miércoles, 3 de abril de 2013

BlaCkHaT - Europa 2013


Hace algunos días se realizo la conferencia mas esperado por las personas que están muy interesados en el tema de la seguridad informática. Para los que no conocen acerca de BlaCkHaT, esta es una conferencia donde los expositores dan a conocer algún tipo de herramienta creado por ellos mismo y a la vez exponiendo exploits y vulnerabilidades muy peligrosos para sistemas informáticos que se pensaban que eran seguro.

Bueno la conferencia de BlaCkHat Europe 2013 tuvo lugar este año en  Krasnapolsky, Amsterdam, Países Bajos.

El NH Grand Hotel Krasnapolsky en Ámsterdam Hotel está situado en el corazón de la ciudad, justo en la plaza central, y en esta ocasión tuvo lugar a una de las mas importantes conferencias de seguridad informática del mundo.

Bueno a continuación voy a exponer las presentación que tuvieron lugar en dicha conferencia.Comenzemos.





1.- A Perfect CRIME? Only TIME Will Tell 

 Presented By :

  • Tal Be'ery
  • Amichai Shulman

White Paper : https://media.blackhat.com/eu-13/briefings/Beery/bh-eu-13-a-perfect-crime-beery-wp.pdf

Presentation : https://media.blackhat.com/eu-13/briefings/Beery/bh-eu-13-a-perfect-crime-beery-slides.pdf


2.- Advanced Heap Manipulation in Windows 8

Presented By :

  • Zhenhua 'Eric' Liu


Presentation : https://media.blackhat.com/eu-13/briefings/Liu/bh-eu-13-liu-advanced-heap-slides.pdf


3.- Building a Defensive Framework for Medical Device Security

Presented By :

  • Jay Radcliffe

4.- The Deputies Are Still Confused

Presented By :

  • Rich Lundeen




5.- DropSmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless.

Presented By :

  • Simon Roses Femerling
  • Curro Marquez 


7.- Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic.

Presented By :

  • Tobias Jeske




8.- Hacking Appliances: Ironic exploitation of security products.

Presented By :

  • Ben Williams




9.- Hacking Video Conferencing Systems.

Presented By :




10.- Hardening Windows 8 apps for the Windows Store.

Presented By :

  • Bill Sempf



11.- Harnessing GP²Us – Building Better Browser Based Botnets.

Presented By :

  • Marc Blanchou



12.- Honeypot That Can Bite: Reverse Penetration.

Presented By :

  • Alexey Sintsov




13 .- Huawei - Fron China in Love.

Presented By :

  • Nikita Tarakanov
  • Oleg Kupreev

14.- Hybrid Defense: How to Protect Yourself From Polymorphic 0-days.

Presented By :

  • Svetlana Gaivoronski
  • Dennis Gamayunov





15.- Invisibility Purge – Unmasking the Dormant Events of Invisible Web Controls – Advanced Hacking Methods for Asp.Net, Mono and RIA.

Presented By :

  • Shay Chen




16.- Let’s Play – Applanting.

Presented By :

  • Ajit Hatti




17.- The M2M Risk Assessment Guite, a Cyber Fast Track Proyect.

Presented By :

  • Don A. Bailey

18.- Mesh Stalkings-Penetration Testing with Small Networked Devices.

Presented By :

  • Phil Polstra




19.- Multiplayer Online Games Insecurity.

Presented By :

  • Thomas Roth 

21.- Off Grid communications with Android – Meshing the mobile world.

Presented By :

  • Josh Thomas
  • Jeff Robble




22.- Optisig : Semantic Signature for Metamorphic Malware.

Presented By :

  • Nguyen Anh Quynh

23.- Practical Attacks Against MDM Solutions.

Presented By :

  • Daniel Brodie
  • Michael Shaulov




24.- Power Analysis Attacks for Cheapskates.

Presented By :

  • Colin O'Flynn





25.- Practical Exploitation Using A Malicious Service Set Identifier (SSID).

Presented By :

  • Deral Heiland




26.- The Sandbox Roulette – Are You Ready For The Gamble?

Presented By :

  • Rafal Wojtczuk
  • Rahul Kashyap



27.- To Dock Or Not To Dock, That is the question : Using laptop docking stations as Hardware-Based Attack Platforms.

Presented By :

  • Andy Davis


28.- Using D-Space To Open Doors.

Presented By :

  • Brad Antoniewicz


29.- XML Out-of-Band Data Retrieval.

Presented By :

  • Alexey Osipov
  • Timur Yunusov




30.- Who’s Really Attacking Your ICS Devices?

Presented By :

  • Kyle Wilhoit




31.- Advanced iOS Application Pentesting.

Presented By :

  • Vivek Ramachandran



32.- Application Development Secure Coding Workshop.

Presented By :

  • Jim Manico



33 .- Assessing BYOD with the Smartphone Pentest Framework.

Presented By :






Bueno con esto finalizamos las presentaciones que se dieron en BlaCkHaT Europe 2013, espero que puedan puedan darse un tiempo para leer y analizar los archivos presentados en este post. (Si uno quiere aprender, no importa el idioma.)














1 comentario: