Mirror archivos DEFCON 21
Es genial, poder encontrarse con un material tan bueno como las presentaciones y materiales de la DEFCON colgados en Internet antes de que la propia DEFCON haga release oficial.
En contagiodump, página de sobras conocida por compartir muestras para el researching de malware, han colgado todo el material de la DEFCON 2013. Lo he descargado y he hecho un mirror en Mega para que lo podamos descargar sin problemas.
El material que hay subido es el siguiente:
Abraham Kang and Dinis Cruz
- DEFCON-21-Kang-Cruz-RESTing-On-Your-Laurels-Will-Get-You-Pwned.pdf
Alejandro Caceres
- DEFCON-21-Caceres-Massive-Attacks-With-Distributed-Computing.pdf
Alexandre Pinto
- DEFCON-21-Pinto-Defending-Networks-Machine-Learning-WP.pdf
- DEFCON-21-Pinto-Defending-Networks-Machine-Learning.pdf
Amber Baldet
- DEFCON-21-Baldet-Suicide-Intervention-Risk-Assessment-Tactics.pdf
Andy Davis
- DEFCON-21-Davis-Revealing-Embedded-Fingerprints.pdf
Balint Seeber
- DEFCON-21-Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf
Bogdan Alecu
- DEFCON-21-Bogdan-Alecu-Attacking-SIM-Toolkit-with-SMS-WP.pdf
- DEFCON-21-Bogdan-Alecu-Business-Logic-Flaws-in-MO.pdf
Brendan O'Connor
- DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf
Brian Gorenc and Jasiel Spelman
- DEFCON-21-Gorenc-Spelman-Java-Every-days-WP.pdf
- DEFCON-21-Gorenc-Spelman-Java-Every-days.pdf
Chris John Riley
- DEFCON-21-Riley-Defense-by-Numbers.pdf
Chris Sumner and Randall Wald
- DEFCON-21-Sumner-Wald-Prediciting-Susceptibility-To-Social-Bots-On-Twitter.pdf
Christine Dudley
- DEFCON-21-Dudley-Privacy-In-DSRC-Connected-Vehicles.pdf
Craig Young
- DEFCON-21-Young-Google-Skeleton-Key.pdf
---Extras
- DEFCON-21-Craig-Young-Android-PoC-StockView-with-SSL.apk
- DEFCON-21-Craig-Young-Android-PoC-StockView.apk
- DEFCON-21-Craig-Young-Android-PoC-TubeApp.apk
- DEFCON-21-Craig-Young-StockView-ExampleCode.java
Crowley and Panel
- DEFCON-21-Crowley-Savage-Bryan-Home-Invasion-2.0-WP.pdf
- DEFCON-21-Crowley-Savage-Bryan-Home-Invasion-2.0.pdf
| ---Extras
---upnp_request_gen
LICENSE.txt
readme.txt
upnp_request_gen.php
Dan Griffin
- DEFCON-21-Dan-Griffin-Protecting-Data.pdf
Daniel Chechik
- DEFCON-21-Chechik-Utilizing-Popular-Websites-for-Malicious-Purposes-Using-RDI.pdf
Daniel Selifonov
- DEFCON-21-Selifonov-A-Password-is-Not-Enough-Why-Disk-Encryption-is-Broken.pdf
Eric Fulton and Daniel Zolnikov
- DEFCON-21-Fulton-Zolnikov-The-Politics-of-Privacy-and-Technology.pdf
Eric Milam
- DEFCON-21-Milam-Getting-The-Goods-With-smbexec.pdf
Eric Robi and Michael Perklin
- DEFCON-21-Robi-Perklin-Forensic-Fails.txt
Etemadieh and Panel
- DEFCON-21-Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf
Fatih Ozavci
- DEFCON-21-Ozavci-VoIP-Wars-Return-of-the-SIP.pdf
| ---Extras
DEFCON-21-viproy-voipkit.tgz
Flipper
- DEFCON-21-Flipper-10000-Yen.pdf
| ---Extras
| Defcon 21 - 10000 Yen Source Code.txt
| OpenGlider BoM.pdf
| OpenGlider V0.1.x_t.txt
| x35 coordinates.sldcrv.txt
|
---OpenGlider IGES Files
Franz Payer
- DEFCON-21-Payer-Exploiting-Music-Streaming-with-JavaScript.pdf
Gregory Pickett
- DEFCON-21-Pickett-Lets-Screw-With-NMAP.pdf
| ---Extras
DEFCON-21-Pickett-Lets-Screw-With-NMAP-Specifications.pdf
DEFCON-21-Pickett-Lets-Screw-With-NMAP-Transformations.pdf
platform.zip
scans.zip
Hunter Scott
- DEFCON-21-Scott-Security-in-Cognitive-Radio-Networks.pdf
Jacob Thompson
- DEFCON-21-Thompson-CREAM-Cache-Rules-Evidently-Ambiguous-Misunderstood.pdf
Jaeson Schultz
- DEFCON-21-Schultz-Examining-the-Bitsquatting-Attack-Surface-WP.pdf
Jason Staggs
- DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
- DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper.pdf
| ---Extras
DEFCON-21-CANClockProof-of-ConceptDemo.wmv
DEFCON-21-CANClockSource.pde
DEFCON-21-MINI-Cooper-Crash-Test.wmv
Jim Denaro
- DEFCON-21-Denaro-How-to-Disclose-or-Sell-an-Exploit.pdf
Joe Bialek
- DEFCON-21-Bialek-PowerPwning-Post-Exploiting-by-Overpowering-Powershell.pdf
| ---Extras
DEFCON-21-Invoke-ReflectivePEInjection.ps1.txt
Joe Grand
- DEFCON-21-Grand-JTAGulator.pdf
| ---Extras
| DEFCON-21-jtagulatorassembly.pdf
| DEFCON-21-jtagulatorblockdiagram.pdf
| DEFCON-21-jtagulatorbom.pdf
| DEFCON-21-jtagulatorschematic.pdf
| DEFCON-21-jtagulatortestproc.pdf
|
Firmware 1.1 (b9b49b3)
---Gerbers B
John Ortiz
- DEFCON-21-Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf
| ---Extras
DEFCON-21-Ortiz-TOOLSCustom.zip
DEFCON-21-Ortiz-TOOLSFreeDownload.zip
Joseph Paul Cohen
| ---Extras
| DEFCON-21-blucat.base64
|
---blucat-r50
Justin Engler and Paul Vines
- DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking-WP.pdf
- DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking.pdf
| ---Extras
DEFCON-21-Codepartslistinstructions.zip
Justin Hendricks
- DEFCON-21-Justin-Hendricks-So-You-Think-Your-Domain-Controller-Is-Secure.pdf
Karl Koscher and Eric Butler
- DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf
Lawrence and Panel
- DEFCON-21-Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf
| ---Extras
DEFCON-21-config.scad
DEFCON-21-key.scad
Marc Weber Tobias and Tobias Bluzmanis
- DEFCON-21-Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf
Marion Marschalek
- DEFCON-21-Marschalek-Thorny-Malware.pdf
| ---Extras
DEFCON-21-Marschalek-MalwareBase64.txt
DEFCON-21-Marschalek-Thorny-Malware-Analysis-Report.pdf
Melissa Elliott
- DEFCON-21-Elliott-noisefloor-URLS-reference.txt
Michael Perklin
- DEFCON-21-Perklin-ACL-Steganography.pdf.pdf
| ---Extras
| ACLEncode.sln
| README.txt
|
Michael Schrenk
- DEFCON-21-Schrenk-How-my-Botnet-Defeated-Russian-Hackers.pdf
Ming Chow
- DEFCON-21-Chow-Abusing-NoSQL-Databases.pdf
Neil Sikka
- DEFCON-21-Sikka-EMET-4.0-PKI-Mitigation.pdf
Nicolas Oberli
- DEFCON-21-Oberli-Please-Insert-Inject-More-Coins.pdf
Nikhil Mittal
- DEFCON-21-Mittal-Powerpreter-Post-Exploitation-Like-a-Boss.pdf
| ---Extras
Nikhil_Mittal_Powerpreter_Code.psm1
Pau Oliva Fora
- DEFCON-21-Fora-Defeating-SEAndroid.pdf
Philip Polstra
- DEFCON-21-Polstra-We-are-Legion-Pentesting.pdf
| ---Extras
DEFCON-21-Philip-Polstra-code.py.txt
Phorkus and Evilrob
- DEFCON-21-Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf
Piotr Duszynski
- DEFCON-21-Duszynski-Cyber-Offenders.pdf
Pukingmonkey
- DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf
| ---Extras
01_ALPR_detector_proof_of_concept.mp4
02_ezpass_detector_of_open_road_tolling.mp4
03_ezpass_detector_of_hidden_reader.mp4
04_ezpass_detector_of_hidden_reader_with_toll_tag_sensor.mp4
DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds-(1).mp4
DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds.mp4
arduino-micro
Remy Baumgarten
- DEFCON-21-Baumgarten-Mach-O-Viz-WP.pdf
- DEFCON-21-Baumgarten-Mach-O-Viz.pdf
Richard Thieme
- DEFCON-21-Richard-Thieme-UFOs-and-Govt.pdf
| ---Extras
DEFCON-21-Richard Thieme-UFOs-and-Govt-Resources.txt
Ricky HIll
- DEFCON-21-Ricky-Hill-Phantom-Drone.pdf
Robert Clark
- DEFCON-21-Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense.pdf
Robert Stucke
- DEFCON-21-Stucke-DNS-Hazards.pdf
Runa A Sandvik
- DEFCON-21-Sandvik-Safety-of-the-Tor-Network.pdf
Ryan Holeman
- DEFCON-21-Holeman-The-Bluetooth-Device-Database.pdf
---Extras
---src
analytics
Sam Bowne
- DEFCON-21-Bowne-SSD-Data-Evap.pdf
Sam Bowne and Matthew Prince
- DEFCON-21-Bowne-Prince-Evil-DoS-Attacks-and-Strong-Defenses.pdf
Scott Behrens and Brent Bandelgar
- DEFCON-21-Behrens-Bandelgar-MITM-All-The-IPv6-Things.pdf
Teal Rogers and Alejandro Caceres
- DEFCON-21-Rogers-Caceres-The-Dawn-of-Web-30.pdf
Tom Keenan
- DEFCON-21-Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf
Tom Steele and Dan Kottman
- DEFCON-21-Steele-Kottman-Collaborative-Penetration-Testing-With-Lair.pdf
Tony Mui and Wai-leng
- DEFCON-21-Miu-Lee-Kill-em-All-DDoS-Protection-Total-Annihilation.pdf
| ---Extras
Vaagn Toukharian and Tigran Gevorgyan
- DEFCON-21-Toukharian-Gevorgyan-HTTP-Time-Bandit.pdf
Wesley McGrew
- DEFCON-21-McGrew-Pwn-The-Pwn-Plug .pdf
- DEFCON-21-McGrew-Pwn-The-Pwn-Plug-WP.pdf
| ---Extras
DEFCON-21-community1.1vswireless1.1.txt
DEFCON-21-exploitpacketpayload.dat
DEFCON-21-originalubootenv.txt
DEFCON-21-ubi.py
WiK and Mubix
- DEFCON-21-WiK-Mubix-gitDigger.pdf
Zak Blacher
- DEFCON-21-Blacher-Transcending-Cloud-Limitations.pdf
| ---Extras
DEFCON-21-Scripted-Demo.tar
DEFCON-21-source-Code-dpk-master.zip
Zoz
- DEFCON-21-Zoz-Hacking-Driverless-Vehicles.pdf
bughardy and Eagle1753
- DEFCON-21-bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT-WP.pdf
- DEFCON-21-bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT.pdf
m0nk
- DEFCON-21-m0nk-BoutiqueKit.pdf
soen
- DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf
Link de Mediafire cortesía de ContagioDump => DOWNLOAD HERE - 394MB Zip
Mirror para la Comunidad DragonJAR =>
defcon_21.tar.gz (394.8 MB)
https://mega.co.nz/#!aUVEHRQD!KRjzPQQBGAwtmevTcfpiQHk3z-FNRgquZKbSzFF-Fb0
El MD5 del archivo subido es =>
darkmac:Downloads marc$ md5 defcon_21.tar.gz
MD5 (defcon_21.tar.gz) = 63d7c59bb02e796bc4afcef36a623eca
Muchas gracias a ContagioDump por compartir el archivo!
SOURCE => http://contagiodump.blogspot.com.es/2013/08/defcon-21-archives-speaker-materials.html