...

Presentation Archive

...
Thank you for visiting HackMiami’s Presentation Archive.
For Presentations that you missed or would like to view again, select the document below. Each file is presented in a convenient .pdf format. Check back often for updates on both new and old presentations. Thank you for your interest and


...
Whitepaper: Crypto-Ransomware, Defense and Countermeasures
HackMiami CryptoRansomeware WhitepaperResearchers from HackMiami have authored a whitepaper in an effort to combat the growing trend of cryptographic ransomware infections affecting businesses and consumers. The publication is intended as a guide for the analysis, decryption, open_pdfand disinfection of devices that have been impacted by the latest variants of cryptographic ransomware.


...
Whitepaper: Analysis of the Cryptocurrency Marketplace
An overview of the technical, economic, and social impact of cryptocurrencies such as Bitcoin and Litecoin by: Alexander Heid
HackMiami Cryptocurrency WhitepaperThis document will go into a comprehensive level of detail about cryptocurrency technologies and protocols, as this is required to familiarize the reader with the principles behind the rapidly emerging open source economic ecosystem. open_pdfFurthermore, emerging attack vectors of cryptocurrencies will be discussed, such as custom malware campaigns and targeted exploitation.


...
Whitepaper: HackMiami Web Application Scanner 2013 PwnOff
An Analysis of Automated Web Application Scanning Suites Presented by: James Ball, Alexander Heid, and Rod Soto
P0wn off 2013This document is an analysis of the performance of five common web application scanners, which were put against three different types of web applications. The document will provide as an evaluation of the web application scanner suites from application to the completion of the scan, and will rate the suites on multiple criteria. The Web Application PwnOff was a live event that took place at the HackMiami 2013 Hackers Conference in Miami Beach Florida. There were three target web applications, one PHP based, one JSP based and one .NET based. open_pdfThe scans consisted of a single pre-authentication scan, and a single post-authentication scan against each user level.