In this presentation, Jiggyasu Sharma covered Bluetooth security focusing on Bluetooth low energy weaknesses and he also demonstrated Bluetooth low energy traffic capturing and cracking them using Ubertooth One.
Presentation:
In this presentation, Jiggyasu Sharma covered Bluetooth security focusing on Bluetooth low energy weaknesses and he also demonstrated Bluetooth low energy traffic capturing and cracking them using Ubertooth One.
I remember my first meeting with Nagareshwar in 2011. We were sitting in a small cafe with a cup of coffee. we discussed many things but one of the topic was how to build a group of like minded people to solve some real problems with education system, economic system or just to create an […]
Here is the quick update and presentations from our recently concluded ‘SecurityXploded Cyber Security Quarterly Meetup’. In this meet, Adarsh Agarwal delivered presentation on “Understanding Cryptolocker (Ransomware) with a Case study”, Satyam Saxena covered the topic on “Malicious Client Detection using Machine Learning”, Abhinav Chourasia presented on “Buffer Overflow Attacks”, Anirudh Duggal presented […]
In this presentation, Monnappa explained the concept of code injection and hollow process injection. He demonstrated the working of hollow process injection using reverse engineering and showed how such infections can be detected and investigated using memory forensics Presentation: Demo 1 – Understanding Hollow Process Injection Using Reverse Engineering: Demo […]
No Comments Yet