The G DATA Software AG offers an evening program, accompanying the "Offensive Security Course" at the Ruhr University of Bochum.

Every participant is welcome to meet the speakers and the organizing crew in the G DATA Academy. Excellent food and drink invite everybody to exchange thoughts and ideas in a comfortable atmosphere.

Whoever is seeking for the opportunity to get in touch with the external speakers or wants to speak at ease and talk shop with team members of G DATA's technical departments is just in the right place.

Details

Location: G DATA Academy

Route: Download

Time: Starting at 6 p.m.

The following events are planned for the summer term 2017:

Will be announced soon.

 

(no responsibility can be taken for this information)

 

Please contact Karsten Tellmann for further information regarding G DATA and the "Offensive Security Course".

Previous Events

RednerTitelVideo
Martin SchmiedeckerTurning Incident Response to ElevenZum Video
Anders FoghCovert shotgun: Automatically finding covert channels in SMTZum Video
Clémentine MauriceReverse-engineering CPUs for fun and profitZum Video
Tom Van GoethemBreaking privacy and security by abusing cross-origin resource sizeZum Video
Ben StockFrom Facepalm to Brain Bender - Exploring Client-Side Cross-Site ScriptingZum Video
Christian RossowZeus P2PWNED: Monitoring and Disrupting Modern P2P BotnetsZum Video
Hanno BöckTLS - the most important crypto protocolZum Video
Sven SchlueterModern penetration testingZum Video
Dirk WetterIntricacies testing SSL: sockets, schools, threa{t,d}s and sometimes no shake-handsZum Video
Ibrahim KöseManaging Security TestingZum Video
Michele OrruDark Fairy Tales from a Phisherman (Vol. III)Zum Video
Matthias KaiserExploiting Deserializsation Vulnerabilities in JavaZum Video
Christian SchneiderSecurity DevOps - Free pentesters time to focus on high-hanging fruitsZum Video
Sebastian Lekies25 Million Flows Later: Detection and Exploitation of DOM-based XSS at ScaleZum Video
Frederik BraunUsing a CDN that can not XSS you - with Subresourece IntegrityZum Video
Thomas PatzkeNear Field Communication SecurityZum Video
Joern SchneeweiszBug TalesZum Video
Sebastian SchinzelRemote Timing AttacksZum Video
Johannes DahseStatic Detection of Vulnerabilities in Modern PHP ApplicationsZum Video
Collin MullinerHidden GEMs: Automated Discovery of Access Control Vulnerabilities in GUIsZum Video
Alex InführAdobe Reader - Pictures and Text on SteroidsZum Video
Mathias KarlssonPolyglot payloads in practiceZum Video
Steven Van AckerA Hero´s guide to taming the JavaScript beastZum Video
Mathias BynensHacking with UnicodeZum Video
Felix GröbertSecurity Analysis of Apple FileVault2Zum Video
Mike WestUser Agent LockdownZum Video
Stefan EsseriOS 7 Security OverviewZum Video
Miroslav StamparCurious Case of SQLiZum Video
Fabian YamaguchiInformation Retrieval and Machine Learning for Interactive Bug HuntingZum Video
Andreas KurtzPentesting IOs Apps - Runtime Analysis and ManipulationZum Video
Karsten NohlIn-depth crypto attacks - It always takes two bugsZum Video
Giorgio MaoneDefending the Indefensible - The Unsung Battles & Legacy of NoScriptZum Video
Jeremiah GrossmanThe real state of website security and the truth about accountability and "Best-Practices."Zum Video
Matthias KaiserRecent Java Exploitation TechniquesZum Video
Jürgen PabelInformation Security ManagementZum Video
Felix LindnerSecurity is PrivacyZum Video
Svetlana GaivoronskiShellcode detection techniquesZum Video
Arthur GerkisDynamic PHP web-appliaktion analysisZum Video
Roberto Suggi LiveraniCross Context Scripting (XCS) - Attacks and ExploitationZum Video
Soroush DaliliFile Uploaders Vulnerabilities - Fire in the hole!Zum Video
Tuomas KärkkäinenFuzzing scale and in styleZum Video
Jonas MagaziniusCrossing Origins by Crossing Formats Zum Video
Ange AlbertiniA challenge in your pocket, an introduction to brainteasersZum Video
Sandro GauciWebapp Exploit Payloads - tools built for & during the job Zum Video
Alexey SintsovLotus Domino: Penetration Through the Controller Zum Video
Vladimir VorontsovBlind XXE injections Zum Video
Michele OrruBeef, what a tasty piece of meat Zum Video
Paul StoneBrowser Timing Attacks via the Graphics Stack Zum Video
Nicolas GregoireAttacking xml processing Zum Video