martes, 9 de agosto de 2011

Presentaciones de la Defcon 19

El 7 de agosto concluyó la Defcon 19 y, a dos dias de su terminacion su web sufría un DDoS producido por la cantidad de miles de usuarios ávidos del tan esperado material de las conferencias.

Sorprendentemente, Chief Monkey pone ya a nuestra disposición los pdfs de las presentaciones y, aunque la celeridad de su publicación hacía sospechar de su seguridad, parece que son de fiar. 
 
DEFCON-19-program.pdf
DEFCON-19-Abstrct-The-Schemaverse-Guide.pdf
DEFCON-19-Abstrct-The-Schemaverse.pdf
DEFCON-19-Almeida-Workshop-ESD.pdf
DEFCON-19-Alonso-Garrido-DUST.pdf
DEFCON-19-Alonso-Garrido-Excel.pdf
DEFCON-19-Arlen-Nano-Seconds-WP.pdf
DEFCON-19-Arlen-Nano-Seconds.pdf
DEFCON-19-Arpaia-Reed-Beat-to-1337.pdf
DEFCON-19-Baldwin-DVCS-WP.pdf
DEFCON-19-Baldwin-DVCS.pdf
DEFCON-19-Barisani-Bianco-Laurie-Franken.pdf
DEFCON-19-Barnett-Deceptive-Hacking-WP.pdf
DEFCON-19-Barnett-Deceptive-Hacking.pdf
DEFCON-19-Bilodeau-FingerBank.pdf
DEFCON-19-Bilodeau-PacketFence.pdf
DEFCON-19-Bouillon-Federation-and-Empire.pdf
DEFCON-19-Bowne-Three-Generations-of-DoS-Attacks.pdf
DEFCON-19-Brooks-Wilson-Traps-of-Gold.pdf
DEFCON-19-Bryner-Kinectasploit.pdf
DEFCON-19-Carey-Metasploit-vSploit-Modules.pdf
DEFCON-19-Chamales-Securing-Crisis-Maps.pdf
DEFCON-19-Chow-Abusing-HTML5.pdf
DEFCON-19-Conti-Security-Research.pdf
DEFCON-19-Cook-Kernel-Exploitation.pdf
DEFCON-19-Craig-Internet-Kiosk-Terminals.pdf
DEFCON-19-Crenshaw-Cipherspaces-Darknets.pdf
DEFCON-19-Crowley-Cryptographic-Oracles.pdf
DEFCON-19-Cryer-Taking-Your-Ball-and-Going-Home.pdf
DEFCON-19-DC-Groups-Panel.pdf
DEFCON-19-Devarajan-LeBert-VDLDS.pptx.pdf
DEFCON-19-Dinaburg-Bit-Squatting.pdf
DEFCON-19-Duckwall-Bridge-Too-Far.pdf
DEFCON-19-Elhage-Virtualization-Under-Attack.pdf
DEFCON-19-Elrod-Morris-Not-a-Doctor.pdf
DEFCON-19-Engebretson-Pauli-Pen-Testing.pdf
DEFCON-19-Fail-Panel.pdf
DEFCON-19-Feinstein-Jarmoc-Get-Off-of-My-Cloud.pdf
DEFCON-19-Foofus-Forceful-Browsing-WP.pdf
DEFCON-19-Fritschie-Witmer-F-On-the-River.pdf
DEFCON-19-Garcia-UPnP-Mapping-WP.pdf
DEFCON-19-Garcia-UPnP-Mapping.pdf
DEFCON-19-Gavin-OpenDLP.pdf
DEFCON-19-Geers-Strategic-Cyber-Security-WP.pdf
DEFCON-19-Geers-Strategic-Cyber-Security.pdf
DEFCON-19-Gomez-Bulletproofing-The-Cloud.pdf
DEFCON-19-Hamiel-Smartfuzzing_the_Web_DC.pdf
DEFCON-19-Havelt-Henrique.pdf
DEFCON-19-Heiland-Printer-To-Pwnd.pdf
DEFCON-19-Holt-Kilger-Assessing-Civilian-Willingness.pdf
DEFCON-19-Howard-Cyber-Security-Trends-WP.pdf
DEFCON-19-Howard-Cyber-Security-Trends.pdf
DEFCON-19-Imhoff-Password-Cracking.pdf
DEFCON-19-JackDaniel-PCI-2-PANEL.pdf
DEFCON-19-Jakhar-Jugaad-Linux-Thread-Injection.pdf
DEFCON-19-Kennedy-Pentesting-Over-Powerlines-2.pdf
DEFCON-19-Kennish-Tracking-the-Trackers.pdf
DEFCON-19-Kornbrust-Hacking-and-Securing-DB2.pdf
DEFCON-19-Kotler-Amit-Sounds-Like-Botnet.pdf
DEFCON-19-Krick-License-to-Transmit.pdf
DEFCON-19-Lai-Wu-Chiu-PK-APT-Secrets-2.pdf
DEFCON-19-Lenik-MAC(b)Daddy.pdf
DEFCON-19-Linn-PIG-Finding-Truffles.pdf
DEFCON-19-Maresca-FIPS-140.pdf
DEFCON-19-Marpet-Gostom-Smile-for-the-Grenade.pdf
DEFCON-19-McCoy-Hacking-Net.pdf
DEFCON-19-McGrew-Covert-WP.pdf
DEFCON-19-McGrew-Covert.pdf
DEFCON-19-McNabb-Vulns-Wireless-Water-Meter-Networks.pdf
DEFCON-19-Miller-Battery-Firmware-Hacking.pdf
DEFCON-19-O’Neil-Chin-Google-Android.pdf
DEFCON-19-Ocepek-Blinkie-Lights-Arduino.pdf
DEFCON-19-Ollam-Gun-Safes.pdf
DEFCON-19-Osborn-Johansen-Hacking-Google-Chrome-OS.pdf
DEFCON-19-Percoco-Spiderlabs-Droid.pdf
DEFCON-19-Percoco-Spiderlabs-Malware-Freakshow-3.pdf
DEFCON-19-Percoco-Spiderlabs-SSLizzard.pdf
DEFCON-19-Phillips-Hacking-MMORPGs.pdf
DEFCON-19-Pickett-Port-Scanning-Without-Packets.pdf
DEFCON-19-Pickett-Resources.pdf
DEFCON-19-Pittman-Password-Fail.pdf
DEFCON-19-Rezchikov-Wang-Engelman-Airport-Security-WP.pdf
DEFCON-19-Robinson-Time.pdf
DEFCON-19-Schearer-WTF-Privacy.pdf
DEFCON-19-Shah-Mobile-Moolah.pdf
DEFCON-19-Skunkworks-Bitcoin.pdf
DEFCON-19-Strauchs_Rad_Newman-SCADA-in-Prisons.pptx.pdf
DEFCON-19-Street-Steal-Everything.pdf
DEFCON-19-Sumner-Byers-Alien-Weaponizing-Cyberpsychology.pdf
DEFCON-19-Sutherland-How-to-Get-Your-Message-Out.pdf
DEFCON-19-Swende-Karlsson-Owasp-Hatkit.pdf
DEFCON-19-Tassey-Perkins-Wireless-Aerial-Surveillance-Platform.pdf
DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf
DEFCON-19-Trimble-Cybertravel.ppt.pdf
DEFCON-19-Webb-Runtime-Process-Insemination.pdf
DEFCON-19-Weeks-Network-Nightmare.pdf
DEFCON-19-Weyers-Key-Impressioning.pdf
DEFCON-19-Wilson-Traps-of-Gold.pdf
DEFCON-19-Woodberg-Network-Application-Firewalls.pdf
DEFCON-19-Zhu-Phishing-Online-Scams-in-China.pdf
DEFCON-19-Zoz-Bianchi-Vanquishing-Voyeurs.pdf

Mas informacion
 
Aqui podemos ver el resto del material: 




0 comentarios:

Publicar un comentario

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites