Infiltrate 2015 April 16, 2015 to April 17, 2015, Miami,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Abyss or Turning Point: Strategy, Skills and Tradecraft in the Age of 21st Century Warfare Ray Boisvert Ray Boisvert is the former Assistant Director, Intelligence, for the Canadian Security Intelligence Service (CSIS). ...
Practical Attacks on DOCSIS Braden Thomas Braden (@drspringfield) is a Principal Research Scientist at Accuvant, focusing on embedded security research and ...
Modern Objective-C Exploitation Neil Archibald This talk serves to advance the research I published in Phrack 66 (2009) regarding the ...
MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect data Joaquim Espinhara , Rafael Silva The goal of this talk is present a way to abuse a default feature of ...
A Link to the Past: Abusing Symbolic Links on Windows James Forshaw The dangers of symbolic links are well known on Unix-like operating systems. Through their misuse ...
Insection: AWEsomely Exploiting Shared Memory Objects Alex Ionescu As the barriers to hijacking the kernel and system processes continue to increase with technologies ...
Fuzzing OSX At Scale Ben Nagy In this talk Ben Nagy delves into scaling out OSX fuzzfarms on commodity (i.e. non-Apple) ... IncludeThinkstScapes
Problems in symbolic fuzzing Nathan Rittenhouse Fuzzing is undoubtedly one of the most popular methods for both attackers and defenders to ...
Data Driven Offense Ram Shankar , Sacha Faust While the industry’s “blue team” of defenders and analysts are racing to make security detections ...
Hardened Anti-Reverse Engineering System Jacob Torrey Hardened Anti-Reverse Engineering System (HARES), a prototype anti-reverse engineering technique providing a method to seamlessly ... IncludeThinkstScapes
Hacking Games in a Hacked Game Jordan Wiens , Rusty Wagner For the last two years, the Ghost in the ShellCode Capture the Flag (CTF) has ...