HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > 27C3 report
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|27C3 report  
> Access to the content HTML Beginning of the presentation
PDF PDF version [494 KB]
AdobeFlash Adobe Flash version  
> Description 27C3 report  
> Context & Dates Talk presented during OSSIR meeting, on 8 February 2011.
 
> Author Benjamin Arnault (Benjamin.Arnault@hsc.fr) , Guillaume Lehembre (Guillaume.Lehembre@hsc.fr)  
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Plan
27C3
27C3 - 2
Faits marquants 2010
GSM Sniffing
GSM Sniffing - 2
OsmocomBB
OsmocomBB - 2
SMS-O-Death
The baseband apocalypse
Android geolocalisation using GSM network
Android geolocalisation using GSM network - 2
Is the SSLiverse a safe place ?
Data Recovery Techniques
Frozen Cache
The Hidden Nemesis
Rootkits and Troyans on your SAP landscape
Distributed FPGA Number for the masses
Analysing a modern cryptographic RFID system
Reverse Engineering a real-world RFID payment system
Embedded reverse engineering tools & techniques
IMG WTF PDF
IMG WTF PDF - 2
Sony cat iz Happy !
Console Hacking 2010 - PS3 Epic Fail
Console Hacking 2010 - PS3 Epic Fail - 2
Conclusion  
> Related documents
themeNews
[Service]  Security monitoring
[Presentation]  Security clauses of a SaaS contract [21 January 2011 - French]
[Presentation]  Cloud computing security [20 January 2011 - French]
[Presentation]  Report from Black Hat USA 2009 [8 September 2009 - French]
[Presentation]  From ISS to risks and reverse [29 April 2009 - French]
[Presentation]  Black Hat Europe 2008 report - OSSIR [17 June 2008 - French]
[Presentation]  BlackHat06 report [12 September 2006 - French]
[Presentation]  Threats and preemptive security [18 May 2006 - French]
[Presentation]  Managing insecurity of spontaneous infrastructures [3 April 2006 - French]
[Presentation]  Spontaneous infrastructures : witch security ? [19 October 2005 - French]
[Presentation]  Today's security needs in networking [13 October 2005 - English]
[Presentation]  Information Systems Security in banking industrie [25 May 2005 - French]
[Presentation]  Firewalls are not dead [10 May 2005 - French]
[Presentation]  Stakes of security [19 April 2005 - French]
[Presentation]  Manage IS security of wide enterprise [12 April 2005 - French]
[Presentation]  Introduction - Stake and trends [January 2004 - French]
[Article]  2002, the year of all challenges [17 February 2002 - French]
[Article]  The security market news [29 March 2001 - French]
themeNetwork Security
[Presentation]  Forcasting in French cyberdefence doctrines [24 November 2010 - French]
[Presentation]  IPv6 Networks Discovery [30 May 2007 - French]
[Presentation]  IPv6: Network Security Threats [15 November 2006 - English]
[Presentation]  IPv6: impacts and threats [14 November 2006 - French]
[Presentation]  Manage IS security of wide enterprise [12 April 2005 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  Stakes of network security [31 March 2005 - French]
[Presentation]  Ethereal: an open-source network analyzer and a must-have security tool [2 February 2005 - French]
[Presentation]  Network security stakes [14 October 2004 - French]
[Techno-watch]  CanSecWest 2002 Conference [4 May 2002 - French]
[Presentation]  Network security: Introduction and Bluetooth [9 November 2000 - French]
[Article]  Networks Security [25 July 2000 - French]
[Presentation]  Policy managment for network security [29 May 2000 - French]
[Presentation]  Firewalls, protection and supervision, VPNs: situation of the security tools market [20 January 2000 - French]
[Course]  TCP/IP Networks Security [25 November 1999 - French]
[Presentation]  Network security: intrusion risks and countermeasures [18 November 1999 - French]
[Presentation]  Network security techniques [6 March 1997 - French]
themePenetration tests
[Service]  Vunerability assessment (TSAR)
[Service]  Penetration tests
[Course]  Ethical and Practical Hacking
[Tool]  Webef tool [Bruteforcer of web server files and directories - English]
[Tool]  BlueBerry tool [BlueBerry is a tool that can be used to decrypt BlackBerry Administration Service passwords. - English]
[Presentation]  Webshells, or how to open your network's doors ? [21 October 2010 - French]
[Tool]  passe-partout tool [In-memory extraction of SSL private keys - English]
[Presentation]  Webshells, or how to open your network's doors ? [16 March 2010 - French]
[Presentation]  Webshells, real threat for information systems ? [1 December 2009 - French]
[Presentation]  Web Attacks with Smartphone [4 June 2009 - French]
[Presentation]  Security issue seen in enterprises web applications [27 November 2008 - French]
[Presentation]  Feedback on security audits [1 April 2008 - French]
[Tool]  WSPP tool [WSPP - English]
[Presentation]  Modern techniques of IP attacks [18 March 2003 - French]
[Presentation]  Audits, Assessments and Penetration Tests [22 January 2003 - French]
[Presentation]  Audits, Assessments and Penetration Tests [26 June 2002 - French]
[Tip]  Nmap's hidden option [27 December 2000 - French]
[Presentation]  Introduction to intrusion tests [17 March 1998 - French]
[Presentation]  Tests and evaluation of Internet security solutions [30 May 1997 - French]
[Presentation]  Intrusion tests [December 1996 - French]
> Copyright © 2011, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 9 February 2011 at 10:22:00 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants