Han sido unos días locos y hemos alucinado con algunas demos del Def Con 18 / Black Hat USA 2010: interceptación de llamadas GSM, hackeo de cajeros automáticos, fraude de cheques rusos, un rootkit silencioso para Android, la presentación de Chema de la nueva Foca y muchísimas, muchísimas cosas más.
Además ya es posible descargar las presentaciones del Black Hat (ayer era realmente difícil por la saturación de los servidores) así que bájatelas, siéntate en frente de tu ordenador y ¡siéntete como en Las Vegas!:
Además ya es posible descargar las presentaciones del Black Hat (ayer era realmente difícil por la saturación de los servidores) así que bájatelas, siéntate en frente de tu ordenador y ¡siéntete como en Las Vegas!:
http://media.blackhat.com/bh-us-10/whitepapers/Anh/BlackHat-USA-2010-Anh-Virt-ICE-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Arlen/BlackHat-USA-2010-Arlen-SCADA-Cyberdouchery-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/olleb/BlackHat-USA-2010-olleb-Hardening-Windows-Applications-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/olleb/BlackHat-USA-2010-olleb-Hardening-Windows-Applications-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Bailey_DePetrillo/BlackHat-USA-2010-Bailey-DePetrillo-The-Carmen-Sandiego-Project-wp.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Becherer/BlackHat-USA-2010-Becherer-Andrew-Hadoop-Security-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Becherer/BlackHat-USA-2010-Becherer-Andrew-Hadoop-Security-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Beek/BlackHat-USA-2010-Beek-Virtual-Forensics-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Bolzoni_Schade/BlackHat-USA-2010-Bolzoni-Schade-Goodware-drugs-for-malware-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Born/BlackHat-USA-2010-Born-psudp-Passive-Network-Covert-Communication-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Born/BlackHat-USA-2010-Born-psudp-Passive-Network-Covert-Communication-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Bugher/BlackHat-USA-2010-Bugher-Secure-Use-of-Cloud-Storage-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Bugher/BlackHat-USA-2010-Bugher-Secure-Use-of-Cloud-Storage-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Bursztein_Gourdin_Rydstedt/BlackHat-USA-2010-Bursztein-Bad-Memories-wp.pdf
http://www.argeniss.com/research/TokenKidnapping.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Cerrudo/BlackHat-USA-2010-Cerrudo-Toke-Kidnapping's-Revenge-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Cerrudo/BlackHat-USA-2010-Cerrudo-Toke-Kidnapping's-Revenge-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Bratus_Conti/BlackHat-USA-2010-Bratus-Conti-Taxonomy-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Bratus_Conti/BlackHat-USA-2010-Bratus-Conti-Voyage-of-a-Reverser-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Criscione/BlackHat-USA-2010-Criscione-Virtually-Pwned-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Cross/BlackHat-USA-2010-Cross-Internet-Wiretapping-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Dabirsiaghi/BlackHat-USA-2010-Dabirsiaghi-JavaSnoop-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Zovi/BlackHat-USA-2010-DaiZovi-Return-Oriented-Exploitation-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Daswani/BlackHat-USA-2010-Daswani-mod-antimalware-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Daswani/BlackHat-USA-2010-Daswani-mod-antimalware-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Di_Croce/BlackHat-USA-2010-Di-Croce-SAP-Backdoors-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Eng_Creighton/BlackHat-USA-2010-Eng-Creighton-Deconstructing-ColdFusion-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Engebretson_Pauli_Cronin/BlackHat-USA-2010-Engebretson-Pauli-Cronin-SprayPAL-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Engebretson_Pauli_Cronin/BlackHat-USA-2010-Engebretson-Pauli-Cronin-SprayPAL-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Esser/BlackHat-USA-2010-Esser-Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Fayo/BlackHat-USA-2010-Fayo-Hacking-Protecting-Oracle-Databease-Vault-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Fayo/BlackHat-USA-2010-Fayo-Hacking-Protecting-Oracle-Databease-Vault-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Feinstein_Jarmoc_King/BlackHat-USA-2010-Jarmoc-Insecurities-in-Security-Infrastructure-wp.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Feinstein_Jarmoc_King/BlackHat-USA-2010-King-Insecurities-in-Security-Infrastructure-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Feinstein_Jarmoc_King/BlackHat-USA-2010-Insecurities-in-Security-Infrastructure-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/FX/BlackHat-USA-2010-FX-Blitzableiter-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/FX/BlackHat-USA-2010-FX-Blitzableiter-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Vaskovitch/BlackHat-USA-2010-Fyodor-Fifield-NMAP-Scripting-Engine-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Vaskovitch/BlackHat-USA-2010-Fyodor-Fifield-NMAP-Scripting-Engine-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Grenier_Johnson/BlackHat-USA-2010-Grenier-Johnson-Harder-Better-Faster-Stronger-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Grugq/BlackHat-USA-2010-Gurgq-Base-Jumping-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Hamiel_Wielgoszewski/BlackHat-USA-2010-Hamiel-Wielgosweski-Constricting-the-Web-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Hamiel_Wielgoszewski/BlackHat-USA-2010-Hamiel-Wielgosweski-Constricting-the-Web-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Hansen_Sokol/Blackhat-USA-2010-Hansen-Sokol-HTTPS-Can-Byte-Me.pdf
http://media.blackhat.com/bh-us-10/presentations/Harbour/BlackHat-USA-2010-Harbour-Black-Art-of-Binary-Hijacking-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Hypponen/BlackHat-USA_2010-Hypponen-You-will-be-billed-90000-for-this-call-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Iozzo,Weinmann_Kornau/BlackHat-USA-2010-Iozzo-Weinmann-Kornau-Everybody-be-cool-this-is-a-roppery-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Kamkar/BlackHat-USA-2010-Kamkar-How-I-Met-Your-Girlfriend-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Kamkar/BlackHat-USA-2010-Kamkar-How-I-Met-Your-Girlfriend-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Keltner/BlackHat-USA-2010-Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3.pdf
http://media.blackhat.com/bh-us-10/presentations/Kennedy_Kelly/BlackHat-USA-2010-Kennedy-Kelly-PowerShell-Its-Time-To-Own-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Le/BlackHat-USA-2010-Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Le/BlackHat-USA-2010-Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Meer/BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Meiners_Sor/Blackhat-USA-2010-Meiners-Sor-WEP-is-back-to-haunt-you-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Meiners_Sor/Blackhat-USA-2010-Meiners-Sor-WEP-is-back-to-haunt-you-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Nagy/BlackHat-USA-2010-Nagy-Industrial-Bug-Mining-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Nohl/BlackHat-USA-2010-Nohl-Attacking.Phone.Privacy-wp.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Ocepek_Henderson/BlackHat-USA-2010-Henderson-Ocepek-Need-A-Hug-wp.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Ochoa_Azubel/BlackHat-USA-2010-Ochoa-Azubel-NTLM-Weak-Nonce-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Ochoa_Azubel/BlackHat-USA-2010-Ochoa-Azubel-NTLM-Weak-Nonce-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Jeongwook_Oh/BlackHat-USA-2010-Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Jeongwook_Oh/BlackHat-USA-2010-Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Ollmann/BlackHat-USA-2010-Ollmann-6millionDollarMan-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Ollmann/BlackHat-USA-2010-Ollmann-6millionDollarMan-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Parker/BlackHat-USA-2010-Parker-Finger-Pointing-for-Fun-Profit-and-War-0.2-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Percoco_Llyas/Trustwave - SpiderLabs - BlackHat-USA-2010-Percoco-Llyas-Malware Freakshow-2010-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Percoco_Llyas/Trustwave - SpiderLabs - BlackHat-USA-2010-Percoco-Llyas-Malware Freakshow-2010-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Pollet_Cummins/BlackHat-USA-2010-Pollet-Cummings-RTS-Electricity-for-Free-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Raber_Cheatham/BlackHat-USA-2010-Raber-Cheatham-Reverse-Engineering-with-Hardware-Debuggers-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Rad/BlackHat-USA-2010-Rad-DMCA-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Rad/BlackHat-USA-2010-Rad-DMCA-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Rey_Mende/BlackHat-USA-2010-Mende-Graf-Rey-loki_v09-wp.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Ristic/BlackHat-USA-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1.pdf
http://media.blackhat.com/bh-us-10/presentations/Ristic/BlackHat-USA-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Ryan/BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin-Sage-v1.0.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Shah/BlackHat-USA-2010-Shah-DOM-Hacks-Shreeraj-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Shah/BlackHat-USA-2010-Shah-DOM-Hacks-Shreeraj-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Shelton/BlackHat-USA-2010-Shelton-IBM-AIX-Heap-Overflow-Methods-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Shelton/BlackHat-USA-2010-Shelton-IBM-AIX-Heap-Overflow-Methods-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Siddharth/BlackHat-USA-2010-Siddharth-Hacking-Oracle-from-the-Web-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Slaviero/BlackHat-USA-2010-Slaviero-Lifting-the-Fog-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Smith/BlackHat-USA-2010-Smith-pyREtic-Reversing-wp.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Smith_Lai/BlackHat-USA-2010-Smith-Lai-Balancing-the-Pwn-deficit-wp.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Stender_Engel_Hill/BlackHat-USA-2010-Stender-Engel-Hill-Attacking-Kerberos-Deployments-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Stender_Engel_Hill/BlackHat-USA-2010-Stender-Engel-Hill-Attacking-Kerberos-Deployments-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Suiche/BlackHat-USA-2010-Suiche-Blue-Screen-of-the-Death-is-dead-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Suiche/BlackHat-USA-2010-Suiche-Blue-Screen-of-the-Death-is-dead-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Sullivan/BlackHat-USA-2010-Sullivan-Cryptographic-Agility-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Sullivan/BlackHat-USA-2010-Sullivan-Cryptographic-Agility-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Sumner/BlackHat-USA-2010-Sumner-Social-Net-Special-Ops-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Thomas/BlackHat-USA-2010-Thomas-BlindElephant-WebApp-Fingerprinting-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Umadas_Alleny/BlackHat-USA-2010-Umadas-Allen-Network-Stream_Debugging-with-Mallory-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Umadas_Alleny/BlackHat-USA-2010-Umadas-Allen-Network-Stream_Debugging-with-Mallory-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/deVries/BlackHat-USA-2010-deVries-Attacking-Java-Clients-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Vuksan_Pericin/BlackHat-USA-2010-Vuksan-Pericin-TitanMist-wp.pdf
http://media.blackhat.com/bh-us-10/presentations/Vuksan_Pericin/BlackHat-USA-2010-Vuksan-Pericin-TitanMist-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Waisman/BlackHat-USA-2010-Waisman-APT-slides.pdf
http://media.blackhat.com/bh-us-10/presentations/Wicherski/BlackHat-USA-2010-Wicherski-dirtbox-x86-windows-emulator-slides.pdf
http://media.blackhat.com/bh-us-10/whitepapers/Yerazunis/BlackHat-USA-2010-Yerazunis-Confidential-Mail-Filtering-wp.pdf
Comentarios
Publicar un comentario