exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files

DAY_2_-_Wes_Brown_-_MOSREF.pdf
Posted Oct 9, 2006
Authored by Wes Brown | Site conference.hitb.org

HITBSecConf2006 Presentation - MOSREF: Using Cryptography and Injectable Virtual Machines in Security.

SHA-256 | 6ebc0677ca036a5bb4b4aa391d01ce08011f2ef6428bbe899715080b876373fd
DAY_2_-_The_Grugq_-_VoIPhreaking_-_SIPhalis_Unveiled.pdf
Posted Oct 9, 2006
Authored by The Grugq | Site conference.hitb.org

HITBSecConf2006 Presentation - VoIPhreaking: SIPhallis Unveiled.

SHA-256 | 55819f64fc30085e3548f1fc45e1d9c7671876304111e31b58763ce476b15121
DAY_2_-_Rohyt_Belani_-_Smashing_the_Stack_for_Profit._Period..pdf
Posted Oct 9, 2006
Authored by Rohyt Belani | Site conference.hitb.org

HITBSecConf2006 Presentation - Smashing the Stack for Profit - Period.

SHA-256 | cd74f7befdf12c7c088085b1801eab1d242650db7f86d39c152344ae7ac1c34b
DAY_2_-_Roberto_Preatoni_and_Fabio_Ghioni_-_The_Biggest_Brother.pdf
Posted Oct 9, 2006
Authored by Roberto Preatoni, Fabio Ghioni | Site conference.hitb.org

HITBSecConf2006 Presentation - The Biggest Brother.

SHA-256 | 593d5a78bfc5e29cff64ec5f6f7464f848eec1f59121378c7b9beb514ba9c92b
DAY_2_-_Raoul_Chiesa_-_HPP.pdf
Posted Oct 9, 2006
Authored by Raoul Chiesa | Site conference.hitb.org

HITBSecConf2006 Presentation - A New Approach to Cybercrime: The Hackers Profiling Project (HPP).

SHA-256 | fe422b6eba9e7e5be46710ece591e7835f71c06b0b869e4a607fae76beccd956
Scapy and IPv6 networking
Posted Oct 9, 2006
Authored by Phil Biondi, Arnaud Ebalard | Site conference.hitb.org

HITBSecConf2006 Presentation - Scapy and IPv6 networking.

SHA-256 | 432effb8942d5cd534cb10fa92aa8d8d8bdba7f14a3def904ec9cb85f3f03970
DAY_2_-_Nish_Bhalla_-_Binary_Analysis.pdf
Posted Oct 9, 2006
Authored by Nish Bhalla | Site conference.hitb.org

HITBSecConf2006 Presentation - Finding Secrets in ISAPI.

SHA-256 | bc0314b2e692a9f545d86a278fbf1b1fff9a3394cf2ad0abb846888a1a402087
DAY_2_-_Nguyen_Anh_Quynh_-_Towards_an_Invisible_Honeypot_Monitoring_Tool.pdf
Posted Oct 9, 2006
Authored by Nguyen Anh Quynh | Site conference.hitb.org

HITBSecConf2006 Presentation - Towards an Invisible Honeypot Monitoring System.

SHA-256 | 4a9b4c63d47b9b96eea0f12e6cefc0b433c2b7fae81bd20cbb93d36c468cfef6
DAY_2_-_Joanna_Rutkowska_-_Subverting_Vista_Kernel.pdf
Posted Oct 9, 2006
Authored by Joanna Rutkowska | Site conference.hitb.org

HITBSecConf2006 Presentation - Subverting the Vista Kernel For Fun And Profit.

tags | kernel
SHA-256 | 166ba047155514bdbc82f9186d41dca4b8e72f60d2b133a6a00d0de888f89ac7
DAY_2_-_Jim_Geovedi_and_Raditya_Iryandi_-_Hacking_a_bird_in_the_sky.pdf
Posted Oct 9, 2006
Authored by Jim Geovedi, Raditya Iryandi | Site conference.hitb.org

HITBSecConf2006 Presentation - Hacking a Bird in The Sky: Hijacking VSAT Connections.

