πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Configuration Management

Focus Area: πŸ” Vulnerability Management
6
Total Entries
5
Contributors

Top Contributors

Bharadwaj Machiraju(4) Francis Alexander(3) Altaf Shaik(1) Preeti Subramanian(1) Ravishankar Borgaonkar(1)

All Entries (6 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2017-05-23TalkPhdays How we hacked distributed configuration management systems Presentation Bharadwaj Machiraju, Francis Alexander#red-teaming#fingerprinting#configuration-management
2017-03-24TalkInsomnihack How we hacked Distributed Configuration Management Systems Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Bharadwaj Machiraju, Francis Alexander#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2015-10-30TalkT2 LTE (in) Security Ravishankar Borgaonkar, Altaf Shaik#lte#mobile-hacking#configuration-management+1
2015-03-26Tool demoBlackhat SecPod Saner Source Code Preeti Subramanian#blueteam#security-tools#automated-scanning+2