
Hack In The Box Security Conference
Share This Collection
eye
Title
Date Archived
Creator
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 18
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Being stuck below the security poverty line isn't about budget, it's about attitude, motivation, and focusing not...
Topics: Youtube, video, Science & Technology, #HITB2012AMS, #HITB, HITB, HITB2012AMS, HITB2012,...
Topics: Youtube, video, Science & Technology, #HITB2012AMS, #HITB, HITB, HITB2012AMS, HITB2012,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 26
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Jaya Baloo has been working internationally in Information Security for fourteen years. Her focus has been on secure...
Topics: Youtube, video, Science & Technology, #HITB2012AMS, #HITB, HITB, HITB2012AMS, HITB2012,...
Topics: Youtube, video, Science & Technology, #HITB2012AMS, #HITB, HITB, HITB2012AMS, HITB2012,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 39
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Two years ago, we showed how to use social web site to identify target in a company using LinkedIn then learn about...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 55
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 63
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ In 2011 a team of Fox-IT forensic experts won the DFRWS 2011 challenge which focused on advancing forensic analysis of...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 39
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Global Fortune 1000 companies, large governmental organizations and defense entities have something in common -- they...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 39
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Web browsers have become part of everyday life, and are relied upon by millions of internet citizens each day. The...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 58
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ This presentation will showcase security threats in the context of the novel platform of digital satellite TV...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 61
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ This talk will be a continuation of our presentation Security Threats in the World of Digital Satellite Television. In...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 18
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ In the past, researchers who reported security-bugs feared that the companies affected wouldn't take this report in a...
Topics: Youtube, video, Science & Technology, google, bug bounty, hitb, hitb2012ams, hitbsecconf,...
Topics: Youtube, video, Science & Technology, google, bug bounty, hitb, hitb2012ams, hitbsecconf,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 65
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Since the first iPhone in 2007, the baseband that Apple uses for cellular communications has evolved in terms of both...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 49
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Windows 8 will come with lots of change compared to Windows 7, not only with the new Metro interface, ARM support, but...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 29
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ In this presentation, we will discuss The System of Automatic Searching for Vulnerabilities (SASV). We will show how...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 26
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ After very successful "Hacking printers for fun and profit" series of talks, I have decided to continue the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 40
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Cloud services such as Amazon's EC2 and IBM SmartCloud allow users to create and share virtual images (AMIs) with...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 38
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ When giving a security talk on the Android platform, one of the most common questions is can the permissions model be...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 52
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Amazon Web Services has emerged as one of the fastest growing companies in the past five years, and is increasingly...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 33
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ GreenPois0n Absinthe was built upon @pod2g's Corona untether jailbreak to create the first public jailbreak for the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 44
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Shortly after the release of Corona, @xvolks came to @pod2g with an interesting observation. He noticed it was...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 34
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Documenting more than a year of research in XML technologies, this talk will detail security implications of the XML...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 42
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ CXML and VXML languages are used to power IVR applications. IVR systems are often seen in Phone Banking , Call Center...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 23
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ Windows 7 introduced many new security mechanisms regarding the use of the front end allocator. In an attempt to...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 33
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ ABOUT ROP GONGGRIJP Rop Gonggrijp is the founder of the Dutch hacker magazine Hack-Tic and was believed to be a major security threat by authorities in The Netherlands as well as in the USA. In 1993,...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 44
favorite 0
comment 0
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of trust, there is an...
Topics: Youtube, video, Science & Technology, hitb2012ams, hitb, hitbsecconf, amsterdam, netherlands,...
Topics: Youtube, video, Science & Technology, hitb2012ams, hitb, hitbsecconf, amsterdam, netherlands,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 42
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: For the 10th anniversary of HITB we keep it old school with an in-depth exploration of the reverse engineering and exploitation of embedded systems. We will cover hardware by showing how to identify and probe debugging and I/O ports on undocumented circuit board layouts. We will cover software by exploring the analysis, reverse engineer and binary patching techniques for obscure real time...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, malaysia,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, malaysia,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 52
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. We used static binary analysis on thousands of applications submitted to us by large enterprises, commercial software vendors, open source projects, and software outsourcers, to create an anonymized vulnerability data set. By mining this data we can answer some...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2012kul,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2012kul,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 43
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Too often in security we are trapped by a long history of questionable decisions, and its not often you get to design an entirely new security model for apps and phones! Take a look inside the new Firefox OS and apps security model, the unique approach we took to designing it, and how you can participate! ABOUT LUCAS ADAMSKI Lucas Adamski heads up the security team at Mozilla, herds bugs, and...
Topics: Youtube, video, Science & Technology, mozilla, firefox os, firefox, lucas adamski,...
Topics: Youtube, video, Science & Technology, mozilla, firefox os, firefox, lucas adamski,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 68
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: The backbones of our digital lives, the ISPs and Telecom operators, have never been secure. Their "closed garden" security model has always been a fallacy and the reality on the ground paints a much bleaker picture. Why are they constantly getting hacked, and sometimes discovering it many years later or not at all? This presentation will give a broad perspective on the security of...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, telco, hackers, hacking,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, telco, hackers, hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 32
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: In 2006 we had the first JavaScript port scanner. The same year we saw the incarnation of more advanced tools such as AttackAPI, Carnaval and Backframe. A year later we saw several decent attempts to create complete security tools designed to run with nothing else but web technologies. That was just the start. This presentation aims to show the progress that has been made in the past six...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2012kul,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2012kul,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 42
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: In this lecture, Don A. Bailey will take a look back at another great milestone in information security: the movie Hackers. In this retrospective, Don will analyze every "hack" implemented in the cult classic and demonstrate how in modern day these attacks are even more relevant, realistic, and cost effective. Don will discuss the exact technologies used in modern day versions of...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 31
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: What does it take to do quality research? What stops you from being a one-hit wonder? Is there an age limit to productive hackery? What are the key ingredients needed and how can you up your chances of doing great work? In a talk unabashedly stolen from far greater minds we hope to answer these questions and discuss their repercussions. ABOUT HAROON MEER Haroon Meer is the founder of Thinkst,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, research, security,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, research, security,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 24
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: IPv6 is creeping slowly into the ISP and telco network, so it is final time to present on new security issues in IPv6 as well as showing the professionals how to audit and hacking it. All accompanied with GPL tools to do the deeds: the new thc-ipv6 package. rewritten, expanded, enhanced. ABOUT VAN HAUSER Marc "van Hauser" Heuse is performing security research since 1993, having...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, ipv6, thc, van hauser,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, ipv6, thc, van hauser,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 32
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: In recent years, iOS security has become a hot topic, largely due to the unprecedented popularity of Apple iDevices. One of the major exploitation targets within iOS that has received a significant amount of public scrutiny is the kernel, as it encapsulates the security extensions that govern access to the device. A variety of kernel exploits have been publicly released that employ relatively...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, iOS6, apple, iPhone,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, iOS6, apple, iPhone,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 37
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Whether you are a consultant or a software engineer, you have probably realized by now that we're not really making a lot of progress on server-side web security. Consultants benefit from the resulting job security and developers want to focus on building awesome technology without spending a lot of time and energy building reusable security solutions, which are hard. Come and hear about the...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, google, kydyraliev, web...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, google, kydyraliev, web...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 36
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: For more than two years, ThreatGRID has been building a threat intelligence service where samples and content are cross-indexed and related. This allows for tremendous amounts of derived analysis, building relationships based on timing, behavioral, structural, and communications characteristics. We are able to determine origin, aims, and targets of specific samples via second and third order...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, security, hackers,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, security, hackers,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 94
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: I've been in the home computing industry ever since it started. From the IBM-360 Main frame through a college course, to a small mini-computer operated by a private individual, Call Computer. Having lived in Silicon valley, the center of all this activity, I managed to be in the right spots most of the time, and have a knack for putting people together -- Steve Wozniak with Alex from Call...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, john draper, captain...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, john draper, captain...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 121
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: If you want to believe popular movies or worse yet popular news, a hacker's perfect habitat is either a riverside apartment in the tropics, an ominous apartment in Eastern Europe or an unsuspecting mother's basement in the United States. Obviously, neither movie directors nor reporters have ever worked security in the Far East. In this presentation, we will shine a light on how security...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, paul sebastian ziegler,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, paul sebastian ziegler,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 205
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Drawing on lessons gleaned from recent hacker indictments, research on surveillance, espionage and counter-intelligence, this talk focuses on practical operational security (OPSEC) measures to avoid detection and prevent arrest by Law Enforcement Officials. The target audience for this talk are hacktivists whose primary mission requires strong online anonymity in the face of intense scrutiny...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, opsec, grugq, security,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, opsec, grugq, security,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 31
favorite 0
comment 0
A special 1-hour LIVE STREAMED iOS / OS X panel discussion held on the afternoon of Day 2 at #HITB2012KUL featuring (L-R:) Mark Dowd (Azimuth Security), Cyril aka pod2g (Chronic Dev Team), L33tdawg (Founder/CEO of HITB and moderator for the panel), MuscleNerd (iPhone Dev Team) and David 'planetbeing' Wang (iPhone Dev Team) Source: https://www.youtube.com/watch?v=STAWXGQvmRI Uploader: Hack In The Box Security Conference
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, 0day, hackers, hacking,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, 0day, hackers, hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 47
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Starting with the earliest Chromium Security Reward Program, we'll look at the evolution from $500 in 2010 to $60000 in 2012. Along the way, we'll look at the events and motivations that directed the growth of the program, as well as celebrate some of the more interesting and quirky bugs and individuals involved. Most excitingly, we'll end with results and updates from the previous day's...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, disclosure, responsible...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, disclosure, responsible...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 30
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: As a security researcher, what you can and can't get away with in terms of research (AKA hacking) and vulnerability disclosure is getting harder to keep track of. Laws seem to be getting stricter, especially around online services and critical infrastructure. Internet freedom fighters like the EFF have seemingly modified their stance with regard to the sale of exploits -- or have they?...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, msrc, microsoft,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, msrc, microsoft,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 33
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: With ever increasing OS, compiler and linker defences it is in the interest of researchers and security teams to understand which binaries don't leverage these available protections. The goal maybe to ensure exploitability should a vulnerability be discovered or it may be understanding where other defensive measures need to be deployed. This talk will provide a comprehensive review of the...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 34
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Every few weeks a new security company is born. No matter what the brand or the segment, the data flow looks the same from on high: let's get smart people and write some smart software, suck in all kinds of telemetry and samples, and produce threat feeds and reputation feeds, and then... profit! This plan works more often than not, since the problem space and therefore the market continues to...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 25
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Malware is widely acknowledged as a growing threat with hundreds of thousands of new samples reported each week. Analysis of these malware samples has to deal with this significant quantity but also with the defensive capabilities built into malware. Malware authors use a range of evasion techniques to harden their creations against accurate analysis. The evasion techniques aim to disrupt...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, bsdaemon, rodrigo rubira...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, bsdaemon, rodrigo rubira...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 51
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: HTML5 has empowered browser with a number of new features and functionalities. Browsers with this new architecture include features like XMLHttpRequest Object (L2), Local Storage, File System APIs, WebSQL, WebSocket, File APIs and many more. The browser is emerging as a platform like a little operating system and expanded its attack surface significantly. Applications developed in this new...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, html 5, csrf, xss, web,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, html 5, csrf, xss, web,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 27
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: In this presentation Fyodor will present research that he and Vladimir have been working on for the past year. The main objective is a to raise the bar and eliminate easy targets, frequently victimized by low-level crime gangs and point-and-click targeting groups (aka APT professionals). The presentation will discuss the current situation with computer crime in .ru and Asia-Pacific domains....
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, p1sec, fyodor yarochkin,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, p1sec, fyodor yarochkin,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 40
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Most people are disturbed when they witness just how much of their personal information is accessible the very moment they visit a website. Then, if you give that [malicious] website just one mouse-click — out goes even more personally identifiable data. We're talking about full names, where you live, the town where you grew up and went to school, martial status, list of friends, sites you...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, jeremiah grossman,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, jeremiah grossman,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 50
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: The cloud presents a huge opportunity for modern businesses to reduce cost and complexity -- but doing so at the cost of reduced security is a non-starter for many organizations. Those responsible for security oversight within their organizations lose sleep over the security of critical data. What if some unforeseen problem with someone else's applications or controls exposes all of this...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 40
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Behind every successful exploit is a good delivery mechanism. This talk combines my research in exploit writing, browser and PDF exploitation, web hacking and old school data representation techniques, bringing you a slew of creative and innovative tricks and techniques to send exploits successfully to the victim's doorstep. Never before has the fine art of packaging been more important when...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, exploit, exploit...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, exploit, exploit...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 61
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Come hear the history behind Megaupload, plus insight into Mega API and the 'new Mega' -- why, how and most importantly, when. ABOUT EMMANUEL GADAIX Emmanuel started working in the mobile telecommunications industry in the early 90′s while following an advanced late-night curriculum in in-band signalling. Distressed by the apparent death of phreaking due to the introduction of the SS7...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, legality, hackers,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, legality, hackers,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 81
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make increasing use of them. However, very little is known of Huawei's Software Platform and its security. This presentation will introduce the architecture, special properties of configurations and services as well as how to...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, 0day, hackers, hacking,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, 0day, hackers, hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 34
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: The online threat landscape does not stand still. One of the best ways to understand the threats is to understand the attackers and their motives. Mikko Hypponen divides the attackers into three main groups: Criminals, Hactivists and Nation-states. What makes them tick? More importantly, where are they going? ABOUT MIKKO HYPPONEN Mikko Hypponen is the Chief Research Officer for F-Secure. He...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, f-secure, behind enemy...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, f-secure, behind enemy...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 35
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: With the astonishing rate of new and modified malware samples being released daily, automation of analysis is needed to classify and cluster together similar samples, exclude basic and uninteresting variations, and focus costly manual analysis work on novel and interesting features (e.g., added or remove pieces of code with a given semantic). We will discuss the challenges in analyzing large...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hackers, hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 29
favorite 0
comment 0
KEYNOTE PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ CLOSING KEYNOTE ABSTRACT: Join Winn Schwartau as he looks into his crystal ball and predicts the future of information security, information warfare, cyberterrorism and the coming technologies we will be facing and it's not going to be pleasant either. Bumblebots and nanotechnology. High Energy RF Weapons. Deception. Wireless? What are the impacts on business and productivity? When law enforcement won't...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2013ams, winn...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2013ams, winn...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 28
favorite 0
comment 0
A short video overview of the fourth annual HITB Security Conference in Amsterdam, #HITB2013AMS, on RSI Telegiornale featuring interviews with Itzik Kotler (Independent Consultant) Barry van Kampen (HITB .NL Team Lead) and Peleus Uhley (Platform Security Strategist, Adobe SSET). Source: https://www.youtube.com/watch?v=J9I4j8Pv8m4 Uploader: Hack In The Box Security Conference
Topics: Youtube, video, Science & Technology, hugo teso, adobe, amsterdam, peleus uhley, hitbsecconf,...
Topics: Youtube, video, Science & Technology, hugo teso, adobe, amsterdam, peleus uhley, hitbsecconf,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 53
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: This presentation will be a practical demonstration on how to remotely attack and take full control of an aircraft, exposing some of the results of my three years research on the aviation security field. The attack performed will follow the classical methodology, divided in discovery, information gathering, exploitation and post-exploitation phases. The complete attack will be accomplished...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hugo teso, nruns ag,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hugo teso, nruns ag,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 34
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: The goal of mass malware is to successfully run on as many different platforms and applications as possible. The goal of 0-day malware is to exploit a narrow set of hosts. In recent 0-day attacks against Adobe Flash Player and Adobe Reader, we have observed exploits combining the features of mass malware -- obfuscation and complexity -- with the quality that makes up a successful 0-day...
Topics: Youtube, video, Science & Technology, vulnerability, sandboxing, pdf, malware, hackinthebox,...
Topics: Youtube, video, Science & Technology, vulnerability, sandboxing, pdf, malware, hackinthebox,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 32
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/ PRESENTATION ABSTRACT: This presentation will give information security professionals and enthusiasts an opportunity to explore new tricks and techniques for performing web application security assessments and penetration tests without using any intercepting proxies or any other standard tools. We will explore the weird and wonderful world of web browsers, the modern web application stack and rich web APIs to create a...
Topics: Youtube, video, Science & Technology, Proxy Server (Software Genre), nodjs, http proxy, http,...
Topics: Youtube, video, Science & Technology, Proxy Server (Software Genre), nodjs, http proxy, http,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 38
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: This lecture presents a bunch of clever tricks that will save you time and headaches when writing exploits for small embedded systems, such as smart meters, thermostats, keyboards, and mice. You'll learn how to write tiny shellcode that's quickly portable to any variant of ARM, as well as how to exploit memory corruption on an 8-bit micro that's incapable of executing RAM. You'll learn how to...
Topics: Youtube, video, Science & Technology, embedded hardware, thermostats, Tutorial, hackinthebox,...
Topics: Youtube, video, Science & Technology, embedded hardware, thermostats, Tutorial, hackinthebox,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 45
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Server request forgery attacks -- SSRF (Server Side Request Forgery) has been known since 2008, but only recently used in practical information security work. Vulnerabilities of this class gives the attacker the ability to send different requests on behalf of the server, which in turn allows you to bypass various network perimeter restrictions giving the attacker the ability to create...
Topics: Youtube, video, Science & Technology, vulnerability, fastcgi, pwn, vladimir vorontsov, http,...
Topics: Youtube, video, Science & Technology, vulnerability, fastcgi, pwn, vladimir vorontsov, http,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 45
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Almost every recent higher class DSLR camera features multiple and complex access technologies. For example, CANON's new flagship features IP connectivity both wired via 802.3 and wireless via 802.11. All big vendors are pushing these features to the market and advertise them as realtime image transfer to the cloud. We have taken a look at the layer 2 and 3 implementations in the CamOS and...
Topics: Youtube, video, Science & Technology, Canon (company), daniel mende, Hitb2013ams, canon camera,...
Topics: Youtube, video, Science & Technology, Canon (company), daniel mende, Hitb2013ams, canon camera,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 30
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Since March 2013, Twitter's new web API requires every request to be signed with OAuth. This mechanism is supposed to prevent abuse and also allow Twitter to ban third-party clients who do not adhere to their new, much stricter terms of service. After studying how Twitter API uses OAuth, it turns out that the required authentication is inefficient in letting Twitter control third party...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, nicolas seriot, twitter,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, nicolas seriot, twitter,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 30
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Each new version of Windows OS Microsoft enhances security by adding security mitigation mechanisms -- Kernel land vulnerabilities are getting more and more valuable these days. For example, the easy way to escape from a sandbox (Google Chrome sandbox for example) is by using a kernel vulnerability. That's why Microsoft struggles to enhance security of Windows kernel. Kernel Pool allocator...
Topics: Youtube, video, Science & Technology, zero bytes, corruption, windows NT, tarjei mandt, Windows...
Topics: Youtube, video, Science & Technology, zero bytes, corruption, windows NT, tarjei mandt, Windows...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 75
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Phrack and other magazines used to be full of obscure hardware and systems descriptions for telecom equipment that were the pride and the thrill of many dark-corner hackers. There's a specific kink about these strange OS, protocols and interfaces. But sadly (or not, as we'll see), it's a gone era. Gone are the DMS100, the DX200, the COSMOS switches and other telecom legacy beauty, ahem, well,...
Topics: Youtube, video, Science & Technology, dos, tftp, dpi, philippe langlois, hackinthebox, telecom,...
Topics: Youtube, video, Science & Technology, dos, tftp, dpi, philippe langlois, hackinthebox, telecom,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 49
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Today most networks present one "gateway" to the whole network -- The SSL-VPN. A vector that is often overlooked and considered "secure", we decided to take apart an industry leading SSL-VPN appliance and analyze it to bits to thoroughly understand how secure it really is. During this talk we will examine the internals of the F5 FirePass SSL-VPN Appliance. We discover that...
Topics: Youtube, video, Science & Technology, zeltzer, System, appliance, 0day, vulnerabilities, hitb,...
Topics: Youtube, video, Science & Technology, zeltzer, System, appliance, 0day, vulnerabilities, hitb,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 31
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: This will be an in-depth talk about the SIA-HS and Vebon SecIP alarm system protocols in use in The Netherlands. We will cover why these protocols are broken and how Dutch alarm systems can be rendered useless, creating panic at the alarm receiving centers and allow for a 'Die Hard' like scenario to be achieved. We will go through the mistakes and assumptions about security that were made...
Topics: Youtube, video, Science & Technology, fire sale, alarm systems, Amsterdam, hitbsecconf, hitb,...
Topics: Youtube, video, Science & Technology, fire sale, alarm systems, Amsterdam, hitbsecconf, hitb,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 28
favorite 0
comment 0
PRESENTATION ABSTRACT: OAuth has recently become a proposed standard for web authorization, intended to solve security issues of resource sharing and is being deployed by all major service providers such as Google, Facebook, Twitter, etc. We performed a security study of one of the world's largest implementations -- Facebook's OAuth 2.0 and in this presentation we will share a technical description of multiple high-impact security issues we uncovered including: - Data leakage of private...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2013ams, oauth,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2013ams, oauth,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 27
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: The Apple product security team did an impressive job raising the resilience of the iOS 6 kernel to well known attacks: Kernel ASLR was added, code pages of the kernel protected, and heap structures reinforced to harden the exploitability of heap overflows. Also, numerous directory traversals and vulnerabilities in iOS lockdown services have been fixed silently in the road from 5.1.1 to 6.0,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, evad3rs, planetbeing,...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, evad3rs, planetbeing,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 41
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: The importance of software security and integrity of common embedded devices is still often overlooked by many. Compromising the important part of a network (modems, routers/switches, etc.) yields a unique and powerful vector for both eavesdropping and injection of packets. This talk will cover the main aspects of a typical DSL modem and the risks that emerge from the ways ISP's are trying to...
