Ya está disponible el material de las presentaciones y charlas de la segunda edición europea de la Conferencia de seguridad Hack In The Box (HITB) que ha tenido lugar en Amsterdam entre el 17 y el 20 de mayo.
A continuación os dejo los enlaces:
D1 SIGINT
D1T1
D1T2
D1T3
D2 SIGINT
D2T1
D2T2
D2T3
KEYNOTES
A continuación os dejo los enlaces:
D1 SIGINT
- Elger Stitch Jonker - Building the Hackerspace
- D1 SIGINT - Frank Breedijk - Seccubus - Vuln Scanning Doesn't Have to Be a Time Drain
- D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011
D1T1
- Don Bailey - I'm Going Hunting I'm The Hunter
- Elena K and Joffrey C - Webshells - A Framework for Pentesting
- Mariano Nunez - Attacks Against SAP Web Applications
- Stefan Esser - Antid0te 2.0 - ASLR in iOS
D1T2
- Asia Slowinka - Excavating Data Structures from Stripped Binaries
- Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting
- Guillaume Prigent - Really Open Source Information Gathering
- Laurent Oudot - Extracting Senstive Data from Your iPhone
- Thomas Caplin - Silverlight - A New Way to Surf .Net Holes
D1T3
- Didier Stevens - Malicious PDF Analysis Lab
- Itzhak Zuk Avraham - Popping Shell On Android Devices
- Mitja Kolsek - Remote Binary Planting
D2 SIGINT
- Ferdinand Vroom - How OWASP Helps You Tell The Story - NO SLIDES
- Jim Manico - Ghost of XSS Past Present and Future
- Martin Knobloch - Secure Your Software Using OWASP
D2T1
- Andreas Weigenstein - SQL Injection with ABAP
- Andrew Gavin - Stealing Sensitive Data from Thousands of Systems
- Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf
- Itzik Kotler - Let Me Stuxnet You
- Ivan Ristic - A Study of What Really Breaks SSL
D2T2
- D. Mende & Enno Rey - Attacking 3G and 4G Networks
- Jean-Baptiste Bédrune & Jean Sigwald - iPhone Data Protection in Depth
- Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky
- Rosario Valotta - Cookie Jacking
- Shreeraj Shah - Next Generation Web Attacks
D2T3
- Aditya K Sood - Spying on SpyEye
- Bert Hubert - DNSSEC - The Good The Bad and The Very Bad
- Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware
- Maarten Oosterink - Attacking Critical Infrastructure
- ravis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer
KEYNOTES
Comentarios
Publicar un comentario