Uncovering SAP vulnerabilities dissecting and breaking the Diag protocol

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=HmOxrUAGqnM



Duration: 46:15
4 views
0


BruCON - 2012
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #BruCON

https://www.brucon.org/

BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Belgium, BruCON offers a high quality line up of speakers, security challenges and interesting workshops. BruCON is a conference by and for the security and hacker(*) community.

The conference tries to create bridges between the various actors active in computer security world, included but not limited to hackers(*), security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies, etc…..
BruCON is organized as a non-profit event by volunteers. A group of security enthusiasts decided that it was time for Belgium to have its own security and hacker conference. A lot of countries around the world have this kind of conferences to discuss and present research on computer security and related subject matters. We want to unite people who share the same passion and support the Belgian (research) communities, with BruCON as a yearly highlight. We are not professional organizers and started this as a non-profit organization. We all have full time jobs and dedicate a lot of our free time to this project. Everyone is welcome to join us and help!!
The term ‘hacker’ has been misrepresented in popular media for a long time: “Hacking has nothing to do with criminal activities such as identity theft and electronic trespassing! Rather, it [hacker] has been coined at the Massachusetts Institute of Technology (MIT) as a term for curious individuals for whom every device or piece of software is full of exciting challenges to develop potential improvements or discover alternative uses.”

“Anyone who remembers the childhood curiosity and excitement of taking apart radios and other devices to find out how they work is a good example of what is considered a hacker!”




Other Videos By All Hacking Cons


2022-01-15How I met your pointer Hijacking client software for fuzz and profit
2022-01-15Shotgun parsers in the cross hairs
2022-01-15Cyberwar Not What We Were Expecting
2022-01-15Keynote by Katie Moussouris
2022-01-15Recent Advances in IPv6 Security
2022-01-15Welcome
2022-01-15Aloria NET The Framework, the Myth, the Legend
2022-01-15pMap, the silent killer
2022-01-15HTML5 A Whole New Attack Vector
2022-01-15We have you by the gadgets
2022-01-15Uncovering SAP vulnerabilities dissecting and breaking the Diag protocol
2022-01-15Moar Anti Forensics for the Louise
2022-01-15Andreas Bogk
2022-01-15Dan Kaminski
2022-01-15Alex Hutton
2022-01-15Ian Amit
2022-01-15Andrey Belenko
2022-01-15Alluc
2022-01-15Chris Nickerson
2022-01-15Ian Amit
2022-01-15Stephan



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering