46
46
-
-
-
by
DEFCONConference
movies
eye 46
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMorris-McAtee%2FDEFCON-22-Lucas-Morris-Michael-McAtee-ShareEnum-We-Wrapped-Samba.pdf&v=qiN6ogNWJEg&redir_token=CZt9CHooJxJzGSx2LngLjQY_LyF8MTUzNzM5NDAzN0AxNTM3MzA3NjM3&event=video_description ShareEnum: We Wrapped Samba So You Don’t Have To Lucas Morris MANAGER, CROWE HORWATH Michael McAtee SENIOR CONSULTANT, CROWE HORWATH CIFS shares can tell you a lot about a network, including...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEFCON Video Series, DEFCON...
94
94
-
-
-
by
DEFCONConference
movies
eye 94
favorite 0
comment 0
Slides here: /redirect?redir_token=KHuiT5SsqoIAI-P73iPAG6VOyGF8MTUzNzM5ODgyNEAxNTM3MzEyNDI0&v=vbdyG0l_b3M&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSelf%2FDEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf&event=video_description Don't DDoS Me Bro: Practical DDoS Defense Blake Self SENIOR SECURITY ARCHITECT Shawn "cisc0ninja" Burrell SOLDIERX CREW Layer 7 DDoS attacks have been on the rise since at least 2010, especially attacks that...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
30
30
-
-
-
by
DEFCONConference
movies
eye 30
favorite 0
comment 0
David Kennedy - Destroying Education and Awareness Programs Source: https://www.youtube.com/watch?v=vcA6dLl5Sa4 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
71
71
-
-
-
by
DEFCONConference
movies
eye 71
favorite 0
comment 0
Panel — Surveillance on the Silver Screen- Fact or Fiction? Nicole Ozer Technology and Civil Liberties Policy Director, ACLU of California Kevin Bankston Policy Director, New America Foundation's Open Technology Institute Timothy Edgar Fellow, Watson Institute for International Studies, Brown University Join ACLU and others for a fun-filled surveillance tour of the movies - from Brazil to Bourne - to talk about what is still fiction and what is now fact. What is technologically possible? What...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Presentation (Quotation...
32
32
-
-
-
by
DEFCONConference
movies
eye 32
favorite 0
comment 0
Slides Here:/redirect?redir_token=7qOvijcEYFsFAy_eNasKzt3FrGl8MTUzNzM5OTQ2OEAxNTM3MzEzMDY4&event=video_description&v=IFNb3ciJZkQ&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcGrew%2FDEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf Additional Materials available:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
24
24
-
-
-
by
DEFCONConference
movies
eye 24
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMenerick%2FDEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf&v=OnJ18pyMncE&event=video_description&redir_token=saMxqfjdGA__2p2QXxfRj5vHQNF8MTUzNzM5NTA3M0AxNTM3MzA4Njcz Open Source Fairy Dust John Menerick SECURITY RESEARCHER, NETSUITE Over the past 30 years, the Internet and open source software have worked in tandem. The Internet has provided an environment for open source...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
95
95
-
-
-
by
DEFCONConference
movies
eye 95
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPolstra%2FDEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf&v=Uy3nXXZgqmg&event=video_description&redir_token=RwcJx7udZIAoHbCnlgAp4u6iNo58MTUzNzM5Njc4MkAxNTM3MzEwMzgy Cyberhijacking Airplanes: Truth or Fiction? Dr. Phil Polstra ASSOCIATE PROFESSOR OF DIGITAL FORENSICS, BLOOMSBURG UNIVERSITY OF PENNSYLVANIA Captain Polly ASSOCIATE PROFESSOR OF AVIATION,...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
35
35
-
-
-
by
DEFCONConference
movies
eye 35
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHoffman-Kinsey%2FDEFCON-22-Dustin-Hoffman-and-Thomas-Kinsey-What-the-Watchers-See-UPDATED.pdf&v=W95VK75m9RM&redir_token=X1RzczECo2O9xyLBbwGtlFu3e6t8MTUzNzM5NjY0MUAxNTM3MzEwMjQx&event=video_description What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil) Dustin Hoffman SENIOR ENGINEER, EXIGENT SYSTEMS INC. Thomas (TK) Kinsey SENIOR ENGINEER, EXIGENT...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
188
188
-
-
-
by
DEFCONConference
movies
eye 188
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FOssman%2FDEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf&event=video_description&v=mAai6dRAtFo&redir_token=Qs5QJsImCl4qGKxCHRKFyv1DpYh8MTUxMDA4Nzc4N0AxNTEwMDAxMzg3 Extra materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
104
104
-
-
-
by
DEFCONConference
movies
eye 104
favorite 1
comment 0
Slides Here: /redirect?redir_token=CXcDrFMUnfJ3p3u5aj2a4l_zxDV8MTUwNzA2NTAyMkAxNTA2OTc4NjIy&v=To5yarfAg_E&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMetacortex-Grifter%2FDEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf&event=video_description Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin Metacortex SECURITY RESEARCHER Grifter SECURITY RESEARCHER This is an introduction level talk. The talk itself will...
Topics: Youtube, video, Science & Technology, Tor (Software), Bitcoin (Currency), Darknet, The Internet...
83
83
-
-
-
by
DEFCONConference
movies
eye 83
favorite 0
comment 0
Eric (XlogicX) Davisson and Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDavisson-Alejandro%2FDEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf&event=video_description&v=VkP87oY5VCw&redir_token=R1gSuBkeqcdAr0ixIWCLHBxYeUV8MTUzNzM5NjQyMEAxNTM3MzEwMDIw Abuse of Blind Automation in Security Tools Eric (XlogicX) Davisson SECURITY...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
27
27
-
-
-
by
DEFCONConference
movies
eye 27
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=dfi3AEvCL_E&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBruno-Graziano%2FDEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf&redir_token=nzYHyGgDWHZTLEQ_Z_UBaUoXtft8MTUzNzM5NDExMUAxNTM3MzA3NzEx Through the Looking-Glass, and What Eve Found There Luca "kaeso" Bruno RESEARCH ENGINEER, EURECOM Mariano "emdel" Graziano PH.D. STUDENT, EURECOM Traditionally, network operators have...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
150
150
-
-
-
by
DEFCONConference
movies
eye 150
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FJauregui%2FDEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf&redir_token=GWOWHGKJjorubZTu4lkbl_zdElB8MTUzNzM5Mzk2MUAxNTM3MzA3NTYx&event=video_description&v=hT9LwyjpfzI Girl… Fault-Interrupted. Maggie Jauregui SOFTWARE SECURITY TEST ENGINEER GFCI's (Ground Fault Circuit Interrupts) are a practically unnoticeable part of our daily lives, except maybe for when you have to fumble...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEFCON Video Series, DEFCON...
39
39
-
-
-
by
DEFCONConference
movies
eye 39
favorite 0
comment 0
Presentation Available here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPinto-Maxwell%2FDEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf&redir_token=PeiTxrBXShZU0AhTGkEBIqtGI458MTUzNzM5MzMxN0AxNTM3MzA2OTE3&event=video_description&v=5NeOIhfkD0Q Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT We could all have predicted this with our magical Big Data analytics platforms,...
Topics: Youtube, video, Science & Technology, Mathematics (Field Of Study), DEFCON Video Series, DEFCON...
16
16
-
-
-
by
DEFCONConference
movies
eye 16
favorite 0
comment 0
Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations Source: https://www.youtube.com/watch?v=D2N6FclMMTg Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
39
39
-
-
-
by
DEFCONConference
movies
eye 39
favorite 0
comment 0
Slides Here: /redirect?redir_token=3rjJ4SjJ6x4RaqJaSPdnl7uaogt8MTUzNzM5NjM0OEAxNTM3MzA5OTQ4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSmith-Perrymon%2FDEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf&v=EEGxifOAk48&event=video_description Advanced Red Teaming: All Your Badges Are Belong To Us Eric Smith SENIOR PARTNER, PRINCIPAL SECURITY CONSULTANT AT LARES Josh Perrymon SENIOR ADVERSARIAL ENGINEER AT LARES By definition ”Red...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
45
45
-
-
-
by
DEFCONConference
movies
eye 45
favorite 0
comment 0
Slides Here: /redirect?v=EDci2gb3ruQ&event=video_description&redir_token=_kdMqniTkcGjjzMaUo8m8SajbKF8MTUzNzM5OTM5OEAxNTM3MzEyOTk4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHecker%2FDEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf Burner Phone DDOS 2 dollars a day : 70 Calls a Minute Weston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY Phone DDOS research. Current proof of concept is dealing with Samsung SCH-U365 QUALCOMM prepaid Verizon...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
50
50
-
-
-
by
DEFCONConference
movies
eye 50
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=3LZhFFm1tK0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKlafter-Swanson%2FDEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf&redir_token=6hf6QocokC-KNUNJX_WZV0dFVmN8MTUzNzQwMDQ1M0AxNTM3MzE0MDUz Check Your Fingerprints: Cloning the Strong Set Richard Klafter (Free) SENIOR SOFTWARE ENGINEER, OPTIMIZELY Eric Swanson (Lachesis) SOFTWARE DEVELOPER The web of trust has...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
49
49
-
-
-
by
DEFCONConference
movies
eye 49
favorite 0
comment 0
DEF CON the Mystery, Myth and Legend Panel It's hard to throw a stone these days without hitting a security/hacking conference. But, when every year the Las Vegas Metro SWAT Team stages for an interdiction of your convention, you know you have something "different". From crawling through Air Ducts to surreptitiously "acquiring" telco equipment, these are the stories of DEF CON you don't often hear about. The stories of yesteryear that not only helped shape defcon but also...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
60
60
-
-
-
by
DEFCONConference
movies
eye 60
favorite 0
comment 0
Slides Here: /redirect?redir_token=qhUox9F3t6ba1YgqxbpQjJYnKtR8MTUzNzM5NjA2NkAxNTM3MzA5NjY2&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWilkinson%2FDEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance.pdf&event=video_description&v=knrvrR-B1ZI White Paper Available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
65
65
-
-
-
by
DEFCONConference
movies
eye 65
favorite 0
comment 0
Slides Here; /redirect?v=nBR7Kru6JX0&redir_token=qmF3AGzW0Iq1eyRrun29EG4KaId8MTUzNzM5NDUxM0AxNTM3MzA4MTEz&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKelley-Anderson%2FDEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe-Updated.pdf&event=video_description Is This Your Pipe? Hijacking the Build Pipeline. Kyle Kelley DEVELOPER SUPPORT ENGINEER, RACKSPACE Greg Anderson SOFTWARE SECURITY ENGINEER,RACKSPACE As developers of the web, we rely on tools to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
34
34
-
-
-
by
DEFCONConference
movies
eye 34
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHunt%2FDEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf&redir_token=WOoiFvXf6uNdiDY-yjuVGvbeUot8MTUzNzM5ODk2N0AxNTM3MzEyNTY3&v=nSqV78le3jU&event=video_description Additional materials are available for download here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
96
96
-
-
-
by
DEFCONConference
movies
eye 96
favorite 0
comment 0
Elevator Hacking - From the Pit to the Penthouse Deviant Ollam The CORE Group Howard Payne The CORE Group Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking late-night rides upon car tops (don't do that, please!) to the work of modern pen testers who use elevators to bypass building security systems (it's easier than you think!) these devices are often misunderstood and their full range of features and abilities go unexplored....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
82
82
-
-
-
by
DEFCONConference
movies
eye 82
favorite 0
comment 0
Around the world in 80 cons” - A Perspective Jayson E. Street Senior Partner of Krypton Security After spending 15 years in the hacker / InfoSec community, I thought it was time to pause and look back upon all I have seen, everywhere I have been, all the people I met and everything I have learned. And then share some of that knowledge with people to hopefully help them have a leg up moving forward. More importantly, compare and contrast my experiences and perspectives with statistics we...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
62
62
-
-
-
by
DEFCONConference
movies
eye 62
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMacaulay%2FDEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf&v=tfFbQvglaxU&event=video_description&redir_token=Fpv26dvTXbXsWZjZOQwYlQ_TrAp8MTUzNzM5OTkwNUAxNTM3MzEzNTA1 Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System Shane Macaulay DIRECTOR OF CLOUD SECURITY, IOACTIVE Windows7 & Server...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
43
43
movies
eye 43
favorite 0
comment 0
El Kentaro joins us during DEF CON 26 to talk about his Hak5 on-the-go build and the Tokyo, Japan Hacker Events. Links: https://twitter.com/elkentaro https://www.instagram.com/elkentaro/ https://medium.com/@elkentaro https://codeblue.jp/2018/en/ http://www.avtokyo.org/ https://pacsec.jp/ https://bsides.tokyo/ -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Shop → http://www.hakshop.com Subscribe → http://www.youtube.com/hak5 RSS Feeds →...
Topics: Youtube, video, Science & Technology, hak5, hack, technology, darren kitchen, shannon morse,...
31
31
-
-
-
by
DEFCONConference
movies
eye 31
favorite 0
comment 0
In this modern digital age of technically competent adversaries we forget that there may still be a need to conduct old school physical surveillance against a target. Many organisations utilise surveillance teams and these may be in-house in the case of government agencies or third-party teams contracted for a specific task and their targets range from suspected terrorists to people accused of bogus insurance claims. Whilst most people think that they may never be placed under surveillance some...
Topics: Youtube, video, Science & Technology, DEF, CON, DEFCON 26, DEFCON, DEF CON, hackers, hacking...
63
63
-
-
-
by
DEFCONConference
movies
eye 63
favorite 0
comment 0
Secure Random By Default Dan Kaminsky Chief Scientist, White Ops As a general rule in security, we have learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs -- insecure and default, and secure but obscure. Why not fix this? Why not make JavaScript and PHP and Java and Python and even libc rand() return strong entropy? What are the...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
57
57
-
-
-
by
DEFCONConference
movies
eye 57
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLittlebury%2FDEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf&v=2IeU7Cck0hI&redir_token=GHmdcUQxe2eVHa3roWN5TJkWIT18MTUzNzM5ODE4NkAxNTM3MzExNzg2&event=video_description Home Alone with localhost: Automating Home Defense Chris Littlebury SENIOR PENETRATION TESTER, KNOWLEDGE CONSULTING GROUP, INC. Home automation is everywhere, and so are their exploits. This presentation will go...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
58
58
-
-
-
by
DEFCONConference
movies
eye 58
favorite 0
comment 0
Slides Here: /redirect?v=d6VCri6sPnY&event=video_description&redir_token=-DGawUHPQPJY0BWOZ4Tn4EVbxZ98MTUzNzM5Nzg0NEAxNTM3MzExNDQ0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKallenberg%2FDEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
29
29
-
-
-
by
DEFCONConference
movies
eye 29
favorite 0
comment 0
Slides Here; /redirect?v=8PXHhGa5k8g&redir_token=_5uFMm-OmeEiYbtmyuUnDJSl9fB8MTUzNzM5MzAxMUAxNTM3MzA2NjEx&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMoore-Wardle%2FDEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf Optical Surgery; Implanting a DropCam Patrick Wardle DIRECTOR OF RESEARCH, SYNACK Colby Moore SECURITY RESEARCH ENGINEER, SYNACK Video Monitoring solutions such as DropCam aim to provide remote monitoring,...
Topics: Youtube, video, Science & Technology, DEFCON Conference, DEFCON Video Series, DEF CON 22,...
25
25
-
-
-
by
DEFCONConference
movies
eye 25
favorite 0
comment 0
Michele Fincher - How to you Feel about your Mother.. Psych and The SE Source: https://www.youtube.com/watch?v=A0_NL1YBvK4 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
50
50
-
-
-
by
DEFCONConference
movies
eye 50
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLeder%2FDEFCON-22-Felix-Leder-NinjaTV.pdf&v=Y0P1Lx5DRvE&event=video_description&redir_token=cf65ZdAiyzQtZod4JnUlX0RigJR8MTUzNzM5NjIwN0AxNTM3MzA5ODA3 NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It Felix Leder DIRECTOR, MALWARE RESEARCH, BLUE COAT NORWAY Smart TVs are growing in popularity. Set-top boxes like Apple TV, Roku, or WD TV can make your “normal” TV...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
36
36
-
-
-
by
DEFCONConference
movies
eye 36
favorite 0
comment 0
Slides here: /redirect?v=dq2Hv7J9fvk&event=video_description&redir_token=cfG7edv0lGfJAt_70WmsyrdINCZ8MTUzNzM5ODc0N0AxNTM3MzEyMzQ3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBloxham%2FDEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse Brady Bloxham PRINCIPAL SECURITY CONSULTANT, SILENT BREAK SECURITY Windows APIs are often a blackbox with poor documentation, taking input and...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
83
83
-
-
-
by
DEFCONConference
movies
eye 83
favorite 0
comment 0
Slides Here: /redirect?redir_token=4mOePPTFFqiNwzZkdgA8Z9Wyj_N8MTUzNzQwMDA0OUAxNTM3MzEzNjQ5&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FErven-Merdinger%2FDEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf&event=video_description&v=wTEMSBXtkAc Just What The Doctor Ordered? Scott Erven FOUNDER & PRESIDENT SECMEDIC, INC Shawn Merdinger HEALTHCARE SECURITY RESEARCHER You have already heard the stories of security researchers...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
26
26
-
-
-
by
DEFCONConference
movies
eye 26
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDorsey%2FDEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf&redir_token=qnvPDdx8wXuaqQVhTJIUZhkY2_J8MTUzNzM5NzcwMkAxNTM3MzExMzAy&v=gXuxfh5-XeE&event=video_description Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go David Dorsey LEAD SECURITY RESEARCHER AT CLICK SECURITY Using a ROP chain to bypass operating system defenses is commonplace and detecting this...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
68
68
-
-
-
by
DEFCONConference
movies
eye 68
favorite 0
comment 0
Slides Here: /redirect?v=tVLatTmNI38&redir_token=k5AoTc7AXGiRJ5YCV-6DRSR_8I98MTUzNzM5OTc3MEAxNTM3MzEzMzcw&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSuch%2FDEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf Playing with Car Firmware or How to Brick your Car Paul Such 0x222 FOUNDER OF SCRT Agix SCRT A lot of papers have already been done/produced on hacking cars through ODB2/CanBus. Looking at the car firmware could also be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
97
97
-
-
-
by
DEFCONConference
movies
eye 97
favorite 0
comment 0
Slides Here: /redirect?v=EqG3tR5Zu6E&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FElazari%2FDEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf&redir_token=o12gfJMucHSswH5dOLXPhdPvACt8MTUzNzM5NDcxMEAxNTM3MzA4MzEw Empowering Hackers to Create a Positive Impact Keren Elazari In March 2014 I spoke at the annual TED conference about why hackers are a vital part of the information age. I claimed that the world actually needs hackers,...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Hacker (Character Power),...
53
53
-
-
-
by
DEFCONConference
movies
eye 53
favorite 0
comment 0
Slides here: /redirect?v=KFx4lhxMi-M&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMahjoub-Toonk-Reuille%2FDEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf&redir_token=z7tmvlIzYesz7khWPB8Kw6nTHQN8MTUzNzM5NzAxOUAxNTM3MzEwNjE5 Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
57
57
-
-
-
by
DEFCONConference
movies
eye 57
favorite 0
comment 0
Slides Here: /redirect?v=O8FQZIPkgZM&redir_token=aVin7Zq8YA0trdXKmcOe2sYMmRd8MTUzNzM5NTIyM0AxNTM3MzA4ODIz&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGrand%2FDEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering Joe Grand aka Kingpin GRAND IDEA STUDIO Printed Circuit Boards (PCBs), used within nearly every electronic product in...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
60
60
-
-
-
by
DEFCONConference
movies
eye 60
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf&v=-SqAlpANtIs&redir_token=SdKzJ9Gu2Y1csKhcbu9EfL6vAqF8MTUzNzM5ODA2MkAxNTM3MzExNjYy&event=video_description The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns Christopher Campbell SECURITY RESEARCHER 15 years after APT was released for Linux, Microsoft is finally going to ship Windows with a package...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
55
55
-
-
-
by
DEFCONConference
movies
eye 55
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWhite-Green%2FDEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf&v=Udsu_Vdw_Q8&event=video_description&redir_token=KAnnTrU8Yhr_utFoC_W8AS7O9tB8MTUzNzM5NDc3NkAxNTM3MzA4Mzc2 The Open Crypto Audit Project Kenneth White CO-FOUNDER, OPEN CRYPTO AUDIT PROJECT Matthew Green RESEARCH PROFESSOR, JOHNS HOPKINS UNIVERSITY Join us for the story of the origins and...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
88
88
-
-
-
by
DEFCONConference
movies
eye 88
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FYoung%2FDEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf&redir_token=tVZuE7xrTKW5PGb7RxNaa2W6izl8MTUzNzQwMDU4NEAxNTM3MzE0MTg0&event=video_description&v=Xfl4spvM5DI From root to SPECIAL: Pwning IBM Mainframes Philip “Soldier of Fortran” Young 1.1 million transactions are run through mainframes every second worldwide. From your flight to your ATM withdrawal...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
53
53
-
-
-
by
DEFCONConference
movies
eye 53
favorite 0
comment 0
Slides Here: /redirect?redir_token=51LS_ku_Ev0s9yPcYVej6pi-nWx8MTUzNzM5NDQ0MkAxNTM3MzA4MDQy&event=video_description&v=biulJpOomRc&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLevison-Watt%2FDEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf Dark Mail Ladar Levison FOUNDER OF LAVABIT, LLC Stephen Watt LEAD DEVELOPER, REFERENCE IMPLEMENTATION, DARK MAIL Data privacy and anonymity have long been cornerstone interests of the computer security world, but not...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
105
105
-
-
-
by
DEFCONConference
movies
eye 105
favorite 0
comment 0
Slides Here:/redirect?redir_token=uTqJO4utchAhySBUTo-XWZxxRJJ8MTUzNzM5OTUzNUAxNTM3MzEzMTM1&event=video_description&v=vLU92bNeIdI&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FStrazzere-Sawyer%2FDEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf Android Hacker Protection Level 0 Tim Strazzere LEAD RESEARCH & RESPONSE ENGINEER Jon Sawyer CTO OF APPLIED CYBERSECURITY LLC Obfuscator here, packer there - the Android ecosystem is...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
87
87
-
-
-
by
DEFCONConference
movies
eye 87
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPetrov-Gaivoronski%2FDEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf&v=vOz40Zk8lEw&redir_token=wKa2ag9ycRQ3t7roLAu03OJ2QOB8MTUzNzM5OTY5OEAxNTM3MzEzMjk4&event=video_description Extra Materials are available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
290
290
-
-
-
by
DEFCONConference
movies
eye 290
favorite 0
comment 0
Old Skewl Hacking: Porn Free! Major Malfunction Having cut his teeth (and scarred his mind) on hotel Infra-Red controlled TV systems, spent ten years scanning the skies for 'interesting' satellite feeds, in this, the 3rd in his series of 'Old Skewl Hacking' talks, Major Malfunction once again, and with great personal sacrifice, goes down on^winto the depths of late-night terrestrial broadcast television to determine how secure 'Pay Per View' / 'Pay Per Night' systems are, and if Debbie really...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
60
60
-
-
-
by
DEFCONConference
movies
eye 60
favorite 0
comment 0
Slides Here: /redirect?redir_token=MyoRXolHw4QrdtBs4JSRkKBi-rZ8MTUzNzM5NTI5MkAxNTM3MzA4ODky&event=video_description&v=Y8Cpio6z9qA&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDenaro-Beardsley%2FDEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf How to Disclose an Exploit Without Getting in Trouble Jim Denaro CIPHERLAW Tod Beardsley ENGINEERING MANAGER, METASPLOIT PROJECT You have identified a vulnerability and may have developed...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
41
41
-
-
-
by
DEFCONConference
movies
eye 41
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWhite-deVilliers%2FDEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf&redir_token=AIWSZpqCKzor1vZgJFuKtOyNrEB8MTUzNzM5Njg1MEAxNTM3MzEwNDUw&event=video_description&v=i2-jReLBSVk Manna from Heaven: Improving the state of wireless rogue AP attacks Dominic White CTO, SENSEPOST Ian de Villiers SENIOR ANALYST, SENSEPOST The current state of theoretical attacks against...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
24
24
-
-
-
by
DEFCONConference
movies
eye 24
favorite 0
comment 0
Slides: /redirect?redir_token=SOH2BucePo7gTWjmxFOfRzGg09p8MTUzNzM5NzIwMkAxNTM3MzEwODAy&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWyde%2FDEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf&v=tso5rhzQYBc&event=video_description Client-Side HTTP Cookie Security: Attack and Defense David Wyde SOFTWARE ENGINEER, CISCO HTTP cookies are an important part of trust on the web. Users often trade their login credentials for a cookie, which is then used to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...