REPOSITORY
The materials and videos from the previous editions of our events are now available for download and streaming on GitHub and YouTube. You can download them by clicking on the links.
Talk Title |
Author |
Download |
Video |
Bypassing Trusted Boot thru microcode downgrade
(H2HC)
|
Alexander Ermolov |
|
|
Launching feedback-driven fuzzing
(H2HC)
|
Andrey Akimov |
|
|
Embedded Research & Automation
(H2HC)
|
Brian Butterly |
|
|
Deconstructing the phishing campaigns that target Gmail users
(H2HC)
|
Bursztein & Oliveira |
|
|
Modern Heap Exploitation The Poison NULL byte
(H2HC)
|
Daniel Medina |
|
|
Keynote Thinking Outside the Box
(H2HC)
|
Dino Dai Zovi |
|
|
Keynote OSS Security, here be dragons!
(H2HC)
|
Fermin Serna |
|
|
Network Reconnaissance Adventures in IPv6 Land
(H2HC)
|
Fernando Gont |
|
|
Crash Analysis with Reverse Taint
(H2HC)
|
Marek Zmyslowski |
|
|
Oh Memset Where Did You Go
(H2HC)
|
Marion Marschalek |
|
|
Trashing like its 1999
(H2HC)
|
Matias Soler |
|
|
Under Pressure
(H2HC)
|
Raz & Einhorn |
|
|
Finding format strings with and in binary ninja
(H2HC)
|
Vasco Franco |
|
|
Machete 9 Years of Cyber Espionage
(H2HC)
|
Veronica Valeros |
|
|
Raspy on Aircraft
(H2HC University)
|
Bordini & Diego |
|
|
Windows Objects Exploitation
(H2HC University)
|
Bruno Oliveira |
|
|
Construindo Bootkits
(H2HC University)
|
Joao Victorino |
|
|
Anti-Tamper em Maquinas de Cartao
(H2HC University)
|
Julio Della Flora |
|
|
Como Detectar uma Bomba Atomica
(H2HC University)
|
Lucas Ferreira |
|
|
Dissecting a Linux Kernel Exploit - QEMU Demo Capture
(H2HC University)
|
Scotti & Hamasaki |
|
|
Dissecting a Linux Kernel Exploit
(H2HC University)
|
Scotti & Hamasaki |
|
|
Keynote Securing Cyber-Physical Systems
(H2HC University)
|
Stefano Zanero |
|
|
Talk Title |
Author |
Download |
Video |
Sonic Attacks to Spinning HDs
(H2HC)
|
Alfredo Ortega |
|
|
Embedded Fuzzing
(H2HC)
|
Anh Quynh & Lau |
|
|
SMAPwn
(H2HC)
|
Artem Shishkin |
|
|
DSL Dismantling Secret Layers
(H2HC)
|
Brian Butterly |
|
|
Hacking the International RFQ
(H2HC)
|
Dino Covotsos |
|
|
Constraint Solvers for Reverse Engineering
(H2HC)
|
Edgar Barbosa |
|
|
Visualization
(H2HC)
|
Edmond Rogers |
|
|
Evoting from Argentina to the World
(H2HC)
|
Ivan Oro |
|
|
Keynote
(H2HC)
|
Jayson Street |
|
|
Attacking VMware NSX
(H2HC)
|
Luft & Harrie |
|
|
GCC is the New Pink
(H2HC)
|
Marion Marschalek |
|
|
Kernel Rootkits
(H2HC)
|
Matveychikov & f0rb1dd3 |
|
|
All the Tiny Features
(H2HC)
|
Natalie Silvanovich |
|
|
Abusando da Virtualizacao
(H2HC University)
|
Gabriel Barbosa |
|
|
Cracking Craptcha
(H2HC University)
|
Gustavo Scotti |
|
|
A little bit about Code Injection in Web App Frameworks
(H2HC University)
|
Joao Matos |
|
|
Fault Injection Attacks
(H2HC University)
|
Julio Della Flora |
|
|
SegDSP
(H2HC University)
|
Lucas Teske |
|
|
Cyber Mercenaries
(H2HC University)
|
MIchelle Ribeiro |
|
|
Internet of Sh1t
(H2HC University)
|
Maycon Vitali |
|
|
Splitter Paper & Slides
(H2HC University)
|
Rener Silva |
|
|
The path towards automated heap exploitation
(H2HC University)
|
Thais Moreira Hamasaki |
|
|
Talk Title |
Author |
Download |
Video |
Betraying the BIOS
(H2HC)
|
Alex Matrosov |
|
|
Attacking Cellular Devices
(H2HC)
|
Butterly & Schmidt |
|
|
UEFI BIOS Holes
(H2HC)
|
Ermolov & Zakirov |
|
|
Hackig Smart Home Devices
(H2HC)
|
Fernando Gont |
|
|
50 Shades of VisualStudio
(H2HC)
|
Marion Marschalek |
|
|
Medical Records Black Market
(H2HC)
|
Matias Katz |
|
|
Porosity
(H2HC)
|
Matt Suiche |
|
|
Pentesting DevOps Environments
(H2HC)
|
Matthias Luft |
|
|
Keynote Notes
(H2HC)
|
Mike Ossmann |
|
|
Bioinformatics in SP
(H2HC)
|
Nina Alli |
|
|
Software Attacks on Different Type of System Firmware
(H2HC)
|
Oleksandr Bazhaniuk |
|
|
Content Security Policy
(H2HC)
|
Sergey Shekyan |
|
|
Keynote
(H2HC)
|
Shay Gueron |
|
|
Chris & Daniel-Badge H2HC
(H2HC)
|
University |
|
|
Leave Crypto Alone
(H2HC University)
|
Diego Aranha |
|
|
Data Mining Using Tracing and Profiling Tools
(H2HC University)
|
Francisco Junior |
|
|
Introdução à Virtualização
(H2HC University)
|
Gabriel Negreira Barbosa |
|
|
IA para Web Attacks
(H2HC University)
|
Glaudson Ocampos |
|
|
ParasiteOS
(H2HC University)
|
Gustavo Scotti |
|
|
Overview of Deserialization Vulns in the Java VM
(H2HC University)
|
Joao Figueiredo |
|
|
Cripto HW com FPGA
(H2HC University)
|
Luckas Farias |
|
|
Keynote
(H2HC University)
|
Nelson Brito |
|
|
Firmware is the new Black
(H2HC University)
|
Rodrigo Branco |
|
|
SMT Solvers
(H2HC University)
|
Thais Hamasaki |
|
|
Hacking Ultrasound Machines
(H2HC University)
|
Victor Pasknel |
|
|
PenTest Evolution and Tricks
(H2HC University)
|
Ygor Parreira |
|
|
Talk Title |
Author |
Download |
Video |
Risk-based design for
|
Evenchik & Zanero |
|
|
Android Resiliency Defense Strategy
|
Felipe Boeira |
|
|
The intersection between virtualization and security
|
Gabriel Barbosa |
|
|
Voting Among Sharks
|
Guasch & Choliz |
|
|
Introduction to the Witchcraft Compiler Collection
|
Jonathan Brossard |
|
|
Lost your secure HDD PIN, We can help
|
Lenoir & Rigo |
|
|
Rogue Behavior Detection
|
Marion Marschalek |
|
|
UEFI Firmware Rootkits Myths and Reality
|
Matrosov & Rodionov |
|
|
Dumbster Driving
|
Schmidt & Butterly |
|
|
Keynote
|
Shay Gueron |
|
|
Breaking the bank
|
Thiago Valverde |
|
|
Talk Title |
Author |
Download |
Video |
Talk Title |
Author |
Download |
Video |
Talk Title |
Author |
Download |
Video |
Talk Title |
Author |
Download |
Video |
Talk Title |
Author |
Download |
Video |
I know Kung-Fu - Analyzing Mobile Malware
|
Alex Kirk |
|
|
Some Research Directions in Automated Pentesting
|
Carlos Sarraute |
|
|
Anatomy of a Remote Kernel Exploit
|
Dan Rosenberg |
|
|
Control Flow Analysis
|
Edgar Barbosa |
|
|
How to take over the TOR network operationally
|
Eric Filiol |
|
|
The Science of Insecurity
|
Len Sassman |
|
|
Analyzing the attack surface of kernel registry files
|
Matthieu Suiche |
|
|
Talk Title |
Author |
Download |
Video |
Detecting Obfuscated Malicious JavaScript with Snort and Razorback
|
Alex Kirk |
|
|
Urgente - Hackers causaram a eruopcao do vulcao Eyjafjallajokull
|
Anchises de Paula |
|
|
Strategies for Evolving Threats
|
Andrew Cushman |
|
|
Finding bugs and publishing advisories - the Core Security way
|
Carlos Sarraute |
|
|
Sandboxes Uncovered - Desmistificando sistemas de analise de malware
|
Dario Filho |
|
|
Malicious Cryptography Techniques for Unreversable binaries
|
Eric Filiol |
|
|
The EDB Project
|
Fernando Merces |
|
|
Generic exploitation of invalid memory writes
|
Jonathan Brossard |
|
|
Ainda quer tc
|
Jordan Bonagura |
|
|
Blue Screen of Death is Dead
|
Matthieu Suiche |
|
|
Hacking the Fast Lane - security issues in 802
|
Oliveira & Havelt |
|
|
Realidade das Botnets Atuais
|
Ranieri Romera |
|
|
HTML5 Seguro ou Inseguro
|
Wagner Elias |
|
|
Talk Title |
Author |
Download |
Video |
Life Cycle of a Snort Rule - From Vulnerability to Coverage
|
Alex Kirk |
|
|
Privacidade na era da internet
|
Anderson Ramos |
|
|
w3af
|
Andres Riancho |
|
|
Breaking the perimeter through human stupidity
|
Bruno Oliveira |
|
|
Probabilistic Attack Planning in Network + Webapps Scenarios
|
Carlos Sarraute |
|
|
Token Kidnapping's Revenge
|
Cesar Cerrudo |
|
|
Taint Analysis
|
Edgar Barbosa |
|
|
Ring 0x64
|
Gustavo Scotti |
|
|
Brute-forcing HD Encryption Systems
|
Jonathan Brossard |
|
|
Netifera platform demo
|
Juliano Rizzo |
|
|
The Departed Exploit Next Generation
|
Nelson Brito |
|
|
The Departed Exploit Next Generation
|
Nelson Brito |
|
|
Abusing Bitmask
|
Nicolas Waisman |
|
|
Ciber-Terrorismo, Hacktivismo religioso
|
Paulo Roizman |
|
|
Toward the HLR, attacking the SS7 & SIGTRAN
|
Philippe Langlois |
|
|
The Reverse Engineering Intermediate Language REIL and its Applications
|
Sebastian Porst |
|
|
Anti-Anti-Forense
|
Tony Rodrigues |
|
|
Playing Web Fuzzer
|
Wagner Elias |
|
|
Kernel do Windows - Historia, Evolucao e Debug
|
Weber Ress |
|
|
Talk Title |
Author |
Download |
Video |
Hypervisor Framework
|
Edgar Barbosa |
|
|
Analise de Seguranca do Protocolo Wireless USB
|
Felipe Zimmerle |
|
|
Raising GPRS Security Awareness by Observing Real World Security
|
Guto Motta |
|
|
Playing with Web Application Firewalls
|
Henrique & Gauci |
|
|
Practical Introduction to Reverse Engineering
|
Julio Auto |
|
|
PCI Rootkits
|
Lopes & Correa |
|
|
Apology of 0days
|
Nicolas Waisman |
|
|
Defeating DEP, the Immunity Debugger way
|
Pablo Sole |
|
|
Hacking into Samba
|
Rodrigo Costa |
|
|
Onde estao as ferramentas de seguranca do Brasil
|
Ronaldo Vasconcelos |
|
|
Secure The Planet! New Strategic Initiatives from Microsoft to Rock your World
|
Steve Adegbite |
|
|
Extreme Web Hacking
|
Wagner Elias |
|
|
Talk Title |
Author |
Download |
Video |
Hacking well-protected databases
|
Alexander Kornbrust |
|
|
DNS Amplification Attack
|
Bruno Oliveira |
|
|
The Computer Forensics Challenge and Anti-Forensics Techniques
|
Domingo Montanaro |
|
|
Detecting Blue Pill
|
Edgar Barbosa |
|
|
Capture the Flag Results
|
Intruders Tiger Team |
|
|
Next-Generation Debuggers for Reverse Engineering
|
Julio Auto |
|
|
Hacking iPod Touch & iPhone
|
Marcos Azevedo |
|
|
PE Binary Infection
|
Maycon Vitali |
|
|
Hacking the big brother
|
Moreira & Fort |
|
|
KIDS - Kernel Intrusion Detection System
|
Rodrigo Branco |
|
|
Hacking into Apache
|
Rodrigo Costa |
|
|
Call for Papers
|
The Bug Magazine |
|
|
REST Insecurity
|
Wagner Elias |
|
|
Malwares x AntiVirus
|
Wendel Henrique |
|
|
Talk Title |
Author |
Download |
Video |
Syscall Proxying or Pivoting
|
Balestra & Branco |
|
|
Process Infection
|
Carlos Barros |
|
|
Polutin sys_execve
|
Federico Kirschbaum |
|
|
Lock Picking
|
Fleury & Souza |
|
|
Shellcode Evolution
|
Itzik Kotler |
|
|
Rootkits kernel 2
|
Julio Auto |
|
|
Rootkits kernel 2
|
Julio Auto |
|
|
Old School Hacking
|
Julio Cesar Fort |
|
|
Hostile Wireless Ambients
|
Luiz Eduardo |
|
|
VoIP Insecurity
|
Luiz Eduardo |
|
|
Introducao a Engenharia Reversa
|
Maycon Vitali |
|
|
Windows Driver Development Kit (Driver Exploitation)
|
Rodrigo Costa |
|
|
Talk Title |
Author |
Download |
Video |
Dog Crawler x PHP_GUARD
|
Bruno Ramos |
|
|
Anti-Forensics
|
Domingo Montanaro |
|
|
Fun with Assembly
|
Everson Tavares |
|
|
Linux Kernel Exploiting
|
Nash & dum_dum |
|
|
Vulnerabilidades em Aplicacoes Bluetooth
|
Nelson Rufino |
|
|
Backdoors x Firewalls de Applicacao - Praticando em Kernel Linux
|
Rodrigo Branco |
|
|
Discovering Vulnerabilities
|
Rodrigo Costa |
|
|
Breaking PaX ASLR in the Wild
|
Tiago Assumpcao |
|
|
Talk Title |
Author |
Download |
Video |
OSSTMM-br
|
Eduardo Neves |
|
|
OSSTMM-en
|
Eduardo Neves |
|
|
Deteccao e Ataques a HoneyPots-br
|
Felix Junior |
|
|
Deteccao e Ataques a HoneyPots-en
|
Felix Junior |
|
|
Ataques em redes Wi-Fi-br
|
Nelson Rufino |
|
|
Ataques em redes Wi-Fi-en
|
Nelson Rufino |
|
|
Assinaturas de Ataques-br
|
Rodrigo Branco |
|
|
Assinaturas de Ataques-en
|
Rodrigo Branco |
|
|
Cryptography and Clusters-br
|
Rodrigo Costa |
|
|
Cryptography and Clusters-en
|
Rodrigo Costa |
|
|