Presentaciones de Black Hat Europe 2015
Ya podemos acceder al material de la edición de este año de Black Hat celebrada en Amsterdam.
- What Got Us Here Wont Get Us There eu-15-Meer-What-Got-Us-Here-Wont-Get-Us-There.pdf
- (In-)Security of Backend-As-A-Service eu-15-Rasthofer-In-Security-Of-Backend-As-A-Service.pdf eu-15-Rasthofer-In-Security-Of-Backend-As-A-Service-wp.pdf
- A Peek Under the Blue Coat eu-15-Rigo-A-Peek-Under-The-Blue-Coat.pdf
- All Your Root Checks Belong to Us: The Sad State of Root Detection
- AndroBugs Framework: An Android Application Security Vulnerability Scanner eu-15-Lin-Androbugs-Framework-An-Android-Application-Security-Vulnerability-Scanner.pdf
- Attacking the XNU Kernel in El Capitain eu-15-Todesco-Attacking-The-XNU-Kernal-In-El-Capitain.pdf
- Authenticator Leakage through Backup Channels on Android eu-15-Bai-Authenticator-Leakage-Through-Backup-Channels-On-Android.pdf
- Automating Linux Malware Analysis Using Limon Sandbox eu-15-KA-Automating-Linux-Malware-Analysis-Using-Limon-Sandbox.pdf eu-15-KA-Automating-Linux-Malware-Analysis-Using-Limon-Sandbox-wp.pdf
- Breaking Access Controls with BLEKey
- Bypassing Local Windows Authentication to Defeat Full Disk Encryption eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryption.pdf eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryption-wp.pdf
- Bypassing Self-Encrypting Drives (SED) in Enterprise Environments eu-15-Boteanu-Bypassing-Self-Encrypting-Drives-SED-In-Enterprise-Environments.pdf eu-15-Boteanu-Bypassing-Self-Encrypting-Drives-SED-In-Enterprise-Environments-wp.pdf
- Commix: Detecting and Exploiting Command Injection Flaws eu-15-Stasinopoulos-Commix-Detecting-And-Exploiting-Command-Injection-Flaws.pdf eu-15-Stasinopoulos-Commix-Detecting-And-Exploiting-Command-Injection-Flaws-wp.pdf
- Continuous Intrusion: Why CI tools are an Attackers Best Friends eu-15-Mittal-Continuous-Intrusion-Why-CI-Tools-Are-An-Attackers-Best-Friend.pdf
- Cybercrime in the Deep Web eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web.pdf eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf
- Cybersecurity for Oil and Gas Industries: How Hackers Can Manipulate Oil Stocks eu-15-Polyakov-Cybersecurity-For-Oil-And-Gas-Industries-How-Hackers-Can-Manipulate-Oil-Stocks.pdf eu-15-Polyakov-Cybersecurity-For-Oil-And-Gas-Industries-How-Hackers-Can-Manipulate-Oil-Stocks-wp.pdf
- Defending Against Malicious Application Compatibility Shims eu-15-Pierce-Defending-Against-Malicious-Application-Compatibility-Shims.pdf eu-15-Pierce-Defending-Against-Malicious-Application-Compatibility-Shims-wp.pdf
- Even the LastPass Will be Stolen Deal with It! eu-15-Vigo-Even-The-Lastpass-Will-Be-Stolen-deal-with-it.pdf
- Exploiting Adobe Flash Player in the Era of Control Flow Guard eu-15-Falcon-Exploiting-Adobe-Flash-Player-In-The-Era-Of-Control-Flow-Guard.pdf
- Faux Disk Encryption: Realities of Secure Storage on Mobile Devices eu-15-Mayer-Faux-Disk-Encryption-Realities-Of-Secure-Storage-On-Mobile-Devices.pdf eu-15-Mayer-Faux-Disk-Encryption-Realities-Of-Secure-Storage-On-Mobile-Devices-wp.pdf
- Fuzzing Android: A Recipe for Uncovering Vulnerabilities Inside System Components in Android eu-15-Blanda-Fuzzing-Android-A-Recipe-For-Uncovering-Vulnerabilities-Inside-System-Components-In-Android.pdf eu-15-Blanda-Fuzzing-Android-A-Recipe-For-Uncovering-Vulnerabilities-Inside-System-Components-In-Android-wp.pdf
- Going AUTH the Rails on a Crazy Train eu-15-Jarmoc-Going-AUTH-The-Rails-On-A-Crazy-Train.pdf eu-15-Jarmoc-Going-AUTH-The-Rails-On-A-Crazy-Train-wp.pdf
- Hey Man Have You Forgotten to Initialize Your Memory? eu-15-Chen-Hey-Man-Have-You-Forgotten-To-Initialize-Your-Memory.pdf eu-15-Chen-Hey-Man-Have-You-Forgotten-To-Initialize-Your-Memory-wp.pdf
- Hiding in Plain Sight - Advances in Malware Covert Communication Channels eu-15-Bureau-Hiding-In-Plain-Sight-Advances-In-Malware-Covert-Communication-Channels.pdf eu-15-Bureau-Hiding-In-Plain-Sight-Advances-In-Malware-Covert-Communication-Channels-wp.pdf
- How to Break XML Encryption - Automatically eu-15-Somorovsky-How-To-Break-XML-Encryption-Automatically-wp.pdf
- Implementing Practical Electrical Glitching Attacks
- Is Your TimeSpace Safe? - Time and Position Spoofing Opensourcely eu-15-Kang-Is-Your-Timespace-Safe-Time-And-Position-Spoofing-Opensourcely.pdf eu-15-Kang-Is-Your-Timespace-Safe-Time-And-Position-Spoofing-Opensourcely-wp.pdf
- Lessons from Defending the Indefensible eu-15-Majkowski-Lessons-From-Defending-The-Indefensible.pdf
- Locknote: Conclusions and Key Takeaways from Black Hat Europe 2015
- LTE & IMSI Catcher Myths eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths.pdf eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths-wp.pdf
- New (and Newly-Changed) Fully Qualified Domain Names: A View of Worldwide Changes to the Internets DNS eu-15-Vixie-New-And-Newly-Changed-Fully-Qualified-Domain-Names-A-View-Of-Worldwide-Changes-To-The-Internets-DNS.pdf
- New Tool for Discovering Flash Player 0-day Attacks in the Wild from Various Channels eu-15-Pi-New-Tool-For-Discovering-Flash-Player-0-day-Attacks-In-The-Wild-From-Various-Channels.pdf eu-15-Pi-New-Tool-For-Discovering-Flash-Player-0-day-Attacks-In-The-Wild-From-Various-Channels-wp.pdf
- Panel: What You Need to Know About the Changing Regulatory Landscape in Information Security
- Self-Driving and Connected Cars: Fooling Sensors and Tracking Drivers eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers.pdf eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp1.pdf eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp2.pdf
- Silently Breaking ASLR in the Cloud eu-15-Barresi-Silently-Breaking-ASLR-In-The-Cloud.pdf eu-15-Barresi-Silently-Breaking-ASLR-In-The-Cloud-wp.pdf
- Stegosploit - Exploit Delivery with Steganography and Polyglots eu-15-Shah-Stegosploit-Exploit-Delivery-With-Steganography-And-Polyglots.pdf
- Triaging Crashes with Backward Taint Analysis for ARM Architecture eu-15-Kim-Triaging-Crashes-With-Backward-Taint-Analysis-For-ARM-Architecture.pdf
- Unboxing the White-Box: Practical Attacks Against Obfuscated Ciphers eu-15-Sanfelix-Unboxing-The-White-Box-Practical-Attacks-Against-Obfuscated-Ciphers.pdf eu-15-Sanfelix-Unboxing-The-White-Box-Practical-Attacks-Against-Obfuscated-Ciphers-wp.pdf
- VoIP Wars: Destroying Jar Jar Lync eu-15-Ozavci-VoIP-Wars-Destroying-Jar-Jar-Lync.pdf
- Vulnerability Exploitation in Docker Container Environments eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments.pdf eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments-wp.pdf
- Watching the Watchdog: Protecting Kerberos Authentication with Network Monitoring eu-15-Beery-Watching-The-Watchdog-Protecting-Kerberos-Authentication-With-Network-Monitoring.pdf eu-15-Beery-Watching-The-Watchdog-Protecting-Kerberos-Authentication-With-Network-Monitoring-wp.pdf
- Your Scripts in My Page - What Could Possibly Go Wrong?
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec