Enviar pesquisa
Carregar
Stephen Ridley - Greyhat Ruby
•
1 gostou
•
2,828 visualizações
Source Conference
Seguir
Tecnologia
Educação
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 58
Baixar agora
Baixar para ler offline
Recomendados
Mp26 : Tachyon, sloppiness is bliss
Mp26 : Tachyon, sloppiness is bliss
Montreal Python
PSR-3 logs using Monolog and Graylog
PSR-3 logs using Monolog and Graylog
OCoderFest
Intro to grunt
Intro to grunt
春行 常
Vimm
Vimm
guest7f6a7f
Kettunen, miaubiz fuzzing at scale and in style
Kettunen, miaubiz fuzzing at scale and in style
DefconRussia
Creating qmgr and allowing remote authorization
Creating qmgr and allowing remote authorization
Ravi Babu
MongoDB World 2019 Builder's Fest - Open source command line power tools for ...
MongoDB World 2019 Builder's Fest - Open source command line power tools for ...
Stennie Steneker
Http2 on go1.6rc2
Http2 on go1.6rc2
Jxck Jxck
Recomendados
Mp26 : Tachyon, sloppiness is bliss
Mp26 : Tachyon, sloppiness is bliss
Montreal Python
PSR-3 logs using Monolog and Graylog
PSR-3 logs using Monolog and Graylog
OCoderFest
Intro to grunt
Intro to grunt
春行 常
Vimm
Vimm
guest7f6a7f
Kettunen, miaubiz fuzzing at scale and in style
Kettunen, miaubiz fuzzing at scale and in style
DefconRussia
Creating qmgr and allowing remote authorization
Creating qmgr and allowing remote authorization
Ravi Babu
MongoDB World 2019 Builder's Fest - Open source command line power tools for ...
MongoDB World 2019 Builder's Fest - Open source command line power tools for ...
Stennie Steneker
Http2 on go1.6rc2
Http2 on go1.6rc2
Jxck Jxck
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Source Conference
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Source Conference
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Source Conference
Advanced (persistent) binary planting
Advanced (persistent) binary planting
Source Conference
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Source Conference
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
Source Conference
Wendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security Program
Source Conference
Don Bailey - A Million Little Tracking Devices
Don Bailey - A Million Little Tracking Devices
Source Conference
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Source Conference
Adam Meyers - Obfuscation And Communications
Adam Meyers - Obfuscation And Communications
Source Conference
Ken Smith - Tokenization
Ken Smith - Tokenization
Source Conference
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Source Conference
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
Source Conference
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Source Conference
Banking Fraud Evolution
Banking Fraud Evolution
Source Conference
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Source Conference
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Source Conference
Security Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Source Conference
Million Browser Botnet
Million Browser Botnet
Source Conference
iBanking - a botnet on Android
iBanking - a botnet on Android
Source Conference
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
How to Like Social Media Network Security
How to Like Social Media Network Security
Source Conference
Mais conteúdo relacionado
Destaque
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Source Conference
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Source Conference
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Source Conference
Advanced (persistent) binary planting
Advanced (persistent) binary planting
Source Conference
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Source Conference
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
Source Conference
Wendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security Program
Source Conference
Don Bailey - A Million Little Tracking Devices
Don Bailey - A Million Little Tracking Devices
Source Conference
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Source Conference
Adam Meyers - Obfuscation And Communications
Adam Meyers - Obfuscation And Communications
Source Conference
Ken Smith - Tokenization
Ken Smith - Tokenization
Source Conference
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Source Conference
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
Source Conference
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Source Conference
Banking Fraud Evolution
Banking Fraud Evolution
Source Conference
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Source Conference
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Source Conference
Security Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Source Conference
Destaque
(18)
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Andrew Hay - Chris Nickerson - Building Bridges - Forcing Hackers and Busine...
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced (persistent) binary planting
Advanced (persistent) binary planting
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
Wendy Nather - Building a Rube Goldberg Application Security Program
Wendy Nather - Building a Rube Goldberg Application Security Program
Don Bailey - A Million Little Tracking Devices
Don Bailey - A Million Little Tracking Devices
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Adam Meyers - Obfuscation And Communications
Adam Meyers - Obfuscation And Communications
Ken Smith - Tokenization
Ken Smith - Tokenization
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Forensic Memory Analysis of Android's Dalvik Virtual Machine
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Banking Fraud Evolution
Banking Fraud Evolution
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Security Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Mais de Source Conference
Million Browser Botnet
Million Browser Botnet
Source Conference
iBanking - a botnet on Android
iBanking - a botnet on Android
Source Conference
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
How to Like Social Media Network Security
How to Like Social Media Network Security
Source Conference
Wfuzz para Penetration Testers
Wfuzz para Penetration Testers
Source Conference
Securty Testing For RESTful Applications
Securty Testing For RESTful Applications
Source Conference
Esteganografia
Esteganografia
Source Conference
Adapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
Source Conference
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
Source Conference
Who should the security team hire next?
Who should the security team hire next?
Source Conference
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
Source Conference
JSF Security
JSF Security
Source Conference
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
Source Conference
Keynote
Keynote
Source Conference
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
Source Conference
Threat Modeling: Best Practices
Threat Modeling: Best Practices
Source Conference
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Source Conference
Mais de Source Conference
(17)
Million Browser Botnet
Million Browser Botnet
iBanking - a botnet on Android
iBanking - a botnet on Android
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
How to Like Social Media Network Security
How to Like Social Media Network Security
Wfuzz para Penetration Testers
Wfuzz para Penetration Testers
Securty Testing For RESTful Applications
Securty Testing For RESTful Applications
Esteganografia
Esteganografia
Adapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
Who should the security team hire next?
Who should the security team hire next?
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
JSF Security
JSF Security
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
Keynote
Keynote
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
Threat Modeling: Best Practices
Threat Modeling: Best Practices
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Geer - Hutton - Shannon - A Pilot Project On The Use Of Prediction Markets I...
Último
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Último
(20)
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Stephen Ridley - Greyhat Ruby
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
Automated HTTP Verb
Tampering Usage
42.
43.
https://github.com/s7ephen/Tamatebako/blob/master/
user32.rb
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
https://github.com/s7ephen/Ruxxer
54.
#declarations long typeop; long_lc pkt_len;
#byte length calculator string dgram; structure tlv_packet; #assignments typeop = 0x0D030A0D; pkt_len = tlv_packet; dgram = “This is userdatarm” push(tlv_packet, typeop, pkt_len, dgram);
55.
http://www.slideshare.net/d0cs4vage/ruby-meta-fuzzing
https://github.com/tqbf/ruckus
Baixar agora