Tag: conference
-
[Video] Defcon – 20 Drones
Thanks to the plummeting cost of powerful motion sensors like those found in smartphones, the technology to create military-class autopilots is availa… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/R9Y6nAnM-pQ/5780
-
[Video] Defcon 20 – Owned in 60 Seconds: From Network Guest to Windows Domain Admin
Their systems were fully patched, their security team watching, and the amateur pentesters just delivered their compliant report. They thought their W… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/FsyFrfWuf6E/5769
-
FLAMING RETORT: Frankenstein Malware – the future of cyberwar, or just a catchy headline?
A paper on Frankenware presented at a recent USENIX conference offers to help you build new malware entirely out of code sequences which already appea… First seen on http: Jump to article: feedproxy.google.com/~r/nakedsecurity/~3/4WPA5cHTgNY/
-
[Video] BlackHat USA 2011: How a Hacker Has Helped Influence the Government
Mudge, front man for the L0pht, founder of @stake, author of L0phtCrack, and a pioneer in vulnerability discovery and disclosure still calls himself a… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/PohUYfJV0WU/5513
-
[Video] Blackhat 2011 – Pulp Google Hacking:The Next Generation Search Engine Hacking Arsenal
Last year’s Lord of the Bing presentation stabbed Google Hacking in the heart with a syringe full of adrenaline and injected life back into a dying ar… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/7clBfDddels/5511
-
[Video] Defcon 20 – Drinking From the Caffeine Firehose We Know as Shodan
Tags: conferenceSlides : – media.defcon.org/dc-20/presentations/Viss/DEFCON-20-Viss-SHODAN.pdfShodan is commonly known for allowing users to search for banner… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/SFVyffVw2zI/5516
-
[Video] Defcon 20 – Owning One to Rule Them All
Tags: conferenceDavid Kennedy : – This is probably the most fun and exciting talk I have ever had the privilege to give. Dave DeSimone and myself had so much fun on … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/g1dsc5J2E0o/5506
-
[Video] Blackhat 2010 – These Aren’t The Permissions You’re Looking For
ANTHONY LINEBERRY SECURITY RESEARCHER, LOOKOUT MOBILE SECURITYDAVID RICHARDSON, SR. SOFTWARE ENGINEER, LOOKOUT MOBILE SECURITYTIM WYATT PRINCIPAL SOFT… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/Xt4vJLPsV9o/5496
-
[Video] Blackhat 2010 – Exploiting Lawful Intercept to Wiretap The Internet
Slides : – www.blackhat.com/presentations/bh-dc-10/Cross_Tom/BlackHat-DC-2010-Cross-Attacking-LawfulI-Intercept-slides.pdfhttp://www.blackhat…. First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/Ig1IB_6x-tw/5464
-
[Video] Blackhat 2010 – Changing Threats to Privacy
Changing Threats To Privacy: From TIA To GoogleA lot has changed since discussions around digital privacy began. The security community won the war fo… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/S-ytoXC_B3w/5465
-
[Video] Blackhat 2010 – SAP Backdoors
Slides : – media.blackhat.com/bh-eu-10/presentations/Di_Croce/BlackHat-EU-2010-Di-Croce-SAP-Backdoors-slides.pdfhttp://media.blackhat.com/bh-… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/t6lznyPKUrs/5466
-
[Video] Blackhat 2010 – Harder, Better, Faster, Stronger
Slides : – media.blackhat.com/bh-us-10/whitepapers/Grenier_Johnson/BlackHat-USA-2010-Grenier-Johnson-Harder-Better-Faster-Stronger-wp.pdfHarder… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/85SlKCjNw7M/5467
-
[Video] Blackhat 2010 – Aleatory Persistent Threat
Slides :- media.blackhat.com/bh-us-10/presentations/Waisman/BlackHat-USA-2010-Waisman-APT-slides.pdfOver the years, exploitation objectives hav… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/WI8VzmxVWpE/5469
-
[Video] Blackhat 2010 – Attacking Java Clients !
Slides : – media.blackhat.com/bh-us-10/whitepapers/deVries/BlackHat-USA-2010-deVries-Attacking-Java-Clients-wp.pdfhttp://media.blackhat.com/b… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/1GyRIMhIit0/5468
-
[Video] Blackhat 2010 – Ushering in the Post-GRC World : Applied Threat Modeling
Ushering in the Post-GRC World: Applied Threat ModelingRisk management at a systemic level is complicated enough that many organizations deem it pract… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/Yv2yKEKk6qQ/5471
-
[Video] Blackhat 2010 – Hardening Windows Applications
Slides : – media.blackhat.com/bh-us-10/whitepapers/olleb/BlackHat-USA-2010-olleb-Hardening-Windows-Applications-wp.pdf media.blackha… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/aVYxhKJt84k/5470
-
[Video] Blackhat 2010 – Adventures in Limited User Post Exploitation.
Just how much damage *can* be done with EIP under a non-Administrative Windows environment? Much, much more than you likely think. Through new techniq… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/cFRim-iFjWQ/5472
-
Sexism And The Single Hacker: Defcons Feminist Moment
First seen on http: Jump to article: packetstormsecurity.org/news/view/21380/Sexism-And-The-Single-Hacker-Defcons-Feminist-Moment.html
-
[Video] Hacking Web Applications for Fun and Profit
In this video Eric Fulton talking about Hacking Web Applications for Fun & Profit at Missoula BarCamp 2011. This open space conference was held i… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/wfbA6Y1xPYg/5437
-
Oracle Releases OutCycle Update for Blackhat Database Server Flaw
First seen on http: Jump to article: watchguardsecuritycenter.com/2012/08/14/oracle-releases-out-of-cycle-update-for-blackhat-database-server-flaw/
-
[Video] nullcong Goa 2012 Desi Jugaad Talk: Your phone is your phone but your call are now my calls
At nullcon Goa – International security conference held on 15-18th Feb 2012, one of the talks given by telecom security experts Akib sayyed , Dipesh g… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/T-WfCkJfNHw/5431
-
DEFCON: NSA Chief Calls on Hackers to Secure the Internet
First seen on http: Jump to article: www.esecurityplanet.com/hackers/defcon-nsa-chief-calls-on-hackers-to-secure-the-internet.html
-
Pwned Or Paranoid? Phone Weirdness At Defcon
First seen on http: Jump to article: packetstormsecurity.org/news/view/21332/Pwned-Or-Paranoid-Phone-Weirdness-At-Defcon.html
-
Blackhat – Schwachstellen in Netgear-Routern entdeckt
First seen on http: Jump to article: www.pcwelt.de/news/Blackhat-Zero-Day-Schwachstelle-in-Netgear-Router-6126917.html
-
[Video] Blackhat – Attacking Oracle Web Applications with Metasploit
Slide : – media.blackhat.com/bh-dc-11/Gates/BlackHat_DC_2011_Gates_Attacking-Oracle-Web-Slides.pdfIn 2009, Metasploit released a suite of auxi… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/dAzmOn2bC1w/5347
-
[Video] Blackhat USA – Security When Nanoseconds Count
There’s a brave new frontier for IT Security-a place where best practices does not even contemplate the inclusion of a firewall in the network. This f… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/GlEfpigrRIY/5346
-
[Video] Blackhat 2010 – Exploiting Remote timing attacks
Exploiting timing attacks in widespread systemsMuch has been written about timing attacks since they first appeared over 15 years ago. However, many d… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/Fm_VCljyWv8/5388
-
[Video] Blackhat 2010 – Burning Asgard – An Introduction to the tool loki
I personally remember the release of Yersinia at Black Hat Europe 2005. It was a ground breaking experience: a number of Layer 2 attacks regarded pure… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/ZOM34Ml7eJU/5387
-
[Video] Blackhat 2010 – Extreme-Range RFID
Tags: conferenceIf you think that RFID tags can only be read a few inches away from a reader you haven’t met EPC Gen2, the tag that can be found in Enhanced Drivers L… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/T1Y__JoSk8c/5386
-
[Video] Blackhat 2010 – WPA Migration Mode : WEP is Back to Haunt You….
Cisco access points support WPA migration mode, which enables both WPA and WEP clients to associate to an access point using the same Service Set Iden… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/ZxB8BMEKgWY/5385

