Vivir en esta profesión es vivir en un examen constante. Día tras día hay que estudiar y prepararse nuevos temas. Las tecnologías nacen y como las cucarachas crecen, se reproducen y mueren. En ese camino que llevan, nosotros tenemos que conocerlas. Hoy, mientras leía y descubría las soluciones que siguen llegando al juego del XSS (TheSur y Sealteam, ok a vuestra última solución) me he topado con que ya están publicadas todas las presentaciones de las conferencias de Blackhat que tuvieron lugar hace un par de semanas en Washinton. Como siempre un monton de cosas chulas junto con otras que no se ni por dónde cogerlas de mi poco conocimiento sobre ellas. Así que, deja de vagear y ponte a estudiar.
Blackhat DC 2008 presentations
- Birds of a Feather #1 - CyberCOPS (Not the TV series)
- Keynote - Quest for the Holy Grail.
- Birds of a Feather #2 - Cyber Commission Recommendations
- Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking
- Botnet Population and Intelligence Gathering Techniques
- Side Channel Analysis on Embedded Systems. Impact and countermeasures
- Bad Sushi - Beating Phishers at Their Own Game
- Entertainment Talk - Social Engineering
- IO in the Cyber Domain, Immunity Style
- Biometric and Token-Based Access Control Systems
- The latest phishing challenges related to IRS
- Threats to the 2008 Presidential Election
- Developments in Cisco IOS Forensics
- Cracking GSM
- Hacking VoIP through IPSec Tunnels
- A Picture's Worth: Digital Image Analysis
- SCADA Security
- RFIDIOts!!! -Practical RFID hacking (without soldering irons)
- Oracle Security
- URI Use and Abuse
- Analyzing an Unknown RF-Based Data Transmission (aka: Fun with 27Mhz wireless keyboards)
- (un)Smashing the Stack: Overflows, Countermeasures, and the Real World
- Exploiting Live Virtual Machine Migration
- Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
- Security Failures in Secure Devices
- Preparing for the Cross Site Request Forgery Defense
- DTRACE: The Reverse Engineer's Unexpected Swiss Army Knife
- Classification and Detection of Application Backdoors
Saludos Malignos!
Blackhat DC 2008 presentations
- Birds of a Feather #1 - CyberCOPS (Not the TV series)
- Keynote - Quest for the Holy Grail.
- Birds of a Feather #2 - Cyber Commission Recommendations
- Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking
- Botnet Population and Intelligence Gathering Techniques
- Side Channel Analysis on Embedded Systems. Impact and countermeasures
- Bad Sushi - Beating Phishers at Their Own Game
- Entertainment Talk - Social Engineering
- IO in the Cyber Domain, Immunity Style
- Biometric and Token-Based Access Control Systems
- The latest phishing challenges related to IRS
- Threats to the 2008 Presidential Election
- Developments in Cisco IOS Forensics
- Cracking GSM
- Hacking VoIP through IPSec Tunnels
- A Picture's Worth: Digital Image Analysis
- SCADA Security
- RFIDIOts!!! -Practical RFID hacking (without soldering irons)
- Oracle Security
- URI Use and Abuse
- Analyzing an Unknown RF-Based Data Transmission (aka: Fun with 27Mhz wireless keyboards)
- (un)Smashing the Stack: Overflows, Countermeasures, and the Real World
- Exploiting Live Virtual Machine Migration
- Scanning Applications 2.0 - Next Generation Scan, Attacks and Tools
- Security Failures in Secure Devices
- Preparing for the Cross Site Request Forgery Defense
- DTRACE: The Reverse Engineer's Unexpected Swiss Army Knife
- Classification and Detection of Application Backdoors
Saludos Malignos!
No hay comentarios:
Publicar un comentario