presentaciones de defcon 22
TRANSCRIPT
BY [PS]Chamo
Presentaciones de Defcon 22 (PDFs)
Ya se encuentran disponibles las presentaciones (diapositivas y
algún documento extra) de Defcon 22:
Protecting SCADA From the Ground Up – PDF
Detecting Bluetooth Surveillance Systems – PDF
Dropping Docs on Darknets: How People Got Caught – PDF
Hacking 911: Adventures in Disruption, Destruction, and Death – PDF
How to Disclose an Exploit Without Getting in Trouble – PDF
Reverse Engineering Mac Malware – PDF
NSA Playset: PCIe – PDF
The Monkey in the Middle: A pentesters guide to playing in traffic. – PDF
Investigating PowerShell Attacks – PDF
Is This Your Pipe? Hijacking the Build Pipeline. – PDF
Screw Becoming A Pentester – When I Grow Up I Want To Be A Bug Bounty Hunter!
Home Alone with localhost: Automating Home Defense – PDF
Meddle: Framework for Piggy-back Fuzzing and Tool Development – PDF
Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware
Analysis More Effectively –PDF White Paper
One Man Shop: Building an effective security program all by yourself – PDF
RF Penetration Testing, Your Air Stinks – PDF
Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
USB for all! – PDF
BY [PS]Chamo
ShareEnum: We Wrapped Samba So You Don’t Have To – PDF
An Introduction to Back Dooring Operating Systems for Fun and Trolling – PDF
Android Hacker Protection Level 0 – PDF
Anatomy of a Pentest; Poppin’ Boxes like a Pro – PDF
Bug Bounty Programs Evolution – PDF Extras
Practical Foxhunting 101 – PDF
Client-Side HTTP Cookie Security: Attack and Defense – PDF
Bypass firewalls, application white lists, secure remote desktops under 20 seconds
PropLANE: Kind of keeping the NSA from watching you pee – PDF
Getting Windows to Play with Itself: A Hacker’s Guide to Windows API Abuse – PDF
Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog – PDF
Through the Looking-Glass, and What Eve Found There – PDF White Paper
Summary of Attacks Against BIOS and Secure Boot – PDF
I am a legend: Hacking Hearthstone with machine learning – PDF
The Secret Life of Krbtgt – PDF
The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns – PDF
Hacking US (and UK, Australia, France, etc.) traffic control systems – PDF
The Cavalry Year[0] & a Path Forward for Public Safety – PDF
NSA Playset: DIY WAGONBED Hardware Implant over I2C – PDF
Abuse of Blind Automation in Security Tools – PDF
Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go – PDF
Steganography in Commonly Used HF Radio Protocols – PDF Extras
Saving Cyberspace by Reinventing File Sharing – PDF
Empowering Hackers to Create a Positive Impact – PDF
Just What The Doctor Ordered? – PDF
Check Your Fingerprints: Cloning the Strong Set – PDF
Shellcodes for ARM: Your Pills Don’t Work on Me, x86 – PDF
Blowing up the Celly – Building Your Own SMS/MMS Fuzzer – PDF
Mass Scanning the Internet: Tips, Tricks, Results – PDF
Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse
Engineering – PDF
Saving the Internet (for the Future) – PDF
Burner Phone DDOS 2 dollars a day : 70 Calls a Minute – PDF
Hack All The Things: 20 Devices in 45 Minutes – PDF
Stolen Data Markets: An Economic and Organizational Assessment – PDF
Raspberry MoCA – A recipe for compromise – PDF White Paper 1 White Paper 2
BY [PS]Chamo
Girl… Fault-Interrupted. – PDF
Extreme Privilege Escalation On Windows 8/UEFI Systems – PDF White Paper
NinjaTV – Increasing Your Smart TV’s IQ Without Bricking It – PDF
Oracle Data Redaction is Broken – PDF
Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What’s
Running on Your System –PDF
Catching Malware En Masse: DNS and IP Style – PDF White Paper
Attacking the Internet of Things using Time – PDF
Open Source Fairy Dust – PDF
Learn how to control every room at a luxury hotel remotely: the dangers of insecure
home automation deployment – PDF White Paper
Generating ROP payloads from numbers – PDF
DEF CON Comedy Jam Part VII, Is This The One With The Whales? – PDF
The NSA Playset: RF Retroreflectors – PDF 1 PDF 2
VoIP Wars: Attack of the Cisco Phones – PDF
Playing with Car Firmware or How to Brick your Car – PDF
Measuring the IQ of your Threat Intelligence feeds – PDF
Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring – PDF
Abusing Software Defined Networks – PDF
NSA Playset : GSM Sniffing – PDF
Cyberhijacking Airplanes: Truth or Fiction? – PDF
Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance – PDF
Detecting and Defending Against a Surveillance State – PDF
Acquire current user hashes without admin privileges – PDF
You’re Leaking Trade Secrets – PDF
Veil-Pillage: Post-exploitation 2.0 – PDF
From Raxacoricofallapatorius With Love: Case Studies In Insider Threat – PDF
Don’t DDoS Me Bro: Practical DDoS Defense – PDF
Advanced Red Teaming: All Your Badges Are Belong To Us – PDF
I Hunt TR-069 Admins: Pwning ISPs Like a Boss – PDF
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National
Security State – PDF
A Journey to Protect Points-of-sale – PDF
Impostor — Polluting Tor Metadata – PDF
Domain Name Problems and Solutions – PDF White Paper
Optical Surgery; Implanting a DropCam – PDF
Manna from Heaven: Improving the state of wireless rogue AP attacks – PDF
BY [PS]Chamo
The Open Crypto Audit Project – PDF
Practical Aerial Hacking & Surveillance – PDF White Paper
From root to SPECIAL: Pwning IBM Mainframes – PDF
PoS Attacking the Traveling Salesman – PDF
Don’t Fuck It Up! – PDF