Material de Black Hat Asia 2016
Una de las conferencias sobre seguridad referente a nivel mundial, Black Hat, ya ha publicado el material de la edición Asia 2016.
- Devaluing Attack: Disincentivizing Threats Against the Next Billion Devices
- A New CVE-2015-0057 Exploit Technology asia-16-Wang-A-New-CVE-2015-0057-Exploit-Technology.pdf asia-16-Wang-A-New-CVE-2015-0057-Exploit-Technology-wp.pdf
- Android Commercial Spyware Disease and Medication asia-16-Saad-Android-Commercial-Spyware-Disease-And-Medication.pdf asia-16-Saad-Android-Commercial-Spyware-Disease-And-Medication-wp.pdf
- Automated Detection of Firefox Extension-Reuse Vulnerabilities
- Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces.pdf asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces-wp.pdf
- Break Out of the Truman Show: Active Detection and Escape of Dynamic Binary Instrumentation asia-16-Sun-Break-Out-Of-The-Truman-Show-Active-Detection-And-Escape-Of-Dynamic-Binary-Instrumentation.pdf
- Bypassing Browser Security Policies for Fun and Profit asia-16-Baloch-Bypassing-Browser-Security-Policies-For-Fun-And-Profit.pdf asia-16-Baloch-Bypassing-Browser-Security-Policies-For-Fun-And-Profit-wp.pdf
- CANtact: An Open Tool for Automotive Exploitation
- DSCompromised: A Windows DSC Attack Framework asia-16-Kazanciyan-DSCompromised-A-Windows-DSC-Attack-Framework.pdf
- Enterprise Apps: Bypassing the iOS Gatekeeper asia-16-Bashan-Enterprise-Apps-Bypassing-The-iOS-Gatekeeper.pdf asia-16-Bashan-Enterprise-Apps-Bypassing-The-iOS-Gatekeeper-wp.pdf
- Exploiting Linux and PaX ASLR's Weaknesses on 32-bit and 64-bit Systems asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems.pdf asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems-wp.pdf
- Hacking a Professional Drone asia-16-Rodday-Hacking-A-Professional-Drone.pdf
- Hey Your Parcel Looks Bad - Fuzzing and Exploiting Parcel-ization Vulnerabilities in Android asia-16-He-Hey-Your-Parcel-Looks-Bad-Fuzzing-And-Exploiting-Parcelization-Vulnerabilities-In-Android.pdf asia-16-He-Hey-Your-Parcel-Looks-Bad-Fuzzing-And-Exploiting-Parcelization-Vulnerabilities-In-Android-wp.pdf
- I'm Not a Human: Breaking the Google reCAPTCHA asia-16-Sivakorn-Im-Not-a-Human-Breaking-the-Google-reCAPTCHA.pdf asia-16-Sivakorn-Im-Not-a-Human-Breaking-the-Google-reCAPTCHA-wp.pdf
- Incident Response @ Scale - Building a Next Generation SOC asia-16-Cohen-Incident-Response-At-Scale-Building-A-Next-Generation-SOC.pdf
- Let's See What's Out There - Mapping the Wireless IoT asia-16-Zillner-Complete-Lets-See-Whats-Out-There-Mapping-The-Wireless-IOT.pdf
- Locknote: Conclusions and Key Takeaways from Black Hat Asia 2016
- Multivariate Solutions to Emerging Passive DNS Challenges asia-16-Vixie-Multivariate-Solutions-to-Emerging-Passive-DNS-Challenges.pdf
- Never Trust Your Inputs: Causing 'Catastrophic Physical Consequences' from the Sensor (or How to Fool ADC) asia-16-Bolshev-Never-Trust-Your-Inputs-Causing-Catastrophic-Physical-Consequences-From-The-Sensor.pdf
- NumChecker: A System Approach for Kernel Rootkit Detection and Identification
- PLC-Blaster: A Worm Living Solely in the PLC asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC.pdf asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC-wp.pdf
- Practical New Developments in the BREACH Attack asia-16-Karakostas-Practical-New-Developments-In-The-BREACH-Attack.pdf asia-16-Karakostas-Practical-New-Developments-In-The-BREACH-Attack-wp.pdf
- Rapid Radio Reversing asia-16-Ossmann-Rapid-Radio-Reversing.pdf asia-16-Ossmann-Rapid-Radio-Reversing-wp.pdf
- su-a-Cyder: Homebrewing Malware for iOS Like a B0$$! asia-16-Tamir-Su-A-Cyder-Homebrewing-Malware-For-iOS-Like-A-B0SS.pdf
- The Kitchen's Finally Burned Down: DLP Security Bakeoff
- The Perl Jam 2: The Camel Strikes Back asia-16-Rubin-The-Perl-Jam-2-The-Camel-Strikes-Back.pdf
- The Security Wolf of Wall Street: Fighting Crime with High-Frequency Classification and Natural Language Processing asia-16-Reuille-The-Security-Wolf-Of-Wall-Street-Fighting-Crime-With-High-Frequency-Classification-And-Natural-Language-Processing.pdf asia-16-Reuille-The-Security-Wolf-Of-Wall-Street-Fighting-Crime-With-High-Frequency-Classification-And-Natural-Language-Processing-wp.pdf
- The Tactical Application Security Program: Getting Stuff Done asia-16-Scott-Tactical-Application-Security-Program-Getting-Stuff-Done.pdf
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec