The G DATA CyberDefense AG offers an evening program, accompanying the "Offensive Security Course" at the Ruhr University of Bochum.

Every participant is welcome to meet the speakers and the organizing crew in the G DATA Academy. Excellent food and drink invite everybody to exchange thoughts and ideas in a comfortable atmosphere.

Whoever is seeking for the opportunity to get in touch with the external speakers or wants to speak at ease and talk shop with team members of G DATA's technical departments is just in the right place.

Details

Location: G DATA Academy

Route:Download

Time: Starting at 6 p.m.

The following events are planned for the winter term 2019:

DateSpeaker
23.10.2019Christian Becker
18.12.2019Marina Krotofil
29.01.2020Jasper Bongartz & Christian Landstroem

(no responsibility can be taken for this information)

 

Please contact Karsten Tellmann for further information regarding G DATA and the "Offensive Security Course".

Previous Events

RednerTitelVideo
Christian BeckerRed Team Excercises - A case studyVideo
Rene FreingruberAn overview on modern fuzzing techniquesVideo
Gertjan FrankenWho left open the cookie jar? ...Video
Michele OrrùAll your sessions are belong to usVideo
Johannes DahseState-of-the-art PHP Exploitation TechniquesVideo
Mathy VanhoefKRACKing WPA2 and Mitigating Future VulnerabilitiesVideo
Ange AlbertiniBeyond your studies - You studied X at Y. Now what?Video
Florian KohlarTales from an IT-Security consultantVideo
Enno ReyProperties of IPv6 and Their Implications for Offense & DefenseVideo
Nicolas GrégoireNearly generic fuzzing of XML-based formatsNo Video available
Mario HeiderichMy Sweet Innocence Exposed - Eleven Reasons why we will all miss you, "e"Video
Victor van der VeenDrammer: Making-OfVideo
Johannes DahseAn Advent Calendar full of PHP Security BugsVideo
Martin SchmiedeckerTurning Incident Response to ElevenVideo
Anders FoghCovert shotgun: Automatically finding covert channels in SMTVideo
Clémentine MauriceReverse-engineering CPUs for fun and profitVideo
Tom Van GoethemBreaking privacy and security by abusing cross-origin resource sizeVideo
Ben StockFrom Facepalm to Brain Bender - Exploring Client-Side Cross-Site ScriptingVideo
Christian RossowZeus P2PWNED: Monitoring and Disrupting Modern P2P BotnetsVideo
Hanno BöckTLS - the most important crypto protocolVideo
Sven SchlueterModern penetration testingVideo
Dirk WetterIntricacies testing SSL: sockets, schools, threa{t,d}s and sometimes no shake-handsVideo
Ibrahim KöseManaging Security TestingVideo
Michele OrruDark Fairy Tales from a Phisherman (Vol. III)Video
Matthias KaiserExploiting Deserializsation Vulnerabilities in JavaVideo
Christian SchneiderSecurity DevOps - Free pentesters time to focus on high-hanging fruitsVideo
Sebastian Lekies25 Million Flows Later: Detection and Exploitation of DOM-based XSS at ScaleVideo
Frederik BraunUsing a CDN that can not XSS you - with Subresourece IntegrityVideo
Thomas PatzkeNear Field Communication SecurityVideo
Joern SchneeweiszBug TalesVideo
Sebastian SchinzelRemote Timing AttacksVideo
Johannes DahseStatic Detection of Vulnerabilities in Modern PHP ApplicationsVideo
Collin MullinerHidden GEMs: Automated Discovery of Access Control Vulnerabilities in GUIsVideo
Alex InführAdobe Reader - Pictures and Text on SteroidsVideo
Mathias KarlssonPolyglot payloads in practiceVideo
Steven Van AckerA Hero´s guide to taming the JavaScript beastVideo
Mathias BynensHacking with Unicodehttps://www.youtube.com/watch?v=1hjc2PQR8ucVideo
Felix GröbertSecurity Analysis of Apple FileVault2Video
Mike WestUser Agent LockdownVideo
Stefan EsseriOS 7 Security OverviewVideo
Miroslav StamparCurious Case of SQLiVideo
Fabian YamaguchiInformation Retrieval and Machine Learning for Interactive Bug HuntingVideo
Andreas KurtzPentesting IOs Apps - Runtime Analysis and ManipulationVideo
Karsten NohlIn-depth crypto attacks - It always takes two bugsVideo
Giorgio MaoneDefending the Indefensible - The Unsung Battles & Legacy of NoScriptVideo
Jeremiah GrossmanThe real state of website security and the truth about accountability and "Best-Practices."Video
Matthias KaiserRecent Java Exploitation TechniquesVideo
Jürgen PabelInformation Security ManagementVideo
Felix LindnerSecurity is PrivacyVideo
Svetlana GaivoronskiShellcode detection techniquesVideo
Arthur GerkisDynamic PHP web-appliaktion analysisVideo
Roberto Suggi LiveraniCross Context Scripting (XCS) - Attacks and ExploitationVideo
Soroush DaliliFile Uploaders Vulnerabilities - Fire in the hole!Video
Tuomas KärkkäinenFuzzing scale and in styleVideo
Jonas MagaziniusCrossing Origins by Crossing Formats Video
Ange AlbertiniA challenge in your pocket, an introduction to brainteasersVideo
Sandro GauciWebapp Exploit Payloads - tools built for & during the job Video
Alexey SintsovLotus Domino: Penetration Through the Controller Video
Vladimir VorontsovBlind XXE injections Video
Michele OrruBeef, what a tasty piece of meat Video
Paul StoneBrowser Timing Attacks via the Graphics Stack Video
Nicolas GregoireAttacking xml processing Video