{"id":209,"date":"2023-05-29T17:00:56","date_gmt":"2023-05-29T11:00:56","guid":{"rendered":"https:\/\/murat.one\/?p=209"},"modified":"2023-05-29T17:01:22","modified_gmt":"2023-05-29T11:01:22","slug":"my-speeches-at-opensysconf22-and-beetechconf23","status":"publish","type":"post","link":"https:\/\/murat.one\/?p=209","title":{"rendered":"My speeches at OpenSysConf&#8217;22 and BeetechConf&#8217;23"},"content":{"rendered":"\n<p>I haven&#8217;t write posts for a while, and now I want to share with you my speeches at OpenSysConf&#8217;22 and BeetechConf&#8217;23.<\/p>\n\n\n\n<p>The title of the first speech is &#8220;The history of the one CVE or how to hack hacker on Kali Linux&#8221; at OpenSysConf&#8217;22<\/p>\n\n\n\n<p>Video: <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"05. Open SysConf 2022 - \u0418\u0441\u0442\u043e\u0440\u0438\u044f \u043e\u0434\u043d\u043e\u0433\u043e CVE. Kutlymurat &quot;manfromkz&quot; Mambetniyazov\" width=\"750\" height=\"422\" src=\"https:\/\/www.youtube.com\/embed\/QBolH9bzzIE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>PDF:<\/p>\n\n\n\n<div class=\"wp-block-file\"><object class=\"wp-block-file__embed\" data=\"https:\/\/murat.one\/wp-content\/uploads\/2023\/05\/\u0418\u0441\u0442\u043e\u0440\u0438\u044f_\u043e\u0434\u043d\u043e\u0433\u043e_CVE_@manfromkz_Open_SysConf22-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of \u0418\u0441\u0442\u043e\u0440\u0438\u044f_\u043e\u0434\u043d\u043e\u0433\u043e_CVE_@manfromkz_Open_SysConf'22 (2).\"><\/object><a id=\"wp-block-file--media-736740e4-23ae-4207-a88b-b8e1e3e16bf7\" href=\"https:\/\/murat.one\/wp-content\/uploads\/2023\/05\/\u0418\u0441\u0442\u043e\u0440\u0438\u044f_\u043e\u0434\u043d\u043e\u0433\u043e_CVE_@manfromkz_Open_SysConf22-2.pdf\">\u0418\u0441\u0442\u043e\u0440\u0438\u044f_\u043e\u0434\u043d\u043e\u0433\u043e_CVE_@manfromkz_Open_SysConf&#8217;22 (2)<\/a><a href=\"https:\/\/murat.one\/wp-content\/uploads\/2023\/05\/\u0418\u0441\u0442\u043e\u0440\u0438\u044f_\u043e\u0434\u043d\u043e\u0433\u043e_CVE_@manfromkz_Open_SysConf22-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-736740e4-23ae-4207-a88b-b8e1e3e16bf7\">Download<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>The title of the second speech is &#8220;Your code through the eyes of a hacker&#8221; at BeetechConf&#8217;23<\/p>\n\n\n\n<p>Video:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"\u041a\u0443\u0442\u043b\u044b\u043c\u0443\u0440\u0430\u0442 \u041c\u0430\u043c\u0431\u0435\u0442\u043d\u0438\u044f\u0437\u043e\u0432. \u0422\u0432\u043e\u0439 \u043a\u043e\u0434 \u0433\u043b\u0430\u0437\u0430\u043c\u0438 \u0445\u0430\u043a\u0435\u0440\u0430\" width=\"750\" height=\"422\" src=\"https:\/\/www.youtube.com\/embed\/wmffWB71b_k?list=PL37Je68UsvW1bYRSJfZlWIeJfZt-ul2ep\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>PDF:<\/p>\n\n\n\n<div class=\"wp-block-file\"><object class=\"wp-block-file__embed\" data=\"https:\/\/murat.one\/wp-content\/uploads\/2023\/04\/Tvoi_kod_glazami_hackera_black.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Tvoi_kod_glazami_hackera_black.\"><\/object><a id=\"wp-block-file--media-f3866349-c743-4ce3-b9de-dcd7b64a85af\" href=\"https:\/\/murat.one\/wp-content\/uploads\/2023\/04\/Tvoi_kod_glazami_hackera_black.pdf\">Tvoi_kod_glazami_hackera_black<\/a><a href=\"https:\/\/murat.one\/wp-content\/uploads\/2023\/04\/Tvoi_kod_glazami_hackera_black.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f3866349-c743-4ce3-b9de-dcd7b64a85af\">Download<\/a><\/div>\n\n\n\n<p>Hope you will enjoy!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I haven\u2019t write posts for a while, and now I want to share with you my speeches at OpenSysConf\u201922 &#8220;The history of the one CVE or how to hack hacker on Kali Linux&#8221; and BeetechConf\u201923 &#8220;Your code through the eyes of a hacker&#8221;.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[14,1],"tags":[40,13,17],"_links":{"self":[{"href":"https:\/\/murat.one\/index.php?rest_route=\/wp\/v2\/posts\/209"}],"collection":[{"href":"https:\/\/murat.one\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/murat.one\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/murat.one\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/murat.one\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=209"}],"version-history":[{"count":3,"href":"https:\/\/murat.one\/index.php?rest_route=\/wp\/v2\/posts\/209\/revisions"}],"predecessor-version":[{"id":213,"href":"https:\/\/murat.one\/index.php?rest_route=\/wp\/v2\/posts\/209\/revisions\/213"}],"wp:attachment":[{"href":"https:\/\/murat.one\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/murat.one\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/murat.one\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}