We build trust relationships

Security from experience

Driven by trust, delivery by experience

Conferences and public speaking

  • OSINT 2.0, Past, Present and Future. OSIRA Conference, London 2015.

    This presentation covers the current status and the oportunities the newer technologies are bringing to OSINT. Download

  • Offensive OSINT. OSIRA Confernece, London 2014

    The presentation covers the OSINT process, and how is used by attackers to profile the targets Download

  • A journey into Application Security, ISACA/OWASP, Venice, 2014.

    This presentation is about the evolution of software development and the relation with Application Security Download

  • Wfuzz for pentesters, Source Conference, Sept 2011

    How Wfuzz can be used in Penetration tests Download

  • Wfuzz, theHarvester and Metagoofil, Blackhat USA, 2011

    We presented the new version of the tools in Blackhat Arsenal.Download

  • 2010: And still Bruteforcing, OWASP VI Spain, Barcelona, 2010

    A review of Bruteforce attacks in web applications, this is an old technique that is still useful for the attackers, and i showed with examples that is present in many attacks that affect big companies like Facebook, Yahoo, AT&T, Tuenti, etc. Also i presented the latest version of Webslayer a tool to perform all kind of bruteforce attacks in web applications.Download

  • Tactical Information Gathering, Source Conference, Barcelona, 2009

    The objective of the talk is to show the dangers of having public information on the Internet and how an attacker can take advantage of this information against you or your company.Download

  • Playing in a Satellite environment, Hack.Lu, Luxemburg, 2009

    This presentation is a warning call to those responsible for the companies that use or provide data connection (especially the Internet) via satellite, proving some of the attacks [more]This presentation is a warning call to those responsible for the companies that use or provide data connection (especially the Internet) via satellite, proving some of the attacks that are possible in this environment.Download

  • A Fresh new look into Information Gathering, IV OWASP Spain, Barcelona, 2008

    New and different techniques to gather information about a target. Download

  • eCrime, Fist Conferences Barcelona, Sept 2008

    From botnets to money laundry, this presentation shows the scene of the fraud on the Internet. (Spanish)

  • Principales Vulnerabilidades en aplicaciones Web, RedIris VI Foro de Seguridad, 2008

    An overview of the top web applications vulnerabilities, with demos and examples. (Spanish) Download

  • All your Data are belong to Us, FIST Conference Barcelona, 2007

    This presentation is about Databases and how they got hacked, different techniques and approachs.Download

  • Information Gathering, FIST Conference Barcelona, 2007

    An overview of the actual Information Gathering techniques, and introducing some tools, to facilitate the task of the pentester.Download

  • Mysql Backdoor analysis

    A brief analysis about the possibilities of developing a Mysql database backdoor, the analsysis is based on the backdoors developed by Argeniss for SQL 2005 and Oracle. Download

  • Fuzzing, FIST Conference Barcelona, 2006

    In this talk we introduced Fuzzing, an automatic way to find vulnerabilities in software.Download

  • Metacoretex-Ng, NoconName Mallorca, 2005

    The presentation is about metacoretex-Ng, the why, when and how of the project.Download

  • Modsecurity, Whatthehack! Netherland, 2005

    The presentation given at Whatthehack, introducing Modsecurity, and some new features for improving the level of protection provided by Modsecurity. Download