Discover

Continual learning and investment

We enjoy looking at devices, networks and applications (including mobile) for vulnerabilities and weaknesses. Let us tear apart your product to see what risks you might be exposing yourself to when it goes live.

Blackhat Asia - March 2016

Date: 29 March 2016

SensePost is returning to amazing Singapore and Black Hat Asia. Singapore is playing host to a region that is growing from a cyber security perspective and we are proud to be there flying the SensePost flag.

Security Focuses - November 2015

Date: 12 November 2015

Stop cyber threats in their tracks with data-driven security intelligence and strategy. If you’re responsible for security, risk or compliance, this is a must-attend event.

44Con London - September 2015

Date: 07 September 2015

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Defcon Las Vegas - August 2015

Date: 08 August 2015

Defcon is one of the world's largest annual hacker conventions, held every year in Las Vegas, Nevada. The first DEF CON took place in June 1993.

Blackhat USA - August 2015

Date: 01 August 2015

18 years of Blackhat Las Vegas and SensePost was there training amongst the brightest professionals and researchers in the industry.

Blackhat Asia - March 2015

Date: 24 March 2015

SensePost is training at Black Hat Asia and will be involved with the brightest professionals and researchers in the industry.

ZaCon Jo'Burg - October 2015

Date: 24 March 2015

ZaCon is a South African information security conference run by hackers for hackers, with the explicit aim of growing the South African information security scene. New speakers, as well as veterans are encouraged, with local-research in nearly any security-relevant topic preferred.

Hacking Mainframes: Vulnerabilities in applications exposed over TN3210

Date: 28 September 2014

IBM System Z Mainframes are in regular use in Fortune 500 companies. Far from being legacy these systems are running...

Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber

Date: 22 September 2014

What happens when you collect a bunch of good data, under good pretences only to realise that the findings that...

When documents bite

Date: 12 September 2014

Mana from heaven: Improving the state of wireless rogue AP attacks

Date: 08 August 2014

Wifi (802.11/abgn...etc) networks are increasingly the primary interface for the majority of computing devices. These devices are usually portable, following...

Machines that betrayed their masters

Date: 28 March 2014

The devices we carry betray us to those who want to invade our privacy by emitting uniquely identifiable signals. The...

Hacking Z-Wave Home Automation Systems

Date: 01 August 2013

Presented by Behrang Fouladi and Sahand Ghanoun at BlackHat 2013 USA

Fun And Games With OSINT

Date: 24 April 2013

The Internet, a rich source of Open-Source Intelligence (OSINT). How are attackers using our 'online life' to discover weaknesses in...

Inside .NET Smart Card OS

Date: 06 September 2012

Presentation by Behrang Fouladi at 44Con in 2012.

Snoopy: Distributed Tracking and Profiling Framework

Date: 01 January 2012

Snoopy: Distributed Tracking and Profiling Framework Snoopy is a distributed tracking and profiling framework to perform some pretty interesting tracking...