Zero Nights 2019 (Russia) 作者: Hack Inn 时间: December 14, 2019 分类: 安全大会资料 访问: 3,048 次 ![logo](https://data.hackinn.com/ppt/ZeroNights2019/logo.jpeg "logo") > ZeroNights сохраняет свой фокус и тематическую направленность #### 1、[Advanced Binary Emulation framework](https://data.hackinn.com/ppt/ZeroNights2019/Advanced%20Binary%20Emulation%20framework.pdf) #### 2、[Oldschool way of hacking MicroDigital ip-cameras](https://data.hackinn.com/ppt/ZeroNights2019/Oldschool%20way%20of%20hacking%20MicroDigital%20ip-cameras.pdf) #### 3、[CiscoASA:From Zero to ID=0](https://data.hackinn.com/ppt/ZeroNights2019/CiscoASA:From%20Zero%20to%20ID=0.pdf) #### 4、[Fatal Fury on ESP32:Time to release Hardware Exploits](https://data.hackinn.com/ppt/ZeroNights2019/Fatal%20Fury%20on%20ESP32:Time%20to%20release%20Hardware%20Exploits.pdf) #### 5、[Single byte write to RCE:exploiting a bug in php-fpm](https://data.hackinn.com/ppt/ZeroNights2019/Single%20byte%20write%20to%20RCE:exploiting%20a%20bug%20in%20php-fpm.pdf) #### 6、[Two Bytes to Rule Adobe Reader Twice:The Black Magic Behind the Byte Order Mark](https://data.hackinn.com/ppt/ZeroNights2019/Two%20Bytes%20to%20Rule%20Adobe%20Reader%20Twice:The%20Black%20Magic%20Behind%20the%20Byte%20Order%20Mark.pdf) #### 7、[Trusted Types & the end of DOM XSS](https://data.hackinn.com/ppt/ZeroNights2019/Trusted%20Types%20&%20the%20end%20of%20DOM%20XSS.pdf) #### 8、[Launching feedback-driven fuzzing on TrustZone TEE](https://data.hackinn.com/ppt/ZeroNights2019/Launching%20feedback-driven%20fuzzing%20on%20TrustZone%20TEE.pdf) #### 9、[Hacking Medical Imaging with DICOM](https://data.hackinn.com/ppt/ZeroNights2019/Hacking%20Medical%20Imaging%20with%20DICOM.pdf) #### 10、[Electron,scheme handlers and stealthy security patches](https://data.hackinn.com/ppt/ZeroNights2019/Electron,scheme%20handlers%20and%20stealthy%20security%20patches.pdf) #### 11、[crauEmu - your IDE for code-reuse attacks](https://data.hackinn.com/ppt/ZeroNights2019/crauEmu%20-%20your%20IDE%20for%20code-reuse%20attacks.pdf) #### 12、[Practical LoRaWAN auditing and exploitation](https://data.hackinn.com/ppt/ZeroNights2019/Practical%20LoRaWAN%20auditing%20and%20exploitation.pdf) #### 13、[I PWN thee,I PWN thee not! ](https://data.hackinn.com/ppt/ZeroNights2019/I%20PWN%20thee,I%20PWN%20thee%20not!%20.pdf) #### 14、[Dark sides of Java remote protocols](https://data.hackinn.com/ppt/ZeroNights2019/Dark%20sides%20of%20Java%20remote%20protocols.pdf) #### 15、[Malign Machine Learning Models](https://data.hackinn.com/ppt/ZeroNights2019/Malign%20Machine%20Learning%20Models.pdf) ## CCCP ! #### Advanced Binary Emulation framework #### Trusted Types & the end of DOM XSS #### Launching feedback-driven fuzzing on TrustZone TEE #### Hacking Medical Imaging with DICOM #### Electron,scheme handlers and stealthy security patches #### crauEmu - your IDE for code-reuse attacks #### Practical LoRaWAN auditing and exploitation #### Malign Machine Learning Models `版权归大会主办方及演讲者所有,若有相关问题欢迎在下方留言或者发送邮件至管理员邮箱:aдмiн @ hackiнн·coм` 标签: none