Blogs & Presentations
Available blogs, articles and presentations related to Telecom and Security:
- 19.11.2020 DeepSec 2020 conference talk - Security Model Of Endpoint Devices
- 8.10.2019 tshark + Elasticsearch in Docker
Bash commands provides lightweight example how to use tshark + Elasticsearch to perform simple pcap analytic using Docker images.
- 3.10.2017 Crafting Network Protocols
The document describes the methods and approach how to craft any protocol message which could be used to try to find vulnerabilities also in not common protocols. The precondition is to have some existing traffic capture (pcap) and that the protocol is dissected by the wireshark.
- 3.10.2017 Kali Linux Tips
This document is providing selected steps and is presenting approaches which could be used to perform the security assessment effectively within the limited allocated time with Kali Linux.
- 3.10.2017 Analyzing Network Capture
How to perform analysis of the network capture (pcap) with the goal to detect anomalies, perform incident investigation or try to understand the network flow.
- 30.8.2016 SS7 messages screening, filtering presentation

- 16.7.2016 Protecting Telecom Core Networks from SS7 Attacks presentation

- 12.7.2016 jDiameter library usage
Example of Diameter client and usage of jDiameter java library.
- 12.7.2016 jSS7 library usage
Example of SS7 (Sigtran) client and usage of jSS7 java library.
- 12.7.2016 Auditing Network Elements
Auditing Network Elements and deciding the audit strategy.
- 12.7.2016 SS7, Diameter, GTP Security presentation

- 12.7.2016 IT Security Controls
Recommendations and selected security controls related to IT and Operation and Maintenance networks.
- 12.7.2016 Generic Security Overview
Where to start for organizations to address the security.