Aquí les dejo el material de las charlas que se dieron en la BlackHat USA 2012 el pasado mes de julio en Las Vegas. Hay bastante material y muy bueno:
- A Scientific (But Non Academic) Study of How Malware Employs
Anti-Debugging, Anti-Disassembly and Anti-Virtualization Technologies
- A Stitch in Time Saves Nine: A Case of Multiple Operating System Vulnerability
- Adventures in Bouncerland
- AMF Testing Made Easy!
- Are You My Type? – Breaking .NET Sandboxes Through Serialization
- Blended Threats and JavaScript: A Plan for Permanent Network Compromise
- Clonewise – Automated Package Clone Detection
- Confessions of a WAF Developer: Protocol-Level Evasion of Web Application Firewalls
- Control-Alt-Hack(TM): White Hat Hacking for Fun and Profit (A Computer Security Card Game)
- DE MYSTERIIS DOM JOBSIVS: Mac EFI Rootkits
- BH_US_12_LoukasK_De_Mysteriis_Dom_Jobsivs_WP.pdf
- BH_US_12_LoukasK_De_Mysteriis_Dom_Jobsivs_Slides.pdf
- Digging Deep Into The Flash Sandboxes
- Don’t Stand So Close To Me: An Analysis of the NFC Attack Surface
- BH_US_12_Miller_NFC_attack_surface_WP.pdf
- BH_US_12_Miller_NFC_attack_surface_Slides.pdf
- BH_US_12_Miller_NFC_attack_surface_Code.zip
- Easy Local Windows Kernel Exploitation
- Errata Hits Puberty: 13 Years of Chagrin
- Exchanging Demands
- BH_US_12_Hannay_Exchanging_Demands_WP.pdf
- BH_US_12_Hannay_Exchanging_Demands_Slides.pdf
- BH_US_12_Hannay_Exchanging_Demands_Code.zip
- Exploit Mitigation Improvements in Win 8
- Exploiting the jemalloc Memory Allocator: Owning Firefox’s Heap
- BH_US_12_Argyroudis_Exploiting_the_ jemalloc_Memory_ Allocator_WP.pdf
- BH_US_12_Argyroudis_Exploiting_the_ jemalloc_Memory_ Allocator_Slides.pdf
- BH_US_12_Argyroudis_Exploiting_the_ jemalloc_Memory_ Allocator_Code.zip
- File disinfection framework: Striking back at polymorphic viruses
- Flowers for Automated Malware Analysis
- From the Iriscode to the Iris: A New Vulnerability of Iris Recognition Systems
- Ghost is in the Air(traffic)
- Google Native Client – Analysis Of A Secure Browser Plugin Sandbox
- Hacking the Corporate Mind: Using Social Engineering Tactics to Improve Organizational Security Acceptance
- BH_US_12_Philput_Hacking_The_Corporate_Mind_WP.pdf
- BH_US_12_Philput_Hacking_The_Corporate_Mind_Slides.pdf
- Hacking with WebSockets
- Hardware backdooring is practical
- Here Be Backdoors: A Journey Into The Secrets Of Industrial Firmware
- Hookin’ ain’t easy: BeEF injection with MITM
- How many bricks does it take to crack a microcell?
- How the Analysis of Electrical Current Consumption of Embedded Systems Could Lead to Code Reversing?
- BH_US_12_Allain_Current Consumption-WP.pdf
- BH_US_12_Allain_Current Consumption-Slides.pdf
- BH_US_12_Allain_Current Consumption-Code.zip
- HTML5 Top 10 Threats – Stealth Attacks and Silent Exploits
- iOS Application Security Assessment and Automation: Introducing SIRA
- iOS Kernel Heap Armageddon Revisited
- BH_US_12_Esser_iOS_Kernel_Heap_Armageddon_WP.pdf
- BH_US_12_Esser_iOS_Kernel_Heap_Armageddon_Slides.pdf
- Legal Aspects of Cyberspace Operations
- Looking Into The Eye Of The Meter
- My Arduino Can Beat Up Your Hotel Room Lock
- Owning bad guys {and mafia} with javascript botnets
- Probing Mobile Operator Networks
- BH_US_12_Milliner_Probing Mobile Operating_WP.pdf
- BH_US_12_Milliner_Probing Mobile Operating_Slides.pdf
- SexyDefense – Maximizing the Home-Field Advantage
- SQL Injection to MIPS Overflows: Rooting SOHO Routers
- BH_US_12_Cutlip_SQL_Exploitation_WP.pdf
- BH_US_12_Cutlip_SQL_Exploitation_Slides.pdf
- BH_US_12_Cutlip_SQL_Exploitation_Code.zip
- SSRF vs. Business Critical Applications
- State of Web Exploit Toolkits
- Still Passing the Hash 15 Years Later? Using the Keys to the Kingdom to Access All your Data
- BH_US_12_Duckwall_Campbell_Still_Passing_WP.pdf
- BH_US_12_Duckwall_Campbell_Still_Passing_Slides.pdf
- BH_US_12_Duckwall_Campbell_Still_Passing_Code.zip
- Targeted Intrusion Remediation: Lessons From The Front Lines
- The Defense RESTs: Automation and APIs for Improving Security
- The Info Leak Era on Software Exploitation
- The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet
- The subway line 8 – Exploitation of Windows 8 Metro Style Apps
- Torturing OpenSSL
- Trust, Security, and Society
- We have you by the Gadgets
- BH_US_12_Shkatov_Kohlenberg_Blackhat_Have_You_By_The_Gadgets_WP.pdf
- BH_US_12_Shkatov_Kohlenberg_Blackhat_Have_You_By_The_Gadgets_Slides.pdf
- Web Tracking for You
- BH_US_12_Fleischer_Implementing_Web_Tracking_gfleischer_WP.pdf
- BH_US_12_Fleischer_Implementing_Web_Tracking_gfleischer_Slides.pdf
- BH_US_12_Fleischer_Implementing_Web_Tracking_gfleischer_Code.zip
- Windows Phone 7 Internals and Exploitability
- Windows 8 Heap Internals
- Advanced Chrome Extension Exploitation – Leveraging API Powers for the Better Evil
- BH_US_12_Osborn_Kotowicz_Advanced_Chrome_Extension_WP.pdf
- BH_US_12_Osborn_Kotowicz_Advanced_Chrome_Extension_Slides.pdf
- BH_US_12_Osborn_Kotowicz_Advanced_Chrome_Extension_Code.zip
- Code Reviewing Web Application Framework Based Applications (Struts 2, Spring MVC, Ruby on Rails (Groovy on Grails), .NET MVC)
- Lessons Of Binary Analysis
- Linux interactive exploit development with GDB and PEDA
- Ruby for Pentesters: The Workshop
- HTExploit Bypassing Htaccess Restrictions
- libinjection: A C library for SQLi detection and generation through lexical analysis of real world attacks
- ModSecurity as Universal Cross-platform Web Protection Tool
- BH_US_12_Wroblewski_ModSecurity_Universal_WP.pdf
- BH_US_12_Wroblewski_ModSecurity_Universal_Slides.pdf
- Passive Bluetooth Monitoring in Scapy
- BH_US_12_Holeman_Demo.pdf
- BH_US_12_Holeman_Panda.pdf
- BH_US_12_Holeman_Passive_Bluetooth_Slides.pdf
- source.zip
- Stamp Out Hash Corruption, Crack All The Things
- BH_US_12_Reynods_Stamp_Out_Hash_WP.pdf
- BH_US_12_Reynods_Stamp_Out_Hash_Slides.pdf
- BH_US_12_Reynods_Stamp_Out_Hash_Code.zip
- SYNful Deceit, Stateful Subterfuge
- The last gasp of the industrial air-gap…
- When security gets in the way: PenTesting mobile apps that use certificate pinning
0 Notaciones:
Publicar un comentario