Presentaciones de Ruxcon 2015
- November 6, 2015
- tuxotron
- DNS as a Defense Vector
- High Performance Fuzzing
- The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election
- MalwAirDrop: Compromising iDevices via AirDrop
- Broadcasting Your Attack: Security Testing DAB Radio In Cars
- Windows 10: 2 Steps Forward, 1 Step Back
- Practical Intel SMEP Bypass Techniques on Linux
- Advanced SOHO Router Exploitation
- Why Attacker's Toolsets Do What They Do
- SDN Security
- Window Driver Attack Surface: Some New Insights
- Abusing Adobe Reader¹s JavaScript APIs
- High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
- VoIP Wars: Destroying Jar Jar Lync
- VENOM
- Fruit Salad, yummy yummy: An analysis of ApplePay
- A Peek Under The Blue Coat
- Automated Malware Analysis: A Behavioural Approach to Automated Unpacking
- Tasty Malware Analysis with T.A.C.O.: Bringing Cuckoo Reports into IDA Pro
- A Practical Robust Mitigation and Testing Tool for Use-After-Free Vulnerabilities
- Testing TLS - How To Check If Your TLS Implementation Is Correct
- Microarchitecture Independent VM Introspection

Aquí tenéis la lista de las presentaciones que se han publicados de Ruxcon 2015:
Material de SecTor 2015
- November 4, 2015
- tuxotron
- Maturing InfoSec: Lessons from Aviation on Information Sharing - Slides
- Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Video
- Breaking Access Controls with BLEKey - Video
- Breaking and Fixing Python Applications - Video Slides Tools
- Complete Application Ownage via Multi-POST XSRF - Video
- Confessions of a Professional Cyber Stalker - Video
- Cymon - An Open Threat Intelligence System - Video
- Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Slides
- Hijacking Arbitrary .NET Application Control Flow - Video Slides
- Malware Activity in Mobile Networks – An Insider View - Video Slides
- Software Defined Networking / Attacker Defined Networking - Video
- Stealth Attack From The Produce Aisle - Slides
- Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Video Slides
- UNMASKING MALWARE - Video
- Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Video
- Bulletproofing Your Incident Response Plan: Effective Tabletops - Video
- CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Slides
- Make Metrics Matter - Slides
- The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Video
- There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Video
- Building an Effective Vulnerability & Remediation Management Program - Video
- Ground Zero Financial Services: Targeted Attacks from the Darknet - Video
- Peeling The Layers Of Vawtrak - Slides
- Preventing Home Automation Security Disasters - Video Slides
- Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Video
- Security for non-Unicorns - Video
- Certifi-gate: Has your Android device been Pwned? - Video
- Effective Ways to Tackle Vulnerability Remediation - Video
- Knowing what happened is only half the battle. - Video
- SIEM and the Art of Log Management - Video Slides

Ya está disponible el material (vídeos y diapositivas) de SecTor 2015.
CODEGIRL - Documental subtitulado en español
- November 4, 2015
- tuxotron
Desde la remota tierra de Moldova , pasando por el Brasil metropolitano, hasta el Massachusetts suburbano, CODEGIRL sigue a equipos de chicas de secundaria alrededor del mundo que tienen tres meses para crear una aplicación que resuelva los problemas en sus comunidades. El equipo ganador recibirá 10 mil dólares si termina su aplicación, pero cada chica descubre algo valioso por el camino.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec