FileMood

Download DEF CON 26 video and slides

DEF CON 26 video and slides

Name

DEF CON 26 video and slides

 DOWNLOAD Copy Link

Total Size

8.2 GB

Total Files

213

Last Seen

2024-09-06 23:47

Hash

EEB73E7F4473D8558DBECF7257E6CBDC5F495311

/

DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.mp4

33.0 MB

DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.srt

29.2 KB

DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.mp4

42.7 MB

DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.srt

23.3 KB

DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.mp4

84.2 MB

DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.srt

70.5 KB

DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.mp4

52.5 MB

DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.srt

34.1 KB

DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.mp4

25.9 MB

DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.srt

20.9 KB

DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.mp4

30.1 MB

DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.srt

21.2 KB

DEF CON 26 Conference - Balmas and Itkin - What the Fax.srt

51.2 KB

DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.mp4

68.6 MB

DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.srt

32.3 KB

DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.mp4

42.4 MB

DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.srt

40.6 KB

DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.mp4

64.3 MB

DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.srt

36.0 KB

DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.mp4

118.3 MB

DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.srt

67.2 KB

DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.mp4

55.5 MB

DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.srt

31.5 KB

DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.mp4

109.0 MB

DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.srt

41.1 KB

DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.mp4

58.2 MB

DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.srt

36.9 KB

DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.mp4

155.8 MB

DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.srt

65.2 KB

DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.mp4

58.7 MB

DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.srt

26.4 KB

DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.mp4

103.9 MB

DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.srt

39.8 KB

DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.mp4

52.0 MB

DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.srt

57.8 KB

DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.mp4

132.7 MB

DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.srt

67.6 KB

DEF CON 26 Conference - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory.srt

