Black Hat DC 2010 : http://www.blackhat.com/html/bh-dc-10/bh-dc-10-archives.html
Chema Alonso & Jose Palazon
Connection String Parameter Pollution Attacks
Document : http://www.blackhat.com/presentations/bh-dc-10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-slides.pdf
Jorge Luis Alvarez Medina
Internet Explorer turns your personal computer into a public file server
Document : http://www.blackhat.com/presentations/bh-dc-10/Medina_Jorge/BlackHat-DC-2010-Medina-Abusing-insecure-features-of-Internet-Explorer-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Medina_Jorge/BlackHat-DC-2010-Medina-Abusing-insecure-features-of-Internet-Explorer-slides.pdf
Colin Ames & David Kerb
Neurosurgery With Meterpreter
Document : http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf
bannedit
Advanced Command Injection Exploitation: cmd.exe in the '00s
Document : http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-slides.pdf
Mike Bailey
Neat, New, and Ridiculous Flash Hacks
Document : http://www.blackhat.com/presentations/bh-dc-10/Bailey_Mike/BlackHat-DC-2010-Bailey-Neat-New-Ridiculous-flash-hacks-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Bailey_Mike/BlackHat-DC-2010-Bailey-Neat-New-Ridiculous-flash-hacks-slides.pdf
Bill Blunden
An Uninvited Guest (Who Won’t Go Home)
Document : http://www.blackhat.com/presentations/bh-dc-10/Blunden_Bill/Blackhat-DC-2010-Blunden-Uninvited-Guest-wp.pdf
Elie Bursztein and Jean-Michel Picod
Reversing DPAPI and Stealing Windows Secrets Offline
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Picod_Jean-Michel/BlackHat-DC-2010-Picod-DPAPI-slides.pdf
Tom Cross
Exploiting Lawful Intercept to Wiretap the Internet
Document : http://www.blackhat.com/presentations/bh-dc-10/Cross_Tom/BlackHat-DC-2010-Cross-Attacking-LawfulI-Intercept-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Cross_Tom/BlackHat-DC-2010-Cross-Attacking-LawfulI-Intercept-slides.pdf
Andrew Fried
Whose Internet is it, anyway?
Document : http://www.blackhat.com/presentations/bh-dc-10/Fried_Andrew/BlackHat-DC-2010-Fried-Whos-Internet-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Fried_Andrew/BlackHat-DC-2010-Fried-Whos-Internet-slides.pdf
Joe Grand
Hardware is the New Software
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Grand_Joe/BlackHat-DC-2010-Grand-HW-is-the-new-SW-slides.pdf
Christian Kendi
Enhancing ZFS
Document : http://www.blackhat.com/presentations/bh-dc-10/Kendi_Christian/Blackhat-DC-2010-Kendi-Enhancing-ZFS-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Kendi_Christian/Blackhat-DC-2010-Kendi-Enhancing-ZFS-slides.pdf
Mike Kershaw
Wireless security isn't dead; Attacking clients with MSF
Document : http://www.blackhat.com/presentations/bh-dc-10/Kershaw_Mike/BlackHat-DC-2010-Kershaw-dragorn-wifi-security-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Kershaw_Mike/BlackHat-DC-2010-Kershaw-dragorn-wifi-security-slides.pdf
Vincenzo Iozzo
0-Knowledge Fuzzing
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Iozzo_Vincenzo/BlackHat-DC-2010-Iozzo-0-Knowledge-Fuzzing-slides.pdf
Joshua Marpet
Physical Security in a Networked World: Video Analytics, Video Surveillance, and You
Document : http://www.blackhat.com/presentations/bh-dc-10/Marpet_Joshua/BlackHat-DC-2010-Marpet-Video-analytics-Video-Surveillance-and-you-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Marpet_Joshua/BlackHat-DC-2010-Marpet-Video-analytics-Video-Surveillance-and-you-slides.pdf
HD Moore
Metasploit and Money
Document : http://www.blackhat.com/presentations/bh-dc-10/Moore_HD/BlackHat-DC-2010-Moore-Metasploit-and-Money-wp.pdf
Leonardo Nve
Playing in a Satellite Environment 1.2
Document : http://www.blackhat.com/presentations/bh-dc-10/Nve_Leonardo/BlackHat-DC-2010-Nve-Playing-with-SAT-1.2-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Nve_Leonardo/BlackHat-DC-2010-Nve-Playing-with-SAT-1.2-slides.pdf
Deviant Ollam
The Four Types of Lock
Document : http://www.blackhat.com/presentations/bh-dc-10/Deviant_Ollam/BlackHat-DC-2010-Deviant%20Ollam-The-Four-Types-of-Lock-wp.pdf
Nicholas J. Percoco
Global Security Report 2010
Document : http://www.blackhat.com/presentations/bh-dc-10/Percoco_Nicholas/BlackHat-DC-2010-Percoco-Global-Security-Report-2010-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Percoco_Nicholas/BlackHat-DC-2010-Percoco-Global-Security-Report-2010-slides.pdf
Shane Powell
Cyber Effects Prediction
Document : http://www.blackhat.com/presentations/bh-dc-10/Powell_Shane/BlackHat-DC-2010-Powell-Cyber-Effects-Prediction-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Powell_Shane/BlackHat-DC-2010-Powell-Cyber-Effects-Prediction-slides.pdf
Jason Ross
Malware Analysis for the Enterprise
Document : http://www.blackhat.com/presentations/bh-dc-10/Ross_Jason/Blackhat-DC-2010-Ross-Malware-Analysis-for-the-Enterprise-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Ross_Jason/Blackhat-DC-2010-Ross-Malware-Analysis-for-the-Enterprise-slides.pdf
Nicolas Seriot
iPhone Privacy
Document : http://www.blackhat.com/presentations/bh-dc-10/Seriot_Nicolas/BlackHat-DC-2010-Seriot-iPhone-Privacy-wp.pdf
Presentation : http://www.blackhat.com/presentations/bh-dc-10/Seriot_Nicolas/BlackHat-DC-2010-Seriot-iPhone-Privacy-slides.pdf
'Infomation' 카테고리의 다른 글
CODEGATE 2010 보안컨퍼런스 일정 (0) | 2010.03.02 |
---|---|
[긴급]동계올림픽과 김연아 인기 틈탄 가짜 백신 주의!! - 보안뉴스 (0) | 2010.02.25 |
Network Security Vision 2010 세미나 (0) | 2010.02.23 |
스마트폰 보안 세미나 (0) | 2010.02.18 |
스마트폰 정보보호 '이용자 10대 안전수칙' (0) | 2010.02.11 |
인터넷 익스플로러 취약 발표. (0) | 2010.02.04 |
숭실대, 스마트폰 해킹 성공 (0) | 2010.02.01 |
짝퉁 구글...(??) (0) | 2010.01.29 |
중국에서 해킹당한 구글 'MS 익스플로러 결함 탓' (0) | 2010.01.18 |
OWASP Top 10 - 2010 (0) | 2009.12.23 |