Jump to content

Nytro

Administrators
  • Posts

    18725
  • Joined

  • Last visited

  • Days Won

    706

Everything posted by Nytro

  1. [h=1]Black Hat USA 2014 - Mobile: Researching Android Device Security with the Help of a Droid Army[/h]
  2. [h=1]Black Hat USA 2014 - Mobile: Mission mPOSsible[/h]
  3. [h=1]Black Hat USA 2014 - Mobile: Cellular Exploitation on a Global Scale The Rise & Fall of the Control[/h]
  4. [h=1]Black Hat USA 2014 - Malware: One Packer to Rule Them All Empirical Identification, Comparison[/h]
  5. [h=1]Black Hat USA 2014 - Malware: Exposing Bootkits with BIOS Emulation[/h]
  6. [h=1]Black Hat USA 2014 - Keynote: PWNIE Awards[/h]
  7. [h=1]Black Hat USA 2014 - Hardware: A Journey to Protect Points of Sale[/h]
  8. [h=1]Black Hat USA 2014 - Exploit: Write Once, Pwn Anywhere[/h]
  9. [h=1]Black Hat USA 2014 - Exploit: Thinking Outside the Sandbox Violating Trust Boundaries[/h]
  10. [h=1]Black Hat USA 2014 - Exploit: The Beast is in Your Mem Return Oriented Programming Attacks Against[/h]
  11. [h=1]Black Hat USA 2014 - Exploit: My Google Glass Sees Your Passwords![/h]
  12. [h=1]Black Hat USA 2014 - Exploit: Hacking the Wireless World with Software Defined Radio 2 0[/h]
  13. [h=1]Black Hat USA 2014 - Exploit: Extreme Privilege Escalation on Windows 8UEFI Systems[/h]
  14. [h=1]Black Hat USA 2014 - Exploit: Exploiting Unpatched iOS Vulnerabilities for Fun and Profit[/h]
  15. [h=1]Black Hat USA 2014 - Exploit: Digging for IE11 Sandbox Escapes[/h]
  16. [h=1]Black Hat USA 2014 - Exploit: Data Only Pwning Microsoft Windows Kernel Exploitation of Kernel Pool[/h]
  17. [h=1]Black Hat USA 2014 - Exploit: Bitcoin Transaction Malleability Theory in Practice[/h]
  18. [h=1]Black Hat USA 2014 - Exploit: Abusing Performance Optimization Weaknesses to Bypass ASLR[/h]
  19. [h=1]Black Hat USA 2014 - Enterprise: Point of Sale System Architecture and Security[/h]
  20. [h=1]Black Hat USA 2014 - Enterprise: Learn How to Ctrl Every Room at a Luxury Hotel Remotely The Dangers[/h]
  21. [h=1]Black Hat USA 2014 - Embedded: Pulling Back the Curtain on Airport Sec Can a Weapon Get Past TSA[/h]
  22. [h=1]Black Hat USA 2014 - Auditing: Fingerprinting Web App Platforms by Variations in PNG Implementation[/h]
  23. [h=1]Black Hat USA 2014 - Crypto: The BEAST Wins Again Why TLS Keeps Failing to Protect HTTP[/h]
  24. [h=1]Black Hat USA 2014 - Crypto: 48 Dirty Little Secrets Cryptographers Don’t Want You To Know[/h]
  25. [h=1]Black Hat USA 2014 - AppSec: The New Page of Injections Book Memcached Injections[/h]
×
×
  • Create New...