Material de Defcon 23

Y después de Black Hat, llega Defcon. Ya podemos acceder a las presentaciones de la edición 23 de la conferencia más grande sobre seguridad informática. 3alarmlampscooter 3alarmlampscooter-DIY-Nukeproofing.pdf Alessandro Di Federico Alessandro-Di-Federico-Leakless-How-The-ELF-ruined.pdf Amit Ashbel & Maty Siman Amit-Ashbel-Maty-Siman-Game-of-Hacks-Play-Hack-and.pdf AmmonRa ammonRA-How-to-hack-your-way-out-of-home-detention.pdf Andres Blanco & Andres Gazzoli Andres-Blanco-802.11-Massive-Monitoring.pdf Atlas Atlas-Fun-With-Symboliks.pdf Bart Kulach Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pdf Brent White Brent-White-Hacking-Web-Apps-WP.pdf Brian Gorenc & Abdul Aziz Hariri & Jason Spelman Hariri-Spelman-Gorenc-Abusing-Adobe-Readers-JavaSc.pdf Bruce Potter Bruce-Potter-Hackers-Guide-to-Risk.pdf Chris Domas Chris-Domas-REpsych.pdf Chris Rock Chris-Rock-I-Will-Kill-You-How-to-Get-Away-with-Mu.
Leer más

Material de Black Hat USA 2015

Ya tenemos disponible la mayoría de las presentaciones de la Black Hat USA 2015. La lista es la siguiente: The Lifecycle of a Revolution us-15-Granick-The-Lifecycle-Of-A-Revolution.pdf Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection us-15-Gorenc-Abusing-Silent-Mitigations-Understanding-Weaknesses-Within-Internet-Explorers-Isolated-Heap-And-MemoryProtection.pdf us-15-Gorenc-Abusing-Silent-Mitigations-Understanding-Weaknesses-Within-Internet-Explorers-Isolated-Heap-And-MemoryProtection-wp.pdf Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asynchronous-And-Fileless-Backdoor.pdf us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asynchronous-And-Fileless-Backdoor-wp.pdf us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asynchronous-And-Fileless-Backdoor-WMIBackdoor.ps1 Abusing XSLT for Practical Attacks us-15-Arnaboldi-Abusing-XSLT-For-Practical-Attacks.pdf us-15-Arnaboldi-Abusing-XSLT-For-Practical-Attacks-wp.pdf Advanced IC Reverse Engineering Techniques: In Depth Analysis of a Modern Smart Card us-15-Thomas-Advanced-IC-Reverse-Engineering-Techniques-In-Depth-Analysis-Of-A-Modern-Smart-Card.
Leer más

Vídeos de la Infiltrate 2015

Ya está disponibles los vídeos de la Infiltrate 2015, conferencia sobre seguridad informática celebrada el pasado mes de abril en Miami, Florida. Los vídeos publicados son los siguientes: Alex Ionescu Insection: AWEsomely Exploiting Shared Memory Objects Ram Shankar & Sacha Faust Data Driven Offense Neil Archibald Modern Objective-C Exploitation James Forshaw A Link to the Past: Abusing Symbolic Links on Windows Rusty Wagner & Jordan Wiens Hacking Games in a Hacked Game Infiltrate2015 BJJ Open Mat - part 2 Infiltrate2015 BJJ Open Mat - Part 1 Braden Thomas Technical Keynote: Practical Attacks on DOCSIS Nathan Rittenhouse Problems in Symbolic Fuzzing Joaquim Espinhara & Rafael Silva MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect data Patrick Wardle Writing Bad@ss OS X Malware Jacob Torrey HARES: Hardened Anti-Reverse Engineering System Ray Boisvert [keynote] Abyss or Turning Point: Strategy Skills and Tradecraft in the Age of 21st Century Warfare
Leer más

Presentaciones de REcon 2015

Ya están disponibles las presentaciones de la REcon 2015, una conferencia sobre seguridad que se celebra anualmente en Montreal, Canadá. La lista de presentaciones es la siguiente (de acuerdo con el programa, faltan algunas en estos momentos): 01-joan-calvet-marion-marschalek-paul-rascagneres-Totally-Spies 04-jeffrey-crowell-julien-voisin-Radare2-building-a-new-IDA 05-peter-hlavaty-jihui-lu-This-Time-Font-hunt-you-down-in-4-bytes 06-sophia-d-antoine-Exploiting-Out-of-Order-Execution 07-travis-goodspeed-sergey-bratus-Polyglots-and-Chimeras-in-Digital-Radio-Modes 09-yuriy-bulygin-oleksandr-bazhaniuk-Attacking-and-Defending-BIOS-in-2015 13-colin-o-flynn-Glitching-and-Side-Channel-Analysis-for-All 14-christopher-domas-The-movfuscator 16-yong-chuan-koh-Understaning-the-Microsoft-Office-Protected-View-Sandbox 17-nitay-artenstein-shift-reduce-Pandora-s-Cash-Box-The-Ghost-Under-Your-POS 18-andrew-zonenberg-From-Silicon-to-Compiler 20-steven-vittitoe-Reverse-Engineering-Windows-AFD-sys 21-j00ru-One-font-vulnerability-to-rule-them-all
Leer más

Vídeos de la OWASP AppSec Europa 2015

Ya están disponibles los vídeos de la OWASP AppSec Europa 2015 celebrada en Amsterdam del 19 al 22 de mayo. Martin Knobloch - Opening ceremony Joshua Corman - Continuous Acceleration: Why Continuous Everything Requires A Suppl... Nicolas Gregoire - Server-Side Browsing Considered Harmful Yossi Daya - Rise Of The Machines - How Automated Processes Overtook the Web Aaron Weaver - Building An AppSec Pipeline: Keeping Your Program, And Your Life, Sane Andrew Lee-Thorp - So, You Want To Use A WebView?
Leer más

Material de la Hack In The Box Amsterdam 2015

Ya está disponible el material de la Hack In The Box Amsterdam 2015. D1T1 - Alfonso De Gregorio - illusoryTLS.pdf D1T1 - Markus Vervier - Mobile Authentication Subspace Travel.pdf D1T1 - R. Rodriguez P. Vila - Relay Attacks in EMV Contactless Cards with Android OTS Devices.pdf D1T1 - Saumil Shah - Stegosploit - Hacking with Pictures.pdf D1T1 - T. Yunusov K. Nesterov - Bootkit via SMS.pdf D1T1 - Xeno Kovah and Corey Kallenberg - How Many Million BIOSes Would You Like to Infect.
Leer más

Vídeos de la BSides Boston 2015

Desde la web de irongeek podemos acceder a los vídeos de la BSides Boston 2015. The Securitized State: Where it came from, where it's going, what can be done about it Molly Sauter Is Threat Modeling for Me? Robert Hurlbut Hacker or criminal? Repairing the reputation of the infosec community. Melanie Ensign Running Away from Security: Web App Vulnerabilities and OSINT Collide Micah Hoffman Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program Paul Asadoorian Protect Your "
Leer más

Vídeos PyCon 2015

Entre el 8 y el 16 de abril, se celebró en Montreal la conferencia más distinguida enfocada al lenguaje de programación Python: PyCon 2015. La lista de charlas es bastante amplia y tocan todo tipo de temas alrededor de Python. Si te interesa este lenguaje de programación que tan de moda está, aquí tienes material de sobra para pasar un buen rato: Keynote - Guido van Rossum Keynote - Gabriella Coleman Type Hints - Guido van Rossum Closing Messages Jim Baker - Getting to Jython 2.
Leer más

Vídeos de BSides Nashville 2015

Cortesía de Irongeek, podemos ver los vídeos de las charlas de BSides Nashville 2015. La list es la siguiente: BSides Nashville Intro and Pondering the False Economy of Secrets Applied Detection and Analysis Using Flow Data Using devops monitoring tools to increase security visibility The Great Trojan Demo Nobody Understands Me: Better Executive Metrics We Built This & So Can You! That's NOT my RJ45 Jack!: IRL Networking for Humans Finding Low Hanging Fruit with Kali What do infosec practitioners actually do From Parking Lot to Server Room N4P Wireless Pentesting: So easy even a caveman can do it hashcat Skiddiemonkeys: Fling "
Leer más

Presentaciones de SyScan 2015

También están disponibles las presentaciones de SyScan 2015: Finding and exploiting novel flaws in Java software Attacks on telecom operators and mobile subscribers using SS7: from DoS to call interception got root? Compromising OS X HARES: Hardened Anti-Reverse Engineering System A Link to the Past: Abusing Symbolic Links on Windows Cryptographic backdooring Caring Less - De-humanizing Human Vulnerability Assessment How to own any windows network via group policy hijacking attacks Shooting Elephants BadXNU, a rotten apple!
Leer más