sensepost charl van der walt security hacking haroon meer roelof temmingh 2011 2010 blackhat marco slaviero security summit 2001 2009 zacon tuks information security itweb ian de villiers 2008 jaco van graan wifi research 44con sqli 2004 ctm xss dominic white assessment luc de graeve yvette du toit ddos internal security cybercrime cloud squeeza defence footprinting malware mobile proxy metrics privacy issa infosec instrumentation frida objection mainframes tn3270 z/os microsoft office365 exchange exfiltration bsides rogue ap defcon heartbleed botconf botnets dark comet poison ivy home automation z-wave zwave m2m besides cape-town smart card .net smart card hivemod x509 amazon web services xsrt 2007 uncon behrang fouladi snmp gorg christian pranschkle cisco zacon 2 go-derper.rb.2010 ethical hackers iia recon directory traversal 2005 terrorism worm 2003 threats internetix trends business francesco geremla threat modeling sql injection pen testing glenn wilkinson windows server 2003 sensepnfo sec africa black hat 2006 iphone reversing decrypting hacking android saurabh harit smartphon 2002 charl de walt sa ip manipulation dos risk gordon institute of business science penetration testing social engineering nick arvanitis web 2 internet show junaid loonat captcha authentication format string activex banking daniel cuthbert logic flaws info sec africa 2000 iir isec security process 200 google hacking signing obfuscation attacking java idc 2006 kernel-rootkit web application hacking stack overflow issa 2006 jurgens van der merwe enterprise portals abusing portlets security theater university of pretoria evert smith ids icm 2000 nevercookie evercookie googlesharing ec2 aws apple amazon salesforce attacks timing dns reduh tunnels suru tcp strikeback network trojan setiri links bile automation bidiblah tut workshop ccdcoe cyberwar south africa mss sapgui sap phone windows dynamic analysis metricon6 threat model pickle python exploit memcached memcache mining
Mehr anzeigen