Skip to main content

More right-solid
More right-solid
More right-solid
SHOW DETAILS
eye
Title
Date Archived
Creator
DEFCON 24
movies
eye 9
favorite 0
comment 0
Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems that manage the keys. Using a modified MST injection method Weston will demonstrate several attacks on POS and Hotel keys including brute forcing other guest’s keys from your card information as a start point. And methods of injecting keystrokes into POS systems just as if you had a keyboard plugged into the system. This includes injecting keystrokes to open cash drawer...
Topics: Youtube, video, Science & Technology
DEFCON 24
by DEFCONConference
movies
eye 3
favorite 0
comment 0
Source: https://www.youtube.com/watch?v=KXycoirlm9A Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology
DEFCON 24
movies
eye 4
favorite 0
comment 0
Tor is a widely used anonymity network that protects users' privacy and and identity from corporations, agencies and governments. However, Tor remains a practical system with a variety of limitations, some of which were indeed exploited in the recent past. In particular, Tor's security relies on the fact that a substantial number of its nodes do not misbehave. Previous work showed the existence of malicious participating Tor relays. For example, there are some Exit nodes that actively interfere...
Topics: Youtube, video, Science & Technology
DEFCON 23
by DEFCONConference
movies
eye 11
favorite 0
comment 0
A talk was cancelled and Priest takes to the stage to do an impromtu "Spot the Fed". What is Spot the Fed you ask? Well it's a game we've played at DEF CON forever now...Here's a description from Priest: "Like a paranoid version of pin the tail on the donkey, the favorite sport at this gathering of computer hackers and phone phreaks seems to be hunting down real and imagined telephone security and Federal and local law enforcement authorities who the attendees are certain are...
Topics: Youtube, video, Science & Technology
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here; /redirect?v=8PXHhGa5k8g&redir_token=_5uFMm-OmeEiYbtmyuUnDJSl9fB8MTUzNzM5MzAxMUAxNTM3MzA2NjEx&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMoore-Wardle%2FDEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf Optical Surgery; Implanting a DropCam Patrick Wardle DIRECTOR OF RESEARCH, SYNACK Colby Moore SECURITY RESEARCH ENGINEER, SYNACK Video Monitoring solutions such as DropCam aim to provide remote monitoring,...
Topics: Youtube, video, Science & Technology, DEFCON Conference, DEFCON Video Series, DEF CON 22,...
DEFCON 23
by DEFCONConference
movies
eye 15
favorite 0
comment 0
Everybody plays games, and a whole lot of people plays computer games. Despite this fact, very few of us, security researchers consider them as interesting targets. Granted, you won't likely be able to directly hack into a big corporate network via game exploits, but you could for example target the people running the company via their favorite games. Or their children's favorite games. Another scenario: you should consider that a hacked game could allow Not So Admirable people access to your...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), video games, Video Game...
DEFCON 26
movies
eye 4
favorite 0
comment 0
Source: https://www.youtube.com/watch?v=wPbW6zQ52w8 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLeder%2FDEFCON-22-Felix-Leder-NinjaTV.pdf&v=Y0P1Lx5DRvE&event=video_description&redir_token=cf65ZdAiyzQtZod4JnUlX0RigJR8MTUzNzM5NjIwN0AxNTM3MzA5ODA3 NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It Felix Leder DIRECTOR, MALWARE RESEARCH, BLUE COAT NORWAY Smart TVs are growing in popularity. Set-top boxes like Apple TV, Roku, or WD TV can make your “normal” TV...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 2
favorite 0
comment 0
Michele Fincher - How to you Feel about your Mother.. Psych and The SE Source: https://www.youtube.com/watch?v=A0_NL1YBvK4 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBathurst-Rogers-Carey-Clarke%2FDEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf&event=video_description&v=H7kPoJXtE6Y&redir_token=HC7Tb6P3Nf_U5feUDxR--MWR-Jl8MTUzNzM5ODU1MkAxNTM3MzEyMTUy PropLANE: Kind of keeping the NSA from watching you pee Rob Bathurst (EVILROB) Russ Rogers (RUSSR) Mark Carey (PHORKUS) Ryan Clarke (L0STBOY) No one likes to be watched, especially on the Internet. Your...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 5
favorite 0
comment 0
Slides Here: /redirect?redir_token=Qo7sQPkbEjnSzuc51YPGjazDko58MTUzNzM5OTE5OEAxNTM3MzEyNzk4&event=video_description&v=ssE_mwSEH9U&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBalazs%2FDEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf Bypass firewalls, application white lists, secure remote desktops under 20 seconds Zoltán Balázs CHIEF TECHNOLOGY OFFICER AT MRG EFFITAS In theory, post-exploitation after having...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 18
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=3LZhFFm1tK0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKlafter-Swanson%2FDEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf&redir_token=6hf6QocokC-KNUNJX_WZV0dFVmN8MTUzNzQwMDQ1M0AxNTM3MzE0MDUz Check Your Fingerprints: Cloning the Strong Set Richard Klafter (Free) SENIOR SOFTWARE ENGINEER, OPTIMIZELY Eric Swanson (Lachesis) SOFTWARE DEVELOPER The web of trust has...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
DEF CON the Mystery, Myth and Legend Panel It's hard to throw a stone these days without hitting a security/hacking conference. But, when every year the Las Vegas Metro SWAT Team stages for an interdiction of your convention, you know you have something "different". From crawling through Air Ducts to surreptitiously "acquiring" telco equipment, these are the stories of DEF CON you don't often hear about. The stories of yesteryear that not only helped shape defcon but also...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 20
