For My Next Trick: Client-Side Hacking - This paper describes numerous techniques for attacking Clients-side technologies. The content of the paper is based the research that has been conducted over past year by the GNUCITIZEN Ethical Hacker Outfit.
5114d549b8788fd32a3a932d6dc7a62491c96edcf00a8827b0992a195405db27
Hacking the Bluetooth Stack for Fun, Fame and Mayhem - As the use of bluetooth technology becomes more commonly used, the room for exploitation increases. From cell phones to gaming devices. Dino demonstrates various methods of exploiting this technology in real life situations.
371a5f5e0f86c9c0696d681ba324a68ce8da7ea7d9e88421d34c2d5e098fc51f
Token Kidnapping - This presentation is about a new technique for elevating privileges on Windows mostly from services, this technique exploits design weaknesses in Microsoft Windows XP, 2003, Vista and even Windows 2008. While in Windows Vista and 2008 many new security protections have been added, because of other weaknesses some of the new protection mechanisms are almost useless.
40e7a53ef53b12614b71cc8defc384e185161986510e109617ac0fd30faa1aaf
Computer Forensics and Incident Response.
173e04022a3bb01dad090856ee26318a48eaf3beb57e160fe02d939119ff15b7