Presentaciones Usenix 2018
- August 19, 2018
- tuxotron
-
Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? Keynote
-
Fear the Reaper: Characterization and Fast Detection of Card Skimmers
-
BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
-
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
-
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security
-
Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies
-
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies
-
Effective Detection of Multimedia Protocol Tunneling using Machine Learning
-
Quack: Scalable Remote Measurement of Application-Layer Censorship
-
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse
-
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
-
Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
-
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem
-
Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems
-
Inception: System-Wide Security Testing of Real-World Embedded Systems Software
-
Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices
-
Donna Dodson, Chief Cybersecurity Advisor, National Institute of Standards and Technology
-
Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers
-
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
-
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks
-
BurnBox: Self-Revocable Encryption in a World Of Compelled Access
-
Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes
-
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
-
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning
-
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
-
One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSA
-
DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries
-
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
-
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
-
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
-
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation
-
QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
-
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities
-
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI
-
Debloating Software through Piece-Wise Compilation and Loading
-
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
-
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think
-
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
-
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
-
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets
-
Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem
-
The aftermath of a crypto-ransomware attack at a large academic institution
-
From Spam to Speech: Policing the Next Generation of “Unwanted Traffic”
-
Amit Elazari Bar On, Doctoral Candidate, Berkeley Law, Center for Long-Term Cybersecurity Grantee
-
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS
-
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks
-
SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics
-
FANCI : Feature-based Automated NXDomain Classification and Intelligence
-
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications
-
Fast and Service-preserving Recovery from Malware Infections Using CRIU
-
Susan Landau, Bridge Professor of Cyber Security and Policy, Tufts University
-
The Guard’s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX
-
A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping
-
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation
-
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
-
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
-
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
-
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
-
Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts
-
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
-
Security Namespace: Making Linux Security Frameworks Available to Containers
-
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning
-
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
-
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
-
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
-
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks
-
Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets
-
Formal Security Analysis of Neural Networks using Symbolic Intervals
-
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
-
A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation
-
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
-
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps
-
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking
-
Dependence-Preserving Data Compaction for Scalable Forensic Analysis
La 27 edición de la conferencia sobre seguridad USENIX 2018 se acaba de celebrar en Baltimore, MD esta pasada semana. Lo que característica a esta conferencia es que es una conferencia sobre seguridad desde ámbito académico.
El número de presentaciones es bastante amplio y ya podemos acceder tanto a la investigación académica, así, como las diapositivas de la mayoría de dichas presentaciones:
Hack para convertir Karateka a dos jugadores
- August 18, 2018
- tuxotron
- Q,A,Z puñetazo
- W,S,X patada
- C,V moverse/correr
- SPACE cambia a posición de combate
- N patada
- M puñetazo
- < moverse a la izquierda
Karateka fue un juego publicado en 1984 originalmente para Apple II. Más tarde el juego fue portado a muchos otros sistemas de la época como Commodore 64, Amstrad CPC, MSX, etc, así como a sistemas más modernos. Fue escrito por Jordan Mechner, creador también del mega popular Prince of Persia, Karateka era un juego donde el jugador tenía que luchar (Karate) contra sus enemigos para rescatar a la princesa Mariko del castillo de Akuma. Presta atención al detalle de el jugador, y digo esto porque esta es la miga de esta entrada, el juego era de un sólo jugador.
A Charles Mangin hace un par años le llamó la antención la idea de una versión de Karateka con dos jugadores. Y tal y cómo ha publicado, dicha idea, la ha hecho realidad.
Lo impresionante de esto, no es que éste haya reescrito el juego, sino que ha creado un parche de tan sólo 42 bytes para convertir el juego en multijugador.
La imagen parcheada del juego la puedes descargar desde aquí (es la versión original para Apple II).
Los controles son los siguientes:
PLAYER 1 CONTROLS:
PLAYER 2 CONTROLS:
Estas son las direcciones de memoria a cambiar:
$6C11: D0 1C C5 21 D0 18 A9 00 85 29 A9 D7 -> AD 00 C0 C9 CD D0 02 A9 D7 8D 10 C0 (M to punch, clears strobe)
$6C20: 20 95 6C C5 D7 B0 08 20 71 6C A9 C5 -> AD 00 C0 C9 CE D0 02 A9 C5 8D 10 C0 (N to kick, clears strobe)
$6B9B: A6 33 E0 0C 90 03 4C 52 6C E0 07 B0 02 -> AD 00 C0 EA EA EA C9 AC D0 03 4C 52 6C (< to move player 2)
$6EA9: 8D 10 C0 -> EA EA EA (keep from clearing keyboard strobe)
$6e8e: 88 -> C3 (C to move left instead of ctrl-H/left arrow)
$6e98: 95 -> D6 (V to move right instead of ctrl-U/right arrow)
$b9a8: A5 C4 D0 00 -> A9 01 85 C4 (default to keyboard control, ignores joystick)
Si quieres más detalles sobre el parche, no dudes en visitar en enlace original.
¡Esto es Hacking en su más puro estado!
Material DEF CON 26
- August 13, 2018
- tuxotron
- Alexei Bulazel
- Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos
- Alexei-Bulazel-Reverse-Engineering-Windows-Defender.pdf
- Alfonso Garcia and Alejo Murillo
- DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos
- Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf
- Andrea Marcelli
- Bai Zheng and Chai Wang
- Christopher Domas
- DEFCON-26-Damien-Cauquil-Updated
- DEFCON-26-Damien-Cauquil-Extras
- DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos
- Damien-Cauquil-Secure-Your-BLE-Devices-Updated.pdf
- Damien Cauquil
- DEFCON-26-Damien-Cauquil-Extras
- DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos
- Damien-Cauquil-Secure-Your-BLE-Devices.pdf
- Dan Crowley - Mauro Paredes - Jen Savage - Updated
- Daniel Zolnikov
- David Melendez
- Dongsung Kim and Hyoung Kee Choi
- Dongsung Kim and Hyoung Kee Choi - Updated
- Douglas Mckee
- DEFCON-26-Douglas-McKee-Demo-Videos
- Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals.pdf
- Douglas Mckee - Updated
- Eric Sesterhenn
- Feng Xiao - Jianwei Huang - Peng Liu
- Gabriel Ryan
- DEFCON-26-Gabriel-Ryan-Demo-Videos
- Gabriel-Ryan-bait-n-switch.mp4
- Gabriel-Ryan-bypass-mab.mp4
- Gabriel-Ryan-classic-8021x-bypass-with-interaction (1920 x 1080).mp4
- Gabriel-Ryan-classic-8021x-bypass-with-interaction.mp4
- Gabriel-Ryan-eap-md5-forced-reauth-full.mp4
- Gabriel-Ryan-rogue-gateway-final (1920 x 1080).mp4
- Gabriel-Ryan-rogue-gateway-final.mp4
- Gabriel-Ryan-ryan-gabriel-ryan-bait-n-switch (1920 x 1080).mp4
- Gabriel-Ryanforged-eapol-start.mp4
- Gabriel-Ryan-Owning-the-LAN-in-2018-WP.pdf
- Gabriel-Ryan-Owning-the-LAN-in-2018.pdf
- DEFCON-26-Gabriel-Ryan-Demo-Videos
- Joe Rozner
- John Seymour and Azeem Aqil
- DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos
- John-Seymour-and-Azeem-Aqil-Your-Voice-is-My-Passport.pdf
- Josep Rodriguez
- L0pht Panel
- Leigh Anne Galloway and Tim Yunusov
- Louis Dion Marcil
- DEFCON-26-Louis-Dion-Marcil-Demo-Videos
- Louis-Dion-Marcil-Edge-Side-Include-Injection.pdf
- Martin Vigo
- DEFCON-26-Martin-Vigo-Demo-Videos
- Martin-Vigo-Compromising-Online-Cracking-Voicemail-Systems.pdf
- Michael West and Collin Campbell
- Mickey Shkatov and Jesse Micheal
- DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-Demo-Videos
- Mickey-Shkatov-and-Jesse-Micheal-UEFI-Exploitation-For-The-Masses.pdf
- Morgan Gangwere
- DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Demo-Videos
- Morgan-Gangwere-Its-assembler-jim-Notes.pdf
- Morgan-Gangwere-Its-assembler-jim.pdf
- Nafeez
- Nick Cano
- DEFCON-26-Nick-Cano-Demo-Videos
- Nick-Cano-Relocation-Bonus-Attacking-the-Win-Loader.pdf
- Patrick Wardle
- Ruo Ando
- Ryan Johnson and Angelos Stavrou
- Ryan Johnson and Angelos Stavrou - Updated
- DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated
- Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-Updated.pdf
- Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf
- Sanat Sharma
- Sheila A Berta and Sergio De Los Santos
- DEFCON-26-Sheila-A-Berta-and-Sergio-De-Los-Santos-Demo-Video
- Sheila-A-Berta-and-Sergio-De-Los-Santos-Tracking-Android-Malware-Developers.pdf
- Siegfried Rasthofer and Stephan Huber
- Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video
- Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us.pdf
- Siegfried Rasthofer and Stephan Huber - Updated
- Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video-Updated
- Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us-Updated.pdf
- Silke Holtmanns and Isha Singh
- Slava Makkaveev
- Stark Riedesel and Parsia Hakimian
- DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos
- Stark-Riedesel-and-Parsia-Hakimian-Tineola-Taking-Bite-Out-of-Enterprise-Blockchain.pdf
- Thanh Bui and Siddharth Rao
- DEFCON-26-Thanh-Bui-and-Siddharth-Rao-Demo-Videos
- Thanh-Bui-and-Siddharth-Rao-Last-Mile-Auth-Problem-Exploiting-End-to-End.pdf
- The Tarquin
- DEFCON-26-The-Tarquin-Demo-Videos
- The-Tarquin-Weaponizing-Unicode-Homographs-Beyond-IDNs.pdf
- Thiago Alves
- DEFCON-26-Thiago-Alves-Demo-Videos
- Thiago-Alves-Hacking-PLCs-and-Causing-Havoc-on-Critical-Infrastructures.pdf
- Torani - Buchwald - Nirenberg
- Truman Kain
- Truman Kain - Updated
- Vincent Tan
- Wesley McGrew
- William Martin
- Wu HuiYu and Qian Wenxiang
- DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos
- Wu-HuiYu-and-Qian-Wenxiang-Breaking-Smart-Speakers.pdf
- Xiaolong Bai and Min Zheng
- DEFCON-26-Xiaolong-Bai-and-Min-Zheng-Demo-Video
- Xiaolong-Bai-and-Min-Zheng-One-Bite-And-All-Your-Dreams-Will-Come-True.pdf
- Zach Miller and Alex Kissinger
- DEFCON-26-Zach-Miller-and-Alex-Kissinger-Demo-Videos
- Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain.pdf
- Zach Miller and Alex Kissinger - Updated
- Zach Miller and Alex Kissinger - Extras
- Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain-Updated.pdf
- nevermoe
- sghctoma
- DEFCON-26-sghctoma-Demo-Videos
- sghctoma-all-your-math-are-belong-to-us.pdf
- singe
- smea
- DEFCON-26-smea-Jailbreaking-the-3DS-Demo-Videos
- smea-Jailbreaking-the-3DS.pdf
- Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf
- Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf
- Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses.pdf
- Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story.pdf
- Crowley-Paredes-Savage-Outsmarting-the-Smart-City.pdf
- Eckert-Sumner-Krause-Inside-the-Fake-Science-Factory.pdf
- Eduardo-Izycki-And-Rodrigo-Colli-Digital-Leviathan-Nation-State-Big-Brothers.pdf
- Egypt-One-Liners-to-Rule-Them-All.pdf
- Fireside-Panel-D0-N0-H4RM.pdf
- Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz-Updated.pdf
- Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz.pdf
- Foster-and-Ayrey-Lost-and-Found-Certs-residual-certs-for-pre-owned-domains.pdf
- Galloway-and-Yunusov-For-the-love-of-Money-Finding-And-Exploiting-Vulns-In-Mobile-POS-Updated.pdf
- Ian-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains.pdf
- Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target-Updated.pdf
- Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target.pdf
- Joe-Grand-Searching-for-the-Light-Adventures-w-Opticspy.pdf
- Josep-Rodriguez-Breaking-Extreme-Networks-WingOS-Updated.pdf
- Lawshae-Who-Controls-the-Controllers-Hacking-Crestron.pdf
- Maggie-Mayhem-Sex-Work-After-SESTA.pdf
- Maksim-Shudrak-Fuzzing-Malware-For-Fun-and-Profit.pdf
- Matt-King-Micro-Renovator-Bringing-Proc-Firmware-Up-To-Code.pdf
- Matt-Knight-and-Ryan-Speers-RF-Fuzzing-Tools-to-Expose-PHY-Layer-Vulns.pdf
- Matt-Wixey-Betrayed-by-the-Keyboard-Updated.pdf
- Matt-Wixey-Betrayed-by-the-Keyboard.pdf
- Matthews-Adams-Greco-Youre-Just-Complaining-Because-Youre-Guilty.pdf
- Michael-Ossmann-and-Dominic-Spill-Revolting-Radios.pdf
- Min-Zheng-Xiaolong-Bai-Fasten-your-Seatbelts-Escaping-iOS-11-Sandbox.pdf
- Nils-Amiet-and-Yonal-Romailler-Reaping-and-breaking-keys-at-scale-when-crypto-meets-big-data.pdf
- Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-and-Pop-0days-Out.pdf
- Panel-DCGroups.pdf
- Paternotte-and-van-Ommeren-It-WISNt-Me-Attacking-Industrial-Wireless-Mesh.pdf
- Rachel-Greenstadt-and-Aylin-Caliskan-De-anonymizing-Programmers.pdf
- Richard-Thieme-The-Road-to-Resilience .pdf
- Rob-Joyce-Absurd-Xmas-Lights.pdf
- Rousseau-and-Seymour-Finding-Xori-Malware-Analysis-Triage-w-Auto-Disassembly.pdf
- Seamus-Burke-Journey-Into-Hexagon.pdf
- Sean-Metcalf-Exploiting-Administrator-Insecurities.pdf
- Shortxstack-and-Seth-Law-Building-the-Hacker-tracker.pdf
- Si-and-AgentX-Wagging-The-Tail.pdf
- Steven-Danneman-Your-Banks-Digital-Side-Door.pdf
- Yaniv-Balmas-What-The-FAX.pdf
- YawnBox-Emerald-Onion-Privacy-Infrastructure-Challenges-and-Opportunites.pdf
- Yu-Wang-Attacking-The-MacOS-Kernel-Graphics-Driver.pdf
- Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs-Updated.pdf
- Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs.pdf
- zerosum0x0-Eternal-Exploits.pdf
- DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID
- DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments
- Workshop-Adam-Steed-and-James-Albany-Attacking-Active-Directory-and-Advanced-Methods-of-Defense-2018.pdf
- Workshop-Alexandrine-Torrents-and-Arnaud-Soullie-Pentesting-ICS-101.pdf
- Workshop-Arun-Magesh-Buzzing-Smart-Devices.pdf
- Workshop-Bryce-Kunz-and-Kevin-Lustic-Fuzzing-FTW.pdf
- Workshop-Dave-Porcello-and-Sean-Gallagher-Packet-Mining-for-Privacy-Leakage.pdf
- Workshop-David-Pearson-The-Truth-is-in-the-Network_-Reverse-Engineering-Application-Layer-Protocols-Via-PCAP.pdf
- Workshop-David-Turco-and-Jon-Overgaard-Christiansen-Wheres-My-Browser-Learn-Hacking-iOS-and-Android-WebViews.pdf
- Workshop-Eijah-Decentralized-Hacker-Net.pdf
- Workshop-Jakub-Botwicz-and-Wojciech-Rauner-Fuzzing-with-AFL-(American-Fuzzy-Lop).pdf
- Workshop-Joe-Grand-Build-Your-Own-Opticspy.pdf
- Workshop-Joe-Grand-Hardware-Hacking-Basics.pdf
- Workshop-Joshua-Pereyda-and-Timothy-Clemans-Advanced-Custom-Network-Protocol-Fuzzing.pdf
- Workshop-Louis-Nyfenegger-and-Luke-Jahnke-Finding-Needles-in-Haystacks.pdf
- Workshop-Louis-Nyfenegger-and-Luke-Jahnke-JWAT-Attacking-JSON-WEB-TOKENS.pdf
- Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf
- Workshop-Mike-Guirao-Securing-Big-Data-in-Hadoop.pdf
- Workshop-Nick-Tait-Reverse-Engineering-with-OpenSCAD-and-3D-Printing.pdf
- Workshop-Sneha-Rajguru-ARM-eXploitation-101.pdf
- Workshop-Walter-Cuestas-and-Mauricio-Velazco-Lateral-Movement-101-2018-Update.pdf
Aquí tenéis el material disponible de la DEF CON 26:
También también podéis descargar todo este contenido desde este enlace o por torrent a través de este otro enlace.
Y si también os interesan los talleres, aquí tenéis la lista de los publicados:
Los cuales también tenéis la opción de baralos vía torrent o rar.
Y ya puestos, si también quieres descargarte la música, aquí tienes los enlaces: torrent y rar.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec