Memorias del Black Hat USA 2010
Se ha liberado la documentación oficial del Blackhat USA, una de las conferencia de seguridad más importantes a nivel mundial, a continuación les dejo los contenidos expuestos en estas conferencias.
Posiblemente encuentren los servidores saturados por la gran demanda que deben tener estos documentos en estos momentos.
- Anh Virt ICE
- Arlen SCADA Cyberdouchery
- olleb Hardening Windows Applications
- olleb Hardening Windows Applications - Diapositivas
- Bailey DePetrillo The Carmen Sandiego Project
- Becherer Andrew Hadoop Security
- Becherer Andrew Hadoop Security - Diapositivas
- Beek Virtual Forensics
- Bolzoni Schade Goodware drugs for malware
- Born psudp Passive Network Covert Communicatio
- Born psudp Passive Network Covert Communication - Diapositivas.
- Bugher Secure Use of Cloud Storage
- Bugher Secure Use of Cloud Storage - Diapositivas
- Bursztein-Bad-Memories
- Cerrudo Toke Kidnapping's Revenge
- Cerrudo Toke Kidnapping's Revenge - Diapositivas
- Bratus Conti Taxonomy
- Bratus Conti Voyage of a Reverser - Diapositivas
- Criscione Virtually Pwned - Diapositivas
- Cross Internet Wiretapping - Diapositivas
- Dabirsiaghi JavaSnoop
- DaiZovi Return Oriented Exploitation - Diapositivas
- Daswani mod antimalware
- Daswani mod antimalware - Diapositivas
- Di Croce SAP Backdoors
- Eng Creighton Deconstructing ColdFusion - Diapositivas
- Engebretson Pauli Cronin SprayPAL
- Engebretson Pauli Cronin SprayPAL - Diapositivas
- Esser Utilizing Code Reuse Or Return Oriented Programming In PHP Application Exploits - Diapositivas
- Fayo Hacking Protecting Oracle Databease Vault
- Fayo Hacking Protecting Oracle Databease Vault - Diapositivas
- Jarmoc Insecurities in Security Infrastructure
- King Insecurities in Security Infrastructure
- Insecurities in Security Infrastructure - Diapositivas
- FX Blitzableiter
- FX Blitzableiter - Diapositivas
- Fyodor Fifield NMAP Scripting Engine
- Fyodor Fifield NMAP Scripting Engine - Diapositivas
- Grenier Johnson Harder Better Faster Stronger
- Gurgq Base Jumping - Diapositivas
- Hamiel Wielgosweski Constricting the Web
- Hamiel Wielgosweski Constricting the Web - Diapositivas
- Hansen Sokol HTTPS Can Byte Me
- Harbour Black Art of Binary Hijacking - Diapositivas
- Heffner How to Hack Millions of Routers
- Heffner How to Hack Millions of Routers - Diapositivas
- Hypponen You will be billed 90000 for this call - Diapositivas
- Iozzo Weinmann Kornau Everybody be cool this is a roppery - Diapositivas
- Kamkar How I Met Your Girlfriend
- Kamkar How I Met Your Girlfriend - Diapositivas
- Keltner Elrod Adventures In Limited User Post Exploitation wp v1.3
- Kennedy Kelly PowerShell Its Time To Own - Diapositivas
- Le Paper Payload already inside data reuse for ROP exploits
- Le Paper Payload already inside data reuse for ROP exploits - Diapositivas
- Meer History of Memory Corruption Attacks
- Blackhat USA 2010 Meiners Sor WEP is back to haunt you.
- Meiners Sor WEP is back to haunt you - Diapositivas
- Nagy Industrial Bug Mining - Diapositivas
- Nohl Attacking.Phone.Privacy
- Henderson Ocepek Need A Hug
- Ochoa Azubel NTLM Weak Nonce
- Ochoa Azubel NTLM Weak Nonce - Diapositivas
- Jeongwook Oh ExploitSpotting Locating Vulnerabilities Out Of Vendor Patches Automatically
- Jeongwook Oh ExploitSpotting Locating Vulnerabilities Out Of Vendor Patches Automatically - Diapositivas
- Ollmann 6millionDollarMan
- Ollmann 6millionDollarMan - Diapositivas
- Parker Finger Pointing for Fun Profit and War 0.2 - Diapositivas
- Percoco Llyas Malware Freakshow 2010
- Percoco Llyas Malware Freakshow 2010 - Diapositivas
- Pollet Cummings RTS Electricity for Free
- Raber Cheatham Reverse Engineering with Hardware Debuggers - Diapositivas
- Rad DMCA
- Rad DMCA - Diapositivas
- Mende Graf Rey loki_v09
- Ristic Qualys SSL Survey HTTP Rating Guide wp v1
- Ristic Qualys SSL Survey HTTP Rating Guide slide
- Ryan Getting In Bed With Robin Sage v1.0
- Shah DOM Hacks Shreeraj
- Shah DOM Hacks Shreeraj - Diapositivas
- Shelton IBM AIX Heap Overflow Methods
- IBM AIX Heap Overflow Methods - Diapositivas
- Siddharth Hacking Oracle from the Web
- Slaviero Lifting the Fog - Diapositivas
- Smith pyREtic Reversing.
- Smith Lai Balancing the Pwn deficit
- Stender Engel Hill Attacking Kerberos Deployments
- Stender Engel Hill Attacking Kerberos Deployments - Diapositivas
- Suiche Blue Screen of the Death is dead
- Suiche Blue Screen of the Death is dead - Diapositivas
- USA 2010 Sullivan Cryptographic Agility
- Sullivan Cryptographic Agility - Diapositivas
- Sumner Social Net Special Ops - Diapositivas
- Thomas BlindElephant WebApp Fingerprinting - Diapositivas
- Umadas Allen Network Stream_Debugging with Mallory
- Umadas Allen Network Stream_Debugging with Mallory - Diapositivas
- eVries Attacking Java Clients - Diapositivas
- Vuksan Pericin TitanMist.
- Vuksan Pericin TitanMist - Diapositivas
- Waisman APT - Diapositivas
- Wicherski dirtbox x86 windows emulator - Diapositivas
- Yerazunis Confidential Mail Filtering
Mas Información:
Blackhat USA 2010 Media Archives