Aerosol Posted January 13, 2015 Report Posted January 13, 2015 (edited) Protecting SCADA From the Ground Up – PDFDetecting Bluetooth Surveillance Systems – PDFDropping Docs on Darknets: How People Got Caught – PDFHacking 911: Adventures in Disruption, Destruction, and Death – PDFHow to Disclose an Exploit Without Getting in Trouble – PDFReverse Engineering Mac Malware – PDFNSA Playset: PCIe – PDFThe Monkey in the Middle: A pentesters guide to playing in traffic. – PDFInvestigating PowerShell Attacks – PDFIs This Your Pipe? Hijacking the Build Pipeline. – PDFScrew Becoming A Pentester – When I Grow Up I Want To Be A Bug Bounty Hunter! – PDFHome Alone with localhost: Automating Home Defense – PDFMeddle: Framework for Piggy-back Fuzzing and Tool Development – PDFInstrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively – PDF White PaperOne Man Shop: Building an effective security program all by yourself – PDFRF Penetration Testing, Your Air Stinks – PDFTouring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin – PDFUSB for all! – PDFShareEnum: We Wrapped Samba So You Don’t Have To – PDFAn Introduction to Back Dooring Operating Systems for Fun and Trolling – PDFAndroid Hacker Protection Level 0 – PDFAnatomy of a Pentest; Poppin’ Boxes like a Pro – PDFBug Bounty Programs Evolution – PDF ExtrasPractical Foxhunting 101 – PDFClient-Side HTTP Cookie Security: Attack and Defense – PDFBypass firewalls, application white lists, secure remote desktops under 20 seconds – PDFPropLANE: Kind of keeping the NSA from watching you pee – PDFGetting Windows to Play with Itself: A Hacker’s Guide to Windows API Abuse – PDFWeaponizing Your Pets: The War Kitteh and the Denial of Service Dog – PDFThrough the Looking-Glass, and What Eve Found There – PDF White PaperSummary of Attacks Against BIOS and Secure Boot – PDFI am a legend: Hacking Hearthstone with machine learning – PDFThe Secret Life of Krbtgt – PDFThe $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns – PDFHacking US (and UK, Australia, France, etc.) traffic control systems – PDFThe Cavalry Year[0] & a Path Forward for Public Safety – PDFNSA Playset: DIY WAGONBED Hardware Implant over I2C – PDFAbuse of Blind Automation in Security Tools – PDFWhy Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go – PDFSteganography in Commonly Used HF Radio Protocols – PDF ExtrasSaving Cyberspace by Reinventing File Sharing – PDFEmpowering Hackers to Create a Positive Impact – PDFJust What The Doctor Ordered? – PDFCheck Your Fingerprints: Cloning the Strong Set – PDFShellcodes for ARM: Your Pills Don’t Work on Me, x86 – PDFBlowing up the Celly – Building Your Own SMS/MMS Fuzzer – PDFMass Scanning the Internet: Tips, Tricks, Results – PDFDeconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering – PDFSaving the Internet (for the Future) – PDFBurner Phone DDOS 2 dollars a day : 70 Calls a Minute – PDFHack All The Things: 20 Devices in 45 Minutes – PDFStolen Data Markets: An Economic and Organizational Assessment – PDFRaspberry MoCA – A recipe for compromise – PDF White Paper 1 White Paper 2Girl… Fault-Interrupted. – PDFExtreme Privilege Escalation On Windows 8/UEFI Systems – PDF White PaperNinjaTV – Increasing Your Smart TV’s IQ Without Bricking It – PDFOracle Data Redaction is Broken – PDFWeird-Machine Motivated Practical Page Table Shellcode & Finding Out What’s Running on Your System – PDFCatching Malware En Masse: DNS and IP Style – PDF White PaperAttacking the Internet of Things using Time – PDFOpen Source Fairy Dust – PDFLearn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment – PDF White PaperGenerating ROP payloads from numbers – PDFDEF CON Comedy Jam Part VII, Is This The One With The Whales? – PDFThe NSA Playset: RF Retroreflectors – PDF 1 PDF 2VoIP Wars: Attack of the Cisco Phones – PDFPlaying with Car Firmware or How to Brick your Car – PDFMeasuring the IQ of your Threat Intelligence feeds – PDFSecure Because Math: A Deep Dive On Machine Learning-Based Monitoring – PDFAbusing Software Defined Networks – PDFNSA Playset : GSM Sniffing – PDFCyberhijacking Airplanes: Truth or Fiction? – PDFAm I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance – PDFDetecting and Defending Against a Surveillance State – PDFAcquire current user hashes without admin privileges – PDFYou’re Leaking Trade Secrets – PDFVeil-Pillage: Post-exploitation 2.0 – PDFFrom Raxacoricofallapatorius With Love: Case Studies In Insider Threat – PDFDon’t DDoS Me Bro: Practical DDoS Defense – PDFAdvanced Red Teaming: All Your Badges Are Belong To Us – PDFI Hunt TR-069 Admins: Pwning ISPs Like a Boss – PDFThe Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State – PDFA Journey to Protect Points-of-sale – PDFImpostor — Polluting Tor Metadata – PDFDomain Name Problems and Solutions – PDF White PaperOptical Surgery; Implanting a DropCam – PDFManna from Heaven: Improving the state of wireless rogue AP attacks – PDFThe Open Crypto Audit Project – PDFPractical Aerial Hacking & Surveillance – PDF White PaperFrom root to SPECIAL: Pwning IBM Mainframes – PDFPoS Attacking the Traveling Salesman – PDFDon’t Fuck It Up! – PDFSource Edited January 13, 2015 by Aerosol 1 Quote