Presentaciones de DEF CON 24
Una vez más una de las conferencias sobre seguridad informática ha llegado a su fin: DEF CON 24. Por ahora, se han puesto disponible las diapositivas y algún material extra de las presentaciones que se pudieron presenciar.
- Amro-Abdelgawad-Extras/
- Jonathan-Brossard-Extras/
- Lucas-Lundgren-Extras/
- Mike-Rich-Extras/
- Regilero-Extras/
- Robert-Olson-Extras/
- Seymour-Tully-Extras/
- SixVolts-and-Haystack-Extras/
- Wesley-McGrew-Extras/
- 3alarmlampscoot-DIY-Nukeproofing.pdf
- Adam-Donenfeld-Stumping-The-Mobile-Chipset.pdf
- Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist.pdf
- Amro-Abdelgawad-The-Remote-Metamorphic-Engine.pdf
- Anch-So-you-want-to-be-a-pentester-DC101.pdf
- Anto-Joseph-Fuzzing-Android-Devices.pdf
- Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf
- Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-Writeup.pdf
- Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection.pdf
- Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf
- Bertin-Bervis-James-Jara-Exploiting-And-Attacking-Seismological-Networks-Remotely.pdf
- Bigezy-Saci-Pinworm-MITM-for-Metadata.pdf
- Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf
- Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness.pdf
- Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory.pdf
- Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf
- Chris-Rock-How-to-overthrow-a-Government-Kuwait-Coup-WP.pdf
- Chris-Rock-How-to-overthrow-a-Government.pdf
- Clarence-Chio-Machine-Duping-101.pdf
- Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-WP.pdf
- Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools.pdf
- Demay-Lebrun-Canspy-A-Platorm-For-Auditing-Can-Devices.pdf
- Dr-Phil-Polstra-Mouse-Jigglers.pdf
- Drake-Christey-Vulnerabilities-101.pdf
- Eagle-Sk3Wldbg-Emulating-with-Ida.pdf
- Eric-Escobar-Rogue-Cell-Towers.pdf
- Evan-Booth-Jjittery-Macgyver.pdf
- Fasel-Jacobs-I-fight-for-the-users.pdf
- Fitzpatrick-and-Grand-101-Ways-To-Brick-Your-Hardware.pdf
- Forgety-Kreilein-Ng9-1-1-The-Next-Gene-Of-Emergency-Ph0Nage.pdf
- Fred-Bret-Mounet-All-Your-Solar-Panels-Are-Belong-To-Me.pdf
- Gorenc-Sands-Hacker-Machine-Interface.pdf
- Granolocks-Zero-Chaos-Bluehydra-Realtime-Blutetooth-Detection.pdf
- Grant-Bugher-Captive-Portals.pdf
- Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays-WP.pdf
- Guevara-Noubir-Amirali-Sanatinia-Honey-Onions-Exposing-Snooping-Tor-Hsdir-Relays.pdf
- Hendrik-Schmidt-Brian-Butter-Attacking-BaseStations.pdf
- Huber-Rasthofer-Smartphone-Antivirus-And-Security-Applications-Under-Fire.pdf
- Hunter-Scott-Rt2Win-The-Luckiest-Guy-On-Twitter.pdf
- Int0X80-Anti-Forensics-AF.pdf
- Jay-Beale-Larry-Pesce-Phishing-without-Frustration.pdf
- Jennifer-Granick-Slouching-Towards-Utopia.pdf
- Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel-WP.pdf
- Jkambic-Cunning-With-Cng-Soliciting-Secrets-From-Schannel.pdf
- Jmaxxz-Backdooring-the-Frontdoor-Bypass-Cert-Pinning.pdf
- Jmaxxz-Backdooring-the-Frontdoor-Extracting-Secrets-From-Log.pdf
- Jmaxxz-Backdooring-the-Frontdoor.pdf
- Joe-Grand-Zoz-BSODomizerHD.pdf
- Jonathan-Brossard-Intro-to-Witchcraft-Compiler.pdf
- Karyn-Benson-Examining-The-Internets-Pollution.pdf
- Klijnsma-Tentler-Stargate-Pivoting-Through-VNC.pdf
- Ladar-Levison-Compelled-Decryption.pdf
- Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles-WP.pdf
- Liu-Yan-Xu-Can-You-Trust-Autonomous-Vehicles.pdf
- Lucas-Lundgren-Light-Weight Protocol-Critical-Implications.pdf
- Luke-Young-The-4TbS-Ddos-For-5-bucks.pdf
- Maldonado-Mcguffin-Sticky-Keys-To-The-Kingdom.pdf
- Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice-WP.pdf
- Marc-Newlin-MouseJack-Injecting-Keystrokes-Into-Wireless-Mice.pdf
- Max-Bazaliy-A-Journey-Through-Exploit-Mitigation-Techniques-On-Ios.pdf
- Mcsweeny-Cranor-Research-On-The-Machines.pdf
- Mike-Rich-Use-Their-Machines-Against-Them-WP.pdf
- Mike-Rich-Use-Their-Machines-Against-Them.pdf
- Nick-Rosario-Weaponize-Your-Feature-Codes.pdf
- Panel-How-To-Make-A-DEFCON-Black-Badge.pdf
- Patrick-Wardle-99-Problems-Little-Snitch.pdf
- Plore-Side-Channel-Attacks-On-High-Security-Electronic-Safe-Locks.pdf
- Przemek-Jaroszewski-How-To-Get-Good-Seats-In-The-Security-Theater.pdf
- Radia-Perlman-Resilience-Despite-Malicious-Pariticpants.pdf
- Regilero-Hiding-Wookiees-In-Http.pdf
- Ricky-Lawshae-Lets-Get-Physical.pdf
- Robbins-Vazarkar-Schroeder-Six-Degrees-of-Domain-Admin.pdf
- Robert-Olson-Writing-Your-First-Exploit.pdf
- Rogan-Dawes-Dominic-White-Universal-Serial-aBUSe-Remote-Attacks.pdf
- Rose-Ramsey-Picking-Bluetooth-Low-Energy-Locks.pdf
- Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers-WP.pdf
- Salvador-Mendoza-Samsung-Pay-Tokenized-Numbers.pdf
- Sean-Metcalf-Beyond-The-MCSE-Red-Teaming-Active-Directory.pdf
- Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf
- Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering.pdf
- Shane-Steiger-Maelstrom-Are-You-Playing-With-A-Full-Deck-V14-Back.pdf
- Shane-Steiger-Maelstrom-Rules-V10.pdf
- SixVolts-and-Haystack-Cheap-Tools-For-Hacking-Heavy-Trucks.pdf
- Tamas-Szakaly-Help-I-got-ANTS.pdf
- Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf
- Thomas-Wilhelm-Intrusion-Prevention-System-Evasion-Techniques.pdf
- Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines-Literature-Survey.pdf
- Tim-Estell-Katea-Murray-NPRE-Eavesdropping-on-the-Machines.pdf
- Tom-Kopchak-SSD-Forensics-Research-WP.pdf
- Tom-Kopchak-Sentient-Storage.pdf
- Ulf-Frisk-Direct-Memory-Attack-the-Kernel.pdf
- Wesley-McGrew-Secure-Penetration-Testing-Operations-WP.pdf
- Wesley-McGrew-Secure-Penetration-Testing-Operations.pdf
- Willa-Riggins-Esoteric-Exfiltration.pdf
- Zhang-Shan-Forcing-Targeted-Lte-Cellphone-Into-Unsafe-Network.pdf
- Zhong-Lee-411-A-Framework-For-Managing-Security-Alerts.pdf
- the-bob-ross-fan-club-Propaganda-and-you.pdf
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec