Presentaciones de Defcon 22 ya disponibles

  • August 25, 2014
  • tuxotron
  • defcon22.jpg

    Ya se encuentran disponibles las presentaciones (diapositivas y algún documento extra) de Defcon 22:

    • Protecting SCADA From the Ground Up - PDF
    • Detecting Bluetooth Surveillance Systems - PDF
    • Dropping Docs on Darknets: How People Got Caught - PDF
    • Hacking 911: Adventures in Disruption, Destruction, and Death - PDF
    • How to Disclose an Exploit Without Getting in Trouble - PDF
    • Reverse Engineering Mac Malware - PDF
    • NSA Playset: PCIe - PDF
    • The Monkey in the Middle: A pentesters guide to playing in traffic. - PDF
    • Investigating PowerShell Attacks - PDF
    • Is This Your Pipe? Hijacking the Build Pipeline. - PDF
    • Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! - PDF
    • Home Alone with localhost: Automating Home Defense - PDF
    • Meddle: Framework for Piggy-back Fuzzing and Tool Development - PDF
    • Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively - PDF White Paper
    • One Man Shop: Building an effective security program all by yourself - PDF
    • RF Penetration Testing, Your Air Stinks - PDF
    • Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin - PDF
    • USB for all! - PDF
    • ShareEnum: We Wrapped Samba So You Don’t Have To - PDF
    • An Introduction to Back Dooring Operating Systems for Fun and Trolling - PDF
    • Android Hacker Protection Level 0 - PDF
    • Anatomy of a Pentest; Poppin' Boxes like a Pro - PDF
    • Bug Bounty Programs Evolution - PDF Extras
    • Practical Foxhunting 101 - PDF
    • Client-Side HTTP Cookie Security: Attack and Defense - PDF
    • Bypass firewalls, application white lists, secure remote desktops under 20 seconds - PDF
    • PropLANE: Kind of keeping the NSA from watching you pee - PDF
    • Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse - PDF
    • Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog - PDF
    • Through the Looking-Glass, and What Eve Found There - PDF White Paper
    • Summary of Attacks Against BIOS and Secure Boot - PDF
    • I am a legend: Hacking Hearthstone with machine learning - PDF
    • The Secret Life of Krbtgt - PDF
    • The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns - PDF
    • Hacking US (and UK, Australia, France, etc.) traffic control systems - PDF
    • The Cavalry Year[0] & a Path Forward for Public Safety - PDF
    • NSA Playset: DIY WAGONBED Hardware Implant over I2C - PDF
    • Abuse of Blind Automation in Security Tools - PDF
    • Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go - PDF
    • Steganography in Commonly Used HF Radio Protocols - PDF Extras
    • Saving Cyberspace by Reinventing File Sharing - PDF
    • Empowering Hackers to Create a Positive Impact - PDF
    • Just What The Doctor Ordered? - PDF
    • Check Your Fingerprints: Cloning the Strong Set - PDF
    • Shellcodes for ARM: Your Pills Don't Work on Me, x86 - PDF
    • Blowing up the Celly - Building Your Own SMS/MMS Fuzzer - PDF
    • Mass Scanning the Internet: Tips, Tricks, Results - PDF
    • Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering - PDF
    • Saving the Internet (for the Future) - PDF
    • Burner Phone DDOS 2 dollars a day : 70 Calls a Minute - PDF
    • Hack All The Things: 20 Devices in 45 Minutes - PDF
    • Stolen Data Markets: An Economic and Organizational Assessment - PDF
    • Raspberry MoCA - A recipe for compromise - PDF White Paper 1 White Paper 2
    • Girl… Fault-Interrupted. - PDF
    • Extreme Privilege Escalation On Windows 8/UEFI Systems - PDF White Paper
    • NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It - PDF
    • Oracle Data Redaction is Broken - PDF
    • Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System - PDF
    • Catching Malware En Masse: DNS and IP Style - PDF White Paper
    • Attacking the Internet of Things using Time - PDF
    • Open Source Fairy Dust - PDF
    • Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment - PDF White Paper
    • Generating ROP payloads from numbers - PDF
    • DEF CON Comedy Jam Part VII, Is This The One With The Whales? - PDF
    • The NSA Playset: RF Retroreflectors - PDF 1 PDF 2
    • VoIP Wars: Attack of the Cisco Phones - PDF
    • Playing with Car Firmware or How to Brick your Car - PDF
    • Measuring the IQ of your Threat Intelligence feeds - PDF
    • Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring - PDF
    • Abusing Software Defined Networks - PDF
    • NSA Playset : GSM Sniffing - PDF
    • Cyberhijacking Airplanes: Truth or Fiction? - PDF
    • Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance - PDF
    • Detecting and Defending Against a Surveillance State - PDF
    • Acquire current user hashes without admin privileges - PDF
    • You're Leaking Trade Secrets - PDF
    • Veil-Pillage: Post-exploitation 2.0 - PDF
    • From Raxacoricofallapatorius With Love: Case Studies In Insider Threat - PDF
    • Don't DDoS Me Bro: Practical DDoS Defense - PDF
    • Advanced Red Teaming: All Your Badges Are Belong To Us - PDF
    • I Hunt TR-069 Admins: Pwning ISPs Like a Boss - PDF
    • The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State - PDF
    • A Journey to Protect Points-of-sale - PDF
    • Impostor — Polluting Tor Metadata - PDF
    • Domain Name Problems and Solutions - PDF White Paper
    • Optical Surgery; Implanting a DropCam - PDF
    • Manna from Heaven: Improving the state of wireless rogue AP attacks - PDF
    • The Open Crypto Audit Project - PDF
    • Practical Aerial Hacking & Surveillance - PDF White Paper
    • From root to SPECIAL: Pwning IBM Mainframes - PDF
    • PoS Attacking the Traveling Salesman - PDF
    • Don't Fuck It Up! - PDF