Title |
Speakers |
Conference |
Tags |
Taint Nobody Got Time for Crash Analysis |
Richard Johnson
|
REcon-2013 - Montreal,Canada |
Exploitation
Taint Tracking
|
Next generation rootkits for ARM based devices |
Thomas Roth
|
hackinparis-2013 - Paris,France |
Android
Rootkits
Exploitation
ARM
TrustZone
|
LEAKING ADDRESSES WITH VULNERABILITIES THAT CAN'T READ GOOD |
Dionysus Blazakis
|
SummerCon-2013 - New York,USA |
Exploitation
Browser
Javascript
Information Leaks
Timing Attacks
|
Swiping Through Modern Security Features |
Cyril \xe2\x80\x98@pod2g\xe2\x80\x99
,
Eric \xe2\x80\x98@musclenerd\xe2\x80\x99
,
David \xe2\x80\x98@planetbeing\xe2\x80\x99 Wang
,
Nikias \xe2\x80\x98@pimskeks\xe2\x80\x99 Bassen
|
HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands |
Exploitation
iOS
Jailbreak
|
HOW TO CATCH A CHAMELEON: ITS ALL IN YOUR HEAP |
Steven Seeley
|
Ruxcon-2012 - Melbourne, Australia |
Exploitation
Heap Overflows
Tools
Immdbg
|
MODELING THE EXPLOITATION AND MITIGATION OF MEMORY SAFETY VULNS |
Matt Miller
|
Breakpoint-2012 - Melbourne,Australia |
Exploitation
Tools
Metrics
|
IOS6 SECURITY |
Mark Dowd
,
Tarjei Mandt
|
Breakpoint-2012 - Melbourne,Australia |
Exploitation
iOS
|
UNRAVELLING WINDOWS 8 SECURITY AND THE ARM KERNEL |
Alex Ionescu
|
Breakpoint-2012 - Melbourne,Australia |
Exploitation
Windows 8
Mitigations
ARM
|
Innovative Approaches to Exploit Delivery |
Saumil Udayan Shah
|
HITBSecConf Malaysia-2012 - KL, Malaysia |
Exploitation
Web Security
Attack
|
Into the Droid: Gaining Access to Android User Data |
Thomas Cannon
|
DEF CON-20 - Las Vegas, USA |
Android
Exploitation
Mobile Security
|
DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS |
Loukas K
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
EFI
Mac OS
|
EASY LOCAL WINDOWS KERNEL EXPLOITATION |
Cesar Cerrudo
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Kernel
Windows
|
SQL INJECTION TO MIPS OVERFLOWS: ROOTING SOHO ROUTERS |
Zachary Cutlip
|
BlackHat USA-2012 - Las Vegas, USA |
Buffer Overflows
Exploitation
SQL Injection
|
XMPPloit |
Luis Delgado
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
SSL
XMPP
|
From the Iriscode to the Iris: a new vulnerability of Iris recognition systems |
Javier Galbally
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Biometrics
Iris
Genetic Algorithm
|
STATE OF WEB EXPLOIT TOOLKITS |
Jason Jones
|
BlackHat USA-2012 - Las Vegas, USA |
Web
Exploitation
|
HOOKIN' AIN'T EASY: BEEF INJECTION WITH MITM |
Ryan Linn
,
Steve Ocepek
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Browser
Man-in-the-middle
|
RECENT JAVA EXPLOITATION TRENDS AND MALWARE |
Jeong wook Oh
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Java
|
WINDOWS PHONE 7 INTERNALS AND EXPLOITABILITY |
Tsukasa Oi
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Windows Phone 7
|
ADVANCED CHROME EXTENSION EXPLOITATION - LEVERAGING API POWERS FOR THE BETTER EVIL |
Kyle Osborn
,
Krzysztof Kotowicz
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Google Chrome
Extensions
|
BLENDED THREATS AND JAVASCRIPT: A PLAN FOR PERMANENT NETWORK COMPROMISE |
Josh ( savant ) Brashars
,
Phil Purviance
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Cross Site Request Forgery
|
CONFESSIONS OF A WAF DEVELOPER: PROTOCOL-LEVEL EVASION OF WEB APPLICATION FIREWALLS |
Ivan Ristic
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Web Application Firewall
|
THE INFO LEAK ERA ON SOFTWARE EXPLOITATION |
Fermin J. Serna
