Presentaciones de DEF CON 21
Ya estás disponibles las presentaciones (diapositivas y algún material extra) de la DEF CON 21. Todavía no están todas, pero aquí tenéis la lista de las disponibles en estos momentos:
- Business logic flaws in mobile operators services - PDF White Paper
- Fear the Evil FOCA: IPv6 attacks in Internet connections - PDF
- Suicide Risk Assessment and Intervention Tactics - PDF Extras
- Combatting Mac OSX/iOS Malware with Data Visualization - PDF White Paper
- MITM All The IPv6 Things - PDF
- PowerPwning: Post-Exploiting By Overpowering PowerShell - PDF Extras
- Transcending Cloud Limitations by Obtaining Inner Piece - PDF Extras
- Data Evaporation from SSDs - PDF
- Evil DoS Attacks and Strong Defenses - PDF
- RFID Hacking: Live Free or RFID Hard - PDF Extras
- OTP, It won't save you from free rides! - PDF White Paper Extras
- Conducting massive attacks with open source distributed computing - PDF
- Offensive Forensics: CSI for the Bad Guy - PDF Extras
- Utilizing Popular Websites for Malicious Purposes Using RDI - PDF
- Abusing NoSQL Databases - PDF
- Legal Aspects of Full Spectrum Computer Network (Active) Defense - PDF
- Blucat: Netcat For Bluetooth - Extras
- Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices - PDF White Paper Extras
- Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!) - PDF
- Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions - PDF White Paper
- How to Disclose or Sell an Exploit Without Getting in Trouble - PDF
- I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell - PDF
- Privacy In DSRC Connected Vehicles - PDF
- Pwn'ing You(r) Cyber Offenders - PDF
- Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO) - PDF White Paper Extras
- Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot - PDF
- gitDigger: Creating useful wordlists from public GitHub repositories - PDF
- 10000 Yen into the Sea - PDF Extras
- Defeating SEAndroid - PDF
- The Politics of Privacy and Technology: Fighting an Uphill Battle - PDF
- Java Every-Days: Exploiting Software Running on 3 Billion Devices - PDF White Paper
- JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces - PDF Extras
- Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust - PDF
- So You Think Your Domain Controller is Secure? - PDF
- Phantom Network Surveillance UAV / Drone - PDF
- The Bluetooth Device Database - PDF Extras
- Dude, WTF in my car? - PDF
- Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned - PDF
- Torturing Open Government Systems for Fun, Profit and Time Travel - PDF
- The Secret Life of SIM Cards - PDF
- Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock - PDF Extras
- GoPro or GTFO: A Tale of Reversing an Embedded System - PDF
- A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading - PDF Extras
- Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices - PDF White Paper Extras
- Getting The Goods With smbexec - PDF
- PowerPreter: Post Exploitation Like a Boss - PDF Extras
- Kill 'em All — DDoS Protection Total Annihilation! - PDF White Paper Extras
- Please Insert Inject More Coins - PDF
- Stalking a City for Fun and Frivolity - PDF
- Fast Forensics Using Simple Statistics and Cool Tools - PDF Extras
- VoIP Wars: Return of the SIP - PDF Extras
- Exploiting Music Streaming with JavaScript - PDF Extras
- ACL Steganography - Permissions to Hide Your Porn - PDF Extras
- Doing Bad Things to 'Good' Security Appliances - PDF
- Let's screw with nmap - PDF Extras
- Defending Networks with Incomplete Information: A Machine Learning Approach - PDF White Paper
- We are Legion: Pentesting with an Army of Low-power Low-cost Devices - PDF Extras
- The Road Less Surreptitiously Traveled - PDF Extras
- Hacker Law School - PDF1 PDF2 PDF3 PDF4
- Defense by numbers: Making problems for script kiddies and scanner monkeys - PDF
- Forensic Fails - Shift + Delete won't help you here - PDF
- The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies - PDF
- Building an Android IDS on Network Level - PDF
- Safety of the Tor network: a look at network diversity, relay operators, and malicious relays - PDF
- How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers - PDF
- Examining the Bitsquatting Attack Surface - White Paper
- Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks - PDF
- Making Of The DEF CON Documentary - PDF
- All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio - PDF
- A Password is Not Enough: Why disk encryption is broken and how we might fix it - PDF
- EMET 4.0 PKI Mitigation - PDF
- BYO-Disaster and Why Corporate Wireless Security Still Sucks - PDF
- Evolving Exploits Through Genetic Algorithms - PDF
- How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles - PDF White Paper Extras
- Collaborative Penetration Testing With Lair - PDF
- DNS May Be Hazardous to Your Health - PDF
- Predicting Susceptibility to Social Bots on Twitter - PDF
- EDS: Exploitation Detection System - PDF White Paper
- The Government and UFOs: A Historical Analysis by Richard Thieme - PDF Extras
- BoutiqueKit: Playing WarGames with expensive rootkits and malware - PDF
- C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood - PDF
- Insecurity - A Failure of Imagination - PDF
- HTTP Time Bandit - PDF
- BYOD PEAP Show - PDF
- Android WebLogin: Google's Skeleton Key - PDF Extras
- Hacking Driverless Vehicles - PDF
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec