FileMood

Download DEF CON 25 presentations

DEF CON 25 presentations

Name

DEF CON 25 presentations

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

501.3 MB

Total Files

130

Hash

85579B7788BBC7FC07C0B4A61727A52CE1003049

/Dimitry Snezhkov/

DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks.pdf

74.5 MB

/

DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf

2.0 MB

DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf

1.7 MB

DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf

2.3 MB

DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf

3.1 MB

DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf

2.7 MB

DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf

256.0 KB

DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf

5.8 MB

DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf

2.3 MB

DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf

5.3 MB

DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf

4.5 MB

DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf

1.9 MB

DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf

2.0 MB

DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf

5.1 MB

DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf

7.0 MB

DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf

2.9 MB

DEFCON-25-Svea-Eckert-Andreas-Dewes-Dark-Data.pdf

6.5 MB

DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf

6.2 MB

DEFCON-25-Tess-Schrodinger-Total-Recall.pdf

5.2 MB

DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf

6.3 MB

DEFCON-25-0ctane-Untrustworthy-Hardware.pdf

2.7 MB

DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf

2.5 MB

DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf

2.3 MB

DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf

1.9 MB

DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf

297.1 KB

DEFCON-25-Salvador-Mendoza-Exploiting-0ld-Magstripe-Info-with-New-Technology.pdf

5.5 MB

DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf

4.4 MB

DEFCON-25-Matt-Wixey-See-No-Evil-Hear-No-Evil.pdf

6.3 MB

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf

21.7 MB

DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf

3.1 MB

DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf

2.0 MB

DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf

2.9 MB

DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf

6.1 MB

DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf

5.3 MB

DEFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf

1.3 MB

DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf

11.1 MB

DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf

2.5 MB

DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf

70.9 KB

DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf

2.4 MB

DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf

2.3 MB

DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf

6.8 MB

DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf

818.5 KB

DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf

7.9 MB

DEFCON-25-Plore-Popping-a-Smart-Gun.pdf

4.3 MB

DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf

3.3 MB

DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf

2.5 MB

DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf

2.1 MB

DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf

2.6 MB

DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf

6.3 MB

DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf

4.4 MB

DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf

4.2 MB

DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf

5.0 MB

DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf

8.8 MB

DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf

1.5 MB

DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf

631.3 KB

DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf

7.2 MB

DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf

933.5 KB

DEFCON-25-Scott-Behrens-and-Jeremy-Heffner-Starting-The-Avalanche-Application-DoS-In-Microservice-Architectures.pdf

2.1 MB

DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf

4.4 MB

DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf

4.7 MB

DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf

7.1 MB

DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf

3.4 MB

DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf

2.1 MB

DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf

4.8 MB

DEFCON-25-Joe-Rozner-Wiping-Out-CSRF.pdf

134.6 KB

DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools.pdf

4.7 MB

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf

2.1 MB

/Dor Azouri/

DEFCON-25-Dor-Azouri-BITSInject.pdf

847.8 KB

DEFCON-25-Dor-Azouri-BITSInject-WP.pdf

1.5 MB

/Morten Schenk/

DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update.pdf

2.1 MB

DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-Leveraging-vulns-in-Creators-Update-WP.pdf

1.2 MB

/Mark Newlin Logan Lamb and Christopher Grayson/

DEFCON-25-Newlin-Lamb-Grayson-CableTap-Wirelessly-Tapping-Your-Home-Network.pdf

3.9 MB

/Matt Suiche/

DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-WP.pdf

317.7 KB

DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts.pdf

6.4 MB

/Tomer Cohen/

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf

2.1 MB

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf

21.7 MB

/Steinthor Bjarnason and Jason Jones/

DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-WP.pdf

168.7 KB

DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House.pdf

6.6 MB

/Cheng Lei/

DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus.pdf

1.7 MB

DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-Security-Wall-of-S7CommPlus-WP.pdf

1.3 MB

/Matt Knight and Marc Newlin/

DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation.pdf

26.3 MB

DEFCON-25-Matt-Knight-and-Marc-Newlin-Radio-Exploitation-WP.pdf

127.7 KB

/Denton Gentry/

DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-WP.pdf

525.3 KB

DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi.pdf

475.3 KB

/Phillip Tully and Michael Raggo/

DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally-WP.pdf

395.7 KB

DEFCON-25-Phillip-Tully-Michael-Raggo-A-Picture-is-Worth-a-Thousand-Words-Literally.pdf

3.8 MB

/.../Josh Pitts - Extras/parser-output/winVista/

output.json

4.6 MB

/.../Josh Pitts - Extras/parser-output/win8/

output.json

9.6 MB

/.../Josh Pitts - Extras/parser-output/win10/

output.json

18.3 MB

/.../Josh Pitts - Extras/parser-output/win7/

output.json

6.5 MB

/.../Josh Pitts - Extras/parser-output/winXP/

output.json

886.7 KB

/.../Josh Pitts - Extras/

README.txt

0.1 KB

fido.py

173.6 KB

/Josh Pitts/

DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks.pdf

5.7 MB

/Duncan Woodbury and Nicholas Haltmeyer/

DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles.pdf

4.7 MB

DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-WP.pdf

600.4 KB

/5A1F/

DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects-WP.pdf

6.5 MB

DEFCON-25-5A1F-Demystifying-Kernel-Exploitation-By-Abusing-GDI-Objects.pdf

11.2 MB

/.../Dimitry Snezhkov - Extras/octohook-master/kcmd/

__init__.pyc

0.1 KB

cmdlook.py

1.4 KB

__init__.py

0.0 KB

cmdservice.py

12.2 KB

/.../Dimitry Snezhkov - Extras/octohook-master/config/

client.yml

1.9 KB

server.yml

1.9 KB

/.../Dimitry Snezhkov - Extras/octohook-master/keys/

server.pem

3.1 KB

/.../Dimitry Snezhkov - Extras/octohook-master/

README.md

0.2 KB

octohook.py

4.2 KB

/.../Dimitry Snezhkov - Extras/octohook-master/logs/

octohook_server.log

9.1 KB

octohook_client.log

40.8 KB

/.../Dimitry Snezhkov - Extras/octohook-master/ktasks/

__init__.py

0.0 KB

gtasks.py

2.4 KB

/.../Dimitry Snezhkov - Extras/octohook-master/doc/

requirements.txt

0.5 KB

/.../Dimitry Snezhkov - Extras/octohook-master/klib/

ghlib.pyc

4.0 KB

__init__.py

0.0 KB

__init__.pyc

0.1 KB

configuration.py

1.3 KB

ghlib.py

3.7 KB

/.../Dimitry Snezhkov - Extras/octohook-master/kweb/

webservice.pyc

3.9 KB

webrouter.py

1.1 KB

webservice.py

3.8 KB

gitcommander.py

8.0 KB

__init__.pyc

0.1 KB

__init__.py

0.0 KB

/.../Dimitry Snezhkov - Extras/octohook-master/utils/

cr_cert.sh

0.1 KB

/.../Dimitry Snezhkov - Extras/octohook-master/templates/

putlocal.tmpl

0.2 KB

execlocal.tmpl

0.2 KB

/Itzik Kotler and Amit Klein/

DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox-WP.pdf

1.4 MB

DEFCON-25-Itzik-Kotler-and-Amit-Klein-The-Adventures-of-AV-and-the-Leaky-Sandbox.pdf

7.4 MB

/Romain Coltel and Yves Le Provost/

DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients-WP.pdf

1.1 MB

DEFCON-25-Coltel-LeProvost-WSUSpendu-How-To-Hang-Its-Clients.pdf

2.3 MB

 

Total files 130


Copyright © 2025 FileMood.com