Blackhat

Results: 880



#Item
141

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:52
    142Software bugs / Buffer overflow / Open Source Vulnerability Database / Computer security / Computer memory / Morris worm / Memory corruption / Vulnerability / Computer worm / Blackhat

    Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 14:53:12
    143

    Post Exploitation in Hardened PHP Environments

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:49
      144

      Attacks on uninitialized local variables Halvar Flake – Head of Research SABRE Security GmbH Black Hat Federal 2006

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:51:35
        145

        BREAK OUT OF THE TRUMAN SHOW ACTIVE DETECTION AND ESCAPE OF DYNAMIC BINARY INSTRUMENTATION Ke Sun Xiaoning Li

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2016-04-03 06:53:57
          146Computing / Software / Template engines / Scripting languages / SQL / Java enterprise platform / Cross-site scripting / Hacking / Web template system / FreeMarker / Apache Velocity / SQL injection

          Server-Side Template Injection: RCE for the modern webapp James Kettle - - @albinowax Abstract Template engines are widely used by web applications to present dynamic data via web pages and e

          Add to Reading List

          Source URL: www.blackhat.com

          Language: English - Date: 2015-08-05 21:02:05
          147

          Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken () November 12, 2015 Full disk encryption is a defensive measure in which all data stored on a physical disk or volume

          Add to Reading List

          Source URL: www.blackhat.com

          Language: English - Date: 2015-11-13 10:32:33
            148Software / Computing / Hacking / Cross-site scripting / Froala Editor / HTML editor / TinyMCE / Online rich-text editor / WYSIWYG / CKEditor / JavaScript / Content Security Policy

            Revisiting XSS Sanitization Ashar Javed Chair for Network and Data Security Horst G¨ ortz Institute for IT-Security, Ruhr-University Bochum

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2015-05-28 15:50:55
            149

            Implementing and Detecting a PCI Rootkit John Heasman [] Black Hat DC 2007 An NGSSoftware Insight Security Research (NISR) Publication ©2006 Next Generation Security Software Ltd

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2015-05-28 15:51:25
              150

              Hardware Backdooring is practical Jonathan Brossard (Toucan System) Download the full whitepaper

              Add to Reading List

              Source URL: media.blackhat.com

              Language: English - Date: 2012-08-16 12:47:52
                UPDATE