Parent directory/ | - | - |
DEF CON 26 - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.srt | 14.2 KiB | 2020 May 16 05:40 |
DEF CON 26 - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.srt | 14.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.srt | 16.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.srt | 16.5 KiB | 2020 May 16 05:40 |
DEF CON 26 - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.srt | 16.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Slava Makkaveev - Man-In-The-Disk.srt | 17.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.srt | 17.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.srt | 18.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.srt | 19.6 KiB | 2020 May 16 05:40 |
DEF CON 26 - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.srt | 19.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.srt | 20.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.srt | 20.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.srt | 20.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Zeng and Panel - Lora Smart Water Meter Security Analysis.srt | 20.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.srt | 20.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.srt | 20.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.srt | 21.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.srt | 22.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Truman Kain - Dragnet Your Social Engineering Sidekick.srt | 22.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - West and Campbell - barcOwned Popping shells with your cereal box.srt | 23.1 KiB | 2020 May 16 05:40 |
DEF CON 26 - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.srt | 24.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - Maggie Mayhem - Sex Work After SESTA FOSTA.srt | 24.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - William Martin - One-Click to OWA.srt | 25.1 KiB | 2020 May 16 05:40 |
DEF CON 26 - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.srt | 25.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.srt | 25.5 KiB | 2020 May 16 05:40 |
DEF CON 26 - Jeanette Manfra - Securing our Nations Election Infrastructure.srt | 25.5 KiB | 2020 May 16 05:40 |
DEF CON 26 - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.srt | 25.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.srt | 25.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.srt | 25.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain.srt | 26.5 KiB | 2020 May 16 05:40 |
DEF CON 26 - Yu Wang - Attacking the macOS Kernel Graphics Driver.srt | 26.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.srt | 26.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.srt | 28.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - 0x200b - Detecting Blue Team Research Through Targeted Ads.srt | 28.5 KiB | 2020 May 16 05:40 |
DEF CON 26 - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.srt | 30.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Christopher Domas - The ring 0 facade awakening the processors inner demons.srt | 30.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.srt | 31.5 KiB | 2020 May 16 05:40 |
DEF CON 26 - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.srt | 32.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - sghctoma - All Your Math are Belong to Us.srt | 32.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.srt | 33.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - Champion and Law - Building the Hacker Tracker.srt | 35.1 KiB | 2020 May 16 05:40 |
DEF CON 26 - yawnbox - Privacy Infrastructure Challenges and Opportunities.srt | 35.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Daniel Crowley and Panel - Outsmarting the Smart City.srt | 36.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.srt | 36.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.srt | 37.2 KiB | 2020 May 16 05:40 |
DEF CON 26 - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.srt | 38.1 KiB | 2020 May 16 05:40 |
DEF CON 26 - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.srt | 38.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.srt | 38.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Delta Zero and Azeem Aqil - Your Voice is My Passport.srt | 38.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.srt | 39.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.srt | 39.6 KiB | 2020 May 16 05:40 |
DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.srt | 40.1 KiB | 2020 May 16 05:40 |
DEF CON 26 - Rob Joyce - Building Absurd Christmas Light Shows.srt | 41.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.srt | 41.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.srt | 42.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.srt | 42.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Egypt and Vu - One-liners to Rule Them All.srt | 43.6 KiB | 2020 May 16 05:40 |
DEF CON 26 - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.srt | 43.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - William Martin - SMBetray Backdooring and breaking signatures.srt | 43.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.srt | 44.1 KiB | 2020 May 16 05:40 |
DEF CON 26 - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.srt | 45.5 KiB | 2020 May 16 05:40 |
DEF CON 26 - Nafeez - Compression Oracle Attacks on VPN Networks.srt | 45.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.srt | 45.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.srt | 46.2 KiB | 2020 May 16 05:40 |
DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the Masses.srt | 46.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.srt | 46.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.srt | 47.6 KiB | 2020 May 16 05:40 |
DEF CON 26 - Levison and hon1nbo - Booby Trapping Boxes.srt | 48.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.srt | 49.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - singe - Practical and Improved Wifi MitM with Mana.srt | 49.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.srt | 50.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Balmas and Itkin - What the Fax.srt | 50.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.srt | 50.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - Steven Danneman - Your Banks Digital Side Door.srt | 50.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.srt | 51.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - Matt Wixey - Betrayed by the keyboard How what you type can give you away.srt | 51.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.srt | 51.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.srt | 51.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity.srt | 52.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.srt | 52.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.srt | 53.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Panel - DC 101 PANEL.srt | 54.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.srt | 54.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - Ossmann and Spill - Revolting Radios.srt | 54.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.srt | 55.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.srt | 55.6 KiB | 2020 May 16 05:40 |
DEF CON 26 - Patrick Wardle - The Mouse is Mightier than the Sword.srt | 55.9 KiB | 2020 May 16 05:40 |
DEF CON 26 - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.srt | 56.1 KiB | 2020 May 16 05:40 |
DEF CON 26 - The Dark Tangent and Panel - Panel DEF CON GROUPS.srt | 56.2 KiB | 2020 May 16 05:40 |
DEF CON 26 - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.srt | 56.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.srt | 58.2 KiB | 2020 May 16 05:40 |
DEF CON 26 - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.srt | 58.5 KiB | 2020 May 16 05:40 |
DEF CON 26 - Ian Haken - Automated Discovery of Deserialization Gadget Chains.srt | 59.2 KiB | 2020 May 16 05:40 |
DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.srt | 61.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.srt | 62.2 KiB | 2020 May 16 05:40 |
DEF CON 26 - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.srt | 62.3 KiB | 2020 May 16 05:40 |
DEF CON 26 - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.srt | 63.6 KiB | 2020 May 16 05:40 |
DEF CON 26 - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.srt | 63.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.srt | 65.6 KiB | 2020 May 16 05:40 |
DEF CON 26 - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.srt | 66.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - smea - Jailbreaking the 3DS through 7 years of hardening.srt | 67.2 KiB | 2020 May 16 05:40 |
DEF CON 26 - Joe Grand - Searching for the Light Adventures with OpticSpy.srt | 68.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.srt | 68.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.srt | 69.0 KiB | 2020 May 16 05:40 |
DEF CON 26 - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory.srt | 86.4 KiB | 2020 May 16 05:40 |
DEF CON 26 - The Dark Tangent - DEF CON 26 Closing Ceremonies.srt | 90.7 KiB | 2020 May 16 05:40 |
DEF CON 26 - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.srt | 93.8 KiB | 2020 May 16 05:40 |
DEF CON 26 - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.mp4 | 21.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4 | 21.8 MiB | 2020 May 26 04:24 |
DEF CON 26 - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.mp4 | 23.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.mp4 | 23.2 MiB | 2020 May 26 04:24 |
DEF CON 26 - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.mp4 | 25.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.mp4 | 25.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.mp4 | 25.5 MiB | 2020 May 26 04:23 |
DEF CON 26 - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.mp4 | 27.8 MiB | 2020 May 26 04:24 |
DEF CON 26 - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.mp4 | 29.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.mp4 | 29.6 MiB | 2020 May 26 04:23 |
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain.mp4 | 30.2 MiB | 2020 May 26 04:24 |
DEF CON 26 - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.mp4 | 30.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - 0x200b - Detecting Blue Team Research Through Targeted Ads.mp4 | 32.2 MiB | 2020 May 26 04:23 |
DEF CON 26 - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.mp4 | 33.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - Truman Kain - Dragnet Your Social Engineering Sidekick.mp4 | 36.1 MiB | 2020 May 26 04:24 |
DEF CON 26 - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.mp4 | 36.9 MiB | 2020 May 26 04:24 |
DEF CON 26 - West and Campbell - barcOwned Popping shells with your cereal box.mp4 | 37.1 MiB | 2020 May 26 04:24 |
DEF CON 26 - William Martin - One-Click to OWA.mp4 | 37.3 MiB | 2020 May 26 04:24 |
DEF CON 26 - Maggie Mayhem - Sex Work After SESTA FOSTA.mp4 | 37.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.mp4 | 39.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.mp4 | 40.4 MiB | 2020 May 26 04:24 |
DEF CON 26 - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.mp4 | 41.6 MiB | 2020 May 26 04:23 |
DEF CON 26 - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.mp4 | 41.8 MiB | 2020 May 26 04:23 |
DEF CON 26 - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.mp4 | 42.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.mp4 | 42.3 MiB | 2020 May 26 04:24 |
DEF CON 26 - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.mp4 | 42.4 MiB | 2020 May 26 04:24 |
DEF CON 26 - Slava Makkaveev - Man-In-The-Disk.mp4 | 42.6 MiB | 2020 May 26 04:24 |
DEF CON 26 - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.mp4 | 44.8 MiB | 2020 May 26 04:24 |
DEF CON 26 - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.mp4 | 45.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.mp4 | 45.6 MiB | 2020 May 26 04:24 |
DEF CON 26 - Jeanette Manfra - Securing our Nations Election Infrastructure.mp4 | 45.9 MiB | 2020 May 26 04:24 |
DEF CON 26 - Zeng and Panel - Lora Smart Water Meter Security Analysis.mp4 | 46.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.mp4 | 49.1 MiB | 2020 May 26 04:24 |
DEF CON 26 - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.mp4 | 49.1 MiB | 2020 May 26 04:24 |
DEF CON 26 - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.mp4 | 49.2 MiB | 2020 May 26 04:24 |
DEF CON 26 - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.mp4 | 49.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.mp4 | 50.4 MiB | 2020 May 26 04:24 |
DEF CON 26 - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.mp4 | 51.1 MiB | 2020 May 26 04:23 |
DEF CON 26 - Yu Wang - Attacking the macOS Kernel Graphics Driver.mp4 | 51.3 MiB | 2020 May 26 04:24 |
DEF CON 26 - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.mp4 | 51.4 MiB | 2020 May 26 04:23 |
DEF CON 26 - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.mp4 | 51.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Christopher Domas - The ring 0 facade awakening the processors inner demons.mp4 | 53.8 MiB | 2020 May 26 04:23 |
DEF CON 26 - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.mp4 | 54.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.mp4 | 55.4 MiB | 2020 May 26 04:24 |
DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.mp4 | 55.4 MiB | 2020 May 26 04:24 |
DEF CON 26 - smea - Jailbreaking the 3DS through 7 years of hardening.mp4 | 56.1 MiB | 2020 May 26 04:24 |
DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.mp4 | 56.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Daniel Crowley and Panel - Outsmarting the Smart City.mp4 | 56.8 MiB | 2020 May 26 04:23 |
DEF CON 26 - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.mp4 | 57.3 MiB | 2020 May 26 04:23 |
DEF CON 26 - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.mp4 | 57.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Patrick Wardle - The Mouse is Mightier than the Sword.mp4 | 57.8 MiB | 2020 May 26 04:24 |
DEF CON 26 - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.mp4 | 59.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Nafeez - Compression Oracle Attacks on VPN Networks.mp4 | 59.6 MiB | 2020 May 26 04:24 |
DEF CON 26 - Ian Haken - Automated Discovery of Deserialization Gadget Chains.mp4 | 59.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Steven Danneman - Your Banks Digital Side Door.mp4 | 60.1 MiB | 2020 May 26 04:24 |
DEF CON 26 - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.mp4 | 60.7 MiB | 2020 May 26 04:23 |
DEF CON 26 - Egypt and Vu - One-liners to Rule Them All.mp4 | 60.9 MiB | 2020 May 26 04:23 |
DEF CON 26 - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.mp4 | 61.4 MiB | 2020 May 26 04:24 |
DEF CON 26 - Champion and Law - Building the Hacker Tracker.mp4 | 62.3 MiB | 2020 May 26 04:23 |
DEF CON 26 - singe - Practical and Improved Wifi MitM with Mana.mp4 | 62.9 MiB | 2020 May 26 04:24 |
DEF CON 26 - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.mp4 | 65.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.mp4 | 66.7 MiB | 2020 May 26 04:23 |
DEF CON 26 - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.mp4 | 68.4 MiB | 2020 May 26 04:24 |
DEF CON 26 - Eyal Itkin, Yaniv Balmas - What the Fax-!.mp4 | 68.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.mp4 | 69.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.mp4 | 69.4 MiB | 2020 May 26 04:23 |
DEF CON 26 - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.mp4 | 70.8 MiB | 2020 May 26 04:24 |
DEF CON 26 - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.mp4 | 71.1 MiB | 2020 May 26 04:23 |
DEF CON 26 - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.mp4 | 71.4 MiB | 2020 May 26 04:24 |
DEF CON 26 - Rob Joyce - Building Absurd Christmas Light Shows.mp4 | 74.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the Masses.mp4 | 75.2 MiB | 2020 May 26 04:24 |
DEF CON 26 - yawnbox - Privacy Infrastructure Challenges and Opportunities.mp4 | 77.6 MiB | 2020 May 26 04:24 |
DEF CON 26 - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.mp4 | 80.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.mp4 | 81.9 MiB | 2020 May 26 04:23 |
DEF CON 26 - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.mp4 | 82.0 MiB | 2020 May 26 04:23 |
DEF CON 26 - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.mp4 | 88.8 MiB | 2020 May 26 04:24 |
DEF CON 26 - sghctoma - All Your Math are Belong to Us.mp4 | 90.2 MiB | 2020 May 26 04:24 |
DEF CON 26 - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.mp4 | 90.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 | 92.1 MiB | 2020 May 26 04:24 |
DEF CON 26 - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.mp4 | 97.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Delta Zero and Azeem Aqil - Your Voice is My Passport.mp4 | 100.3 MiB | 2020 May 26 04:23 |
DEF CON 26 - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.mp4 | 100.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.mp4 | 102.6 MiB | 2020 May 26 04:24 |
DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.mp4 | 105.4 MiB | 2020 May 26 04:23 |
DEF CON 26 - William Martin - SMBetray Backdooring and breaking signatures.mp4 | 105.9 MiB | 2020 May 26 04:24 |
DEF CON 26 - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.mp4 | 108.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Joe Grand - Searching for the Light Adventures with OpticSpy.mp4 | 109.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.mp4 | 109.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Matt Wixey - Betrayed by the keyboard How what you type can give you away.mp4 | 112.2 MiB | 2020 May 26 04:24 |
DEF CON 26 - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.mp4 | 113.6 MiB | 2020 May 26 04:24 |
DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.mp4 | 114.4 MiB | 2020 May 26 04:23 |
DEF CON 26 - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.mp4 | 121.3 MiB | 2020 May 26 04:24 |
DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity.mp4 | 127.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.mp4 | 128.1 MiB | 2020 May 26 04:23 |
DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.mp4 | 134.6 MiB | 2020 May 26 04:24 |
DEF CON 26 - Ossmann and Spill - Revolting Radios.mp4 | 141.3 MiB | 2020 May 26 04:24 |
DEF CON 26 - Levison and hon1nbo - Booby Trapping Boxes.mp4 | 141.3 MiB | 2020 May 26 04:24 |
DEF CON 26 - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.mp4 | 142.7 MiB | 2020 May 26 04:24 |
DEF CON 26 - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.mp4 | 150.1 MiB | 2020 May 26 04:23 |
DEF CON 26 - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.mp4 | 159.1 MiB | 2020 May 26 04:24 |
DEF CON 26 - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.mp4 | 165.5 MiB | 2020 May 26 04:24 |
DEF CON 26 - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.mp4 | 174.0 MiB | 2020 May 26 04:24 |
DEF CON 26 - The Dark Tangent and Panel - Panel DEF CON GROUPS.mp4 | 174.8 MiB | 2020 May 26 04:24 |
DEF CON 26 - Panel - DC 101 PANEL.mp4 | 188.3 MiB | 2020 May 26 04:24 |
DEF CON 26 - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.mp4 | 251.3 MiB | 2020 May 26 04:23 |
DEF CON 26 - The Dark Tangent - DEF CON 26 Closing Ceremonies.mp4 | 360.0 MiB | 2020 May 26 04:24 |