Material de DeepSec 2015
Por si no tenéis material bastante para leer, aquí tenéis las diapositivas presentadas en DeepSec 2015:
- Agile_Security_The_Good,_The_Bad,_(and_Mostly)_The_Ugly_-_Daniel_Liber.pdf
- Bridging_the_Air-Gap_Data_Exfiltration_from_Air-Gap_ Networks_-_Yisroel_Mirsky.pdf
- Can_societies_manage_ the_SIGINT_monster_-_Duncan_Campbell.pdf
- Chw00t_How_To_Break Out_from_Various_Chroot_Solutions_-_Bucsay_Balazs.pdf
- Continuous_Intrusion_Why_CI_Tools_Are_an_Attacker's_Best_Friends_-_Nikhil_Mittal.pdf
- Cyber_Cyber_Cyber_Warfare___Mistakes_of_the_DoDs_-_Raoul Chiesa.pdf
- Deactivating_Endpoint_Protection_Software_in_an_Unauthorized_ Manner_-_Matthias_Deeg.pdf
- Extending_a_Legacy_ Platform_Providing_a_Minimalistic,_Secure_Single-Sign-On-Library_-_Bernhard_Goeschelberger,_Sebastian_Goettfert.pdf
- File_Format_Fuzzing_in_Android_-Alexandru_Blanda.pdf
- German_Privacy_Law_And_IT_Security_-_Stefan_Schumacher.pdf
- Hacking Cookies in Modern Web Applications_and_Browsers_-_Dawid_Czagan.pdf
- How_To_Break_XML_Encryption_-_Automatically_-_Juraj_Somorovsky.pdf
- Legal_Responses_ Against_Cyber_ Incidents_-_Oscar_Serrano.pdf
- Not_so_Smart_On_ Smart_TV_Apps_-_Marcus_Niemietz.pdf
- OSINT_Barncat___Mining_Malware_for_Intelligence_at_Scale_-_John_Bambenek.pdf
- Revisiting_SOHO_Router_Attacks_-_Jose_Antonio _Rodriguez_Garcia,_Ivan _Sanz_de_Castro,_Ãlvaro_Folgado_Rueda.pdf
- Yes,_Now_YOU_Can_ Patch_That_Vulnerability_Too!_-_Mitja_Kolsek.pdf
- ZigBee_SmartHomes_A_Hackers_Open_House_-_Tobias_Zillner,_Florian_Eichelberger.pdf