[SOS 2009] D-Link: Red Segura L2 L3
Disclosing Private Information from Metadata, hidden info and lost data
Ldap injection y Blind Ldap Injection
Forefront Threat Management Gateway TMG
Connection String Parameter Pollution Attacks
Time-Based Blind SQL Injection Using Heavy Queries
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
FOCA 2.5.5 Training
LDAP Injection & Blind LDAP Injection
The Power of FOCA 3
Defcon 18: FOCA 2
Foca training hackcon6
Bosses love excel, hackers too
LDAP Injection & Blind LDAP Injection in Web Applications
Defcon 21 - Fear the Evil FOCA: mitm attacks using IPv6
Asegúr@IT 7: Playing with Satellites 1.2
Owning bad guys {and mafia} with javascript botnets
Trends in network security feinstein - informatica64
MSRC - Funcionamiento