sábado, 7 de enero de 2012

Presentaciones Defcon19 (2011)


Bueno... para aquellos que les guste leer y practicar el inglés al mismo tiempo, fueron publicadas las presentaciones de la Defcon19. Son bastantes y algunas muy complejas si no te las explican (sumado a que están en inglés), pero bueno, hay varias entretenidas.


Lo ideal sería ver los videos de las presentaciones también (o por lo menos audio), pero lo más seguro es que las suban en el mismo repositorio que subieron los PDFs asi como están las DefCon anteriores, las BlackHat, CodeCon, etc... Busquen ustedes mismos.
File or Directory NameSize (Units)
dc-19-program.pdf(19.01 MiB)
DEFCON-19-Abstrct-The-Schemaverse-Guide.pdf(592.27 KiB)
DEFCON-19-Abstrct-The-Schemaverse.pdf(993.54 KiB)
DEFCON-19-Almeida-Workshop-ESD.pdf(1.85 MiB)
DEFCON-19-Alonso-Garrido-DUST.pdf(1.78 MiB)
DEFCON-19-Alonso-Garrido-Excel.pdf(458.22 KiB)
DEFCON-19-Arlen-Nano-Seconds-WP.pdf(177.42 KiB)
DEFCON-19-Arlen-Nano-Seconds.pdf(5.40 MiB)
DEFCON-19-Arpaia-Reed-Beat-to-1337.pdf(99.74 KiB)
DEFCON-19-Baldwin-DVCS-WP.pdf(102.23 KiB)
DEFCON-19-Baldwin-DVCS.pdf(2.69 MiB)
DEFCON-19-Barisani-Bianco-Laurie-Franken.pdf(2.01 MiB)
DEFCON-19-Barnett-Deceptive-Hacking-WP.pdf(822.13 KiB)
DEFCON-19-Barnett-Deceptive-Hacking.pdf(717.56 KiB)
DEFCON-19-Bilodeau-FingerBank.pdf(214.22 KiB)
DEFCON-19-Bilodeau-PacketFence.pdf(1005.30 KiB)
DEFCON-19-Bouillon-Federation-and-Empire.pdf(19.63 MiB)
DEFCON-19-Bowne-Three-Generations-of-DoS-Attacks.pdf(2.38 MiB)
DEFCON-19-Brooks-Wilson-Traps-of-Gold.pdf(4.89 MiB)
DEFCON-19-Bryner-Kinectasploit.pdf(1.07 MiB)
DEFCON-19-Carey-Metasploit-vSploit-Modules.pdf(1.08 MiB)
DEFCON-19-Chamales-Securing-Crisis-Maps.pdf(24.78 MiB)
DEFCON-19-Chow-Abusing-HTML5.pdf(124.22 KiB)
DEFCON-19-Conti-Security-Research.pdf(8.53 MiB)
DEFCON-19-Cook-Kernel-Exploitation.pdf(564.81 KiB)
DEFCON-19-Craig-Internet-Kiosk-Terminals.pdf(1.56 MiB)
DEFCON-19-Crenshaw-Cipherspaces-Darknets.pdf(5.12 MiB)
DEFCON-19-Crowley-Cryptographic-Oracles.pdf(5.49 MiB)
DEFCON-19-Cryer-Taking-Your-Ball-and-Going-Home.pdf(5.58 MiB)
DEFCON-19-DC-Groups-Panel.pdf(19.67 MiB)
DEFCON-19-Devarajan-LeBert-VDLDS.pptx.pdf(298.56 KiB)
DEFCON-19-Dinaburg-Bit-Squatting.pdf(11.86 MiB)
DEFCON-19-Duckwall-Bridge-Too-Far.pdf(1.28 MiB)
DEFCON-19-Elhage-Virtualization-Under-Attack.pdf(422.68 KiB)
DEFCON-19-Elrod-Morris-Not-a-Doctor.pdf(297.53 KiB)
DEFCON-19-Engebretson-Pauli-Pen-Testing.pdf(759.48 KiB)
DEFCON-19-Fail-Panel.pdf(347.34 KiB)
DEFCON-19-Feinstein-Jarmoc-Get-Off-of-My-Cloud.pdf(1.41 MiB)
DEFCON-19-Foofus-Forceful-Browsing-WP.pdf(417.46 KiB)
DEFCON-19-Fritschie-Witmer-F-On-the-River.pdf(2.76 MiB)
DEFCON-19-Garcia-UPnP-Mapping-WP.pdf(252.99 KiB)
DEFCON-19-Garcia-UPnP-Mapping.pdf(204.41 KiB)
DEFCON-19-Gavin-OpenDLP.pdf(61.34 KiB)
DEFCON-19-Geers-Strategic-Cyber-Security-WP.pdf(6.35 MiB)
DEFCON-19-Geers-Strategic-Cyber-Security.pdf(1.57 MiB)
DEFCON-19-Gomez-Bulletproofing-The-Cloud.pdf(17.52 MiB)
DEFCON-19-Hamiel-Smartfuzzing_the_Web_DC.pdf(744.91 KiB)
DEFCON-19-Havelt-Henrique.pdf(3.22 MiB)
DEFCON-19-Heiland-Printer-To-Pwnd.pdf(2.09 MiB)
DEFCON-19-Holt-Kilger-Assessing-Civilian-Willingness.pdf(248.35 KiB)
DEFCON-19-Howard-Cyber-Security-Trends-WP.pdf(456.41 KiB)
DEFCON-19-Howard-Cyber-Security-Trends.pdf(2.69 MiB)
DEFCON-19-Imhoff-Password-Cracking.pdf(574.54 KiB)
DEFCON-19-JackDaniel-PCI-2-PANEL.pdf(875.54 KiB)
DEFCON-19-Jakhar-Jugaad-Linux-Thread-Injection.pdf(168.53 KiB)
DEFCON-19-Kennedy-Pentesting-Over-Powerlines-2.pdf(1.17 MiB)
DEFCON-19-Kennish-Tracking-the-Trackers.pdf(3.83 MiB)
DEFCON-19-Kornbrust-Hacking-and-Securing-DB2.pdf(664.58 KiB)
DEFCON-19-Kotler-Amit-Sounds-Like-Botnet.pdf(586.40 KiB)
DEFCON-19-Krick-License-to-Transmit.pdf(11.74 MiB)
DEFCON-19-Lai-Wu-Chiu-PK-APT-Secrets-2.pdf(12.48 MiB)
DEFCON-19-Lenik-MAC(b)Daddy.pdf(753.41 KiB)
DEFCON-19-Linn-PIG-Finding-Truffles.pdf(3.36 MiB)
DEFCON-19-Maresca-FIPS-140.pdf(294.20 KiB)
DEFCON-19-Marpet-Gostom-Smile-for-the-Grenade.pdf(7.68 MiB)
DEFCON-19-McCoy-Hacking-Net.pdf(3.98 MiB)
DEFCON-19-McGrew-Covert-WP.pdf(542.33 KiB)
DEFCON-19-McGrew-Covert.pdf(2.44 MiB)
DEFCON-19-McNabb-Vulns-Wireless-Water-Meter-Networks.pdf(2.62 MiB)
DEFCON-19-Miller-Battery-Firmware-Hacking.pdf(43.52 MiB)
DEFCON-19-O'Neil-Chin-Google-Android.pdf(4.85 MiB)
DEFCON-19-Ocepek-Blinkie-Lights-Arduino.pdf(11.74 MiB)
DEFCON-19-Ollam-Gun-Safes.pdf(27.28 MiB)
DEFCON-19-Osborn-Johansen-Hacking-Google-Chrome-OS.pdf(9.45 KiB)
DEFCON-19-Percoco-Spiderlabs-Droid.pdf(5.62 MiB)
DEFCON-19-Percoco-Spiderlabs-Malware-Freakshow-3.pdf(3.81 MiB)
DEFCON-19-Percoco-Spiderlabs-SSLizzard.pdf(4.45 MiB)
DEFCON-19-Phillips-Hacking-MMORPGs.pdf(870.61 KiB)
DEFCON-19-Pickett-Port-Scanning-Without-Packets.pdf(8.22 MiB)
DEFCON-19-Pickett-Resources.pdf(24.66 KiB)
DEFCON-19-Pittman-Password-Fail.pdf(2.52 MiB)
DEFCON-19-Rezchikov-Wang-Engelman-Airport-Security-WP.pdf(344.67 KiB)
DEFCON-19-Robinson-Time.pdf(1.36 MiB)
DEFCON-19-Schearer-WTF-Privacy.pdf(4.42 MiB)
DEFCON-19-Shah-Mobile-Moolah.pdf(1.49 MiB)
DEFCON-19-Skunkworks-Bitcoin.pdf(131.50 KiB)
DEFCON-19-Strauchs_Rad_Newman-SCADA-in-Prisons.pptx.pdf(38.10 MiB)
DEFCON-19-Street-Steal-Everything.pdf(78.45 MiB)
DEFCON-19-Sumner-Byers-Alien-Weaponizing-Cyberpsychology.pdf(95.57 KiB)
DEFCON-19-Sutherland-How-to-Get-Your-Message-Out.pdf(1.03 MiB)
DEFCON-19-Swende-Karlsson-Owasp-Hatkit.pdf(1.45 MiB)
DEFCON-19-Tassey-Perkins-Wireless-Aerial-Surveillance-Platform.pdf(5.00 MiB)
DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf(233.95 KiB)
DEFCON-19-Trimble-Cybertravel.ppt.pdf(1.39 MiB)
DEFCON-19-Webb-Runtime-Process-Insemination.pdf(799.93 KiB)
DEFCON-19-Weeks-Network-Nightmare.pdf(7.04 MiB)
DEFCON-19-Weyers-Key-Impressioning.pdf(17.05 MiB)
DEFCON-19-Wilson-Traps-of-Gold.pdf(4.89 MiB)
DEFCON-19-Woodberg-Network-Application-Firewalls.pdf(1.46 MiB)
DEFCON-19-Zhu-Phishing-Online-Scams-in-China.pdf(6.88 MiB)
DEFCON-19-Zoz-Bianchi-Vanquishing-Voyeurs.pdf(4.75 MiB)
Total size of files in this directory

(536.33 MiB)




fuente: blackploit.com

0 comentarios:

Publicar un comentario