Hoy es el último día de la Black Hat Europe 2013 que se celebra en Amsterdam y, gracias a nuestros compañeros de Cyberhades, nos enteramos que ya está disponible todo el material, sin duda más de una lectura recomendada para el fin de semana ;):
- A Perfect CRIME? Only TIME Will Tell White Paper Presentation
- Advanced Heap Manipulation in Windows 8 Presentation
- Building a Defensive Framework for Medical Device Security
- The Deputies Are Still Confused White Paper Presentation
- DropSmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless White Paper Presentation File File
- Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic White Paper Presentation
- Hacking Appliances: Ironic exploitation of security products White Paper Presentation
- Hacking Video Conferencing Systems White Paper Presentation
- Hardening Windows 8 apps for the Windows Store White Paper
- Harnessing GP²Us – Building Better Browser Based Botnets Presentation
- Honeypot That Can Bite: Reverse Penetration White Paper Presentation
- Hybrid Defense: How to Protect Yourself From Polymorphic 0-days White Paper Presentation File
- Invisibility Purge – Unmasking the Dormant Events of Invisible Web Controls – Advanced Hacking Methods for Asp.Net, Mono and RIA Presentation File File File File
- Let’s Play – Applanting White Paper Presentation
- Mesh Stalkings-Penetration Testing with Small Networked Devices White Paper Presentation
- Multiplayer Online Games Insecurity White Paper Presentation
- Off Grid communications with Android – Meshing the mobile world White Paper Presentation
- Practical Attacks Against MDM Solutions White Paper Presentation
- Power Analysis Attacks for Cheapskates White Paper Presentation File
- Practical Exploitation Using A Malicious Service Set Identifier (SSID) White Paper Presentation
- The Sandbox Roulette – Are You Ready For The Gamble? Presentation
- XML Out-of-Band Data Retrieval White Paper Presentation
- Who’s Really Attacking Your ICS Devices? White Paper Presentation
- Advanced iOS Application Pentesting Presentation
- Application Development Secure Coding Workshop Presentation
- Assessing BYOD with the Smartphone Pentest Framework White Paper Presentation
- PowerShell for Penetration Testers Presentation
- Vehicle Networks Workshop Presentation
Comentarios
Publicar un comentario