Topics: manualzz, manuals, DC24 Blueprint Limited Edition, Ball DC24, User manual, Dyson, BALL
7
7.0
Jan 19, 2021
01/21
by
Stefan Seifert (xoration)
data
eye 7
favorite 0
comment 0
A little trim hat which can be glued with double sided sticky tape on the trim buttons of the Jeti Radio for easier trimming.
Topics: DS16, DC24, DS-16, Duplex, Jeti Trim, trim hat, Jeti, Trim, DC16, thingiverse, DS-24, DS24,...
3
3.0
Jan 5, 2021
01/21
by
Roland Nagel (modellflugsepp)
data
eye 3
favorite 0
comment 0
the inserts are very useful for storing small parts in the transport case, in addition the transmitter is better held
Topics: R/C Vehicles, stl, jeti, Jeti koffer, Jeti bag, thingiverse, jeti dc24
3
3.0
Jan 6, 2021
01/21
by
Roger Hammond (backpaqer)
data
eye 3
favorite 0
comment 0
A bearing replacement option for Dyson DC24 roller brushes
Topics: stl, DC24, Dyson, thingiverse, 608 bearing, Replacement Parts
6
6.0
Jan 22, 2021
01/21
by
Alexander Gee (bostwickenator)
data
eye 6
favorite 0
comment 0
This is a replacement for the catch that secures the hand-held tube to the flexible hose
Topics: DC24, dyson, thingiverse, Dyson_dc, Replacement Parts, stl
2
2.0
Aug 22, 2021
08/21
by
PiX Da MiX (pixdamix)
data
eye 2
favorite 0
comment 0
This fixes a common fault on Dysons DC24 where the ball becoming loose and clunky and gets significant play up and down on the left side of the ball if you look at it from the front. This play can cause the ball to catch on the HEPA filter inside the ball and clatter in use. In extreme cases the play when using the machine can cause the HEPA filter to pop out which can lock the ball up. Modify / Export / View this model using OnShape:...
Topics: Bearing, Replacement Parts, Bearing Cog, dyson, 914063-01, replacement, 923685-01, stl,...
28
28
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 28
favorite 0
comment 0
As a Japanese security consultant, one of my research questions in social engineering is whether or not cultural difference becomes the barrier for social engineering. It is because the malicious practice of social engineering is different between in Japan and the U.S. I think it is true. Since I have the both experience of being the company in Japan and the U.S., I would like to consider various technique of social engineering from both cultural glasses, such as tailgating, phishing or vishing...
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 24, DC24, DC-24, hack, Hackers, Hacking,...
37
37
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 37
favorite 0
comment 0
Description: What can defunct C.I.A. Manuals, radical lesbian separatists, and an 18th century Romantic essayist teach you about engineering the world to be a better place? We often think about social engineering either on the small-scale – how can one operate in individual conversations to manipulate others for data, access, or specific, immediate purposes – or we think about engineering on a large scale, how politicians or other popular figures embrace and direct a culture. But what about...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DC24, DC-24, Social Engineering, Social...
41
41
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 41
favorite 0
comment 0
US Army Interrogation techniques and training is the Irish Twin of Social Engineering. Objectives for both Match, obtain information from a source or target. Techniques for both match: Lying and Deception at the Source or Target Sincere and Convincing to the Source or Target Building Rapport and Confidence with the Source or Target The speaker will establish the synergy between both practices and provide insight into how to utilize this information in Social Engineering pentesting and defense...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
32
32
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 32
favorite 0
comment 0
Almost everyone is aware about the Technical Support SCAM calls. “Hi, your PC is infected”” is a known phrase – but sometimes they are calling the wrong person who decides to make fun of the caller.” BIO: Mattias is working for WSP | PB in a global role and also a freelance security professional. He is a Certified Ethical Hacker and always working on increasing his Social-Engineering skills. 34 years old and spent most of his time, booth professional and private, ín the IT field. He...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, DC24, DC-24, Social...
31
31
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 31
favorite 0
comment 0
In an industry that does so much to uncover and expose the mistakes of others. Which don’t get me wrong is a valuable service in helping to increase security by the discovery of these vulnerabilities. It seems everyone though is very shy about pointing out their own failures! I’ve decided that I could help teach others valuable lessons I learned by showcasing failures I’ve had in Blue Team. failures I’ve had in Red Team and failures I’ve had in this community. I once read that a smart...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DC24, DC-24, social engineering, Social...
28
28
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 28
favorite 0
comment 0
Description: You are being manipulated. There is constant pressure coming from companies, people, and attackers. Millions are spent researching and studying your weaknesses. The attack vectors are subtle. Most times we don’t realize that manipulation has occurred until it is too late. Fear not, we can harden our defenses. We can put safeguards in place to help avoid being the victim. For me, the answer came from an unlikely source: my daughter. Small children are fantastic. Society has not...
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 24, DC-24, DC24, DEFCON, social...
32
32
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 32
favorite 0
comment 0
Description: In the last couple of years, the number of cases of people being scammed online has risen gradually, and as the number of people become increasingly connected to the online world, so are the number of scammers. Scam cases, from online dating scams, winning lottery scams, free credit card scams, and of course the Nigerian prince who wants to send millions of dollars to your bank account scams are some of those that have been hitting innocent victims the most. Although many such...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DC24, DC-24, Social Engineering, Social...
70
70
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 70
favorite 0
comment 0
We’ve all seen the Wizard of Oz in some form regardless if it was the old classic or the recreations or story books as children. Oscar Diggs or also known as Oz the Great and Terrible was the most stunning wizard in all of Oz. His wizardry known through all of the land, except Oz was a fake and his entire wizardry an illusion. We are seeing a number of breaches come down to human interaction and the ability to create a fake Oz landscape in order to coax victims into opening a document or...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, DC24, DC-24, Social...
35
35
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 35
favorite 0
comment 0
Description: Social engineering is quickly becoming more prevalent in the InfoSec industry. Users are becoming more educated about social engineering attempts, but they still fall victim to attacks. Why? Well, like all in all industries, with great improvement to technology comes great improvement to exploitation, and maybe not so great improvement to security. This presentation explores the subtleties involved in wordcrafting, tone of voice, and adaptability during – shudder – human...
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 24, DEFCON, DC-24, DC24, Social...
49
49
Aug 14, 2017
08/17
by
DEFCONConference
movies
eye 49
favorite 0
comment 0
There are nonverbal movements and actions, that if you master, can make your target more compliant, easier to influence and even happier to comply with your wishes. BIO: Chris is the sole defender of those who do not want to hear Hornsby. His passion for SE is only match by his passion for the NoHornsby movement. Source: https://www.youtube.com/watch?v=VFnCRVWBISY Uploader: DEFCONConference Upload date: 2017-01-04
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 24, DEFCON, DC24, DC-24, Social...
91
91
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 91
favorite 0
comment 0
In this talk, we’ll cover some novel USB-level attacks, that can provide remote command and control of, even air-gapped machines, with a minimal forensic footprint, and release an open-source toolset using freely available hardware. In 2000, Microsoft published its 10 Immutable laws of security [1]. One of which was “if a bad guy has unrestricted access to your computer, it’s not your computer anymore.” This has been robustly demonstrated over the years. Examples include numerous...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
50
50
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 50
favorite 0
comment 0
We’ve all worked on ‘closed systems’ with little to no direct Internet access. And we’ve all struggled with the limitations those systems put on us in the form of available tools or software we want to use. I didn’t like struggling, so I came up with a method to load whatever I wanted on to a closed system without triggering any common security alerts. To do this I had to avoid accessing the Internet or using mag media. In the end all I needed was an office multi-function machine and...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
57
57
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 57
favorite 0
comment 0
Meet the Feds panel Source: https://www.youtube.com/watch?v=EPIVjqExh9s Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
132
132
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 132
favorite 0
comment 0
Drone related applications have sprung up in the recent years, and the drone security has also became a hot topic in the security industry. This talk will introduce some general security issues of the drones, including vulnerabilities existing in the radio signals, WiFi, Chipset, FPV system, GPS, App, and SDK. The most famous and popular drone product will be used to demonstrate the security vulnerabilities of each aspects, and recommendation of enforcements. The talk will also demo how to take...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
67
67
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 67
favorite 0
comment 0
HTTP is everywhere, everybody wants to write an HTTP server. So I wrote mine :-) But mine not fast, and come with an HTTP client which sends very bad HTTP queries. My tool is a stress tester for HTTP servers and proxies, and I wrote it because I found flaws in all HTTP agents that I have checked in the last year i.e. nodejs, golang, Apache httpd, FreeBSD http, Nginx, Varnish and even Haproxy. This presentation will try to explain how flaws in HTTP parsers can be exploited for bad things; we'll...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
