Material de Zero Nights 2015, incluido los talleres
Ya está disponible el material de la conferencia Zero Nights 2015. No sólo las de las charlas, sino también de los talleres!
- “A praise for hackers”
- "Hacking Virtual Appliances"
- "Browser Fuzzing with a Twist (and a Shake)"
- "Warranty Void If Label Removed - Attacking MPLS Networks"
- “Big problems with big data - Hadoop interfaces security”
- “Mathematical theory of input validation vulnerabilities and attacks”
- «Cisco IOS shellcode – all-in-one»
- "Introducing Choronzon: an approach to knowedgebased evolutionary fuzzing"
- "Samsung SmartTV: how-to to creating insecure device in today’s world"
- "Did you get your token?”
- "Fix it yourself: resolving UEFI vulnerabilities single-handedly"
- "Attacking hypervisors using firmware and hardware"
- "Direct X – direct way to Microsoft Windows kernel"
- "Hack like a movie star: Step-bystep guide to crafting SCADA payloads for physical attacks with catastrophic consequences"
- "Modifying the firmwares of industrial switches"
- “Getting The Most Out Of CSP: a Deep Dive”
- "illusoryTLS: Nobody But Us Impersonate, Tamper, and Exploit"
- "How to build your own Echelon system? Attacks at 3G modems"
- "EESIL – universal IL (Intermediate Language) for Radare2"
- "S[c][/c]rum is all around. How to stop continuous integration"
- "KNX security or how to steal a skyscraper"
- "Extracting the painful (blue) tooth"
- “Cross-platform reversing with Frida”
- "Enlarge your Burp, or How to stop fearing Javadocs"
- “Practical exploitation of AVR MC-based devices”
- “On the way to (wrong) anonymity. Basic techniques of digital contraception and private data hygiene”
- “Software vulnerabilities of Yota communication equipment”
- “Distributing the reconstruction of high-level intermediate representation for large scale malware analysis”
- “Hooked browser network based on BeEF and Google Drive”
- “ORM2Pwn: exploiting injections in Hibernate”
- “What should a hacker know about WebDav? Vulnerability review in WebDav implementations”
- “Knowledge based approach for fast Internet resource discovery or Data Mining in the service of nmap”
- “Correlating security events with Esper”
- “Fighting against Flash 0-day: a hunt for a tainted vector”
- “Banking Trojans: a look from the new perspective”
- “Automation of web applications scanning: experience of Yandex”
- “Do-it-yourself banking SDL”
- “Let’s play the game: One more way to perform penetration test”
- Presentation
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec