[Owasp-cuiaba] Compass Security

mauricio goncalves qmail.asdf em gmail.com
Quinta Fevereiro 20 18:46:06 UTC 2014


foda

Em segunda-feira, 17 de fevereiro de 2014 14h35min09s UTC-3, Kembolle 
Amilkar escreveu:
>
> Segue relação de documentação de Segurança da compass Security: 
>
>       2013 Oct Beer-Talk Jona/Berne - SuisseID als PKI-Ersatz für KMU?<http://www.csnc.ch/misc/files/2013/SuisseID_als_PKI-Ersatz_fuer_KMU.pdf>  2013 
> Aug Black Hat Las Vegas - summary/field report<http://www.csnc.ch/misc/files/2013/blackhat_2013_v1_0.pdf>  2013 
> Aug Black Hat Las Vegas - Fraud Energy and Orchestrated Blackouts<http://www.csnc.ch/misc/files/2013/energy_fraud_and_blackouts.pdf>  2013 
> Aug Black Hat Las Vegas - Wireless M-Bus Secrity Whitepaper<http://www.csnc.ch/misc/files/2013/wmbus_security_whitepaper.pdf>  2013 
> Jun/Jul Beer-Talk Jona/Berne - SharePoint Security Revealed<http://www.csnc.ch/misc/files/2013/sharepoint_v1.0_de.pdf>  2013 
> Mar Beer-Talk #8 - Hacking Industrial Control Systems<http://www.csnc.ch/misc/files/2013/beertalk_2013_hacking_industrial_control_systems.pdf>  2013 
> Mar Beer-Talk #8 - Cyber-Bedrohung (MELANI)<http://www.csnc.ch/misc/files/2013/beertalk_2013_cyberbedrohung_MELANI.pdf>  2012 
> Oct Beer-Talk #7 - Social Engineering / SmartPhone and DriveBy<http://www.csnc.ch/misc/files/2012/201210_BeerTalk_SocialEngineering.pdf>  2012 
> Aug Beer-Talk #6 - Incident Experiences/Forensic Readiness<http://www.csnc.ch/misc/files/2012/201208_forensic_readiness.pdf>  2012 
> Aug Black Hat Las Vegas - summary/field report<http://www.csnc.ch/misc/files/2012/blackhat_2012_paper_v1_0.pdf>  2012 
> Jun Beer-Talk #5 - IPv6<http://www.csnc.ch/misc/files/2012/201206_BeerTalk_IPv6_1.1.pdf>  2012 
> Mar Beer-Talk #4 - Advanced Web Security<http://www.csnc.ch/misc/files/201203_AdvancedWebSecurity.pdf>  2012 
> Jan Fachanlass "Mobilität und Sicherheit" der Fachgruppe 
> Sicherheitstechnik FGST, Swiss Engineers<http://www.csnc.ch/misc/files/publications/2012_fgst_mobilitaet_und_sicherheit>  2011 
> Dec Sophos Roadshow "Anatomy of an Attack": "Cloud Computing - 
> Sonnenschein oder Donnerwetter?"<http://www.csnc.ch/misc/files/2011/sophos_aoa_cloudsecurity_v1_0.pdf>  2011 
> Dec HTML5 Web Security<http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf>  2011 
> Nov *Beer-Talk # 3 - Swiss National Cyber Defense Strategy*  2011 Oct Compass 
> Live-Hacking at it-sa: VoIP<http://c.mescdn.com/nuernbergmesse/it-sa/2011/player.php?title=Live-Hacking%3A+Sprachfehler+2.0+-+VoIP+im+Visier&speaker=Giedat%2C+Rainer&company=Compass+Security+AG+&id=BL_Di_17_15_Giedat>  2011 
> Oct Compass Live-Hacking at it-sa: Phishing<http://c.mescdn.com/nuernbergmesse/it-sa/2011/player.php?title=Live-Hacking%3A+Anatomie+von+Phishen+-+Die+Hintert%C3%BCr+zur+Chefetage&speaker=Herzog%2C+Sascha&company=Compass+Security+AG+&id=RO_Mi_16_45_Herzog>  2011 
> Oct Compass Live-Hacking at it-sa: Mobile Security<http://c.mescdn.com/nuernbergmesse/it-sa/2011/player.php?title=Live-Hacking%3A+Wie+%28un-%29sicher+sind+iPhone%2C+Android%2C+Blackberry+%26+Co.%3F&speaker=Di+Filippo%2C+Marco&company=Compass+Security+AG+&id=BL_Do_09_15_Di_Filippo>  2011 
> Sept Beer-Talk # 2 - iPhone Security<http://www.csnc.ch/misc/files/2011/beertalk_iphone_security.pdf>  2011 
> Aug BlackHat / Defcon 2011, Las Vegas - Field report by Compass<http://www.csnc.ch/misc/files/2011/BlackHat_2011_v1_0_web.pdf>  2011 
> Jul Beer-Talk # 1 - HTML5 Web Security<http://www.csnc.ch/misc/files/2011/Beer_Talk_Html5_x2x.pdf>  2011 
> Jun Swiss IT Leadership Forum 2011 - Cyberwar<http://www.csnc.ch/misc/files/publications/2011_Swiss_ITLeadership_Forum_Cyberwar.pdf>  2011 
> Jun Digicomp HackingDay 2011 - Cybercrime today<http://www.csnc.ch/misc/files/publications/2011_digicomp_cybercrime_heute.pdf>  2011 
> May SCS3 - IPv6 & Cyber Security - Alaa Al-Din Al-Radhi<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Alaa-Al-Din.pdf>  2011 
> May SCS3 - Open Web Application Security Project - Antonio Fontes<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Fontes.pdf>  2011 
> May SCS3 - Potential dangers of Activex attacks - Brian Mariani<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Mariani.pdf>  2011 
> May SCS3 - Threats On Your Smartphone - Celil Ünüver<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Unuver.pdf>  2011 
> May SCS3 - How to beat a dragon with a shark - Christian Beek<https://www.swisscyberstorm.com/speakers/beek>  2011 
> May SCS3 - ZeuS MitMo: a real case of banking fraud through mobile phones 
> - Daniel L. Creus <https://www.swisscyberstorm.com/speakers/creus>  2011 
> May SCS3 - Achieving Low-Latency Security - Darren Turnbull<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Turnbull.pdf>  2011 
> May SCS3 - Social Engineering - “Because there is no patch for human 
> stupidity” - Dave Wollmann<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Wollmann.pdf>  2011 
> May SCS3 - Data Breaches: Legal Obligations And Practices For Businesses 
> - David Rosenthal <https://www.swisscyberstorm.com/speakers/rosenthal>  2011 
> May SCS3 - Corporate IT Forensic Readiness - Bruce Nikkel<https://www.swisscyberstorm.com/speakers/nikkel>  2011 
> May SCS3 - Hunting Slowloris and Friends -Christian Folini<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Folini.pdf>  2011 
> May SCS3 - Collective Prediction in Digital Social Networks Through 
> Discovery of Collaborative Innovation Networks - Peter A. Gloor<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Gloor.pdf>  2011 
> May SCS3 - Exploiting SCADA Systems - Jeremy Brown<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Brown.pdf>  2011 
> May SCS3 - Application Security as a Team Effort - Jörg Ewald<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Ewald.pdf>  2011 
> May SCS3 - iOS applications reverse engineering - Julien Bachmann<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Bachmann.pdf>  2011 
> May SCS3 - Obfuscated Malc0de Hunting with Emulator+Disassembler - Lee 
> Ling Chuan <http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Lee.pdf>  2011 
> May SCS3 - Is Switzerland under attack? - Marc Henauer<https://www.swisscyberstorm.com/speakers/henauer>  2011 
> May SCS3 - HTTP Parameter Pollution Vulnerabilities in Web Applications - 
> Marco Balduzzi<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Balduzzi.pdf>  2011 
> May SCS3 - I Control Your Code – Attack Vectors Through the Eyes of 
> Software-based Fault Isolation - Mathias Payer<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Payer.pdf>  2011 
> May SCS3 - Modern Criminal Networks: Infrastructure and Tasks 
> Segmentation of Today's Criminal Groups in Cyberspace - Mauro Vignati<https://www.swisscyberstorm.com/speakers/vignati>  2011 
> May SCS3 - Cyber Warfare Prediction - Daniel Ng (Ching Wa)<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Weng.pdf>  2011 
