19 mar 2012

Material Oficial Blackhat Europe 2012

Se ha liberado el material (White Papers, Slides, Sources) de Blackhat Europe 2012, el congreso de seguridad más importante de Europa. 

Muchos se ven muy interesantes y vale la pena darse un tiempo para verlos:

  • Axelle Apvrille – Guillaume LovetAn Attacker’s Day into Virology: Human vs Computer
  •  Antonios Atlasis – Attacking IPv6 Implementation Using Fragmentation
    • White Paper
    • Slides
    • Archivo
  • Michael Baker Finding Needles in Haystacks (The Size of Countries)
  • Andrey Belenko – Dmitry Sklyarov "Secure Password Managers" and “Military-Grade Encryption” on Smartphones: Oh Really?
  • Andy DavisHDMI – Hacking Displays Made Interesting
  • Stephen de Vries – Beyond Scanning: Automating Web Application Security Tests
  • Tyrone Erasmus – The Heavy Metal That Poisoned the Droid
  • Takahiro Haruyama – Hiroshi SuzukiOne-byte Modification for Breaking Memory Forensic Analysis
  • Marcia Hofmann – Seth SchoenDefending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices
  • Jeff Jarmoc – SSL/TLS Interception Proxies and Transitive Trust
  • Ling Chuan Lee – Chan Lee YeeGDI Font Fuzzing in Windows Kernel For Fun
  • Steve Lord – Drop It Like It’s Hotspot: Hacking Mifi Routers For Nefarious Purposes
  • Rafal Los – Shane MacDougallOffensive Threat Modeling for Attackers: Turning Threat Modeling on its Head
  • Matias Madou – Secure in 2010? Broken in 2011!
  • Mariano Nunez Di Croce – Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
  • Phil Polstra – Preventing “Oh Shit!” Moments for 20 Euros or Less
  • Jerome Radcliffe – Issues with Embedded Device Disclosures: Helping the Vendors and Recognizing the End-Users
  • Enno Rey – Daniel MendeAll Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Crypto Ecosystem
  • Simon Roses Femerling – Smartphone’s Apps Are Not That Smart: Insecure Development Practices
  • Paul Royal – Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis
  • Rahul Sasi – IVR Security- Internal Network Attack via Phone Lines
  • Justin Searle – Dissecting Smart Meters
  • Shreeraj Shah – HTML5 Top 10 Threats: Stealth Attacks and Silent Exploits
  • Sumit Siddharth – Tom ForbesHacking XPATH 2.0
  • Alexey Sintsov – Lotus Domino: Penetration Through the Controller
  • Didier Stevens – Malicious PDF Analysis
  • Ben Williams – They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
  • Chris Wysopal – Data Mining a Mountain of Zero Day Vulnerabilities
  • Justin Searle – Workshop: SamuraiWTF

Aquí la web oficial por si suben más charlas: https://www.blackhat.com/

Fuente: http://www.cyberhades.com/

Author & Editor

Ingeniero, me gusta la cyberseguridad, la programación y el blockchain.

0 Notaciones:

Publicar un comentario

Labels

0-day (12) 1337day (1) 8.8 (2) Adobe Acrobat (1) Android (2) Anonimato (1) Anonymous (9) BackDoor (2) BackTrack (15) badUSB (1) Base64 (1) Black Hat (7) BlackHat (1) Blackploit (30) Brute Force (3) Bug (106) Bypass Password (1) Bypass Redirect (1) C99 Shell (1) Carding (1) CheatSheet (15) Chilean Way (2) Conference (10) Cryptsetup (1) CSRF (1) DDoS (11) DEF CON (3) DEFCON (7) Dev (1) Diapositivas (1) Diseño Web (1) Distro Linux (27) Documental (2) DoS (2) Drupal (1) DuckDuckGo (1) E-zine (18) Ekoparty (1) Escaneo (4) España (1) Exploit (64) Ezine (1) Facebook (1) Fast-Info (44) FBI (1) Ficheros Binarios (1) Firefox (4) Flash (2) Forense (9) Fuerza Bruta (11) Fuga de Datos (1) GhostShell (1) GNU/Linux (4) Google (2) Guía (1) Hack T00LZ (135) Hack Tips (63) Hacked (6) Hacking (19) Hacking Hardware (5) HashCat (1) Herramientas (125) HighSecCON (1) Humor Geek (13) Infografía (1) Ingeniería Social (5) Inj3ct0r (1) Internet Explorer (3) Java (7) JavaScript (2) Kali (3) KitPloit (6) Leaks (22) Linux OS (79) LulzSec (1) Mac OS (10) Magazine (1) Malaware (3) Malaware Tools (12) Malware (1) Man in the Middle (15) Manuales (3) MD5 CRACK (4) Metasploit (57) MSSQL (1) MySQL (6) MySQL CRACK (1) Nmap (6) Nmap NSE (2) Noticias (200) NTLM CRACK (1) Ofuscar (5) OpenSolaris OS (1) OpenSSL (1) ORACLE (1) OWASP (3) Paper (10) PDF (7) PenTest (14) Perl (2) Phearking (13) Phishing (3) PHP (13) phpMyAdmin (1) PoC (1) Premios Bitacoras (1) Presentaciones (11) PRISM (1) Privacidad (2) Programación (12) Programas Linux (41) Programas Windows (41) Pwned (1) Python (5) Ransomware (1) Reconocimiento (5) Ruby (2) s (1) Scripts (7) Seguridad (150) Seguridad Web (139) Seguridad Wireless (19) Sensitive Data Exposure (2) SHA1 CRACK (1) Shellshock (1) Slides (1) Spoofing (1) Spyware (1) SQLi (19) SQLi Tools (7) SQLMap (2) SSH (1) Textos (74) Tips (57) Troyanos y Virus (11) Trucos (7) Trucos Win (7) Turiales (56) Tutoriales (18) Twitter (1) Ubuntu (2) Underc0de (1) UnderDOCS (1) Unlock (1) URL Redirection (1) UXSS (1) vBulletin (1) Video (48) Virtualización (2) Web T00LZ (16) Wifislax (1) Wikileaks (1) WikiRebels (1) Windows OS (65) Wireless Tools (13) XSS (16) Youtube (1)

 
biz.