Presentaciones de Black Hat Europe 2016
Ya se encuentran disponibles las presentaciones de otra de las ediciones de Black Hat, la edición europea de 2016 en este caso.
- (Pen)Testing Vehicles with CANToolz eu-16-Sintsov-Pen-Testing-Vehicles-With-Cantoolz.pdf
- 50 Thousand Needles in 5 Million Haystacks: Understanding Old Malware Tricks to Find New Malware Families eu-16-Valeros-50-Thousand-Needles-In-5-Million-Haystacks-Understanding-Old-Malware-Tricks-To-Find-New-Malware-Families.pdf
- AI based Antivirus: Can AlphaAV Win the Battle in which Man Has Failed? eu-16-Wang-AI-Based-Antivirus-Can-Alphaav-Win-The-Battle-In-Which-Man-Has-Failed.pdf
- Another Brick Off the Wall: Deconstructing Web Application Firewalls Using Automata Learning eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning.pdf eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning-wp.pdf eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning-too-lightbulb-framework.zip
- ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy.pdf eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf armageddon
- Attacking Windows by Windows eu-16-Liang-Attacking-Windows-By-Windows.pdf
- Automating Incident Response: Sit Back and Relax Bots are Taking Over… eu-16-Hovor-Automating-Incident-Investigations-Sit-Back-And-Relax-Bots-Are-Taking-Over.pdf
- Backslash Powered Scanning: Hunting Unknown Vulnerability Classes eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes.pdf eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes-wp.pdf eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes-backslashPoweredScanner.zip eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes-distributeDamage.zip
- Breaking BHAD: Abusing Belkin Home Automation Devices eu-16-Tenaglia-Breaking-Bhad-Abusing-Belkin-Home-Automation-Devices.pdf
- Breaking Big Data: Evading Analysis of the Metadata of Your Life eu-16-Venable-Breaking-Big-Data-Evading-Analysis-Of-The-Metadata-Of-Your-Life.pdf
- Bypassing Clang's SafeStack for Fun and Profit
- Bypassing Secure Boot Using Fault Injection eu-16-Timmers-Bypassing-Secure-Boot-Using-Fault-Injection.pdf
- Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums eu-16-Ahlberg-Chasing-Foxes-By-The-Numbers-Patterns-Of-Life-And-Activity-In-Hacker-Forums.pdf
- Code Deobfuscation: Intertwining Dynamic Static and Symbolic Approaches eu-16-David-Code-Deobfuscation-Intertwining-Dynamic-Static-And-Symbolic-Approaches.pdf
- CTX: Eliminating BREACH with Context Hiding eu-16-Karakostas-Ctx-Eliminating-BREACH-With-Context-Hiding.pdf eu-16-Karakostas-Ctx-Eliminating-BREACH-With-Context-Hiding-wp.pdf
- Cyber Judo: Offensive Cyber Defense eu-16-Beery-Grady-Cyber-Judo-Offensive-Cyber-Defense.pdf
- Detach Me Not - DoS Attacks Against 4G Cellular Users Worldwide from your Desk eu-16-Holtmanns-Detach-Me-Not.pdf
- DRAMA: How Your DRAM Becomes a Security Problem eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem.pdf eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-tool.zip
- Effective File Format Fuzzing – Thoughts Techniques and Results eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf
- EGO MARKET: When People's Greed for Fame Benefits Large-Scale Botnets eu-16-Paquet-Clouston-Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets.pdf eu-16-Paquet-Clouston-Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets-wp.pdf
- Flip Feng Shui: Rowhammering the VM's Isolation eu-16-Razavi-Flip-Feng-Shui-Rowhammering-The-VMs-Isolation.pdf eu-16-Razavi-Flip-Feng-Shui-Rowhammering-The-VMs-Isolation-wp.pdf
- Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit.pdf eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit-wp.pdf
- GPU Security Exposed eu-16-Taft-GPU-Security-Exposed.pdf
- How to Fool an ADC Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing eu-16-Gonzalez-How-To-Fool-An-ADC-Part-II-Or-Hiding-Destruction-Of-Turbine-With-A-Little-Help-Of-Signal-Processing.pdf
- I Know What You Saw Last Minute - The Chrome Browser Case eu-16-Dubin-I-Know-What-You-Saw-Last-Minute-The-Chrome-Browser-Case.pdf eu-16-Dubin-I-Know-What-You-Saw-Last-Minute-The-Chrome-Browser-Case-WP.pdf
- Inside Web Attacks: The Real Payloads
- Locknote: Conclusions and Key Takeaways from Black Hat Europe 2016
- Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks eu-16-Bazaliy-Mobile-Espionage-in-the-Wild-Pegasus-and-Nation-State-Level-Attacks.pdf
- Narcos Counterfeiters and Scammers: An Approach to Visualize Illegal Markets eu-16-Lewman-Narcos-Counterfeiters-And-Scammers-An-Approach-To-Visualize-Illegal-Markets.pdf
- Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game eu-16-Maggi-Pocket-sized Badness-Why-Ransomware Comes-as-a-Plot-Twist-in-the-Cat-Mouse-Game.pdf heldroid
- Randomization Can't Stop BPF JIT Spray eu-16-Reshetova-Randomization-Can't-Stop-BPF-JIT-Spray.pdf eu-16-Reshetova-Randomization-Can't-Stop-BPF-JIT-Spray-wp.pdf
- Real-World Post-Quantum Cryptography: Introducing the OpenQuantumSafe Software Project
- Rooting EVERY Android: From Extension to Exploitation eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf
- Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0 eu-16-Yang-Signing-Into-Billion-Mobile-Apps-Effortlessly-With-OAuth20.pdf eu-16-Yang-Signing-Into-Billion-Mobile-Apps-Effortlessly-With-OAuth20-wp.pdf
- Stumping the Mobile Chipset eu-16-Donenfeld-Stumping-The-Mobile-Chipset.pdf eu-16-Donenfeld-Stumping-The-Mobile-Chipset-wp.pdf
- Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking eu-16-Mavroudis-Talking-Behind-Your-Back-Attacks-And-Countermeasures-Of-Ultrasonic-Cross-Device-Tracking.pdf
- Towards a Policy-Agnostic Control-Flow Integrity Implementation eu-16-Sullivan-Towards-A-Policy-Agnostic-Control-Flow-Integrity-Implementation.pdf
- Use-After-Use-After-Free: Exploit UAF by Generating Your Own eu-16-Wen-Use-After-Use-After-Free-Exploit-UAF-By-Generating-Your-Own.pdf eu-16-Wen-Use-After-Use-After-Free-Exploit-UAF-By-Generating-Your-Own-wp.pdf
- When Virtualization Encounter AFL: A Portable Virtual Device Fuzzing Framework with AFL eu-16-Li-When-Virtualization-Encounters-AFL-A-Portable-Virtual-Device-Fuzzing-Framework-With-AFL.pdf eu-16-Li-When-Virtualization-Encounters-AFL-A-Portable-Virtual-Device-Fuzzing-Framework-With-AFL-wp.pdf
- WiFi-Based IMSI Catcher eu-16-OHanlon-WiFi-IMSI-Catcher.pdf
- Witchcraft Compiler Collection: Towards Self Aware Computer Programs eu-16-Brossard-Witchcraft-Compiler-Collection-Towards-Self-Aware-Computer-Programs.pdf eu-16-Brossard-Witchcraft-Compiler-Collection-Towards-Self-Aware-Computer-Programs-wp.pdf
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec