Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

DEF CON 23 [Audio] Speeches from the Hacker Convention

Technology Education

Activity Overview

Episode publication activity over the past year

Episodes

Showing 1-100 of 133
Page 1 of 2 Next → »»

Rob Bathurst (evilrob) & Jeff Thomas (xaphan) - Canary: Keeping Your Dick Pics Safe(r)

03 Nov 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick...

Zoz - And That's How I Lost My Other Eye: Further Explorations In Data Destruction

30 Oct 2015

Contributed by Lukas

And That's How I Lost My Other Eye: Further Explorations In Data Destruction Zoz Robotics Engineer and Security Researcher How much more paranoid are ...

Zack Fasel - Seeing through the Fog

30 Oct 2015

Contributed by Lukas

Seeing through the Fog Zack Fasel Urbane Security Yes. "The Cloud" (drink). Even though many of us would much like to see use of public clouds declin...

Terrell McSweeny & Ashkan Soltani - How to Hack Government: Technologists as Policy Makers

30 Oct 2015

Contributed by Lukas

How to Hack Government: Technologists as Policy Makers Terrell McSweeny Commissioner, Federal Trade Commission Ashkan Soltani Chief Technologist, Fede...

Sean Pierce - Abusing native Shims for Post Exploitation

30 Oct 2015

Contributed by Lukas

Abusing native Shims for Post Exploitation Sean Pierce Technical Intelligence Analyst for iSIGHT Partners Shims offer a powerful rootkit-like framewor...

Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots

30 Oct 2015

Contributed by Lukas

Medical Devices: Pwnage and Honeypots Scott Erven Associate Director, Protiviti Mark Collao Security Consultant, Protiviti We know medical devices are...

Runa A. Sandvik & Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle

30 Oct 2015

Contributed by Lukas

When IoT attacks: hacking a Linux-powered rifle Runa A. Sandvik Michael Auger TrackingPoint is an Austin startup known for making precision-guided fir...

Robert Graham and David Maynor - HamSammich – long distance proxying over radio

30 Oct 2015

Contributed by Lukas

HamSammich – long distance proxying over radio Robert Graham Erratasec.com David Maynor Erratasec.com The ProxyHam talk was mysteriously canceled. H...

Richard Thieme - Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0

30 Oct 2015

Contributed by Lukas

Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0 Richard Thieme Author and Professional Speaker, ThiemeWorks T...

Peter Shipley - Insteon - False Security and Deceptive Documentation

30 Oct 2015

Contributed by Lukas

Insteon' False Security And Deceptive Documentation Peter Shipley Security Researcher Ryan Gooler Insteon is a leading home automation solution for c...

Panel - ThunderStrike 2- Sith Strike

30 Oct 2015

Contributed by Lukas

ThunderStrike 2: Sith Strike Trammel Hudson Vice President, Two Sigma Investments Xeno Kovah Co-founder, LegbaCore, LLC Corey Kallenberg Co-Founder, L...

Panel - Licensed to Pwn - Weaponization and Regulation of Security Research

30 Oct 2015

Contributed by Lukas

Licensed to Pwn: The Weaponization and Regulation of Security Research Jim Denaro Dave Aitel Matt Blaze Nate Cardozo Mara Tam Catherine “Randy” Wh...

Panel - Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web

30 Oct 2015

Contributed by Lukas

Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web Peter Eckersley Electronic Frontier Foundation James Kasten Electronic Frontier Fo...

Panel - Contests Closing Ceremonies

30 Oct 2015

Contributed by Lukas

: Presenting the results and awards for the DEF CON 23 Contests and Events.

Matt Cagle & Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy War

30 Oct 2015

Contributed by Lukas

Who Will Rule the Sky? The Coming Drone Policy Wars Matt Cagle Technology and Civil Liberties Policy Attorney, ACLU of Northern California Eric Cheng ...

Marc Rogers & Kevin Mahaffey - How to Hack a Tesla Model S

30 Oct 2015

Contributed by Lukas

How to Hack a Tesla Model S Marc Rogers Principle Security Researcher for CloudFlare Kevin Mahaffey CTO of Lookout Inc The Tesla Model S is the most ...

Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS

30 Oct 2015

Contributed by Lukas

Investigating the Practicality and Cost of Abusing Memory Errors with DNS Luke Young Information Security Engineer, Hydrant Labs LLC In a world full ...

Geoff Walton & Dave Kennedy - Pivoting Without Rights – Introducing Pivoter

30 Oct 2015

Contributed by Lukas

Pivoting Without Rights – Introducing Pivoter Geoff Walton Senior Security Consultant for Cleveland-based TrustedSec Dave Kennedy (ReL1K/HackingDave...

Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID

30 Oct 2015

Contributed by Lukas

RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID Francis Brown Partner - Bishop Fox Shubham Shah Security Analyst at Bishop Fox Have you ev...

Damon Small - Beyond the Scan: The Value Proposition of Vulnerability Assessment - 101 Track

30 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Damon-Small-Beyond-the-Scan.pdf Beyond the...

DaKahuna & satanklawz - Introduction to SDR and the Wireless Village - 101 Track

30 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-...

Tottenkoph & IrishMASMS - Hackers Hiring Hackers - How to Do Things Better - 101 Track

30 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker...

1057 - Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey - RICKASTLEY

30 Oct 2015

Contributed by Lukas

Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey LosT We're no strangers to love You know the rules and so...

Dr. Phil Polstra - Hacker in the Wires - 101 Track

23 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf Extra...

Marina Krotofil & Jason Larsen - Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

23 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Poc...

John Seymour - "Quantum" Classification of Malware

23 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-John-Seymour-Quantum-Classification-of-Malw...

Topher Timzen & Ryan Allen - Hijacking Arbitrary .NET Application Control Flow - 101 Track

23 Oct 2015

Contributed by Lukas

Materials Available Here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary...

Charlie Miller - Remote exploitation of an unaltered passenger vehicle

22 Oct 2015

Contributed by Lukas

Remote Exploitation of an Unaltered Passenger Vehicle Charlie Miller Security engineer at Twitter Chris Valasek Director of Vehicle Security Research ...

AmmonRa - How to hack your way out of home detention

22 Oct 2015

Contributed by Lukas

Materials Available Here; https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-ammonRA-How-to-hack-your-way-out-of-home-de...

Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track

22 Oct 2015

Contributed by Lukas

Materials Available Here: https://media.defcon.org/DEF CON 23/DEF CON 23 presentations/DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy...

Patrick "Unregistered436" McNeil & "Snide" Owen - Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present - 101 Track

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-McNeil-Owen-Sorry-Wrong-Number.pdf ...

Miaubiz - Put on your tinfo_t hat if youre my type

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Miaubiz-Put-on-Your-Tinfo_t-Hat.pdf Put on...

Nir Valtman & Moshe Ferber - From 0 To Secure In 1 Minute — Securing IAAS

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Nir-Valtman-Moshe-Ferber-From-zero-to-secure...

Vivek Ramachandran - Chigula — A framework for Wi-Fi Intrusion Detection and Forensics

22 Oct 2015

Contributed by Lukas

Chigula — a framework for Wi-Fi Intrusion Detection and Forensics Vivek Ramachandran, Founder, SecurityTube.net and Pentester Academy Most of Wi-Fi...

Aditya K Sood - Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities

22 Oct 2015

Contributed by Lukas

Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Aditya K Sood Architect - Threat Research Labs, Elastica ...

Jose Selvi - Breaking SSL Using Time Synchronisation Attacks

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jose-Selvi-Breaking-SSL-Using-Time-Synchroni...

Bart Kulach (Bartlomiej Jakub Kulach - Hack the Legacy! IBM i (aka AS/400) Revealed

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pd...

Ryan Mitchell - Separating Bots from the Humans

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-Mitchell-Separating-Bots-from-Humans.pd...

Marte L0ge - Tell me who you are and I will tell you your lock patter

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marte-L0ge-I-will-Tell-you-your-Lock-Patter...

Jean-Philippe Aumasson - Quantum Computers vs. Computers Security

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phillip-Aumasson-Quantum-Computers-vs-Comput...

Andres Blanco & Andres Gazzoli - 80211 Massive Monitoring

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Andres-Blanco-802.11-Massive-Monitoring-UPD...

Panel - DEF CON Comedy Inception: How many levels deep can we go?

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Panel-Comedy-Inception-Amanda-Berlin-Blue-T...

Patrick Wardle - Stick That In Your root Pipe and Smoke It

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-Wardle-Stick-that-in-your-(Root)Pipe...

Ryan O'Neill - Advances in Linux Process Forensics Using ECFS

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-O%27Neil-Advances-in-Linux-Forensics-E...

Teddy Reed & Nick Anderson - Hardware and Trust Security: Explain it like I’m 5

22 Oct 2015

Contributed by Lukas

Hardware and Trust Security: Explain it like I’m 5 Teddy Reed Security Engineer Facebook Nick Anderson Research Scientist There are a lot of presen...

Daniel “unicornFurnace” Crowley & Damon Smith - Bugged Files: Is Your Document Telling on You?

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Daniel-Crowley-Damon-Smith-Bugged-Files.pdf ...

Weston Hecker - Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Weston-Hecker-Goodbye-Memory-Scraping-Malwa...

Ken Westin - Confessions of a Professional Cyber Stalker

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ken-Westin-Confessions-of-a-Cyberstalker.pd...

Colin O'Flynn - Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Colin-O%27Flynn-Dont-Whisper-My-Chips.pdf ...

Joshua Smith - High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-...

Panel - WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ballenthin-Graeber-Teodorescu-WMI-Attacks-De...

Wesley McGrew - I Hunt Penetration Testers: More Weaknesses in Tools and Procedures

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers.pd...

Patrick Wardle - 'DLL Hijacking' on OS X? #@%& Yeah!

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-Wardle-DLL-Hijacking-on-OSX-UPDATED...

Tom Cross aka Decius & Collin Anderson - Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Collin-Anderson-Tom-Cross-Export-Controls-o...

Christian (@xntrik) Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-xntrik-Hooked-Browser-Meshed-Networks-with-...

Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers

22 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ionut-Popescu-NetRipper.pdf Whitepaper Here...

David An - When the Secretary of State says Please Stop Hacking Us

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-An-When-the-Secretary-of-State-says-S...

Ryan Castellucci - Cracking Cryptocurrency Brainwallets

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-Castellucci-Cracking-Cryptocurrency-Br...

Ian Latter - Remote Access - the APT

22 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ian-Latter-Remote-Access-the-APT.pdf Remot...

Cory Doctorow - Fighting Back in the War on General Purpose Computers

21 Oct 2015

Contributed by Lukas

Fighting Back in the War on General Purpose Computers Cory Doctorow Author & Activist, Electronic Frontier Foundation EFF's Apollo 1201 project is a ...

Sean Metcalf - Red vs. Blue: Modern Active Directory Attacks & Defense

21 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Sean-Metcalf-Red-vs-Blue-AD-Attack-and-Defe...

Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications

21 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jeremy-Dorrough-USB-Attack-to-Decrypt-Wi-Fi...

DT and 1057 - Welcome to DEF CON 23

21 Oct 2015

Contributed by Lukas

Welcome to DEF CON 23!

DEF CON 23 - Closing Ceremonies

21 Oct 2015

Contributed by Lukas

The Dark Tangent and others give thanks and hand out awards during the DEF CON 23 Closing Ceremonies.

Ricky "HeadlessZeke" Lawshae - Let's Talk About SOAP, Baby. Let's Talk About UPNP

21 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Rickey-Lawshae-Lets-Talk-About-SOAP.pdf Ext...

Omer Coskun - Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts

21 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Omer-Coskun-Why-Nation-State-Malwares-Targe...

David Mortman - Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You

21 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-Mortman-Docker-UPDATED.pdf Docker, D...

Panel - Ask the EFF - The Year in Digital Civil Liberties

21 Oct 2015

Contributed by Lukas

Ask the EFF: The Year in Digital Civil Liberties Kurt Opsahl General Counsel, Electronic Frontier Foundation Nate Cardozo EFF Staff Attorney Mark Jayc...

Philip Young & Chad "Bigendian Smalls” Rikansrud - Security Necromancy: Further Adventures in Mainframe Hacking

21 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Young-Chad-Rikansrud-Security-Necromanc...

Dan Kaminsky - I want these * bugs off my * Internet

21 Oct 2015

Contributed by Lukas

I want these * bugs off my * Internet Dan Kaminsky Chief Scientist, White Ops Are you interested in the gory details in fixing ugly bugs? No? Just li...

Mike Ryan & Richo Healey - Hacking Electric Skateboards: Vehicle Research For Mortals

21 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Richo-Healey-Mike-Ryan-Hacking-Electric-Ska...

Yan Shoshitaishvili & Fish Wang - Angry Hacking - the next generation of binary analysis

21 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yan-Shoshitaishvili-Fish-Wang-Angry-Hacking...

Panel - F*ck the attribution, show us your .idb!

21 Oct 2015

Contributed by Lukas

F*ck the attribution, show us your .idb! Morgan Marquis-Boire Senior Researcher, Citizen Lab Marion Marschalek Malware reverse engineer, Cyphort Inc C...

Michael Walker & Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF

21 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Walker-Wiens-Machine-vs-Machine-DARPA-Fully...

Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns

21 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Daniel-Selifonov-Drinking-from-LETHE.pdf D...

Chris Rock - I Will Kill You

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Rock-I-Will-Kill-You-How-to-Get-Away-...

Rich Kelley - Harness - Powershell Weaponization Made Easy

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Rich-Kelley-Harness-Powershell-Weaponizatio...

Lin Huang & Qing Yang - Low-cost GPS simulator – GPS spoofing by SDR

16 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf Low-c...

Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Samy-Kamkar-README.txt Extras: https://med...

Alejandro Mayorkas - Working together to keep the Internet safe and secure

16 Oct 2015

Contributed by Lukas

Working together to keep the Internet safe and secure Alejandro Mayorkas Deputy Secretary of Homeland Security We all have a role to play when it com...

Etienne Martineau - Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Etienne-Martineau-Inter-VM-Data-Exfiltratio...

Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware

16 Oct 2015

Contributed by Lukas

Attacking Hypervisors Using Firmware and Hardware Yuriy Bulygin Advanced Threat Research, Intel Security Mikhail Gorobets Advanced Threat Research, In...

Michael Robinson & Alan Mitchell - Knocking my neighbor’s kid’s cruddy drone offline

16 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Michael-Robinson-Knocking-My-Neighbors-Kids-...

Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman - Abusing Adobe Reader’s JavaScript APIs

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Hariri-Spelman-Gorenc-Abusing-Adobe-Readers...

Gregory Picket - Staying Persistent in Software Defined Networks

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Gregory-Pickett-Staying-Persistant-in-Softw...

Eric Van Albert & Zach Banks - Looping Surveillance Cameras through Live Editing of Network Streams

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Eric-Van-Albert-Zack-Banks-Looping-Surveill...

Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Colby-Moore-Spread-Spectrum-Satcom-Hacking....

Dan “AltF4” Petro & Oscar Salaza - Hacking Smart Safes: On the "Brink" of a Robbery

16 Oct 2015

Contributed by Lukas

Hacking Smart Safes: On the "Brink" of a Robbery Dan “AltF4” Petro Security Associate, Bishop Fox Oscar Salazar Senior Security Associate at Bisho...

Mickey Shkatov & Jesse Michael - Scared Poopless – LTE and your laptop

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mickey-Shkatov-Jesse-Michael-Scared-pooples...

Dr. Phil Polstra - One Device to Pwn Them All

16 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-One-device-to-Pwn-them-all.pdf ...

Craig Young - How to Train Your RFID Hacking Tools

16 Oct 2015

Contributed by Lukas

Materials Available Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-...

Atlas - Fun with Symboliks

16 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Atlas-Fun-With-Symboliks.pdf Fun with Symb...

Yuwei Zheng & Haoqi Shan - Build a free cellular traffic capture tool with a vxworks based femoto

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellula...

Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - 101 Track

16 Oct 2015

Contributed by Lukas

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Lance-Buttars-Nemus-Hacking-SQL-Injection-fo...

Paul Amicelli & David Baptiste - How to secure the keyboard chain

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Paul-Amicelli-David-Baptiste-How-to-secure...

Peter Desfigies, Joshua Brierton, Naveed Ul Islam - Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - 101 Track

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins.p...

Saif El-Sherei & Etienne Stalmans - Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers - 101 Track

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Saif-El-Sherei-Etienne-Stalmans-SensePost-I...

Sarah Edwards - Ubiquity Forensics - Your iCloud and You - 101 Track

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Sarah-Edwards-Ubiquity-Forensics.pdf Ubiqu...

Tony Trummer & Tushar Dalvi - QARK: Android App Exploit and SCA Tool - 101 Track

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tony-Trummer-Tushar-Dalvi-QARK.pdf QARK: A...

Zack Allen & Rusty Bower - Malware in the Gaming Micro-economy

16 Oct 2015

Contributed by Lukas

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Zack-Allen-Rusty-Bower-Malware-In-Gaming.pd...

Page 1 of 2 Next → »»