Showing posts with label Sandbox. Show all posts
Showing posts with label Sandbox. Show all posts

Friday, April 14, 2017

Twitter Archive of 14/04/2017 Friday




1) Hacking Customer Information Control System : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T1%20-%20Ayoub%20Elaassal%20-%20Hacking%20Customer%20Information%20System.pdf (Slides)

2) The Secret of ChakraCore : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T2%20-%20Linan%20Hao%20and%20Long%20Liu%20-%20The%20Secret%20of%20ChakraCore.pdf (Slides) #HITB2017AMS

3) Harnessing Intel Processor Trace on Windows for Vulnerability Discovery :  http://conference.hitb.org/hitbsecconf2017ams/materials/D1T1%20-%20Richard%20Johnson%20-%20Harnessing%20Intel%20Processor%20Trace%20on%20Windows%20for%20Vulnerability%20Discovery.pdf (Slides) #HITB2017AMS

4) Drammer : TheMaking-Of : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T1%20-%20Victor%20van%20der%20Veen%20-%20Drammer%20The%20Making%20Of.pdf (Slides) #HITB2017AMS

5) FemtoCell Hacking - From Zero to 0-day ! : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T2%20-%20JeongHoon%20Shin%20-%20Femotcell%20Hacking.pdf (Slides) #HITB2017AMS

6) Can’t Touch This : Cloning Any Android HCE Contactless Card : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T2%20-%20Slawomir%20Jasek%20-%20Cloning%20Any%20Android%20HCE%20Contactless%20Card.pdf (Slides) #HITB2017AMS

7) Lure10 : Exploiting Windows Automatic Wireless Association Algorithm : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4%20-%20George%20Chatzisofroniou%20-%20Exploiting%20Windows%20Automatic%20Wireless%20Association%20Algorithm.pdf (Slides) #HITB2017AMS

8) iOS KPP/watchtower bypass : https://xerub.github.io/ios/kpp/2017/04/13/tick-tock.html

9) Meet & Greet with the Mac Malware Class of 2016 : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4%20-%20Patrick%20Wardle%20-%20Meet%20and%20Greet%20with%20the%20MacOS%20Malware%20Class%20of%202016.pdf (Slides) #HITB2017AMS

10) Pwning Banks : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4%20-%20Miika%20Turkia%20-%20Pwning%20Banks.pdf (Slides) #HITB2017AMS

11) So You Want to Hack Radios - A Primer on Wireless Reverse Engineering : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4%20-%20Marc%20Newlin%20and%20Matt%20Knight%20-%20So%20You%20Want%20to%20Hack%20Radios.pdf (Slides) #HITB2017AMS


12) Shadow-Box : The Practical and Omnipotent Sandbox : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T2%20-%20Seunghun%20Han%20-%20Shadow-Box%20-%20The%20Practical%20and%20Omnipotent%20Sandbox.pdf (Slides) #HITB2017AMS


13) Side Channel Attacks Against iOS Crypto Libraries and More :  http://conference.hitb.org/hitbsecconf2017ams/materials/D1T2%20-%20Najwa%20Aaraj%20-%20Side%20Channel%20Attacks%20Against%20iOS%20Crypto%20Libraries%20and%20More.pdf (Slides) #HITB2017AMS

14) Fault Injection Attacks on Secure Boot : http://conference.hitb.org/hitbsecconf2017ams/materials/D1T4%20-%20Niek%20Timmers%20and%20Albert%20Spruyt%20-%20Fault%20Injection%20Attacks%20On%20Secure%20Boot.pdf (Slides) #HITB2017AMS

15) Setting up a Shiny Development Environment within Linux on Windows 10 : https://www.hanselman.com/blog/SettingUpAShinyDevelopmentEnvironmentWithinLinuxOnWindows10.aspx