{"id":3692,"date":"2018-03-19T10:18:09","date_gmt":"2018-03-19T10:18:09","guid":{"rendered":"http:\/\/2018.bsidesbud.com\/?page_id=3692"},"modified":"2018-03-19T10:22:22","modified_gmt":"2018-03-19T10:22:22","slug":"archives_pdf_video","status":"publish","type":"page","link":"https:\/\/2022.bsidesbud.com\/archives_pdf_video\/","title":{"rendered":"Archives of #BSidesBUD2018:"},"content":{"rendered":"

Here you can download the presentations and check out the videos of the talks of #BSidesBUD2018:<\/strong><\/em><\/p>\n\n\n\n\n\n\n\n\n\n\n\n\n
Sebastian Garcia & Veronica Valeros<\/strong> – Spy vs. Spy: A modern study of mic bugs operation and detection<\/td>\n\n

PDF<\/a><\/p>\n<\/td>\n

\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n

D\u00e1vid Szili<\/strong> – The Metric System<\/td>\n\n

PDF<\/a><\/p>\n<\/td>\n

<\/td>\n<\/tr>\n
Zolt\u00e1n L. N\u00e9meth<\/strong> – How to exploit the DNSmasq vulnerabilities<\/td>\n<\/td>\n\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n

Julien Thomas<\/strong> – In-App virtualization to bypass Android security mechanisms of unrooted devices<\/td>\n\n

PDF<\/a><\/p>\n<\/td>\n

\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n

Jose Pino & Jhonathan Espinosa<\/strong> – Trape: the evolution of phishing attacks<\/td>\n<\/td>\n\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n

Sebastian Garcia & Franti\u0161ek St\u0159as\u00e1k<\/strong> – Detecting malware even when it is encrypted<\/td>\n\n

PDF<\/a><\/p>\n<\/td>\n

\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n

S\u00e1ndor Nemes<\/strong> – Spying on botnets<\/td>\n\n

PDF<\/a><\/p>\n<\/td>\n

\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n

S\u00e1ndor Feh\u00e9r<\/strong> – Let’s dig into the persistence mechanism world<\/td>\n\n

PDF<\/a><\/p>\n<\/td>\n

\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n

Tobias Schr\u00f6del<\/strong> – Hacking a teddy bear & buying passwords in the darknet<\/td>\n<\/td>\n\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n

Dr. Ferenc Leitold & Dr. Attila Kiss<\/strong> – Assessment of users\u2019 IT security awareness in light of the GDPR<\/td>\n\n

PDF<\/a><\/p>\n<\/td>\n

\n

Video<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Follow-up of #BSidesBUD2018<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Here you can download the presentations and check out the videos of the talks of #BSidesBUD2018: Sebastian Garcia & Veronica Valeros – Spy vs. Spy: A modern study of mic bugs operation and detection PDF Video D\u00e1vid Szili – The Metric System PDF Zolt\u00e1n L. N\u00e9meth – How to exploit the DNSmasq vulnerabilities Video Julien […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/2022.bsidesbud.com\/wp-json\/wp\/v2\/pages\/3692"}],"collection":[{"href":"https:\/\/2022.bsidesbud.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/2022.bsidesbud.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/2022.bsidesbud.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/2022.bsidesbud.com\/wp-json\/wp\/v2\/comments?post=3692"}],"version-history":[{"count":3,"href":"https:\/\/2022.bsidesbud.com\/wp-json\/wp\/v2\/pages\/3692\/revisions"}],"predecessor-version":[{"id":3705,"href":"https:\/\/2022.bsidesbud.com\/wp-json\/wp\/v2\/pages\/3692\/revisions\/3705"}],"wp:attachment":[{"href":"https:\/\/2022.bsidesbud.com\/wp-json\/wp\/v2\/media?parent=3692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}