Chema Alonso – Pentesting Driven by FOCA
Cedric Blancher – Hacking, an activity of Public interest?
Nicolas Bareli – Sandboxing based on SECCOM for Linux kernel
Cesar Cerrudo – Token Kidnapping\’s Revenge
Cesar Cerrudo – History 0days, Disclosing y otras yerbas
Claudio Criscione – Virtually Pwned: Pentesting VMware
Giovanni Cruz – Atacking VoIP…a paradise!
Nicolas Economou – 2×1 Microsoft Bugs: ‘Virtual PC hyper-hole-visor’ + ‘Windows Creation Vulnerability (MS10-048)’
Gary Golomb – Network-based detection of PE structural anomalies and linker characteristics
Michael Hudson – Wrong Way, the true story of a Black Hat
Barnaby Jack – Jackpotting Automated Teller Machines
Leando Meiners & Diego Sor – WPA Migration Mode: WEP is back to haunt you…
Eric Monti – iPhone Rootkit? There’s an App for That!
Mariano Nuñez Di Croce – SAP Backdoors: A ghost at the heart of your business
Hernan Ochoa – Understanding the Win SMB NTLM Weak Nonce Vulnerability
Hernan Ochoa -Transferring files on isolated remote desktop environments
Deviant Ollam – Distinguishing Lockpicks: Raking vs Lifting vs Jiggling and More
Alfredo Ortega & Oren Isacson – Exploiting Digital Cameras
Andres Riancho – Lucas Apa Web Application Security Payloads
Juliano Rizzo & Thai Duong – Padding Oracles Everywhere
Pablo Sole – Hanging on a ROPe
Roelf Temmingh – Your life online: No more secrets Marty
Chris Valasek – Understanding the Low Fragmentation Heap: From Allocation to Exploitation

Por admin

Deja una respuesta

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO