Целая пачка презентаций: http://www.slideshare.net/DefconRuss…eronights-2011
Особо советую:
Don’t touch it, unless it falls in pieces business applications hack in extreme conditions
Root via XSS
How to hack a telecom and stay alive
Splitting, smuggling and cache poisoning come back
Ну и видео от difezza: <http://www.youtube.com/watch?v=_Qlxx-xKknY>