ZeroNights 2015 Nov. 25, 2015 to Nov. 26, 2015, moscow,russia
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote: A praise for hackers | Rodrigo Rubira Branco | Hackers are creating knowledge and sharing information since the inception of technologies. They do have ... | |
Hacking virtual appliances | Jeremy Brown | Virtual Appliances have become very prevalent these days as virtualization is ubiquitous and hypervisors commonplace. ... | |
Extracting the painful (Blue)tooth | Matteo Beccaro , Matteo Collura | Do you know how many Bluetooth-enabled devices are currently present in the world? With the ... | |
Cisco IOS shellcode – all-in-one | George Nosenko | Cisco network equipment has always been an attractive attack target due to its prevalence and ... | |
Fix it yourself: resolving UEFI vulnerabilities single-handedly | Nikolaj Schlej | A vulnerability has been found in your firmware but the vendor isn’t in any hurry ... | |
Big problems with big data – Hadoop interfaces security | Jakub Kaluzny | Did "cloud computing" and "big data" buzzwords bring new challenges for security testers? Apart from ... | |
illusoryTLS: Nobody But Us Impersonate, Tamper, and Exploit | Alfonso de Gregorio | Learn how to embed an elliptic-curve asymmetric backdoor into a RSA modulus using Elligator. Find ... | |
Hack like a movie star: Step-by-step guide to crafting SCADA payloads for physical attacks with catastrophic consequences | Marina Krotofil | Nearly all talks on SCADA vulnerabilities are concluded with the sweeping scenarios of physical attacks ... | |
Modifying the firmwares of industrial switches | Alexander Ermolov | The data bus is the heart of any modern ICS infrastructure. It is typically based ... | |
Direct X – direct way to Microsoft Windows kernel | Nikita Tarakanov | Graphics technologies expose a large number of APIs in kernel mode drivers that need to ... | |
«Attacking hypervisors using firmware and hardware» | Alexander Matrosov | In this presentation, we explore the attack surface of modern hypervisors from the perspective of ... | |
«Introducing Choronzon: an approach to knowledge-based evolutionary fuzzing» | Nikolaos Naziridis , Zisis Sialveras | The framework that will be presented is a file format fuzzer that uses evolutionary algorithms ... | |
«Warranty void if label removed – attacking MPLS networks» | Georgi Geshev | Multiprotocol Label Switching (MPLS) is certainly the most prevalent service provider technology used by major ... | |
«Getting the most out of CSP: a deep dive» | Sergey Shekyan | Content Security Policy is used to declare web resource content restrictions. It prevents exploitation by ... | |
«Did you get your token?» | Daniel (jin Long) , Azure (yang Jietao) | Microsoft keeps evolving its security mechanisms while releasing new versions of Windows. These new introduced ... |