View Full Version : สื่อต่างๆ ที่ใช้ในงาน defcon
Gen0TypE
15-04-2008, 07:18 PM
สำหรับงาน defcon ที่จัดแต่ละครั้งนั้น จะมีการนำสื่อต่างๆ ทีใช้ในงานมา post ไว้ให้โหลดได้
ซึ่งสื่อที่มีให้โหลดนั้น ก็มีหลายรูปแบบ ทั้ง pdf, video, audio
ถึงตอนนี้ งาน defcon มีทั้งหมด 15 ครั้งแล้ว และสื่อต่างๆ ก็สามารถโหลดได้จากเว็บ
ส่วนครั้งที่ 16 นั้นจะจัดขึ้นในเดือนสิงหาคมปีนี้ครับ
สื่อต่างๆ สามารถโหลดได้จากเว็บนี้ครับ
**Hidden Content: Check the thread to see hidden data.**
5h4d0wm4n
08-05-2008, 08:10 AM
ขอช่วยเสริมละกัน
Videos from Defcon 15 Hacker Conference
วันที่ 3-5 สิงหาคม 2007
***เดิมที่เป็นดีวีดี ที่นี่ สามารถแยกดาวน์โหลดเป็นเรื่องๆตามที่สนใจได้ เป็นไฟล์ FLV ***
* T101: Making of the DEFCON 15 Badges by Joe Grand
* T102: Q&A with Bruce by Bruce Schneier
* T103: Turn-Key Pen Test Labs by Thomas Wilhelm
* T104: How I Learned to Stop Fuzzing and Find More Bugs by Jacob west
* T105: Convert Debugging - Circumventing Software Armoring Techniques by Danny Quist & Valsmith
* T106: Functional Fuzzing with Funk by Benjamin Kurtz
* T107: Tactical Exploitation by H.D.Moore & Valsmith
* T108: Intelligent Debugging for vuln-dev by Damien Gomez
* T109: Fingerprinting and Cracking Java Obfuscated Code by Subere
* T110: Comparing Application Security Tools by Edward Lee
* T111: Meet the Feds (Panel Discussion)
* T112: No-Tech Hacking by Johnny Long
* T131: The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats by Steve Orrin
* T133: Pen-testing Wi-Fi by Aaron Peterson
* T134: Hacking EVDO by King Tuna
* T135: Multipot - A More Potent Variant of Evil Twin by K.N.Gopinath
* T136: The Next Wireless Frontier - TV White Spaces by Doug Mohney
* T137: Creating Unreliable Systems - Attacking the Systems that Attack You by Sysmin & Marklar
* T138: GeoLocation of Wireless Access Points and “Wireless GeoCaching” by Ricky Hill
* T139: Being in the Know… Listening to and Understanding Modern Radio Systems by Brett Neilson
* T140: The Emperor Has No Cloak - Web Cloaking Exposed by Vivek Ramachandran
* T141: Hardware Hacking for Software Geeks by nosequitor & Ab3nd
* T142: The Church of WiFi Presents: Hacking Iraq by Michael Schearer
* T161: HoneyJax (aka Web Security Monitoring and Intelligence 2.0) by Dan Hubbard
* T162: Hacking Social Lives: MySpace.com by Rick Deacon
* T163: The Inherent Insecurity of Widgets and Gadgets by Aviv Raff & Iftach Ian Amit
* T164: Greater Than 1 - Defeating “Strong” Authentication in Web Applications (for Online Banking) by
Brendan O’Connor.
* T165: Intranet Invasion With Anti-DNS Pinning by David Byrne
* T166: Biting the Hand that Feeds You - Storing and Serving Malicious Content From Well Known Web
Servers by Billy Rios & Nathan McFeters
* T201: Church Of WiFi’s Wireless Extravaganza by Church of WiFi’s
* T202: SQL Injection and Out-of-Band Channeling by Patrik Karlsson
* T203: Z-Phone by Phillip Zimmermann
* T204: OpenBSD Remote Exploit and Another IPv6 Vulnerabilities by Alfredo Ortega
* T205: MQ Jumping by Martyn Ruks
* T206: Virtual World, Real Hacking by Greg Hoglund
* T207: It’s All About the Timing by Haroon Meer & Marco Slaviero
* T208: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing by Jared
DeMott, Dr. Richard Enbody & Dr. Bill Punch
* T209: How Smart is Intelligent Fuzzing - or - How Stupid is Dumb Fuzzing? by Charlie Miller
* T210: INTERSTATE: A Stateful Protocol Fuzzer for SIP by Ian G. Harris
* T211: One Token to Rule Them All by Luke Jennings
* T212: Trojans - A Reality Check by Toralv Dirro & Dirk Kollberg
* T231: Multiplatform Malware Within the .NET-Framework by Paul Ziegler
* T232: Malware Secrets by Valsmith & Delchi
* T233: 44 Lines About 22 Things That Keep Me Up at Night by Agent X
* T234: Click Fraud Detection with Practical Memetrics by Broward Horne
* T235: Fighting Malware on your Own by Vitaliy Kamlyuk
* T236: Virtualization: Enough Holes to Work Vegas by D.J.Capelis
* T237: Homeless Vikings, (Short-Lived bgp Prefix Hijacking and the Spamwars) by Dave Josephsen
* T238: Webserver Botnets by Gadi Evron
* T239: The Commercial Malware Industry by Peter Gutmann
* T240: CaffeineMonkey - Automated Collection, Detection and Analysis of Malicious JavaScript by
Daniel Peck & Ben Feinstein
* T241: Greetz from Room 101 by Kenneth Geers
* T242: Estonia and Information Warfare by Gadi Evron
* T261: The Completion Backward Principle by geoffrey
* T262: Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level by Deviant Ollam,
Noid, Thorn, Jur1st
* T263: Locksport: An Emerging Subculture by Schuyler Towne
* T264: Satellite Imagery Analysis by Greg Conti
* T265: High Insecurity: Locks, Lies, and Liability by Marc Weber Tobias & Matt Fiddler
* T301: Analysing Intrusions & Intruders by Sean Bodmer
* T302: Aliens Cloned My Sheep by Major Malfunction
* T303: Breaking Forensics Software by Chris Palmer & Alex Stamos
* T304: Re-Animating Drives and Advanced Data Recovery by Scott Moulton
* T305: Cool Stuff Learned from Competing in the DC3 Digital Forensic Challenge by David C. Smith
* T306: Windows Vista Log Forensics by Rich Murphey
* T307: When Tapes Go Missing by Robert Stoudt
* T308: CiscoGate by The Dark Tangent
* T309: Hacking UFOlogy - Thirty Years in the Wilderness of Mirrors by Richard Thieme
* T311: Hack Your Car for Boost and Power! by Aaron Higbee
* T312: The Executable Image Exploit by Michael Schrenk
* T331: A Crazy Toaster: Can Home Devices Turn Against Us? by Dror Shalev
* T332: IPv6 is Bad for Your Privacy by Janne Lindqvist
* T333: Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation
by Andrea Barisani
* T335: Unraveling SCADA Protocols: Using Sulley Fuzzer by Ganesh Devarajan
* T336: Hacking the Extensible Firmware Interface by John Heasman
* T337: Hacking your Access Control Reader by Zac Franken
* T338: Security by Politics - Why it Will Never Work by Lukas Grunwald
* T339: Kernel Wars by Joel Eriksson, Karl Janmar, Claes Nyberg, Christer
Powered by vBulletin® Version 4.2.5 Copyright © 2025 vBulletin Solutions Inc. All rights reserved.