The presentations from ToorCon X are now available to download on the ToorCon X Conference page. Below are direct links to the presentations.
Hour Presentations
- Black Ops of DNS 2008: Its The End Of The Cache As We Know It by Dan Kaminsky
- How To Impress Girls With Browser Memory Protection Bypasses by Alexander Sotirov
- Knowing and Enjoying the Cold Boot Attack by Bruno G Oliveira and Jake Appelbaum
- Targeted VoIP Eavesdropping: An Attack From Within by Jason Ostrom
- Active Fingerprinting of 802.11 APs by Sergey Bratus, Cory Cornelius, Daniel Peebles, and Axel Hansen
- One XSS To Rule The Enterprise by grutz
- Loaded Dice: SSH Key Exchange and the OpenSSL PRNG Vuln by Ben Feinstein
- Your risk is not what it used to be by Ariel Waissbein
- Freifunk in the USA: Leveraging Community Organizations to build Neighborhood Wireless Networks by Nick Farr and Eric Michaud
- Advanced SQL Injection by Joseph McCray
20 Minute Presentations
- a 30,000 feet look at wi-fi, the freezing spot by Luiz “effffn” Eduardo
- Breaking UNIX crypt() on the PlayStation 3 by Marc Bevand
- RFD (Remote File Downloading) using Blind Techniques by Chema Alonso and Jose Parada
- Anatomy of the Asprox/Danmec Botnet by Dennis Brown
- Hacking SharePoint by Dan Griffin
- Nunchaku: Attack, Defense, and a lot of arm flailing by Adam Cecchetti
- Owning telephone entry systems (aka why you shouldn’t sleep so well) by Joshua Brashars
- Ultimate Script Deobfuscation: Browser Hooking version simulation by Stephan Chenette
- Advanced Techniques in Automated Web Application Testing by David Byrne
- Mobile Phone Messaging Anti-Forensics by Luis Miras and Zane Lackey
- New School Information Gathering by Chris Gates
- Privacy-preserving Location Tracking of Lost of Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs by Thomas Ristenpart
- The future of Lockpicking by datagram
[…] ToorCon X Presentations | Infosec Events Yup, more reading. […]