DEF CON® 25 Hacking Conference - Demo Labs at DEF CON 25."
I will be demonstrating the Maltego integration of “Have I been pwned?” on Saturday 29 July from 10AM until 11:50AM at Table #5.
I will be demonstrating the Maltego integration of “Have I been pwned?” on Saturday 29 July from 10AM until 11:50AM at Table #5.
I will be demonstrating the integration of “Have I been pwned?” with Maltego at BlackHat Asia 2017 on 30 March 2017 at 4PM and again on 31 March 2017 at 11:50AM.
I’ll be demonstrating the Maltego integration of VirusTotal with Karl Hiramoto during DEF CON 24 on Saturday 6 August from 2PM
I’m demonstrating the Maltego Transforms related to DNSDB with Mike Schiffman at BlackHat USA 2016 on Wednesday 3 August at 4PM.
Passive DNS (pDNS) provides near real-time detection of cache poisoning and fraudulent changes to domains registered for trademarks, etc.
Karl Hiramoto and I are also demonstrating the Maltego integration with “VirusTotal” at 10AM on Thursday 4 August
The two images above show how the supergroup of Maltego Entities of the same type (in this example these are e-mail addresses from the @haveibeenpwned Maltego Transforms) are displayed as the Maltego Graph is zoomed in.
This was first demonstrated by Roelof Temmingh of Paterva at the ACSC 2016 Conference in Canberra, Australia.
I’m demonstrating the Maltego Transforms related to Passive DNS with Paul Vixie and Daniel Cuthbert at BlackHat Asia 2016 on 31 March at 14:15 and 1 April at 13:10.
Passive DNS (pDNS) provides near real-time detection of cache poisoning and fraudulent changes to domains registered for trademarks, etc.
These Maltego Transforms interact with DNSDB from Farsight Security and VirusTotal.
Daniel Cuthbert is presenting the Maltego “SensePost Toolset” at 11:10 on 1 April at “Arsenal” too.
Karl Hiramoto is presenting “VirusTotal” at 10:00 on 31 March and at 9:30 on 1 April at “Arsenal” too.
Paul Vixie is presenting “Multivariate Solutions to Emerging Passive DNS Challenges” at 10:15 on 31 March at “Briefing” too.
I will be in SIngapore until Saturday night.
The Maltego Transforms for Taia Global’s OverWatch are now available on the Commericial Transform Hub at no cost.
They will be made available on the Community Edition Transform Hub next month (sometime from March 2016).
They return either the location or URL from an IPv4 Address of a Russian, Chinese, French and South Korean Institute.
The LeakDB transforms have commenced forewarning of their closure at the end of January 2016 by @Abusix.
The “Abuse Contact” transform is still available for the foreseable future.
End Users of Maltego Clients prior to the “Chlorine” release, such as those of Kali Linux prior to v2.0, can download the latest [Maltego] Configuration File from https://github.com/cmlh/Maltego-Abusix/releases.
End Users of Maltego Clients after the “Chlorine” release (including the upcoming Plutonium release) will be updated automatically by the Transform Hub towards the end next month (i.e. January 2016).