DEF CON logo

Media Server

  • Home |
  • Mastodon |
  • Forums |
  • Groups |
  • FAQ |
  • RSS |
  • .onion |

/DEF CON 29/DEF CON 29 video and slides/DEF CON 29 video and slides captions/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.json2.4 MiB2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.lrc61.9 KiB2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.srt66.8 KiB2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.text48.5 KiB2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.tsv56.4 KiB2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.txt62.5 KiB2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.vtt61.5 KiB2024 Jun 21 21:49
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.json2.2 MiB2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.lrc54.9 KiB2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.srt62.6 KiB2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.text42.8 KiB2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.tsv49.9 KiB2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.txt55.4 KiB2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.vtt57.0 KiB2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.json2.1 MiB2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.lrc55.9 KiB2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.srt60.9 KiB2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.text39.3 KiB2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.tsv49.0 KiB2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.txt56.5 KiB2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.vtt54.7 KiB2024 Jun 21 22:01
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.json882.6 KiB2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.lrc27.5 KiB2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.srt20.8 KiB2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.text17.0 KiB2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.tsv22.7 KiB2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.txt27.9 KiB2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.vtt19.7 KiB2024 Jun 21 22:03
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.json1.6 MiB2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.lrc42.1 KiB2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.srt45.5 KiB2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.text33.0 KiB2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.tsv38.3 KiB2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.txt42.5 KiB2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.vtt42.0 KiB2024 Jun 21 22:08
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.json2.2 MiB2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.lrc64.0 KiB2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.srt53.3 KiB2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.text39.6 KiB2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.tsv53.9 KiB2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.txt64.9 KiB2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.vtt49.2 KiB2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.json1.6 MiB2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.lrc39.5 KiB2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.srt45.9 KiB2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.text30.8 KiB2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.tsv35.8 KiB2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.txt39.9 KiB2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.vtt41.6 KiB2024 Jun 21 22:18
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.json2.0 MiB2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.lrc49.6 KiB2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.srt56.8 KiB2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.text38.7 KiB2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.tsv45.1 KiB2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.txt50.0 KiB2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.vtt51.7 KiB2024 Jun 21 22:23
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.json1.9 MiB2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.lrc48.2 KiB2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.srt52.0 KiB2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.text37.6 KiB2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.tsv43.8 KiB2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.txt48.6 KiB2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.vtt47.9 KiB2024 Jun 21 22:29
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.json1.2 MiB2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.lrc30.3 KiB2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.srt34.2 KiB2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.text23.5 KiB2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.tsv27.4 KiB2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.txt30.6 KiB2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.vtt31.2 KiB2024 Jun 21 22:32
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.json1.6 MiB2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.lrc41.7 KiB2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.srt45.7 KiB2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.text32.2 KiB2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.tsv37.7 KiB2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.txt42.1 KiB2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.vtt41.9 KiB2024 Jun 21 22:36
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.json2.4 MiB2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.lrc63.4 KiB2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.srt65.6 KiB2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.text49.7 KiB2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.tsv57.8 KiB2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.txt63.9 KiB2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.vtt61.1 KiB2024 Jun 21 22:43
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.json1.9 MiB2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.lrc48.2 KiB2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.srt57.3 KiB2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.text37.5 KiB2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.tsv43.7 KiB2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.txt48.6 KiB2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.vtt51.6 KiB2024 Jun 21 22:48
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.json3.9 MiB2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.lrc100.8 KiB2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.srt111.1 KiB2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.text78.0 KiB2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.tsv90.9 KiB2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.txt101.6 KiB2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.vtt103.1 KiB2024 Jun 21 22:58
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.json2.9 MiB2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.lrc75.0 KiB2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.srt80.6 KiB2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.text58.7 KiB2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.tsv68.4 KiB2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.txt75.6 KiB2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.vtt74.3 KiB2024 Jun 21 23:05
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.json2.1 MiB2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.lrc56.5 KiB2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.srt54.7 KiB2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.text44.4 KiB2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.tsv51.5 KiB2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.txt57.0 KiB2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.vtt51.7 KiB2024 Jun 21 23:10
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.json1.4 MiB2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.lrc35.4 KiB2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.srt39.6 KiB2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.text27.4 KiB2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.tsv32.0 KiB2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.txt35.7 KiB2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.vtt36.2 KiB2024 Jun 21 23:14
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.json1.4 MiB2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.lrc38.3 KiB2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.srt40.5 KiB2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.text30.1 KiB2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.tsv34.7 KiB2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.txt38.6 KiB2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.vtt37.6 KiB2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.json82.6 KiB2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.lrc2.2 KiB2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.srt2.2 KiB2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.text1.6 KiB2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.tsv1.9 KiB2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.txt2.2 KiB2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.vtt2.0 KiB2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.json2.0 MiB2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.lrc50.6 KiB2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.srt55.8 KiB2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.text39.7 KiB2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.tsv46.0 KiB2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.txt51.0 KiB2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.vtt51.2 KiB2024 Jun 21 23:23
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.json2.2 MiB2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.lrc60.1 KiB2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.srt62.6 KiB2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.text42.2 KiB2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.tsv52.6 KiB2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.txt60.8 KiB2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.vtt56.8 KiB2024 Jun 21 23:29
DEF CON 29 - David Dworken - Worming through IDEs.eng.json986.2 KiB2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.lrc25.0 KiB2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.srt26.4 KiB2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.text19.6 KiB2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.tsv22.6 KiB2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.txt25.2 KiB2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.vtt24.5 KiB2024 Jun 21 23:32
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.json2.5 MiB2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.lrc63.3 KiB2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.srt65.8 KiB2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.text47.0 KiB2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.tsv56.6 KiB2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.txt64.0 KiB2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.vtt60.4 KiB2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.json1.6 MiB2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.lrc42.5 KiB2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.srt47.8 KiB2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.text31.3 KiB2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.tsv37.7 KiB2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.txt42.9 KiB2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.vtt43.1 KiB2024 Jun 21 23:43
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.json903.4 KiB2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.lrc25.0 KiB2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.srt22.4 KiB2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.text16.3 KiB2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.tsv21.1 KiB2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.txt25.4 KiB2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.vtt20.7 KiB2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.json820.9 KiB2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.lrc20.0 KiB2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.srt22.0 KiB2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.text16.2 KiB2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.tsv18.3 KiB2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.txt20.2 KiB2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.vtt20.4 KiB2024 Jun 21 23:48
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.json1.2 MiB2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.lrc32.5 KiB2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.srt33.9 KiB2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.text24.6 KiB2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.tsv29.0 KiB2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.txt32.8 KiB2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.vtt31.3 KiB2024 Jun 21 23:51
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.json2.6 MiB2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.lrc83.6 KiB2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.srt58.3 KiB2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.text42.1 KiB2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.tsv66.4 KiB2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.txt85.2 KiB2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.vtt53.4 KiB2024 Jun 21 23:58
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.json1.3 MiB2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.lrc35.6 KiB2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.srt39.5 KiB2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.text26.7 KiB2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.tsv31.8 KiB2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.txt36.0 KiB2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.vtt35.9 KiB2024 Jun 22 00:02
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.json2.3 MiB2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.lrc56.9 KiB2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.srt67.3 KiB2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.text44.5 KiB2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.tsv51.7 KiB2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.txt57.4 KiB2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.vtt60.8 KiB2024 Jun 22 00:08
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.json103.1 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.lrc2.6 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.srt2.7 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.text2.0 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.tsv2.3 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.txt2.6 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.vtt2.5 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.json183.9 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.lrc4.7 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.srt5.0 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.text3.4 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.tsv4.1 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.txt4.8 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.vtt4.6 KiB2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.json127.1 KiB2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.lrc3.2 KiB2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.srt3.1 KiB2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.text2.4 KiB2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.tsv2.8 KiB2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.txt3.2 KiB2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.vtt2.9 KiB2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.json2.1 MiB2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.lrc53.2 KiB2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.srt62.4 KiB2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.text41.7 KiB2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.tsv48.4 KiB2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.txt53.6 KiB2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.vtt56.5 KiB2024 Jun 22 00:15
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.json1.8 MiB2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.lrc51.5 KiB2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.srt45.6 KiB2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.text31.6 KiB2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.tsv43.4 KiB2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.txt52.3 KiB2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.vtt41.5 KiB2024 Jun 22 00:21
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.json743.1 KiB2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.lrc19.5 KiB2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.srt20.2 KiB2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.text13.9 KiB2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.tsv16.9 KiB2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.txt19.7 KiB2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.vtt18.4 KiB2024 Jun 22 00:23
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.json1.6 MiB2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.lrc46.2 KiB2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.srt44.2 KiB2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.text30.6 KiB2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.tsv39.5 KiB2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.txt46.8 KiB2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.vtt40.3 KiB2024 Jun 22 00:28
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.json2.0 MiB2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.lrc62.5 KiB2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.srt45.6 KiB2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.text35.3 KiB2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.tsv51.4 KiB2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.txt63.5 KiB2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.vtt42.5 KiB2024 Jun 22 00:34
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.json2.0 MiB2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.lrc50.3 KiB2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.srt59.8 KiB2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.text39.1 KiB2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.tsv45.6 KiB2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.txt50.7 KiB2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.vtt53.9 KiB2024 Jun 22 00:39
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.json1.0 MiB2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.lrc25.7 KiB2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.srt28.6 KiB2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.text20.1 KiB2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.tsv23.2 KiB2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.txt25.9 KiB2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.vtt26.3 KiB2024 Jun 22 00:42
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.json2.2 MiB2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.lrc53.1 KiB2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.srt70.4 KiB2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.text41.3 KiB2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.tsv48.2 KiB2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.txt53.5 KiB2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.vtt62.2 KiB2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.json1.6 MiB2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.lrc39.9 KiB2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.srt49.3 KiB2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.text33.7 KiB2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.tsv37.2 KiB2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.txt40.1 KiB2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.vtt44.9 KiB2024 Jun 22 00:54
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.json1.6 MiB2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.lrc42.7 KiB2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.srt46.0 KiB2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.text32.5 KiB2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.tsv38.5 KiB2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.txt43.1 KiB2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.vtt42.2 KiB2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.json41 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.lrc0 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.srt0 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.text0 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.tsv16 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.txt0 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.vtt10 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.json41 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.lrc0 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.srt0 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.text0 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.tsv16 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.txt0 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.vtt10 B2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.json1.5 MiB2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.lrc38.0 KiB2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.srt41.6 KiB2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.text29.6 KiB2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.tsv34.4 KiB2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.txt38.3 KiB2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.vtt38.2 KiB2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.json1.0 MiB2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.lrc25.7 KiB2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.srt28.5 KiB2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.text20.2 KiB2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.tsv23.3 KiB2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.txt25.9 KiB2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.vtt26.2 KiB2024 Jun 22 01:07
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.json2.0 MiB2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.lrc57.7 KiB2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.srt48.9 KiB2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.text35.8 KiB2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.tsv48.4 KiB2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.txt58.5 KiB2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.vtt45.0 KiB2024 Jun 22 01:13
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.json1.8 MiB2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.lrc47.2 KiB2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.srt51.2 KiB2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.text36.3 KiB2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.tsv42.7 KiB2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.txt47.6 KiB2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.vtt46.9 KiB2024 Jun 22 01:18
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.json2.2 MiB2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.lrc56.3 KiB2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.srt61.4 KiB2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.text44.0 KiB2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.tsv51.2 KiB2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.txt56.8 KiB2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.vtt56.4 KiB2024 Jun 22 01:26
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.json1.5 MiB2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.lrc37.5 KiB2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.srt41.4 KiB2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.text29.0 KiB2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.tsv33.9 KiB2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.txt37.8 KiB2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.vtt37.9 KiB2024 Jun 22 01:31
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.json2.0 MiB2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.lrc59.0 KiB2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.srt46.7 KiB2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.text37.6 KiB2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.tsv50.2 KiB2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.txt59.8 KiB2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.vtt44.0 KiB2024 Jun 22 01:37
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.json2.4 MiB2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.lrc59.3 KiB2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.srt63.9 KiB2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.text46.0 KiB2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.tsv53.8 KiB2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.txt59.9 KiB2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.vtt58.8 KiB2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.json2.6 MiB2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.lrc64.5 KiB2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.srt65.9 KiB2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.text49.4 KiB2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.tsv58.3 KiB2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.txt65.1 KiB2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.vtt61.2 KiB2024 Jun 22 01:54
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.json1.9 MiB2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.lrc45.8 KiB2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.srt62.0 KiB2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.text35.8 KiB2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.tsv41.7 KiB2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.txt46.2 KiB2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.vtt54.6 KiB2024 Jun 22 02:00
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.json1.1 MiB2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.lrc27.0 KiB2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.srt35.9 KiB2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.text20.9 KiB2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.tsv24.3 KiB2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.txt27.2 KiB2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.vtt31.7 KiB2024 Jun 22 02:03
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.json1.4 MiB2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.lrc36.9 KiB2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt41.3 KiB2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.text28.3 KiB2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.tsv33.4 KiB2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.txt37.3 KiB2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.vtt37.6 KiB2024 Jun 22 02:07
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.json261.8 KiB2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.lrc6.2 KiB2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.srt6.6 KiB2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.text4.8 KiB2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.tsv5.5 KiB2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.txt6.2 KiB2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.vtt6.1 KiB2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.json1.9 MiB2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.lrc48.2 KiB2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.srt49.3 KiB2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.text37.7 KiB2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.tsv43.8 KiB2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.txt48.6 KiB2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.vtt46.0 KiB2024 Jun 22 02:15
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.json2.0 MiB2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.lrc58.3 KiB2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.srt53.3 KiB2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.text38.5 KiB2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.tsv50.1 KiB2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.txt59.1 KiB2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.vtt49.0 KiB2024 Jun 22 02:22
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.json1.4 MiB2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.lrc36.2 KiB2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.srt42.8 KiB2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.text27.8 KiB2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.tsv32.7 KiB2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.txt36.5 KiB2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.vtt38.6 KiB2024 Jun 22 02:27
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.json2.3 MiB2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.lrc58.6 KiB2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.srt62.0 KiB2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.text46.0 KiB2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.tsv53.4 KiB2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.txt59.1 KiB2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.vtt57.4 KiB2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.json3.1 MiB2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.lrc99.4 KiB2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.srt69.7 KiB2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.text47.3 KiB2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.tsv78.6 KiB2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.txt101.4 KiB2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.vtt62.9 KiB2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.json2.7 MiB2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.lrc77.8 KiB2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.srt72.4 KiB2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.text50.9 KiB2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.tsv66.9 KiB2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.txt78.8 KiB2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.vtt66.1 KiB2024 Jun 22 02:54
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.json1.3 MiB2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.lrc33.1 KiB2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.srt35.8 KiB2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.text25.4 KiB2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.tsv29.9 KiB2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.txt33.4 KiB2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.vtt32.9 KiB2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.json109.9 KiB2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.lrc2.6 KiB2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.srt2.8 KiB2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.text2.0 KiB2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.tsv2.3 KiB2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.txt2.7 KiB2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.vtt2.6 KiB2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.json1.8 MiB2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.lrc46.3 KiB2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.srt49.2 KiB2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.text36.2 KiB2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.tsv42.1 KiB2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.txt46.7 KiB2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.vtt45.5 KiB2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.json1.8 MiB2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.lrc47.1 KiB2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.srt51.2 KiB2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.text36.6 KiB2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.tsv42.7 KiB2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.txt47.5 KiB2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.vtt47.0 KiB2024 Jun 22 03:08
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.json2.0 MiB2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.lrc57.4 KiB2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.srt51.0 KiB2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.text34.4 KiB2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.tsv47.8 KiB2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.txt58.3 KiB2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.vtt46.1 KiB2024 Jun 22 03:13
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.json1.7 MiB2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.lrc43.4 KiB2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.srt47.4 KiB2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.text34.0 KiB2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.tsv39.5 KiB2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.txt43.8 KiB2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.vtt43.6 KiB2024 Jun 22 03:18
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.json1.8 MiB2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.lrc45.7 KiB2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.srt49.8 KiB2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.text35.6 KiB2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.tsv41.5 KiB2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.txt46.1 KiB2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.vtt45.8 KiB2024 Jun 22 03:23
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.json1.6 MiB2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.lrc38.4 KiB2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.srt48.2 KiB2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.text29.7 KiB2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.tsv34.8 KiB2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.txt38.8 KiB2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.vtt43.0 KiB2024 Jun 22 03:27
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.json2.2 MiB2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.lrc52.9 KiB2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.srt64.1 KiB2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.text41.7 KiB2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.tsv48.1 KiB2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.txt53.4 KiB2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.vtt57.7 KiB2024 Jun 22 03:33
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.json2.4 MiB2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.lrc63.4 KiB2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.srt64.6 KiB2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.text45.5 KiB2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.tsv56.1 KiB2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.txt64.1 KiB2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.vtt59.1 KiB2024 Jun 22 03:40
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.json1.6 MiB2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.lrc46.6 KiB2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.srt39.5 KiB2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.text28.2 KiB2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.tsv39.0 KiB2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.txt47.3 KiB2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.vtt36.2 KiB2024 Jun 22 03:44
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.json1.2 MiB2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.lrc32.0 KiB2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.srt31.7 KiB2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.text22.5 KiB2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.tsv27.9 KiB2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.txt32.4 KiB2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.vtt29.1 KiB2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.json1.3 MiB2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.lrc32.9 KiB2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.srt35.3 KiB2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.text25.6 KiB2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.tsv29.8 KiB2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.txt33.2 KiB2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.vtt32.5 KiB2024 Jun 22 03:51
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.json1.9 MiB2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.lrc45.1 KiB2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.srt51.7 KiB2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.text36.7 KiB2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.tsv41.6 KiB2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.txt45.5 KiB2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.vtt47.5 KiB2024 Jun 22 03:56
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.json1.8 MiB2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.lrc51.2 KiB2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.srt45.0 KiB2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.text31.2 KiB2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.tsv42.8 KiB2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.txt52.0 KiB2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.vtt41.0 KiB2024 Jun 22 04:01
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.json1.1 MiB2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.lrc28.0 KiB2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.srt30.9 KiB2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.text21.6 KiB2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.tsv25.2 KiB2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.txt28.2 KiB2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.vtt28.3 KiB2024 Jun 22 04:04
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.json1.4 MiB2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.lrc35.6 KiB2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.srt38.5 KiB2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.text27.7 KiB2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.tsv32.2 KiB2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.txt35.9 KiB2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.vtt35.4 KiB2024 Jun 22 04:07
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.json41 B2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.lrc0 B2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.srt0 B2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.text0 B2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.tsv16 B2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.txt0 B2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.vtt10 B2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.json681.8 KiB2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.lrc20.0 KiB2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.srt17.1 KiB2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.text12.3 KiB2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.tsv16.4 KiB2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.txt20.3 KiB2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.vtt15.8 KiB2024 Jun 22 04:10
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.json2.1 MiB2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.lrc58.0 KiB2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.srt48.4 KiB2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.text35.8 KiB2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.tsv48.7 KiB2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.txt58.8 KiB2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.vtt44.7 KiB2024 Jun 22 04:15
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.json4.1 MiB2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.lrc100.0 KiB2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.srt125.7 KiB2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.text76.3 KiB2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.tsv89.3 KiB2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.txt100.9 KiB2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.vtt114.9 KiB2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.json2.0 MiB2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.lrc46.3 KiB2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.srt61.6 KiB2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.text36.0 KiB2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.tsv42.0 KiB2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.txt46.7 KiB2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.vtt54.3 KiB2024 Jun 22 04:32
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.json1.9 MiB2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.lrc51.0 KiB2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.srt45.1 KiB2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.text32.8 KiB2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.tsv43.3 KiB2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.txt51.7 KiB2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.vtt41.5 KiB2024 Jun 22 04:37
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.json1.4 MiB2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.lrc38.9 KiB2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.srt42.3 KiB2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.text30.0 KiB2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.tsv35.2 KiB2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.txt39.2 KiB2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.vtt38.8 KiB2024 Jun 22 04:41
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.json1.4 MiB2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.lrc35.4 KiB2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.srt38.5 KiB2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.text28.3 KiB2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.tsv32.4 KiB2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.txt35.6 KiB2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.vtt35.6 KiB2024 Jun 22 04:44
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.json1.6 MiB2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.lrc50.2 KiB2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.srt43.0 KiB2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.text30.3 KiB2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.tsv41.9 KiB2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.txt51.0 KiB2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.vtt39.3 KiB2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.json41.7 KiB2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.lrc1.2 KiB2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.srt1.1 KiB2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.text944 B2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.tsv1.0 KiB2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.txt1.2 KiB2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.vtt1.1 KiB2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.json47.0 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.lrc1.2 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.srt1.2 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.text925 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.tsv1.0 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.txt1.2 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.vtt1.1 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.json14.7 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.lrc394 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.srt360 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.text290 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.tsv350 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.txt398 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.vtt352 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.json38.0 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.lrc1.1 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.srt1.1 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.text828 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.tsv956 B2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.txt1.1 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.vtt1.0 KiB2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.json81.0 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.lrc2.1 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.srt2.1 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.text1.6 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.tsv1.8 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.txt2.1 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.vtt2.0 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.json34.5 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.lrc859 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.srt781 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.text677 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.tsv771 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.txt866 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.vtt764 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.json36.6 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.lrc1.0 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.srt943 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.text804 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.tsv920 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.txt1.0 KiB2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.vtt917 B2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.json1020.1 KiB2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.lrc26.6 KiB2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.srt27.1 KiB2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.text21.0 KiB2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.tsv24.1 KiB2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.txt26.9 KiB2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.vtt25.4 KiB2024 Jun 22 04:54
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.json1.4 MiB2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.lrc38.9 KiB2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.srt41.0 KiB2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.text27.3 KiB2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.tsv34.0 KiB2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.txt39.3 KiB2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.vtt37.1 KiB2024 Jun 22 04:58
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.json1.3 MiB2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.lrc35.7 KiB2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.srt37.9 KiB2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.text26.1 KiB2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.tsv31.6 KiB2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.txt36.1 KiB2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.vtt34.5 KiB2024 Jun 22 05:01
  • © 1992-2024 DEF CON Communications, Inc.
  • Home |
  •  Mastodon |
  • Forums |
  • Discord |
  • Reddit |
  • X |
  • Facebook |
  • FAQ |
  • RSS |
  • .onion