DEF CON 23 [Audio] Speeches from the Hacker Convention
Activity Overview
Episode publication activity over the past year
Episodes
Rob Bathurst (evilrob) & Jeff Thomas (xaphan) - Canary: Keeping Your Dick Pics Safe(r)
03 Nov 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick...
Zoz - And That's How I Lost My Other Eye: Further Explorations In Data Destruction
30 Oct 2015
Contributed by Lukas
And That's How I Lost My Other Eye: Further Explorations In Data Destruction Zoz Robotics Engineer and Security Researcher How much more paranoid are ...
Zack Fasel - Seeing through the Fog
30 Oct 2015
Contributed by Lukas
Seeing through the Fog Zack Fasel Urbane Security Yes. "The Cloud" (drink). Even though many of us would much like to see use of public clouds declin...
Terrell McSweeny & Ashkan Soltani - How to Hack Government: Technologists as Policy Makers
30 Oct 2015
Contributed by Lukas
How to Hack Government: Technologists as Policy Makers Terrell McSweeny Commissioner, Federal Trade Commission Ashkan Soltani Chief Technologist, Fede...
Sean Pierce - Abusing native Shims for Post Exploitation
30 Oct 2015
Contributed by Lukas
Abusing native Shims for Post Exploitation Sean Pierce Technical Intelligence Analyst for iSIGHT Partners Shims offer a powerful rootkit-like framewor...
Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots
30 Oct 2015
Contributed by Lukas
Medical Devices: Pwnage and Honeypots Scott Erven Associate Director, Protiviti Mark Collao Security Consultant, Protiviti We know medical devices are...
Runa A. Sandvik & Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle
30 Oct 2015
Contributed by Lukas
When IoT attacks: hacking a Linux-powered rifle Runa A. Sandvik Michael Auger TrackingPoint is an Austin startup known for making precision-guided fir...
Robert Graham and David Maynor - HamSammich – long distance proxying over radio
30 Oct 2015
Contributed by Lukas
HamSammich – long distance proxying over radio Robert Graham Erratasec.com David Maynor Erratasec.com The ProxyHam talk was mysteriously canceled. H...
Richard Thieme - Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0
30 Oct 2015
Contributed by Lukas
Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0 Richard Thieme Author and Professional Speaker, ThiemeWorks T...
Peter Shipley - Insteon - False Security and Deceptive Documentation
30 Oct 2015
Contributed by Lukas
Insteon' False Security And Deceptive Documentation Peter Shipley Security Researcher Ryan Gooler Insteon is a leading home automation solution for c...
Panel - ThunderStrike 2- Sith Strike
30 Oct 2015
Contributed by Lukas
ThunderStrike 2: Sith Strike Trammel Hudson Vice President, Two Sigma Investments Xeno Kovah Co-founder, LegbaCore, LLC Corey Kallenberg Co-Founder, L...
Panel - Licensed to Pwn - Weaponization and Regulation of Security Research
30 Oct 2015
Contributed by Lukas
Licensed to Pwn: The Weaponization and Regulation of Security Research Jim Denaro Dave Aitel Matt Blaze Nate Cardozo Mara Tam Catherine “Randy” Wh...
Panel - Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
30 Oct 2015
Contributed by Lukas
Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web Peter Eckersley Electronic Frontier Foundation James Kasten Electronic Frontier Fo...
Panel - Contests Closing Ceremonies
30 Oct 2015
Contributed by Lukas
: Presenting the results and awards for the DEF CON 23 Contests and Events.
Matt Cagle & Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy War
30 Oct 2015
Contributed by Lukas
Who Will Rule the Sky? The Coming Drone Policy Wars Matt Cagle Technology and Civil Liberties Policy Attorney, ACLU of Northern California Eric Cheng ...
Marc Rogers & Kevin Mahaffey - How to Hack a Tesla Model S
30 Oct 2015
Contributed by Lukas
How to Hack a Tesla Model S Marc Rogers Principle Security Researcher for CloudFlare Kevin Mahaffey CTO of Lookout Inc The Tesla Model S is the most ...
Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS
30 Oct 2015
Contributed by Lukas
Investigating the Practicality and Cost of Abusing Memory Errors with DNS Luke Young Information Security Engineer, Hydrant Labs LLC In a world full ...
Geoff Walton & Dave Kennedy - Pivoting Without Rights – Introducing Pivoter
30 Oct 2015
Contributed by Lukas
Pivoting Without Rights – Introducing Pivoter Geoff Walton Senior Security Consultant for Cleveland-based TrustedSec Dave Kennedy (ReL1K/HackingDave...
Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID
30 Oct 2015
Contributed by Lukas
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID Francis Brown Partner - Bishop Fox Shubham Shah Security Analyst at Bishop Fox Have you ev...
Damon Small - Beyond the Scan: The Value Proposition of Vulnerability Assessment - 101 Track
30 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Damon-Small-Beyond-the-Scan.pdf Beyond the...
DaKahuna & satanklawz - Introduction to SDR and the Wireless Village - 101 Track
30 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-...
Tottenkoph & IrishMASMS - Hackers Hiring Hackers - How to Do Things Better - 101 Track
30 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker...
1057 - Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey - RICKASTLEY
30 Oct 2015
Contributed by Lukas
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey LosT We're no strangers to love You know the rules and so...
Dr. Phil Polstra - Hacker in the Wires - 101 Track
23 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf Extra...
Marina Krotofil & Jason Larsen - Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
23 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Poc...
John Seymour - "Quantum" Classification of Malware
23 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-John-Seymour-Quantum-Classification-of-Malw...
Topher Timzen & Ryan Allen - Hijacking Arbitrary .NET Application Control Flow - 101 Track
23 Oct 2015
Contributed by Lukas
Materials Available Here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary...
Charlie Miller - Remote exploitation of an unaltered passenger vehicle
22 Oct 2015
Contributed by Lukas
Remote Exploitation of an Unaltered Passenger Vehicle Charlie Miller Security engineer at Twitter Chris Valasek Director of Vehicle Security Research ...
AmmonRa - How to hack your way out of home detention
22 Oct 2015
Contributed by Lukas
Materials Available Here; https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-ammonRA-How-to-hack-your-way-out-of-home-de...
Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track
22 Oct 2015
Contributed by Lukas
Materials Available Here: https://media.defcon.org/DEF CON 23/DEF CON 23 presentations/DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy...
Patrick "Unregistered436" McNeil & "Snide" Owen - Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present - 101 Track
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-McNeil-Owen-Sorry-Wrong-Number.pdf ...
Miaubiz - Put on your tinfo_t hat if youre my type
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Miaubiz-Put-on-Your-Tinfo_t-Hat.pdf Put on...
Nir Valtman & Moshe Ferber - From 0 To Secure In 1 Minute — Securing IAAS
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Nir-Valtman-Moshe-Ferber-From-zero-to-secure...
Vivek Ramachandran - Chigula — A framework for Wi-Fi Intrusion Detection and Forensics
22 Oct 2015
Contributed by Lukas
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics Vivek Ramachandran, Founder, SecurityTube.net and Pentester Academy Most of Wi-Fi...
Aditya K Sood - Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
22 Oct 2015
Contributed by Lukas
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Aditya K Sood Architect - Threat Research Labs, Elastica ...
Jose Selvi - Breaking SSL Using Time Synchronisation Attacks
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jose-Selvi-Breaking-SSL-Using-Time-Synchroni...
Bart Kulach (Bartlomiej Jakub Kulach - Hack the Legacy! IBM i (aka AS/400) Revealed
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pd...
Ryan Mitchell - Separating Bots from the Humans
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-Mitchell-Separating-Bots-from-Humans.pd...
Marte L0ge - Tell me who you are and I will tell you your lock patter
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marte-L0ge-I-will-Tell-you-your-Lock-Patter...
Jean-Philippe Aumasson - Quantum Computers vs. Computers Security
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phillip-Aumasson-Quantum-Computers-vs-Comput...
Andres Blanco & Andres Gazzoli - 80211 Massive Monitoring
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Andres-Blanco-802.11-Massive-Monitoring-UPD...
Panel - DEF CON Comedy Inception: How many levels deep can we go?
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Panel-Comedy-Inception-Amanda-Berlin-Blue-T...
Patrick Wardle - Stick That In Your root Pipe and Smoke It
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-Wardle-Stick-that-in-your-(Root)Pipe...
Ryan O'Neill - Advances in Linux Process Forensics Using ECFS
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-O%27Neil-Advances-in-Linux-Forensics-E...
Teddy Reed & Nick Anderson - Hardware and Trust Security: Explain it like I’m 5
22 Oct 2015
Contributed by Lukas
Hardware and Trust Security: Explain it like I’m 5 Teddy Reed Security Engineer Facebook Nick Anderson Research Scientist There are a lot of presen...
Daniel “unicornFurnace” Crowley & Damon Smith - Bugged Files: Is Your Document Telling on You?
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Daniel-Crowley-Damon-Smith-Bugged-Files.pdf ...
Weston Hecker - Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Weston-Hecker-Goodbye-Memory-Scraping-Malwa...
Ken Westin - Confessions of a Professional Cyber Stalker
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ken-Westin-Confessions-of-a-Cyberstalker.pd...
Colin O'Flynn - Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Colin-O%27Flynn-Dont-Whisper-My-Chips.pdf ...
Joshua Smith - High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-...
Panel - WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ballenthin-Graeber-Teodorescu-WMI-Attacks-De...
Wesley McGrew - I Hunt Penetration Testers: More Weaknesses in Tools and Procedures
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers.pd...
Patrick Wardle - 'DLL Hijacking' on OS X? #@%& Yeah!
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-Wardle-DLL-Hijacking-on-OSX-UPDATED...
Tom Cross aka Decius & Collin Anderson - Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Collin-Anderson-Tom-Cross-Export-Controls-o...
Christian (@xntrik) Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-xntrik-Hooked-Browser-Meshed-Networks-with-...
Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers
22 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ionut-Popescu-NetRipper.pdf Whitepaper Here...
David An - When the Secretary of State says Please Stop Hacking Us
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-An-When-the-Secretary-of-State-says-S...
Ryan Castellucci - Cracking Cryptocurrency Brainwallets
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-Castellucci-Cracking-Cryptocurrency-Br...
Ian Latter - Remote Access - the APT
22 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ian-Latter-Remote-Access-the-APT.pdf Remot...
Cory Doctorow - Fighting Back in the War on General Purpose Computers
21 Oct 2015
Contributed by Lukas
Fighting Back in the War on General Purpose Computers Cory Doctorow Author & Activist, Electronic Frontier Foundation EFF's Apollo 1201 project is a ...
Sean Metcalf - Red vs. Blue: Modern Active Directory Attacks & Defense
21 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Sean-Metcalf-Red-vs-Blue-AD-Attack-and-Defe...
Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications
21 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jeremy-Dorrough-USB-Attack-to-Decrypt-Wi-Fi...
DT and 1057 - Welcome to DEF CON 23
21 Oct 2015
Contributed by Lukas
Welcome to DEF CON 23!
DEF CON 23 - Closing Ceremonies
21 Oct 2015
Contributed by Lukas
The Dark Tangent and others give thanks and hand out awards during the DEF CON 23 Closing Ceremonies.
Ricky "HeadlessZeke" Lawshae - Let's Talk About SOAP, Baby. Let's Talk About UPNP
21 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Rickey-Lawshae-Lets-Talk-About-SOAP.pdf Ext...
Omer Coskun - Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
21 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Omer-Coskun-Why-Nation-State-Malwares-Targe...
David Mortman - Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You
21 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-Mortman-Docker-UPDATED.pdf Docker, D...
Panel - Ask the EFF - The Year in Digital Civil Liberties
21 Oct 2015
Contributed by Lukas
Ask the EFF: The Year in Digital Civil Liberties Kurt Opsahl General Counsel, Electronic Frontier Foundation Nate Cardozo EFF Staff Attorney Mark Jayc...
Philip Young & Chad "Bigendian Smalls” Rikansrud - Security Necromancy: Further Adventures in Mainframe Hacking
21 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Young-Chad-Rikansrud-Security-Necromanc...
Dan Kaminsky - I want these * bugs off my * Internet
21 Oct 2015
Contributed by Lukas
I want these * bugs off my * Internet Dan Kaminsky Chief Scientist, White Ops Are you interested in the gory details in fixing ugly bugs? No? Just li...
Mike Ryan & Richo Healey - Hacking Electric Skateboards: Vehicle Research For Mortals
21 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Richo-Healey-Mike-Ryan-Hacking-Electric-Ska...
Yan Shoshitaishvili & Fish Wang - Angry Hacking - the next generation of binary analysis
21 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yan-Shoshitaishvili-Fish-Wang-Angry-Hacking...
Panel - F*ck the attribution, show us your .idb!
21 Oct 2015
Contributed by Lukas
F*ck the attribution, show us your .idb! Morgan Marquis-Boire Senior Researcher, Citizen Lab Marion Marschalek Malware reverse engineer, Cyphort Inc C...
Michael Walker & Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF
21 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Walker-Wiens-Machine-vs-Machine-DARPA-Fully...
Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns
21 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Daniel-Selifonov-Drinking-from-LETHE.pdf D...
Chris Rock - I Will Kill You
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Rock-I-Will-Kill-You-How-to-Get-Away-...
Rich Kelley - Harness - Powershell Weaponization Made Easy
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Rich-Kelley-Harness-Powershell-Weaponizatio...
Lin Huang & Qing Yang - Low-cost GPS simulator – GPS spoofing by SDR
16 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf Low-c...
Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Samy-Kamkar-README.txt Extras: https://med...
Alejandro Mayorkas - Working together to keep the Internet safe and secure
16 Oct 2015
Contributed by Lukas
Working together to keep the Internet safe and secure Alejandro Mayorkas Deputy Secretary of Homeland Security We all have a role to play when it com...
Etienne Martineau - Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Etienne-Martineau-Inter-VM-Data-Exfiltratio...
Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware
16 Oct 2015
Contributed by Lukas
Attacking Hypervisors Using Firmware and Hardware Yuriy Bulygin Advanced Threat Research, Intel Security Mikhail Gorobets Advanced Threat Research, In...
Michael Robinson & Alan Mitchell - Knocking my neighbor’s kid’s cruddy drone offline
16 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Michael-Robinson-Knocking-My-Neighbors-Kids-...
Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman - Abusing Adobe Reader’s JavaScript APIs
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Hariri-Spelman-Gorenc-Abusing-Adobe-Readers...
Gregory Picket - Staying Persistent in Software Defined Networks
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Gregory-Pickett-Staying-Persistant-in-Softw...
Eric Van Albert & Zach Banks - Looping Surveillance Cameras through Live Editing of Network Streams
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Eric-Van-Albert-Zack-Banks-Looping-Surveill...
Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Colby-Moore-Spread-Spectrum-Satcom-Hacking....
Dan “AltF4” Petro & Oscar Salaza - Hacking Smart Safes: On the "Brink" of a Robbery
16 Oct 2015
Contributed by Lukas
Hacking Smart Safes: On the "Brink" of a Robbery Dan “AltF4” Petro Security Associate, Bishop Fox Oscar Salazar Senior Security Associate at Bisho...
Mickey Shkatov & Jesse Michael - Scared Poopless – LTE and your laptop
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mickey-Shkatov-Jesse-Michael-Scared-pooples...
Dr. Phil Polstra - One Device to Pwn Them All
16 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-One-device-to-Pwn-them-all.pdf ...
Craig Young - How to Train Your RFID Hacking Tools
16 Oct 2015
Contributed by Lukas
Materials Available Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-...
Atlas - Fun with Symboliks
16 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Atlas-Fun-With-Symboliks.pdf Fun with Symb...
Yuwei Zheng & Haoqi Shan - Build a free cellular traffic capture tool with a vxworks based femoto
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellula...
Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - 101 Track
16 Oct 2015
Contributed by Lukas
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Lance-Buttars-Nemus-Hacking-SQL-Injection-fo...
Paul Amicelli & David Baptiste - How to secure the keyboard chain
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Paul-Amicelli-David-Baptiste-How-to-secure...
Peter Desfigies, Joshua Brierton, Naveed Ul Islam - Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - 101 Track
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins.p...
Saif El-Sherei & Etienne Stalmans - Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers - 101 Track
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Saif-El-Sherei-Etienne-Stalmans-SensePost-I...
Sarah Edwards - Ubiquity Forensics - Your iCloud and You - 101 Track
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Sarah-Edwards-Ubiquity-Forensics.pdf Ubiqu...
Tony Trummer & Tushar Dalvi - QARK: Android App Exploit and SCA Tool - 101 Track
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tony-Trummer-Tushar-Dalvi-QARK.pdf QARK: A...
Zack Allen & Rusty Bower - Malware in the Gaming Micro-economy
16 Oct 2015
Contributed by Lukas
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Zack-Allen-Rusty-Bower-Malware-In-Gaming.pd...