En el post "Presentaciones de HITBSECCONF2007 - Malasia" les publicamos los link para descargar las presentaciones y fotos del evento, en esta oportunidad les informamos que se encuentran disponibles los videos (via Torrent):
HITBSecConf2007 - Malaysia - Día 1.torrent
1.) Keynote Address 1: Honeypot Project
2.) Keynote Address 2: Online Crime and Crime Online
3.) State of SecurityAndrew Cushman
4.) Injecting RDS-TMC Traffic Information Signals - How to Freak Out Your Sat Nav System
5.) Hacking SCADA – How to 0wn Critical National Infrastructure
6.) Exploiting the Intranet With a Webpage - Is JavaScript the New Shellcode?
7.) Meta Anti Forensics: The HASH Hacking Harness
8.) Security: Past, Present and Future
9.) WabiSabiLabi - The Exploit Marketplace
10.) Advanced Web Application and Database Threat Analysis with MatriXay
11.) 360° Anomaly Based Intrusion Detection
12.) Insider Threat Visualization
HITBSecConf2007 - Malaysia - Día 2.torrent
1) Keynote Address 3: The Rise and Fall of Information Security in the Western World
2) Keynote Address 4: The Evolution of Hacking
3) Tools and Strategies for Securing a Large Development Project
4) Hacking the Bluetooth Stack for Fun, Fame and ProfitDino Covotsos.
5) Protocol FuzzingLuiz Eduardo (Senior Systems & Security Engineer, Mu Security)
6) Hacking Biometric SystemsStarbug (Independent Security Researcher)
7) Hacking Hardened and Secured Oracle Servers
8) Enterprise Hacking: Who Needs Exploit Codes?
9) An End-to-End Analysis of Securing Networked CCTV Systems
10) Slipping Past The Firewall
11) Attack Surface of Modern Applications
12) Googling for Malware and Bugs
13) The Computer Forensics Challenge and Anti-Forensics Techniques
14) Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise
HITBSecConf2007 - Malaysia - Día 1.torrent
1.) Keynote Address 1: Honeypot Project
2.) Keynote Address 2: Online Crime and Crime Online
3.) State of SecurityAndrew Cushman
4.) Injecting RDS-TMC Traffic Information Signals - How to Freak Out Your Sat Nav System
5.) Hacking SCADA – How to 0wn Critical National Infrastructure
6.) Exploiting the Intranet With a Webpage - Is JavaScript the New Shellcode?
7.) Meta Anti Forensics: The HASH Hacking Harness
8.) Security: Past, Present and Future
9.) WabiSabiLabi - The Exploit Marketplace
10.) Advanced Web Application and Database Threat Analysis with MatriXay
11.) 360° Anomaly Based Intrusion Detection
12.) Insider Threat Visualization
HITBSecConf2007 - Malaysia - Día 2.torrent
1) Keynote Address 3: The Rise and Fall of Information Security in the Western World
2) Keynote Address 4: The Evolution of Hacking
3) Tools and Strategies for Securing a Large Development Project
4) Hacking the Bluetooth Stack for Fun, Fame and ProfitDino Covotsos.
5) Protocol FuzzingLuiz Eduardo (Senior Systems & Security Engineer, Mu Security)
6) Hacking Biometric SystemsStarbug (Independent Security Researcher)
7) Hacking Hardened and Secured Oracle Servers
8) Enterprise Hacking: Who Needs Exploit Codes?
9) An End-to-End Analysis of Securing Networked CCTV Systems
10) Slipping Past The Firewall
11) Attack Surface of Modern Applications
12) Googling for Malware and Bugs
13) The Computer Forensics Challenge and Anti-Forensics Techniques
14) Hacking Ajax and Web Services – Next Generation Web Attacks on the Rise
All videos have been encoded in Quicktime. Please use Quicktime Player or VLC for playback. If you have trouble playing these files, please ensure you have the latest 3IVX codec.
No hay comentarios:
Publicar un comentario