Star 0

Talks

Title Humans
Hardcore Photography: How I Hacked My DSLR Ross ‘shodan’ Bevington
TECH TRAINING 2: Practical Malicious Document Analysis Mahmud Ab Rahman
Watching the Watcher: Extreme Privilege Escalation on Windows 8/UEFI Systems Corey Kallenberg , Xeno Kovah , John Butterworth , Sam Cornwell
Breaking “Secure” Mobile Applications Dominic Chell
TECH TRAINING 5: Application Security for Hackers & Developers Dr. Jared DeMott
Weapons of Mass Distraction: Sock Puppetry for Fun & Profit Haroon Meer , Marco Slaviero , Azhar Desai
The NSA Playset: Bluetooth Smart Attack Tools Mike Ryan
SENTER Sandman: Using Intel TXT to Attack BIOSes Xeno Kovah , Corey Kallenberg , John Butterworth , Sam Cornwell
HITB LAB: You Forgot Your Wallet! Tracing Bits of Coins in Disk and Memory Cem Gurkok
HITB LAB: Identifying Threats in Raw Data Events: A Practical Approach for Enterprises (PART 2) Vladimir Kropotov , Fyodor Yarochkin , Vitaly Chetvertakov
Forging the USB Armory Andrea Barisani
Automatic, Scalable Extraction of Malicious Behavior from Large Datasets Stefano Zanero
It Just (Net)Works: The Truth About Apple’s Multipeer Connectivity Framework Alban Diquet
TECH TRAINING 7: SensePost Wireless Bootcamp Daniel Cuthbert
TECH TRAINING 4: Understanding x86-64 Assembly for Reverse Engineering & Exploits Xeno Kovah
Browser Fuzzing in 2014: Where to Throw Your Stones Rosario Valotta
A Pyrotechnic Composition: Fireworks, Embedded Wireless and Insecurity-by-Design Andrei Costin
Fuzzing and Patch Analysis: SAGEly Advice Richard Johnson
Image Hoster Diving: Examining the Web’s Dumpster Paul S. Ziegler
OPSEC for the Age of EGOTISTICAL GIRAFFE The Grugq , Emmanuel Gadaix
How a Helpful Man-in-the-Middle Can Help You Evade Monitoring Ryan Lackey , Marc Rogers
Exploiting ECDSA Failures in the Bitcoin Blockchain Filippo Valsorda
ALPC Fuzzing Toolkit Ben Nagy
HITB LAB: Multi-user Encrypted Communication with No Trust in the Server David Dahl , Cam Pedersen
HITB LAB: Identifying Threats in Raw Data Events: A Practical Approach for Enterprises (PART 1) Vladimir Kropotov , Fyodor Yarochkin , Vitaly Chetvertakov
CLOSING KEYNOTE – Hacking as Practice for Transplanetary Life in the 21st Century: How Hackers Frame the Pictures in Which Others Live Richard Thieme
TECH TRAINING 6: LTE Security and Insecurity Alexandre De Oliveira , Pierre-Olivier Vauboin
TackyDroid: Pentesting Android in Style Chris Liu , Matthew Lionetti
KEYNOTE 1 – The Next Crypto Wars, Or How We Never Learned to Stop Regulating Exports Nate Cardozo , Marcia Hofmann
TECH TRAINING 1: iOS Exploitation Techniques Cyril @pod2g Cattiaux , Nikias @pimskeks Bassen
Keynote 2 – Into the Dark Ages or On to the Renaissance Katie Moussouris
TECH TRAINING 3: Practical Threat Intelligence Ty Miller
Giving ApplePay the Finger: Hacking TouchID on the iPhone 6 Marc Rogers
Abusing JSONP with Rosetta Flash Michele Spagnuolo
ARM Wrestling a Printer: How to Mod Firmware Michael Jordon
Kill Yr Idols Don Bailey
HITBSecWhat? GSEC || SecConf || Haxpo – The Why, What, When & Where Dhillon ‘L33tdawg’ Kannabhiran
HITB LAB: IRMA – An Open Source Incident Response & Malware Analysis Platform Alexandre Quint , Fernand Lone-Sang
When the Sand is Leaking: How I Found Five IE Sandbox Escapes in Two Weeks Sunghun ‘trimo’ Kim