Media Server
Home
|
Mastodon
|
Forums
|
Groups
|
FAQ
|
RSS
|
.onion
|
/DEF CON 29/DEF CON 29 video and slides/DEF CON 29 video and slides captions/
File Name
↓
File Size
↓
Date
↓
Parent directory/
-
-
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.json
2.4 MiB
2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.lrc
61.9 KiB
2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.srt
66.8 KiB
2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.text
48.5 KiB
2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.tsv
56.4 KiB
2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.txt
62.5 KiB
2024 Jun 21 21:49
DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.vtt
61.5 KiB
2024 Jun 21 21:49
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.json
2.2 MiB
2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.lrc
54.9 KiB
2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.srt
62.6 KiB
2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.text
42.8 KiB
2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.tsv
49.9 KiB
2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.txt
55.4 KiB
2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.vtt
57.0 KiB
2024 Jun 21 21:55
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.json
2.1 MiB
2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.lrc
55.9 KiB
2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.srt
60.9 KiB
2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.text
39.3 KiB
2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.tsv
49.0 KiB
2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.txt
56.5 KiB
2024 Jun 21 22:01
DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.vtt
54.7 KiB
2024 Jun 21 22:01
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.json
882.6 KiB
2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.lrc
27.5 KiB
2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.srt
20.8 KiB
2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.text
17.0 KiB
2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.tsv
22.7 KiB
2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.txt
27.9 KiB
2024 Jun 21 22:03
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.vtt
19.7 KiB
2024 Jun 21 22:03
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.json
1.6 MiB
2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.lrc
42.1 KiB
2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.srt
45.5 KiB
2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.text
33.0 KiB
2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.tsv
38.3 KiB
2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.txt
42.5 KiB
2024 Jun 21 22:08
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.vtt
42.0 KiB
2024 Jun 21 22:08
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.json
2.2 MiB
2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.lrc
64.0 KiB
2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.srt
53.3 KiB
2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.text
39.6 KiB
2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.tsv
53.9 KiB
2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.txt
64.9 KiB
2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.vtt
49.2 KiB
2024 Jun 21 22:13
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.json
1.6 MiB
2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.lrc
39.5 KiB
2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.srt
45.9 KiB
2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.text
30.8 KiB
2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.tsv
35.8 KiB
2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.txt
39.9 KiB
2024 Jun 21 22:18
DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.vtt
41.6 KiB
2024 Jun 21 22:18
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.json
2.0 MiB
2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.lrc
49.6 KiB
2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.srt
56.8 KiB
2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.text
38.7 KiB
2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.tsv
45.1 KiB
2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.txt
50.0 KiB
2024 Jun 21 22:23
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.vtt
51.7 KiB
2024 Jun 21 22:23
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.json
1.9 MiB
2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.lrc
48.2 KiB
2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.srt
52.0 KiB
2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.text
37.6 KiB
2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.tsv
43.8 KiB
2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.txt
48.6 KiB
2024 Jun 21 22:29
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.vtt
47.9 KiB
2024 Jun 21 22:29
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.json
1.2 MiB
2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.lrc
30.3 KiB
2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.srt
34.2 KiB
2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.text
23.5 KiB
2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.tsv
27.4 KiB
2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.txt
30.6 KiB
2024 Jun 21 22:32
DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.vtt
31.2 KiB
2024 Jun 21 22:32
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.json
1.6 MiB
2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.lrc
41.7 KiB
2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.srt
45.7 KiB
2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.text
32.2 KiB
2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.tsv
37.7 KiB
2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.txt
42.1 KiB
2024 Jun 21 22:36
DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.vtt
41.9 KiB
2024 Jun 21 22:36
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.json
2.4 MiB
2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.lrc
63.4 KiB
2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.srt
65.6 KiB
2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.text
49.7 KiB
2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.tsv
57.8 KiB
2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.txt
63.9 KiB
2024 Jun 21 22:43
DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.vtt
61.1 KiB
2024 Jun 21 22:43
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.json
1.9 MiB
2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.lrc
48.2 KiB
2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.srt
57.3 KiB
2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.text
37.5 KiB
2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.tsv
43.7 KiB
2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.txt
48.6 KiB
2024 Jun 21 22:48
DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.vtt
51.6 KiB
2024 Jun 21 22:48
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.json
3.9 MiB
2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.lrc
100.8 KiB
2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.srt
111.1 KiB
2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.text
78.0 KiB
2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.tsv
90.9 KiB
2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.txt
101.6 KiB
2024 Jun 21 22:58
DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.vtt
103.1 KiB
2024 Jun 21 22:58
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.json
2.9 MiB
2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.lrc
75.0 KiB
2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.srt
80.6 KiB
2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.text
58.7 KiB
2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.tsv
68.4 KiB
2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.txt
75.6 KiB
2024 Jun 21 23:05
DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.vtt
74.3 KiB
2024 Jun 21 23:05
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.json
2.1 MiB
2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.lrc
56.5 KiB
2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.srt
54.7 KiB
2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.text
44.4 KiB
2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.tsv
51.5 KiB
2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.txt
57.0 KiB
2024 Jun 21 23:10
DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.vtt
51.7 KiB
2024 Jun 21 23:10
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.json
1.4 MiB
2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.lrc
35.4 KiB
2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.srt
39.6 KiB
2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.text
27.4 KiB
2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.tsv
32.0 KiB
2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.txt
35.7 KiB
2024 Jun 21 23:14
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.vtt
36.2 KiB
2024 Jun 21 23:14
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.json
1.4 MiB
2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.lrc
38.3 KiB
2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.srt
40.5 KiB
2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.text
30.1 KiB
2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.tsv
34.7 KiB
2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.txt
38.6 KiB
2024 Jun 21 23:18
DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.vtt
37.6 KiB
2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.json
82.6 KiB
2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.lrc
2.2 KiB
2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.srt
2.2 KiB
2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.text
1.6 KiB
2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.tsv
1.9 KiB
2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.txt
2.2 KiB
2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.vtt
2.0 KiB
2024 Jun 21 23:18
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.json
2.0 MiB
2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.lrc
50.6 KiB
2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.srt
55.8 KiB
2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.text
39.7 KiB
2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.tsv
46.0 KiB
2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.txt
51.0 KiB
2024 Jun 21 23:23
DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.vtt
51.2 KiB
2024 Jun 21 23:23
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.json
2.2 MiB
2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.lrc
60.1 KiB
2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.srt
62.6 KiB
2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.text
42.2 KiB
2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.tsv
52.6 KiB
2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.txt
60.8 KiB
2024 Jun 21 23:29
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.vtt
56.8 KiB
2024 Jun 21 23:29
DEF CON 29 - David Dworken - Worming through IDEs.eng.json
986.2 KiB
2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.lrc
25.0 KiB
2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.srt
26.4 KiB
2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.text
19.6 KiB
2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.tsv
22.6 KiB
2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.txt
25.2 KiB
2024 Jun 21 23:32
DEF CON 29 - David Dworken - Worming through IDEs.eng.vtt
24.5 KiB
2024 Jun 21 23:32
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.json
2.5 MiB
2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.lrc
63.3 KiB
2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.srt
65.8 KiB
2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.text
47.0 KiB
2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.tsv
56.6 KiB
2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.txt
64.0 KiB
2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.vtt
60.4 KiB
2024 Jun 21 23:38
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.json
1.6 MiB
2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.lrc
42.5 KiB
2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.srt
47.8 KiB
2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.text
31.3 KiB
2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.tsv
37.7 KiB
2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.txt
42.9 KiB
2024 Jun 21 23:43
DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.vtt
43.1 KiB
2024 Jun 21 23:43
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.json
903.4 KiB
2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.lrc
25.0 KiB
2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.srt
22.4 KiB
2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.text
16.3 KiB
2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.tsv
21.1 KiB
2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.txt
25.4 KiB
2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.vtt
20.7 KiB
2024 Jun 21 23:45
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.json
820.9 KiB
2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.lrc
20.0 KiB
2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.srt
22.0 KiB
2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.text
16.2 KiB
2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.tsv
18.3 KiB
2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.txt
20.2 KiB
2024 Jun 21 23:48
DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.vtt
20.4 KiB
2024 Jun 21 23:48
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.json
1.2 MiB
2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.lrc
32.5 KiB
2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.srt
33.9 KiB
2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.text
24.6 KiB
2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.tsv
29.0 KiB
2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.txt
32.8 KiB
2024 Jun 21 23:51
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.vtt
31.3 KiB
2024 Jun 21 23:51
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.json
2.6 MiB
2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.lrc
83.6 KiB
2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.srt
58.3 KiB
2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.text
42.1 KiB
2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.tsv
66.4 KiB
2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.txt
85.2 KiB
2024 Jun 21 23:58
DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.vtt
53.4 KiB
2024 Jun 21 23:58
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.json
1.3 MiB
2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.lrc
35.6 KiB
2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.srt
39.5 KiB
2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.text
26.7 KiB
2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.tsv
31.8 KiB
2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.txt
36.0 KiB
2024 Jun 22 00:02
DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.vtt
35.9 KiB
2024 Jun 22 00:02
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.json
2.3 MiB
2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.lrc
56.9 KiB
2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.srt
67.3 KiB
2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.text
44.5 KiB
2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.tsv
51.7 KiB
2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.txt
57.4 KiB
2024 Jun 22 00:08
DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.vtt
60.8 KiB
2024 Jun 22 00:08
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.json
103.1 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.lrc
2.6 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.srt
2.7 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.text
2.0 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.tsv
2.3 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.txt
2.6 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.vtt
2.5 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.json
183.9 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.lrc
4.7 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.srt
5.0 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.text
3.4 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.tsv
4.1 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.txt
4.8 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.vtt
4.6 KiB
2024 Jun 22 00:09
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.json
127.1 KiB
2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.lrc
3.2 KiB
2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.srt
3.1 KiB
2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.text
2.4 KiB
2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.tsv
2.8 KiB
2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.txt
3.2 KiB
2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.vtt
2.9 KiB
2024 Jun 22 00:10
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.json
2.1 MiB
2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.lrc
53.2 KiB
2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.srt
62.4 KiB
2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.text
41.7 KiB
2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.tsv
48.4 KiB
2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.txt
53.6 KiB
2024 Jun 22 00:15
DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.vtt
56.5 KiB
2024 Jun 22 00:15
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.json
1.8 MiB
2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.lrc
51.5 KiB
2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.srt
45.6 KiB
2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.text
31.6 KiB
2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.tsv
43.4 KiB
2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.txt
52.3 KiB
2024 Jun 22 00:21
DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.vtt
41.5 KiB
2024 Jun 22 00:21
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.json
743.1 KiB
2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.lrc
19.5 KiB
2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.srt
20.2 KiB
2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.text
13.9 KiB
2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.tsv
16.9 KiB
2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.txt
19.7 KiB
2024 Jun 22 00:23
DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.vtt
18.4 KiB
2024 Jun 22 00:23
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.json
1.6 MiB
2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.lrc
46.2 KiB
2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.srt
44.2 KiB
2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.text
30.6 KiB
2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.tsv
39.5 KiB
2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.txt
46.8 KiB
2024 Jun 22 00:28
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.vtt
40.3 KiB
2024 Jun 22 00:28
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.json
2.0 MiB
2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.lrc
62.5 KiB
2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.srt
45.6 KiB
2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.text
35.3 KiB
2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.tsv
51.4 KiB
2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.txt
63.5 KiB
2024 Jun 22 00:34
DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.vtt
42.5 KiB
2024 Jun 22 00:34
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.json
2.0 MiB
2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.lrc
50.3 KiB
2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.srt
59.8 KiB
2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.text
39.1 KiB
2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.tsv
45.6 KiB
2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.txt
50.7 KiB
2024 Jun 22 00:39
DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.vtt
53.9 KiB
2024 Jun 22 00:39
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.json
1.0 MiB
2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.lrc
25.7 KiB
2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.srt
28.6 KiB
2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.text
20.1 KiB
2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.tsv
23.2 KiB
2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.txt
25.9 KiB
2024 Jun 22 00:42
DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.vtt
26.3 KiB
2024 Jun 22 00:42
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.json
2.2 MiB
2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.lrc
53.1 KiB
2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.srt
70.4 KiB
2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.text
41.3 KiB
2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.tsv
48.2 KiB
2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.txt
53.5 KiB
2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.vtt
62.2 KiB
2024 Jun 22 00:49
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.json
1.6 MiB
2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.lrc
39.9 KiB
2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.srt
49.3 KiB
2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.text
33.7 KiB
2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.tsv
37.2 KiB
2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.txt
40.1 KiB
2024 Jun 22 00:54
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.vtt
44.9 KiB
2024 Jun 22 00:54
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.json
1.6 MiB
2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.lrc
42.7 KiB
2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.srt
46.0 KiB
2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.text
32.5 KiB
2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.tsv
38.5 KiB
2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.txt
43.1 KiB
2024 Jun 22 00:59
DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.vtt
42.2 KiB
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.json
41 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.lrc
0 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.srt
0 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.text
0 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.tsv
16 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.txt
0 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.vtt
10 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.json
41 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.lrc
0 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.srt
0 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.text
0 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.tsv
16 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.txt
0 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.vtt
10 B
2024 Jun 22 00:59
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.json
1.5 MiB
2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.lrc
38.0 KiB
2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.srt
41.6 KiB
2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.text
29.6 KiB
2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.tsv
34.4 KiB
2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.txt
38.3 KiB
2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.vtt
38.2 KiB
2024 Jun 22 01:04
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.json
1.0 MiB
2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.lrc
25.7 KiB
2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.srt
28.5 KiB
2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.text
20.2 KiB
2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.tsv
23.3 KiB
2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.txt
25.9 KiB
2024 Jun 22 01:07
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.vtt
26.2 KiB
2024 Jun 22 01:07
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.json
2.0 MiB
2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.lrc
57.7 KiB
2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.srt
48.9 KiB
2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.text
35.8 KiB
2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.tsv
48.4 KiB
2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.txt
58.5 KiB
2024 Jun 22 01:13
DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.vtt
45.0 KiB
2024 Jun 22 01:13
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.json
1.8 MiB
2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.lrc
47.2 KiB
2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.srt
51.2 KiB
2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.text
36.3 KiB
2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.tsv
42.7 KiB
2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.txt
47.6 KiB
2024 Jun 22 01:18
DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.vtt
46.9 KiB
2024 Jun 22 01:18
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.json
2.2 MiB
2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.lrc
56.3 KiB
2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.srt
61.4 KiB
2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.text
44.0 KiB
2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.tsv
51.2 KiB
2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.txt
56.8 KiB
2024 Jun 22 01:26
DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.vtt
56.4 KiB
2024 Jun 22 01:26
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.json
1.5 MiB
2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.lrc
37.5 KiB
2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.srt
41.4 KiB
2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.text
29.0 KiB
2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.tsv
33.9 KiB
2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.txt
37.8 KiB
2024 Jun 22 01:31
DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.vtt
37.9 KiB
2024 Jun 22 01:31
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.json
2.0 MiB
2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.lrc
59.0 KiB
2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.srt
46.7 KiB
2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.text
37.6 KiB
2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.tsv
50.2 KiB
2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.txt
59.8 KiB
2024 Jun 22 01:37
DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.vtt
44.0 KiB
2024 Jun 22 01:37
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.json
2.4 MiB
2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.lrc
59.3 KiB
2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.srt
63.9 KiB
2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.text
46.0 KiB
2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.tsv
53.8 KiB
2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.txt
59.9 KiB
2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.vtt
58.8 KiB
2024 Jun 22 01:44
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.json
2.6 MiB
2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.lrc
64.5 KiB
2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.srt
65.9 KiB
2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.text
49.4 KiB
2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.tsv
58.3 KiB
2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.txt
65.1 KiB
2024 Jun 22 01:54
DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.vtt
61.2 KiB
2024 Jun 22 01:54
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.json
1.9 MiB
2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.lrc
45.8 KiB
2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.srt
62.0 KiB
2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.text
35.8 KiB
2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.tsv
41.7 KiB
2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.txt
46.2 KiB
2024 Jun 22 02:00
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.vtt
54.6 KiB
2024 Jun 22 02:00
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.json
1.1 MiB
2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.lrc
27.0 KiB
2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.srt
35.9 KiB
2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.text
20.9 KiB
2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.tsv
24.3 KiB
2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.txt
27.2 KiB
2024 Jun 22 02:03
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.vtt
31.7 KiB
2024 Jun 22 02:03
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.json
1.4 MiB
2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.lrc
36.9 KiB
2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt
41.3 KiB
2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.text
28.3 KiB
2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.tsv
33.4 KiB
2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.txt
37.3 KiB
2024 Jun 22 02:07
DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.vtt
37.6 KiB
2024 Jun 22 02:07
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.json
261.8 KiB
2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.lrc
6.2 KiB
2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.srt
6.6 KiB
2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.text
4.8 KiB
2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.tsv
5.5 KiB
2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.txt
6.2 KiB
2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.vtt
6.1 KiB
2024 Jun 22 02:09
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.json
1.9 MiB
2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.lrc
48.2 KiB
2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.srt
49.3 KiB
2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.text
37.7 KiB
2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.tsv
43.8 KiB
2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.txt
48.6 KiB
2024 Jun 22 02:15
DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.vtt
46.0 KiB
2024 Jun 22 02:15
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.json
2.0 MiB
2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.lrc
58.3 KiB
2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.srt
53.3 KiB
2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.text
38.5 KiB
2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.tsv
50.1 KiB
2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.txt
59.1 KiB
2024 Jun 22 02:22
DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.vtt
49.0 KiB
2024 Jun 22 02:22
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.json
1.4 MiB
2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.lrc
36.2 KiB
2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.srt
42.8 KiB
2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.text
27.8 KiB
2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.tsv
32.7 KiB
2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.txt
36.5 KiB
2024 Jun 22 02:27
DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.vtt
38.6 KiB
2024 Jun 22 02:27
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.json
2.3 MiB
2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.lrc
58.6 KiB
2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.srt
62.0 KiB
2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.text
46.0 KiB
2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.tsv
53.4 KiB
2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.txt
59.1 KiB
2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.vtt
57.4 KiB
2024 Jun 22 02:34
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.json
3.1 MiB
2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.lrc
99.4 KiB
2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.srt
69.7 KiB
2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.text
47.3 KiB
2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.tsv
78.6 KiB
2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.txt
101.4 KiB
2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.vtt
62.9 KiB
2024 Jun 22 02:45
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.json
2.7 MiB
2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.lrc
77.8 KiB
2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.srt
72.4 KiB
2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.text
50.9 KiB
2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.tsv
66.9 KiB
2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.txt
78.8 KiB
2024 Jun 22 02:54
DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.vtt
66.1 KiB
2024 Jun 22 02:54
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.json
1.3 MiB
2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.lrc
33.1 KiB
2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.srt
35.8 KiB
2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.text
25.4 KiB
2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.tsv
29.9 KiB
2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.txt
33.4 KiB
2024 Jun 22 02:58
DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.vtt
32.9 KiB
2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.json
109.9 KiB
2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.lrc
2.6 KiB
2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.srt
2.8 KiB
2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.text
2.0 KiB
2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.tsv
2.3 KiB
2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.txt
2.7 KiB
2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.vtt
2.6 KiB
2024 Jun 22 02:58
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.json
1.8 MiB
2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.lrc
46.3 KiB
2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.srt
49.2 KiB
2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.text
36.2 KiB
2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.tsv
42.1 KiB
2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.txt
46.7 KiB
2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.vtt
45.5 KiB
2024 Jun 22 03:03
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.json
1.8 MiB
2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.lrc
47.1 KiB
2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.srt
51.2 KiB
2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.text
36.6 KiB
2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.tsv
42.7 KiB
2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.txt
47.5 KiB
2024 Jun 22 03:08
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.vtt
47.0 KiB
2024 Jun 22 03:08
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.json
2.0 MiB
2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.lrc
57.4 KiB
2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.srt
51.0 KiB
2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.text
34.4 KiB
2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.tsv
47.8 KiB
2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.txt
58.3 KiB
2024 Jun 22 03:13
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.vtt
46.1 KiB
2024 Jun 22 03:13
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.json
1.7 MiB
2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.lrc
43.4 KiB
2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.srt
47.4 KiB
2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.text
34.0 KiB
2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.tsv
39.5 KiB
2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.txt
43.8 KiB
2024 Jun 22 03:18
DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.vtt
43.6 KiB
2024 Jun 22 03:18
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.json
1.8 MiB
2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.lrc
45.7 KiB
2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.srt
49.8 KiB
2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.text
35.6 KiB
2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.tsv
41.5 KiB
2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.txt
46.1 KiB
2024 Jun 22 03:23
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.vtt
45.8 KiB
2024 Jun 22 03:23
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.json
1.6 MiB
2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.lrc
38.4 KiB
2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.srt
48.2 KiB
2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.text
29.7 KiB
2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.tsv
34.8 KiB
2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.txt
38.8 KiB
2024 Jun 22 03:27
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.vtt
43.0 KiB
2024 Jun 22 03:27
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.json
2.2 MiB
2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.lrc
52.9 KiB
2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.srt
64.1 KiB
2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.text
41.7 KiB
2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.tsv
48.1 KiB
2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.txt
53.4 KiB
2024 Jun 22 03:33
DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.vtt
57.7 KiB
2024 Jun 22 03:33
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.json
2.4 MiB
2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.lrc
63.4 KiB
2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.srt
64.6 KiB
2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.text
45.5 KiB
2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.tsv
56.1 KiB
2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.txt
64.1 KiB
2024 Jun 22 03:40
DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.vtt
59.1 KiB
2024 Jun 22 03:40
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.json
1.6 MiB
2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.lrc
46.6 KiB
2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.srt
39.5 KiB
2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.text
28.2 KiB
2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.tsv
39.0 KiB
2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.txt
47.3 KiB
2024 Jun 22 03:44
DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.vtt
36.2 KiB
2024 Jun 22 03:44
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.json
1.2 MiB
2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.lrc
32.0 KiB
2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.srt
31.7 KiB
2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.text
22.5 KiB
2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.tsv
27.9 KiB
2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.txt
32.4 KiB
2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.vtt
29.1 KiB
2024 Jun 22 03:48
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.json
1.3 MiB
2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.lrc
32.9 KiB
2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.srt
35.3 KiB
2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.text
25.6 KiB
2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.tsv
29.8 KiB
2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.txt
33.2 KiB
2024 Jun 22 03:51
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.vtt
32.5 KiB
2024 Jun 22 03:51
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.json
1.9 MiB
2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.lrc
45.1 KiB
2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.srt
51.7 KiB
2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.text
36.7 KiB
2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.tsv
41.6 KiB
2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.txt
45.5 KiB
2024 Jun 22 03:56
DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.vtt
47.5 KiB
2024 Jun 22 03:56
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.json
1.8 MiB
2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.lrc
51.2 KiB
2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.srt
45.0 KiB
2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.text
31.2 KiB
2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.tsv
42.8 KiB
2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.txt
52.0 KiB
2024 Jun 22 04:01
DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.vtt
41.0 KiB
2024 Jun 22 04:01
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.json
1.1 MiB
2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.lrc
28.0 KiB
2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.srt
30.9 KiB
2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.text
21.6 KiB
2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.tsv
25.2 KiB
2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.txt
28.2 KiB
2024 Jun 22 04:04
DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.vtt
28.3 KiB
2024 Jun 22 04:04
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.json
1.4 MiB
2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.lrc
35.6 KiB
2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.srt
38.5 KiB
2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.text
27.7 KiB
2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.tsv
32.2 KiB
2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.txt
35.9 KiB
2024 Jun 22 04:07
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.vtt
35.4 KiB
2024 Jun 22 04:07
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.json
41 B
2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.lrc
0 B
2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.srt
0 B
2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.text
0 B
2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.tsv
16 B
2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.txt
0 B
2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.vtt
10 B
2024 Jun 22 04:08
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.json
681.8 KiB
2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.lrc
20.0 KiB
2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.srt
17.1 KiB
2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.text
12.3 KiB
2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.tsv
16.4 KiB
2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.txt
20.3 KiB
2024 Jun 22 04:10
DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.vtt
15.8 KiB
2024 Jun 22 04:10
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.json
2.1 MiB
2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.lrc
58.0 KiB
2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.srt
48.4 KiB
2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.text
35.8 KiB
2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.tsv
48.7 KiB
2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.txt
58.8 KiB
2024 Jun 22 04:15
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.vtt
44.7 KiB
2024 Jun 22 04:15
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.json
4.1 MiB
2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.lrc
100.0 KiB
2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.srt
125.7 KiB
2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.text
76.3 KiB
2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.tsv
89.3 KiB
2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.txt
100.9 KiB
2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.vtt
114.9 KiB
2024 Jun 22 04:26
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.json
2.0 MiB
2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.lrc
46.3 KiB
2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.srt
61.6 KiB
2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.text
36.0 KiB
2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.tsv
42.0 KiB
2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.txt
46.7 KiB
2024 Jun 22 04:32
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.vtt
54.3 KiB
2024 Jun 22 04:32
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.json
1.9 MiB
2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.lrc
51.0 KiB
2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.srt
45.1 KiB
2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.text
32.8 KiB
2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.tsv
43.3 KiB
2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.txt
51.7 KiB
2024 Jun 22 04:37
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.vtt
41.5 KiB
2024 Jun 22 04:37
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.json
1.4 MiB
2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.lrc
38.9 KiB
2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.srt
42.3 KiB
2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.text
30.0 KiB
2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.tsv
35.2 KiB
2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.txt
39.2 KiB
2024 Jun 22 04:41
DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.vtt
38.8 KiB
2024 Jun 22 04:41
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.json
1.4 MiB
2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.lrc
35.4 KiB
2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.srt
38.5 KiB
2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.text
28.3 KiB
2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.tsv
32.4 KiB
2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.txt
35.6 KiB
2024 Jun 22 04:44
DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.vtt
35.6 KiB
2024 Jun 22 04:44
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.json
1.6 MiB
2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.lrc
50.2 KiB
2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.srt
43.0 KiB
2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.text
30.3 KiB
2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.tsv
41.9 KiB
2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.txt
51.0 KiB
2024 Jun 22 04:49
DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.vtt
39.3 KiB
2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.json
41.7 KiB
2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.lrc
1.2 KiB
2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.srt
1.1 KiB
2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.text
944 B
2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.tsv
1.0 KiB
2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.txt
1.2 KiB
2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.vtt
1.1 KiB
2024 Jun 22 04:49
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.json
47.0 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.lrc
1.2 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.srt
1.2 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.text
925 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.tsv
1.0 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.txt
1.2 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.vtt
1.1 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.json
14.7 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.lrc
394 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.srt
360 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.text
290 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.tsv
350 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.txt
398 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.vtt
352 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.json
38.0 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.lrc
1.1 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.srt
1.1 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.text
828 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.tsv
956 B
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.txt
1.1 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.vtt
1.0 KiB
2024 Jun 22 04:50
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.json
81.0 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.lrc
2.1 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.srt
2.1 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.text
1.6 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.tsv
1.8 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.txt
2.1 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.vtt
2.0 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.json
34.5 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.lrc
859 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.srt
781 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.text
677 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.tsv
771 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.txt
866 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.vtt
764 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.json
36.6 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.lrc
1.0 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.srt
943 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.text
804 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.tsv
920 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.txt
1.0 KiB
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.vtt
917 B
2024 Jun 22 04:51
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.json
1020.1 KiB
2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.lrc
26.6 KiB
2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.srt
27.1 KiB
2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.text
21.0 KiB
2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.tsv
24.1 KiB
2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.txt
26.9 KiB
2024 Jun 22 04:54
DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.vtt
25.4 KiB
2024 Jun 22 04:54
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.json
1.4 MiB
2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.lrc
38.9 KiB
2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.srt
41.0 KiB
2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.text
27.3 KiB
2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.tsv
34.0 KiB
2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.txt
39.3 KiB
2024 Jun 22 04:58
DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.vtt
37.1 KiB
2024 Jun 22 04:58
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.json
1.3 MiB
2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.lrc
35.7 KiB
2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.srt
37.9 KiB
2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.text
26.1 KiB
2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.tsv
31.6 KiB
2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.txt
36.1 KiB
2024 Jun 22 05:01
DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.vtt
34.5 KiB
2024 Jun 22 05:01