Image may be NSFW.
Clik here to view.
Se ha liberado la documentación oficial del Blackhat USA, una de las conferencia de seguridad más importantes a nivel mundial, a continuación les dejo los contenidos expuestos en estas conferencias.
Image may be NSFW.
Clik here to view.
Posiblemente encuentren los servidores saturados por la gran demanda que deben tener estos documentos en estos momentos.
- Anh Virt ICE
- Arlen SCADA Cyberdouchery
- olleb Hardening Windows Applications
- olleb Hardening Windows Applications – Diapositivas
- Bailey DePetrillo The Carmen Sandiego Project
- Becherer Andrew Hadoop Security
- Becherer Andrew Hadoop Security – Diapositivas
- Beek Virtual Forensics
- Bolzoni Schade Goodware drugs for malware
- Born psudp Passive Network Covert Communicatio
- Born psudp Passive Network Covert Communication – Diapositivas.
- Bugher Secure Use of Cloud Storage
- Bugher Secure Use of Cloud Storage – Diapositivas
- Bursztein-Bad-Memories
- Cerrudo Toke Kidnapping’s Revenge
- Cerrudo Toke Kidnapping’s Revenge – Diapositivas
- Bratus Conti Taxonomy
- Bratus Conti Voyage of a Reverser – Diapositivas
- Criscione Virtually Pwned – Diapositivas
- Cross Internet Wiretapping – Diapositivas
- Dabirsiaghi JavaSnoop
- DaiZovi Return Oriented Exploitation – Diapositivas
- Daswani mod antimalware
- Daswani mod antimalware – Diapositivas
- Di Croce SAP Backdoors
- Eng Creighton Deconstructing ColdFusion – Diapositivas
- Engebretson Pauli Cronin SprayPAL
- Engebretson Pauli Cronin SprayPAL – Diapositivas
- Esser Utilizing Code Reuse Or Return Oriented Programming In PHP Application Exploits – Diapositivas
- Fayo Hacking Protecting Oracle Databease Vault
- Fayo Hacking Protecting Oracle Databease Vault – Diapositivas
- Jarmoc Insecurities in Security Infrastructure
- King Insecurities in Security Infrastructure
- Insecurities in Security Infrastructure – Diapositivas
- FX Blitzableiter
- FX Blitzableiter – Diapositivas
- Fyodor Fifield NMAP Scripting Engine
- Fyodor Fifield NMAP Scripting Engine – Diapositivas
- Grenier Johnson Harder Better Faster Stronger
- Gurgq Base Jumping – Diapositivas
- Hamiel Wielgosweski Constricting the Web
- Hamiel Wielgosweski Constricting the Web – Diapositivas
- Hansen Sokol HTTPS Can Byte Me
- Harbour Black Art of Binary Hijacking – Diapositivas
- Heffner How to Hack Millions of Routers
- Heffner How to Hack Millions of Routers – Diapositivas
- Hypponen You will be billed 90000 for this call – Diapositivas
- Iozzo Weinmann Kornau Everybody be cool this is a roppery – Diapositivas
- Kamkar How I Met Your Girlfriend
- Kamkar How I Met Your Girlfriend – Diapositivas
- Keltner Elrod Adventures In Limited User Post Exploitation wp v1.3
- Kennedy Kelly PowerShell Its Time To Own – Diapositivas
- Le Paper Payload already inside data reuse for ROP exploits
- Le Paper Payload already inside data reuse for ROP exploits – Diapositivas
- Meer History of Memory Corruption Attacks
- Blackhat USA 2010 Meiners Sor WEP is back to haunt you.
- Meiners Sor WEP is back to haunt you – Diapositivas
- Nagy Industrial Bug Mining – Diapositivas
- Nohl Attacking.Phone.Privacy
- Henderson Ocepek Need A Hug
- Ochoa Azubel NTLM Weak Nonce
- Ochoa Azubel NTLM Weak Nonce – Diapositivas
- Jeongwook Oh ExploitSpotting Locating Vulnerabilities Out Of Vendor Patches Automatically
- Jeongwook Oh ExploitSpotting Locating Vulnerabilities Out Of Vendor Patches Automatically – Diapositivas
- Ollmann 6millionDollarMan
- Ollmann 6millionDollarMan – Diapositivas
- Parker Finger Pointing for Fun Profit and War 0.2 – Diapositivas
- Percoco Llyas Malware Freakshow 2010
- Percoco Llyas Malware Freakshow 2010 – Diapositivas
- Pollet Cummings RTS Electricity for Free
- Raber Cheatham Reverse Engineering with Hardware Debuggers – Diapositivas
- Rad DMCA
- Rad DMCA – Diapositivas
- Mende Graf Rey loki_v09
- Ristic Qualys SSL Survey HTTP Rating Guide wp v1
- Ristic Qualys SSL Survey HTTP Rating Guide slide
- Ryan Getting In Bed With Robin Sage v1.0
- Shah DOM Hacks Shreeraj
- Shah DOM Hacks Shreeraj – Diapositivas
- Shelton IBM AIX Heap Overflow Methods
- IBM AIX Heap Overflow Methods – Diapositivas
- Siddharth Hacking Oracle from the Web
- Slaviero Lifting the Fog – Diapositivas
- Smith pyREtic Reversing.
- Smith Lai Balancing the Pwn deficit
- Stender Engel Hill Attacking Kerberos Deployments
- Stender Engel Hill Attacking Kerberos Deployments – Diapositivas
- Suiche Blue Screen of the Death is dead
- Suiche Blue Screen of the Death is dead – Diapositivas
- USA 2010 Sullivan Cryptographic Agility
- Sullivan Cryptographic Agility – Diapositivas
- Sumner Social Net Special Ops – Diapositivas
- Thomas BlindElephant WebApp Fingerprinting – Diapositivas
- Umadas Allen Network Stream_Debugging with Mallory
- Umadas Allen Network Stream_Debugging with Mallory – Diapositivas
- eVries Attacking Java Clients – Diapositivas
- Vuksan Pericin TitanMist.
- Vuksan Pericin TitanMist – Diapositivas
- Waisman APT – Diapositivas
- Wicherski dirtbox x86 windows emulator – Diapositivas
- Yerazunis Confidential Mail Filtering
Mas Información:
Blackhat USA 2010 Media Archives