DEFCON 18 : télécharger les présentations, documents, outils et extras

La 18 eme édition du DEFCON, l’une des plus prestigieuse conférence de sécurité s’est tenu du 31 juillet au 1 er aout 2010 a las Vegas .

Voici le programme ainsi que la liste des liens pour télécharger toutes les présentations, documents, outils et les extras.

En téléchargement direct : Documents séparés
En téléchargement direct : Tout les document dans un seul zip 530 Mega
En Téléchargement torrent : Documents séparés
En Téléchargement torrent : Un seul document 600 Mega

• A New Approach to Digital Forensic Methodology And !!BUSTED!! Case studies David C. Smith Samuel Petreski
• A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare. Dondi ―spookdoctor06‖ West
• Advanced Format String Attacks Presented by Paul Haas
• Air Traffic Control Insecurity 2.0 Righter Kunkel
• Analyzing vulnerability assessment data the easy way… Schuberg Philis Seccubus
• Attack the Key Own the Lock. datagram & Schuyler Towne
• Attacking .NET Applications at Runtime Jon McCoy
• Attacking JBoss like a Boss Krpata
• au.bug William-LeGrand
• Be a Mentor Marisa Fagan InfoSec Mentors Project
• BlindElephant:Web Application Fingerprinting With Static Files Patrick Thomas
• Blitzableiter –BETA Release Countering Flash Exploits Felix « FX » Lindner
• Browser Based Defenses x06d
• Build a Lie Detector / Beat a Lie Detector. Rain, J03b34r
• Building a Security Operations Center with little or no money. Pyorre
• Changing Threats To Privacy Marlinspike
• Cloud ComputingA Weapon of Mass Destruction? David M. N. Bryan
• Connection Strings Chema Alonso Informática 64
• Constricting the Web. Offensive Python for Web Hackers Nathan Hamiel, Marcin Wielgoszewski
• Crawling Bittorrent DHTs for Fun and Profit Scott Wolchok
• Cyber [Crime|War] Connecting the dots Iftach Ian Amit Managing Partner, Security & Innovation
• Cyberterrorism & the Security of the National Drinking Water Infrastructure John McNabb
• DCFluX in: Moon-Bouncer Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc.
• Defcon Comedy Jam 3D Or Not 3D? PANEL
• Electronic Weapons Tim Otto, aka mage2
• Embedded devices, an AntiVirus-free safe hideout for Malware Ahn Ki-Chan, Ha Dong-Joo
• evilgrade, « You STILL have pending upgrades!“ Francisco Amato / Federico Kirschbaum
• Exploitable Assumptions Doktor Zoz, Dr. Foley, and Eric Schmiedl
• Exploitation on ARM Technique and bypassing defense mechanisms STRI/Advance Technology Lab/Security
• Exploiting Digital Cameras Oren Isacson, Alfredo Ortega
• Exploiting Internet Surveillance Systems Decius
• Exploiting SCADA Systems JBrown
• Exploiting WebSphere Application Server’s JSP Engine Schaller
• ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh
• Extras java by Lee-Pahl
• F.O.E.Feed Over Email A Proxy-less RSS Reader For Users in Internet Censored Countries Sho Ho
• Function hooking for OSX and Linux Joe Damato
• Gaming in the glass safe. Games, DRM, and Privacy. Ferdinand Schober
• Go Go Gadget Python Nick Waite FurkanCayçı
• Google Toolbar: The NARC Within gtoolbarsnoop.py Bryner
• Hacking and protecting Oracle Database Vault Esteban Martínez Fayó
• Hacking DOCSIS for Fun and Profit Blake SElf Bytemytaco
• Hacking Oracle from web apps Sumit Siddharth, Aleksander Gorkowienko
• Hacking The Future: Weaponizing the Next Generation PANEL
• Hardware Black Magic:Designing Printed Circuit Boards Dr. Fouad (Dr. K) Kiamilev, Corey (c0re) Lange, Stephen (afterburn) Janansky
• Hardware Hacking for us dumb software guys Arduinos
• How To Get Your FBI File (and Other Information You Want From the Federal Government) Hofmann
• How to Hack Millions of Routers Craig Heffner
• How Unique is Your Browser? a report on the Panopticlick experiment Peter Eckersley
• Improving Antivirus Accuracy with Hypervisor Assisted Analysis Danny Quist
• Industrial Cyber Security From the Perspective of the Power Sector Revision 1 Wade Polk.Paul Malkewicz.Jaroslav Novak
• INSECURITY ENGINEERING: Locks, Lies, and Videotape Tobias-Fiddler-Bluzmanis
• IPv6: No Longer Optional John CurranPresident & CEO ARIN
• IPv6@ARIN Matt Ryanczak
• Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller
• Kartograph Elie Bursztein and Jocelyn Lagarenne Stanford University
• Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010
• KenjiUrada
• Letting the Air Out of Tire Pressure Monitoring Systems Mike MetzgerKim Jong
• Live fire exercise:Baltic Cyber Shield 2010 Kenneth Geers
• Lord of the Bing Taking Back Search Engine Hacking From Google and Bing Francis Brown and Rob Ragan Stach & Liu, LLC
• Malware Freakshow 2 Nicholas J. Percoco & Jibran Ilyas
• Mastering the Nmap Scripting Engine Fyodor and David Fifield
• Mind Games Extras by Theime
• Mobile Privacy: Tor On The iPhone And Other Unusual Devices Marco Bonetti – CutAway s.r.l.
• Multiplayer Metasploit Tag-Team Pen Testing and Reporting Ryan Linn
• My Life As A Spyware Developer Why I’m Probably Going to Hell Pejski
• Open Data Source Analysis Daniel “whopis” Burroughs
• Operating System Fingerprinting for Virtual Machines Nguyen Anh Quynh
• PCI: Compromising Controls and Compromising Security PANEL
• PHP-Nuke_exploit.php.php Brooks
• Physical Security (You’re Doing It Wrong) A.P. Delchi
• Programmable HID USB Keyboard House for pen-testing Adrian Crenshaw
• Pwned by the Owner Zoz
• ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode Rich Smith
• Razorback Mullen-Pentney
• Repelling the Wily Insider Matias Madou
• Resilient Botnet Command and Control with Tor Dennis Brown
• SCADA and ICS for Security Experts: How to Avoid Cyberdouchery James Arlen, CISA
• Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims Paul Judge, David Maynor
• Securing MMOs A Security rofessional’s View From the Inside
• Security Measurement and Assuring Reliability through metrics Technology ( SMART) Applying Reliability Metrics to Security Vulnerabilities Wayne Zage, Dolores Zage, Blake Self
• SHODAN for Penetration Testers Michael “theprez98” Schearer
• Sniper Forensics “One Shot, One Kill” Christopher E. Pogue – Trustwave
• So Many Ways to Slap a YoHo: Hacking Facebook & YoVille Tom Stracener “Strace”, EvilAdamSmith, Sean Barnum
• Social Engineering. Street
• Tales from the Crypto G. Mark Hardy
• The Anatomy of Drug Testing Fiekert
• The Year of HD Voice –2010 Who, what, where, how? (Actually, who, how, where, what) Doug Mohney
• This is not the droid you’re looking for… Nicholas J. Percoco & Christian Papathanasiou
• This needs to be fixed. Jokes, vulnerabilities, and analysis of commit statements. Logan Lodge, Bruce Potter
• Token Kidnapping’s Revenge Cesar Cerrudo Argeniss
• TOOLSMITHING AN IDA BRIDGE: A TOOL BUILDING CASE STUDY Adam Pridgen Matt Wollenweber
• Training the Next Generation of Hardware Hackers Teaching Computer Organization and Assembly Language Hands-On with Embedded Systems Kongs-Kane
• Trolling with Math frank^2
• Universal RF Usb Keyboard Emulation Device URFUKED by Monta Elkins
• VirGraf101:An Introduction to Virtual Graffiti Tottenkoph
• Wardriving the smart Grid. Practical approaches to attacking utility packet radios Shawn Moyer,Nathan Keltner
• We don’t need no stinkin’ badges! Hacking electronic door access controllers Shawn Merdinger
• Weaponizing Lady GaGa PsychoSonic Attacks BSmith
• Web Services We Just Don’t Need Mike Bailey
• Who Cares About IPv6? Sam Bowne City College San Francisco
• WiMAX Hacking 2010 Pierce Goldy aSmig
• WPA Too! Md Sohail Ahmad, AirTight Networks
• You Spent All That Money …And You Still Got Owned Joe McCray
• Your boss is a douchebag…How about you?

Merci a Mila Parkour du blog contagiodum pour avoir assembler tous les documents sur MediaFire.

Articles similaires

7 thoughts on “DEFCON 18 : télécharger les présentations, documents, outils et extras

  1. Bonjour, y\’a t\’il un tuto qui expliquerait comment utilisé Ces outils ? & merci pour ces infos =)

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *