Foro de elhacker.net

Seguridad Informática => Hacking => Mensaje iniciado por: madpitbull_99 en 11 Agosto 2011, 21:03 pm



Título: Disponibles las presentaciones de la DEFCON 19
Publicado por: madpitbull_99 en 11 Agosto 2011, 21:03 pm
Ya están disponibles las presentaciones (PDF) de la recién acabada Defcon19 (http://www.defcon.org/html/defcon-19/dc-19-index.html).
 
  • Program (http://good.net/dl/k4r3lj/DEFCON19/dc-19-program.pdf)
  • DEFCON-19-Abstrct-The-Schemaverse-Guide.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Abstrct-The-Schemaverse-Guide.pdf)
  • DEFCON-19-Abstrct-The-Schemaverse.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Abstrct-The-Schemaverse.pdf)
  • DEFCON-19-Almeida-Workshop-ESD.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Almeida-Workshop-ESD.pdf)
  • DEFCON-19-Alonso-Garrido-DUST.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Alonso-Garrido-DUST.pdf)
  • DEFCON-19-Alonso-Garrido-Excel.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Alonso-Garrido-Excel.pdf)
  • DEFCON-19-Arlen-Nano-Seconds-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Arlen-Nano-Seconds-WP.pdf)
  • DEFCON-19-Arlen-Nano-Seconds.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Arlen-Nano-Seconds.pdf)
  • DEFCON-19-Arpaia-Reed-Beat-to-1337.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Arpaia-Reed-Beat-to-1337.pdf)
  • DEFCON-19-Baldwin-DVCS-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Baldwin-DVCS-WP.pdf)
  • DEFCON-19-Baldwin-DVCS.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Baldwin-DVCS.pdf)
  • DEFCON-19-Barisani-Bianco-Laurie-Franken.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Barisani-Bianco-Laurie-Franken.pdf)
  • DEFCON-19-Barnett-Deceptive-Hacking-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Barnett-Deceptive-Hacking-WP.pdf)
  • DEFCON-19-Barnett-Deceptive-Hacking.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Barnett-Deceptive-Hacking.pdf)
  • DEFCON-19-Bilodeau-FingerBank.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Bilodeau-FingerBank.pdf)
  • DEFCON-19-Bilodeau-PacketFence.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Bilodeau-PacketFence.pdf)
  • DEFCON-19-Bouillon-Federation-and-Empire.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Bouillon-Federation-and-Empire.pdf)
  • DEFCON-19-Bowne-Three-Generations-of-DoS-Attacks.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Bowne-Three-Generations-of-DoS-Attacks.pdf)
  • DEFCON-19-Brooks-Wilson-Traps-of-Gold.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Brooks-Wilson-Traps-of-Gold.pdf)
  • DEFCON-19-Bryner-Kinectasploit.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Bryner-Kinectasploit.pdf)
  • DEFCON-19-Carey-Metasploit-vSploit-Modules.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Carey-Metasploit-vSploit-Modules.pdf)
  • DEFCON-19-Chamales-Securing-Crisis-Maps.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Chamales-Securing-Crisis-Maps.pdf)
  • DEFCON-19-Chow-Abusing-HTML5.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Chow-Abusing-HTML5.pdf)
  • DEFCON-19-Conti-Security-Research.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Conti-Security-Research.pdf)
  • DEFCON-19-Cook-Kernel-Exploitation.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Cook-Kernel-Exploitation.pdf)
  • DEFCON-19-Craig-Internet-Kiosk-Terminals.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Craig-Internet-Kiosk-Terminals.pdf)
  • DEFCON-19-Crenshaw-Cipherspaces-Darknets.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Crenshaw-Cipherspaces-Darknets.pdf)
  • DEFCON-19-Crowley-Cryptographic-Oracles.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Crowley-Cryptographic-Oracles.pdf)
  • DEFCON-19-Cryer-Taking-Your-Ball-and-Going-Home.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Cryer-Taking-Your-Ball-and-Going-Home.pdf)
  • DEFCON-19-DC-Groups-Panel.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-DC-Groups-Panel.pdf)
  • DEFCON-19-Devarajan-LeBert-VDLDS.pptx.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Devarajan-LeBert-VDLDS.pptx.pdf)
  • DEFCON-19-Dinaburg-Bit-Squatting.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Dinaburg-Bit-Squatting.pdf)
  • DEFCON-19-Duckwall-Bridge-Too-Far.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Duckwall-Bridge-Too-Far.pdf)
  • DEFCON-19-Elhage-Virtualization-Under-Attack.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Elhage-Virtualization-Under-Attack.pdf)
  • DEFCON-19-Elrod-Morris-Not-a-Doctor.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Elrod-Morris-Not-a-Doctor.pdf)
  • DEFCON-19-Engebretson-Pauli-Pen-Testing.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Engebretson-Pauli-Pen-Testing.pdf)
  • DEFCON-19-Fail-Panel.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Fail-Panel.pdf)
  • DEFCON-19-Feinstein-Jarmoc-Get-Off-of-My-Cloud.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Feinstein-Jarmoc-Get-Off-of-My-Cloud.pdf)
  • DEFCON-19-Foofus-Forceful-Browsing-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Foofus-Forceful-Browsing-WP.pdf)
  • DEFCON-19-Fritschie-Witmer-F-On-the-River.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Fritschie-Witmer-F-On-the-River.pdf)
  • DEFCON-19-Garcia-UPnP-Mapping-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Garcia-UPnP-Mapping-WP.pdf)
  • DEFCON-19-Garcia-UPnP-Mapping.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Garcia-UPnP-Mapping.pdf)
  • DEFCON-19-Gavin-OpenDLP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Gavin-OpenDLP.pdf)
  • DEFCON-19-Geers-Strategic-Cyber-Security-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Geers-Strategic-Cyber-Security-WP.pdf)
  • DEFCON-19-Geers-Strategic-Cyber-Security.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Geers-Strategic-Cyber-Security.pdf)
  • DEFCON-19-Gomez-Bulletproofing-The-Cloud.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Gomez-Bulletproofing-The-Cloud.pdf)
  • DEFCON-19-Hamiel-Smartfuzzing_the_Web_DC.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Hamiel-Smartfuzzing_the_Web_DC.pdf)
  • DEFCON-19-Havelt-Henrique.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Havelt-Henrique.pdf)
  • DEFCON-19-Heiland-Printer-To-Pwnd.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Heiland-Printer-To-Pwnd.pdf)
  • DEFCON-19-Holt-Kilger-Assessing-Civilian-Willingness.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Holt-Kilger-Assessing-Civilian-Willingness.pdf)
  • DEFCON-19-Howard-Cyber-Security-Trends-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Howard-Cyber-Security-Trends-WP.pdf)
  • DEFCON-19-Howard-Cyber-Security-Trends.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Howard-Cyber-Security-Trends.pdf)
  • DEFCON-19-Imhoff-Password-Cracking.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Imhoff-Password-Cracking.pdf)
  • DEFCON-19-JackDaniel-PCI-2-PANEL.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-JackDaniel-PCI-2-PANEL.pdf)
  • DEFCON-19-Jakhar-Jugaad-Linux-Thread-Injection.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Jakhar-Jugaad-Linux-Thread-Injection.pdf)
  • DEFCON-19-Kennedy-Pentesting-Over-Powerlines-2.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Kennedy-Pentesting-Over-Powerlines-2.pdf)
  • DEFCON-19-Kennish-Tracking-the-Trackers.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Kennish-Tracking-the-Trackers.pdf)
  • DEFCON-19-Kornbrust-Hacking-and-Securing-DB2.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Kornbrust-Hacking-and-Securing-DB2.pdf)
  • DEFCON-19-Kotler-Amit-Sounds-Like-Botnet.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Kotler-Amit-Sounds-Like-Botnet.pdf)
  • DEFCON-19-Krick-License-to-Transmit.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Krick-License-to-Transmit.pdf)
  • DEFCON-19-Lai-Wu-Chiu-PK-APT-Secrets-2.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Lai-Wu-Chiu-PK-APT-Secrets-2.pdf)
  • DEFCON-19-Lenik-MAC(b)Daddy.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Lenik-MAC%28b%29Daddy.pdf)
  • DEFCON-19-Linn-PIG-Finding-Truffles.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Linn-PIG-Finding-Truffles.pdf)
  • DEFCON-19-Maresca-FIPS-140.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Maresca-FIPS-140.pdf)
  • DEFCON-19-Marpet-Gostom-Smile-for-the-Grenade.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Marpet-Gostom-Smile-for-the-Grenade.pdf)
  • DEFCON-19-McCoy-Hacking-Net.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-McCoy-Hacking-Net.pdf)
  • DEFCON-19-McGrew-Covert-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-McGrew-Covert-WP.pdf)
  • DEFCON-19-McGrew-Covert.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-McGrew-Covert.pdf)
  • DEFCON-19-McNabb-Vulns-Wireless-Water-Meter-Networks.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-McNabb-Vulns-Wireless-Water-Meter-Networks.pdf)
  • DEFCON-19-Miller-Battery-Firmware-Hacking.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Miller-Battery-Firmware-Hacking.pdf)
  • DEFCON-19-O’Neil-Chin-Google-Android.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-O)
  • DEFCON-19-Ocepek-Blinkie-Lights-Arduino.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Ocepek-Blinkie-Lights-Arduino.pdf)
  • DEFCON-19-Ollam-Gun-Safes.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Ollam-Gun-Safes.pdf)
  • DEFCON-19-Osborn-Johansen-Hacking-Google-Chrome-OS.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Osborn-Johansen-Hacking-Google-Chrome-OS.pdf)
  • DEFCON-19-Percoco-Spiderlabs-Droid.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Percoco-Spiderlabs-Droid.pdf)
  • DEFCON-19-Percoco-Spiderlabs-Malware-Freakshow-3.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Percoco-Spiderlabs-Malware-Freakshow-3.pdf)
  • DEFCON-19-Percoco-Spiderlabs-SSLizzard.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Percoco-Spiderlabs-SSLizzard.pdf)
  • DEFCON-19-Phillips-Hacking-MMORPGs.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Phillips-Hacking-MMORPGs.pdf)
  • DEFCON-19-Pickett-Port-Scanning-Without-Packets.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Pickett-Port-Scanning-Without-Packets.pdf)
  • DEFCON-19-Pickett-Resources.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Pickett-Resources.pdf)
  • DEFCON-19-Pittman-Password-Fail.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Pittman-Password-Fail.pdf)
  • DEFCON-19-Rezchikov-Wang-Engelman-Airport-Security-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Rezchikov-Wang-Engelman-Airport-Security-WP.pdf)
  • DEFCON-19-Robinson-Time.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Robinson-Time.pdf)
  • DEFCON-19-Schearer-WTF-Privacy.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Schearer-WTF-Privacy.pdf)
  • DEFCON-19-Shah-Mobile-Moolah.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Shah-Mobile-Moolah.pdf)
  • DEFCON-19-Skunkworks-Bitcoin.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Skunkworks-Bitcoin.pdf)
  • DEFCON-19-Strauchs_Rad_Newman-SCADA-in-Prisons.pptx.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Strauchs_Rad_Newman-SCADA-in-Prisons.pptx.pdf)
  • DEFCON-19-Street-Steal-Everything.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Street-Steal-Everything.pdf)
  • DEFCON-19-Sumner-Byers-Alien-Weaponizing-Cyberpsychology.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Sumner-Byers-Alien-Weaponizing-Cyberpsychology.pdf)
  • DEFCON-19-Sutherland-How-to-Get-Your-Message-Out.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Sutherland-How-to-Get-Your-Message-Out.pdf)
  • DEFCON-19-Swende-Karlsson-Owasp-Hatkit.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Swende-Karlsson-Owasp-Hatkit.pdf)
  • DEFCON-19-Tassey-Perkins-Wireless-Aerial-Surveillance-Platform.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Tassey-Perkins-Wireless-Aerial-Surveillance-Platform.pdf)
  • DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf)
  • DEFCON-19-Trimble-Cybertravel.ppt.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Trimble-Cybertravel.ppt.pdf)
  • DEFCON-19-Webb-Runtime-Process-Insemination.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Webb-Runtime-Process-Insemination.pdf)
  • DEFCON-19-Weeks-Network-Nightmare.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Weeks-Network-Nightmare.pdf)
  • DEFCON-19-Weyers-Key-Impressioning.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Weyers-Key-Impressioning.pdf)
  • DEFCON-19-Wilson-Traps-of-Gold.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Wilson-Traps-of-Gold.pdf)
  • DEFCON-19-Woodberg-Network-Application-Firewalls.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Woodberg-Network-Application-Firewalls.pdf)
  • DEFCON-19-Zhu-Phishing-Online-Scams-in-China.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Zhu-Phishing-Online-Scams-in-China.pdf)
  • DEFCON-19-Zoz-Bianchi-Vanquishing-Voyeurs.pdf (http://good.net/dl/k4r3lj/DEFCON19/DEFCON-19-Zoz-Bianchi-Vanquishing-Voyeurs.pdf)
Vía| CyberHades (http://www.cyberhades.com/2011/08/08/presentaciones-de-la-defcon19/).
Enlace directo: http://good.net/dl/k4r3lj/DEFCON19/ (http://good.net/dl/k4r3lj/DEFCON19/)



Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: Darkgold9 en 11 Agosto 2011, 21:45 pm
 :o Se agradece!, alguna opinion sobre cual / cuales son las mas interesantes?(que son muchas XD) :)


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: madpitbull_99 en 11 Agosto 2011, 22:32 pm
Con JDownloader parece que se pueden descargar, estoy intentando descargarlas todas.


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: $Edu$ en 11 Agosto 2011, 23:32 pm
Estos pdf contienen lo mas interesante q se hablo en las defcon o q?


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: madpitbull_99 en 11 Agosto 2011, 23:58 pm
Se trata de las presentaciones que se usaron en las charlas de DEFCON en formato PDF.



Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: $Edu$ en 12 Agosto 2011, 01:25 am
Ah Gracias!


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: Ambr0si0 en 12 Agosto 2011, 17:02 pm
Y sabeis si ya estan disponibles las charlas?


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: madpitbull_99 en 12 Agosto 2011, 17:07 pm
De momento no están disponibles, cuando se hagan públicas las pondrá en el siguiente enlace:

_https://www.defcon.org/html/defcon-19/dc-19-index.html


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: kadenasman en 1 Septiembre 2011, 03:43 am
hey gracias viejo, muy muy interesante


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: eat7herich en 26 Septiembre 2011, 15:15 pm
A leer =). Con un poco de imaginación es como si estuviéramos en Las Vegas.

Jaja.


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: Ambr0si0 en 27 Septiembre 2011, 15:33 pm
Los viendo aun no están no?


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: madpitbull_99 en 27 Septiembre 2011, 16:34 pm
No, los vídeos no han sido publicados por Defcon. Desconozco el motivo.

De todas formas hay muchos que están repartidos por Google y YouTube.


Título: Re: Disponibles las presentaciones de la DEFCON 19
Publicado por: Ambr0si0 en 28 Octubre 2011, 15:12 pm
Ya están disponibles los videos https://www.defcon.org/html/links/dc-archives/dc-19-archive.html