Видео


Сообщение

Видео [DefCon community] Выступления и видеопрезентации с DEF CON 19 (2011) [2011, ENG]

Сообщение Nik » 22 сен 2013, 23:18

Выступления и видеопрезентации с DEF CON 19 (2011)

Год выпуска: 2011
Производитель: DefCon community
Сайт производителя: http://www.defcon.org/
Продолжительность: 20-100 мин
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: Видео, видеопрезентации и pdf-презентации с хакерской конференции DefCon 19
Даты проведения: August 4-7, 2011, место: Лас-Вегас, Rio Hotel & Casino
Содержание
Dark Tangent - Closing Ceremonies - Video and Slides
The Dark Tangent and LosTboY - Welcome - Making of the badge - Slides
Panel - Network Security Podcast - Slides
Panel - Meet The Federal Agent 2.0 - Slides
Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks - Slides
Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too - Slides
Chema Alonso and Juan Garrido - Dust Your Feed RSS Belongs To You! Avoid Censorship! - Slides
Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE - Slides
James Myrcurial Arlen - Security When Nano Seconds Count - Slides
Mike Arpaia and Ted Reed - Beat to 1337 Creating A Successful University Cyber Defense Organization - Slides
Adam Baldwin - Pillaging DVCS Repos For Fun And Profit - Slides
Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken - Slides
Bruce Grymoire Barnett - Deceptive Hacking How Misdirection Can Be Used To Steal Information Without Being Detected - Slides
Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database - Slides
Olivier Bilodeau - PacketFence The Open Source Nac What Weve Done In The Last Two Years - Slides
Emmanuel Bouillon - Federation and Empire - Slides
Sam Bowne - Three Generations of DoS Attacks - Slides
David Bryan and Luiz Eduardo - Building The DEF CON Network Making A Sandbox For 10000 Hackers - Slides
Jeff Bryner - Kinectasploit Metasploit Meets Kinect - Slides
Jamie Butler - Physical Memory Forensics for Cache - Slides
Carey Rude and Vandevanter - Metasploit vSploit Modules - Slides
George Chamales - Lives On The Line Securing Crisis Maps In Libya Sudan And Pakistan - Slides
Ming Chow - Abusing HTML5 - Slides
Mouse and Renderman - Familiarity Breeds Contempt - Slides
Christopher Cleary - Operational Use of Offensive Cyber - Slides
Tyler Cohen - Look At What My Car Can Do - Slides
Kees Cook - Kernel Exploitation Via Uninitialized Stack - Slides
Greg Conti - The Art and Science of Security Research - Slides
Paul Craig - Internet Kiosk Terminals The Redux - Slides
Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies - Slides
Daniel Crowley - Speaking with Cryptographic Oracles - Slides
Phil Cryer - Taking Your Ball And Going Home Building Your Own Secure Storage Space That Mirrors Dropbox Functionality - Slides
Panel - PCI 2 Still Compromising Controls and Compromising Security - Slides
Panel - Former Keynotes The Future - Slides
datagram - Introduction to Tamper Evident Devices - Slides
Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us - Slides
Deviant Ollam - Safe to Armed in Seconds A Study of Epic Fails of Popular Gun Safes - Slides
Whitfield Diffie and Moxie Marlinspike - Slides
Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation - Slides
Alva Skip Duckwall - A Bridge Too Far Defeating Wired 8021x with a Transparent Bridge Using Linux - Slides
Nelson Elhage - Virtualization Under Attack Breaking out of KVM - Slides
Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network - Slides
Patrick Engebretson and Josh Pauli - Mamma Dont Let Your Babies Grow Up to be Pen Testers - Slides
eskimo - Steganography and Cryptography 101 - Slides
Eston Abraham and Johnson - Dont Drop the SOAP Real World Web Service Testing for Web Hackers - Slides
Ben Feinstein and Jeff Jarmoc - Get Off of My Cloud Cloud Credential Compromise and Exposure - Slides
Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing - Slides
Gus Fritschie and Mike Wright - Getting F On the River - Slides
Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic - Slides
Daniel Garcia - UPnP Mapping - Slides
Andrew Gavin - Gone in 60 Minutes Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP - Slides
Kenneth Geers - Strategic Cyber Security An Evaluation of Nation-State Cyber Attack Mitigation Strategies - Slides
Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security - Slides
Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang - Slides
Panel - Represent Defcon Groups Hackerspaces and You - Slides
Panel - Smartfuzzing the Web Carpe Vestra Foramina - Slides
Rob Havelt and Wendel Guglielmetti Henrique - Earth vs The Giant Spider Amazingly True Stories of Real Penetration Tests - Slides
Deral Heiland - From Printer To Pwnd Leveraging Multifunction Printers During Penetration Testing - Slides
Thomas Holt and Max Kilger - Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict - Slides
Rick Howard - An Insiders Look at International Cyber Security Threats and Trends - Slides
Hubris and a5h3r4h - Anonymous Cyber War - Slides
Mikko Hypponen - The History and the Evolution of Computer Viruses - Slides
Hackajar - Economics of Password Cracking in the GPU Era - Slides
Aseem Jakhar - Jugaad Linux Thread Injection Kit - Slides
Matt Joyce - The Art of Trolling - Slides
Dan Kaminsky - Black Ops of TCPIP 2011 - Slides
Dave Kennedy - Hacking Your Victims Over Power Lines - Slides
Brian Kennish - Tracking the Trackers How Our Browsing History Is Leaking into the Cloud - Slides
Alexander Kornbrust - Hacking and Securing DB2 LUW Databases - Slides
Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet - Slides
Matt Krick - DCFluX in License to Transmit - Slides
Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia - Slides
Lawson Potter and Deviant Ollam - And Thats How I Lost My Eye Exploring Emergency Data Destruction - Slides
Grayson Lenik - Im Your MACbDaddy - Slides
Katy Levinson - Dont Fix It In Software - Slides
Steven Levy - We Owe it All to the Hackers - Slides
Ryan Linn - PIG Finding Truffles Without Leaving A Trace - Slides
David Litchfield - Hacking and Forensicating an Oracle Database Server - Slides
Johnny Long - Johnny Long and Hackers for Charity - Slides
William Manning - Pervasive Cloaking - Slides
Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security - Slides
Moxie Marlinspike - SSL And The Future Of Authenticity - Slides
Jon McCoy - Hacking Net Applications The Black Arts - Slides
Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit - Slides
John McNabb - Vulnerabilities of Wireless Water Meter Networks - Slides
Charlie Miller - Battery Firmware Hacking - Slides
Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale - Slides
Steve Ocepek - Blinkie Lights Network Monitoring with Arduino - Slides
Panel - Ask EFF The Year in Digital Civil Liberties - Slides
Kyle Osborn and Matt Johanson - Hacking Google Chrome OS - Slides
Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP - Slides
Nicole Ozer - Big Brother on the Big Screen - Slides
Nicholas Percoco and Paul Kehrer - Getting SSLizzard - Slides
Nicholas Percoco and Jibran Ilyas - Malware Freak Show 3 Theyre pwning erbody out there - Slides
Nicholas Percoco and Sean Schulte - This is REALLY not the droid youre looking for - Slides
Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit - Slides
Gregory Pickett - Port Scanning Without Sending Packets - Slides
Jason Pittman - My password is FullOfFail The Core Problem with Authentication and How We Can Overcome It - Slides
Mahmud Ab Rahman - Sneaky PDF - Slides
Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST - Slides
Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves - Slides
Michael Robinson - What Time Are You Anyway - Slides
The Dark Tangent and Russ Rogers - DEF CON Awards - Slides
Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011 - Slides
Michael Scarito - Build your own Synthetic Aperture Radar - Slides
Panel - Net Neutrality Panel - Slides
Michael theprez98 Schearer - WTF Happened to the Constitution The Right to Privacy in the Digital Age - Slides
Jason Scott - Archive Team A Distributed Preservation of Service Attack - Slides
Justin Searle - Attacking and Defending the Smart Grid - Slides
Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware - Slides
Shrdlu - Are You In Yet The CISOs View of Pentesting - Slides
Skunkworks - Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin - Slides
Reeves Smith - How Haunters Void Warranties - Slides
Panel - SCADA and PLCs in Correctional Facilities The Nightmare Before Christmas - Slides
Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin - Slides
Sumner alien and alison b - Weaponizing Cyberpsychology and Subverting Cybervetting for Fun Profit and Subterfuge - Slides
Bruce Sutherland - How To Get Your Message Out When Your Government Turns Off The Internet - Slides
Martin Holst Swende and Patrik Karlsson - Web Application Analysis With Owasp Hatkit - Slides
Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform - Slides
Richard Thieme - Staring into the Abyss The Dark Side of Crime-fighting Security and Professional Intelligence - Slides
Tobias Fiddler and Bluzmanis - Insecurity An Analysis Of Current Commercial And Government Security Lock Designs - Slides
Schuyler Towne - DIY Non-Destructive Entry - Slides
Marketa Trimble - The Future of Cybertravel Legal Implications of the Evasion of Geolocation - Slides
Shawn Webb - Runtime Process Insemination - Slides
Matt scriptjunkie Weeks - Network Nightmare Ruling The Nightlife Between Shutdown And Boot With Pxesploit - Slides
Yekaterina Tsipenyuk ONeil and Erika Chin - Seven Ways to Hang Yourself with Google Android - Slides
Jos Weyers - Key Impressioning - Slides
Thomas Wilhelm - Staying Connected during a Revolution or Disaster - Slides
Andrew Wilson and Michael Brooks - Traps of Gold - Slides
Brad Woodberg - Network Application Firewalls Exploits and Defense - Slides
Joey Zhu - Phishing and Online Scam in China - Slides
Zoz and Andrea Bianchi - Vanquishing Voyeurs Secure Ways To Authenticate Insecurely - Slides
Panel - Is it 0-day or 0-care - Slides
Файлы примеров: отсутствуют
Формат видео: m4v
Видео: AVC1, 800x600, 14.98 FPS, ~800 Kbps (avg)
Аудио: AAC, 48000 Hz, 2 ch., 16 bits, 64 Kbps
Скриншоты

Постеры

Соцсети

 

Статистика

Автор: Nik
Добавлен: 22 сен 2013, 23:18
Размер: 18.29 ГБ
Размер: 19 634 595 658 байт
Сидеров: 0
Личеров: 1
Скачали: 0
Здоровье: ???%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: 1 месяц 12 дней 3 часа 40 минут 19 секунд назад
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 124.06 КБ / Просмотров 1 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность