Presentaciones de la Hack in the box 2012 celebrada en Amsterdam
Ya podemos descargarnos las presentaciones de otra gran conferencia de seguridad en la que ha habido participación hispana. La HITB (Hack in the box) 2012 Amsterdam:
- CLOSING KEYNOTE - Ms Jaya Baloo - Identity Privacy and Security.pdf
- D1 SIGINT - Marinus Kuivenhoven - Hack to the Future.pdf
- D1 SIGINT - Ralf- Philip Weinmann - NO SLIDES.pdf
- D1 SIGINT - Xavier Mertens - Pastebinmon and Leakedin.pdf
- D1T1 - Arnauld Mascret - Whistling Over The Wire.zip
- D1T1 - Claudio Guarnieri - One Flew Over the Cuckoos Nest.pdf
- D1T1 - Ivo Pooters - Turning Android Inside Out.pdf
- D1T1 - Juan-Pablo Echtegoyen - Attacking the SAP Solution Manager.pdf
- D1T1 - Roberto Suggi and Scott Bell - Browser Bug Hunting in 2012.pdf
- D1T2 - Adam Gowdiak - Security Threats in Digital Sat Televisions.pdf
- D1T2 - Adam Gowdiak - Security Vulnerabilities of DVB Chipsets.pdf
- D1T2 - Itzhak Zuk Avraham and Nir Goldshlager - Killing a Bug Bounty Program - Twice.pdf
- D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.pdf
- D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.pdf
- D1T3 - Didier Stevens - Whitehat Shellcode.zip
- D1T3 - Gal Diskin - Hacking Using Dynamic Binary Instrumentation.pdf
- D1T3 - Jurriaan Bremer - Binary Obfuscation the SSE Way.pdf
- D2 SIGINT - Elger Jonker - Close-Up of Three Technical Hackerspace Projects.pdf
- D2 SIGINT - Rory Breuk and Albert Spruyt - Integrating DMA Attacks in Metasploit.pdf
- D2T1 - Alex Bazhanyuk and Nikita Tarakanov - Automatically Searching for Vulnerabilities.pdf
- D2T1 - Andrei Costin - Postscript Dangers Ahead - Hacking MFPCs.pdf
- D2T1 - Georgia Weidman - Bypassing the Android Permission Model.pdf
- D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.pdf
- D2T1 - Marco Balduzzi - SatanCloud.pdf
- D2T2 - Jailbreak Dream Team - Absinthe Jailbreak for iOS 5.0.1.pdf
- D2T2 - Jailbreak Dream Team - Corona Jailbreak for iOS 5.0.1.pdf
- D2T2 - Nicolas Gregoire - Attacking XML Processing.pdf
- D2T2 - Rahul Sasi - CXML VXML Auditing for IVR Pentesters.zip
- D2T2 - Steven Seeley - Ghost In the Windows 7 Allocator.pdf
- D2T3 - Chema Alonso and Manu The Sur - Power of FOCA 3.pdf
- D2T3 - Enno Rey Daniel Mende Pascal Turbing Matthias Luft - Smashing VMDK Files for Fun and Profit.pdf
- D2T3 - Mario Vuksan and Tomislav Pericin - Titan Engine 3.pdf
- KEYNOTE 1 - Andy Ellis - Staying Ahead of the Security Poverty Line.pdf
- KEYNOTE 2 - Bruce Schneier - Trust, Security and Society - NO SLIDES.pdf
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec