Se llevó a cabo del 8 al 11 de agosto del 2019 la DEF CON 27,
conferencia que se destaca por llevar a los mejores exponentes
mundiales y por ser una de las conferencias más renombradas en el mundo
de la seguridad informática, hacking y pentest. Las presentaciones y
demos las puedes descargar todas juntas en formato RAR o individualmente:
- Anish-Athalye-Strong-Isolation.pdf
- Anish Athalye - Strong Isolation - Demo 1 of 7.mp4
- Anish Athalye - Strong Isolation - Demo 2 of 7.mp4
- Anish Athalye - Strong Isolation - Demo 3 of 7.mp4
- Anish Athalye - Strong Isolation - Demo 4 of 7.mp4
- Anish Athalye - Strong Isolation - Demo 5 of 7.mp4
- Anish Athalye - Strong Isolation - Demo 6 of 7.mp4
- Anish Athalye - Strong Isolation - Demo 7 of 7.mp4
- Bernhard-Mueller-The-Ether-Wars.pdf
- Bill-Graydon-Restricted-Keys.pdf
- Christopher-Wade-Tag-side-attacks-against-NFC.pdf
- Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF
- DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips.pdf
- Dirk-jan-Mollema-Im-in-your-cloud-pwning-your-azure-environment.pdf
- Douglas-McKee-HVACking-Understanding-the-Delta-Between-Security-and-Reality.pdf
- Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin.pdf
- Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo1-iPad-5sec.mp4
- Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo2-hook-control.mp4
- Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo3-automation.mp4
- Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding.pdf
- Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoiP-Configuration-Interfaces.pdf
- Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All.pdf
- Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Extras.zip
- Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllAtomBombing.mp4
- Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllGhostWriting.mp4
- Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllSetWindowsLongPtr.mp4
- Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllStackBomber.mp4
- Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllnmapMap.mp4
- Jack-Baker-Hacking-Web-Assembly-Games.pdf
- Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil.pdf
- Jeff-Dileo-Evil-eBPF-In-Depth.pdf
- Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-on-Email-End-to-End-Encryption.pdf
- Jmaxxz-Your-Car-is-My-Car.pdf
- OpenRemoteStart-master
- Jmaxxz - 0 - BenchCarTour.mp4
- Jmaxxz - 1 - StartingBenchCarRf.mp4
- Jmaxxz - 10 - StartImprezaWithoutTransponder.mp4
- Jmaxxz - 11 -StartMiniWIthoutKey.mp4
- Jmaxxz - 2 - CloneExistingRemote_ShortEdit - UPDATED V2.mp4
- Jmaxxz - 2 -CloneExistingRemote.mp4
- Jmaxxz - 3 - StartCar.mp4
- Jmaxxz - 4 - DriveOff - UPDATED V2.mp4
- Jmaxxz - 4 - DriveOff.mp4
- Jmaxxz - 5 - DisableWheelLockAndDrive.mp4
- Jmaxxz - 6 - StartCarAfterStop.mp4
- Jmaxxz - 9 - SqliStartCar.mp4
- Joshua-Maddux-API-Induced-SSRF.pdf
- Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations.pdf
- Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-AFL-How-to-Improve-Coverage-guided-Fuzzing-and-Find-New-Zero-days-in-Tough-Targets.pdf
- Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance.pdf
- Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo2-ModifyServicePermissions.mp4
- Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo3-JEAToDC.mp4
- Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo4-DumpDCHash.mp4
- Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo5-CompromiseForestRoot.mp4
- Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance- Demo1-PSRemotingToDC.mp4
- Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs.pdf
- Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video.zip
- Orange-Tsai-and-Meh Chang-Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs-demo_fortigate.mp4
- Orange-Tsai-and-Meh Chang-Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs-demo_pulsesecure_v1.mp4
- Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks.pdf
- 1_video.mp4
- 2_video.mp4
- PedroCabrera - SDR Against Smart TVs_video10-B+M.mp4
- PedroCabrera - SDR Against Smart TVs_video3-NotFinal.mp4
- PedroCabrera - SDR Against Smart TVs_video4.mp4
- PedroCabrera - SDR Against Smart TVs_video5_inject_URL.mp4
- PedroCabrera - SDR Against Smart TVs_video6-IISS-SDR.mp4
- PedroCabrera - SDR Against Smart TVs_video7-IISS-DNS.mp4
- PedroCabrera - SDR Against Smart TVs_video8-KL.mp4
- PedroCabrera - SDR Against Smart TVs_video9-Mi.mp4
- Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers.pdf
- Xiling-Gong-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air.pdf
- Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-How-to-Easily-Bypass-the-Latest-NTLM-Relay-Mitigations.pdf
- albinowax-HTTP-Desync-Attacks.pdf
- albinowax-HTTP-Desync-Attacks-tool
- build
- out
- resources
- src
- build.gradle
- readme.md
- sqlite-jdbc-3.23.1.jar
- turbo-intruder-all.jar
- finalphoenix-Rise-of-the-Hypebots.pdf
- Alexandre-Borges-dotNET-Malware-Threats.pdf
- Alon-Weinberg-Please-inject-me-a-x64-code-injection.pdf
- Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace.pdf
- Amit-Waisel-and-Hila-Cohen-malproxy.pdf
- Andreas-Baumhof-Are-Quantum-Computers-Really-A-Threat-To-Cryptography.pdf
- Andy-Grant-Unpacking-pkgs.pdf
- Ariel-Adversariel-Herbert-Voss-Dont-Red-Team-AI-like-a-Chump.pdf
- Ben-Morris-More-Keys-Than-A-Piano-Finding-Secrets-In-Publicly-Exposed-Ebs-Volumes.pdf
- Ben-Sadeghipour-Owning-the-clout-through-SSRF-and-PDF-generators.pdf
- Bill-Swearingen-HAKC-The-Police.pdf
- Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.compressed.pdf
- Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.pdf
- Brent-Stone-Reverse-Enginerring-17-Cars.pdf
- Brizendine-Stroschein-The-JOP-ROCKET-DEMO-1.mp4
- Brizendine-Stroschein-The-JOP-ROCKET.pdf
- Campbell-Murray-GSM-We-can-hear-everyone-now.pdf
- Christopher-Roberts-Firmware-Slap.pdf
- Dan-Regalado-Defcon27AliDan.pdf
- Daniel-Romero-and-Mario-Rivas-Why-you-should-fear-your-mundane-office.pdf
- Elliott-Thompson-Mi-Casa-Su-Casa.pdf
- Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera.pdf
- Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design.pdf
- Jacob-Baines-Help-Me-Vulnerabilities.-Youre-My-Only-Hope.pdf
- Jesse-Michael-Get-off-the-kernel-if-you-cant-drive.pdf
- Joe-Grand-Badge.pdf
- Joseph-Cox-How-You-Can-Buy-ATT-T-Mobile-and-Sprint-Real-Time-Location-Data-on-the-Black-Market.pdf
- Joseph-Menn-Change-the-World-cDc-Style.pdf
- Junyu-Zhou-and-Ce-Qin-and-Jianing-Wang-Web2Own-Attacking-Desktop-Apps-From-Web-Securitys-Perspective.pdf
- Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pdf
- Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee.pdf
- Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-Driven-by-Malware.pdf
- Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf
- Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht.pdf
- Michael-Stepankin-Apache-Solr-Injection.pdf
- Nicolas-Oberli-Poking-the-S-in-SD-cards.PDF
- Nina-Kollars-Confessions-of-a-Nespresso-Money-Mule.pdf
- Omer-Gull-SELECT-code-execution-FROM-USING-SQLite.pdf
- Panel-DC101-The-Panel.pdf
- Patrick-Wardle-Harnessing-Weapons-of-Mac-Destruction.pdf
- Phar-No-Mas-How-One-Side-Channel-Flaw-Opens-Atm-Pharmacies-and-Government-Secrets-Up-to-Attack.pdf
- Philippe-Laulheret-Introduction-to-Hardware-Hacking-Extended-Version.pdf
- Roger-Dingledine-TOR-Censorship-Arms-Race.pdf
- Travis-Palmer-First-try-DNS-Cache-Poisoning-with-IPv4-and-IPv6-Fragmentation.pdf
- Truman-Kain-Surveillance-Detection-Scout.pdf
- Wenxiang-Qian-Yuxiang-Li-Huiyu-Wu-Breaking-Google-Home-Exploit-It-with-SQLite-Magellan.pdf
- WillC-Phreaking-Elevators.pdf
- Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf
- Xiaohuihui-All-The-4G-Modules-Could-Be-Hacked.pdf
- Zhang-Xiangqian-Liu-Huiming-Your-secret-files-are-mine.pdf
- d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer.pdf
- droogie-go-null-yourself.pdf
- grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss.pdf
- jiska-fabian-vacuum-cleaning-security.pdf
- smea-Adventures-in-smart-buttplug-penetration-testing.pdf
Via: https://www.cyberhades.com
0 Notaciones:
Publicar un comentario