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Information Leaks
|
EXPLOITATION OF WINDOWS 8 METRO STYLE APPS |
Sung-ting Tsai
,
Ming-chieh Pan
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
Windows 8
AppContainer
Sandbox
|
WINDOWS 8 HEAP INTERNALS |
Chris Valasek
,
Tarjei Mandt
|
BlackHat USA-2012 - Las Vegas, USA |
Deep Knowledge
Exploitation
Windows 8
Heap Overflows
|
Advanced ARM exploitation |
Stephen Ridley
,
Stephen Lawler
|
BlackHat USA-2012 - Las Vegas, USA |
Exploitation
ARM
|
CVE-2012-0769, the case of the perfect info leak |
Fermin Serna
|
SummerCon-2012 - Brooklyn, USA |
Exploitation
Flash
|
The Exploit Intelligence Project |
Dan Guido
|
SOURCE Boston-2011 - Boston, USA |
Exploitation
|
Usb Autorun Attacks Against Linux |
Jon Larimer
|
ShmooCon-2011 - Washington DC, USA |
Security
Access
Exploitation
Malware
|
Printers Gone Wild! |
Ben Smith
|
ShmooCon-2011 - Washington DC, USA |
Security
Panel
Exploitation
Browser
|
Non-Obvious Bugs By Example |
Greg
|
Berlinsides-2010 - Berlin, Germany |
Security
Exploitation
|
Finding Backdoors In Code |
Matias Madou
|
OWASP BeNelux-2010 - Netherlands |
Security
Exploitation
|
How Not To Implement A Payback/Cashback System |
Thierry Zoller
|
OWASP BeNelux-2010 - Netherlands |
Infrastructure
Exploitation
|
0Wning Networks With Voip And Web Attacks |
Radu State
|
OWASP BeNelux-2010 - Netherlands |
Infrastructure
Firewall
Exploitation
Web Security
|
Windows Exploit Mitigation Techniques |
Brett ( Antic0de ) Moore
|
KiwiCon-2010 - Wellington, New Zealand |
Exploitation
|
Hacking Sap Businessobjects |
Will Vandevanter
,
Joshua Abraham
|
OWASP BASC-2010 - Boston, USA |
Security
Application Security
Exploitation
Risk
|
The Exploit Arms Race |
Christien ( Dildog ) Rioux
|
OWASP BASC-2010 - Boston, USA |
Security
Exploitation
Cyberwar
|
Exploring Three Modern Attack Vectors: Insiders, Industrialized And Apts |
Brian Contos
|
OWASP AppSec Brasil-2010 - Brazil |
Exploitation
|
The Hidden Nemesis: Backdooring Embedded Controllers |
Ralf-Philipp Weinmann
|
PacSec-2010 - Tokyo, Japan |
Security
Exploitation
|
Cyber-Assurance Ecosystem - Automation Activities For Securing The Enterprise |
Joe Jarzombek
|
OWASP Appsec-2010 - Washington DC, USA |
Security
Exploitation
Cyberwar
|
Unlocking The Toolkit: Attacking Google Web Toolkit |
Ron Gutierrez
|
OWASP Appsec-2010 - Washington DC, USA |
Security
Web
Exploitation
|
Smart Phones With Dumb Apps: Threat Modeling For Mobile Applications |
Dan Dan cornell
|
OWASP Appsec-2010 - Washington DC, USA |
Mobile Security
Android
Security
Exploitation
|
Friendly Traitor 2 Features Are Hot But Giving Up Our Secrets Is Not! |
Mike Poor
,
Kevin Johnson
|
OWASP Appsec-2010 - Washington DC, USA |
Security
Exploitation
|
Mass Exploitation For Dummies |
Greg Martin
|
Security B-Sides DFW-2010 - USA |
Exploitation
Application Security
|
Testing The Limits Of Ev Certificates |
Philippe Oechslin
|
hashdays-2010 - Lucerne, Switzerland |
Security
Exploitation
Browser
|
Threats And Countermeasures - Human Factor And Physical Security |
Jim Broome
|
House Con-2010 - USA |
Exploitation
Social Engineering
Risk
|
Smart Phones With Dumb Apps |
Dan Dan cornell
|
House Con-2010 - USA |
Mobile Security
Security
Exploitation
|
Passwords In Corporate Networks |
Carric Dooley
,
Simon Roses Femerling
|
SOURCE Barcelona-2010 - Barcelona, Spain |
Security
Others
Firewall
Exploitation
|
Anatomy Of A Logic Flaw |
Charles Henderson
,
Garrett Held
|
LASCON-2010 - Austin, USA |
Exploitation
Security
|
Some Things That Every Vulnerability Developer Should Know |
Halvar Flake
|
t2-2010 - Helsinki, Finland |
Security
Exploitation
Development
|
Protecting Yourself In A Public Wireless Network |
Hugo Gonzalez
|
BugCon-2010 - Mexico |
Security
Wireless
Web
Exploitation
|
Live Hacking, The Bug To Exploit |
Alejandro Hernandez
|
BugCon-2010 - Mexico |
Exploitation
|
Cracking Software |
Rodolfo Hernandez
|
BugCon-2010 - Mexico |
Exploitation
|
Vulnerabilities In Mexico Modems |
Pedro "hkm" Joaquin
|
BugCon-2010 - Mexico |
Exploitation
Hardware Reverse Engineering
Hardware General
|
Loss Of Data, What Bug? |
Edgar Gómez
|
BugCon-2010 - Mexico |
Security
Exploitation
Data Exfiltration
|
Web Attack And Defense Trends |
Frank Fan
|
OWASP China-2010 - China |
Web
Exploitation
|
Browser Hacks, Design Flaws, & Opt-In Security |
Jeremiah Grossman
|
BlueHat-2010 - Redmond, USA |
Security
Exploitation
Browser
|
Payload Already Inside: Data Re-Use For Rop Exploits |
Long Le
|
HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia |
Security
Web
Exploitation
Analysis
|
Cache On Delivery |
Marco Slaviero
|
HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia |
Security
Web
Exploitation
Cloud
|
Iphone Security Model And Vulnerabilities |
Cedric Halbronn
|
HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia |
Security
Web
Access
Exploitation
Analysis
Browser
|
Remote Binary Planting – An Overlooked Vulnerability Affair |
Mitja Kolsek
|
HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia |
Exploitation
|
Payload Already Inside: Data Re-Use For Rop Exploits |
Long Le
,
Thanh Nguyen
|
HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia |
Exploitation
|
Powershell.. What Every Hax0R Needs To Know |
Jameel Haffejee
|
ZaCon-2 - Johannesburg, South Africa |
Security
Exploitation
Network Penetration
|
The Jar Of Joy... |
Ian De Villiers
|
ZaCon-2 - Johannesburg, South Africa |
Security
Exploitation
Analysis
|
How I Met Your Girlfriend |
Samy Kamkar
|
BruCON-2010 - Brussels, Belgium |
Web
Exploitation
|
Top 5 Ways To Steal A Company |
Chris Nickerson
|
BruCON-2010 - Brussels, Belgium |
Security
Others
Deep Knowledge
Exploitation
|
Finding Backdoors In Code |
Matias Madou
|
BruCON-2010 - Brussels, Belgium |
Security
Exploitation
Network Penetration
|
Embedded System Hacking And My Plot To Take Over The World |
Paul Asadoorian
|
BruCON-2010 - Brussels, Belgium |
Web
Exploitation
Hardware Reverse Engineering
|
The Evolution Of Security Testing: Testing The Resiliency Of Security |
David Stubley
|
OWASP Dublin-2010 - Ireland |
Security
Others
Exploitation
|
(Too Much) Access Points - Exploitation Roundup |
Cristofaro Mune
|
SyScan-2010 - Taipei, Taiwan |
Security
Access
Exploitation
|
Hacking Printers For Fun And Profit |
Andrei Costin
|
SyScan-2010 - Taipei, Taiwan |
Security
Exploitation
Malware
|
The Conundrum Of Declarative Security Http Response Headers: Lessons Learned |
Richard Enbody
,
Aditya K Sood
|
CollSec-2010 - Washington DC, USA |
Security
Web
Exploitation
Browser
|
Interpreter Exploitation |
Dionysus Blazakis
|
4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA |
Security
Exploitation
|
Binary Exploitation Basics |
Joern Bratzke
|
NinjaCon-2010 - Vienna, Austria |
Security
Exploitation
|
Kicking The Vulnerabilities Out Of Microsoft Patches |
Yaniv Miron
|
NinjaCon-2010 - Vienna, Austria |
Security
Application Security
Exploitation
|
Exploitation On Arm - Technique And Bypassing Defense Mechanisms |
Itzhak "Zuk" Avraham
|
DEF CON-18 - Las Vegas, USA |
Security
Exploitation
|
Antique Exploitation (Aka Terminator 3: Point One One For Workgroups) |
Jon Oberheide
|
DEF CON-18 - Las Vegas, USA |
Security
Exploitation
|
Returning Into The Php Interpreter - Remote Exploitation Of Memory Corruptions In Php Is Not Over, Yet. |
Stefan Esser
|
SyScan-2010 - Singapore |
Security
Exploitation
|
Office Is Still Yummy - How To Defeat Memory Protections In Office Document Exploitation |
Nanika&tt
|
SyScan-2010 - Singapore |
Security
Exploitation
|
Dep In Depth |
Brett ( Antic0de ) Moore
|
SyScan-2010 - Singapore |
Security
Exploitation
|
Web In The Middle |
Laurent Oudot
|
HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands |
Exploitation
|
Owned Live On Stage |
Niels Teusink
|
HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands |
Security
Wireless
Exploitation
Network Penetration
|
Jit Spray Attacks And Advanced Shellcode |
Alexey Sintsov
|
HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands |
Security
Exploitation
|
Abusing Microsofts Postmark Validation |
Dumitri Codreanu
|
HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands |
Security
Exploitation
|
Firefox 4 And Opportunities For Security Research |
Chris Hofmann
|
HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands |
Security
Exploitation
Analysis
|
Understanding The Low-Fragmentation Heap: From Allocation To Exploitation |
Chris Valasek
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Exploitation
|
Advanced Aix Heap Exploitation Methods |
Tim Shelton
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Exploitation
|
Adventures In Limited User Post Exploitation |
Nathan Keltner
,
Tim Elrod
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Exploitation
|
Return-Oriented Exploitation |
Dino Dai Zovi
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Exploitation
|
Aleatory Persistent Threat |
Nicolas Waisman
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Community
Exploitation
|
Lifting The Fog |
Marco Slaviero
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Exploitation
Cloud
|
Getting In Bed With Robin Sage |
Thomas Ryan
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Exploitation
|
Payload Already Inside: Data Re-Use For Rop Exploits |
Long Le
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Exploitation
|
Everybody Be Cool This Is A Roppery! |
Vincenzo Iozzo
,
Tim Weinmann
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Exploitation
Development
|
Https Can Byte Me |
Josh Sokol
,
Robert ( Rsnake ) Hansen
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Infrastructure
Exploitation
|
Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research |
Richard Johnson
,
Lurene ( pusscat ) Grenier
|
Blackhat USA-2010 - Las Vegas, USA |
Security
Fuzzing
Exploitation
|
Web Vulnerability Exploitation Post |
Nahuel Grisolía
|
OWASP Argentina-2010 - Argentina |
Exploitation
Web
|
Ldap Injection: Attack And Defense Techniques In Web Applications |
Hernan Abbamonte
|
OWASP Argentina-2010 - Argentina |
Security
Web
Exploitation
|
Exploiting Botnets For Profit And Fun |
Greg Martin
|
Security B-Sides Las Vegas-2009 - Las Vegas, USA |
Security
Exploitation
Malware
|
Cain Beef Hash: Snagging Passwords Without Popping Boxes |
Ryan Linn
|
Security B-Sides Las Vegas-2009 - Las Vegas, USA |
Security
Exploitation
|
Csfire: Browser-Enforced Mitigation Against Csrf |
Lieven Desmet
,
Philippe De ryck
|
OWASP Appsec-2010 - Stocholm, Sweden |
Security
Exploitation
Browser
|
Deconstructing Coldfusion |
Chris Eng
|
OWASP Appsec-2010 - Stocholm, Sweden |
Security
Others
Deep Knowledge
Exploitation
Risk
|
Responsibility For The Harm And Risk Of Software Security Flaws |
Cassio Goldschmidt
|
OWASP Appsec-2010 - Stocholm, Sweden |
Security
Application Security
Exploitation
|
Kim Jong-Il And Me: How To Build A Cyber Army To Attack The U.S. |
Charlie Miller
|
CCDCOE-2010 - Estonia |
Security
Exploitation
Risk
Media
Law Enforcement
Application Security
Cyberwar
|
Making The Most Out Of Post-Exploitation |
Paul Asadoorian
|
SANS Pen Test Summit-2010 - Baltimore, USA |
Incident Response
Exploitation
|
“Attack Cms System – 0Day Exploitation“ |
Anastasios Stasinopoulos
|
AthCon-2010 - Athens, Greece |
Security
Exploitation
|
“Abusing Jboss” |
Christian Papathanasiou
|
AthCon-2010 - Athens, Greece |
Security
Others
Application Security
Exploitation
|
Vulnerabilities In Secure Code - Now And Beyond |
Alex Wheeler
,
Ryan Smith
|
OWASP FROC-2010 - Denver, USA |
Exploitation
Security
|
Application Security Program Management With Vulnerability Manager |
Bryan Beverly
|
OWASP FROC-2010 - Denver, USA |
Security
Application Security
Exploitation
|
Exploiting Windows Dep Using Return-Oriented Programming |
Dino Dai Zovi
|
ITWeb Security Summit-2010 - Johannesburg, South Africa |
Exploitation
|
Advanced Sql Injection |
Joe Mccray
|
QuahogCon-2010 - USA |
Exploitation
|
Killerbee: Practical Zigbee Exploitation |
Joshua Wright
|
QuahogCon-2010 - USA |
Security
Exploitation
|
Linux Kernel Exploitation: Earning Its Pwnie A Vuln At A Time, |
Jon Oberheide
|
SOURCE Boston-2010 - Boston, USA |
Security
Community
Exploitation
|
Neurosurgery With Meterpreter |
Colin Ames
|
SOURCE Boston-2010 - Boston, USA |
Security
Exploitation
|
Binding The Daemon: Freebsd Kernel Stack And Heap Exploitation |
Patroklos Argyroudis
|
Blackhat Europe-2010 - Barcelona, Spain |
Security
Exploitation
|
Targeted Attacks: From Being A Victim To Counter Attacking |
Andrzej Dereszowski
|
Blackhat Europe-2010 - Barcelona, Spain |
Security
Access
Exploitation
Analysis
|
Adobe Reader'S Custom Memory Management: A Heap Of Trouble |
Haifei Lovet
|
Blackhat Europe-2010 - Barcelona, Spain |
Security
Exploitation
|
Abusing Jboss |
Christian Papathanasiou
|
Blackhat Europe-2010 - Barcelona, Spain |
Security
Access
Exploitation
|
Will It Blend? |
Billy Rios
|
Ruxcon-2010 - Melbourne, Austrailia |
Exploitation
Security
|
Getting More Out Of App Vuln Scan Results |
Dan Dan cornell
|
Security B-Sides Austin-2010 - Austin, USA |
Others
Firewall
Access Control
Access
Exploitation
Risk
|
Web App (In)Security On A Tight Budget |
Jason Jones
|
Security B-Sides Austin-2010 - Austin, USA |
Web
Application Security
Exploitation
Network Penetration
|
Exploitation |
Cole Minaar
|
ZaCon-1 - Johannesburg, South Africa |
Exploitation
Security
|
Assessing And Exploiting Web Applications With The Open Source Samurai Web Testing Framework |
Justin Searle
|
OWASP Appsec-2009 - Washington DC, USA |
Security
Web
Exploitation
|
Defend Yourself: Integrating Real Time Defenses Into Online Applications |
Michael Coates
|
OWASP Appsec-2009 - Washington DC, USA |
Exploitation
|
Unicode Transformations: Finding Elusive Vulnerabilities |
Chris Weber
|
OWASP Appsec-2009 - Washington DC, USA |
Exploitation
|
Injectable Exploits: Two New Tools For Pwning Web Apps And Browsers |
Kevin Johnson
|
OWASP Appsec-2009 - Washington DC, USA |
Web
Exploitation
Network Penetration
|
Hacking By Numbers |
Tom Brennan
|
OWASP Appsec-2009 - Washington DC, USA |
Exploitation
Automation
|
Attacking Interoperability |
Mark Dowd
|
HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia |
Security
Exploitation
Browser
|
A New Web Attack Vector: Script Fragmentation |
Stephan Chenette
|
BruCON-2009 - Brussels, Belgium |
Web
Exploitation
Risk
|
Rage Against The Kiosk |
Paul Craig
|
BruCON-2009 - Brussels, Belgium |
Security
Others
Exploitation
|
Modern Exploitation And Memory Protection Bypasses |
Alexander Sotirov
|
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
Exploitation
|
Advanced Mysql Exploitation |
Muhaimin Dzulfakar
|
DEF CON-17 - Las Vegas, USA |
Security
Exploitation
|
Router Exploitation |
Felix ( FX ) Lindner
|
DEF CON-17 - Las Vegas, USA |
Security
Exploitation
|
Using Guided Missiles In Drive-Bys: Automatic Browser Fingerprinting And Exploitation With Metasploit |
Egypt
|
DEF CON-17 - Las Vegas, USA |
Security
Exploitation
Browser
|
Practical Windows Xp/2003 Heap Exploitation |
John Mcdonald
,
Chris Valasek
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Exploitation
|
Router Exploitation |
Felix ( FX ) Lindner
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Exploitation
|
Post Exploitation Bliss: Loading Meterpreter On A Factory Iphone |
Charlie Miller
,
Vincenzo Iozzo
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Exploitation
|
State Of The Art Post Exploitation In Hardened Php Environments |
Stefan Esser
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Exploitation
|
Using Guided Missiles In Drive-By'S: Automatic Browser Fingerprinting And Exploitation With Metasploit |
Egypt
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Exploitation
Browser
|
Advanced Mysql Exploitation |
Muhaimin Dzulfakar
|
Blackhat USA-2009 - Las Vegas, USA |
Security
Exploitation
|
State Of The Art Post Exploitation In Hardened Php Environments |
Stefan Esser
|
SyScan-2009 - Taipei, Taiwan |
Security
Exploitation
|
State Of The Art Post Exploitation In Hardened Php Environments |
Stefan Esser
|
SyScan-2009 - Singapore |
Security
Exploitation
|
Windows Nt Kernel Security |
Stephen Ridley
|
SyScan-2009 - Singapore |
Security
Exploitation
Auditing
|
Outspect: Live Memory Forensic And Incident Response For Virtual Machine |
Nguyen Anh Quynh
|
SyScan-2009 - Singapore |
Security
Rootkits
Exploitation
Malware
|
Advanced Sql Injection Exploitation To Operating System Full Control |
Bernardo Guimaraes
|
Blackhat Europe-2009 - Barcelona, Spain |
Security
Exploitation
SQL
|
Mac Os Xploitation |
Dino Dai Zovi
|
SOURCE Boston-2009 - Boston, USA |
Security
Exploitation
|
Horseless Carriage Exploits And Eavesdropping Defenses |
James Atkinson
|
SOURCE Boston-2009 - Boston, USA |
Security
Exploitation
|
Jsunpack: A Solution To Decode Javascript Exploits As They Rapidly Evolve |
Blake Hartstein
|
ShmooCon-2009 - Washington DC, USA |
Security
Community
Exploitation
Browser
|
Methods For Understanding Targeted Attacks With Office Documents |
Bruce Dang
|
Chaos Communication Congress-25 - Berlin, Germany |
Security
Exploitation
|
Exploiting Symbian |
Collin Mulliner
|
Chaos Communication Congress-25 - Berlin, Germany |
Security
Exploitation
|
Tricks: Makes You Smile |
Francesco `ascii` Ongaro
|
Chaos Communication Congress-25 - Berlin, Germany |
Security
Web
Exploitation
|
Bluepilling The Xen Hypervisor |
Alexander Tereshkin
|
HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia |
Security
Firewall
Exploitation
Malware
|
Ipwning The Iphone |
Charlie Miller
|
HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia |
Security
Fuzzing
Access
Exploitation
|
Mac Os Xploitation |
Dino Dai Zovi
|
HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia |
Security
Rootkits
Wireless
Exploitation
Testing
|
Hacking Internet Kiosks |
Paul Craig
|
HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia |
Security
Access
Exploitation
Browser
|
The Internet Is Broken: Beyond Document.Cookie - Extreme Client Side Exploitation |
John Heasman
,
Nathan Mcfeters
,
Rob Carter
|
Blackhat USA-2008 - Las Vegas, USA |
Security
Exploitation
|
Appsec A-Z: Reverse Engineering, Source Code Auditing, Fuzzing, And Exploitation |
Jared Demott
|
Blackhat USA-2008 - Las Vegas, USA |
Security
Exploitation
|
Hackernomics |
Hugh Thompson
|
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
Exploitation
Development
Automation
|
Real World Kernel Pool Exploitation |
Kostya Kortchinsky
|
SyScan-2008 - Singapore |
Security
Exploitation
|
Defeating Aslr And Dep Protections On Windows Vista |
Alexander Sotirov
|
SyScan-2008 - Singapore |
Security
Exploitation
|
Heaps About Heaps |
Brett ( Antic0de ) Moore
|
SyScan-2008 - Singapore |
Security
Exploitation
|
Telephone Defenses Against The Dark Arts |
James Atkinson
|
SOURCE Boston-2008 - Boston, USA |
Security
Exploitation
Auditing
|
Crouching Powerpoint, Hidden Trojan |
Maarten Van Horenbeeck
|
Chaos Communication Congress-24 - Berlin, Germany |
Security
Exploitation
|
Vrda: Vulnerability Response Decision Assistance |
Hal Burch
,
Art Manion
,
Yurie Ito
|
EC2ND-2007 - Heraklion, Greece |
Incident Response
Exploitation
|
Signaling Vulnerabilities In Wiretapping Systems |
Eric Cronin
|
EC2ND-2007 - Heraklion, Greece |
Exploitation
|
Tactical Exploitation |
H.d. Moore
,
Valsmith
|
DEF CON-15 - Las Vegas, USA |
Security
Exploitation
|
Javascript Heap Exploitation Methods |
Alexander Sotirov
|
SyScan-2007 - Singapore |
Security
Exploitation
|
Tactical Exploitation |
Valsmith
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Exploitation
|
Understanding The Heap By Breaking It: A Case Study Of The Heap As A Persistent Data Structure Through Non-Traditional Exploitation Techniques |
Justin Ferguson
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Exploitation
|
Remote And Local Exploitation Of Network Drivers |
Yuriy Bulygin
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Exploitation
|
Timing Attacks For Recovering Private Entries From Database Engines |
Pablo Damian Saura
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Web
Access
Exploitation
|
Heap Feng Shui In Javascript |
Alexander Sotirov
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Exploitation
|
Openbsd Remote Exploit |
Alfredo Ortega
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Exploitation
|
Kernel Wars |
Karl Janmar
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Exploitation
|
Kernel Wars |
Christer Öberg
|
Blackhat Europe-2007 - Amsterdam, The Netherlands |
Security
Exploitation
|
Heap Feng Shui In Javascript |
Alexander Sotirov
|
Blackhat Europe-2007 - Amsterdam, The Netherlands |
Security
Exploitation
|
Voip Security Issues: Problems On The Users' Side And What Are The Providers Doing Wrong? |
Hendrik Scholz
|
SyScan-2006 - Singapore |
Security
Exploitation
|
Exploiting Embedded System |
Barnaby Jack
|
SyScan-2006 - Singapore |
Security
Exploitation
|
