CONFidence 11

28-29 may 2013

Wodociągi Kraków





Mariusz Sawczuk, Jochen Belke Invisible attacks – visible in your network. How to see and follow the tracks? Video
Ilja van Sprundel Linux Desktop Insecurity Video
Nguyen Anh Quynh Opticode: machine code deobfuscation for malware analysts Video
Yaniv Miron, MC Ph0k 0-days, We Will Pwn U with Hardware Mofos Video
Gynvael Coldwind,Mateusz “j00ru” Jurczyk Beyond MOV ADD XOR – the unusual and unexpected in x86 Video
Robert Lipovsky The “Facebook PokerAgent” Video
Georgia Weidman Can You Hear Me Now: Leveraging Mobile Devices on Pentests Video
Nikita Tarakanov Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel Video
Arseny Reutov PHP Object Injection revisted Video
Julian Bangert, Sergey Bratus ELF Eccentricities Video
Grzegorz Niemirowski Podatności aplikacji desktopowych Video
Devesh Bhatt My Experiments with truth: a different route to bug hunting Video
Gaweł Mikołajczyk Networking Security Treasures Video
Rebecca Bx Shapiro,Julian Bangert, Sergey Bratus Any Input Is a Program: Weird Machines in ABI and architecture metadata Video
Felix “fx” Lindner, Gregor Kopf Cisco in the Sky with Diamonds Video
Fernando Gont Network Reconnaissance in IPv6 Networks Video
Jesse Burns Securing Data in Mobile Application Suites Video
Meredith L. Patterson LANGSEC 2011-2016 Video
Michał Sajdak Embedded Devices Hacking Video
Adam ‘pi3′ Zabrocki Crashdumps: hunt 0days and rootkits Video
Dmitriy Chastuchin Breaking, Forensicating and Anti-Forensicating SAP Portal and J2EE Engine Video
Yury Chemerkin Insecurities in blackberry Video
Marek Zmysłowski Testy penetracyjne – 7 grzechów głównych PDF