Parent directory/ | - | - |
DEF CON 20 - Darkred - Not-So-Limited Warranty Target Attacks on Warranties for Fun and Profit - Audio.m4b | 2.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - Alexander Minozhenko - How to Hack VMware vCenter Server in 60 Seconds - Audio.m4b | 3.4 MiB | 2020 May 30 05:37 |
DEF CON 20 - Bob Pan - APK File Infection on an Android System - Audio.m4b | 4.0 MiB | 2020 May 30 05:37 |
DEF CON 20 - Sergio Valderrama and Carlos Rodriguez - Scylla Because Theres no Patch for Human Stupidity - Audio.m4b | 4.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Jayson E Street - How to Channel Your Inner Henry Rollins - Audio.m4b | 4.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Nick Galbreath - New Techniques in SQLi Obfuscation SQL never before used in SQLi - Audio.m4b | 5.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - Gail Thackeray and Dead Addict - Before During and After - Audio.m4b | 6.0 MiB | 2020 May 30 05:37 |
DEF CON 20 - Linda C Butler - The Open Cyber Challenge Platform - Audio.m4b | 6.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Chris Conley - Bad and Sometimes Good Tech Policy Its Not Just a DC Thing - Audio.m4b | 6.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Dan AltF4 Petro - Network Anti-Reconnaissance Messing with Nmap Through Smoke and Mirrors - Audio.m4b | 6.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Ang Cui - Embedded Device Firmware Vulnerability Hunting Using FRAK the Firmware Reverse Analysis Konsole - Audio.m4b | 6.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Viss - Drinking From the Caffeine Firehose We Know as Shodan - Audio.m4b | 6.6 MiB | 2020 May 30 05:38 |
DEF CON 20 - Jason Scott - DEF CON Documentary Trailer - Audio.m4b | 6.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Ryan Holeman - Passive Bluetooth Monitoring in Scapy - Audio.m4b | 6.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Matthew Duggan - Not So Super Notes How Well Does US Dollar Note Security Prevent Counterfeiting - Audio.m4b | 7.4 MiB | 2020 May 30 05:37 |
DEF CON 20 - Robert Deaton - DivaShark - Monitor your Flow - Audio.m4b | 7.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Adam Baldwin - Blind XSS - Audio.m4b | 7.7 MiB | 2020 May 30 05:37 |
DEF CON 20 - Andrew King - Detecting Reflective Injection - Audio.m4b | 7.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Nadeem Douba - Sploitego - Maltegos Local Partner in Crime - Audio.m4b | 8.1 MiB | 2020 May 30 05:37 |
DEF CON 20 - Jeff Bryner - KinectasploitV2 Kinect Meets 20 Security Tools - Audio.m4b | 8.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Marlinspike Hulton and Ray - Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2 - Audio.m4b | 8.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - esden dotAero misterj and cifo - The Paparazzi Platform Flexible Open-Source UAS Software and Hardware - Audio.m4b | 9.4 MiB | 2020 May 30 05:37 |
DEF CON 20 - FX and Greg - Hacking Redacted Routers - Audio.m4b | 9.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Jason A Novak and Andrea London - SQL ReInjector - Automated Exfiltrated Data Identification - Audio.m4b | 9.7 MiB | 2020 May 30 05:37 |
DEF CON 20 - Eddie Lee - NFC Hacking The Easy Way - Audio.m4b | 9.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - David Maloney - Weaponizing the Windows API with Metasploits Railgun - Audio.m4b | 10.0 MiB | 2020 May 30 05:37 |
DEF CON 20 - Elie Bursztein and Patrick Samy - Fuzzing Online Games - Audio.m4b | 10.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Thor - Socialized Data Using Social Media as a Cyber Mule - Audio.m4b | 10.8 MiB | 2020 May 30 05:38 |
DEF CON 20 - Zachary Cutlip - SQL Injection to MIPS Overflows Rooting SOHO Routers - Audio.m4b | 10.8 MiB | 2020 May 30 05:38 |
DEF CON 20 - Zack Fasel - Owned in 60 Seconds From Network Guest to Windows Domain Admin - Audio.m4b | 10.9 MiB | 2020 May 30 05:38 |
DEF CON 20 - John Floren - Hellaphone Replacing the Java in Android - Audio.m4b | 11.1 MiB | 2020 May 30 05:37 |
DEF CON 20 - Chema Alonso and Manu The Sur - Owning Bad Guys And Mafia With Javascript Botnets - Audio.m4b | 11.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Dave Kennedy and Dave DeSimone - Owning One to Rule Them All - Audio.m4b | 11.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Bitweasil - Cryptohaze Cloud Cracking - Audio.m4b | 11.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Gavin Baucom and Smith - Post-Exploitation Nirvana Launching OpenDLP Agents over Meterpreter Sessions - Audio.m4b | 11.7 MiB | 2020 May 30 05:37 |
DEF CON 20 - Ryan Reynolds and Jonathan Claudius - Stamp Out Hash Corruption Crack All The Things - Audio.m4b | 11.7 MiB | 2020 May 30 05:37 |
DEF CON 20 - Martin Gallo - Uncovering SAP Vulnerabilities Reversing and Breaking the Diag Protocol - Audio.m4b | 12.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Matthew Toussain and Christopher Shields - Subterfuge The Automated Man-in-the-Middle Attack Framework - Audio.m4b | 12.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Dave Brown - DIY Electric Car - Audio.m4b | 12.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - atlas - sub ghz or bust - Audio.m4b | 12.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Mickey Shkatov and ToKohlenberg - We Have You the Gadgets - Audio.m4b | 12.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Bankston Blaze and Granick - Should the Wall of Sheep Be Illegal - Audio.m4b | 12.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - DT Jericho and Russ Rogers - DC RECOGNIZE Awards - Audio.m4b | 12.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Phil Polstra - Bypassing Endpoint Security for 20 Dollars or Less - Audio.m4b | 12.7 MiB | 2020 May 30 05:37 |
DEF CON 20 - Paul Vixie and Andrew Fried - The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet - Audio.m4b | 12.7 MiB | 2020 May 30 05:37 |
DEF CON 20 - Ben Toews and Scott Behrens - Rapid Blind SQL Injection Exploitation with BBQSQL - Audio.m4b | 12.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - Peter Hannay - Exchanging Demands - Audio.m4b | 12.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Wesley McGrew - SCADA HMI and Microsoft Bob Modern Authentication Flaws With a 90s Flavor - Audio.m4b | 13.0 MiB | 2020 May 30 05:38 |
DEF CON 20 - Chris Sumner and Randall Wald - Can Twitter Really Help Expose Psychopath Killers Traits - Audio.m4b | 13.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Shawn Henry - Changing the Security Paradigm Taking Back Your Network and Bringing Pain to the Adversary - Audio.m4b | 13.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - DT and LosT - Welcome and Making the DEF CON 20 - Badge - Audio.m4b | 13.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Rebecca Shapiro and Sergey Bratus - Programming Weird Machines with ELF Metadata - Audio.m4b | 13.4 MiB | 2020 May 30 05:37 |
DEF CON 20 - Dan Griffin - Hacking Measured Boot and UEFI - Audio.m4b | 13.4 MiB | 2020 May 30 05:37 |
DEF CON 20 - Conti Shay and Hartzog - Life Inside a Skinner Box Confronting our Future of Automated Law Enforcement - Audio.m4b | 13.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Kenneth Geers - The Art of Cyberwar - Audio.m4b | 13.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Thomas Cannon - Into the Droid Gaining Access to Android User Data - Audio.m4b | 13.7 MiB | 2020 May 30 05:38 |
DEF CON 20 - Bruce Schneier - Bruce Schneier Answers Your Questions - Audio.m4b | 13.7 MiB | 2020 May 30 05:37 |
DEF CON 20 - Fergus Noble and Colin Beighley - Making Sense of Static - New Tools for Hacking GPS - Audio.m4b | 13.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - Anch and Omega - The Darknet of Things Building Sensor Networks That Do Your Bidding - Audio.m4b | 13.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Marcia Hofmann - Crypto and the Cops the Law of Key Disclosure and Forced Decryption - Audio.m4b | 13.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Katy Levinson - Robots Youre Doing It Wrong 2 - Audio.m4b | 13.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Francis Brown and Rob Ragan - Tenacious Diggity Skinny Dippin in a Sea of Bing - Audio.m4b | 13.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Joshua Corman and Panel - World War 3 dot 0 Chaos Control and the Battle for the Net - Audio.m4b | 13.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Paul Wilson - The Art Of The Con - Audio.m4b | 13.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Amber Lyon and Panel - Anonymous and the Online Fight for Justice - Audio.m4b | 13.9 MiB | 2020 May 30 05:37 |
DEF CON 20 - Jonathan Brossard - Hardware Backdooring is Practical - Audio.m4b | 14.0 MiB | 2020 May 30 05:37 |
DEF CON 20 - Mark Weatherford - The Christopher Columbus Rule and DHS - Audio.m4b | 14.0 MiB | 2020 May 30 05:37 |
DEF CON 20 - Etemadieh Heres Rosenberg and Dwenger - Hacking the Google TV - Audio.m4b | 14.0 MiB | 2020 May 30 05:37 |
DEF CON 20 - Sandy Clark and Matt Blaze - SIGINT and Traffic Analysis for the Rest of Us - Audio.m4b | 14.1 MiB | 2020 May 30 05:37 |
DEF CON 20 - General Keith B Alexander - Shared Values Shared Responsibility - Audio.m4b | 14.1 MiB | 2020 May 30 05:37 |
DEF CON 20 - Charlie Miller - Dont Stand So Close To Me An Analysis of the NFC Attack Surface - Audio.m4b | 14.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Tom Perrine - Creating an A1 Security Kernel in the 1980s - Audio.m4b | 14.2 MiB | 2020 May 30 05:38 |
DEF CON 20 - Raphael Mudge - Cortana Rise of the Automated Red Team - Audio.m4b | 14.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Ostrom Feinauer and Borskey - The End of the PSTN As You Know It - Audio.m4b | 14.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Richard Thieme - Twenty Years Back Twenty Years Ahead The Arc of DEF CON Past and Future - Audio.m4b | 14.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Chris Tarnovsky - Attacking TPM Part 2 A Look at the ST19WP18 TPM Device - Audio.m4b | 14.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Jim Rennie and Jennifer Granick - MegaUpload Guilty or Not Guilty - Audio.m4b | 14.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Christian Dameff and Jeff Tully - Hacking Humanity Human Augmentation and You - Audio.m4b | 14.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Michael Perklin - Anti-Forensics and Anti-Anti-Forensics Attacks - Audio.m4b | 14.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Xeno Kovah and Corey Kallenberg - No More Hooks Detection of Code Integrity Attacks - Audio.m4b | 14.4 MiB | 2020 May 30 05:38 |
DEF CON 20 - Robert Portvliet and Brad Antoniewicz - The Safety Dance - Wardriving the Public Safety Band - Audio.m4b | 14.4 MiB | 2020 May 30 05:37 |
DEF CON 20 - Branco Oakley and Bratus - Overwriting the Exception Handling Cache PointerDwarf Oriented Programming - Audio.m4b | 14.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Cory Docotorow - Beyond the War on General Purpose Computing Whats Inside the Box - Audio.m4b | 14.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Kurt Opsahl and Panel - Meet the EFF - Audio.m4b | 14.5 MiB | 2020 May 30 05:37 |
DEF CON 20 - Josh Thomas and Jeff Robble - Off-Grid Communications with Android Meshing the Mobile World - Audio.m4b | 14.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Chris Anderson - Drones - Audio.m4b | 14.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Jim Christy and Panel - Meet the Feds 2 - Policy - Audio.m4b | 14.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - James Kirk - An Inside Look Into Defense Industrial Base Technical Security Controls - Audio.m4b | 14.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Cutaway - Looking Into The Eye Of The Meter - Audio.m4b | 14.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Panel - The Making of DEF CON 20 - - Audio.m4b | 14.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Josh Brashars - Exploit Archaeology Raiders of the Lost Payphones - Audio.m4b | 14.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - Jim Christy and Panel - Meet the Feds 1 - Law Enforcement - Audio.m4b | 14.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - Michael Robinson and Chris Taylor - Spy vs Spy Spying on Mobile Device Spyware - Audio.m4b | 14.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - Tim Maletic and Christopher Pogue - OPFOR 4Ever - Audio.m4b | 15.0 MiB | 2020 May 30 05:38 |
DEF CON 20 - Joe Grand and Zoz - More Projects of Prototype This - Audio.m4b | 15.1 MiB | 2020 May 30 05:37 |
DEF CON 20 - RenderMan - Hacker and Airplanes No Good Can Come Of This - Audio.m4b | 15.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Tobias Fiddler and Bluzmanis - Safes and Containers Insecurity Design Excellence - Audio.m4b | 15.2 MiB | 2020 May 30 05:38 |
DEF CON 20 - Michael Coppola - Owning the Network Adventures in Router Rootkits - Audio.m4b | 15.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Priest and Panel - Q and A with the Men and Women in Black - Audio.m4b | 15.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - Blakdayz and Panel - Connected Chaos Evolving the DCG and Hackspace Communication Landscape - Audio.m4b | 15.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Dan Zulla - Improving Web Vulnerability Scanning - Audio.m4b | 16.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Aditya K Sood and Richard J Enbody - Botnets Die Hard - Owned and Operated - Audio.m4b | 16.2 MiB | 2020 May 30 05:37 |
DEF CON 20 - Kevin Poulsen - Kevin Poulsen Answers Your Questions - Audio.m4b | 16.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Lai Miu Wong and Chung - DDoS Black and White Kungfu Revealed - Audio.m4b | 17.0 MiB | 2020 May 30 05:37 |
DEF CON 20 - Dan Kaminsky - Black Ops - Audio.m4b | 17.8 MiB | 2020 May 30 05:37 |
DEF CON 20 - Alberto Garcia Illera - How to Hack All the Transport Networks of a Country - Audio.m4b | 23.3 MiB | 2020 May 30 05:37 |
DEF CON 20 - David Mortman and Panel - DEF CON Comedy Jam V V for Vendetta - Audio.m4b | 30.6 MiB | 2020 May 30 05:37 |
DEF CON 20 - Closing Ceremonies - Audio.m4b | 33.7 MiB | 2020 May 30 05:37 |