SHA-256 | 6825e8ca8ed3d1a6b4854ce53a2b77dc9b5e8ab847b0ca259814c15bda9a296b
DAY_2_-_Fyodor_Yarochkin_and_Meder_Kydyraliev_-_YAWATT.pdf
Posted Oct 9, 2006
Authored by Fyodor Yarochkin, Meder Kydyraliev | Site conference.hitb.org

HITBSecConf2006 Presentation - Yet Another Web Application Testing Toolkit (YAWATT).

tags | web
SHA-256 | a35cbde25a9caa5e6325a5bfbf04887f6e92677113767b8f0aa24425004a6546
DAY_2_-_Douglas_MacIver_-_Pentesting_BitLocker.pdf
Posted Oct 9, 2006
Authored by Douglas MacIver | Site conference.hitb.org

HITBSecConf2006 Presentation - Pen Testing Windows Vista BitLocker Drive Encryption from the Inside.

systems | windows
SHA-256 | 4822a2f724006e0f086e1a06406715d251d3413ffb397714cdb96f08aaaa61db
DAY_2_-_Carlos_Sarraute_and_Javier_Burroni_-_Using_Neural_Networks.pdf
Posted Oct 9, 2006
Authored by Javier Burroni, Carlos Sarraute | Site conference.hitb.org

HITBSecConf2006 Presentation - Using Neural Networks and Statistical Machinery to improve remote OS Detection.

tags | remote
SHA-256 | f2bfc2dd5a19b97cfc08c5d4ca6b863421a578144924c59002dbe2073a9c2988
DAY_2_-_Anthony_Zboralski_and_Dave_Mckay_-_Hacking_Trust.pdf
Posted Oct 9, 2006
Authored by Anthony Zboralski, Dave Mckay | Site conference.hitb.org

HITBSecConf2006 Presentation - Hacking Trust.

SHA-256 | 2fa82b2554f0fbdc178846a7f5b08c355c6c8c07004ef47867948000887ef342
DAY_1_-_Yen_Ming_Chen_-_Triple_Play_Triple_Threats_IPTV_Security.pdf
Posted Oct 9, 2006
Authored by Yen Ming Chen | Site conference.hitb.org

HITBSecConf2006 Presentation - Triple Play; Triple Threat? IPTV Security.

SHA-256 | c764b639948e9110979699a66aa8e598faeb1fc139e4655df45d28a722372546
DAY_1_-_Thorsten_Holz_-_Tracking_Botnets.pdf
Posted Oct 9, 2006
Authored by Thorsten Holz | Site conference.hitb.org

HITBSecConf2006 Presentation - Playing with Botnets for Fun and Profit.

SHA-256 | 51d51cc83f425fde075909c905fd790df452d01bea3767f829de5a800ab74503
DAY_1_-_Saumil_Shah_-_Writing_Metasploit_Plugins.pdf
Posted Oct 9, 2006
Authored by Saumil Shah | Site conference.hitb.org

HITBSecConf2006 Presentation - Writing Metasploit Plugins - From Vulnerability to Exploit.

SHA-256 | faacdb406725440eeb2a40eb8ed68e7558e0296a14eb29da2e4d26a408c8b99c
DAY_1_-_Paul_Boehm_-_Taming_Bugs.pdf
Posted Oct 9, 2006
Authored by Paul Boehm | Site conference.hitb.org

HITBSecConf2006 Presentation - Taming Bugs: The Art and Science of Writing Secure Code.

SHA-256 | 72014f096a260f225fff5afa279f799a8e830f8170f7fbef7b2c8b35f1086e16
DAY_1_-_Michael_Davis_-_Client_Honeypots.pdf
Posted Oct 9, 2006
Authored by Michael Davis | Site conference.hitb.org

HITBSecConf2006 Presentation - Client Honeypots - Its Not Only The Network.

SHA-256 | e330bb5cd0ddf943f40890e4bda401671766859f0c31edeef80c1b2dfb8d4029
DAY_1_-_Marc_Schoenefeld_-_Pentesting_Java_J2EE.pdf
Posted Oct 9, 2006
Authored by Marc Schoenefeld | Site conference.hitb.org

HITBSecConf2006 Presentation - Pentesting Java/J2EE - Discovering Remote Holes.

tags | java, remote
SHA-256 | 1415cf54b295ce5b73fb813b0ebf680add2c464363512687c557911aa8ecc12a
DAY_1_-_Jonathan_Limbo.pdf
Posted Oct 9, 2006
Authored by Jonathan Limbo | Site conference.hitb.org

HITBSecConf2006 Presentation - The world through the eyes of a signature developer.

SHA-256 | 65cb5fc1c76ff202d050fe25ff1250d0ec851c89acc3600715810a5e0ddd4fb7
DAY_1_-_Ian_Hellen_and_Vishal_Kumar_-_Security_Engineering_in_Vista.pdf
Posted Oct 9, 2006
Authored by Ian Hellen, Vishal Kumar | Site conference.hitb.org

HITBSecConf2006 Presentation - Security Engineering in Windows Vista.

systems | windows
SHA-256 | a7f1f2504679e3b5e20316cb55913e40eb67172e2995c9cf14553c94ff67ce12
DAY_1_-_Fabrice_Marie_-_AIPS.pdf
Posted Oct 9, 2006
Authored by Fabrice Marie | Site conference.hitb.org

HITBSecConf2006 Presentation - NAIPS/AAIPS - A New Approach to Protecting Your Data.

SHA-256 | bfc21ec5768df5cbf18e7472b8decd4c5a897cbcf8a3ba0016ea8764390086ab
DAY_1_-_Ching_Tim_Meng_-_x.805_standard.pdf
Posted Oct 9, 2006
Authored by Ching Tim Meng | Site conference.hitb.org

HITBSecConf2006 Presentation - Discussion of the X.805 Standard.

SHA-256 | 060abe7a401ce7d3dbb445e80dfe3e9d1bc45e22062d16a6a8115d37bca4fa9b
CONF_KEYNOTE_-_Mark_Curphey_and_John_Viega.pdf
Posted Oct 9, 2006
Authored by John Viega, Mark Curphey | Site conference.hitb.org

HITBSecConf2006 Presentation - What application security tools vendors dont want you to know and holes they will never find!

SHA-256 | 565e1e3b88632ae0122d2200a59eda6fec8c0e3a0c5a35dc3546d8ede2da7f4e
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Why Does The US Want To ban TikTok, And When Could It Happen?
Posted Mar 15, 2024

tags | headline, government, usa, china, cyberwar, spyware, social
Discontinued Security Plugins Expose Many WordPress Sites To Takeover
Posted Mar 15, 2024

tags | headline, hacker, flaw, wordpress
Member Of LockBit Ransomware Group Sentenced To 4 Years In Prison
Posted Mar 15, 2024

tags | headline, malware, canada, russia, cybercrime, fraud, cryptography
Banish OEM Self-Signed Certs And Roll Your Own LetsEncrypt
Posted Mar 15, 2024

tags | headline, privacy, cryptography
Cop Shop Rapped For Completely Avoidable Web Form Blunder
Posted Mar 15, 2024

tags | headline, government, privacy, britain, data loss
Cisco Patches High Severity IOS RX Vulnerabilities
Posted Mar 14, 2024

tags | headline, flaw, patch, cisco
RedLine Malware Top Credential Stealer Of Last 6 Months
Posted Mar 14, 2024

tags | headline, hacker, malware, cybercrime, data loss, password, identity theft
Meta Sues Brazenly Disloyal Former Exec Over Stolen Confidential Docs
Posted Mar 14, 2024

tags | headline, data loss, fraud, facebook
Poking Holes In Google Tech Bagged Bug Hunters $10M
Posted Mar 14, 2024

tags | headline, hacker, flaw, google
US Congress Goes Bang, Bang, On Tik-Tok Sale Or Ban Plan
Posted Mar 14, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close