Results 1 to 2 of 2

Thread: สื่อต่างๆ ที่ใช้ในงาน defcon

  1. #1
    Jedi Global Moderator Gen0TypE's Avatar
    Join Date
    Jan 2008
    Location
    Khonkaen
    Posts
    312


    สำหรับงาน defcon ที่จัดแต่ละครั้งนั้น จะมีการนำสื่อต่างๆ ทีใช้ในงานมา post ไว้ให้โหลดได้
    ซึ่งสื่อที่มีให้โหลดนั้น ก็มีหลายรูปแบบ ทั้ง pdf, video, audio

    ถึงตอนนี้ งาน defcon มีทั้งหมด 15 ครั้งแล้ว และสื่อต่างๆ ก็สามารถโหลดได้จากเว็บ
    ส่วนครั้งที่ 16 นั้นจะจัดขึ้นในเดือนสิงหาคมปีนี้ครับ

    สื่อต่างๆ สามารถโหลดได้จากเว็บนี้ครับ
    **Hidden Content: To see this hidden content your post count must be 7 or greater.**

  2. #2
    Senior Member
    Join Date
    Sep 2007
    Posts
    228


    ขอช่วยเสริมละกัน

    Videos from Defcon 15 Hacker Conference

    วันที่ 3-5 สิงหาคม 2007

    ***เดิมที่เป็นดีวีดี ที่นี่ สามารถแยกดาวน์โหลดเป็นเรื่องๆตามที่สนใจได้ เป็นไฟล์ FLV ***

    * T101: Making of the DEFCON 15 Badges by Joe Grand
    * T102: Q&A with Bruce by Bruce Schneier
    * T103: Turn-Key Pen Test Labs by Thomas Wilhelm
    * T104: How I Learned to Stop Fuzzing and Find More Bugs by Jacob west
    * T105: Convert Debugging - Circumventing Software Armoring Techniques by Danny Quist & Valsmith
    * T106: Functional Fuzzing with Funk by Benjamin Kurtz
    * T107: Tactical Exploitation by H.D.Moore & Valsmith
    * T108: Intelligent Debugging for vuln-dev by Damien Gomez
    * T109: Fingerprinting and Cracking Java Obfuscated Code by Subere
    * T110: Comparing Application Security Tools by Edward Lee
    * T111: Meet the Feds (Panel Discussion)
    * T112: No-Tech Hacking by Johnny Long
    * T131: The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats by Steve Orrin
    * T133: Pen-testing Wi-Fi by Aaron Peterson
    * T134: Hacking EVDO by King Tuna
    * T135: Multipot - A More Potent Variant of Evil Twin by K.N.Gopinath
    * T136: The Next Wireless Frontier - TV White Spaces by Doug Mohney
    * T137: Creating Unreliable Systems - Attacking the Systems that Attack You by Sysmin & Marklar
    * T138: GeoLocation of Wireless Access Points and “Wireless GeoCaching” by Ricky Hill
    * T139: Being in the Know… Listening to and Understanding Modern Radio Systems by Brett Neilson
    * T140: The Emperor Has No Cloak - Web Cloaking Exposed by Vivek Ramachandran
    * T141: Hardware Hacking for Software Geeks by nosequitor & Ab3nd
    * T142: The Church of WiFi Presents: Hacking Iraq by Michael Schearer
    * T161: HoneyJax (aka Web Security Monitoring and Intelligence 2.0) by Dan Hubbard
    * T162: Hacking Social Lives: MySpace.com by Rick Deacon
    * T163: The Inherent Insecurity of Widgets and Gadgets by Aviv Raff & Iftach Ian Amit
    * T164: Greater Than 1 - Defeating “Strong” Authentication in Web Applications (for Online Banking) by

    Brendan O’Connor.
    * T165: Intranet Invasion With Anti-DNS Pinning by David Byrne
    * T166: Biting the Hand that Feeds You - Storing and Serving Malicious Content From Well Known Web

    Servers by Billy Rios & Nathan McFeters
    * T201: Church Of WiFi’s Wireless Extravaganza by Church of WiFi’s
    * T202: SQL Injection and Out-of-Band Channeling by Patrik Karlsson
    * T203: Z-Phone by Phillip Zimmermann
    * T204: OpenBSD Remote Exploit and Another IPv6 Vulnerabilities by Alfredo Ortega
    * T205: MQ Jumping by Martyn Ruks
    * T206: Virtual World, Real Hacking by Greg Hoglund
    * T207: It’s All About the Timing by Haroon Meer & Marco Slaviero
    * T208: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing by Jared

    DeMott, Dr. Richard Enbody & Dr. Bill Punch
    * T209: How Smart is Intelligent Fuzzing - or - How Stupid is Dumb Fuzzing? by Charlie Miller
    * T210: INTERSTATE: A Stateful Protocol Fuzzer for SIP by Ian G. Harris
    * T211: One Token to Rule Them All by Luke Jennings
    * T212: Trojans - A Reality Check by Toralv Dirro & Dirk Kollberg
    * T231: Multiplatform Malware Within the .NET-Framework by Paul Ziegler
    * T232: Malware Secrets by Valsmith & Delchi
    * T233: 44 Lines About 22 Things That Keep Me Up at Night by Agent X
    * T234: Click Fraud Detection with Practical Memetrics by Broward Horne
    * T235: Fighting Malware on your Own by Vitaliy Kamlyuk
    * T236: Virtualization: Enough Holes to Work Vegas by D.J.Capelis
    * T237: Homeless Vikings, (Short-Lived bgp Prefix Hijacking and the Spamwars) by Dave Josephsen
    * T238: Webserver Botnets by Gadi Evron
    * T239: The Commercial Malware Industry by Peter Gutmann
    * T240: CaffeineMonkey - Automated Collection, Detection and Analysis of Malicious JavaScript by

    Daniel Peck & Ben Feinstein
    * T241: Greetz from Room 101 by Kenneth Geers
    * T242: Estonia and Information Warfare by Gadi Evron
    * T261: The Completion Backward Principle by geoffrey
    * T262: Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level by Deviant Ollam,

    Noid, Thorn, Jur1st
    * T263: Locksport: An Emerging Subculture by Schuyler Towne
    * T264: Satellite Imagery Analysis by Greg Conti
    * T265: High Insecurity: Locks, Lies, and Liability by Marc Weber Tobias & Matt Fiddler
    * T301: Analysing Intrusions & Intruders by Sean Bodmer
    * T302: Aliens Cloned My Sheep by Major Malfunction
    * T303: Breaking Forensics Software by Chris Palmer & Alex Stamos
    * T304: Re-Animating Drives and Advanced Data Recovery by Scott Moulton
    * T305: Cool Stuff Learned from Competing in the DC3 Digital Forensic Challenge by David C. Smith
    * T306: Windows Vista Log Forensics by Rich Murphey
    * T307: When Tapes Go Missing by Robert Stoudt
    * T308: CiscoGate by The Dark Tangent
    * T309: Hacking UFOlogy - Thirty Years in the Wilderness of Mirrors by Richard Thieme
    * T311: Hack Your Car for Boost and Power! by Aaron Higbee
    * T312: The Executable Image Exploit by Michael Schrenk
    * T331: A Crazy Toaster: Can Home Devices Turn Against Us? by Dror Shalev
    * T332: IPv6 is Bad for Your Privacy by Janne Lindqvist
    * T333: Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation

    by Andrea Barisani
    * T335: Unraveling SCADA Protocols: Using Sulley Fuzzer by Ganesh Devarajan
    * T336: Hacking the Extensible Firmware Interface by John Heasman
    * T337: Hacking your Access Control Reader by Zac Franken
    * T338: Security by Politics - Why it Will Never Work by Lukas Grunwald
    * T339: Kernel Wars by Joel Eriksson, Karl Janmar, Claes Nyberg, Christer
    <div align="center">“If SOURCE is outlawed, only outlaws will have SOURCE ”</div>

Similar Threads

  1. Replies: 0
    Last Post: 19-05-2009, 08:22 PM
  2. Defcon 16 Videos
    By SheLLniX in forum Hacking Video
    Replies: 0
    Last Post: 10-03-2009, 09:47 AM
  3. Defcon 15 video
    By akira in forum Hacking Video
    Replies: 1
    Last Post: 22-11-2008, 08:08 AM
  4. Replies: 1
    Last Post: 18-12-2007, 01:13 AM
  5. งาน DefCon
    By DArkSign in forum Hacking/Security News (ภาษาไทย)
    Replies: 4
    Last Post: 08-10-2007, 09:57 PM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •