Ruxcon 2014 Oct. 11, 2014 to Oct. 12, 2014, melbourne,austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Devil in the Detail - Advanced Forensic Artefact Analysis & More Tales From the Coalface Adam Daniel In this talk I will provide brief history and overview of Computer Forensic tools and ...
iOS 8 - Containers, Sandboxes and Entitlements Stefan Esser With the release of iOS 8 Apple introduces the concept of app extensions to iOS. ...
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer Brian Gorenc , Matt Molinyawe Every time you hand out your phone number you are giving adversaries access to an ...
Bitcoin Transaction Malleability Theory In Practice Rami Kogan , Daniel Chechik A mysterious vulnerability from 2011 almost made the Bitcoin network collapse. Silk Road, MTGox, and ...
Crash & Pay: Reading, Cloning and Fuzzing RFID Payment Cards Peter Fillmore So, we all know you can clone your building pass, and you can clone you ...
Tools of the NSA Playset Mike Ryan , Joe Fitzpatrick The leaked pages from the ANT catalog have given us unprecedented insight into the capabilities ...
Safecracking on a Budget Luke Jahnke , Jay Davis This talk will cover the creation of an autodialer capable of opening a group 2 ...
Software Defined Radness: HackRF meets +613 Y011 , Liamosaur Recently we got a few HackRF software defined radios. The HackRF is a new low-cost ...
Cyber Necromancy: Reverse Engineering Dead Protocols Matt Halchyshak , Joe Tartaro Reverse engineering is not all binaries and byte-code. The black art also extends to networks ...
Windows ShellBags Forensics in Depth Vincent Lo The problem of identifying when and which folders a user accessed arises often in digital ...
Mobile Underground Activities in China Lion Gu The mobile Web is significantly changing the world. More and more people are replacing their ...
Breaking Bricks and Plumbing Pipes: Cisco ASA a Super Mario Adventure Alec Stuart-muirk When Super Mario looks at your average network topology diagram he sees opportunity in those ... IncludeThinkstScapes
Ransomware - A Study of Evolution Peter Szabo RansomWare is not new, from the very early FAT scramblers to the poorly implemented crypto ...
BIOS and Secure Boot Attacks Uncovered John Loucaides A variety of attacks targeting platform firmware have been discussed publicly, drawing attention to the ...
Extreme Privilege Escalation on Windows 8/UEFI Systems Corey Kallenberg The UEFI specification has more tightly coupled the bonds of the operating system and the ...
EMET 5.0 – Armor or Curtain? René Freingruber EMET (Enhanced Mitigation Experience Toolkit) is an application which can be used to further harden ... IncludeThinkstScapes
Recapping: Breaking the Security of Physical Devices Silvio Cesare This is a recap and extended work of the presentation breaking the security of physical ...
Image and Video Forensics – An image is Worth 1000 Frauds Robert Winkel Magazines with photo shoots of super slim super models… Dictators releasing images that show their ...
Exploiting SQL Race Conditions and Other Oddities David Litchfield This talk will examine SQL race conditions and numeric lateral injection and how to exploit ...
Android Forensics: The Joys of JTAG Tty0x80 JTAG provides a standard interface with the ability to debug and determine faults in integrated ...
Homebrew Incident Response Mimeframe , Mcgrew In the past three years, Facebook's Incident Response team has grown from a single person ... IncludeThinkstScapes
International Voicemail Security And Bypassing 2FA For Fun And Profit Shubham Shah Voicemail systems have been broken into for years. Whether it be through spoofing attacks or ...
Linux Kernel Futex Fun: Exploiting CVE-2014-3153 Dougall Johnson It's not often that a vulnerability is discovered that can root most Android phones, compromise ...
Write Once, Run Anywhere: A Tour Of Java Remote Code Execution Vectors David Jorm Java applets run in a browser within a sandbox provided by the Java Security Manager ...
Finding Bugs The Rube-Goldberg Way Mark Brand The most popular questions after my presentation last year was 'How practical is this?' and ...
Let's Talk About SOAP Baby, Let's Talk About UPnP Ricky Lawshae Whether we want it to be or not, the Internet of Things is upon us. ...
Bolt on some Crypto Michael Samuel Adding cryptography to your datacenter or application doesn't need to be hard, but people still ...