Profile cover photo
Profile photo
Secdocs - Hacking knowledge
153 followers -
Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy.
Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy.

153 followers
About
Secdocs - Hacking knowledge's posts

Post has attachment
[Video] Ghost in the Shell - Tags: SAP Event: Troopers 2013 Abstract: Security conferences in the past years have made it clear, that common security vulnerabilities such as SQL Injection, XSS, CSRF, HTTP verb tampering and many others also exist in SAP software. This talk covers several vulnerabilities that are unique to SAP systems and shows how these can be used in order to bypass crucial security mechanisms and at the same time operate completely below the (forensic... http://ow.ly/2Q2CQx

Post has attachment

Post has attachment
[Video] Detecting white-collar cybercrime: SAP Forensics - Tags: SAP Event: Troopers 2013 Abstract: The largest organizations in the world rely on SAP platforms to run their critical processes and keep their business crown jewels: financial information, customers data, intellectual property, credit cards, human resources salaries, sensitive materials, suppliers and more. Everything is there – and attackers know it. Now, the big question arises: Has your SAP system ever ... http://ow.ly/2PSqt9

Post has attachment
[Video] UI Redressing Attacks on Android Devices - Tags: clickjacking Event: Troopers 2013 Abstract: In this presentation, we describe novel high-impact user interface attacks on Android-based mobile devices, additionally focusing on showcasing the possible mitigation techniques for such attacks. We discuss which UI redressing attacks can be transferred from desktop- to mobile- browser field. Our main contribution is a demonstration of a browserless tap-jacking attack, ... http://ow.ly/2PMidx

Post has attachment
[Video] Malicious pixels: QR-codes as attack vectors - Tags: QR code Event: Troopers 2013 Abstract: QR-Codes, a version of two-dimensional barcodes that are able to store quite large amounts of information, started gaining huge popularity throughout the last few years, including all sorts of new applications for them. Originating from the area of logistics, they found their ways into marketing and since the rise of modern smartphones with their ability to scan them in t... http://ow.ly/2PHeDN

Post has attachment
[Video] Virtual firewalls – the Good, the Bad and the Ugly - Tags: firewall Event: Troopers 2013 Abstract: Anything is marketed as a virtual firewall these days, from contexts on physical boxes to hypervisor kernel modules and VMs with a kitschy GUI in front of iptables. This presentation will walk you through the virtual firewalls taxonomy, describe the major architectural options, and illustrate typical use cases with products from few established virtual firewall ven... http://ow.ly/2PDvE8

Post has attachment
[Video] Closing Remarks & TROOPERS Challenge Award Ceremony - Tags: hacking Event: Troopers 2013 http://ow.ly/2PzCMb

Post has attachment

Post has attachment

Post has attachment
Wait while more posts are being loaded