El 7 de agosto terminaba la Defcon 19 y, en el momento de escribir esta entrada, su web sufría un DDoS producido por la cantidad de miles de usuarios como yo, ávidos del tan esperado material de las conferencias.
Sorprendentemente, Chief Monkey pone ya a nuestra disposición los pdfs de las presentaciones y, aunque la celeridad de su publicación hacía sospechar de su seguridad, parece que son fidedignos, o eso espero ;)
dc-19-program.pdf
DEFCON-19-Abstrct-The-Schemaverse-Guide.pdf
DEFCON-19-Abstrct-The-Schemaverse.pdf
DEFCON-19-Almeida-Workshop-ESD.pdf
DEFCON-19-Alonso-Garrido-DUST.pdf
DEFCON-19-Alonso-Garrido-Excel.pdf
DEFCON-19-Arlen-Nano-Seconds-WP.pdf
DEFCON-19-Arlen-Nano-Seconds.pdf
DEFCON-19-Arpaia-Reed-Beat-to-1337.pdf
DEFCON-19-Baldwin-DVCS-WP.pdf
DEFCON-19-Baldwin-DVCS.pdf
DEFCON-19-Barisani-Bianco-Laurie-Franken.pdf
DEFCON-19-Barnett-Deceptive-Hacking-WP.pdf
DEFCON-19-Barnett-Deceptive-Hacking.pdf
DEFCON-19-Bilodeau-FingerBank.pdf
DEFCON-19-Bilodeau-PacketFence.pdf
DEFCON-19-Bouillon-Federation-and-Empire.pdf
DEFCON-19-Bowne-Three-Generations-of-DoS-Attacks.pdf
DEFCON-19-Brooks-Wilson-Traps-of-Gold.pdf
DEFCON-19-Bryner-Kinectasploit.pdf
DEFCON-19-Carey-Metasploit-vSploit-Modules.pdf
DEFCON-19-Chamales-Securing-Crisis-Maps.pdf
DEFCON-19-Chow-Abusing-HTML5.pdf
DEFCON-19-Conti-Security-Research.pdf
DEFCON-19-Cook-Kernel-Exploitation.pdf
DEFCON-19-Craig-Internet-Kiosk-Terminals.pdf
DEFCON-19-Crenshaw-Cipherspaces-Darknets.pdf
DEFCON-19-Crowley-Cryptographic-Oracles.pdf
DEFCON-19-Cryer-Taking-Your-Ball-and-Going-Home.pdf
DEFCON-19-DC-Groups-Panel.pdf
DEFCON-19-Devarajan-LeBert-VDLDS.pptx.pdf
DEFCON-19-Dinaburg-Bit-Squatting.pdf
DEFCON-19-Duckwall-Bridge-Too-Far.pdf
DEFCON-19-Elhage-Virtualization-Under-Attack.pdf
DEFCON-19-Elrod-Morris-Not-a-Doctor.pdf
DEFCON-19-Engebretson-Pauli-Pen-Testing.pdf
DEFCON-19-Fail-Panel.pdf
DEFCON-19-Feinstein-Jarmoc-Get-Off-of-My-Cloud.pdf
DEFCON-19-Foofus-Forceful-Browsing-WP.pdf
DEFCON-19-Fritschie-Witmer-F-On-the-River.pdf
DEFCON-19-Garcia-UPnP-Mapping-WP.pdf
DEFCON-19-Garcia-UPnP-Mapping.pdf
DEFCON-19-Gavin-OpenDLP.pdf
DEFCON-19-Geers-Strategic-Cyber-Security-WP.pdf
DEFCON-19-Geers-Strategic-Cyber-Security.pdf
DEFCON-19-Gomez-Bulletproofing-The-Cloud.pdf
DEFCON-19-Hamiel-Smartfuzzing_the_Web_DC.pdf
DEFCON-19-Havelt-Henrique.pdf
DEFCON-19-Heiland-Printer-To-Pwnd.pdf
DEFCON-19-Holt-Kilger-Assessing-Civilian-Willingness.pdf
DEFCON-19-Howard-Cyber-Security-Trends-WP.pdf
DEFCON-19-Howard-Cyber-Security-Trends.pdf
DEFCON-19-Imhoff-Password-Cracking.pdf
DEFCON-19-JackDaniel-PCI-2-PANEL.pdf
DEFCON-19-Jakhar-Jugaad-Linux-Thread-Injection.pdf
DEFCON-19-Kennedy-Pentesting-Over-Powerlines-2.pdf
DEFCON-19-Kennish-Tracking-the-Trackers.pdf
DEFCON-19-Kornbrust-Hacking-and-Securing-DB2.pdf
DEFCON-19-Kotler-Amit-Sounds-Like-Botnet.pdf
DEFCON-19-Krick-License-to-Transmit.pdf
DEFCON-19-Lai-Wu-Chiu-PK-APT-Secrets-2.pdf
DEFCON-19-Lenik-MAC(b)Daddy.pdf
DEFCON-19-Linn-PIG-Finding-Truffles.pdf
DEFCON-19-Maresca-FIPS-140.pdf
DEFCON-19-Marpet-Gostom-Smile-for-the-Grenade.pdf
DEFCON-19-McCoy-Hacking-Net.pdf
DEFCON-19-McGrew-Covert-WP.pdf
DEFCON-19-McGrew-Covert.pdf
DEFCON-19-McNabb-Vulns-Wireless-Water-Meter-Networks.pdf
DEFCON-19-Miller-Battery-Firmware-Hacking.pdf
DEFCON-19-O’Neil-Chin-Google-Android.pdf
DEFCON-19-Ocepek-Blinkie-Lights-Arduino.pdf
DEFCON-19-Ollam-Gun-Safes.pdf
DEFCON-19-Osborn-Johansen-Hacking-Google-Chrome-OS.pdf
DEFCON-19-Percoco-Spiderlabs-Droid.pdf
DEFCON-19-Percoco-Spiderlabs-Malware-Freakshow-3.pdf
DEFCON-19-Percoco-Spiderlabs-SSLizzard.pdf
DEFCON-19-Phillips-Hacking-MMORPGs.pdf
DEFCON-19-Pickett-Port-Scanning-Without-Packets.pdf
DEFCON-19-Pickett-Resources.pdf
DEFCON-19-Pittman-Password-Fail.pdf
DEFCON-19-Rezchikov-Wang-Engelman-Airport-Security-WP.pdf
DEFCON-19-Robinson-Time.pdf
DEFCON-19-Schearer-WTF-Privacy.pdf
DEFCON-19-Shah-Mobile-Moolah.pdf
DEFCON-19-Skunkworks-Bitcoin.pdf
DEFCON-19-Strauchs_Rad_Newman-SCADA-in-Prisons.pptx.pdf
DEFCON-19-Street-Steal-Everything.pdf
DEFCON-19-Sumner-Byers-Alien-Weaponizing-Cyberpsychology.pdf
DEFCON-19-Sutherland-How-to-Get-Your-Message-Out.pdf
DEFCON-19-Swende-Karlsson-Owasp-Hatkit.pdf
DEFCON-19-Tassey-Perkins-Wireless-Aerial-Surveillance-Platform.pdf
DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf
DEFCON-19-Trimble-Cybertravel.ppt.pdf
DEFCON-19-Webb-Runtime-Process-Insemination.pdf
DEFCON-19-Weeks-Network-Nightmare.pdf
DEFCON-19-Weyers-Key-Impressioning.pdf
DEFCON-19-Wilson-Traps-of-Gold.pdf
DEFCON-19-Woodberg-Network-Application-Firewalls.pdf
DEFCON-19-Zhu-Phishing-Online-Scams-in-China.pdf
DEFCON-19-Zoz-Bianchi-Vanquishing-Voyeurs.pdf
Repositorio: http://good.net/dl/k4r3lj/DEFCON19/ (echa un vistazo al resto de material ^o^)
Descarga pdfs sin abusar de tanto clic:
curl -silent http://good.net/dl/k4r3lj/DEFCON19/ | grep -i 'pdf' | cut -d '"' -f 8 | cut -d '<' -f 1 | grep -v '/' > dc19pdf.txt; for i in $(cat dc19pdf.txt); do curl --location "http://THIS-DOWNLOAD-WOULD-BE-FASTER-WITH-A-PREMIUM-ACCOUNT-AT-good.net" -L "http://good.net/dl/k4r3lj/DEFCON19/$i" > $i; done
Comentarios
Publicar un comentario