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FYoung%2FDEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf&redir_token=tVZuE7xrTKW5PGb7RxNaa2W6izl8MTUzNzQwMDU4NEAxNTM3MzE0MTg0&event=video_description&v=Xfl4spvM5DI From root to SPECIAL: Pwning IBM Mainframes Philip “Soldier of Fortran” Young 1.1 million transactions are run through mainframes every second worldwide. From your flight to your ATM withdrawal...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBulygin-Bazhaniul-Furtak-Loucaides%2FDEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf&v=QDSlWa9xQuA&event=video_description&redir_token=xeTSylyn5qzGHiOQ75r1iakKWGl8MTUzNzM5OTI2NkAxNTM3MzEyODY2 Summary of Attacks Against BIOS and Secure Boot Yuriy Bulygin CHIEF THREAT ARCHITECT, INTEL SECURITY Oleksandr Bazhaniuk SECURITY RESEARCHER, INTEL SECURITY...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKouns-Eiram%2FDEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-UPDATED.pdf&v=759ZalgD1vg&event=video_description&redir_token=c18lmjGhyRtvbnYkQ3KitntbMip8MTUzNzM5NTg1M0AxNTM3MzA5NDUz Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! Jake Kouns CISO, RISK BASED SECURITY Carsten Eiram CHIEF RESEARCH OFFICER, RISK BASED SECURITY Everywhere you...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?redir_token=7a7GIl-mZ_KTw7nfO4rEPlMRp0t8MTUzNzQwMDM4NUAxNTM3MzEzOTg1&event=video_description&v=d5jqV06Yijw&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FRowley%2FDEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf Detecting and Defending Against a Surveillance State Robert RowleySECURITY RESEARCHER, TRUSTWAVE SPIDERLABS This talk is based on semi-recent reported leaks that detail how state-actors could be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf&event=video_description&v=7HdcEQGQZDU&redir_token=XUAls5sLm4iDgHPV7bVSprWmtet8MTUzNzM5ODAwNUAxNTM3MzExNjA1 The Secret Life of Krbtgt Christopher Campbell SECURITY RESEARCHER A tale of peril and woe, Krbtgt is the domain account that you just can't quit. Quiet and harmless, it has been with your enterprise since you...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 13
favorite 0
comment 0
Panel - Diversity in Information Security Jennifer Imhoff-Dousharm Informatics student, co-organizer of theSummit, NCWIT affiliate member Sandy “Mouse” Clark Security Researcher and part-time Phd. candidate Kristin Paget Jolly Full time hacker Vyrus Independent Security Consultant Scott Martin CIO Spikes Security Discussion from the point of view of a diverse panel of leading representatives currently in or thinking of becoming part of the Information Security industry. This panel will give...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides here: /redirect?v=KFx4lhxMi-M&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMahjoub-Toonk-Reuille%2FDEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf&redir_token=z7tmvlIzYesz7khWPB8Kw6nTHQN8MTUzNzM5NzAxOUAxNTM3MzEwNjE5 Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 4
favorite 0
comment 0
Slides Here: /redirect?redir_token=4mOePPTFFqiNwzZkdgA8Z9Wyj_N8MTUzNzQwMDA0OUAxNTM3MzEzNjQ5&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FErven-Merdinger%2FDEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf&event=video_description&v=wTEMSBXtkAc Just What The Doctor Ordered? Scott Erven FOUNDER & PRESIDENT SECMEDIC, INC Shawn Merdinger HEALTHCARE SECURITY RESEARCHER You have already heard the stories of security researchers...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 5
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=nX9JXI4l3-E&redir_token=4u5f22ke16CDdP3ILZ2m4wch7Mp8MTUzNzM5OTA5N0AxNTM3MzEyNjk3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGraham-McMillan-Tentler%2FDEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf Mass Scanning the Internet: Tips, Tricks, Results Robert Graham Paul McMillan Dan Tentler Scanning the net -- the entire net -- is now a thing. This talk will discuss how to do it, such as how to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=rz0SNEFZ8h0&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FTal%2FDEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf&redir_token=eyh5zWmonhLFMBzYracghdLElNl8MTUzNzM5OTk4NUAxNTM3MzEzNTg1 I Hunt TR-069 Admins: Pwning ISPs Like a Boss Shahar Tal SECURITY & VULNERABILITY RESEARCH TEAM LEADER, CHECK POINT SOFTWARE TECHNOLOGIES Residential gateway (/SOHO router) exploitation is a rising trend in the security...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides here: /redirect?v=mBOLml3yLBY&redir_token=9xPQ6LNY2eXxo71_iYvHwQ4vUfR8MTUzNzM5ODEyM0AxNTM3MzExNzIz&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FQuaddi-R3plicant-Hefley%2FDEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf&event=video_description Hacking 911: Adventures in Disruption, Destruction, and Death Christian “quaddi” Dameff MD Jeff “r3plicant” Tully MD Peter Hefley SENIOR MANAGER - SUNERA Ever wonder what you would do if...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here:/redirect?redir_token=7qOvijcEYFsFAy_eNasKzt3FrGl8MTUzNzM5OTQ2OEAxNTM3MzEzMDY4&event=video_description&v=IFNb3ciJZkQ&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcGrew%2FDEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf Additional Materials available:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDrapeau-Dukes%2FDEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf&redir_token=pTAdg2IHb51r5azG3NjTX7HdTAx8MTUzNzM5NzI2NEAxNTM3MzEwODY0&v=X72vwxQ8B84&event=video_description Additional Extra Materials are available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Panel: Ephemeral Communications: Why and How? Ryan Lackey Founder, CryptoSeal, Inc. Jon Callas Silent Circle Elissa Shevinsky Glimpse Possibly more to come..... Ephemeral communications applications are increasingly popular ways, especially among younger users, to communicate online. In contrast to “once it’s on the Internet, it’s forever”, these applications promise to delete information rapidly, or to maintain anonymity indefinitely, lowering inhibitions to share sensitive or personal...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
Slides here: /redirect?redir_token=uw9ninDPmKhxrkbWabIg2oj2doV8MTUzNzM5NzQwM0AxNTM3MzExMDAz&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLitchfield%2FDEFCON-22-David-Litchfield-Oracle-Data-Redaction-is-Broken.pdf&v=L6Fc9S0xUtY&event=video_description Oracle Data Redaction is Broken David Litchfield SECURITY SPECIALIST, DATACOM TSS The Oracle data redaction service is a new feature introduced with Oracle 12c. It allows sensitive data, such as PII, to be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
David Kennedy - Destroying Education and Awareness Programs Source: https://www.youtube.com/watch?v=vcA6dLl5Sa4 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 18
favorite 0
comment 0
Slides Here:/redirect?redir_token=uTqJO4utchAhySBUTo-XWZxxRJJ8MTUzNzM5OTUzNUAxNTM3MzEzMTM1&event=video_description&v=vLU92bNeIdI&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FStrazzere-Sawyer%2FDEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf Android Hacker Protection Level 0 Tim Strazzere LEAD RESEARCH & RESPONSE ENGINEER Jon Sawyer CTO OF APPLIED CYBERSECURITY LLC Obfuscator here, packer there - the Android ecosystem is...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPetrov-Gaivoronski%2FDEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf&v=vOz40Zk8lEw&redir_token=wKa2ag9ycRQ3t7roLAu03OJ2QOB8MTUzNzM5OTY5OEAxNTM3MzEzMjk4&event=video_description Extra Materials are available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=EDci2gb3ruQ&event=video_description&redir_token=_kdMqniTkcGjjzMaUo8m8SajbKF8MTUzNzM5OTM5OEAxNTM3MzEyOTk4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHecker%2FDEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf Burner Phone DDOS 2 dollars a day : 70 Calls a Minute Weston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY Phone DDOS research. Current proof of concept is dealing with Samsung SCH-U365 QUALCOMM prepaid Verizon...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=dfi3AEvCL_E&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBruno-Graziano%2FDEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf&redir_token=nzYHyGgDWHZTLEQ_Z_UBaUoXtft8MTUzNzM5NDExMUAxNTM3MzA3NzEx Through the Looking-Glass, and What Eve Found There Luca "kaeso" Bruno RESEARCH ENGINEER, EURECOM Mariano "emdel" Graziano PH.D. STUDENT, EURECOM Traditionally, network operators have...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=d6VCri6sPnY&event=video_description&redir_token=-DGawUHPQPJY0BWOZ4Tn4EVbxZ98MTUzNzM5Nzg0NEAxNTM3MzExNDQ0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKallenberg%2FDEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 25
favorite 0
comment 0
Slides Here: /redirect?q=http%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMolina%2FDEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf&v=RX-O4XuCW1Y&redir_token=00hZo8EVTjFTT6GySHzXfyMe9DJ8MTUzNzM5NTM3NkAxNTM3MzA4OTc2&event=video_description White paper Here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?redir_token=4HYPndHHE4fCV-TlctceVNoQxAF8MTUzNzQwMDMxOEAxNTM3MzEzOTE4&v=qF06PFcezLs&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKazanciyan-Hastings%2FDEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf&event=video_description Investigating PowerShell Attacks Ryan Kazanciyan TECHNICAL DIRECTOR, MANDIANT Matt Hastings CONSULTANT, MANDIANT Over the past two years, we've seen targeted attackers increasingly...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides here; /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGorenc-Molinyawe%2FDEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf&event=video_description&v=zn6D-iVcRwg&redir_token=Sp7sGtEQmqIjp5uokH8AcXY9weF8MTUzNzM5ODYxOEAxNTM3MzEyMjE4 Blowing up the Celly - Building Your Own SMS/MMS Fuzzer Brian Gorenc ZERO DAY INITIATIVE, HP SECURITY RESEARCH Matt Molinyawe ZERO DAY INITIATIVE, HP SECURITY RESEARCH Every time you hand out...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 2
favorite 0
comment 0
Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations Source: https://www.youtube.com/watch?v=D2N6FclMMTg Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides Here: /redirect?redir_token=3rjJ4SjJ6x4RaqJaSPdnl7uaogt8MTUzNzM5NjM0OEAxNTM3MzA5OTQ4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSmith-Perrymon%2FDEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf&v=EEGxifOAk48&event=video_description Advanced Red Teaming: All Your Badges Are Belong To Us Eric Smith SENIOR PARTNER, PRINCIPAL SECURITY CONSULTANT AT LARES Josh Perrymon SENIOR ADVERSARIAL ENGINEER AT LARES By definition ”Red...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 16
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLittlebury%2FDEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf&v=2IeU7Cck0hI&redir_token=GHmdcUQxe2eVHa3roWN5TJkWIT18MTUzNzM5ODE4NkAxNTM3MzExNzg2&event=video_description Home Alone with localhost: Automating Home Defense Chris Littlebury SENIOR PENETRATION TESTER, KNOWLEDGE CONSULTING GROUP, INC. Home automation is everywhere, and so are their exploits. This presentation will go...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHunt%2FDEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf&redir_token=WOoiFvXf6uNdiDY-yjuVGvbeUot8MTUzNzM5ODk2N0AxNTM3MzEyNTY3&v=nSqV78le3jU&event=video_description Additional materials are available for download here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 20
