ZeroNights 2012 Nov. 19, 2012 to Nov. 20, 2012, Moscow, Russia

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
OPSEC: Because Jail is for wuftpd The Grugq Drawing on lessons gleaned from recent hacker indictments, research on surveillance, espionage and counter-intelligence, this ... Security
Try Harder 2 Be Yourself Felix ( FX ) Lindner N/A Security
Dark and Bright Sides of iCloud (In)security Dmitry Sklyarov , Andrey Belenko "In July 2011 Apple has introduced iCloud, a successor to MobileMe. iCloud is a comprehensive ...
Fuzzing at scale and in style Atte Kettunen , Miaubiz Heating your house is important, but it helps being smart about it. We will show ...
To be announced Alberto garcia Illera N/A Security
SSRF attacks and sockets: smorgasbord of vulnerabilities Vladimir Vorontsov , Alexander Golovko The report described server request forgery vulnerabilities (Server Side Request Forgery SSRF) in terms of ...
On security aspects of ADS-B and other "flying" technology Andrei Costin Air-related technologies are on the verge of technological upgrade and advance in approximately the same ... Security
They told me I could be anything, so I became BAh7BkkiDHVzZXJfaWQGOgZFVGkG Joernchen ( joernchen ) "In this presentation, we'll have a deeper look at Ruby on Rails' own session handling ... Security
Mac OS X malware overview Ivan Sorokin To date, the Dr.Web classification includes about 20 malware families targeting Mac OS X. The ... Security
Stealing from Thieves: Breaking IonCube VM to Reverse Exploit Kits Mohamed Saher Exploit kits are packs containing malicious programs that are mainly used to carry out automated ... Security
Win32/Flamer: Reverse Engineering and Framework Reconstruction Aleksandr Matrosov , Eugene Rodionov In this talk one wouldnt see any speculations on state-sponsored cyber-espionage and ?onspirology theories on ...
Applied anti-forensics: rootkits, kernel vulnerabilities and then some Oleksiuk Dmytro Currently, the most well-known type of rootkits is those used in mass distribution malware. But ... Security
Modern payments security: EMV, NFC, etc.? Nikita Abdullin Have you ever thought about security & reliability of the high-tech payment stuff that inhabits ... Security
Windows Kernel Reference Count Vulnerabilities Case Study Mateusz ( j00ru ) Jurczyk Windows kernel vulnerabilities are quickly becoming the second most significant concern of low-level software specialists ... ExcludeThinkstScapes Attack Kernel Windows Reference Counting
That's why I love XML hacking! Nicolas Gregoire "Yes, that's a talk about XML. But with exciting new content! You want to read ... Security
A blow against MongoDB Mikhail Fyrstov More and more software developers use NoSQL databases for various applications. Attack techniques for NoSQL ... Security
Armed Failure Hacking Wireless Alarm Systems Babak Javadi Alarm systems and panels were designed before the prevalence of wireless technology and communicate with ... Security
No locked doors, no windows barred: hacking OpenAM infrastructure Andrey Petukhov , Georgy Noseyevich One of the main functional components of enterprise applications and Internet portals is an authentication ...
The Diviner Digital Clairvoyance Breakthrough Gaining Access to the Source Code & Server Side Memory Structure of ANY Application Shay Chen "The Crown Jewel of information disclosure, source code disclosure, is arguably the most significant information ... Reverse Engineering Web Security IncludeThinkstScapes Blackbox Testing
The Art of Binary Diffing or how to find 0-dayz for free Nikita Tarakanov Are you sick of scrolling though hundreds of updated functions whenever Flash Player is patched? ... Security
How I will break your enterprise Alexander mikhailovich Polyakov So, you have a project to pen-test the internals of a large enterprise. Now what? ... Security
MiTM attack on iOS: Methodology and consequences Alexey Troshichev How to make a user install root certificate and a review of installation consequences: control ... Security
Android behind the scenes: possible attacks and radical defense measures Sergey Karasikov All the way from A to Z: the story of a low-level hack of HTC ... Security