41
41
Jul 8, 2019
07/19
Jul 8, 2019
by
Hak5
movies
eye 41
favorite 0
comment 0
El Kentaro joins us during DEF CON 26 to talk about his Hak5 on-the-go build and the Tokyo, Japan Hacker Events. Links: https://twitter.com/elkentaro https://www.instagram.com/elkentaro/ https://medium.com/@elkentaro https://codeblue.jp/2018/en/ http://www.avtokyo.org/ https://pacsec.jp/ https://bsides.tokyo/ -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds →...
Topics: Youtube, video, Science & Technology, hak5, hack, technology, darren kitchen, shannon morse,...
30
30
Oct 6, 2018
10/18
Oct 6, 2018
by
DEFCONConference
movies
eye 30
favorite 0
comment 0
In this modern digital age of technically competent adversaries we forget that there may still be a need to conduct old school physical surveillance against a target. Many organisations utilise surveillance teams and these may be in-house in the case of government agencies or third-party teams contracted for a specific task and their targets range from suspected terrorists to people accused of bogus insurance claims. Whilst most people think that they may never be placed under surveillance some...
Topics: Youtube, video, Science & Technology, DEF, CON, DEFCON 26, DEFCON, DEF CON, hackers, hacking...
87
87
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 87
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FYoung%2FDEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf&redir_token=tVZuE7xrTKW5PGb7RxNaa2W6izl8MTUzNzQwMDU4NEAxNTM3MzE0MTg0&event=video_description&v=Xfl4spvM5DI From root to SPECIAL: Pwning IBM Mainframes Philip “Soldier of Fortran” Young 1.1 million transactions are run through mainframes every second worldwide. From your flight to your ATM withdrawal...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
51
51
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 51
favorite 0
comment 0
Slides Here: /redirect?redir_token=cxl245MgLWALVC2SMYGMg98XM9l8MTUzNzQwMDUxMkAxNTM3MzE0MTEy&event=video_description&v=wzyuioto4y8&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPierce-Loki%2FDEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf NSA Playset : GSM Sniffing Pierce SECURITY RESEARCHER Loki SECURITY RESEARCHER A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
50
50
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 50
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=3LZhFFm1tK0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKlafter-Swanson%2FDEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf&redir_token=6hf6QocokC-KNUNJX_WZV0dFVmN8MTUzNzQwMDQ1M0AxNTM3MzE0MDUz Check Your Fingerprints: Cloning the Strong Set Richard Klafter (Free) SENIOR SOFTWARE ENGINEER, OPTIMIZELY Eric Swanson (Lachesis) SOFTWARE DEVELOPER The web of trust has...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
58
58
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 58
favorite 0
comment 0
Slides Here: /redirect?redir_token=7a7GIl-mZ_KTw7nfO4rEPlMRp0t8MTUzNzQwMDM4NUAxNTM3MzEzOTg1&event=video_description&v=d5jqV06Yijw&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FRowley%2FDEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf Detecting and Defending Against a Surveillance State Robert RowleySECURITY RESEARCHER, TRUSTWAVE SPIDERLABS This talk is based on semi-recent reported leaks that detail how state-actors could be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
45
45
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 45
favorite 0
comment 0
Slides Here: /redirect?redir_token=4HYPndHHE4fCV-TlctceVNoQxAF8MTUzNzQwMDMxOEAxNTM3MzEzOTE4&v=qF06PFcezLs&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKazanciyan-Hastings%2FDEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf&event=video_description Investigating PowerShell Attacks Ryan Kazanciyan TECHNICAL DIRECTOR, MANDIANT Matt Hastings CONSULTANT, MANDIANT Over the past two years, we've seen targeted attackers increasingly...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
47
47
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 47
favorite 0
comment 0
Slides Here: /redirect?v=5D4wssff0jg&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FVixie%2FDEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf&redir_token=VPhtNfUMM_YLW-clk-Tj7y31Bxx8MTUzNzQwMDIwOEAxNTM3MzEzODA4 White paper available for download here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
46
46
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 46
favorite 0
comment 0
Hacking the FBI: How & Why to Liberate Government Records Ryan Noah Shapiro PhD candidate, Massachusetts Institute of Technology After narrowly avoiding a lengthy activism-related prison sentence, I began PhD work at MIT in part to map out the criminalization of political dissent in Post-9/11 America. Especially in trying to obtain records from the FBI, Freedom of Information Act (FOIA) work became an essential component of my research. However, it quickly became apparent that the FBI...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
78
78
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 78
favorite 0
comment 0
Slides Here: /redirect?redir_token=4mOePPTFFqiNwzZkdgA8Z9Wyj_N8MTUzNzQwMDA0OUAxNTM3MzEzNjQ5&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FErven-Merdinger%2FDEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf&event=video_description&v=wTEMSBXtkAc Just What The Doctor Ordered? Scott Erven FOUNDER & PRESIDENT SECMEDIC, INC Shawn Merdinger HEALTHCARE SECURITY RESEARCHER You have already heard the stories of security researchers...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
37
37
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 37
favorite 0
comment 0
Slides Here: /redirect?v=rz0SNEFZ8h0&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FTal%2FDEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf&redir_token=eyh5zWmonhLFMBzYracghdLElNl8MTUzNzM5OTk4NUAxNTM3MzEzNTg1 I Hunt TR-069 Admins: Pwning ISPs Like a Boss Shahar Tal SECURITY & VULNERABILITY RESEARCH TEAM LEADER, CHECK POINT SOFTWARE TECHNOLOGIES Residential gateway (/SOHO router) exploitation is a rising trend in the security...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
62
62
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 62
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMacaulay%2FDEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf&v=tfFbQvglaxU&event=video_description&redir_token=Fpv26dvTXbXsWZjZOQwYlQ_TrAp8MTUzNzM5OTkwNUAxNTM3MzEzNTA1 Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System Shane Macaulay DIRECTOR OF CLOUD SECURITY, IOACTIVE Windows7 & Server...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
45
45
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 45
favorite 0
comment 0
How To Get Phone Companies To Just Say No To Wiretapping Phil Zimmermann President & Co-Founder Silent Circle Phil is going to talk about his latest projects, which are helping several mobile carriers to provide their customers with wiretap-free phone services. These carriers are breaking ranks with the rest of their industry's century-long culture of wiretapping. When you can get actual phone companies to join in the struggle, you know change is afoot. And yes, Navy SEALS are involved....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
68
68
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 68
favorite 0
comment 0
Slides Here: /redirect?v=tVLatTmNI38&redir_token=k5AoTc7AXGiRJ5YCV-6DRSR_8I98MTUzNzM5OTc3MEAxNTM3MzEzMzcw&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSuch%2FDEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf Playing with Car Firmware or How to Brick your Car Paul Such 0x222 FOUNDER OF SCRT Agix SCRT A lot of papers have already been done/produced on hacking cars through ODB2/CanBus. Looking at the car firmware could also be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
87
87
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 87
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPetrov-Gaivoronski%2FDEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf&v=vOz40Zk8lEw&redir_token=wKa2ag9ycRQ3t7roLAu03OJ2QOB8MTUzNzM5OTY5OEAxNTM3MzEzMjk4&event=video_description Extra Materials are available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
81
81
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 81
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSchrodinger%2FDEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf&event=video_description&redir_token=yW3QQ-BOlx_DxjlTguKh_JFzoVZ8MTUzNzM5OTYxNUAxNTM3MzEzMjE1&v=CxkJyibPfEo From Raxacoricofallapatorius With Love: Case Studies In Insider Threat Tess Schrodinger Espionage, honey pots, encryption, and lies. Clandestine meetings in hotels. The naïve girl seduced by a...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
105
105
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 105
favorite 0
comment 0
Slides Here:/redirect?redir_token=uTqJO4utchAhySBUTo-XWZxxRJJ8MTUzNzM5OTUzNUAxNTM3MzEzMTM1&event=video_description&v=vLU92bNeIdI&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FStrazzere-Sawyer%2FDEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf Android Hacker Protection Level 0 Tim Strazzere LEAD RESEARCH & RESPONSE ENGINEER Jon Sawyer CTO OF APPLIED CYBERSECURITY LLC Obfuscator here, packer there - the Android ecosystem is...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
32
32
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 32
favorite 0
comment 0
Slides Here:/redirect?redir_token=7qOvijcEYFsFAy_eNasKzt3FrGl8MTUzNzM5OTQ2OEAxNTM3MzEzMDY4&event=video_description&v=IFNb3ciJZkQ&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcGrew%2FDEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf Additional Materials available:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
45
45
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 45
favorite 0
comment 0
Slides Here: /redirect?v=EDci2gb3ruQ&event=video_description&redir_token=_kdMqniTkcGjjzMaUo8m8SajbKF8MTUzNzM5OTM5OEAxNTM3MzEyOTk4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHecker%2FDEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf Burner Phone DDOS 2 dollars a day : 70 Calls a Minute Weston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY Phone DDOS research. Current proof of concept is dealing with Samsung SCH-U365 QUALCOMM prepaid Verizon...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
40
40
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 40
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=KYYIluNXgMw&redir_token=aUVply7Nv6Lld1ZmaEKgDSyiMrV8MTUzNzM5OTMzMUAxNTM3MzEyOTMx&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSchroeder%2FDEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf Veil-Pillage: Post-exploitation 2.0 Will Schroeder SECURITY RESEARCHER, VERIS GROUP The Veil-Framework is a project that aims to bridge the gap between pentesting and red team toolsets. It began with...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
44
44
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 44
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBulygin-Bazhaniul-Furtak-Loucaides%2FDEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf&v=QDSlWa9xQuA&event=video_description&redir_token=xeTSylyn5qzGHiOQ75r1iakKWGl8MTUzNzM5OTI2NkAxNTM3MzEyODY2 Summary of Attacks Against BIOS and Secure Boot Yuriy Bulygin CHIEF THREAT ARCHITECT, INTEL SECURITY Oleksandr Bazhaniuk SECURITY RESEARCHER, INTEL SECURITY...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
65
65
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 65
favorite 0
comment 0
Slides Here: /redirect?redir_token=Qo7sQPkbEjnSzuc51YPGjazDko58MTUzNzM5OTE5OEAxNTM3MzEyNzk4&event=video_description&v=ssE_mwSEH9U&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBalazs%2FDEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf Bypass firewalls, application white lists, secure remote desktops under 20 seconds Zoltán Balázs CHIEF TECHNOLOGY OFFICER AT MRG EFFITAS In theory, post-exploitation after having...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
32
32
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 32
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=nX9JXI4l3-E&redir_token=4u5f22ke16CDdP3ILZ2m4wch7Mp8MTUzNzM5OTA5N0AxNTM3MzEyNjk3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGraham-McMillan-Tentler%2FDEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf Mass Scanning the Internet: Tips, Tricks, Results Robert Graham Paul McMillan Dan Tentler Scanning the net -- the entire net -- is now a thing. This talk will discuss how to do it, such as how to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
26
26
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 26
favorite 0
comment 0
Slides Available here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMolina%2FDEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf&v=l_14h0r7qA8&event=video_description&redir_token=JHwd2xX9gw-GsO7D0lFFzSR_2b18MTUzNzM5OTAyOEAxNTM3MzEyNjI4 Extra Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
33
33
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 33
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHunt%2FDEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf&redir_token=WOoiFvXf6uNdiDY-yjuVGvbeUot8MTUzNzM5ODk2N0AxNTM3MzEyNTY3&v=nSqV78le3jU&event=video_description Additional materials are available for download here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
21
21
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 21
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSapozhnikov%2FDEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf&redir_token=_dwnO2oIciF8wOPpY4ahp-cr3h98MTUzNzM5ODg5NkAxNTM3MzEyNDk2&v=bji0VMXl108&event=video_description Acquire current user hashes without admin privileges Anton Sapozhnikov KPMG If an attacker has only user level access to an infected machine inside corporate internal network, that means...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
89
89
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 89
favorite 0
comment 0
Slides here: /redirect?redir_token=KHuiT5SsqoIAI-P73iPAG6VOyGF8MTUzNzM5ODgyNEAxNTM3MzEyNDI0&v=vbdyG0l_b3M&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSelf%2FDEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf&event=video_description Don't DDoS Me Bro: Practical DDoS Defense Blake Self SENIOR SECURITY ARCHITECT Shawn "cisc0ninja" Burrell SOLDIERX CREW Layer 7 DDoS attacks have been on the rise since at least 2010, especially attacks that...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
35
35
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 35
favorite 0
comment 0
Slides here: /redirect?v=dq2Hv7J9fvk&event=video_description&redir_token=cfG7edv0lGfJAt_70WmsyrdINCZ8MTUzNzM5ODc0N0AxNTM3MzEyMzQ3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBloxham%2FDEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse Brady Bloxham PRINCIPAL SECURITY CONSULTANT, SILENT BREAK SECURITY Windows APIs are often a blackbox with poor documentation, taking input and...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
16
16
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 16
favorite 0
comment 0
Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations Source: https://www.youtube.com/watch?v=D2N6FclMMTg Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
88
88
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 88
favorite 0
comment 0
Slides here; /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGorenc-Molinyawe%2FDEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf&event=video_description&v=zn6D-iVcRwg&redir_token=Sp7sGtEQmqIjp5uokH8AcXY9weF8MTUzNzM5ODYxOEAxNTM3MzEyMjE4 Blowing up the Celly - Building Your Own SMS/MMS Fuzzer Brian Gorenc ZERO DAY INITIATIVE, HP SECURITY RESEARCH Matt Molinyawe ZERO DAY INITIATIVE, HP SECURITY RESEARCH Every time you hand out...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
23
23
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 23
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBathurst-Rogers-Carey-Clarke%2FDEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf&event=video_description&v=H7kPoJXtE6Y&redir_token=HC7Tb6P3Nf_U5feUDxR--MWR-Jl8MTUzNzM5ODU1MkAxNTM3MzEyMTUy PropLANE: Kind of keeping the NSA from watching you pee Rob Bathurst (EVILROB) Russ Rogers (RUSSR) Mark Carey (PHORKUS) Ryan Clarke (L0STBOY) No one likes to be watched, especially on the Internet. Your...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
59
59
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 59
favorite 0
comment 0
Slides here: /redirect?v=_j9lELCSZQw&redir_token=y3J88YyWuCDRN7UxFBkljRLZNNx8MTUzNzM5ODQ3N0AxNTM3MzEyMDc3&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCerrudo%2FDEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf Hacking US (and UK, Australia, France, etc.) traffic control systems Cesar Cerrudo CTO, IOACTIVE LABS Probably many of us have seen that scene from "Live Free or Die Hard" (Die Hard 4) were the...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
80
80
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 80
favorite 0
comment 0
A Survey of Remote Automotive Attack Surfaces Charlie Miller Security Engineer, Twitter Chris Valasek Director of Threat Intelligence, IOActive Automotive security concerns have gone from the fringe to the mainstream with security researchers showing the susceptibility of the modern vehicle to local and remote attacks. A malicious attacker leveraging a remote vulnerability could do anything from enabling a microphone for eavesdropping to turning the steering wheel to disabling the brakes. Last...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
25
25
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 25
favorite 0
comment 0
Chris Hadnagy - What Your Body Tells Me - Body Language for the SE Source: https://www.youtube.com/watch?v=RfLj7y0Xf2Y Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, Christopher Hadnagy, DEFCON Video Series, DEFCON...
56
56
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 56
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLittlebury%2FDEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf&v=2IeU7Cck0hI&redir_token=GHmdcUQxe2eVHa3roWN5TJkWIT18MTUzNzM5ODE4NkAxNTM3MzExNzg2&event=video_description Home Alone with localhost: Automating Home Defense Chris Littlebury SENIOR PENETRATION TESTER, KNOWLEDGE CONSULTING GROUP, INC. Home automation is everywhere, and so are their exploits. This presentation will go...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
46
46
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 46
favorite 0
comment 0
Slides here: /redirect?v=mBOLml3yLBY&redir_token=9xPQ6LNY2eXxo71_iYvHwQ4vUfR8MTUzNzM5ODEyM0AxNTM3MzExNzIz&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FQuaddi-R3plicant-Hefley%2FDEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf&event=video_description Hacking 911: Adventures in Disruption, Destruction, and Death Christian “quaddi” Dameff MD Jeff “r3plicant” Tully MD Peter Hefley SENIOR MANAGER - SUNERA Ever wonder what you would do if...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
59
59
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 59
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf&v=-SqAlpANtIs&redir_token=SdKzJ9Gu2Y1csKhcbu9EfL6vAqF8MTUzNzM5ODA2MkAxNTM3MzExNjYy&event=video_description The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns Christopher Campbell SECURITY RESEARCHER 15 years after APT was released for Linux, Microsoft is finally going to ship Windows with a package...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
38
38
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 38
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf&event=video_description&v=7HdcEQGQZDU&redir_token=XUAls5sLm4iDgHPV7bVSprWmtet8MTUzNzM5ODAwNUAxNTM3MzExNjA1 The Secret Life of Krbtgt Christopher Campbell SECURITY RESEARCHER A tale of peril and woe, Krbtgt is the domain account that you just can't quit. Quiet and harmless, it has been with your enterprise since you...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
44
44
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 44
favorite 0
comment 0
Blinding The Surveillance State Christopher Soghoian Principal Technologist, American Civil Liberties Union We live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them to learn intimate, private details about our lives. In part, the ease with which they can obtain such information reflects the fact that our laws have failed to keep up with advances in technology. However, privacy enhancing technologies can offer real...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
58
58
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 58
favorite 0
comment 0
Slides Here: /redirect?v=d6VCri6sPnY&event=video_description&redir_token=-DGawUHPQPJY0BWOZ4Tn4EVbxZ98MTUzNzM5Nzg0NEAxNTM3MzExNDQ0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKallenberg%2FDEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
63
63
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 63
favorite 0
comment 0
Secure Random By Default Dan Kaminsky Chief Scientist, White Ops As a general rule in security, we have learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs -- insecure and default, and secure but obscure. Why not fix this? Why not make JavaScript and PHP and Java and Python and even libc rand() return strong entropy? What are the...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
26
26
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 26
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDorsey%2FDEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf&redir_token=qnvPDdx8wXuaqQVhTJIUZhkY2_J8MTUzNzM5NzcwMkAxNTM3MzExMzAy&v=gXuxfh5-XeE&event=video_description Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go David Dorsey LEAD SECURITY RESEARCHER AT CLICK SECURITY Using a ROP chain to bypass operating system defenses is commonplace and detecting this...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
33
33
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 33
favorite 0
comment 0
The Dark Tangent and Ryan Clarke "LosT" Welcome to DEF CON and discuss the making of the DEF CON 22 Badge. Source: https://www.youtube.com/watch?v=gt-8okGMrFE Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
30
30
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 30
favorite 0
comment 0
David Kennedy - Destroying Education and Awareness Programs Source: https://www.youtube.com/watch?v=vcA6dLl5Sa4 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
41
41
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 41
favorite 0
comment 0
Slides here: /redirect?redir_token=uw9ninDPmKhxrkbWabIg2oj2doV8MTUzNzM5NzQwM0AxNTM3MzExMDAz&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLitchfield%2FDEFCON-22-David-Litchfield-Oracle-Data-Redaction-is-Broken.pdf&v=L6Fc9S0xUtY&event=video_description Oracle Data Redaction is Broken David Litchfield SECURITY SPECIALIST, DATACOM TSS The Oracle data redaction service is a new feature introduced with Oracle 12c. It allows sensitive data, such as PII, to be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
38
38
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 38
favorite 0
comment 0
Slides Here: /redirect?v=uzGXxWuDwxc&event=video_description&redir_token=J6gun1QsSB6ZacRWaT70gVTQZf98MTUzNzM5NzMzM0AxNTM3MzEwOTMz&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcmillan%2FDEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf Attacking the Internet of Things using Time Paul McMillan SECURITY ENGINEER, NEBULA Internet of Things devices are often slow and resource constrained. This makes them the perfect target for network-based...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
43
43
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 43
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDrapeau-Dukes%2FDEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf&redir_token=pTAdg2IHb51r5azG3NjTX7HdTAx8MTUzNzM5NzI2NEAxNTM3MzEwODY0&v=X72vwxQ8B84&event=video_description Additional Extra Materials are available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
24
24
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 24
favorite 0
comment 0
Slides: /redirect?redir_token=SOH2BucePo7gTWjmxFOfRzGg09p8MTUzNzM5NzIwMkAxNTM3MzEwODAy&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWyde%2FDEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf&v=tso5rhzQYBc&event=video_description Client-Side HTTP Cookie Security: Attack and Defense David Wyde SOFTWARE ENGINEER, CISCO HTTP cookies are an important part of trust on the web. Users often trade their login credentials for a cookie, which is then used to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
32
32
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 32
favorite 0
comment 0
Panel: Ephemeral Communications: Why and How? Ryan Lackey Founder, CryptoSeal, Inc. Jon Callas Silent Circle Elissa Shevinsky Glimpse Possibly more to come..... Ephemeral communications applications are increasingly popular ways, especially among younger users, to communicate online. In contrast to “once it’s on the Internet, it’s forever”, these applications promise to delete information rapidly, or to maintain anonymity indefinitely, lowering inhibitions to share sensitive or personal...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
53
53
Sep 18, 2018
09/18
Sep 18, 2018
by
DEFCONConference
movies
eye 53
favorite 0
comment 0
Slides here: /redirect?v=KFx4lhxMi-M&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMahjoub-Toonk-Reuille%2FDEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf&redir_token=z7tmvlIzYesz7khWPB8Kw6nTHQN8MTUzNzM5NzAxOUAxNTM3MzEwNjE5 Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...