Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Report of BlackHat 2007 and DefCon 15
Go to: HSC Trainings
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Report of BlackHat 2007 and DefCon 15  
> Access to the content HTML Beginning of the presentation
PDF PDF version [867 KB]
AdobeFlash Adobe Flash version  
> Description Report of BlackHat 2007 and DefCon 15  
> Context & Dates Talk presented during OSSIR, on 11 September 2007.
> Author Jérôme Poggi, Louis Nyffenegger 
> Type [ French - HTML ]  
> Abstract &
Table of content
Blackhat : Introduction
OpenBSD Remote Exploit
Hacking Intranet Websites from the outside
Attacking Web Service Security...
Tactical Exploitation (Part 2)
IsGameOver(), anyone ?
Injecting RDS-TMC Traffic Information Signals
Blind Security Testing - An Evolutionary Approach
Fuzzing Sucks! - (or Fuzz it Like you Mean it!)
Oracle Forensic
MS-SQL Forensic
Black Out : What happened ?
Breaking Forensics Software: Weaknesses in Critical Evidence Collection
Defcon : Introduction
Defcon : Contests
Defcon : la boutique
SQL injection and out-of-band channeling
When Tapes Go Missing
How smart is Intelligent fuzzing or how stupid is dump fuzzing
Interstate : A stateful protocol fuzzer for SIP
One token to rule them all
No-Tech Hacking
Pentesting Wi-Fi
Creating Unreliable Systems, Attacking the Systems that Attack You
Hacking your Access Control Reader
GeoLocation of Wireless Access Points and "Wireless GeoCaching"
The Emperor Has No Cloak - WEP Cloaking Exposed
High insecurity : Locks, lies and Liability
Questions ?
> Related documents
> Copyright © 2007, Hervé Schauer Consultants, all rights reserved.


Last modified on 12 September 2007 at 00:48:54 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants