ekoparty 2013 Sept. 23, 2013 to Sept. 27, 2013, Buenos Aires, Argentina
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Droid Rage, Android exploitation on steroids. | Pablo Solè , Agustin Gianni | El gran numero de dispositivos Android actualmente en uso en todo tipo de ambientes, tanto ... | |
How I met ZynOS. A journey from compromised router to Zyxel’s OS internals. | Alexander Markov | It’s all started with my friend’s post to Facebook asking if it’s normal that his ... | |
Compromising Industrial Facilities From 40 Miles Away | Carlos mario Penagos , Lucas Apa | The evolution of wireless technologies has allowed industrial automation and control systems (IACS) to become ... | |
Atacando IPv6 con Evil FOCA | Chema Alonso | La tecnología IPv6 está por defecto en todos los sistemas operativos actuales.... y está funcionando. ... | |
String Allocations in Internet Explorer | Chris Valasek | Allocation of memory, specifically user-controlled strings, has played a major role in browser exploitation, especially ... | |
BIOS Chronomancy | Corey Kallenberg | In 2011 the National Institute of Standard and Technology (NIST) released a draft of special ... | |
Defeating Signed BIOS Enforcement | Corey Kallenberg | The integrity of the BIOS is paramount to the security of the platform. Research such ... | |
ERP Security: How hackers can open the safe and take the jewels | Ezequiel D. Gutesman , Jordan Santarsieri | The largest organizations of the world run their businesses thanks to ERP (Enterprise Resource Planning) ... | |
Shoulder Surfing 2.0 | Federico Pacheco | Getting a password never was a silver bullet try, and as an ethical hacker you ... | |
A symbolic execution engine for amd64 binaries | Felipe Manzano | Current popular approaches to bug hunting largely rely on the use of fuzzing, it's effectiveness ... | |
Do you know who's watching you?: An in-depth examination of IP cameras attack surface | Francisco Falcon , Nahuel Riva | Nowadays, people buy SoHo IP cameras and install them at home, at the office and ... | |
Ahí va el Capitán Beto por el espacio | Gera Richarte | In English? alright. During 2012 a team of mostly Argentinean security experts and engineers set ... | |
Vote early and vote often | Harri Hursti | 8 years have passed since it was proven that electronic voting machines can be easily ... | |
All your sextapes are belong to us | Matías Medina , Patricio Palladino | Cuando una persona que desconoce el campo de la seguridad informática se entera de que ... | |
Debuggers are really powerful - Pwning all of the Android things | Mathew Rowley | Last year my talk - how we tear into that little green man - received ... | |
Weighing in on Issues with "Cloud Scale": Hacking the Withings WS-30 | Michael Coppola | In this new age of computing, more and more household devices are being connected to ... | |
Sentinel | Nicolas Alejandro Economou | En estos dÃas, donde el STACK y el HEAP ya no son ejecutables por default, ... | |
Uncovering your trails. Privacy issues of bluetooth devices. | Sebastian Garcia | Bluetooth devices are ubiquitous. However, until recently, there were no tools to perform bluetooth wardriving. ... |