Skip to main content

DEFCON 22

DEF CON (also written as DEFCON, Defcon or DC) is one of the world's largest hacker conventions, held annually in Las Vegas, Nevada, with the first DEF CON taking place in June 1993.

PART OF
Hacker Conferences
More right-solid
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
DEFCON 22
by DEFCONConference
movies
eye 87
favorite 0
comment 0
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Zoz/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf Don't Fuck It Up! Zoz ROBOTICS ENGINEER Online antics used to be all about the lulz; now they're all about the pervasive surveillance. Whether you're the director of a TLA just trying to make a booty call or an internet entrepreneur struggling to make your marketplace transactions as smooth as silk, getting up to any kind of mischief involving electronic communications now...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 81
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FJauregui%2FDEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf&redir_token=GWOWHGKJjorubZTu4lkbl_zdElB8MTUzNzM5Mzk2MUAxNTM3MzA3NTYx&event=video_description&v=hT9LwyjpfzI Girl… Fault-Interrupted. Maggie Jauregui SOFTWARE SECURITY TEST ENGINEER GFCI's (Ground Fault Circuit Interrupts) are a practically unnoticeable part of our daily lives, except maybe for when you have to fumble...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEFCON Video Series, DEFCON...
DEFCON 22
movies
eye 65
favorite 0
comment 0
Old Skewl Hacking: Porn Free! Major Malfunction Having cut his teeth (and scarred his mind) on hotel Infra-Red controlled TV systems, spent ten years scanning the skies for 'interesting' satellite feeds, in this, the 3rd in his series of 'Old Skewl Hacking' talks, Major Malfunction once again, and with great personal sacrifice, goes down on^winto the depths of late-night terrestrial broadcast television to determine how secure 'Pay Per View' / 'Pay Per Night' systems are, and if Debbie really...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 56
favorite 0
comment 0
Slides Here:https://defcon.org/images/defcon-22/dc-22-presentations/Theime/DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdf The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State Richard Thieme THIEMEWORKS Over a decade ago, a friend at the National Security Agency told Richard Thieme that he could address the core issues they discussed in a context of "ethical considerations for intelligence and security professionals" only if he wrote...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Richard Thieme (Author),...
DEFCON 22
movies
eye 43
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FOssman%2FDEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf&event=video_description&v=mAai6dRAtFo&redir_token=Qs5QJsImCl4qGKxCHRKFyv1DpYh8MTUxMDA4Nzc4N0AxNTEwMDAxMzg3 Extra materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 38
favorite 0
comment 0
Presentation available here: /redirect?v=eQ2OZKitRwc&event=video_description&redir_token=nx0P2pvOs1ntjKPIT9gLW8FlkaB8MTUwNzA2ODg2NkAxNTA2OTgyNDY2&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCrenshaw%2FDEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf Dropping Docs on Darknets: How People Got Caught Adrian Crenshaw TRUSTEDSEC & IRONGEEK.COM Most of you have probably used Tor before, but I2P may be unfamiliar....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 30
favorite 1
comment 0
Slides Here: /redirect?redir_token=CXcDrFMUnfJ3p3u5aj2a4l_zxDV8MTUwNzA2NTAyMkAxNTA2OTc4NjIy&v=To5yarfAg_E&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMetacortex-Grifter%2FDEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf&event=video_description Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin Metacortex SECURITY RESEARCHER Grifter SECURITY RESEARCHER This is an introduction level talk. The talk itself will...
Topics: Youtube, video, Science & Technology, Tor (Software), Bitcoin (Currency), Darknet, The Internet...
DEFCON 22
movies
eye 28
favorite 0
comment 0
Slides Here: /redirect?v=tVLatTmNI38&redir_token=k5AoTc7AXGiRJ5YCV-6DRSR_8I98MTUzNzM5OTc3MEAxNTM3MzEzMzcw&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSuch%2FDEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf Playing with Car Firmware or How to Brick your Car Paul Such 0x222 FOUNDER OF SCRT Agix SCRT A lot of papers have already been done/produced on hacking cars through ODB2/CanBus. Looking at the car firmware could also be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 27
favorite 0
comment 0
Slides Here: /redirect?q=http%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMolina%2FDEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf&v=RX-O4XuCW1Y&redir_token=00hZo8EVTjFTT6GySHzXfyMe9DJ8MTUzNzM5NTM3NkAxNTM3MzA4OTc2&event=video_description White paper Here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 25
favorite 0
comment 0
WarKitteh: In my job I have to deliver frequent Information Security briefings to both technical and non-technical professionals. I noticed that as the material got more technical, I began to lose the non-technical crowd. Therefore, I started including humorous pictures of cats and made the briefings include stories about those cats. This worked, and I soon became notorious for my presentation style. After delivering one of those presentations, an audience member offered to lend me their cat...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), war kitteh, gene bransfield,...
DEFCON 22
movies
eye 23
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSchrodinger%2FDEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf&event=video_description&redir_token=yW3QQ-BOlx_DxjlTguKh_JFzoVZ8MTUzNzM5OTYxNUAxNTM3MzEzMjE1&v=CxkJyibPfEo From Raxacoricofallapatorius With Love: Case Studies In Insider Threat Tess Schrodinger Espionage, honey pots, encryption, and lies. Clandestine meetings in hotels. The naïve girl seduced by a...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 22
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FYoung%2FDEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf&redir_token=tVZuE7xrTKW5PGb7RxNaa2W6izl8MTUzNzQwMDU4NEAxNTM3MzE0MTg0&event=video_description&v=Xfl4spvM5DI From root to SPECIAL: Pwning IBM Mainframes Philip “Soldier of Fortran” Young 1.1 million transactions are run through mainframes every second worldwide. From your flight to your ATM withdrawal...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 22
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPolstra%2FDEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf&v=Uy3nXXZgqmg&event=video_description&redir_token=RwcJx7udZIAoHbCnlgAp4u6iNo58MTUzNzM5Njc4MkAxNTM3MzEwMzgy Cyberhijacking Airplanes: Truth or Fiction? Dr. Phil Polstra ASSOCIATE PROFESSOR OF DIGITAL FORENSICS, BLOOMSBURG UNIVERSITY OF PENNSYLVANIA Captain Polly ASSOCIATE PROFESSOR OF AVIATION,...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 21
favorite 0
comment 0
Secure Random By Default Dan Kaminsky Chief Scientist, White Ops As a general rule in security, we have learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs -- insecure and default, and secure but obscure. Why not fix this? Why not make JavaScript and PHP and Java and Python and even libc rand() return strong entropy? What are the...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 21
favorite 0
comment 0
Presentation available here: /redirect?redir_token=iyJUIC8EHiHvBbjUZHOgF6JJcHx8MTUzNzM5NDg0N0AxNTM3MzA4NDQ3&v=uMJSOYA9xoM&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPinto-Maxwell%2FDEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf&event=video_description Measuring the IQ of your Threat Intelligence feeds Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT Kyle Maxwell RESEARCHER Threat Intelligence feeds are now being...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 20
favorite 0
comment 0
Slides here: /redirect?redir_token=gparawKN7p4dnM-K1cAo3_IYS_18MTUzNzM5NjQ5MUAxNTM3MzEwMDkx&event=video_description&v=7AAilkNRQAw&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBursztein%2FDEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf I am a legend: Hacking Hearthstone with machine learning Elie Bursztein SECURITY RESEARCHER, GOOGLE Celine Bursztein FOUNDER, PETSQUARE Want to become a legend at Hearthstone -- Blizzard's new blockbuster...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 20
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHealey%2FDEFCON-22-Jay-Healey-Saving-the-Internet-UPDATED.pdf&v=2W9AShhlX5w&redir_token=BIMgqML9Q_UD8TkE9i2xA8HGFE18MTUzNzM5NTc3NkAxNTM3MzA5Mzc2&event=video_description Saving the Internet (for the Future) Jason Healey DIRECTOR, CYBER STATECRAFT INITIATIVE, ATLANTIC COUNCIL Saving the Internet (for the Future): Last year, the Dark Tangent wrote in the DC XXI program that the "balance...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 19
favorite 0
comment 0
Slides Here:/redirect?redir_token=uTqJO4utchAhySBUTo-XWZxxRJJ8MTUzNzM5OTUzNUAxNTM3MzEzMTM1&event=video_description&v=vLU92bNeIdI&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FStrazzere-Sawyer%2FDEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf Android Hacker Protection Level 0 Tim Strazzere LEAD RESEARCH & RESPONSE ENGINEER Jon Sawyer CTO OF APPLIED CYBERSECURITY LLC Obfuscator here, packer there - the Android ecosystem is...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 18
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=3LZhFFm1tK0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKlafter-Swanson%2FDEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf&redir_token=6hf6QocokC-KNUNJX_WZV0dFVmN8MTUzNzQwMDQ1M0AxNTM3MzE0MDUz Check Your Fingerprints: Cloning the Strong Set Richard Klafter (Free) SENIOR SOFTWARE ENGINEER, OPTIMIZELY Eric Swanson (Lachesis) SOFTWARE DEVELOPER The web of trust has...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 17
favorite 0
comment 0
Presentation Available here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPinto-Maxwell%2FDEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf&redir_token=PeiTxrBXShZU0AhTGkEBIqtGI458MTUzNzM5MzMxN0AxNTM3MzA2OTE3&event=video_description&v=5NeOIhfkD0Q Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT We could all have predicted this with our magical Big Data analytics platforms,...
Topics: Youtube, video, Science & Technology, Mathematics (Field Of Study), DEFCON Video Series, DEFCON...
DEFCON 22
movies
eye 17
favorite 0
comment 0
Slides Here: /redirect?redir_token=qhUox9F3t6ba1YgqxbpQjJYnKtR8MTUzNzM5NjA2NkAxNTM3MzA5NjY2&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWilkinson%2FDEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance.pdf&event=video_description&v=knrvrR-B1ZI White Paper Available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 16
favorite 0
comment 0
Panel: Ask the EFF: The Year in Digital Civil Liberties Kurt Opsahl Deputy General Counsel, Electronic Frontier Foundation Nate Cardozo EFF Staff Attorney Mark Jaycox EFF Legislative Analyst Yan Zhu EFF Staff Technologist Eva Galperin EFF Global Policy Analyst KURT OPSAHL is the Deputy General Counsel of the Electronic Frontier Foundation focusing on civil liberties, free speech and privacy law. Opsahl has counseled numerous computer security researchers on their rights to conduct and discuss...
Topics: Youtube, video, Science & Technology, Civil Liberties (Literature Subject), Electronic Frontier...
DEFCON 22
movies
eye 16
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLittlebury%2FDEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf&v=2IeU7Cck0hI&redir_token=GHmdcUQxe2eVHa3roWN5TJkWIT18MTUzNzM5ODE4NkAxNTM3MzExNzg2&event=video_description Home Alone with localhost: Automating Home Defense Chris Littlebury SENIOR PENETRATION TESTER, KNOWLEDGE CONSULTING GROUP, INC. Home automation is everywhere, and so are their exploits. This presentation will go...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 16
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWhite-Green%2FDEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf&v=Udsu_Vdw_Q8&event=video_description&redir_token=KAnnTrU8Yhr_utFoC_W8AS7O9tB8MTUzNzM5NDc3NkAxNTM3MzA4Mzc2 The Open Crypto Audit Project Kenneth White CO-FOUNDER, OPEN CRYPTO AUDIT PROJECT Matthew Green RESEARCH PROFESSOR, JOHNS HOPKINS UNIVERSITY Join us for the story of the origins and...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 15
favorite 0
comment 0
Slides Here; /redirect?v=nBR7Kru6JX0&redir_token=qmF3AGzW0Iq1eyRrun29EG4KaId8MTUzNzM5NDUxM0AxNTM3MzA4MTEz&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKelley-Anderson%2FDEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe-Updated.pdf&event=video_description Is This Your Pipe? Hijacking the Build Pipeline. Kyle Kelley DEVELOPER SUPPORT ENGINEER, RACKSPACE Greg Anderson SOFTWARE SECURITY ENGINEER,RACKSPACE As developers of the web, we rely on tools to...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 15
favorite 0
comment 0
Slides here: /redirect?redir_token=KHuiT5SsqoIAI-P73iPAG6VOyGF8MTUzNzM5ODgyNEAxNTM3MzEyNDI0&v=vbdyG0l_b3M&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSelf%2FDEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf&event=video_description Don't DDoS Me Bro: Practical DDoS Defense Blake Self SENIOR SECURITY ARCHITECT Shawn "cisc0ninja" Burrell SOLDIERX CREW Layer 7 DDoS attacks have been on the rise since at least 2010, especially attacks that...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCorman-Percoco%2FDEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf&event=video_description&v=32XvFebA8tQ&redir_token=FiU5iPBxzNU88aosHmYHRFdOPnB8MTUzNzM5NDkxNEAxNTM3MzA4NTE0 The Cavalry Year[0] & a Path Forward for Public Safety Joshua Corman CTO, SONATYPE Nicholas J Percoco VP STRATEGIC SERVICES, RAPID7 At DEF CON 21, The Cavalry was born. In the face of clear &...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 14
favorite 0
comment 0
Panel — Surveillance on the Silver Screen- Fact or Fiction? Nicole Ozer Technology and Civil Liberties Policy Director, ACLU of California Kevin Bankston Policy Director, New America Foundation's Open Technology Institute Timothy Edgar Fellow, Watson Institute for International Studies, Brown University Join ACLU and others for a fun-filled surveillance tour of the movies - from Brazil to Bourne - to talk about what is still fiction and what is now fact. What is technologically possible? What...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Presentation (Quotation...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides Here: /redirect?redir_token=9YdNTeCiUQI21Tl-mSfcZ8OaC6h8MTUzNzM5NjI3NEAxNTM3MzA5ODc0&v=vcWwtH05f7E&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FOzavci%2FDEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf&event=video_description VoIP Wars: Attack of the Cisco Phones Fatih Ozavci SENIOR SECURITY CONSULTANT, SENSE OF SECURITY Many hosted VoIP service providers are using Cisco hosted collaboration suite and Cisco VoIP solutions....
Topics: Youtube, video, Science & Technology, Cisco Wireless IP Phone 7920, Voice Over IP (Industry),...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides here: /redirect?v=mBOLml3yLBY&redir_token=9xPQ6LNY2eXxo71_iYvHwQ4vUfR8MTUzNzM5ODEyM0AxNTM3MzExNzIz&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FQuaddi-R3plicant-Hefley%2FDEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf&event=video_description Hacking 911: Adventures in Disruption, Destruction, and Death Christian “quaddi” Dameff MD Jeff “r3plicant” Tully MD Peter Hefley SENIOR MANAGER - SUNERA Ever wonder what you would do if...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides Here: /redirect?redir_token=3rjJ4SjJ6x4RaqJaSPdnl7uaogt8MTUzNzM5NjM0OEAxNTM3MzA5OTQ4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSmith-Perrymon%2FDEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf&v=EEGxifOAk48&event=video_description Advanced Red Teaming: All Your Badges Are Belong To Us Eric Smith SENIOR PARTNER, PRINCIPAL SECURITY CONSULTANT AT LARES Josh Perrymon SENIOR ADVERSARIAL ENGINEER AT LARES By definition ”Red...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 14
favorite 0
comment 0
Hacker Jeopardy is the legendary, long running DEF CON hacker trivia game that dominates the nighttime offerings every year. The questions are tough, the beverage choices are dubious and the winners are immortal. Source: https://www.youtube.com/watch?v=3_5rO3abWoM Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), jeopardy, hacker jeopardy,...
DEFCON 22
by DEFCONConference
movies
eye 14
favorite 0
comment 0
DEF CON 22 Contests Award Ceremony Source: https://www.youtube.com/watch?v=14Kh016_mhA Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), DEFCON Video Series, DEFCON...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Eric (XlogicX) Davisson and Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDavisson-Alejandro%2FDEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf&event=video_description&v=VkP87oY5VCw&redir_token=R1gSuBkeqcdAr0ixIWCLHBxYeUV8MTUzNzM5NjQyMEAxNTM3MzEwMDIw Abuse of Blind Automation in Security Tools Eric (XlogicX) Davisson SECURITY...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 14
favorite 0
comment 0
Slides Here: /redirect?redir_token=bieYCcQifZc1Tvx8rpelyeE9E5V8MTUzNzM5NTkxOUAxNTM3MzA5NTE5&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPickett%2FDEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf&v=9_toldlQpgI&event=video_description Abusing Software Defined Networks Gregory Pickett CYBERSECURITY OPERATIONS, HELLFIRE SECURITY Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the...
Topics: Youtube, video, Science & Technology, Software-defined Networking, DEFCON Video Series, DEFCON...
DEFCON 22
by DEFCONConference
movies
eye 13
favorite 0
comment 0
Panel - Diversity in Information Security Jennifer Imhoff-Dousharm Informatics student, co-organizer of theSummit, NCWIT affiliate member Sandy “Mouse” Clark Security Researcher and part-time Phd. candidate Kristin Paget Jolly Full time hacker Vyrus Independent Security Consultant Scott Martin CIO Spikes Security Discussion from the point of view of a diverse panel of leading representatives currently in or thinking of becoming part of the Information Security industry. This panel will give...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKouns-Eiram%2FDEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-UPDATED.pdf&v=759ZalgD1vg&event=video_description&redir_token=c18lmjGhyRtvbnYkQ3KitntbMip8MTUzNzM5NTg1M0AxNTM3MzA5NDUz Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! Jake Kouns CISO, RISK BASED SECURITY Carsten Eiram CHIEF RESEARCH OFFICER, RISK BASED SECURITY Everywhere you...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf&event=video_description&v=7HdcEQGQZDU&redir_token=XUAls5sLm4iDgHPV7bVSprWmtet8MTUzNzM5ODAwNUAxNTM3MzExNjA1 The Secret Life of Krbtgt Christopher Campbell SECURITY RESEARCHER A tale of peril and woe, Krbtgt is the domain account that you just can't quit. Quiet and harmless, it has been with your enterprise since you...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Elevator Hacking - From the Pit to the Penthouse Deviant Ollam The CORE Group Howard Payne The CORE Group Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking late-night rides upon car tops (don't do that, please!) to the work of modern pen testers who use elevators to bypass building security systems (it's easier than you think!) these devices are often misunderstood and their full range of features and abilities go unexplored....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FValtman%2FDEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf&redir_token=lY_r1MIWt7mH8T7VpDO05jeDGYx8MTUzNzM5MzQ4MkAxNTM3MzA3MDgy&event=video_description&v=QvHUYhLebDc A Journey to Protect Points-of-sale Nir Valtman ENTERPRISE SECURITY ARCHITECT, NCR RETAIL Many point-of-sale breaches occurred in the past year and many organizations are still vulnerable against the simplest...
Topics: Youtube, video, Science & Technology, Computer Security Conference, Point Of Sale (Software...
DEFCON 22
by DEFCONConference
movies
eye 13
favorite 0
comment 0
Night 2 of Hacker Pyramid's last hurrah. Source: https://www.youtube.com/watch?v=BQEHElSwXUM Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEFCON, DEF CON 22, hackers, las vegas, game show
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here: /redirect?redir_token=cxl245MgLWALVC2SMYGMg98XM9l8MTUzNzQwMDUxMkAxNTM3MzE0MTEy&event=video_description&v=wzyuioto4y8&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FPierce-Loki%2FDEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf NSA Playset : GSM Sniffing Pierce SECURITY RESEARCHER Loki SECURITY RESEARCHER A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FNemus%2FDEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS.pdf&event=video_description&v=g9H-WO_RY3k&redir_token=EJQUHZ7dYWm8qWh8DEiQK3m0ib98MTUzNzM5MzY4NkAxNTM3MzA3Mjg2 An Introduction to Back Dooring Operating Systems for Fun and Trolling Nemus SECURITY RESEARCHER So you want to setup a back door? Have you ever wondered how its done and what you can do to detect back doors on your...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FCampbell%2FDEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf&v=-SqAlpANtIs&redir_token=SdKzJ9Gu2Y1csKhcbu9EfL6vAqF8MTUzNzM5ODA2MkAxNTM3MzExNjYy&event=video_description The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns Christopher Campbell SECURITY RESEARCHER 15 years after APT was released for Linux, Microsoft is finally going to ship Windows with a package...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools Zack Fasel Managing Partner, Urbane Security Many struggle in their job with the decision of what events to log in battle against costly increases to their licensing of a commercial SIEM or other logging solution. Leveraging the open source solutions used for "big-data" that have been proven by many can help build a scalable, reliable, and hackable event logging and security intelligence system to address...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here: /redirect?redir_token=MyoRXolHw4QrdtBs4JSRkKBi-rZ8MTUzNzM5NTI5MkAxNTM3MzA4ODky&event=video_description&v=Y8Cpio6z9qA&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDenaro-Beardsley%2FDEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf How to Disclose an Exploit Without Getting in Trouble Jim Denaro CIPHERLAW Tod Beardsley ENGINEERING MANAGER, METASPLOIT PROJECT You have identified a vulnerability and may have developed...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 13
favorite 0
comment 0
Slides Here: /redirect?v=5D4wssff0jg&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FVixie%2FDEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf&redir_token=VPhtNfUMM_YLW-clk-Tj7y31Bxx8MTUzNzQwMDIwOEAxNTM3MzEzODA4 White paper available for download here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?redir_token=7a7GIl-mZ_KTw7nfO4rEPlMRp0t8MTUzNzQwMDM4NUAxNTM3MzEzOTg1&event=video_description&v=d5jqV06Yijw&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FRowley%2FDEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf Detecting and Defending Against a Surveillance State Robert RowleySECURITY RESEARCHER, TRUSTWAVE SPIDERLABS This talk is based on semi-recent reported leaks that detail how state-actors could be...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLeder%2FDEFCON-22-Felix-Leder-NinjaTV.pdf&v=Y0P1Lx5DRvE&event=video_description&redir_token=cf65ZdAiyzQtZod4JnUlX0RigJR8MTUzNzM5NjIwN0AxNTM3MzA5ODA3 NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It Felix Leder DIRECTOR, MALWARE RESEARCH, BLUE COAT NORWAY Smart TVs are growing in popularity. Set-top boxes like Apple TV, Roku, or WD TV can make your “normal” TV...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?v=EqG3tR5Zu6E&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FElazari%2FDEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf&redir_token=o12gfJMucHSswH5dOLXPhdPvACt8MTUzNzM5NDcxMEAxNTM3MzA4MzEw Empowering Hackers to Create a Positive Impact Keren Elazari In March 2014 I spoke at the annual TED conference about why hackers are a vital part of the information age. I claimed that the world actually needs hackers,...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Hacker (Character Power),...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Blinding The Surveillance State Christopher Soghoian Principal Technologist, American Civil Liberties Union We live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them to learn intimate, private details about our lives. In part, the ease with which they can obtain such information reflects the fact that our laws have failed to keep up with advances in technology. However, privacy enhancing technologies can offer real...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Hacking the FBI: How & Why to Liberate Government Records Ryan Noah Shapiro PhD candidate, Massachusetts Institute of Technology After narrowly avoiding a lengthy activism-related prison sentence, I began PhD work at MIT in part to map out the criminalization of political dissent in Post-9/11 America. Especially in trying to obtain records from the FBI, Freedom of Information Act (FOIA) work became an essential component of my research. However, it quickly became apparent that the FBI...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?event=video_description&v=KYYIluNXgMw&redir_token=aUVply7Nv6Lld1ZmaEKgDSyiMrV8MTUzNzM5OTMzMUAxNTM3MzEyOTMx&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FSchroeder%2FDEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf Veil-Pillage: Post-exploitation 2.0 Will Schroeder SECURITY RESEARCHER, VERIS GROUP The Veil-Framework is a project that aims to bridge the gap between pentesting and red team toolsets. It began with...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Around the world in 80 cons” - A Perspective Jayson E. Street Senior Partner of Krypton Security After spending 15 years in the hacker / InfoSec community, I thought it was time to pause and look back upon all I have seen, everywhere I have been, all the people I met and everything I have learned. And then share some of that knowledge with people to hopefully help them have a leg up moving forward. More importantly, compare and contrast my experiences and perspectives with statistics we...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 12
favorite 0
comment 0
Slides Here: /redirect?v=uzGXxWuDwxc&event=video_description&redir_token=J6gun1QsSB6ZacRWaT70gVTQZf98MTUzNzM5NzMzM0AxNTM3MzEwOTMz&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcmillan%2FDEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf Attacking the Internet of Things using Time Paul McMillan SECURITY ENGINEER, NEBULA Internet of Things devices are often slow and resource constrained. This makes them the perfect target for network-based...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Slides Here: /redirect?v=OD2Wxe4RLeU&event=video_description&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FFitzpatrick-Crabill%2FDEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf&redir_token=5TF4z_MZtYSWX_LT6dQGAwXBwHV8MTUzNzM5NTE1NEAxNTM3MzA4NzU0 NSA Playset: PCIe Joe FitzPatrick HARDWARE SECURITY RESOURCES, LLC Miles Crabill SECURITY RESEARCHER Hardware hacks tend to focus on low-speed (jtag, uart) and external (network, usb) interfaces,...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 11
favorite 0
comment 0
Slides here: /redirect?v=YImQys2Xlf0&event=video_description&redir_token=TLepHqIC1izCnyBTnevpkSRVP2x8MTUzNzM5MzA4NUAxNTM3MzA2Njg1&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FAnch%2FDEFCON-22-Anch-The-Monkey-In-the-Middle.pdf The Monkey in the Middle: A pentesters guide to playing in traffic. Anch (MIKE GUTHRIE) Prank your friends, collect session information and passwords, edit traffic as it goes by.. become the Monkey(man)-In-The-Middle and do it...
Topics: Youtube, video, Science & Technology, Software (Industry), Penetration Test, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides here: /redirect?v=KFx4lhxMi-M&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMahjoub-Toonk-Reuille%2FDEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf&redir_token=z7tmvlIzYesz7khWPB8Kw6nTHQN8MTUzNzM5NzAxOUAxNTM3MzEwNjE5 Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=d6VCri6sPnY&event=video_description&redir_token=-DGawUHPQPJY0BWOZ4Tn4EVbxZ98MTUzNzM5Nzg0NEAxNTM3MzExNDQ0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKallenberg%2FDEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf Additional Materials available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=rz0SNEFZ8h0&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FTal%2FDEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf&redir_token=eyh5zWmonhLFMBzYracghdLElNl8MTUzNzM5OTk4NUAxNTM3MzEzNTg1 I Hunt TR-069 Admins: Pwning ISPs Like a Boss Shahar Tal SECURITY & VULNERABILITY RESEARCH TEAM LEADER, CHECK POINT SOFTWARE TECHNOLOGIES Residential gateway (/SOHO router) exploitation is a rising trend in the security...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?redir_token=4HYPndHHE4fCV-TlctceVNoQxAF8MTUzNzQwMDMxOEAxNTM3MzEzOTE4&v=qF06PFcezLs&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FKazanciyan-Hastings%2FDEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf&event=video_description Investigating PowerShell Attacks Ryan Kazanciyan TECHNICAL DIRECTOR, MANDIANT Matt Hastings CONSULTANT, MANDIANT Over the past two years, we've seen targeted attackers increasingly...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=O8FQZIPkgZM&redir_token=aVin7Zq8YA0trdXKmcOe2sYMmRd8MTUzNzM5NTIyM0AxNTM3MzA4ODIz&event=video_description&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FGrand%2FDEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering Joe Grand aka Kingpin GRAND IDEA STUDIO Printed Circuit Boards (PCBs), used within nearly every electronic product in...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?v=EDci2gb3ruQ&event=video_description&redir_token=_kdMqniTkcGjjzMaUo8m8SajbKF8MTUzNzM5OTM5OEAxNTM3MzEyOTk4&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FHecker%2FDEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf Burner Phone DDOS 2 dollars a day : 70 Calls a Minute Weston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY Phone DDOS research. Current proof of concept is dealing with Samsung SCH-U365 QUALCOMM prepaid Verizon...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
This presentation will dive into research, outcomes, and recommendations regarding information security for the "Internet of Things". Mark and Zach will discuss IoT security failures both from their own research as well as the work of people they admire. Attendees are invited to laugh/cringe at concerning examples of improper access control, a complete lack of transport security, hardcoded-everything, and ways to bypass paying for stuff. Source:...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Internet of Things, The...
DEFCON 22
movies
eye 10
favorite 0
comment 0
How To Get Phone Companies To Just Say No To Wiretapping Phil Zimmermann President & Co-Founder Silent Circle Phil is going to talk about his latest projects, which are helping several mobile carriers to provide their customers with wiretap-free phone services. These carriers are breaking ranks with the rest of their industry's century-long culture of wiretapping. When you can get actual phone companies to join in the struggle, you know change is afoot. And yes, Navy SEALS are involved....
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMenerick%2FDEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf&v=OnJ18pyMncE&event=video_description&redir_token=saMxqfjdGA__2p2QXxfRj5vHQNF8MTUzNzM5NTA3M0AxNTM3MzA4Njcz Open Source Fairy Dust John Menerick SECURITY RESEARCHER, NETSUITE Over the past 30 years, the Internet and open source software have worked in tandem. The Internet has provided an environment for open source...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?redir_token=51LS_ku_Ev0s9yPcYVej6pi-nWx8MTUzNzM5NDQ0MkAxNTM3MzA4MDQy&event=video_description&v=biulJpOomRc&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FLevison-Watt%2FDEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf Dark Mail Ladar Levison FOUNDER OF LAVABIT, LLC Stephen Watt LEAD DEVELOPER, REFERENCE IMPLEMENTATION, DARK MAIL Data privacy and anonymity have long been cornerstone interests of the computer security world, but not...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 10
favorite 0
comment 0
Slides Here: /redirect?redir_token=U59sdleuGN2XBmKh_qFO8kyoVZt8MTUzNzM5NDk5NEAxNTM3MzA4NTk0&q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FDatko-Reed%2FDEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c-UPDATED.pdf&v=Lmpw95MFXCI&event=video_description NSA Playset: DIY WAGONBED Hardware Implant over I2C Josh Datko FOUNDER, CRYPTOTRONIX, LLC Teddy Reed SECURITY ENGINEER In this talk we present an open source hardware version of the...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 9
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMetacortex-Grifter%2FDEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf&redir_token=zqWRMcbc8LtuiR4088-kbXdEhPN8MTUzNzM5NTUyOUAxNTM3MzA5MTI5&v=7HnQnpJwr-c&event=video_description USB for all! Jesse Michael SECURITY RESEARCHER Mickey Shkatov SECURITY RESEARCHER USB is used in almost every computing device produced in recent years. In addition to well-known usages like keyboard,...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
by DEFCONConference
movies
eye 9
favorite 0
comment 0
Slides Here; /redirect?redir_token=BfUHlOILa5CQsT9wRWBt_yNEcbx8MTUzNzM5MzM5N0AxNTM3MzA2OTk3&v=l1GHeebvqPw&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FValtman%2FDEFCON-22-Nir-Valtman-Bug-Bounty-Programs-Evolution.pdf&event=video_description Extra Materials are available here:...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 9
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FWhite-deVilliers%2FDEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf&redir_token=AIWSZpqCKzor1vZgJFuKtOyNrEB8MTUzNzM5Njg1MEAxNTM3MzEwNDUw&event=video_description&v=i2-jReLBSVk Manna from Heaven: Improving the state of wireless rogue AP attacks Dominic White CTO, SENSEPOST Ian de Villiers SENIOR ANALYST, SENSEPOST The current state of theoretical attacks against...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 9
favorite 0
comment 0
A Survey of Remote Automotive Attack Surfaces Charlie Miller Security Engineer, Twitter Chris Valasek Director of Threat Intelligence, IOActive Automotive security concerns have gone from the fringe to the mainstream with security researchers showing the susceptibility of the modern vehicle to local and remote attacks. A malicious attacker leveraging a remote vulnerability could do anything from enabling a microphone for eavesdropping to turning the steering wheel to disabling the brakes. Last...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 9
favorite 0
comment 0
Slides Here: /redirect?v=h4w_JbhY3zg&redir_token=D3uZeOKfX7QQEU3AuoH-AVDKb2F8MTUzNzM5NjEzMEAxNTM3MzA5NzMw&event=video_description&q=https%3A%2F%2Fwww.defcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FMcdonald%2FDEFCON-22-Geoff-Mcdonald-Meddle-Framework-UPDATED.pdf Meddle: Framework for Piggy-back Fuzzing and Tool Development Geoff McDonald ANTI-VIRUS RESEARCHER AT MICROSOFT Towards simplifying the vulnerability fuzzing process, this presentation introduces a moldable framework...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
DEF CON the Mystery, Myth and Legend Panel It's hard to throw a stone these days without hitting a security/hacking conference. But, when every year the Las Vegas Metro SWAT Team stages for an interdiction of your convention, you know you have something "different". From crawling through Air Ducts to surreptitiously "acquiring" telco equipment, these are the stories of DEF CON you don't often hear about. The stories of yesteryear that not only helped shape defcon but also...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...
DEFCON 22
movies
eye 8
favorite 0
comment 0
Slides Here: /redirect?q=https%3A%2F%2Fdefcon.org%2Fimages%2Fdefcon-22%2Fdc-22-presentations%2FBulygin-Bazhaniul-Furtak-Loucaides%2FDEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf&v=QDSlWa9xQuA&event=video_description&redir_token=xeTSylyn5qzGHiOQ75r1iakKWGl8MTUzNzM5OTI2NkAxNTM3MzEyODY2 Summary of Attacks Against BIOS and Secure Boot Yuriy Bulygin CHIEF THREAT ARCHITECT, INTEL SECURITY Oleksandr Bazhaniuk SECURITY RESEARCHER, INTEL SECURITY...
Topics: Youtube, video, Science & Technology, DEFCON Video Series, DEFCON Conference, Defcon, DEF CON,...