HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Report from Black Hat USA 2009
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Report from Black Hat USA 2009  
> Access to the content HTML Beginning of the presentation
PDF PDF version [1945 KB]
AdobeFlash Adobe Flash version  
> Description Report of the Black Hat USA 2009 briefing which took place on July 29th and 30th 2009.  
> Context & Dates Talk presented during OSSIR Paris, on 8 September 2009.
 
> Author Christophe Alladoum (Christophe.Alladoum@hsc.fr) , Julien Raeis (Julien.Raeis@hsc.fr) 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Black Hat USA 2009
Photos
Les "faits marquants" de 2009
Router exploitation
Router exploitation
Router exploitation
Advanced Windows Heap Exploitation
Advanced Windows Heap Exploitation
Sniffing Keystrokes With Lasers/Voltmeters
Sniffing Keystrokes With Lasers/Voltmeters
Demystifying Fuzzers
More Tricks for Defeating SSL
More Tricks for Defeating SSL
More Tricks for Defeating SSL
Our Favorite XSS Filters and How to Attack Them
Our Favorite XSS Filters and How to Attack Them
Black Ops of PKI
Internet Spec Ops : Data Mining
Introducing Ring -3 Rootkits
Introducing Ring -3 Rootkits
Photos
Attacking SMS
Attacking SMS
Attacking Intel® Bios
Attacking Intel® Bios
Unraveling Unicode
Unraveling Unicode
SADE: Injecting agents in to VM guest OS
Is Your Phone Pwnd?
"Smart" Parking Meter Implementations, Globalism, and You
"Smart" Parking Meter Implementations, Globalism, and You
Exploratory Android Surgery
Exploratory Android Surgery
Exploratory Android Surgery
Cloudburst - Hacking 3D and Breaking out of VMware
Cloudburst - Hacking 3D and Breaking out of VMware
The Conficker Mystery
The Conficker Mystery
Merci !  
> Related documents
themeNews
[Service]  Security monitoring
[Presentation]  From ISS to risks and reverse [29 April 2009 - French]
[Presentation]  Black Hat Europe 2008 report - OSSIR [17 June 2008 - French]
[Presentation]  BlackHat06 report [12 September 2006 - French]
[Presentation]  Threats and preemptive security [18 May 2006 - French]
[Presentation]  Managing insecurity of spontaneous infrastructures [3 April 2006 - French]
[Presentation]  Spontaneous infrastructures : witch security ? [19 October 2005 - French]
[Presentation]  Today's security needs in networking [13 October 2005 - English]
[Presentation]  Information Systems Security in banking industrie [25 May 2005 - French]
[Presentation]  Firewalls are not dead [10 May 2005 - French]
[Presentation]  Stakes of security [19 April 2005 - French]
[Presentation]  Manage IS security of wide enterprise [12 April 2005 - French]
[Presentation]  Introduction - Stake and trends [January 2004 - French]
[Article]  2002, the year of all challenges [17 February 2002 - French]
[Article]  The security market news [29 March 2001 - French]
[Presentation]  BlackHat06 report [12 September 2006 - French]
[Presentation]  Black Hat Europe 2008 report - OSSIR [17 June 2008 - French]
> Copyright © 2009, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 14 September 2009 at 11:56:58 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants