Presentaciones de la HITBSECCONF Malaysia 2013
Las presentaciones de la Hack In The Box Security Conference (HITBSECCONF) 2013 celebrada en Malasia han sido publicadas.
Las lista de las diapositivas es la siguiente:
- D1 KEYNOTE - Andy Ellis - Cognitive Injection.pdf
- D1T1 - Collin Mulliner - Android DDI - Dynamic Dalvik Instrumentation of Android Applications.pdf
- D1T1 - Dominic Chell and Shaun Colley - Practical Attacks Against Encrypted VoIP Communications.pdf
- D1T1 - Gianni Gnesa - Hacking Corporations Using Unconventional Chained Exploits.pdf
- D1T1 - Kallenberg, Kovah, Butterworth - Defeating Signed BIOS Enforcement.pdf
- D1T1 - Marco Balduzzi, Kyle Wilhoit Alessandro Pasta - Attacking Vessel Tracking Systems for Fun and Profit.pdf
- D1T1 - Peter 'bl4sty' Geissler - Demystifying Game Console Security.pdf
- D1T2 - Adam Laurie - RFIDler - Software Defined RFID Reader Writer Emulator.pdf
- D1T2 - Andy Davis - Deriving Intelligence from USB Stack Interactions.pdf
- D1T2 - Francisco - Owning a Cisco VoIP Environment.pdf
- D1T2 - Joaquim Espinhara and Ulisses Alburquerque - Using Online Activity as Digital DNA.pdf
- D1T2 - Mariano Graziano and Andrea Lanzi - How Actaeon Unveils Your Hypervisor.pdf
- D1T2 - Mathias Morbitzer - TCP Idle Scans in IPv6.pdf
- D1T3 - Cem Gurkok - Hunting for OS X Rootkits in Memory.pdf
- D1T3 - Mike Shema - CSRF Lab.pdf
- D1T3 - Wes Brown - Malware Analysis Using Visualization.pdf
- D1T3 BONUS TALK - Marc Rogers - Why I Hacked TouchID and Still Think It's Awesome.pdf
- D2 KEYNOTE - Joe Sullivan - Bringing Social to Security - NO SLIDES.pdf
- D2T1 - Cyril 'pod2g' Cattiaux and GG - How Apple Can Read Your iMessages.pdf
- D2T1 - Hugo Teso - Digging Deeper Into Aviation Security.pdf
- D2T1 - James Forshaw - Exploiting XML Digital Signature Implementations.pdf
- D2T1 - Joshua 'p0sixninja' Hill - SHAttered Dreams.pdf
- D2T1 - Mark Vincent Yason - Diving Into IE10's Enhanced Protected Mode Sandbox.pdf
- D2T2 - Rahul Sasi - Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis.pdf
- D2T2 - Stefan Esser - Tales from iOS 6 Exploitation and iOS 7 Security Changes.pdf
- D2T2 - Stefano Zanero - Tracking and Characterizing Botnets Using Automatically Generated Domains.pdf
- D2T2 - Victor van der Veen - A Fast and Complete Android Method Tracer.pdf
- D2T2 - Vladimir Katalov - Cracking and Analyzing Apple's iCloud Protocol.pdf
- D2T3 - Ashar Javad - Trusted Friend Attack.pdf
- D2T3 - Eric Michaud and Ryan Lackey - Thwarting Evil Maid Attacks.pdf
- D2T3 - Job de Haas - 20 Ways Past Secure Boot.pdf
- D2T3 - Keith Lee and Jonathan Werrett - Facebook OSINT.pdf
- D2T3 - Luiz Eduardo and Joaquim Espinhara - Lost in Translation.pdf
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec