Téléchargez les présentations de la Defcon et de la Blackhat 2010

Image illustrant l'article : Téléchargez les présentations de la Defcon et de la Blackhat 2010

Téléchargez les présentations de la Defcon et de la Blackhat 2010

Le 4 août 2010 par Korben -

Si ça vous intéresse, sachez que les présentations PDF de la Defcon 18 sont disponibles au téléchargement, ainsi que celles de la BlackHat 2010 !

Defcon 2010

Les PDF sont téléchargeables séparément sur MediaFire, ou dans un gros zip ici, ou directement sur Bittorrent.

  • A New Approach to Digital Forensic Methodology And !!BUSTED!! Case studies David C. Smith Samuel Petreski
  • A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare. Dondi ―spookdoctor06‖ West
  • Advanced Format String Attacks Presented by Paul Haas
  • Air Traffic Control Insecurity 2.0 Righter Kunkel
  • Analyzing vulnerability assessment data the easy way… Schuberg Philis Seccubus
  • Attack the Key Own the Lock. datagram & Schuyler Towne
  • Attacking .NET Applications at Runtime Jon McCoy
  • Attacking JBoss like a Boss Krpata
  • au.bug William-LeGrand
  • Be a Mentor Marisa Fagan InfoSec Mentors Project
  • BlindElephant:Web Application Fingerprinting With Static Files Patrick Thomas
  • Blitzableiter –BETA Release Countering Flash Exploits Felix “FX” Lindner
  • Browser Based Defenses x06d
  • Build a Lie Detector / Beat a Lie Detector. Rain, J03b34r
  • Building a Security Operations Center with little or no money. Pyorre
  • Changing Threats To Privacy Marlinspike
  • Cloud ComputingA Weapon of Mass Destruction? David M. N. Bryan
  • Connection Strings Chema Alonso Informática 64
  • Constricting the Web. Offensive Python for Web Hackers Nathan Hamiel, Marcin Wielgoszewski
  • Crawling Bittorrent DHTs for Fun and Profit Scott Wolchok
  • Cyber [Crime|War] Connecting the dots Iftach Ian Amit Managing Partner, Security & Innovation
  • Cyberterrorism & the Security of the National Drinking Water Infrastructure John McNabb
  • DCFluX in: Moon-Bouncer Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc.
  • Defcon Comedy Jam 3D Or Not 3D? PANEL
  • Electronic Weapons Tim Otto, aka mage2
  • Embedded devices, an AntiVirus-free safe hideout for Malware Ahn Ki-Chan, Ha Dong-Joo
  • evilgrade, “You STILL have pending upgrades!“ Francisco Amato / Federico Kirschbaum
  • Exploitable Assumptions Doktor Zoz, Dr. Foley, and Eric Schmiedl
  • Exploitation on ARM Technique and bypassing defense mechanisms STRI/Advance Technology Lab/Security
  • Exploiting Digital Cameras Oren Isacson, Alfredo Ortega
  • Exploiting Internet Surveillance Systems Decius
  • Exploiting SCADA Systems JBrown
  • Exploiting WebSphere Application Server’s JSP Engine Schaller
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh
  • Extras java by Lee-Pahl
  • F.O.E.Feed Over Email A Proxy-less RSS Reader For Users in Internet Censored Countries Sho Ho
  • Function hooking for OSX and Linux Joe Damato
  • Gaming in the glass safe. Games, DRM, and Privacy. Ferdinand Schober
  • Go Go Gadget Python Nick Waite FurkanCayçı
  • Google Toolbar: The NARC Within gtoolbarsnoop.py Bryner
  • Hacking and protecting Oracle Database Vault Esteban Martínez Fayó
  • Hacking DOCSIS for Fun and Profit Blake SElf Bytemytaco
  • Hacking Oracle from web apps Sumit Siddharth, Aleksander Gorkowienko
  • Hacking The Future: Weaponizing the Next Generation PANEL
  • Hardware Black Magic:Designing Printed Circuit Boards Dr. Fouad (Dr. K) Kiamilev, Corey (c0re) Lange, Stephen (afterburn) Janansky
  • Hardware Hacking for us dumb software guys Arduinos
  • How To Get Your FBI File (and Other Information You Want From the Federal Government) Hofmann
  • How to Hack Millions of Routers Craig Heffner
  • How Unique is Your Browser? a report on the Panopticlick experiment Peter Eckersley
  • Improving Antivirus Accuracy with Hypervisor Assisted Analysis Danny Quist
