Na stronie konferencji CONFidence 2010 pojawiły się nagrania wideo z kilku prelekcji, m.in. z prelekcji mojej i j00ru "Case study of recent Windows vulnerabilities". Nagranie jest w formie do pobrania na dysk (tj. nie ma playera online).
http://2010.confidence.org.pl/materials - Materiały z wszystkich prelekcji
Video from our lecture (680 MB)
Wstępnie przejrzałem powyższe nagranie, i jakość dźwięku i video jest dobra, a montaż świetny :)
Gorzej z moim angielskim hehehe, więc zalecam włączenie "fuzzy logic" i przygotowanie się na dziwną gramatykę i akcent :)))
Anyway, miłego oglądania!
Links / Blogs
- → dragonsector.pl
- → vexillium.org
- Security/Hacking:
- Reverse Eng./Low-Level:
- Programming/Code:
Posts
- GSGC2019: Winners,
- Teaser Dragon CTF 2019 - this Sat/Sun,
- Gynvael's Summer GameDev Challenge 2019,
- HackYeah 2019: 30 free tickets,
- Paged Out! Issue #1,
- Paged Out! Article submission deadline is 30th July 2019,
- Security conferences and CFPs,
- Introducing Paged Out! magazine (also CFP),
- CONFidence 2019 - 3-4 June, Kraków, Poland,
- My new Discord server,
- → see all posts on main page
// copyright © Gynvael Coldwind
// design & art by Xa
// logo font (birdman regular) by utopiafonts / Dale Harris
/* the author and owner of this blog hereby allows anyone to test the security of this blog (on HTTP level only, the server is not mine, so let's leave it alone ;>), and try to break in (including successful breaks) without any consequences of any kind (DoS attacks are an exception here) ... I'll add that I planted in some places funny photos of some kittens, there are 7 of them right now, so have fun looking for them ;> let me know if You find them all, I'll add some congratz message or sth ;> */
Vulns found in blog:
* XSS (pers, user-inter) by ged_
* XSS (non-pers) by Anno & Tracerout
* XSS (pers) by Anno & Tracerout
* Blind SQLI by Sławomir Błażek
* XSS (pers) by Sławomir Błażek
// design & art by Xa
// logo font (birdman regular) by utopiafonts / Dale Harris
/* the author and owner of this blog hereby allows anyone to test the security of this blog (on HTTP level only, the server is not mine, so let's leave it alone ;>), and try to break in (including successful breaks) without any consequences of any kind (DoS attacks are an exception here) ... I'll add that I planted in some places funny photos of some kittens, there are 7 of them right now, so have fun looking for them ;> let me know if You find them all, I'll add some congratz message or sth ;> */
Vulns found in blog:
* XSS (pers, user-inter) by ged_
* XSS (non-pers) by Anno & Tracerout
* XSS (pers) by Anno & Tracerout
* Blind SQLI by Sławomir Błażek
* XSS (pers) by Sławomir Błażek
Comments:
Hash: SHA1
Nareszcie zobaczę wykład Appelbauma!
Btw. Jaki jest sens dodawania matematycznej CAPTHA, skoro bot mógłby to po prostu sobie przeparsować i wyliczyć? To przecież prostsze niż zwykły obrazek!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Use GnuPG with Firefox : http://getfiregpg.org (Version: 0.8)
iEYEARECAAYFAkxHIaQACgkQHrUFeOTlcqv+JwCeOeeQSl7NWqH2CXjIHtmqF8Yf
LF8AoMHct/yjslkLhZg2HhhGqtoAaVkN
=G5/a
-----END PGP SIGNATURE-----
;D 'Allo 'allo było kapitalne ;DDD
@TBH
:)
Ad CAPTCHA: dwa słowa: Analiza Ryzyka ;DDDD
Add a comment: