Vídeos de la DerbyCon 3.0 y Ruxcon 2012
A través de la magnífica web de Irongeek, podemos ver todos los vídeos de las charlas dadas (tracks 1 y 2 y algunas de la 3) en la DerbyCon 3.0.
La lista de los vídeos publicados es:
La lista de los vídeos publicados es:
- Scanning Darkly – HD Moore (keynote)
- Kinetic Pwnage: Obliterating the Line Between Computers and the
Physical World – Ed Skoudis (keynote) - Look Ma – No Exploits! – The Recon-ng Framework – Tim “LaNMaSteR53?
Tomes - Cognitive Injection: Reprogramming the Situation-Oriented Human OS –
Andy Ellis - It’s Only a Game: Learning Security through Gaming – Bruce Potter
- Practical Exploitation Using A Malicious Service Set Identifier
(SSID) – Deral Heiland - IOCAware – Actively Collect Compromise Indicators and Test Your
Entire Enterprise – Matt Jezorek and Dennis Kuntz - Ooops – Now What? :: The Stolen Data Impact Model (SDIM) – Brent
Huston - JTAGulator: Assisted discovery of on-chip debug interfaces – Joe
Grand - Cash is King: Who’s Wearing Your Crown? – Tom Eston and Spencer
McIntyre - Anti-Forensics: Memory or something – I forget. – int0x80
- Seeing red in your future? – Ian Iamit
- Security Sucks – and You’re Wearing a Nursing Bra – Paul Asadoorian
- TMI: How to attack SharePoint servers and tools to make it easier –
Kevin Johnson and James Jardine - Windows Attacks: AT is the new black – Rob Fuller and Chris Gates
- The High Risk of Low Risk Applications – conrad reynolds
- How Good is Your Phish – @sonofshirt
- It’s Okay to Touch Yourself – Ben Ten (Ben0xA)
- Identifying Evil: An introduction to Reverse Engineering Malware and
other software – Bart ‘d4ncind4n’ Hopper - Collaborative Penetration Testing With Lair – Tom Steele and Dan
Kottmann - How Im going to own your organization in just a few days. – RazorEQX
- Malware Automation – Christopher Elisan
- Pass-The-Hash 2: The Admin’s Revenge – Skip Duckwall and Chris
Campbell - What’s common in Oracle and Samsung? They tried to think differently
about crypto. – L·szlÛ TÛth – Ferenc Spala - The Cavalry Is Us: Protecting the public good and our profession –
Josh Corman - Burning the Enterprise with BYOD – Georgia Weidman
- Love letters to Frank Abagnale (How do I pwn thee let me count the
ways) – Jayson E. Street - Getting the goods with smbexec – Eric Milam(brav0hax) and Martin Bos
(purehate) - The Message and The Messenger – James Arlen
- Shattering the Glass: Crafting Post Exploitation Tools with
PowerShell – Matt Johnson - 50 Shades of RED: Stories from the “Playroom” – Chris Nickerson
- Cheat Codez: Level UP Your SE Game – Eric Smith
- Beyond Information Warfare “You Ain’t Seen Nothing Yet” – Winn
Schwartau - My Experiments with truth: a different route to bug-hunting – Devesh
Bhatt - Stop Fighting Anti-Virus – Integgroll
- The Art and Science of Hacking Any Organization – Tyler Wrightson
- Living Off the Land: A Minimalist’s Guide to Windows
Post-Exploitation – Christopher Campbell & Matthew Graeber - Cracking Corporate Passwords – Exploiting Password Policy Weaknesses
– Minga / Rick Redman - How the Grid Will Be Hacked – Josh Axelrod and Matt Davis
- Ownage From Userland: Process Puppeteering – Nick Cano
- help for the helpdesk – Mick Douglas
- ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation
Techniquesí) – Roberto Salgado - Weaponizing your Coffee Pot – Daniel Buentello
- Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent
Threat to Pwn the Network – SOLOMON SONYA and NICK KULESZA - Practical OSINT – Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY
TALK – 18+ or older) - Phishing Like The Pros – Luis “Connection” Santana
- Stop making excuses; it’s time to own your HIV (High Impact
Vulnerabilities) – Jack D. Nichelson - Raspberry Pi – Media Centers – and AppleTV – David Schuetz
- Uncloaking IP Addresses on IRC – Derek Callaway
- Reverse Engineering a Mass Transit Ticketing System – TrainHack
- Hardware Backdooring is Practical – Jonathan Brossard
- Injecting PHY-Layer Packets without a Bug or your Radio – Travis Goodspeed
- How To Catch a Chameleon: Its All In Your Heap – Steven Seeley
- Tracking vulnerable JARs – David Jorm
- A Tale of Two Firefox Bugs – Fionnbharr Davies
- Bluetooth Packet Sniffing Using Project Ubertooth – Dominic Spill
- Thar’ be Vuln. ID’s Here – A Data Mining Case Study Matt Jones
- Detecting Source Code Re-use through Metadata and Context Partial Hashing – Daniel Cabezas
- Advanced Persistent Response – Peleus Uhley
- Finding Needles in Haystacks (The Size of Countries) – Michael Baker
- Binary Instrumentation for Android – Collin Mulliner
- Examination of the VMWARE ESXi Binary Protocol Using Canape – Alex Chapman
- Monitoring Repositories for Fun and Profit – Louis Nyffenegger
- Windows Kernel Fuzzing For Beginners – Ben Nagy
- Firefox OS Application Security – Paul Theriault
- Targeted Malware — Sophisticated Criminals or Babytown Frolics? – Josh Grunzweig & Ryan Merritt
- Exploiting Internal Network Vulns via the Browser Using BeEF Bind – Ty Miller & Michele Orru
- The Impacts of Advancing Technology on Computer Forensics and E-Discovery – Adam Daniel
- The 3 Rings of the Data Breach Circus – Mark Goudie
- FooCodeChu for Software Analysis, Malware Detection & Vuln Research – Silvio Cesare
- Practical Attacks on Payment Gateways – Eldar Marcussen
- De Mysteriis Dom Jobsivs: Mac EFI Rootkits – snare
0 Comments:
Publicar un comentario
Gracias por dejar un comentario en Segu-Info.
Gracias por comentar!