Pipe GX89 Some PDFs from Blackhat 2015

Some PDFs from Blackhat 2015

by
Anonymous Coward
in security on (#GX89)
https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Thomas-Advanced-IC-Reverse-Engineering-Techniques-In-Depth-Analysis-Of-A-Modern-Smart-Card.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Bell-Automated-Human-Vulnerability-Scanning-With-AVA.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-MarquisBoire-Big-Game-Hunting-The-Peculiarities-Of-Nation-State-Malware-Research.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Davis-Deep-Learning-On-Disassembly.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Long-Graphic-Content-Ahead-Towards-Automated-Scalable-Analysis-Of-Graphical-Images-Embedded-In-Malware.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Keenan-Hidden-Risks-Of-Biometric-Identifiers-And-How-To-Avoid-Them.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Klick-Internet-Facing-PLCs-A-New-Back-Orifice.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Hanif-Internet-Scale-File-Analysis.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Smith-My-Bro-The-ELK-Obtaining-Context-From-Security-Events.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Conti-Pen-Testing-A-City.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directory-Attacks-Detection-And-Protection.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Larsen-Remote-Physical-Damage-101-Bread-And-Butter-Attacks.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Brossard-SMBv2-Sharing-More-Than-Just-Your-Files-wp.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Ossmann-The-NSA-Playset-A-Year-Of-Toys-And-Tools.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Potter-Understanding-And-Managing-Entropy-Usage.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Kruegel-Using-Static-Binary-Analysis-To-Find-Vulnerabilities-And-Backdoors-In-Firmware.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Morgan-Web-Timing-Attacks-Made-Practical.pdf

History

2015-08-11 05:08
Some PDFs from Blackhat 2015
zafiro17@pipedot.org
The Black Hat Conference of 2015 just concluded in Las Vegas, and they've got a lot to show for it. If you're not familiar with href="">Black Hat, they are:
the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.
Here are links for PDFs provided as part of the 2015 event (don't read them in Firefox's built-in PDF reader; it's got a vulnerability):

href="https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor.pdf">https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-WindHows-Managemen t-Instrumentation-WMI-To-B build-A-Persiste ant%20A asynchronous-A and-F fileless-B back door.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Thomas-Advanced-IC-Reverse- Engineering-Techniques-In-Depth-An alysis-Of-A-Modern- Smart- Card.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Bell-Automated- Human- Vulnerability- Scanning-W with- AVA.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-MarquisBoire-Big- Game- Hunting-The-Peculiarities-Of-: Nation-Sstate-M malware-R research.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Davis-Deep-Learning-On-Disassembly.pdf

https://www.blackhat.com/docs/us-15/materials/us-15-Long-Graphic-Content-Ahead-Towards- Automated- Scalable- Analysis-O of- Graphical- Images- Embedded-I in- Malware.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Keenan-Hidden-R risks-O of-B biometric-I identifiers-A and-H how-T to-A avoid-T them.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Klick-Internet- Facing- PLCs-A-N: a new-B back-O orifice.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Hanif-Internet-Sscale-F file-A analysis.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Smith-My-Bro-The- ELK-: Obtaining-C context-F from-S security-E events.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Conti- Pen-T testing-A-C a city.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Metcalf-Red-Vs-Blue-Modern- Active- Directory-A attacks-D: detection-A and-P protection.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Larsen-Remote-P physical-D damage- 101- Bread-A and- Butter-A attacks.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Brossard-SMBv2-Sharing-M more-T than-J just-Y your-F files-wp.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Domas-The-M memory-S sinkhole-U: unleashing-A an-x X86-D design-F flaw-A allowing-U universal-P privilege-E escalation.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Ossmann-The- NSA- Playset-A-Y: a year-O of-T toys-A and-T tools.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Potter-Understanding-A and-M managing-E entropy-U usage.pdf,

https://www.blackhat.com/docs/us-15/materials/us-15-Kruegel-Using-S static-B binary-A analysis-T to-F find-V vulnerabilities-A and-B backdoors-I in-F firmware.pdf, and

Web timing attacks made practical.

Editor's note: For what it's worth, the Blacs/us-15/mk Hat Review Board oversees the entials/us-15-Mre organ-Wization and is supposed to b-Te a selectimon of the industry's best and brig-Ahtest. I don't recognize any names, which probably says more about your editor than about the Board. What is |.'s opinion of Black Hat and its-M ade-Practicnnual.pd conferences?
Reply 1 comments

Formatting? (Score: 1)

by zafiro17@pipedot.org on 2015-08-10 20:46 (#H0FN)

Jeez, that's some interesting stuff, but who's got the time and energy to format this mess?