Star 0

Talks

Title Humans
TECH TRAINING 5: Windows Internals Sebastien Renaud , Damien Aumaitre
HITB Haxpo continues till 21:00 in Grotezaal
Exploiting Browsers the Logical Way Bas Venis
CLOSING KEYNOTE: Bringing Security and Privacy to Where the Wild Things Are Runa A. Sandvik
Eight Ou Two Mobile Matias Eissler
Oracle PeopleSoft Applications are Under Attack! Alexey Tiurin
TECH TRAINING 2: Hacking PDFs for Ninjas Didier Stevens
Stegosploit: Hacking With Pictures Saumil Shah
HITB LAB: IRMA – A Framework for Incident Response & Malware Analysis Alexandre Quint , Fernand Lone-Sang , Guillaume Dedrie
illusoryTLS: Impersonate, Tamper, and Exploit Alfonso De Gregorio
How Many Million BIOSes Would You Like to Infect? Corey Kallenberg , Xeno Kovah
Fuzzing Objects d’ART: Digging Into the New Android L Runtime Internals Anestis Bechtsoudis
HITB Lab: Breaking Bad Crypto Filippo Valsorda
HITB LAB: Memory Forensics for Cisco IOS Didier Stevens , Xavier Mertens
TECH TRAINING 7: Hacking Web Applications: Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More Dawid Czagan
HITB LAB: Attacking Android Apps Tony Trummer
Mobile Authentication Subspace Travel Markus Vervier
µMIMOSAWRITERROUTER: Abusing EPC on Cisco Routers to Collect Data Joaquim Espinhara , Rafael Silva
HITB Lab: PowerShell for Penetration Testers Nikhil Mittal
TECH TRAINING 6: Android Security – Reverse Engineering & App Pentesting Fernand Lone-Sang , Andre Moulu
KEYNOTE 2: The Return of Dragons John Matherly
TECH TRAINING 4: Understanding x86-64 Assembly for Reverse Engineering & Exploits Xeno Kovah
The Windows Phone Freakshow Luca De Fulgentis
Supervising the Supervisor: Reversing Proprietary SCADA Tech Jean-Baptise Bedrune , Alexandre Gazet , Florent Monjalet
Hacking Samsung’s Tizen: The OS of Everything Ajin Abraham
The Savage Curtain: Mobile SSL Failures Tony Trummer , Tushar Dalvi
KEYNOTE 1: Fighting for Internet Security in the New Crypto Wars Marcia Hofmann
Mozilla InvestiGator: Distributed and Real-Time Digital Forensics at the Speed of the Cloud Julien Vehent
TECH TRAINING 3: Application Security for Hackers & Developers Dr. Jared DeMott
USB Armory Andrea Barisani
What You Always Wanted and Now Can: Hacking Chemical Processes Marina Krotofil , Jason Larsen
Opcodes in Google Play: Tracing Malicious Applications Dr. Alfonso Muñoz , Sergio de los Santos
TECH TRAINING 8: Professional Pentesting IPv6 Networks Marc Heuse
Relay Attacks in EMV Contactless Cards with Android OTS Devices Ricardo J. Rodríguez , Pepe Vila
TECH TRAINING 1: iOS Exploitation Techniques Cyril @pod2g Cattiaux , Nikias @pimskeks Bassen
Uncovering Secret Connections Using Network Theory and Custom Honeypots Pedram Hayati
Non-Hidden Hidden Services Considered Harmful: Attacks and Detection Filippo Valsorda , George Tankersley
Yes Parking: Remotely Owning ‘Secure’ Parking Systems Jose Antonio Guasch
Bootkit via SMS: 4G Access Level Security Assessment Timur Yunusov , Kirill Nesterov