Material DEF CON 26
Aquí tenéis el material disponible de la DEF CON 26:
- Alexei Bulazel
- Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos
- Alexei-Bulazel-Reverse-Engineering-Windows-Defender.pdf
- Alfonso Garcia and Alejo Murillo
- DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos
- Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf
- Andrea Marcelli
- Bai Zheng and Chai Wang
- Christopher Domas
- DEFCON-26-Damien-Cauquil-Updated
- DEFCON-26-Damien-Cauquil-Extras
- DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos
- Damien-Cauquil-Secure-Your-BLE-Devices-Updated.pdf
- Damien Cauquil
- DEFCON-26-Damien-Cauquil-Extras
- DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos
- Damien-Cauquil-Secure-Your-BLE-Devices.pdf
- Dan Crowley - Mauro Paredes - Jen Savage - Updated
- Daniel Zolnikov
- David Melendez
- Dongsung Kim and Hyoung Kee Choi
- Dongsung Kim and Hyoung Kee Choi - Updated
- Douglas Mckee
- DEFCON-26-Douglas-McKee-Demo-Videos
- Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals.pdf
- Douglas Mckee - Updated
- Eric Sesterhenn
- Feng Xiao - Jianwei Huang - Peng Liu
- Gabriel Ryan
- DEFCON-26-Gabriel-Ryan-Demo-Videos
- Gabriel-Ryan-bait-n-switch.mp4
- Gabriel-Ryan-bypass-mab.mp4
- Gabriel-Ryan-classic-8021x-bypass-with-interaction (1920 x 1080).mp4
- Gabriel-Ryan-classic-8021x-bypass-with-interaction.mp4
- Gabriel-Ryan-eap-md5-forced-reauth-full.mp4
- Gabriel-Ryan-rogue-gateway-final (1920 x 1080).mp4
- Gabriel-Ryan-rogue-gateway-final.mp4
- Gabriel-Ryan-ryan-gabriel-ryan-bait-n-switch (1920 x 1080).mp4
- Gabriel-Ryanforged-eapol-start.mp4
- Gabriel-Ryan-Owning-the-LAN-in-2018-WP.pdf
- Gabriel-Ryan-Owning-the-LAN-in-2018.pdf
- DEFCON-26-Gabriel-Ryan-Demo-Videos
- Joe Rozner
- John Seymour and Azeem Aqil
- DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos
- John-Seymour-and-Azeem-Aqil-Your-Voice-is-My-Passport.pdf
- Josep Rodriguez
- L0pht Panel
- Leigh Anne Galloway and Tim Yunusov
- Louis Dion Marcil
- DEFCON-26-Louis-Dion-Marcil-Demo-Videos
- Louis-Dion-Marcil-Edge-Side-Include-Injection.pdf
- Martin Vigo
- DEFCON-26-Martin-Vigo-Demo-Videos
- Martin-Vigo-Compromising-Online-Cracking-Voicemail-Systems.pdf
- Michael West and Collin Campbell
- Mickey Shkatov and Jesse Micheal
- DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-Demo-Videos
- Mickey-Shkatov-and-Jesse-Micheal-UEFI-Exploitation-For-The-Masses.pdf
- Morgan Gangwere
- DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Demo-Videos
- Morgan-Gangwere-Its-assembler-jim-Notes.pdf
- Morgan-Gangwere-Its-assembler-jim.pdf
- Nafeez
- Nick Cano
- DEFCON-26-Nick-Cano-Demo-Videos
- Nick-Cano-Relocation-Bonus-Attacking-the-Win-Loader.pdf
- Patrick Wardle
- Ruo Ando
- Ryan Johnson and Angelos Stavrou
- Ryan Johnson and Angelos Stavrou - Updated
- DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated
- Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-Updated.pdf
- Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf
- Sanat Sharma
- Sheila A Berta and Sergio De Los Santos
- DEFCON-26-Sheila-A-Berta-and-Sergio-De-Los-Santos-Demo-Video
- Sheila-A-Berta-and-Sergio-De-Los-Santos-Tracking-Android-Malware-Developers.pdf
- Siegfried Rasthofer and Stephan Huber
- Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video
- Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us.pdf
- Siegfried Rasthofer and Stephan Huber - Updated
- Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video-Updated
- Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us-Updated.pdf
- Silke Holtmanns and Isha Singh
- Slava Makkaveev
- Stark Riedesel and Parsia Hakimian
- DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos
- Stark-Riedesel-and-Parsia-Hakimian-Tineola-Taking-Bite-Out-of-Enterprise-Blockchain.pdf
- Thanh Bui and Siddharth Rao
- DEFCON-26-Thanh-Bui-and-Siddharth-Rao-Demo-Videos
- Thanh-Bui-and-Siddharth-Rao-Last-Mile-Auth-Problem-Exploiting-End-to-End.pdf
- The Tarquin
- DEFCON-26-The-Tarquin-Demo-Videos
- The-Tarquin-Weaponizing-Unicode-Homographs-Beyond-IDNs.pdf
- Thiago Alves
- DEFCON-26-Thiago-Alves-Demo-Videos
- Thiago-Alves-Hacking-PLCs-and-Causing-Havoc-on-Critical-Infrastructures.pdf
- Torani - Buchwald - Nirenberg
- Truman Kain
- Truman Kain - Updated
- Vincent Tan
- Wesley McGrew
- William Martin
- Wu HuiYu and Qian Wenxiang
- DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos
- Wu-HuiYu-and-Qian-Wenxiang-Breaking-Smart-Speakers.pdf
- Xiaolong Bai and Min Zheng
- DEFCON-26-Xiaolong-Bai-and-Min-Zheng-Demo-Video
- Xiaolong-Bai-and-Min-Zheng-One-Bite-And-All-Your-Dreams-Will-Come-True.pdf
- Zach Miller and Alex Kissinger
- DEFCON-26-Zach-Miller-and-Alex-Kissinger-Demo-Videos
- Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain.pdf
- Zach Miller and Alex Kissinger - Updated
- Zach Miller and Alex Kissinger - Extras
- Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain-Updated.pdf
- nevermoe
- sghctoma
- DEFCON-26-sghctoma-Demo-Videos
- sghctoma-all-your-math-are-belong-to-us.pdf
- singe
- smea
- DEFCON-26-smea-Jailbreaking-the-3DS-Demo-Videos
- smea-Jailbreaking-the-3DS.pdf
- Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf
- Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf
- Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses.pdf
- Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story.pdf
- Crowley-Paredes-Savage-Outsmarting-the-Smart-City.pdf
- Eckert-Sumner-Krause-Inside-the-Fake-Science-Factory.pdf
- Eduardo-Izycki-And-Rodrigo-Colli-Digital-Leviathan-Nation-State-Big-Brothers.pdf
- Egypt-One-Liners-to-Rule-Them-All.pdf
- Fireside-Panel-D0-N0-H4RM.pdf
- Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz-Updated.pdf
- Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz.pdf
- Foster-and-Ayrey-Lost-and-Found-Certs-residual-certs-for-pre-owned-domains.pdf
- Galloway-and-Yunusov-For-the-love-of-Money-Finding-And-Exploiting-Vulns-In-Mobile-POS-Updated.pdf
- Ian-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains.pdf
- Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target-Updated.pdf
- Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target.pdf
- Joe-Grand-Searching-for-the-Light-Adventures-w-Opticspy.pdf
- Josep-Rodriguez-Breaking-Extreme-Networks-WingOS-Updated.pdf
- Lawshae-Who-Controls-the-Controllers-Hacking-Crestron.pdf
- Maggie-Mayhem-Sex-Work-After-SESTA.pdf
- Maksim-Shudrak-Fuzzing-Malware-For-Fun-and-Profit.pdf
- Matt-King-Micro-Renovator-Bringing-Proc-Firmware-Up-To-Code.pdf
- Matt-Knight-and-Ryan-Speers-RF-Fuzzing-Tools-to-Expose-PHY-Layer-Vulns.pdf
- Matt-Wixey-Betrayed-by-the-Keyboard-Updated.pdf
- Matt-Wixey-Betrayed-by-the-Keyboard.pdf
- Matthews-Adams-Greco-Youre-Just-Complaining-Because-Youre-Guilty.pdf
- Michael-Ossmann-and-Dominic-Spill-Revolting-Radios.pdf
- Min-Zheng-Xiaolong-Bai-Fasten-your-Seatbelts-Escaping-iOS-11-Sandbox.pdf
- Nils-Amiet-and-Yonal-Romailler-Reaping-and-breaking-keys-at-scale-when-crypto-meets-big-data.pdf
- Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-and-Pop-0days-Out.pdf
- Panel-DCGroups.pdf
- Paternotte-and-van-Ommeren-It-WISNt-Me-Attacking-Industrial-Wireless-Mesh.pdf
- Rachel-Greenstadt-and-Aylin-Caliskan-De-anonymizing-Programmers.pdf
- Richard-Thieme-The-Road-to-Resilience .pdf
- Rob-Joyce-Absurd-Xmas-Lights.pdf
- Rousseau-and-Seymour-Finding-Xori-Malware-Analysis-Triage-w-Auto-Disassembly.pdf
- Seamus-Burke-Journey-Into-Hexagon.pdf
- Sean-Metcalf-Exploiting-Administrator-Insecurities.pdf
- Shortxstack-and-Seth-Law-Building-the-Hacker-tracker.pdf
- Si-and-AgentX-Wagging-The-Tail.pdf
- Steven-Danneman-Your-Banks-Digital-Side-Door.pdf
- Yaniv-Balmas-What-The-FAX.pdf
- YawnBox-Emerald-Onion-Privacy-Infrastructure-Challenges-and-Opportunites.pdf
- Yu-Wang-Attacking-The-MacOS-Kernel-Graphics-Driver.pdf
- Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs-Updated.pdf
- Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs.pdf
- zerosum0x0-Eternal-Exploits.pdf
También también podéis descargar todo este contenido desde este enlace o por torrent a través de este otro enlace.
Y si también os interesan los talleres, aquí tenéis la lista de los publicados:
- DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID
- DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments
- Workshop-Adam-Steed-and-James-Albany-Attacking-Active-Directory-and-Advanced-Methods-of-Defense-2018.pdf
- Workshop-Alexandrine-Torrents-and-Arnaud-Soullie-Pentesting-ICS-101.pdf
- Workshop-Arun-Magesh-Buzzing-Smart-Devices.pdf
- Workshop-Bryce-Kunz-and-Kevin-Lustic-Fuzzing-FTW.pdf
- Workshop-Dave-Porcello-and-Sean-Gallagher-Packet-Mining-for-Privacy-Leakage.pdf
- Workshop-David-Pearson-The-Truth-is-in-the-Network_-Reverse-Engineering-Application-Layer-Protocols-Via-PCAP.pdf
- Workshop-David-Turco-and-Jon-Overgaard-Christiansen-Wheres-My-Browser-Learn-Hacking-iOS-and-Android-WebViews.pdf
- Workshop-Eijah-Decentralized-Hacker-Net.pdf
- Workshop-Jakub-Botwicz-and-Wojciech-Rauner-Fuzzing-with-AFL-(American-Fuzzy-Lop).pdf
- Workshop-Joe-Grand-Build-Your-Own-Opticspy.pdf
- Workshop-Joe-Grand-Hardware-Hacking-Basics.pdf
- Workshop-Joshua-Pereyda-and-Timothy-Clemans-Advanced-Custom-Network-Protocol-Fuzzing.pdf
- Workshop-Louis-Nyfenegger-and-Luke-Jahnke-Finding-Needles-in-Haystacks.pdf
- Workshop-Louis-Nyfenegger-and-Luke-Jahnke-JWAT-Attacking-JSON-WEB-TOKENS.pdf
- Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf
- Workshop-Mike-Guirao-Securing-Big-Data-in-Hadoop.pdf
- Workshop-Nick-Tait-Reverse-Engineering-with-OpenSCAD-and-3D-Printing.pdf
- Workshop-Sneha-Rajguru-ARM-eXploitation-101.pdf
- Workshop-Walter-Cuestas-and-Mauricio-Velazco-Lateral-Movement-101-2018-Update.pdf
Los cuales también tenéis la opción de baralos vía torrent o rar.
Y ya puestos, si también quieres descargarte la música, aquí tienes los enlaces: torrent y rar.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec