Hacker2HackerCon 2014 Oct. 18, 2014 to Oct. 19, 2014, sao paolo,brasil

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Reversing firmware using radare2 Anton Kochkov This talk will briefly describe modern computers (PC mostly) architecture, commonly used microcontrollers inside PC ...
DemystiPHYing 802.15.4 Digital Radio; or, How to Weaponize ingerprinting for PacketinPacket Mitigation Bypasses Sergey Bratus , Travis Goodspeed The PHY layer of digital radio is commonly viewed as a black box that takes ...
For Want of a Nail (*): A LangSec look at parser bugs in the Pwnies Sergey Bratus , Meredith L. Patterson Input parser bugs appear to be simple. For years, they've been among the best-understood bug ...
Android file system monitoring discussion Breno Silva This is a work in progress presentation to discuss challenges in file system monitoring in ...
LTE vs Darwin: Return of the SON Butterly , Schmidt "LTE vs. Darwin - Return of the SON" is the third presentation in a series ...
Keynote Daniel J. Bernstein , Halvar Flake This is an invited talk by the famous cryptologist and programmer, Daniel J. Bernstein Daniel ...
Who put the backdoor in my modem Ewerson Guimaraes For quite some time we have been seeing espionage cases reaching countries, governments and large ...
State of the Art in IPv6 Security Fernando Gont The IPv6 protocol suite was designed to accommodate the present and future growth of the ...
Catch­me if you can: TOR tricks for bots, shells and general hacking Jan Seidl This presentation brings some techniques that can be used by bots, shells (specially Metasploit's meterpreter) ...
Hardware Backdooring X11 with much class and no privileges Matias Katz X11 is much more powerful than we think. In this talk I will show how ...
HexRaysCodeXplorer: object oriented RE for fun and profit Matrosov , Rodionov HexRaysCodeXplorer - Hex-Rays Decompiler plugin for easier code navigation. Here are the main features of ...
Practical Analysis of Embedded Microcontrollers against Clock Glitching Attacks Ricardo Silva Clock glitching attacks are one of the different types of hardware fault injections studied nowadays. ...
Headless Browser Hide and Seek Sergey Shekyan Headless browsers have quietly become indispensable tools for security teams, researchers, and attackers focusing on ...
Option ROMs: A Hidden (But Privileged) World Shikhin Sethi Each modern x86 computer uses PCI option ROMs to initialize devices during early boot. The ...