Vídeos de DEF CON 24

Junto con las presentaciones de DEF CON 24, ya también tenemos acceso a los vídeos: WIFI 204 Insteon, Inste off, Inste open WIFI 202 Evil ESP WIFI 201 WCTF Day 2 Kickoff WIFI 105 Introducing the HackMeRF WIFI 104 Handing Full Control of the Radio Spectrum Over to the Machines WIFI 103 How Do IBLE Hacking WIFI 102 Decoding LoRa Exploring Next Gen Wireless WIFI 101 Wireless Capture the Flag Inbrief Weaponizing Data Science for Social Engineering Automated E2E spear phishing on Twit weaponize your feature codes VLAN hopping, ARP poisoning & MITM Attacks in Virtualized Environments Use Their Machines Against Them Loading Code with a Copier Universal Serial aBUSe Remote physical access attacks toxic proxies bypassing HTTPS and VPNs to pwn your online identity The Remote Metamorphic Engine Detecting, Evading, Attacking the AI and Reverse Engin the next gen of emergency ph0nage T1 Jeopardy 2 T1 Jeopardy 1 Stumping the Mobile Chipset sticky keys to the kingdom Stargate Pivoting Through VNC To Own Internal Networks so you think you want to be a pentester Slouching Towards Utopia The State of the Internet Dream Sk3wlDbg Emulating all well many of the things with Ida Six Degrees of Domain Admin Side channel attacks on high security electronic safe locks sentient storage do ssd's have a mind of their own secure penetration testing operations SE 301 The Live SE Podcast SE 205 Advanced Social Engineering Techniques and The Rise of Cyber Scam Industrial SE 204 How to Un Work your job Revolutionism Radicals, and Engineering by Committee SE 203 SCAM CALL Call Dropped SE 202 Total Fail and Bad Mistakes I've Made a Few SE 201 Human Hacking You ARE the weakest link SE 105 You are being manipulated SE 104 US Interrogation Techniques and Social Engineering SE 103 7 Jedi Mind Tricks Influence Your Target without a Word SE 102 The Wizard of Oz Painting a reality through deception SE 101 Does Cultural differences become a barrier for social engineering Samsung Pay Tokenized Numbers, Flaws and Issues Robot Hacks Video Games How TASBot Exploits Consoles with Custom Controllers Retweet to win How 50 lines of Python made me the luckiest guy on Twitter Research on the Machines Help the FTC Protect Privacy & Security real time bluetooh device detection with blue hydra propaganda and you Project CITL Playing Through the Pain The Impact of Secrets and Dark Knowledge Platform Agnostic Kernel Fuzzing pin2pwn How to Root an Embedded Linux Box with a Sewing Needle Picking Bluetooth Low Energy Locks from a Quarter Mile Away phishing without failure and frustration PH 301 Packet Hacking Village, Block 5 PH 202 Packet Hacking Village, Block 4 PH 201 Packet Hacking Village, Block 3 PH 102 Packet Hacking Village, Block 2 PH 101 Packet Hacking Village, Block 1 network protocol reverse engineering Mr Robot Panel MouseJack Injecting Keystrokes into Wireless Mice mouse jiggler offense and defense malware command and control channels a journey into darkness Maelstrom are you plaing with a full deck Machine Duping Pwning deep learning systems LOCK 302 Sesame Style Pad Locks LOCK 203 Intro to LockpickingPower LOCK 202 Intro to LockpickingPower LOCK 201 Intro to LockpickingDuffley LOCK 104 Intro to Lock PickingFitzhugh LOCK 102 Locking Picking 101 LOCK 101 Locking Picking 101 Light Weight Protocol!
Leer más

Vídeos de Black Hat USA 2016

Ya también están disponibles de los vídeos de Black Hat USA 2016, así como el material presentado: Why This Internet Worked How We Could Lose It and the Role Hackers Play A Journey From JNDI/LDAP Manipulation to Remote Code Execution Dream Land The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud Applied Machine Learning for Data Exfil and Other Fun Topics Canspy: A Platform for Auditing Can Devices Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization Over the Edge: Silently Owning Windows 10's Secure Browser How to Make People Click on a Dangerous Link Despite Their Security Awareness Certificate Bypass: Hiding and Executing Malware From a Digitally Signed Executable Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network Drone Attacks on Industrial Wireless: A New Front in Cyber Security Hackproofing Oracle Ebusiness Suite Using Undocumented CPU Behavior to See Into Kernel Mode and Break Kaslr in the Process Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool Measuring Adversary Costs to Exploit Commercial Software Removing Roadblocks to Diversity HEIST: HTTP Encrypted Information Can Be Stolen Through TCP-Windows Memory Forensics Using Virtual Machine Introspection for Cloud Computing Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Towards a Holistic Approach in Building Intelligence to Fight Crimeware Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root The Remote Malicious Butler Did It!
Leer más

Vídeos de GrrCON 2016

Ya tenemos acceso a los vídeos de las charlas de GrrCON 2016, celebrada en Michigan los pasados 6 y 7 de octubre. 116 Security Guards LOL Brent White Tim Roberts 115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years 318 Welcome to The World of Yesterday Tomorrow Joel Cardella 317 On being an Eeyore in Infosec Stefan Edwards 217 Phish your employees for fun Kristoffer Marshall 216 Binary Ninja Jared Demott 316 Piercing the Air Gap Network Steganography for Everyone John Ventura 315 So Youve Inherited a Security Department Now What Amanda Berlin 215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller 214 Tales from the Cryptanalyst Jeff Man 114 Breaking Android Apps for Fun and Profit Bill Sempf 113 Back to the Future Understanding our future but following the past Kevin Johnson 313 Alignment of business and IT Security Shane Harsch 213 Money Fame Power Build your success as a security professional Nathan Dragun 212 Machine Duping Pwning Deep Learning Systems Clarence Chio 211 Magnetic Stripes 101 Tyler Keeton 112 Guarding Lunch J Wolfgang Goerlich 111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin 110 and bad mistakes Ive made a few Jayson Street 312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman 312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman 110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so) 210 Encryption Mobility Cloud Oh My Bill Harmer 209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma 311 Stop attacking your mothers car Charles Parker II 208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey 207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra 310 How to Implement Crypto Poorly Sean Cassidy 309 Reality Checking Your AppSec Program Darren Meyer 308 Bad Guys Look Just Like You Justin Beard 205 Threat Detection Response with Hipara J Brett Cunningham 204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado 203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 108 Secure Dicks Michael Kemp 206 still broken after all these years aka utility security for smarties doug nibbelink 307 Getting to the Root of Advanced Threats Before Impact Josh Fazio 306 Fighting the Enemy Within Matt Crowe 305 How Do You Secure What You Dont Control Dimitri Vlachos 304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F 303 Make STEHM Great Again David HealWHans Schwartzberg 205 Threat Detection Response with Hipara J Brett Cunningham 204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado 203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 105 Abnormal Behavior Detection in Large Environments Dave Kennedy 302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob 300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould 202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth 201 So You Want to Be a Pentester Absolute0x0 200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong 103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau 102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts 100 Act Three The Evolution of Privacy Finux  
Leer más

Presentaciones de LinuxCon Europa 2016

Del 4 al 6 de octubre se ha celebrado la LinuxCon edición Europa en Berlín, Alemania. Como puedes imaginar ésta, es una conferencia alrededor del kernel de Linux. Desde la web de la Fundación Linux puedes acceder a dichas presentaciones, que a continuación listo: Linux Kernel Security Update Ceph and Flash Efficient kernel backporting Making More Open: Creating open source infrastructure for your open source project Flowgrind: a TCP traffic generator for developers Efficient unit test and fuzz tools for kernel/libc porting Adding CPU frequency scaling for your ARM platform to Linux kernel entry_*.
Leer más

Vídeos de Derbycon 2016

Ya tenemos disponibles los vídeos (faltan algunos) de una de las conferencias que más ha crecido en los últimos años: Derbycon. La edición de este año 2016 acaba de terminar y nos ha dejado un gran número de charlas interesantes: Key Note - Jeffrey Snover, Lee Holmes Carlos Perez - Thinking Purple Ed Skoudis - Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S. David Maloney, James Lee, Brent Cook, Tod Beardsley, Lance Sanchez - Metasploit Townhall Parker Schmitt - Data Obfuscation: How to hide data and payloads to make them "
Leer más

RootedCON Valencia 2016

El congreso RootedValencia se celebrará los días 9 y 10 de Septiembre. El viernes día 9 tendrá lugar un training llamado "RB16-1 Hacking ético" (pulsa aquí para más información) y durante el sábado día 10 se celebrarán conferencias desde las 10am hasta las 8pm. Nosotros estaremos por allí el sábado para saludar a viejos y nuevos amigos, disfrutar de las conferencias y además tomar algunas cervezas ;) Lugar: ADEIT - Fundación Universidad - Plaza Virgen de la Paz, 3, 46001 Valencia (España)
Leer más

Material de USENIX Security 2016

Otra de las conferencias referentes sobre seguridad, USENIX Security 2016, ha publicado el material presentado: Flip Feng Shui: Hammering a Needle in the Software Stack - PDF One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation - PDF - Slides PIkit: A New Kernel-Independent Processor-Interconnect Rootkit - PDF - Slides Verifying Constant-Time Implementations - PDF Secure, Precise, and Fast Floating-Point Operations on x86 Processors - PDF - Slides überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor - PDF Undermining Information Hiding (and What to Do about It) - PDF Poking Holes in Information Hiding - PDF What Cannot Be Read, Cannot Be Leveraged?
Leer más

Presentaciones de DEF CON 24

Una vez más una de las conferencias sobre seguridad informática ha llegado a su fin: DEF CON 24. Por ahora, se han puesto disponible las diapositivas y algún material extra de las presentaciones que se pudieron presenciar. Amro-Abdelgawad-Extras/ Jonathan-Brossard-Extras/ Lucas-Lundgren-Extras/ Mike-Rich-Extras/ Regilero-Extras/ Robert-Olson-Extras/ Seymour-Tully-Extras/ SixVolts-and-Haystack-Extras/ Wesley-McGrew-Extras/ 3alarmlampscoot-DIY-Nukeproofing.pdf Adam-Donenfeld-Stumping-The-Mobile-Chipset.pdf Allan-Cecil-dwangoAC-Tasbot-The-Perfectionist.pdf Amro-Abdelgawad-The-Remote-Metamorphic-Engine.pdf Anch-So-you-want-to-be-a-pentester-DC101.pdf Anto-Joseph-Fuzzing-Android-Devices.pdf Arnaud-Soullie-Workshop-Pentesting-ICS-101.pdf Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection-Writeup.pdf Ashmastaflash-Sitch-Inexpensive-Coordinated-GSM-Anomaly-Detection.pdf Benjamin-Holland-Developing-Managed-Code-Rootkits-For-Java-Runtime.pdf Bertin-Bervis-James-Jara-Exploiting-And-Attacking-Seismological-Networks-Remotely.pdf Bigezy-Saci-Pinworm-MITM-for-Metadata.pdf Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness.pdf Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory.pdf Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf Chris-Rock-How-to-overthrow-a-Government-Kuwait-Coup-WP.pdf Chris-Rock-How-to-overthrow-a-Government.pdf Clarence-Chio-Machine-Duping-101.pdf Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-WP.pdf Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools.pdf Demay-Lebrun-Canspy-A-Platorm-For-Auditing-Can-Devices.pdf Dr-Phil-Polstra-Mouse-Jigglers.pdf Drake-Christey-Vulnerabilities-101.
Leer más

Material de Black Hat USA 2016

Para pasar las tardes de verano, ya tenemos disponible la mayoría del material presentado en Black Hat USA 2016: $hell on Earth: From Browser to System Compromise us-16-Molinyawe-Shell-On-Earth-From-Browser-To-System-Compromise.pdf 1000 Ways to Die in Mobile OAuth us-16-Tian-1000-Ways-To-Die-In-Mobile-OAuth.pdf us-16-Tian-1000-Ways-To-Die-In-Mobile-OAuth-wp.pdf A Journey from JNDI/LDAP Manipulation to Remote Code Execution Dream Land us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf A Lightbulb Worm? us-16-OFlynn-A-Lightbulb-Worm.pdf us-16-OFlynn-A-Lightbulb-Worm-wp.pdf Abusing Bleeding Edge Web Standards for AppSec Glory us-16-Zadegan-Abusing-Bleeding-Edge-Web-Standards-For-AppSec-Glory.pdf Access Keys Will Kill You Before You Kill the Password us-16-Simon-Access-Keys-Will-Kill-You-Before-You-Kill-The-Password.
Leer más

Vídeos de HOPE XI

Ayer terminó la conferencia organizada por el grupo de 2600, HOPE XI (Hackers On Planet Earth). La mayoría de los vídeos ya están disponibles. Hubo tres pistas (tracks) en paralelo: (desde el mismo player puedes hacer cambiar los vídeos derecha/izquierda) Lamarr: Noether: Friedman:
Leer más