exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 92 of 92 RSS Feed

Files Date: 2006-10-09 to 2006-10-10

DAY_2_-_Jim_Geovedi_and_Raditya_Iryandi_-_Hacking_a_bird_in_the_sky.pdf
Posted Oct 9, 2006
Authored by Jim Geovedi, Raditya Iryandi | Site conference.hitb.org

HITBSecConf2006 Presentation - Hacking a Bird in The Sky: Hijacking VSAT Connections.

SHA-256 | 6825e8ca8ed3d1a6b4854ce53a2b77dc9b5e8ab847b0ca259814c15bda9a296b
DAY_2_-_Fyodor_Yarochkin_and_Meder_Kydyraliev_-_YAWATT.pdf
Posted Oct 9, 2006
Authored by Fyodor Yarochkin, Meder Kydyraliev | Site conference.hitb.org

HITBSecConf2006 Presentation - Yet Another Web Application Testing Toolkit (YAWATT).

tags | web
SHA-256 | a35cbde25a9caa5e6325a5bfbf04887f6e92677113767b8f0aa24425004a6546
DAY_2_-_Douglas_MacIver_-_Pentesting_BitLocker.pdf
Posted Oct 9, 2006
Authored by Douglas MacIver | Site conference.hitb.org

HITBSecConf2006 Presentation - Pen Testing Windows Vista BitLocker Drive Encryption from the Inside.

systems | windows
SHA-256 | 4822a2f724006e0f086e1a06406715d251d3413ffb397714cdb96f08aaaa61db
DAY_2_-_Carlos_Sarraute_and_Javier_Burroni_-_Using_Neural_Networks.pdf
Posted Oct 9, 2006
Authored by Javier Burroni, Carlos Sarraute | Site conference.hitb.org

HITBSecConf2006 Presentation - Using Neural Networks and Statistical Machinery to improve remote OS Detection.

tags | remote
SHA-256 | f2bfc2dd5a19b97cfc08c5d4ca6b863421a578144924c59002dbe2073a9c2988
DAY_2_-_Anthony_Zboralski_and_Dave_Mckay_-_Hacking_Trust.pdf
Posted Oct 9, 2006
Authored by Anthony Zboralski, Dave Mckay | Site conference.hitb.org

HITBSecConf2006 Presentation - Hacking Trust.

SHA-256 | 2fa82b2554f0fbdc178846a7f5b08c355c6c8c07004ef47867948000887ef342
DAY_1_-_Yen_Ming_Chen_-_Triple_Play_Triple_Threats_IPTV_Security.pdf
Posted Oct 9, 2006
Authored by Yen Ming Chen | Site conference.hitb.org

HITBSecConf2006 Presentation - Triple Play; Triple Threat? IPTV Security.

SHA-256 | c764b639948e9110979699a66aa8e598faeb1fc139e4655df45d28a722372546
DAY_1_-_Thorsten_Holz_-_Tracking_Botnets.pdf
Posted Oct 9, 2006
Authored by Thorsten Holz | Site conference.hitb.org

HITBSecConf2006 Presentation - Playing with Botnets for Fun and Profit.

SHA-256 | 51d51cc83f425fde075909c905fd790df452d01bea3767f829de5a800ab74503
DAY_1_-_Saumil_Shah_-_Writing_Metasploit_Plugins.pdf
Posted Oct 9, 2006
Authored by Saumil Shah | Site conference.hitb.org

HITBSecConf2006 Presentation - Writing Metasploit Plugins - From Vulnerability to Exploit.

SHA-256 | faacdb406725440eeb2a40eb8ed68e7558e0296a14eb29da2e4d26a408c8b99c
DAY_1_-_Paul_Boehm_-_Taming_Bugs.pdf
Posted Oct 9, 2006
Authored by Paul Boehm | Site conference.hitb.org

HITBSecConf2006 Presentation - Taming Bugs: The Art and Science of Writing Secure Code.

SHA-256 | 72014f096a260f225fff5afa279f799a8e830f8170f7fbef7b2c8b35f1086e16
DAY_1_-_Michael_Davis_-_Client_Honeypots.pdf
Posted Oct 9, 2006
Authored by Michael Davis | Site conference.hitb.org

HITBSecConf2006 Presentation - Client Honeypots - Its Not Only The Network.

SHA-256 | e330bb5cd0ddf943f40890e4bda401671766859f0c31edeef80c1b2dfb8d4029
DAY_1_-_Marc_Schoenefeld_-_Pentesting_Java_J2EE.pdf
Posted Oct 9, 2006
Authored by Marc Schoenefeld | Site conference.hitb.org

HITBSecConf2006 Presentation - Pentesting Java/J2EE - Discovering Remote Holes.

tags | java, remote
SHA-256 | 1415cf54b295ce5b73fb813b0ebf680add2c464363512687c557911aa8ecc12a
DAY_1_-_Jonathan_Limbo.pdf
Posted Oct 9, 2006
Authored by Jonathan Limbo | Site conference.hitb.org

HITBSecConf2006 Presentation - The world through the eyes of a signature developer.

SHA-256 | 65cb5fc1c76ff202d050fe25ff1250d0ec851c89acc3600715810a5e0ddd4fb7
DAY_1_-_Ian_Hellen_and_Vishal_Kumar_-_Security_Engineering_in_Vista.pdf
Posted Oct 9, 2006
Authored by Ian Hellen, Vishal Kumar | Site conference.hitb.org

HITBSecConf2006 Presentation - Security Engineering in Windows Vista.

systems | windows
SHA-256 | a7f1f2504679e3b5e20316cb55913e40eb67172e2995c9cf14553c94ff67ce12
DAY_1_-_Fabrice_Marie_-_AIPS.pdf
Posted Oct 9, 2006
Authored by Fabrice Marie | Site conference.hitb.org

HITBSecConf2006 Presentation - NAIPS/AAIPS - A New Approach to Protecting Your Data.

SHA-256 | bfc21ec5768df5cbf18e7472b8decd4c5a897cbcf8a3ba0016ea8764390086ab
DAY_1_-_Ching_Tim_Meng_-_x.805_standard.pdf
Posted Oct 9, 2006
Authored by Ching Tim Meng | Site conference.hitb.org

HITBSecConf2006 Presentation - Discussion of the X.805 Standard.

SHA-256 | 060abe7a401ce7d3dbb445e80dfe3e9d1bc45e22062d16a6a8115d37bca4fa9b
CONF_KEYNOTE_-_Mark_Curphey_and_John_Viega.pdf
Posted Oct 9, 2006
Authored by John Viega, Mark Curphey | Site conference.hitb.org

HITBSecConf2006 Presentation - What application security tools vendors dont want you to know and holes they will never find!

SHA-256 | 565e1e3b88632ae0122d2200a59eda6fec8c0e3a0c5a35dc3546d8ede2da7f4e
hitbsecconf2006banner.jpg
Posted Oct 9, 2006

Graphic for HITB06.

SHA-256 | a31edb0ea696f339a1f110955e2b58e75f0fb59068493c0f2ee34f83a53665a4
Page 4 of 4
Back1234Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close