Enviar búsqueda
Cargar
Operation emmental appsec
•
0 recomendaciones
•
1,546 vistas
Cyber Security Alliance
Seguir
1
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 20
Descargar ahora
Descargar para leer sin conexión
Recomendados
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
Cyber Security Alliance
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Cyber Security Alliance
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
Cyber Security Alliance
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
Cyber Security Alliance
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Luca Bongiorni
Certificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
Arash Ramez
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
Arash Ramez
Recomendados
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
Cyber Security Alliance
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Cyber Security Alliance
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
Cyber Security Alliance
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
Cyber Security Alliance
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Luca Bongiorni
Certificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
Arash Ramez
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
Arash Ramez
Flak+technologies
Flak+technologies
Tatyana Kobets
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
Arash Ramez
44cafe heart bleed
44cafe heart bleed
iphonepentest
[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101
OWASP
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Arash Ramez
Evaluating iOS Applications
Evaluating iOS Applications
iphonepentest
RSA Secur id for windows
RSA Secur id for windows
arpit06055
Certificate Pinning: Not as Simple as It Sounds
Certificate Pinning: Not as Simple as It Sounds
Synopsys Software Integrity Group
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
Chris Ryu
1.3. (In)security Software
1.3. (In)security Software
defconmoscow
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
Zeev Shetach
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Jakub Kałużny
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Jakub Kałużny
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
Cisco DevNet
RSA SecurID Access
RSA SecurID Access
MarketingArrowECS_CZ
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
Fatih Ozavci
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
FIWARE
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
Code by the sea: Web Application Security
Code by the sea: Web Application Security
Boy Baukema
Little Things That Make a BIG Difference in Sales
Little Things That Make a BIG Difference in Sales
Abhishek Shah
Making Hashtags Talk
Making Hashtags Talk
ixigo.com
Más contenido relacionado
La actualidad más candente
Flak+technologies
Flak+technologies
Tatyana Kobets
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
Arash Ramez
44cafe heart bleed
44cafe heart bleed
iphonepentest
[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101
OWASP
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Arash Ramez
Evaluating iOS Applications
Evaluating iOS Applications
iphonepentest
RSA Secur id for windows
RSA Secur id for windows
arpit06055
Certificate Pinning: Not as Simple as It Sounds
Certificate Pinning: Not as Simple as It Sounds
Synopsys Software Integrity Group
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
Chris Ryu
1.3. (In)security Software
1.3. (In)security Software
defconmoscow
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
Zeev Shetach
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Jakub Kałużny
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Jakub Kałużny
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
Cisco DevNet
RSA SecurID Access
RSA SecurID Access
MarketingArrowECS_CZ
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
Fatih Ozavci
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
FIWARE
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
Code by the sea: Web Application Security
Code by the sea: Web Application Security
Boy Baukema
La actualidad más candente
(20)
Flak+technologies
Flak+technologies
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
44cafe heart bleed
44cafe heart bleed
[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Evaluating iOS Applications
Evaluating iOS Applications
RSA Secur id for windows
RSA Secur id for windows
Certificate Pinning: Not as Simple as It Sounds
Certificate Pinning: Not as Simple as It Sounds
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
1.3. (In)security Software
1.3. (In)security Software
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
RSA SecurID Access
RSA SecurID Access
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
Code by the sea: Web Application Security
Code by the sea: Web Application Security
Destacado
Little Things That Make a BIG Difference in Sales
Little Things That Make a BIG Difference in Sales
Abhishek Shah
Making Hashtags Talk
Making Hashtags Talk
ixigo.com
Scottish government approval rating increases
Scottish government approval rating increases
Ipsos UK
คนไทยในอังกฤษชุมนุมครั้งที่ ๒
คนไทยในอังกฤษชุมนุมครั้งที่ ๒
konthaiuk
Nettech International Co., Ltd.
Nettech International Co., Ltd.
Saran Yuwanna
Pokran certificate computer
Pokran certificate computer
Bhivraj Bhati
IGE Presentation to Foyson Shareholders
IGE Presentation to Foyson Shareholders
Foyson Resources
Representação de imagens em formato digital
Representação de imagens em formato digital
Helinton Bruce
Quantified Sleep - Science behind the sleep trackers
Quantified Sleep - Science behind the sleep trackers
Quantified Self Dublin
Hydrolic Power Plant
Hydrolic Power Plant
sravanthi computers
Halloween by the Numbers #Infographic: Top Stats, Social Trends, and Insights
Halloween by the Numbers #Infographic: Top Stats, Social Trends, and Insights
Salesforce Marketing Cloud
Random Facts about Web App Security
Random Facts about Web App Security
Łukasz Wójcik
Flag Waiving
Flag Waiving
Kevlin Henney
Blockchain revolution
Blockchain revolution
geetachauhan
How to Break the Zombification of the Enterprise!
How to Break the Zombification of the Enterprise!
Christian Buckley
Social Media Scheduling Workshop
Social Media Scheduling Workshop
Inner Ear
(IDEユーザのための) ClojureのEmacs開発環境について
(IDEユーザのための) ClojureのEmacs開発環境について
Kazuhiro Hara
Grandes pintores del Romanticismo europeo. III. Joseph Mallord William Turner
Grandes pintores del Romanticismo europeo. III. Joseph Mallord William Turner
Museo del Romanticismo
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
Home
Shifting to a Strength-Based Culture in Schools
Shifting to a Strength-Based Culture in Schools
Chris Wejr
Destacado
(20)
Little Things That Make a BIG Difference in Sales
Little Things That Make a BIG Difference in Sales
Making Hashtags Talk
Making Hashtags Talk
Scottish government approval rating increases
Scottish government approval rating increases
คนไทยในอังกฤษชุมนุมครั้งที่ ๒
คนไทยในอังกฤษชุมนุมครั้งที่ ๒
Nettech International Co., Ltd.
Nettech International Co., Ltd.
Pokran certificate computer
Pokran certificate computer
IGE Presentation to Foyson Shareholders
IGE Presentation to Foyson Shareholders
Representação de imagens em formato digital
Representação de imagens em formato digital
Quantified Sleep - Science behind the sleep trackers
Quantified Sleep - Science behind the sleep trackers
Hydrolic Power Plant
Hydrolic Power Plant
Halloween by the Numbers #Infographic: Top Stats, Social Trends, and Insights
Halloween by the Numbers #Infographic: Top Stats, Social Trends, and Insights
Random Facts about Web App Security
Random Facts about Web App Security
Flag Waiving
Flag Waiving
Blockchain revolution
Blockchain revolution
How to Break the Zombification of the Enterprise!
How to Break the Zombification of the Enterprise!
Social Media Scheduling Workshop
Social Media Scheduling Workshop
(IDEユーザのための) ClojureのEmacs開発環境について
(IDEユーザのための) ClojureのEmacs開発環境について
Grandes pintores del Romanticismo europeo. III. Joseph Mallord William Turner
Grandes pintores del Romanticismo europeo. III. Joseph Mallord William Turner
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
Shifting to a Strength-Based Culture in Schools
Shifting to a Strength-Based Culture in Schools
Similar a Operation emmental appsec
Hacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
African Cyber Security Summit
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
Aaron Zauner
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
ORG, The Public Interest Registry
DNS Cache Poisoning
DNS Cache Poisoning
Kourosh Sajjadi
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
Fatima Qayyum
News bytes Sept-2011
News bytes Sept-2011
Ashwin Patil, GCIH, GCIA, GCFE
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Amazon Web Services
Windows 2012 and DNSSEC
Windows 2012 and DNSSEC
Men and Mice
Novinky F5
Novinky F5
MarketingArrowECS_CZ
It's a Dangerous World
It's a Dangerous World
MongoDB
Web 2.0 PPT
Web 2.0 PPT
yogendra singh chahar
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Zack Meyers
Issa jason dablow
Issa jason dablow
ISSA LA
Progressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent Convento
DEVCON
Attacking backup softwares
Attacking backup softwares
Nibin Varghese
Techniques for Agile Performance Testing
Techniques for Agile Performance Testing
TechWell
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
Ramece Cave
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)
Andreas Taudte
The Evil Friend in Your Browser
The Evil Friend in Your Browser
Achim D. Brucker
Similar a Operation emmental appsec
(20)
Hacking Client Side Insecurities
Hacking Client Side Insecurities
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
DNS Cache Poisoning
DNS Cache Poisoning
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
News bytes Sept-2011
News bytes Sept-2011
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Windows 2012 and DNSSEC
Windows 2012 and DNSSEC
Novinky F5
Novinky F5
It's a Dangerous World
It's a Dangerous World
Web 2.0 PPT
Web 2.0 PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Issa jason dablow
Issa jason dablow
Progressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent Convento
Attacking backup softwares
Attacking backup softwares
Techniques for Agile Performance Testing
Techniques for Agile Performance Testing
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
The Enemy Within: Organizational Insight Through the Eyes of a Webserver
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)
The Evil Friend in Your Browser
The Evil Friend in Your Browser
Más de Cyber Security Alliance
Bug Bounty @ Swisscom
Bug Bounty @ Swisscom
Cyber Security Alliance
Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?
Cyber Security Alliance
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
Cyber Security Alliance
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
Cyber Security Alliance
Blockchain for Beginners
Blockchain for Beginners
Cyber Security Alliance
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
Cyber Security Alliance
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
Cyber Security Alliance
Understanding the fundamentals of attacks
Understanding the fundamentals of attacks
Cyber Security Alliance
Rump : iOS patch diffing
Rump : iOS patch diffing
Cyber Security Alliance
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
Cyber Security Alliance
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
Cyber Security Alliance
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Cyber Security Alliance
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
Cyber Security Alliance
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
Cyber Security Alliance
Hacking the swisscom modem
Hacking the swisscom modem
Cyber Security Alliance
Colt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinal
Cyber Security Alliance
Asfws2014 tproxy
Asfws2014 tproxy
Cyber Security Alliance
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Cyber Security Alliance
Appsec rump reverse-i_os_machook
Appsec rump reverse-i_os_machook
Cyber Security Alliance
Más de Cyber Security Alliance
(20)
Bug Bounty @ Swisscom
Bug Bounty @ Swisscom
Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
Blockchain for Beginners
Blockchain for Beginners
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
Understanding the fundamentals of attacks
Understanding the fundamentals of attacks
Rump : iOS patch diffing
Rump : iOS patch diffing
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
Hacking the swisscom modem
Hacking the swisscom modem
Colt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinal
Asfws2014 tproxy
Asfws2014 tproxy
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Appsec rump reverse-i_os_machook
Appsec rump reverse-i_os_machook
Último
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Último
(20)
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Operation emmental appsec
1.
Operation Emmental David
Sancho FTR team 11/10/2014 Copyright 2014 Trend Micro Inc. 1
2.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
3.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
4.
The Way In…
11/10/2014 Copyright 2014 Trend Micro Inc. 2
5.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
6.
One more certificate
on the list… 11/10/2014 Copyright 2014 Trend Micro Inc. 2
7.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
8.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
9.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
10.
But what’s hhaappppeenniinngg
iinn reality? 11/10/2014 Copyright 2014 Trend Micro Inc. 2
11.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
12.
Attacker’s Infrastructure DNS
servers C&C servers Windows Trojan Hosting servers SMS receiver 11/10/2014 Copyright 2014 Trend Micro Inc. 2 Android Trojan
13.
Domains involved
hxxp://security-apps.net/Raiffeisen.apk hhxxxxpp::////sseeccuurriittyy--aappppss..bbiizz//RRaaiiffffeeiisseenn..aappkk hxxp://tc-zo.ch/security/ZKB.apk 11/10/2014 Copyright 2014 Trend Micro Inc. 2
14.
Who registered those?
Oleg Makarov oleg_makarov555@yahoo.com 11/10/2014 Copyright 2014 Trend Micro Inc. 2
15.
Other domains from
our friend Oleg banking-security.net certificate-security. com chromeupd.pw safe-browser.biz safe-time.net security-apps.biz security-apps.net 11/10/2014 Copyright 2014 Trend Micro Inc. 2 ffupdate.pw ieupdate.pw sfotware.pw softwareup.pw
16.
openssl s_client –connect
5.39.219.212:443 | openssl x509 -text DNS:default, DNS:93.171.202.71, DNS:e-finance.postfinance.ch, DNS:banking.bekb.ch, DNS:cs.directnet.com, DNS:e-banking.gkb.ch, DNS:eb.akb.ch, DNS:ebanking-ch.ubs.com, DNS:ebanking-ch1.ubs.com, DNS:ebanking-ch2.ubs.com, DNS:ebanking.bkb.ch, DNS:inba.lukb.ch, DNS:netbanking.bcge.ch, DNS:onba.zkb.ch, DNS:tb.raiffeisendirect.ch, DNS:www.credit-suisse.com, DNS:credit-suisse.com, DNS:www.onba.ch, DNS:onba.ch, DNS:www.postfinance.ch, DNS:postfinance.ch, DNS:www.raiffeisen.ch, DNS:raiffeisen.ch, DNS:www.ubs.com, DDNNSS::uubbss..ccoomm,, DDNNSS::wwwwww..zzkkbb..cchh,, DDNNSS::zzkkbb..cchh,, DNS:wwwsec.ebanking.zugerkb.ch, DNS:banking.raiffeisen.at, DNS:online.bankaustria.at, DNS:ebanking.bawagpsk.com, DNS:netbanking.sparkasse.at, DNS:ebanking.easybank.at, DNS:banking.privatbank.at, DNS:bankaustria.at, DNS:www.bankaustria.at, DNS:raiffeisen.at, DNS:www.raiffeisen.at, DNS:privatbank.at, DNS:www.privatbank.at, DNS:sparkasse.at, DNS:www.sparkasse.at, DNS:bawagpsk.com, DNS:www.bawagpsk.com, DNS:easybank.at, DNS:www.easybank.at, DNS:*.google.com, DNS:*.android.com, DNS:*.google.de, DNS:*.google.nl, DNS:*.gstatic.com, DNS:*.youtube.com, DNS:google.com, DNS:youtube.com, DNS:facebook.com, DNS:*.facebook.com, DNS:gmx.com, DNS:gmx.de, DNS:*.gmx.com, DNS:*.gmx.de, DNS:*.gmx.ch, DNS:*.gmx.at, DNS:yahoo.com, DNS:www.yahoo.com, DNS:microsoft.com, DNS:www.microsoft.com, DNS:gmail.com, DNS:paypal.com, DNS:*.paypal.com, DNS:stats2.bekb.ch, DNS:sdc.credit-suisse.com, DNS:portal.privatbank.at, DNS:portal.raiffeisen.at, DNS:stat.swedbank.se, 11/10/2014 Copyright 2014 Trend Micro Inc. 2
17.
OObbnniilliimm rid 11/10/2014
Copyright 2014 Trend Micro Inc. 2
18.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
19.
11/10/2014 Copyright 2014
Trend Micro Inc. 2
20.
TThhaannkk yyoouu!!
Descargar ahora