Blackhat

Results: 880



#Item
821Design of experiments / Random number generation / Buffer overflow / Randomization / Computing / Scientific method / Statistics / Randomness / Address space layout randomization / Software bugs

Bypassing ASLR by predicting a process’ randomization Hagen Fritsch January 23nd, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
822Hats / Clothing / Culture

a u g u s t 2 – 7, [removed]m a n d a l ay b ay | l a s v e g a s , n v w w w. b l a c k h at. c o m MOVE TO MANDALAY BAY OFFERS MORE OPPORTUNITES FOR ENGAGEMENT

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:03
823Internet culture / Hats / Black hat / Hacking

BHEU_1411066_SalesHighlights-v5.indd

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:01
824Design / Visual arts / Communication / Advertising / Communication design / Graphic design

SPONSOR PROSPECTUS 2013 DELEGATE SNAPSHOT • • •

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:09
825Electronic engineering / IEEE 802.11 / Network access / Multiplexing / Beacon frame / Service set / Wireless LAN / Station / ANT / Wireless networking / Technology / Wireless

Yes it is too Wi-Fi, and No its not Inherently Secure Rob Havelt March 27, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
826Internet protocols / Internet standards / Routing protocols / Border Gateway Protocol / Network protocols / Router / Virtual Private LAN Service / Virtual private network / Cisco IOS / Network architecture / Computing / Internet

All Your Packets Are Belong to Us ‒ Attacking Backbone Technologies Classification: Version:

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
827Espionage / Veracode / Backdoor / Rootkit / Computer worm / Chris Wysopal / Spyware / InterBase / Extended Copy Protection / System software / Software / Malware

Detecting "Certified Pre-owned" Software and Devices Chris Wysopal April 17, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
828Computing / Computer network security / Hacking / Application security / Penetration test / Security testing / Vulnerability / Cross-site scripting / Threat model / Computer security / Cyberwarfare / Software testing

Microsoft Word - Blackhat-Whitepaper-JonMiller.doc

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
829Windows shell / Software / Computing / Shellcode / Portable Executable / Microsoft Windows

Windows Shellcode Mastery BlackHat Europe 2009 Benjamin CAILLAT ESIEA - SI&S lab

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
830Relational database management systems / Database management systems / Query languages / SQL / SQL injection / Microsoft SQL Server / Stored procedure / Insert / Select / Data management / Computing / Software

Advanced SQL injection to operating system full control Bernardo Damele Assumpção Guimarães [removed] April 10, 2009

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
UPDATE