Material de la #BlackHat USA 2014

- Cybersecurity as Realpolitik
geer.blackhat.6viii14.txt - A Journey to Protect Points-of-Sale
us-14-Valtman-A-Journey-To-Protect-Point-Of-Sale.pdf - A Practical Attack Against VDI Solutions
us-14-Brodie-A-Practical-Attack-Against-VDI-Solutions-WP.pdf - A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks Over Millions of Malicious Binaries
us-14-Saxe.pdf
us-14-Saxe-Tool.zip - Abuse of CPE Devices and Recommended Fixes
us-14-Spring-Abuse-Of-CPE-Devices-And-Recommended-Fixes-WP.pdf
us-14-Spring-Abuse-Of-CPE-Devices-And-Recommended-Fixes.pdf - Android FakeID Vulnerability Walkthrough
us-14-Forristal-Android-FakeID-Vulnerability-Walkthrough.pdf - APT Attribution and DNS Profiling
us-14-Li-APT-Attribution-And-DNS-Profiling-WP.pdf
us-14-Li-APT-Attribution-And-DNS-Profiling.pdf - Attacking Mobile Broadband Modems Like a Criminal Would
us-14-Lindh-Attacking-Mobile-Broadband-Modems-Like-A-Criminal-Would-WP.pdf
us-14-Lindh-Attacking-Mobile-Broadband-Modems-Like-A-Criminal-Would.pdf - Badger – The Networked Security State Estimation Toolkit
us-14-Rogers-Badger-The-Networked-Security-State-Estimation-Toolkit.pdf - Bitcoin Transaction Malleability Theory in Practice
us-14-Chechik-Bitcoin-Transaction-Malleability-Theory-In-Practice.pdf
us-14-Chechik-Malleability-Tool-Tool.zip - Bringing Software Defined Radio to the Penetration Testing Community
us-14-Picod-Bringing-Software-Defined-Radio-To-The-Penetration-Testing-Community-WP.pdf
us-14-Picod-Bringing-Software-Defined-Radio-To-The-Penetration-Testing-Community.pdf - Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering
us-14-Johns-Call-To-Arms-A-Tale-Of-The-Weaknesses-Of-Current-Client-Side-XSS-Filtering-WP.pdf
us-14-Johns-Call-To-Arms-A-Tale-Of-The-Weaknesses-Of-Current-Client-Side-XSS-Filtering.pdf - Catching Malware En Masse: DNS and IP Style
us-14-Mahjoub-Catching-Malware-En-Masse-DNS-And-IP-Style-WP.pdf
us-14-Mahjoub-Catching-Malware-En-Masse-DNS-And-IP-Style.pdf - Computrace Backdoor Revisited
us-14-Kamluk-Computrace-Backdoor-Revisited-WP.pdf
us-14-Kamlyuk-Kamluk-Computrace-Backdoor-Revisited.pdf - Creating a Spider Goat: Using Transactional Memory Support for Security
us-14-Muttik-Creating-A-Spider-Goat-Using-Transactional-Memory-Support-For-Securitypdf.pdf - Data-Only Pwning Microsoft Windows Kernel: Exploitation of Kernel Pool Overflows on Microsoft Windows 8.1
us-14-Tarakanov-Data-Only-Pwning-Microsoft-Windows-Kernel-Exploitation-Of-Kernel-Pool-Overflows-On-Microsoft-Windows-8.1.pdf - Defeating the Transparency Feature of DBI
us-14-Li-Defeating-The-Transparency-Feature-Of-DBI.pdf - Digging for IE11 Sandbox Escapes
us-14-Forshaw-Digging-For_IE11-Sandbox-Escapes.pdf
us-14-Forshaw-Digging-For-IE11-Sandbox-Escapes-Tool.zip - Evasion of High-End IPS Devices in the Age of IPv6
us-14-Atlasis-Evasion-Of-HighEnd-IPS-Devices-In-The-Age-Of-IPv6-WP.pdf
us-14-Atlasis-Evasion-Of-HighEnd-IPS-Devices-In-The-Age-Of-IPv6.pdf - Exposing Bootkits with BIOS Emulation
us-14-Haukli-Exposing-Bootkits-With-BIOS-Emulation-WP.pdf
us-14-Haukli-Exposing-Bootkits-With-BIOS-Emulation.pdf - Extreme Privilege Escalation on Windows 8/UEFI Systems
us-14-Kallenberg-Extreme-Privilege-Escalation-On-Windows8-UEFI-Systems-WP.pdf
us-14-Kallenberg-Extreme-Privilege-Escalation-On-Windows8-UEFI-Systems.pdf - Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces
us-14-Mulliner-Finding-And-Exploiting-Access-Control-Vulnerabilities-In-Graphical-User-Interfacess-WP.pdf
us-14-Mulliner-Finding-And-Exploiting-Access-Control-Vulnerabilities-In-Graphical-User-Interfaces.pdf
us-14-Mulliner-Finding-And-Exploiting-Access-Control-Vulnerabilities-In-Graphical-User-Interfaces-Tool.zip - Fingerprinting Web Application Platforms by Variations in PNG Implementations
us-14-Bongard-Fingerprinting-Web-Application-Platforms-By-Variations-In-PNG-Implementations-WP.pdf
us-14-Bongard-Fingerprinting-Web-Application-Platforms-By-Variations-In-PNG-Implementations.pdf - Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware
us-14-Kruegel-Full-System-Emulation-Achieving-Successful-Automated-Dynamic-Analysis-Of-Evasive-Malware-WP.pdf
us-14-Kruegel-Full-System-Emulation-Achieving-Successful-Automated-Dynamic-Analysis-Of-Evasive-Malware.pdf - Governments As Malware Authors: The Next Generation
us-14-Hypponen-Goverments-As-Malware-Authors.pdf - GRR: Find All the Badness, Collect All the Things
us-14-Castle-GRR-Find-All-The-Badness-Collect-All-The-Things-WP.pdf
us-14-Castle-GRR-Find-All-The-Badness-Collect-All-The-Things.pdf - Hacking the Wireless World with Software Defined Radio – 2.0
us-14-Seeber-Hacking-The-Wireless-World-With-Software-Defined-Radio-2.0.pdf - How Smartcard Payment Systems Fail
us-14-Anderson-How_Smartcard-Payment-Systems-Fail.pdf - How to Leak a 100-Million-Node Social Graph in Just One Week? – A Reflection on Oauth and API Design in Online Social Networks
us-14-Hu-How-To-Leak-A100-Million-Node-Social-Graph-In-Just-One-Week-WP.pdf
us-14-Hu-How-To-Leak-A100-Million-Node-Social-Graph-In-Just-One-Week.pdf - How to Wear Your Password
us-14-Jakobsson-How-To-Wear-Your-Password-WP.pdf
us-14-Jakobsson-How-To-Wear-Your-Password.pdf - I Know Your Filtering Policy Better than You Do: External Enumeration and Exploitation of Email and Web Security Solutions
us-14-Williams-I-Know-Your-Filtering-Policy-Better-Than-You-Do-WP.pdf
us-14-Williams-I-Know-Your-Filtering-Policy-Better-Than-You-Do.pdf - ICSCorsair: How I Will PWN Your ERP Through 4-20 mA Current Loop
us-14-Bolshev-ICSCorsair-How-I-Will-PWN-Your-ERP-Through-4-20mA-Current-Loop-WP.pdf
us-14-Bolshev-ICSCorsair-How-I-Will-PWN-Your-ERP-Through-4-20mA-Current-Loop.pdf - Internet Scanning – Current State and Lessons Learned
us-14-Schloesser-Internet-Scanning-Current-State-And-Lessons-Learned.pdf - Investigating PowerShell Attacks
us-14-Kazanciyan-Investigating-Powershell-Attacks-WP.pdf
us-14-Kazanciyan-Investigating-Powershell-Attacks.pdf - Leviathan: Command and Control Communications on Planet Earth
us-14-Geers-Leviathan-Command-And-Control-Communications-On-Planet-Earth-WP.pdf
us-14-Geers-Leviathan-Command-And-Control-Communications-On-Planet-Earth.pdf - Lifecycle of a Phone Fraudster: Exposing Fraud Activity from Reconnaissance to Takeover Using Graph Analysis and Acoustical Anomalies
us-14-Balasubramaniyan-Lifecycle-Of-A-Phone-Fraudster-WP.pdf
us-14-Balasubramaniyan-Lifecycle-Of-A-Phone-Fraudster.pdf - Miniaturization
us-14-Larsen-Miniturization-WP.pdf
us-14-Larsen-Miniturization.pdf - MoRE Shadow Walker: The Progression of TLB-Splitting on x86
us-14-Torrey-MoRE-Shadow-Walker-The-Progression-Of-TLB-Splitting-On-x86-WP.pdf
us-14-Torrey-MoRE-Shadow-Walker-The-Progression-Of-TLB-Splitting-On-x86.pdf - Multipath TCP: Breaking Today’s Networks with Tomorrow’s Protocols
us-14-Pearce-Multipath-TCP-Breaking-Todays-Networks-With-Tomorrows-Protocols-WP.pdf
us-14-Pearce-Multipath-TCP-Breaking-Todays-Networks-With-Tomorrows-Protocols.pdf
us-14-Pearce-Multipath-TCP-Breaking-Todays-Networks-With-Tomorrows-Protocols-Tool.zip - My Google Glass Sees Your Passwords!
us-14-Fu-My-Google-Glass-Sees-Your-Passwords-WP.pdf
us-14-Fu-My-Google-Glass-Sees-Your-Passwords.pdf - One Packer to Rule Them All: Empirical Identification, Comparison, and Circumvention of Current Antivirus Detection Techniques
us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf
us-14-Mesbahi-One-Packer-To-Rule-Them-All.pdf - Pivoting in Amazon Clouds
us-14-Riancho-Pivoting-In-Amazon-Clouds-WP.pdf
us-14-Riancho-Pivoting-In-Amazon-Clouds.pdf
us-14-Riancho-Nimbostratus-Target-Tool.zip
us-14-Riancho-Nimbostratus-Tool.zip - Poacher Turned Gamekeeper: Lessons Learned from Eight Years of Breaking Hypervisors
us-14-Wojtczuk-Poacher-Turned-Gamekeeper-Lessons_Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf - Point of Sale System Architecture and Security
us-14-Zaichkowsky-Point-Of-Sale System-Architecture-And-Security.pdf - Prevalent Characteristics in Modern Malware
us-14-Branco-Prevalent-Characteristics-In-Modern-Malware.pdf - Probabilistic Spying on Encrypted Tunnels
us-14-Niemczyk-Probabilist-Spying-On-Encrypted-Tunnels.pdf
us-14-Niemczyk-Pacumen.tar-Tool.gz - Protecting Data In-Use from Firmware and Physical Attacks
us-14-Weis-Protecting-Data-In-Use-From-Firmware-And-Physical-Attacks-WP.pdf
us-14-Weis-Protecting-Data-In-Use-From-Firmware-And-Physical-Attacks.pdf - Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA?
us-14-Rios-Pulling-Back-The-Curtain-On-Airport-Security.pdf - RAVAGE – Runtime Analysis of Vulnerabilities and Generation of Exploits
us-14-Wang-RAVAGE-Runtime-Analysis-Of-Vulnerabilities-And-Generation-Of-Exploits.pdf - Reflections on Trusting TrustZone
us-14-Rosenberg-Reflections-On-Trusting-TrustZone-WP.pdf
us-14-Rosenberg-Reflections-on-Trusting-TrustZone.pdf - Reverse Engineering Flash Memory for Fun and Benefit
us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit-WP.pdf
us-14-Oh-Reverse-Engineering-Flash-Memory-For-Fun-And-Benefit.pdf - SAP, Credit Cards, and the Bird that Talks Too Much
us-14-Arsal-SAP-Credit-Cards-And-The-Bird-That-Talks-Too-Much.pdf - SATCOM Terminals: Hacking by Air, Sea, and Land
us-14-Santamarta-SATCOM-Terminals-Hacking-By-Air-Sea-And-Land-WP.pdf
us-14-Santamarta-SATCOM-Terminals-Hacking-By-Air-Sea-And-Land.pdf - Saving Cyberspace
us-14-Healey-Saving-Cyberspace-WP.pdf
us-14-Healey-Saving-Cyberspace.pdf - SecSi Product Development: Techniques for Ensuring Secure Silicon Applied to Open-Source Verilog Projects
us-14-FitzPatrick-SecSi-Product-Development-WP.pdf
us-14-FitzPatrick-SecSi-Product-Development.pdf - Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring
us-14-Pinto-Secure-Because-Math-A-Deep-Dive-On-Machine-Learning-Based-Monitoring-WP.pdf - Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs
us-14-Wei-Sidewinder-Targeted-Attack-Against-Android-In-The-Golden-Age-Of-Ad-Libs.pdf - Smart Nest Thermostat: A Smart Spy in Your Home
us-14-Jin-Smart-Nest-Thermostat-A-Smart-Spy-In-Your-Home-WP.pdf
us-14-Jin-Smart-Nest-Thermostat-A-Smart-Spy-In-Your-Home.pdf - The Devil Does Not Exist – The Role of Deception in Cyber
us-14-Mateski-The-Devil-Does-Not-Exist-The-Role-Of-Deception-In-Cyber.pdf - The Library of Sparta
us-14-Raymond-The-Library-Of-Sparta-WP.pdf
us-14-Raymond-The-Library-Of-Sparta.pdf - The New Page of Injections Book: Memcached Injections
us-14-Novikov-The-New-Page-Of-Injections-Book-Memcached-Injections-WP.pdf
us-14-Novikov-The-New-Page-Of-Injections-Book-Memcached-Injections-WP.pdf - Thinking Outside the Sandbox – Violating Trust Boundaries in Uncommon Ways
us-14-Gorenc-Thinking-Outside-The-Sandbox-Violating-Trust-Boundaries-In-Uncommon-Ways-WP.pdf
us-14-Gorenc-Thinking-Outside-The-Sandbox-Violating-Trust-Boundaries-In-Uncommon-Ways.pdf - Time Trial: Racing Towards Practical Timing Attacks
us-14-Mayer-Time-Trial-Racing-Towards-Practical-Timing-Attacks-WP.pdf
us-14-Mayer-Time-Trial-Racing-Towards-Practical-Timing-Attackss.pdf - Unveiling the Open Source Visualization Engine for Busy Hackers
us-14-Hay-Unveiling-The-Open-Source-Visualization-Engine-For-Busy-Hackers-WP.pdf
us-14-Hay-Unveiling-The-Open-Source-Visualization-Engine-For-Busy-Hackers.pdf
us-14-Hay-OpenGraphiti-Black-Hat-2014-Release-Tool.zip - VoIP Wars: Attack of the Cisco Phones
us-14-Ozavci-VoIP-Wars-Attack-Of-The-Cisco-Phones.pdf
us-14-Ozavci-Viproy-1.9.0-Tool.zip - What Goes Around Comes Back Around – Exploiting Fundamental Weaknesses in Botnet C&C Panels!
us-14-Sood-What-Goes-Around-Comes-Back-Around-Exploiting-Fundamental-Weaknesses-In-Botnet-C&C-Panels-WP.pdf
us-14-Sood-What-Goes-Around-Comes-Back-Around-Exploiting-Fundamental-Weaknesses-In-Botnet-C&C-Panels.pdf - When the Lights Go Out: Hacking Cisco EnergyWise
us-14-Luft-When-The-Lights-Go-Out-Hacking-Cisco-EnergyWise-WP.pdf
us-14-Luft-When-The-Lights-Go-Out-Hacking-Cisco-EnergyWise.pdf
us-14-Luft-When-The-Lights-Go-Out-Hacking-Cisco-EnergyWise-Tool.zip - Why Control System Cyber-Security Sucks…
us-14-Luders-Why-Control-System-Cyber-Security-Sucks.pdf - Why You Need to Detect More Than PtH
us-14-Hathaway-Why-You-Need-To-Detect-More-Than-PtH-WP.pdf
us-14-Hathaway-Why-You-Need-To-Detect-More-Than-PtH.pdf - Windows Kernel Graphics Driver Attack Surface
us-14-vanSprundel-Windows-Kernel-Graphics-Driver-Attack-Surface.pdf
0 Comments:
Publicar un comentario
Gracias por dejar un comentario en Segu-Info.
Gracias por comentar!