ekoparty 2014 Oct. 29, 2014 to Oct. 31, 2014, buenos aires,argentina
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Hacking US (and UK, Australia, France, etc.) traffic control systems | Cesar Cerrudo | Probably many of us have seen that scene from "Live Free or Die Hard" (Die ... | |
Exploring the Jolla Phone | Vitaly Mclain , Drew Weedon | In February of 2011, Nokia cancelled all of its Linux-based phone projects in favor Windows ... | |
Cooking an APT in the paranoid way | Lorenzo martinez Rodriguez | La charla versa sobre los diferentes pasos para crear un APT en modo paranoico. Es ... | |
Pointer Subterfuge In The Browser Address Space | Alex Rad | Hardening a browser is especially interesting because exploitation tends to be so interactive. Browser exploitation ... | |
Security Monitoring for big Infrastructures without a Million Dollar budget | Hernan Costante , Juan Berner | Nowadays in an increasingly more complex and dynamic network its not enough to be a ... | IncludeThinkstScapes |
IDA Synergy - Collaborative Reverse Engineering | Federico Muttis | A well-known problem in everyday's reverse engineering team's life is to consolidate their results. Although ... | |
La cifra negra de los delitos informáticos | Cristian Borghello , Marcelo Macedo | Los delitos informáticos ya dejaron de ser un problema a futuro para convertirse en un ... | |
Dissecting and Attacking RMI Frameworks | Nahuel Abraham | Distributed Object or Remote Method Invocation (RMI) frameworks facilitate the remote invocation of methods and ... | |
Reverse Engineering the Supra iBox Yes | Braden Thomas | This presentation walks through the reverse-engineering and exploitation of a hardened embedded device and provides ... | |
Explotación práctica de señales de radio con Software Defined Radio | Luis Colunga | ¿Sabías que es posible recibir señales de radio de aviones, barcos y hasta satélites de ... | |
Deep-submicron CPU backdoors | Alfredo Ortega | La existencia de backdoors o rootkits presentes directamente en el diseño del CPU es un ... | |
Agafi (Advanced Gadget Finder) | Nicolas Economou | La aparicion del bit NX en los CPUs de Intel y el uso de este ... | |
Security vulnerabilities in DVB-C networks: Hacking Cable TV network part 2 | Rahul Sasi | DVB-C stands for "Digital Video Broadcasting - Cable" and it is the DVB European consortium ... | |
Privacidad – Una historia de desencuentros | Luciano Martins | Existe la privacidad o es todo una mera ilusión? Esta charla abarca varios puntos sobre ... | |
Practical String Comparison Timing Attacks | Paul Mcmillan | Embedded systems are often slow and resource constrained. This makes them the perfect target for ... | |
Making Android's Bootable Recovery Work For You | Drew Suarez | Android bootable recovery mode is a self-contained alternative boot mode that loads a tiny Linux ... | |
Hacking RFID Billing Schemes For Fun and Free Rides | Marcio Almeida Macedo | The MIFARE Classic is one of the most used contactless cards in the world. It ... | |
Monitoring malicious domains on the Internet in real time for forensics purposes. | Thiago Bordini | In times of Bullet Proof hosting and Fast Flux Networks, in which cybercriminals are constantly ... | |
Shellcode's map with locks in exports | Javier Aguinaga | Cuando analizamos un exploit que tuvo gran impacto a nivel global, nuestro principal objetivo es ... | |
BARFing Gadgets (turbo) | Christian Heitman | Analizar código binario es una actividad crucial en muchas áreas de la ciencia de la ... | |
BIOS and Secure Boot Attacks Uncovered | Alexander Matrosov , Yuriy Bulygin | A variety of attacks targeting platform firmware have been discussed publicly, drawing attention to the ... | |
2 threads, 1 app (Inyección en Dalvik VM) | Martin Fernandez | ¿Qué pasaría si un atacante usara tu dispositivo Android para hacer llamadas y mandar SMSs ... | |
BERserk: New RSA signature forgery attack | Yuriy Bulygin | We will describe a new class of implementations vulnerabilities in PKCS#1 v1.5 RSA signature verification ... |