Advertisement
Guest User

bhusa-pdfs & presos

a guest
Jul 30th, 2010
5,558
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.55 KB | None | 0 0
  1. "https://media.blackhat.com/bh-us-10/whitepapers/Anh/BlackHat-USA-2010-Anh-Virt-ICE-wp.pdf"
  2. "https://media.blackhat.com/bh-us-10/presentations/Arlen/BlackHat-USA-2010-Arlen-SCADA-Cyberdouchery-slides.pdf"
  3. "https://media.blackhat.com/bh-us-10/whitepapers/olleb/BlackHat-USA-2010-olleb-Hardening-Windows-Applications-wp.pdf"
  4. "https://media.blackhat.com/bh-us-10/presentations/olleb/BlackHat-USA-2010-olleb-Hardening-Windows-Applications-slides.pdf"
  5. "https://media.blackhat.com/bh-us-10/whitepapers/Bailey_DePetrillo/BlackHat-USA-2010-Bailey-DePetrillo-The-Carmen-Sandiego-Project-wp.pdf"
  6. "https://media.blackhat.com/bh-us-10/whitepapers/Becherer/BlackHat-USA-2010-Becherer-Andrew-Hadoop-Security-wp.pdf"
  7. "https://media.blackhat.com/bh-us-10/presentations/Becherer/BlackHat-USA-2010-Becherer-Andrew-Hadoop-Security-slides.pdf"
  8. "https://media.blackhat.com/bh-us-10/presentations/Beek/BlackHat-USA-2010-Beek-Virtual-Forensics-slides.pdf"
  9. "https://media.blackhat.com/bh-us-10/presentations/Bolzoni_Schade/BlackHat-USA-2010-Bolzoni-Schade-Goodware-drugs-for-malware-slides.pdf"
  10. "https://media.blackhat.com/bh-us-10/whitepapers/Born/BlackHat-USA-2010-Born-psudp-Passive-Network-Covert-Communication-wp.pdf"
  11. "https://media.blackhat.com/bh-us-10/presentations/Born/BlackHat-USA-2010-Born-psudp-Passive-Network-Covert-Communication-slides.pdf"
  12. "https://media.blackhat.com/bh-us-10/whitepapers/Bugher/BlackHat-USA-2010-Bugher-Secure-Use-of-Cloud-Storage-wp.pdf"
  13. "https://media.blackhat.com/bh-us-10/presentations/Bugher/BlackHat-USA-2010-Bugher-Secure-Use-of-Cloud-Storage-slides.pdf"
  14. "https://media.blackhat.com/bh-us-10/whitepapers/Bursztein_Gourdin_Rydstedt/BlackHat-USA-2010-Bursztein-Bad-Memories-wp.pdf"
  15. "http://www.argeniss.com/research/TokenKidnapping.pdf"
  16. "https://media.blackhat.com/bh-us-10/whitepapers/Cerrudo/BlackHat-USA-2010-Cerrudo-Toke-Kidnapping's-Revenge-wp.pdf"
  17. "https://media.blackhat.com/bh-us-10/presentations/Cerrudo/BlackHat-USA-2010-Cerrudo-Toke-Kidnapping's-Revenge-slides.pdf"
  18. "https://media.blackhat.com/bh-us-10/whitepapers/Bratus_Conti/BlackHat-USA-2010-Bratus-Conti-Taxonomy-wp.pdf"
  19. "https://media.blackhat.com/bh-us-10/presentations/Bratus_Conti/BlackHat-USA-2010-Bratus-Conti-Voyage-of-a-Reverser-slides.pdf"
  20. "https://media.blackhat.com/bh-us-10/presentations/Criscione/BlackHat-USA-2010-Criscione-Virtually-Pwned-slides.pdf"
  21. "https://media.blackhat.com/bh-us-10/presentations/Cross/BlackHat-USA-2010-Cross-Internet-Wiretapping-slides.pdf"
  22. "https://media.blackhat.com/bh-us-10/whitepapers/Dabirsiaghi/BlackHat-USA-2010-Dabirsiaghi-JavaSnoop-wp.pdf"
  23. "https://media.blackhat.com/bh-us-10/presentations/Zovi/BlackHat-USA-2010-DaiZovi-Return-Oriented-Exploitation-slides.pdf"
  24. "https://media.blackhat.com/bh-us-10/whitepapers/Daswani/BlackHat-USA-2010-Daswani-mod-antimalware-wp.pdf"
  25. "https://media.blackhat.com/bh-us-10/presentations/Daswani/BlackHat-USA-2010-Daswani-mod-antimalware-slides.pdf"
  26. "https://media.blackhat.com/bh-us-10/whitepapers/Di_Croce/BlackHat-USA-2010-Di-Croce-SAP-Backdoors-wp.pdf"
  27. "https://media.blackhat.com/bh-us-10/presentations/Eng_Creighton/BlackHat-USA-2010-Eng-Creighton-Deconstructing-ColdFusion-slides.pdf"
  28. "https://media.blackhat.com/bh-us-10/whitepapers/Engebretson_Pauli_Cronin/BlackHat-USA-2010-Engebretson-Pauli-Cronin-SprayPAL-wp.pdf"
  29. "https://media.blackhat.com/bh-us-10/presentations/Engebretson_Pauli_Cronin/BlackHat-USA-2010-Engebretson-Pauli-Cronin-SprayPAL-slides.pdf"
  30. "https://media.blackhat.com/bh-us-10/presentations/Esser/BlackHat-USA-2010-Esser-Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits-slides.pdf"
  31. "https://media.blackhat.com/bh-us-10/whitepapers/Fayo/BlackHat-USA-2010-Fayo-Hacking-Protecting-Oracle-Databease-Vault-wp.pdf"
  32. "https://media.blackhat.com/bh-us-10/presentations/Fayo/BlackHat-USA-2010-Fayo-Hacking-Protecting-Oracle-Databease-Vault-slides.pdf"
  33. "https://media.blackhat.com/bh-us-10/whitepapers/Feinstein_Jarmoc_King/BlackHat-USA-2010-Jarmoc-Insecurities-in-Security-Infrastructure-wp.pdf"
  34. "https://media.blackhat.com/bh-us-10/whitepapers/Feinstein_Jarmoc_King/BlackHat-USA-2010-King-Insecurities-in-Security-Infrastructure-wp.pdf"
  35. "https://media.blackhat.com/bh-us-10/presentations/Feinstein_Jarmoc_King/BlackHat-USA-2010-Insecurities-in-Security-Infrastructure-slides.pdf"
  36. "https://media.blackhat.com/bh-us-10/whitepapers/FX/BlackHat-USA-2010-FX-Blitzableiter-wp.pdf"
  37. "https://media.blackhat.com/bh-us-10/presentations/FX/BlackHat-USA-2010-FX-Blitzableiter-slides.pdf"
  38. "https://media.blackhat.com/bh-us-10/whitepapers/Vaskovitch/BlackHat-USA-2010-Fyodor-Fifield-NMAP-Scripting-Engine-wp.pdf"
  39. "https://media.blackhat.com/bh-us-10/presentations/Vaskovitch/BlackHat-USA-2010-Fyodor-Fifield-NMAP-Scripting-Engine-slides.pdf"
  40. "https://media.blackhat.com/bh-us-10/whitepapers/Grenier_Johnson/BlackHat-USA-2010-Grenier-Johnson-Harder-Better-Faster-Stronger-wp.pdf"
  41. "https://media.blackhat.com/bh-us-10/presentations/Grugq/BlackHat-USA-2010-Gurgq-Base-Jumping-slides.pdf"
  42. "https://media.blackhat.com/bh-us-10/whitepapers/Hamiel_Wielgoszewski/BlackHat-USA-2010-Hamiel-Wielgosweski-Constricting-the-Web-wp.pdf"
  43. "https://media.blackhat.com/bh-us-10/presentations/Hamiel_Wielgoszewski/BlackHat-USA-2010-Hamiel-Wielgosweski-Constricting-the-Web-slides.pdf"
  44. "https://media.blackhat.com/bh-us-10/presentations/Hansen_Sokol/Blackhat-USA-2010-Hansen-Sokol-HTTPS-Can-Byte-Me.pdf"
  45. "https://media.blackhat.com/bh-us-10/presentations/Harbour/BlackHat-USA-2010-Harbour-Black-Art-of-Binary-Hijacking-slides.pdf"
  46. "https://media.blackhat.com/bh-us-10/whitepapers/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-wp.pdf"
  47. "https://media.blackhat.com/bh-us-10/presentations/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-slides.pdf"
  48. "https://media.blackhat.com/bh-us-10/presentations/Hypponen/BlackHat-USA_2010-Hypponen-You-will-be-billed-90000-for-this-call-slides.pdf"
  49. "https://media.blackhat.com/bh-us-10/presentations/Iozzo,Weinmann_Kornau/BlackHat-USA-2010-Iozzo-Weinmann-Kornau-Everybody-be-cool-this-is-a-roppery-slides.pdf"
  50. "https://media.blackhat.com/bh-us-10/whitepapers/Kamkar/BlackHat-USA-2010-Kamkar-How-I-Met-Your-Girlfriend-wp.pdf"
  51. "https://media.blackhat.com/bh-us-10/presentations/Kamkar/BlackHat-USA-2010-Kamkar-How-I-Met-Your-Girlfriend-slides.pdf"
