This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "User:Tal Mel"
m (pages) |
m (ted) |
||
Line 15: | Line 15: | ||
== Conferences == | == Conferences == | ||
+ | [2017] [https://program.sha2017.org/events/230.html Hack-a-ble: Hacking BLE Smart Devices] @ | ||
+ | [https://sha2017.org/7 SHA 2017] <br> | ||
+ | Download: n/a | Watch: [https://media.ccc.de/v/SHA2017-230-hack-a-ble Video]<br> | ||
+ | |||
+ | [2017] [https://bsidestlv.com/schedule/bsidestlv-underground/ Break-a-ble: Hacking Your Smartphone with BLE] @ | ||
+ | [https://bsidestlv.com BSidesTLV 2017] <br> | ||
+ | Download: n/a | Watch: n/a | ||
+ | |||
[2017] [https://www.owasp.org/index.php/OWASP_Israel_January_2017#RUaBLE_BLE_Application_Hacking Hacking BLE Applications] @ [https://www.owasp.org/index.php/OWASP_Israel_January_2017 OWASP Israel 2017] <br> | [2017] [https://www.owasp.org/index.php/OWASP_Israel_January_2017#RUaBLE_BLE_Application_Hacking Hacking BLE Applications] @ [https://www.owasp.org/index.php/OWASP_Israel_January_2017 OWASP Israel 2017] <br> | ||
− | Download: [https://www.owasp.org/images/6/6f/OWASP2017_HackingBLEApplications_TalMelamed.pdf Presentation] | + | Download: [https://www.owasp.org/images/6/6f/OWASP2017_HackingBLEApplications_TalMelamed.pdf Presentation] | Watch: n/a |
[2016] [https://www.owasp.org/index.php/AppSec_Israel_2016_Presentations#Java_Hurdling:_Obstacles_and_Techniques_in_Java_Client_Penetration-testing Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing] @ [https://www.owasp.org/index.php/AppSec_Israel_2016 OWASP AppSec IL 2016] <br> | [2016] [https://www.owasp.org/index.php/AppSec_Israel_2016_Presentations#Java_Hurdling:_Obstacles_and_Techniques_in_Java_Client_Penetration-testing Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing] @ [https://www.owasp.org/index.php/AppSec_Israel_2016 OWASP AppSec IL 2016] <br> | ||
− | Download: | + | Download: [https://www.owasp.org/images/f/fb/AppSecIL2016_JavaHurdling_TalMelamed.pdf Presentation] | Watch: [https://www.youtube.com/watch?v=oq4phacH9WY Video] |
== Projects == | == Projects == |
Revision as of 16:50, 4 January 2018
Tal Melamed
Tal Melamed
[email protected]
Experience
[2017-Present] Cyber Security Advisor @ FBK
[2017-Present] Security Researcher @ Synack
[2013-Present] Tech Lead | Application Security Expert @ AppSec Labs
[2011-2013] Information Security Analyst @ Amdocs
[2009-2011] Security Researcher @ CheckPoint Software Technologies
[2006-2008] Fraud Analyst @ RSA, The Security Division of EMC
[2004-2005] Security Team @ Israeli Aircraft Industries (IAI)
[2001-2004] Platoon Sergeant @ Israel Defense Forces (IDF)
Conferences
[2017] Hack-a-ble: Hacking BLE Smart Devices @
SHA 2017
Download: n/a | Watch: Video
[2017] Break-a-ble: Hacking Your Smartphone with BLE @
BSidesTLV 2017
Download: n/a | Watch: n/a
[2017] Hacking BLE Applications @ OWASP Israel 2017
Download: Presentation | Watch: n/a
[2016] Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing @ OWASP AppSec IL 2016
Download: Presentation | Watch: Video
Projects
OWASP Path Traverser
OWASP Rainbow Maker
AppUse - Android Pentest Platform Unified Standalone Environment
iNalyzer - iOS Penetration testing Framework
iNalyzer - iOS Penetration testing Framework
Kingpin - TCP/SSL Proxy