Infomation

Black Hat DC 2010 자료 모음

Hanlee79 2010. 2. 5. 10:01


Black Hat DC 2010 : http://www.blackhat.com/html/bh-dc-10/bh-dc-10-archives.html

Chema Alonso & Jose Palazon
Connection String Parameter Pollution Attacks
Document : http://www.blackhat.com/presentations/bh-dc-10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-slides.pdf


Jorge Luis Alvarez Medina
Internet Explorer turns your personal computer into a public file server
Document : http://www.blackhat.com/presentations/bh-dc-10/Medina_Jorge/BlackHat-DC-2010-Medina-Abusing-insecure-features-of-Internet-Explorer-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Medina_Jorge/BlackHat-DC-2010-Medina-Abusing-insecure-features-of-Internet-Explorer-slides.pdf


Colin Ames & David Kerb
Neurosurgery With Meterpreter
Document : http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf


bannedit
Advanced Command Injection Exploitation: cmd.exe in the '00s
Document : http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-slides.pdf


Mike Bailey
Neat, New, and Ridiculous Flash Hacks
Document : http://www.blackhat.com/presentations/bh-dc-10/Bailey_Mike/BlackHat-DC-2010-Bailey-Neat-New-Ridiculous-flash-hacks-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Bailey_Mike/BlackHat-DC-2010-Bailey-Neat-New-Ridiculous-flash-hacks-slides.pdf


Bill Blunden
An Uninvited Guest (Who Won’t Go Home)
Document : http://www.blackhat.com/presentations/bh-dc-10/Blunden_Bill/Blackhat-DC-2010-Blunden-Uninvited-Guest-wp.pdf

 

Elie Bursztein and Jean-Michel Picod
Reversing DPAPI and Stealing Windows Secrets Offline
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Picod_Jean-Michel/BlackHat-DC-2010-Picod-DPAPI-slides.pdf


Tom Cross
Exploiting Lawful Intercept to Wiretap the Internet
Document : http://www.blackhat.com/presentations/bh-dc-10/Cross_Tom/BlackHat-DC-2010-Cross-Attacking-LawfulI-Intercept-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Cross_Tom/BlackHat-DC-2010-Cross-Attacking-LawfulI-Intercept-slides.pdf

Andrew Fried
Whose Internet is it, anyway?
Document : http://www.blackhat.com/presentations/bh-dc-10/Fried_Andrew/BlackHat-DC-2010-Fried-Whos-Internet-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Fried_Andrew/BlackHat-DC-2010-Fried-Whos-Internet-slides.pdf


Joe Grand
Hardware is the New Software
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Grand_Joe/BlackHat-DC-2010-Grand-HW-is-the-new-SW-slides.pdf


Christian Kendi
Enhancing ZFS
Document : http://www.blackhat.com/presentations/bh-dc-10/Kendi_Christian/Blackhat-DC-2010-Kendi-Enhancing-ZFS-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Kendi_Christian/Blackhat-DC-2010-Kendi-Enhancing-ZFS-slides.pdf


Mike Kershaw
Wireless security isn't dead; Attacking clients with MSF
Document : http://www.blackhat.com/presentations/bh-dc-10/Kershaw_Mike/BlackHat-DC-2010-Kershaw-dragorn-wifi-security-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Kershaw_Mike/BlackHat-DC-2010-Kershaw-dragorn-wifi-security-slides.pdf


Vincenzo Iozzo
0-Knowledge Fuzzing
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Iozzo_Vincenzo/BlackHat-DC-2010-Iozzo-0-Knowledge-Fuzzing-slides.pdf


Joshua Marpet
Physical Security in a Networked World: Video Analytics, Video Surveillance, and You
Document : http://www.blackhat.com/presentations/bh-dc-10/Marpet_Joshua/BlackHat-DC-2010-Marpet-Video-analytics-Video-Surveillance-and-you-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Marpet_Joshua/BlackHat-DC-2010-Marpet-Video-analytics-Video-Surveillance-and-you-slides.pdf


HD Moore
Metasploit and Money
Document : http://www.blackhat.com/presentations/bh-dc-10/Moore_HD/BlackHat-DC-2010-Moore-Metasploit-and-Money-wp.pdf


Leonardo Nve
Playing in a Satellite Environment 1.2
Document : http://www.blackhat.com/presentations/bh-dc-10/Nve_Leonardo/BlackHat-DC-2010-Nve-Playing-with-SAT-1.2-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Nve_Leonardo/BlackHat-DC-2010-Nve-Playing-with-SAT-1.2-slides.pdf


Deviant Ollam
The Four Types of Lock
Document : http://www.blackhat.com/presentations/bh-dc-10/Deviant_Ollam/BlackHat-DC-2010-Deviant%20Ollam-The-Four-Types-of-Lock-wp.pdf


Nicholas J. Percoco
Global Security Report 2010
Document : http://www.blackhat.com/presentations/bh-dc-10/Percoco_Nicholas/BlackHat-DC-2010-Percoco-Global-Security-Report-2010-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Percoco_Nicholas/BlackHat-DC-2010-Percoco-Global-Security-Report-2010-slides.pdf


Shane Powell
Cyber Effects Prediction
Document : http://www.blackhat.com/presentations/bh-dc-10/Powell_Shane/BlackHat-DC-2010-Powell-Cyber-Effects-Prediction-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Powell_Shane/BlackHat-DC-2010-Powell-Cyber-Effects-Prediction-slides.pdf


Jason Ross
Malware Analysis for the Enterprise
Document : http://www.blackhat.com/presentations/bh-dc-10/Ross_Jason/Blackhat-DC-2010-Ross-Malware-Analysis-for-the-Enterprise-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Ross_Jason/Blackhat-DC-2010-Ross-Malware-Analysis-for-the-Enterprise-slides.pdf


Nicolas Seriot
iPhone Privacy
Document : http://www.blackhat.com/presentations/bh-dc-10/Seriot_Nicolas/BlackHat-DC-2010-Seriot-iPhone-Privacy-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Seriot_Nicolas/BlackHat-DC-2010-Seriot-iPhone-Privacy-slides.pdf