Material oficial de la Blackhat Europe 2012 disponible

Ya está disponible el material de la recién acabada BlackHat 2012 Europa. Parece que faltan algunas charlas. Si las ponen actualizaremos esta entrada. Axelle Apvrille - Guillaume LovetAn Attacker's Day into Virology: Human vs Computer White Paper Slides Antonios Atlasis - Attacking IPv6 Implementation Using Fragmentation White Paper Slides Archivo Michael BakerFinding Needles in Haystacks (The Size of Countries) White Paper Slides Andrey Belenko - Dmitry Sklyarov"Secure Password Managers" and "
Leer más

Presentaciones y vídeos de la ShmooCon 2012 disponibles

Ya nos avisaron en SecurityByDefault de que Georgia Weidman estaba subiendo los vídeos de esta conferencia sobre seguridad celebrada en Washington DC. Pero ya están tanto los vídeos como las presentaciones oficiales a disposición de todos. El listado de las mismas es: Keynote - Peter Gutmann - video Closing Plenary - Arlen, Marcus, and Potter - Doing InfoSec Right - video pt 1, pt 2 Ben Agre - Cool New Crypto - video Brad Antonlewicz - Attacking Proximity Card Access Systems - video atlas of d00m - < GHz or Bust- video Corey Benninger and Max Sobell - Intro to Near Field Communication (NFC) Mobile Security - video Nicholas (aricon) Berthaume - Java Backdoors and Cross Framework Abuse - video Brad Bowers - Building MASINT Capabilities on a Hackers Budget - slides James Caroland and Greg Conti - Lessons of the Kobayashi Maru: Cheating is Fundamental - video Clark et al - Inside the OODA Loop - video Kristin Paget - Credit Card Fraud: The Contactless Generation - video slides Dan G et al - SNSCat - video slides and code Tony DeLaGrange and Kevin Johnson - Whack-a-Mobile - video Hanni Fakhoury - Destroying Evidence Before it's "
Leer más

Vídeos de la Source Boston 2011

Esta es la lista de vídeos de la SOURCE celebrada en Boston en abril del año pasado. Un poco tarde, pero han sido publicados recientemente. Algunas de las charlas tienen muy buena pinta: Secure Development Lifecycle In The Mobile World What The Post-PC Era Means For Enterprise Security When Prevention Fails, The Tough Get Responding Tokenization Bringing Sexy Back, Defensive Measures That Actu… On The Use Of Prediction Markets In Information … Building Security Integrity Across The Security … Grey Hat Ruby Cyber Crime War Connecting The Dots Among The Blind The Squinter Rules James Beeson Keynote Improving Application Security Vulnerability Res… Streamline Incident Types For Efficient Incident… Network Stream Hacking With Mallory Attacking Oracle Web Applications With Metasploit Adam Meyers - Reversing Obfuscation Reverse Engineering Flash Files With SWFREtools Higher Education’s Ability To Conduct Relevant R… The Real Cost Of Software Remediation Dino Dai Zovi Keynote Jack Of All Formats Nailing Down Security Regulation Security Convergence Fuel For Pwnage Secure Development For iOS Hugh Njemanze Keynote PTES Speed Debates Adding Another Level Of Hell To Reverse Engineer… You Got That SIEM, Now What Do You Do Fireshark v2 How To Isotope Tag A Ghost Building Bridges, Forcing Hackers And Business T… Tinker Tailor Soldier A-GPS Further Down The EXIF Hole Security Toolbox Getting Stuff Done Will We Ever Be Secure The 2011 Verizon Data Breach Investigation Report James Beeson - KeynoteFuente (aquí también puedes encontrar las presentaciones)
Leer más

Presentaciones de la DeepSec 2011

La conferencia sobre seguridad DeepSec 2011 se celebró el pasado 15-18 de noviembre en Viena. Esta son las presentaciones que se dieron: DeepSec_2011_Adrian_Wiesmann_-_compliance_can_make_sense.pdf DeepSec_2011_Alan_Kakareka_-_Insight_Into_Russian_Black_Market.pdf DeepSec_2011_Arron_Finnon_-_Reassemble_or_GTFO!_-_IDS_Evasion_Strategies.pdf DeepSec_2011_Bogdan_Alecu_-_SMS_Fuzzing-SIM_Toolkit_Attack.pdf DeepSec_2011_Jagadesh_Chandraiah_-_ .pdf DeepSec_2011_Khash_Kiani_-_Identity X.0 - Securing the Insecure.pdf DeepSec_2011_Matthias_Luft_-_Do_They_Deliver_-_Practical_Security_and_Load_Testing_of_Cloud_Service_Providers.pdf DeepSec_2011_Michele_Orru_-_Ground BeEF_- Cutting,_devouring_and_digesting_the_legs_off_a_browser.pdf DeepSec_2011_Mikhail_Utin_-_US experience_-_laws,_compliance_an_real_life_-_when_everything_seems_right_but_does_not_work.pdf DeepSec_2011_Mitja Kolsek_-_How_to_rob_an_online_bank_and_get_away_with_it.pdf DeepSec_2011_Morgan_Marquis-Boire_-_Armageddon Redux_-_The_Changing_Face_of_the_Infocalypse.pdf DeepSec_2011_Peter_Wolkerstorfer_-_Human_Factors_Engineering_for_IT_Security.pdf DeepSec_2011_Sourabh_Satish_-_Behavioral_Security.pdf DeepSec_2011_Tam_Hanna_-_Attack_vectors_on_mobile_devices.pdf DeepSec_2011_Toby_Foster_-_Solving_Social_Engineering_Attacks.pdf DeepSec_2011_Toralv_Dirro_-_Malware_Trends_2011.pdf DeepSec_2011_Victor_Julien_-_Advances_in_IDS_and_Suricata.pdf DeepSec_2011_laurent_weber-extending_Scapy_by_a_GSM_interface.pdf Deepsec_2011_Alex_Plaskett_-_Windows_Pwn_7_OEM.pdf Deepsec_2011_Duncan_Campbell_-_How_Terrorists_Encrypt.pdf Deepsec_2011_Fernando_Gont_-_Results_of_a_Security_Assessment_of_IPv6.pdf Deepsec_2011_Mariano_Nunez_Di_Croce_-_Your crown jewels online_-_Further_Attacks_to_SAP_Web_Applications.pdf Deepsec_2011_Stefan_Schumacher_-_On-Cyber-Peace.pdf Fuente
Leer más

Vídeos de la conferencia SOURCE de Barcelona

Ya se pueden acceder a los vídeos y algunas de las presentaciones de las charlas dadas en la conferencia de seguridad SOURCE celebrada en Barcelona los pasados 16 y 17 de noviembre. Adapting to the Age of Anonymous Vídeo Presentación Wfuzz para Penetration Testers Vídeo Presentación Advanced (Persistent) Binary Planting Vídeo Presentación All Your Crimeware Are Belong To Us! Vídeo Are Agile and Secure Development Mutually Exclusive? Vídeo Presentación Canales Cubiertos en Redes Sociales Vídeo Metasploit: Hacker's Swiss Army Knife Vídeo Show Me Your Kung-Fu Vídeo RESTful Services, the Web Security Blind Spot Vídeo Presentación Steganography Vídeo Presentación Men in the server meets the Man In The Browser Vídeo Presentación Security Goodness with Ruby on Rails Presentación Security Convergence - Goldmines & Pitfalls Vídeo La calificación y su aplicación al cloud computing Vídeo How NOT to do a Penetration Test Vídeo There’s an App for That: Evolving Mobile Security into a Business Advantage Vídeo Data Exfiltration - the way Q would have done it Vídeo Presentación Legal/technical strategies addressing data risks as perimeter shifts to Cloud Vídeo Gaining Acceptance for a New Approach to Software Development Vídeo Web de las charlas
Leer más

Vídeos de la Embedded Linux Conference Europe 2011

Ya están disponibles todos los vídeos de la conferencia sobre Linux embebido celebrada en Praga, República Checa los pasados 26-28 de octubre. Jim Zemlin - Imagine a World Without Linux - full HD (220M), 450×800 (76M) Linus Torvalds, Alan Cox, Thomas Gleixner, Paul McKenney - Kernel Developer Panel - full HD (622M), 450×800 (191M) Zach Pfeffer - Linaro’s Android Platform - full HD (604M), 450×800 (164M) Thomas Gleixner - State of PREEMPT_RT - full HD (374M), 450×800 (147M) Jessica Zhang - The Yocto Project Eclipse plug-in: An effective IDE environment for both Embedded Application and System developers - full HD (431M), 450×800 (118M) Satoru Ueda - Contributing to the Community?
Leer más

Vídeos de la SECTOR 2011

Ya podemos acceder a los vídeos de la SECTOR 2011, conferencia sobre seguridad celebrada en Toronto, Canadá. Ésta se celebro el pasado 17-19 de Octubre. Las presentaciones, aunque faltan bastantes también están disponibles desde la web oficial. Trust_me-I_am_a_cloud_vendor-Bruce_Cowper.wmv Thinking_Differently-Bringing_the_Hacker_Mindset_to_the_Corporate_Environment-Joe_Grand.wmv Online Espionage - Mikko Hypponen.wmv TheBizarre_Business_of_Rogue_Internet_Pharmacies-Brian_Krebs.wmv Near Field Communications (NFC) mobile security for those with No F'ing Clue - Corey Benninger and Max Sobell.wmv FireShark - A Tool to Link the Malicious Web - Stephan Chenette.
Leer más

Presentaciones de la Crypto 2011

Ya nos podemos descargar las presentaciones de la conferencia Crypto 2011 celebrada en Santa Barbara, California los pasados 14 al 18 de agosto. Leftover Hash Lemma, Revisited [slides] Random Oracle Reducibility [slides] Time-Lock Puzzles in the Random Oracle Model [slides] Physically Uncloneable Functions in the Universal Composition Framework [slides] Computer-Aided Security Proofs for the Working Cryptographer [slides] Illegitimi Non Carborundum [slides] Optimal Verification of Operations on Dynamic Sets [slides] Verificable Delegation of Computation over Large Datasets [slides] Secure Computation on the Web: Computing Without Simultaneous Interaction [slides] Memory Delegation [slides] Automatic Search of Attacks on Round-Reduced AES and Applications [slides] How to Improve Rebound Attacks [slides] A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack [slides] The PHOTON Family of Lightweight Hash Functions [slides] Perfectly-Secure Multiplication for any t n/3 [slides] The IPS Compiler: Optimizations, Variants and Concrete Efficiency [slides] 1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds [slides] Leakage-Resilient Zero Knowledge [slides] A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework [slides] Key-Evolution Schemes Resilient to Space-Bounded Leakage [slides] Generic Side-Channel Distinguishers: Improvements and Limitations [slides] Cryptography with Tamperable and Leaky Memory [slides] Tutorial Session — Fully Homomorphic Encryption, by Shai Halevi [slides] Merkle Puzzles in a Quantum World Classical Cryptographic Protocols in a Quantum World [slides] Position-Based Quantum Cryptography: Impossibility and Constructions [slides] Analyzing Blockwise Lattice Algorithms using Dynamical Systems [slides] Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions [slides] Tor and Circumvention: Lessons Learned [slides] Fully Homomorphic Encryption over the Integers with Shorter Public-Keys [slides] Fully Homomorphic Encryption for Ring-LWE and Security for Key Dependent Messages [slides] Bi-Deniable Public-Key Encryption [slides] Better Security for Deterministic Public-Key Encryption: The Auxillary-Input Setting [slides] The Collision Security of Tandem-DM in the Ideal Cipher Model [slides] Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions [slides] A New Variant of PMAC: Beyond the Birthday Bound [slides] Authenticated and Misuse-Resistant Encryption of Key-Dependent Data [slides] Round Optimal Blind Signatures [slides] Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups [slides] Constant-Rate Oblivious Transfer from Noisy Channels [slides] The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing [slides] Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials [slides] Inverting HFE Systems is Quasipolynomial for all Fields [slides] Smaller Decoding Exponents: Ball-Collision Decoding [slides] McEliece and Niederreiter Cryptosystems that Resist Quantum Fourier Sampling Attacks [slides] Fuente original
Leer más

Presentaciones de la DFRWS 2011

Ya podemos acceder a las presentaciones de la conferencia anual de este año de la DFRWS (Digital Forensics Research Workshop). Esta edición se celebró en New Orleans los días 1 al 3 de agosto. A continuación os dejo la lista de las presentaciones: "A System for the Proactive, Continuous, and Efficient Collection of Digital Forensic Evidence", Clay Shields, Ophir Frieder and Mark Maloof (pdf) "Towards a General Collection Methodology for Android Devices"
Leer más

Caro 2011, presentaciones

Caro 2011 es una conferencia de seguridad que tuvo lugar en Praga los pasados 4,5 y 6 de Mayo. Aquí podéis ver el programa. Y a continuación el listado con las presentaciones: Alex Kirk - Characteristics and detection of HTTP C&C.pptx Andrei Saygo and Patrik Vicol - How to stop the Daemon.ppsx Anoirel Issa - Polymorphism and anti anti-virus techniques - A look at recent malware trends.pdf Anthony Bettini - (In)security in URL shortening and redirection services.
Leer más