Netconf 2020 edition Circumventing Internet shutdownsThis flash talk provides a brief overview of a few practical methods that can be used to circumvent Internet censorship techniques. more
Format of the session: Flash talk (10 mins)
|
JSFoo Coimbatore 2019 Leveraging Web Application Vulnerabilities for Resourceful Intelligence GatheringThis talk aims to introduce the audience how web application vulnerabilities can be leveraged for self-sufficient information and intelligence gathering. more
Section: Full talk (40 mins)
Technical level: Beginner
Session type: Demo
Technical level: Intermediate
Session type: Lecture
|
Rootconf 2019 Defensive and Offensive Applications of Open Source IntelligenceIn real life, a footprint can be used to distinguish and confirm the identity of an individual. The same is true on the Internet, where activities and transactions that have been carried out leave behind a digital footprint, which at times can be leveraged for gathering intelligence about a particular individual and their activities. As an example, websites which reveal partial phone numbers can … more
Section: Birds Of Feather (BOF) Session
Technical level: Intermediate
Section: Birds Of Feather (BOF) session
Technical level: Intermediate
Session type: Discussion
|