Y después de las Presentaciones de BlackHat, llega DefCon. Ya podemos acceder a las presentaciones de la edición 23 de la conferencia más grande sobre seguridad informática.
- 3alarmlampscooter 3alarmlampscooter-DIY-Nukeproofing.pdf
- Alessandro Di Federico Alessandro-Di-Federico-Leakless-How-The-ELF-ruined.pdf
- Amit Ashbel & Maty Siman Amit-Ashbel-Maty-Siman-Game-of-Hacks-Play-Hack-and.pdf
- AmmonRa ammonRA-How-to-hack-your-way-out-of-home-detention.pdf
- Andres Blanco & Andres Gazzoli Andres-Blanco-802.11-Massive-Monitoring.pdf
- Atlas Atlas-Fun-With-Symboliks.pdf
- Bart Kulach Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pdf
- Brent White Brent-White-Hacking-Web-Apps-WP.pdf
- Brian Gorenc & Abdul Aziz Hariri & Jason Spelman Hariri-Spelman-Gorenc-Abusing-Adobe-Readers-JavaSc.pdf
- Bruce Potter Bruce-Potter-Hackers-Guide-to-Risk.pdf
- Chris Domas Chris-Domas-REpsych.pdf
- Chris Rock Chris-Rock-I-Will-Kill-You-How-to-Get-Away-with-Mu.pdf
- Chris Sistrunk Chris-Sistrunk-NSM-101-for-ICS.pdf
- Colby Moore Colby-Moore-Spread-Spectrum-Satcom-Hacking.pdf
- Colin O’Flynn Colin-O’Flynn-Dont-Whisper-My-Chips.pdf
- Collin Anderson & Tom Cross Collin-Anderson-Tom-Cross-Export-Controls-on-Intru.pdf
- Collin Cassidy & Robert Lee & Eireann Leverett Cassidy-Leverett-Lee-Switches-Get-Stitches.pdf
- Craig Young Extras/
- Craig-Young-How-To-Train-Your-RFID-Hacking-Tools.pdf
- Dakahuna & Satanklawz DaKahuna-Satanlawz-Introduction-to-SDR-and-Wifi-Vi.pdf
- Damon Small Damon-Small-Beyond-the-Scan.pdf
- Daniel Crowley & Damon Smith Daniel-Crowley-Damon-Smith-Bugged-Files.pdf
- Daniel Selifonov Daniel-Selifonov-Drinking-from-LETHE.pdf
- David An David-An-When-the-Secretary-of-State-says-Stop-Hac.pdf
- David Huerta David-Huerta-Alice-and-Bob-are-Really-Confused.pdf
- David Mortman David-Mortman-Docker.pdf
- Eijah Eijah-Crypto-for-Hackers.pdf
- Eric (XlogicX) Davisson Eric-XlogicX-Davisson-ReDoS.pdf
- Eric Van Albert & Zack Banks Eric-Van-Albert-Zack-Banks-Looping-Surveillance-Ca.pdf
- Etienne Martineau Etienne-Martineau-Inter-VM-Data-Exfiltration.pdf
- Evilrob & Xaphan Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick-Pics-S.pdf
- Fatih Ozavci Fatih-Ozavci-The-Art-of-VoIP-Workshop.pdf
- Fernando Arnaboldi Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Atta.pdf
- Fernando-Arnaboldi-Abusing-XSLT-for-Practical-_002.pdf
- Gerard Laygui Gerard-Laygui-Forensic-Artifacts-Pass-The-Hash-Att.pdf
- Grant Bugher Grant-Bugher-Obtaining-and-Detecting-Domain-Persis.pdf
- Gregory Pickett Extras/
- Gregory-Pickett-Staying-Persistant-in-Software-Def.pdf
- Ian Kline Ian-Kline-LTE-Recon-and-Tracking-with-RTLSDR.pdf
- Ian Latter Ian-Latter-Remote-Access-the-APT.pdf
- Ionut Popescu Ionut-Popescu-NetRipper-WP.pdf
- Ionut-Popescu-NetRipper.pdf
- Jason Haddix Jason-Haddix-How-Do-I-shot-Web.pdf
- Jeremy Dorrough Jeremy-Dorrough-USB-Attack-to-Decrypt-Wi-Fi-Commun.pdf
- John Menerick John-Menerick-Backdooring-Git.pdf
- John Seymour John-Seymour-Quantum-Classification-of-Malware-WP.pdf
- John-Seymour-Quantum-Classification-of-Malware.pdf
- Jose Selvi Jose-Selvi-Breaking-SSL-Using-Time-Synchronisation.pdf
- Joshua Smith Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HD.pdf
- Justin Engler Justin-Engler-Secure-Messaging-For-Normal-People-W.pdf
- Justin-Engler-Secure-Messaging-For-Normal-People.pdf
- Ken Westin Ken-Westin-Confessions-of-a-Cyberstalker.pdf
- Lance Butters (Nemus) Lance-Buttars-Nemus-SQLi-on-LAMP.pdf
- Li Jun & Yang Qing Li-Jun-Yang-Qing-I-AM-A-NEWBIE-YET-I-CAN-HACK-ZIGB.pdf
- Lin Huang & Qing Yang Lin-Huang-Qing-Yang-GPS-Spoofing.pdf
- Luke Young
- Mahdi Namazifar Mahdi-Namazifar-Detecting-Random-Strings-Language-.pdf
- Maiubiz Miaubiz-Put-on-Your-Tinfo_t-Hat.pdf
- Marina Krotofil & Jason Larsen Marina-Krotofil-Jason-Larsen-Rocking-the-Pocke_002.pdf
- Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketboo.pdf
- Mark Ryan Talabis Mark-Ryan-Talabis-The-Bieber-Project.pdf
- Marte L0ge Marte-L0ge-I-will-Tell-you-your-Lock-Pattern.pdf
- Matt Graeber & Willi Ballenthin & Claudio Teodorescu Ballenthin-Graeber-Teodorescu-WMI-Attacks-Defense-.pdf
- Matteo Becarro & Matteo Collura Matteo-Becarro-Matteo-Collura-Extracting-The-Painf.pdf
- Michael Robinson Michael-Robinson-Knocking-My-Neighbors-Kids-Drone-.pdf
- Michael Schrenk Michael-Schrenk-Applied-Intelligence.pdf
- Mickey Shkatov & Jesse Michael Mickey-Shkatov-Jesse-Michael-Scared-poopless-LTE-a.pdf
- Mike Sconzo Mike-Sconzo-I-am-packer-and-so-can-you.pdf
- Nadeem Douba Extras/
- Nadeem-Douba-BurpKit.pdf
- Nir Valtman & MosheFerber Nir-Valtman-Moshe-Ferber-From-zero-to-secure-in-1-.pdf
- Omer Coskun Omer-Coskun-Why-Nation-State-Malwares-Target-Telco.pdf
- Panel – Comedy Inception Panel-Comedy-Inception-Amanda-Berlin-Blue-Team-Hel.pdf
- Patrick McNeil Patrick-McNeil-Guidelines-For-Securing-Your-VoIP-P.pdf
- Patrick McNeil & Snide Owen Patrick-McNeil-Owen-Sorry-Wrong-Number.pdf
- Patrick Wardle Patrick-Wardle-DLL-Hijacking-on-OSX.pdf
- Patrick-Wardle-Stick-that-in-your-(Root)Pipe-and-S.pdf
- Paul Amicelli & David Baptiste Paul-Amicelli-David-Baptiste-How-to-secure-the-key.pdf
- Peter Desfigies, Joshua Brierton & Naveed Ul Islam Desfigies-Brierton-Islam-Guests-N-Goblins-Referenc.txt
- Desfigies-Brierton-Islam-Guests-N-Goblins.pdf
- Phil Polstra Extras/
- Phil-Polstra-Hacker-in-the-Wires.pdf
- Phil-Polstra-One-device-to-Pwn-them-all.pdf
- Phil Young & Chad Rikansrud Extras/
- Phil-Young-Chad-Rikansrud-Security-Necromancy-Furt.pdf
- Phillip Aumasson Phillip-Aumasson-Quantum-Computers-vs-Computers-Se.pdf
- Rich Kelley Rich-Kelley-Harness-Powershell-Weaponization-Made-.pdf
- Richo Healey & Mike Ryan Richo-Healey-Mike-Ryan-Hacking-Electric-Skateboard.pdf
- Ricky Lawshae Extras/
- Rickey-Lawshae-Lets-Talk-About-SOAP.pdf
- Rodrigo Almeida Extras/
- Rodringo-Almeida-Embedded-System-Design-From-E_002.pdf
- Rodringo-Almeida-Embedded-System-Design-From-Elect.pdf
- Ronny Bull & Jeanna Matthews Extras/
- Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-N_002.pdf
- Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Netwo.pdf
- Ryan Castelluci Ryan-Castellucci-Cracking-Cryptocurrency-Brainwall.pdf
- Ryan Mitchell Ryan-Mitchell-Separating-Bots-from-Humans.pdf
- Ryan O’Neil Ryan-O’Neil-Advances-in-Linux-Forensics-ECFS.pdf
- Saif El-Sherei & Etienne Stalmans Saif-El-Sherei-Etienne-Stalmans-SensePost-Introduc.pdf
- Sam Bowne Sam-Bowne-Workshop-Android-Security-Auditing-Mobil.pdf
- Sam-Bowne-Workshop-Violent-Python.pdf
- Samy Kamkar Extras/
- Samy-Kamkar-README.txt
- Sarah Edwards Sarah-Edwards-Ubiquity-Forensics.pdf
- Sean Metcalf Sean-Metcalf-Red-vs-Blue-AD-Attack-and-Defense.pdf
- Shawn Webb Shawn-Webb-HardenedBSD-Internals.pdf
- Tamas Szakaly Tamas-Szakaly-Shall-We-Play-A-Game.pdf
- Tony Trummer & Tushar Dalvi Tony-Trummer-Tushar-Dalvi-QARK.pdf
- Topher Timzen & Ryan Allen Topher-Timzen-Acquiring-NET-Objects-From-The-Manag.pdf
- Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-A.pdf
- Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-N_002.pdf
- Tottenkoph & IrishMASMS Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker.pdf
- Vivek Ramachadran Vivek-Ramachadran-Chellam.pdf
- Wesley McGrew Wesley-McGrew-I-Hunt-Penetration-Testers-WP.pdf
- Wesley-McGrew-I-Hunt-Penetration-Testers.pdf
- Weston Hecker Weston-Hecker-Goodbye-Memory-Scraping-Malware.pdf
- Xntrik xntrik-Hooked-Browser-Meshed-Networks-with-webRTC-.pdf
- Yan Shoshitaishvili & Fish Wang Yan-Shoshitaishvili-Fish-Wang-Angry-Hacking.pdf
- Yaniv Balmas & Lior Oppenheim Yaniv-Balmas-Lior-Oppenheim-Key-Logger-Video-Mouse.pdf
- Yuwei Zheng & Haoqi Shan Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traff.pdf
- Zach Allen & Rusty Bower Zack-Allen-Rusty-Bower-Malware-In-Gaming.pdf
- fluxist Fluxist-Unbootable-Exploiting-Paylock-Smartboot.pdf
Comentarios
Publicar un comentario