Star 0


Title Humans
Exploiting 64-bit IE on Windows 8.1 – The Pwn2Own Case Study
DDoS mitigation EPIC FAIL collection Moshe Zioni
A Trek to the Emerald City: Ring -1 Based AV
Jtagsploitation: 5 wires, 5 ways to root
Responsible disclosure: who cares?
Software Defined Networking (SDN) Security David Jorm
Smart Muttering; a story and toolset for smart meter platform Ian de Villiers
How to drive a malware analyst crazy Michael Boman
Inside Terracotta VPN
Playing with Fire: Attacking the FireEye MPS Felix Wilhelm
Hunting Asynchronous Vulnerabilities James Kettle
Old Dog, New Tricks: Forensics With PowerShell Jared Atkinson
Meterpreter: Understanding the New Shiny
Get in the Ring0 – Understanding Windows drivers Graham Sutherland
reverse reverse engineering Richo Healey
Dark Fairytales from a Phisherman (Vol.II) Michele Orru
MITMf: Bringing Man-In-The-Middle attacks to the 21’st century
15-Minute Linux Incident Response Live Analysis
Barbarians At The Gate(way): An Examination Of The Attacker’s Tool Box
Hackers in the Wire and Drones Oh My!
Windows 10: 2 Steps Forward, 1 Step Back James Forshaw
Reverse engineering and exploiting font rasterizers: the OpenType saga Mateusz Jurczyk
Going AUTH the Rails on a Crazy Train
Attacking VxWorks: from Stone Age to Interstellar
Stegosploit – Drive-by Browser Exploits using only Images Saumil Shah
Is there an EFI monster inside your apple? Pedro Vilaça
Forging the USB armory Andrea Barisani