Si ça vous intéresse, sachez que les présentations PDF de la Defcon 18 sont disponibles au téléchargement, ainsi que celles de la BlackHat 2010 !

Defcon 2010

Les PDF sont téléchargeables séparément sur MediaFire, ou dans un gros zip ici, ou directement sur Bittorrent.

  • A New Approach to Digital Forensic Methodology And !!BUSTED!! Case studies David C. Smith Samuel Petreski
  • A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare. Dondi ―spookdoctor06‖ West
  • Advanced Format String Attacks Presented by Paul Haas
  • Air Traffic Control Insecurity 2.0 Righter Kunkel
  • Analyzing vulnerability assessment data the easy way… Schuberg Philis Seccubus
  • Attack the Key Own the Lock. datagram & Schuyler Towne
  • Attacking .NET Applications at Runtime Jon McCoy
  • Attacking JBoss like a Boss Krpata
  • au.bug William-LeGrand
  • Be a Mentor Marisa Fagan InfoSec Mentors Project
  • BlindElephant:Web Application Fingerprinting With Static Files Patrick Thomas
  • Blitzableiter –BETA Release Countering Flash Exploits Felix "FX" Lindner
  • Browser Based Defenses x06d
  • Build a Lie Detector / Beat a Lie Detector. Rain, J03b34r
  • Building a Security Operations Center with little or no money. Pyorre
  • Changing Threats To Privacy Marlinspike
  • Cloud ComputingA Weapon of Mass Destruction? David M. N. Bryan
  • Connection Strings Chema Alonso Informática 64
  • Constricting the Web. Offensive Python for Web Hackers Nathan Hamiel, Marcin Wielgoszewski
  • Crawling Bittorrent DHTs for Fun and Profit Scott Wolchok
  • Cyber [Crime|War] Connecting the dots Iftach Ian Amit Managing Partner, Security & Innovation
  • Cyberterrorism & the Security of the National Drinking Water Infrastructure John McNabb
  • DCFluX in: Moon-Bouncer Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc.
  • Defcon Comedy Jam 3D Or Not 3D? PANEL
  • Electronic Weapons Tim Otto, aka mage2
  • Embedded devices, an AntiVirus-free safe hideout for Malware Ahn Ki-Chan, Ha Dong-Joo
  • evilgrade, "You STILL have pending upgrades!“ Francisco Amato / Federico Kirschbaum
  • Exploitable Assumptions Doktor Zoz, Dr. Foley, and Eric Schmiedl
  • Exploitation on ARM Technique and bypassing defense mechanisms STRI/Advance Technology Lab/Security
  • Exploiting Digital Cameras Oren Isacson, Alfredo Ortega
  • Exploiting Internet Surveillance Systems Decius
  • Exploiting SCADA Systems JBrown
  • Exploiting WebSphere Application Server's JSP Engine Schaller
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh
  • Extras java by Lee-Pahl
  • F.O.E.Feed Over Email A Proxy-less RSS Reader For Users in Internet Censored Countries Sho Ho
  • Function hooking for OSX and Linux Joe Damato
  • Gaming in the glass safe. Games, DRM, and Privacy. Ferdinand Schober
  • Go Go Gadget Python Nick Waite FurkanCayçı
  • Google Toolbar: The NARC Within gtoolbarsnoop.py Bryner
  • Hacking and protecting Oracle Database Vault Esteban Martínez Fayó
  • Hacking DOCSIS for Fun and Profit Blake SElf Bytemytaco
  • Hacking Oracle from web apps Sumit Siddharth, Aleksander Gorkowienko
  • Hacking The Future: Weaponizing the Next Generation PANEL
  • Hardware Black Magic:Designing Printed Circuit Boards Dr. Fouad (Dr. K) Kiamilev, Corey (c0re) Lange, Stephen (afterburn) Janansky
  • Hardware Hacking for us dumb software guys Arduinos
  • How To Get Your FBI File (and Other Information You Want From the Federal Government) Hofmann
  • How to Hack Millions of Routers Craig Heffner
  • How Unique is Your Browser? a report on the Panopticlick experiment Peter Eckersley
  • Improving Antivirus Accuracy with Hypervisor Assisted Analysis Danny Quist
  • Industrial Cyber Security From the Perspective of the Power Sector Revision 1 Wade Polk.Paul Malkewicz.Jaroslav Novak
  • INSECURITY ENGINEERING: Locks, Lies, and Videotape Tobias-Fiddler-Bluzmanis
  • IPv6: No Longer Optional John CurranPresident & CEO ARIN
  • IPv6@ARIN Matt Ryanczak
  • Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller
  • Kartograph Elie Bursztein and Jocelyn Lagarenne Stanford University
  • Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010
  • KenjiUrada
  • Letting the Air Out of Tire Pressure Monitoring Systems Mike MetzgerKim Jong
  • Live fire exercise:Baltic Cyber Shield 2010 Kenneth Geers
  • Lord of the Bing Taking Back Search Engine Hacking From Google and Bing Francis Brown and Rob Ragan Stach & Liu, LLC
  • Malware Freakshow 2 Nicholas J. Percoco & Jibran Ilyas
  • Mastering the Nmap Scripting Engine Fyodor and David Fifield
  • Mind Games Extras by Theime
  • Mobile Privacy: Tor On The iPhone And Other Unusual Devices Marco Bonetti - CutAway s.r.l.
  • Multiplayer Metasploit Tag-Team Pen Testing and Reporting Ryan Linn
  • My Life As A Spyware Developer Why I’m Probably Going to Hell Pejski
  • Open Data Source Analysis Daniel “whopis” Burroughs
  • Operating System Fingerprinting for Virtual Machines Nguyen Anh Quynh
  • PCI: Compromising Controls and Compromising Security PANEL
  • PHP-Nuke_exploit.php.php Brooks
  • Physical Security (You’re Doing It Wrong) A.P. Delchi
  • Programmable HID USB Keyboard House for pen-testing Adrian Crenshaw
  • Pwned by the Owner Zoz
  • ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode Rich Smith
  • Razorback Mullen-Pentney
  • Repelling the Wily Insider Matias Madou
  • Resilient Botnet Command and Control with Tor Dennis Brown
  • SCADA and ICS for Security Experts: How to Avoid Cyberdouchery James Arlen, CISA
  • Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims Paul Judge, David Maynor
  • Securing MMOs A Security rofessional’s View From the Inside
  • Security Measurement and Assuring Reliability through metrics Technology ( SMART) Applying Reliability Metrics to Security Vulnerabilities Wayne Zage, Dolores Zage, Blake Self
  • SHODAN for Penetration Testers Michael “theprez98” Schearer
  • Sniper Forensics “One Shot, One Kill” Christopher E. Pogue - Trustwave
  • So Many Ways to Slap a YoHo: Hacking Facebook & YoVille Tom Stracener “Strace”, EvilAdamSmith, Sean Barnum
  • Social Engineering. Street
  • Tales from the Crypto G. Mark Hardy
  • The Anatomy of Drug Testing Fiekert
  • The Year of HD Voice --2010 Who, what, where, how? (Actually, who, how, where, what) Doug Mohney
  • This is not the droid you’re looking for… Nicholas J. Percoco & Christian Papathanasiou
  • This needs to be fixed. Jokes, vulnerabilities, and analysis of commit statements. Logan Lodge, Bruce Potter
  • Token Kidnapping's Revenge Cesar Cerrudo Argeniss
  • TOOLSMITHING AN IDA BRIDGE: A TOOL BUILDING CASE STUDY Adam Pridgen Matt Wollenweber
  • Training the Next Generation of Hardware Hackers Teaching Computer Organization and Assembly Language Hands-On with Embedded Systems Kongs-Kane
  • Trolling with Math frank^2
  • Universal RF Usb Keyboard Emulation Device URFUKED by Monta Elkins
  • VirGraf101:An Introduction to Virtual Graffiti Tottenkoph
  • Wardriving the smart Grid. Practical approaches to attacking utility packet radios Shawn Moyer,Nathan Keltner
  • We don’t need no stinkin’ badges! Hacking electronic door access controllers Shawn Merdinger
  • Weaponizing Lady GaGa PsychoSonic Attacks BSmith
  • Web Services We Just Don’t Need Mike Bailey
  • Who Cares About IPv6? Sam Bowne City College San Francisco
  • WiMAX Hacking 2010 Pierce Goldy aSmig
  • WPA Too! Md Sohail Ahmad, AirTight Networks
  • You Spent All That Money ...And You Still Got Owned Joe McCray
  • Your boss is a douchebag...How about you? effffn

Blackhat 2010

Les PDF sont téléchargeables séparement  sur MediaFire mais dès que je peux, je vous fais un zip de tout ça.

  • Anh-Virt-ICE-wp
  • Arlen-SCADA-Cyberdouchery-slides
  • Bailey-DePetrillo-The-Carmen-Sandiego-Project-wp
  • Becherer-Andrew-Hadoop-Security-slides
  • Becherer-Andrew-Hadoop-Security-wp
  • Beek-Virtual-Forensics-slides
  • BlackHat-USA_2010-Hypponen-You-will-be-billed-90000-for-this-call-slides
  • Bolzoni-Schade-Goodware-drugs-for-malware-slides
  • Born-psudp-Passive-Network-Covert-Communication-slides
  • Born-psudp-Passive-Network-Covert-Communication-wp
  • Bratus-Conti-Taxonomy-wp
  • Bratus-Conti-Voyage-of-a-Reverser-slides
  • Bugher-Secure-Use-of-Cloud-Storage-slides
  • Bugher-Secure-Use-of-Cloud-Storage-wp
  • Bursztein-Bad-Memories-wp
  • Cerrudo-Toke-Kidnapping's-Revenge-slides
  • Cerrudo-Toke-Kidnapping's-Revenge-wp
  • Criscione-Virtually-Pwned-slides
  • Cross-Internet-Wiretapping-slides
  • Dabirsiaghi-JavaSnoop-wp
  • DaiZovi-Return-Oriented-Exploitation-slides
  • Daswani-mod-antimalware-slides
  • Daswani-mod-antimalware-wp
  • Di-Croce-SAP-Backdoors-wp
  • Eng-Creighton-Deconstructing-ColdFusion-slides
  • Engebretson-Pauli-Cronin-SprayPAL-slides
  • Engebretson-Pauli-Cronin-SprayPAL-wp
  • Esser-Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits-slides
  • FX-Blitzableiter-slides
  • FX-Blitzableiter-wp
  • Fayo-Hacking-Protecting-Oracle-Databease-Vault-slides
  • Fayo-Hacking-Protecting-Oracle-Databease-Vault-wp
  • Fyodor-Fifield-NMAP-Scripting-Engine-slides
  • Fyodor-Fifield-NMAP-Scripting-Engine-wp
  • Grenier-Johnson-Harder-Better-Faster-Stronger-wp
  • Gurgq-Base-Jumping-slides
  • Hamiel-Wielgosweski-Constricting-the-Web-slides
  • Hamiel-Wielgosweski-Constricting-the-Web-wp
  • Hansen-Sokol-HTTPS-Can-Byte-Me
  • Harbour-Black-Art-of-Binary-Hijacking-slides
  • Heffner-How-to-Hack-Millions-of-Routers-slides
  • Heffner-How-to-Hack-Millions-of-Routers-wp
  • Henderson-Ocepek-Need-A-Hug-wp
  • Insecurities-in-Security-Infrastructure-slides
  • Iozzo-Weinmann-Kornau-Everybody-be-cool-this-is-a-roppery-slides
  • Jarmoc-Insecurities-in-Security-Infrastructure-wp
  • Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-slides
  • Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-wp
  • Kamkar-How-I-Met-Your-Girlfriend-slides
  • Kamkar-How-I-Met-Your-Girlfriend-wp
  • Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3
  • Kennedy-Kelly-PowerShell-Its-Time-To-Own-slides
  • King-Insecurities-in-Security-Infrastructure-wp
  • Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-slides
  • Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-wp
  • Meer-History-of-Memory-Corruption-Attacks-wp
  • Meiners-Sor-WEP-is-back-to-haunt-you-slides
  • Meiners-Sor-WEP-is-back-to-haunt-you-wp
  • Mende-Graf-Rey-loki_v09-wp
  • Nagy-Industrial-Bug-Mining-slides
  • Nohl-Attacking.Phone.Privacy-wp
  • Ochoa-Azubel-NTLM-Weak-Nonce-slides
  • Ochoa-Azubel-NTLM-Weak-Nonce-wp
  • Ollmann-6millionDollarMan-slides
  • Ollmann-6millionDollarMan-wp
  • Parker-Finger-Pointing-for-Fun-Profit-and-War-0.2-slides
  • Pollet-Cummings-RTS-Electricity-for-Free-wp
  • Raber-Cheatham-Reverse-Engineering-with-Hardware-Debuggers-slides
  • Rad-DMCA-slides
  • Rad-DMCA-wp
  • Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides
  • Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1
  • Ryan-Getting-In-Bed-With-Robin-Sage-v1.0
  • Shah-DOM-Hacks-Shreeraj-slides
  • Shah-DOM-Hacks-Shreeraj-wp
  • Shelton-IBM-AIX-Heap-Overflow-Methods-slides
  • Shelton-IBM-AIX-Heap-Overflow-Methods-wp
  • Siddharth-Hacking-Oracle-from-the-Web-wp
  • Slaviero-Lifting-the-Fog-slides
  • Smith-Lai-Balancing-the-Pwn-deficit-wp
  • Smith-pyREtic-Reversing-wp
  • Stender-Engel-Hill-Attacking-Kerberos-Deployments-slides
  • Stender-Engel-Hill-Attacking-Kerberos-Deployments-wp
  • Suiche-Blue-Screen-of-the-Death-is-dead-slides
  • Suiche-Blue-Screen-of-the-Death-is-dead-wp
  • Sullivan-Cryptographic-Agility-slides
  • Sullivan-Cryptographic-Agility-wp
  • Sumner-Social-Net-Special-Ops-slides
  • Thomas-BlindElephant-WebApp-Fingerprinting-slides
  • Umadas-Allen-Network-Stream_Debugging-with-Mallory-slides
  • Umadas-Allen-Network-Stream_Debugging-with-Mallory-wp
  • Vuksan-Pericin-TitanMist-slides
  • Vuksan-Pericin-TitanMist-wp
  • Waisman-APT-slides
  • Wicherski-dirtbox-x86-windows-emulator-slides
  • Yerazunis-Confidential-Mail-Filtering-wp
  • deVries-Attacking-Java-Clients-slides
  • olleb-Hardening-Windows-Applications-slides
  • olleb-Hardening-Windows-Applications-wp

Bonne lecture les amis !

[Source]