'black hat dc 2010'에 해당되는 글 2건

  1. 2010.02.05 Black Hat DC 2010 자료 모음
  2. 2010.02.04 인터넷 익스플로러 취약 발표.





Black Hat DC 2010 : http://www.blackhat.com/html/bh-dc-10/bh-dc-10-archives.html

Chema Alonso & Jose Palazon
Connection String Parameter Pollution Attacks
Document : http://www.blackhat.com/presentations/bh-dc-10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-slides.pdf


Jorge Luis Alvarez Medina
Internet Explorer turns your personal computer into a public file server
Document : http://www.blackhat.com/presentations/bh-dc-10/Medina_Jorge/BlackHat-DC-2010-Medina-Abusing-insecure-features-of-Internet-Explorer-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Medina_Jorge/BlackHat-DC-2010-Medina-Abusing-insecure-features-of-Internet-Explorer-slides.pdf


Colin Ames & David Kerb
Neurosurgery With Meterpreter
Document : http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf


bannedit
Advanced Command Injection Exploitation: cmd.exe in the '00s
Document : http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-slides.pdf


Mike Bailey
Neat, New, and Ridiculous Flash Hacks
Document : http://www.blackhat.com/presentations/bh-dc-10/Bailey_Mike/BlackHat-DC-2010-Bailey-Neat-New-Ridiculous-flash-hacks-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Bailey_Mike/BlackHat-DC-2010-Bailey-Neat-New-Ridiculous-flash-hacks-slides.pdf


Bill Blunden
An Uninvited Guest (Who Won’t Go Home)
Document : http://www.blackhat.com/presentations/bh-dc-10/Blunden_Bill/Blackhat-DC-2010-Blunden-Uninvited-Guest-wp.pdf

 

Elie Bursztein and Jean-Michel Picod
Reversing DPAPI and Stealing Windows Secrets Offline
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Picod_Jean-Michel/BlackHat-DC-2010-Picod-DPAPI-slides.pdf


Tom Cross
Exploiting Lawful Intercept to Wiretap the Internet
Document : http://www.blackhat.com/presentations/bh-dc-10/Cross_Tom/BlackHat-DC-2010-Cross-Attacking-LawfulI-Intercept-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Cross_Tom/BlackHat-DC-2010-Cross-Attacking-LawfulI-Intercept-slides.pdf

Andrew Fried
Whose Internet is it, anyway?
Document : http://www.blackhat.com/presentations/bh-dc-10/Fried_Andrew/BlackHat-DC-2010-Fried-Whos-Internet-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Fried_Andrew/BlackHat-DC-2010-Fried-Whos-Internet-slides.pdf


Joe Grand
Hardware is the New Software
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Grand_Joe/BlackHat-DC-2010-Grand-HW-is-the-new-SW-slides.pdf


Christian Kendi
Enhancing ZFS
Document : http://www.blackhat.com/presentations/bh-dc-10/Kendi_Christian/Blackhat-DC-2010-Kendi-Enhancing-ZFS-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Kendi_Christian/Blackhat-DC-2010-Kendi-Enhancing-ZFS-slides.pdf


Mike Kershaw
Wireless security isn't dead; Attacking clients with MSF
Document : http://www.blackhat.com/presentations/bh-dc-10/Kershaw_Mike/BlackHat-DC-2010-Kershaw-dragorn-wifi-security-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Kershaw_Mike/BlackHat-DC-2010-Kershaw-dragorn-wifi-security-slides.pdf


Vincenzo Iozzo
0-Knowledge Fuzzing
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Iozzo_Vincenzo/BlackHat-DC-2010-Iozzo-0-Knowledge-Fuzzing-slides.pdf


Joshua Marpet
Physical Security in a Networked World: Video Analytics, Video Surveillance, and You
Document : http://www.blackhat.com/presentations/bh-dc-10/Marpet_Joshua/BlackHat-DC-2010-Marpet-Video-analytics-Video-Surveillance-and-you-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Marpet_Joshua/BlackHat-DC-2010-Marpet-Video-analytics-Video-Surveillance-and-you-slides.pdf


HD Moore
Metasploit and Money
Document : http://www.blackhat.com/presentations/bh-dc-10/Moore_HD/BlackHat-DC-2010-Moore-Metasploit-and-Money-wp.pdf


Leonardo Nve
Playing in a Satellite Environment 1.2
Document : http://www.blackhat.com/presentations/bh-dc-10/Nve_Leonardo/BlackHat-DC-2010-Nve-Playing-with-SAT-1.2-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Nve_Leonardo/BlackHat-DC-2010-Nve-Playing-with-SAT-1.2-slides.pdf


Deviant Ollam
The Four Types of Lock
Document : http://www.blackhat.com/presentations/bh-dc-10/Deviant_Ollam/BlackHat-DC-2010-Deviant%20Ollam-The-Four-Types-of-Lock-wp.pdf


Nicholas J. Percoco
Global Security Report 2010
Document : http://www.blackhat.com/presentations/bh-dc-10/Percoco_Nicholas/BlackHat-DC-2010-Percoco-Global-Security-Report-2010-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Percoco_Nicholas/BlackHat-DC-2010-Percoco-Global-Security-Report-2010-slides.pdf


Shane Powell
Cyber Effects Prediction
Document : http://www.blackhat.com/presentations/bh-dc-10/Powell_Shane/BlackHat-DC-2010-Powell-Cyber-Effects-Prediction-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Powell_Shane/BlackHat-DC-2010-Powell-Cyber-Effects-Prediction-slides.pdf


Jason Ross
Malware Analysis for the Enterprise
Document : http://www.blackhat.com/presentations/bh-dc-10/Ross_Jason/Blackhat-DC-2010-Ross-Malware-Analysis-for-the-Enterprise-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Ross_Jason/Blackhat-DC-2010-Ross-Malware-Analysis-for-the-Enterprise-slides.pdf


Nicolas Seriot
iPhone Privacy
Document : http://www.blackhat.com/presentations/bh-dc-10/Seriot_Nicolas/BlackHat-DC-2010-Seriot-iPhone-Privacy-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Seriot_Nicolas/BlackHat-DC-2010-Seriot-iPhone-Privacy-slides.pdf






Posted by Hanlee79
,




블랙햇 DC 2010에서 인터넷 익스플로러를 이용해 사용자의 컴퓨터 파일을
빼내는 것을 발표 되었습니다.

Read the paper : http://www.coresecurity.com/files/attachments/Abusing_insecure_features_of_Internet_Explorer.pdf
View the slide presentation : http://www.coresecurity.com/files/attachments/BHDC2010.pdf
CoreLabs advisory : http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag

이 취약점에 약한 패키지들 입니다.

  • Internet Explorer 5.01 SP4 on Windows 2000 sp4
  • Internet Explorer 6sp1 on Windows 2000 sp4
  • Internet Explorer 6sp2 on Windows XP sp2
  • Internet Explorer 6sp2 on Windows XP sp3
  • Internet Explorer 7 on Windows XP sp2
  • Internet Explorer 7 on Windows XP sp3
  • Internet Explorer 7 on Windows Vista sp1
  • Internet Explorer 7 on Windows Vista sp2
  • Internet Explorer 7 on Windows Server 2003 sp2 if Protected Mode if OFF and not using Enhanced Security Configuration
  • Internet Explorer 7 on Windows Server 2008 if Protected Mode if OFF and not using Enhanced Security Configuration
  • Internet Explorer 8 on Windows XP sp2
  • Internet Explorer 8 on Windows XP sp3
  • Internet Explorer 8 on Windows Vista sp1 if Protected Mode if OFF
  • Internet Explorer 8 on Windows Vista sp2 if Protected Mode is OFF
  • Internet Explorer 8 on Windows 7 if Protected Mode if OFF
  • Internet Explorer 8 on Windows Server 2003 sp2 if Protected Mode if OFF and not using Enhanced Security Configuration
  • Internet Explorer 8 on Windows Server 2008 R2 if Protected Mode if OFF and not using Enhanced Security Configuration




  •  

    Posted by Hanlee79
    ,