Presentaciones Black Hat USA 2018

Black Hat USA 2018 Aquí tenéis la list de las presentaciones de Black Hat USA de este año, con enlace a las diapositivas y documentos que se han hecho públicos: Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes Finding Xori: Malware Analysis Triage with Automated Disassembly Download Presentation Slides Exposing the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection Download Presentation Slides Software Attacks on Hardware Wallets Download Presentation Slides Download White Paper Dissecting Non-Malicious Artifacts: One IP at a Time Download Presentation Slides Detecting Credential Compromise in AWS Download Presentation Slides Download White Paper How I Learned to Stop Worrying and Love the SBOM Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking Download Presentation Slides Download White Paper Measuring the Speed of the Red Queen’s Race; Adaption and Evasion in Malware Download Presentation Slides Download White Paper Holding on for Tonight: Addiction in InfoSec Download Presentation Slides TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever Download Presentation Slides Download White Paper Stress and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops Download Presentation Slides From Bot to Robot: How Abilities and Law Change with Physicality Download Presentation Slides Download White Paper Miasm: Reverse Engineering Framework Download Presentation Slides New Trends in Browser Exploitation: Attacking Client-Side JIT Compilers Download Presentation Slides Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools Download Presentation Slides KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths Download Presentation Slides A Dive in to Hyper-V Architecture & Vulnerabilities Download Presentation Slides No Royal Road … Notes on Dangerous Game There will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently Download Presentation Slides Compression Oracle Attacks on VPN Networks Download Presentation Slides CANCELLED: Too Soft[ware Defined] Networks: SD-WAN VulnerabilityAssessment Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers Download Presentation Slides Download White Paper Remotely Attacking System Firmware Reversing a Japanese Wireless SD Card - From Zero to Code Execution Download Presentation Slides Deep Dive into an ICS Firewall, Looking for the Fire Hole Legal Landmines: How Law and Policy are Rapidly Shaping Information Security Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering Download Presentation Slides From Workstation to Domain Admin: Why Secure Administration isn’t Secure and How to Fix it Download Presentation Slides An Attacker Looks at Docker: Approaching Multi-Container Applications Download Presentation Slides Download White Paper The Unbearable Lightness of BMC’s Download Presentation Slides Download White Paper Mental Health Hacks: Fighting Burnout, Depression and Suicide in the Hacker Community Download Presentation Slides WireGuard: Next Generation Secure Network Tunnel Download Presentation Slides Download White Paper Threat Modeling in 2018: Attacks, Impacts and Other Updates Download Presentation Slides Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology Download Presentation Slides Download White Paper Don’t @ Me: Hunting Twitter Bots at Scale Download Presentation Slides Download White Paper A Brief History of Mitigation: The Path to EL1 in iOS 11 [] () ZEROing Trust: Do Zero Trust Approaches Deliver Real Security?
Leer más

Presentaciones De Black Hat Asia 2018

Black Hat Asia 2018 Ya están disponibles la mayoría de las presentaciones de Black Hat Asi 2018 celebrada el pasado 20-23 de marzo: A Short Course in Cyber Warfare National Cyber-Aggression and Private-Sector Internet Infrastructure A Deal with the Devil: Breaking Smart Contracts Wong-Hemmel-A-Deal-with-the-Devil-Breaking-Smart-Contracts.pdf A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages_update_Thursday.pdf AES Wireless Keyboard – Template Attack for Eavesdropping Kim-AES-Wireless-Keyboard-Template-Attack-for-Eavesdropping.
Leer más

Presentaciones de Black Hat USA 2017

BlackHat 2017 Ya están disponible las presentaciones de Black Hat USA 2017: Stepping Up Our Game: Re-focusing the Security Community on Defense and Making Security Work for Everyone ‘Ghost Telephonist’ Link Hijack Exploitations in 4G LTE CS Fallback Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback.pdf (in)Security in Building Automation: How to Create Dark Buildings with Light Speed Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed.pdf Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed-wp.pdf A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!
Leer más

Material de la Black Hat USA 2014

Como muchos ya sabréis Black Hat USA 2014 se celebró la semana pasada, 2-7 agosto, como de costumbre en Las Vegas. Para los que no tuvieran la fortuna de haber asistido a esta conferencia, al menos podréis disfrutar del material que se presentó en las charlas, y que os enlazo a continuación: Cybersecurity as Realpolitik geer.blackhat.6viii14.txt 48 Dirty Little Secrets Cryptographers Don’t Want You To Know 802.
Leer más

Presentaciones de la BlackHat USA 2012

Ya están disponibles para descarga el material de las charlas que se dieron en la BlackHat USA 2012 pasado mes de julio en Las Vegas: A Scientific (But Non Academic) Study of How Malware Employs Anti-Debugging, Anti-Disassembly and Anti-Virtualization Technologies BH_US_12_Branco_Scientific_Academic_WP.pdf BH_US_12_Branco_Scientific_Academic_Slides.pdf A Stitch in Time Saves Nine: A Case of Multiple Operating System Vulnerability BH_US_12_Wojtczuk_A_Stitch_In_Time_WP.pdf BH_US_12_Wojtczuk_A_Stitch_In_Time_Slides.pdf Adventures in Bouncerland BH_US_12_Percoco_Adventures_in_Bouncerland_WP.pdf BH_US_12_Percoco_Bouncerland_Slides.
Leer más

Hacker gana acceso a 4 millones de habitaciones de hotel con un microcontrolador Arduino

Todos sabemos que en estos momentos se está celebrando la Black Hat USA 2012 en las Vegas, una de las conferencias sobre seguridad con más prestigio del mundo. Un hacker, Cody Brocious, desarrollador de software de Mozilla ha demostrado como usando un dispositivo Arduino puede acceder a las habitaciones de hotel, concretamente a aquellas que usan cierta cerradura electrónica de la marca Onity, de la que según parece hay 4 millones instaladas.
Leer más

Material oficial de la Blackhat Europe 2012 disponible

Ya está disponible el material de la recién acabada BlackHat 2012 Europa. Parece que faltan algunas charlas. Si las ponen actualizaremos esta entrada. Axelle Apvrille - Guillaume LovetAn Attacker’s Day into Virology: Human vs Computer White Paper Slides Antonios Atlasis - Attacking IPv6 Implementation Using Fragmentation White Paper Slides Archivo Michael BakerFinding Needles in Haystacks (The Size of Countries) White Paper Slides Andrey Belenko - Dmitry Sklyarov”Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh Really?
Leer más

Vídeos de la Defcon 18 y la BlackHat 2010

Pues eso, todos los vídeos de la Defcon 18 y la BlackHat 2010 disponibles en este canal de youtube. Aquí tienes un torrent con todos los vídeos de la Defcon, por si te lo quieres bajar todos de golpe.
Leer más