DEFCON 16 Presentations now online!
- BackTrack Foo - From Bug to 0day - Mati Aharoni (PDF)
- Autoimmunity Disorder in Wireless LAN - Md Sohail Ahmad, JVR Murthy, Amit Vartak (PDF)
- Time-Based Blind SQL Injection using heavy queries: A practical approach for MS SQL Server, MS Access, Oracle and MySQL databases and Marathon Tool - Chema Alonso & José Parada (PDF White Paper) Extras (ZIP)
- The Anatomy of a Subway Hack: Breaking Crypto RFID's and Magstripes of Ticketing Systems - Zack Anderson, RJ Ryan & Alessandro Chiesa (PDF)
- Digital Security: A Risky Business - Ian O. Angell (PDF)
- VulnCatcher: Fun with Vtrace and Programmatic Debugging - (PDF ) Extras (ZIP)
- Pen-Testing is Dead, Long Live the Pen Test - Taylor Banks & Carric (PDF)
- They're Hacking Our Clients! Introducing Free Client-side Intrusion Prevention - Jay Beale (PDF)
- When Lawyers Attack! Dealing with the New Rules of Electronic Discovery - John Benson "jur1st" (PDF)
- The Emergence (and Use) of Open Source Warfare - Peter Berghammer (PDF)
- What To Do When Your Data Winds Up Where It Shouldn't - Don M. Blumenthal (PDF)
- Working with Law Enforcement (PDF White Paper)
- Buying Time - What is your Data Worth? (PDF)
- ModScan: A SCADA MODBUS Network Scanner (PDF) Extras (ZIP)
- Deciphering Captcha (ZIP)
- CSRF Bouncing† (PDF) Extras (ZIP)
- Bypassing Pre-boot Authentication Passwords (PDF White Paper) Extras (ZIP)
- Grendel-Scan: A new web application scanning tool (PDF) Extras (ZIP)
- Building a Real Session Layer (PDF)
- Hacking E.S.P. (PDF)
- Hacking Desire (PDF)
- Climbing Everest: An Insider's Look at one State's Voting Systems (PDF)
- Could Googling Take Down a President, a Prime Minister, or an Average Citizen? (PDF) Extras (ZIP)
- Compromising Windows Based Internet Kiosks (PDF)
- Shifting the Focus of WiFi Security: Beyond cracking your neighbor's wep key (PDF)
- Hacking Data Retention: Small Sister your digital privacy self defense (PDF)
- Ticket to Trouble (PDF)
- Next Generation Collaborative Reversing with Ida Pro and CollabREate (PDF White Paper)
- de-Tor-iorate Anonymity (PDF)
- Identification Card Security: Past, Present, Future (PDF)
- Snort Plug-in Development: Teaching an Old Pig New Tricks (PDF)
- The Wide World of WAFs (PDF)
- VLANs Layer 2 Attacks: Their Relevance and their Kryptonite (PDF)
- Virtually Hacking (PDF)
- Is That a Unique Credential in Your Pocket or Are You Just Pleased to See Me? (PDF)
- Exploiting A Hundred-Million Hosts Before Brunch (PDF)
- Nmap: Scanning the Internet (PDF)
- Journey to the Center of the HP28 (PDF)
- Making the DEFCON 16 Badge (PDF) Extras (ZIP)
- BSODomizer (PDF) Extras (ZIP)
- Nail the Coffin Shut, NTLM is Dead (PDF)
- Satan is on my Friends list: Attacking Social Networks (PDF)
- Advanced Software Armoring and Polymorphic Kung Fu (PDF)
- Playing with Web Application Firewalls (PDF)
- War Ballooning-Kismet Wireless "Eye in the Sky" (PDF)
- Under the iHood (PDF) Extras (ZIP)
- Ham For Hackers- Take Back the Airwaves (PDF)
- Demonstration of Hardware Trojans (PDF)
- Comparison of File Infection on Windows & Linux (PDF White Paper) Extras (ZIP)
- Developments in Cisco IOS Forensics (PDF)
- Sniffing Cable Modems (PDF)
- Toasterkit, a Modular NetBSD Rootkit (PDF)
- Bringing Sexy Back: Breaking in with Style (PDF)
- New Tool for SQL Injection with DNS Exfiltration (PDF)
- Free Anonymous Internet Using Modified Cable Modems (PDF) Extras (ZIP)
- Xploiting Google Gadgets: Gmalware and Beyond (PDF)
- Evade IDS/IPS Systems using Geospatial Threat Detection (PDF)
- Password Cracking on a Budget (PDF) Extras (ZIP)
- Mobile Hacker Space (PDF)
- New Ideas for Old Practices - Port-Scanning Improved (PDF)
- WhiteSpace: A Different Approach to JavaScript Obfuscation (PDF) Extras (ZIP)
- Taking Back your Cellphone (PDF)
Mas presentaciones (incluidas las de eventos anteriores) . . .
No hay comentarios:
Publicar un comentario