ekoparty 2012 Sept. 19, 2012 to Sept. 21, 2012, Buenos Aires, Argentina
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Cyberwar for all | Cesar Cerrudo | Most days appear related news Cyberwar, cyber weapons, cyber attacks, etc.., Ever have wondered how ... | Security |
Inception of the SAP Platform's Brain: Attacks to SAP Solution Manager | Juan perez Etchegoyen | Global Fortune 1000 companies, large government organizations, and defense entities, they share something in common: ... | Security |
One firmware to monitor 'em all | Andres Blanco , Matias Eissler | In recent years, mobile devices have become articles of use masivo.Por Usually these devices follow ... | |
HTExploit - Bypassing your htaccess and beyond! | Maximiliano Soler , Matias Katz | HTExploit is an open-source tool written in Python That exploits a weakness in the Way ... | |
Literacy for Integrated Circuit Reverse Engineering | Alex Radocea | "Prior teach the big pictures Talks About hardware security - it's nearly impossible to safely ... | |
The Future of Automated Malware Generation | Stephan Chenette | "Cyber-criminals Have had back-end equivalent to Virus Total Infrastructures to test if malware is Effective ... | |
Bitcoin, and the future of MavePay cryptocurrencies | Sergio Lerner | In this presentation we present the MAVE digital signature protocol and a new payment scheme ... | |
Fear and Loathing in Java (Fear and Loathing in Java) | Esteban Guillardoy | A lysergic and psychedelic journey through the underworld of Java vulnerabilities. In this talk we ... | Security |
Fuzzing DTMF Input Processing Algorithms | Rahul Sasi | Our paper would be on DTMF input processing algorithms [DSP], That Are Often embed into ... | |
Cryptographic flaws in Oracle Database authentication protocol | Esteban Martínez Fayó | This presentation will focus on new vulnerabilities in Oracle Database native authentication protocol. It will ... | |
Satellite baseband mods: Taking Control of the GMR-2 phone InmarSat terminal | Alfredo Ortega , Sebastian Muiz | We present a way to modify the firmware of a satellite phone (Inmarsat IsatPhonePro) using ... | |
OPSEC: Because Jail is for wuftpd | The Grugq | Drawing on lessons gleaned from recent indictments hacker, research on surveillance, espionage and counter-intelligence, This ... | |
Trace Surfing | Agustin Gianni | Reverse engineering is an arduous task Often That Requires Both time and skill. As new ... | |
Welcome to your Secure / home, $ user | Lorenzo | The aim of the conference is to present how to perform so simple and structured ... | Security |
PIN for all (and all) | Pablo Solè | This talk is about the implementation of a tool to Pin (http://www.pintool.org/) that allows all ... | |
SinFP3: More Than A Complete Framework for Operating System Fingerprinting | Patrice Auffret | In 2008 [Springer, 2008], we released a new version of SinFP [cpan] and a paper ... | |
4140 ways your alarm system can fail | Babak Javadi , Keith Howell | Alarm systems and panels designed before Were the Prevalence of wireless technology and a proprietary ... | |
Persistent VGA Rootkit | Nicolas Economou , Diego Juarez | For years, we have seen that by turning our computer the first legend we see ... | Rootkits Hardware General IncludeThinkstScapes Video Card |
Dirty use of USSD Codes in Cellular Network | Ravi Borgaonkar , . | "USSD stands for Unstructured Supplementary Service Data and is a session based GSM SMS or ... |