Presentaciones de la HITBSECCONF Malaysia 2013

Las presentaciones de la Hack In The Box Security Conference (HITBSECCONF) 2013 celebrada en Malasia han sido publicadas. Las lista de las diapositivas es la siguiente: D1 KEYNOTE - Andy Ellis - Cognitive Injection.pdf D1T1 - Collin Mulliner - Android DDI - Dynamic Dalvik Instrumentation of Android Applications.pdf D1T1 - Dominic Chell and Shaun Colley - Practical Attacks Against Encrypted VoIP Communications.pdf D1T1 - Gianni Gnesa - Hacking Corporations Using Unconventional Chained Exploits.
Leer más

Presentaciones de la C++Now 2013

Ya están disponibles las presentaciones de la C++Now 2013 celebrada en Aspen, Colorado. Una conferencia que reúne a un número importante de expertos en el lenguaje de programación C++. Jeff Garland:Library in a Week: C++11 & Boost Cookbook (I) Rob Stewart: Survey of Multi-Threaded Programming Support in C++11 and Boost Boris Schäling: Containers in Boost Tony Van Eerd: Low Level Threading with C++11 Leor Zolman: A Zephyr Overview of C++11 Eric Niebler: A First Look at Proto-0x | PPTX Format Tony Van Eerd: Non-Allocating std::future/promise Ábel Sinkovics: Boosting MPL with Haskell elements Chandler Carruth: Keynote: Optimizing the Emergent Structures of C++ Scott Schurr: Sweating the Small Stuff: Brace Initialization, Unions and Enums | Code for AnyString David Sankel: The Intellectual Ascent to Agda pptx Hartmut Kaiser, Vinay Amatya: HPX: A C++ Standards Compliant Runtime System For Asynchronous Parallel And Distributed Computing Edouard Alligand: Scaling with C++11 John Bandela: Easy Binary Compatible C++ Interfaces Across Compilers | PPT Format Dominik Charousset, Matthias Vallentin: libcppa – Designing an Actor Semantic for C++11 Stanley Lippman: Keynote: yet another paradigm shift – A Meta4 model of concurrency | pptx Format Joel de Guzman: Inside Spirit X3: Redesigning Boost.
Leer más

Vídeos de la Shmoocon 2013

Ya están disponibles los vídeos de la Shmoocon 2013. Otra conferencia de seguridad de gran calidad que se celebró el pasado 15-17 de febrero en Wahington DC. Opening Remarks & Rants How to Own a Building BacNET Attack Framework Mainframed The Secrets Inside that Black Box WIPE THE DRIVE - Techniques for Malware Persistence Apple iOS Certificate Tomfoolery Hide and Seek, Post-Exploitation Style Hackers get Schooled Learning Lessons from Academia Friday Fire Talks Running a CTF - Panel on the Art of Hacker Gaming C10M Defending The Internet At Scale Paparazzi Over IP DIY Using Trust to Secure Embedded Projects Moloch A New And Free Way To Index Your Packet Capture Repository-1 OpenStack Security Brief Generalized Single Packet Auth for Cloud Envions From Shotgun Parsers to Better Software Stacks The Computer Fraud and Abuse Act Swartz, Auernheimer, and Beyond Malware Analysis Collaboration Automation & Training Bright Shiny Things Intelligent DA Control Strategies of a World Class Security Inciden Armoring Your Android Apps Protecting Sensitive Information on iOS Devices Beyond Nymwars - Online Identity Battle How Smart Is BlueTooth Smart Chopshop Busting the Gh0st The Cloud - Storms on the Horizon 0wn The Con PunkSPIDER Open Source Fuzzing Proj Tgting the Internet Crypto - Youre Doing It Wrong Identity Based Internet Protocol NSM and more with Bro Network Monitor These Go To Eleven - When the Law Goes Too Far Forensics - ExFat Bastardized for Cameras Page Fault Liberation Army or Better Security Through Trapping Hacking as an Act of War MASTIFF - Automated Static Analysis Framewor Attacking SCADA Wireless Systems Ka-Ching - How to Make Real Money Is Practical Info Sharing Possible
Leer más

Presentaciones de Black Hat Europe 2013

Ya tenemos disponible para descarga las presentaciones de la Black Hat 2013 Europe: A Perfect CRIME? Only TIME Will Tell White Paper Presentation Advanced Heap Manipulation in Windows 8 Presentation Building a Defensive Framework for Medical Device Security The Deputies Are Still Confused White Paper Presentation DropSmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless White Paper Presentation File File Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic White Paper Presentation Hacking Appliances: Ironic exploitation of security products White Paper Presentation Hacking Video Conferencing Systems White Paper Presentation Hardening Windows 8 apps for the Windows Store White Paper Harnessing GP²Us - Building Better Browser Based Botnets Presentation Honeypot That Can Bite: Reverse Penetration White Paper Presentation Hybrid Defense: How to Protect Yourself From Polymorphic 0-days White Paper Presentation File Invisibility Purge – Unmasking the Dormant Events of Invisible Web Controls – Advanced Hacking Methods for Asp.
Leer más

Vídeos de las charlas del 29C3 con mini-microhistoria incluida

Ya están disponibles los vídeos de las charlas de la que para mi, es la mejor conferencia sobre seguridad/hacking del mundo. El Chaos Communication Congress ha celebrado este pasado fin de semana su conferencia número 29. Ésta se celebró por primera vez fuera de Berlín, en Hamburgo. Este año la conferencia llevaba por título: Not my department. El motivo del mismo es hacer una crítica y un llamamiento a la responsabilidad.
Leer más

Vídeos de la Øredev Developer Conference

La Øredev Developer Conference es como su nombre indica una conferencia orientada al desarrollo de ningún lenguaje o plataforma en particular. Dicha conferencia se celebró en Suecia entre el 5 y el 9 de noviembre. La lista de vídeos es la siguiente: Transform Your Agile Process with Kanban Thinking (Karl Scotland) The Rebellion Imperative (Reginald Braithwaite) Tailwind/Headwind in the pursuit of the Fibre to All (Jonas Birgersson) Nashorn: Optimizing JavaScript and dynamic language execution on the JVM (Marcus Lagergren) The Future of Work is about being more Human - Gamestorming (Maarten Volders) Android Burning Questions (Pavel Lahoda) Stupid questions and n00bs - top ten intriguing things you need to do (Iris Classon) Budgeting Reality: a New Approach to Mock Objects (Justin Searls) Managing Your Teams’ Agile Competency (Diana Larsen) Git Going with Distributed Source Control (Tim Berglund) Liftoff: Launching Agile Teams and Projects (Diana Larsen) Hypermedia and ASP.
Leer más

Vídeos de la DerbyCon 2012

Este era otra de las entradas que tenía pendiente de publicar. Como ya bien anunciaron en Security By Default, en IronGeek estaban subiendo los vídeos de la DerbyCon 2012. Hasta ahora sólo faltan 2 vídeos, el de Kevin Mitnick, pendiente de aprobar y otro titulado “You Can’t Buy Security. Building an Open Sourced Information Security Program”, del cual parece ser tuvieron alguna dificultad técnica. Para que quede registrado por aquí, esta es la lista:
Leer más

Vídeos de la Bsides Cleveland 2012

Aquí tenéis los vídeos de otra conferencia sobre seguridad: Bsides Cleveleand 2012 Secret Pentesting Technigues Shhh...Dave KennedyDave "ReL1K" Kennedy Focusing on the Fool: Building an Awareness & Training Program - Branden Miller & Bill Gardner <? $People ?> Process Technology - Jeff @ghostnomad Kirsch Dingleberry Pi Building a Blackthrow: More inexpensive hardware to leave behind on someone else's network - Adrian "Irongeek" Crenshaw Testing Enterprise DLP Systems // Advanced data exfiltration techniques - Albert School Automating Incident Response - Mick Douglas Business Ramifications of the Internet's Unclean Conflicts - Rockie Brockway Netflow for Incident Response - Jamison Budacki Winter is Coming: Cloud Security in Dark Ages - Bill Mathews Pass the Hash like a Rockstar - Martin "
Leer más

Positive Hack Days (PHDAYS) - Vídeos

Ya están disponible los vídeos de la Positive Hack Days que se celebró los pasado 30 y 31 de mayo. Dónde por cierto, ¡los Int3pids consiguieron un gran tercer puesto! Go Int3pids! Bruse Schneier. video Datuk Mohd Noor Amin. video Sergey Gordeychik. How to hack a telecom and stay alive 2. Owning a billing video Evgeny Klimov, RISSPA. Telecom vs fraud. Who will win? video Mikhail Yemelyannikov. Why it is impossible to comply with Russian private data protection law?
Leer más

Derbycon 2011 Vídeos

De forma casual me he topado con los vídeos de la Derbycon del año pasado 2011 y después de buscar por el blog he visto que no teníamos una entrada con los vídeos de esta magnífica conferencia, que por cierto fue la primera edición. Así que aquí van: jimmy shah mobile app moolah profit taking with mobile malware mccorkle and rios 100 bugs in 100 days an analysis of ics scada software brent huston realize your hacker heritage do the needful mick douglas blue team is sexy refocusing on defense part ii all you baseline are belong to us thomas dotreppe mister x openwips ng joshua drake jduck exploiting java memory corruption vulnerabilities matthew becker 73o7ki survival hacking your way out of armageddon bart hopper avoiding the landmines in your own backyard georgia weidman throw it in the river towards real live actual smartphone security brian baskin walking the green mile how to get fired after a security incident infojanitor virtual trust virtual permission and the illusion of security boris sverdlik your perimeter sucks larry pesce you are the smart meter making and hacking of the 2011 ma ccdc electronic badges rob simon pentesting over powerlines bill sempf is locksport a sport raphael mudge dirty red team tricks keynote hd moore acoustic intrusions ben feinstein and jeff jarmoc get off of my cloud cloud credential compromise and exposure josh kelley winfang98 infectious media bypassing autorun once and for all chris nickerson compliance an assault on reason chris roberts a tribute to dr strangelove deviant ollam distinguishing lockpicks raking vs lifting vs jiggling and more joe schorr rule 1 cardio and 9 other rules to keep intruders out ryan linn collecting underpants to win your network jayson e street steal everything kill everyone cause total financial ruin or how i walked in and misbehaved bruce potter the details dont matter kevin mitnick dave kennedy adaptive penetration testing rick farina free floating hostility chris gates and rob fuller the dirty little secrets they didnt teach you in pentesting class johnny long hackers for charity update jamison scheeres social engineering is a fraud jack daniel surviving a teleporter accident it could happen to you kevin johnson and tom eston desktop betrayal exploiting clients through the features they demand closing rick hayes karthik rangarajan osint beyond the basics int0x80 of dual core anti forensics for the louise evan booth hide yo kids hide yo wife residential security and monitoring the bottom line atlas sploit me if you can charlie miller battery firmware hacking michael arpaia beat to 1337 creating a successful university cyber defense organization tony huffman myne us when fuzzers miss the no hanging fruit adrian dave martin welcome to derbycon 2011 intro to the con and events tottenkoph data mining for neuro hackers kyle osborne kos the hidden xss attacking the desktop thomas hoffecker exploiting pki for fun and profit or the next yellow padlock icon rafal los youre going to need a bigger shovel a critical look at software security assurance carlos perez darkoperator tactical post exploitation jason scott jason scotts shareware calvacade paul asadoorian john strand offensive countermeasures still trying to bring sexy back rick redman tomorrow you can patch that 0day but your users will still get you p0wn3d pat mccoy and chris silvers hook line and syncer the liar for hires ultimate tacklebox adrian crenshaw building a svartkast cheap hardware to leave behind on someone elses network peter van eeckhoutte and elliot cutright win32 exploit development with mona and the metasploit framework dennis kuntz mining sensitive information from images using command line ocr the penetration testing execution standard ptes panel adrian dave martin welcome to derbycon 2011 intro to the con and events keynote hd moore acoustic intrusions johnny long hackers for charity update kevin mitnick dave kennedy adaptive penetration testing the penetration testing execution standard ptes panel bruce potter the details dont matter chris nickerson compliance an assault on reason pat mccoy and chris silvers hook line and syncer the liar for hires ultimate tacklebox jason scott jason scotts shareware calvacade atlas sploit me if you can dennis kuntz mining sensitive information from images using command line ocr tottenkoph data mining for neuro hackers michael arpaia beat to 1337 creating a successful university cyber defense organization carlos perez darkoperator tactical post exploitation paul asadoorian john strand offensive countermeasures still trying to bring sexy back tony huffman myne us when fuzzers miss the no hanging fruit rafal los youre going to need a bigger shovel a critical look at software security assurance rick hayes karthik rangarajan osint beyond the basics int0x80 of dual core anti forensics for the louise rick redman tomorrow you can patch that 0day but your users will still get you p0wn3d brian baskin walking the green mile how to get fired after a security incident jack daniel surviving a teleporter accident it could happen to you adrian crenshaw building a svartkast cheap hardware to leave behind on someone elses network joe schorr rule 1 cardio and 9 other rules to keep intruders out thomas hoffecker exploiting pki for fun and profit or the next yellow padlock icon matthew becker 73o7ki survival hacking your way out of armageddon bart hopper avoiding the landmines in your own backyard chris gates and rob fuller the dirty little secrets they didnt teach you in pentesting class boris sverdlik your perimeter sucks evan booth hide yo kids hide yo wife residential security and monitoring the bottom line rick farina free floating hostility georgia weidman throw it in the river towards real live actual smartphone security brent huston realize your hacker heritage do the needful rob simon pentesting over powerlines larry pesce you are the smart meter making and hacking of the 2011 ma ccdc electronic badges bill sempf is locksport a sport infojanitor virtual trust virtual permission and the illusion of security ben feinstein and jeff jarmoc get off of my cloud cloud credential compromise and exposure jimmy shah mobile app moolah profit taking with mobile malware mccorkle and rios 100 bugs in 100 days an analysis of ics scada software charlie miller battery firmware hacking peter van eeckhoutte and elliot cutright win32 exploit development with mona and the metasploit framework ryan linn collecting underpants to win your network jamison scheeres social engineering is a fraud josh kelley winfang98 infectious media bypassing autorun once and for all kevin johnson and tom eston desktop betrayal exploiting clients through the features they demand jayson e street steal everything kill everyone cause total financial ruin or how i walked in and misbehaved deviant ollam distinguishing lockpicks raking vs lifting vs jiggling and more raphael mudge dirty red team tricks chris roberts a tribute to dr strangelove kyle osborne kos the hidden xss attacking the desktop mick douglas blue team is sexy refocusing on defense part ii all you baseline are belong to us thomas dotreppe mister x openwips ng joshua drake jduck exploiting java memory corruption vulnerabilities closing Podéis encontrar otros formatos de vídeo aquí
Leer más