FileMood

Download DEF CON 27

DEF CON 27

Name

DEF CON 27

 DOWNLOAD Copy Link

Total Size

116.3 GB

Total Files

3012

Hash

08AEB25765F5456462ED904F9EEAAF3F3FCC6398

/DEF CON 27 art/

defcon27-blue-shaded.jpg

880.6 KB

defcon27-blue-shaded.png

408.7 KB

/.../DEF CON 27 conference audio flac/

DEF CON 27 Conference - Alexandre Borges - NET Malware Threats Internals And Reversing.flac

144.6 MB

DEF CON 27 Conference - Alexandre Borges - NET Malware Threats Internals And Reversing.txt

34.8 KB

DEF CON 27 Conference - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.flac

144.9 MB

DEF CON 27 Conference - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.txt

57.6 KB

DEF CON 27 Conference - Alon Weinberg - Please Inject Me a x64 Code Injection.flac

50.6 MB

DEF CON 27 Conference - Alon Weinberg - Please Inject Me a x64 Code Injection.txt

17.4 KB

DEF CON 27 Conference - Alvaro Muñoz - SSO Wars The Token Menace.flac

116.0 MB

DEF CON 27 Conference - Alvaro Muñoz - SSO Wars The Token Menace.txt

39.2 KB

DEF CON 27 Conference - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.flac

147.9 MB

DEF CON 27 Conference - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.txt

54.6 KB

DEF CON 27 Conference - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.flac

64.4 MB

DEF CON 27 Conference - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.txt

25.4 KB

DEF CON 27 Conference - Anish Athalye - Want Strong Isolation Just Reset Your Processor.flac

132.6 MB

DEF CON 27 Conference - Anish Athalye - Want Strong Isolation Just Reset Your Processor.txt

60.6 KB

DEF CON 27 Conference - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.flac

79.5 MB

DEF CON 27 Conference - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.txt

38.1 KB

DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.flac

91.0 MB

DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.txt

32.6 KB

DEF CON 27 Conference - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.flac

147.7 MB

DEF CON 27 Conference - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.txt

43.5 KB

DEF CON 27 Conference - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.flac

119.0 MB

DEF CON 27 Conference - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.txt

47.8 KB

DEF CON 27 Conference - Bill Graydon - Duplicating Restricted Mechanical Keys.flac

132.5 MB

DEF CON 27 Conference - Bill Graydon - Duplicating Restricted Mechanical Keys.txt

52.3 KB

DEF CON 27 Conference - Bill Swearingen - HAKC THE POLICE.flac

125.6 MB

DEF CON 27 Conference - Bill Swearingen - HAKC THE POLICE.txt

44.3 KB

DEF CON 27 Conference - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.flac

110.6 MB

DEF CON 27 Conference - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.txt

43.6 KB

DEF CON 27 Conference - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.flac

47.8 MB

DEF CON 27 Conference - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.txt

22.9 KB

DEF CON 27 Conference - Bruce Schneier - Information Security in the Public Interest.flac

125.3 MB

DEF CON 27 Conference - Bruce Schneier - Information Security in the Public Interest.txt

41.5 KB

DEF CON 27 Conference - Campbell Murray - GSM We Can Hear Everyone Now.flac

116.0 MB

DEF CON 27 Conference - Campbell Murray - GSM We Can Hear Everyone Now.txt

40.5 KB

DEF CON 27 Conference - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.flac

87.3 MB

DEF CON 27 Conference - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.txt

32.5 KB

DEF CON 27 Conference - Christopher Wade - Tag-side attacks against NFC.flac

108.3 MB

DEF CON 27 Conference - Christopher Wade - Tag-side attacks against NFC.txt

47.7 KB

DEF CON 27 Conference - Contests and Events - Contests Awards Ceremony.flac

181.8 MB

DEF CON 27 Conference - Contests and Events - Contests Awards Ceremony.txt

63.5 KB

DEF CON 27 Conference - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.flac

112.9 MB

DEF CON 27 Conference - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.txt

37.3 KB

DEF CON 27 Conference - Daniel Romero - Why You Should Fear Your mundane Office Equipment.flac

130.3 MB

DEF CON 27 Conference - Daniel Romero - Why You Should Fear Your mundane Office Equipment.txt

