This archive includes presentation slides for the talk VoIP Wars: Destroying Jar Jar Lync along with the Viproxy tool used to perform the attack.
7c10f7a577fbea0fc76921b0346d6dd57980d6c5773f75f34712eadc6b092e2e
This set of slide is from "The Art of VoIP Hacking", a workshop that was held at Defcon 23.
ef720563f84090601b556006b1294eb24450124db43e13dabccb9df654d51dc0
Presentation slides from BlackHat Europe 2014 regarding reflected file downloads as a new web attack vector.
d0ddaf91840521dae18bc622076204b3c2d7271f61c75aa3adc9a3c8c8f9f4cd
These are the slides from the presentation "VoIP Wars: Attack of the Cisco Phones" from the talk given at Defcon 22 and Blackhat USA 2014.
720ddb24a662b21cf705390762e270841f4e60b42dfbc2cfb78cf7cff84316a9
This presentation is a set of slides that gives an overview of the Heartbleed vulnerability.
7278e4408858b07591a56dec3e0ae59d2bbaf5470e4ff7aa8258235334b9a0df
NCC Group Research Director Andy Davis presented 'USB Attacks Need Physical Access Right? Not Any More...' at this year's BlackHat Asia in Singapore. Due to recent advances in a number of remoting technologies, USB attacks can now be launched over a network. The talk went into detail about how these technologies work, the resulting impact on the world of USB bugs and included a live demo remotely triggering a USB kernel bug in Windows 2012 server.
6b69c9ca16bc7b4b25c8eaf51bdad117771585a02daec7c27db6c045043dfa9c
It is generally assumed that sending and sniffing arbitrary, Fast Ethernet packets can be performed with standard Network Interface Cards (NIC) and generally available packet injection software. However, full control of frame values such as the Frame Check Sequence (FCS) or Start-of-Frame delimiter (SFD) has historically required the use of dedicated and costly hardware. This presentation, given at Blackhat 2013, dissects Fast Ethernet layer 1 and 2 presenting novel attack techniques supported by an affordable hardware setup that, using customized firmware, allows fully arbitrary frame injection. Proof of concept code also included.
bb338be7787778fc49af36b5ed03c58f82629edba14f5a75966b83f8bf58fd3c
These are the presentation slides given at Hack in Paris 2013 giving tips and tricks for using Burp Suite Pro.
6eb93e4f370bae913fe79dd342c4f800b20b1c02177cbc5a77b10acdf66ce7e3
These are presentation slides from the German IPv6 Kongress that was held in Frankfurt, Germany in 2013.
bc707bd82aae4f68dfff095f7eb059d3eff1bb8aae00edc3d6984f3f773c302b
These slides are from an IPv6 reconnaissance presentation given at CONFidence 2013.
1c0197c1d3e4ff5a462e99d9c291cb0c37f2ad96066b8709c6893ec713075389
These are the presentation slides for the Hacking SIP Like A Boss presentation given at Athcon 2013.
53fbc30333acdeadc3874c962abbe40c92f1c1e844a6354e73fd3df90a47f6f4
This is a presentation that discusses low level exploitation such as stack buffer overflows, null pointer exceptions, etc. It offers decent examples and explanations.
cf8f57a23f2830b47616375181328e0335105ea381d3428a3f1e91d4ded96b96
These are the slides for the "Hacking IPv6 Networks" security training course as given at BRUCON 2012.
e3087a85f87af2ef63cb6ee55ffaad7558a549d506e6ff8988c95b01399882ad
These are presentation slides from a talk called Aircraft Hacking - Practical Aero Series. It was presented at HackInTheBox 2013 AMS. It discusses how controls on aircraft could be hacked and the shortcomings that need to be addressed for flight safety.
542bcde77cd07d80fe47993d9d5ecd2f91301b0bc3682a4924d5feb4854ba4e2
This archive includes a presentation and code samples. The presentation is called Parsing Binary File Formats with PowerShell.
2ee444a0cd762da3305af205e37bf1cd02f62382b8e740e9691fa5f622881576
These are slides from a presentation call WinCC Under X-Rays.
48affd9265f6129d8e1b9288f64659adda11ce5640c00598776b5fa4cc425985
This archive holds twelves PDFs that hold presentations for Reversing and Malware Analysis Training. The Topics covered are Lab Setup Guide, Introduction to Windows Internals, Windows PE File Format Basics, Assembly Programming Basics, Reverse Engineering Tools Basics, Practical Reversing (I), Unpacking UPX, Malware Memory Forensics, Advanced Malware Analysis, Exploit Development Basics, Exploit Development Advanced, and Rootkit Analysis.
b983588785a2428722c7ff2fffbcea082a97f7f42fa2e24bf0c05b5a82870907
This is a presentation given at Devoxx that goes into detail about the Oracle Java vulnerabilities discussed in SE-2012-01.
49d02139ee9c74682ac34a668af63077f0e2e4b0d473c32bb2104c25866d4982
These are the slides presented at EuSecWest and Ekoparty in 2012 for SinFP3 - More than a complete framework for operating system fingerprinting.
438deec4e015d4978b01c31e37ec43970322c4a0e93d327e0bdfcf03d803c9ea
This is a presentation called Security Vulnerabilities of Digital Video Broadcast Chipsets. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.
b5085e8431fb1a7e2bbeb1de39c969addc0919c9cb22fbe8c72602adfcfcf41b
This is a presentation called Security Threats in the World of Digital Satellite Television. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.
61103d4ce9bcf58777deab4ee4ff4c33b39828de0f9c1efaefc51fa159e8fffc
This is a presentation called Uncovering ZeroDays and Advanced Fuzzing. It has one PDF of the presentation and one of the full script used during the presentation. This was presented at AthCon 2012.
ed4e76db85a1968d96d0b168a230dcf62722f0fc8e23574007b3bcc95e50099c
These are the slides for the presentation "Recent Advances in IPv6 Security" that was given at Hackito Ergo Sum 2012.
26a911f6f3b82ca092f560786633c0b4c82f374446265a10e96b3f88af2c9c53
This is a brief presentation that touches on various elements of attacks used to cause computer security issues. It is very high level.
40bf343ddc6f826bdaa3a6f429164fd979037dafa0de7cfaa4220c3431ebc5aa
These are the presentation slides from a talk called Threat Modeling Cloud Applications: What You Don't Know Will Hurt You as presented at the OWASP AppSec USA 2011 conference.
ca7ed7c83b5ae0d31004acf587fa92652ec54e92efce0b74f1135654c8dcb0a8