Aquí les dejo una lista de las nuevas tecnicas llevadas en la gran Conferencia DEFCON
Def Con es una de las mayores conferencias de hackers del mundo, con decenas de miles de asistentes al año. En esta ocasión, lograron reunirse alrededor de 17 mil personas. En este evento, hay dos reglas: solo se puede comprar con dinero en efectivo y los organizadores no pueden recoger ninguna información sobre la identidad de los asistentes.
DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf
DEFCON-25-0ctane-Untrustworthy-Hardware.pdf
DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf
DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf
DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf
DEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf
DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf
DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf
DEFCON-25-DEFCON-101-The-Panel-UPDATED.pdf
DEFCON-25-Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf
DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf
DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf
DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf
DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf
DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf
DEFCON-25-Eckert-and-Dewes-Dark-Data-UPDATED.pdf
DEFCON-25-FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf
DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf
DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf
DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf
DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf
DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf
DEFCON-25-Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf
DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf
DEFCON-25-K2-Un-Fucking-Forensics-UPDATED.pdf
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf
DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf
DEFCON-25-Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf
DEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf
DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf
EFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf
EFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf
DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf
DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf
DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf
DEFCON-25-Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf
DEFCON-25-Plore-Popping-a-Smart-Gun-UPDATED.pdf
DEFCON-25-Plore-Popping-a-Smart-Gun.pdf
DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf
DEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf
DEFCON-25-Redezem-PEIMA-Using-Power-Laws-to-Address-DOS-Attacks-UPDATED.pdf
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf
DEFCON-25-Sean-Kanuck-Hacking-Democracy-UPDATED.pdf
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf
DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf
DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf
DEFCON-25-Tess-Schrodinger-Total-Recall.pdf
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf
DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf
DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf
DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf
DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf
DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf
DEFCON-25-Zardus-25-Years-of-Program-Analysis-UPDATED.pdf
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf
DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf
DEFCON-25-trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf
DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf
Danos tu reacción




