"Go ahead! Pwn that Apple!" - Youri van der Zwart and Cyril 'pod2g'
"Go ahead! Pwn that Apple!" - Youri van der Zwart and Cyril 'pod2g' "Go ahead! Pwn that Apple!" - Youri van der Zwart and Cyril 'pod2g'
View ArticleAnd what lekkertjes do we have for tea today?
And what lekkertjes do we have for tea today? And what lekkertjes do we have for tea today?
View Article... getting ready to grab Chilik Tamir after his talk before he gets swarmed...
... getting ready to grab Chilik Tamir after his talk before he gets swarmed by more media ... getting ready to grab Chilik Tamir after his talk before he gets swarmed by more media
View Article"It's tea time which means time for more interviews!" Mei 'I am the HITB...
"It's tea time which means time for more interviews!" Mei 'I am the HITB Media Overlord' Ling checking the master media schedule ... "It's tea time which means time for more interviews!" Mei 'I am the...
View ArticleChilik Tamir, Chief Scientist at AppSec Labs during his presentation
Chilik Tamir, Chief Scientist at AppSec Labs during his presentation Chilik Tamir, Chief Scientist at AppSec Labs during his presentation
View ArticleiNalyzer works by collecting all data from the application application and...
iNalyzer works by collecting all data from the application application and generates a Command & Control interface which provides a full testing environment to the application iNalyzer works by...
View ArticleIn our second iOS related talk, Chilik Tamir of AppSec Labs covered iNaylzer...
In our second iOS related talk, Chilik Tamir of AppSec Labs covered iNaylzer - his free and open-source tool for blackbox iOS application analysis In our second iOS related talk, Chilik Tamir of...
View Article... Artem Harutyunyan from Qualys
... Artem Harutyunyan from Qualys ... Artem Harutyunyan from Qualys
View ArticleA close up of Sergey Shekyan during his talk with ...
A close up of Sergey Shekyan during his talk with ... A close up of Sergey Shekyan during his talk with ...
View ArticleTheir research focused on the Foscam F18910W device for which they discovered...
Their research focused on the Foscam F18910W device for which they discovered an authentication bypass / privilege escalation vulnerability which they then coupled with Shodan in order to find...
View ArticleIn the second camera related talk, Sergey Shekyan and Artem Harutyunyan took...
In the second camera related talk, Sergey Shekyan and Artem Harutyunyan took a look at how to remotely access surveillance cameras and turn them into nefarious spying devices! In the second camera...
View Article"Lesson number 1 - If you practice insecure coding techniques, you're gonna...
"Lesson number 1 - If you practice insecure coding techniques, you're gonna get pwned" - Jim Manico "Lesson number 1 - If you practice insecure coding techniques, you're gonna get pwned" - Jim Manico
View ArticleJim covered various attack techniques that bypass even some of the most...
Jim covered various attack techniques that bypass even some of the most modern web applications and the defensive coding techniques to help counter them Jim covered various attack techniques that...
View ArticleWrapping up the HITB Labs for this year was none other than Jim Manico, VP of...
Wrapping up the HITB Labs for this year was none other than Jim Manico, VP of Security Architecture at Whitehat Security, who ran a 2 hour session on secure coding for web and mobile. Wrapping up the...
View ArticleA close up of George Noseevich, PhD candidate at Moscow State University...
A close up of George Noseevich, PhD candidate at Moscow State University during his talk with Dennis and Andrew A close up of George Noseevich, PhD candidate at Moscow State University during his talk...
View ArticleA close up of Dennis Gamayunov (Acting Head, Information Systems Security...
A close up of Dennis Gamayunov (Acting Head, Information Systems Security Lab, MSU) A close up of Dennis Gamayunov (Acting Head, Information Systems Security Lab, MSU)
View Article"We found a way to submit fully trusted requests from malicious clients to...
"We found a way to submit fully trusted requests from malicious clients to the banking server as if they were generated by a legitimate client" - Andrew Petukhov "We found a way to submit fully...
View ArticleNext door, Andrew Petukhov, George Noseevich and Dennis Gamayunov were...
Next door, Andrew Petukhov, George Noseevich and Dennis Gamayunov were breaking through certified crypto in banking apps Next door, Andrew Petukhov, George Noseevich and Dennis Gamayunov were breaking...
View ArticleWith a total of 8 vulnerabilities used in evasi0n, the Evad3rs discussed all...
With a total of 8 vulnerabilities used in evasi0n, the Evad3rs discussed all things iOS security related including payload injection, how userland code is triggered, untethered, and finally how the...
View Article.... and David 'planetbeing' Wang!
.... and David 'planetbeing' Wang! .... and David 'planetbeing' Wang!
View Article
More Pages to Explore .....