Descarga las Presentaciones del BlackHat 2008

Presentaciones BlackHat 2008

Ya han sido publicadas las presentaciones del Black Hat 2008 (uno de los más importantes eventos de seguridad informática), puedes acceder a ellos por medio de su pagina oficial o puedes descargarlos individualmente con los enlaces que te pongo a continuación:

Birds of a Feather #1 - CyberCOPS (Not the TV series)
Ovie Carroll, Jim Christy, Andy Fried, Ken Privette, SA David Trosch
(no han publicado la info todavia)

Keynote - Quest for the Holy Grail
Jerry Dixon, National Member Alliance’s Vice President for Government Relations, Infragard
(no han publicado la info todavia)

Birds of a Feather #2 - Cyber Commission Recommendations
Jerry Dixon, Tom Kellerman, James Andrew Lewis, Amit Yoran
(no han publicado la info todavia)

Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking
Brian Chess, Chief Scientist, Fortify Software
Jacob West, Manager, Security Research Group, Fortify Software
Descargar Diapositivas de esta Charla

Botnet Population and Intelligence Gathering Techniques
David Dagon, Georgia Tech
Christopher Davis, Damballa
Descargar Diapositivas de esta Charla

Side Channel Analysis on Embedded Systems. Impact and Countermeasures
Job De Haas, Riscure
Descargar Diapositivas de esta Charla

Bad Sushi - Beating Phishers at Their Own Game
Nitesh Dhanjani
Billy Rios, Microsoft
Descargar Diapositivas de esta Charla

Entertainment Talk - Social Engineering
Peter Earnest
(no han publicado la info todavia)

IO in the Cyber Domain, Immunity Style
Sinan Eren, VP of Research, Immunity
Descargar Diapositivas de esta Charla

Biometric and Token-Based Access Control Systems
Zac Franken, Freelance Security Consultant
Descargar Diapositivas de esta Charla

Comments to Follow the Keynote
Andy Fried, IRS
After Jerry Dixon’s keynote, Andy Fried will give more details about the latest phishing challenges related to IRS.
(no han publicado la info todavia)

Threats to the 2008 Presidential Election
Oliver Friedrichs, Symantec Corporation
Descargar WithePaper
Descargar Diapositivas de esta Charla

Developments in Cisco IOS Forensics
FX, Recurity Labs GmbH
Descargar WithePaper

Cracking GSM
David Hulton, Steve Pico Computing, Inc.
Descargar Video
Descargar WithePaper
Descargar Diapositivas de esta Charla

Hacking VoIP through IPSec Tunnels
Sachin Jogkelar, Sipera VIPER Lab
(no han publicado la info todavia)

A Picture’s Worth: Digital Image Analysis
Dr. Neal Krawetz, Hacker Factor Solutions
Descargar WithePaper
Descargar Diapositivas de esta Charla
Herramientas Utilizadas

SCADA Security
Jason Larsen,IOActive, Inc.
Descargar Diapositivas de esta Charla

RFIDIOts!!! -Practical RFID hacking (without soldering irons)
Adam Laurie, Freelance Security Consultant
Descargar Diapositivas de esta Charla

Oracle Security
David Litchfield, NGS Software
(no han publicado la info todavia)

URI Use and Abuse
Nathan McFeters, Ernst & Young, LLP
Descargar WithePaper
Descargar Diapositivas de esta Charla

Analyzing an Unknown RF-Based Data Transmission
(aka: Fun with 27Mhz wireless keyboards)
Max Moser, Dreamlab Technologies AG
Descargar WhitePaper

(un)Smashing the Stack: Overflows, Countermeasures, and the Real World
Shawn Moyer, Agura Digital Security
Descargar WithePaper
Descargar Diapositivas de esta Charla

Exploiting Live Virtual Machine Migration
Jon Oberheide, University of Michigan
Descargar WithePaper
Descargar Diapositivas de esta Charla

Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
Sheeraj Shah, Blueinfy
Descargar Diapositivas de esta Charla

Security Failures in Secure Devices
Christopher Tarnovsky, Flylogic Engineering, LLC.
Descargar Diapositivas de esta Charla

Preparing for the Cross Site Request Forgery Defense
Chuck Willis, Principal Consultant, MANDIANT
Descargar WithePaper
Descargar Diapositivas de esta Charla

DTRACE: The Reverse Engineer’s Unexpected Swiss Army Knife
David Weston, Science Applications International Corporation (SAIC)
Tiller Beauchamp Science Applications International Corporation (SAIC)
Descargar WithePaper
Descargar Diapositivas de esta Charla

Classification and Detection of Application Backdoors
Chris Wysopal, CTO, Veracode
Descargar WithePaper
Descargar Diapositivas de esta Charla

Go up