
Se ha liberado la documentación oficial del Blackhat USA, una de las conferencia de seguridad más importantes a nivel mundial, a continuación les dejo los contenidos expuestos en estas conferencias:
= Paper
= Diapositivas de la presentacion
= Video Presentacion
= Codigo Fuente
Alessandro Acquisti
I Just Found 10 Million SSN’s

Dmitri Alperovitch, Keith Mularski
Fighting Russian Cybercrime Mobsters: Report from the Trenches

Andrea Barisani, Daniele Bianco
Sniff Keystrokes With Lasers/Voltmeters
Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage

Marc Bevand
MD5 Chosen-Prefix Collisions on GPUs

Bill Blunden
Anti-Forensics: The Rootkit Connection

Hristo Bojinov, Dan Boneh, Elie Bursztein
Embedded Management Interfaces: Emerging Massive Insecurity

Michael Brooks, David Aslanian
BitTorrent Hacks

Jesse Burns
Exploratory Android Surgery

K. Chen
Reversing and Exploiting an Apple® Firmware Update

Matt Conover
SADE: Injecting Agents into VM Guest OS

Dino Dai Zovi
Advanced Mac OS X Rootkits

Datagram
Lockpicking Forensics

Nitesh Dhanjani
Psychotronica: Exposure, Control, and Deceit

Mark Dowd, Ryan Smith, David Dewey
The Language of Trust: Exploiting Trust Relationships in Active Content

Muhaimin Dzulfakar
Advanced MySQL Exploitation

Michael Eddington
Demystifying Fuzzers

Egypt
Using Guided Missiles in Drive-by’s: Automatic browser fingerprinting and exploitation with Metasploit

Rachel Engel
Gizmo: A Lightweight Open Source Web Proxy

Stefan Esser
State of the Art Post Exploitation in Hardened PHP Environments

Tony Flick
Hacking the Smart Grid

Andrew Fried, Paul Vixie, Dr. Chris Lee
Internet Special Ops: Stalking Badness Through Data Mining

Chris Gates
Breaking the «Unbreakable» Oracle with Metasploit

Travis Goodspeed
A 16 bit Rootkit and Second Generation Zigbee Chips


Joe Grand, Jacob Appelbaum, Chris Tarnovsky
«Smart» Parking Meter Implementations, Globalism, and You

Jennifer Granick
Computer Crime Year In Review: MySpace, MBTA, Boston College and More


Jeremiah Grossman, Trey Ford
Mo’ Money Mo’ Problems: Making A LOT More Money on the Web the Black Hat Way

Peter Guerra
How Economics and Information Security Affects Cyber Crime and What It Means in the Context of a Global Recession

Nathan Hamiel, Shawn Moyer
Weaponizing the Web: More Attacks on User-Generated Content

Nick Harbour
Win at Reversing: Tracing and Sandboxing through Inline Hooking

Riley Hassell
Exploiting Rich Content

Mikko Hypponen
The Conficker Mystery

Vincenzo Iozzo, Charlie Miller
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone

Dan Kaminsky
Something about Network Security

Peter Kleissner
Stoned Bootkit

Kostya Kortchinsky
Cloudburst: Hacking 3D (and Breaking Out of VMware)

Zane Lackey, Luis Miras
Attacking SMS

Aaron LeMasters, Michael Murphy
Rapid Enterprise Triaging (RETRI): How to Run a Compromised Network and Keep Your Data Safe

Felix «FX» Lindner
Router Exploitation

Kevin Mahaffey, Anthony Lineberry, John Hering
Is Your Phone Pwned? Auditing, Attacking and Defending Mobile Devices


Moxie Marlinspike
More Tricks For Defeating SSL

John McDonald, Chris Valasek
Practical Windows XP/2003 Heap Exploitation

Haroon Meer, Nick Arvanitis, Marco Slaviero
Clobbering the Cloud!

Erez Metula
Managed Code Rootkits: Hooking into the Runtime Environments

Charlie Miller, Collin Mulliner
Fuzzing the Phone in your Phone

David Mortman
A Black Hat Vulnerability Risk Assessment

Graeme Neilson
Netscreen of the Dead: Developing a Trojaned ScreenOS for Juniper Netscreen Appliances

Steve Ocepek
Long-Term Sessions: This Is Why We Can’t Have Nice Things

Jeongwook Oh
Fight Against 1-day Exploits: Diffing Binaries vs Anti-diffing Binaries

Alfredo Ortega, Anibal Sacco
Deactivate the Rootkit

Thomas H. Ptacek, David Goldsmith, Jeremy Rauch
Hacking Capitalism ’09: Vulnerabilities In Markets And Trading Platforms

Danny Quist, Lorie Liebrock
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization

Tiffany Strauchs Rad, James Arlen
Your Mind: Legal Status, Rights and Securing Yourself

Daniel Raygoza
Automated Malware Similarity Analysis

Peter Silberman, Steve Davis
Metasploit Autopsy: Reconstructing the Crime Scene

Val Smith, Colin Ames, David Kerb
MetaPhish

Mike Zusman, Alexander Sotirov
Breaking the security myths of Extended Validation SSL Certificates

Kevin Stadmeyer, Garrett Held
Worst of the Best of the Best

Bryan Sullivan
Defensive Rewriting: A New Take on XSS/XSRF/Redirect-Phishing Defense

Chris Tarnovsky
What the hell is inside there?

Steve Topletz, Jonathan Logan and Kyle Williams
Global Spying: Realistic Probabilities in Modern Signals Intelligence

Michael Tracy, Chris Rohlf, Eric Monti
Ruby for Pentesters

Dustin «I)ruid» Trammell
Metasploit Telephony

Eduardo Vela Nava, David Lindsay
Our Favorite XSS Filters and How to Attack Them

Mario Vuksan, Tomislav Pericin
Fast & Furious Reverse Engineering with TitanEngine

Chris Weber
Unraveling Unicode: A Bag of Tricks for Bug Hunting

Jeff Williams
Enterprise Java Rootkits
