| Yersinia, A Framework For Layer 2 Attacks |
David Barroso Berrueta, Alfredo Andres |
Presentation |
- |
| Hacking PGP |
Jon Callas |
Presentation |
- |
| Hacking Windows Internals |
Cesar Cerrudo |
Presentation |
- |
| Symbian Security |
Job de Haas |
Presentation |
- |
| A New Password Capture on Cisco System Devices |
Steve Dugan |
- |
- |
| Building Zero-Day Self-Defending Web Applications: Enforcing Authoritative Action to Stop Session Attacks |
Arian Evans |
Presentation |
- |
| Injecting Trojans via Patch Management Software & Other Evil Deeds |
Chris Farrow |
Presentation |
- |
| Network Flows and Security |
Nicolas Fischbach |
Presentation |
- |
| Compare, Port, Navigate |
Halvar Flake, Rolf Rolles |
Presentation |
- |
| Hacking in a Foreign Language: A Network Security Guide to Russia |
Kenneth Geers |
Presentation |
- |
| Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices |
Joe Grand |
Presentation |
- |
| The Art of Defiling: Defeating Forensic Analysis |
the Grugq |
Presentation |
- |
| Attacking Distributed Systems: The DNS Case Study |
Dan Kaminsky |
Presentation |
- |
| Mac OS X Kernel Insecurity |
Christian Klein, Ilja van Sprundel |
Presentation |
- |
| Database Rootkits |
Alexander Kornbrust |
Presentation |
- |
| Bluetooth Hacking - Full Disclosure |
Adam Laurie, Martin Herfurt, Marcel Holtmann |
Presentation |
Paper |
| SQL Injection and Data Mining Through Inference |
David Litchfield |
Presentation |
- |
| Google Hacking for Penetration Testers |
Johnny Long |
Presentation |
- |
| WLAN and Stealth Issues |
Laurent Oudot |
Presentation |
- |
| Revolutions in Web Server/Application Assessments |
Sensepost |
Presentation |
- |
| Defeating Automated Web Assessment Tools |
Saumil Shah |
Presentation |
- |
| Architectural Challenges in a Jericho World |
Paul Simmonds |
Presentation |
- |
| Owning Anti-Virus: Weaknesses in a Critical Security Component |
Alex Wheeler, Neel Mehta |
Presentation |
- |
| Automatically Detecting Web Application Vulnerabilities by Variable Flow Reconstruction |
Stefano Zanero |
Presentation |
- |