DEFCON 18 [2010, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям

<t>Оценка торрента</t>

Голосов нет
Голосов нет
Голосов нет
Голосов нет
Голосов нет
Всего голосов: 0

Торрент Сидеров Личеров Размер
1 3 15.9 ГБ
Аватара пользователя
Сообщения: 14754
Зарегистрирован: 26 ноя 2011, 13:44

DEFCON 18 [2010, ENG]

Сообщение master » 09 июн 2012, 20:04

Выступления и видеопрезентации с DEF CON 18 (2010)
Год выпуска: 2010
Производитель: DefCon community
Сайт производителя:
Продолжительность: 20-100 мин
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: Видео и видеопрезентации с хакерской конференции DefCon 18
Даты проведения: July 30 - August 1, 2010, место: Лас-Вегас, Riviera Hotel & Casino
A.P. Delchi - Physical Security You Are Doing It Wrong
Adam Pridgen and Matt Wollenweber - Toolsmithing an IDA Bridge
Adrian Crenshaw - Programmable HID USB Keystroke Dongle
Ahn Ki-Chan and Ha Dong-Joo - Malware Migrating to Gaming Consoles
Andrew Kongs and Dr. Gerald Kane - Training the Next Generation of Hardware Hackers
Barnaby Jack - Jackpotting Automated Teller Machines Redux
Blake Self and bitemytaco - Hacking DOCSIS For Fun and Profit
Blake Self with Wayne and Dolores Zage - SMART Project
Brad Smith - Weaponizing Lady GaGa
Brandon Nesbit - The Games We Play
Bruce Potter and Logan Lodge - This Needs to be Fixed
Cesar Cerrudo - Token Kidnappings Revenge
Chad Houck and Jason Lee - Decoding reCAPTCHA
Charlie Miller - Kim Jong-il and Me
Chema Alonso and Jose Palazon - Connection String Parameter Attacks
Chema Alonso and Jose Palazon - FOCA2 The FOCA Strikes Back
Chris Conley - Hacking Facebook Privacy
Chris Paget - Extreme-Range RFID Tracking
Chris Paget - Practical Cellphone Spying
Craig Heffner - How to Hack Millions of Routers
Daniel Burroughs - Open Public Sensors and Trend Monitoring
Dan Kaminsky - Black Ops Of Defense Web Edition
Dark Tangent and Joe Grand - Welcome and Making the Badge
Dave King - Hardware Hacking for Software Guys
David Bryan and Michael Anderson - Cloud Computing and a WMD
David C Smith and Samuel Petreski - A New Approach to Forensic Methodology
David Kennedy and Josh Kelley - Powershell omfg
David Maynor and Paul Judge - Searching for Malware
Decius - Exploiting Internet Surveillance Systems
Dennis Brown - How Hackers Won the Zombie Apocalypse
Dennis Brown - Resilient Botnet Command and Control with Tor
Deviant Ollam and Toool - The Search for Perfect Handcuffs
Dondi West - Adequacy of the Laws Related to Cyber Warfare
Doug Mohney - HD Voice - The Overdue Revolution
Elie Bursztein and Jocelyn Lagarenne - Kartograph
Elie Bursztein and Panel - Bad Memories
Esteban Martinez Fayo - Hacking and Protecting Oracle Database Vault
Felix FX Lindner - Blitzableiter
Ferdinand Schober - Gaming in the Glass Safe
Francisco Amato and Federico Kirschbaum - Evilgrade and You Still Have Pending Upgrades
frank^2 - Trolling Reverse-Engineers with Math
Frank Breedijk - Seccubus - Analyzing Vulnerability Assessment Data the Easy Way
Fyodor and David Fifield - Mastering the Nmap Scripting Engine
Garry Pejski - My Life as a Spyware Developer
G Mark Hardy - Tales from the Crypto
Granick Bankston Hofmann and Opsahl - The Law of Laptop Search and Seizure
Greg Conti - Our Instrumented Lives
HONEY - Ripping Media Off Of the Wire
Huang Chiu and Wu - 0box Analyzer
Iftach Ian Amit- Cyber Crime War Charting Dangerous Waters
Itzhak Avraham Exploitation on ARM
Jack Daniel and Panel - PCI and Compromising Controls and Compromising Security
James Arlen - SCADA and ICS How to Avoid Cyberdouchery
James Shewmaker - Browser Based Defenses
Jason Scott - You are Stealing It Wrong 30 Years of Inter-Pirate Battles
Jayson E Street - Deceiving the Heavens to Cross the Sea
Jeff Bryner - Google Toolbar The NARC Within
Jennifer Granick and Matt Zimmerman - Legal Developments in Hardware Hacking
Jeongwook Oh - Exploit Spotting Locating Vulnerabilities Out of Vendor Patches Automatically
Jeremy Brown - Exploiting SCADA Systems
Jimi Fiekert - The Anatomy of Drug Testing
Jim Rennie and Eric Rachner - Search & Seizure & Golfballs
Joe Damato - Function Hooking for Mac OSX and Linux
John Curran - IPv6 No Longer Optional
John McNabb - Cyberterrorism and the Security of the National Drinking Water Infrastructure
Jonathan Lee and Neil Pahl - Bypassing Smart-Card Authentication and Blocking Debiting
Jon McCoy - Hacking Net Applications A Dynamic Attack
Jon Oberheide - Antique Exploitation aka Terminator
Joseph McCray - You Spent All That Money and You Still Got Owned
Josh Pyorre and Chris McKenney - Build Your Own Security Ops Center - Audio.m4b
Josh Pyorre and Chris McKenney - Build Your Own Security Ops Center
Joshua Marpet - Facial Recognition
Joshua Wise - From No Way to 0-day
JP Dunning - Breaking Bluetooth by Being Bored
JP Dunning - Katana Portable Multi-Boot Security Suite
Justin Morehouse and Tony Flick - Getting Social with the Smart Grid
Kenneth Geers - Live Fire Exercise Baltic Cyber Shield 2010
Kevin Mahaffey and John Hering - App Attack
Lai Appelbaum and Oberheide - The Power of Chinese Security
Leigh Honeywell and follower - Physical Computing and Virtual Security
Lineberry Richardson and Wyatt - These Aren't the Permissions
Luiz Eduardo -Your Boss is a Douchebag How About You
Mage2 - Electronic Weaponry
Marcia Hofmann - How To Get Your FBI File
Marco Bonetti - Mobile Privacy
Marisa Fagan - Be a Mentor
Matias Madou and Jacob West - Repelling the Wily Insider
Matt Krick - DCFluX in Moon-Bouncer
Matt Ryanczak - Implementing IPv6 at ARIN
Max Kelly - Perspectives in Cybersecurity and Cyberwarfare
Md Sohail Ahmad - WPA Too
metr0 - Securing MMOs
Michael Brooks - masSEXploitation
Michael Schearer - SHODAN for Penetration Testers
Mike Bailey - Web Services We Just Do Not Need
Mike Metzger - Letting the Air Out of Tire Pressure Monitoring Systems
Monta Elkins - Hacking with Hardware Introducing URFUKED
Moxie Marlinspike - Changing Threats To Privacy From TIA to Google
Nathan Hamiel and Marcin Wielgoszewski - Constricting the Web
Nguyen Anh Quynh - Operating System Fingerprinting for Virtual Machines
Nicholas J. Percoco and Christian Papathanasiou - This is Not the Droid You are Looking For
Nicholas J. Percoco and Jibran Ilyas - Malware Freak Show 2
Nicole Ozer and Kevin Bankston - Big Brother on the Big Screen
Oren Isacson and Alfredo Ortega - Exploiting Digital Cameras
Panel - ChaosVPN for Playing CTFs
Panel - Defcon Security Jam III Now in 3-D
Panel - DNS Systemic Vulnerabilities and Risk Management
Panel- Meet the EFF
Panel - Meet the Feds - CSI TCP IP
Panel - Meet the Feds - Policy Privacy Deterrence and Cyber War
Panel - oCTF 5 years in 50 minutes
Panel - Of Bytes and Bullets
Patrick Mullen and Ryan Pentney - Open Source Framework for Advanced IDS
Paul Haas - Advanced Format String Attacks
Peter Eckersley - How Unique Is Your Browser
Peter Eckersley and Jesse Burns - An Observatory for the SSLiverse
Pierce Goldy aSmig and sanitybit - WiMAX Hacking 2010
Polk Malkewicz and Novak - Industrial Cyber Security
Rain and urbanmonkey -Build a Lie Detector
Richard Thieme - Getting Root Remote Viewing and Non-Local Consciousness
Rich Smith - In-memory Reverse Engineering for Obfuscated Python
Righter Kunkel - Air Traffic Control Insecurity
Riley Repko - Enough Cyber Talk Already
Robert Edmonds and Paul Vixie - Passive DNS Hardening
Rob Ragan and Francis Brown - Lord of the Bing
Ryan Linn - Multiplayer Metasploit
Sam Bowne - Who Cares About IPv6
Samy Kamkar - How I Met Your Girlfriend
Schuyler Towne and datagram - Attack the Key and Own the Lock
Scott Wolchok - Crawling BitTorrent DHTs for Fun
Shawn Merdinger - We Dont Need No Stinkin Badges
Shawn Moyer and Nathan Keltner - Wardriving the Smart Grid
Sho Ho - FOE The Release of Feed Over Email
Smith Ames and Lai - Balancing the Pwn Trade Deficit
Stracener Barnum and Peterson - So Many Ways to Slap A Yo-Ho
Sumit Siddharth - Hacking Oracle From Web Apps
The Suggmeister - Social Networking Special Ops
Tobias Bluzmanis and Fiddler - Locks Lies and Videotape
Tottenkoph - VirGraff101 An Intro to Virtual Graffiti
Tyler Krpata - Like a Boss Attacking JBoss
Wayne Huang - Drivesploit
Wayne Huang and Kuon Ding - No SQL No Injection
Weigand Renderman and Kershaw - Build your own UAV 2.0
Zoz - Pwned By The Owner
Файлы примеров: отсутствуют
Формат видео: m4v
Видео: AVC1, 1024x600, ~400 Kbps (avg)
Аудио: AAC, 44100 Hz, 2 ch., 16 bits, 1 411 Kbps
У вас нет необходимых прав для просмотра вложений в этом сообщении.