Parent directory/ | - | - |
DEF CON 23 - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - audio.m4b | 39.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Zack Fasel - Seeing through the Fog - audio.m4b | 32.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - audio.m4b | 41.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - audio.m4b | 39.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - audio.m4b | 49.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - audio.m4b | 45.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - audio.m4b | 31.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - audio.m4b | 40.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Weston Hecker - Goodbye Memory Scraping Malware - audio.m4b | 35.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - audio.m4b | 38.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - audio.m4b | 41.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - audio.m4b | 36.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - audio.m4b | 42.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - audio.m4b | 43.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Tamas Szakaly - Shall We Play a Game - audio.m4b | 37.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - audio.m4b | 48.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - audio.m4b | 38.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - audio.m4b | 46.8 MiB | 2020 May 27 03:08 |
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - audio.m4b | 42.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - audio.m4b | 41.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - audio.m4b | 42.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - audio.m4b | 43.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - audio.m4b | 41.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Sean Pierce - Abusing native Shims for Post Exploitation - audio.m4b | 44.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - audio.m4b | 37.8 MiB | 2020 May 27 03:08 |
DEF CON 23 - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - audio.m4b | 44.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - audio.m4b | 40.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans - audio.m4b | 22.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.m4b | 39.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - audio.m4b | 43.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - audio.m4b | 44.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Patrick Wardle - Stick That In Your root Pipe and Smoke It - audio.m4b | 37.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Peter Shipley - Insteon - False Security and Deceptive Documentation - audio.m4b | 33.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - audio.m4b | 20.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - audio.m4b | 21.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Rich Kelley - Harness - Powershell Weaponization Made Easy - audio.m4b | 19.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Richard Thieme - Hacking the Human Body and Brain - audio.m4b | 47.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - Patrick Wardle - DLL Hijacking on OS X - audio.m4b | 41.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - audio.m4b | 42.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - audio.m4b | 98.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - audio.m4b | 97.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - ThunderStrike 2- Sith Strike - audio.m4b | 41.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - Switches Get Stitches - audio.m4b | 40.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - DEF CON 101 The Panel - audio.m4b | 75.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - audio.m4b | 48.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - Contests Closing Ceremonies - audio.m4b | 25.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - DEF CON Comedy Inception - audio.m4b | 92.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - audio.m4b | 30.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - Closing Ceremonies - audio.m4b | 80.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - Ask the EFF - The Year in Digital Civil Liberties - audio.m4b | 91.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - audio.m4b | 43.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs - audio.m4b | 34.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Omer Coskun - Why nation-state malwares target Telco Networks - audio.m4b | 43.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - audio.m4b | 42.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - audio.m4b | 36.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - audio.m4b | 35.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Mike Ryan and Richo Healey - Hacking Electric Skateboards - audio.m4b | 41.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - audio.m4b | 41.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Nadeem Douba - BurpKit - Using WebKit to Own the Web - audio.m4b | 27.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Mike Sconzo - I Am Packer And So Can You - audio.m4b | 42.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Marte L0ge - Tell me who you are and I will tell you your lock pattern - audio.m4b | 16.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - audio.m4b | 40.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - audio.m4b | 47.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - audio.m4b | 44.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - miaubiz - Put on your tinfo_t hat if youre my type - audio.m4b | 15.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System -audio.m4b | 44.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - audio.m4b | 50.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Justin Engler - Secure Messaging for Normal People - audio.m4b | 46.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - audio.m4b | 34.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - audio.m4b | 44.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - audio.m4b | 46.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - audio.m4b | 44.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ken Westin - Confessions of a Professional Cyber Stalker - audio.m4b | 37.8 MiB | 2020 May 27 03:08 |
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - audio.m4b | 46.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings - audio.m4b | 19.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - John Seymour - Quantum Classification of Malware - audio.m4b | 27.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - audio.m4b | 29.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.m4b | 45.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - John Menerick - Backdooring Git - audio.m4b | 37.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - audio.m4b | 36.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - audio.m4b | 41.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ian Latter - Remote Access - the APT - audio.m4b | 37.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - audio.m4b | 38.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - audio.m4b | 43.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - audio.m4b | 44.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - audio.m4b | 37.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Ian Kline - LTE Recon and Tracking with RTLSDR - audio.m4b | 12.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Gregory Picket - Staying Persistent in Software Defined Networks - audio.m4b | 41.8 MiB | 2020 May 27 03:08 |
DEF CON 23 - Graham and Maynor - HamSammich - long distance proxying over radio - audio.m4b | 25.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - Eijah - Crypto for Hackers - audio.m4b | 51.8 MiB | 2020 May 27 03:08 |
DEF CON 23 - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter- audio.m4b | 46.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - audio.m4b | 19.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - DT and 1057 - Welcome to DEF CON - audio.m4b | 37.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - audio.m4b | 35.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical Attacks - audio.m4b | 32.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - audio.m4b | 50.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Eric-XlogicX-Davisson - REvisiting RE DoS - audio.m4b | 40.8 MiB | 2020 May 27 03:08 |
DEF CON 23 - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - audio.m4b | 43.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Dr Phil Polstra - One Device to Pwn Them All - audio.m4b | 32.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - David Huerta - Alice and Bob are Really Confused - audio.m4b | 40.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Dr Phil Polstra - Hacker in the Wires - audio.m4b | 36.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - David An - When the Secretary of State says Please Stop Hacking Us - audio.m4b | 19.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - audio.m4b | 40.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - audio.m4b | 43.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - audio.m4b | 40.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - audio.m4b | 42.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Craig Young - How to Train Your RFID Hacking Tools - audio.m4b | 28.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - audio.m4b | 42.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers - audio.m4b | 47.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Dan Kaminsky - I want these bugs off my Internet - audio.m4b | 44.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - audio.m4b | 37.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - audio.m4b | 42.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - Chris Rock - I Will Kill You - audio.m4b | 28.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - audio.m4b | 43.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering - audio.m4b | 36.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Bruce Schneier - Questions and Answers - audio.m4b | 43.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - audio.m4b | 37.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - audio.m4b | 39.8 MiB | 2020 May 27 03:08 |
DEF CON 23 - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - audio.m4b | 42.7 MiB | 2020 May 27 03:08 |
DEF CON 23 - Chris Sistrunk - NSM 101 for ICS - audio.m4b | 36.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - audio.m4b | 35.0 MiB | 2020 May 27 03:08 |
DEF CON 23 - Brent White - Hacking Web Apps - audio.m4b | 35.5 MiB | 2020 May 27 03:08 |
DEF CON 23 - Bruce Potter - A Hackers Guide to Risk - audio.m4b | 49.6 MiB | 2020 May 27 03:08 |
DEF CON 23 - Alejandro Mayorkas - Working together to keep the Internet safe and secure - audio.m4b | 43.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - AmmonRa - How to hack your way out of home detention - audio.m4b | 34.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - audio.m4b | 42.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - atlas - Fun with Symboliks - audio.m4b | 39.3 MiB | 2020 May 27 03:08 |
DEF CON 23 - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - audio.m4b | 29.2 MiB | 2020 May 27 03:08 |
DEF CON 23 - Beccaro and Collura - Extracting the Painful blue-tooth - audio.m4b | 39.9 MiB | 2020 May 27 03:08 |
DEF CON 23 - 1057 - RICKASTLEY - audio.m4b | 43.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Aaron Grattafiori - Linux Containers - Future or Fantasy - audio.m4b | 41.4 MiB | 2020 May 27 03:08 |
DEF CON 23 - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - audio.m4b | 34.1 MiB | 2020 May 27 03:08 |
DEF CON 23 - Beccaro and Collura - Extracting the Painful blue-tooth - audio.lrc | 25.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - audio.lrc | 50.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - audio.lrc | 37.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - audio.lrc | 37.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - Switches Get Stitches - audio.lrc | 26.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - audio.lrc | 51.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - audio.lrc | 44.6 KiB | 2020 May 16 03:52 |
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - audio.lrc | 49.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - audio.lrc | 31.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Omer Coskun - Why nation-state malwares target Telco Networks - audio.lrc | 26.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Chris Rock - I Will Kill You - audio.lrc | 17.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - audio.lrc | 93.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - David An - When the Secretary of State says Please Stop Hacking Us - audio.lrc | 22.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - audio.lrc | 44.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering - audio.lrc | 24.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Dr Phil Polstra - Hacker in the Wires - audio.lrc | 31.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Peter Shipley - Insteon - False Security and Deceptive Documentation - audio.lrc | 21.6 KiB | 2020 May 16 03:52 |
DEF CON 23 - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - audio.lrc | 30.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - John Menerick - Backdooring Git - audio.lrc | 33.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - audio.lrc | 37.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - audio.lrc | 42.3 KiB | 2020 May 16 03:52 |
DEF CON 23 - AmmonRa - How to hack your way out of home detention - audio.lrc | 26.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Gregory Picket - Staying Persistent in Software Defined Networks - audio.lrc | 41.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings - audio.lrc | 16.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - audio.lrc | 45.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - audio.lrc | 31.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - audio.lrc | 31.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Aaron Grattafiori - Linux Containers - Future or Fantasy - audio.lrc | 41.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Craig Young - How to Train Your RFID Hacking Tools - audio.lrc | 32.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - audio.lrc | 18.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - audio.lrc | 51.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Nadeem Douba - BurpKit - Using WebKit to Own the Web - audio.lrc | 22.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Justin Engler - Secure Messaging for Normal People - audio.lrc | 54.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Bruce Schneier - Questions and Answers - audio.lrc | 40.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - audio.lrc | 41.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - audio.lrc | 37.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Eijah - Crypto for Hackers - audio.lrc | 50.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - audio.lrc | 50.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers - audio.lrc | 58.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Zack Fasel - Seeing through the Fog - audio.lrc | 38.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - audio.lrc | 36.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - audio.lrc | 24.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ian Kline - LTE Recon and Tracking with RTLSDR - audio.lrc | 11.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - audio.lrc | 41.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - audio.lrc | 45.6 KiB | 2020 May 16 03:52 |
DEF CON 23 - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - audio.lrc | 37.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - Closing Ceremonies - audio.lrc | 66.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - audio.lrc | 32.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - David Huerta - Alice and Bob are Really Confused - audio.lrc | 42.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - audio.lrc | 23.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - audio.lrc | 17.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Patrick Wardle - DLL Hijacking on OS X - audio.lrc | 39.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - audio.lrc | 37.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - audio.lrc | 31.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Brent White - Hacking Web Apps - audio.lrc | 34.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Weston Hecker - Goodbye Memory Scraping Malware - audio.lrc | 38.6 KiB | 2020 May 16 03:52 |
DEF CON 23 - Patrick Wardle - Stick That In Your root Pipe and Smoke It - audio.lrc | 42.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - Ask the EFF - The Year in Digital Civil Liberties - audio.lrc | 62.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Tamas Szakaly - Shall We Play a Game - audio.lrc | 26.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - audio.lrc | 24.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ken Westin - Confessions of a Professional Cyber Stalker - audio.lrc | 46.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - DEF CON Comedy Inception - audio.lrc | 74.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - audio.lrc | 13.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - 1057 - RICKASTLEY - audio.lrc | 27.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - audio.lrc | 25.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - audio.lrc | 39.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - ThunderStrike 2- Sith Strike - audio.lrc | 32.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - audio.lrc | 29.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - audio.lrc | 21.3 KiB | 2020 May 16 03:52 |
DEF CON 23 - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - audio.lrc | 44.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Eric-XlogicX-Davisson - REvisiting RE DoS - audio.lrc | 43.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - audio.lrc | 45.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - audio.lrc | 48.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical Attacks - audio.lrc | 34.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - audio.lrc | 22.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - audio.lrc | 15.6 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs - audio.lrc | 36.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - audio.lrc | 34.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - audio.lrc | 36.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - audio.lrc | 48.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - John Seymour - Quantum Classification of Malware - audio.lrc | 32.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - DEF CON 101 The Panel - audio.lrc | 73.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - audio.lrc | 34.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - audio.lrc | 20.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - audio.lrc | 37.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - audio.lrc | 28.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ian Latter - Remote Access - the APT - audio.lrc | 39.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Mike Ryan and Richo Healey - Hacking Electric Skateboards - audio.lrc | 28.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - audio.lrc | 51.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - audio.lrc | 25.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - atlas - Fun with Symboliks - audio.lrc | 28.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - audio.lrc | 38.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - DT and 1057 - Welcome to DEF CON - audio.lrc | 50.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans - audio.lrc | 15.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - audio.lrc | 43.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - audio.lrc | 14.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - audio.lrc | 28.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - miaubiz - Put on your tinfo_t hat if youre my type - audio.lrc | 10.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - audio.lrc | 35.3 KiB | 2020 May 16 03:52 |
DEF CON 23 - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - audio.lrc | 41.3 KiB | 2020 May 16 03:52 |
DEF CON 23 - Sean Pierce - Abusing native Shims for Post Exploitation - audio.lrc | 38.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - audio.lrc | 29.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Chris Sistrunk - NSM 101 for ICS - audio.lrc | 31.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - audio.lrc | 48.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Dr Phil Polstra - One Device to Pwn Them All - audio.lrc | 29.3 KiB | 2020 May 16 03:52 |
DEF CON 23 - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - audio.lrc | 33.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Richard Thieme - Hacking the Human Body and Brain - audio.lrc | 39.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Bruce Potter - A Hackers Guide to Risk - audio.lrc | 38.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - audio.lrc | 61.6 KiB | 2020 May 16 03:52 |
DEF CON 23 - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - audio.lrc | 37.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - audio.lrc | 86.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Rich Kelley - Harness - Powershell Weaponization Made Easy - audio.lrc | 14.1 KiB | 2020 May 16 03:52 |
DEF CON 23 - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - audio.lrc | 47.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - audio.lrc | 42.6 KiB | 2020 May 16 03:52 |
DEF CON 23 - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - audio.lrc | 28.5 KiB | 2020 May 16 03:52 |
DEF CON 23 - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - audio.lrc | 47.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Marte L0ge - Tell me who you are and I will tell you your lock pattern - audio.lrc | 11.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - audio.lrc | 38.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Panel - Contests Closing Ceremonies - audio.lrc | 25.4 KiB | 2020 May 16 03:52 |
DEF CON 23 - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - audio.lrc | 44.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - audio.lrc | 33.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Mike Sconzo - I Am Packer And So Can You - audio.lrc | 39.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks - audio.lrc | 28.7 KiB | 2020 May 16 03:52 |
DEF CON 23 - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - audio.lrc | 41.2 KiB | 2020 May 16 03:52 |
DEF CON 23 - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - audio.lrc | 32.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - audio.lrc | 44.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - audio.lrc | 49.8 KiB | 2020 May 16 03:52 |
DEF CON 23 - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - audio.lrc | 18.9 KiB | 2020 May 16 03:52 |
DEF CON 23 - Dan Kaminsky - I want these bugs off my Internet - audio.lrc | 34.6 KiB | 2020 May 16 03:52 |
DEF CON 23 - Graham and Maynor - HamSammich - long distance proxying over radio - audio.lrc | 26.0 KiB | 2020 May 16 03:52 |
DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - audio.lrc | 36.1 KiB | 2020 May 16 03:52 |