88.5 KB

DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.mp4

84.5 MB

DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.srt

45.1 KB

DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.mp4

71.3 MB

DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.srt

48.1 KB

DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.mp4

73.0 MB

DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.srt

57.5 KB

DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.mp4

62.3 MB

DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.srt

44.7 KB

DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.mp4

261.3 MB

DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.srt

96.1 KB

DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.mp4

62.8 MB

DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.srt

21.4 KB

DEF CON 26 Conference - Eyal Itkin, Yaniv Balmas - What the Fax-!.mp4

70.5 MB

DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.mp4

46.9 MB

DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.srt

31.4 KB

DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.mp4

112.4 MB

DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.srt

52.6 KB

DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.mp4

117.6 MB

DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.srt

65.1 KB

DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4

95.1 MB

DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.srt

51.2 KB

DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.mp4

43.6 MB

DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.srt

21.8 KB

DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.mp4

70.2 MB

DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.srt

52.5 KB

DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.mp4

23.1 MB

DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.srt

16.9 KB

DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.mp4

73.3 MB

DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.srt

37.7 KB

DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.mp4

61.1 MB

DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.srt

60.7 KB

DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.mp4

25.4 MB

DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.srt

20.2 KB

DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.mp4

47.3 MB

DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.srt

26.2 KB

DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.mp4

112.6 MB

DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.srt

70.3 KB

DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.mp4

125.6 MB

DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.srt

50.5 KB

DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.mp4

100.7 MB

DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.srt

47.0 KB

DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.mp4

55.9 MB

DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.srt

48.7 KB

DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.mp4

66.6 MB

DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.srt

46.6 KB

DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.mp4

51.5 MB

DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.srt

33.2 KB

DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.mp4

62.9 MB

DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.srt

56.3 KB

DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.mp4

72.4 MB

DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.srt

70.7 KB

DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.mp4

49.9 MB

DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.srt

55.7 KB

DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.mp4

93.4 MB

DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.srt

63.8 KB

DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.mp4

146.6 MB

DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.srt

49.2 KB

DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.mp4

38.5 MB

DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.srt

25.3 KB

DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.mp4

71.1 MB

DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.srt

38.1 KB

DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.mp4

43.6 MB

DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.srt

27.5 KB

DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.mp4

37.9 MB

DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.srt

20.0 KB

DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.mp4

116.2 MB

DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.srt

52.5 KB

DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.mp4

61.1 MB

DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.srt

43.7 KB

DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.mp4

60.9 MB

DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.srt

46.8 KB

DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.mp4

21.7 MB

DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.srt

14.6 KB

DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.mp4

59.4 MB

DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.srt

39.8 KB

DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.mp4

171.8 MB

DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.srt

57.0 KB

DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.mp4

56.5 MB

DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.srt

39.3 KB

DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.mp4

146.6 MB

DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.srt

56.2 KB

DEF CON 26 Conference - Panel - DC 101 PANEL.mp4

195.7 MB

DEF CON 26 Conference - Panel - DC 101 PANEL.srt

55.3 KB

DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.mp4

113.4 MB

DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.srt

39.0 KB

DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.mp4

25.9 MB

DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.srt

26.5 KB

DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.mp4

59.0 MB

DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.srt

57.2 KB

DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.mp4

180.8 MB

DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.srt

54.3 KB

DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.mp4

104.5 MB

DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.srt

43.4 KB

DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.mp4

83.2 MB

DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.srt

54.2 KB

DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.mp4

76.7 MB

DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.srt

42.0 KB

DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.mp4

132.3 MB

DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.srt

53.3 KB

DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.mp4

51.3 MB

DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.srt

19.1 KB

DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.mp4

33.8 MB

DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.srt

25.0 KB

DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.mp4

46.0 MB

DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.srt

44.7 KB

DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.mp4

46.1 MB

DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.srt

15.2 KB

DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.mp4

23.5 MB

DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.srt

20.5 KB

DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.mp4

56.4 MB

DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.srt

63.7 KB

DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.mp4

139.6 MB

DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.srt

62.4 KB

DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.mp4

40.8 MB

DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.srt

16.3 KB

DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.mp4

77.2 MB

DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.srt

47.9 KB

DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.mp4

91.4 MB

DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.srt

51.5 KB

DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.mp4

43.9 MB

DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.srt

17.4 KB

DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.mp4

61.3 MB

DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.srt

51.9 KB

DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.mp4

374.5 MB

DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.srt

92.9 KB

DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.mp4

165.3 MB

DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.srt

47.4 KB

DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.mp4

181.8 MB

DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.srt

57.6 KB

DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.mp4

147.9 MB

DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.srt

59.9 KB

DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.mp4

58.0 MB

DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.srt

42.4 KB

DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.mp4

37.1 MB

DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.srt

23.4 KB

DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.mp4

41.3 MB

DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.srt

29.0 KB

DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.mp4

50.1 MB

DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.srt

52.6 KB

DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.mp4

38.0 MB

DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.srt

23.6 KB

DEF CON 26 Conference - William Martin - One-Click to OWA.mp4

38.2 MB

DEF CON 26 Conference - William Martin - One-Click to OWA.srt

25.7 KB

DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.mp4

109.7 MB

DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.srt

44.8 KB

DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.mp4

30.2 MB

DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.srt

17.4 KB

DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.mp4

52.5 MB

DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.srt

27.4 KB

DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.mp4

30.8 MB

DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.srt

27.1 KB

DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.mp4

47.8 MB

DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.srt

21.3 KB

DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.mp4

28.4 MB

DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.srt

17.1 KB

DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.mp4

105.9 MB

DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.srt

40.4 KB

DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.mp4

50.1 MB

DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.srt

26.0 KB

DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4

22.0 MB

DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.srt

26.1 KB

DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.mp4

31.4 MB

DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.srt

26.4 KB

DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.mp4

92.9 MB

DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.srt

33.5 KB

DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.mp4

64.6 MB

DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.srt

51.1 KB

DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.mp4

57.2 MB

DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.srt

68.8 KB

DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.mp4

80.1 MB

DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.srt

36.6 KB

DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.mp4

43.3 MB

DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.srt

21.4 KB

DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.mp4

52.5 MB

DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.srt

59.6 KB

 

Total files 213


Copyright © 2024 FileMood.com