Aquí les dejo una lista de las nuevas tecnicas llevadas  en la gran Conferencia DEFCON

Def Con es una de las mayores conferencias de hackers del mundo, con decenas de miles de asistentes al año. En esta ocasión, lograron reunirse alrededor de 17 mil personas. En este evento, hay dos reglas: solo se puede comprar con dinero en efectivo y los organizadores no pueden recoger ninguna información sobre la identidad de los asistentes.

DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf

DEFCON-25-0ctane-Untrustworthy-Hardware.pdf

DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf

DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf

DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf

DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf

DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf

DEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf

DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf

DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf

DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf

DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf

DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf

DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf

DEFCON-25-Closing-Slides.pdf

DEFCON-25-DEFCON-101-The-Panel-UPDATED.pdf

DEFCON-25-Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf

DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf

DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf

DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf

DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf

DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf

DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf

DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf

DEFCON-25-Eckert-and-Dewes-Dark-Data-UPDATED.pdf

DEFCON-25-FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf

DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf

DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf

DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf

DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf

DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf

DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf

DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf

DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf

DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf

DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf

DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf

DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf

DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf

DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf

DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf

DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf

DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf

DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf

DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf

DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf

DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf

DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf

DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf

DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf

DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf

DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf

DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf

DEFCON-25-Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf

DEFCON-25-Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf

DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf

DEFCON-25-K2-Un-Fucking-Forensics-UPDATED.pdf

DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf

DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf

DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf

DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf

DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf

DEFCON-25-Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf

DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf

DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf

DEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf

DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf

EFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf

DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf

DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf

DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf

DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf

EFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf

DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf

DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf

DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf

DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf

DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf

DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser in-Trending-Programming-Languages-UPDATED.pdf

DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf

DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf

DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf

DEFCON-25-Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf

DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf

DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf

DEFCON-25-Plore-Popping-a-Smart-Gun-UPDATED.pdf

DEFCON-25-Plore-Popping-a-Smart-Gun.pdf

DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf

DEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf

DEFCON-25-Redezem-PEIMA-Using-Power-Laws-to-Address-DOS-Attacks-UPDATED.pdf

DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf

DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf

DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf

DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf

DEFCON-25-Sean-Kanuck-Hacking-Democracy-UPDATED.pdf

DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf

DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf

DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf

DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf

DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf

DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf

DEFCON-25-Tess-Schrodinger-Total-Recall.pdf

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf

DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf

DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf

DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf

DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf

DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf

DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf

DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf

DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf

DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf

DEFCON-25-Zardus-25-Years-of-Program-Analysis-UPDATED.pdf

DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf

DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf

DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf

DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf

DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf

DEFCON-25-spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf

DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf

DEFCON-25-trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf

DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf

Danos tu reacción

0
Me encanta
0
Me alegra
0
Me sorprende
0
Me entristese
0
Me enoja