2
2.0
Aug 22, 2021
08/21
Aug 22, 2021
by
PiX Da MiX (pixdamix)
data
eye 2
favorite 0
comment 0
This fixes a common fault on Dysons DC24 where the ball becoming loose and clunky and gets significant play up and down on the left side of the ball if you look at it from the front. This play can cause the ball to catch on the HEPA filter inside the ball and clatter in use. In extreme cases the play when using the machine can cause the HEPA filter to pop out which can lock the ball up. Modify / Export / View this model using OnShape:...
Topics: Bearing, Replacement Parts, Bearing Cog, dyson, 914063-01, replacement, 923685-01, stl,...
6
6.0
Jan 22, 2021
01/21
Jan 22, 2021
by
Alexander Gee (bostwickenator)
data
eye 6
favorite 0
comment 0
This is a replacement for the catch that secures the hand-held tube to the flexible hose
Topics: DC24, dyson, thingiverse, Dyson_dc, Replacement Parts, stl
8
8.0
Jan 19, 2021
01/21
Jan 19, 2021
by
Stefan Seifert (xoration)
data
eye 8
favorite 0
comment 0
A little trim hat which can be glued with double sided sticky tape on the trim buttons of the Jeti Radio for easier trimming.
Topics: DS16, DC24, DS-16, Duplex, Jeti Trim, trim hat, Jeti, Trim, DC16, thingiverse, DS-24, DS24,...
Topics: manualzz, manuals, DC24 Blueprint Limited Edition, Ball DC24, User manual, Dyson, BALL
3
3.0
Jan 6, 2021
01/21
Jan 6, 2021
by
Roger Hammond (backpaqer)
data
eye 3
favorite 0
comment 0
A bearing replacement option for Dyson DC24 roller brushes
Topics: stl, DC24, Dyson, thingiverse, 608 bearing, Replacement Parts
3
3.0
Jan 5, 2021
01/21
Jan 5, 2021
by
Roland Nagel (modellflugsepp)
data
eye 3
favorite 0
comment 0
the inserts are very useful for storing small parts in the transport case, in addition the transmitter is better held
Topics: R/C Vehicles, stl, jeti, Jeti koffer, Jeti bag, thingiverse, jeti dc24
39
39
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 39
favorite 0
comment 0
Electronic locks are becoming increasingly common on consumer-grade safes, particularly those used to secure guns. This talk explores vulnerabilities of several UL-listed Type 1 "High Security" electronic safe locks. Using side-channel attacks, we recover the owner-configured keycodes on two models of these locks from outside of locked safes without any damage to the locks or safes. Discussion includes power-line analysis, timing attacks, and lockout-defeat strategies on embedded...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
61
61
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 61
favorite 0
comment 0
The presentation will begin by discussing the protocol (http://mqtt.org/) and results from a simple query on shodan, showing the number of servers directly available on the internet. We will then go through the protocol specifications which shows that security is more or less non-existent. We are able to directly connect to many of the servers which are open to the internet, and following protocol specifications, see what devices they are communicating with. We will show how its possible to...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
91
91
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 91
favorite 0
comment 0
VNC is a great tool to use if you need to get to a box you're not physically near. The trouble with VNC is that it was invented 15+ years ago and hasn't been improved upon in any significant way. Besides the internet of things being sprinkled with VNC endpoints, there are companies which use VNC to such a large degree they need a VNC proxy on their perimeter to get to all the internal VNC hosts - some of which are ICS/SCADA devices. Stargate is the result of discovering a vulnerability in these...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEFCON 24, DEF CON 24, DC24, DC-24,...
