A story about the development of software for red team using the extraction of secrets directly from physical memory of Windows as an example
SPEAKERS
Georgy Kiguradze
Senior Application Security Specialist, Assume Birch Team
Somewhat a reverse engineer, exploit writer, and security researcher. A bit of a penetration tester. Georgy plays CTF for the C4T BuT S4D team. He has created a lot of interesting CTF assignments
We use cookies to personalize our services and enhance your browsing experience. You can disable cookies in your browser settings. Read our cookie policy to learn more about how we use cookies