REcon Brussels

@reconbrx

REcon: Annual reverse engineering and security conference held in Brussels. Sister event of

Brussels
Vrijeme pridruživanja: rujan 2016.

Tweetovi

Blokirali ste korisnika/cu @reconbrx

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @reconbrx

  1. proslijedio/la je Tweet
    21. stu 2018.

    Our Black Friday sale starts now. 42% off everything at with FRIDAY42. Please RT and *

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. ožu 2019.

    Prochain MTLSEC le 14 Mars - Next MTLSEC March 14th @ 17:00 - Maison 2109, 2109 rue de Bleury - Details:

    Poništi
  3. proslijedio/la je Tweet
    12. velj 2019.

    Challenge for Recon this year. Identify the poser that try to break in Recon Office Last week...

    Poništi
  4. proslijedio/la je Tweet
    Odgovor korisnicima

    Yes indeed! Can’t believe I get to be on the same stage as the Pastor! GoodWatch assembly party in the lobby right?? 😋

    Poništi
  5. proslijedio/la je Tweet
    15. svi 2018.

    Awesome lineup for this year - lots of great speakers and interesting topics. I'm looking forward to debuting 100% new research on REing Windows Defender building upon my prior presentation

    Poništi
  6. proslijedio/la je Tweet
    3. velj 2018.
    Poništi
  7. proslijedio/la je Tweet
    11. ožu 2018.
    Poništi
  8. proslijedio/la je Tweet
    7. ožu 2018.

    GDSII extraction from IC pictures : I have been stoping the standard cell detection process to create a set of GDSII files. There are roughly 4500 cells + 4 interconnect layers in that corner of the digital logic. @Essiralc_Tenig

    Poništi
  9. proslijedio/la je Tweet
    13. velj 2018.

    Great quote on one of the first slides of "Breaking State-of-the-Art Binary Code Obfuscation" from . I also keep recommending this article on crack protection:

    Poništi
  10. 12. velj 2018.

    REcon BRX 2018 Slides are here !!

    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet
    4. velj 2018.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    5. velj 2018.

    Just published the slides of my talk at about CVE-2018-0101 targeting Cisco ASA firewalls

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    7. velj 2018.

    Our slides from are online . Again, patch now, an exploit is now public ;)

    Poništi
  15. proslijedio/la je Tweet
    31. sij 2018.

    From Brussels with love, the REcon Montreal 2018 CFP and trainings have been announced: Register early to benefit from a steep discount:

    Poništi
  16. proslijedio/la je Tweet
    30. sij 2018.

    Hey guys, I know you're excited about CVE-2018-0101 (Cisco ASA SSL VPN RCE), but even if you don't have a service contract you can obtain the update from TAC. DO NOT download and install images from anyone but Cisco. (We appreciate the help, we really do...but...just....don't)

    Poništi
  17. proslijedio/la je Tweet
    30. sij 2018.

    I'll be giving a talk together with about QNX exploit mitigations & PRNGS this week:

    Poništi
  18. proslijedio/la je Tweet

    Prior to this weekend CISCO has released -2018-0101 which patches a pre-auth RCE in ASA and specifically AnyConnect - - go to Brussels and hear from -

    Poništi
  19. proslijedio/la je Tweet
    29. sij 2018.

    Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability: To be presented at by :

    Poništi
  20. 26. sij 2018.

    We'll be hosting lightning talk periods from 14:00 to 14:30 every day of the conference. Sign-up sheets will be next to the stage.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·