Security/BlackHat 2012: Difference between revisions

Line 12: Line 12:
''July 25''
''July 25''


* 10:15  
10:15  
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Ridley Advanced ARM Exploitation] (Palace I) - ''kang''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Amit SexyDefense - Maximizing the home-field advantage] (Palace II) - ''joes''
Line 27: Line 27:
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Mortman The Defense RESTs: Automation and APIs for Improving Security] (Palace II) - ''kang''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Mortman The Defense RESTs: Automation and APIs for Improving Security] (Palace II) - ''kang''


* 2:15
14:15
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Miller "Don't Stand So Close To Me: An Analysis of the NFC Attack Surface"] -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Miller "Don't Stand So Close To Me: An Analysis of the NFC Attack Surface"] -''Who is attending, if anyone? Name here''
Defeating ASLR through info leaks, and how to cause them.
Defeating ASLR through info leaks, and how to cause them.
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Serna "The Info Leak Era on Software Exploitation"] (an example of one he wrote up on Flash is http://seclists.org/bugtraq/2012/Apr/63 ) -''Who is attending, if anyone? Name here''
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Serna "The Info Leak Era on Software Exploitation"] (an example of one he wrote up on Flash is http://seclists.org/bugtraq/2012/Apr/63 ) -''Who is attending, if anyone? Name here''


3:30
15:30
*  For the privacy geeks -- decloaking "private browsing" among other
*  For the privacy geeks -- decloaking "private browsing" among other
ways to track people. [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Fleischer "Web Tracking for You"]
ways to track people. [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Fleischer "Web Tracking for You"]
* A wildcard... Math.random() isn't crytographically secure, could we be vulnerable to anything like these PHP issues? If you go bringyour open mind and wear your brainstorming hat. * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyros "PRNG: Pwning Random Number Generators (in PHP applications)"]
* A wildcard... Math.random() isn't crytographically secure, could we be vulnerable to anything like these PHP issues? If you go bringyour open mind and wear your brainstorming hat. * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Argyros "PRNG: Pwning Random Number Generators (in PHP applications)"]


5:00
17:00
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Alonso Owning bad guys and mafia with javascript botnets] - who doesn't love a botnet that uses javascript?
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Alonso Owning bad guys and mafia with javascript botnets] - who doesn't love a botnet that uses javascript?
* New defensive features of Win8 we should consider using. Some may be
* New defensive features of Win8 we should consider using. Some may be
Confirmed users
58

edits