DEF CON logo

Media Server

  • Home |
  • Mastodon |
  • Forums |
  • Groups |
  • FAQ |
  • RSS |
  • .onion |

/DEF CON 27/DEF CON 27 video and slides/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 27 video and slides captions/-2024 Jul 26 03:06
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.mp430.3 MiB2024 Jun 26 00:57
DEF CON 27 - Alexandre Borges - NET Malware Threats Internals And Reversing.mp430.4 MiB2024 Jun 26 00:57
DEF CON 27 - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.mp459.1 MiB2024 Jun 26 00:57
DEF CON 27 - Alon Weinberg - Please Inject Me a x64 Code Injection.mp415.7 MiB2024 Jun 26 00:57
DEF CON 27 - Alvaro Munoz - SSO Wars The Token Menace.mp431.1 MiB2024 Jun 26 00:57
DEF CON 27 - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.mp440.7 MiB2024 Jun 26 00:57
DEF CON 27 - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.mp419.1 MiB2024 Jun 26 00:57
DEF CON 27 - Anish Athalye - Want Strong Isolation Just Reset Your Processor.mp431.4 MiB2024 Jun 26 00:57
DEF CON 27 - Ariel Herbert-Voss - Don't Red-Team AI Like a Chump.mp429.2 MiB2024 Jun 26 00:57
DEF CON 27 - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.mp416.9 MiB2024 Jun 26 00:57
DEF CON 27 - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.mp435.2 MiB2024 Jun 26 00:57
DEF CON 27 - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.mp436.3 MiB2024 Jun 26 00:57
DEF CON 27 - Bill Graydon - Duplicating Restricted Mechanical Keys.mp448.3 MiB2024 Jun 26 00:57
DEF CON 27 - Bill Swearingen - HAKC THE POLICE.mp439.5 MiB2024 Jun 26 00:57
DEF CON 27 - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.mp434.3 MiB2024 Jun 26 00:57
DEF CON 27 - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.mp415.8 MiB2024 Jun 26 00:57
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest.mp452.6 MiB2024 Jun 26 00:57
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now.mp432.0 MiB2024 Jun 26 00:57
DEF CON 27 - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.mp426.4 MiB2024 Jun 26 00:57
DEF CON 27 - Christopher Wade - Tag-side attacks against NFC.mp430.5 MiB2024 Jun 26 00:57
DEF CON 27 - Contests and Events - Contests Awards Ceremony.mp485.4 MiB2024 Jun 26 00:57
DEF CON 27 - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.mp432.6 MiB2024 Jun 26 00:57
DEF CON 27 - Daniel Romero - Why You Should Fear Your mundane Office Equipment.mp440.7 MiB2024 Jun 26 00:57
DEF CON 27 - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.mp435.7 MiB2024 Jun 26 00:57
DEF CON 27 - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.mp431.2 MiB2024 Jun 26 00:57
DEF CON 27 - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.mp429.5 MiB2024 Jun 26 00:57
DEF CON 27 - Douglas McKee - HVACking Understand the Delta Between Security and Reality.mp429.3 MiB2024 Jun 26 00:57
DEF CON 27 - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.mp417.9 MiB2024 Jun 26 00:57
DEF CON 27 - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Others Auto Infractions.mp422.3 MiB2024 Jun 26 00:57
DEF CON 27 - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.mp433.0 MiB2024 Jun 26 00:57
DEF CON 27 - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.mp435.4 MiB2024 Jun 26 00:57
DEF CON 27 - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.mp430.3 MiB2024 Jun 26 00:57
DEF CON 27 - finalphoenix - Rise of the Hypebots Scripting Streetwear.mp438.3 MiB2024 Jun 26 00:57
DEF CON 27 - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.mp428.9 MiB2024 Jun 26 00:57
DEF CON 27 - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.mp436.0 MiB2024 Jun 26 00:57
DEF CON 27 - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.mp421.7 MiB2024 Jun 26 00:57
DEF CON 27 - Hadrien Barral - The ABC of Next-Gen Shellcoding.mp429.3 MiB2024 Jun 26 00:57
DEF CON 27 - Hila Cohen - Malproxy Leave Your Malware at Home.mp421.2 MiB2024 Jun 26 00:57
DEF CON 27 - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.mp444.4 MiB2024 Jun 26 00:57
DEF CON 27 - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.mp433.1 MiB2024 Jun 26 00:57
DEF CON 27 - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.mp432.1 MiB2024 Jun 26 00:57
DEF CON 27 - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.mp449.1 MiB2024 Jun 26 00:57
DEF CON 27 - Jayson Grace - MOSE Using Configuration Management for Evil.mp436.6 MiB2024 Jun 26 00:57
DEF CON 27 - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.mp433.7 MiB2024 Jun 26 00:57
DEF CON 27 - Jens Muller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.mp415.6 MiB2024 Jun 26 00:57
DEF CON 27 - Jesse Michael - Get Off the Kernel if You Cant Drive.mp435.8 MiB2024 Jun 26 00:57
DEF CON 27 - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.mp419.7 MiB2024 Jun 26 00:57
DEF CON 27 - Jmaxxz - Your Car is My Car.mp454.9 MiB2024 Jun 26 00:57
DEF CON 27 - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.mp437.2 MiB2024 Jun 26 00:57
DEF CON 27 - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.mp433.6 MiB2024 Jun 26 00:57
DEF CON 27 - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.mp476.5 MiB2024 Jun 26 00:57
DEF CON 27 - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.mp427.1 MiB2024 Jun 26 00:57
DEF CON 27 - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.mp430.7 MiB2024 Jun 26 00:57
DEF CON 27 - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.mp433.9 MiB2024 Jun 26 00:57
DEF CON 27 - Kyle Gwinnup - Next Generation Process Emulation with Binee.mp432.2 MiB2024 Jun 26 00:57
DEF CON 27 - Leon Jacobs - Meticulously Modern Mobile Manipulations.mp436.8 MiB2024 Jun 26 00:57
DEF CON 27 - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.mp432.3 MiB2024 Jun 26 00:57
DEF CON 27 - Marina Simakov - Relaying Credentials Has Never Been Easier.mp436.4 MiB2024 Jun 26 00:57
DEF CON 27 - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.mp430.2 MiB2024 Jun 26 00:57
DEF CON 27 - Michael Leibowitz - EDR Is Coming Hide Yo Sht.mp434.1 MiB2024 Jun 26 00:57
DEF CON 27 - Michael Stepankin - Apache Solr Injection.mp412.0 MiB2024 Jun 26 00:57
DEF CON 27 - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.mp416.9 MiB2024 Jun 26 00:57
DEF CON 27 - Nicolas Oberli - Poking the S in SD cards.mp417.9 MiB2024 Jun 26 00:57
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.mp429.3 MiB2024 Jun 26 00:57
DEF CON 27 - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.mp416.9 MiB2024 Jun 26 00:57
DEF CON 27 - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.mp425.8 MiB2024 Jun 26 00:57
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite.mp430.9 MiB2024 Jun 26 00:57
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.mp434.8 MiB2024 Jun 26 00:57
DEF CON 27 - Orange Tsai - Infiltrating Corporate Intranet Like NSA Pre-auth RCE on Leading SSL VPNs.mp437.3 MiB2024 Jun 26 00:57
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.mp478.3 MiB2024 Jun 26 00:57
DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.mp450.5 MiB2024 Jun 26 00:57
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction.mp445.0 MiB2024 Jun 26 00:57
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.mp448.8 MiB2024 Jun 26 00:57
DEF CON 27 - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.mp431.2 MiB2024 Jun 26 00:57
DEF CON 27 - Philippe Laulheret - Intro to Hardware Hacking.mp437.1 MiB2024 Jun 26 00:57
DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.mp444.5 MiB2024 Jun 26 00:57
DEF CON 27 - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.mp430.9 MiB2024 Jun 26 00:57
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing.mp433.2 MiB2024 Jun 26 00:57
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.mp423.8 MiB2024 Jun 26 00:57
DEF CON 27 - The Dark Tangent - Closing Ceremonies.mp4220.6 MiB2024 Jun 26 00:57
DEF CON 27 - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.mp470.1 MiB2024 Jun 26 00:57
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.mp416.4 MiB2024 Jun 26 00:57
DEF CON 27 - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.mp457.8 MiB2024 Jun 26 00:57
DEF CON 27 - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.mp422.3 MiB2024 Jun 26 00:57
DEF CON 27 - WillC - Phreaking Elevators.mp439.1 MiB2024 Jun 26 00:57
DEF CON 27 - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.mp433.7 MiB2024 Jun 26 00:57
DEF CON 27 - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.mp430.0 MiB2024 Jun 26 00:57
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked.mp441.0 MiB2024 Jun 26 00:57
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.mp430.0 MiB2024 Jun 26 00:57
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.mp425.3 MiB2024 Jun 26 00:57
  • © 1992-2024 DEF CON Communications, Inc.
  • Home |
  •  Mastodon |
  • Forums |
  • Discord |
  • Reddit |
  • X |
  • Facebook |
  • FAQ |
  • RSS |
  • .onion