Tag Archives: hacking

[EN] Anorak’s Weekly Reading List

Previous week was very busy. A lot of articles which I read was connected with my actual project for one of my customer. So more tech than life last week. But… Enjoy!

LIFE

  • LINK | 26, unmarried, and childless
  • LINK | Five top tips for layovers on a business trip
  • LINK | Baaba Kulka
  • LINK | Autonomus Weapons: an Open Letter from AI & Robotics Researchers
  • LINK | Wolne Lektury
  • LINK | Top 10 Geddy Lee Rush Songs

TECH

  • LINK | Cortana Analytics Suite: Transform data into intelligent action
  • LINK | TechNet Evaluation Center
  • LINK | Revealed: The Chinese forums offering hacking courses for just US$100
  • LINK | China’s Parliament Publishes Draft Cyber-Security Law
  • LINK | China Uses ‘Picking Quarrels’ Charge to Cast a Wider Net Online
  • LINK | ‘The China Challenge,’ by Thomas J. Christensen
  • LINK | Ensuring cyber security an indisputable norm
  • LINK | Authorization Services Role-Based and Attribute-Based Access Control
  • LINK | Introduction to Web Vulnerabilities (Prezi)
  • LINK | Windows 10’s Wi-Fi Sense draws security concerns and questions
  • LINK | Analyze Session Logon Duration
  • LINK | List of free and fee based SQL Server training opportunities in UK
  • LINK | Certyfikacja Microsoft – jakie egzaminy zostaną wycofane w najbliższym czasie?
  • LINK | China-Tied Hackers That Hit U.S. Said to Breach United Airlines
  • LINK | Making PowerShell useful for your team
  • LINK | Learn ethical hacking and session hijacking on Pluralsight
  • LINK | Windows 10: Here are the privacy issues you should know about
  • LINK | SQL Server Radio: Show 26 – Boris Hristov
  • LINK | SQL Server 2016 Community Technology Preview 2.2 is available
  • LINK | What Windows 10 Means for Enterprise Users
  • LINK | I’m giving away MILLIONS of FREE Microsoft eBooks again!
  • LINK | Key Connection for Encryptionizer (NetLib) Resource Kit
  • LINK | Windows 10 Shares Your Wi-Fi With Contacts
  • LINK | Common causes of SQL Server licensing pain
  • LINK | End of Mainstream and Extended Support for SQL Server 2005 and End of Service Pack Support for SQL Server 2008 SP1
  • LINK | Tagging on Compute, Network and Storage Resources Compute, Network, and Storage resources created through the Azure
  • LINK | DBTA – Russian Hackers Steal 1.2b Internet Credentials: Or, Why the Heck Does this Keep Happening?!

NOTE: week 31 | year 2015

[EN] Def Con 21–a little UnOfficially…

a1652230982_2The biggest, most important, incredible (especially in the context of discussion between Director of NSA and Attendees on another conference <Black Hat>) conference focused for security, cyber security, ethical hacking and more. It was held in Las Vegas between 1st and 4th August. Def Con 21. Some of us cannot be there, maybe in next year, but we can get (and share) two parts of materials form DefCon.

PRIMARY – unofficial sessions (I found it on blog post here). And here is the list of available for download (394 MB) sessions:

  • Kang-Cruz-RESTing-On-Your-Laurels-Will-Get-You-Pwned.pdf
  • Caceres-Massive-Attacks-With-Distributed-Computing.pdf
  • Pinto-Defending-Networks-Machine-Learning-WP.pdf
  • Pinto-Defending-Networks-Machine-Learning.pdf
  • Baldet-Suicide-Intervention-Risk-Assessment-Tactics.pdf
  • Davis-Revealing-Embedded-Fingerprints.pdf
  • Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf
  • Bogdan-Alecu-Attacking-SIM-Toolkit-with-SMS-WP.pdf
  • Bogdan-Alecu-Business-Logic-Flaws-in-MO.pdf
  • OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf
  • Gorenc-Spelman-Java-Every-days-WP.pdf
  • Gorenc-Spelman-Java-Every-days.pdf
  • Riley-Defense-by-Numbers.pdf
  • Sumner-Wald-Prediciting-Susceptibility-To-Social-Bots-On-Twitter.pdf
  • Dudley-Privacy-In-DSRC-Connected-Vehicles.pdf
  • Young-Google-Skeleton-Key.pdf
  • Crowley-Savage-Bryan-Home-Invasion-2.0-WP.pdf
  • Crowley-Savage-Bryan-Home-Invasion-2.0.pdf
  • Dan-Griffin-Protecting-Data.pdf
  • Chechik-Utilizing-Popular-Websites-for-Malicious-Purposes-Using-RDI.pdf
  • Selifonov-A-Password-is-Not-Enough-Why-Disk-Encryption-is-Broken.pdf
  • Fulton-Zolnikov-The-Politics-of-Privacy-and-Technology.pdf
  • Milam-Getting-The-Goods-With-smbexec.pdf
  • Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf
  • Ozavci-VoIP-Wars-Return-of-the-SIP.pdf
  • Flipper-10000-Yen.pdf
  • Payer-Exploiting-Music-Streaming-with-JavaScript.pdf
  • Pickett-Lets-Screw-With-NMAP.pdf
  • Scott-Security-in-Cognitive-Radio-Networks.pdf
  • Thompson-CREAM-Cache-Rules-Evidently-Ambiguous-Misunderstood.pdf
  • Schultz-Examining-the-Bitsquatting-Attack-Surface-WP.pdf
  • Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
  • Staggs-How-to-Hack-Your-Mini-Cooper.pdf
  • Denaro-How-to-Disclose-or-Sell-an-Exploit.pdf
  • Bialek-PowerPwning-Post-Exploiting-by-Overpowering-Powershell.pdf
  • Grand-JTAGulator.pdf
  • Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf
  • Engler-Vines-Electromechanical-PIN-Cracking-WP.pdf
  • Engler-Vines-Electromechanical-PIN-Cracking.pdf
  • Justin-Hendricks-So-You-Think-Your-Domain-Controller-Is-Secure.pdf
  • Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf
  • Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf
  • Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf
  • Marschalek-Thorny-Malware.pdf
  • Perklin-ACL-Steganography.pdf.pdf
  • Schrenk-How-my-Botnet-Defeated-Russian-Hackers.pdf
  • Chow-Abusing-NoSQL-Databases.pdf
  • Sikka-EMET-4.0-PKI-Mitigation.pdf
  • Oberli-Please-Insert-Inject-More-Coins.pdf
  • Mittal-Powerpreter-Post-Exploitation-Like-a-Boss.pdf
  • Fora-Defeating-SEAndroid.pdf
  • Polstra-We-are-Legion-Pentesting.pdf
  • Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf
  • Duszynski-Cyber-Offenders.pdf
  • Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf
  • Baumgarten-Mach-O-Viz-WP.pdf
  • Baumgarten-Mach-O-Viz.pdf
  • Richard-Thieme-UFOs-and-Govt.pdf
  • Ricky-Hill-Phantom-Drone.pdf
  • Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense.pdf
  • Stucke-DNS-Hazards.pdf
  • Sandvik-Safety-of-the-Tor-Network.pdf
  • Holeman-The-Bluetooth-Device-Database.pdf
  • Bowne-SSD-Data-Evap.pdf
  • Bowne-Prince-Evil-DoS-Attacks-and-Strong-Defenses.pdf
  • Behrens-Bandelgar-MITM-All-The-IPv6-Things.pdf
  • Rogers-Caceres-The-Dawn-of-Web-30.pdf
  • Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf
  • Steele-Kottman-Collaborative-Penetration-Testing-With-Lair.pdf
  • Miu-Lee-Kill-em-All-DDoS-Protection-Total-Annihilation.pdf
  • Toukharian-Gevorgyan-HTTP-Time-Bandit.pdf
  • McGrew-Pwn-The-Pwn-Plug .pdf
  • McGrew-Pwn-The-Pwn-Plug-WP.pdf
  • WiK-Mubix-gitDigger.pdf
  • Blacher-Transcending-Cloud-Limitations.pdf
  • source-Code-dpk-master.zip
  • Zoz-Hacking-Driverless-Vehicles.pdf
  • bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT-WP.pdf
  • bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT.pdf
  • m0nk-BoutiqueKit.pdf
  • soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf

SECONDARY – very important too – The Def Con 21 Soundtrack:

  • BT – The Gathering Darkness  13:12  
  • Dual Core – Fear and Chaos (Dale Chase Remix)  04:35  
  • ytcracker – Bitcoin Baron  03:29  
  • BLEO – The Carterfone Decision  01:47  
  • Swinging Rabbits – Monster (Gunslinger vs Blare Remix)  04:14  
  • Psymbionic & Great Scott – Computronium  04:39  
  • Gramatik – Talkbox Intended  06:10  
  • PANTyRAiD – Jokes from the Backseat  04:38  
  • DJ RoboRob – The Great Divide ft. Dual Core  04:11  
  • BREDE – Crush On  04:04  
  • Karton – Chase It High (Left/Right Remix)  06:00  
  • Royal Sapien presents No Context – For the Breakers (DEF CON Edit)  04:23  
  • Son of the Electric Ghost – Beat It Kids  05:23  
  • Nick Stoynoff presents NOFF – Aryt  03:20  
  • A.E. Burdick – Room 101  06:35  
  • Faderhead – Free  03:42  
  • MDMM – Octopus (Redux)  07:25  
  • Vigilante – It’s Our Time (Electro Version)  03:00  
  • BlakOPz – BlakOUt  05:59  
  • Bud Melvin – Trolling is a Art  02:48

Soundtrack is available for download for free or if You want to pay, You can choose appropriate quality. Formats for standard users: MP3 V0 and MP3 320 and of course for Audiophiles and NERDS (!): FLAC, AAC, ALAC, OGG – from 143 to 712 MB.

DEF CON 21: The Official Soundtrack

____

ENJOY!

Content Protected Using Blog Protector By: PcDrome.
Skip to toolbar