User contributions
From BruCON 2016
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 09:47, 27 May 2015 (diff | hist) . . (-10) . . Training
- 09:46, 27 May 2015 (diff | hist) . . (+234) . . Training
- 10:54, 26 May 2015 (diff | hist) . . (-1) . . Training 2015 - Offensive IoT Exploitation (→Trainer Biography) (current)
- 10:54, 26 May 2015 (diff | hist) . . (0) . . Training 2015 - Offensive IoT Exploitation (→Trainer Biography)
- 10:53, 26 May 2015 (diff | hist) . . (0) . . m File:Aseem Jakhar.jpg (Protected "File:Aseem Jakhar.jpg" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite) [Upload=Allow only administrators] (indefinite))) (current)
- 10:53, 26 May 2015 (diff | hist) . . (0) . . m File:Aditya Gupta.jpg (Protected "File:Aditya Gupta.jpg" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite) [Upload=Allow only administrators] (indefinite))) (current)
- 10:53, 26 May 2015 (diff | hist) . . (0) . . N File:Aditya Gupta.jpg
- 10:50, 26 May 2015 (diff | hist) . . (+1) . . Training 2015 - Offensive IoT Exploitation (→Trainer Biography)
- 10:49, 26 May 2015 (diff | hist) . . (+2,645) . . Training 2015 - Offensive IoT Exploitation (→Trainer Biography)
- 10:48, 26 May 2015 (diff | hist) . . (0) . . N File:Aseem Jakhar.jpg
- 10:40, 26 May 2015 (diff | hist) . . (+2,684) . . N Training 2015 - Offensive IoT Exploitation (Created page with "=Offensive IoT Exploitation= ==Objectives== IoT or the Internet of Things is one of the most upcoming trends in technology as of now. A lot many new devices are coming up eve...")
- 10:36, 26 May 2015 (diff | hist) . . (+6) . . Training 2015 - Assessing and Exploiting Control Systems (→Tactical Exploitation and Response)
- 10:32, 26 May 2015 (diff | hist) . . (0) . . m Training 2015 - Assessing and Exploiting Control Systems (Protected "Training 2015 - Assessing and Exploiting Control Systems" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
- 14:27, 15 May 2015 (diff | hist) . . (+630) . . Training 2015 - Assessing and Exploiting Control Systems (→Trainer Biography)
- 14:26, 15 May 2015 (diff | hist) . . (+1,579) . . Training 2015 - Assessing and Exploiting Control Systems (→Requirements)
- 14:19, 15 May 2015 (diff | hist) . . (+3,519) . . Training 2015 - Assessing and Exploiting Control Systems (→Course Contents)
- 14:08, 15 May 2015 (diff | hist) . . (-558) . . Training 2015 - Assessing and Exploiting Control Systems (→Course Description)
- 14:03, 15 May 2015 (diff | hist) . . (-55) . . Training 2015 - Assessing and Exploiting Control Systems (→Course Description)
- 14:02, 15 May 2015 (diff | hist) . . (+5,300) . . N Training 2015 - Assessing and Exploiting Control Systems (Created page with "=Tactical Exploitation and Response= ===Course Description=== This is not your traditional SCADA security course! How many courses send you home...")
- 13:50, 15 May 2015 (diff | hist) . . (+83) . . Training
- 20:49, 3 May 2015 (diff | hist) . . (+56) . . Contact (current)
- 20:47, 3 May 2015 (diff | hist) . . (0) . . Travel (→By Space Craft)
- 20:46, 3 May 2015 (diff | hist) . . (-574) . . Tickets (→BruCON Training Track)
- 12:37, 2 May 2015 (diff | hist) . . (+40) . . Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more
- 19:10, 29 April 2015 (diff | hist) . . (+2,493) . . Training
- 21:27, 28 April 2015 (diff | hist) . . (-2,493) . . Training (Blanked the page)
- 20:57, 28 April 2015 (diff | hist) . . (+1) . . Training
- 20:57, 28 April 2015 (diff | hist) . . (+51) . . Training
- 20:52, 28 April 2015 (diff | hist) . . (+174) . . Training 2015 - Cyber Breach Management (→Trainer Biography) (current)
- 20:49, 28 April 2015 (diff | hist) . . (0) . . m Training 2015 - Cyber Breach Management (Protected "Training 2015 - Cyber Breach Management" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
- 20:48, 28 April 2015 (diff | hist) . . (-309) . . Training 2015 - Cyber Breach Management (→Trainer Biography)
- 20:48, 28 April 2015 (diff | hist) . . (-1) . . Training 2015 - Cyber Breach Management (→Trainer Biography)
- 20:48, 28 April 2015 (diff | hist) . . (0) . . m File:Chris.Nutt.jpg (Protected "File:Chris.Nutt.jpg" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite) [Upload=Allow only administrators] (indefinite))) (current)
- 20:48, 28 April 2015 (diff | hist) . . (0) . . N File:Chris.Nutt.jpg
- 20:47, 28 April 2015 (diff | hist) . . (+2,302) . . N Training 2015 - Cyber Breach Management (Created page with "=Cyber Breach Management= ===Course Description=== The frequency, scope, and sophistication of attacks against computer networks is increasing daily. This course will teach...")
- 20:37, 28 April 2015 (diff | hist) . . (+5) . . Training
- 20:35, 28 April 2015 (diff | hist) . . (+2,194) . . Training
- 19:23, 25 April 2015 (diff | hist) . . (0) . . m File:Andrew.Honig.jpg (Protected "File:Andrew.Honig.jpg" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite) [Upload=Allow only administrators] (indefinite))) (current)
- 19:23, 25 April 2015 (diff | hist) . . (-4) . . Training 2015 - Practical Malware Analysis - Rapid Introduction (→Trainer Biography) (current)
- 19:22, 25 April 2015 (diff | hist) . . (0) . . N File:Andrew.Honig.jpg
- 19:22, 25 April 2015 (diff | hist) . . (-4) . . Training 2015 - Practical Malware Analysis - Rapid Introduction (→Trainer Biography)
- 19:21, 25 April 2015 (diff | hist) . . (-255) . . Training 2015 - Practical Malware Analysis - Rapid Introduction
- 19:14, 25 April 2015 (diff | hist) . . (0) . . Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more
- 19:13, 25 April 2015 (diff | hist) . . (0) . . Training 2015 - Tactical Exploitation and Response
- 19:12, 25 April 2015 (diff | hist) . . (+10) . . Training 2015 - Wireshark WiFi and Lua-Packet Class (→Trainers Biography)
- 19:10, 25 April 2015 (diff | hist) . . (0) . . Training 2015 - Wireshark WiFi and Lua-Packet Class (→Trainers Biography)
- 19:10, 25 April 2015 (diff | hist) . . (0) . . Training 2015 - Wireshark WiFi and Lua-Packet Class
- 19:09, 25 April 2015 (diff | hist) . . (0) . . m Training 2015 - Wireshark WiFi and Lua-Packet Class (Tom.Gilis moved page Spring Training 2015 - Wireshark WiFi and Lua-Packet Class to Training 2015 - Wireshark WiFi and Lua-Packet Class without leaving a redirect)
- 19:08, 25 April 2015 (diff | hist) . . (0) . . m Training 2015 - Tactical Exploitation and Response (Tom.Gilis moved page Spring Training 2015 - Tactical Exploitation and Response to Training 2015 - Tactical Exploitation and Response without leaving a redirect)
- 19:08, 25 April 2015 (diff | hist) . . (0) . . m Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more (Tom.Gilis moved page Spring Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more to [[Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mo...)
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)