The ever popular Web Application Attacks and Defense
In TT3, Shreeraj Shah and Hemil Shah ran their super popular Advanced Application Hacking ... In TT3, Shreeraj Shah and Hemil Shah ran their super popular Advanced Application Hacking ...
View ArticleASLR, DEP
Jonathan covered all the latest exploitation techniques, including ret2libc, ROP, heap sparying, stack canaries ... Jonathan covered all the latest exploitation techniques, including ret2libc, ROP,...
View Article"When you leave here, you will be a Linux pwnstar"
"When you leave here, you will be a Linux pwnstar" "When you leave here, you will be a Linux pwnstar"
View Article"So you want to pwn Linux boxes"
In TT2, Jonathan Broassard of Toucan Systems conducted his Advanced Linux Exploitation training which is more of a mini CTF / wargame! Kick ass. In TT2, Jonathan Broassard of Toucan Systems conducted...
View ArticleIt's that HITB time again - Now at an all new hotel with 2 Michelin Star...
Sitting in the all new, all fresh, #HITB2012AMS Speakers Lounge getting ready for the pre-event briefing Sitting in the all new, all fresh, #HITB2012AMS Speakers Lounge getting ready for the pre-event...
View Article"Hmmmm - So how can we make the network more 'fun'"
L-R: 404, Belinda The Conference Overlord and Prabu (missing in action since 2009) L-R: 404, Belinda The Conference Overlord and Prabu (missing in action since 2009)
View Article"Show us your kungf00"
One of the new 1-day training courses on wireless security conducted by Vivek Ramachandran, Founder of SecurityTube One of the new 1-day training courses on wireless security conducted by Vivek...
View Article"Everybody be cool we haz a network team!"
L33tdawg speaking with AK-47 about the awesome network set up for #HITB2012AMS - Over 20+ wireless access points and 7 DSLs for uplink! \o/ L33tdawg speaking with AK-47 about the awesome network set...
View Article"So where did my packet just disappear to?"
L33tdawg taking a look at the source of all routing L33tdawg taking a look at the source of all routing
View ArticleWe like injecting things
One of the new 1-day training courses - The Art of Exploiting SQL Injection Flaws by Sumit 'Sid' Siddharth One of the new 1-day training courses - The Art of Exploiting SQL Injection Flaws by Sumit...
View Article
More Pages to Explore .....