31 jul. 2017

Presentaciones de la DEF CON 25 (PDF)



Sin lugar a duda DEF CON es la conferencia de seguridad informática y hacking más grande y con los mejores exponentes a nivel mundial. En esta ocasión les traigo las presentaciones de la versión 25 de este encuentro. Vale la pena revisarlas para entender a que amenazas nos enfrentamos hoy en día. Espero las disfruten:

File NameTamaño Archivo
5A1F/-
Cheng Lei/-
Denton Gentry/-
Dimitry Snezhkov/-
Dor Azouri/-
Duncan Woodbury and Nicholas Haltmeyer/-
Itzik Kotler and Amit Klein/-
Josh Pitts/-
Mark Newlin Logan Lamb and Christopher Grayson/-
Matt Knight and Marc Newlin/-
Matt Suiche/-
Morten Schenk/-
Phillip Tully and Michael Raggo/-
Romain Coltel and Yves Le Provost/-
Steinthor Bjarnason and Jason Jones/-
Tomer Cohen/-
DEFCON-25-0ctane-Untrustworthy-Hardware.pdf2.5 MiB
DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf1.8 MiB
DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf3.0 MiB
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf2.5 MiB
DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf3.2 MiB
DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf4.3 MiB
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf2.4 MiB
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf5.0 MiB
DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf1.8 MiB
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf2.2 MiB
DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf6.9 MiB
DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf799.3 KiB
DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf616.5 KiB
DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf69.2 KiB
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf2.0 MiB
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf1.7 MiB
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf7.4 MiB
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf2.4 MiB
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf4.0 MiB
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf2.7 MiB
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf250.0 KiB
DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf2.3 MiB
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf6.0 MiB
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf4.6 MiB
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf2.0 MiB
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf4.1 MiB
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf4.2 MiB
DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf10.6 MiB
DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf4.2 MiB
DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf2.2 MiB
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf131.4 KiB
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf4.5 MiB
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf1.5 MiB
DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf290.1 KiB
DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf3.0 MiB
DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf6.0 MiB
DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf1.3 MiB
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf6.5 MiB
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf5.5 MiB
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf4.8 MiB
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf2.4 MiB
DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf5.9 MiB
DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf1.9 MiB
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf4.5 MiB
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf8.4 MiB
DEFCON-25-Plore-Popping-a-Smart-Gun.pdf4.1 MiB
DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf6.7 MiB
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf2.2 MiB
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf2.5 MiB
DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf5.2 MiB
DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf2.0 MiB
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf911.6 KiB
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf6.0 MiB
DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf6.8 MiB
DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf6.2 MiB
DEFCON-25-Tess-Schrodinger-Total-Recall.pdf5.0 MiB
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf2.0 MiB
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf20.7 MiB
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf1.9 MiB
DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf2.2 MiB
DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf4.9 MiB
DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf2.8 MiB
DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf7.5 MiB
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf1.6 MiB
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf5.1 MiB
DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf3.2 MiB
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf5.8 MiB
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf2.0 MiB
DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf1.9 MiB


Enjoy!

[!] Salu2
[i] Zion3R


Leo Romero

Author & Editor

Ingeniero Civil en Computación (Universidad de Chile FCFM) y Diplomado en Gestión y Evaluación de Proyectos TI (Universidad de Chile FEN). Actualmente trabajo como ingeniero de software en varios proyectos y como asesor tecnológico para empresas.

Labels

0-day (11) 1337day (1) 8.8 (2) Adobe Acrobat (1) Android (2) Anonimato (1) Anonymous (9) BackDoor (2) BackTrack (15) badUSB (1) Black Hat (5) BlackHat (1) Blackploit (24) Brute Force (3) Bug (105) Bypass Password (1) C99 Shell (1) Carding (1) CheatSheet (15) Chilean Way (1) Conference (9) Cryptsetup (1) DDoS (11) DEF CON (3) DEFCON (6) Diapositivas (1) Diseño Web (1) Distro Linux (27) Documental (2) DoS (2) Drupal (1) DuckDuckGo (1) E-zine (18) Ekoparty (1) Escaneo (4) España (1) Exploit (63) Facebook (1) Fast-Info (44) FBI (1) Ficheros Binarios (1) Firefox (4) Flash (2) Forense (9) Fuerza Bruta (11) GhostShell (1) GNU/Linux (4) Google (1) Guía (1) Hack T00LZ (129) Hack Tips (63) Hacked (5) Hacking (17) Hacking Hardware (5) HashCat (1) Herramientas (120) HighSecCON (1) Humor Geek (13) Infografía (1) Ingeniería Social (4) Inj3ct0r (1) Internet Explorer (3) Java (7) JavaScript (2) Kali (3) Leaks (21) Linux OS (79) LulzSec (1) Mac OS (10) Magazine (1) Malaware (3) Malaware Tools (12) Malware (1) Man in the Middle (15) Manuales (3) MD5 CRACK (4) Metasploit (57) MSSQL (1) MySQL (6) MySQL CRACK (1) Nmap (6) Nmap NSE (2) Noticias (191) NTLM CRACK (1) Ofuscar (5) OpenSolaris OS (1) OpenSSL (1) ORACLE (1) OWASP (3) Paper (9) PDF (6) PenTest (14) Perl (2) Phearking (13) Phishing (3) PHP (13) phpMyAdmin (1) PoC (1) Premios Bitacoras (1) Presentaciones (9) PRISM (1) Privacidad (1) Programación (12) Programas Linux (41) Programas Windows (41) Pwned (1) Python (4) Reconocimiento (5) Ruby (2) s (1) Scripts (7) Seguridad (142) Seguridad Web (139) Seguridad Wireless (19) Sensitive Data Exposure (2) SHA1 CRACK (1) Shellshock (1) Slides (1) Spoofing (1) Spyware (1) SQLi (19) SQLi Tools (7) SQLMap (2) SSH (1) Textos (73) Tips (57) Troyanos y Virus (11) Trucos (7) Trucos Win (7) Turiales (56) Tutoriales (18) Twitter (1) Ubuntu (2) Unlock (1) URL Redirection (1) UXSS (1) vBulletin (1) Video (47) Virtualización (2) Web T00LZ (17) Wifislax (1) Wikileaks (1) WikiRebels (1) Windows OS (65) Wireless Tools (13) XSS (15)

 
biz.