Vídeos de Black Hat USA 2015
- September 30, 2015
- tuxotron
- ZigBee Exploited The Good, The Bad, And The Ugly
- WSUSpect Compromising The Windows Enterprise Via Windows Update
- Writing Bad @$$ Malware For OS X
- Winning The Online Banking War
- Why Security Data Science Matters & How It's Different Pitfalls And Promises Of
- Why Security Data Science Matters & How It's Different Pitfalls And Promises Of
- When IoT Attacks Hacking A Linux Powered Rifle
- Web Timing Attacks Made Practical
- Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware
- Unicorn Next Generation CPU Emulator Framework
- Understanding The Attack Surface & Attack Resilience Of Project Spartan's New E
- Understanding And Managing Entropy Usage
- TrustKit Code Injection On IOS 8 For The Greater Good
- ThunderStrike 2 Sith Strike
- THIS IS DeepERENT Tracking App Behaviors With Nothing Changed Phone
- These're Not Your Grand Daddy's CPU Performance Counters CPU Hardware Performa
- The Tactical Application Security Program Getting Stuff Done
- The NSA Playset A Year Of Toys And Tools
- The Node js Highway Attacks Are At Full Throttle
- The Memory Sinkhole Unleashing An X86 Design Flaw Allowing Universal Privilege
- The Little Pump Gauge That Could Attacks Against Gas Pump Monitoring Systems
- The Lifecycle Of A Revolution
- The Kali Linux Dojo Workshop #2 Kali USB Setups With Persistent Stores & LUKS N
- The Kali Linux Dojo Workshop #1 Rolling Your Own Generating Custom Kali Linux 2
- The Battle For Free Speech On The Internet
- The Applications Of Deep Learning On Traffic Identification
- Taxonomic Modeling Of Security Threats In Software Defined Networking
- Targeted Takedowns Minimizing Collateral Damage Using Passive DNS
- Taking Event Correlation With You
- Take A Hacker To Work Day How Federal Prosecutors Use The CFAA
- Switches Get Stitches
- Subverting Satellite Receivers For Botnet And Profit
- Stranger Danger! What Is The Risk From 3rd Party Libraries
- Staying Persistent In Software Defined Networks
- Stagefright Scary Code In The Heart Of Android
- Spread Spectrum Satcom Hacking Attacking The Globalstar Simplex Data Service
- Social Engineering The Windows Kernel Finding & Exploiting Token Handling Vulne
- SMBv2 Sharing More Than Just Your Files
- Server Side Template Injection RCE For The Modern Web App
- Securing Your Big Data Environment
- ROPInjector Using Return Oriented Programming For Polymorphism & Antivirus Evas
- Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion
- Review And Exploit Neglected Attack Surfaces In IOS 8
- Return To Where You Can't Exploit What You Can't Find
- Repurposing OnionDuke A Single Case Study Around Reusing Nation State Malware
- Remote Physical Damage 101 Bread And Butter Attacks
- Remote Exploitation Of An Unaltered Passenger Vehicle
- Red Vs Blue Modern Active Directory Attacks, Detection, And Protection
- PWNIE AWARDS
- Pen Testing A City
- Panel How The Wassenaar Arrangement's Export Control Of Intrusion Soft Affect
- Optimized Fuzzing IOKit In IOS
- My Bro The ELK Obtaining Context From Security Events
- Most Ransomware Isn't As Complex As You Might Think
- Mobile Point Of Scam Attacking The Square Reader
- Is The NSA Still Listening To Your Calls A Surveillance Debate Congressiona
- Internet Scale File Analysis
- Internet Facing PLCs A New Back Orifice
- Internet Plumbing Gor Security Professionals The State Of BGP Security
- Information Access And Information Sharing Where We Are And Where We Are Going
- How Vulnerable Are We To Scams
- How To Implement IT Security After A Cyber Meltdown
- How To Hack Government Technologists As Policy Makers
- Hidden Risks Of Biometric Identifiers And How To Avoid Them
- HI THIS IS URGENT PLZ FIX ASAP Critical Vulnerabilities And Bug Bounty Programs
- Harnessing Intelligence From Malware Repositories
- Graphic Content Ahead Towards Auto Scalable Analysis Of Graphical Images Emb
- GameOver Zeus Badguys And Backends
- From False Positives To Actionable Analysis Behavioral Intrusion Detection
- Forging The USB Armory, An Open Source Secure Flash Drive Sized Computer
- Fingerprints On Mobile Devices Abusing And Leaking
- FileCry The New Age Of XXE
- Faux Disk Encryption Realities Of Secure Storage On Mobile Devices
- Exploiting XXE Vulnerabilities In File Parsing Functionality
- Exploiting The DRAM Rowhammer Bug To Gain Kernel Privileges
- Exploiting Out of Order Execution For Covert Cross VM Communication
- Emanate Like A Boss Generalized Covert Data Exfiltration With Funtenna
- Dom Flow Untangling The DOM For More Easy Juicy Bugs
- Distributing The Reconstruction Of High Level Intermediate Representation
- Defeating Pass the Hash Separation Of Powers
- Defeating Machine Learning What Your Security Vendor Is Not Telling You
- Deep Learning On Disassembly
- Data Driven Threat Intelligence Metrics On Indicator Dissemination And Sharing
- Dance Like Nobodys Watching Encrypt Like Everyone Is A Peek Inside The BlackHat
- Crash & Pay How To Own And Clone Contactless Payment Devices
- CrackLord Maximizing Password Cracking Boxes
- Commercial Mobile Spyware Detecting The Undetectable
- Cloning 3G4G SIM Cards With A PC And An Oscilloscope Lessons Learned
- Certifi gate Front Door Access To Pwning Millions Of Androids
- Bypass Surgery Abusing Content Delivery Networks With Ser-Side Request Forgery
- Bypass Control Flow Guard Comprehensively
- Broadcasting Your Attack Security Testing DAB Radio In Cars
- Bringing A Cannon To A Knife Fight
- Bring Back The Honeypots
- Breaking Payloads With Runtime Code Stripping And Image Freezing
- Breaking HTTPS With BGP Hijacking
- Breaking Honeypots For Fun And Profit
- Breaking Access Controls With BLEKey
- Big Game Hunting The Peculiarities Of Nation State Malware Research
- BGP Stream
- Behind The Mask The Agenda, Tricks, & Tactics Of The Federal Trade Commission A
- Battle Of The SKM And IUM How Windows 10 Rewrites OS Architecture
- Back Doors And Front Doors Breaking The Unbreakable System
- Automated Human Vulnerability Scanning With AVA
- Attacking Interoperability An OLE Edition
- Attacking Hypervisors Using Firmware And Hardware
- Attacking ECMAScript Engines With Redefinition
- Assessing And Exploiting BigNum Vulnerabilities
- API Deobfuscator Resolving Obfuscated API Functions In Modern Packers
- Android Security State Of The Union
- Ah! Universal Android Rooting Is Back
- Adventures In Femtoland 350 Yuan For Invaluable Fun
- Advanced IC Reverse Engineering Tech In Depth Analysis Of A Modern Smart Ca
- Abusing XSLT For Practical Attacks
- Abusing Windows Management Instrumentation WMI To Build A Persistent, Asyn
- Abusing Silent Mitigations Understanding Weaknesses Within Internet Explorer's

Y después del material, ya podemos acceder también a los vídeos de las presentaciones de Black Hat USA 2015:
Aprende a usar la línea de comandos lo suficiente para ser peligroso
- September 21, 2015
- tuxotron

Con el título de Learn enough command line to be dangerous, Michael Hartl (creador de Ruby On Rails) está escribiendo un libro sobre una introducción a la línea de comandos de sistemas *nix (Linux, Mac OS, etc).
El contenido de lo que lleva escrito por ahora está disponible en el enlace anterior. Éste empieza con la instalación de una máquina virtual (Ubuntu) por si no tienes acceso a un sistema *nix o si estás aprendiendo, por si las moscas.
El libro empieza desde lo más básico, como la explicación de qué es el prompt y continúa con los comandos más básicos y esenciales que cualquiera que lidie con la línea de comandos debe conocer. Además de la teoría de los mismos, sigue con ejemplos y ejercicios.
Cómo funcionan los gráficos en sistemas de 8bits
- September 20, 2015
- tuxotron

A través de una serie de vídeos (dos por el momento), The ibookguy nos ilustra cómo se manejaban los gráficos en sistemas antiguos como Commodore, Nintendo, Apple o Atari.
Como decía, son sólo dos vídeos los publicados por el momento, pero su autor nos promete más.
En el primero de los vídeos que a continuación enlazo, nos hable del sistema gráfico de Commodore y Nintendo y en el segundo, nos habla sobre Apple y Atari. Ambos vídeos son muy cortitos (~7 y ~5 minutos), pero muy educativos y entretenidos. Si te gusta la retroinformática no te los puedes perder.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec