REPOSITORY

Os materiais dos eventos anteriores estao disponiveis no GitHub / The materials from past editions are all available on GitHub



Os videos dos eventos anteriores estao disponiveis no YouTube / The videos from past editions are all available on YouTube


Palestras H2HC Tenth Edition - 2013

TALK TITLE
BR
ENG
Video
Automated Exploitation Grand Challenge
Julien Vanegue
Automative Hacking
Chris Valasek & Charlie Miller
Keynote 1
FX
Keynote 2
Charlie Miller
Lula Project
Fernando Merces
Sandboxing is the shit
Jonathan Brossard
Scanning in Low Earth Orbit
Travis Goodspeed
Using Online Activity as Digital DNA
Espinhara & Albuquerque


Palestras H2HC Ninth Edition - 2012

TALK TITLE
BR
ENG
Video


Palestras H2HC Eighth Edition - 2011

TALK TITLE
BR
ENG
Video
Analyzing the attack surface of kernel registry filters
Matthieu Suiche
Anatomy of a Remote Kernel Exploit
Dan Rosenberg
Control Flow Analysis
Edgar Barbosa
How to take over the TOR network operationally
Eric Filiol
"I Know Kung-Fu!": Analyzing Mobile Malware
Alex Kirk
Some Research Directions in Automated Pentesting
Carlos Sarraute
The Science of Insecurity
Len Sassaman


Palestras H2HC Seventh Edition - 2010

TALK TITLE
BR
ENG
Video
Aindar quer tc?
Jordan Bonagura
Blue Screen of Death is Dead
Matthieu Suiche
Detecting Obfuscated Malicious JavaScript with Snort and Razorback
Alex Kirk
Finding bugs and publishing advisories – the Core Security way
Carlos Sarraute
Generic exploitation of invalid memory writes
Jonathan Brossard
Hacking the Fast Lane: security issues in 802.11p, DSRC and WAVE
Bruno Oliveira & Rob Havelt
HTML5 Seguro ou Inseguro?
Wagner Elias
Malicious Cryptography Techniques for Unreversable (malicious or not) binaries
Eric Filiol
Realidade das BotNets Atuais
Ranieri Romera
Sandboxes Uncovered: Desmistificando sistemas de análise de malware
Dario Filho
Strategies for Envolving Threats
Andrew Chusman
The EDB Project
Fernando Mercês
Urgente: Hackers causaram a erupção do vulcão Eyjafjallajokull
Anchises de Paula


Palestras H2HC Sixth Edition - 2009

TALK TITLE
BR
ENG
Video
Abusing bitmask
Nicolas Waisman
Anti Anti Forense: Correlacao
Tony Rodrigues
Breaking the perimeter through human stupidity
Bruno Oliveira
Bruteforcing HD Encryption Systems
Jonathan Brossard
Ciber Terrorismo, Hacktivismo religioso
Paulo Roizman
Kernel Do Windows: Historia, Evolucao e Debug
Weber Ress
Life Cycle of a Snort Rule: From Vulnerability to Coverage
Alex Kirk
Netifera platform demo
Juliano Rizzo
Playing Web Fuzzer
Wagner Elias
Privacidade na era da internet
Anderson Ramos
Probabilistic Attack Planning in Network + WebApps Scenarios
Carlos Sarraute
Ring 0x64
Gustavo Scotti
Taint Analysis
Edgar Barbosa
The departed: exploit next generation. The philosophy.
Nelson Brito
The Reverse Engineering Intermediate Language REIL and its Applications
Sebastian Porst
Token Kidnapping's Revenge
Cesar Cerrudo
Toward the HLR, attacking the SS7 & SIGTRAN applications one step further and mapping the phone system
Philippe Langlois
w3af. A framework to own the web
Andres Riancho


Palestras H2HC Fifth Edition - 2008

PALESTRA
BR
ENG
Video
PCI Rootkits
Bruno Cardoso Lopes / João Batista Correa
 
Hypervisor Framework
Edgar Barbosa
 
Analise de Seguranca do Protocolo Wireless USB
Felipe Zimmerle
   
evilgrade, "You have pending upgrades..."
Francisco Amato
 
Raising GPRS Security Awareness by Observing Real World Security Events
Guto Motta
   
Practical (Introduction to) Reverse Engineering
Julio Auto
   
Apology of 0days
Nicolas Waisman
 
Defeating DEP, the Immunity Debugger way
Pablo Sole
   
Hack into Samba
Rodrigo Costa
 
Onde estão as ferramentas de segurança do Brasil?
Ronaldo Vasconcelos
 
Secure the Planet! New Strategic Initiatives from Microsoft to Rock Your World
Steve Adegbite
 
Extreme Web Hacking
Wagner Elias
 
Playing with Web Application Firewalls
Wendel G. Henrique / Sandro Gauci
 


Palestras H2HC Fourth Edition - 2007

PALESTRA
BR
ENG
Call for papers The Bug Magazine
The Bug Magazine Staff
 
Capture the flag - Results
Intruders Tiger Team
 
Hacking well-protected databases
Alexander Kornbrust
 
Detecting Blue Pill
Edgar Barbosa
 
The Computer Forensics Challenge and Anti-forensics Techniques
Domingo Montanaro
 
Hacking iPod Touch/iPhone
Marcos Azevedo
 
Malwares x AntiVirus
Wendel Guglielmetti Henrique
 
Next-Generation Debuggers for Reverse Engineering
Julio Auto - Member of ERESI Team
 
DNS Amplification Attack
Bruno Goncalves de Oliveira
 
PE Binary Infection
Maycon Maia Vitali
 
Hack into apache
Rodrigo Carvalho Costa
 
REST Insecurity
Wagner Elias
 
Hacking the big brother
Joao Batista Moreira & Julio Cesar Fort
 
KIDS - Kernel Intrusion Detection System
Rodrigo Rubira Branco (BSDaemon)
 


Palestras H2HC Third Edition - 2006

PALESTRA
BR
ENG
Syscall Proxying || Pivoting
Rodrigo Rubira Branco (BSDaemon) / Filipe Balestra
 
Process Infection
Carlos Barros
 

Windows Driver Development Kit (Driver exploitation)
Rodrigo Carvalho Costa (Nibble)

 
Lock picking
Eduardo Madeira Fleury / Artur Duque de Souza
 
Introducao a Engenharia Reversa
Maycon Maia Vitali
 
VOIP Insecurity
Luiz Eduardo
 
Polutin sys_execve
Federico Kirschbaum
 
Old School Hacking
Julio Cesar Fort
 
Inseguranca em Web 2.0 e Pen-test em Aplicações Web
Wagner Elias e Thiago Zaninotti - N-Stalker
   
Hostile Wireless Ambients
Luiz Eduardo
 
Rootkits kernel 2.6
Julio Auto
 
Bricando com IPS: Uma maneira mais simples de contorná-los
Anônimo
   
Shellcode Evolution
Itzik Kotler
 


Palestras H2HC Second Edition - 2005

PALESTRA
BR
ENG
Fun With Assembly
Everson da Silva Tavares (IP_FIX)
 
Backdoors x Firewalls de Aplicação: Praticando em Kernel Linux
Rodrigo Rubira Branco (BSDaemon)
 
Discovering Vulnerabilities
Rodrigo Carvalho Costa (Nibble)
 
Breaking PaX ASLR in the Wild
Tiago Assumpção
 
Anti-Forensics
Domingo Montanaro
 
Dog_Crawler x PHP_GUARD do Saumil Shah
Bruno Luiz Cordeiro Ramos
 
Linux Kernel Exploiting
Glaudson Ocampos (Nash Leon)
Wendel Guglielmetti Henrique (dum_dum)
 
Vulnerabilidades em aplicações bluetooth
Nelson Murilo
 
Windows DLL instrumentation + feedback fuzzing + code breaking
Joachim de Zutter (Byte Rage)
 
Hacktivismo
Fernanda Serpa
Sem material Sem material


Palestras H2HC First Edition - 2004

PALESTRA
BR
ENG
Ataques em redes Wi-Fi
Nelson Murilo de Oliveira Rufino
Detecção e ataques a HoneyPots
Felix Alvez Coutinho Júnior (Skynet45)
OSSTMM - Open Source Security Testing Methodology Manual
Eduardo Jorge Feres Serrano Neves
Cryptography and Clusters
Rodrigo Carvalho Costa (Nibble)
 
Assinaturas de Ataques: Como Livrar-se Delas
Rodrigo Rubira Branco (BSDaemon)

 

 

 ORGANIZATION

 

 

 GOLD SPONSORS

 

 

 

 HACKING

 

 

 SUPPORTING ORGANIZATIONS