Presentaciones de Black Hat Asia 2017
Ya podemos acceder a muchas de las presentaciones de la edición asiática de Black Hat de este año:
- The Seven Axioms of Security
- Why We are Not Building a Defendable Internet
- Man-in-the-SCADA: Anatomy of Data Integrity Attacks in Industrial Control Systems
- 24 Techniques to Gather Threat Intel and Track Actors
- 3G/4G Intranet Scanning and its Application on the WormHole Vulnerability
- All Your Emails Belong to Us: Exploiting Vulnerable Email Clients via Domain Name Collision
- Anti-Plugin: Don’t Let Your App Play as an Android Plugin
- Betting Against the House: Security and Stability When the Odds are Against You
- Beyond the Blacklists: Detecting Malicious URL Through Machine Learning
- Breaking Korea Transit Card with Side-Channel Attack - Unauthorized Recharging
- Cache Side Channel Attack: Exploitability and Countermeasures
- Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge
- Daily-Life Peeper: Bug Hunting and Exploit Techniques in IoT
- Delegate to the Top: Abusing Kerberos for Arbitrary Impersonations and RCE
- Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year
- Domo Arigato Mr. Roboto: Security Robots a la Unit-Testing
- Drop the ROP: Fine-Grained Control-Flow Integrity for the Linux Kernel
- Exploiting USB/IP in Linux
- Fried Apples: Jailbreak DIY
- Go Get My/Vulnerabilities: An In-Depth Analysis of Go Language Runtime and the New Class of Vulnerabilities It Introduces
- Hack Microsoft Using Microsoft Signed Binaries
- Hacking HTTP/2 - New Attacks on the Internet’s Next Generation Foundation
- Hello From the Other Side: SSH Over Robust Cache Covert Channels in the Cloud
- Locknote: Conclusions and Key Takeaways from Black Hat Asia 2017
- MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE
- Mobile-Telephony Threats in Asia
- Myth and Truth About Hypervisor-Based Kernel Protector: The Reason Why You Need Shadow-Box
- Never Let Your Guard Down: Finding Unguarded Gates to Bypass Control Flow Guard with Big Data
- Open Sourcing Automotive Diagnostics
- Phishing for Funds: Understanding Business Email Compromise
- Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox
- The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents
- The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques
- The UEFI Firmware Rootkits: Myths and Reality
- What Malware Authors Don’t Want You to Know - Evasive Hollow Process Injection
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec