ekoparty 2012 Sept. 19, 2012 to Sept. 21, 2012, Buenos Aires, Argentina

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cyberwar for all Cesar Cerrudo Most days appear related news Cyberwar, cyber weapons, cyber attacks, etc.., Ever have wondered how ... Security
Inception of the SAP Platform's Brain: Attacks to SAP Solution Manager Juan perez Etchegoyen Global Fortune 1000 companies, large government organizations, and defense entities, they share something in common: ... Security
One firmware to monitor 'em all Andres Blanco , Matias Eissler In recent years, mobile devices have become articles of use masivo.Por Usually these devices follow ...
HTExploit - Bypassing your htaccess and beyond! Maximiliano Soler , Matias Katz HTExploit is an open-source tool written in Python That exploits a weakness in the Way ...
Literacy for Integrated Circuit Reverse Engineering Alex Radocea "Prior teach the big pictures Talks About hardware security - it's nearly impossible to safely ...
The Future of Automated Malware Generation Stephan Chenette "Cyber-criminals Have had back-end equivalent to Virus Total Infrastructures to test if malware is Effective ...
Bitcoin, and the future of MavePay cryptocurrencies Sergio Lerner In this presentation we present the MAVE digital signature protocol and a new payment scheme ...
Fear and Loathing in Java (Fear and Loathing in Java) Esteban Guillardoy A lysergic and psychedelic journey through the underworld of Java vulnerabilities. In this talk we ... Security
Fuzzing DTMF Input Processing Algorithms Rahul Sasi Our paper would be on DTMF input processing algorithms [DSP], That Are Often embed into ...
Cryptographic flaws in Oracle Database authentication protocol Esteban Martínez Fayó This presentation will focus on new vulnerabilities in Oracle Database native authentication protocol. It will ...
Satellite baseband mods: Taking Control of the GMR-2 phone InmarSat terminal Alfredo Ortega , Sebastian Muiz We present a way to modify the firmware of a satellite phone (Inmarsat IsatPhonePro) using ...
OPSEC: Because Jail is for wuftpd The Grugq Drawing on lessons gleaned from recent indictments hacker, research on surveillance, espionage and counter-intelligence, This ...
Trace Surfing Agustin Gianni Reverse engineering is an arduous task Often That Requires Both time and skill. As new ...
Welcome to your Secure / home, $ user Lorenzo The aim of the conference is to present how to perform so simple and structured ... Security
PIN for all (and all) Pablo Solè This talk is about the implementation of a tool to Pin (http://www.pintool.org/) that allows all ...
SinFP3: More Than A Complete Framework for Operating System Fingerprinting Patrice Auffret In 2008 [Springer, 2008], we released a new version of SinFP [cpan] and a paper ...
4140 ways your alarm system can fail Babak Javadi , Keith Howell Alarm systems and panels designed before Were the Prevalence of wireless technology and a proprietary ...
Persistent VGA Rootkit Nicolas Economou , Diego Juarez For years, we have seen that by turning our computer the first legend we see ... Rootkits Hardware General IncludeThinkstScapes Video Card
Dirty use of USSD Codes in Cellular Network Ravi Borgaonkar , . "USSD stands for Unstructured Supplementary Service Data and is a session based GSM SMS or ...