Topics: Youtube, video, Science & Technology, ISP, peter geissler, hitb2013ams, hackinthebox, ADSL,...
Topics: Youtube, video, Science & Technology, ISP, peter geissler, hitb2013ams, hackinthebox, ADSL,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 51
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: "Doesn't matter what you see, Or into it what you read, You can do it your own way, If it's done just how I say..." -- Eye Of The Beholder, Metallica Low cost IP surveillance cameras are becoming increasingly popular among households and small businesses. As of January 2013 Shodan (www.shodanhq.com) shows close to 100000 cameras active all over the world. Despite the fact that there...
Topics: Youtube, video, Science & Technology, backdoor, hitb2013ams, web application, firmware hacking,...
Topics: Youtube, video, Science & Technology, backdoor, hitb2013ams, web application, firmware hacking,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 70
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Unified Extensible Firmware Interface or UEFI, is the result of a common effort from several manufacturers and industry stakeholders based on an initiative from Intel. It is a new software component or 'middleware' interposed between the hardware and the operating system designed to replace the traditional aka old BIOS. This presentation is a study of the overall architecture of UEFI from a...
Topics: Youtube, video, Science & Technology, esx, kaczmarek, hitbsecconf, sebastien kaczmarek,...
Topics: Youtube, video, Science & Technology, esx, kaczmarek, hitbsecconf, sebastien kaczmarek,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 69
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Performing security analysis of iOS applications is a tedious task -- there is no source code and there is no true emulation available. Moreover, communication is usually signed or encrypted by the application, leaving the standard tampering and injection attacks worthless. Needless to say, time spent on testing such applications increases substantially due to the fact that not every...
Topics: Youtube, video, Science & Technology, ipod, Netherlands, tampering, inalyzer, injection,...
Topics: Youtube, video, Science & Technology, ipod, Netherlands, tampering, inalyzer, injection,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 43
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: Heard of the Shodan Computer Search Engine? This young project scans the Internet IPv4 space, collects banners from exposed systems' services, and places them in a searchable database. The impact of Shodan over the past few years is significant, with multiple DHS ICS-CERT advisories on exposed systems, several hacker conference talks, and valuable integration into other tools like Metasploit....
Topics: Youtube, video, Science & Technology, gas pumps, tv station, computer search engine, shodan,...
Topics: Youtube, video, Science & Technology, gas pumps, tv station, computer search engine, shodan,...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 34
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: What could be insecure about charging an electric car? Just plug in to a power outlet and off you go... Nothing can be further from the truth. The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that communicates with the electric grid on one side and the car on the other. To...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2013ams, ofer...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, hitb2013ams, ofer...
Hack In The Box Security Conference
by
Hack In The Box Security Conference
movies
eye 36
favorite 0
comment 0
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: As social engineering has become the dominant method of malware distribution, browsers makers started to design more robust and recognizable UIs in order to help users in making aware choices while surfing the web. In this process, creating trusted UIs notification mechanisms played a crucial role: today any modern browser is able to identify potentially dangerous/sensitive actions requested...
Topics: Youtube, video, Science & Technology, Safari (Software), internet explorer, notification,...
Topics: Youtube, video, Science & Technology, Safari (Software), internet explorer, notification,...
Fetching more results

DESCRIPTION
Collection Info
- Addeddate
- 2019-11-14 19:05:58
- Collection
- hackercons
movies
- Filter-top-level
- AND primary_collection:HackInTheBoxSecurityConference
- Filter-top-level-enable
- true
- Identifier
- HackInTheBoxSecurityConference
- Mediatype
- collection
- Num_recent_reviews
- 5
- Num_top_dl
- 5
- Publicdate
- 2019-11-14 19:05:58
- Sort-by
- titleSorter
- Storage_size
- 216.4 GB (in 24,068 files)
- Title
- Hack In The Box Security Conference
Created on
November 14
2019
2019
narabot
Archivist
Archivist
ITEMS
Total Items 405 (Older Stats)
TOP REGIONS (LAST 30 DAYS)
(data not available)