8 ago 2011

Presentaciones de la Defcon19 (2011)


Bueno... para aquellos que les guste leer y practicar el inglés al mismo tiempo, fueron publicadas las presentaciones de la Defcon19. Son bastantes y algunas muy complejas si no te las explican (sumado a que están en inglés), pero bueno, hay varias entretenidas.

Lo ideal sería ver los videos de las presentaciones también (o por lo menos audio), pero lo más seguro es que las suban en el mismo repositorio que subieron los PDFs asi como están las DefCon anteriores, las BlackHat, CodeCon, etc... Busquen ustedes mismos.

File or Directory Name Size (Units)
dc-19-program.pdf (19.01 MiB)
DEFCON-19-Abstrct-The-Schemaverse-Guide.pdf (592.27 KiB)
DEFCON-19-Abstrct-The-Schemaverse.pdf (993.54 KiB)
DEFCON-19-Almeida-Workshop-ESD.pdf (1.85 MiB)
DEFCON-19-Alonso-Garrido-DUST.pdf (1.78 MiB)
DEFCON-19-Alonso-Garrido-Excel.pdf (458.22 KiB)
DEFCON-19-Arlen-Nano-Seconds-WP.pdf (177.42 KiB)
DEFCON-19-Arlen-Nano-Seconds.pdf (5.40 MiB)
DEFCON-19-Arpaia-Reed-Beat-to-1337.pdf (99.74 KiB)
DEFCON-19-Baldwin-DVCS-WP.pdf (102.23 KiB)
DEFCON-19-Baldwin-DVCS.pdf (2.69 MiB)
DEFCON-19-Barisani-Bianco-Laurie-Franken.pdf (2.01 MiB)
DEFCON-19-Barnett-Deceptive-Hacking-WP.pdf (822.13 KiB)
DEFCON-19-Barnett-Deceptive-Hacking.pdf (717.56 KiB)
DEFCON-19-Bilodeau-FingerBank.pdf (214.22 KiB)
DEFCON-19-Bilodeau-PacketFence.pdf (1005.30 KiB)
DEFCON-19-Bouillon-Federation-and-Empire.pdf (19.63 MiB)
DEFCON-19-Bowne-Three-Generations-of-DoS-Attacks.pdf (2.38 MiB)
DEFCON-19-Brooks-Wilson-Traps-of-Gold.pdf (4.89 MiB)
DEFCON-19-Bryner-Kinectasploit.pdf (1.07 MiB)
DEFCON-19-Carey-Metasploit-vSploit-Modules.pdf (1.08 MiB)
DEFCON-19-Chamales-Securing-Crisis-Maps.pdf (24.78 MiB)
DEFCON-19-Chow-Abusing-HTML5.pdf (124.22 KiB)
DEFCON-19-Conti-Security-Research.pdf (8.53 MiB)
DEFCON-19-Cook-Kernel-Exploitation.pdf (564.81 KiB)
DEFCON-19-Craig-Internet-Kiosk-Terminals.pdf (1.56 MiB)
DEFCON-19-Crenshaw-Cipherspaces-Darknets.pdf (5.12 MiB)
DEFCON-19-Crowley-Cryptographic-Oracles.pdf (5.49 MiB)
DEFCON-19-Cryer-Taking-Your-Ball-and-Going-Home.pdf (5.58 MiB)
DEFCON-19-DC-Groups-Panel.pdf (19.67 MiB)
DEFCON-19-Devarajan-LeBert-VDLDS.pptx.pdf (298.56 KiB)
DEFCON-19-Dinaburg-Bit-Squatting.pdf (11.86 MiB)
DEFCON-19-Duckwall-Bridge-Too-Far.pdf (1.28 MiB)
DEFCON-19-Elhage-Virtualization-Under-Attack.pdf (422.68 KiB)
DEFCON-19-Elrod-Morris-Not-a-Doctor.pdf (297.53 KiB)
DEFCON-19-Engebretson-Pauli-Pen-Testing.pdf (759.48 KiB)
DEFCON-19-Fail-Panel.pdf (347.34 KiB)
DEFCON-19-Feinstein-Jarmoc-Get-Off-of-My-Cloud.pdf (1.41 MiB)
DEFCON-19-Foofus-Forceful-Browsing-WP.pdf (417.46 KiB)
DEFCON-19-Fritschie-Witmer-F-On-the-River.pdf (2.76 MiB)
DEFCON-19-Garcia-UPnP-Mapping-WP.pdf (252.99 KiB)
DEFCON-19-Garcia-UPnP-Mapping.pdf (204.41 KiB)
DEFCON-19-Gavin-OpenDLP.pdf (61.34 KiB)
DEFCON-19-Geers-Strategic-Cyber-Security-WP.pdf (6.35 MiB)
DEFCON-19-Geers-Strategic-Cyber-Security.pdf (1.57 MiB)
DEFCON-19-Gomez-Bulletproofing-The-Cloud.pdf (17.52 MiB)
DEFCON-19-Hamiel-Smartfuzzing_the_Web_DC.pdf (744.91 KiB)
DEFCON-19-Havelt-Henrique.pdf (3.22 MiB)
DEFCON-19-Heiland-Printer-To-Pwnd.pdf (2.09 MiB)
DEFCON-19-Holt-Kilger-Assessing-Civilian-Willingness.pdf (248.35 KiB)
DEFCON-19-Howard-Cyber-Security-Trends-WP.pdf (456.41 KiB)
DEFCON-19-Howard-Cyber-Security-Trends.pdf (2.69 MiB)
DEFCON-19-Imhoff-Password-Cracking.pdf (574.54 KiB)
DEFCON-19-JackDaniel-PCI-2-PANEL.pdf (875.54 KiB)
DEFCON-19-Jakhar-Jugaad-Linux-Thread-Injection.pdf (168.53 KiB)
DEFCON-19-Kennedy-Pentesting-Over-Powerlines-2.pdf (1.17 MiB)
DEFCON-19-Kennish-Tracking-the-Trackers.pdf (3.83 MiB)
DEFCON-19-Kornbrust-Hacking-and-Securing-DB2.pdf (664.58 KiB)
DEFCON-19-Kotler-Amit-Sounds-Like-Botnet.pdf (586.40 KiB)
DEFCON-19-Krick-License-to-Transmit.pdf (11.74 MiB)
DEFCON-19-Lai-Wu-Chiu-PK-APT-Secrets-2.pdf (12.48 MiB)
DEFCON-19-Lenik-MAC(b)Daddy.pdf (753.41 KiB)
DEFCON-19-Linn-PIG-Finding-Truffles.pdf (3.36 MiB)
DEFCON-19-Maresca-FIPS-140.pdf (294.20 KiB)
DEFCON-19-Marpet-Gostom-Smile-for-the-Grenade.pdf (7.68 MiB)
DEFCON-19-McCoy-Hacking-Net.pdf (3.98 MiB)
DEFCON-19-McGrew-Covert-WP.pdf (542.33 KiB)
DEFCON-19-McGrew-Covert.pdf (2.44 MiB)
DEFCON-19-McNabb-Vulns-Wireless-Water-Meter-Networks.pdf (2.62 MiB)
DEFCON-19-Miller-Battery-Firmware-Hacking.pdf (43.52 MiB)
DEFCON-19-O'Neil-Chin-Google-Android.pdf (4.85 MiB)
DEFCON-19-Ocepek-Blinkie-Lights-Arduino.pdf (11.74 MiB)
DEFCON-19-Ollam-Gun-Safes.pdf (27.28 MiB)
DEFCON-19-Osborn-Johansen-Hacking-Google-Chrome-OS.pdf (9.45 KiB)
DEFCON-19-Percoco-Spiderlabs-Droid.pdf (5.62 MiB)
DEFCON-19-Percoco-Spiderlabs-Malware-Freakshow-3.pdf (3.81 MiB)
DEFCON-19-Percoco-Spiderlabs-SSLizzard.pdf (4.45 MiB)
DEFCON-19-Phillips-Hacking-MMORPGs.pdf (870.61 KiB)
DEFCON-19-Pickett-Port-Scanning-Without-Packets.pdf (8.22 MiB)
DEFCON-19-Pickett-Resources.pdf (24.66 KiB)
DEFCON-19-Pittman-Password-Fail.pdf (2.52 MiB)
DEFCON-19-Rezchikov-Wang-Engelman-Airport-Security-WP.pdf (344.67 KiB)
DEFCON-19-Robinson-Time.pdf (1.36 MiB)
DEFCON-19-Schearer-WTF-Privacy.pdf (4.42 MiB)
DEFCON-19-Shah-Mobile-Moolah.pdf (1.49 MiB)
DEFCON-19-Skunkworks-Bitcoin.pdf (131.50 KiB)
DEFCON-19-Strauchs_Rad_Newman-SCADA-in-Prisons.pptx.pdf (38.10 MiB)
DEFCON-19-Street-Steal-Everything.pdf (78.45 MiB)
DEFCON-19-Sumner-Byers-Alien-Weaponizing-Cyberpsychology.pdf (95.57 KiB)
DEFCON-19-Sutherland-How-to-Get-Your-Message-Out.pdf (1.03 MiB)
DEFCON-19-Swende-Karlsson-Owasp-Hatkit.pdf (1.45 MiB)
DEFCON-19-Tassey-Perkins-Wireless-Aerial-Surveillance-Platform.pdf (5.00 MiB)
DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf (233.95 KiB)
DEFCON-19-Trimble-Cybertravel.ppt.pdf (1.39 MiB)
DEFCON-19-Webb-Runtime-Process-Insemination.pdf (799.93 KiB)
DEFCON-19-Weeks-Network-Nightmare.pdf (7.04 MiB)
DEFCON-19-Weyers-Key-Impressioning.pdf (17.05 MiB)
DEFCON-19-Wilson-Traps-of-Gold.pdf (4.89 MiB)
DEFCON-19-Woodberg-Network-Application-Firewalls.pdf (1.46 MiB)
DEFCON-19-Zhu-Phishing-Online-Scams-in-China.pdf (6.88 MiB)
DEFCON-19-Zoz-Bianchi-Vanquishing-Voyeurs.pdf (4.75 MiB)
Total size of files in this directory (536.33 MiB)

[+] Salu2
[+] Zion3R

Author & Editor

Ingeniero, me gusta la cyberseguridad, la programación y el blockchain.

0 Notaciones:

Publicar un comentario

Labels

0-day (12) 1337day (1) 8.8 (2) Adobe Acrobat (1) Android (2) Anonimato (1) Anonymous (9) BackDoor (2) BackTrack (15) badUSB (1) Base64 (1) Black Hat (7) BlackHat (1) Blackploit (30) Brute Force (3) Bug (106) Bypass Password (1) Bypass Redirect (1) C99 Shell (1) Carding (1) CheatSheet (15) Chilean Way (2) Conference (10) Cryptsetup (1) CSRF (1) DDoS (11) DEF CON (3) DEFCON (7) Dev (1) Diapositivas (1) Diseño Web (1) Distro Linux (27) Documental (2) DoS (2) Drupal (1) DuckDuckGo (1) E-zine (18) Ekoparty (1) Escaneo (4) España (1) Exploit (64) Ezine (1) Facebook (1) Fast-Info (44) FBI (1) Ficheros Binarios (1) Firefox (4) Flash (2) Forense (9) Fuerza Bruta (11) Fuga de Datos (1) GhostShell (1) GNU/Linux (4) Google (2) Guía (1) Hack T00LZ (135) Hack Tips (63) Hacked (6) Hacking (19) Hacking Hardware (5) HashCat (1) Herramientas (125) HighSecCON (1) Humor Geek (13) Infografía (1) Ingeniería Social (5) Inj3ct0r (1) Internet Explorer (3) Java (7) JavaScript (2) Kali (3) KitPloit (6) Leaks (22) Linux OS (79) LulzSec (1) Mac OS (10) Magazine (1) Malaware (3) Malaware Tools (12) Malware (1) Man in the Middle (15) Manuales (3) MD5 CRACK (4) Metasploit (57) MSSQL (1) MySQL (6) MySQL CRACK (1) Nmap (6) Nmap NSE (2) Noticias (200) NTLM CRACK (1) Ofuscar (5) OpenSolaris OS (1) OpenSSL (1) ORACLE (1) OWASP (3) Paper (10) PDF (7) PenTest (14) Perl (2) Phearking (13) Phishing (3) PHP (13) phpMyAdmin (1) PoC (1) Premios Bitacoras (1) Presentaciones (11) PRISM (1) Privacidad (2) Programación (12) Programas Linux (41) Programas Windows (41) Pwned (1) Python (5) Ransomware (1) Reconocimiento (5) Ruby (2) s (1) Scripts (7) Seguridad (150) Seguridad Web (139) Seguridad Wireless (19) Sensitive Data Exposure (2) SHA1 CRACK (1) Shellshock (1) Slides (1) Spoofing (1) Spyware (1) SQLi (19) SQLi Tools (7) SQLMap (2) SSH (1) Textos (74) Tips (57) Troyanos y Virus (11) Trucos (7) Trucos Win (7) Turiales (56) Tutoriales (18) Twitter (1) Ubuntu (2) Underc0de (1) UnderDOCS (1) Unlock (1) URL Redirection (1) UXSS (1) vBulletin (1) Video (48) Virtualización (2) Web T00LZ (16) Wifislax (1) Wikileaks (1) WikiRebels (1) Windows OS (65) Wireless Tools (13) XSS (16) Youtube (1)

 
biz.