Korben, roi d’internet, logo bébé avec des lunettes en mode thug life Korben, roi d’internet, logo bébé avec des lunettes en mode thug life

Korben Upgrade your mind

Téléchargez les présentations de la Defcon et de la Blackhat 2010

Si ça vous intéresse, sachez que les présentations PDF de la Defcon 18 sont disponibles au téléchargement, ainsi que celles de la BlackHat 2010 !

Defcon 2010

Les PDF sont téléchargeables séparément sur MediaFire, ou dans un gros zip ici, ou directement sur Bittorrent.

  • A New Approach to Digital Forensic Methodology And !!BUSTED!! Case studies David C. Smith Samuel Petreski
  • A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare. Dondi ―spookdoctor06‖ West
  • Advanced Format String Attacks Presented by Paul Haas
  • Air Traffic Control Insecurity 2.0 Righter Kunkel
  • Analyzing vulnerability assessment data the easy way… Schuberg Philis Seccubus
  • Attack the Key Own the Lock. datagram & Schuyler Towne
  • Attacking .NET Applications at Runtime Jon McCoy
  • Attacking JBoss like a Boss Krpata
  • au.bug William-LeGrand
  • Be a Mentor Marisa Fagan InfoSec Mentors Project
  • BlindElephant:Web Application Fingerprinting With Static Files Patrick Thomas
  • Blitzableiter –BETA Release Countering Flash Exploits Felix « FX » Lindner
  • Browser Based Defenses x06d
  • Build a Lie Detector / Beat a Lie Detector. Rain, J03b34r
  • Building a Security Operations Center with little or no money. Pyorre
  • Changing Threats To Privacy Marlinspike
  • Cloud ComputingA Weapon of Mass Destruction? David M. N. Bryan
  • Connection Strings Chema Alonso Informática 64
  • Constricting the Web. Offensive Python for Web Hackers Nathan Hamiel, Marcin Wielgoszewski
  • Crawling Bittorrent DHTs for Fun and Profit Scott Wolchok
  • Cyber [Crime|War] Connecting the dots Iftach Ian Amit Managing Partner, Security & Innovation
  • Cyberterrorism & the Security of the National Drinking Water Infrastructure John McNabb
  • DCFluX in: Moon-Bouncer Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc.
  • Defcon Comedy Jam 3D Or Not 3D? PANEL
  • Electronic Weapons Tim Otto, aka mage2
  • Embedded devices, an AntiVirus-free safe hideout for Malware Ahn Ki-Chan, Ha Dong-Joo
  • evilgrade, « You STILL have pending upgrades!“ Francisco Amato / Federico Kirschbaum
  • Exploitable Assumptions Doktor Zoz, Dr. Foley, and Eric Schmiedl
  • Exploitation on ARM Technique and bypassing defense mechanisms STRI/Advance Technology Lab/Security
  • Exploiting Digital Cameras Oren Isacson, Alfredo Ortega
  • Exploiting Internet Surveillance Systems Decius
  • Exploiting SCADA Systems JBrown
  • Exploiting WebSphere Application Server’s JSP Engine Schaller
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh
  • Extras java by Lee-Pahl
  • F.O.E.Feed Over Email A Proxy-less RSS Reader For Users in Internet Censored Countries Sho Ho
  • Function hooking for OSX and Linux Joe Damato
  • Gaming in the glass safe. Games, DRM, and Privacy. Ferdinand Schober
  • Go Go Gadget Python Nick Waite FurkanCayçı
  • Google Toolbar: The NARC Within gtoolbarsnoop.py Bryner
  • Hacking and protecting Oracle Database Vault Esteban Martínez Fayó
  • Hacking DOCSIS for Fun and Profit Blake SElf Bytemytaco
  • Hacking Oracle from web apps Sumit Siddharth, Aleksander Gorkowienko
  • Hacking The Future: Weaponizing the Next Generation PANEL
  • Hardware Black Magic:Designing Printed Circuit Boards Dr. Fouad (Dr. K) Kiamilev, Corey (c0re) Lange, Stephen (afterburn) Janansky
  • Hardware Hacking for us dumb software guys Arduinos
  • How To Get Your FBI File (and Other Information You Want From the Federal Government) Hofmann
  • How to Hack Millions of Routers Craig Heffner
  • How Unique is Your Browser? a report on the Panopticlick experiment Peter Eckersley
  • Improving Antivirus Accuracy with Hypervisor Assisted Analysis Danny Quist
  • Industrial Cyber Security From the Perspective of the Power Sector Revision 1 Wade Polk.Paul Malkewicz.Jaroslav Novak
  • INSECURITY ENGINEERING: Locks, Lies, and Videotape Tobias-Fiddler-Bluzmanis
  • IPv6: No Longer Optional John CurranPresident & CEO ARIN
  • IPv6@ARIN Matt Ryanczak
  • Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller
  • Kartograph Elie Bursztein and Jocelyn Lagarenne Stanford University
  • Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010
  • KenjiUrada
  • Letting the Air Out of Tire Pressure Monitoring Systems Mike MetzgerKim Jong
  • Live fire exercise:Baltic Cyber Shield 2010 Kenneth Geers
  • Lord of the Bing Taking Back Search Engine Hacking From Google and Bing Francis Brown and Rob Ragan Stach & Liu, LLC
  • Malware Freakshow 2 Nicholas J. Percoco & Jibran Ilyas
  • Mastering the Nmap Scripting Engine Fyodor and David Fifield
  • Mind Games Extras by Theime
  • Mobile Privacy: Tor On The iPhone And Other Unusual Devices Marco Bonetti – CutAway s.r.l.
  • Multiplayer Metasploit Tag-Team Pen Testing and Reporting Ryan Linn
  • My Life As A Spyware Developer Why I’m Probably Going to Hell Pejski
  • Open Data Source Analysis Daniel “whopisé? Burroughs
  • Operating System Fingerprinting for Virtual Machines Nguyen Anh Quynh
  • PCI: Compromising Controls and Compromising Security PANEL
  • PHP-Nuke_exploit.php.php Brooks
  • Physical Security (You’re Doing It Wrong) A.P. Delchi
  • Programmable HID USB Keyboard House for pen-testing Adrian Crenshaw
  • Pwned by the Owner Zoz
  • ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode Rich Smith
  • Razorback Mullen-Pentney
  • Repelling the Wily Insider Matias Madou
  • Resilient Botnet Command and Control with Tor Dennis Brown
  • SCADA and ICS for Security Experts: How to Avoid Cyberdouchery James Arlen, CISA
  • Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims Paul Judge, David Maynor
  • Securing MMOs A Security rofessional’s View From the Inside
  • Security Measurement and Assuring Reliability through metrics Technology ( SMART) Applying Reliability Metrics to Security Vulnerabilities Wayne Zage, Dolores Zage, Blake Self
  • SHODAN for Penetration Testers Michael “theprez98é? Schearer
  • Sniper Forensics “One Shot, One Killé? Christopher E. Pogue – Trustwave
  • So Many Ways to Slap a YoHo: Hacking Facebook & YoVille Tom Stracener “Straceé?, EvilAdamSmith, Sean Barnum
  • Social Engineering. Street
  • Tales from the Crypto G. Mark Hardy
  • The Anatomy of Drug Testing Fiekert
  • The Year of HD Voice –2010 Who, what, where, how? (Actually, who, how, where, what) Doug Mohney
  • This is not the droid you’re looking for… Nicholas J. Percoco & Christian Papathanasiou
  • This needs to be fixed. Jokes, vulnerabilities, and analysis of commit statements. Logan Lodge, Bruce Potter
  • Token Kidnapping’s Revenge Cesar Cerrudo Argeniss
  • TOOLSMITHING AN IDA BRIDGE: A TOOL BUILDING CASE STUDY Adam Pridgen Matt Wollenweber
  • Training the Next Generation of Hardware Hackers Teaching Computer Organization and Assembly Language Hands-On with Embedded Systems Kongs-Kane
  • Trolling with Math frank^2
  • Universal RF Usb Keyboard Emulation Device URFUKED by Monta Elkins
  • VirGraf101:An Introduction to Virtual Graffiti Tottenkoph
  • Wardriving the smart Grid. Practical approaches to attacking utility packet radios Shawn Moyer,Nathan Keltner
  • We don’t need no stinkin’ badges! Hacking electronic door access controllers Shawn Merdinger
  • Weaponizing Lady GaGa PsychoSonic Attacks BSmith
  • Web Services We Just Don’t Need Mike Bailey
  • Who Cares About IPv6? Sam Bowne City College San Francisco
  • WiMAX Hacking 2010 Pierce Goldy aSmig
  • WPA Too! Md Sohail Ahmad, AirTight Networks
  • You Spent All That Money …And You Still Got Owned Joe McCray
  • Your boss is a douchebag…How about you? effffn

Blackhat 2010

Les PDF sont téléchargeables séparement  sur MediaFire mais dès que je peux, je vous fais un zip de tout ça.

  • Anh-Virt-ICE-wp
  • Arlen-SCADA-Cyberdouchery-slides
  • Bailey-DePetrillo-The-Carmen-Sandiego-Project-wp
  • Becherer-Andrew-Hadoop-Security-slides
  • Becherer-Andrew-Hadoop-Security-wp
  • Beek-Virtual-Forensics-slides
  • BlackHat-USA_2010-Hypponen-You-will-be-billed-90000-for-this-call-slides
  • Bolzoni-Schade-Goodware-drugs-for-malware-slides
  • Born-psudp-Passive-Network-Covert-Communication-slides
  • Born-psudp-Passive-Network-Covert-Communication-wp
  • Bratus-Conti-Taxonomy-wp
  • Bratus-Conti-Voyage-of-a-Reverser-slides
  • Bugher-Secure-Use-of-Cloud-Storage-slides
  • Bugher-Secure-Use-of-Cloud-Storage-wp
  • Bursztein-Bad-Memories-wp
  • Cerrudo-Toke-Kidnapping’s-Revenge-slides
  • Cerrudo-Toke-Kidnapping’s-Revenge-wp
  • Criscione-Virtually-Pwned-slides
  • Cross-Internet-Wiretapping-slides
  • Dabirsiaghi-JavaSnoop-wp
  • DaiZovi-Return-Oriented-Exploitation-slides
  • Daswani-mod-antimalware-slides
  • Daswani-mod-antimalware-wp
  • Di-Croce-SAP-Backdoors-wp
  • Eng-Creighton-Deconstructing-ColdFusion-slides
  • Engebretson-Pauli-Cronin-SprayPAL-slides
  • Engebretson-Pauli-Cronin-SprayPAL-wp
  • Esser-Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits-slides
  • FX-Blitzableiter-slides
  • FX-Blitzableiter-wp
  • Fayo-Hacking-Protecting-Oracle-Databease-Vault-slides
  • Fayo-Hacking-Protecting-Oracle-Databease-Vault-wp
  • Fyodor-Fifield-NMAP-Scripting-Engine-slides
  • Fyodor-Fifield-NMAP-Scripting-Engine-wp
  • Grenier-Johnson-Harder-Better-Faster-Stronger-wp
  • Gurgq-Base-Jumping-slides
  • Hamiel-Wielgosweski-Constricting-the-Web-slides
  • Hamiel-Wielgosweski-Constricting-the-Web-wp
  • Hansen-Sokol-HTTPS-Can-Byte-Me
  • Harbour-Black-Art-of-Binary-Hijacking-slides
  • Heffner-How-to-Hack-Millions-of-Routers-slides
  • Heffner-How-to-Hack-Millions-of-Routers-wp
  • Henderson-Ocepek-Need-A-Hug-wp
  • Insecurities-in-Security-Infrastructure-slides
  • Iozzo-Weinmann-Kornau-Everybody-be-cool-this-is-a-roppery-slides
  • Jarmoc-Insecurities-in-Security-Infrastructure-wp
  • Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-slides
  • Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-wp
  • Kamkar-How-I-Met-Your-Girlfriend-slides
  • Kamkar-How-I-Met-Your-Girlfriend-wp
  • Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3
  • Kennedy-Kelly-PowerShell-Its-Time-To-Own-slides
  • King-Insecurities-in-Security-Infrastructure-wp
  • Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-slides
  • Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-wp
  • Meer-History-of-Memory-Corruption-Attacks-wp
  • Meiners-Sor-WEP-is-back-to-haunt-you-slides
  • Meiners-Sor-WEP-is-back-to-haunt-you-wp
  • Mende-Graf-Rey-loki_v09-wp
  • Nagy-Industrial-Bug-Mining-slides
  • Nohl-Attacking.Phone.Privacy-wp
  • Ochoa-Azubel-NTLM-Weak-Nonce-slides
  • Ochoa-Azubel-NTLM-Weak-Nonce-wp
  • Ollmann-6millionDollarMan-slides
  • Ollmann-6millionDollarMan-wp
  • Parker-Finger-Pointing-for-Fun-Profit-and-War-0.2-slides
  • Pollet-Cummings-RTS-Electricity-for-Free-wp
  • Raber-Cheatham-Reverse-Engineering-with-Hardware-Debuggers-slides
  • Rad-DMCA-slides
  • Rad-DMCA-wp
  • Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides
  • Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1
  • Ryan-Getting-In-Bed-With-Robin-Sage-v1.0
  • Shah-DOM-Hacks-Shreeraj-slides
  • Shah-DOM-Hacks-Shreeraj-wp
  • Shelton-IBM-AIX-Heap-Overflow-Methods-slides
  • Shelton-IBM-AIX-Heap-Overflow-Methods-wp
  • Siddharth-Hacking-Oracle-from-the-Web-wp
  • Slaviero-Lifting-the-Fog-slides
  • Smith-Lai-Balancing-the-Pwn-deficit-wp
  • Smith-pyREtic-Reversing-wp
  • Stender-Engel-Hill-Attacking-Kerberos-Deployments-slides
  • Stender-Engel-Hill-Attacking-Kerberos-Deployments-wp
  • Suiche-Blue-Screen-of-the-Death-is-dead-slides
  • Suiche-Blue-Screen-of-the-Death-is-dead-wp
  • Sullivan-Cryptographic-Agility-slides
  • Sullivan-Cryptographic-Agility-wp
  • Sumner-Social-Net-Special-Ops-slides
  • Thomas-BlindElephant-WebApp-Fingerprinting-slides
  • Umadas-Allen-Network-Stream_Debugging-with-Mallory-slides
  • Umadas-Allen-Network-Stream_Debugging-with-Mallory-wp
  • Vuksan-Pericin-TitanMist-slides
  • Vuksan-Pericin-TitanMist-wp
  • Waisman-APT-slides
  • Wicherski-dirtbox-x86-windows-emulator-slides
  • Yerazunis-Confidential-Mail-Filtering-wp
  • deVries-Attacking-Java-Clients-slides
  • olleb-Hardening-Windows-Applications-slides
  • olleb-Hardening-Windows-Applications-wp

Bonne lecture les amis !

[Source]


IoT, réalité virtuelle, intelligence artificielle… Comment tirer le meilleur parti des datas ?

Le volume des datas en circulation explose…

20 milliards d’objets connectés prévus en 2020, 1,7 mégabytes de données créé chaque secondes par chaque individu sur Terre et 7,7 milliards d’abonnements à un téléphone mobile dans le monde en 2017 ont été enregistrés.
Les donnees circulent partout et leur flux est de plus en plus important. Je vous invite à aller checker cette infographie sur les datas c’est très intéressant.

En Savoir +