integrate with existing vulnerability analysis tools to automate bug hunting for embedded devices. We also demonstrate how FRAK can be used to inject experimental host-based defenses into proprietary devices like Cisco routers and HP printers. "]]>

"Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole -- FRAK is a framework for unpacking, analyzing, modifying and repacking the firmware images of proprietary embedded devices. The FRAK framework provides a programmatic environment for the analysis of arbitrary embedded device firmware as well as an interactive environment for the disassembly, manipulation and re-assembly of such binary images. We demonstrate the automated analysis of Cisco IOS, Cisco IP phone and HP LaserJet printer firmware images. We show how FRAK can integrate with existing vulnerability analysis tools to automate bug hunting for embedded devices. We also demonstrate how FRAK can be used to inject experimental host-based defenses into proprietary devices like Cisco routers and HP printers. "]]>
Tue, 31 Jul 2012 21:40:06 GMT /slideshow/defcon-2012-firmware-vulnerability-hunting-with-frak/13821460 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Firmware Vulnerability Hunting with FRAK the_netlocksmith "Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole -- FRAK is a framework for unpacking, analyzing, modifying and repacking the firmware images of proprietary embedded devices. The FRAK framework provides a programmatic environment for the analysis of arbitrary embedded device firmware as well as an interactive environment for the disassembly, manipulation and re-assembly of such binary images. We demonstrate the automated analysis of Cisco IOS, Cisco IP phone and HP LaserJet printer firmware images. We show how FRAK can integrate with existing vulnerability analysis tools to automate bug hunting for embedded devices. We also demonstrate how FRAK can be used to inject experimental host-based defenses into proprietary devices like Cisco routers and HP printers. " <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-firmwarevulnerabilityhuntingwithfrak-120731214009-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> &quot;Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole -- FRAK is a framework for unpacking, analyzing, modifying and repacking the firmware images of proprietary embedded devices. The FRAK framework provides a programmatic environment for the analysis of arbitrary embedded device firmware as well as an interactive environment for the disassembly, manipulation and re-assembly of such binary images. We demonstrate the automated analysis of Cisco IOS, Cisco IP phone and HP LaserJet printer firmware images. We show how FRAK can integrate with existing vulnerability analysis tools to automate bug hunting for embedded devices. We also demonstrate how FRAK can be used to inject experimental host-based defenses into proprietary devices like Cisco routers and HP printers. &quot;
DefCon 2012 - Firmware Vulnerability Hunting with FRAK from Michael Smith
]]>
1367 5 https://cdn.slidesharecdn.com/ss_thumbnails/defcon2012-firmwarevulnerabilityhuntingwithfrak-120731214009-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2011 - Vulnerabilities in Wireless Water Meters /slideshow/defcon-2011-vulnerabilities-in-wireless-water-meters/13821382 defcon2011-vulnerabilitiesinwirelesswatermeters-120731212736-phpapp02
]]>

]]>
Tue, 31 Jul 2012 21:27:34 GMT /slideshow/defcon-2011-vulnerabilities-in-wireless-water-meters/13821382 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2011 - Vulnerabilities in Wireless Water Meters the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon2011-vulnerabilitiesinwirelesswatermeters-120731212736-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2011 - Vulnerabilities in Wireless Water Meters from Michael Smith
]]>
14940 8 https://cdn.slidesharecdn.com/ss_thumbnails/defcon2011-vulnerabilitiesinwirelesswatermeters-120731212736-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Defcon 2011 - Penetration Testing Over Powerlines /slideshow/defcon-2011-pentesting-over-powerlines/13821356 defcon2011-pentestingoverpowerlines-120731212314-phpapp02
]]>

]]>
Tue, 31 Jul 2012 21:23:11 GMT /slideshow/defcon-2011-pentesting-over-powerlines/13821356 the_netlocksmith@slideshare.net(the_netlocksmith) Defcon 2011 - Penetration Testing Over Powerlines the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon2011-pentestingoverpowerlines-120731212314-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Defcon 2011 - Penetration Testing Over Powerlines from Michael Smith
]]>
927 4 https://cdn.slidesharecdn.com/ss_thumbnails/defcon2011-pentestingoverpowerlines-120731212314-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics /the_netlocksmith/defcon-20-antiforensics-and-antiantiforensics defcon-20-perklin-antiforensics-120730150540-phpapp02
]]>

]]>
Mon, 30 Jul 2012 15:05:38 GMT /the_netlocksmith/defcon-20-antiforensics-and-antiantiforensics the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon-20-perklin-antiforensics-120730150540-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics from Michael Smith
]]>
1422 3 https://cdn.slidesharecdn.com/ss_thumbnails/defcon-20-perklin-antiforensics-120730150540-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Subterfuge - Automated MITM Attacks /slideshow/defcon-20-subterfuge-automated-mitm-attacks/13805668 defcon20toussainshieldssubterfuge-13436771151475-phpapp01-120730144320-phpapp01
]]>

]]>
Mon, 30 Jul 2012 14:39:19 GMT /slideshow/defcon-20-subterfuge-automated-mitm-attacks/13805668 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Subterfuge - Automated MITM Attacks the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon20toussainshieldssubterfuge-13436771151475-phpapp01-120730144320-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Subterfuge - Automated MITM Attacks from Michael Smith
]]>
710 2 https://cdn.slidesharecdn.com/ss_thumbnails/defcon20toussainshieldssubterfuge-13436771151475-phpapp01-120730144320-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Bluetooth Monitoring With SCAPY /slideshow/defcon-20-bluetooth-monitoring-with-scapy/13805617 defcon20holemanscapy-13436766043776-phpapp01-120730143708-phpapp01
]]>

]]>
Mon, 30 Jul 2012 14:33:17 GMT /slideshow/defcon-20-bluetooth-monitoring-with-scapy/13805617 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Bluetooth Monitoring With SCAPY the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon20holemanscapy-13436766043776-phpapp01-120730143708-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Bluetooth Monitoring With SCAPY from Michael Smith
]]>
2142 3 https://cdn.slidesharecdn.com/ss_thumbnails/defcon20holemanscapy-13436766043776-phpapp01-120730143708-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Owned In 60 Seconds - Windows Hacking /slideshow/defcon-20-owned-in-60-seconds-windows-hacks/13805537 defcon20faselownedin60seconds-13436764552643-phpapp02-120730142900-phpapp02
]]>

]]>
Mon, 30 Jul 2012 14:28:33 GMT /slideshow/defcon-20-owned-in-60-seconds-windows-hacks/13805537 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Owned In 60 Seconds - Windows Hacking the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon20faselownedin60seconds-13436764552643-phpapp02-120730142900-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Owned In 60 Seconds - Windows Hacking from Michael Smith
]]>
550 3 https://cdn.slidesharecdn.com/ss_thumbnails/defcon20faselownedin60seconds-13436764552643-phpapp02-120730142900-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Rooting SOHO Routers /slideshow/defcon-20-rooting-soho-routers/13805522 defcon20cutliprootingsohorouters-1343676394287-phpapp02-120730142906-phpapp02
]]>

]]>
Mon, 30 Jul 2012 14:26:56 GMT /slideshow/defcon-20-rooting-soho-routers/13805522 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Rooting SOHO Routers the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon20cutliprootingsohorouters-1343676394287-phpapp02-120730142906-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Rooting SOHO Routers from Michael Smith
]]>
1243 2 https://cdn.slidesharecdn.com/ss_thumbnails/defcon20cutliprootingsohorouters-1343676394287-phpapp02-120730142906-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Finding Firmware Vulnerabilities /slideshow/defcon-20-finding-firmware-vulnerabilities/13805512 defcon20cuifrak-13436762937902-phpapp01-120730142715-phpapp01
]]>

]]>
Mon, 30 Jul 2012 14:26:03 GMT /slideshow/defcon-20-finding-firmware-vulnerabilities/13805512 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Finding Firmware Vulnerabilities the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon20cuifrak-13436762937902-phpapp01-120730142715-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Finding Firmware Vulnerabilities from Michael Smith
]]>
1255 4 https://cdn.slidesharecdn.com/ss_thumbnails/defcon20cuifrak-13436762937902-phpapp01-120730142715-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DefCon 2012 - Gaining Access to User Android Data /slideshow/defcon-20-gaining-access-to-user-android-data/13805476 defcon20cannonintothedroid-13436760063728-phpapp01-120730142304-phpapp01
]]>

]]>
Mon, 30 Jul 2012 14:21:30 GMT /slideshow/defcon-20-gaining-access-to-user-android-data/13805476 the_netlocksmith@slideshare.net(the_netlocksmith) DefCon 2012 - Gaining Access to User Android Data the_netlocksmith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon20cannonintothedroid-13436760063728-phpapp01-120730142304-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
DefCon 2012 - Gaining Access to User Android Data from Michael Smith
]]>
5000 4 https://cdn.slidesharecdn.com/ss_thumbnails/defcon20cannonintothedroid-13436760063728-phpapp01-120730142304-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-the_netlocksmith-48x48.jpg?cb=1632411577 Mike Smith has 17 years of experience in information security, including managing network monitoring, incident response, and forensics for the U.S. House of Representatives; network defense for federal agencies and a Wall Street firm; and assessments for state and federal government, as well as SCADA at nuclear plants. He has a Masters degree in Information Assurance and Security and CISSP and CEH certifications. www.linkedin.com/in/smithmb/ https://cdn.slidesharecdn.com/ss_thumbnails/securingzigbeewirelessnetworks-120731231429-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds the_netlocksmith/dhs-recommended-practices-for-securing-zigbee-networks-in-ics DHS - Recommendations ... https://cdn.slidesharecdn.com/ss_thumbnails/bhus11beresfords7plcswp-120731230902-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/blackhat-2011-exploiting-siemens-simatic-s7-plcs/13821957 BlackHat 2011 - Exploi... https://cdn.slidesharecdn.com/ss_thumbnails/bhus11beresfords7plcsslides-120731230738-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/blackhat-2011-exploiting-siemens-simatic-s7-plcs-slides/13821948 BlackHat 2011 - Exploi...