sa-east-1.hacker-conferences.com
Open in
urlscan Pro
2600:1f1e:342:2f3f:8a84:d01:542e:6857
Public Scan
URL:
https://sa-east-1.hacker-conferences.com/
Submission: On March 02 via api from US — Scanned from US
Submission: On March 02 via api from US — Scanned from US
Form analysis
1 forms found in the DOMGET https://www.hacker-conferences.com/
<form id="searchform" method="get" action="https://www.hacker-conferences.com/">
<input type="search" name="s" class="search-input" placeholder="Search" autocomplete="off">
<button type="submit" class="search-submit"><span class="genericon genericon-search"></span></button>
</form>
Text Content
Skip to content HACKER CONFERENCES Cyber Security Events * Home * USA * Germany Menu Close Menu * Home * USA * Germany * Germany SMS ATTACKS: EXTERNAL SMS INTERFACE SMS OVER GSUP 2 years ago SMS Attacks – Recently an external interface for SS/USSD was introduced. This time I am going to present an alternative (to SMPP) way of forwarding SMS messages between the Osmocom CNI and SMSC (Short Message Service Center) or some ESME... View more » * Germany OSMOCOMBB: HOW TO RUN A GSM MOBILE PHONE WITH SDR DEVICES 2 years ago OsmocomBB -Since SDR (Software Defined Radio) becomes more popular and more available for everyone, there is a lot of projects based on this technology. Looking from the mobile telecommunications side, at the moment it’s possible to run your own GSM... View more » * Germany GRX ATTACKS: ADVANCED INTERCONNECT ATTACKS 2 years ago GRX Attacks – The largest weaknesses of mobile network are well hidden from users: Information exchanged between different mobile networks expose users to fraud and privacy risks. GRX Attacks Attack 1 – Full MiTMAttack 2 – Passive data interceptAttack 3... View more » * Germany SS7 VULNERABILITY SCANNER: MAPPING VULNERABILITY OF THE INTERNATIONAL MOBILE ROAMING INFRASTRUCTURE 2 years ago SS7 vulnerability scanner – SS7 has been shown repeatedly as an insecure protocol: spoofing, faking, crash through fuzzing, fraud. The main question of our study is to determine how this insecurity is mitigated by network operator’s action to prevent compromise... View more » * * * * USA More ALEX PEARLMAN – A COHORT OF PIRATE SHIPS 2 years ago BADHIPPA – A TALK WITH LUCIA SAVAGE 2 years ago REDDRAGON – CHINESE MILITARY BIOWEAPONS 2 years ago CLOUD SECURITY FOR HEALTHCARE AND LIFE SCIENCES 2 years ago GERMANY More SMS ATTACKS: EXTERNAL SMS INTERFACE SMS OVER GSUP 2 years ago OSMOCOMBB: HOW TO RUN A GSM MOBILE PHONE WITH SDR DEVICES 2 years ago GRX ATTACKS: ADVANCED INTERCONNECT ATTACKS 2 years ago SS7 VULNERABILITY SCANNER: MAPPING VULNERABILITY OF THE INTERNATIONAL MOBILE ROAMING INFRASTRUCTURE 2 years ago LATEST POSTS Germany SMS ATTACKS: EXTERNAL SMS INTERFACE SMS OVER GSUP 2 years ago Germany OSMOCOMBB: HOW TO RUN A GSM MOBILE PHONE WITH SDR DEVICES 2 years ago Germany GRX ATTACKS: ADVANCED INTERCONNECT ATTACKS 2 years ago Germany SS7 VULNERABILITY SCANNER: MAPPING VULNERABILITY OF THE INTERNATIONAL MOBILE ROAMING INFRASTRUCTURE 2 years ago USA ALEX PEARLMAN – A COHORT OF PIRATE SHIPS 2 years ago USA BADHIPPA – A TALK WITH LUCIA SAVAGE 2 years ago USA REDDRAGON – CHINESE MILITARY BIOWEAPONS 2 years ago USA CLOUD SECURITY FOR HEALTHCARE AND LIFE SCIENCES 2 years ago USA CYBER DEFENSE MATRIX IN HEALTHCARE 2 years ago USA OHAD ZAIDENBERG – FISHING OR HUNTING 2 years ago USA HC INNOVATION WITH PEOPLE OF ALL ABILITIES 2 years ago USA REFLECTIONS ON RACE, HEALTH, AND EQUITY 2 years ago USA INTERNET OF INGESTIBLE THINGS SECURITY BY DESIGN 2 years ago USA ROB SUAREZ – WHY YOU SHOULD JOIN THE BIOHACKING VILLAGE 2 years ago USA DEF CON 29 BIOHACKING VILLAGE – CHRISTIAN DAMEFF, JEFF TULLY – THE FUTURE STATE OF HEALTHCARE 2 years ago © 2024 Hacker Conferences - WordPress Theme by WPEnjoy x x 🌎 ✕ 🍪 PRIVACY & TRANSPARENCY We and our partners use cookies to Store and/or access information on a device. We and our partners use data for Personalised advertising and content, advertising and content measurement, audience research and services development . An example of data being processed may be a unique identifier stored in a cookie. Some of our partners may process your data as a part of their legitimate business interest without asking for consent. To view the purposes they believe they have legitimate interest for, or to object to this data processing use the vendor list link below. The consent submitted will only be used for data processing originating from this website. If you would like to change your settings or withdraw consent at any time, the link to do so is in our privacy policy accessible from our home page.. Manage Settings Allow Necessary Cookies & Continue Continue with Recommended Cookies Vendor List | Privacy Policy