> May SCS3 - Cryptography: how to break it in practice if you must? - 
> Pascal Junod <https://www.swisscyberstorm.com/speakers/junod>  2011 May SCS3 
> - Botnet Resistant Coding - Rothschild/Greko<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Greko-Rothschild.pdf>  2011 
> May SCS3 - Auditing the Hacker’s Mind : wrong myths, real facts and the 
> Hackers Profiling Project (HPP) - Raoul Chiesa<https://www.swisscyberstorm.com/speakers/chiesa>  2011 
> May SCS3 - Attacks against governmental organizations and appropriate 
> incident response procedures - Reto Inversini<https://www.swisscyberstorm.com/speakers/inversini>  2011 
> May SCS3 - Cookiejacking - Rosario Valotta<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Valotta.pdf>  2011 
> May SCS3 - Relay Attacks on Passive Keyless Entry and Start Systems in 
> Modern Cars - Srdjan Capkun<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Capkun.pdf>  2011 
> May SCS3 - Fixing the Fundamental Failures of End-Point Security - Stefan 
> Frei <http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Frei.pdf>  2011 
> May SCS3 - DOM XssIdentificationand Exploitation - Stefano Di Paola<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Di_Paola.pdf>  2011 
> May SCS3 - Strong Authentication in Web Application“State of the Art 
> 2011” - Sylvain Maret<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Maret.pdf>  2011 
> May SCS3 - Reality check: 2011 Verizon Data Breach Investigations Report 
> - Thijs Bosschert <https://www.swisscyberstorm.com/speakers/bosschert>  2011 
> May SCS3 - HTML5 Web Security - Thomas Röthlisberger<http://media.hacking-lab.com/scs3/scs3_pdf/SCS3_2011_Roethlisberger.pdf>  2011 
> May SCS3 - Protecting Web Applications with Port Knocking - Yiannis 
> Pavlosoglou <https://www.swisscyberstorm.com/speakers/pavlosoglou.html>  2011 
> Mar Records Management Konferenz - Coud Security / Social Media<http://www.csnc.ch/misc/files/publications/2011_rm_schulung_security_socialmedia_cloudservices.pdf>  2011 
> Feb HEIG-VD Security Day - Social Engineering Attacks<http://www.csnc.ch/misc/files/publications/2011_HEIG-VD_Security_Days_Social_Engineering_Attacks.pdf>  
> 2010 Mobilephone Security<http://www.csnc.ch/misc/files/publications/2011_mobilephone_security.pdf>  2010 
> Nov W-jax, Munich - XML External Entity Attacks (XXE)<http://www.csnc.ch/misc/files/publications/2010_w-jax_xml_theory_and_attacks_XXE.pdf>  2010 
> Sept Compass Event - ASP.NET and ViewState Security<http://www.csnc.ch/misc/files/publications/2010_compass_event_asp_net_and_viewstate_security.pdf>  2010 
> Sept Compass Event - Bypassing Same Origin Policy for Mash Ups<http://www.csnc.ch/misc/files/publications/2010_compass_event_same_origin_policy.pdf>  2010 
> Sept Compass Event - Apple iOS 4 Privacy<http://www.csnc.ch/misc/files/publications/2010_compass_event_apple_ios_4_privacy.pdf>  2010 
> Sept Compass Event - Mobile Security<http://www.csnc.ch/misc/files/publications/2010_compass_event_mobile_security.pdf>  2010 
> Sept Compass Event - Windows Attack<http://www.csnc.ch/misc/files/publications/2010_compass_event_windows_attack.pdf>  2010 
> Feb MCTA - Workshop "Mobile Security"<http://media.hacking-lab.com/largefiles/mcta_mobilephone_security_workshop_v1.3.pdf>  2009 
> Oct Compass Event - Security Evaluation of Crealogix CLX.Sentinel<http://www.csnc.ch/misc/files/publications/event09_clxsentinel_evaluation_v1.0.pdf>  2009 
> Oct Compass Event - Social Engineering Attacks<http://www.csnc.ch/misc/files/publications/event09_socialengineering_v1.0.pdf>  2009 
> Oct Compass Event - Compass expand NMAP by SCTP<http://www.csnc.ch/misc/files/publications/event09_nmap_with_sctp_V1.0.pdf>  2009 
> Oct Compass Event - 0-day Exploits: Are we powerless?<http://www.csnc.ch/misc/files/publications/event09_anti-0-day-exploits-v1.1.pdf>  2009 
> Jul Pandora's Cyber Box<http://www.csnc.ch/misc/files/publications/2009_Cyberbuechse_der_Pandora.pdf>  2009 
> June Social Engineering Test Cases<http://www.csnc.ch/misc/files/publications/Social_Engineering_V2.0.pdf>  2009 
> May SCSII - Oracle Security<http://www.csnc.ch/misc/files/publications/2009_scsII_alexander_kornbrust_OracleSecurity.pdf>  2009 
> May SCSII - Reverse Code Engineering<http://www.csnc.ch/misc/files/publications/2009_scsII_andreas_greulich_ReverseCodeEngineering.pdf>  2009 
> May SCSII - WLAN Security<http://www.csnc.ch/misc/files/publications/2009_scsII_andreas_richter_WLANSecurity.pdf>  2009 
> May SCSII - VPN with Windows 7<http://www.csnc.ch/misc/files/publications/2009_scsII_andreas_steffen_VPNWindows7x.pdf>  2009 
> May SCSII - NFS<http://www.csnc.ch/misc/files/publications/2009_scsII_axel_neumann_NFS.pdf>  2009 
> May SCSII - Hacking Legal<http://www.csnc.ch/misc/files/publications/2009_scsII_beat_lehmann_Hacking-Legal.pdf>  2009 
> May SCSII - Anti-Virus Secrets<http://www.csnc.ch/misc/files/publications/2009_scsII_candid_wueest_AV-Secrets.pdf>  2009 
> May SCSII - ZFS<http://www.csnc.ch/misc/files/publications/2009_scsII_christian_kendi_ZFS.pdf>  2009 
> May SCSII - Unix Security<http://www.csnc.ch/misc/files/publications/2009_scsII_daniel_stirnimann_UnixSecurity.pdf>  2009 
> May SCSII - Lsrunase Supercrypt<http://www.csnc.ch/misc/files/publications/2009_scsII_ivan_buetler_LsrunaseSupercrypt.pdf>  2009 
> May SCSII - Observation Plugin<http://www.csnc.ch/misc/files/publications/2009_scsII_marcel_klug_ObservationPlugin.pdf>  2009 
> May SCSII - Hacker Paragraph<http://www.csnc.ch/misc/files/publications/2009_scsII_marco_difilippo_Hackerparagraph.pdf>  2009 
> May SCSII - Internet Threats<http://www.csnc.ch/misc/files/publications/2009_scsII_marco_krebs_GefahrenInternet.pdf>  2009 
> May SCSII - Raiffeisen E-Banking Security<http://www.csnc.ch/misc/files/publications/2009_scsII_michael_maeder_SicherheitRaiffeisenE-Banking.pdf>  2009 
> May SCSII - Windows Update<http://www.csnc.ch/misc/files/publications/2009_scsII_roger_blum_WindowsUpdateDoItRight.pdf>  2009 
> May SCSII - Cybercrime Today<http://www.csnc.ch/misc/files/publications/2009_scsII_roman_huessy_Cybercrime_today.pdf>  2009 
> May SCSII - FastFlux / ZeuS<http://www.csnc.ch/misc/files/publications/2009_scsII_roman_huessy_FastFlux_ZeuS.pdf>  2009 
> May SCSII - DECT Hacking<http://www.csnc.ch/misc/files/publications/2009_scsII_walter_sprenger_DectHacking.pdf>  2009 
> May SCSII - DriveBy Infection<http://www.csnc.ch/misc/files/publications/2009_scsII_walter_sprenger_DriveByInfection.pdf>  2008 
> Nov XSS Shell<http://www.csnc.ch/misc/files/publications/compass_event08_xssshell_krm_v1.0.pdf>  2008 
> Nov Smartcard APDU Analysis<http://www.csnc.ch/misc/files/publications/compass_event08_smartcard_apdu_analysis_but_v1.2.pdf>  2008 
> Nov Teredo - Ipv6 Security<http://www.csnc.ch/misc/files/publications/compass_event08_ipv6_security_sti_v1.1.pdf>  2008 
> Nov Vmware Device Driver Exploit<http://www.csnc.ch/misc/files/publications/compass_event08_hgfsploit_roe_v1.0.pdf>  2008 
> Nov E-Banking Trends<http://www.csnc.ch/misc/files/publications/compass_event08_ebanking_trends_spr_v1.0.pdf>  2008 
> Nov Cross Site Request Forgery<http://www.csnc.ch/misc/files/publications/compass_event08_csrf_bru_v1.0.pdf>  2008 
> Oct Internet in China - The Great Firewall<http://www.csnc.ch/misc/files/publications/ChineseWall_V1.2.pdf>  2008 
> Aug Summary Blackhat / Defcon 2008<http://www.csnc.ch/misc/files/publications/blackhat_defcon_trends_EN_V1.0.pdf>  2008 
> May Malware Distribution<http://www.csnc.ch/misc/files/publications/verbreitung_malware_v1.0.pdf>  2008 
> Apr Web 2.0 Event - Slides<http://www.csnc.ch/misc/files/publications/Web2.0_Event_22.April_V1.2.pdf>  2008 
> Feb Summary Blackhat / Defcon 2007<http://www.csnc.ch/misc/files/publications/trends_and_funstuff_0708_v1.0.pdf>  2008 
> Feb Breaking TOR Anonymity<http://www.csnc.ch/misc/files/publications/the_onion_router_v1.1.pdf>  2007 
> Nov Hash Injection Attacke<http://www.csnc.ch/misc/files/publications/Hash_Injection_Attack_E.pdf>  2007 
> Oct Wireless Drive-By Hacking<http://www.csnc.ch/misc/files/publications/2007_wifi_exploited_v1.0.pdf>  2007 
> Oct DNS Attacken - Advanced Methoden<http://www.csnc.ch/misc/files/publications/2007_DNS_Cache_Poisoning_v1.1.pdf>  2007 
> Oct Verseuchung von Viren über E-Bay Hardware<http://www.csnc.ch/misc/files/publications/2007_suspicious_devices_v1.1_print.pdf>  2007 
> Oct Browser Plugins und Extensions - the Hackers View<http://www.csnc.ch/misc/files/publications/2007_plugins_event_v1.0_withComments.pdf>  2007 
> Oct Kerberos Session Hijacking Attacke<http://www.csnc.ch/misc/files/publications/2007_kerberos_v1.0_print.pdf>  2007 
> Oct Tempest Attacke - Abhören des LCD Screen<http://www.csnc.ch/misc/files/publications/2007_Kurmann_Crypto.pdf>  2007 
> Aug Solaris10 into Active Directory Integration<http://www.csnc.ch/misc/files/publications/Solaris10_AD_Integration_V1.0.pdf>  2007 
> Jun U3 USB Stick (In-)Security<http://www.csnc.ch/misc/files/publications/u3_technology_v1.0.pdf>  2007 
> Jan Universal PDF XSS<http://www.csnc.ch/misc/files/publications/universal_pdf_xss_v1.1.pdf>  2006 
> Dec Hardening Checkliste Windows 2003 Intranet Basis<http://www.csnc.ch/misc/files/publications/Checkliste_Win2K3_Intranet_Basis_V1.7.pdf>  2006 
> Dec Hardening Checkliste Exchange 2003<http://www.csnc.ch/misc/files/publications/Checkliste_Exchange_2003_V1.2.pdf>  2006 
> Dec Hardening Checkliste Windows XP<http://www.csnc.ch/misc/files/publications/Checkliste_WinXP_V1.5.pdf>  2006 
> Dec Hardening Checkliste IIS 6.0 im Intranet<http://www.csnc.ch/misc/files/publications/Checkliste_Win2K3_IIS6_V1.2.pdf>  2006 
> Dec Hardening Checkliste Microsoft SQL Server 2000<http://www.csnc.ch/misc/files/publications/Checkliste_Win2K3_SQL2000_V1.1.pdf>  2006 
> Dec Hardening Checkliste ISA Server 2004 Intranet<http://www.csnc.ch/misc/files/publications/Checkliste_ISA_Server_2004_Intranet_V1.0.pdf>  2006 
> Dec Summary Blackhat / Defcon 2006<http://www.csnc.ch/misc/files/publications/trends_at_blackhat_defcon_2006_v2.2.pdf>  2006 
> Oct Skype Trojaner<http://www.csnc.ch/misc/files/publications/2006_skype_trojaner_v1.1.pdf>  2006 
> Oct BHO (Browser Helper Object) Angriff<http://www.csnc.ch/misc/files/publications/2006_bho_attack_v1.3.pdf>  2006 
> Oct Shellcode Proxying/CoreImpact<http://www.csnc.ch/misc/files/publications/2006_syscall_proxying_v1.0.pdf>  2006 
> Oct Oracle Datenbank Sicherheit<http://www.csnc.ch/misc/files/publications/2006_Best_of_Oracle_Security_2006.pdf>  2006 
> Oct Static/Dynamic Payload Analysis<http://www.csnc.ch/misc/files/publications/2006_malware_analysis_v1.0.pdf>  2006 
> Oct IE Fuzzing and Microsoft Incident Handling<http://www.csnc.ch/misc/files/publications/2006_IE_Fuzzing.pdf>  2006 
> Jun Phishing-Frühwarnsystem<http://www.csnc.ch/misc/files/publications/vortrag_pws_v1.1.pdf>  2006 
> May Ratgeber zu Solaris-Ermittlungen<http://www.csnc.ch/misc/files/publications/solaris_evidence_gathering_v1.2.pdf>  2006 
> Mar Harddisk ATA Security<http://www.csnc.ch/misc/files/publications/harddisk_ata_security_v1.1-1.pdf>  2005 
> Nov Time Stamping Authority<http://www.csnc.ch/misc/files/publications/V1_zeitstempel_tsa_v1.0.pdf>  2005 
> Nov Terminal Server Break-Out<http://www.csnc.ch/misc/files/publications/V2_terminal-server_break-out_v1.0.pdf>  2005 
> Nov Advanced Phishing<http://www.csnc.ch/misc/files/publications/V3_phishing_and_pharming_V1.0.pdf>  2005 
> Nov MELANI<http://www.csnc.ch/misc/files/publications/V4_schutz_kritischer_V1-1.pdf>  2005 
> Nov Hackerspuren in Web Applikationen<http://www.csnc.ch/misc/files/publications/V5_hacker_traces_in_webapps_v1.0.pdf>  2005 
> Nov VoIP Angriffe<http://www.csnc.ch/misc/files/publications/V6_attacking_voip_v1.0.pdf>  2005 
> Oct Forensik in E-Business-Anwendungen<http://www.csnc.ch/misc/files/publications/forensic_in_e-business_anwendungen_v1.1.pdf>  2005 
> Jul Bedrohungen Web-Applikationen<http://www.csnc.ch/misc/files/publications/bedrohungen_web_applikationen_v2.5.pdf>  2005 
> Feb Securing Wireless Networks<http://www.csnc.ch/misc/files/publications/Securing_Wireless_Networks_Reloaded_V1.1.pdf>  2004 
> Dec 24-Stunden-Spiel "Die Computer-Knacker"<http://www.csnc.ch/misc/files/publications/csnc_comp_knacker.pdf>  2004 
> Nov Sicherheit bei automatisierten Windows Installationen<http://www.csnc.ch/misc/files/publications/sicherheit_bei_automatisierten_installationen_V1.0.pdf>  2004 
> Oct Covert Channel - Inside Out<http://www.csnc.ch/misc/files/publications/covert_channel_csnc_v1.0.pdf>  2004 
> Oct Computerforensik und -kriminalität<http://www.csnc.ch/misc/files/publications/Compass_Forensik_DE_v1.3.pdf>  2004 
> Aug .NET Basics & Security<http://www.csnc.ch/misc/files/publications/dotNet_Security_v1.0.pdf>  2004 
> Apr Inside-Out Attacks<http://www.csnc.ch/misc/files/publications/2004_inside_out_tunnel_v1.0.pdf>  2004 
> Apr Spyware Analysis<http://www.csnc.ch/misc/files/publications/2004_spyware_analysis_forensics_v1.0.pdf>  2004 
> Apr Windows Evidence Gathering<http://www.csnc.ch/misc/files/publications/2004_win32_forensics_v1.0.pdf>  2004 
> Apr Überwachung elektronischer Kommunikation<http://www.csnc.ch/misc/files/publications/2004_ueberwachung.pdf>  2004 
> Apr J2EE Trojaner<http://www.csnc.ch/misc/files/publications/2004_j2ee_trojans_v1.1.pdf>  2004 
> Apr Windows 2003 - Security Hints<http://www.csnc.ch/misc/files/publications/2004_windows2003_security_hints_v1.0.pdf>  2004 
> Mar Chrooting Unix Services (Apache, MySQL, Tomcat)<http://www.csnc.ch/misc/files/publications/Chrooting_Applications_CSNC_V2.0.pdf>  2003 
> Sept Laptop Security<http://www.csnc.ch/misc/files/publications/laptopsecurity_csnc_german.pdf>  2003 
> Sept Kernel Hooks und Spy-Detection<http://www.csnc.ch/misc/files/publications/kernelhooks_csnc_german.pdf>  2003 
> Aug Argus PitBull B1 Erläuterungen<http://www.csnc.ch/misc/files/publications/SummaryArgusPitbull_CSNC.pdf>  2003 
> Jul Cross Site Scripting Attacken<http://www.csnc.ch/misc/files/publications/CrossSiteScripting_V1.0.pdf>  2003 
> Jun TCP/IP Gender Ganger<http://www.csnc.ch/misc/files/publications/TCP-IP_Gender_Changer_CSNC_German_V1.0.pdf>  2003 
> May Questions to Penetration Test<http://www.csnc.ch/misc/files/publications/questions_penetrationtest_v1.2.EN.pdf>  2003 
> Apr LASEC SSL Sicherheitslücke<http://www.csnc.ch/misc/files/publications/ssl_event_vortrag.pdf>  2003 
> Mar Cross Site Tracing Schwachstelle in Web Anwendungen<http://www.csnc.ch/misc/files/publications/CrossSiteTracingAttacks_V1.1.pdf>  2003 
> Mar Linux ptrace Sicherheitslücke<http://www.csnc.ch/misc/files/publications/Linux_PTrace_Root_Compromize.pdf>  2003 
> Mar SSL Sicherheitslücke - Timing Attack<http://www.csnc.ch/misc/files/publications/ssl_event_vortrag.pdf>  2003 
> Mar Präsentation zum Thema Security Assessment<http://www.csnc.ch/misc/files/publications/Compass_Security_Testing.pdf>  2003 
> Mar Rechtliche Aspekte von Security Assessments<http://www.csnc.ch/misc/files/publications/legal.pdf>  2003 
> Jan Finjan SurfinGate V5.6 Security Considerations<http://www.csnc.ch/misc/files/publications/FinjanSurfinGate_Analysis_CSNC_V3.0.pdf>  2003 
> Jan Session Fixation Schwachstelle in Web Anwendungen<http://www.csnc.ch/misc/files/publications/SessionFixationVulnerablityV1.0.pdf>  2003 
> Jan Webservices Sicherheitsüberlegungen<http://www.csnc.ch/misc/files/publications/WebServiceSecurity_CSNC.pdf>  2003 
> Jan VPN Gefahrenanalyse<http://www.csnc.ch/misc/files/publications/VPNThreatAnalysis_CSNC.pdf>  2003 
> Jan Shatter Attack<http://www.csnc.ch/misc/files/publications/ShatterAttack_CSNC.pdf>  2003 
> Jan Security von Wireless Networks<http://www.csnc.ch/misc/files/publications/HackingandSecuringWirelessNetworks_CSNC.pdf>  2002 
> Oct Java Datenstrom Inspection<http://www.csnc.ch/misc/files/publications/ObjectInspectorV1.0.pdf>  2002 
> Oct File-Type Analyse (Content Filter)<http://www.csnc.ch/misc/files/publications/Technical_Update_Content_Filter_V1.0.pdf>  2002 
> Jun Hardening Windows NT<http://www.csnc.ch/misc/files/publications/WindowsNTIISHardening_CSNC.pdf>  2002 
> Feb Leitfaden Penetration Tests isb.admin.ch<http://www.csnc.ch/misc/files/publications/Leitfaden_Penetration_Test_von_ISB.ADMIN.CH.pdf>  2001 
> Jun Hardening Oracle<http://www.csnc.ch/misc/files/publications/Oracle_SecurityCheck_CSNC.pdf>  2001 
> Mar Hardening Solaris<http://www.csnc.ch/misc/files/publications/SolarisHardening_CSNC.pdf>  2000 
> Oct Hardening WebSphere<http://www.csnc.ch/misc/files/publications/WAS_IBMHTTPDHardening_CSNC.pdf>  1999 
> Nov Leitfaden Tiger-Team Services FGSEC<http://www.csnc.ch/misc/files/publications/fgsec_isaca_tigerteam.pdf>
> --
>
> - Kembolle Amilkar de Oliveira, Esp. 
> | T.A.D.S | G.P.N.T.I. |  G.T. I. | Seg. Info. |  
> Contact: Homepage <http://www.kembolle.com.br> | Gtalk <javascript:> | MSN<javascript:>| 
> XMMP <javascript:> | SkypeID:Oliverkall
>  
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL: <http://lists.owasp.org/pipermail/owasp-cuiaba/attachments/20140220/ff8ab35b/attachment-0001.html>


More information about the Owasp-cuiaba mailing list