Hace algunos días se realizo la conferencia mas esperado por las personas que están muy interesados en el tema de la seguridad informática. Para los que no conocen acerca de BlaCkHaT, esta es una conferencia donde los expositores dan a conocer algún tipo de herramienta creado por ellos mismo y a la vez exponiendo exploits y vulnerabilidades muy peligrosos para sistemas informáticos que se pensaban que eran seguro.
Bueno la conferencia de BlaCkHat Europe 2013 tuvo lugar este año en Krasnapolsky, Amsterdam, Países Bajos.
El NH Grand Hotel Krasnapolsky en Ámsterdam Hotel está situado en el corazón de la ciudad, justo en la plaza central, y en esta ocasión tuvo lugar a una de las mas importantes conferencias de seguridad informática del mundo.
Bueno a continuación voy a exponer las presentación que tuvieron lugar en dicha conferencia.Comenzemos.
1.- A Perfect CRIME? Only TIME Will Tell
Presented By :
- Tal Be'ery
- Amichai Shulman
Presentation : https://media.blackhat.com/eu-13/briefings/Beery/bh-eu-13-a-perfect-crime-beery-slides.pdf
2.- Advanced Heap Manipulation in Windows 8
Presented By :
- Zhenhua 'Eric' Liu
Presentation : https://media.blackhat.com/eu-13/briefings/Liu/bh-eu-13-liu-advanced-heap-slides.pdf
3.- Building a Defensive Framework for Medical Device Security
Presented By :
- Jay Radcliffe
4.- The Deputies Are Still Confused
Presented By :
- Rich Lundeen
White paper : https://media.blackhat.com/eu-13/briefings/Lundeen/bh-eu-13-deputies-still-confused-lundeen-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Lundeen/bh-eu-13-deputies-still-confused-lundeen-slides.pdf
5.- DropSmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless.
Presented By :
- Jacob Williams
White Paper : https://media.blackhat.com/eu-13/briefings/Williams/bh-eu-13-dropsmack-jwilliams-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Williams/bh-eu-13-dropsmack-jwilliams-slides.pdf
6.- Dude, Where's my laptop?
- Simon Roses Femerling
- Curro Marquez
7.- Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic.
Presented By :
- Tobias Jeske
White Paper : https://media.blackhat.com/eu-13/briefings/Jeske/bh-eu-13-floating-car-data-jeske-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Jeske/bh-eu-13-floating-car-data-jeske-slides.pdf
8.- Hacking Appliances: Ironic exploitation of security products.
Presented By :
- Ben Williams
White Paper : https://media.blackhat.com/eu-13/briefings/B_Williams/bh-eu-13-hacking-appliances-bwilliams-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/B_Williams/bh-eu-13-hacking-appliances-bwilliams-slides.pdf
9.- Hacking Video Conferencing Systems.
Presented By :
- Moritz Jodeit
Presentation : https://media.blackhat.com/eu-13/briefings/Jodeit/bh-eu-13-hacking-video-jodeit-slides.pdf
10.- Hardening Windows 8 apps for the Windows Store.
Presented By :
- Bill Sempf
White Paper : https://media.blackhat.com/eu-13/briefings/Sempf/bh-eu-13-hardening-your-windows-sempf-wp.pdf
11.- Harnessing GP²Us – Building Better Browser Based Botnets.
Presented By :
- Marc Blanchou
Presentation : https://media.blackhat.com/eu-13/briefings/Blanchou/bh-eu-13-harnessing-gpus-blanchou-slides.pdf
12.- Honeypot That Can Bite: Reverse Penetration.
Presented By :
- Alexey Sintsov
Presentation : https://media.blackhat.com/eu-13/briefings/Sintsov/bh-eu-13-honeypot-sintsov-slides.pdf
13 .- Huawei - Fron China in Love.
Presented By :
- Nikita Tarakanov
- Oleg Kupreev
14.- Hybrid Defense: How to Protect Yourself From Polymorphic 0-days.
Presented By :
- Svetlana Gaivoronski
- Dennis Gamayunov
White Paper : https://media.blackhat.com/eu-13/briefings/Gaivoronski/bh-eu-13-hybrid-defense-gaivoronski-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Gaivoronski/bh-eu-13-hybrid-defense-gaivoronski-slides.pdf
File 1 : https://media.blackhat.com/eu-13/briefings/Gaivoronski/demorpheus-demorpheus-gaivoronski.zip
15.- Invisibility Purge – Unmasking the Dormant Events of Invisible Web Controls – Advanced Hacking Methods for Asp.Net, Mono and RIA.
Presented By :
- Shay Chen
Presentation : https://media.blackhat.com/eu-13/briefings/Chen/bh-eu-13-invisibility-purge-chen-slides.pdf
File 4 : https://media.blackhat.com/eu-13/briefings/Chen/ViewStateControls-v1.0-DemoWebApp-VSProject-chen.zip
16.- Let’s Play – Applanting.
Presented By :
- Ajit Hatti
17.- The M2M Risk Assessment Guite, a Cyber Fast Track Proyect.
Presented By :
- Don A. Bailey
18.- Mesh Stalkings-Penetration Testing with Small Networked Devices.
Presented By :
- Phil Polstra
White Paper : https://media.blackhat.com/eu-13/briefings/Polstra/bh-eu-13-mesh-stalkings-penetration-polstra-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Polstra/bh-eu-13-mesh-stalkings-penetration-polstra-slides.pdf
19.- Multiplayer Online Games Insecurity.
Presented By :
- Donato Ferrante
- Luigi Auriemma
White Paper : https://media.blackhat.com/eu-13/briefings/Ferrante/bh-eu-13-multiplayer-online-games-ferrante-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Ferrante/bh-eu-13-multiplayer-online-games-ferrante-slides.pdf
20.- Next Generation Mobil Roottkits
- Thomas Roth
21.- Off Grid communications with Android – Meshing the mobile world.
Presented By :
- Josh Thomas
- Jeff Robble
White Paper : https://media.blackhat.com/eu-13/briefings/Thomas/bh-eu-13-off-grid-communication-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Thomas/bh-eu-13-off-grid-communication-slides.pdf
22.- Optisig : Semantic Signature for Metamorphic Malware.
Presented By :
- Nguyen Anh Quynh
23.- Practical Attacks Against MDM Solutions.
Presented By :
- Daniel Brodie
- Michael Shaulov
White Paper : https://media.blackhat.com/eu-13/briefings/Brodie/bh-eu-13-lacoon-attacks-mdm-brodie-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Brodie/bh-eu-13-lacoon-attacks-mdm-brodie-slides.pdf
24.- Power Analysis Attacks for Cheapskates.
Presented By :
- Colin O'Flynn
White Paper : https://media.blackhat.com/eu-13/briefings/OFlynn/bh-eu-13-for-cheapstakes-oflynn-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/OFlynn/bh-eu-13-for-cheapstakes-oflynn-slides.pdf
25.- Practical Exploitation Using A Malicious Service Set Identifier (SSID).
Presented By :
- Deral Heiland
White Paper : https://media.blackhat.com/eu-13/briefings/Heiland/bh-eu-13-practical-exploitation-heiland-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Heiland/bh-eu-13-practical-exploitation-heiland-slides.pdf
26.- The Sandbox Roulette – Are You Ready For The Gamble?
Presented By :
- Rafal Wojtczuk
- Rahul Kashyap
Presentation : https://media.blackhat.com/eu-13/briefings/Wojtczuk/bh-eu-13-thes-sandbox-wojtczuk-slides.pdf
27.- To Dock Or Not To Dock, That is the question : Using laptop docking stations as Hardware-Based Attack Platforms.
Presented By :
- Andy Davis
28.- Using D-Space To Open Doors.
Presented By :
- Brad Antoniewicz
29.- XML Out-of-Band Data Retrieval.
Presented By :
- Alexey Osipov
- Timur Yunusov
Presentation : https://media.blackhat.com/eu-13/briefings/Osipov/bh-eu-13-XML-data-osipov-slides.pdf
30.- Who’s Really Attacking Your ICS Devices?
Presented By :
- Kyle Wilhoit
White Paper : https://media.blackhat.com/eu-13/briefings/Wilhoit/bh-eu-13-whose-really-attacking-wilhoit-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Wilhoit/bh-eu-13-whose-really-attacking-wilhoit-slides.pdf
31.- Advanced iOS Application Pentesting.
Presented By :
- Vivek Ramachandran
Presentation : https://media.blackhat.com/eu-13/briefings/Ramachandran/bh-eu-13-advanced-iOS-application-ramachandran-slides.pdf
32.- Application Development Secure Coding Workshop.
Presented By :
- Jim Manico
Presentation : https://media.blackhat.com/eu-13/briefings/Manico/bh-eu-13-appsec-bootcamp-manico-slides.pdf
33 .- Assessing BYOD with the Smartphone Pentest Framework.
Presented By :
- Georgia Weidman
White Paper : https://media.blackhat.com/eu-13/briefings/Weidman/bh-eu-13-assessing-byod-weidman-wp.pdf
Presentation : https://media.blackhat.com/eu-13/briefings/Weidman/bh-eu-13-assessing-byod-weidman-slides.pdf
34.- PowerShell for Penetration Testers.
Presented By :
- Nikhil Mittal
Presentation : https://media.blackhat.com/eu-13/briefings/Mittal/bh-eu-13-powershell-for-penetration-mittal-slides.pdf
35.- Vehicle Networks Workshop.
Presented By :
- Robert Leale
Bueno con esto finalizamos las presentaciones que se dieron en BlaCkHaT Europe 2013, espero que puedan puedan darse un tiempo para leer y analizar los archivos presentados en este post. (Si uno quiere aprender, no importa el idioma.)
Gracias me sirvió de mucho tu información
ResponderEliminar