Vídeos de la Black Hat USA 2013
Pues eso, más
vídeos, estos son los de la pasada Black Hat celebrada en las Vegas:
- Spy-jacking the Booters
- Hacking, Surveiling, and Deceiving Victims on Smart TV
- Tribute to Barnaby Jack
- Stepping p3wns: Adventures in Full Spectrum Embedded Exploitation
- The Factoring Dead: Preparing for Cyptopocalypse
- Mactans: Injecting Malware Into iOS Devices via Malicious Chargers
- Let's Get Physical: Breaking Home Security Systems and Bypassing Building Controls
- Million Browser Botnet
- Evading Deep Inspection for Fun and Shell
- Exploiting Network Surveillance Cameras Like a Hollywood Hacker
- Owning the Routing Table - Part II
- How to Build a SpyPhone
- What's on the Wire? - Physical Layer Tapping with Project Daisho
- Just-In-Time Code Reuse: The More Things Change, the More They Stay the Same
- BIOS Security
- TOR... ALL-THE-THINGS!
- Truncating TLS Connections to Violate Beliefs in Web Applications
- Rooting SIM Cards
- Fully Arbitrary 802.3 Packet Injection: Maximizing Ethernet Attack Surface
- Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
- Funderbolt: Adventures in Thunderbolt DMA Attacks
- RFID Hacking: Live Free or RFID Hard
- Home Invasion v2.0 - Attacking Network-Controlled Hardware
- Beyond the Application: Cellular Privacy Regulatory Space
- Legal Considerations for Cellular Research
- A Tale of One Software Bypass of Windows 8 Secure Boot
- I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning...
- Buying into the Bias: Why Vulnerability Statistics Suck
- How CVSS is DOSsing Your Patching Policy (and wasting your money)
- Bluetooth Smart: The Good, the Bad, the Ugly, and the Fix!
- UART THOU MAD?
- Press ROOT to Continue: Detecting OSX and Windows Bootkits with RDFU
- SSL, Gone in 30 Seconds - A BREACH beyond CRIME
- Multiplexed Wired Attack Surfaces
- Java Every-Days: Exploiting Software Running on Three Billion Devices
- TLS 'SECRETS'
- Lawful Access Panel
- Clickjacking Revisted: A Perceptual View of UI Security
- OPSEC Failures of Spies
- Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory
- Honey, I'm Home!! - Hacking Z-Wave Home Automation Systems
- Android: One Root to Own them All
- Abusing Web APIs Through Scripted Android Applications
- Big Data for Web Application Security
- Dissecting CSRF Attacks and Countermeasures
- Above My Pay Grade: Cyber Response at the National Level
- Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort
- Teridian SoC Exploitation: Exploration of Harvard Architecture Smart Grid Systems
- New Trends in FastFlux Networks
- CrowdSource: Open Source Crowd Trained Machine Learning Model for Malware Detection
- Denying Service to DDoS Protection Services
- Denial of Service as a Service - Asymmetrical Warfare at its Finest
- Universal DDoS Mitigation Bypass
- Untwining Twine
- Detecting Vulnerabilities in Virtual Devices with Conformance Testing
- Smashing the Font Scaler Engine in Windows Kernel
- The SCADA That Didn't Cry Wolf - Who's Really Attacking Your ICS Devices - 2/2
- Hunting the Shadows: In-Depth Analysis of Escalated APT Attacks
- The Outer Limits: Hacking The Samsung Smart TV
- Out of Control: Demonstrating SCADA Device Exploitation
- Compromising Industrial Facilities from 40 Miles Away
- Hacking Like in the Movies: Visualizing Page Tables for Local Exploitation
- PWNIE AWARDS
- Welcome & Introduction to Black Hat USA 2013
- Mainframes: The Past Will Come to Haunt You
- Black-box Assessment of Pseudorandom Algorithms
- End-to-end Analysis of Domain Generating Algorithm Malware Family
- Javascript Static Security Analysis Made Easy with JSPrime
- The Web IS Vulnerable: XSS Defense on the BattleFront
- Malicious File for Exploiting Forensic Software
- CMX: IEEE Clean File Metadata Exchange
- Mobile Malware: Why the Traditional AV Paradigm is Doomed
- Bochspwn: Identifying 0-Days via System-Wide Memory Access Pattern Analysis
- Using Online Activity as Digital DNA to Create a Better Spear Phisher
- CreepyDOL: Cheap, Distributed Stalking
- OptiROP: The Art of Hunting ROP Gadgets
- BlackberryOS 10 From a Security Perspective
- Shattering Illusions in Lock-Free Worlds: Compiler/Hardware Behaviors in OS and VMs
- Password Hashing: The Future is Now
- Pass the Hash and other credential theft and reuse: Preventing Lateral Movement...
- How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS...
- Predicting Susceptibility to Socialbots on Twitter
- Pass-the-Hash 2: The Admin's Revenge
- Energy Fraud and Orchestrated Blackouts: Issues with Wireless Metering Protocols...
- Hot Knives Through Butter: Bypassing Automated Analysis Systems
- Post Eploitation Operations with Cloud Synchronization
- Defending Networks With Incomplete Information: A Machine Learning Approach
- With BIGDATA comes BIG responsibility: Practical exploiting of MDX injections
- Power Analysis Attacks for Cheapskates
- Fact and Fiction: Defending Medical Device
- Maltego Tungsten As a Collaborative Attack Platform
- BinaryPig - Scalable Malware Analytics in Hadoop