Si ça vous intéresse, sachez que les présentations PDF de la Defcon 18 sont disponibles au téléchargement, ainsi que celles de la BlackHat 2010 !
Defcon 2010
Les PDF sont téléchargeables séparément sur MediaFire, ou dans un gros zip ici, ou directement sur Bittorrent.
- A New Approach to Digital Forensic Methodology And !!BUSTED!! Case studies David C. Smith Samuel Petreski
- A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare. Dondi ―spookdoctor06‖ West
- Advanced Format String Attacks Presented by Paul Haas
- Air Traffic Control Insecurity 2.0 Righter Kunkel
- Analyzing vulnerability assessment data the easy way… Schuberg Philis Seccubus
- Attack the Key Own the Lock. datagram & Schuyler Towne
- Attacking .NET Applications at Runtime Jon McCoy
- Attacking JBoss like a Boss Krpata
- au.bug William-LeGrand
- Be a Mentor Marisa Fagan InfoSec Mentors Project
- BlindElephant:Web Application Fingerprinting With Static Files Patrick Thomas
- Blitzableiter –BETA Release Countering Flash Exploits Felix « FX » Lindner
- Browser Based Defenses x06d
- Build a Lie Detector / Beat a Lie Detector. Rain, J03b34r
- Building a Security Operations Center with little or no money. Pyorre
- Changing Threats To Privacy Marlinspike
- Cloud ComputingA Weapon of Mass Destruction? David M. N. Bryan
- Connection Strings Chema Alonso Informática 64
- Constricting the Web. Offensive Python for Web Hackers Nathan Hamiel, Marcin Wielgoszewski
- Crawling Bittorrent DHTs for Fun and Profit Scott Wolchok
- Cyber [Crime|War] Connecting the dots Iftach Ian Amit Managing Partner, Security & Innovation
- Cyberterrorism & the Security of the National Drinking Water Infrastructure John McNabb
- DCFluX in: Moon-Bouncer Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc.
- Defcon Comedy Jam 3D Or Not 3D? PANEL
- Electronic Weapons Tim Otto, aka mage2
- Embedded devices, an AntiVirus-free safe hideout for Malware Ahn Ki-Chan, Ha Dong-Joo
- evilgrade, « You STILL have pending upgrades!“ Francisco Amato / Federico Kirschbaum
- Exploitable Assumptions Doktor Zoz, Dr. Foley, and Eric Schmiedl
- Exploitation on ARM Technique and bypassing defense mechanisms STRI/Advance Technology Lab/Security
- Exploiting Digital Cameras Oren Isacson, Alfredo Ortega
- Exploiting Internet Surveillance Systems Decius
- Exploiting SCADA Systems JBrown
- Exploiting WebSphere Application Server’s JSP Engine Schaller
- ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh
- Extras java by Lee-Pahl
- F.O.E.Feed Over Email A Proxy-less RSS Reader For Users in Internet Censored Countries Sho Ho
- Function hooking for OSX and Linux Joe Damato
- Gaming in the glass safe. Games, DRM, and Privacy. Ferdinand Schober
- Go Go Gadget Python Nick Waite FurkanCayçı
- Google Toolbar: The NARC Within gtoolbarsnoop.py Bryner
- Hacking and protecting Oracle Database Vault Esteban Martínez Fayó
- Hacking DOCSIS for Fun and Profit Blake SElf Bytemytaco
- Hacking Oracle from web apps Sumit Siddharth, Aleksander Gorkowienko
- Hacking The Future: Weaponizing the Next Generation PANEL
- Hardware Black Magic:Designing Printed Circuit Boards Dr. Fouad (Dr. K) Kiamilev, Corey (c0re) Lange, Stephen (afterburn) Janansky
- Hardware Hacking for us dumb software guys Arduinos
- How To Get Your FBI File (and Other Information You Want From the Federal Government) Hofmann
- How to Hack Millions of Routers Craig Heffner
- How Unique is Your Browser? a report on the Panopticlick experiment Peter Eckersley
- Improving Antivirus Accuracy with Hypervisor Assisted Analysis Danny Quist
- Industrial Cyber Security From the Perspective of the Power Sector Revision 1 Wade Polk.Paul Malkewicz.Jaroslav Novak
- INSECURITY ENGINEERING: Locks, Lies, and Videotape Tobias-Fiddler-Bluzmanis
- IPv6: No Longer Optional John CurranPresident & CEO ARIN
- [email protected] Matt Ryanczak
- Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller
- Kartograph Elie Bursztein and Jocelyn Lagarenne Stanford University
- Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010
- KenjiUrada
- Letting the Air Out of Tire Pressure Monitoring Systems Mike MetzgerKim Jong
- Live fire exercise:Baltic Cyber Shield 2010 Kenneth Geers
- Lord of the Bing Taking Back Search Engine Hacking From Google and Bing Francis Brown and Rob Ragan Stach & Liu, LLC
- Malware Freakshow 2 Nicholas J. Percoco & Jibran Ilyas
- Mastering the Nmap Scripting Engine Fyodor and David Fifield
- Mind Games Extras by Theime
- Mobile Privacy: Tor On The iPhone And Other Unusual Devices Marco Bonetti – CutAway s.r.l.
- Multiplayer Metasploit Tag-Team Pen Testing and Reporting Ryan Linn
- My Life As A Spyware Developer Why I’m Probably Going to Hell Pejski
- Open Data Source Analysis Daniel “whopisé? Burroughs
- Operating System Fingerprinting for Virtual Machines Nguyen Anh Quynh
- PCI: Compromising Controls and Compromising Security PANEL
- PHP-Nuke_exploit.php.php Brooks
- Physical Security (You’re Doing It Wrong) A.P. Delchi
- Programmable HID USB Keyboard House for pen-testing Adrian Crenshaw
- Pwned by the Owner Zoz
- ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode Rich Smith
- Razorback Mullen-Pentney
- Repelling the Wily Insider Matias Madou
- Resilient Botnet Command and Control with Tor Dennis Brown
- SCADA and ICS for Security Experts: How to Avoid Cyberdouchery James Arlen, CISA
- Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims Paul Judge, David Maynor
- Securing MMOs A Security rofessional’s View From the Inside
- Security Measurement and Assuring Reliability through metrics Technology ( SMART) Applying Reliability Metrics to Security Vulnerabilities Wayne Zage, Dolores Zage, Blake Self
- SHODAN for Penetration Testers Michael “theprez98é? Schearer
- Sniper Forensics “One Shot, One Killé? Christopher E. Pogue – Trustwave
- So Many Ways to Slap a YoHo: Hacking Facebook & YoVille Tom Stracener “Straceé?, EvilAdamSmith, Sean Barnum
- Social Engineering. Street
- Tales from the Crypto G. Mark Hardy
- The Anatomy of Drug Testing Fiekert
- The Year of HD Voice –2010 Who, what, where, how? (Actually, who, how, where, what) Doug Mohney
- This is not the droid you’re looking for… Nicholas J. Percoco & Christian Papathanasiou
- This needs to be fixed. Jokes, vulnerabilities, and analysis of commit statements. Logan Lodge, Bruce Potter
- Token Kidnapping’s Revenge Cesar Cerrudo Argeniss
- TOOLSMITHING AN IDA BRIDGE: A TOOL BUILDING CASE STUDY Adam Pridgen Matt Wollenweber
- Training the Next Generation of Hardware Hackers Teaching Computer Organization and Assembly Language Hands-On with Embedded Systems Kongs-Kane
- Trolling with Math frank^2
- Universal RF Usb Keyboard Emulation Device URFUKED by Monta Elkins
- VirGraf101:An Introduction to Virtual Graffiti Tottenkoph
- Wardriving the smart Grid. Practical approaches to attacking utility packet radios Shawn Moyer,Nathan Keltner
- We don’t need no stinkin’ badges! Hacking electronic door access controllers Shawn Merdinger
- Weaponizing Lady GaGa PsychoSonic Attacks BSmith
- Web Services We Just Don’t Need Mike Bailey
- Who Cares About IPv6? Sam Bowne City College San Francisco
- WiMAX Hacking 2010 Pierce Goldy aSmig
- WPA Too! Md Sohail Ahmad, AirTight Networks
- You Spent All That Money …And You Still Got Owned Joe McCray
- Your boss is a douchebag…How about you? effffn
Blackhat 2010
Les PDF sont téléchargeables séparement sur MediaFire mais dès que je peux, je vous fais un zip de tout ça.
- Anh-Virt-ICE-wp
- Arlen-SCADA-Cyberdouchery-slides
- Bailey-DePetrillo-The-Carmen-Sandiego-Project-wp
- Becherer-Andrew-Hadoop-Security-slides
- Becherer-Andrew-Hadoop-Security-wp
- Beek-Virtual-Forensics-slides
- BlackHat-USA_2010-Hypponen-You-will-be-billed-90000-for-this-call-slides
- Bolzoni-Schade-Goodware-drugs-for-malware-slides
- Born-psudp-Passive-Network-Covert-Communication-slides
- Born-psudp-Passive-Network-Covert-Communication-wp
- Bratus-Conti-Taxonomy-wp
- Bratus-Conti-Voyage-of-a-Reverser-slides
- Bugher-Secure-Use-of-Cloud-Storage-slides
- Bugher-Secure-Use-of-Cloud-Storage-wp
- Bursztein-Bad-Memories-wp
- Cerrudo-Toke-Kidnapping’s-Revenge-slides
- Cerrudo-Toke-Kidnapping’s-Revenge-wp
- Criscione-Virtually-Pwned-slides
- Cross-Internet-Wiretapping-slides
- Dabirsiaghi-JavaSnoop-wp
- DaiZovi-Return-Oriented-Exploitation-slides
- Daswani-mod-antimalware-slides
- Daswani-mod-antimalware-wp
- Di-Croce-SAP-Backdoors-wp
- Eng-Creighton-Deconstructing-ColdFusion-slides
- Engebretson-Pauli-Cronin-SprayPAL-slides
- Engebretson-Pauli-Cronin-SprayPAL-wp
- Esser-Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits-slides
- FX-Blitzableiter-slides
- FX-Blitzableiter-wp
- Fayo-Hacking-Protecting-Oracle-Databease-Vault-slides
- Fayo-Hacking-Protecting-Oracle-Databease-Vault-wp
- Fyodor-Fifield-NMAP-Scripting-Engine-slides
- Fyodor-Fifield-NMAP-Scripting-Engine-wp
- Grenier-Johnson-Harder-Better-Faster-Stronger-wp
- Gurgq-Base-Jumping-slides
- Hamiel-Wielgosweski-Constricting-the-Web-slides
- Hamiel-Wielgosweski-Constricting-the-Web-wp
- Hansen-Sokol-HTTPS-Can-Byte-Me
- Harbour-Black-Art-of-Binary-Hijacking-slides
- Heffner-How-to-Hack-Millions-of-Routers-slides
- Heffner-How-to-Hack-Millions-of-Routers-wp
- Henderson-Ocepek-Need-A-Hug-wp
- Insecurities-in-Security-Infrastructure-slides
- Iozzo-Weinmann-Kornau-Everybody-be-cool-this-is-a-roppery-slides
- Jarmoc-Insecurities-in-Security-Infrastructure-wp
- Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-slides
- Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-wp
- Kamkar-How-I-Met-Your-Girlfriend-slides
- Kamkar-How-I-Met-Your-Girlfriend-wp
- Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3
- Kennedy-Kelly-PowerShell-Its-Time-To-Own-slides
- King-Insecurities-in-Security-Infrastructure-wp
- Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-slides
- Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-wp
- Meer-History-of-Memory-Corruption-Attacks-wp
- Meiners-Sor-WEP-is-back-to-haunt-you-slides
- Meiners-Sor-WEP-is-back-to-haunt-you-wp
- Mende-Graf-Rey-loki_v09-wp
- Nagy-Industrial-Bug-Mining-slides
- Nohl-Attacking.Phone.Privacy-wp
- Ochoa-Azubel-NTLM-Weak-Nonce-slides
- Ochoa-Azubel-NTLM-Weak-Nonce-wp
- Ollmann-6millionDollarMan-slides
- Ollmann-6millionDollarMan-wp
- Parker-Finger-Pointing-for-Fun-Profit-and-War-0.2-slides
- Pollet-Cummings-RTS-Electricity-for-Free-wp
- Raber-Cheatham-Reverse-Engineering-with-Hardware-Debuggers-slides
- Rad-DMCA-slides
- Rad-DMCA-wp
- Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides
- Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1
- Ryan-Getting-In-Bed-With-Robin-Sage-v1.0
- Shah-DOM-Hacks-Shreeraj-slides
- Shah-DOM-Hacks-Shreeraj-wp
- Shelton-IBM-AIX-Heap-Overflow-Methods-slides
- Shelton-IBM-AIX-Heap-Overflow-Methods-wp
- Siddharth-Hacking-Oracle-from-the-Web-wp
- Slaviero-Lifting-the-Fog-slides
- Smith-Lai-Balancing-the-Pwn-deficit-wp
- Smith-pyREtic-Reversing-wp
- Stender-Engel-Hill-Attacking-Kerberos-Deployments-slides
- Stender-Engel-Hill-Attacking-Kerberos-Deployments-wp
- Suiche-Blue-Screen-of-the-Death-is-dead-slides
- Suiche-Blue-Screen-of-the-Death-is-dead-wp
- Sullivan-Cryptographic-Agility-slides
- Sullivan-Cryptographic-Agility-wp
- Sumner-Social-Net-Special-Ops-slides
- Thomas-BlindElephant-WebApp-Fingerprinting-slides
- Umadas-Allen-Network-Stream_Debugging-with-Mallory-slides
- Umadas-Allen-Network-Stream_Debugging-with-Mallory-wp
- Vuksan-Pericin-TitanMist-slides
- Vuksan-Pericin-TitanMist-wp
- Waisman-APT-slides
- Wicherski-dirtbox-x86-windows-emulator-slides
- Yerazunis-Confidential-Mail-Filtering-wp
- deVries-Attacking-Java-Clients-slides
- olleb-Hardening-Windows-Applications-slides
- olleb-Hardening-Windows-Applications-wp
Bonne lecture les amis !
[Source]