HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Infiltrate 2011 report
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Infiltrate 2011 report  
> Access to the content HTML Beginning of the presentation
PDF PDF version [195598 KB]  
> Description Infiltrate 2011 report. The conference was organized by Immunity Inc, at Miami Beach.  
> Context & Dates Talk presented during OSSIR meeting, the 17th of april, on 16 April 2011.
 
> Author Guillaume Thiaux (Guillaume.Thiaux@hsc.fr) 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Planning
Ouverture de la conférence
Creating Strategic Surprise in Information Security
Rock'm Sock'm Robots - Exploiting the Android Attack Surface
Modern Heap Exploiation using the Low Fragmentation Heap
The Listening
State spaces and exploitation
How to FAIL at Fuzzing
Don't Give Credit: Hacking Arcade Machines
Bypassing Windows services protections
Modern Kernel Pool Exploitation: Attacks and Techniques
Infiltrating PHP
Attacking Webkit Heap
Fun with LDT: Fast and Generic Shellcode Detection
TBA Kernel Fun
Conclusion / Avis personnel  
> Related documents
themeAudit
[Service]  Audit & Assessment
[Presentation]  Feedback on RGS compliance [27 May 2011 - French]
[Presentation]  Feedback on security audits [1 April 2008 - French]
[Presentation]  Technicals Security Audits for BS7799 [24 May 2005 - French]
[Presentation]  Useful standards for network security [20 October 2003 - French]
[Presentation]  Audits, Assessments and Penetration Tests [22 January 2003 - French]
[Presentation]  Audits, Assessments and Penetration Tests [26 June 2002 - French]
[Presentation]  Network auditing [12 November 1997 - French]
[Presentation]  Tests and evaluation of Internet security solutions [30 May 1997 - French]
[Presentation]  Autohack [13 June 1995 - French]
[Presentation]  Satan [11 April 1995 - French]
themePenetration tests
[Service]  Vunerability assessment (TSAR)
[Service]  Penetration tests
[Course]  Web App Penetration Testing and Ethical Hacking SANS Security 542
[Course]  Ethical and Practical Hacking
[Course]  Network Penetration Testing and Ethical Hacking SANS Security 560

[Tool]  Delphes tool [Delphes extracts the usernames and passwords from Oracle file. - English]
[Presentation]  Penetration tests: Exposing real world attacks [9 February 2011 - French]
[Presentation]  27C3 report [8 February 2011 - French]
[Tool]  Webef tool [Bruteforcer of web server files and directories - English]
[Tool]  BlueBerry tool [BlueBerry is a tool that can be used to decrypt BlackBerry Administration Service passwords. - English]
[Presentation]  Webshells, or how to open your network's doors ? [21 October 2010 - French]
[Tool]  passe-partout tool [In-memory extraction of SSL private keys - English]
[Presentation]  Webshells, or how to open your network's doors ? [16 March 2010 - French]
[Presentation]  Webshells, real threat for information systems ? [1 December 2009 - French]
[Presentation]  Web Attacks with Smartphone [4 June 2009 - French]
[Presentation]  Security issue seen in enterprises web applications [27 November 2008 - French]
[Presentation]  Feedback on security audits [1 April 2008 - French]
[Tool]  WSPP tool [WSPP - English]
[Presentation]  Modern techniques of IP attacks [18 March 2003 - French]
[Presentation]  Audits, Assessments and Penetration Tests [22 January 2003 - French]
[Presentation]  Audits, Assessments and Penetration Tests [26 June 2002 - French]
[Tip]  Nmap's hidden option [27 December 2000 - French]
[Presentation]  Introduction to intrusion tests [17 March 1998 - French]
[Presentation]  Tests and evaluation of Internet security solutions [30 May 1997 - French]
[Presentation]  Intrusion tests [December 1996 - French]
> Copyright © 2011, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 31 May 2011 at 10:26:01 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants