Presentaciones de la HITBSecConf2011
Este es el listado de las presentaciones celebradas en Amsterdam entre el 17 y el 20 de Mayo de la HITB Sec Conf 2011:
D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf D1 SIGINT - Frank Breedijk - Seccubus - Vuln Scanning Doesn’t Have to Be a Time Drain.pdf D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf D1T1 - Don Bailey - I’m Going Hunting I’m The Hunter.pdf D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf D1T3 - Didier Stevens - Malicious PDF Analysis Lab .zip D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf D1T3 - Mitja Kolsek - Remote Binary Planting.pdf D2 SIGINT - Ferdinand Vroom - How OWASP Helps You Tell The Story - NO SLIDES.pdf D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf D2T2 - Jean-Baptiste Be%cc%81drune & Jean Sigwald - iPhone Data Protection in Depth.pdf D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf D2T2 - Rosario Valotta - Cookie Jacking.pdf D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf D2T3 - Aditya K Sood - Spying on SpyEye.pdf D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf KEYNOTE 1 - Joe Sullivan - NO SLIDES.pdf KEYNOTE 2 - PANEL DISCUSSION - NO SLIDES.pdf KEYNOTE CLOSING - Richard Thieme - NO SLIDES.pdf
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec