hitbsecconf2022sin

D1 COMMSEC - API Security Through External Attack Surface Management - Phillip Wylie.pdf

2022-08-25 09:00

7.7M

D1 COMMSEC - Building an Army of Bots by Hijacking a Unicorn’s Twitter Handle - Rahul Sasi & Vishal Singh.pdf

2022-08-26 01:45

10M

D1 COMMSEC - Faking at Level 1 - How Digital Twins Save Your PLCs - Thomas Weber.pdf

2022-08-26 01:37

3.5M

D1 COMMSEC - Fuzzing the MCU of Connected Vehicles for Security and Safety - Hao Chen.pdf

2022-08-25 08:53

1.0M

D1 COMMSEC - ICEFALL – Revisiting a Decade of OT Insecure-by-Design Practices - Jos Wetzels.pdf

2022-08-25 08:53

6.0M

D1 COMMSEC - MPT - Pentest In Action - Jyoti Raval.pdf

2022-08-25 08:53

656K

D1T1 - Attacking WPA3 - New Vulnerabilities and Exploit Framework - Mathy Vanhoef.pdf

2022-08-25 08:53

1.0M

D1T1 - Breaking Web3 - Exploitation Techniques for Cryptocurrency Hacking - David Pethes.pdf

2022-08-26 01:47

3.6M

D1T1 - EDR Evasion Primer for Red Teamers - Karsten Nohl & Jorge Gimenez.pdf

2022-08-29 08:30

2.3M

D1T1 - Erybody Gettin TIPC - Demystifying Remote Linux Kernel Exploitation - Sam Page.pdf

2022-08-25 08:53

5.6M

D1T1 - One-Click to Completely Takeover a MacOS Device - Mickey Jin.pdf

2022-08-26 01:36

4.6M

D1T1 - Settlers of Netlink - Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE - Aaron Adams.pdf

2022-08-25 08:53

2.1M

D2 COMMESC - Biometrics System Hacking in the Age of the Smart Vehicle - Kevin Chen & Li Siwei.pdf

2022-08-26 04:36

7.8M

D2 COMMSEC - Best Practices For Simulating Execution in Malicious Text Detection - Shuo Wang & Yi Sun.pdf

2022-08-26 03:30

1.9M

D2 COMMSEC - Can a Fuzzer Match a Human - Bhargava Shastry.pdf

2022-08-26 09:15

450K

D2 COMMSEC - Cracking Kyocera Printers - Yue Liu, Minghang Shen & Juyang Gao.pdf

2022-08-26 03:44

6.1M

D2 COMMSEC - Exploiting Race Condition Vulnerabilities in Web Applications - Javan Rasokat.pdf

2022-08-27 03:45

3.8M

D2 COMMSEC - Getting Clear Text Passwords from an IdP & More - Our Research Methodology - Gal Diskin.pdf

2022-08-26 09:16

2.9M

D2 COMMSEC - Web3 + Scams = It’s a Match - Zoltan Balazs.pdf

2022-08-26 05:47

1.8M

D2T1 - Browser Hacking with ANGLE - Jeonghoon Shin.pdf

2022-08-26 09:21

927K

D2T1 - Scripts-behavioral ML Classification Using Windows 10 AMSI-instrumentation - Ankit Garg.pdf

2022-08-26 09:19

3.0M

D2T1 - Suborner - Windows Bribery for Invisible Persistence - Sebastian Castro.pdf

2022-08-27 03:45

2.3M

D2T1 - The Ransomware Protection Full Of Holes - Soya Aoyama.pdf

2022-08-26 09:24

4.3M

D2T1 - Unlocking KeeLoq -A Reverse Engineering Story - Rogan Dawes.pdf

2022-08-26 03:40

2.3M

KEYNOTE 1 - A Random Walk through a Few Million Things - Chris Rouland.pdf

2022-08-26 04:09

12M

KEYNOTE 2 - Adventures in Security Research - Runa Sandvik.pdf

2022-08-26 03:06

3.9M