Skip to main content

More right-solid
More right-solid
More right-solid
SHOW DETAILS
eye
Title
Date Archived
Creator
DEFCON 23
movies
eye 4
favorite 0
comment 0
There have been over 20 cryptoparties in New York City, in which people are introduced to open source cryptography software. This doesn't always go smoothly. Usability experts have only recently being included in the design process for encryption tools, but by and large what we have to work with were designed by cryptography experts in the 90s. I'll be going over some pain points between real-world users and their real-life encounters with open source cryptography tools. David Huerta ships...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Alice And Bob, Cryptography...
DEFCON 23
movies
eye 24
favorite 0
comment 0
Windows Management Instrumentation (WMI) is a remote management framework that enables the collection of host information, execution of code, and provides an eventing system that can respond to operating system events in real time. FireEye has recently seen a surge in attacker use of WMI to carry out objectives such as system reconnaissance, remote code execution, persistence, lateral movement, covert data storage, and VM detection. Defenders and forensic analysts have largely remained unaware...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEF CON 23, DEFCON, DC23,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FNemus%2FDEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS.pdf&event=video_description&v=g9H-WO_RY3k&redir_token=EJQUHZ7dYWm8qWh8DEiQK3m0ib98MTUzNzM5MzY4NkAxNTM3MzA3Mjg2 An Introduction to Back Dooring Operating Systems for Fun and Trolling Nemus SECURITY RESEARCHER So you want to setup a back door? Have you ever wondered how its done and what you can do to detect back doors on your...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 23
movies
eye 15
favorite 0
comment 0
This speech will demonstrate attacking .NET applications at runtime. I will show how to modify running applications with advanced .NET and assembly level attacks that alter the control flow of any .NET application. New attack techniques and tools will be released to allow penetration testers and attackers to carry out advanced post exploitation attacks. This presentation gives an overview of how to use these tools in a real attack sequence and gives a view into the .NET hacker space. Topher...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEF CON 23, DC23, security...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FValtman%2FDEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf&redir_token=lY_r1MIWt7mH8T7VpDO05jeDGYx8MTUzNzM5MzQ4MkAxNTM3MzA3MDgy&event=video_description&v=QvHUYhLebDc A Journey to Protect Points-of-sale Nir Valtman ENTERPRISE SECURITY ARCHITECT, NCR RETAIL Many point-of-sale breaches occurred in the past year and many organizations are still vulnerable against the simplest...
Topics: Youtube, video, Science & Technology, Computer Security Conference, Point Of Sale (Software...
DEFCON 22
movies
eye 63
favorite 0
comment 0
Old Skewl Hacking: Porn Free! Major Malfunction Having cut his teeth (and scarred his mind) on hotel Infra-Red controlled TV systems, spent ten years scanning the skies for 'interesting' satellite feeds, in this, the 3rd in his series of 'Old Skewl Hacking' talks, Major Malfunction once again, and with great personal sacrifice, goes down on^winto the depths of late-night terrestrial broadcast television to determine how secure 'Pay Per View' / 'Pay Per Night' systems are, and if Debbie really...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMetacortex-Grifter%2FDEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf&redir_token=zqWRMcbc8LtuiR4088-kbXdEhPN8MTUzNzM5NTUyOUAxNTM3MzA5MTI5&v=7HnQnpJwr-c&event=video_description USB for all! Jesse Michael SECURITY RESEARCHER Mickey Shkatov SECURITY RESEARCHER USB is used in almost every computing device produced in recent years. In addition to well-known usages like keyboard,...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 20
favorite 0
comment 0
Secure Random By Default Dan Kaminsky Chief Scientist, White Ops As a general rule in security, we have learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs -- insecure and default, and secure but obscure. Why not fix this? Why not make JavaScript and PHP and Java and Python and even libc rand() return strong entropy? What are the...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FElijah%2FDEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing-Updated.pdf&v=fMfQQoHHLBA&redir_token=c_Hy420u5CCR4Ea561qpMDusBFZ8MTUzNzM5NjU3MEAxNTM3MzEwMTcw&event=video_description Saving Cyberspace by Reinventing File Sharing Eijah Internet access is a basic human right, due to its unparalleled capacity to deliver content and information. Recently, our right to share files online...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?redir_token=cxl245MgLWALVC2SMYGMg98XM9l8MTUzNzQwMDUxMkAxNTM3MzE0MTEy&event=video_description&v=wzyuioto4y8&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPierce-Loki%2FDEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf NSA Playset : GSM Sniffing Pierce SECURITY RESEARCHER Loki SECURITY RESEARCHER A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 4
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDorsey%2FDEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf&redir_token=qnvPDdx8wXuaqQVhTJIUZhkY2_J8MTUzNzM5NzcwMkAxNTM3MzExMzAy&v=gXuxfh5-XeE&event=video_description Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go David Dorsey LEAD SECURITY RESEARCHER AT CLICK SECURITY Using a ROP chain to bypass operating system defenses is commonplace and detecting this...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 4
favorite 0
comment 0
Slides here: /redirect?v=dq2Hv7J9fvk&event=video_description&redir_token=cfG7edv0lGfJAt_70WmsyrdINCZ8MTUzNzM5ODc0N0AxNTM3MzEyMzQ3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBloxham%2FDEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse Brady Bloxham PRINCIPAL SECURITY CONSULTANT, SILENT BREAK SECURITY Windows APIs are often a blackbox with poor documentation, taking input and...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHunt%2FDEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf&redir_token=WOoiFvXf6uNdiDY-yjuVGvbeUot8MTUzNzM5ODk2N0AxNTM3MzEyNTY3&v=nSqV78le3jU&event=video_description Additional materials are available for download here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Slides here: /redirect?v=YImQys2Xlf0&event=video_description&redir_token=TLepHqIC1izCnyBTnevpkSRVP2x8MTUzNzM5MzA4NUAxNTM3MzA2Njg1&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FAnch%2FDEFCON-22-Anch-The-Monkey-In-the-Middle.pdf The Monkey in the Middle: A pentesters guide to playing in traffic. Anch (MIKE GUTHRIE) Prank your friends, collect session information and passwords, edit traffic as it goes by.. become the Monkey(man)-In-The-Middle and do it...
Topics: Youtube, video, Science & Technology, Software (Industry), Penetration Test, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
How To Get Phone Companies To Just Say No To Wiretapping Phil Zimmermann President & Co-Founder Silent Circle Phil is going to talk about his latest projects, which are helping several mobile carriers to provide their customers with wiretap-free phone services. These carriers are breaking ranks with the rest of their industry's century-long culture of wiretapping. When you can get actual phone companies to join in the struggle, you know change is afoot. And yes, Navy SEALS are involved....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here; /redirect?v=nBR7Kru6JX0&redir_token=qmF3AGzW0Iq1eyRrun29EG4KaId8MTUzNzM5NDUxM0AxNTM3MzA4MTEz&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKelley-Anderson%2FDEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe-Updated.pdf&event=video_description Is This Your Pipe? Hijacking the Build Pipeline. Kyle Kelley DEVELOPER SUPPORT ENGINEER, RACKSPACE Greg Anderson SOFTWARE SECURITY ENGINEER,RACKSPACE As developers of the web, we rely on tools to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMenerick%2FDEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf&v=OnJ18pyMncE&event=video_description&redir_token=saMxqfjdGA__2p2QXxfRj5vHQNF8MTUzNzM5NTA3M0AxNTM3MzA4Njcz Open Source Fairy Dust John Menerick SECURITY RESEARCHER, NETSUITE Over the past 30 years, the Internet and open source software have worked in tandem. The Internet has provided an environment for open source...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 23
movies
eye 8
favorite 0
comment 0
The ProxyHam talk was mysteriously canceled. However, it’s easy to replicate the talk from the press coverage. In this talk, we propose “HamSammich”, creating a point-to-point link in order to access WiFi from many miles away, as a means to avoid detection. We show how off-the-shelf devices can be configured to do this for less than $200. After demonstrating the working system, we’ll talk about radio signals. This includes both the FCC regulatory issues which may have caused the...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Radio (Invention), Amateur...
DEFCON 22
movies
eye 29
favorite 1
comment 0
Slides Here: /redirect?redir_token=CXcDrFMUnfJ3p3u5aj2a4l_zxDV8MTUwNzA2NTAyMkAxNTA2OTc4NjIy&v=To5yarfAg_E&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMetacortex-Grifter%2FDEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf&event=video_description Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin Metacortex SECURITY RESEARCHER Grifter SECURITY RESEARCHER This is an introduction level talk. The talk itself will...
Topics: Youtube, video, Science & Technology, Tor (Software), Bitcoin (Currency), Darknet, The Internet...
DEFCON 23
movies
eye 3
favorite 0
comment 0
Let's Encrypt is a new certificate authority that is being launched by EFF in collaboration with Mozilla, Cisco, Akamai, IdenTrust, and a team at the University of Michigan. It will issue certificates for free, using a new automated protocol called ACME for verification of domain control and issuance. This talk will describe the features of the CA and available clients at launch; explore the security challenges inherent in building such a system; and its effect on the security of the CA...
Topics: Youtube, video, Science & Technology, Let's Encrypt, Encryption (Literature Subject), DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides Here: /redirect?redir_token=bieYCcQifZc1Tvx8rpelyeE9E5V8MTUzNzM5NTkxOUAxNTM3MzA5NTE5&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPickett%2FDEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf&v=9_toldlQpgI&event=video_description Abusing Software Defined Networks Gregory Pickett CYBERSECURITY OPERATIONS, HELLFIRE SECURITY Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the...
Topics: Youtube, video, Science & Technology, Software-defined Networking, DEFCON Video Series, DEFCON...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here:/redirect?redir_token=7qOvijcEYFsFAy_eNasKzt3FrGl8MTUzNzM5OTQ2OEAxNTM3MzEzMDY4&event=video_description&v=IFNb3ciJZkQ&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcGrew%2FDEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf Additional Materials available:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDrapeau-Dukes%2FDEFCON-22-Drapeau-Dukes-Steganography-in-Commonly-Used-HF-Radio-Protocols-UPDATED.pdf&redir_token=pTAdg2IHb51r5azG3NjTX7HdTAx8MTUzNzM5NzI2NEAxNTM3MzEwODY0&v=X72vwxQ8B84&event=video_description Additional Extra Materials are available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Panel: Ephemeral Communications: Why and How? Ryan Lackey Founder, CryptoSeal, Inc. Jon Callas Silent Circle Elissa Shevinsky Glimpse Possibly more to come..... Ephemeral communications applications are increasingly popular ways, especially among younger users, to communicate online. In contrast to “once it’s on the Internet, it’s forever”, these applications promise to delete information rapidly, or to maintain anonymity indefinitely, lowering inhibitions to share sensitive or personal...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
Slides here: /redirect?redir_token=uw9ninDPmKhxrkbWabIg2oj2doV8MTUzNzM5NzQwM0AxNTM3MzExMDAz&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLitchfield%2FDEFCON-22-David-Litchfield-Oracle-Data-Redaction-is-Broken.pdf&v=L6Fc9S0xUtY&event=video_description Oracle Data Redaction is Broken David Litchfield SECURITY SPECIALIST, DATACOM TSS The Oracle data redaction service is a new feature introduced with Oracle 12c. It allows sensitive data, such as PII, to be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
David Kennedy - Destroying Education and Awareness Programs Source: https://www.youtube.com/watch?v=vcA6dLl5Sa4 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides here: /redirect?v=mBOLml3yLBY&redir_token=9xPQ6LNY2eXxo71_iYvHwQ4vUfR8MTUzNzM5ODEyM0AxNTM3MzExNzIz&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FQuaddi-R3plicant-Hefley%2FDEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf&event=video_description Hacking 911: Adventures in Disruption, Destruction, and Death Christian “quaddi” Dameff MD Jeff “r3plicant” Tully MD Peter Hefley SENIOR MANAGER - SUNERA Ever wonder what you would do if...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=d6VCri6sPnY&event=video_description&redir_token=-DGawUHPQPJY0BWOZ4Tn4EVbxZ98MTUzNzM5Nzg0NEAxNTM3MzExNDQ0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKallenberg%2FDEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=dfi3AEvCL_E&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBruno-Graziano%2FDEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf&redir_token=nzYHyGgDWHZTLEQ_Z_UBaUoXtft8MTUzNzM5NDExMUAxNTM3MzA3NzEx Through the Looking-Glass, and What Eve Found There Luca "kaeso" Bruno RESEARCH ENGINEER, EURECOM Mariano "emdel" Graziano PH.D. STUDENT, EURECOM Traditionally, network operators have...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides here; /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGorenc-Molinyawe%2FDEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf&event=video_description&v=zn6D-iVcRwg&redir_token=Sp7sGtEQmqIjp5uokH8AcXY9weF8MTUzNzM5ODYxOEAxNTM3MzEyMjE4 Blowing up the Celly - Building Your Own SMS/MMS Fuzzer Brian Gorenc ZERO DAY INITIATIVE, HP SECURITY RESEARCH Matt Molinyawe ZERO DAY INITIATIVE, HP SECURITY RESEARCH Every time you hand out...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 18
favorite 0
comment 0
Slides Here:/redirect?redir_token=uTqJO4utchAhySBUTo-XWZxxRJJ8MTUzNzM5OTUzNUAxNTM3MzEzMTM1&event=video_description&v=vLU92bNeIdI&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FStrazzere-Sawyer%2FDEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf Android Hacker Protection Level 0 Tim Strazzere LEAD RESEARCH & RESPONSE ENGINEER Jon Sawyer CTO OF APPLIED CYBERSECURITY LLC Obfuscator here, packer there - the Android ecosystem is...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPetrov-Gaivoronski%2FDEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf&v=vOz40Zk8lEw&redir_token=wKa2ag9ycRQ3t7roLAu03OJ2QOB8MTUzNzM5OTY5OEAxNTM3MzEzMjk4&event=video_description Extra Materials are available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=rz0SNEFZ8h0&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FTal%2FDEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf&redir_token=eyh5zWmonhLFMBzYracghdLElNl8MTUzNzM5OTk4NUAxNTM3MzEzNTg1 I Hunt TR-069 Admins: Pwning ISPs Like a Boss Shahar Tal SECURITY & VULNERABILITY RESEARCH TEAM LEADER, CHECK POINT SOFTWARE TECHNOLOGIES Residential gateway (/SOHO router) exploitation is a rising trend in the security...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?redir_token=4HYPndHHE4fCV-TlctceVNoQxAF8MTUzNzQwMDMxOEAxNTM3MzEzOTE4&v=qF06PFcezLs&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKazanciyan-Hastings%2FDEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf&event=video_description Investigating PowerShell Attacks Ryan Kazanciyan TECHNICAL DIRECTOR, MANDIANT Matt Hastings CONSULTANT, MANDIANT Over the past two years, we've seen targeted attackers increasingly...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 25
favorite 0
comment 0
Slides Here: /redirect?q=http%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMolina%2FDEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf&v=RX-O4XuCW1Y&redir_token=00hZo8EVTjFTT6GySHzXfyMe9DJ8MTUzNzM5NTM3NkAxNTM3MzA4OTc2&event=video_description White paper Here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 2
favorite 0
comment 0
Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations Source: https://www.youtube.com/watch?v=D2N6FclMMTg Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 16
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLittlebury%2FDEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf&v=2IeU7Cck0hI&redir_token=GHmdcUQxe2eVHa3roWN5TJkWIT18MTUzNzM5ODE4NkAxNTM3MzExNzg2&event=video_description Home Alone with localhost: Automating Home Defense Chris Littlebury SENIOR PENETRATION TESTER, KNOWLEDGE CONSULTING GROUP, INC. Home automation is everywhere, and so are their exploits. This presentation will go...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides Here: /redirect?redir_token=3rjJ4SjJ6x4RaqJaSPdnl7uaogt8MTUzNzM5NjM0OEAxNTM3MzA5OTQ4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSmith-Perrymon%2FDEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf&v=EEGxifOAk48&event=video_description Advanced Red Teaming: All Your Badges Are Belong To Us Eric Smith SENIOR PARTNER, PRINCIPAL SECURITY CONSULTANT AT LARES Josh Perrymon SENIOR ADVERSARIAL ENGINEER AT LARES By definition ”Red...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=EDci2gb3ruQ&event=video_description&redir_token=_kdMqniTkcGjjzMaUo8m8SajbKF8MTUzNzM5OTM5OEAxNTM3MzEyOTk4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHecker%2FDEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf Burner Phone DDOS 2 dollars a day : 70 Calls a Minute Weston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY Phone DDOS research. Current proof of concept is dealing with Samsung SCH-U365 QUALCOMM prepaid Verizon...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 23
movies
eye 4
favorite 0
comment 0
Additional Materials available here: https://media.defcon.org/DEF CON 23/DEF CON 23 presentations/Peter Desfigies, Joshua Brierton & Naveed Ul Islam/DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins-Referenc.txt Wi-Fi is a pervasive part of everyone’s everyday life. Whether it be home networks, open hotspots at cafés, corporate networks or corporate guest networks they can be found virtually everywhere. Fortunately, for the security minded, some steps are taken to secure these weak...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 23, DC23, DC-23, hack, hacker,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBathurst-Rogers-Carey-Clarke%2FDEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf&event=video_description&v=H7kPoJXtE6Y&redir_token=HC7Tb6P3Nf_U5feUDxR--MWR-Jl8MTUzNzM5ODU1MkAxNTM3MzEyMTUy PropLANE: Kind of keeping the NSA from watching you pee Rob Bathurst (EVILROB) Russ Rogers (RUSSR) Mark Carey (PHORKUS) Ryan Clarke (L0STBOY) No one likes to be watched, especially on the Internet. Your...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 2
favorite 0
comment 0
Michele Fincher - How to you Feel about your Mother.. Psych and The SE Source: https://www.youtube.com/watch?v=A0_NL1YBvK4 Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLeder%2FDEFCON-22-Felix-Leder-NinjaTV.pdf&v=Y0P1Lx5DRvE&event=video_description&redir_token=cf65ZdAiyzQtZod4JnUlX0RigJR8MTUzNzM5NjIwN0AxNTM3MzA5ODA3 NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It Felix Leder DIRECTOR, MALWARE RESEARCH, BLUE COAT NORWAY Smart TVs are growing in popularity. Set-top boxes like Apple TV, Roku, or WD TV can make your “normal” TV...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 18
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=3LZhFFm1tK0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKlafter-Swanson%2FDEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf&redir_token=6hf6QocokC-KNUNJX_WZV0dFVmN8MTUzNzQwMDQ1M0AxNTM3MzE0MDUz Check Your Fingerprints: Cloning the Strong Set Richard Klafter (Free) SENIOR SOFTWARE ENGINEER, OPTIMIZELY Eric Swanson (Lachesis) SOFTWARE DEVELOPER The web of trust has...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 5
favorite 0
comment 0
Slides Here: /redirect?redir_token=Qo7sQPkbEjnSzuc51YPGjazDko58MTUzNzM5OTE5OEAxNTM3MzEyNzk4&event=video_description&v=ssE_mwSEH9U&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBalazs%2FDEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf Bypass firewalls, application white lists, secure remote desktops under 20 seconds Zoltán Balázs CHIEF TECHNOLOGY OFFICER AT MRG EFFITAS In theory, post-exploitation after having...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 20
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FYoung%2FDEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf&redir_token=tVZuE7xrTKW5PGb7RxNaa2W6izl8MTUzNzQwMDU4NEAxNTM3MzE0MTg0&event=video_description&v=Xfl4spvM5DI From root to SPECIAL: Pwning IBM Mainframes Philip “Soldier of Fortran” Young 1.1 million transactions are run through mainframes every second worldwide. From your flight to your ATM withdrawal...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
DEF CON the Mystery, Myth and Legend Panel It's hard to throw a stone these days without hitting a security/hacking conference. But, when every year the Las Vegas Metro SWAT Team stages for an interdiction of your convention, you know you have something "different". From crawling through Air Ducts to surreptitiously "acquiring" telco equipment, these are the stories of DEF CON you don't often hear about. The stories of yesteryear that not only helped shape defcon but also...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBulygin-Bazhaniul-Furtak-Loucaides%2FDEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf&v=QDSlWa9xQuA&event=video_description&redir_token=xeTSylyn5qzGHiOQ75r1iakKWGl8MTUzNzM5OTI2NkAxNTM3MzEyODY2 Summary of Attacks Against BIOS and Secure Boot Yuriy Bulygin CHIEF THREAT ARCHITECT, INTEL SECURITY Oleksandr Bazhaniuk SECURITY RESEARCHER, INTEL SECURITY...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides here: /redirect?v=KFx4lhxMi-M&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMahjoub-Toonk-Reuille%2FDEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf&redir_token=z7tmvlIzYesz7khWPB8Kw6nTHQN8MTUzNzM5NzAxOUAxNTM3MzEwNjE5 Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 4
favorite 0
comment 0
Slides Here: /redirect?redir_token=4mOePPTFFqiNwzZkdgA8Z9Wyj_N8MTUzNzQwMDA0OUAxNTM3MzEzNjQ5&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FErven-Merdinger%2FDEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf&event=video_description&v=wTEMSBXtkAc Just What The Doctor Ordered? Scott Erven FOUNDER & PRESIDENT SECMEDIC, INC Shawn Merdinger HEALTHCARE SECURITY RESEARCHER You have already heard the stories of security researchers...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 13
favorite 0
comment 0
Panel - Diversity in Information Security Jennifer Imhoff-Dousharm Informatics student, co-organizer of theSummit, NCWIT affiliate member Sandy “Mouse” Clark Security Researcher and part-time Phd. candidate Kristin Paget Jolly Full time hacker Vyrus Independent Security Consultant Scott Martin CIO Spikes Security Discussion from the point of view of a diverse panel of leading representatives currently in or thinking of becoming part of the Information Security industry. This panel will give...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKouns-Eiram%2FDEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-UPDATED.pdf&v=759ZalgD1vg&event=video_description&redir_token=c18lmjGhyRtvbnYkQ3KitntbMip8MTUzNzM5NTg1M0AxNTM3MzA5NDUz Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! Jake Kouns CISO, RISK BASED SECURITY Carsten Eiram CHIEF RESEARCH OFFICER, RISK BASED SECURITY Everywhere you...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?redir_token=7a7GIl-mZ_KTw7nfO4rEPlMRp0t8MTUzNzQwMDM4NUAxNTM3MzEzOTg1&event=video_description&v=d5jqV06Yijw&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FRowley%2FDEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf Detecting and Defending Against a Surveillance State Robert RowleySECURITY RESEARCHER, TRUSTWAVE SPIDERLABS This talk is based on semi-recent reported leaks that detail how state-actors could be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf&event=video_description&v=7HdcEQGQZDU&redir_token=XUAls5sLm4iDgHPV7bVSprWmtet8MTUzNzM5ODAwNUAxNTM3MzExNjA1 The Secret Life of Krbtgt Christopher Campbell SECURITY RESEARCHER A tale of peril and woe, Krbtgt is the domain account that you just can't quit. Quiet and harmless, it has been with your enterprise since you...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 5
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=nX9JXI4l3-E&redir_token=4u5f22ke16CDdP3ILZ2m4wch7Mp8MTUzNzM5OTA5N0AxNTM3MzEyNjk3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGraham-McMillan-Tentler%2FDEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf Mass Scanning the Internet: Tips, Tricks, Results Robert Graham Paul McMillan Dan Tentler Scanning the net -- the entire net -- is now a thing. This talk will discuss how to do it, such as how to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 23
by DEFCONConference
movies
eye 27
favorite 0
comment 0
This talk will show attendees how to use a small ARM-based computer that is connected inline to a wired network for penetration testing. The computer is running a full-featured penetration testing Linux distro. Data may be exfiltrated using the network or via a ZigBee mesh network or GSM modem. The device discussed in this talk is easily integrated into a powerful penetration test that is performed with an army of ARM-based small computer systems connected by XBee or ZigBee mesh networking....
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 23, DEFCON, DC23, DC-23, Phil Polstra,...
DEFCON 23
movies
eye 21
favorite 0
comment 0
This talk will present a device that can be used as a dropbox, remote hacking drone, hacking command console, USB writeblocker, USB Mass Storage device impersonator, or scripted USB HID device. The device is based on the BeagleBone Black, can be battery operated for several days, and is easily constructed for under $100. The dropbox, remote hacking drone, and hacking command console functionality were presented at DEF CON 21. This talk will emphasize the new USB-based attack functionality....
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), dropbox, drone,...
DEFCON 23
by DEFCONConference
movies
eye 8
favorite 0
comment 0
The number of vulnerabilities in firmware disclosed as affecting Wintel PC vendors has been rising over the past few years. Although several attacks have been presented against Mac firmware, unlike their PC counterparts, all of them required physical presence to perform. Interestingly, when contacted with the details of previously disclosed PC firmware attacks, Apple systematically declared themselves not vulnerable. This talk will provide conclusive evidence that Mac's are in fact vulnerable...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEF CON 23, DC23, DC-23,...
DEFCON 22
by DEFCONConference
movies
eye 12
favorite 0
comment 0
DEF CON 22 Contests Award Ceremony Source: https://www.youtube.com/watch?v=14Kh016_mhA Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEFCON Video Series, DEFCON...
DEFCON 22
movies
eye 79
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FJauregui%2FDEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf&redir_token=GWOWHGKJjorubZTu4lkbl_zdElB8MTUzNzM5Mzk2MUAxNTM3MzA3NTYx&event=video_description&v=hT9LwyjpfzI Girl… Fault-Interrupted. Maggie Jauregui SOFTWARE SECURITY TEST ENGINEER GFCI's (Ground Fault Circuit Interrupts) are a practically unnoticeable part of our daily lives, except maybe for when you have to fumble...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEFCON Video Series, DEFCON...
DEFCON 22
movies
eye 37
favorite 0
comment 0
Presentation available here: /redirect?v=eQ2OZKitRwc&event=video_description&redir_token=nx0P2pvOs1ntjKPIT9gLW8FlkaB8MTUwNzA2ODg2NkAxNTA2OTgyNDY2&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCrenshaw%2FDEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf Dropping Docs on Darknets: How People Got Caught Adrian Crenshaw TRUSTEDSEC & IRONGEEK.COM Most of you have probably used Tor before, but I2P may be unfamiliar....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 23
by DEFCONConference
movies
eye 15
favorite 0
comment 0
Everybody plays games, and a whole lot of people plays computer games. Despite this fact, very few of us, security researchers consider them as interesting targets. Granted, you won't likely be able to directly hack into a big corporate network via game exploits, but you could for example target the people running the company via their favorite games. Or their children's favorite games. Another scenario: you should consider that a hacked game could allow Not So Admirable people access to your...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), video games, Video Game...
DEFCON 23
movies
eye 3
favorite 0
comment 0
Are you interested in the gory details in fixing ugly bugs? No? Just like watching stuff blow up? Go to some other talk! But if you want to see what it takes to comprehensively end an entire bug class -- how you dive into a code base, what performance and usability and maintainability and debuggability constraints it takes to make a web browser more secure -- oh do I have some dirt for you. Dan Kaminsky is Chief Scientist of White Ops. Source: https://www.youtube.com/watch?v=9wx2TnaRSGs...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Dan Kaminsky (Person),...
DEFCON 22
movies
eye 8
favorite 0
comment 0
The Dark Tangent and Ryan Clarke "LosT" Welcome to DEF CON and discuss the making of the DEF CON 22 Badge. Source: https://www.youtube.com/watch?v=gt-8okGMrFE Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Slides Here: /redirect?v=uzGXxWuDwxc&event=video_description&redir_token=J6gun1QsSB6ZacRWaT70gVTQZf98MTUzNzM5NzMzM0AxNTM3MzEwOTMz&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcmillan%2FDEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf Attacking the Internet of Things using Time Paul McMillan SECURITY ENGINEER, NEBULA Internet of Things devices are often slow and resource constrained. This makes them the perfect target for network-based...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPolstra%2FDEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf&v=Uy3nXXZgqmg&event=video_description&redir_token=RwcJx7udZIAoHbCnlgAp4u6iNo58MTUzNzM5Njc4MkAxNTM3MzEwMzgy Cyberhijacking Airplanes: Truth or Fiction? Dr. Phil Polstra ASSOCIATE PROFESSOR OF DIGITAL FORENSICS, BLOOMSBURG UNIVERSITY OF PENNSYLVANIA Captain Polly ASSOCIATE PROFESSOR OF AVIATION,...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?redir_token=51LS_ku_Ev0s9yPcYVej6pi-nWx8MTUzNzM5NDQ0MkAxNTM3MzA4MDQy&event=video_description&v=biulJpOomRc&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLevison-Watt%2FDEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf Dark Mail Ladar Levison FOUNDER OF LAVABIT, LLC Stephen Watt LEAD DEVELOPER, REFERENCE IMPLEMENTATION, DARK MAIL Data privacy and anonymity have long been cornerstone interests of the computer security world, but not...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 78
favorite 0
comment 0
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Zoz/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf Don't Fuck It Up! Zoz ROBOTICS ENGINEER Online antics used to be all about the lulz; now they're all about the pervasive surveillance. Whether you're the director of a TLA just trying to make a booty call or an internet entrepreneur struggling to make your marketplace transactions as smooth as silk, getting up to any kind of mischief involving electronic communications now...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Around the world in 80 cons” - A Perspective Jayson E. Street Senior Partner of Krypton Security After spending 15 years in the hacker / InfoSec community, I thought it was time to pause and look back upon all I have seen, everywhere I have been, all the people I met and everything I have learned. And then share some of that knowledge with people to hopefully help them have a leg up moving forward. More importantly, compare and contrast my experiences and perspectives with statistics we...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 5
favorite 0
comment 0
Slides here: /redirect?v=_j9lELCSZQw&redir_token=y3J88YyWuCDRN7UxFBkljRLZNNx8MTUzNzM5ODQ3N0AxNTM3MzEyMDc3&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCerrudo%2FDEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf Hacking US (and UK, Australia, France, etc.) traffic control systems Cesar Cerrudo CTO, IOACTIVE LABS Probably many of us have seen that scene from "Live Free or Die Hard" (Die Hard 4) were the...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides here: /redirect?redir_token=KHuiT5SsqoIAI-P73iPAG6VOyGF8MTUzNzM5ODgyNEAxNTM3MzEyNDI0&v=vbdyG0l_b3M&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSelf%2FDEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf&event=video_description Don't DDoS Me Bro: Practical DDoS Defense Blake Self SENIOR SECURITY ARCHITECT Shawn "cisc0ninja" Burrell SOLDIERX CREW Layer 7 DDoS attacks have been on the rise since at least 2010, especially attacks that...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHoffman-Kinsey%2FDEFCON-22-Dustin-Hoffman-and-Thomas-Kinsey-What-the-Watchers-See-UPDATED.pdf&v=W95VK75m9RM&redir_token=X1RzczECo2O9xyLBbwGtlFu3e6t8MTUzNzM5NjY0MUAxNTM3MzEwMjQx&event=video_description What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil) Dustin Hoffman SENIOR ENGINEER, EXIGENT SYSTEMS INC. Thomas (TK) Kinsey SENIOR ENGINEER, EXIGENT...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
A Survey of Remote Automotive Attack Surfaces Charlie Miller Security Engineer, Twitter Chris Valasek Director of Threat Intelligence, IOActive Automotive security concerns have gone from the fringe to the mainstream with security researchers showing the susceptibility of the modern vehicle to local and remote attacks. A malicious attacker leveraging a remote vulnerability could do anything from enabling a microphone for eavesdropping to turning the steering wheel to disabling the brakes. Last...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 28
favorite 0
comment 0
Slides Here: /redirect?v=tVLatTmNI38&redir_token=k5AoTc7AXGiRJ5YCV-6DRSR_8I98MTUzNzM5OTc3MEAxNTM3MzEzMzcw&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSuch%2FDEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf Playing with Car Firmware or How to Brick your Car Paul Such 0x222 FOUNDER OF SCRT Agix SCRT A lot of papers have already been done/produced on hacking cars through ODB2/CanBus. Looking at the car firmware could also be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
Slides Here: /redirect?v=h4w_JbhY3zg&redir_token=D3uZeOKfX7QQEU3AuoH-AVDKb2F8MTUzNzM5NjEzMEAxNTM3MzA5NzMw&event=video_description&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcdonald%2FDEFCON-22-Geoff-Mcdonald-Meddle-Framework-UPDATED.pdf Meddle: Framework for Piggy-back Fuzzing and Tool Development Geoff McDonald ANTI-VIRUS RESEARCHER AT MICROSOFT Towards simplifying the vulnerability fuzzing process, this presentation introduces a moldable framework...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?v=5D4wssff0jg&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FVixie%2FDEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf&redir_token=VPhtNfUMM_YLW-clk-Tj7y31Bxx8MTUzNzQwMDIwOEAxNTM3MzEzODA4 White paper available for download here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 23
movies
eye 7
favorite 0
comment 0
Over the years, XML has been a rich target for attackers due to flaws in its design as well as implementations. It is a tempting target because it is used by other programming languages to interconnect applications and is supported by web browsers. In this talk, I will demonstrate how to use XSLT to produce documents that are vulnerable to new exploits. XSLT can be leveraged to affect the integrity of arithmetic operations, lead to code logic failure, or cause random values to use the same...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEF CON 23, DEFCON, DC23,...
