Mirror archivos DEFCON 21

Es genial, poder encontrarse con un material tan bueno como las presentaciones y materiales de la DEFCON colgados en Internet antes de que la propia DEFCON haga release oficial.

Material defcon21

En contagiodump, página de sobras conocida por compartir muestras para el researching de malware, han colgado todo el material de la DEFCON 2013. Lo he descargado y he hecho un mirror en Mega para que lo podamos descargar sin problemas.

El material que hay subido es el siguiente:

Abraham Kang and Dinis Cruz

  • DEFCON-21-Kang-Cruz-RESTing-On-Your-Laurels-Will-Get-You-Pwned.pdf

Alejandro Caceres

  • DEFCON-21-Caceres-Massive-Attacks-With-Distributed-Computing.pdf

Alexandre Pinto

  • DEFCON-21-Pinto-Defending-Networks-Machine-Learning-WP.pdf
  • DEFCON-21-Pinto-Defending-Networks-Machine-Learning.pdf

Amber Baldet

  • DEFCON-21-Baldet-Suicide-Intervention-Risk-Assessment-Tactics.pdf

Andy Davis

  • DEFCON-21-Davis-Revealing-Embedded-Fingerprints.pdf

Balint Seeber

  • DEFCON-21-Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf

Bogdan Alecu

  • DEFCON-21-Bogdan-Alecu-Attacking-SIM-Toolkit-with-SMS-WP.pdf
  • DEFCON-21-Bogdan-Alecu-Business-Logic-Flaws-in-MO.pdf

Brendan O’Connor

  • DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf

Brian Gorenc and Jasiel Spelman

  • DEFCON-21-Gorenc-Spelman-Java-Every-days-WP.pdf
  • DEFCON-21-Gorenc-Spelman-Java-Every-days.pdf

Chris John Riley

  • DEFCON-21-Riley-Defense-by-Numbers.pdf

Chris Sumner and Randall Wald

  • DEFCON-21-Sumner-Wald-Prediciting-Susceptibility-To-Social-Bots-On-Twitter.pdf

Christine Dudley

  • DEFCON-21-Dudley-Privacy-In-DSRC-Connected-Vehicles.pdf

Craig Young

  • DEFCON-21-Young-Google-Skeleton-Key.pdf

—Extras

  • DEFCON-21-Craig-Young-Android-PoC-StockView-with-SSL.apk
  • DEFCON-21-Craig-Young-Android-PoC-StockView.apk
  • DEFCON-21-Craig-Young-Android-PoC-TubeApp.apk
  • DEFCON-21-Craig-Young-StockView-ExampleCode.java

Crowley and Panel

  • DEFCON-21-Crowley-Savage-Bryan-Home-Invasion-2.0-WP.pdf
  • DEFCON-21-Crowley-Savage-Bryan-Home-Invasion-2.0.pdf

|   —Extras
—upnp_request_gen
LICENSE.txt
readme.txt
upnp_request_gen.php

Dan Griffin

  • DEFCON-21-Dan-Griffin-Protecting-Data.pdf

Daniel Chechik

  • DEFCON-21-Chechik-Utilizing-Popular-Websites-for-Malicious-Purposes-Using-RDI.pdf

Daniel Selifonov

  • DEFCON-21-Selifonov-A-Password-is-Not-Enough-Why-Disk-Encryption-is-Broken.pdf

Eric Fulton and Daniel Zolnikov

  • DEFCON-21-Fulton-Zolnikov-The-Politics-of-Privacy-and-Technology.pdf

Eric Milam

  • DEFCON-21-Milam-Getting-The-Goods-With-smbexec.pdf

Eric Robi and Michael Perklin

  • DEFCON-21-Robi-Perklin-Forensic-Fails.txt

Etemadieh and Panel

  • DEFCON-21-Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf

Fatih Ozavci

  • DEFCON-21-Ozavci-VoIP-Wars-Return-of-the-SIP.pdf

|   —Extras
DEFCON-21-viproy-voipkit.tgz

Flipper

  • DEFCON-21-Flipper-10000-Yen.pdf

|   —Extras
|   Defcon 21 – 10000 Yen Source Code.txt
|   OpenGlider BoM.pdf
|   OpenGlider V0.1.x_t.txt
|   x35 coordinates.sldcrv.txt
|
—OpenGlider IGES Files

Franz Payer

  • DEFCON-21-Payer-Exploiting-Music-Streaming-with-JavaScript.pdf

Gregory Pickett

  • DEFCON-21-Pickett-Lets-Screw-With-NMAP.pdf

|   —Extras
DEFCON-21-Pickett-Lets-Screw-With-NMAP-Specifications.pdf
DEFCON-21-Pickett-Lets-Screw-With-NMAP-Transformations.pdf
platform.zip
scans.zip

Hunter Scott

  • DEFCON-21-Scott-Security-in-Cognitive-Radio-Networks.pdf

Jacob Thompson

  • DEFCON-21-Thompson-CREAM-Cache-Rules-Evidently-Ambiguous-Misunderstood.pdf

Jaeson Schultz

  • DEFCON-21-Schultz-Examining-the-Bitsquatting-Attack-Surface-WP.pdf

Jason Staggs

  • DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
  • DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper.pdf

|   —Extras
DEFCON-21-CANClockProof-of-ConceptDemo.wmv
DEFCON-21-CANClockSource.pde
DEFCON-21-MINI-Cooper-Crash-Test.wmv

Jim Denaro

  • DEFCON-21-Denaro-How-to-Disclose-or-Sell-an-Exploit.pdf

Joe Bialek

  • DEFCON-21-Bialek-PowerPwning-Post-Exploiting-by-Overpowering-Powershell.pdf

|   —Extras
DEFCON-21-Invoke-ReflectivePEInjection.ps1.txt

Joe Grand

  • DEFCON-21-Grand-JTAGulator.pdf

|   —Extras
|   DEFCON-21-jtagulatorassembly.pdf
|   DEFCON-21-jtagulatorblockdiagram.pdf
|   DEFCON-21-jtagulatorbom.pdf
|   DEFCON-21-jtagulatorschematic.pdf
|   DEFCON-21-jtagulatortestproc.pdf
|
Firmware 1.1 (b9b49b3)
—Gerbers B

John Ortiz

  • DEFCON-21-Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf

|   —Extras
DEFCON-21-Ortiz-TOOLSCustom.zip
DEFCON-21-Ortiz-TOOLSFreeDownload.zip

Joseph Paul Cohen
|   —Extras
|   DEFCON-21-blucat.base64
|
—blucat-r50

Justin Engler and Paul Vines

  • DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking-WP.pdf
  • DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking.pdf

|   —Extras
DEFCON-21-Codepartslistinstructions.zip

Justin Hendricks

  • DEFCON-21-Justin-Hendricks-So-You-Think-Your-Domain-Controller-Is-Secure.pdf

Karl Koscher and Eric Butler

  • DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf

Lawrence and Panel

  • DEFCON-21-Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf

|   —Extras
DEFCON-21-config.scad
DEFCON-21-key.scad

Marc Weber Tobias and Tobias Bluzmanis

  • DEFCON-21-Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf

Marion Marschalek

  • DEFCON-21-Marschalek-Thorny-Malware.pdf

|   —Extras
DEFCON-21-Marschalek-MalwareBase64.txt
DEFCON-21-Marschalek-Thorny-Malware-Analysis-Report.pdf

Melissa Elliott

  • DEFCON-21-Elliott-noisefloor-URLS-reference.txt

Michael Perklin

  • DEFCON-21-Perklin-ACL-Steganography.pdf.pdf

|   —Extras
|   ACLEncode.sln
|   README.txt
|
Michael Schrenk

  • DEFCON-21-Schrenk-How-my-Botnet-Defeated-Russian-Hackers.pdf


Ming Chow

  • DEFCON-21-Chow-Abusing-NoSQL-Databases.pdf

Neil Sikka

  • DEFCON-21-Sikka-EMET-4.0-PKI-Mitigation.pdf

Nicolas Oberli

  • DEFCON-21-Oberli-Please-Insert-Inject-More-Coins.pdf


Nikhil Mittal

  • DEFCON-21-Mittal-Powerpreter-Post-Exploitation-Like-a-Boss.pdf

|   —Extras
Nikhil_Mittal_Powerpreter_Code.psm1

Pau Oliva Fora

  • DEFCON-21-Fora-Defeating-SEAndroid.pdf

Philip Polstra

  • DEFCON-21-Polstra-We-are-Legion-Pentesting.pdf

|   —Extras
DEFCON-21-Philip-Polstra-code.py.txt
    
Phorkus and Evilrob

  • DEFCON-21-Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf


Piotr Duszynski

  • DEFCON-21-Duszynski-Cyber-Offenders.pdf

Pukingmonkey

  • DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf

|   —Extras
01_ALPR_detector_proof_of_concept.mp4
02_ezpass_detector_of_open_road_tolling.mp4
03_ezpass_detector_of_hidden_reader.mp4
04_ezpass_detector_of_hidden_reader_with_toll_tag_sensor.mp4
DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds-(1).mp4
DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds.mp4
arduino-micro

Remy Baumgarten

  • DEFCON-21-Baumgarten-Mach-O-Viz-WP.pdf
  • DEFCON-21-Baumgarten-Mach-O-Viz.pdf

Richard Thieme

  • DEFCON-21-Richard-Thieme-UFOs-and-Govt.pdf

|   —Extras
DEFCON-21-Richard Thieme-UFOs-and-Govt-Resources.txt

Ricky HIll

  • DEFCON-21-Ricky-Hill-Phantom-Drone.pdf

Robert Clark

  • DEFCON-21-Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense.pdf

Robert Stucke

  • DEFCON-21-Stucke-DNS-Hazards.pdf

Runa A Sandvik

  • DEFCON-21-Sandvik-Safety-of-the-Tor-Network.pdf


Ryan Holeman

  • DEFCON-21-Holeman-The-Bluetooth-Device-Database.pdf

—Extras
—src
analytics

Sam Bowne

  • DEFCON-21-Bowne-SSD-Data-Evap.pdf

Sam Bowne and Matthew Prince

  • DEFCON-21-Bowne-Prince-Evil-DoS-Attacks-and-Strong-Defenses.pdf

Scott Behrens and Brent Bandelgar

  • DEFCON-21-Behrens-Bandelgar-MITM-All-The-IPv6-Things.pdf


Teal Rogers and Alejandro Caceres

  • DEFCON-21-Rogers-Caceres-The-Dawn-of-Web-30.pdf


Tom Keenan

  • DEFCON-21-Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf


Tom Steele and Dan Kottman

  • DEFCON-21-Steele-Kottman-Collaborative-Penetration-Testing-With-Lair.pdf

Tony Mui and Wai-leng

  • DEFCON-21-Miu-Lee-Kill-em-All-DDoS-Protection-Total-Annihilation.pdf

|   —Extras

Vaagn Toukharian and Tigran Gevorgyan

  • DEFCON-21-Toukharian-Gevorgyan-HTTP-Time-Bandit.pdf

Wesley McGrew

  • DEFCON-21-McGrew-Pwn-The-Pwn-Plug .pdf
  • DEFCON-21-McGrew-Pwn-The-Pwn-Plug-WP.pdf

|   —Extras
DEFCON-21-community1.1vswireless1.1.txt
DEFCON-21-exploitpacketpayload.dat
DEFCON-21-originalubootenv.txt
DEFCON-21-ubi.py

WiK and Mubix

  • DEFCON-21-WiK-Mubix-gitDigger.pdf

Zak Blacher

  • DEFCON-21-Blacher-Transcending-Cloud-Limitations.pdf

|   —Extras
DEFCON-21-Scripted-Demo.tar
DEFCON-21-source-Code-dpk-master.zip

Zoz

  • DEFCON-21-Zoz-Hacking-Driverless-Vehicles.pdf

bughardy and Eagle1753

  • DEFCON-21-bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT-WP.pdf
  • DEFCON-21-bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT.pdf

m0nk

  • DEFCON-21-m0nk-BoutiqueKit.pdf

soen

  • DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf

Link de Mediafire cortesía de ContagioDump => DOWNLOAD HERE – 394MB Zip

Mirror para la Comunidad DragonJAR =>

defcon_21.tar.gz (394.8 MB)
https://mega.co.nz/#!aUVEHRQD!KRjzPQQBGAwtmevTcfpiQHk3z-FNRgquZKbSzFF-Fb0

El MD5 del archivo subido es =>

darkmac:Downloads marc$ md5 defcon_21.tar.gz
MD5 (defcon_21.tar.gz) = 63d7c59bb02e796bc4afcef36a623eca

Muchas gracias a ContagioDump por compartir el archivo!

SOURCE => http://contagiodump.blogspot.com.es/2013/08/defcon-21-archives-speaker-materials.html


Si te ha gustado el post, compartelo y ayudanos a crecer.

Unete a nuestra Fanpage Siguenos en Twitter

Autor: Seifreed

Formado en un equipo de lucha contra el fraude. He trabajado implementando la protección y prevención del fraude en varios clientes dentro del sector bancario nacional e internacioal. Mi trabajo consiste en encontrar soluciones a los problemas actuales y futuros de las entidades financieras respecto al código malicioso y el fraude. Especialidades como el análisis de malware, análisis forense, ingeniería inversa o tareas de hacking ético, forman parte de mis tareas diarias. Soy ponente ien eventos nacionales (No cON Name, Owasp, Navaja Negra) e internacionales (DraonJAR CON - Colombia). Soy profesor asociado en La Salle enseñando el curso MPWAR (Master in High Performance Web Programming) y el máster de ciberseguridad de La Salle (MCS. Master in Cybersecurity) Miembro de asociaciones y grupos de research como la HoneyNet Project, Owasp, SySsec etc.. También soy el organizador de las conferencias Hack&Beers en Barcelona

Compartir este Artículo
  • Fernando

    ¡¡ Muchisimas Gracias !!!!

    :))

  • Wow jaime que buen aporte para todos aquellos que no podemos estar en estos enventos mil gracias 😀

  • Edwin

    Gracias !!! Descargado …..
    63d7c59bb02e796bc4afcef36a623eca

  • cecilia

    Amigos una pregunta, hay videos subtitulado o algo de español sobre este tema?

    muchas gracias por responder

Siguenos!

O Puedes Subscribete

ANTES DE

SALIRTE ...

NO TE

ARREPENTIRÁS

!Gracias¡

NO OLVIDES NUESTRAS REDES SOCIALES