52
52
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 52
favorite 0
comment 0
This presentation is the screaming goat anti-forensics version of those ‘Stupid Pet Tricks’ segments on late night US talk shows. Nothing ground-breaking here, but we’ll cover new (possibly) and trolly (definitely) techniques that forensic investigators haven’t considered or encountered. Intended targets cover a variety of OS platforms. Bio: int0x80 is the rapper in Dual Core. Drink all the booze, hack all the things! Source: https://www.youtube.com/watch?v=_fZfDGWpP4U Uploader:...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
33
33
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 33
favorite 0
comment 0
The Internet of Things is filled with vulnerabilities, would you expect the Internet of Vibrating Things to be any different? As teledildonics come into the mainstream, human sexual pleasure has become connected with the concerns of privacy and security already familiar to those who previously only wanted to turn on their lights, rather than their lover. Do you care if someone else knows if you or your lover is wearing a remote control vibrator? Do you care if the manufacturer is tracking your...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
35
35
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 35
favorite 0
comment 0
What is the root cause of memory and network traffic bloat? Our current research using tools we previously released Badger at Black Hat in 2014 and the Kobra released at BsidesLV 2015 shows a 40 percent increase in outside unique IP traffic destinations and a 400 percent increase in data transmitted towards these destinations. But through the course of the research we found currently used IRP monitoring tools were lacking to help produce enough information to forensically investigate the...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
28
28
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 28
favorite 0
comment 0
It's recently become easier and less expensive to create malicious GSM Base Transceiver Station (BTS) devices, capable of intercepting and recording phone and sms traffic. Detection methods haven't evolved to be as fast and easy to implement. Wireless situational awareness has a number of challenges. Categorically, these challenges are usually classified under Time, Money, or a lot of both. Provisioning sensors takes time, and the fast stuff usually isn’t cheap. Iterative improvements...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
36
36
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 36
favorite 0
comment 0
We are releasing a new tool for discovering bluetooth devices and automatically probing them for information. Effectively we have created a new tool with an airodump-ng like display for nearby bluetooth and bluetooth low energy devices. We will discuss the challenges with finding bluetooth devices, as well as how we have overcome them using both standard bluetooth adapters and optionally ubertooth hardware. If you have ever wondered why no one released an effective tool to see all the bluetooth...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, dc24, dc-24, computer...
160
160
Sep 22, 2016
09/16
by
DEFCONConference
movies
eye 160
favorite 1
comment 0
This is not just another "I found a problem in a single IOT device" talk. Focusing on attacking three major consumer product lines that have grown rapidly in the past years, Zack and Erin will review flaws they’ve discovered and weaponized against home Windows installs, DIY security solutions, personal fitness tracking devices, and digital notification devices. We’ll review the security of these popular products and services in a ‘consumer reports’ style walkthrough, the...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, DC24, DC-24, DC 24, Zack...
91
91
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 91
favorite 0
comment 0
VNC is a great tool to use if you need to get to a box you're not physically near. The trouble with VNC is that it was invented 15+ years ago and hasn't been improved upon in any significant way. Besides the internet of things being sprinkled with VNC endpoints, there are companies which use VNC to such a large degree they need a VNC proxy on their perimeter to get to all the internal VNC hosts - some of which are ICS/SCADA devices. Stargate is the result of discovering a vulnerability in these...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEFCON 24, DEF CON 24, DC24, DC-24,...
31
31
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 31
favorite 0
comment 0
When the machines rise up and take away our freedom to communicate we're going to need a way out. Exfiltration of data across trust boundaries will be our only means of communication. How do we do that when the infrastructure we built to defend ourselves is the very boundary we must defeat? We use the same pathways we used to, but bend the rules to meet our needs. Whether its breaking protocol, attaching payloads, or pirating the airwaves we'll find a way. We'll cover using a custom server...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
163
163
Sep 22, 2016
09/16
by
DEFCONConference
movies
eye 163
favorite 1
comment 0
Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems that manage the keys. Using a modified MST injection method Weston will demonstrate several attacks on POS and Hotel keys including brute forcing other guest’s keys from your card information as a start point. And methods of injecting keystrokes into POS systems just as if you had a keyboard plugged into the system. This includes injecting keystrokes to open cash drawer...
Topics: Youtube, video, Science & Technology, def con, defcon, DEF CON 24, Dc24, DC 24, DC-24, weston...
130
130
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 130
favorite 0
comment 0
Inexpensive universal DMA attacking is the new reality of today! In this talk I will explore and demonstrate how it is possible to take total control of operating system kernels by DMA code injection. Once control of the kernel has been gained I will execute code and dump gigabytes of memory in seconds. Full disk encryption will be defeated, authentication will be bypassed and shells will be spawned. This will all be made possible using a $100 piece of hardware together with the easy to use...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEFCON24, DEF CON 24, DC24, DC-24, hack,...
35
35
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 35
favorite 0
comment 0
Any novice in the security field can tell you the importance of sanitizing input that is being read into computer systems. But what steps do most of us take in sanitizing the input that is read into the computer systems known as our brains? This presentation will go over the attack vector that is known as Propaganda. By studying works such as Manufacturing Consent (by Noam Chomsky and Ed Herman) we can learn of the various manipulations that happen to media before it reaches the end reader....
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, DC24, DC-24, Hack, hackers,...
38
38
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 38
favorite 0
comment 0
Machines are getting smarter – so consumer protection enforcers like the Federal Trade Commission need to get smarter too. The FTC is the lead federal agency for protecting the privacy rights and data security of American consumers. In the last year, it brought several enforcement actions against companies for violating consumer privacy and data security and launched new initiatives – PrivacyCon, Start with Security, and a new Office of Technology Research and Investigation– to improve...
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 24, DEFCON, DC24, DC-24, hack, hackers,...
132
132
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 132
favorite 0
comment 0
As stated in my bio, besides computer security I also love flight simulators and mountain biking. Last year I gave a talk about hacking a flight simulator (among other games), it was only fitting to research something related to my other hobby too. Old day's bike speedometers have evolved quite a bit, and nowadays a lot of bikers (swimmers, runners, ers) do their sport with tiny computers attached to them. These computers do much more than measuring speed: they have GPS, they can store your...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, DC24, DC-24, security...
61
61
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 61
favorite 0
comment 0
Today’s evil often comes in the form of ransomware, keyloggers, or spyware, against which AntiVirus applications are usually an end user’s only means of protection. But current security apps not only scan for malware, they also aid end users by detecting malicious URLs, scams or phishing attacks. Generally, security apps appear so self-evidently useful that institutions such as online-banking providers even require users to install anti-virus programs. In this talk, however, we show that...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DC24, DC-24, hack, hackers, hacking,...
45
45
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 45
favorite 0
comment 0
There has been much buzz about car hacking, but what about the larger heavy-duty brother, the big rig? Heavy trucks are increasingly networked, connected and susceptible to attack. Networks inside trucks frequently use Internet connected devices even on safety-critical networks where access to brakes and engine control is possible. Unfortunately, tools for doing analysis on heavy trucks are expensive and proprietary. Six_Volts and Haystack have put together a set of tools that include open...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
88
88
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 88
favorite 0
comment 0
Last year, DARPA ran the qualifying event for the Cyber Grand Challenge to usher in the era of automated hacking. Shellphish, a rag-tag team of disorganized hackers mostly from UC Santa Barbara, decided to join the competition about ten minutes before the signups closed. Characteristically, we proceeded to put everything off until the last minute, and spent 3 sleepless weeks preparing our Cyber Reasoning System for the contest. Our efforts paid off and, as we talked about last DEF CON , against...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
21
21
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 21
favorite 0
comment 0
As a defender, have you ever been asked ‘do they win?’ How about ‘what products or capabilities should I buy to even the odds?’ Mapping the functionality to a standard list of desired capabilities only gets you so far. And, many vendors require an organization to pay for a framework, or for access to a framework, to enable tactical and strategic campaigns. Wouldn’t it be great to have an open source way to pick strategies? So what do you do? Build out your own defensive campaigns...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
17
17
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 17
favorite 0
comment 0
Samsung announced many layers of security to its Pay app. Without storing or sharing any type of user’s credit card information, Samsung Pay is trying to become one of the securest approaches offering functionality and simplicity for its customers. This app is a complex mechanism which has some limitations relating security. Using random tokenize numbers and implementing Magnetic Secure Transmission (MST) technology, which do not guarantee that every token generated with Samsung Pay would be...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
29
29
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 29
favorite 0
comment 0
Cloud service providers offer their customers the ability to deploy virtual machines in a multi-tenant environment. These virtual machines are typically connected to the physical network via a virtualized network configuration. This could be as simple as a bridged interface to each virtual machine or as complicated as a virtual switch providing more robust networking features such as VLANs, QoS, and monitoring. At DEF CON 23, we presented how attacks known to be successful on physical switches...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
15
15
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 15
favorite 0
comment 0
With the rise of the Internet of Things, the line between the physical and the digital is growing ever more hazy. Devices that once only existed in the tangible world are now accessible by anyone with a network connection. Even physical security systems, a significant part of any large organization’s overall security posture, are being given network interfaces to make management and access more convenient. But that convenience also significantly increases the risk of attack, and hacks that...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
48
48
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 48
favorite 0
comment 0
Source: https://www.youtube.com/watch?v=A9ew4jdLjYY Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, def con, defcon, defcon 24, def con 24, conference,...
79
79
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 79
favorite 0
comment 0
While traveling through airports, we usually don’t give a second thought about why our boarding passes are scanned at various places. After all, it’s all for the sake of passengers’ security. Or is it? The fact that boarding pass security is broken has been proven many times by researchers who easily crafted their passes, effectively bypassing not just ‘passenger only’ screening, but also no-fly lists. Since then, not only security problems have not been solved, but boarding passes...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
39
39
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 39
favorite 0
comment 0
Electronic locks are becoming increasingly common on consumer-grade safes, particularly those used to secure guns. This talk explores vulnerabilities of several UL-listed Type 1 "High Security" electronic safe locks. Using side-channel attacks, we recover the owner-configured keycodes on two models of these locks from outside of locked safes without any damage to the locks or safes. Discussion includes power-line analysis, timing attacks, and lockout-defeat strategies on embedded...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
22
22
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 22
favorite 0
comment 0
Security products should make our computers more secure, not less. Little Snitch is the de facto personal firewall for OS X that aims to secure a Mac by blocking unauthorized network traffic. Unfortunately bypassing this firewall's network monitoring mechanisms is trivial...and worse yet, the firewall's kernel core was found to contain an exploitable ring-0 heap-overflow. #fail Though briefly touching on generic firewall bypass techniques, this talk will largely focus on the kernel-mode...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
142
142
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 142
favorite 0
comment 0
MR. ROBOT is a rare treat - a network television show whose hacker protagonist is a fully realized character with a realistically attainable set of skills. No hyper-typing, no gibberish masquerading as tech jargon, no McGuffins to magically paper over plot holes with hacker dust. MR. ROBOT takes the tech as seriously as the drama. One of the main reasons for this verisimilitude is the work of Kor Adana, MR. ROBOT's advisor on all things hackish. His fingerprints are on every terminal window in...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 24, DC24, DC-24, Panel, security...
18
18
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 18
favorite 0
comment 0
Closing Ceremonies of DEF CON 24 Source: https://www.youtube.com/watch?v=bfuRKriDDYQ Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
25
25
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 25
favorite 0
comment 0
Get the latest information about how the law is racing to catch up with technological change from staffers at the Electronic Frontier Foundation, the nation’s premiere digital civil liberties group fighting for freedom and privacy in the computer age. This session will include updates on current EFF issues such as surveillance online, encryption (and backdoors), and fighting efforts to use intellectual property claims to shut down free speech and halt innovation, discussion of our technology...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
28
28
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 28
favorite 0
comment 0
Strong end-to-end encryption is legal in the United States today, thanks to our victory in what’s come to be known as the Crypto Wars of the 1990s. But in the wake of Paris and San Bernardino, there is increasing pressure from law enforcement and policy makers, both here and abroad, to mandate so-called backdoors in encryption products. In this presentation, I will discuss in brief the history of the first Crypto Wars, and the state of the law coming into 2016. I will then discuss what...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...
90
90
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 90
favorite 0
comment 0
Many industries, provide consumers with data about the quality, content, and cost of ownership of products, but the software industry leaves consumers with very little data to act upon. In fact when it comes to how secure or weak a product is from a security perspective, there is no meaningful consumer facing data. There has long been a call for the establishment of an independent organization to address this need. Last year, Mudge (from DARPA, Google, and L0pht fame) announced that after...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, Hacking, Hacker Conference, Computer...