favorite 0
comment 0
Secure Random By Default Dan Kaminsky Chief Scientist, White Ops As a general rule in security, we have learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs -- insecure and default, and secure but obscure. Why not fix this? Why not make JavaScript and PHP and Java and Python and even libc rand() return strong entropy? What are the...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FElijah%2FDEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing-Updated.pdf&v=fMfQQoHHLBA&redir_token=c_Hy420u5CCR4Ea561qpMDusBFZ8MTUzNzM5NjU3MEAxNTM3MzEwMTcw&event=video_description Saving Cyberspace by Reinventing File Sharing Eijah Internet access is a basic human right, due to its unparalleled capacity to deliver content and information. Recently, our right to share files online...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here; /redirect?v=nBR7Kru6JX0&redir_token=qmF3AGzW0Iq1eyRrun29EG4KaId8MTUzNzM5NDUxM0AxNTM3MzA4MTEz&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKelley-Anderson%2FDEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe-Updated.pdf&event=video_description Is This Your Pipe? Hijacking the Build Pipeline. Kyle Kelley DEVELOPER SUPPORT ENGINEER, RACKSPACE Greg Anderson SOFTWARE SECURITY ENGINEER,RACKSPACE As developers of the web, we rely on tools to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 63
favorite 0
comment 0
Old Skewl Hacking: Porn Free! Major Malfunction Having cut his teeth (and scarred his mind) on hotel Infra-Red controlled TV systems, spent ten years scanning the skies for 'interesting' satellite feeds, in this, the 3rd in his series of 'Old Skewl Hacking' talks, Major Malfunction once again, and with great personal sacrifice, goes down on^winto the depths of late-night terrestrial broadcast television to determine how secure 'Pay Per View' / 'Pay Per Night' systems are, and if Debbie really...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 4
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDorsey%2FDEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf&redir_token=qnvPDdx8wXuaqQVhTJIUZhkY2_J8MTUzNzM5NzcwMkAxNTM3MzExMzAy&v=gXuxfh5-XeE&event=video_description Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go David Dorsey LEAD SECURITY RESEARCHER AT CLICK SECURITY Using a ROP chain to bypass operating system defenses is commonplace and detecting this...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 4
favorite 0
comment 0
Slides here: /redirect?v=dq2Hv7J9fvk&event=video_description&redir_token=cfG7edv0lGfJAt_70WmsyrdINCZ8MTUzNzM5ODc0N0AxNTM3MzEyMzQ3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBloxham%2FDEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse Brady Bloxham PRINCIPAL SECURITY CONSULTANT, SILENT BREAK SECURITY Windows APIs are often a blackbox with poor documentation, taking input and...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
How To Get Phone Companies To Just Say No To Wiretapping Phil Zimmermann President & Co-Founder Silent Circle Phil is going to talk about his latest projects, which are helping several mobile carriers to provide their customers with wiretap-free phone services. These carriers are breaking ranks with the rest of their industry's century-long culture of wiretapping. When you can get actual phone companies to join in the struggle, you know change is afoot. And yes, Navy SEALS are involved....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMetacortex-Grifter%2FDEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf&redir_token=zqWRMcbc8LtuiR4088-kbXdEhPN8MTUzNzM5NTUyOUAxNTM3MzA5MTI5&v=7HnQnpJwr-c&event=video_description USB for all! Jesse Michael SECURITY RESEARCHER Mickey Shkatov SECURITY RESEARCHER USB is used in almost every computing device produced in recent years. In addition to well-known usages like keyboard,...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?redir_token=cxl245MgLWALVC2SMYGMg98XM9l8MTUzNzQwMDUxMkAxNTM3MzE0MTEy&event=video_description&v=wzyuioto4y8&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPierce-Loki%2FDEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf NSA Playset : GSM Sniffing Pierce SECURITY RESEARCHER Loki SECURITY RESEARCHER A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 13
favorite 0
comment 0
Night 2 of Hacker Pyramid's last hurrah. Source: https://www.youtube.com/watch?v=BQEHElSwXUM Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON, DEF CON 22, hackers, las vegas, game show
DEFCON 25
movies
eye 9
favorite 0
comment 0
Closing Ceremonies Source: https://www.youtube.com/watch?v=Ly7uurZ2d9A Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...
DEFCON 22
by DEFCONConference
movies
eye 14
favorite 0
comment 0
Hacker Jeopardy is the legendary, long running DEF CON hacker trivia game that dominates the nighttime offerings every year. The questions are tough, the beverage choices are dubious and the winners are immortal. Source: https://www.youtube.com/watch?v=3_5rO3abWoM Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), jeopardy, hacker jeopardy,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here: /redirect?redir_token=9YdNTeCiUQI21Tl-mSfcZ8OaC6h8MTUzNzM5NjI3NEAxNTM3MzA5ODc0&v=vcWwtH05f7E&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FOzavci%2FDEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf&event=video_description VoIP Wars: Attack of the Cisco Phones Fatih Ozavci SENIOR SECURITY CONSULTANT, SENSE OF SECURITY Many hosted VoIP service providers are using Cisco hosted collaboration suite and Cisco VoIP solutions....
Topics: Youtube, video, Science & Technology, Cisco Wireless IP Phone 7920, Voice Over IP (Industry),...
DEFCON 22
movies
eye 43
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FOssman%2FDEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf&event=video_description&v=mAai6dRAtFo&redir_token=Qs5QJsImCl4qGKxCHRKFyv1DpYh8MTUxMDA4Nzc4N0AxNTEwMDAxMzg3 Extra materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSchrenk%2FDEFCON-22-Mike-Schrenk-Youre-Leaking-Trade-Secrets-UPDATED.pdf&v=JTd5TL6_zgY&redir_token=bGv901pZu5xwiO56a_wBoFfEoXV8MTUzNzM5MzgxMEAxNTM3MzA3NDEw&event=video_description You're Leaking Trade Secrets Michael Schrenk BUSINESS INTELLIGENCE SPECIALIST Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FValtman%2FDEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf&redir_token=lY_r1MIWt7mH8T7VpDO05jeDGYx8MTUzNzM5MzQ4MkAxNTM3MzA3MDgy&event=video_description&v=QvHUYhLebDc A Journey to Protect Points-of-sale Nir Valtman ENTERPRISE SECURITY ARCHITECT, NCR RETAIL Many point-of-sale breaches occurred in the past year and many organizations are still vulnerable against the simplest...
Topics: Youtube, video, Science & Technology, Computer Security Conference, Point Of Sale (Software...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCorman-Percoco%2FDEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf&event=video_description&v=32XvFebA8tQ&redir_token=FiU5iPBxzNU88aosHmYHRFdOPnB8MTUzNzM5NDkxNEAxNTM3MzA4NTE0 The Cavalry Year[0] & a Path Forward for Public Safety Joshua Corman CTO, SONATYPE Nicholas J Percoco VP STRATEGIC SERVICES, RAPID7 At DEF CON 21, The Cavalry was born. In the face of clear &...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 23
movies
eye 11
favorite 0
comment 0
Materials Available Here: ; /redirect?redir_token=WERQ52A1H7A4vP3-aqPh_3Mk1hx8MTUwNzMxNTE1MEAxNTA3MjI4NzUw&v=6wiBl3lohu4&q=https%3A%2F%2Fmedia.defcon.org%2FDEF%2520CON%252023%2FDEF%2520CON%252023%2520presentations%2FDEFCON-23-Amit-Ashbel-Maty-Siman-Game-of-Hacks-Play-Hack-and-Track-UPDATED.pdf&event=video_description Game of Hacks: Play, Hack & Track Amit Ashbel Product Evangelist Checkmarx Maty Siman CTO and Founder Checkmarx Fooling around with some ideas we found ourselves...
Topics: Youtube, video, Science & Technology, DEF CON Video Series, DEF CON Conference, Conference...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Elevator Hacking - From the Pit to the Penthouse Deviant Ollam The CORE Group Howard Payne The CORE Group Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking late-night rides upon car tops (don't do that, please!) to the work of modern pen testers who use elevators to bypass building security systems (it's easier than you think!) these devices are often misunderstood and their full range of features and abilities go unexplored....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 16
favorite 0
comment 0
Panel: Ask the EFF: The Year in Digital Civil Liberties Kurt Opsahl Deputy General Counsel, Electronic Frontier Foundation Nate Cardozo EFF Staff Attorney Mark Jaycox EFF Legislative Analyst Yan Zhu EFF Staff Technologist Eva Galperin EFF Global Policy Analyst KURT OPSAHL is the Deputy General Counsel of the Electronic Frontier Foundation focusing on civil liberties, free speech and privacy law. Opsahl has counseled numerous computer security researchers on their rights to conduct and discuss...
Topics: Youtube, video, Science & Technology, Civil Liberties (Literature Subject), Electronic Frontier...
DEFCON 23
by DEFCONConference
movies
eye 30
favorite 0
comment 0
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey LosT We're no strangers to love You know the rules and so do I A full commitment's what I'm thinking of You wouldn't get this from any other guy I just wanna tell you how I'm feeling Gotta make you understand Never gonna give you up Never gonna let you down Never gonna run around and desert you Never gonna make you cry Never gonna say goodbye Never gonna tell a lie and hurt you LosT also runs the annual...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEF CON Video Series, DEF...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=KYYIluNXgMw&redir_token=aUVply7Nv6Lld1ZmaEKgDSyiMrV8MTUzNzM5OTMzMUAxNTM3MzEyOTMx&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSchroeder%2FDEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf Veil-Pillage: Post-exploitation 2.0 Will Schroeder SECURITY RESEARCHER, VERIS GROUP The Veil-Framework is a project that aims to bridge the gap between pentesting and red team toolsets. It began with...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMacaulay%2FDEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf&v=tfFbQvglaxU&event=video_description&redir_token=Fpv26dvTXbXsWZjZOQwYlQ_TrAp8MTUzNzM5OTkwNUAxNTM3MzEzNTA1 Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System Shane Macaulay DIRECTOR OF CLOUD SECURITY, IOACTIVE Windows7 & Server...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Blinding The Surveillance State Christopher Soghoian Principal Technologist, American Civil Liberties Union We live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them to learn intimate, private details about our lives. In part, the ease with which they can obtain such information reflects the fact that our laws have failed to keep up with advances in technology. However, privacy enhancing technologies can offer real...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Hacking the FBI: How & Why to Liberate Government Records Ryan Noah Shapiro PhD candidate, Massachusetts Institute of Technology After narrowly avoiding a lengthy activism-related prison sentence, I began PhD work at MIT in part to map out the criminalization of political dissent in Post-9/11 America. Especially in trying to obtain records from the FBI, Freedom of Information Act (FOIA) work became an essential component of my research. However, it quickly became apparent that the FBI...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf&v=-SqAlpANtIs&redir_token=SdKzJ9Gu2Y1csKhcbu9EfL6vAqF8MTUzNzM5ODA2MkAxNTM3MzExNjYy&event=video_description The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns Christopher Campbell SECURITY RESEARCHER 15 years after APT was released for Linux, Microsoft is finally going to ship Windows with a package...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 21
favorite 0
comment 0
Presentation available here: /redirect?redir_token=iyJUIC8EHiHvBbjUZHOgF6JJcHx8MTUzNzM5NDg0N0AxNTM3MzA4NDQ3&v=uMJSOYA9xoM&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPinto-Maxwell%2FDEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf&event=video_description Measuring the IQ of your Threat Intelligence feeds Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT Kyle Maxwell RESEARCHER Threat Intelligence feeds are now being...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides Available here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMolina%2FDEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf&v=l_14h0r7qA8&event=video_description&redir_token=JHwd2xX9gw-GsO7D0lFFzSR_2b18MTUzNzM5OTAyOEAxNTM3MzEyNjI4 Extra Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 4
favorite 0
comment 0
Slides Here: /redirect?v=GP61zSYpqdc&event=video_description&redir_token=Df0u4ysGAnf6vdUNXvPKobH76yR8MTUzNzM5NjcxN0AxNTM3MzEwMzE3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHolt-Smirnova-Chua%2FDEFCON-22-Holt-Smirnova-Chua-Stolen-Data-Markets-Updated.pdf Stolen Data Markets: An Economic and Organizational Assessment Tom Holt ASSOCIATE PROFESSOR, MICHIGAN STATE UNIVERSITY Olga Smirnova ASSISTANT PROFESSOR, EASTERN CAROLINA UNIVERSITY Yi-Ting Chua MICHIGAN...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 3
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSapozhnikov%2FDEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf&redir_token=_dwnO2oIciF8wOPpY4ahp-cr3h98MTUzNzM5ODg5NkAxNTM3MzEyNDk2&v=bji0VMXl108&event=video_description Acquire current user hashes without admin privileges Anton Sapozhnikov KPMG If an attacker has only user level access to an infected machine inside corporate internal network, that means...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides: /redirect?redir_token=SOH2BucePo7gTWjmxFOfRzGg09p8MTUzNzM5NzIwMkAxNTM3MzEwODAy&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWyde%2FDEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf&v=tso5rhzQYBc&event=video_description Client-Side HTTP Cookie Security: Attack and Defense David Wyde SOFTWARE ENGINEER, CISCO HTTP cookies are an important part of trust on the web. Users often trade their login credentials for a cookie, which is then used to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Eric (XlogicX) Davisson and Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDavisson-Alejandro%2FDEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf&event=video_description&v=VkP87oY5VCw&redir_token=R1gSuBkeqcdAr0ixIWCLHBxYeUV8MTUzNzM5NjQyMEAxNTM3MzEwMDIw Abuse of Blind Automation in Security Tools Eric (XlogicX) Davisson SECURITY...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 22
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSchrodinger%2FDEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf&event=video_description&redir_token=yW3QQ-BOlx_DxjlTguKh_JFzoVZ8MTUzNzM5OTYxNUAxNTM3MzEzMjE1&v=CxkJyibPfEo From Raxacoricofallapatorius With Love: Case Studies In Insider Threat Tess Schrodinger Espionage, honey pots, encryption, and lies. Clandestine meetings in hotels. The naïve girl seduced by a...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 9
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWhite-deVilliers%2FDEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf&redir_token=AIWSZpqCKzor1vZgJFuKtOyNrEB8MTUzNzM5Njg1MEAxNTM3MzEwNDUw&event=video_description&v=i2-jReLBSVk Manna from Heaven: Improving the state of wireless rogue AP attacks Dominic White CTO, SENSEPOST Ian de Villiers SENIOR ANALYST, SENSEPOST The current state of theoretical attacks against...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=85uwy0ACJJw&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBugher%2FDEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf&redir_token=rMVb7dR6897v9Cj7wmlotoUUHtB8MTUzNzM5NTk5OEAxNTM3MzA5NTk4 Detecting Bluetooth Surveillance Systems Grant Bugher PERIMETER GRID Departments of Transportation around the United States have deployed "little white boxes" -- Bluetooth detectors used...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools Zack Fasel Managing Partner, Urbane Security Many struggle in their job with the decision of what events to log in battle against costly increases to their licensing of a commercial SIEM or other logging solution. Leveraging the open source solutions used for "big-data" that have been proven by many can help build a scalable, reliable, and hackable event logging and security intelligence system to address...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here: /redirect?redir_token=MyoRXolHw4QrdtBs4JSRkKBi-rZ8MTUzNzM5NTI5MkAxNTM3MzA4ODky&event=video_description&v=Y8Cpio6z9qA&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDenaro-Beardsley%2FDEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf How to Disclose an Exploit Without Getting in Trouble Jim Denaro CIPHERLAW Tod Beardsley ENGINEERING MANAGER, METASPLOIT PROJECT You have identified a vulnerability and may have developed...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 21
movies
eye 18
favorite 0
comment 0
BoutiqueKit: Playing WarGames with expensive rootkits and malware JOSH 'M0NK' THOMAS APPLIED RESEARCH SCIENTIST - ACCUVANT "Theoretical" targeted rootkits need to play by different rules than the common malware that ends up filling our inboxes with spam and attempting to steal our CC numbers... The costs involved of getting popped are huge in comparison, the value is in the secrecy of being truly hidden and embedded for the long term. I've spent the past year considering what the next...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
by DEFCONConference
movies
eye 14
favorite 0
comment 0
BYO-Disaster and Why Corporate Wireless Security Still Sucks JAMES SNODGRASS (PUNK1NPO0P) HILLBILLY HACKER JOSH HOOVER (WISHBONE) HILLBILLY HACKER Right when you thought this topic had been beaten to death, something new emerges. This horse isn't dead yet! This talk will focus on a completely new vulnerability in the way some devices handle MsChapV2 and present some newer methods for capturing clear text credentials easily and without heavy processing power. We will walk you through a full...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 11
favorite 0
comment 0
Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices DANIEL "UNICORNFURNACE" CROWLEY MANAGING CONSULTANT, SPIDERLABS, TRUSTWAVE JENNIFER "SAVAGEJEN" SAVAGE SOFTWARE ENGINEER DAVID "VIDEOMAN" BRYAN A growing trend in electronics is to have them integrate with your home network in order to provide potentially useful features like automatic updates or to extend the usefulness of existing technologies such as door locks you can open and close from anywhere...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 20
favorite 0
comment 0
The Dirty South -- Getting Justified with Technology DAVID KENNEDY FOUNDER & PRINCIPAL SECURITY CONSULTANT, TRUSTEDSEC NICK HITCHCOCK SENIOR SECURITY CONSULTANT, TRUSTEDSEC It seems that every day there's a new NextGen firewall, whitelisting and blacklisting, DLP, or the latest technology thats suppose to stop us. But does it really stop "hackers"? Truth is, naw not really. In this talk we'll be showing off the latest bypass techniques for the "latest" hacker stoppers,...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 12
favorite 0
comment 0
Torturing Open Government Systems for Fun, Profit and Time Travel TOM KEENAN PROFESSOR, UNIVERSITY OF CALGARY "I'm from the government and I'm here to help you" takes on a sinister new meaning as jurisdictions around the world stumble over each other to 'set the people's data free'. NYC boasts in subway ads that 'our apps are whiz kid certified' (i.e. third party) which of course translates to 'we didn't pay for them, and don't blame us if somebody got it wrong and the bus don't...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
by DEFCONConference
movies
eye 13
favorite 0
comment 0
DEF CON 21 - LosT - Welcome and Making of the Badges LosT welcomes everyone to the conference and discusses the making of the DEF CON Badges. Source: https://www.youtube.com/watch?v=yS_KiWKLS2c Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 10
favorite 0
comment 0
(Transcription coming soon, sorry for the delay ) EDS: Exploitation Detection System AMR THABET MALWARE RESEARCHER, Q-CERT In the last several years, exploits have become the strongest weapons in cyber warfare. Exploit developers and vulnerability researchers have now become the nuclear scientists of the digital world. OS Companies and third party companies have created several security mitigation tools to make it harder to use these vulnerabilities and have made exploit creation harder. In...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
by DEFCONConference
movies
eye 14
favorite 0
comment 0
The ACLU Presents: NSA Surveillance and More ALEX ABDO STAFF ATTORNEY, ACLU NATIONAL SECURITY PROJECT CATHERINE CRUMP STAFF ATTORNEY, ACLU SPEECH PRIVACY & TECHNOLOGY PROJECT CHRISTOPHER SOGHOIAN PRINCIPAL TECHNOLOGIST, ACLU SPEECH PRIVACY & TECHNOLOGY PROJECT KADE CROCKFORD ACLU OF MASSACHUSETTS TECHNOLOGY FOR LIBERTY PROJECT NICOLE OZER TECHNOLOGY AND CIVIL LIBERTIES POLICY DIRECTOR, ACLU OF CALIFORNIA From the NSA's PRISM and metadata programs to IMSI catchers, location tracking to...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 25
movies
eye 22
favorite 0
comment 0
Get over it!" as Scott McNeeley said - unhelpfully. Only if we understand why it is gone and not coming back do we have a shot at rethinking what privacy means in a new context. Thieme goes deep and wide as he rethinks the place of privacy in the new social/cultural context and challenges contemporary discussions to stop using 20th century frames. Pictures don't fit those frames, including pictures of "ourselves." We have always known we were cells in a body, but we emphasized...
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...
DEFCON 21
movies
eye 29
favorite 0
comment 0
ACL Steganography - Permissions to Hide Your Porn MICHAEL PERKLIN SECURITY RESEARCHER Everyone's heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field of steganography itself - the art of hiding things in plain sight. Most people know you can hide a text file inside a photograph, or embed a photograph inside an MP3. But how does this work under the hood? What's new in the stego field? This talk will explore how various techniques employed...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 14
favorite 0
comment 0
his presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps DREA LONDON DIGITAL FORENSIC EXAMINER, STROZ FRIEDBERG KYLE O'MEARA DIGITAL FORENSIC EXAMINER, STROZ FRIEDBERG Prior to 2013, the phrase 'Self Destructing Message' was most commonly associated with Inspector Gadget, Maxwell Smart, and the occasional Tom Cruise movie. With the advent of smartphone apps like Snapchat, Wickr, and Facebook Poke, the self-destructing message has left the world...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
by DEFCONConference
movies
eye 32
favorite 0
comment 0
Do-It-Yourself Cellular IDS SHERRI DAVIDOFF LMG SECURITY SCOTT FRETHEIM LMG SECURITY DAVID HARRISON LMG SECURITY RANDI PRICE LMG SECURITY For less than $500, you can build your own cellular intrusion detection system to detect malicious activity through your own local femtocell. Our team will show how we leveraged root access on a femtocell, reverse engineered the activation process, and turned it into a proof-of-concept cellular network intrusion monitoring system. We leveraged commercial Home...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 13
favorite 0
comment 0
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust DAN GRIFFIN PRESIDENT, JW SECURE, INC. The US National Security Agency has been public about the inevitability of mobile computing and the need to support cloud-based service use for secret projects. General Alexander, head of the NSA, recently spoke of using smartphones as ID cards on classified networks. And yet, mobile devices have a poor security track record, both as data repositories and as sources of trustworthy...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
by DEFCONConference
movies
eye 14
favorite 0
comment 0
Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot AMIR ETEMADIEH RESEARCH SCIENTIST AT ACCUVANT LABS CJ HERES IT CONSULTANT MIKE BAKER CO-FOUNDER OPENWRT HANS NIELSEN SENIOR SECURITY CONSULTANT AT MATASANO Google TV is intended to bring the Android operating system out of the mobile environment and into consumers' living rooms. Unfortunately, content providers began to block streaming access to popular content from the Google TV platform which hindered its reach. Furthermore,...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 12
favorite 0
comment 0
gitDigger: Creating useful wordlists from public GitHub repositories JAIME FILSON (WIK) ROB FULLER (MUBIX) This presentation intends to cover the thought process and logistics behind building a better wordlist using github public repositories as its source. With an estimated 2,000,000 github projects to date, how would one store that amount of data? Would you even want or need to? After downloading approximately 500,000 repositories, storing 6TB on multiple usb drives; this will be a story of...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 21
favorite 0
comment 0
Backdoors, Government Hacking and The Next Crypto Wars CHRISTOPHER SOGHOIAN PRINCIPAL TECHNOLOGIST, PRIVACY & TECHNOLOGY PROJECT, ACLU The FBI claims it is going dark. Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs of our government. What can the FBI and...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 23
favorite 0
comment 0
Examining the Bitsquatting Attack Surface JAESON SCHULTZ THREAT RESEARCH ENGINEER, CISCO SYSTEMS Bit errors in computer memory, when they occur in a stored domain name, can cause Internet traffic to be directed to the wrong Internet location potentially compromising security. When a domain name one bit different from a target domain is registered, this is called "bitsquatting". This presentation builds on previous work in this area presented by Artem Dinaburg at Blackhat 2011. Cisco's...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 24
favorite 0
comment 0
The Cavalry Isn't Coming: Starting the Revolution to Fsck it All! NICHOLAS J. PERCOCO SENIOR VICE PRESIDENT AND HEAD OF SPIDERLABS, TRUSTWAVE JOSHUA CORMAN DIRECTOR OF SECURITY INTELLIGENCE, AKAMAI TECHNOLOGIES We have some good news and some bad news. The good news is that security is now top of mind for the people of planet Earth. The bad news is that their security illiteracy has lead to very dangerous precedents and this is likely just the beginning. The reactionary stances taken by the...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
by DEFCONConference
movies
eye 27
favorite 0
comment 0
VoIP Wars: Return of the SIP FATIH OZAVCI INFORMATION SECURITY RESEARCHER AND CONSULTANT, VIPROY SECURITY NGN (Next Generation Network) is modern TDM/PSTN system for communication infrastructure. SIP (Session Initiation Protocol) Servers are center of NGN services, they provide signaling services. SIP based communication is insecure, because of protocol implementation. Based on this fact, NGN is not actually Next Generation. It can be hacked with old stuff, but a few new attack types will be...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 17
favorite 0
comment 0
Please Insert Inject More Coins NICOLAS OBERLI SECURITY ENGINEER, SCRT The ccTalk protocol is widely used in the vending machine sector as well as casino gaming industry, but is actually not that much known, and very little information exists about it except the official documentation. This protocol is used to transfer money-related information between various devices and the machine mainboard like the value of the inserted bill or how many coins need to be given as change to the customer. This...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
movies
eye 19
favorite 0
comment 0
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers MICHAEL SCHRENK This is the true story of a botnet that created a competitive advantage for a car dealership. This dealership found a website that offered returned lease vehicles—great cars for their inventory—but bad web design and heavy competition from other automotive dealerships made the website useless. In response, a botnet was developed to make automotive purchases with machine precision. With the...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...
DEFCON 21
by DEFCONConference
movies
eye 21
favorite 0
comment 0
Data Evaporation from SSDs SAM BOWNE INSTRUCTOR, CITY COLLEGE SAN FRANCISCO Files on magnetic hard drives remain on the drive even after they are deleted, so they can be recovered later with forensic tools. Sometimes SSDs work the same way, but under other conditions they erase this latent data in a "garbage collection" process. Understanding when and how this happens is important to forensic investigators and people who handle confidential data. I'll explain the purpose of garbage...
Topics: Youtube, video, Science & Technology, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon...