Se você, assim como eu, gostaria de estar na DEFCON 19 em Las Vegas, mas estava muito ocupado com seus afazeres diários, aqui está a solução! Agora você pode fazer o download de quase todas as apresentações que rolaram no DEFCON deste ano totalmente de graça. Tem muita coisa interessante, e os temas são bastante atuais, como é de praxe da DEFCON.
Para quem nunca ouviu falar, a DEFCON é uma das maiores convenções hacker do mundo! Ela acontece anualmente na cidade de Nevada, em Las Vegas. Os participantes da convenção são profissionais em segurança, jornalistas, crackers, cyber-criminosos, advogados, hackers com interesses em programação, arquitetura de computadores, phreaking, modificação de hardware, ou qualquer coisa que pode ser "hackeada", inclusive caixas eletrônicos :)
Boa leitura!
Introdução
When Space Elephants Attack: A DEFCON Challenge for Database Geeks
Leia (PDF)
Bosses love Excel, Hackers too.
Leia (PDF)
Dust: Your Feed RSS Belongs To You! Avoid Censorship!
Leia (PDF)
Security When Nano Seconds Count
Leia (Slides
| White
Paper)
Beat to 1337: Creating A Successful University Cyber Defense Organization
Leia (PDF)
Pillaging DVCS Repos For Fun And Profit
Leia (Slides
| White
Paper)
Chip & PIN is Definitely Broken
Leia (PDF)
Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected
Leia (Slides
| White
Paper)
Fingerbank — Open DHCP Fingerprints Database
Leia (PDF)
PacketFence, The Open Source Nac: What We've Done In The Last Two Years
Leia (PDF)
Federation and Empire
Leia (PDF)
Three Generations of DoS Attacks (with Audience Participation, as Victims)
Leia (PDF)
Kinectasploit: Metasploit Meets Kinect
Leia (PDF)
Metasploit vSploit Modules
Leia (PDF)
Lives On The Line: Securing Crisis Maps In Libya, Sudan, And Pakistan
Leia (PDF)
Abusing HTML5
Operational Use of Offensive Cyber
Leia (PDF)
Kernel Exploitation Via Uninitialized Stack
The Art and Science of Security Research
Leia (PDF)
Internet Kiosk Terminals : The Redux
Leia (PDF)
Cipherspaces/Darknets: An Overview Of Attack Strategies
Leia (PDF)
Speaking with Cryptographic Oracles
Leia (PDF)
Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's Functionality
Leia (PDF)
PCI 2.0: Still Compromising Controls and Compromising Security
Leia (PDF)
VDLDS — All Your Voice Are Belong To Us
Leia (PDF)
Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
Leia (PDF)
Bit-squatting: DNS Hijacking Without Exploitation
Leia (PDF)
A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux
Leia (PDF)
Virtualization under attack: Breaking out of KVM
Leia (PDF)
I Am Not a Doctor but I Play One on Your Network
Leia (PDF)
Mamma Don't Let Your Babies Grow Up to be Pen Testers - (a.k.a. Everything Your Guidance Counselor Forgot to Tell You About Pen Testing)
Leia (PDF)
"Get Off of My Cloud": Cloud Credential Compromise and Exposure
Leia (PDF)
Handicapping the US Supreme Court: Can We Get Rich by Forceful Browsing?
Leia (White
Paper)
Getting F***** On the River
Leia (PDF)
UPnP Mapping
Leia (PDF)
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
Leia (PDF)
Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Leia (Slides
| White
Paper)
Bulletproofing The Cloud: Are We Any Closer To Security?
Leia (PDF)
Represent! Defcon Groups, Hackerspaces, and You.
Leia (PDF)
Smartfuzzing The Web: Carpe Vestra Foramina
Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests
Leia (PDF)
From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
Leia (PDF)
An Insider's Look at International Cyber Security Threats and Trends
Leia (PDF
| White
Paper)
Economics of Password Cracking in the GPU Era
Leia (PDF)
Jugaad – Linux Thread Injection Kit
Leia (PDF)
The Art of Trolling
Leia (PNG)
Hacking Your Victims Over Power Lines
Leia (PDF)
Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud
Leia (PDF)
Hacking and Securing DB2 LUW Databases
Leia (PDF)
Sounds Like Botnet
Leia (PDF)
DCFluX in: License to Transmit
Balancing The Pwn Trade Deficit – APT Secrets in Asia
Leia (PDF)
I'm Your MAC(b)Daddy
Leia (PDF)
PIG: Finding Truffles Without Leaving A Trace
Leia (PDF)
We're (The Government) Here To Help: A Look At How FIPS 140 Helps (And Hurts) Security
Leia (PDF)
Hacking .Net Applications: The Black Arts
Covert Post-Exploitation Forensics With Metasploit
Vulnerabilities of Wireless Water Meter Networks
Leia (PDF)
Battery Firmware Hacking
Leia (PDF)
Blinkie Lights: Network Monitoring with Arduino
Hacking Google Chrome OS
Leia (PDF)
Getting SSLizzard
Malware Freak Show 3: They're pwning er'body out there!
Leia (PDF)
This is REALLY not the droid you're looking for...
Hacking MMORPGs for Fun and Mostly Profit
Port Scanning Without Sending Packets
My password is: #FullOfFail! — The Core Problem with Authentication and How We Can Overcome It
Leia (PDF)
Why Airport Security Can't Be Done FAST
Leia (PDF)
What Time Are You Anyway?
Leia (PDF)
WTF Happened to the Constitution?! The Right to Privacy in the Digital Age
Leia (PDF)
Mobile App Moolah: Profit taking with Mobile Malware
Leia (PDF)
Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
Leia (PDF)
SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas
Leia (PDF)
Steal Everything, Kill Everyone, Cause Total Financial Ruin! (Or How I Walked In And Misbehaved)
Leia (PDF)
Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge
Leia (PDF)
How To Get Your Message Out When Your Government Turns Off The Internet
Leia (PDF)
Web Application Analysis With Owasp Hatkit
Leia (PDF)
Wireless Aerial Surveillance Platform
Leia (PDF)
Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence
Leia (PDF)
The Future of Cybertravel: Legal Implications of the Evasion of Geolocation
Leia (PDF)
Runtime Process Insemination
Leia (PDF)
Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit
Leia (PDF)
Seven Ways to Hang Yourself with Google Android
Leia (PDF)
Key Impressioning
Leia (PDF)
Staying Connected during a Revolution or Disaster
Leia (PDF)
Traps of Gold
Leia (PDF)
Network Application Firewalls: Exploits and Defense
Leia (PDF)
Phishing and Online Scam in China
Leia (PDF)
Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely
Leia (PDF)
Nenhum comentário:
Postar um comentário