ekoparty 2013 Sept. 23, 2013 to Sept. 27, 2013, Buenos Aires, Argentina

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Droid Rage, Android exploitation on steroids. Pablo Solè , Agustin Gianni El gran numero de dispositivos Android actualmente en uso en todo tipo de ambientes, tanto ...
How I met ZynOS. A journey from compromised router to Zyxel’s OS internals. Alexander Markov It’s all started with my friend’s post to Facebook asking if it’s normal that his ...
Compromising Industrial Facilities From 40 Miles Away Carlos mario Penagos , Lucas Apa The evolution of wireless technologies has allowed industrial automation and control systems (IACS) to become ...
Atacando IPv6 con Evil FOCA Chema Alonso La tecnología IPv6 está por defecto en todos los sistemas operativos actuales.... y está funcionando. ...
String Allocations in Internet Explorer Chris Valasek Allocation of memory, specifically user-controlled strings, has played a major role in browser exploitation, especially ...
BIOS Chronomancy Corey Kallenberg In 2011 the National Institute of Standard and Technology (NIST) released a draft of special ...
Defeating Signed BIOS Enforcement Corey Kallenberg The integrity of the BIOS is paramount to the security of the platform. Research such ...
ERP Security: How hackers can open the safe and take the jewels Ezequiel D. Gutesman , Jordan Santarsieri The largest organizations of the world run their businesses thanks to ERP (Enterprise Resource Planning) ...
Shoulder Surfing 2.0 Federico Pacheco Getting a password never was a silver bullet try, and as an ethical hacker you ...
A symbolic execution engine for amd64 binaries Felipe Manzano Current popular approaches to bug hunting largely rely on the use of fuzzing, it's effectiveness ...
Do you know who's watching you?: An in-depth examination of IP cameras attack surface Francisco Falcon , Nahuel Riva Nowadays, people buy SoHo IP cameras and install them at home, at the office and ...
Ahí va el Capitán Beto por el espacio Gera Richarte In English? alright. During 2012 a team of mostly Argentinean security experts and engineers set ...
Vote early and vote often Harri Hursti 8 years have passed since it was proven that electronic voting machines can be easily ...
All your sextapes are belong to us Matías Medina , Patricio Palladino Cuando una persona que desconoce el campo de la seguridad informática se entera de que ...
Debuggers are really powerful - Pwning all of the Android things Mathew Rowley Last year my talk - how we tear into that little green man - received ...
Weighing in on Issues with "Cloud Scale": Hacking the Withings WS-30 Michael Coppola In this new age of computing, more and more household devices are being connected to ...
Sentinel Nicolas Alejandro Economou En estos dÃas, donde el STACK y el HEAP ya no son ejecutables por default, ...
Uncovering your trails. Privacy issues of bluetooth devices. Sebastian Garcia Bluetooth devices are ubiquitous. However, until recently, there were no tools to perform bluetooth wardriving. ...