94
94
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 94
favorite 0
comment 0
For 48 years, 9-1-1 has been /the/ emergency telephone number in the United States. It’s also been mired in 48-year-old technology. So let’s just put that on the internet, right? What could possibly go wrong? Without the radical segmentation of the PSTN, the move to IP networks (even the private, managed kind) will bring new 9-1-1 capabilities AND new vulnerabilities. This talk builds on the work of quad, r3plicant, and Peter Hefley (see &lquo;Hacking 911: Adventures in Destruction,...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
100
100
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 100
favorite 0
comment 0
Managed Code Rootlets (MCRs) are terrifying post-exploitation attacks that open the doors for cementing and expanding a foothold in a target network. While the concept isn’t new, practical tools for developing MCRs don’t currently exist. Ere Metula released ReFrameworker in 2010 with the ability to inject attack modules into the C# runtime, paving the way for MCRs, but the tool requires the attacker to have knowledge of intermediate languages, does not support other runtimes, and is no...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
91
91
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 91
favorite 0
comment 0
Many industries, provide consumers with data about the quality, content, and cost of ownership of products, but the software industry leaves consumers with very little data to act upon. In fact when it comes to how secure or weak a product is from a security perspective, there is no meaningful consumer facing data. There has long been a call for the establishment of an independent organization to address this need. Last year, Mudge (from DARPA, Google, and L0pht fame) announced that after...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
24
24
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 24
favorite 0
comment 0
A number of toolsets have been around for a while which propose methods for identifying vulnerabilities in kernels, in particular POSIX kernels. However, none of these identified a method for generic fuzzing across Windows and POSIX kernels and have not been updated for some time. This presentation will outline the research which has occurred in order to find exploitable bugs across both Windows and POSIX kernels, focusing on fuzzing system calls and library calls in the Windows environment....
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
106
106
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 106
favorite 0
comment 0
It is not uncommon that a software reverse engineer finds themselves desiring to execute a bit of code they are studying in order to better understand that code or alternatively to have that code perform some bit of useful work related to the reverse engineering task at hand. This generally requires access to an execution environment capable of supporting the machine code being studied, both at an architectural level (CPU type) and a packaging level (file container type). Unfortunately, this is...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
23
23
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 23
favorite 1
comment 0
Security products should make our computers more secure, not less. Little Snitch is the de facto personal firewall for OS X that aims to secure a Mac by blocking unauthorized network traffic. Unfortunately bypassing this firewall's network monitoring mechanisms is trivial...and worse yet, the firewall's kernel core was found to contain an exploitable ring-0 heap-overflow. #fail Though briefly touching on generic firewall bypass techniques, this talk will largely focus on the kernel-mode...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
31
31
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 31
favorite 0
comment 0
The use cases for hooking code execution are abundant and this topic is very expansive. EhTracing (pronounced Tracing) is technique that allows monitoring/altering of code execution at a high rate with several distinct advantages. Full context (registers, stack & system state) hooking can be logged without needing to know a function prototype and changes to execution flow can be made as desired. Traditional detours like hooking requires a length disassembly engine than direct binary .text...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
92
92
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 92
favorite 0
comment 0
Historically, machine learning for information security has prioritized defense: think intrusion detection systems, malware classification and bonnet traffic identification. Offense can benefit from data just as well. Social networks, especially Twitter with its access to extensive personal data, bot-friendly API, colloquial syntax and prevalence of shortened links, are the perfect venues for spreading machine-generated malicious content. We present a recurrent neural network that learns to...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
118
118
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 118
favorite 0
comment 0
If you’re interested in vulnerability research for fun or profit, or if you’re a beginner and you’re not sure how to progress, it can be difficult to sift through the firehose of technical information that’s out there. Plus there are all sorts of non-technical things that established researchers seem to just know. There are many different things to learn, but nobody really talks about the different paths you can take on your journey. We will provide an overview of key concepts in...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
33
33
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 33
favorite 0
comment 0
On Friday morning, August 5th, DARPA will announce the prize winners and recognize the parties responsible for building and competing in the Cyber Grand Challenge (CGC), the world's first all-machine hacking tournament, which was completed August 4th. Seven high performance computers will have completed an all-machine Capture the Flag contest, reverse engineering unknown binary software, authoring new IDS signatures, probing the security of opponent software, and re-mixing defended services...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
106
106
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 106
favorite 0
comment 0
In this talk, I'll share how I won 4 Twitter contests per day, every day, for 9 months straight. I'll discuss the methods I used, the delightfully random and surprising things I won, and how to run a Twitter contest to prevent people like me from winning. Bio: Hunter Scott is an electrical and computer engineer with over 7 years of experience designing and implementing hardware systems. He has lead electrical development on a variety of projects, from robotics to communication systems. He has...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
57
57
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 57
favorite 0
comment 0
Network telescopes are collections of unused but BGP-announced IP addresses. They collect the pollution of the Internet: scanning, misconfigurations, backscatter from DoS attacks, bugs, etc. For example, several historical studies used network telescopes to examine worm outbreaks. In this talk I will discuss phenomena that have recently induced many sources to send traffic to network telescopes. By examining this pollution we find a wealth of security-related data. Specifically, I’ll touch on...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
45
45
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 45
favorite 0
comment 0
With this presentation, we take a new approach to reverse engineering. Instead of attempting to decompile code, we seek to undo the work of the linker and produce relocatable files, the typical output of a compiler. The main benefit of the later technique over the former being that it does work. Once achieved universal code ‘reuse’ by relinking those relocatable objects as arbitrary shared libraries, we’ll create a form of binary reflection, add scripting capabilities and in memory...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
73
73
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 73
favorite 0
comment 0
In the past few years, several tools have been released allowing hobbyists to connect to CAN buses found in cars. This is welcomed as the CAN protocol is becoming the backbone for embedded computers found in smart cars. Its use is now even spreading outside the car through the OBD-II connector: usage-based policies from insurance companies, air-pollution control from law enforcement or engine diagnostics from smartphones for instance. Nonetheless, these tools will do no more than what...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
132
132
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 132
favorite 0
comment 0
Inexpensive universal DMA attacking is the new reality of today! In this talk I will explore and demonstrate how it is possible to take total control of operating system kernels by DMA code injection. Once control of the kernel has been gained I will execute code and dump gigabytes of memory in seconds. Full disk encryption will be defeated, authentication will be bypassed and shells will be spawned. This will all be made possible using a $100 piece of hardware together with the easy to use...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEFCON24, DEF CON 24, DC24, DC-24, hack,...
54
54
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 54
favorite 0
comment 0
I got myself a new toy: A solar array… With it, a little device by a top tier manufacturer that manages its performance and reports SLAs to the cloud. After spending a little time describing why it tickled me pink, I’ll walk you through my research and yes, root is involved! Armed with the results of this pen test, we will cover the vendor’s reaction to the bee sting: ostrich strategy, denial, panic, shooting the messenger and more. Finally, not because I know you get it, but because the...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
37
37
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 37
favorite 0
comment 0
Rogue access points provide attackers with powerful capabilities, but in 2016 modern privacy protections such as HTTPS Everywhere, free TLS certificates and HSTS are de-facto standards. Surely our encrypted traffic is now safe on the local coffee shop network? If not, my VPN will definitely protect me… right? In this talk we’ll reveal how recent improvements in online security and privacy can be undermined by decades old design flaws in obscure specifications. These design weakness can be...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
116
116
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 116
favorite 0
comment 0
A group of highly-armed individuals has just stormed into your office. They are looking to pull data from your computers which are protected with full disk encryption. In order to prevent your screen saver from activating they will likely immediately insert a mouse jiggler to prevent your screensaver lock from activating. This talk will present ways of detecting and defending against such assaults on your system by mouse jiggler wielding individuals. It will also show you how to build your own...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
79
79
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 79
favorite 0
comment 0
While traveling through airports, we usually don’t give a second thought about why our boarding passes are scanned at various places. After all, it’s all for the sake of passengers’ security. Or is it? The fact that boarding pass security is broken has been proven many times by researchers who easily crafted their passes, effectively bypassing not just ‘passenger only’ screening, but also no-fly lists. Since then, not only security problems have not been solved, but boarding passes...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
18
18
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 18
favorite 0
comment 0
Closing Ceremonies of DEF CON 24 Source: https://www.youtube.com/watch?v=bfuRKriDDYQ Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
29
29
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 29
favorite 0
comment 0
Continuing the series of hacker foundational skills, YbfG jvyy nqqerff shaqnzragny fxvyyf gung rirel unpxre fubhyq xabj. Whfg sbe sha jr jvyy nyfb tb sebz gur guerr onfvp ybtvp tngrf gb n shapgvbany cebprffbe juvyr enpvat n pybpx. Qb lbh xabj ubj n cebprffbe ernyyl jbexf? Jul qb lbh pner? Pbzr svaq bhg. Bu, naq pelcgb. Bio: Ryan "1o57" Clarke self-identifies as a hacker. Formerly a member of the Advanced Programs Group (APG) at Intel, he continues to do 'security stuff'...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
36
36
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 36
favorite 0
comment 0
What is the root cause of memory and network traffic bloat? Our current research using tools we previously released Badger at Black Hat in 2014 and the Kobra released at BsidesLV 2015 shows a 40 percent increase in outside unique IP traffic destinations and a 400 percent increase in data transmitted towards these destinations. But through the course of the research we found currently used IRP monitoring tools were lacking to help produce enough information to forensically investigate the...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
44
44
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 44
favorite 0
comment 0
There are multiple x86 processors in your monitor! OSD, or on-screen-display controllers are ubiquitous components in nearly all modern monitors. OSDs are typically used to generate simple menus on the monitor, allowing the user to change settings like brightness, contrast and input source. However, OSDs are effectively independent general-purpose computers that can: read the content of the screen, change arbitrary pixel values, and execute arbitrary code supplied through numerous control...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
28
28
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 28
favorite 0
comment 0
Modern web applications generate a ton of logs. Suites like ELK (Elasticsearch, Logstash, Kibana) exist to help manage these logs, and more people are turning to them for their log analysis needs. These logs contain a treasure trove of information regarding bad actors on your site, but surfacing that information in a timely manner can be difficult. When Etsy moved over from Splunk to ELK in mid-2014, we realized that ELK lacked necessary functionality for real-time alerting. We needed a...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
46
46
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 46
favorite 0
comment 0
There has been much buzz about car hacking, but what about the larger heavy-duty brother, the big rig? Heavy trucks are increasingly networked, connected and susceptible to attack. Networks inside trucks frequently use Internet connected devices even on safety-critical networks where access to brakes and engine control is possible. Unfortunately, tools for doing analysis on heavy trucks are expensive and proprietary. Six_Volts and Haystack have put together a set of tools that include open...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
36
36
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 36
favorite 0
comment 0
While some domainers allegedly brainstorm ideas for new domains to register while taking a shower, the more successful domain portfolio managers, working at scale, are believed to be ‘data driven.’ DNS queries are a material source of intelligence about domainer opportunities and operations, and also help us to understand the operational constraints around potentially combating domainers, should we want to do so. In this presentation co-authored with Farsight Security Scientist Dr. Joe St...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
76
76
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 76
favorite 0
comment 0
DEF CON has changed for the better since the days at the Alexis Park. It has evolved from a few speaking tracks to an event that still offers the speakers, but also Villages, where you can get hands-on experience and Demo Labs where you can see tools in action. Of course, there is still the Entertainment and Contest Area, as well as Capture The Flag. There is so much more to DEF CON than there was in the past and it is our goal to help you get the best experience possible. In addition to...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
28
28
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 28
favorite 0
comment 0
It's recently become easier and less expensive to create malicious GSM Base Transceiver Station (BTS) devices, capable of intercepting and recording phone and sms traffic. Detection methods haven't evolved to be as fast and easy to implement. Wireless situational awareness has a number of challenges. Categorically, these challenges are usually classified under Time, Money, or a lot of both. Provisioning sensors takes time, and the fast stuff usually isn’t cheap. Iterative improvements...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
51
51
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 51
favorite 0
comment 0
Source: https://www.youtube.com/watch?v=A9ew4jdLjYY Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, def con, defcon, defcon 24, def con 24, conference,...
48
48
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 48
favorite 1
comment 0
Does the FBI have to tell Apple of the vuln it used to break their iPhone? How many 0days every year go into the NSA arsenal — dozens, hundreds or thousands? Are there any grown-ups in Washington DC watching over FBI or NSA as they decide what vulns to disclose to vendors and which to keep to themselves? These are all key questions which have dominated so much of 2016, yet there’s been relatively little reliable information for us to go on, to learn what the Feds are up to and whether it...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
15
15
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 15
favorite 0
comment 0
With the rise of the Internet of Things, the line between the physical and the digital is growing ever more hazy. Devices that once only existed in the tangible world are now accessible by anyone with a network connection. Even physical security systems, a significant part of any large organization’s overall security posture, are being given network interfaces to make management and access more convenient. But that convenience also significantly increases the risk of attack, and hacks that...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
28
28
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 28
favorite 0
comment 0
Strong end-to-end encryption is legal in the United States today, thanks to our victory in what’s come to be known as the Crypto Wars of the 1990s. But in the wake of Paris and San Bernardino, there is increasing pressure from law enforcement and policy makers, both here and abroad, to mandate so-called backdoors in encryption products. In this presentation, I will discuss in brief the history of the first Crypto Wars, and the state of the law coming into 2016. I will then discuss what...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
41
41
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 41
favorite 0
comment 0
Get mirandized for an encrypted world. This talk will cover the legal doctrines and statues our government is perverting to compel individuals into decrypting their data, or conscript technology companies into subverting the security of their own products. We’ll survey the arguments being advanced by prosecutors, the resulting case law, and the ethical dilemmas facing technology companies. The session will cover the rights and civil liberties we’ve already lost, and review the current...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
42
42
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 42
favorite 0
comment 0
As introduced in our former series of talks ‘LTE vs. Darwin‘ there are quite a few of holes in the LTE specs. Now, having our own Macro BaseStation (an eNodeB) on the desk, we will demonstrate practical approaches to and attacks on real life devices. More and more devices are using mobile radio networks such as GSM, UMTS and LTE and there has already been quite a bit of research on (in)securities on the radio part, but only few people have had a look behind the scenes. Luckily, we had the...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
86
86
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 86
favorite 0
comment 0
Spend some time hacking hardware and you’ll eventually render a piece of equipment unusable either by accident or intentionally. Between us, we’ve got decades of bricking experience that we’d like to share. We’ll document the most common ways of temporarily or permanently damaging your hardware and ways to recover, if possible. We’ll also talk about tips on how to avoid bricking your projects in the first place. If you’re getting into hardware hacking and worried about messing...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
108
108
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 108
favorite 0
comment 0
Common hotspot software like Chilispot and Sputnik allow anyone to set up a restricted WiFi router or Ethernet network with a captive portal, asking for money, advertising, or personal information in exchange for access to the Internet. In this talk I take a look at how these and similar restrictive networks work, how they identify and restrict users, and how with a little preparation we can reach the Internet regardless of what barriers they throw up. Bio: Grant Bugher has been hacking and...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
143
143
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 143
favorite 0
comment 0
MR. ROBOT is a rare treat - a network television show whose hacker protagonist is a fully realized character with a realistically attainable set of skills. No hyper-typing, no gibberish masquerading as tech jargon, no McGuffins to magically paper over plot holes with hacker dust. MR. ROBOT takes the tech as seriously as the drama. One of the main reasons for this verisimilitude is the work of Kor Adana, MR. ROBOT's advisor on all things hackish. His fingerprints are on every terminal window in...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, DC24, DC-24, Panel, security...
58
58
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 58
favorite 0
comment 0
Active Directory domain privilege escalation is a critical component of most penetration tests and red team assessments, but standard methodology dictates a manual and often tedious process – gather credentials, analyze new systems we now have admin rights on, pivot, and repeat until we reach our objective. Then — and only then — we can look back and see the path we took in its entirety. But that may not be the only, nor shortest path we could have taken. By combining our concept of...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
79
79
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 79
favorite 0
comment 0
You want to phish your company or your client. You’ve never done this for work before, you’ve got a week to do it, and you figure that’s plenty of time. Then someone objects to the pretext at the last minute. Or spam filters block everything. Or you decide to send slowly, to avoid detection, but the third recipient alerts the entire company. Or you can only find 5 target addresses. We’ve all been there on our first professional phishing exercise. What should be as easy as building a two...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
35
35
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 35
favorite 0
comment 0
Any novice in the security field can tell you the importance of sanitizing input that is being read into computer systems. But what steps do most of us take in sanitizing the input that is read into the computer systems known as our brains? This presentation will go over the attack vector that is known as Propaganda. By studying works such as Manufacturing Consent (by Noam Chomsky and Ed Herman) we can learn of the various manipulations that happen to media before it reaches the end reader....
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, DC24, DC-24, Hack, hackers,...
57
57
Oct 3, 2017
10/17
Oct 3, 2017
by
DEFCONConference
movies
eye 57
favorite 0
comment 0
Meet the Feds panel Source: https://www.youtube.com/watch?v=EPIVjqExh9s Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...