Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Report from BlackHat/DEFCON 2014
Go to: HSC Trainings
Télécharger le catalogue des formations
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Bulletin juridique HSC
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Report from BlackHat/DEFCON 2014  
> Access to the content HTML Beginning of the presentation
PDF PDF version [1.7M KB]  
> Description Report of the BlackHat/Defcon 2014 conferences  
> Context & Dates Talk presented during OSSIR, on 9 September 2014.
> Author Inčs Ribeiro (Ines.Ribeiro@hsc.fr), Steeve Barbeau (Steeve.Barbeau@hsc.fr) 
> Type [ French - HTML ]  
> Abstract &
Table of content
blackhat 2014
Defcon 22
Defcon bonus
IPS evasion on IPv6 - Antonios Atlasis - Enno Rey
Attacking Broadband modems - Andreas Lindh
Android FakeID vulnerability - Jeff Forristal
VoIP Wars - Fatih Ozavci
Exploiting vulnerabilities on graphical user interfaces - Collin Mulliner
BadUSB - Karsten Nohl - Jakob Lell
BadUSB - Karsten Nohl - Jakob Lell
Hacking Cisco EnergyWise - Matthias Luft - Ayhan Soner Koca
GRR - Greg Castle
SVG: Exploiting browsers without bugs - Rennie deGraaf
A journey to protect PoS - Nir Valtman
Capstone - Quynh Nguyen Anh
Cellular exploitation on a global scale: the rise and fall of the control protocol - Mathew Solnik - Marc Blanchou
SATCOM terminals: Hacking by air, sea, and land - Ruben Santamarta
Pulling the Curtain on Airport Security - Billy Rios
Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment - Jesus Molina
Oracle Data Redaction is Broken - David Litchfield
From root to SPECIAL: Pwning IBM Mainframes - Philip Young
Bypass firewalls, application white lists, secure remote desktops under 20s - Zoltán Balázs
Hack All The Things: 20 Devices in 45 Minutes - CJ Heres - Amir Etemadieh - Mike Baker - Hans Nielsen
Abusing Software Defined Networks - Gregory Pickett
A survey of remote automotive attack surfaces - Charlie Miller - Christopher Valasek
A survey of remote automotive attack surfaces - Charlie Miller - Christopher Valasek
> Related documents
[Service]  Audit & Assessment
[Presentation]  Report from BlackHat/DEFCON 2012 [11 September 2012 - French]
[Presentation]  Qualifications of suppliers in security [15 June 2012 - French]
[Presentation]  Industrial control systems security. Scadastrophe... or not. [15 May 2012 - French]
[Presentation]  Feedback on RGS compliance [27 May 2011 - French]
[Presentation]  Infiltrate 2011 report [16 April 2011 - French]
[Presentation]  Feedback on security audits [1 April 2008 - French]
[Presentation]  Technicals Security Audits for BS7799 [24 May 2005 - French]
[Presentation]  Useful standards for network security [20 October 2003 - French]
[Presentation]  Audits, Assessments and Penetration Tests [22 January 2003 - French]
[Presentation]  Audits, Assessments and Penetration Tests [26 June 2002 - French]
[Presentation]  Network auditing [12 November 1997 - French]
[Presentation]  Tests and evaluation of Internet security solutions [30 May 1997 - French]
[Presentation]  Autohack [13 June 1995 - French]
[Presentation]  Satan [11 April 1995 - French]
> Copyright © 2014, Hervé Schauer Consultants, all rights reserved.


Last modified on 17 September 2014 at 10:21:56 CET - webmaster@hsc.fr
Information on this server - © 1989-2013 Hervé Schauer Consultants