blog.layakk.com
LAYAKK Security Blog: November 2013
http://blog.layakk.com/2013_11_01_archive.html
Wednesday, November 13, 2013. With this post we start the blog associated to a new stage in the professional project that we have been developing during the past few years. After the closing of our previous chapter in Taddong (more information here. Jose Pico and David Perez have created a new company, called Layakk, with the aim of reinforcing and expanding our areas of work. Subscribe to: Posts (Atom). Simple template. Powered by Blogger.
blog.layakk.com
LAYAKK Security Blog: Hello world! from Layakk
http://blog.layakk.com/2013/11/hello-world-from-layakk.html
Wednesday, November 13, 2013. With this post we start the blog associated to a new stage in the professional project that we have been developing during the past few years. After the closing of our previous chapter in Taddong (more information here. Jose Pico and David Perez have created a new company, called Layakk, with the aim of reinforcing and expanding our areas of work. February 27, 2016 at 1:56 PM. Keep writing and sharing! SEO Training in Chennai. March 2, 2016 at 11:08 AM. Wow amazing i saw the...
blog.layakk.com
LAYAKK Security Blog: 3G Attacks at RootedCON 2014
http://blog.layakk.com/2014/03/3g-attacks-at-rootedcon-2014.html
Wednesday, March 26, 2014. 3G Attacks at RootedCON 2014. Some time ago we learned that a subset of the attacks that were possible for 2G mobile communications using a fake base station were also possible in 3G, particularly:. Or how to know whether an IMSI is active in the range of the attacker's base station. Geo-location of mobile devices. With high accuracy and reliability. You can find more details on this attack in the associated materials of two of our previous talks: RootedCON 2013. Our goal is to...
blog.taddong.com
Taddong Security Blog
http://blog.taddong.com/2013/11/after-almost-four-years-taddongs_11.html
Monday, November 11, 2013. After almost four years, Taddong’s expedition comes to an end…. Much like the four historic and meritable expeditions that went into the Challenger Deep reached their destination, today we announce that Taddong's adventures will hit bottom next December 2013. And the tools and articles we published in our lab. As of 2014, Taddong members will be starting two new adventures, motivated by the quest for new and more advanced technical challenges and committed to continue their jou...
rootedcon.com
Rooted CON 2016 - ES - Home
https://www.rootedcon.com/ponencias
Rooted Satellite VLC 1. Rooted Satellite VLC 2. Congreso de seguridad informática. 10 de Septiembre 2016. ADEIT - Fundación Universidad - Plaza Virgen de la Paz, 3, 46001 Valencia (España). Patrocina esta edición. Uacute;ltimas noticias relacionadas con Rooted disponibles:. Patrocinador PLATA de RootedCON Valencia 2016: S2 Grupo. Patrocinador PLATINO de RootedCON Valencia 2016: CCN-Cert. Patrocinador PLATA de RootedCON Valencia 2016: Layakk. Premio a RootedCON en Madrid Recognition Night.
rootedcon.com
Rooted CON 2016 - ES - Home
https://www.rootedcon.com/agenda
Rooted Satellite VLC 1. Rooted Satellite VLC 2. Congreso de seguridad informática. 10 de Septiembre 2016. ADEIT - Fundación Universidad - Plaza Virgen de la Paz, 3, 46001 Valencia (España). Patrocina esta edición. Uacute;ltimas noticias relacionadas con Rooted disponibles:. Patrocinador PLATA de RootedCON Valencia 2016: S2 Grupo. Patrocinador PLATINO de RootedCON Valencia 2016: CCN-Cert. Patrocinador PLATA de RootedCON Valencia 2016: Layakk. Premio a RootedCON en Madrid Recognition Night.
blog.layakk.com
LAYAKK Security Blog: Book: Mobile communications Hacking and Security - SECOND EDITION
http://blog.layakk.com/2014/05/book-mobile-communications-hacking-and.html
Thursday, May 29, 2014. Book: Mobile communications Hacking and Security - SECOND EDITION. Back in november 2011 we published our first book about mobile communications security. After more than a thousand units sold, we are proud to announce that the second edition of the boook is available. We have also expanded both the theoretical study of 3G protocols and attack techinques not covered in the first edition, including the ones that we explained in RootedCON 2014. The index of the book is available.
rootedcon.com
Rooted CON 2016 - ES - Home
https://www.rootedcon.com/rooted-con-2015
Rooted Satellite VLC 1. Rooted Satellite VLC 2. Congreso de seguridad informática. 10 de Septiembre 2016. ADEIT - Fundación Universidad - Plaza Virgen de la Paz, 3, 46001 Valencia (España). Patrocina esta edición. Uacute;ltimas noticias relacionadas con Rooted disponibles:. Patrocinador PLATA de RootedCON Valencia 2016: S2 Grupo. Patrocinador PLATINO de RootedCON Valencia 2016: CCN-Cert. Patrocinador PLATA de RootedCON Valencia 2016: Layakk. Premio a RootedCON en Madrid Recognition Night.
blog.layakk.com
LAYAKK Security Blog: December 2014
http://blog.layakk.com/2014_12_01_archive.html
Friday, December 19, 2014. If you are a security profesional (or an IT profesional) probably you -like us- are constantly writing shell scripts, so that you can automate certain tasks in your linux (or unix) environment. We don't usually use shell scripting to write complex applications (although some shell scripts become quite big), but we do use it extensively to create some "utilities" or little tools to quickly fulfill certain needs that arise along the way. These "shell script libraries" are sets of...