blackhatsummer 2014 Nov. 25, 2014 to Nov. 26, 2014, sao paulo,brazil

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
REWIRE: DIGITAL COSMOPOLITANS IN THE AGE OF CONNECTION Ethan Zuckerman N/A
SMART MARKETS Derrik De Kerkhove N/A
A DIFFERENT KIND OF CRYPTO: CRYPTO ALGORITHMS DESIGNED FOR PAYLOAD OBFUSCATION Chris Schmitt With signature-based anti-virus, many times payloads are encrypted. However, people often use standard algorithms such ...
A SONG OF HASHES AND DUMPS: WHAT I'VE LEARNED FROM CRACKING .BR PASSWORDS Daniel Marques We do a lot of password cracking these days. Hashes from owned systems pop out ...
APPLYING MILITARY DECEPTION TO NEUTRALIZE METASPLOIT POST-EXPLOITATION Pornsook Kornkitichai After a successful exploitation, one of the most significant steps in attacking a system is ...
BYPASSING THE SECURE DESKTOP PROTECTIONS Bruno Oliveira , Marcio Almeida Macedo The Secure Desktop is a feature of Windows API that creates a separated desktop to ...
DEVICEDISENABLER: A LIGHTWEIGHT HYPERVISOR WHICH HIDES DEVICES TO PROTECT CYBER ESPIONAGE AND TAMPERING Kuniyasu Suzaki Current computers have lots of rich devices, but the devices may be used by attackers. ...
EVASION OF HIGH-END IPS DEVICES IN THE AGE OF IPV6 Rafael Schaefer IPv6-era is here, whetheryou already use it or if you continue to ignore it. However, ...
LOST IN TRANSLATION Rodrigo Montoro , Joaquim Espinhara We all know English has been the universal language for several years now. Companies have ...
STAY OUT OF THE KITCHEN: A DLP SECURITY BAKE-OFF Zach Lanier , Kelly Lum Despite a plethora of data security and protection standards and certifications, companies and their systems ...
YET ANOTHER ANDROID SECURITY FEATURE Breno Pinto , Felipe Boeira Recent years have brought a dramatic rise of mobile exploitation techniques and one of the ...
HACKING MIFARE CLASSIC CARDS Marcio Almeida Macedo The MIFARE Classic is one of the most used, contactless cards in the world. It ...
IOS FORENSICS WITH OPEN-SOURCE TOOLS Andrey Belenko This workshop is for attendees who want to become familiar with current state-of-the-art techniques in ...
IPV6 ATTACKS AND DEFENSES - A HANDS-ON WORKSHOP Christopher Werny , Rafael Schaefer IPv6 deployment is rising every single day. According to the statistics and trends of the ...