DEFCON 23
movies
eye 31
favorite 0
comment 0
Remember that web application you wrote when you where first learning PHP? Ever wonder how vulnerable that code base is? Through the perspective of an attacker you will see how SQL injection can lead to data loss and system compromise. This presentation will take you through the techniques and tools used to take control of a PHP web application starting from an injection point moving to PHP web shells, and ending with a Linux wildcard attack. Speaker Bio: Nemus works as a software engineer in...
Topics: Youtube, video, Science & Technology, Nemus, SQL, SQL Injection, RCE, Remote Code Execution,...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Slides Here: /redirect?v=OD2Wxe4RLeU&event=video_description&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FFitzpatrick-Crabill%2FDEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf&redir_token=5TF4z_MZtYSWX_LT6dQGAwXBwHV8MTUzNzM5NTE1NEAxNTM3MzA4NzU0 NSA Playset: PCIe Joe FitzPatrick HARDWARE SECURITY RESOURCES, LLC Miles Crabill SECURITY RESEARCHER Hardware hacks tend to focus on low-speed (jtag, uart) and external (network, usb) interfaces,...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 6
favorite 0
comment 0
Closing Ceremonies, Results from several contests, closing remarks, thank you's and plans for DEF CON 23. Source: https://www.youtube.com/watch?v=wbjRjgJi3MI Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEFCON Video Series, DEFCON...
DEFCON 22
movies
eye 19
favorite 0
comment 0
Slides here: /redirect?redir_token=gparawKN7p4dnM-K1cAo3_IYS_18MTUzNzM5NjQ5MUAxNTM3MzEwMDkx&event=video_description&v=7AAilkNRQAw&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBursztein%2FDEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf I am a legend: Hacking Hearthstone with machine learning Elie Bursztein SECURITY RESEARCHER, GOOGLE Celine Bursztein FOUNDER, PETSQUARE Want to become a legend at Hearthstone -- Blizzard's new blockbuster...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Slides Here: /redirect?v=EqG3tR5Zu6E&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FElazari%2FDEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf&redir_token=o12gfJMucHSswH5dOLXPhdPvACt8MTUzNzM5NDcxMEAxNTM3MzA4MzEw Empowering Hackers to Create a Positive Impact Keren Elazari In March 2014 I spoke at the annual TED conference about why hackers are a vital part of the information age. I claimed that the world actually needs hackers,...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Hacker (Character Power),...
DEFCON 25
movies
eye 18
favorite 0
comment 0
In this talk, we'll be exploring how wireless communication works. We'll capture digital data live (with Software-Defined Radio), and see how the actual bits are transmitted. From here, we'll see how to view, listen to, manipulate, and replay wireless signals. We'll also look at interrupting wireless communication, and finally, we'll even generate new radio waves from scratch (which can be useful for fuzzing and brute force attacks). I'll also be demoing some brand new tools I've written to...
Topics: Youtube, video, Science & Technology, defcon, def con, computer security, defcon 2017, defcon...
DEFCON 23
movies
eye 10
favorite 0
comment 0
For several years I developed and utilized various technologies and methods to track criminals leading to at least two dozen convictions. In the process of recovering stolen devices, larger crimes would be uncovered including drugs, theft rings, stolen cars, even a violent car jacking. Much of the evidence in these cases would be collected by stolen devices themselves, such as network information, photos captured from laptops and cell phones, but often times there was additional data that would...
Topics: Youtube, video, Science & Technology, DEF CON, DEF CON 23, DEFCON, DC23, DC-23, hack, hacker,...
DEFCON 21
movies
eye 17
favorite 0
comment 0
Noise Floor: Exploring the world of unintentional radio emissions by Melissa Elliott Application security researcher, Veracode If it's electronic, it makes noise. Not necessarily noise that you and I can hear, of course -- unless you know how to tune in. The air around us is filled with bloops, bleeps, and bzzts of machines going about their business, betraying their existence through walls or even from across the street. The unintentional noise lurking among intentional signals can even reveal...
Topics: Youtube, video, Science & Technology, Security, Information Security (Software Genre), DC21,...
DEFCON 23
movies
eye 13
favorite 0
comment 0
Security research is under attack. Updates to the Wassenaar Arrangement in 2013 established among its 41 member nations an agreement to place a variety of previously undesignated “cybersecurity items” under export control. After 18 months and a half-dozen open advisory meetings, the U.S. has taken the entire security research community by surprise with its proposed rule; we are confronted by a sweeping implementation with profound consequences for academia, independent research, commercial...
Topics: Youtube, video, Science & Technology, Computer Security (Software Genre), DEF CON (Conference...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=O8FQZIPkgZM&redir_token=aVin7Zq8YA0trdXKmcOe2sYMmRd8MTUzNzM5NTIyM0AxNTM3MzA4ODIz&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGrand%2FDEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering Joe Grand aka Kingpin GRAND IDEA STUDIO Printed Circuit Boards (PCBs), used within nearly every electronic product in...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 23
movies
eye 11
favorite 0
comment 0
Get the latest information about how the law is racing to catch up with technological change from staffers at the Electronic Frontier Foundation, the nation’s premiere digital civil liberties group fighting for freedom and privacy in the computer age. This session will include updates on current EFF issues such as surveillance online and fighting efforts to use intellectual property claims to shut down free speech and halt innovation, discussion of our technology project to protect privacy...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Electronic Frontier...
DEFCON 23
movies
eye 9
favorite 0
comment 0
The HDMI (High Definition Multimedia Interface) standard has gained extensive market penetration. Nearly every piece of modern home theater equipment has HDMI support and most modern mobile devices actually have HDMI-capable outputs, though it may not be obvious. Lurking inside most modern HDMI-compatible devices is something called HDMI-CEC, or Consumer Electronics Control. This is the functionality that allows a media device to, for example, turn on your TV and change the TV’s input. That...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DEF CON 23, DC23, Hack, Hacker, Hacking,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMacaulay%2FDEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf&v=tfFbQvglaxU&event=video_description&redir_token=Fpv26dvTXbXsWZjZOQwYlQ_TrAp8MTUzNzM5OTkwNUAxNTM3MzEzNTA1 Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System Shane Macaulay DIRECTOR OF CLOUD SECURITY, IOACTIVE Windows7 & Server...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=KYYIluNXgMw&redir_token=aUVply7Nv6Lld1ZmaEKgDSyiMrV8MTUzNzM5OTMzMUAxNTM3MzEyOTMx&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSchroeder%2FDEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf Veil-Pillage: Post-exploitation 2.0 Will Schroeder SECURITY RESEARCHER, VERIS GROUP The Veil-Framework is a project that aims to bridge the gap between pentesting and red team toolsets. It began with...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 6
favorite 0
comment 0
Slides Available here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMolina%2FDEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf&v=l_14h0r7qA8&event=video_description&redir_token=JHwd2xX9gw-GsO7D0lFFzSR_2b18MTUzNzM5OTAyOEAxNTM3MzEyNjI4 Extra Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 4
favorite 0
comment 0
Slides Here: /redirect?v=GP61zSYpqdc&event=video_description&redir_token=Df0u4ysGAnf6vdUNXvPKobH76yR8MTUzNzM5NjcxN0AxNTM3MzEwMzE3&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHolt-Smirnova-Chua%2FDEFCON-22-Holt-Smirnova-Chua-Stolen-Data-Markets-Updated.pdf Stolen Data Markets: An Economic and Organizational Assessment Tom Holt ASSOCIATE PROFESSOR, MICHIGAN STATE UNIVERSITY Olga Smirnova ASSISTANT PROFESSOR, EASTERN CAROLINA UNIVERSITY Yi-Ting Chua MICHIGAN...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 3
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSapozhnikov%2FDEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf&redir_token=_dwnO2oIciF8wOPpY4ahp-cr3h98MTUzNzM5ODg5NkAxNTM3MzEyNDk2&v=bji0VMXl108&event=video_description Acquire current user hashes without admin privileges Anton Sapozhnikov KPMG If an attacker has only user level access to an infected machine inside corporate internal network, that means...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 7
favorite 0
comment 0
Slides: /redirect?redir_token=SOH2BucePo7gTWjmxFOfRzGg09p8MTUzNzM5NzIwMkAxNTM3MzEwODAy&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWyde%2FDEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf&v=tso5rhzQYBc&event=video_description Client-Side HTTP Cookie Security: Attack and Defense David Wyde SOFTWARE ENGINEER, CISCO HTTP cookies are an important part of trust on the web. Users often trade their login credentials for a cookie, which is then used to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 9
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWhite-deVilliers%2FDEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf&redir_token=AIWSZpqCKzor1vZgJFuKtOyNrEB8MTUzNzM5Njg1MEAxNTM3MzEwNDUw&event=video_description&v=i2-jReLBSVk Manna from Heaven: Improving the state of wireless rogue AP attacks Dominic White CTO, SENSEPOST Ian de Villiers SENIOR ANALYST, SENSEPOST The current state of theoretical attacks against...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Blinding The Surveillance State Christopher Soghoian Principal Technologist, American Civil Liberties Union We live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them to learn intimate, private details about our lives. In part, the ease with which they can obtain such information reflects the fact that our laws have failed to keep up with advances in technology. However, privacy enhancing technologies can offer real...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 21
favorite 0
comment 0
Presentation available here: /redirect?redir_token=iyJUIC8EHiHvBbjUZHOgF6JJcHx8MTUzNzM5NDg0N0AxNTM3MzA4NDQ3&v=uMJSOYA9xoM&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPinto-Maxwell%2FDEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf&event=video_description Measuring the IQ of your Threat Intelligence feeds Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT Kyle Maxwell RESEARCHER Threat Intelligence feeds are now being...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf&v=-SqAlpANtIs&redir_token=SdKzJ9Gu2Y1csKhcbu9EfL6vAqF8MTUzNzM5ODA2MkAxNTM3MzExNjYy&event=video_description The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns Christopher Campbell SECURITY RESEARCHER 15 years after APT was released for Linux, Microsoft is finally going to ship Windows with a package...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 25
movies
eye 11
favorite 0
comment 0
Imagine that you're accused of a crime, and the basis of the accusation is a log entry generated by a piece of custom software. You might have some questions: does the software work? how accurate is it? how did it get the results that it did? Unfortunately, the software isn't available to the public. And you can't get access to the source code or even a working instance of the software. All you get are assurances that the software is in use by investigators around the globe, and doesn't do...
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...