diff --git a/docs/pptx/BHMEA23-Arsenals-PolarDNS_Specialized_DNS_Server_For_Penetration_Testing.pptx b/docs/pptx/BHMEA23-Arsenals-PolarDNS_Specialized_DNS_Server_For_Penetration_Testing.pptx deleted file mode 100644 index 9a62b17..0000000 Binary files a/docs/pptx/BHMEA23-Arsenals-PolarDNS_Specialized_DNS_Server_For_Penetration_Testing.pptx and /dev/null differ diff --git a/docs/pptx/BHMEA23-Briefing-Attacking_DNS_Resolvers_From_Server-Side.pptx b/docs/pptx/BHMEA23-Briefing-Attacking_DNS_Resolvers_From_Server-Side.pptx deleted file mode 100644 index d6c8940..0000000 Binary files a/docs/pptx/BHMEA23-Briefing-Attacking_DNS_Resolvers_From_Server-Side.pptx and /dev/null differ diff --git a/docs/pptx/README.md b/docs/pptx/README.md new file mode 100644 index 0000000..3e70efe --- /dev/null +++ b/docs/pptx/README.md @@ -0,0 +1,6 @@ +## BlackHat 2023 MEA + +PolarDNS was presented at [Black Hat MEA 2023](https://blackhatmea.com/) in the following sessions: + +- [Session 1](https://blackhatmea.com/session/attacking-dns-resolvers-server-side-fun-and-profit): Attacking DNS resolvers from the server-side for fun and profit ([pptx](https://dns-research-public-pptx.s3.us-east-2.amazonaws.com/BHMEA23-Briefing-Attacking_DNS_Resolvers_From_Server-Side.pptx)) +- [Session 2](https://blackhatmea.com/session/polardns-new-specialized-dns-server-penetration-testing-and-vulnerability-research): PolarDNS: New specialized DNS server for penetration testing and vulnerability research ([pptx](https://dns-research-public-pptx.s3.us-east-2.amazonaws.com/BHMEA23-Arsenals-PolarDNS_Specialized_DNS_Server_For_Penetration_Testing.pptx))