Wlsi - Windows Local Shellcode Injection |
Cesar Cerrudo
|
Blackhat Europe-2006 - Amsterdam, The Netherlands |
Security
Exploitation
|
Advances In Single Packet Authorization (Build It!) |
Michael Rash
|
ShmooCon-2006 - Washington DC, USA |
Security
Access
Monitoring
Exploitation
|
Exploiting Kmalloc Overflows To Own J00 |
Clflushandamnesia
|
SyScan-2005 - Singapore |
Security
Exploitation
|
Remote Windows Kernel Exploitation - Step In To The Ring 0 |
Barnaby Jack
|
Blackhat USA-2005 - Las Vegas, USA |
Security
Exploitation
|
Device Drivers |
Johnny cacheDavid Maynor
|
Blackhat USA-2005 - Las Vegas, USA |
Security
Exploitation
|
Economics, Physics, Psychology And How They Relate To Technical Aspects Of Counter Intelligence/Counter Espionage Within Information Security |
Peiter ( Mudge ) Zatko
|
Blackhat USA-2005 - Las Vegas, USA |
Security
Exploitation
|
Plug And Root, The Usb Key To The Kingdom |
David Dewey
|
Blackhat USA-2005 - Las Vegas, USA |
Security
Exploitation
|
Secure Instant Messaging |
Phar
|
Chaos Communication Congress-21 - Berlin, Germany |
Security
Exploitation
|
Windows Kernel Exploitation |
Sk Chong
|
SyScan-2004 - Singapore |
Security
Exploitation
|
The Keys To The Kingdom: Understanding Covert Channels Of Communication |
Russ Rogers
|
Blackhat USA-2004 - Las Vegas, USA |
Security
Exploitation
|
Practical Win32 And Unicode Exploitation |
Felix ( FX ) Lindner
,
Phenoelit
|
Blackhat Europe-2004 - Amsterdam, The Netherlands |
Security
Exploitation
|
Windows Local Kernel Exploitation |
S.k. Chong
|
HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia |
Security
Exploitation
|
Java 2 Micro Edition (J2Me) Security Vulnerabilities |
Adam Gowdiak
|
HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia |
Security
Exploitation
|
Practical Win32 And Unicode Exploitation |
Felix ( FX ) Lindner
|
Chaos Communication Congress-20 - Berlin, Germany |
Security
Exploitation
|
Microsoft Windows Rpc Security Vulnerabilities |
Last Delirium
|
HITBSecConf Malaysia-2003 - Kuala Lampur, Malaysia |
Security
Exploitation
|
Opensource Kernel Auditing And Exploitation |
Silvio Cesare
|
DEF CON-11 - Las Vegas, USA |
Security
Exploitation
Auditing
|
Bsd Heap Smashing |
Bbp
|
Blackhat Europe-2003 - Amsterdam, The Netherlands |
Security
Exploitation
|
Design And Software Vulnerabilities In Embedded Systems |
Felix ( FX ) Lindner
|
Blackhat Europe-2003 - Amsterdam, The Netherlands |
Security
Access
Exploitation
|
Attacking Networked Embedded Systems |
Felix ( FX ) Lindner
|
Chaos Communication Congress-19 - Berlin, Germany |
Security
Access
Exploitation
|
Jello Biafra'S State Of The World Address |
Jello Biafra
|
H2K2-2002 - USA |
Security
Keynote
Exploitation
|
Argus Pitbull Hack |
LSD
|
Chaos Communication Congress-18 - Berlin, Germany |
Security
Buffer Overflows
Exploitation
|
Kernel Level Vulnerabilities Exploitation: Behind The Scenes Of The 5Th Argus Hacking Contest |
LSD
|
Blackhat Europe-2001 - Amsterdam, The Netherlands |
Security
Exploitation
Analysis
|
Third Generation Exploits On Nt/Win2K Platforms |
Thomas ( Halvar Flake ) Dullien
|
Blackhat Europe-2001 - Amsterdam, The Netherlands |
Security
Exploitation
Development
Testing
|
Decoding And Understanding Internet Worms |
Ryan Permeh
,
Dale Coddington
|
Blackhat Europe-2001 - Amsterdam, The Netherlands |
Security
Exploitation
Reverse Engineering
Analysis
Malware
|
Designing Small Payloads |
Anders Ingeborn
|
DEF CON-09 - Las Vegas, USA |
Exploitation
Security
|