Vídeos de la OWASP AppSec Europe 2013

La CMU publica el material de su clase Secure Software Systems

Presentaciones de DEF CON 21

  • August 28, 2013
  • tuxotron
  • dc-21-archive-header.jpg

    Ya estás disponibles las presentaciones (diapositivas y algún material extra) de la DEF CON 21. Todavía no están todas, pero aquí tenéis la lista de las disponibles en estos momentos:

    • Business logic flaws in mobile operators services - PDF White Paper
    • Fear the Evil FOCA: IPv6 attacks in Internet connections - PDF
    • Suicide Risk Assessment and Intervention Tactics - PDF Extras
    • Combatting Mac OSX/iOS Malware with Data Visualization - PDF White Paper
    • MITM All The IPv6 Things - PDF
    • PowerPwning: Post-Exploiting By Overpowering PowerShell - PDF Extras
    • Transcending Cloud Limitations by Obtaining Inner Piece - PDF Extras
    • Data Evaporation from SSDs - PDF
    • Evil DoS Attacks and Strong Defenses - PDF
    • RFID Hacking: Live Free or RFID Hard - PDF Extras
    • OTP, It won't save you from free rides! - PDF White Paper Extras
    • Conducting massive attacks with open source distributed computing - PDF
    • Offensive Forensics: CSI for the Bad Guy - PDF Extras
    • Utilizing Popular Websites for Malicious Purposes Using RDI - PDF
    • Abusing NoSQL Databases - PDF
    • Legal Aspects of Full Spectrum Computer Network (Active) Defense - PDF
    • Blucat: Netcat For Bluetooth - Extras
    • Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices - PDF White Paper Extras
    • Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!) - PDF
    • Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions - PDF White Paper
    • How to Disclose or Sell an Exploit Without Getting in Trouble - PDF
    • I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell - PDF
    • Privacy In DSRC Connected Vehicles - PDF
    • Pwn'ing You(r) Cyber Offenders - PDF
    • Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO) - PDF White Paper Extras
    • Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot - PDF
    • gitDigger: Creating useful wordlists from public GitHub repositories - PDF
    • 10000 Yen into the Sea - PDF Extras
    • Defeating SEAndroid - PDF
    • The Politics of Privacy and Technology: Fighting an Uphill Battle - PDF
    • Java Every-Days: Exploiting Software Running on 3 Billion Devices - PDF White Paper
    • JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces - PDF Extras
    • Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust - PDF
    • So You Think Your Domain Controller is Secure? - PDF
    • Phantom Network Surveillance UAV / Drone - PDF
    • The Bluetooth Device Database - PDF Extras
    • Dude, WTF in my car? - PDF
    • Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned - PDF
    • Torturing Open Government Systems for Fun, Profit and Time Travel - PDF
    • The Secret Life of SIM Cards - PDF
    • Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock - PDF Extras
    • GoPro or GTFO: A Tale of Reversing an Embedded System - PDF
    • A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading - PDF Extras
    • Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices - PDF White Paper Extras
    • Getting The Goods With smbexec - PDF
    • PowerPreter: Post Exploitation Like a Boss - PDF Extras
    • Kill 'em All — DDoS Protection Total Annihilation! - PDF White Paper Extras
    • Please Insert Inject More Coins - PDF
    • Stalking a City for Fun and Frivolity - PDF
    • Fast Forensics Using Simple Statistics and Cool Tools - PDF Extras
    • VoIP Wars: Return of the SIP - PDF Extras
    • Exploiting Music Streaming with JavaScript - PDF Extras
    • ACL Steganography - Permissions to Hide Your Porn - PDF Extras
    • Doing Bad Things to 'Good' Security Appliances - PDF
    • Let's screw with nmap - PDF Extras
    • Defending Networks with Incomplete Information: A Machine Learning Approach - PDF White Paper
    • We are Legion: Pentesting with an Army of Low-power Low-cost Devices - PDF Extras
    • The Road Less Surreptitiously Traveled - PDF Extras
    • Hacker Law School - PDF1 PDF2 PDF3 PDF4
    • Defense by numbers: Making problems for script kiddies and scanner monkeys - PDF
    • Forensic Fails - Shift + Delete won't help you here - PDF
    • The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies - PDF
    • Building an Android IDS on Network Level - PDF
    • Safety of the Tor network: a look at network diversity, relay operators, and malicious relays - PDF
    • How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers - PDF
    • Examining the Bitsquatting Attack Surface - White Paper
    • Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks - PDF
    • Making Of The DEF CON Documentary - PDF
    • All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio - PDF
    • A Password is Not Enough: Why disk encryption is broken and how we might fix it - PDF
    • EMET 4.0 PKI Mitigation - PDF
    • BYO-Disaster and Why Corporate Wireless Security Still Sucks - PDF
    • Evolving Exploits Through Genetic Algorithms - PDF
    • How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles - PDF White Paper Extras
    • Collaborative Penetration Testing With Lair - PDF
    • DNS May Be Hazardous to Your Health - PDF
    • Predicting Susceptibility to Social Bots on Twitter - PDF
    • EDS: Exploitation Detection System - PDF White Paper
    • The Government and UFOs: A Historical Analysis by Richard Thieme - PDF Extras
    • BoutiqueKit: Playing WarGames with expensive rootkits and malware - PDF
    • C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood - PDF
    • Insecurity - A Failure of Imagination - PDF
    • HTTP Time Bandit - PDF
    • BYOD PEAP Show - PDF
    • Android WebLogin: Google's Skeleton Key - PDF Extras
    • Hacking Driverless Vehicles - PDF