28 ago 2013

[DEF CON 21] Presentaciones y Papers

DEF CON es una de las más grandes y viejas convenciones de hackers en el mundo. Se lleva a cabo en Las Vegas y su fundador fue Jeff Moss. La primera reunión de DEF CON tuvo lugar en Las Vegas, en junio de 1993. La mayoría de los asistentes son profesionales de la seguridad informática, crackers, y hackers.


Ya está disponible el material de la última convención, DEF CON 21, y aquí les dejo las Presentaciones y Papers de los exponentes:

  • Business logic flaws in mobile operators services – PDF White Paper
  • Fear the Evil FOCA: IPv6 attacks in Internet connections – PDF
  • Suicide Risk Assessment and Intervention Tactics – PDF Extras
  • Combatting Mac OSX/iOS Malware with Data Visualization – PDF White Paper
  • MITM All The IPv6 Things – PDF
  • PowerPwning: Post-Exploiting By Overpowering PowerShell – PDF Extras
  • Transcending Cloud Limitations by Obtaining Inner Piece – PDF Extras
  • Data Evaporation from SSDs – PDF
  • Evil DoS Attacks and Strong Defenses – PDF
  • RFID Hacking: Live Free or RFID Hard – PDF Extras
  • OTP, It won’t save you from free rides! – PDF White Paper Extras
  • Conducting massive attacks with open source distributed computing – PDF
  • Offensive Forensics: CSI for the Bad Guy – PDF Extras
  • Utilizing Popular Websites for Malicious Purposes Using RDI – PDF
  • Abusing NoSQL Databases – PDF
  • Legal Aspects of Full Spectrum Computer Network (Active) Defense – PDF
  • Blucat: Netcat For Bluetooth – Extras
  • Home Invasion 2.0 – Attacking Network-Controlled Consumer Devices – PDF White Paper Extras
  • Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!) – PDF
  • Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions – PDF White Paper
  • How to Disclose or Sell an Exploit Without Getting in Trouble – PDF
  • I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell – PDF
  • Privacy In DSRC Connected Vehicles – PDF
  • Pwn’ing You(r) Cyber Offenders – PDF
  • Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO) – PDF White Paper Extras
  • Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot – PDF
  • gitDigger: Creating useful wordlists from public GitHub repositories – PDF
  • 10000 Yen into the Sea – PDF Extras
  • Defeating SEAndroid – PDF
  • The Politics of Privacy and Technology: Fighting an Uphill Battle – PDF
  • Java Every-Days: Exploiting Software Running on 3 Billion Devices – PDF White Paper
  • JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces – PDF Extras
  • Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust – PDF
  • So You Think Your Domain Controller is Secure? – PDF
  • Phantom Network Surveillance UAV / Drone – PDF
  • The Bluetooth Device Database – PDF Extras
  • Dude, WTF in my car? – PDF
  • Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned – PDF
  • Torturing Open Government Systems for Fun, Profit and Time Travel – PDF
  • The Secret Life of SIM Cards – PDF
  • Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock – PDF Extras
  • GoPro or GTFO: A Tale of Reversing an Embedded System – PDF
  • A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading – PDF Extras
  • Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices – PDF White Paper Extras
  • Getting The Goods With smbexec – PDF
  • PowerPreter: Post Exploitation Like a Boss – PDF Extras
  • Kill ‘em All — DDoS Protection Total Annihilation! – PDF White Paper Extras
  • Please Insert Inject More Coins – PDF
  • Stalking a City for Fun and Frivolity – PDF
  • Fast Forensics Using Simple Statistics and Cool Tools – PDF Extras
  • VoIP Wars: Return of the SIP – PDF Extras
  • Exploiting Music Streaming with JavaScript – PDF Extras
  • ACL Steganography – Permissions to Hide Your Porn – PDF Extras
  • Doing Bad Things to ‘Good’ Security Appliances – PDF
  • Let’s screw with nmap – PDF Extras
  • Defending Networks with Incomplete Information: A Machine Learning Approach – PDF White Paper
  • We are Legion: Pentesting with an Army of Low-power Low-cost Devices – PDF Extras
  • The Road Less Surreptitiously Traveled – PDF Extras
  • Hacker Law School – PDF1 PDF2 PDF3 PDF4
  • Defense by numbers: Making problems for script kiddies and scanner monkeys – PDF
  • Forensic Fails – Shift + Delete won’t help you here – PDF
  • The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies – PDF
  • Building an Android IDS on Network Level – PDF
  • Safety of the Tor network: a look at network diversity, relay operators, and malicious relays – PDF
  • How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers – PDF
  • Examining the Bitsquatting Attack Surface – White Paper
  • Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks – PDF
  • Making Of The DEF CON Documentary – PDF
  • All Your RFz Are Belong to Me – Hacking the Wireless World with Software Defined Radio – PDF
  • A Password is Not Enough: Why disk encryption is broken and how we might fix it – PDF
  • EMET 4.0 PKI Mitigation – PDF
  • BYO-Disaster and Why Corporate Wireless Security Still Sucks – PDF
  • Evolving Exploits Through Genetic Algorithms – PDF
  • How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles – PDF White Paper Extras
  • Collaborative Penetration Testing With Lair – PDF
  • DNS May Be Hazardous to Your Health – PDF
  • Predicting Susceptibility to Social Bots on Twitter – PDF
  • EDS: Exploitation Detection System – PDF White Paper
  • The Government and UFOs: A Historical Analysis by Richard Thieme – PDF Extras
  • BoutiqueKit: Playing WarGames with expensive rootkits and malware – PDF
  • C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood – PDF
  • Insecurity – A Failure of Imagination – PDF
  • HTTP Time Bandit – PDF
  • BYOD PEAP Show – PDF
  • Android WebLogin: Google’s Skeleton Key – PDF Extras
  • Hacking Driverless Vehicles – PDF

Fuente: http://www.cyberhades.com/

Author & Editor

Ingeniero, me gusta la cyberseguridad, la programación y el blockchain.

0 Notaciones:

Publicar un comentario

Labels

0-day (12) 1337day (1) 8.8 (2) Adobe Acrobat (1) Android (2) Anonimato (1) Anonymous (9) BackDoor (2) BackTrack (15) badUSB (1) Base64 (1) Black Hat (7) BlackHat (1) Blackploit (30) Brute Force (3) Bug (106) Bypass Password (1) Bypass Redirect (1) C99 Shell (1) Carding (1) CheatSheet (15) Chilean Way (2) Conference (10) Cryptsetup (1) CSRF (1) DDoS (11) DEF CON (3) DEFCON (7) Dev (1) Diapositivas (1) Diseño Web (1) Distro Linux (27) Documental (2) DoS (2) Drupal (1) DuckDuckGo (1) E-zine (18) Ekoparty (1) Escaneo (4) España (1) Exploit (64) Ezine (1) Facebook (1) Fast-Info (44) FBI (1) Ficheros Binarios (1) Firefox (4) Flash (2) Forense (9) Fuerza Bruta (11) Fuga de Datos (1) GhostShell (1) GNU/Linux (4) Google (2) Guía (1) Hack T00LZ (135) Hack Tips (63) Hacked (6) Hacking (19) Hacking Hardware (5) HashCat (1) Herramientas (125) HighSecCON (1) Humor Geek (13) Infografía (1) Ingeniería Social (5) Inj3ct0r (1) Internet Explorer (3) Java (7) JavaScript (2) Kali (3) KitPloit (6) Leaks (22) Linux OS (79) LulzSec (1) Mac OS (10) Magazine (1) Malaware (3) Malaware Tools (12) Malware (1) Man in the Middle (15) Manuales (3) MD5 CRACK (4) Metasploit (57) MSSQL (1) MySQL (6) MySQL CRACK (1) Nmap (6) Nmap NSE (2) Noticias (200) NTLM CRACK (1) Ofuscar (5) OpenSolaris OS (1) OpenSSL (1) ORACLE (1) OWASP (3) Paper (10) PDF (7) PenTest (14) Perl (2) Phearking (13) Phishing (3) PHP (13) phpMyAdmin (1) PoC (1) Premios Bitacoras (1) Presentaciones (11) PRISM (1) Privacidad (2) Programación (12) Programas Linux (41) Programas Windows (41) Pwned (1) Python (5) Ransomware (1) Reconocimiento (5) Ruby (2) s (1) Scripts (7) Seguridad (150) Seguridad Web (139) Seguridad Wireless (19) Sensitive Data Exposure (2) SHA1 CRACK (1) Shellshock (1) Slides (1) Spoofing (1) Spyware (1) SQLi (19) SQLi Tools (7) SQLMap (2) SSH (1) Textos (74) Tips (57) Troyanos y Virus (11) Trucos (7) Trucos Win (7) Turiales (56) Tutoriales (18) Twitter (1) Ubuntu (2) Underc0de (1) UnderDOCS (1) Unlock (1) URL Redirection (1) UXSS (1) vBulletin (1) Video (48) Virtualización (2) Web T00LZ (16) Wifislax (1) Wikileaks (1) WikiRebels (1) Windows OS (65) Wireless Tools (13) XSS (16) Youtube (1)

 
biz.