|
@niemand_sec | |||||
|
#BHEU is about to begin! :D pic.twitter.com/sWT0vO7Mqe
|
||||||
|
||||||
|
Niemand 🇦🇷
@niemand_sec
|
5. pro |
|
Breaking Bootloaders on the Cheap at #BHEU by @qaistemeiza and @sublevado pic.twitter.com/tHxcCDO6lL
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
Booting the iOS Kernel to an Interactive Bash Shell on QEMU at #BHEU by @jonathanAfek pic.twitter.com/2vcDpbbGXD
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
First Contact - Vulnerabilities in Contactless Payments at #BHEU pic.twitter.com/FagWpbYd8q
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
Exploiting Windows Hello for Business
#BHEU pic.twitter.com/YfeOcSTEiE
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
@MGrafnetter explained many different attacks against Windows Hello, nice work! #BHEU pic.twitter.com/2xiHgewAiN
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
#BHEU Countdown for the keynote pic.twitter.com/vj08IGMXZM
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
First Contact - Vulnerabilities in Contactless Payments at #BHEU pic.twitter.com/GFcJHBS82V
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
Exploiting Windows Hello for Business
#BHEU One of the many attacks explained during the talk pic.twitter.com/WKFGEihN0L
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
Exploiting Windows Hello for Business
#BHEU
Remembering old techniques ROCA pic.twitter.com/KROIQSrTGC
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
4. pro |
|
Exploiting Windows Hello for Business
#BHEU Each user from AD can list the public keys and identify the weak ones pic.twitter.com/t98RTkrMn2
|
||
|
|
||