Las presentaciones de la Hack In The Box Security Conference (HITBSECCONF) 2013 celebrada en Malasia han sido publicadas.
Las lista de las diapositivas es la siguiente:
- D1 KEYNOTE - Andy Ellis - Cognitive Injection.pdf
- D1T1 - Collin Mulliner - Android DDI - Dynamic Dalvik Instrumentation of Android Applications.pdf
- D1T1 - Dominic Chell and Shaun Colley - Practical Attacks Against Encrypted VoIP Communications.pdf
- D1T1 - Gianni Gnesa - Hacking Corporations Using Unconventional Chained Exploits.pdf
- D1T1 - Kallenberg, Kovah, Butterworth - Defeating Signed BIOS Enforcement.pdf
- D1T1 - Marco Balduzzi, Kyle Wilhoit Alessandro Pasta - Attacking Vessel Tracking Systems for Fun and Profit.pdf
- D1T1 - Peter 'bl4sty' Geissler - Demystifying Game Console Security.pdf
- D1T2 - Adam Laurie - RFIDler - Software Defined RFID Reader Writer Emulator.pdf
- D1T2 - Andy Davis - Deriving Intelligence from USB Stack Interactions.pdf
- D1T2 - Francisco - Owning a Cisco VoIP Environment.pdf
- D1T2 - Joaquim Espinhara and Ulisses Alburquerque - Using Online Activity as Digital DNA.pdf
- D1T2 - Mariano Graziano and Andrea Lanzi - How Actaeon Unveils Your Hypervisor.pdf
- D1T2 - Mathias Morbitzer - TCP Idle Scans in IPv6.pdf
- D1T3 - Cem Gurkok - Hunting for OS X Rootkits in Memory.pdf
- D1T3 - Mike Shema - CSRF Lab.pdf
- D1T3 - Wes Brown - Malware Analysis Using Visualization.pdf
- D1T3 BONUS TALK - Marc Rogers - Why I Hacked TouchID and Still Think It's Awesome.pdf
- D2 KEYNOTE - Joe Sullivan - Bringing Social to Security - NO SLIDES.pdf
- D2T1 - Cyril 'pod2g' Cattiaux and GG - How Apple Can Read Your iMessages.pdf
- D2T1 - Hugo Teso - Digging Deeper Into Aviation Security.pdf
- D2T1 - James Forshaw - Exploiting XML Digital Signature Implementations.pdf
- D2T1 - Joshua 'p0sixninja' Hill - SHAttered Dreams.pdf
- D2T1 - Mark Vincent Yason - Diving Into IE10's Enhanced Protected Mode Sandbox.pdf
- D2T2 - Rahul Sasi - Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis.pdf
- D2T2 - Stefan Esser - Tales from iOS 6 Exploitation and iOS 7 Security Changes.pdf
- D2T2 - Stefano Zanero - Tracking and Characterizing Botnets Using Automatically Generated Domains.pdf
- D2T2 - Victor van der Veen - A Fast and Complete Android Method Tracer.pdf
- D2T2 - Vladimir Katalov - Cracking and Analyzing Apple's iCloud Protocol.pdf
- D2T3 - Ashar Javad - Trusted Friend Attack.pdf
- D2T3 - Eric Michaud and Ryan Lackey - Thwarting Evil Maid Attacks.pdf
- D2T3 - Job de Haas - 20 Ways Past Secure Boot.pdf
- D2T3 - Keith Lee and Jonathan Werrett - Facebook OSINT.pdf
- D2T3 - Luiz Eduardo and Joaquim Espinhara - Lost in Translation.pdf