martes, 26 de agosto de 2008

Defcon 16: Speakers & Presentations

DEFCON 16: August 8-10, 2008
at the Riviera Hotel & Casino in Las Vegas

DEFCON 16 Presentations now online!
  • BackTrack Foo - From Bug to 0day - Mati Aharoni (PDF)
  • Autoimmunity Disorder in Wireless LAN - Md Sohail Ahmad, JVR Murthy, Amit Vartak (PDF)
  • Time-Based Blind SQL Injection using heavy queries: A practical approach for MS SQL Server, MS Access, Oracle and MySQL databases and Marathon Tool - Chema Alonso & José Parada (PDF White Paper) Extras (ZIP)
  • The Anatomy of a Subway Hack: Breaking Crypto RFID's and Magstripes of Ticketing Systems - Zack Anderson, RJ Ryan & Alessandro Chiesa (PDF)
  • Digital Security: A Risky Business - Ian O. Angell (PDF)
  • VulnCatcher: Fun with Vtrace and Programmatic Debugging - (PDF ) Extras (ZIP)
  • Pen-Testing is Dead, Long Live the Pen Test - Taylor Banks & Carric (PDF)
  • They're Hacking Our Clients! Introducing Free Client-side Intrusion Prevention - Jay Beale (PDF)
  • When Lawyers Attack! Dealing with the New Rules of Electronic Discovery - John Benson "jur1st" (PDF)
  • The Emergence (and Use) of Open Source Warfare - Peter Berghammer (PDF)
  • What To Do When Your Data Winds Up Where It Shouldn't - Don M. Blumenthal (PDF)
  • Working with Law Enforcement (PDF White Paper)
  • Buying Time - What is your Data Worth? (PDF)
  • ModScan: A SCADA MODBUS Network Scanner (PDF) Extras (ZIP)
  • Deciphering Captcha (ZIP)
  • CSRF Bouncing† (PDF) Extras (ZIP)
  • Bypassing Pre-boot Authentication Passwords (PDF White Paper) Extras (ZIP)
  • Grendel-Scan: A new web application scanning tool (PDF) Extras (ZIP)
  • Building a Real Session Layer (PDF)
  • Hacking E.S.P. (PDF)
  • Hacking Desire (PDF)
  • Climbing Everest: An Insider's Look at one State's Voting Systems (PDF)
  • Could Googling Take Down a President, a Prime Minister, or an Average Citizen? (PDF) Extras (ZIP)
  • Compromising Windows Based Internet Kiosks (PDF)
  • Shifting the Focus of WiFi Security: Beyond cracking your neighbor's wep key (PDF)
  • Hacking Data Retention: Small Sister your digital privacy self defense (PDF)
  • Ticket to Trouble (PDF)
  • Next Generation Collaborative Reversing with Ida Pro and CollabREate (PDF White Paper)
  • de-Tor-iorate Anonymity (PDF)
  • Identification Card Security: Past, Present, Future (PDF)
  • Snort Plug-in Development: Teaching an Old Pig New Tricks (PDF)
  • The Wide World of WAFs (PDF)
  • VLANs Layer 2 Attacks: Their Relevance and their Kryptonite (PDF)
  • Virtually Hacking (PDF)
  • Is That a Unique Credential in Your Pocket or Are You Just Pleased to See Me? (PDF)
  • Exploiting A Hundred-Million Hosts Before Brunch (PDF)
  • Nmap: Scanning the Internet (PDF)
  • Journey to the Center of the HP28 (PDF)
  • Making the DEFCON 16 Badge (PDF) Extras (ZIP)
  • BSODomizer (PDF) Extras (ZIP)
  • Nail the Coffin Shut, NTLM is Dead (PDF)
  • Satan is on my Friends list: Attacking Social Networks (PDF)
  • Advanced Software Armoring and Polymorphic Kung Fu (PDF)
  • Playing with Web Application Firewalls (PDF)
  • War Ballooning-Kismet Wireless "Eye in the Sky" (PDF)
  • Under the iHood (PDF) Extras (ZIP)
  • Ham For Hackers- Take Back the Airwaves (PDF)
  • Demonstration of Hardware Trojans (PDF)
  • Comparison of File Infection on Windows & Linux (PDF White Paper) Extras (ZIP)
  • Developments in Cisco IOS Forensics (PDF)
  • Sniffing Cable Modems (PDF)
  • Toasterkit, a Modular NetBSD Rootkit (PDF)
  • Bringing Sexy Back: Breaking in with Style (PDF)
  • New Tool for SQL Injection with DNS Exfiltration (PDF)
  • Free Anonymous Internet Using Modified Cable Modems (PDF) Extras (ZIP)
  • Xploiting Google Gadgets: Gmalware and Beyond (PDF)
  • Evade IDS/IPS Systems using Geospatial Threat Detection (PDF)
  • Password Cracking on a Budget (PDF) Extras (ZIP)
  • Mobile Hacker Space (PDF)
  • New Ideas for Old Practices - Port-Scanning Improved (PDF)
  • WhiteSpace: A Different Approach to JavaScript Obfuscation (PDF) Extras (ZIP)
  • Taking Back your Cellphone (PDF)

Mas presentaciones (incluidas las de eventos anteriores) . . .

No hay comentarios: