TECH TRAINING 5: Windows Internals
|
Sebastien Renaud
,
Damien Aumaitre
|
HITB Haxpo continues till 21:00 in Grotezaal
|
|
Exploiting Browsers the Logical Way
|
Bas Venis
|
CLOSING KEYNOTE: Bringing Security and Privacy to Where the Wild Things Are
|
Runa A. Sandvik
|
Eight Ou Two Mobile
|
Matias Eissler
|
Oracle PeopleSoft Applications are Under Attack!
|
Alexey Tiurin
|
TECH TRAINING 2: Hacking PDFs for Ninjas
|
Didier Stevens
|
Stegosploit: Hacking With Pictures
|
Saumil Shah
|
HITB LAB: IRMA – A Framework for Incident Response & Malware Analysis
|
Alexandre Quint
,
Fernand Lone-Sang
,
Guillaume Dedrie
|
illusoryTLS: Impersonate, Tamper, and Exploit
|
Alfonso De Gregorio
|
How Many Million BIOSes Would You Like to Infect?
|
Corey Kallenberg
,
Xeno Kovah
|
Fuzzing Objects d’ART: Digging Into the New Android L Runtime Internals
|
Anestis Bechtsoudis
|
HITB Lab: Breaking Bad Crypto
|
Filippo Valsorda
|
HITB LAB: Memory Forensics for Cisco IOS
|
Didier Stevens
,
Xavier Mertens
|
TECH TRAINING 7: Hacking Web Applications: Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More
|
Dawid Czagan
|
HITB LAB: Attacking Android Apps
|
Tony Trummer
|
Mobile Authentication Subspace Travel
|
Markus Vervier
|
µMIMOSAWRITERROUTER: Abusing EPC on Cisco Routers to Collect Data
|
Joaquim Espinhara
,
Rafael Silva
|
HITB Lab: PowerShell for Penetration Testers
|
Nikhil Mittal
|
TECH TRAINING 6: Android Security – Reverse Engineering & App Pentesting
|
Fernand Lone-Sang
,
Andre Moulu
|
KEYNOTE 2: The Return of Dragons
|
John Matherly
|
TECH TRAINING 4: Understanding x86-64 Assembly for Reverse Engineering & Exploits
|
Xeno Kovah
|
The Windows Phone Freakshow
|
Luca De Fulgentis
|
Supervising the Supervisor: Reversing Proprietary SCADA Tech
|
Jean-Baptise Bedrune
,
Alexandre Gazet
,
Florent Monjalet
|
Hacking Samsung’s Tizen: The OS of Everything
|
Ajin Abraham
|
The Savage Curtain: Mobile SSL Failures
|
Tony Trummer
,
Tushar Dalvi
|
KEYNOTE 1: Fighting for Internet Security in the New Crypto Wars
|
Marcia Hofmann
|
Mozilla InvestiGator: Distributed and Real-Time Digital Forensics at the Speed of the Cloud
|
Julien Vehent
|
TECH TRAINING 3: Application Security for Hackers & Developers
|
Dr. Jared DeMott
|
USB Armory
|
Andrea Barisani
|
What You Always Wanted and Now Can: Hacking Chemical Processes
|
Marina Krotofil
,
Jason Larsen
|
Opcodes in Google Play: Tracing Malicious Applications
|
Dr. Alfonso Muñoz
,
Sergio de los Santos
|
TECH TRAINING 8: Professional Pentesting IPv6 Networks
|
Marc Heuse
|
Relay Attacks in EMV Contactless Cards with Android OTS Devices
|
Ricardo J. Rodríguez
,
Pepe Vila
|
TECH TRAINING 1: iOS Exploitation Techniques
|
Cyril @pod2g Cattiaux
,
Nikias @pimskeks Bassen
|
Uncovering Secret Connections Using Network Theory and Custom Honeypots
|
Pedram Hayati
|
Non-Hidden Hidden Services Considered Harmful: Attacks and Detection
|
Filippo Valsorda
,
George Tankersley
|
Yes Parking: Remotely Owning ‘Secure’ Parking Systems
|
Jose Antonio Guasch
|
Bootkit via SMS: 4G Access Level Security Assessment
|
Timur Yunusov
,
Kirill Nesterov
|