Unternehmenslösungen
IT-Dienstleistungen
Partner
Antivirus

Internet Security

Total Security

Unsere Story
Arbeiten bei G DATA
Newsroom
The G DATA Software AG offers an evening program, accompanying the "Offensive Security Course" at the Ruhr University of Bochum.
Every participant is welcome to meet the speakers and the organizing crew in the G DATA Academy. Excellent food and drink invite everybody to exchange thoughts and ideas in a comfortable atmosphere.
Whoever is seeking for the opportunity to get in touch with the external speakers or wants to speak at ease and talk shop with team members of G DATA's technical departments is just in the right place.
Location: G DATA Academy
Route:Download
Time: Starting at 6 p.m.
The following events are planned for the summer term 2019:
Date | Speaker |
---|---|
24.04.2019 | TBA |
12.07.2019 | TBA |
26.07.2019 | TBA |
(no responsibility can be taken for this information)
Please contact Karsten Tellmann for further information regarding G DATA and the "Offensive Security Course".
Redner | Titel | Video |
---|---|---|
Rene Freingruber | An overview on modern fuzzing techniques | Video |
Gertjan Franken | Who left open the cookie jar? ... | Video |
Michele Orrù | All your sessions are belong to us | Video |
Johannes Dahse | State-of-the-art PHP Exploitation Techniques | Video |
Mathy Vanhoef | KRACKing WPA2 and Mitigating Future Vulnerabilities | Video |
Ange Albertini | Beyond your studies - You studied X at Y. Now what? | Video |
Florian Kohlar | Tales from an IT-Security consultant | Video |
Enno Rey | Properties of IPv6 and Their Implications for Offense & Defense | Video |
Nicolas Grégoire | Nearly generic fuzzing of XML-based formats | No Video available |
Mario Heiderich | My Sweet Innocence Exposed - Eleven Reasons why we will all miss you, "e" | Video |
Victor van der Veen | Drammer: Making-Of | Video |
Johannes Dahse | An Advent Calendar full of PHP Security Bugs | Video |
Martin Schmiedecker | Turning Incident Response to Eleven | Video |
Anders Fogh | Covert shotgun: Automatically finding covert channels in SMT | Video |
Clémentine Maurice | Reverse-engineering CPUs for fun and profit | Video |
Tom Van Goethem | Breaking privacy and security by abusing cross-origin resource size | Video |
Ben Stock | From Facepalm to Brain Bender - Exploring Client-Side Cross-Site Scripting | Video |
Christian Rossow | Zeus P2PWNED: Monitoring and Disrupting Modern P2P Botnets | Video |
Hanno Böck | TLS - the most important crypto protocol | Video |
Sven Schlueter | Modern penetration testing | Video |
Dirk Wetter | Intricacies testing SSL: sockets, schools, threa{t,d}s and sometimes no shake-hands | Video |
Ibrahim Köse | Managing Security Testing | Video |
Michele Orru | Dark Fairy Tales from a Phisherman (Vol. III) | Video |
Matthias Kaiser | Exploiting Deserializsation Vulnerabilities in Java | Video |
Christian Schneider | Security DevOps - Free pentesters time to focus on high-hanging fruits | Video |
Sebastian Lekies | 25 Million Flows Later: Detection and Exploitation of DOM-based XSS at Scale | Video |
Frederik Braun | Using a CDN that can not XSS you - with Subresourece Integrity | Video |
Thomas Patzke | Near Field Communication Security | Video |
Joern Schneeweisz | Bug Tales | Video |
Sebastian Schinzel | Remote Timing Attacks | Video |
Johannes Dahse | Static Detection of Vulnerabilities in Modern PHP Applications | Video |
Collin Mulliner | Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in GUIs | Video |
Alex Inführ | Adobe Reader - Pictures and Text on Steroids | Video |
Mathias Karlsson | Polyglot payloads in practice | Video |
Steven Van Acker | A Hero´s guide to taming the JavaScript beast | Video |
Mathias Bynens | Hacking with Unicodehttps://www.youtube.com/watch?v=1hjc2PQR8uc | Video |
Felix Gröbert | Security Analysis of Apple FileVault2 | Video |
Mike West | User Agent Lockdown | Video |
Stefan Esser | iOS 7 Security Overview | Video |
Miroslav Stampar | Curious Case of SQLi | Video |
Fabian Yamaguchi | Information Retrieval and Machine Learning for Interactive Bug Hunting | Video |
Andreas Kurtz | Pentesting IOs Apps - Runtime Analysis and Manipulation | Video |
Karsten Nohl | In-depth crypto attacks - It always takes two bugs | Video |
Giorgio Maone | Defending the Indefensible - The Unsung Battles & Legacy of NoScript | Video |
Jeremiah Grossman | The real state of website security and the truth about accountability and "Best-Practices." | Video |
Matthias Kaiser | Recent Java Exploitation Techniques | Video |
Jürgen Pabel | Information Security Management | Video |
Felix Lindner | Security is Privacy | Video |
Svetlana Gaivoronski | Shellcode detection techniques | Video |
Arthur Gerkis | Dynamic PHP web-appliaktion analysis | Video |
Roberto Suggi Liverani | Cross Context Scripting (XCS) - Attacks and Exploitation | Video |
Soroush Dalili | File Uploaders Vulnerabilities - Fire in the hole! | Video |
Tuomas Kärkkäinen | Fuzzing scale and in style | Video |
Jonas Magazinius | Crossing Origins by Crossing Formats | Video |
Ange Albertini | A challenge in your pocket, an introduction to brainteasers | Video |
Sandro Gauci | Webapp Exploit Payloads - tools built for & during the job | Video |
Alexey Sintsov | Lotus Domino: Penetration Through the Controller | Video |
Vladimir Vorontsov | Blind XXE injections | Video |
Michele Orru | Beef, what a tasty piece of meat | Video |
Paul Stone | Browser Timing Attacks via the Graphics Stack | Video |
Nicolas Gregoire | Attacking xml processing | Video |