L’ édition 2010 de la conférence de sécurité BlackHat USA s’est tenu le 28 et 29 juillet 2010 .
Voici le programme ainsi que la liste des liens pour télécharger toutes les présentations, documents, outils et les extras.
– En téléchargement direct : Documents séparés sur MediaFire
– En téléchargement direct : Documents séparés sur le site officiel
– En téléchargement torrent : Documents séparés en fichier Torrent
• Anh Virt ICE wp
• Arlen SCADA Cyberdouchery slides
• Bailey DePetrillo The Carmen Sandiego Project wp
• Becherer Andrew Hadoop Security slides
• Beek Virtual Forensics slides
• BlackHat USA_2010 Hypponen You will be billed 90000 for this call slides
• Bolzoni Schade Goodware drugs for malware slides
• Born psudp Passive Network Covert Communication slides
• Bratus Conti Taxonomy wp
• Bratus Conti Voyage of a Reverser slides
• Bugher Secure Use of Cloud Storage slides
• Bursztein Bad Memories wp
• Cerrudo Toke Kidnapping’s Revenge slides
• Criscione Virtually Pwned slides
• Cross Internet Wiretapping slides
• Dabirsiaghi JavaSnoop wp
• DaiZovi Return Oriented Exploitation slides
• Daswani mod antimalware slides
• Di Croce SAP Backdoors wp
• Eng Creighton Deconstructing ColdFusion slides
• Engebretson Pauli Cronin SprayPAL slides
• Esser Utilizing Code Reuse Or Return Oriented Programming In PHP Application Exploits slides
• FX Blitzableiter slides
• Fayo Hacking Protecting Oracle Databease Vault slides
• Fyodor Fifield NMAP Scripting Engine slides
• Grenier Johnson Harder Better Faster Stronger wp
• Gurgq Base Jumping slides
• Hamiel Wielgosweski Constricting the Web slides
• Hansen Sokol HTTPS Can Byte Me
• Harbour Black Art of Binary Hijacking slides
• Heffner How to Hack Millions of Routers slides
• Henderson Ocepek Need A Hug wp
• Insecurities in Security Infrastructure slides
• Iozzo Weinmann Kornau Everybody be cool this is a roppery slides
• Jarmoc Insecurities in Security Infrastructure wp
• Jeongwook Oh ExploitSpotting Locating Vulnerabilities Out Of Vendor Patches Automatically slides
• Kamkar How I Met Your Girlfriend slides
• Keltner Elrod Adventures In Limited User Post Exploitation wp v1.3
• Kennedy Kelly PowerShell Its Time To Own slides
• King Insecurities in Security Infrastructure wp
• Le Paper Payload already inside data reuse for ROP exploits slides
• Meer History of Memory Corruption Attacks wp
• Meiners Sor WEP is back to haunt you slides
• Mende Graf Rey loki_v09 wp
• Nagy Industrial Bug Mining slides
• Nohl Attacking.Phone.Privacy wp
• Ochoa Azubel NTLM Weak Nonce slides
• Ollmann 6millionDollarMan slides
• Parker Finger Pointing for Fun Profit and War 0.2 slides
• Pollet Cummings RTS Electricity for Free wp
• Raber Cheatham Reverse Engineering with Hardware Debuggers slides
• Rad DMCA slides
• Ristic Qualys SSL Survey HTTP Rating Guide slides
• Ryan Getting In Bed With Robin Sage v1.0
• Shah DOM Hacks Shreeraj slides
• Shelton IBM AIX Heap Overflow Methods slides
• Siddharth Hacking Oracle from the Web wp
• Slaviero Lifting the Fog slides
• Smith Lai Balancing the Pwn deficit wp
• Smith pyREtic Reversing wp
• Stender Engel Hill Attacking Kerberos Deployments slides
• Suiche Blue Screen of the Death is dead slides
• Sullivan Cryptographic Agility slides
• Sumner Social Net Special Ops slides
• Thomas BlindElephant WebApp Fingerprinting slides
• Umadas Allen Network Stream_Debugging with Mallory slides
• Vuksan Pericin TitanMist slides
• Waisman APT slides
• Wicherski dirtbox x86 windows emulator slides
• Yerazunis Confidential Mail Filtering wp
• deVries Attacking Java Clients slides
• olleb Hardening Windows Applications slides
Merci a Mila Parkour du blog contagiodump pour avoir rassembler tous les documents .
صراحة محتوى ثري من بلاك هات ….ان شاء الله يقع نشر تقنيات جديدة عن أمن المعلومات و خاصة اختراق شبكات الجوال
أخي حمزة يرجى منك ضافتي على المسنجر ….لدسا رغبة في تأسيس موقع مغاربي لخبراء الهاكر الأخلاقي و أمن المعلومات ..
أنتظرك و دمت في حفظ الله
hhhhhhhhhhhhhhhh