Rump Session
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + comma | Decrease playback rate |
shift + dot or shift + semicolon | Increase playback rate |
end | Seek to end |
beginning | Seek to beginning |
Share this media
Download links
HLS video stream
You can use an external player to play this stream (like VLC).
HLS video streamWhen subscribed to notifications, an email will be sent to you for all added annotations.
Your user account has no email address.
Information on this media
Links:
Number of views:
33Creation date:
July 5, 2016Speakers:
Various SeakersCompany:
RMLLLicense:
CC BY SA v4Description
- Ardui-no pown Android by Antoine Cervoise
Arduino is used as a keyboard for powning Windows, Linux or Mac OS by dropping a reverse shell. What if a Unicorn wants to do something similar on Android?
- Firefox’ Containers Feature by Stéphanie Ouillon
Let’s talk about a new feature coming in Firefox Nightly called the Containers Feature, which enables users to login to multiple accounts on the same site simultaneously and gives users the ability to segregate site data for improved privacy and security.
- Amsterdamize your firewall by Éric Leblond
Amsterdam is a Suricata docker container based system that is really easy to extend. Talk will show how you can add firewall logs to it.
- SANS ISC Honeypot network by Xavier Mertens
The SANS ISC (“Internet Storm Center”) is operating a worldwide network of honeypots. Recently a dedicated version of Cowrie was released to be used with a Raspberry Pi. We also collect 404 logs and firewall logs (or any “IP based” logs) to feed the DShield database. We need you to collect more and more useful data!
- The guide of a security jerk by Clément Oudot
I will try to explain in 3 minutes how to be a jerk in security
- Automatic cleanup of emails …because email clients suck at it and you don’t have bitcoins by Raphaël Vinot
Did you know that thunderbird cannot filter emails on attachments? Also, who in your family ever receive a legitimate office document with a macro? or a javascript? or an exe file? How often do they click on it and you ended up having to play helpdesk?
I developed a tiny tool that get an email, process it and returns a sanitized version, with log files: https://github.com/CIRCL/PyCIRCLeanMail
It is far from being usable by a non-dork, but this is the plan, and I’ll explain how.
- REbus: make your security tools cooperate by Raphaël Rigo
REbus facilitates the coupling of existing tools that perform specific tasks, where one’s output will be used as the input of others.
- Binsec in practice by Robin David
I will in few minutes, shows some functionalities of BINSEC, and especially how to break the first FlareOn challenge.
- RMLLSEC16: Feedback & lessons learned (or not…) by Christophe Brocas
Other media in the channel "Sécurité"
- 82 viewsMOWR, A virustotal-like service for web malwaresAugust 7th, 2016
- 273 views, 1 this yearMIG: Investigate 1,000 endpoints in 10sAugust 8th, 2016
- 59 viewsComplex malware & forensics investigationAugust 7th, 2016
- 129 viewsUsing and abusing MISP to track campaignsAugust 7th, 2016
- 18 viewsBuilding A Poor man’s Fir3Ey3 Mail ScannerAugust 8th, 2016
- 16 viewsHands-on security for DIY projectsAugust 7th, 2016