  • Industrial Cyber Security From the Perspective of the Power Sector Revision 1 Wade Polk.Paul Malkewicz.Jaroslav Novak
  • INSECURITY ENGINEERING: Locks, Lies, and Videotape Tobias-Fiddler-Bluzmanis
  • IPv6: No Longer Optional John CurranPresident & CEO ARIN
  • IPv6@ARIN Matt Ryanczak
  • Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller
  • Kartograph Elie Bursztein and Jocelyn Lagarenne Stanford University
  • Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010
  • KenjiUrada
  • Letting the Air Out of Tire Pressure Monitoring Systems Mike MetzgerKim Jong
  • Live fire exercise:Baltic Cyber Shield 2010 Kenneth Geers
  • Lord of the Bing Taking Back Search Engine Hacking From Google and Bing Francis Brown and Rob Ragan Stach & Liu, LLC
  • Malware Freakshow 2 Nicholas J. Percoco & Jibran Ilyas
  • Mastering the Nmap Scripting Engine Fyodor and David Fifield
  • Mind Games Extras by Theime
  • Mobile Privacy: Tor On The iPhone And Other Unusual Devices Marco Bonetti - CutAway s.r.l.
  • Multiplayer Metasploit Tag-Team Pen Testing and Reporting Ryan Linn
  • My Life As A Spyware Developer Why I’m Probably Going to Hell Pejski
  • Open Data Source Analysis Daniel “whopisé? Burroughs
  • Operating System Fingerprinting for Virtual Machines Nguyen Anh Quynh
  • PCI: Compromising Controls and Compromising Security PANEL
  • PHP-Nuke_exploit.php.php Brooks
  • Physical Security (You’re Doing It Wrong) A.P. Delchi
  • Programmable HID USB Keyboard House for pen-testing Adrian Crenshaw
  • Pwned by the Owner Zoz
  • ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode Rich Smith
  • Razorback Mullen-Pentney
  • Repelling the Wily Insider Matias Madou
  • Resilient Botnet Command and Control with Tor Dennis Brown
  • SCADA and ICS for Security Experts: How to Avoid Cyberdouchery James Arlen, CISA
  • Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims Paul Judge, David Maynor
  • Securing MMOs A Security rofessional’s View From the Inside
  • Security Measurement and Assuring Reliability through metrics Technology ( SMART) Applying Reliability Metrics to Security Vulnerabilities Wayne Zage, Dolores Zage, Blake Self
  • SHODAN for Penetration Testers Michael “theprez98é? Schearer
  • Sniper Forensics “One Shot, One Killé? Christopher E. Pogue - Trustwave
  • So Many Ways to Slap a YoHo: Hacking Facebook & YoVille Tom Stracener “Straceé?, EvilAdamSmith, Sean Barnum
  • Social Engineering. Street
  • Tales from the Crypto G. Mark Hardy
  • The Anatomy of Drug Testing Fiekert
  • The Year of HD Voice –2010 Who, what, where, how? (Actually, who, how, where, what) Doug Mohney
  • This is not the droid you’re looking for… Nicholas J. Percoco & Christian Papathanasiou
  • This needs to be fixed. Jokes, vulnerabilities, and analysis of commit statements. Logan Lodge, Bruce Potter
  • Token Kidnapping’s Revenge Cesar Cerrudo Argeniss
  • TOOLSMITHING AN IDA BRIDGE: A TOOL BUILDING CASE STUDY Adam Pridgen Matt Wollenweber
  • Training the Next Generation of Hardware Hackers Teaching Computer Organization and Assembly Language Hands-On with Embedded Systems Kongs-Kane
  • Trolling with Math frank^2
  • Universal RF Usb Keyboard Emulation Device URFUKED by Monta Elkins
  • VirGraf101:An Introduction to Virtual Graffiti Tottenkoph
  • Wardriving the smart Grid. Practical approaches to attacking utility packet radios Shawn Moyer,Nathan Keltner
  • We don’t need no stinkin’ badges! Hacking electronic door access controllers Shawn Merdinger
  • Weaponizing Lady GaGa PsychoSonic Attacks BSmith
  • Web Services We Just Don’t Need Mike Bailey
  • Who Cares About IPv6? Sam Bowne City College San Francisco
  • WiMAX Hacking 2010 Pierce Goldy aSmig
  • WPA Too! Md Sohail Ahmad, AirTight Networks
  • You Spent All That Money …And You Still Got Owned Joe McCray
  • Your boss is a douchebag…How about you? effffn

Blackhat 2010

Les PDF sont téléchargeables séparement sur MediaFire mais dès que je peux, je vous fais un zip de tout ça.

- Anh-Virt-ICE-wp - Arlen-SCADA-Cyberdouchery-slides - Bailey-DePetrillo-The-Carmen-Sandiego-Project-wp - Becherer-Andrew-Hadoop-Security-slides - Becherer-Andrew-Hadoop-Security-wp - Beek-Virtual-Forensics-slides - BlackHat-USA_2010-Hypponen-You-will-be-billed-90000-for-this-call-slides - Bolzoni-Schade-Goodware-drugs-for-malware-slides - Born-psudp-Passive-Network-Covert-Communication-slides - Born-psudp-Passive-Network-Covert-Communication-wp - Bratus-Conti-Taxonomy-wp - Bratus-Conti-Voyage-of-a-Reverser-slides - Bugher-Secure-Use-of-Cloud-Storage-slides - Bugher-Secure-Use-of-Cloud-Storage-wp - Bursztein-Bad-Memories-wp - Cerrudo-Toke-Kidnapping's-Revenge-slides - Cerrudo-Toke-Kidnapping's-Revenge-wp - Criscione-Virtually-Pwned-slides - Cross-Internet-Wiretapping-slides - Dabirsiaghi-JavaSnoop-wp - DaiZovi-Return-Oriented-Exploitation-slides - Daswani-mod-antimalware-slides - Daswani-mod-antimalware-wp - Di-Croce-SAP-Backdoors-wp - Eng-Creighton-Deconstructing-ColdFusion-slides - Engebretson-Pauli-Cronin-SprayPAL-slides - Engebretson-Pauli-Cronin-SprayPAL-wp - Esser-Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits-slides - FX-Blitzableiter-slides - FX-Blitzableiter-wp - Fayo-Hacking-Protecting-Oracle-Databease-Vault-slides - Fayo-Hacking-Protecting-Oracle-Databease-Vault-wp - Fyodor-Fifield-NMAP-Scripting-Engine-slides - Fyodor-Fifield-NMAP-Scripting-Engine-wp - Grenier-Johnson-Harder-Better-Faster-Stronger-wp - Gurgq-Base-Jumping-slides - Hamiel-Wielgosweski-Constricting-the-Web-slides - Hamiel-Wielgosweski-Constricting-the-Web-wp - Hansen-Sokol-HTTPS-Can-Byte-Me - Harbour-Black-Art-of-Binary-Hijacking-slides - Heffner-How-to-Hack-Millions-of-Routers-slides - Heffner-How-to-Hack-Millions-of-Routers-wp - Henderson-Ocepek-Need-A-Hug-wp - Insecurities-in-Security-Infrastructure-slides - Iozzo-Weinmann-Kornau-Everybody-be-cool-this-is-a-roppery-slides - Jarmoc-Insecurities-in-Security-Infrastructure-wp - Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-slides - Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-wp - Kamkar-How-I-Met-Your-Girlfriend-slides - Kamkar-How-I-Met-Your-Girlfriend-wp - Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3 - Kennedy-Kelly-PowerShell-Its-Time-To-Own-slides - King-Insecurities-in-Security-Infrastructure-wp - Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-slides - Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-wp - Meer-History-of-Memory-Corruption-Attacks-wp - Meiners-Sor-WEP-is-back-to-haunt-you-slides - Meiners-Sor-WEP-is-back-to-haunt-you-wp - Mende-Graf-Rey-loki_v09-wp - Nagy-Industrial-Bug-Mining-slides - Nohl-Attacking.Phone.Privacy-wp - Ochoa-Azubel-NTLM-Weak-Nonce-slides - Ochoa-Azubel-NTLM-Weak-Nonce-wp - Ollmann-6millionDollarMan-slides - Ollmann-6millionDollarMan-wp - Parker-Finger-Pointing-for-Fun-Profit-and-War-0.2-slides - Pollet-Cummings-RTS-Electricity-for-Free-wp - Raber-Cheatham-Reverse-Engineering-with-Hardware-Debuggers-slides - Rad-DMCA-slides - Rad-DMCA-wp - Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides - Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1 - Ryan-Getting-In-Bed-With-Robin-Sage-v1.0 - Shah-DOM-Hacks-Shreeraj-slides - Shah-DOM-Hacks-Shreeraj-wp - Shelton-IBM-AIX-Heap-Overflow-Methods-slides - Shelton-IBM-AIX-Heap-Overflow-Methods-wp - Siddharth-Hacking-Oracle-from-the-Web-wp - Slaviero-Lifting-the-Fog-slides - Smith-Lai-Balancing-the-Pwn-deficit-wp - Smith-pyREtic-Reversing-wp - Stender-Engel-Hill-Attacking-Kerberos-Deployments-slides - Stender-Engel-Hill-Attacking-Kerberos-Deployments-wp - Suiche-Blue-Screen-of-the-Death-is-dead-slides - Suiche-Blue-Screen-of-the-Death-is-dead-wp - Sullivan-Cryptographic-Agility-slides - Sullivan-Cryptographic-Agility-wp - Sumner-Social-Net-Special-Ops-slides - Thomas-BlindElephant-WebApp-Fingerprinting-slides - Umadas-Allen-Network-Stream_Debugging-with-Mallory-slides - Umadas-Allen-Network-Stream_Debugging-with-Mallory-wp - Vuksan-Pericin-TitanMist-slides - Vuksan-Pericin-TitanMist-wp - Waisman-APT-slides - Wicherski-dirtbox-x86-windows-emulator-slides - Yerazunis-Confidential-Mail-Filtering-wp - deVries-Attacking-Java-Clients-slides - olleb-Hardening-Windows-Applications-slides - olleb-Hardening-Windows-Applications-wp
Bonne lecture les amis !

[Source]

Que faire après le bac quand on est passionné de cybersécurité ?

Contenu partenaire

Entièrement dédiée à la cybersécurité, l'école Guardia est accessible soit directement après le bac (post-bac), soit après un bac+2 ou bac+3. En rejoignant l'école Guardia, vous deviendrez développeur informatique option cybersécurité (Bac+3) ou expert en cybersécurité (Bac+5).

Cliquez ici pour en savoir plus