Tutorial By Alessio Pennasilico Preview: I nostri computer, le nostre comunicazioni, traboccano di informazioni che vorremmo non diventassero di pubblico dominio, o fossero conosciute da persone che non hanno alcun diritto di conoscerle. Vogliamo proteggerci? Quali strumenti abbiamo a disposizione per proteggere cosa? Che garanzie ci offrono questi strumenti? Download Link: https://www.ihteam.net/papers/privacy_360.pdf
Comprendere e gestire i RAID
Tutorial by Alessio Pennasilico Preview: Finalità del corso Capire i meccanismi di fault-tolerance delle unita’ di memoria di massa. Imparare a conoscere i meccanismi che permettono di accedere ai dischi. Download Link: https://www.ihteam.net/papers/raid.pdf
Cisco IOS Forensics
Tutorial By Felix FX Lindner Preview: [ad] IP Routing Infrastructure and Cisco IOS Cisco IOS Internals Debugging and Post Mortem Analysis Today A New Analysis Approach Proposal Features Challenges Public Offer Future Work Download Link: http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-fx.pdf
PS3 Cracker – Crackstation
Tutorial By nick breese Preview: I’m Nick Breese From Wellington, New Zealand (are there any other kiwis here?) Have been doing this research for 9 months now “Security consultant” for Security-Assessment.com We break things for a living Due to security being a small market in a small country, we need to be “jack of all […]
iPhone Forensics
Tutorial By Andrew Hoog Preview: Introduction The iPhone was introduced on January, 2007 and has now surpassed the Blackberry as the second largest supplier of smart phones. Regardless if this is sustainable, the Apple iPhone already has a significant footprint and will appear more frequently in computer forensic cases. The iPhone has an active hacking […]
Tutorial By Eagle Preview: 1 Introduction Reverse engineering of binary programs is a very time consuming task, often performed in a very serialized manner. Analysts are forced to operate in this serial fashion in large part because of the nature of the tools they choose to use. When several analysts do attempt to coordinate their […]
Browser Vulnerabilities
Tutorial By ETHz Preview: In recent years the Web browser has increasingly become targeted as an infection vector for vulnerable hosts. Classic scan for and remotely connect to vulnerable hosts (typically servers) in order to exploit them. Unlike these, Web browser vulnerabilities are commonly exploited when the user of the vulnerable host visits a malicious […]
Tracking Ghostnet
Tutorial by SecDevGroup Preview: This investigation was prepared by a dedicated team of professionals. Greg Walton conducted and coordinated the primary field-based research in India, Tibetan Missions abroad, and Europe. Greg is a SecDev Group associate and editor of the Information Warfare Monitor website. He is currently a SecDev Fellow at the Citizen Lab. The […]
Attacking Social Networks
Tutorial By hamiel-moyer Preview: Like most folks of a security bent (and if you’re reading this, that probably means you), we’ve spent a lot of time watching Web 2.0 with bemusement. Promiscuous sharing of information, client-side Javascript goop, blogging, mini-blogging, micro-blogging, vlogging, social nets and social media have all given the web much of what […]
Tutorial by LASEC Preview: Cryptanalytic attacks based on exhaustive search need a lot of computing power or a lot of time to complete. When the same attack has to be carried out multiple times, it may be possible to execute the exhaustive search in advance and store all results in memory. Once this precomputation is […]