Pwnie Awards 2013

Los Pwnie Awards vienen siendo un clásico cada año. El evento en si consiste en premiar a los mejores y a los peores en el mundo de la seguridad informática y el hacking con un bonito Pequeño Pony de colorines desde el año 2007. Las categorías que se premian son: Pwnie for Best Server-Side Bug Pwnie for Best Client-Side Bug Pwnie for Best Privilege Escalation Bug Pwnie for Most Innovative Research Pwnie for Lamest Vendor Response Pwnie for Best Song Pwnie for Most Epic FAIL Pwnie for Epic Ownage Los jueces que evalúan y otorgan estos premios son: Alex Sotirov Dino Dai Zovi Mark Dowd HD Moore Brandon Edwards Justine Aitel Chris Valasek Los premios se entregan el 31 de Julio en la Blackhat. Este año los premios han quedado divididos de la siguiente forma. Pwnie for Best Server-Side Bug Ruby on Rails YAML (CVE-2013-0156) Credit: Ben Murphy Pwnie for Best Client-Side Bug Adobe Reader Buffer Overflow and Sandbox Escape (CVE-2013-0641) Credit: Unknown Pwnie for Best Privilege Escalation Bug iOS incomplete codesign bypass and kernel vulnerabilities (CVE-2013-0977, CVE-2013-0978 and CVE-2013-0981 Credit: David Wang aka planetbeing and the evad3rs team Pwnie for Most Innovative Research Identifying and Exploiting Windows Kernel Race Conditions via Memory Access Patterns Mateusz “j00ru” Jurczyk, Gynvael Coldwind Pwnie for Best Song All the Things Dual Core YouTube Pwnie for Most Epic FAIL Nmap: The Internet Considered Harmful – DARPA Inference Checking Kludge Scanning Hackin9 Pwnie for Epic 0wnage  Joint award to Edward Snowden and the NSA Pwnie for Lifetime Achievement Awarded to those of us who have moved on to bigger and better things. Barnaby...

Leer Más

Memorias del Black Hat USA 2010

Se ha liberado la documentación oficial del Blackhat USA, una de las conferencia de seguridad más importantes a nivel mundial, a continuación les dejo los contenidos expuestos en estas conferencias. Posiblemente encuentren los servidores saturados por la gran demanda que deben tener estos documentos en estos momentos. Anh Virt ICE Arlen SCADA Cyberdouchery olleb Hardening Windows Applications olleb Hardening Windows Applications – Diapositivas Bailey DePetrillo The Carmen Sandiego Project Becherer Andrew Hadoop Security Becherer Andrew Hadoop Security – Diapositivas Beek Virtual Forensics Bolzoni Schade Goodware drugs for malware Born psudp Passive Network Covert Communicatio Born psudp Passive Network Covert Communication – Diapositivas. Bugher Secure Use of Cloud Storage Bugher Secure Use of Cloud Storage – Diapositivas Bursztein-Bad-Memories Cerrudo Toke Kidnapping’s Revenge Cerrudo Toke Kidnapping’s Revenge – Diapositivas Bratus Conti Taxonomy Bratus Conti Voyage of a Reverser – Diapositivas Criscione Virtually Pwned – Diapositivas Cross Internet Wiretapping – Diapositivas Dabirsiaghi JavaSnoop DaiZovi Return Oriented Exploitation – Diapositivas Daswani mod antimalware Daswani mod antimalware – Diapositivas Di Croce SAP Backdoors Eng Creighton Deconstructing ColdFusion – Diapositivas Engebretson Pauli Cronin SprayPAL Engebretson Pauli Cronin SprayPAL – Diapositivas Esser Utilizing Code Reuse Or Return Oriented Programming In PHP Application Exploits – Diapositivas Fayo Hacking Protecting Oracle Databease Vault Fayo Hacking Protecting Oracle Databease Vault – Diapositivas Jarmoc Insecurities in Security Infrastructure King Insecurities in Security Infrastructure Insecurities in Security Infrastructure – Diapositivas FX Blitzableiter FX Blitzableiter – Diapositivas Fyodor Fifield NMAP Scripting Engine Fyodor Fifield NMAP Scripting Engine – Diapositivas Grenier Johnson Harder Better Faster Stronger Gurgq Base Jumping – Diapositivas Hamiel Wielgosweski Constricting the Web Hamiel Wielgosweski Constricting the Web – Diapositivas Hansen Sokol HTTPS Can Byte Me Harbour Black Art of Binary Hijacking – Diapositivas Heffner How to Hack Millions of Routers Heffner How to Hack Millions of Routers – Diapositivas Hypponen You will be billed 90000 for this call – Diapositivas Iozzo Weinmann Kornau Everybody be cool this is a roppery – Diapositivas Kamkar How I Met Your Girlfriend Kamkar How I Met Your Girlfriend – Diapositivas Keltner Elrod Adventures In Limited User Post Exploitation wp v1.3 Kennedy Kelly PowerShell Its Time To Own – Diapositivas Le Paper Payload already inside data reuse for ROP exploits Le Paper Payload already inside data reuse for ROP exploits – Diapositivas Meer History of Memory Corruption Attacks Blackhat USA 2010 Meiners Sor WEP is back to haunt you. Meiners Sor WEP is back to haunt you – Diapositivas Nagy Industrial Bug Mining – Diapositivas Nohl Attacking.Phone.Privacy Henderson Ocepek Need A Hug Ochoa Azubel NTLM Weak Nonce Ochoa Azubel NTLM Weak Nonce – Diapositivas Jeongwook Oh ExploitSpotting Locating Vulnerabilities Out Of Vendor Patches Automatically...

Leer Más

Siguenos!

O Puedes Subscribete

ANTES DE

SALIRTE ...

NO TE

ARREPENTIRÁS

!Gracias¡

NO OLVIDES NUESTRAS REDES SOCIALES