  52. "https://media.blackhat.com/bh-us-10/whitepapers/Keltner/BlackHat-USA-2010-Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3.pdf"
  53. "https://media.blackhat.com/bh-us-10/presentations/Kennedy_Kelly/BlackHat-USA-2010-Kennedy-Kelly-PowerShell-Its-Time-To-Own-slides.pdf"
  54. "https://media.blackhat.com/bh-us-10/whitepapers/Le/BlackHat-USA-2010-Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-wp.pdf"
  55. "https://media.blackhat.com/bh-us-10/presentations/Le/BlackHat-USA-2010-Le-Paper-Payload-already-inside-data-reuse-for-ROP-exploits-slides.pdf"
  56. "https://media.blackhat.com/bh-us-10/whitepapers/Meer/BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf"
  57. "https://media.blackhat.com/bh-us-10/whitepapers/Meiners_Sor/Blackhat-USA-2010-Meiners-Sor-WEP-is-back-to-haunt-you-wp.pdf"
  58. "https://media.blackhat.com/bh-us-10/presentations/Meiners_Sor/Blackhat-USA-2010-Meiners-Sor-WEP-is-back-to-haunt-you-slides.pdf"
  59. "https://media.blackhat.com/bh-us-10/presentations/Nagy/BlackHat-USA-2010-Nagy-Industrial-Bug-Mining-slides.pdf"
  60. "https://media.blackhat.com/bh-us-10/whitepapers/Nohl/BlackHat-USA-2010-Nohl-Attacking.Phone.Privacy-wp.pdf"
  61. "https://media.blackhat.com/bh-us-10/whitepapers/Ocepek_Henderson/BlackHat-USA-2010-Henderson-Ocepek-Need-A-Hug-wp.pdf"
  62. "https://media.blackhat.com/bh-us-10/whitepapers/Ochoa_Azubel/BlackHat-USA-2010-Ochoa-Azubel-NTLM-Weak-Nonce-wp.pdf"
  63. "https://media.blackhat.com/bh-us-10/presentations/Ochoa_Azubel/BlackHat-USA-2010-Ochoa-Azubel-NTLM-Weak-Nonce-slides.pdf"
  64. "https://media.blackhat.com/bh-us-10/whitepapers/Jeongwook_Oh/BlackHat-USA-2010-Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-wp.pdf"
  65. "https://media.blackhat.com/bh-us-10/presentations/Jeongwook_Oh/BlackHat-USA-2010-Jeongwook-Oh-ExploitSpotting-Locating-Vulnerabilities-Out-Of-Vendor-Patches-Automatically-slides.pdf"
  66. "https://media.blackhat.com/bh-us-10/whitepapers/Ollmann/BlackHat-USA-2010-Ollmann-6millionDollarMan-wp.pdf"
  67. "https://media.blackhat.com/bh-us-10/presentations/Ollmann/BlackHat-USA-2010-Ollmann-6millionDollarMan-slides.pdf"
  68. "https://media.blackhat.com/bh-us-10/presentations/Parker/BlackHat-USA-2010-Parker-Finger-Pointing-for-Fun-Profit-and-War-0.2-slides.pdf"
  69. "https://media.blackhat.com/bh-us-10/whitepapers/Percoco_Llyas/Trustwave - SpiderLabs - BlackHat-USA-2010-Percoco-Llyas-Malware Freakshow-2010-wp.pdf"
  70. "https://media.blackhat.com/bh-us-10/presentations/Percoco_Llyas/Trustwave - SpiderLabs - BlackHat-USA-2010-Percoco-Llyas-Malware Freakshow-2010-slides.pdf"
  71. "https://media.blackhat.com/bh-us-10/whitepapers/Pollet_Cummins/BlackHat-USA-2010-Pollet-Cummings-RTS-Electricity-for-Free-wp.pdf"
  72. "https://media.blackhat.com/bh-us-10/presentations/Raber_Cheatham/BlackHat-USA-2010-Raber-Cheatham-Reverse-Engineering-with-Hardware-Debuggers-slides.pdf"
  73. "https://media.blackhat.com/bh-us-10/whitepapers/Rad/BlackHat-USA-2010-Rad-DMCA-wp.pdf"
  74. "https://media.blackhat.com/bh-us-10/presentations/Rad/BlackHat-USA-2010-Rad-DMCA-slides.pdf"
  75. "https://media.blackhat.com/bh-us-10/whitepapers/Rey_Mende/BlackHat-USA-2010-Mende-Graf-Rey-loki_v09-wp.pdf"
  76. "https://media.blackhat.com/bh-us-10/whitepapers/Ristic/BlackHat-USA-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-wp-v1.pdf"
  77. "https://media.blackhat.com/bh-us-10/presentations/Ristic/BlackHat-USA-2010-Ristic-Qualys-SSL-Survey-HTTP-Rating-Guide-slides.pdf"
  78. "https://media.blackhat.com/bh-us-10/whitepapers/Ryan/BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin-Sage-v1.0.pdf"
  79. "https://media.blackhat.com/bh-us-10/whitepapers/Shah/BlackHat-USA-2010-Shah-DOM-Hacks-Shreeraj-wp.pdf"
  80. "https://media.blackhat.com/bh-us-10/presentations/Shah/BlackHat-USA-2010-Shah-DOM-Hacks-Shreeraj-slides.pdf"
  81. "https://media.blackhat.com/bh-us-10/whitepapers/Shelton/BlackHat-USA-2010-Shelton-IBM-AIX-Heap-Overflow-Methods-wp.pdf"
  82. "https://media.blackhat.com/bh-us-10/presentations/Shelton/BlackHat-USA-2010-Shelton-IBM-AIX-Heap-Overflow-Methods-slides.pdf"
  83. "https://media.blackhat.com/bh-us-10/whitepapers/Siddharth/BlackHat-USA-2010-Siddharth-Hacking-Oracle-from-the-Web-wp.pdf"
  84. "https://media.blackhat.com/bh-us-10/presentations/Slaviero/BlackHat-USA-2010-Slaviero-Lifting-the-Fog-slides.pdf"
  85. "https://media.blackhat.com/bh-us-10/whitepapers/Smith/BlackHat-USA-2010-Smith-pyREtic-Reversing-wp.pdf"
  86. "https://media.blackhat.com/bh-us-10/whitepapers/Smith_Lai/BlackHat-USA-2010-Smith-Lai-Balancing-the-Pwn-deficit-wp.pdf"
  87. "https://media.blackhat.com/bh-us-10/whitepapers/Stender_Engel_Hill/BlackHat-USA-2010-Stender-Engel-Hill-Attacking-Kerberos-Deployments-wp.pdf"
  88. "https://media.blackhat.com/bh-us-10/presentations/Stender_Engel_Hill/BlackHat-USA-2010-Stender-Engel-Hill-Attacking-Kerberos-Deployments-slides.pdf"
  89. "https://media.blackhat.com/bh-us-10/whitepapers/Suiche/BlackHat-USA-2010-Suiche-Blue-Screen-of-the-Death-is-dead-wp.pdf"
  90. "https://media.blackhat.com/bh-us-10/presentations/Suiche/BlackHat-USA-2010-Suiche-Blue-Screen-of-the-Death-is-dead-slides.pdf"
  91. "https://media.blackhat.com/bh-us-10/whitepapers/Sullivan/BlackHat-USA-2010-Sullivan-Cryptographic-Agility-wp.pdf"
  92. "https://media.blackhat.com/bh-us-10/presentations/Sullivan/BlackHat-USA-2010-Sullivan-Cryptographic-Agility-slides.pdf"
  93. "https://media.blackhat.com/bh-us-10/presentations/Sumner/BlackHat-USA-2010-Sumner-Social-Net-Special-Ops-slides.pdf"
  94. "https://media.blackhat.com/bh-us-10/presentations/Thomas/BlackHat-USA-2010-Thomas-BlindElephant-WebApp-Fingerprinting-slides.pdf"
  95. "https://media.blackhat.com/bh-us-10/whitepapers/Umadas_Alleny/BlackHat-USA-2010-Umadas-Allen-Network-Stream_Debugging-with-Mallory-wp.pdf"
  96. "https://media.blackhat.com/bh-us-10/presentations/Umadas_Alleny/BlackHat-USA-2010-Umadas-Allen-Network-Stream_Debugging-with-Mallory-slides.pdf"
  97. "https://media.blackhat.com/bh-us-10/presentations/deVries/BlackHat-USA-2010-deVries-Attacking-Java-Clients-slides.pdf"
  98. "https://media.blackhat.com/bh-us-10/whitepapers/Vuksan_Pericin/BlackHat-USA-2010-Vuksan-Pericin-TitanMist-wp.pdf"
  99. "https://media.blackhat.com/bh-us-10/presentations/Vuksan_Pericin/BlackHat-USA-2010-Vuksan-Pericin-TitanMist-slides.pdf"
  100. "https://media.blackhat.com/bh-us-10/presentations/Waisman/BlackHat-USA-2010-Waisman-APT-slides.pdf"
  101. "https://media.blackhat.com/bh-us-10/presentations/Wicherski/BlackHat-USA-2010-Wicherski-dirtbox-x86-windows-emulator-slides.pdf"
  102. "https://media.blackhat.com/bh-us-10/whitepapers/Yerazunis/BlackHat-USA-2010-Yerazunis-Confidential-Mail-Filtering-wp.pdf"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement