sa-east-1.hacker-conferences.com Open in urlscan Pro
2600:1f1e:342:2f3f:8a84:d01:542e:6857  Public Scan

URL: https://sa-east-1.hacker-conferences.com/
Submission: On March 02 via api from US — Scanned from US

Form analysis 1 forms found in the DOM

GET https://www.hacker-conferences.com/

<form id="searchform" method="get" action="https://www.hacker-conferences.com/">
  <input type="search" name="s" class="search-input" placeholder="Search" autocomplete="off">
  <button type="submit" class="search-submit"><span class="genericon genericon-search"></span></button>
</form>

Text Content

Skip to content


HACKER CONFERENCES

Cyber Security Events
 * Home
 * USA
 * Germany

Menu

Close Menu
 * Home
 * USA
 * Germany

 * Germany
   
   
   SMS ATTACKS: EXTERNAL SMS INTERFACE SMS OVER GSUP
   
   2 years ago
   
   SMS Attacks – Recently an external interface for SS/USSD was introduced. This
   time I am going to present an alternative (to SMPP) way of forwarding SMS
   messages between the Osmocom CNI and SMSC (Short Message Service Center) or
   some ESME...
   
   View more »
   
 * Germany
   
   
   OSMOCOMBB: HOW TO RUN A GSM MOBILE PHONE WITH SDR DEVICES
   
   2 years ago
   
   OsmocomBB -Since SDR (Software Defined Radio) becomes more popular and more
   available for everyone, there is a lot of projects based on this technology.
   Looking from the mobile telecommunications side, at the moment it’s possible
   to run your own GSM...
   
   View more »
   
 * Germany
   
   
   GRX ATTACKS: ADVANCED INTERCONNECT ATTACKS
   
   2 years ago
   
   GRX Attacks – The largest weaknesses of mobile network are well hidden from
   users: Information exchanged between different mobile networks expose users
   to fraud and privacy risks. GRX Attacks Attack 1 – Full MiTMAttack 2 –
   Passive data interceptAttack 3...
   
   View more »
   
 * Germany
   
   
   SS7 VULNERABILITY SCANNER: MAPPING VULNERABILITY OF THE INTERNATIONAL MOBILE
   ROAMING INFRASTRUCTURE
   
   2 years ago
   
   SS7 vulnerability scanner – SS7 has been shown repeatedly as an insecure
   protocol: spoofing, faking, crash through fuzzing, fraud. The main question
   of our study is to determine how this insecurity is mitigated by network
   operator’s action to prevent compromise...
   
   View more »
   

 * 
 * 
 * 
 * 


USA

More


ALEX PEARLMAN – A COHORT OF PIRATE SHIPS

2 years ago


BADHIPPA – A TALK WITH LUCIA SAVAGE

2 years ago


REDDRAGON – CHINESE MILITARY BIOWEAPONS

2 years ago


CLOUD SECURITY FOR HEALTHCARE AND LIFE SCIENCES

2 years ago


GERMANY

More


SMS ATTACKS: EXTERNAL SMS INTERFACE SMS OVER GSUP

2 years ago


OSMOCOMBB: HOW TO RUN A GSM MOBILE PHONE WITH SDR DEVICES

2 years ago


GRX ATTACKS: ADVANCED INTERCONNECT ATTACKS

2 years ago


SS7 VULNERABILITY SCANNER: MAPPING VULNERABILITY OF THE INTERNATIONAL MOBILE
ROAMING INFRASTRUCTURE

2 years ago


LATEST POSTS

Germany


SMS ATTACKS: EXTERNAL SMS INTERFACE SMS OVER GSUP

2 years ago
Germany


OSMOCOMBB: HOW TO RUN A GSM MOBILE PHONE WITH SDR DEVICES

2 years ago
Germany


GRX ATTACKS: ADVANCED INTERCONNECT ATTACKS

2 years ago
Germany


SS7 VULNERABILITY SCANNER: MAPPING VULNERABILITY OF THE INTERNATIONAL MOBILE
ROAMING INFRASTRUCTURE

2 years ago
USA


ALEX PEARLMAN – A COHORT OF PIRATE SHIPS

2 years ago
USA


BADHIPPA – A TALK WITH LUCIA SAVAGE

2 years ago
USA


REDDRAGON – CHINESE MILITARY BIOWEAPONS

2 years ago
USA


CLOUD SECURITY FOR HEALTHCARE AND LIFE SCIENCES

2 years ago
USA


CYBER DEFENSE MATRIX IN HEALTHCARE

2 years ago
USA


OHAD ZAIDENBERG – FISHING OR HUNTING

2 years ago
USA


HC INNOVATION WITH PEOPLE OF ALL ABILITIES

2 years ago
USA


REFLECTIONS ON RACE, HEALTH, AND EQUITY

2 years ago
USA


INTERNET OF INGESTIBLE THINGS SECURITY BY DESIGN

2 years ago
USA


ROB SUAREZ – WHY YOU SHOULD JOIN THE BIOHACKING VILLAGE

2 years ago
USA


DEF CON 29 BIOHACKING VILLAGE – CHRISTIAN DAMEFF, JEFF TULLY – THE FUTURE STATE
OF HEALTHCARE

2 years ago

© 2024 Hacker Conferences - WordPress Theme by WPEnjoy


x
x

🌎
✕


🍪 PRIVACY & TRANSPARENCY

We and our partners use cookies to Store and/or access information on a device.
We and our partners use data for Personalised advertising and content,
advertising and content measurement, audience research and services development
. An example of data being processed may be a unique identifier stored in a
cookie. Some of our partners may process your data as a part of their legitimate
business interest without asking for consent. To view the purposes they believe
they have legitimate interest for, or to object to this data processing use the
vendor list link below. The consent submitted will only be used for data
processing originating from this website. If you would like to change your
settings or withdraw consent at any time, the link to do so is in our privacy
policy accessible from our home page..



Manage Settings Allow Necessary Cookies & Continue Continue with Recommended
Cookies

Vendor List | Privacy Policy