ekoparty 2014 Oct. 29, 2014 to Oct. 31, 2014, buenos aires,argentina

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Hacking US (and UK, Australia, France, etc.) traffic control systems Cesar Cerrudo Probably many of us have seen that scene from "Live Free or Die Hard" (Die ...
Exploring the Jolla Phone Vitaly Mclain , Drew Weedon In February of 2011, Nokia cancelled all of its Linux-based phone projects in favor Windows ...
Cooking an APT in the paranoid way Lorenzo martinez Rodriguez La charla versa sobre los diferentes pasos para crear un APT en modo paranoico. Es ...
Pointer Subterfuge In The Browser Address Space Alex Rad Hardening a browser is especially interesting because exploitation tends to be so interactive. Browser exploitation ...
Security Monitoring for big Infrastructures without a Million Dollar budget Hernan Costante , Juan Berner Nowadays in an increasingly more complex and dynamic network its not enough to be a ... IncludeThinkstScapes
IDA Synergy - Collaborative Reverse Engineering Federico Muttis A well-known problem in everyday's reverse engineering team's life is to consolidate their results. Although ...
La cifra negra de los delitos informáticos Cristian Borghello , Marcelo Macedo Los delitos informáticos ya dejaron de ser un problema a futuro para convertirse en un ...
Dissecting and Attacking RMI Frameworks Nahuel Abraham Distributed Object or Remote Method Invocation (RMI) frameworks facilitate the remote invocation of methods and ...
Reverse Engineering the Supra iBox Yes Braden Thomas This presentation walks through the reverse-engineering and exploitation of a hardened embedded device and provides ...
Explotación práctica de señales de radio con Software Defined Radio Luis Colunga ¿Sabías que es posible recibir señales de radio de aviones, barcos y hasta satélites de ...
Deep-submicron CPU backdoors Alfredo Ortega La existencia de backdoors o rootkits presentes directamente en el diseño del CPU es un ...
Agafi (Advanced Gadget Finder) Nicolas Economou La aparicion del bit NX en los CPUs de Intel y el uso de este ...
Security vulnerabilities in DVB-C networks: Hacking Cable TV network part 2 Rahul Sasi DVB-C stands for "Digital Video Broadcasting - Cable" and it is the DVB European consortium ...
Privacidad – Una historia de desencuentros Luciano Martins Existe la privacidad o es todo una mera ilusión? Esta charla abarca varios puntos sobre ...
Practical String Comparison Timing Attacks Paul Mcmillan Embedded systems are often slow and resource constrained. This makes them the perfect target for ...
Making Android's Bootable Recovery Work For You Drew Suarez Android bootable recovery mode is a self-contained alternative boot mode that loads a tiny Linux ...
Hacking RFID Billing Schemes For Fun and Free Rides Marcio Almeida Macedo The MIFARE Classic is one of the most used contactless cards in the world. It ...
Monitoring malicious domains on the Internet in real time for forensics purposes. Thiago Bordini In times of Bullet Proof hosting and Fast Flux Networks, in which cybercriminals are constantly ...
Shellcode's map with locks in exports Javier Aguinaga Cuando analizamos un exploit que tuvo gran impacto a nivel global, nuestro principal objetivo es ...
BARFing Gadgets (turbo) Christian Heitman Analizar código binario es una actividad crucial en muchas áreas de la ciencia de la ...
BIOS and Secure Boot Attacks Uncovered Yuriy Bulygin , Alexander Matrosov A variety of attacks targeting platform firmware have been discussed publicly, drawing attention to the ...
2 threads, 1 app (Inyección en Dalvik VM) Martin Fernandez ¿Qué pasaría si un atacante usara tu dispositivo Android para hacer llamadas y mandar SMSs ...
BERserk: New RSA signature forgery attack Yuriy Bulygin We will describe a new class of implementations vulnerabilities in PKCS#1 v1.5 RSA signature verification ...