/DEF CON 25/DEF CON 25 presentations/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
Tomer Cohen/-2018-Feb-10 05:26
Steinthor Bjarnason and Jason Jones/-2018-Feb-10 05:26
Romain Coltel and Yves Le Provost/-2018-Feb-10 05:26
Phillip Tully and Michael Raggo/-2018-Feb-10 05:26
Morten Schenk/-2018-Feb-10 05:26
Matt Suiche/-2018-Feb-10 05:26
Matt Knight and Marc Newlin - UPDATED/-2018-Feb-10 05:27
Matt Knight and Marc Newlin/-2018-Feb-10 05:27
Mark Newlin Logan Lamb and Christopher Grayson/-2018-Feb-10 05:26
Josh Pitts/-2018-Feb-10 05:27
Itzik Kotler and Amit Klein/-2018-Feb-10 05:26
Duncan Woodbury and Nicholas Haltmeyer/-2018-Feb-10 05:26
Dor Azouri/-2018-Feb-10 05:26
Dimitry Snezhkov/-2018-Feb-10 05:27
Denton Gentry/-2018-Feb-10 05:27
Cooper Quintin and Kashmir Hill - UPDATED/-2018-Feb-10 05:26
Cheng Lei/-2018-Feb-10 05:26
Alvaro Munoz and Oleksandr Mirosh - UPDATED/-2018-Feb-10 05:26
5A1F/-2018-Feb-10 05:26
DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf1.9 MiB2017-Jul-14 09:48
DEFCON-25-trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf21.7 MiB2017-Aug-10 01:15
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf2.0 MiB2017-Jul-14 09:48
DEFCON-25-spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf2.7 MiB2017-Aug-10 01:14
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf5.8 MiB2017-Jul-08 23:22
DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf5.8 MiB2017-Aug-10 01:14
DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf3.2 MiB2017-Jul-14 09:49
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf5.1 MiB2017-Jul-16 12:33
DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf42.6 MiB2017-Aug-10 01:13
DEFCON-25-Zardus-25-Years-of-Program-Analysis-UPDATED.pdf3.7 MiB2017-Aug-10 01:15
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf1.6 MiB2017-Jul-14 08:45
DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf5.5 MiB2017-Aug-10 01:15
DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf7.5 MiB2017-Jul-14 08:52
DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf2.9 MiB2017-Aug-10 01:15
DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf2.8 MiB2017-Jul-14 08:31
DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf4.9 MiB2017-Jul-16 10:44
DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf2.2 MiB2017-Jul-19 23:19
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf1.9 MiB2017-Jul-16 04:02
DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf3.3 MiB2017-Aug-10 01:15
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf20.7 MiB2017-Jul-14 09:38
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf2.0 MiB2017-Jul-14 09:38
DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf14.8 MiB2017-Aug-10 01:14
DEFCON-25-Tess-Schrodinger-Total-Recall.pdf5.0 MiB2017-Jul-14 08:30
DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf6.2 MiB2017-Jul-16 10:55
DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf6.8 MiB2017-Jul-16 10:57
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf6.0 MiB2017-Jul-14 09:37
DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf3.6 MiB2017-Aug-10 01:14
DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf10.1 MiB2017-Aug-10 01:14
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf911.6 KiB2017-Jul-08 23:23
DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf899.7 KiB2017-Aug-10 01:14
DEFCON-25-Sean-Kanuck-Hacking-Democracy-UPDATED.pdf174.6 KiB2017-Aug-20 20:13
DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf2.0 MiB2017-Jul-14 08:26
DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf5.2 MiB2017-Jul-14 10:04
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf2.5 MiB2017-Jul-16 04:02
DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf1.4 MiB2017-Aug-10 01:14
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf2.2 MiB2017-Jul-16 04:02
DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf2.4 MiB2017-Aug-10 01:14
DEFCON-25-Redezem-PEIMA-Using-Power-Laws-to-Address-DOS-Attacks-UPDATED.pdf750.8 KiB2017-Aug-20 20:14
DEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf6.9 MiB2017-Aug-10 01:14
DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf6.7 MiB2017-Jul-14 08:42
DEFCON-25-Plore-Popping-a-Smart-Gun.pdf4.1 MiB2017-Jul-14 08:58
DEFCON-25-Plore-Popping-a-Smart-Gun-UPDATED.pdf4.2 MiB2017-Aug-10 01:14
DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-UPDATED.pdf6.0 MiB2017-Aug-10 01:14
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf8.4 MiB2017-Jul-16 10:52
DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf15.4 MiB2017-Aug-10 01:14
DEFCON-25-Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf29.3 MiB2017-Aug-10 01:14
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf4.5 MiB2017-Jul-16 10:53
DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf12.4 MiB2017-Aug-10 01:14
DEFCON-25-Panel-Corman-and-Congressmen-DC-to-DEFCON-UPDATED.pdf6.0 MiB2017-Aug-10 01:14
DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf1.9 MiB2017-Jul-19 23:34
DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf5.9 MiB2017-Jul-14 08:46
DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser in-Trending-Programming-Languages-UPDATED.pdf5.1 MiB2017-Aug-20 20:13
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf2.4 MiB2017-Jul-14 08:29
DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf2.6 MiB2017-Aug-10 01:14
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf4.8 MiB2017-Jul-14 09:01
DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf6.7 MiB2017-Aug-10 01:14
DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf1.9 MiB2017-Aug-10 01:14
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf5.5 MiB2017-Jul-14 08:29
DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf5.3 MiB2017-Aug-10 01:14
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf6.5 MiB2017-Jul-14 09:32
DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf4.4 MiB2017-Aug-10 01:14
DEFCON-25-Mickey-Jesse-and-Oleksander-Driving-Down-the-Rabbit-Hole-UPDATED.pdf12.3 MiB2017-Aug-10 01:14
DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf1.3 MiB2017-Jul-08 23:21
DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch-UPDATED.pdf4.8 MiB2017-Aug-10 01:14
DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf6.0 MiB2017-Jul-14 09:11
DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil-UPDATED.pdf5.9 MiB2017-Aug-10 01:14
DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf6.7 MiB2017-Aug-10 01:14
DEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf57.2 MiB2017-Aug-10 01:14
DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf3.0 MiB2017-Jul-14 08:29
DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf3.0 MiB2017-Aug-10 01:14
DEFCON-25-Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf38.9 MiB2017-Aug-10 01:14
DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf290.1 KiB2017-Jul-16 05:42
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf1.5 MiB2017-Jul-15 02:55
DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf1.7 MiB2017-Aug-10 01:14
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf4.5 MiB2017-Jul-14 09:51
DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf4.5 MiB2017-Aug-10 01:14
DEFCON-25-K2-Un-Fucking-Forensics-UPDATED.pdf1.7 MiB2017-Aug-10 01:14
DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf3.5 MiB2017-Aug-10 01:14
DEFCON-25-Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf4.7 MiB2017-Aug-10 01:13
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf131.4 KiB2017-Jul-08 23:23
DEFCON-25-Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf130.3 KiB2017-Aug-10 01:13
DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf2.2 MiB2017-Jul-14 09:48
DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf2.5 MiB2017-Aug-10 01:13
DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf4.2 MiB2017-Jul-14 09:18
DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf10.6 MiB2017-Jul-16 11:54
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf4.2 MiB2017-Jul-14 09:35
DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf3.4 MiB2017-Aug-10 01:13
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf4.1 MiB2017-Jul-16 10:46
DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf26.8 MiB2017-Aug-10 01:13
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf2.0 MiB2017-Jul-16 06:15
DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf2.2 MiB2017-Aug-10 01:13
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf4.6 MiB2017-Jul-15 02:55
DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf4.9 MiB2017-Aug-10 01:13
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf6.0 MiB2017-Jul-16 03:47
DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf9.5 MiB2017-Aug-10 01:13
DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf2.3 MiB2017-Jul-14 08:44
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf250.0 KiB2017-Jul-14 09:07
DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf851.2 KiB2017-Aug-10 01:13
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf2.7 MiB2017-Jul-14 08:46
DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf2.8 MiB2017-Aug-10 01:13
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf4.0 MiB2017-Jul-14 09:00
DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf4.1 MiB2017-Aug-10 01:13
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf2.4 MiB2017-Jul-14 09:36
DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf2.4 MiB2017-Aug-10 01:13
DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf5.5 MiB2017-Aug-10 01:13
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf7.4 MiB2017-Jul-14 08:38
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf1.7 MiB2017-Jul-14 08:38
DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Course-Guide.pdf2.0 MiB2017-Jul-14 08:38
DEFCON-25-FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf4.6 MiB2017-Aug-10 01:13
DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf69.2 KiB2017-Jul-14 08:52
DEFCON-25-Eckert-and-Dewes-Dark-Data-UPDATED.pdf7.5 MiB2017-Aug-20 20:14
DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf9.4 MiB2017-Aug-10 01:13
DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf616.5 KiB2017-Jul-14 09:00
DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf507.4 KiB2017-Aug-10 01:13
DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf799.3 KiB2017-Jul-16 10:43
DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf6.9 MiB2017-Jul-16 04:02
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf2.2 MiB2017-Jul-14 09:17
DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf2.8 MiB2017-Aug-10 01:13
DEFCON-25-DEFCON-101-The-Panel-UPDATED.pdf6.3 MiB2017-Aug-10 01:13
DEFCON-25-Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf9.6 MiB2017-Aug-10 01:13
DEFCON-25-Closing-Slides.pdf8.8 MiB2017-Aug-10 01:13
DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf1.8 MiB2017-Jul-16 10:50
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf5.0 MiB2017-Jul-16 04:02
DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf16.7 MiB2017-Aug-10 01:13
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf2.4 MiB2017-Jul-15 07:50
DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf6.7 MiB2017-Aug-10 01:13
DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf4.3 MiB2017-Jul-16 10:42
DEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf29.9 MiB2017-Aug-10 01:13
DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf3.2 MiB2017-Jul-14 09:02
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf2.5 MiB2017-Jul-11 20:42
DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf6.9 MiB2017-Aug-10 01:13
DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf3.0 MiB2017-Jul-14 09:08
DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf1.8 MiB2017-Jul-15 03:01
DEFCON-25-0ctane-Untrustworthy-Hardware.pdf2.4 MiB2017-Aug-20 20:16
DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf5.7 MiB2017-Aug-20 20:15