Пожалуйста, обратите внимание, что пользователь заблокирован
1. HSM Security and Exploitation of USB over SPI bug
2. Caught in the wild, past, present and future
3. Proxying to Kernel : Streaming vulnerabilities from the Windows Kernel
4. Pwning Blockchain for Fun and Profit: Exploiting an RCE Vulnerability in the Solana validator
5. Tales of a RCE in a video game
6. Unleashing a 0day: Pivoting Capabilities and Conquering the Linux Kernel
7. Utilizing Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel
8. What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core
9. Defense through Offense: Building a 1-click Calling Exploit targeting Messenger for Android
10. AMD Sinkclose: Universal Ring -2 Privilege Escalation
11. 0-click RCE on Tesla Model 3 through TPMS Sensors
12. Guest Revolution: Our Story of Compromising the Host Kernel from the VMware Guest
13. DMAKiller: Unleashing the Power of DMA to Escape from QEMU/KVM
14. Exploiting File Writes in Hardened Environments - From HTTP Request to ROP Chain in Node.js
15. 0-click RCE on the IVI component: Pwn2Own Automotive edition
Источник: https://www.hexacon.fr/conference/speakers/
2. Caught in the wild, past, present and future
3. Proxying to Kernel : Streaming vulnerabilities from the Windows Kernel
4. Pwning Blockchain for Fun and Profit: Exploiting an RCE Vulnerability in the Solana validator
5. Tales of a RCE in a video game
6. Unleashing a 0day: Pivoting Capabilities and Conquering the Linux Kernel
7. Utilizing Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel
8. What the hell is Windows's CLIP Service - Reversing and exploiting the obfuscated code at its core
9. Defense through Offense: Building a 1-click Calling Exploit targeting Messenger for Android
10. AMD Sinkclose: Universal Ring -2 Privilege Escalation
11. 0-click RCE on Tesla Model 3 through TPMS Sensors
12. Guest Revolution: Our Story of Compromising the Host Kernel from the VMware Guest
13. DMAKiller: Unleashing the Power of DMA to Escape from QEMU/KVM
14. Exploiting File Writes in Hardened Environments - From HTTP Request to ROP Chain in Node.js
15. 0-click RCE on the IVI component: Pwn2Own Automotive edition
Источник: https://www.hexacon.fr/conference/speakers/
Последнее редактирование: