Material de la Defcon 20
Yeah! Material oficial de la Defcon 20 ya disponible: vídeos, audio, etc. Aquí tenéis la lista de lo que hay disponible en la web oficial:
- Welcome & Making the DEF CON 20 Badge - Slides Video m4b Audio
- DEF CON Documentary Trailer - Slides Video m4b Audio
- Before, During, and After - Slides Video m4b Audio
- Shared Values, Shared Responsibility - Slides Video m4b Audio
- Owning Bad Guys {And Mafia} With Javascript Botnets - PDF White Paper Slides Video m4b Audio
- The Darknet of Things, Building Sensor Networks That Do Your Bidding - PDF Slides Video m4b Audio
- Drones! - Slides Video m4b Audio
- PDF Extras Slides Video m4b Audio
- Blind XSS - PDF Slides Video m4b Audio
- Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated - Slides Video m4b Audio
- Cryptohaze Cloud Cracking - Slides Video m4b Audio
- Overwriting the Exception Handling Cache PointerDwarf Oriented Programming - PDF Slides Video m4b Audio
- Exploit Archaeology: Raiders of the Lost Payphones - PDF Slides Video m4b Audio
- Hardware Backdooring is Practical - PDF White Paper Slides Video m4b Audio
- DIY Electric Car - PDF Slides Video m4b Audio
- Tenacious Diggity: Skinny Dippin' in a Sea of Bing - Slides Video m4b Audio
- KinectasploitV2: Kinect Meets 20 Security Tools - PDF Slides Video m4b Audio
- Fuzzing Online Games - Slides Video m4b Audio
- The Open Cyber Challenge Platform - Slides Video m4b Audio
- Into the Droid: Gaining Access to Android User Data - PDF Slides Video m4b Audio
- Panel: Meet the Feds 1 - Law Enforcement - Slides Video m4b Audio
- Meet the Feds 2 - Policy - Slides Video m4b Audio
- SIGINT and Traffic Analysis for the Rest of Us - Slides Video m4b Audio
- Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing - PDF Slides Video m4b Audio
- Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement - PDF Slides Video m4b Audio
- Owning the Network: Adventures in Router Rootkits - PDF Slides Video m4b Audio
- World War 3.0: Chaos, Control & the Battle for the Net - PDF Slides Video m4b Audio
- Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole - PDF Slides Video m4b Audio
- Looking Into The Eye Of The Meter - PDF White Paper Slides Video m4b Audio
- SQL Injection to MIPS Overflows: Rooting SOHO Routers - PDF White Paper Extras Slides Video m4b Audio
- DC RECOGNIZE Awards - Slides Video m4b Audio
- Hacking Humanity: Human Augmentation and You - PDF Slides Video m4b Audio
- Connected Chaos: Evolving the DCG/Hackspace Communication Landscape - Slides Video m4b Audio
- Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit - PDF Extras Slides Video m4b Audio
- DivaShark - Monitor your Flow - Slides Video m4b Audio
- Beyond the War on General Purpose Computing: What's Inside the Box? - Slides Video m4b Audio
- Sploitego - Maltego's (Local) Partner in Crime - PDF Extras Slides Video m4b Audio
- Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting? - PDF Images Slides Video m4b Audio
- Post Metasploitation: Improving Accuracy and Efficiency in Post Exploitation Using the Metasploit Framework - Slides Video m4b Audio
- The Paparazzi Platform: Flexible, Open-Source, UAS Software and Hardware - PDF Slides Video m4b Audio
- Hacking the Google TV - PDF Slides Video m4b Audio
- Owned in 60 Seconds: From Network Guest to Windows Domain Admin - PDF Slides Video m4b Audio
- Hellaphone: Replacing the Java in Android - PDF Slides Video m4b Audio
- Hacking [Redacted] Routers - Slides Video m4b Audio
- Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network - PDF Extras Slides Video m4b Audio
- New Techniques in SQLi Obfuscation: SQL never before used in SQLi - PDF Slides Video m4b Audio
- Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol - PDF Slides Video m4b Audio
- Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions - PDF Slides Video m4b Audio
- The Art of Cyberwar - PDF Extras Slides Video m4b Audio
- More Projects of Prototype This! - PDF Slides Video m4b Audio
- Hacking Measured Boot and UEFI - PDF Slides Video m4b Audio
- Exchanging Demands - PDF Extras Slides Video m4b Audio
- Changing the Security Paradigm: Taking Back Your Network and Bringing Pain to the Adversary - Slides Video m4b Audio
- Busting the BARR: Tracking "Untrackable" Private Aircraft for Fun & Profit - Slides Video m4b Audio
- Crypto and the Cops: the Law of Key Disclosure and Forced Decryption - Slides Video m4b Audio
- Passive Bluetooth Monitoring in Scapy - PDF Extras Slides Video m4b Audio
- How to Hack All the Transport Networks of a Country - Slides Video m4b Audio
- Bigger Monster, Weaker Chains: The National Security Agency and the Constitution - Slides Video m4b Audio
- Black Ops - Slides Video m4b Audio
- Owning One to Rule Them All - Slides Video m4b Audio
- Detecting Reflective Injection - PDF Slides Video m4b Audio
- An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets - PDF Extras Slides Video m4b Audio
- No More Hooks: Detection of Code Integrity Attacks - PDF Slides Video m4b Audio
- DDoS Black and White "Kungfu" Revealed - PDF Slides Video m4b Audio
- NFC Hacking: The Easy Way - PDF Slides Video m4b Audio
- Robots: You're Doing It Wrong 2 - Slides Video m4b Audio
- Anonymous and the Online Fight for Justice - PDF Slides Video m4b Audio
- OPFOR 4Ever - PDF Slides Video m4b Audio
- Weaponizing the Windows API with Metasploit's Railgun - PDF Slides Video m4b Audio
- Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2 - Slides Video m4b Audio
- SCADA HMI and Microsoft Bob: Modern Authentication Flaws With a 90's Flavor - Slides Video m4b Audio
- Don't Stand So Close To Me: An Analysis of the NFC Attack Surface - PDF Slides Video m4b Audio
- How to Hack VMware vCenter Server in 60 Seconds - PDF Slides Video m4b Audio
- DEF CON Comedy Jam V, V for Vendetta - PDF Slides Video m4b Audio
- Cortana: Rise of the Automated Red Team - PDF Slides Video m4b Audio
- Making Sense of Static - New Tools for Hacking GPS - Slides Video m4b Audio
- SQL ReInjector - Automated Exfiltrated Data Identification - PDF Extras Slides Video m4b Audio
- Meet the EFF - Slides Video m4b Audio
- The End of the PSTN As You Know It - PDF Slides Video m4b Audio
- APK File Infection on an Android System - PDF Slides Video m4b Audio
- Panel: The Making of DEF CON 20 - Slides Video m4b Audio
- Adventures in Bouncerland -
- Anti-Forensics and Anti-Anti-Forensics: Attacks and Mitigating Techniques for Digital-Forensic Investigations - PDF Slides Video m4b Audio
- Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”) - Slides Video m4b Audio
- Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors - PDF Slides Video m4b Audio
- Bypassing Endpoint Security for $20 or Less - PDF Slides Video m4b Audio
- The Safety Dance - Wardriving the Public Safety Band - Slides Video m4b Audio
- Kevin Poulsen Answers Your Questions - Slides Video m4b Audio
- Q&A with the Men (and Women) in Black - Slides Video m4b Audio
- Hacker + Airplanes = No Good Can Come Of This - PDF Slides Video m4b Audio
- MegaUpload: Guilty or Not Guilty? - PDF Slides Video m4b Audio
- Stamp Out Hash Corruption! Crack All The Things! - PDF White paper Extras Slides Video m4b Audio
- Spy vs Spy: Spying on Mobile Device Spyware - PDF Slides Video m4b Audio
- Scylla: Because There's no Patch for Human Stupidity - White Paper Slides Video m4b Audio
- Bruce Schneier Answers Your Questions - Slides Video m4b Audio
- Programming Weird Machines with ELF Metadata - PDF Slides Video m4b Audio
- We Have You by the Gadgets - PDF Slides Video m4b Audio
- Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data - Slides Video m4b Audio
- Botnets Die Hard - Owned and Operated - PDF Slides Video m4b Audio
- How to Channel Your Inner Henry Rollins - PDF Slides Video m4b Audio
- Can Twitter Really Help Expose Psychopath Killers' Traits? - PDF Slides Video m4b Audio
- Attacking TPM Part 2: A Look at the ST19WP18 TPM Device - Slides Video m4b Audio
- Twenty Years Back, Twenty Years Ahead: The Arc of DEF CON Past and Future - Slides Video m4b Audio
- Off-Grid Communications with Android: Meshing the Mobile World - PDF White paper Slides Video m4b Audio
- Socialized Data: Using Social Media as a Cyber Mule - Slides Video m4b Audio
- Safes and Containers: Insecurity Design Excellence - PDF Slides Video m4b Audio
- Rapid Blind SQL Injection Exploitation with BBQSQL - PDF Extras Slides Video m4b Audio
- Subterfuge: The Automated Man-in-the-Middle Attack Framework - PDF White paper Slides Video m4b Audio
- Drinking From the Caffeine Firehose We Know as Shodan - PDF Slides Video m4b Audio
- The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet - Slides Video m4b Audio
- The Christopher Columbus Rule and DHS - Slides Video m4b Audio
- The Art Of The Con - Slides Video m4b Audio
- Improving Web Vulnerability Scanning - PDF Slides Video m4b Audio
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec