PDA

Ver la versión completa : Blackhat Europe 2012 (White Papers, Slides, Sources)



LUK
20-03-2012, 10:04
Ya está disponible el material de la recién acabada BlackHat 2012 Europa (https://www.blackhat.com/html/bh-eu-12/bh-eu-12-home.html). Parece que faltan algunas charlas. Si las ponen actualizaremos esta entrada.


Axelle Apvrille – Guillaume LovetAn Attacker’s Day into Virology: Human vs Computer:

White Paper (https://media.blackhat.com/bh-eu-12/Lovet/bh-eu-12-Lovet-Human_Virology-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Lovet/bh-eu-12-Lovet-Human_Virology-Slides.pdf)
Antonios Atlasis – Attacking IPv6 Implementation Using Fragmentation:

White Paper (https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-WP.pdf) Slides (https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-Slides.pdf)
Archivo (https://media.blackhat.com/bh-eu-12/Atlasis/bh-eu-12-Atlasis-Attacking_IPv6-Tool.zip)
Michael BakerFinding Needles in Haystacks (The Size of Countries):

White Paper (https://media.blackhat.com/bh-eu-12/Baker/bh-eu-12-Baker-Needles_Haystacks-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Baker/bh-eu-12-Baker-Needles_Haystacks-Slides.pdf)
Andrey Belenko – Dmitry Sklyarov”Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh Really?:

White Paper (https://media.blackhat.com/bh-eu-12/Belenko/bh-eu-12-Belenko-Password_Encryption-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Belenko/bh-eu-12-Belenko-Password_Encryption-Slides.pdf)
Andy DavisHDMI – Hacking Displays Made Interesting:

White Paper (https://media.blackhat.com/bh-eu-12/Davis/bh-eu-12-Davis-HDMI-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Davis/bh-eu-12-Davis-HDMI-Slides.pdf)
Stephen de Vries – Beyond Scanning: Automating Web Application Security Tests:

White Paper (https://media.blackhat.com/bh-eu-12/deVries/bh-eu-12-deVries-Beyond_Scanning-WP.pdf) Slides (https://media.blackhat.com/bh-eu-12/deVries/bh-eu-12-deVries-Beyond_Scanning-Slides.pdf)
Archivo (https://media.blackhat.com/bh-eu-12/deVries/bh-eu-12-deVries-Beyond_Scanning-Tools.zip)
Tyrone Erasmus – The Heavy Metal That Poisoned the Droid:

White Paper (https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Erasmus/bh-eu-12-Erasmus-Heavy-Metal_Poisoned_Droid-Slides.pdf)
Takahiro Haruyama – Hiroshi SuzukiOne-byte Modification for Breaking Memory Forensic Analysis:

Slides (https://media.blackhat.com/bh-eu-12/Haruyama/bh-eu-12-Haruyama-Memory_Forensic-Slides.pdf)
Marcia Hofmann – Seth SchoenDefending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices:

White Paper (https://media.blackhat.com/bh-eu-12/Hofmann/bh-eu-12-Hofmann-Defending_privacy_Border-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Hofmann/bh-eu-12-Hofmann-Defending_privacy_Border-Slides.pdf)
Jeff Jarmoc – SSL/TLS Interception Proxies and Transitive Trust:

White Paper (https://media.blackhat.com/bh-eu-12/Jarmoc/bh-eu-12-Jarmoc-SSL_TLS_Interception-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Jarmoc/bh-eu-12-Jarmoc-SSL_TLS_Interception-Slides.pdf)
Ling Chuan Lee – Chan Lee YeeGDI Font Fuzzing in Windows Kernel For Fun:

White Paper (https://media.blackhat.com/bh-eu-12/Lee/bh-eu-12-Lee-GDI_Font_Fuzzing-WP.pdf) Slides (https://media.blackhat.com/bh-eu-12/Lee/bh-eu-12-Lee-GDI_Font_Fuzzing-Slides.pdf)
Archivo (https://media.blackhat.com/bh-eu-12/Lee/bh-eu-12-Lee-GDI_Font_Fuzzing-Tool.zip)
Steve Lord – Drop It Like It’s Hotspot: Hacking Mifi Routers For Nefarious Purposes

Slides (https://media.blackhat.com/bh-eu-12/Lord/bh-eu-12-Lord-Hotspot-Slides.pdf)
Rafal Los – Shane MacDougall Offensive Threat Modeling for Attackers: Turning Threat Modeling on its Head

White Paper (https://media.blackhat.com/bh-eu-12/Los/bh-eu-12-Los-Offensive_Threat_Modeling-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Los/bh-eu-12-Los-Offensive_Threat_Modeling-Slides.pdf)
Matias Madou – Secure in 2010? Broken in 2011!

White Paper (https://media.blackhat.com/bh-eu-12/Madou/bh-eu-12-Madou-Secure10Broken11-WP.pdf)

Slides (https://media.blackhat.com/bh-eu-12/Madou/bh-eu-12-Madou-Secure10Broken11-Slides.pdf)

Mariano Nunez Di Croce – Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?

White Paper (https://media.blackhat.com/bh-eu-12/DiCroce/bh-eu-12-DiCroce-CyberAttacks_to_SAP_systems-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/DiCroce/bh-eu-12-DiCroce-CyberAttacks_to_SAP_systems-Slides.pdf)
Phil Polstra – Preventing “Oh Shit!” Moments for 20 Euros or Less

White Paper (https://media.blackhat.com/bh-eu-12/Polstra/bh-eu-12-Polstra-Preventing_Oh_Shit-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Polstra/bh-eu-12-Polstra-Preventing_Oh_Shit-Slides.pdf)
Jerome Radcliffe – Issues with Embedded Device Disclosures: Helping the Vendors and Recognizing the End-Users

White Paper (https://media.blackhat.com/bh-eu-12/Radcliffe/bh-eu-12-Radcliffe-Embedded_Disclosure-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Radcliffe/bh-eu-12-Radcliffe-Embedded_Disclosure-Slides.pdf)
Enno Rey – Daniel Mende All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Crypto Ecosystem

White Paper (https://media.blackhat.com/bh-eu-12/Rey/bh-eu-12-Rey-Call_Belong_to_Us-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Rey/bh-eu-12-Rey-Call_Belong_to_Us-Slides.pdf)
Simon Roses Femerling – Smartphone’s Apps Are Not That Smart: Insecure Development Practices

White Paper (https://media.blackhat.com/bh-eu-12/Rose/bh-eu-12-Rose-Smartphone_Apps-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Rose/bh-eu-12-Rose-Smartphone_Apps-Slides.pdf)
Paul Royal – Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis

White Paper (https://media.blackhat.com/bh-eu-12/Royal/bh-eu-12-Royal-Entrapment-WP.pdf) Slides (https://media.blackhat.com/bh-eu-12/Royal/bh-eu-12-Royal-Entrapment-Slides.pdf)
Archivo (https://media.blackhat.com/bh-eu-12/Royal/bh-eu-12-Royal-nvmtrace-Code.zip)
Rahul Sasi – IVR Security- Internal Network Attack via Phone Lines

Slides (https://media.blackhat.com/bh-eu-12/Sasi/bh-eu-12-Sasi-IVR_Security-Slides.pdf)
Archivo (https://media.blackhat.com/bh-eu-12/Sasi/bh-eu-12-Sasi-IVR_Security-Tool.zip)
Justin Searle – Dissecting Smart Meters

White Paper (https://media.blackhat.com/bh-eu-12/Searle/bh-eu-12-Searle-Smart_Meters-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Searle/bh-eu-12-Searle-Smart_Meters-Slides.pdf) Shreeraj Shah – HTML5 Top 10 Threats: Stealth Attacks and Silent Exploits

White Paper (https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-Slides.pdf)
Sumit Siddharth – Tom ForbesHacking XPATH 2.0

White Paper (https://media.blackhat.com/bh-eu-12/Siddharth/bh-eu-12-Siddharth-Xpath-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Siddharth/bh-eu-12-Siddharth-Xpath-Slides.pdf)
Alexey Sintsov – Lotus Domino: Penetration Through the Controller

White Paper (https://media.blackhat.com/bh-eu-12/Sintsov/bh-eu-12-Sintsov-Lotus_Domino-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Sintsov/bh-eu-12-Sintsov-Lotus_Domino-Slides.pdf)
Didier Stevens – Malicious PDF Analysis

White Paper (https://media.blackhat.com/bh-eu-12/Stevens/bh-eu-12-Stevens-Malicious_PDFs-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Stevens/bh-eu-12-Stevens-Malicious_PDFs-Slides.pdf)
Ben Williams – They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces

White Paper (https://media.blackhat.com/bh-eu-12/Williams/bh-eu-12-Williams-Exploiting_Gateways-WP.pdf)

Slides (https://media.blackhat.com/bh-eu-12/Williams/bh-eu-12-Williams-Exploiting_Gateways-Slides.pdf)

Chris Wysopal – Data Mining a Mountain of Zero Day Vulnerabilities

White Paper (https://media.blackhat.com/bh-eu-12/Wysopal/bh-eu-12-Wysopal-State_of_Software_Security-WP.pdf)
Slides (https://media.blackhat.com/bh-eu-12/Wysopal/bh-eu-12-Wysopal-State_of_Software_Security-Slides.pdf)
Justin Searle – Workshop: SamuraiWTF

Archivo (https://media.blackhat.com/bh-eu-12/Searle/bh-eu-12-Searle-Samurai-WTF%20.pdf)


Visto en cyberhades.com (http://www.cyberhades.com/)