REPOSITÓRIO
Os materiais e vídeos das edições anteriores dos nossos eventos estão agora disponíveis para download e streaming no GitHub e YouTube. Você pode baixá-los seguindo os links.
Título da palestra |
Autor |
Download |
Vídeo |
Bypassing Trusted Boot thru microcode downgrade
(H2HC)
|
Alexander Ermolov |
|
|
Launching feedback-driven fuzzing
(H2HC)
|
Andrey Akimov |
|
|
Embedded Research & Automation
(H2HC)
|
Brian Butterly |
|
|
Deconstructing the phishing campaigns that target Gmail users
(H2HC)
|
Bursztein & Oliveira |
|
|
Modern Heap Exploitation The Poison NULL byte
(H2HC)
|
Daniel Medina |
|
|
Keynote Thinking Outside the Box
(H2HC)
|
Dino Dai Zovi |
|
|
Keynote OSS Security, here be dragons!
(H2HC)
|
Fermin Serna |
|
|
Network Reconnaissance Adventures in IPv6 Land
(H2HC)
|
Fernando Gont |
|
|
Crash Analysis with Reverse Taint
(H2HC)
|
Marek Zmyslowski |
|
|
Oh Memset Where Did You Go
(H2HC)
|
Marion Marschalek |
|
|
Trashing like its 1999
(H2HC)
|
Matias Soler |
|
|
Under Pressure
(H2HC)
|
Raz & Einhorn |
|
|
Finding format strings with and in binary ninja
(H2HC)
|
Vasco Franco |
|
|
Machete 9 Years of Cyber Espionage
(H2HC)
|
Veronica Valeros |
|
|
Raspy on Aircraft
(H2HC University)
|
Bordini & Diego |
|
|
Windows Objects Exploitation
(H2HC University)
|
Bruno Oliveira |
|
|
Construindo Bootkits
(H2HC University)
|
Joao Victorino |
|
|
Anti-Tamper em Maquinas de Cartao
(H2HC University)
|
Julio Della Flora |
|
|
Como Detectar uma Bomba Atomica
(H2HC University)
|
Lucas Ferreira |
|
|
Dissecting a Linux Kernel Exploit - QEMU Demo Capture
(H2HC University)
|
Scotti & Hamasaki |
|
|
Dissecting a Linux Kernel Exploit
(H2HC University)
|
Scotti & Hamasaki |
|
|
Keynote Securing Cyber-Physical Systems
(H2HC University)
|
Stefano Zanero |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Sonic Attacks to Spinning HDs
(H2HC)
|
Alfredo Ortega |
|
|
Embedded Fuzzing
(H2HC)
|
Anh Quynh & Lau |
|
|
SMAPwn
(H2HC)
|
Artem Shishkin |
|
|
DSL Dismantling Secret Layers
(H2HC)
|
Brian Butterly |
|
|
Hacking the International RFQ
(H2HC)
|
Dino Covotsos |
|
|
Constraint Solvers for Reverse Engineering
(H2HC)
|
Edgar Barbosa |
|
|
Visualization
(H2HC)
|
Edmond Rogers |
|
|
Evoting from Argentina to the World
(H2HC)
|
Ivan Oro |
|
|
Keynote
(H2HC)
|
Jayson Street |
|
|
Attacking VMware NSX
(H2HC)
|
Luft & Harrie |
|
|
GCC is the New Pink
(H2HC)
|
Marion Marschalek |
|
|
Kernel Rootkits
(H2HC)
|
Matveychikov & f0rb1dd3 |
|
|
All the Tiny Features
(H2HC)
|
Natalie Silvanovich |
|
|
Abusando da Virtualizacao
(H2HC University)
|
Gabriel Barbosa |
|
|
Cracking Craptcha
(H2HC University)
|
Gustavo Scotti |
|
|
A little bit about Code Injection in Web App Frameworks
(H2HC University)
|
Joao Matos |
|
|
Fault Injection Attacks
(H2HC University)
|
Julio Della Flora |
|
|
SegDSP
(H2HC University)
|
Lucas Teske |
|
|
Cyber Mercenaries
(H2HC University)
|
MIchelle Ribeiro |
|
|
Internet of Sh1t
(H2HC University)
|
Maycon Vitali |
|
|
Splitter Paper & Slides
(H2HC University)
|
Rener Silva |
|
|
The path towards automated heap exploitation
(H2HC University)
|
Thais Moreira Hamasaki |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Betraying the BIOS
(H2HC)
|
Alex Matrosov |
|
|
Attacking Cellular Devices
(H2HC)
|
Butterly & Schmidt |
|
|
UEFI BIOS Holes
(H2HC)
|
Ermolov & Zakirov |
|
|
Hackig Smart Home Devices
(H2HC)
|
Fernando Gont |
|
|
50 Shades of VisualStudio
(H2HC)
|
Marion Marschalek |
|
|
Medical Records Black Market
(H2HC)
|
Matias Katz |
|
|
Porosity
(H2HC)
|
Matt Suiche |
|
|
Pentesting DevOps Environments
(H2HC)
|
Matthias Luft |
|
|
Keynote Notes
(H2HC)
|
Mike Ossmann |
|
|
Bioinformatics in SP
(H2HC)
|
Nina Alli |
|
|
Software Attacks on Different Type of System Firmware
(H2HC)
|
Oleksandr Bazhaniuk |
|
|
Content Security Policy
(H2HC)
|
Sergey Shekyan |
|
|
Keynote
(H2HC)
|
Shay Gueron |
|
|
Chris & Daniel-Badge H2HC
(H2HC)
|
University |
|
|
Leave Crypto Alone
(H2HC University)
|
Diego Aranha |
|
|
Data Mining Using Tracing and Profiling Tools
(H2HC University)
|
Francisco Junior |
|
|
Introdução à Virtualização
(H2HC University)
|
Gabriel Negreira Barbosa |
|
|
IA para Web Attacks
(H2HC University)
|
Glaudson Ocampos |
|
|
ParasiteOS
(H2HC University)
|
Gustavo Scotti |
|
|
Overview of Deserialization Vulns in the Java VM
(H2HC University)
|
Joao Figueiredo |
|
|
Cripto HW com FPGA
(H2HC University)
|
Luckas Farias |
|
|
Keynote
(H2HC University)
|
Nelson Brito |
|
|
Firmware is the new Black
(H2HC University)
|
Rodrigo Branco |
|
|
SMT Solvers
(H2HC University)
|
Thais Hamasaki |
|
|
Hacking Ultrasound Machines
(H2HC University)
|
Victor Pasknel |
|
|
PenTest Evolution and Tricks
(H2HC University)
|
Ygor Parreira |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Risk-based design for
|
Evenchik & Zanero |
|
|
Android Resiliency Defense Strategy
|
Felipe Boeira |
|
|
The intersection between virtualization and security
|
Gabriel Barbosa |
|
|
Voting Among Sharks
|
Guasch & Choliz |
|
|
Introduction to the Witchcraft Compiler Collection
|
Jonathan Brossard |
|
|
Lost your secure HDD PIN, We can help
|
Lenoir & Rigo |
|
|
Rogue Behavior Detection
|
Marion Marschalek |
|
|
UEFI Firmware Rootkits Myths and Reality
|
Matrosov & Rodionov |
|
|
Dumbster Driving
|
Schmidt & Butterly |
|
|
Keynote
|
Shay Gueron |
|
|
Breaking the bank
|
Thiago Valverde |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Título da palestra |
Autor |
Download |
Vídeo |
Título da palestra |
Autor |
Download |
Vídeo |
Título da palestra |
Autor |
Download |
Vídeo |
Título da palestra |
Autor |
Download |
Vídeo |
I know Kung-Fu - Analyzing Mobile Malware
|
Alex Kirk |
|
|
Some Research Directions in Automated Pentesting
|
Carlos Sarraute |
|
|
Anatomy of a Remote Kernel Exploit
|
Dan Rosenberg |
|
|
Control Flow Analysis
|
Edgar Barbosa |
|
|
How to take over the TOR network operationally
|
Eric Filiol |
|
|
The Science of Insecurity
|
Len Sassman |
|
|
Analyzing the attack surface of kernel registry files
|
Matthieu Suiche |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Detecting Obfuscated Malicious JavaScript with Snort and Razorback
|
Alex Kirk |
|
|
Urgente - Hackers causaram a eruopcao do vulcao Eyjafjallajokull
|
Anchises de Paula |
|
|
Strategies for Evolving Threats
|
Andrew Cushman |
|
|
Finding bugs and publishing advisories - the Core Security way
|
Carlos Sarraute |
|
|
Sandboxes Uncovered - Desmistificando sistemas de analise de malware
|
Dario Filho |
|
|
Malicious Cryptography Techniques for Unreversable binaries
|
Eric Filiol |
|
|
The EDB Project
|
Fernando Merces |
|
|
Generic exploitation of invalid memory writes
|
Jonathan Brossard |
|
|
Ainda quer tc
|
Jordan Bonagura |
|
|
Blue Screen of Death is Dead
|
Matthieu Suiche |
|
|
Hacking the Fast Lane - security issues in 802
|
Oliveira & Havelt |
|
|
Realidade das Botnets Atuais
|
Ranieri Romera |
|
|
HTML5 Seguro ou Inseguro
|
Wagner Elias |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Life Cycle of a Snort Rule - From Vulnerability to Coverage
|
Alex Kirk |
|
|
Privacidade na era da internet
|
Anderson Ramos |
|
|
w3af
|
Andres Riancho |
|
|
Breaking the perimeter through human stupidity
|
Bruno Oliveira |
|
|
Probabilistic Attack Planning in Network + Webapps Scenarios
|
Carlos Sarraute |
|
|
Token Kidnapping's Revenge
|
Cesar Cerrudo |
|
|
Taint Analysis
|
Edgar Barbosa |
|
|
Ring 0x64
|
Gustavo Scotti |
|
|
Brute-forcing HD Encryption Systems
|
Jonathan Brossard |
|
|
Netifera platform demo
|
Juliano Rizzo |
|
|
The Departed Exploit Next Generation
|
Nelson Brito |
|
|
The Departed Exploit Next Generation
|
Nelson Brito |
|
|
Abusing Bitmask
|
Nicolas Waisman |
|
|
Ciber-Terrorismo, Hacktivismo religioso
|
Paulo Roizman |
|
|
Toward the HLR, attacking the SS7 & SIGTRAN
|
Philippe Langlois |
|
|
The Reverse Engineering Intermediate Language REIL and its Applications
|
Sebastian Porst |
|
|
Anti-Anti-Forense
|
Tony Rodrigues |
|
|
Playing Web Fuzzer
|
Wagner Elias |
|
|
Kernel do Windows - Historia, Evolucao e Debug
|
Weber Ress |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Hypervisor Framework
|
Edgar Barbosa |
|
|
Analise de Seguranca do Protocolo Wireless USB
|
Felipe Zimmerle |
|
|
Raising GPRS Security Awareness by Observing Real World Security
|
Guto Motta |
|
|
Playing with Web Application Firewalls
|
Henrique & Gauci |
|
|
Practical Introduction to Reverse Engineering
|
Julio Auto |
|
|
PCI Rootkits
|
Lopes & Correa |
|
|
Apology of 0days
|
Nicolas Waisman |
|
|
Defeating DEP, the Immunity Debugger way
|
Pablo Sole |
|
|
Hacking into Samba
|
Rodrigo Costa |
|
|
Onde estao as ferramentas de seguranca do Brasil
|
Ronaldo Vasconcelos |
|
|
Secure The Planet! New Strategic Initiatives from Microsoft to Rock your World
|
Steve Adegbite |
|
|
Extreme Web Hacking
|
Wagner Elias |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Hacking well-protected databases
|
Alexander Kornbrust |
|
|
DNS Amplification Attack
|
Bruno Oliveira |
|
|
The Computer Forensics Challenge and Anti-Forensics Techniques
|
Domingo Montanaro |
|
|
Detecting Blue Pill
|
Edgar Barbosa |
|
|
Capture the Flag Results
|
Intruders Tiger Team |
|
|
Next-Generation Debuggers for Reverse Engineering
|
Julio Auto |
|
|
Hacking iPod Touch & iPhone
|
Marcos Azevedo |
|
|
PE Binary Infection
|
Maycon Vitali |
|
|
Hacking the big brother
|
Moreira & Fort |
|
|
KIDS - Kernel Intrusion Detection System
|
Rodrigo Branco |
|
|
Hacking into Apache
|
Rodrigo Costa |
|
|
Call for Papers
|
The Bug Magazine |
|
|
REST Insecurity
|
Wagner Elias |
|
|
Malwares x AntiVirus
|
Wendel Henrique |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Syscall Proxying or Pivoting
|
Balestra & Branco |
|
|
Process Infection
|
Carlos Barros |
|
|
Polutin sys_execve
|
Federico Kirschbaum |
|
|
Lock Picking
|
Fleury & Souza |
|
|
Shellcode Evolution
|
Itzik Kotler |
|
|
Rootkits kernel 2
|
Julio Auto |
|
|
Rootkits kernel 2
|
Julio Auto |
|
|
Old School Hacking
|
Julio Cesar Fort |
|
|
Hostile Wireless Ambients
|
Luiz Eduardo |
|
|
VoIP Insecurity
|
Luiz Eduardo |
|
|
Introducao a Engenharia Reversa
|
Maycon Vitali |
|
|
Windows Driver Development Kit (Driver Exploitation)
|
Rodrigo Costa |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
Dog Crawler x PHP_GUARD
|
Bruno Ramos |
|
|
Anti-Forensics
|
Domingo Montanaro |
|
|
Fun with Assembly
|
Everson Tavares |
|
|
Linux Kernel Exploiting
|
Nash & dum_dum |
|
|
Vulnerabilidades em Aplicacoes Bluetooth
|
Nelson Rufino |
|
|
Backdoors x Firewalls de Applicacao - Praticando em Kernel Linux
|
Rodrigo Branco |
|
|
Discovering Vulnerabilities
|
Rodrigo Costa |
|
|
Breaking PaX ASLR in the Wild
|
Tiago Assumpcao |
|
|
Título da palestra |
Autor |
Download |
Vídeo |
OSSTMM-br
|
Eduardo Neves |
|
|
OSSTMM-en
|
Eduardo Neves |
|
|
Deteccao e Ataques a HoneyPots-br
|
Felix Junior |
|
|
Deteccao e Ataques a HoneyPots-en
|
Felix Junior |
|
|
Ataques em redes Wi-Fi-br
|
Nelson Rufino |
|
|
Ataques em redes Wi-Fi-en
|
Nelson Rufino |
|
|
Assinaturas de Ataques-br
|
Rodrigo Branco |
|
|
Assinaturas de Ataques-en
|
Rodrigo Branco |
|
|
Cryptography and Clusters-br
|
Rodrigo Costa |
|
|
Cryptography and Clusters-en
|
Rodrigo Costa |
|
|