Media Server
Home
|
Mastodon
|
Forums
|
Groups
|
FAQ
|
RSS
|
.onion
|
/DEF CON 27/DEF CON 27 video and slides/
File Name
↓
File Size
↓
Date
↓
Parent directory/
-
-
DEF CON 27 video and slides captions/
-
2024 Jul 26 03:06
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.mp4
30.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Alexandre Borges - NET Malware Threats Internals And Reversing.mp4
30.4 MiB
2024 Jun 26 00:57
DEF CON 27 - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.mp4
59.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Alon Weinberg - Please Inject Me a x64 Code Injection.mp4
15.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Alvaro Munoz - SSO Wars The Token Menace.mp4
31.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.mp4
40.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.mp4
19.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Anish Athalye - Want Strong Isolation Just Reset Your Processor.mp4
31.4 MiB
2024 Jun 26 00:57
DEF CON 27 - Ariel Herbert-Voss - Don't Red-Team AI Like a Chump.mp4
29.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.mp4
16.9 MiB
2024 Jun 26 00:57
DEF CON 27 - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.mp4
35.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.mp4
36.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Bill Graydon - Duplicating Restricted Mechanical Keys.mp4
48.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Bill Swearingen - HAKC THE POLICE.mp4
39.5 MiB
2024 Jun 26 00:57
DEF CON 27 - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.mp4
34.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.mp4
15.8 MiB
2024 Jun 26 00:57
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest.mp4
52.6 MiB
2024 Jun 26 00:57
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now.mp4
32.0 MiB
2024 Jun 26 00:57
DEF CON 27 - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.mp4
26.4 MiB
2024 Jun 26 00:57
DEF CON 27 - Christopher Wade - Tag-side attacks against NFC.mp4
30.5 MiB
2024 Jun 26 00:57
DEF CON 27 - Contests and Events - Contests Awards Ceremony.mp4
85.4 MiB
2024 Jun 26 00:57
DEF CON 27 - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.mp4
32.6 MiB
2024 Jun 26 00:57
DEF CON 27 - Daniel Romero - Why You Should Fear Your mundane Office Equipment.mp4
40.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.mp4
35.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.mp4
31.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.mp4
29.5 MiB
2024 Jun 26 00:57
DEF CON 27 - Douglas McKee - HVACking Understand the Delta Between Security and Reality.mp4
29.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.mp4
17.9 MiB
2024 Jun 26 00:57
DEF CON 27 - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Others Auto Infractions.mp4
22.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.mp4
33.0 MiB
2024 Jun 26 00:57
DEF CON 27 - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.mp4
35.4 MiB
2024 Jun 26 00:57
DEF CON 27 - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.mp4
30.3 MiB
2024 Jun 26 00:57
DEF CON 27 - finalphoenix - Rise of the Hypebots Scripting Streetwear.mp4
38.3 MiB
2024 Jun 26 00:57
DEF CON 27 - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.mp4
28.9 MiB
2024 Jun 26 00:57
DEF CON 27 - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.mp4
36.0 MiB
2024 Jun 26 00:57
DEF CON 27 - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.mp4
21.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Hadrien Barral - The ABC of Next-Gen Shellcoding.mp4
29.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Hila Cohen - Malproxy Leave Your Malware at Home.mp4
21.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.mp4
44.4 MiB
2024 Jun 26 00:57
DEF CON 27 - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.mp4
33.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.mp4
32.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.mp4
49.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Jayson Grace - MOSE Using Configuration Management for Evil.mp4
36.6 MiB
2024 Jun 26 00:57
DEF CON 27 - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.mp4
33.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Jens Muller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.mp4
15.6 MiB
2024 Jun 26 00:57
DEF CON 27 - Jesse Michael - Get Off the Kernel if You Cant Drive.mp4
35.8 MiB
2024 Jun 26 00:57
DEF CON 27 - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.mp4
19.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Jmaxxz - Your Car is My Car.mp4
54.9 MiB
2024 Jun 26 00:57
DEF CON 27 - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.mp4
37.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.mp4
33.6 MiB
2024 Jun 26 00:57
DEF CON 27 - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.mp4
76.5 MiB
2024 Jun 26 00:57
DEF CON 27 - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.mp4
27.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.mp4
30.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.mp4
33.9 MiB
2024 Jun 26 00:57
DEF CON 27 - Kyle Gwinnup - Next Generation Process Emulation with Binee.mp4
32.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Leon Jacobs - Meticulously Modern Mobile Manipulations.mp4
36.8 MiB
2024 Jun 26 00:57
DEF CON 27 - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.mp4
32.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Marina Simakov - Relaying Credentials Has Never Been Easier.mp4
36.4 MiB
2024 Jun 26 00:57
DEF CON 27 - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.mp4
30.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Michael Leibowitz - EDR Is Coming Hide Yo Sht.mp4
34.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Michael Stepankin - Apache Solr Injection.mp4
12.0 MiB
2024 Jun 26 00:57
DEF CON 27 - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.mp4
16.9 MiB
2024 Jun 26 00:57
DEF CON 27 - Nicolas Oberli - Poking the S in SD cards.mp4
17.9 MiB
2024 Jun 26 00:57
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.mp4
29.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.mp4
16.9 MiB
2024 Jun 26 00:57
DEF CON 27 - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.mp4
25.8 MiB
2024 Jun 26 00:57
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite.mp4
30.9 MiB
2024 Jun 26 00:57
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.mp4
34.8 MiB
2024 Jun 26 00:57
DEF CON 27 - Orange Tsai - Infiltrating Corporate Intranet Like NSA Pre-auth RCE on Leading SSL VPNs.mp4
37.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.mp4
78.3 MiB
2024 Jun 26 00:57
DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.mp4
50.5 MiB
2024 Jun 26 00:57
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction.mp4
45.0 MiB
2024 Jun 26 00:57
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.mp4
48.8 MiB
2024 Jun 26 00:57
DEF CON 27 - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.mp4
31.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Philippe Laulheret - Intro to Hardware Hacking.mp4
37.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.mp4
44.5 MiB
2024 Jun 26 00:57
DEF CON 27 - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.mp4
30.9 MiB
2024 Jun 26 00:57
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing.mp4
33.2 MiB
2024 Jun 26 00:57
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.mp4
23.8 MiB
2024 Jun 26 00:57
DEF CON 27 - The Dark Tangent - Closing Ceremonies.mp4
220.6 MiB
2024 Jun 26 00:57
DEF CON 27 - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.mp4
70.1 MiB
2024 Jun 26 00:57
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.mp4
16.4 MiB
2024 Jun 26 00:57
DEF CON 27 - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.mp4
57.8 MiB
2024 Jun 26 00:57
DEF CON 27 - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.mp4
22.3 MiB
2024 Jun 26 00:57
DEF CON 27 - WillC - Phreaking Elevators.mp4
39.1 MiB
2024 Jun 26 00:57
DEF CON 27 - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.mp4
33.7 MiB
2024 Jun 26 00:57
DEF CON 27 - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.mp4
30.0 MiB
2024 Jun 26 00:57
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked.mp4
41.0 MiB
2024 Jun 26 00:57
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.mp4
30.0 MiB
2024 Jun 26 00:57
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.mp4
25.3 MiB
2024 Jun 26 00:57