Exploit the possiblities
Showing 1 - 25 of 26 RSS Feed

Files

DAY_2_-_Wes_Brown_-_MOSREF.pdf
Posted Oct 9, 2006
Authored by Wes Brown | Site conference.hitb.org

HITBSecConf2006 Presentation - MOSREF: Using Cryptography and Injectable Virtual Machines in Security.

MD5 | 8850321a0c20d42c2cc510673451c9eb
DAY_2_-_The_Grugq_-_VoIPhreaking_-_SIPhalis_Unveiled.pdf
Posted Oct 9, 2006
Authored by The Grugq | Site conference.hitb.org

HITBSecConf2006 Presentation - VoIPhreaking: SIPhallis Unveiled.

MD5 | 5d86bef147c1c55838f75583d92e54c1
DAY_2_-_Rohyt_Belani_-_Smashing_the_Stack_for_Profit._Period..pdf
Posted Oct 9, 2006
Authored by Rohyt Belani | Site conference.hitb.org

HITBSecConf2006 Presentation - Smashing the Stack for Profit - Period.

MD5 | 3cd2020057c82d569ad16766a4b279d1
DAY_2_-_Roberto_Preatoni_and_Fabio_Ghioni_-_The_Biggest_Brother.pdf
Posted Oct 9, 2006
Authored by Roberto Preatoni, Fabio Ghioni | Site conference.hitb.org

HITBSecConf2006 Presentation - The Biggest Brother.

MD5 | 7222358f412c77414413a5839ddf050b
DAY_2_-_Raoul_Chiesa_-_HPP.pdf
Posted Oct 9, 2006
Authored by Raoul Chiesa | Site conference.hitb.org

HITBSecConf2006 Presentation - A New Approach to Cybercrime: The Hackers Profiling Project (HPP).

MD5 | 0baed0b23e5f9a9073f2355dd5368eb1
Scapy and IPv6 networking
Posted Oct 9, 2006
Authored by Phil Biondi, Arnaud Ebalard | Site conference.hitb.org

HITBSecConf2006 Presentation - Scapy and IPv6 networking.

MD5 | 87306df89b5fe69397a59d1e146221b4
DAY_2_-_Nish_Bhalla_-_Binary_Analysis.pdf
Posted Oct 9, 2006
Authored by Nish Bhalla | Site conference.hitb.org

HITBSecConf2006 Presentation - Finding Secrets in ISAPI.

MD5 | f06198fb089296b196e60c44cf5b9cd6
DAY_2_-_Nguyen_Anh_Quynh_-_Towards_an_Invisible_Honeypot_Monitoring_Tool.pdf
Posted Oct 9, 2006
Authored by Nguyen Anh Quynh | Site conference.hitb.org

HITBSecConf2006 Presentation - Towards an Invisible Honeypot Monitoring System.

MD5 | 25e92098cb9d59d971620a06b9c30f5b
DAY_2_-_Joanna_Rutkowska_-_Subverting_Vista_Kernel.pdf
Posted Oct 9, 2006
Authored by Joanna Rutkowska | Site conference.hitb.org

HITBSecConf2006 Presentation - Subverting the Vista Kernel For Fun And Profit.

tags | kernel
MD5 | da6ab4672cff1901191360c455c2b9d0
DAY_2_-_Jim_Geovedi_and_Raditya_Iryandi_-_Hacking_a_bird_in_the_sky.pdf
Posted Oct 9, 2006
Authored by Jim Geovedi, Raditya Iryandi | Site conference.hitb.org

HITBSecConf2006 Presentation - Hacking a Bird in The Sky: Hijacking VSAT Connections.

MD5 | ef497c2d4303f58dc050d8e55788daad
DAY_2_-_Fyodor_Yarochkin_and_Meder_Kydyraliev_-_YAWATT.pdf
Posted Oct 9, 2006
Authored by Fyodor Yarochkin, Meder Kydyraliev | Site conference.hitb.org

HITBSecConf2006 Presentation - Yet Another Web Application Testing Toolkit (YAWATT).

tags | web
MD5 | b4922f9e8a485ecd99a4cf30eb975cf2
DAY_2_-_Douglas_MacIver_-_Pentesting_BitLocker.pdf
Posted Oct 9, 2006
Authored by Douglas MacIver | Site conference.hitb.org

HITBSecConf2006 Presentation - Pen Testing Windows Vista BitLocker Drive Encryption from the Inside.

systems | windows, vista
MD5 | 6f36b19a594bd1a41de0f152495b84d9
DAY_2_-_Carlos_Sarraute_and_Javier_Burroni_-_Using_Neural_Networks.pdf
Posted Oct 9, 2006
Authored by Javier Burroni, Carlos Sarraute | Site conference.hitb.org

HITBSecConf2006 Presentation - Using Neural Networks and Statistical Machinery to improve remote OS Detection.

tags | remote
MD5 | e2d5265870bed87baca1469bd82b4137
DAY_2_-_Anthony_Zboralski_and_Dave_Mckay_-_Hacking_Trust.pdf
Posted Oct 9, 2006
Authored by Anthony Zboralski, Dave Mckay | Site conference.hitb.org

HITBSecConf2006 Presentation - Hacking Trust.

MD5 | 5801c0f5aa13652d6f69afc5a4b80019
DAY_1_-_Yen_Ming_Chen_-_Triple_Play_Triple_Threats_IPTV_Security.pdf
Posted Oct 9, 2006
Authored by Yen Ming Chen | Site conference.hitb.org

HITBSecConf2006 Presentation - Triple Play; Triple Threat? IPTV Security.

MD5 | c8795b2e264485feca456e0070a0c2ef
DAY_1_-_Thorsten_Holz_-_Tracking_Botnets.pdf
Posted Oct 9, 2006
Authored by Thorsten Holz | Site conference.hitb.org

HITBSecConf2006 Presentation - Playing with Botnets for Fun and Profit.

MD5 | a8faca413989ba3daaba52d42879dc42
DAY_1_-_Saumil_Shah_-_Writing_Metasploit_Plugins.pdf
Posted Oct 9, 2006
Authored by Saumil Shah | Site conference.hitb.org

HITBSecConf2006 Presentation - Writing Metasploit Plugins - From Vulnerability to Exploit.

MD5 | b7764a8ef45db1091c5f699c3ffcadca
DAY_1_-_Paul_Boehm_-_Taming_Bugs.pdf
Posted Oct 9, 2006
Authored by Paul Boehm | Site conference.hitb.org

HITBSecConf2006 Presentation - Taming Bugs: The Art and Science of Writing Secure Code.

MD5 | 79594f5e69ed7f3bc9f75724286aafd7
DAY_1_-_Michael_Davis_-_Client_Honeypots.pdf
Posted Oct 9, 2006
Authored by Michael Davis | Site conference.hitb.org

HITBSecConf2006 Presentation - Client Honeypots - Its Not Only The Network.

MD5 | 97f2572802476d3b72b6c4121dad603d
DAY_1_-_Marc_Schoenefeld_-_Pentesting_Java_J2EE.pdf
Posted Oct 9, 2006
Authored by Marc Schoenefeld | Site conference.hitb.org

HITBSecConf2006 Presentation - Pentesting Java/J2EE - Discovering Remote Holes.

tags | java, remote
MD5 | d5a23c4ff73ec13b47286f9d67383f36
DAY_1_-_Jonathan_Limbo.pdf
Posted Oct 9, 2006
Authored by Jonathan Limbo | Site conference.hitb.org

HITBSecConf2006 Presentation - The world through the eyes of a signature developer.

MD5 | 235a5529f38ff8b7244791f08d9a88c5
DAY_1_-_Ian_Hellen_and_Vishal_Kumar_-_Security_Engineering_in_Vista.pdf
Posted Oct 9, 2006
Authored by Ian Hellen, Vishal Kumar | Site conference.hitb.org

HITBSecConf2006 Presentation - Security Engineering in Windows Vista.

systems | windows, vista
MD5 | 36d624c595f039a615a7cb25b433c8be
DAY_1_-_Fabrice_Marie_-_AIPS.pdf
Posted Oct 9, 2006
Authored by Fabrice Marie | Site conference.hitb.org

HITBSecConf2006 Presentation - NAIPS/AAIPS - A New Approach to Protecting Your Data.

MD5 | 9aa402a7a6026ce4f97cddf0e92b4180
DAY_1_-_Ching_Tim_Meng_-_x.805_standard.pdf
Posted Oct 9, 2006
Authored by Ching Tim Meng | Site conference.hitb.org

HITBSecConf2006 Presentation - Discussion of the X.805 Standard.

MD5 | ac0ce014c16034ab2fa74212e7502ac6
CONF_KEYNOTE_-_Mark_Curphey_and_John_Viega.pdf
Posted Oct 9, 2006
Authored by John Viega, Mark Curphey | Site conference.hitb.org

HITBSecConf2006 Presentation - What application security tools vendors dont want you to know and holes they will never find!

MD5 | b7e05d8e73c4a12752742c07857147e7
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Germany Urges Parents To Destroy Snooping Smartwatches
Posted Nov 20, 2017

tags | headline, privacy, germany
Drone Maker Makes Hacking Accusations
Posted Nov 20, 2017

tags | headline, hacker, flaw
DNS Resolver 9.9.9.9 Will Check Requests Against IBM Threat Database
Posted Nov 20, 2017

tags | headline, malware, dns
F5 DROWNing, Not Waving, In Crypto Fail
Posted Nov 20, 2017

tags | headline, flaw, cryptography
Cap'n Crunch Booted From Conferences Due To Sexual Misconduct Claims
Posted Nov 18, 2017

tags | headline, hacker, phone, conference
3 More Android Malware Families Invade Google Play Store
Posted Nov 18, 2017

tags | headline, malware, phone, google
Shamed TLS/SSL Cert Authority StartCom To Shut Up Shop
Posted Nov 18, 2017

tags | headline, privacy, data loss, flaw, cryptography
Massive US Military Social Media Spying Archive Left Wide Open In AWS S3 Buckets
Posted Nov 18, 2017

tags | headline, government, privacy, usa, amazon, data loss, flaw, spyware, social
NYPD Cops Need A Warrant To Snoop On Your Phone
Posted Nov 17, 2017

tags | headline, government, privacy, usa, phone
Oracle Scrambles To Fix Security Flaws In Tuxedo
Posted Nov 17, 2017

tags | headline, database, flaw, oracle
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close