Presentaciones de la HITBSECCONF 2013 - Amsterdam
Ya tenemos entretenimiento para el fin de semana con las presentaciones de la conferencia sobre seguridad informática de la Hack In The Box 2013 celebrada en Amsterdam.
- CLOSING KEYNOTE - Winn Schwartau - The History of the Future of InfoSec.pdf
- D1 KEYNOTE - Edward Schwartz - Embracing the Uncertainty of Advanced Attacks with Big Data Analytics.pdf
- D1LAB - Didier Stevens - Windows x64 Essentials.pdf
- D1LAB - Itzik Kotler - Hack Like It's 2013.pdf
- D1LAB - Vladimir Kropotov and Sergey Soldatov - Defending the Enterprise the Russian Way.pdf
- D1T1 - Hugo Teso - Aircraft Hacking - Practical Aero Series.pdf
- D1T1 - Peleus Uhley and Karthik Raman - Security Response in the Age of Mass Customized Attacks.pdf
- D1T1 - Petko D Petkov - Defeating the Intercepting Web Proxy %e2%80%93 A Glimpse Into the Next Generation of Web Security Tools.pdf
- D1T1 - Sergey Bratus and Julian Bangert - Better Security Through Creative x86 Trapping.pdf
- D1T1 - Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.pdf
- D1T1 - Vladimir Vorontsov and Alexander Golovko - SSRF PWNs - New Techniques and Stories.pdf
- D1T2 - Daniel Mende - Paparazzi Over IP.pdf
- D1T2 - Nicolas Seriot - Abusing Twitters API and OAuth Implementation.pdf
- D1T2 - Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel.zip
- D1T2 - Philippe Langlois - Hacking HLR HSS and MME Core Network Elements.pdf
- D1T2 - Tal Zeltzer - Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance.pdf
- D1T2 - Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.pdf
- D2 KEYNOTE - Bob Lord - Rethinking the Front Lines.pdf
- D2T1 - Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.pdf
- D2T1 - Peter Geissler and Steven Ketelaar - How I Met Your Modem.pdf
- D2T1 - Pod2g, Planetbeing, Musclenerd and Pimskeks aka Evad3rs - Swiping Through Modern Security Features.pdf
- D2T1 - Sebastien Kaczmarek - Dreamboot UEFI Bootkit.pdf
- D2T1 - Sergey Shekyan and Artem Harutyunyan - Turning Your Surveillance Camera Against You.pdf
- D2T2 - A Petukhov G Noseevich and D Gamayunov - Breaking Through Certified Crypto in Banking Apps.pdf
- D2T2 - Chilik Tamir - iAnalyzer - No More Blackbox iOS Analysis.pdf
- D2T2 - Dan Tentler - The Shodan Computer Search Engine.pdf
- D2T2 - Ofer Shezaf - The Infosec Risks of Charging Electric Cars.pdf
- D2T2 - Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.pdf
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec