Korben, roi d’internet, logo bébé avec des lunettes en mode thug life Korben, roi d’internet, logo bébé avec des lunettes en mode thug life

Korben Upgrade your mind

Téléchargez les présentations de la Defcon et de la Blackhat 2010

Si ça vous intéresse, sachez que les présentations PDF de la Defcon 18 sont disponibles au téléchargement, ainsi que celles de la BlackHat 2010 !

Defcon 2010

Les PDF sont téléchargeables séparément sur MediaFire, ou dans un gros zip ici, ou directement sur Bittorrent.

  • A New Approach to Digital Forensic Methodology And !!BUSTED!! Case studies David C. Smith Samuel Petreski
  • A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare. Dondi ―spookdoctor06‖ West
  • Advanced Format String Attacks Presented by Paul Haas
  • Air Traffic Control Insecurity 2.0 Righter Kunkel
  • Analyzing vulnerability assessment data the easy way… Schuberg Philis Seccubus
  • Attack the Key Own the Lock. datagram & Schuyler Towne
  • Attacking .NET Applications at Runtime Jon McCoy
  • Attacking JBoss like a Boss Krpata
  • au.bug William-LeGrand
  • Be a Mentor Marisa Fagan InfoSec Mentors Project
  • BlindElephant:Web Application Fingerprinting With Static Files Patrick Thomas
  • Blitzableiter –BETA Release Countering Flash Exploits Felix « FX » Lindner
  • Browser Based Defenses x06d
  • Build a Lie Detector / Beat a Lie Detector. Rain, J03b34r
  • Building a Security Operations Center with little or no money. Pyorre
  • Changing Threats To Privacy Marlinspike
  • Cloud ComputingA Weapon of Mass Destruction? David M. N. Bryan
  • Connection Strings Chema Alonso Informática 64
  • Constricting the Web. Offensive Python for Web Hackers Nathan Hamiel, Marcin Wielgoszewski
  • Crawling Bittorrent DHTs for Fun and Profit Scott Wolchok
  • Cyber [Crime|War] Connecting the dots Iftach Ian Amit Managing Partner, Security & Innovation
  • Cyberterrorism & the Security of the National Drinking Water Infrastructure John McNabb
  • DCFluX in: Moon-Bouncer Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc.
  • Defcon Comedy Jam 3D Or Not 3D? PANEL
  • Electronic Weapons Tim Otto, aka mage2
  • Embedded devices, an AntiVirus-free safe hideout for Malware Ahn Ki-Chan, Ha Dong-Joo
  • evilgrade, « You STILL have pending upgrades!“ Francisco Amato / Federico Kirschbaum
  • Exploitable Assumptions Doktor Zoz, Dr. Foley, and Eric Schmiedl
  • Exploitation on ARM Technique and bypassing defense mechanisms STRI/Advance Technology Lab/Security
  • Exploiting Digital Cameras Oren Isacson, Alfredo Ortega
  • Exploiting Internet Surveillance Systems Decius
  • Exploiting SCADA Systems JBrown
  • Exploiting WebSphere Application Server’s JSP Engine Schaller
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh
  • Extras java by Lee-Pahl
  • F.O.E.Feed Over Email A Proxy-less RSS Reader For Users in Internet Censored Countries Sho Ho
  • Function hooking for OSX and Linux Joe Damato
  • Gaming in the glass safe. Games, DRM, and Privacy. Ferdinand Schober
  • Go Go Gadget Python Nick Waite FurkanCayçı
  • Google Toolbar: The NARC Within gtoolbarsnoop.py Bryner
  • Hacking and protecting Oracle Database Vault Esteban Martínez Fayó
  • Hacking DOCSIS for Fun and Profit Blake SElf Bytemytaco
  • Hacking Oracle from web apps Sumit Siddharth, Aleksander Gorkowienko
  • Hacking The Future: Weaponizing the Next Generation PANEL
  • Hardware Black Magic:Designing Printed Circuit Boards Dr. Fouad (Dr. K) Kiamilev, Corey (c0re) Lange, Stephen (afterburn) Janansky
  • Hardware Hacking for us dumb software guys Arduinos
  • How To Get Your FBI File (and Other Information You Want From the Federal Government) Hofmann
  • How to Hack Millions of Routers Craig Heffner
  • How Unique is Your Browser? a report on the Panopticlick experiment Peter Eckersley
  • Improving Antivirus Accuracy with Hypervisor Assisted Analysis Danny Quist
  • Industrial Cyber Security From the Perspective of the Power Sector Revision 1 Wade Polk.Paul Malkewicz.Jaroslav Novak
  • INSECURITY ENGINEERING: Locks, Lies, and Videotape Tobias-Fiddler-Bluzmanis
  • IPv6: No Longer Optional John CurranPresident & CEO ARIN
  • IPv6@ARIN Matt Ryanczak
  • Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller
  • Kartograph Elie Bursztein and Jocelyn Lagarenne Stanford University
  • Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010
  • KenjiUrada
  • Letting the Air Out of Tire Pressure Monitoring Systems Mike MetzgerKim Jong
  • Live fire exercise:Baltic Cyber Shield 2010 Kenneth Geers
  • Lord of the Bing Taking Back Search Engine Hacking From Google and Bing Francis Brown and Rob Ragan Stach & Liu, LLC
  • Malware Freakshow 2 Nicholas J. Percoco & Jibran Ilyas
  • Mastering the Nmap Scripting Engine Fyodor and David Fifield
  • Mind Games Extras by Theime
  • Mobile Privacy: Tor On The iPhone And Other Unusual Devices Marco Bonetti – CutAway s.r.l.
  • Multiplayer Metasploit Tag-Team Pen Testing and Reporting Ryan Linn
  • My Life As A Spyware Developer Why I’m Probably Going to Hell Pejski
  • Open Data Source Analysis Daniel “whopisé? Burroughs
  • Operating System Fingerprinting for Virtual Machines Nguyen Anh Quynh
  • PCI: Compromising Controls and Compromising Security PANEL
  • PHP-Nuke_exploit.php.php Brooks
  • Physical Security (You’re Doing It Wrong) A.P. Delchi
  • Programmable HID USB Keyboard House for pen-testing Adrian Crenshaw
  • Pwned by the Owner Zoz
  • ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode Rich Smith
  • Razorback Mullen-Pentney
  • Repelling the Wily Insider Matias Madou
  • Resilient Botnet Command and Control with Tor Dennis Brown
  • SCADA and ICS for Security Experts: How to Avoid Cyberdouchery James Arlen, CISA
  • Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims Paul Judge, David Maynor
  • Securing MMOs A Security rofessional’s View From the Inside
  • Security Measurement and Assuring Reliability through metrics Technology ( SMART) Applying Reliability Metrics to Security Vulnerabilities Wayne Zage, Dolores Zage, Blake Self
  • SHODAN for Penetration Testers Michael “theprez98é? Schearer
  • Sniper Forensics “One Shot, One Killé? Christopher E. Pogue – Trustwave
  • So Many Ways to Slap a YoHo: Hacking Facebook & YoVille Tom Stracener “Straceé?, EvilAdamSmith, Sean Barnum
  • Social Engineering. Street
  • Tales from the Crypto G. Mark Hardy
  • The Anatomy of Drug Testing Fiekert
  • The Year of HD Voice –2010 Who, what, where, how? (Actually, who, how, where, what) Doug Mohney
  • This is not the droid you’re looking for… Nicholas J. Percoco & Christian Papathanasiou
  • This needs to be fixed. Jokes, vulnerabilities, and analysis of commit statements. Logan Lodge, Bruce Potter
  • Token Kidnapping’s Revenge Cesar Cerrudo Argeniss
  • TOOLSMITHING AN IDA BRIDGE: A TOOL BUILDING CASE STUDY Adam Pridgen Matt Wollenweber
  • Training the Next Generation of Hardware Hackers Teaching Computer Organization and Assembly Language Hands-On with Embedded Systems Kongs-Kane
  • Trolling with Math frank^2
  • Universal RF Usb Keyboard Emulation Device URFUKED by Monta Elkins
  • VirGraf101:An Introduction to Virtual Graffiti Tottenkoph
  • Wardriving the smart Grid. Practical approaches to attacking utility packet radios Shawn Moyer,Nathan Keltner
  • We don’t need no stinkin’ badges! Hacking electronic door access controllers Shawn Merdinger
  • Weaponizing Lady GaGa PsychoSonic Attacks BSmith
  • Web Services We Just Don’t Need Mike Bailey
  • Who Cares About IPv6? Sam Bowne City College San Francisco
  • WiMAX Hacking 2010 Pierce Goldy aSmig
  • WPA Too! Md Sohail Ahmad, AirTight Networks
  • You Spent All That Money …And You Still Got Owned Joe McCray
  • Your boss is a douchebag…How about you? effffn

Blackhat 2010

Les PDF sont téléchargeables séparement  sur MediaFire mais dès que je peux, je vous fais un zip de tout ça.

  • Anh-Virt-ICE-wp
  • Arlen-SCADA-Cyberdouchery-slides
  • Bailey-DePetrillo-The-Carmen-Sandiego-Project-wp
  • Becherer-Andrew-Hadoop-Security-slides
  • Becherer-Andrew-Hadoop-Security-wp
  • Beek-Virtual-Forensics-slides
  • BlackHat-USA_2010-Hypponen-You-will-be-billed-90000-for-this-call-slides
  • Bolzoni-Schade-Goodware-drugs-for-malware-slides
  • Born-psudp-Passive-Network-Covert-Communication-slides
  • Born-psudp-Passive-Network-Covert-Communication-wp
  • Bratus-Conti-Taxonomy-wp
  • Bratus-Conti-Voyage-of-a-Reverser-slides
  • Bugher-Secure-Use-of-Cloud-Storage-slides
  • Bugher-Secure-Use-of-Cloud-Storage-wp
  • Bursztein-Bad-Memories-wp
  • Cerrudo-Toke-Kidnapping’s-Revenge-slides
  • Cerrudo-Toke-Kidnapping’s-Revenge-wp
  • Criscione-Virtually-Pwned-slides
  • Cross-Internet-Wiretapping-slides
  • Dabirsiaghi-JavaSnoop-wp
  • DaiZovi-Return-Oriented-Exploitation-slides
  • Daswani-mod-antimalware-slides
  • Daswani-mod-antimalware-wp
  • Di-Croce-SAP-Backdoors-wp
  • Eng-Creighton-Deconstructing-ColdFusion-slides
  • Engebretson-Pauli-Cronin-SprayPAL-slides
  • Engebretson-Pauli-Cronin-SprayPAL-wp
  • Esser-Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits-slides
  • FX-Blitzableiter-slides
  • FX-Blitzableiter-wp
  • Fayo-Hacking-Protecting-Oracle-Databease-Vault-slides
  • Fayo-Hacking-Protecting-Oracle-Databease-Vault-wp
  • Fyodor-Fifield-NMAP-Scripting-Engine-slides
  • Fyodor-Fifield-NMAP-Scripting-Engine-wp
  • Grenier-Johnson-Harder-Better-Faster-Stronger-wp
  • Gurgq-Base-Jumping-slides
  • Hamiel-Wielgosweski-Constricting-the-Web-slides
  • Hamiel-Wielgosweski-Constricting-the-Web-wp
  • Hansen-Sokol-HTTPS-Can-Byte-Me
  • Harbour-Black-Art-of-Binary-Hijacking-slides
  • Heffner-How-to-Hack-Millions-of-Routers-slides
  • Heffner-How-to-Hack-Millions-of-Routers-wp
  • Henderson-Ocepek-Need-A-Hug-wp
  • Insecurities-in-Security-Infrastructure-slides
  • Iozzo-Weinmann-Kornau-Everybody-be-cool-this-is-a-roppery-slides
  • Jarmoc-Insecurities-in-Security-Infrastructure-wp
  • Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-slides
  • Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-wp
  • Kamkar-How-I-Met-Your-Girlfriend-slides
  • Kamkar-How-I-Met-Your-Girlfriend-wp
  • Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3
  • Kennedy-Kelly-PowerShell-Its-Time-To-Own-slides
  • King-Insecurities-in-Security-Infrastructure-wp
  • Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-slides
  • Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-wp
  • Meer-History-of-Memory-Corruption-Attacks-wp
  • Meiners-Sor-WEP-is-back-to-haunt-you-slides
  • Meiners-Sor-WEP-is-back-to-haunt-you-wp
  • Mende-Graf-Rey-loki_v09-wp
  • Nagy-Industrial-Bug-Mining-slides
  • Nohl-Attacking.Phone.Privacy-wp
  • Ochoa-Azubel-NTLM-Weak-Nonce-slides
  • Ochoa-Azubel-NTLM-Weak-Nonce-wp
  • Ollmann-6millionDollarMan-slides
  • Ollmann-6millionDollarMan-wp
  • Parker-Finger-Pointing-for-Fun-Profit-and-War-0.2-slides
  • Pollet-Cummings-RTS-Electricity-for-Free-wp
  • Raber-Cheatham-Reverse-Engineering-with-Hardware-Debuggers-slides
  • Rad-DMCA-slides
  • Rad-DMCA-wp
  • Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides
  • Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1
  • Ryan-Getting-In-Bed-With-Robin-Sage-v1.0
  • Shah-DOM-Hacks-Shreeraj-slides
  • Shah-DOM-Hacks-Shreeraj-wp
  • Shelton-IBM-AIX-Heap-Overflow-Methods-slides
  • Shelton-IBM-AIX-Heap-Overflow-Methods-wp
  • Siddharth-Hacking-Oracle-from-the-Web-wp
  • Slaviero-Lifting-the-Fog-slides
  • Smith-Lai-Balancing-the-Pwn-deficit-wp
  • Smith-pyREtic-Reversing-wp
  • Stender-Engel-Hill-Attacking-Kerberos-Deployments-slides
  • Stender-Engel-Hill-Attacking-Kerberos-Deployments-wp
  • Suiche-Blue-Screen-of-the-Death-is-dead-slides
  • Suiche-Blue-Screen-of-the-Death-is-dead-wp
  • Sullivan-Cryptographic-Agility-slides
  • Sullivan-Cryptographic-Agility-wp
  • Sumner-Social-Net-Special-Ops-slides
  • Thomas-BlindElephant-WebApp-Fingerprinting-slides
  • Umadas-Allen-Network-Stream_Debugging-with-Mallory-slides
  • Umadas-Allen-Network-Stream_Debugging-with-Mallory-wp
  • Vuksan-Pericin-TitanMist-slides
  • Vuksan-Pericin-TitanMist-wp
  • Waisman-APT-slides
  • Wicherski-dirtbox-x86-windows-emulator-slides
  • Yerazunis-Confidential-Mail-Filtering-wp
  • deVries-Attacking-Java-Clients-slides
  • olleb-Hardening-Windows-Applications-slides
  • olleb-Hardening-Windows-Applications-wp

Bonne lecture les amis !

[Source]


Travis Touch – Traducteur Électronique Intelligent avec 105 langues

Traductions faciles & Hotspot Internet

105 Langues

Travis Touch est le traducteur intelligent par excellence qui tient dans la paume de votre main. Créez des liens significatifs avec les personnes que vous rencontrez. Que ce soit pour vos loisirs ou les affaires, Travis Touch permet un monde sans barrières linguistiques, traduisant à partir de 105 langues, plus que n’importe quel autre appareil.

Travis Touch écoute ce que vous dites, le traduit dans la langue sélectionnée et lit la traduction en temps réel par son haut-parleur. Votre interlocuteur peut alors s’exprimer dans sa propre langue et Travis traduira pour vous.

En Savoir +



Comment découper une carte SIM sans la bousiller

vec certains téléphone, ça devient une vraie galère au niveau des cartes SIM. Entre la SIM classique (MiniSIM), la MicroSIM et la NanoSIM, difficile de s’y retrouver et surtout de passer d’une plus grande à une plus petite sans devoir attendre que les opérateurs veuillent bien se donner la peine de vous l’envoyer…

Lire la suite


6 outils pour cloner un disque dur sous Windows et Linux

Cloner c’est facile… Bon, ok, cloner un bébé, c’est déjà plus complexe mais un disque dur, c’est l’enfance de l’art… Alors bien sûr le logiciel le plus connu pour ça, est Ghost de Symantec mais au prix de 999,99 euros HT (j’déconne, je ne connais pas le prix en vrai), c’est déjà plus rentable de se mettre à cloner son petit frère artisanalement dans le garage…

Lire la suite