2 ago 2010

Presentaciones de BlackHat

Luego de finalizada BlackHat Las Vegas, ya se encuentran disponibles las presentaciones de este excelente evento que reune a los principales investigadores y expertos de seguridad del mundo:
  • http://media.blackhat.com/bh-us-10/whitepapers/Anh/BlackHat-USA-2010-Anh-Virt-ICE-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Arlen/BlackHat-USA-2010-Arlen-SCADA-Cyberdouchery-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/olleb/BlackHat-USA-2010-olleb-Hardening-Windows-Applications-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/olleb/BlackHat-USA-2010-olleb-Hardening-Windows-Applications-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Bailey_DePetrillo/BlackHat-USA-2010-Bailey-DePetrillo-The-Carmen-Sandiego-Project-wp.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Becherer/BlackHat-USA-2010-Becherer-Andrew-Hadoop-Security-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Becherer/BlackHat-USA-2010-Becherer-Andrew-Hadoop-Security-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Beek/BlackHat-USA-2010-Beek-Virtual-Forensics-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Bolzoni_Schade/BlackHat-USA-2010-Bolzoni-Schade-Goodware-drugs-for-malware-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Born/BlackHat-USA-2010-Born-psudp-Passive-Network-Covert-Communication-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Born/BlackHat-USA-2010-Born-psudp-Passive-Network-Covert-Communication-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Bugher/BlackHat-USA-2010-Bugher-Secure-Use-of-Cloud-Storage-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Bugher/BlackHat-USA-2010-Bugher-Secure-Use-of-Cloud-Storage-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Bursztein_Gourdin_Rydstedt/BlackHat-USA-2010-Bursztein-Bad-Memories-wp.pdf
  • http://www.argeniss.com/research/TokenKidnapping.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Cerrudo/BlackHat-USA-2010-Cerrudo-Toke-Kidnapping's-Revenge-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Cerrudo/BlackHat-USA-2010-Cerrudo-Toke-Kidnapping's-Revenge-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Bratus_Conti/BlackHat-USA-2010-Bratus-Conti-Taxonomy-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Bratus_Conti/BlackHat-USA-2010-Bratus-Conti-Voyage-of-a-Reverser-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Criscione/BlackHat-USA-2010-Criscione-Virtually-Pwned-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Cross/BlackHat-USA-2010-Cross-Internet-Wiretapping-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Dabirsiaghi/BlackHat-USA-2010-Dabirsiaghi-JavaSnoop-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Zovi/BlackHat-USA-2010-DaiZovi-Return-Oriented-Exploitation-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Daswani/BlackHat-USA-2010-Daswani-mod-antimalware-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Daswani/BlackHat-USA-2010-Daswani-mod-antimalware-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Di_Croce/BlackHat-USA-2010-Di-Croce-SAP-Backdoors-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Eng_Creighton/BlackHat-USA-2010-Eng-Creighton-Deconstructing-ColdFusion-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Engebretson_Pauli_Cronin/BlackHat-USA-2010-Engebretson-Pauli-Cronin-SprayPAL-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Engebretson_Pauli_Cronin/BlackHat-USA-2010-Engebretson-Pauli-Cronin-SprayPAL-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Esser/BlackHat-USA-2010-Esser-Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Fayo/BlackHat-USA-2010-Fayo-Hacking-Protecting-Oracle-Databease-Vault-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Fayo/BlackHat-USA-2010-Fayo-Hacking-Protecting-Oracle-Databease-Vault-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Feinstein_Jarmoc_King/BlackHat-USA-2010-Jarmoc-Insecurities-in-Security-Infrastructure-wp.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Feinstein_Jarmoc_King/BlackHat-USA-2010-King-Insecurities-in-Security-Infrastructure-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Feinstein_Jarmoc_King/BlackHat-USA-2010-Insecurities-in-Security-Infrastructure-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/FX/BlackHat-USA-2010-FX-Blitzableiter-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/FX/BlackHat-USA-2010-FX-Blitzableiter-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Vaskovitch/BlackHat-USA-2010-Fyodor-Fifield-NMAP-Scripting-Engine-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Vaskovitch/BlackHat-USA-2010-Fyodor-Fifield-NMAP-Scripting-Engine-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Grenier_Johnson/BlackHat-USA-2010-Grenier-Johnson-Harder-Better-Faster-Stronger-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Grugq/BlackHat-USA-2010-Gurgq-Base-Jumping-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Hamiel_Wielgoszewski/BlackHat-USA-2010-Hamiel-Wielgosweski-Constricting-the-Web-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Hamiel_Wielgoszewski/BlackHat-USA-2010-Hamiel-Wielgosweski-Constricting-the-Web-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Hansen_Sokol/Blackhat-USA-2010-Hansen-Sokol-HTTPS-Can-Byte-Me.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Harbour/BlackHat-USA-2010-Harbour-Black-Art-of-Binary-Hijacking-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Hypponen/BlackHat-USA_2010-Hypponen-You-will-be-billed-90000-for-this-call-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Iozzo,Weinmann_Kornau/BlackHat-USA-2010-Iozzo-Weinmann-Kornau-Everybody-be-cool-this-is-a-roppery-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Kamkar/BlackHat-USA-2010-Kamkar-How-I-Met-Your-Girlfriend-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Kamkar/BlackHat-USA-2010-Kamkar-How-I-Met-Your-Girlfriend-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Keltner/BlackHat-USA-2010-Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Kennedy_Kelly/BlackHat-USA-2010-Kennedy-Kelly-PowerShell-Its-Time-To-Own-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Le/BlackHat-USA-2010-Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Le/BlackHat-USA-2010-Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Meer/BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Meiners_Sor/Blackhat-USA-2010-Meiners-Sor-WEP-is-back-to-haunt-you-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Meiners_Sor/Blackhat-USA-2010-Meiners-Sor-WEP-is-back-to-haunt-you-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Nagy/BlackHat-USA-2010-Nagy-Industrial-Bug-Mining-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Nohl/BlackHat-USA-2010-Nohl-Attacking.Phone.Privacy-wp.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Ocepek_Henderson/BlackHat-USA-2010-Henderson-Ocepek-Need-A-Hug-wp.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Ochoa_Azubel/BlackHat-USA-2010-Ochoa-Azubel-NTLM-Weak-Nonce-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Ochoa_Azubel/BlackHat-USA-2010-Ochoa-Azubel-NTLM-Weak-Nonce-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Jeongwook_Oh/BlackHat-USA-2010-Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Jeongwook_Oh/BlackHat-USA-2010-Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Ollmann/BlackHat-USA-2010-Ollmann-6millionDollarMan-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Ollmann/BlackHat-USA-2010-Ollmann-6millionDollarMan-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Parker/BlackHat-USA-2010-Parker-Finger-Pointing-for-Fun-Profit-and-War-0.2-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Percoco_Llyas/Trustwave - SpiderLabs - BlackHat-USA-2010-Percoco-Llyas-Malware Freakshow-2010-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Percoco_Llyas/Trustwave - SpiderLabs - BlackHat-USA-2010-Percoco-Llyas-Malware Freakshow-2010-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Pollet_Cummins/BlackHat-USA-2010-Pollet-Cummings-RTS-Electricity-for-Free-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Raber_Cheatham/BlackHat-USA-2010-Raber-Cheatham-Reverse-Engineering-with-Hardware-Debuggers-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Rad/BlackHat-USA-2010-Rad-DMCA-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Rad/BlackHat-USA-2010-Rad-DMCA-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Rey_Mende/BlackHat-USA-2010-Mende-Graf-Rey-loki_v09-wp.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Ristic/BlackHat-USA-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Ristic/BlackHat-USA-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Ryan/BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin-Sage-v1.0.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Shah/BlackHat-USA-2010-Shah-DOM-Hacks-Shreeraj-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Shah/BlackHat-USA-2010-Shah-DOM-Hacks-Shreeraj-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Shelton/BlackHat-USA-2010-Shelton-IBM-AIX-Heap-Overflow-Methods-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Shelton/BlackHat-USA-2010-Shelton-IBM-AIX-Heap-Overflow-Methods-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Siddharth/BlackHat-USA-2010-Siddharth-Hacking-Oracle-from-the-Web-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Slaviero/BlackHat-USA-2010-Slaviero-Lifting-the-Fog-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Smith/BlackHat-USA-2010-Smith-pyREtic-Reversing-wp.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Smith_Lai/BlackHat-USA-2010-Smith-Lai-Balancing-the-Pwn-deficit-wp.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Stender_Engel_Hill/BlackHat-USA-2010-Stender-Engel-Hill-Attacking-Kerberos-Deployments-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Stender_Engel_Hill/BlackHat-USA-2010-Stender-Engel-Hill-Attacking-Kerberos-Deployments-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Suiche/BlackHat-USA-2010-Suiche-Blue-Screen-of-the-Death-is-dead-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Suiche/BlackHat-USA-2010-Suiche-Blue-Screen-of-the-Death-is-dead-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Sullivan/BlackHat-USA-2010-Sullivan-Cryptographic-Agility-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Sullivan/BlackHat-USA-2010-Sullivan-Cryptographic-Agility-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Sumner/BlackHat-USA-2010-Sumner-Social-Net-Special-Ops-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Thomas/BlackHat-USA-2010-Thomas-BlindElephant-WebApp-Fingerprinting-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Umadas_Alleny/BlackHat-USA-2010-Umadas-Allen-Network-Stream_Debugging-with-Mallory-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Umadas_Alleny/BlackHat-USA-2010-Umadas-Allen-Network-Stream_Debugging-with-Mallory-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/deVries/BlackHat-USA-2010-deVries-Attacking-Java-Clients-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Vuksan_Pericin/BlackHat-USA-2010-Vuksan-Pericin-TitanMist-wp.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Vuksan_Pericin/BlackHat-USA-2010-Vuksan-Pericin-TitanMist-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Waisman/BlackHat-USA-2010-Waisman-APT-slides.pdf
  • http://media.blackhat.com/bh-us-10/presentations/Wicherski/BlackHat-USA-2010-Wicherski-dirtbox-x86-windows-emulator-slides.pdf
  • http://media.blackhat.com/bh-us-10/whitepapers/Yerazunis/BlackHat-USA-2010-Yerazunis-Confidential-Mail-Filtering-wp.pdf
Nota: por la cantidad de descargas, es posible que los servidores estén sobrecargados.

Actualización 05-ago: se puede realizar la descarga desde un sólo archivo RAR (100 MB) y también están disponibles las presentaciones de DefCon 2010.

Fuente: Pastebin

Suscríbete a nuestro Boletín

3 comentarios:

  1. Siempre he tenido en duda el objetivo de este evento. ¿Es una conferencia por y para Black Hats?

    ResponderBorrar
  2. Hola Lost,

    Simplemente se reunen las personas interesadas en seguridad (el termino blackhat ahora quizas les quedo desfazado):
    http://en.wikipedia.org/wiki/Black_Hat_Briefings

    Cristian

    ResponderBorrar
  3. pero que lastima que solo esten en ingles, lo mismo el sitio web de black hat, solo esta en ingles.

    ResponderBorrar

Gracias por dejar un comentario en Segu-Info.

Gracias por comentar!