what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files

Keynote-Tony-Chor-IE-Security-Past-Present-and-Future.ppt
Posted Oct 12, 2005
Authored by Tony Chor

IE Security - Past, Present and Future. Tony Chor outlines the threats to secure browsing, discuss Microsoft's response with Internet Explorer for Windows XP SP2, and details the implementation of safety features in the upcoming Internet Explorer 7.0, such as the Phishing Filter and Protected Mode (the feature formerly known as Low Rights IE).

systems | windows
SHA-256 | 5d6c688b8b387dfa57b467d005c434337fed685c161d1c618d8d6c06008a90c8
TT-Roelof-Temmingh-State-of-the-art.ppt
Posted Oct 12, 2005
Authored by Roelof Temmingh

Assessing Server Security - State of the Art. The talk takes into consideration the progress that has been made in web server security over the last few years, and the progress that has been made in attacking web servers over the same time. The paper visits the new vulnerabilities introduced by web applications and discuss the thinking applied to discover such vulnerabilities. It finally describes the state of the art of web server scanning technology.

tags | web, vulnerability
SHA-256 | 100459d29fc8945bc761d6a2ccc7ce82103b8f31e835d98cf9a6ae54e18497c5
TT-San-Hacking-Windows-CE.ppt
Posted Oct 12, 2005
Authored by San (XFocus)

Hacking Windows CE - This paper shows a buffer overflow exploitation example in Windows CE. It covers knowledge about the ARM architecture, memory management and the features of processes and threads of Windows CE. It also shows how to write a shellcode in Windows CE including knowledge about decoding shellcode of Windows CE.

tags | overflow, shellcode
systems | windows
SHA-256 | 0059aabe36954e204cefd4c2178f8ecdb73547bbf11e9a1e9d1a7ac84f2f8d78
HITB.gif
Posted Oct 11, 2005

Conference Graphic

SHA-256 | 30455302912fd9fd34f096a73e5b327de00c55efdf0b55caf0b6489354520f49
Keynote-Mikko-Hypponen-Mobile-Malware.pdf
Posted Oct 11, 2005
Authored by Mikko Hypponen

Mobile Malware - How exactly do mobile viruses work? We'll have a look at their code and discuss what factors affect their spreading speeds. Virus writers have always been trying to attack new platforms. What draws them now towards the mobile phone? Are phones as a platform simply widespread enough, or is the possibility of making easy money via phone billing systems driving this development? Where are we now and what can we expect to see in the Mobile Malware of the future?

tags | virus
SHA-256 | 56afb490432ed145ebbbbf494d1700304dc665d4538170e570097ca10dab2e42
TT-Dave-Aitel-Nematodes.sxi
Posted Oct 11, 2005
Authored by Dave Aitel

Nematodes (Beneficial Worms) - This presentation presents concepts for taking expoitation frameworks into the next evolution: solving complex security problems by generating robustly controllable beneficial worms. The Why, How, and What of Nematode creation are discussed, along with some concepts in Mesh routing. Problems discussed include legal issues, controlling your worm, writing an intermediate language, the Nematode Intermediate Language (NIL) for writing robust worms, reliability problems, commications protocols, and future work.

tags | worm, protocol
SHA-256 | 446fdad6f1cbb3d6964e71c5e4b8c7eeb406f2582978a27b2314f9e084849e8d
TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt
Posted Oct 11, 2005
Authored by Fyodor Yarochkin, Meder Kydyraliev

STIFWare Evolution - Meder and Fyodor have been working on their concept of common framework to unify offensive part of heterogeneous security data and security tools into a single unit - security tools framework. The presentation deals with the evolution of STIF framework into what they call now STIF-ware - a set of STIF relevant modules that would allow the computer security hobbists to build, control and monitor the distributed network of automated hacking agents, guided by set of goals and targets, assigned to the system.

SHA-256 | 44117ca91c39d4c41ac5c5a1d266ffce5d633d4eb8ddac4389eee2d5417e9085
TT-Jim-Geovedi-Hotspot-Security.pdf
Posted Oct 11, 2005
Authored by Jim Geovedi

Hotspot Security - This presentation covers the basic approach behind Wi-Fi hotspot security design and architecture. During the presentation, vulnerabilities and methods for exploiting Wi-Fi hotspots were shown.

tags | vulnerability
SHA-256 | 0a7dede863446f901b020b5e8cb5a16104df67c26c0d8e604dfe1df366228110
TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt
Posted Oct 11, 2005
Authored by Joanna Rutkowska

Virginity Verifier - The presentation aims towards defining a detailed list of vital operating system parts as well as a methodology for malware detection. The list will start on such basic levels as actions needed for file system and registry integrity verification, go through user-mode memory validating (detecting additional processes, hooked DLLs, injected threads, etc) and finally end on such advanced topics as defining vital kernel parts which can be altered by modern rootkit-based malware (with techniques like Raw IRP hooking, various DKOM based manipulations or VMM cheating)

tags | kernel, registry
SHA-256 | 94500b175b88ce140678c699be8b75984a5ac8857c25de8ad095cfbd32078b6f
TT-Jose-Nazario-Analyzing-all-that-data.pdf
Posted Oct 11, 2005
Authored by Dr. Jose Nazario

Analysing All That Data - This presentation will introduce you to a number of techniques for making sense of large collections of data, including sorting and clustering techniques, fuzzy matching, and trend analysis. These techniques have applicability in numerous applications, such as mail filtering and network event analysis.

SHA-256 | 78f674bd1b1fa124c6336b7c2bbbb4422f9e8541e79202822c6a8a18f5329d3e
TT-Marc-Schoenefeld-Secure-Java-Programming.zip
Posted Oct 11, 2005
Authored by Marc Schoenefeld

Secure Java Programming - The talk is about the causes and effects of coding errors and the techniques to detect them, demonstrated with findings in the current Sun JDK.

tags | java
SHA-256 | bfb10720627d3dc700ef445feae88f44314c35a60fde542354635e8898180b8c
TT-Nish-Bhalla-Defects-Overview.pdf
Posted Oct 11, 2005
Authored by Nish Bhalla

Analyzing Code for Security Defects - Reviewing code to find vulnerabilities is becoming more and more common. Reviewing code is not only useful from a developers point of view but also from an attacker's point of view. The talk covers the basics of threat analysis, how to assess threats and what are some of the vulnerabilities that could exists in code when performing code reviews for large code bases.

tags | vulnerability
SHA-256 | 577816544352b93086ef9e99da313f9fee376f881ae388b2695b3cf5b1bae2f1
TT-Shreeraj-Shah-Webhacking-Kungfu.pdf
Posted Oct 11, 2005
Authored by Shreeraj Shah

Web Hacking Kung-Fu and Art of Defense - Web attacks are on the rise and new methods of hacking are evolving. This presentation covers the new methodologies for web application footprinting, discovery and information gathering with a new range of tools.

tags | web
SHA-256 | 4f5e29a13a9a3f08a42d17d1c4729596c7602ec6f82c8722ba9f630ca7c3ecff
TT-The-Grugq-VoIPPhreaking.ppt
Posted Oct 11, 2005
Authored by The Grugq

VoIPhreaking: How to make free phone calls and influence people This talk explores the technologies behind VoIP infrastructures, focusing on their weaknesses and faults. LIVE DEMOS were conducted to help illustrate that attacks which violate VoIP system security are not only practical, but are already here. The era of VoIPhreaking has begun.

SHA-256 | 3271305c18faa6bd40a617ee26d17e9ace2ab4a191e3050d6395587c1d2c796a
BT-Anthony-Zboralski-Social-Engineering.pdf
Posted Oct 11, 2005
Authored by Anthony Zboralski

Social Engineering Fundamentals - In today's world confidence scams present quite possibly the highest threat to security with in the business world. Control of information, withholding and leaking, can lead to massive failures and losses depending on how skilled the attacker may be. In combination with disinformation and propaganda, social engineering can as fatal as or even lead to loss of customer and shareholder confidence.

SHA-256 | c7eb0d6f8e3d9604128b9b70ac462c22bd11e438eae445c188a7350db6cc9058
BT-Fabrice-Marie-Hacking-Internet-Banking-Applications.pdf
Posted Oct 11, 2005
Authored by Fabrice Marie

Hacking Internet Banking Applications - This presentation highlights the solutions to some of the challenges the banks will face online to ensure that their data handling practices are compliant with their country's privacy regulations and banking regulations among others.

SHA-256 | facb6cdfb8969d787b7bc3da4d2632a5a0ded6a4605b14a9726466d683898afb
BT-Raoul-Chiesa-X25-Security.pdf
Posted Oct 11, 2005
Authored by Raoul Chiesa

x.25 Security - The presentation focuses on X.25 security issues, positioned in present day context and problems. The main intention is to bring personal and professional know-how, background and X.25 penetration testing experiences to the auditorium, with real-life case studies.

SHA-256 | ec36363f681e82827601b5b958109ffc30d24db525a0ec00e087594e31603878
BT-Roberto-Preatoni-Fabio-Ghioni-Corp-vs-Corp.ppt
Posted Oct 11, 2005

Corp vs Corp - An impressionistic overview of what makes the difference today and in the future (in the digital playground) in the balance of power between economic and military powers. The presentation covers a description of the business behind espionage worldwide as well as the asymmetric organizations that are the real master of puppets.

SHA-256 | 99b4e4d92119b97b7001ec31f44f161bbeef564f7f9dfa6041c211df58379614
BT-Tim-Pritlove-Blinkenlights-Arcade-Project.pdf
Posted Oct 11, 2005
Authored by Tim Pritlove

Project Blinkenlights - A presentation covering the Blinkenlights light installation in Berlin, Germany and the Arcade project in Paris, France.

SHA-256 | 128f1accabc534ab089b49d061eec977eb753a6811e67370006815eafee8f7bb
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
The Abortion Clues That Can Hide On Your Phone
Posted Jun 28, 2022

tags | headline, government, privacy
Russia's Killnet Hacker Group Says It Attacked Lithuania
Posted Jun 27, 2022

tags | headline, government, russia, denial of service, cyberwar
Contractor Loses Entire Japanese City's Personal Data In USB Fail
Posted Jun 27, 2022

tags | headline, privacy, data loss, japan
Beijing Probes Security At Academic Journal Database
Posted Jun 27, 2022

tags | headline, government, china, data loss
UK Security Services Must Seek Approval To Access Telecoms Data, Judge Rules
Posted Jun 27, 2022

tags | headline, government, privacy, phone, britain, spyware
NSO Claims More Than 5 EU States Use Pegasus Spyware
Posted Jun 24, 2022

tags | headline, government, phone, israel, spyware, apple
Beijing-Backed Attackers Use Ransomware As Decoy While They Conduct Espionage
Posted Jun 24, 2022

tags | headline, malware, china, cyberwar, spyware
Google Warns Spyware Being Deployed Against Android, iOS
Posted Jun 24, 2022

tags | headline, hacker, malware, phone, google, spyware, apple
Microsoft Compares Russian Hacks Of Ukraine To Assassination That Started World War I
Posted Jun 24, 2022

tags | headline, hacker, government, microsoft, russia, cyberwar, military
Fancy Bear Uses Nuke Threat Lure To Exploit 1-Click Bug
Posted Jun 23, 2022

tags | headline, hacker, malware, russia, flaw
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close