2013年4月3日 星期三

Black Hat Conference : Other


Web Application
2012 USA : HACKING WITH WEBSOCKETS
2012 USA : HTML5 TOP 10 THREATS – STEALTH ATTACKS AND SILENT EXPLOITS

Reverse Engineering
2012 USA : LESSONS OF BINARY ANALYSIS
2012 USA : LINUX INTERACTIVE EXPLOIT DEVELOPMENT WITH GDB AND PEDA
2012 Europe : Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis

Othera
2012 USA : OWNING BAD GUYS {AND MAFIA} WITH JAVASCRIPT BOTNETS
2012 USA : PRNG: PWNING RANDOM NUMBER GENERATORS (IN PHP APPLICATIONS)
2012 USA : STATE OF WEB EXPLOIT TOOLKITS
2013 Europe : HARNESSING GP2US - BUILDING BETTER BROWSER BASED BOTNETS
2013 Europe : ASSESSING BYOD WITH THE SMARTPHONE PENTEST FRAMEWORK
2012 ABU DHABI :  THE ART OF CYBERWAR
2012 ABU DHABI :  CYBERCRIME KILL CHAIN VS. EFFECTIVENESS OF DEFENSE LAYERS

沒有留言:

張貼留言