Parent directory/ | - | - |
DEF CON 24 - Yonathan Klijnsma and Dan Tentler - Stargate - Pivoting Through VNC.opus | 14.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Zero_Chaos and Granolocks - Realtime bluetooth device detection Blue Hydra.opus | 23.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Zack Fasel and Erin Jacobs - I Fight For The Users - Episode I.opus | 32.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Willa Cassandra Riggins and abyssknight - Esoteric Exfiltration.opus | 13.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Tim Estell and Katea Murray - NPRE - Eavesdropping on the Machines.opus | 24.9 MiB | 2020 May 27 01:01 |
DEF CON 24 - Wesley McGrew - Secure Penetration Testing Operations - Demonstrated Weaknesses.opus | 27.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and Point of Sale systems.opus | 34.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Tom Kopchak - Sentient Storage - Do SSDs Have a Mind of Their Own.opus | 36.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Weston Hecker - Hacking Next Gen ATMs From Capture to Cashout.opus | 21.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Ulf Frisk - Direct Memory Attack the Kernel.opus | 31.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Shellphish Panel - Cyber Grand Shellphish.opus | 36.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Six_Volts and Haystack - Cheap Tools for Hacking Heavy Trucks.opus | 15.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Terrell McSweeny and Lorrie Cranor - Research on the Machines - Help the FTC.opus | 31.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Tamas Szakaly - Help - Ive got ANTs.opus | 27.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - The Bob Ross Fan Club - Propaganda - you and your devices.opus | 27.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Stephan Huber and Siegfried Rasthofer - Smartphone Antivirus and Apps Under Fire.opus | 27.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Ricky HeadlessZeke Lawshae - Network Attacks Against Physical Security Systems.opus | 19.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Sean Metcalf - Beyond the MCSE - Red Teaming Active Directory.opus | 30.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Shane Steiger - Maelstrom - Are You Playing with a Full Deck.opus | 31.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Rogan Dawes and Dominic White - Universal Serial aBUSe.opus | 32.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Ronny Bull - Dr Matthews - Kaitlin Trumbull - Attacks in Virtualized Environments.opus | 29.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Salvador Mendoza - Samsung Pay - Tokenized Numbers - Flaws and Issues.opus | 8.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Panel - Kor Adana - Dark Tangent - Marc Rogers - Mr Robot Panel.opus | 52.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Richard Thieme - Playing Through Pain - The Impact of Secrets and Dark Knowledge.opus | 35.3 MiB | 2020 May 27 01:01 |
DEF CON 24 - Radia Perlman - How to design distributed systems resilient.opus | 32.2 MiB | 2020 May 27 01:01 |
DEF CON 24 - Plore - Side-channel attacks on high security electronic safe locks.opus | 13.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - regilero - Hiding Wookiees in HTTP - HTTP smuggling.opus | 26.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Przemek Jaroszewski - Hacking boarding passes for fun and profit.opus | 31.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Patrick Wardle - Ive got 99 Problems - but LittleSnitch aint one.opus | 13.3 MiB | 2020 May 27 01:01 |
DEF CON 24 - Mudge Zatko and Sarah Zatko - Project CITL.opus | 31.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Panel - Ask the EFF.opus | 17.2 MiB | 2020 May 27 01:01 |
DEF CON 24 - Panel - Closing Ceremonies.opus | 57.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Nate Cardozo - Crypto State of the Law.opus | 28.9 MiB | 2020 May 27 01:01 |
DEF CON 24 - Mickey Shkatov and Panel - How to Make Your Own DEF CON Black Badge.opus | 33.0 MiB | 2020 May 27 01:01 |
DEF CON 24 - Mike - Use Their Machines Against Them - Loading Code with a Copier.opus | 19.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Mike Walker and Dr Arati Prabhakar - DARPA Cyber Grand Challenge Award Ceremony.opus | 18.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS.opus | 14.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - MasterChen - Weaponize Your Feature Codes.opus | 28.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Matteo Beccaro and Matteo Collura - Abusing Smart Cities.opus | 26.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Ladar Levison - Compelled Decryption - State of the Art in Doctrinal Perversions.opus | 25.0 MiB | 2020 May 27 01:01 |
DEF CON 24 - Marco Grassi and Qidan He - Escaping The Sandbox By Not Breaking It.opus | 30.0 MiB | 2020 May 27 01:01 |
DEF CON 24 - Lucas Lundgren and Neal Hindocha - Light-Weight Protocol - Critical Implications.opus | 30.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Marc Newlin - MouseJack - Injecting Keystrokes into Wireless Mice.opus | 32.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Luke Young - Attacking Network Infrastructure to Generate a 4 Tbs DDoS.opus | 25.2 MiB | 2020 May 27 01:01 |
DEF CON 24 - LosT - Hacker Fundamentals and Cutting Through Abstraction.opus | 26.3 MiB | 2020 May 27 01:01 |
DEF CON 24 - Linuz and Medic - Sticky Keys To The Kingdom - Pre-auth RCE.opus | 15.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - K2 - BlockFighting with a Hooker - BlockfFghter2.opus | 26.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - L0sT and The Dark Tangent - DEF CON Welcome and Badge Talk.opus | 18.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - JusticeBeaver - Discovering and Triangulating Rogue Cell Towers.opus | 25.0 MiB | 2020 May 27 01:01 |
DEF CON 24 - Kai Zhong - 411 - A framework for managing security alerts.opus | 28.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Karyn Benson - Examining the Internets pollution.opus | 25.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Joshua Drake and Steve Christey Coley - Vulnerabilities 101.opus | 29.9 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jonathan-Christofer Demay and Arnaud Lebrun - CANSPY - Auditing CAN Devices.opus | 11.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jonathan-Christofer Demay - Auditing 6LoWPAN Networks using Standard Tools.opus | 21.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Joe Grand and Zoz - BSODomizer HD - A mischievous FPGA HDMI platform.opus | 33.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jonathan Mayer - Panel - Meet the Feds.opus | 30.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Joe FitzPatrick and Joe Grand - 101 Ways to Brick your Hardware.opus | 33.0 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jonathan Brossard - Intro to Wichcraft Compiler Collection.opus | 30.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jay Healey - Feds and 0Days - From Before Heartbleed to After FBI-Apple.opus | 30.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jennifer Granick - Slouching Towards Utopia - The State of the Internet Dream.opus | 35.9 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jianhao Liu - Wenyuan Xu - Chen Yan - Can You Trust Autonomous Vehicles.opus | 29.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jay Beale and Larry Pesce - Phishing without Failure and Frustration.opus | 32.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jmaxxz - Backdooring the Frontdoor.opus | 24.9 MiB | 2020 May 27 01:01 |
DEF CON 24 - Javier Vazquez Vidal and Ferdinand Noelscher - CAN i haz car secret plz.opus | 16.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Hendrik Schmidt and Brian Butterly - Attacking BaseStations.opus | 32.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - James Loureiro and Georgi Geshev - Platform Agnostic Kernel Fuzzing.opus | 28.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - int0x80 - Anti-Forensics AF.opus | 25.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jake Kambic - Cunning with CNG - Soliciting Secrets from Schannel.opus | 26.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Jake Kouns - Cyber Who Done It - Attribution Analysis Through Arrest History.opus | 32.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Hunter Scott - RT to win - 50 lines of Python made me the luckiest guy on Twitter.opus | 13.3 MiB | 2020 May 27 01:01 |
DEF CON 24 - Haoqi Shan and Wanqiao Zhang - Forcing a Targeted LTE phone into Unsafe Network.opus | 24.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Hacker Jeopardy Part 2.opus | 70.3 MiB | 2020 May 27 01:01 |
DEF CON 24 - Guevara Noubir and Amirali Sanatinia - Exposing Snooping Tor HSDir Relays.opus | 17.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Hacker Jeopardy Part 1.opus | 69.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Dr Phil - Mouse Jiggler Offense and Defense.opus | 31.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - goldfisk and follower - Breaking the Internet of Vibrating Things.opus | 13.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks.opus | 13.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Fred Bret-Mounet - All Your Solar Panels are belong to Me.opus | 15.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Dr Paul Vixie - Frontrunning The Frontrunners.opus | 13.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Evan Booth Fort - Jittery MacGyver - Building a Bionic Hand out of a Coffee Maker.opus | 33.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Elie Bursztein - Celine Bursztein - Jean Michel Picod - Cheating at Poker.opus | 20.3 MiB | 2020 May 27 01:01 |
DEF CON 24 - DC101 - DEF CON 101 Panel.opus | 62.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - CINCVolFLT - AK3R303 - NG911 - The Next Gen of Emergency Ph0nage.opus | 32.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Dan AltF4 Petro - Reversing Video Games to Create an Unbeatable AI Player.opus | 30.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Delta Zero and KingPhish3r - Weaponizing Data Science for Social Engineering.opus | 33.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Clarence Chio - Machine Duping 101 - Pwning Deep Learning Systems.opus | 30.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Brad Woodberg - Malware Command and Control Channels - A journey into darkness.opus | 33.0 MiB | 2020 May 27 01:01 |
DEF CON 24 - Bryant Zadegan and Ryan Lester - Abusing Web Standards for AppSec Glory.opus | 32.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Brian Gorenc and Fritz Sands - State of the Union for SCADA HMI Vulnerabilities.opus | 28.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Chris Eagle - Sk3wlDbg - Emulating many of the things with Ida.opus | 34.1 MiB | 2020 May 27 01:01 |
DEF CON 24 - Chris Rock - How to overthrow a Government.opus | 31.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Anthony Rose - Ben Ramsey - Picking Bluetooth Low Energy Locks a Quarter Mile Away.opus | 27.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Benjamin Holland - Developing Managed Code Rootkits for Java Runtime Environment.opus | 27.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - bigezy and saci - An introduction to Pinworm - MITM for your metadata.opus | 22.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Ang Cui - A Monitor Darkly - Reversing and Exploiting Ubiquitous.opus | 23.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - ashmastaflash - SITCH - Inexpensive Coordinated GSM Anomaly Detection.opus | 28.5 MiB | 2020 May 27 01:01 |
DEF CON 24 - Brad Dixon - pin2pwn - How to Root an Embedded Linux Box with a Sewing Needle.opus | 11.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Bertin Bervis Bonilla and James Jara - Exploiting seismological networks Remotely.opus | 28.2 MiB | 2020 May 27 01:01 |
DEF CON 24 - Anch - So you think you want to be a penetration tester.opus | 28.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Andy Robbins - Rohan Vazarkar - Will Schroeder - Six Degrees of Domain Admin.opus | 32.7 MiB | 2020 May 27 01:01 |
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine - Detecting - Evading - Attacking.opus | 33.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Allan Cecil - Robot Hacks - TASBot Exploits Consoles with Custom Controllers.opus | 29.9 MiB | 2020 May 27 01:01 |
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies - Bypassing HTTPS.opus | 31.0 MiB | 2020 May 27 01:01 |
DEF CON 24 - 3AlarmLampScooter - DIY Nukeproofing - a new dig at data-mining.opus | 12.8 MiB | 2020 May 27 01:01 |
DEF CON 24 - Aaron Luo - Drones Hijacking - multi-dimensional attack vectors - countermeasures.opus | 31.4 MiB | 2020 May 27 01:01 |
DEF CON 24 - Adam Donenfeld - Stumping the Mobile Chipset.opus | 30.6 MiB | 2020 May 27 01:01 |
DEF CON 24 - Tom Kopchak - Sentient Storage - Do SSDs Have a Mind of Their Own.lrc | 51.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Ulf Frisk - Direct Memory Attack the Kernel.lrc | 36.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Richard Thieme - Playing Through Pain - The Impact of Secrets and Dark Knowledge.lrc | 54.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - Bertin Bervis Bonilla and James Jara - Exploiting seismological networks Remotely.lrc | 34.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Tamas Szakaly - Help - Ive got ANTs.lrc | 32.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Brad Dixon - pin2pwn - How to Root an Embedded Linux Box with a Sewing Needle.lrc | 17.3 KiB | 2020 May 16 02:40 |
DEF CON 24 - Ricky HeadlessZeke Lawshae - Network Attacks Against Physical Security Systems.lrc | 24.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks.lrc | 18.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Luke Young - Attacking Network Infrastructure to Generate a 4 Tbs DDoS.lrc | 41.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Mickey Shkatov and Panel - How to Make Your Own DEF CON Black Badge.lrc | 48.3 KiB | 2020 May 16 02:40 |
DEF CON 24 - Marc Newlin - MouseJack - Injecting Keystrokes into Wireless Mice.lrc | 51.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jennifer Granick - Slouching Towards Utopia - The State of the Internet Dream.lrc | 55.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Allan Cecil - Robot Hacks - TASBot Exploits Consoles with Custom Controllers.lrc | 47.9 KiB | 2020 May 16 02:40 |
DEF CON 24 - DC101 - DEF CON 101 Panel.lrc | 81.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Dan AltF4 Petro - Reversing Video Games to Create an Unbeatable AI Player.lrc | 58.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - Chris Rock - How to overthrow a Government.lrc | 36.9 KiB | 2020 May 16 02:40 |
DEF CON 24 - int0x80 - Anti-Forensics AF.lrc | 36.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - ashmastaflash - SITCH - Inexpensive Coordinated GSM Anomaly Detection.lrc | 45.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - K2 - BlockFighting with a Hooker - BlockfFghter2.lrc | 39.0 KiB | 2020 May 16 02:40 |
DEF CON 24 - Joe FitzPatrick and Joe Grand - 101 Ways to Brick your Hardware.lrc | 66.1 KiB | 2020 May 16 02:40 |
DEF CON 24 - Kai Zhong - 411 - A framework for managing security alerts.lrc | 43.3 KiB | 2020 May 16 02:40 |
DEF CON 24 - 3AlarmLampScooter - DIY Nukeproofing - a new dig at data-mining.lrc | 23.0 KiB | 2020 May 16 02:40 |
DEF CON 24 - Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS.lrc | 21.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - LosT - Hacker Fundamentals and Cutting Through Abstraction.lrc | 44.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jonathan Brossard - Intro to Wichcraft Compiler Collection.lrc | 40.9 KiB | 2020 May 16 02:40 |
DEF CON 24 - Plore - Side-channel attacks on high security electronic safe locks.lrc | 22.0 KiB | 2020 May 16 02:40 |
DEF CON 24 - Panel - Closing Ceremonies.lrc | 79.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Hunter Scott - RT to win - 50 lines of Python made me the luckiest guy on Twitter.lrc | 21.9 KiB | 2020 May 16 02:40 |
DEF CON 24 - James Loureiro and Georgi Geshev - Platform Agnostic Kernel Fuzzing.lrc | 48.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Anthony Rose - Ben Ramsey - Picking Bluetooth Low Energy Locks a Quarter Mile Away.lrc | 51.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Shellphish Panel - Cyber Grand Shellphish.lrc | 53.3 KiB | 2020 May 16 02:40 |
DEF CON 24 - CINCVolFLT - AK3R303 - NG911 - The Next Gen of Emergency Ph0nage.lrc | 63.0 KiB | 2020 May 16 02:40 |
DEF CON 24 - Evan Booth Fort - Jittery MacGyver - Building a Bionic Hand out of a Coffee Maker.lrc | 45.1 KiB | 2020 May 16 02:40 |
DEF CON 24 - Karyn Benson - Examining the Internets pollution.lrc | 35.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - Mudge Zatko and Sarah Zatko - Project CITL.lrc | 56.1 KiB | 2020 May 16 02:40 |
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and Point of Sale systems.lrc | 53.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - Chris Eagle - Sk3wlDbg - Emulating many of the things with Ida.lrc | 57.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jonathan-Christofer Demay - Auditing 6LoWPAN Networks using Standard Tools.lrc | 29.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Patrick Wardle - Ive got 99 Problems - but LittleSnitch aint one.lrc | 23.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - The Bob Ross Fan Club - Propaganda - you and your devices.lrc | 46.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - Fred Bret-Mounet - All Your Solar Panels are belong to Me.lrc | 18.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Zack Fasel and Erin Jacobs - I Fight For The Users - Episode I.lrc | 59.0 KiB | 2020 May 16 02:40 |
DEF CON 24 - Adam Donenfeld - Stumping the Mobile Chipset.lrc | 39.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jmaxxz - Backdooring the Frontdoor.lrc | 42.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine - Detecting - Evading - Attacking.lrc | 49.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jonathan Mayer - Panel - Meet the Feds.lrc | 48.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Willa Cassandra Riggins and abyssknight - Esoteric Exfiltration.lrc | 21.9 KiB | 2020 May 16 02:40 |
DEF CON 24 - L0sT and The Dark Tangent - DEF CON Welcome and Badge Talk.lrc | 30.0 KiB | 2020 May 16 02:40 |
DEF CON 24 - Ronny Bull - Dr Matthews - Kaitlin Trumbull - Attacks in Virtualized Environments.lrc | 51.9 KiB | 2020 May 16 02:40 |
DEF CON 24 - Matteo Beccaro and Matteo Collura - Abusing Smart Cities.lrc | 37.1 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jonathan-Christofer Demay and Arnaud Lebrun - CANSPY - Auditing CAN Devices.lrc | 15.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Dr Phil - Mouse Jiggler Offense and Defense.lrc | 44.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - goldfisk and follower - Breaking the Internet of Vibrating Things.lrc | 23.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Salvador Mendoza - Samsung Pay - Tokenized Numbers - Flaws and Issues.lrc | 11.1 KiB | 2020 May 16 02:40 |
DEF CON 24 - Elie Bursztein - Celine Bursztein - Jean Michel Picod - Cheating at Poker.lrc | 31.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - Clarence Chio - Machine Duping 101 - Pwning Deep Learning Systems.lrc | 46.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Bryant Zadegan and Ryan Lester - Abusing Web Standards for AppSec Glory.lrc | 51.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Delta Zero and KingPhish3r - Weaponizing Data Science for Social Engineering.lrc | 54.3 KiB | 2020 May 16 02:40 |
DEF CON 24 - Shane Steiger - Maelstrom - Are You Playing with a Full Deck.lrc | 44.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Sean Metcalf - Beyond the MCSE - Red Teaming Active Directory.lrc | 52.9 KiB | 2020 May 16 02:40 |
DEF CON 24 - Marco Grassi and Qidan He - Escaping The Sandbox By Not Breaking It.lrc | 42.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Panel - Ask the EFF.lrc | 27.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - Terrell McSweeny and Lorrie Cranor - Research on the Machines - Help the FTC.lrc | 54.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Mike Walker and Dr Arati Prabhakar - DARPA Cyber Grand Challenge Award Ceremony.lrc | 23.0 KiB | 2020 May 16 02:40 |
DEF CON 24 - Joe Grand and Zoz - BSODomizer HD - A mischievous FPGA HDMI platform.lrc | 58.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - Brian Gorenc and Fritz Sands - State of the Union for SCADA HMI Vulnerabilities.lrc | 46.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Wesley McGrew - Secure Penetration Testing Operations - Demonstrated Weaknesses.lrc | 45.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Rogan Dawes and Dominic White - Universal Serial aBUSe.lrc | 44.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - Aaron Luo - Drones Hijacking - multi-dimensional attack vectors - countermeasures.lrc | 20.1 KiB | 2020 May 16 02:40 |
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies - Bypassing HTTPS.lrc | 52.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Mike - Use Their Machines Against Them - Loading Code with a Copier.lrc | 38.3 KiB | 2020 May 16 02:40 |
DEF CON 24 - Zero_Chaos and Granolocks - Realtime bluetooth device detection Blue Hydra.lrc | 38.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - JusticeBeaver - Discovering and Triangulating Rogue Cell Towers.lrc | 42.3 KiB | 2020 May 16 02:40 |
DEF CON 24 - MasterChen - Weaponize Your Feature Codes.lrc | 43.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - bigezy and saci - An introduction to Pinworm - MITM for your metadata.lrc | 30.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - Brad Woodberg - Malware Command and Control Channels - A journey into darkness.lrc | 61.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Javier Vazquez Vidal and Ferdinand Noelscher - CAN i haz car secret plz.lrc | 22.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - Joshua Drake and Steve Christey Coley - Vulnerabilities 101.lrc | 54.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Anch - So you think you want to be a penetration tester.lrc | 40.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Andy Robbins - Rohan Vazarkar - Will Schroeder - Six Degrees of Domain Admin.lrc | 49.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - Nate Cardozo - Crypto State of the Law.lrc | 44.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Stephan Huber and Siegfried Rasthofer - Smartphone Antivirus and Apps Under Fire.lrc | 37.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Tim Estell and Katea Murray - NPRE - Eavesdropping on the Machines.lrc | 43.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jake Kambic - Cunning with CNG - Soliciting Secrets from Schannel.lrc | 51.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Radia Perlman - How to design distributed systems resilient.lrc | 45.8 KiB | 2020 May 16 02:40 |
DEF CON 24 - regilero - Hiding Wookiees in HTTP - HTTP smuggling.lrc | 29.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jake Kouns - Cyber Who Done It - Attribution Analysis Through Arrest History.lrc | 53.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jay Beale and Larry Pesce - Phishing without Failure and Frustration.lrc | 56.9 KiB | 2020 May 16 02:40 |
DEF CON 24 - Panel - Kor Adana - Dark Tangent - Marc Rogers - Mr Robot Panel.lrc | 94.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Ladar Levison - Compelled Decryption - State of the Art in Doctrinal Perversions.lrc | 32.1 KiB | 2020 May 16 02:40 |
DEF CON 24 - Lucas Lundgren and Neal Hindocha - Light-Weight Protocol - Critical Implications.lrc | 38.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Six_Volts and Haystack - Cheap Tools for Hacking Heavy Trucks.lrc | 23.5 KiB | 2020 May 16 02:40 |
DEF CON 24 - Guevara Noubir and Amirali Sanatinia - Exposing Snooping Tor HSDir Relays.lrc | 24.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Yonathan Klijnsma and Dan Tentler - Stargate - Pivoting Through VNC.lrc | 22.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - Dr Paul Vixie - Frontrunning The Frontrunners.lrc | 18.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Hendrik Schmidt and Brian Butterly - Attacking BaseStations.lrc | 41.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jianhao Liu - Wenyuan Xu - Chen Yan - Can You Trust Autonomous Vehicles.lrc | 39.4 KiB | 2020 May 16 02:40 |
DEF CON 24 - Linuz and Medic - Sticky Keys To The Kingdom - Pre-auth RCE.lrc | 29.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Haoqi Shan and Wanqiao Zhang - Forcing a Targeted LTE phone into Unsafe Network.lrc | 26.2 KiB | 2020 May 16 02:40 |
DEF CON 24 - Weston Hecker - Hacking Next Gen ATMs From Capture to Cashout.lrc | 41.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Ang Cui - A Monitor Darkly - Reversing and Exploiting Ubiquitous.lrc | 41.6 KiB | 2020 May 16 02:40 |
DEF CON 24 - Przemek Jaroszewski - Hacking boarding passes for fun and profit.lrc | 44.7 KiB | 2020 May 16 02:40 |
DEF CON 24 - Benjamin Holland - Developing Managed Code Rootkits for Java Runtime Environment.lrc | 48.1 KiB | 2020 May 16 02:40 |
DEF CON 24 - Jay Healey - Feds and 0Days - From Before Heartbleed to After FBI-Apple.lrc | 53.4 KiB | 2020 May 16 02:40 |