Hardcore Photography: How I Hacked My DSLR
|
Ross ‘shodan’ Bevington
|
TECH TRAINING 2: Practical Malicious Document Analysis
|
Mahmud Ab Rahman
|
Watching the Watcher: Extreme Privilege Escalation on Windows 8/UEFI Systems
|
Corey Kallenberg
,
Xeno Kovah
,
John Butterworth
,
Sam Cornwell
|
Breaking “Secure” Mobile Applications
|
Dominic Chell
|
TECH TRAINING 5: Application Security for Hackers & Developers
|
Dr. Jared DeMott
|
Weapons of Mass Distraction: Sock Puppetry for Fun & Profit
|
Haroon Meer
,
Marco Slaviero
,
Azhar Desai
|
The NSA Playset: Bluetooth Smart Attack Tools
|
Mike Ryan
|
SENTER Sandman: Using Intel TXT to Attack BIOSes
|
Xeno Kovah
,
Corey Kallenberg
,
John Butterworth
,
Sam Cornwell
|
HITB LAB: You Forgot Your Wallet! Tracing Bits of Coins in Disk and Memory
|
Cem Gurkok
|
HITB LAB: Identifying Threats in Raw Data Events: A Practical Approach for Enterprises (PART 2)
|
Vladimir Kropotov
,
Fyodor Yarochkin
,
Vitaly Chetvertakov
|
Forging the USB Armory
|
Andrea Barisani
|
Automatic, Scalable Extraction of Malicious Behavior from Large Datasets
|
Stefano Zanero
|
It Just (Net)Works: The Truth About Apple’s Multipeer Connectivity Framework
|
Alban Diquet
|
TECH TRAINING 7: SensePost Wireless Bootcamp
|
Daniel Cuthbert
|
TECH TRAINING 4: Understanding x86-64 Assembly for Reverse Engineering & Exploits
|
Xeno Kovah
|
Browser Fuzzing in 2014: Where to Throw Your Stones
|
Rosario Valotta
|
A Pyrotechnic Composition: Fireworks, Embedded Wireless and Insecurity-by-Design
|
Andrei Costin
|
Fuzzing and Patch Analysis: SAGEly Advice
|
Richard Johnson
|
Image Hoster Diving: Examining the Web’s Dumpster
|
Paul S. Ziegler
|
OPSEC for the Age of EGOTISTICAL GIRAFFE
|
The Grugq
,
Emmanuel Gadaix
|
How a Helpful Man-in-the-Middle Can Help You Evade Monitoring
|
Ryan Lackey
,
Marc Rogers
|
Exploiting ECDSA Failures in the Bitcoin Blockchain
|
Filippo Valsorda
|
ALPC Fuzzing Toolkit
|
Ben Nagy
|
HITB LAB: Multi-user Encrypted Communication with No Trust in the Server
|
David Dahl
,
Cam Pedersen
|
HITB LAB: Identifying Threats in Raw Data Events: A Practical Approach for Enterprises (PART 1)
|
Vladimir Kropotov
,
Fyodor Yarochkin
,
Vitaly Chetvertakov
|
CLOSING KEYNOTE – Hacking as Practice for Transplanetary Life in the 21st Century: How Hackers Frame the Pictures in Which Others Live
|
Richard Thieme
|
TECH TRAINING 6: LTE Security and Insecurity
|
Alexandre De Oliveira
,
Pierre-Olivier Vauboin
|
TackyDroid: Pentesting Android in Style
|
Chris Liu
,
Matthew Lionetti
|
KEYNOTE 1 – The Next Crypto Wars, Or How We Never Learned to Stop Regulating Exports
|
Nate Cardozo
,
Marcia Hofmann
|
TECH TRAINING 1: iOS Exploitation Techniques
|
Cyril @pod2g Cattiaux
,
Nikias @pimskeks Bassen
|
Keynote 2 – Into the Dark Ages or On to the Renaissance
|
Katie Moussouris
|
TECH TRAINING 3: Practical Threat Intelligence
|
Ty Miller
|
Giving ApplePay the Finger: Hacking TouchID on the iPhone 6
|
Marc Rogers
|
Abusing JSONP with Rosetta Flash
|
Michele Spagnuolo
|
ARM Wrestling a Printer: How to Mod Firmware
|
Michael Jordon
|
Kill Yr Idols
|
Don Bailey
|
HITBSecWhat? GSEC || SecConf || Haxpo – The Why, What, When & Where
|
Dhillon ‘L33tdawg’ Kannabhiran
|
HITB LAB: IRMA – An Open Source Incident Response & Malware Analysis Platform
|
Alexandre Quint
,
Fernand Lone-Sang
|
When the Sand is Leaking: How I Found Five IE Sandbox Escapes in Two Weeks
|
Sunghun ‘trimo’ Kim
|