45.7 KB

DEF CON 27 Conference - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.flac

143.6 MB

DEF CON 27 Conference - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.txt

49.2 KB

DEF CON 27 Conference - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.flac

149.9 MB

DEF CON 27 Conference - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.txt

48.1 KB

DEF CON 27 Conference - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.flac

122.3 MB

DEF CON 27 Conference - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.txt

44.3 KB

DEF CON 27 Conference - Douglas McKee - HVACking Understand the Delta Between Security and Reality.flac

114.2 MB

DEF CON 27 Conference - Douglas McKee - HVACking Understand the Delta Between Security and Reality.txt

52.0 KB

DEF CON 27 Conference - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.flac

68.2 MB

DEF CON 27 Conference - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.txt

26.4 KB

DEF CON 27 Conference - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.flac

135.3 MB

DEF CON 27 Conference - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.txt

46.9 KB

DEF CON 27 Conference - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.flac

97.6 MB

DEF CON 27 Conference - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.txt

41.2 KB

DEF CON 27 Conference - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.flac

136.4 MB

DEF CON 27 Conference - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.txt

46.6 KB

DEF CON 27 Conference - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.flac

132.4 MB

DEF CON 27 Conference - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.txt

40.7 KB

DEF CON 27 Conference - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.flac

64.3 MB

DEF CON 27 Conference - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.txt

24.9 KB

DEF CON 27 Conference - Hadrien Barral - The ABC of Next-Gen Shellcoding.flac

105.7 MB

DEF CON 27 Conference - Hadrien Barral - The ABC of Next-Gen Shellcoding.txt

36.4 KB

DEF CON 27 Conference - Hila Cohen - Malproxy Leave Your Malware at Home.flac

116.9 MB

DEF CON 27 Conference - Hila Cohen - Malproxy Leave Your Malware at Home.txt

40.8 KB

DEF CON 27 Conference - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.flac

130.3 MB

DEF CON 27 Conference - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.txt

47.5 KB

DEF CON 27 Conference - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.flac

121.7 MB

DEF CON 27 Conference - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.txt

43.2 KB

DEF CON 27 Conference - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.flac

125.8 MB

DEF CON 27 Conference - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.txt

40.9 KB

DEF CON 27 Conference - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.flac

149.2 MB

DEF CON 27 Conference - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.txt

58.9 KB

DEF CON 27 Conference - Jayson Grace - MOSE Using Configuration Management for Evil.flac

119.1 MB

DEF CON 27 Conference - Jayson Grace - MOSE Using Configuration Management for Evil.txt

42.8 KB

DEF CON 27 Conference - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.flac

138.5 MB

DEF CON 27 Conference - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.txt

60.0 KB

DEF CON 27 Conference - Jens Müller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.flac

65.3 MB

DEF CON 27 Conference - Jens Müller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.txt

22.7 KB

DEF CON 27 Conference - Jesse Michael - Get Off the Kernel if You Cant Drive.flac

132.3 MB

DEF CON 27 Conference - Jesse Michael - Get Off the Kernel if You Cant Drive.txt

48.4 KB

DEF CON 27 Conference - Jmaxxz - Your Car is My Car.flac

112.1 MB

DEF CON 27 Conference - Jmaxxz - Your Car is My Car.txt

43.4 KB

DEF CON 27 Conference - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.flac

149.7 MB

DEF CON 27 Conference - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.txt

74.4 KB

DEF CON 27 Conference - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.flac

117.4 MB

DEF CON 27 Conference - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.txt

45.5 KB

DEF CON 27 Conference - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.flac

140.8 MB

DEF CON 27 Conference - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.txt

55.8 KB

DEF CON 27 Conference - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.flac

118.3 MB

DEF CON 27 Conference - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.txt

44.6 KB

DEF CON 27 Conference - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.flac

107.7 MB

DEF CON 27 Conference - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.txt

27.2 KB

DEF CON 27 Conference - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.flac

121.9 MB

DEF CON 27 Conference - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.txt

54.4 KB

DEF CON 27 Conference - Kyle Gwinnup - Next Generation Process Emulation with Binee.flac

136.0 MB

DEF CON 27 Conference - Kyle Gwinnup - Next Generation Process Emulation with Binee.txt

55.9 KB

DEF CON 27 Conference - Leon Jacobs - Meticulously Modern Mobile Manipulations.flac

118.0 MB

DEF CON 27 Conference - Leon Jacobs - Meticulously Modern Mobile Manipulations.txt

44.3 KB

DEF CON 27 Conference - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.flac

122.1 MB

DEF CON 27 Conference - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.txt

41.7 KB

DEF CON 27 Conference - Marina Simakov - Relaying Credentials Has Never Been Easier.flac

138.9 MB

DEF CON 27 Conference - Marina Simakov - Relaying Credentials Has Never Been Easier.txt

45.3 KB

DEF CON 27 Conference - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.flac

110.9 MB

DEF CON 27 Conference - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.txt

46.9 KB

DEF CON 27 Conference - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.flac

142.2 MB

DEF CON 27 Conference - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.txt

52.7 KB

DEF CON 27 Conference - Michael Stepankin - Apache Solr Injection.flac

52.2 MB

DEF CON 27 Conference - Michael Stepankin - Apache Solr Injection.txt

15.8 KB

DEF CON 27 Conference - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.flac

63.3 MB

DEF CON 27 Conference - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.txt

24.4 KB

DEF CON 27 Conference - Nicolas Oberli - Poking the S in SD cards.flac

61.4 MB

DEF CON 27 Conference - Nicolas Oberli - Poking the S in SD cards.txt

19.3 KB

DEF CON 27 Conference - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.flac

92.2 MB

DEF CON 27 Conference - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.txt

34.0 KB

DEF CON 27 Conference - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.flac

63.6 MB

DEF CON 27 Conference - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.txt

23.5 KB

DEF CON 27 Conference - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware .flac

134.5 MB

DEF CON 27 Conference - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware .txt

57.4 KB

DEF CON 27 Conference - Omer Gull - SELECT code execution FROM USING SQLite.flac

123.5 MB

DEF CON 27 Conference - Omer Gull - SELECT code execution FROM USING SQLite.txt

42.1 KB

DEF CON 27 Conference - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.flac

126.7 MB

DEF CON 27 Conference - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.txt

47.6 KB

DEF CON 27 Conference - Orange Tsai - Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs.flac

131.6 MB

DEF CON 27 Conference - Orange Tsai - Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs.txt

38.4 KB

DEF CON 27 Conference - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.flac

109.5 MB

DEF CON 27 Conference - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.txt

50.3 KB

DEF CON 27 Conference - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.flac

113.6 MB

DEF CON 27 Conference - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.txt

45.8 KB

DEF CON 27 Conference - Patrick Wardle - Harnessing Weapons of Mac Destruction.flac

145.5 MB

DEF CON 27 Conference - Patrick Wardle - Harnessing Weapons of Mac Destruction.txt

54.4 KB

DEF CON 27 Conference - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.flac

130.4 MB

DEF CON 27 Conference - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.txt

39.6 KB

DEF CON 27 Conference - Philippe Laulheret - Intro to Hardware Hacking.flac

144.0 MB

DEF CON 27 Conference - Philippe Laulheret - Intro to Hardware Hacking.txt

62.3 KB

DEF CON 27 Conference - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.flac

114.3 MB

DEF CON 27 Conference - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.txt

51.3 KB

DEF CON 27 Conference - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.flac

117.1 MB

DEF CON 27 Conference - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.txt

34.9 KB

DEF CON 27 Conference - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.flac

134.3 MB

DEF CON 27 Conference - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.txt

43.4 KB

DEF CON 27 Conference - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.flac

175.6 MB

DEF CON 27 Conference - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.txt

64.3 KB

DEF CON 27 Conference - The Dark Tangent - Closing Ceremonies.flac

351.0 MB

DEF CON 27 Conference - The Dark Tangent - Closing Ceremonies.txt

111.7 KB

DEF CON 27 Conference - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.flac

58.9 MB

DEF CON 27 Conference - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.txt

21.4 KB

DEF CON 27 Conference - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.flac

110.2 MB

DEF CON 27 Conference - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.txt

35.7 KB

DEF CON 27 Conference - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.flac

116.3 MB

DEF CON 27 Conference - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.txt

36.0 KB

DEF CON 27 Conference - WillC - Phreaking Elevators.flac

106.2 MB

DEF CON 27 Conference - WillC - Phreaking Elevators.txt

40.6 KB

DEF CON 27 Conference - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.flac

101.4 MB

DEF CON 27 Conference - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.txt

28.1 KB

DEF CON 27 Conference - XiaoHuiHui - All the 4G Modules Could Be Hacked.flac

136.9 MB

DEF CON 27 Conference - XiaoHuiHui - All the 4G Modules Could Be Hacked.txt

38.4 KB

DEF CON 27 Conference - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.flac

98.4 MB

DEF CON 27 Conference - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.txt

31.7 KB

DEF CON 27 Conference - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.flac

97.9 MB

DEF CON 27 Conference - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.txt

27.0 KB

DEF CON 27 Conference - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.flac

136.2 MB

DEF CON 27 Conference - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.txt

47.1 KB

DEF CON 27 Conference - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Auto Infractions.flac

74.0 MB

DEF CON 27 Conference - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Others Auto Infractions.txt

25.6 KB

DEF CON 27 Conference - finalphoenix - Rise of the Hypebots Scripting Streetwear.flac

129.5 MB

DEF CON 27 Conference - finalphoenix - Rise of the Hypebots Scripting Streetwear.txt

41.9 KB

DEF CON 27 Conference - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.flac

117.0 MB

DEF CON 27 Conference - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.txt

44.5 KB

DEF CON 27 Conference - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.flac

76.8 MB

DEF CON 27 Conference - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.txt

26.1 KB

DEF CON 27 Conference - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.flac

108.4 MB

DEF CON 27 Conference - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.txt

43.2 KB

DEF CON 27 Conference - smea - Adventures In Smart Buttplug Penetration testing.flac

139.1 MB

DEF CON 27 Conference - smea - Adventures In Smart Buttplug Penetration testing.txt

60.4 KB

DEF CON 27 Conference - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.flac

137.7 MB

DEF CON 27 Conference - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.txt

52.3 KB

/.../DEF CON 27 conference audio m4a/

DEF CON 27 Conference - Alexandre Borges - NET Malware Threats Internals And Reversing.m4a

82.4 MB

DEF CON 27 Conference - Alexandre Borges - NET Malware Threats Internals And Reversing.txt

34.8 KB

DEF CON 27 Conference - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.m4a

89.8 MB

DEF CON 27 Conference - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.txt

57.6 KB

DEF CON 27 Conference - Alon Weinberg - Please Inject Me a x64 Code Injection.m4a

30.3 MB

DEF CON 27 Conference - Alon Weinberg - Please Inject Me a x64 Code Injection.txt

17.4 KB

DEF CON 27 Conference - Alvaro Munoz - SSO Wars The Token Menace.m4a

64.6 MB

DEF CON 27 Conference - Alvaro Muñoz - SSO Wars The Token Menace.txt

39.2 KB

DEF CON 27 Conference - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.m4a

83.7 MB

DEF CON 27 Conference - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.txt

54.6 KB

DEF CON 27 Conference - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.m4a

38.2 MB

DEF CON 27 Conference - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.txt

25.4 KB

DEF CON 27 Conference - Anish Athalye - Want Strong Isolation Just Reset Your Processor.m4a

76.4 MB

DEF CON 27 Conference - Anish Athalye - Want Strong Isolation Just Reset Your Processor.txt

60.6 KB

DEF CON 27 Conference - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.m4a

49.6 MB

DEF CON 27 Conference - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.txt

38.1 KB

DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.m4a

49.3 MB

DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.txt

32.6 KB

DEF CON 27 Conference - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.m4a

81.9 MB

DEF CON 27 Conference - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.txt

43.5 KB

DEF CON 27 Conference - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.m4a

72.9 MB

DEF CON 27 Conference - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.txt

47.8 KB

DEF CON 27 Conference - Bill Graydon - Duplicating Restricted Mechanical Keys.m4a

79.0 MB

DEF CON 27 Conference - Bill Graydon - Duplicating Restricted Mechanical Keys.txt

52.3 KB

DEF CON 27 Conference - Bill Swearingen - HAKC THE POLICE.m4a

71.4 MB

DEF CON 27 Conference - Bill Swearingen - HAKC THE POLICE.txt

44.3 KB

DEF CON 27 Conference - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.m4a

67.7 MB

DEF CON 27 Conference - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.txt

43.6 KB

DEF CON 27 Conference - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.m4a

30.9 MB

DEF CON 27 Conference - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.txt

22.9 KB

DEF CON 27 Conference - Bruce Schneier - Information Security in the Public Interest.m4a

73.1 MB

DEF CON 27 Conference - Bruce Schneier - Information Security in the Public Interest.txt

41.5 KB

DEF CON 27 Conference - Campbell Murray - GSM We Can Hear Everyone Now.m4a

66.0 MB

DEF CON 27 Conference - Campbell Murray - GSM We Can Hear Everyone Now.txt

40.5 KB

DEF CON 27 Conference - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.m4a

56.7 MB

DEF CON 27 Conference - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.txt

32.5 KB

DEF CON 27 Conference - Christopher Wade - Tag-side attacks against NFC.m4a

61.6 MB

DEF CON 27 Conference - Christopher Wade - Tag-side attacks against NFC.txt

47.7 KB

DEF CON 27 Conference - Contests and Events - Contests Awards Ceremony.m4a

104.3 MB

DEF CON 27 Conference - Contests and Events - Contests Awards Ceremony.txt

63.5 KB

DEF CON 27 Conference - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.m4a

64.3 MB

DEF CON 27 Conference - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.txt

37.3 KB

DEF CON 27 Conference - Daniel Romero - Why You Should Fear Your mundane Office Equipment.m4a

76.4 MB

DEF CON 27 Conference - Daniel Romero - Why You Should Fear Your mundane Office Equipment.txt

45.7 KB

DEF CON 27 Conference - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.m4a

84.0 MB

DEF CON 27 Conference - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.txt

49.2 KB

DEF CON 27 Conference - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.m4a

81.9 MB

DEF CON 27 Conference - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.txt

48.1 KB

DEF CON 27 Conference - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.m4a

72.0 MB

DEF CON 27 Conference - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.txt

44.3 KB

DEF CON 27 Conference - Douglas McKee - HVACking Understand the Delta Between Security and Reality.m4a

69.3 MB

DEF CON 27 Conference - Douglas McKee - HVACking Understand the Delta Between Security and Reality.txt

52.0 KB

DEF CON 27 Conference - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.m4a

38.8 MB

DEF CON 27 Conference - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.txt

26.4 KB

DEF CON 27 Conference - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.m4a

69.6 MB

DEF CON 27 Conference - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.txt

46.9 KB

DEF CON 27 Conference - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.m4a

63.4 MB

DEF CON 27 Conference - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.txt

41.2 KB

DEF CON 27 Conference - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.m4a

74.3 MB

DEF CON 27 Conference - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.txt

46.6 KB

DEF CON 27 Conference - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.m4a

72.4 MB

DEF CON 27 Conference - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.txt

40.7 KB

DEF CON 27 Conference - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.m4a

41.1 MB

DEF CON 27 Conference - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.txt

24.9 KB

DEF CON 27 Conference - Hadrien Barral - The ABC of Next-Gen Shellcoding.m4a

62.0 MB

DEF CON 27 Conference - Hadrien Barral - The ABC of Next-Gen Shellcoding.txt

36.4 KB

DEF CON 27 Conference - Hila Cohen - Malproxy Leave Your Malware at Home.m4a

64.8 MB

DEF CON 27 Conference - Hila Cohen - Malproxy Leave Your Malware at Home.txt

40.8 KB

DEF CON 27 Conference - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.m4a

82.4 MB

DEF CON 27 Conference - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.txt

47.5 KB

DEF CON 27 Conference - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.m4a

65.8 MB

DEF CON 27 Conference - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.txt

43.2 KB

DEF CON 27 Conference - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.m4a

72.8 MB

DEF CON 27 Conference - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.txt

40.9 KB

DEF CON 27 Conference - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.m4a

82.6 MB

DEF CON 27 Conference - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.txt

58.9 KB

DEF CON 27 Conference - Jayson Grace - MOSE Using Configuration Management for Evil.m4a

71.9 MB

DEF CON 27 Conference - Jayson Grace - MOSE Using Configuration Management for Evil.txt

42.8 KB

DEF CON 27 Conference - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.m4a

80.4 MB

DEF CON 27 Conference - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.txt

60.0 KB

DEF CON 27 Conference - Jens Muller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.m4a

38.9 MB

DEF CON 27 Conference - Jens Müller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.txt

22.7 KB

DEF CON 27 Conference - Jesse Michael - Get Off the Kernel if You Cant Drive.m4a

83.4 MB

DEF CON 27 Conference - Jesse Michael - Get Off the Kernel if You Cant Drive.txt

48.4 KB

DEF CON 27 Conference - Jmaxxz - Your Car is My Car.m4a

70.4 MB

DEF CON 27 Conference - Jmaxxz - Your Car is My Car.txt

43.4 KB

DEF CON 27 Conference - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.m4a

95.9 MB

DEF CON 27 Conference - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.txt

74.4 KB

DEF CON 27 Conference - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.m4a

66.3 MB

DEF CON 27 Conference - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.txt

45.5 KB

DEF CON 27 Conference - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.m4a

79.5 MB

DEF CON 27 Conference - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.txt

55.8 KB

DEF CON 27 Conference - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.m4a

70.0 MB

DEF CON 27 Conference - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.txt

44.6 KB

DEF CON 27 Conference - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.m4a

64.3 MB

DEF CON 27 Conference - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.txt

27.2 KB

DEF CON 27 Conference - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.m4a

70.5 MB

DEF CON 27 Conference - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.txt

54.4 KB

DEF CON 27 Conference - Kyle Gwinnup - Next Generation Process Emulation with Binee.m4a

75.8 MB

DEF CON 27 Conference - Kyle Gwinnup - Next Generation Process Emulation with Binee.txt

55.9 KB

DEF CON 27 Conference - Leon Jacobs - Meticulously Modern Mobile Manipulations.m4a

63.5 MB

DEF CON 27 Conference - Leon Jacobs - Meticulously Modern Mobile Manipulations.txt

44.3 KB

DEF CON 27 Conference - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.m4a

69.5 MB

DEF CON 27 Conference - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.txt

41.7 KB

DEF CON 27 Conference - Marina Simakov - Relaying Credentials Has Never Been Easier.m4a

76.4 MB

DEF CON 27 Conference - Marina Simakov - Relaying Credentials Has Never Been Easier.txt

45.3 KB

DEF CON 27 Conference - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.m4a

63.7 MB

DEF CON 27 Conference - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.txt

46.9 KB

DEF CON 27 Conference - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.m4a

77.7 MB

DEF CON 27 Conference - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.txt

52.7 KB

DEF CON 27 Conference - Michael Stepankin - Apache Solr Injection.m4a

28.4 MB

DEF CON 27 Conference - Michael Stepankin - Apache Solr Injection.txt

15.8 KB

DEF CON 27 Conference - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.m4a

35.4 MB

DEF CON 27 Conference - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.txt

24.4 KB

DEF CON 27 Conference - Nicolas Oberli - Poking the S in SD cards.m4a

35.1 MB

DEF CON 27 Conference - Nicolas Oberli - Poking the S in SD cards.txt

19.3 KB

DEF CON 27 Conference - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.m4a

62.5 MB

DEF CON 27 Conference - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.txt

34.0 KB

DEF CON 27 Conference - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.m4a

34.5 MB

DEF CON 27 Conference - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.txt

23.5 KB

DEF CON 27 Conference - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malwareÿ.m4a

84.7 MB

DEF CON 27 Conference - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware .txt

57.4 KB

DEF CON 27 Conference - Omer Gull - SELECT code execution FROM USING SQLite.m4a

70.6 MB

DEF CON 27 Conference - Omer Gull - SELECT code execution FROM USING SQLite.txt

42.1 KB

DEF CON 27 Conference - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.m4a

72.5 MB

DEF CON 27 Conference - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.txt

47.6 KB

DEF CON 27 Conference - Orange Tsai - Infiltrating Corporate Intranet Like NSA Pre-auth RCE on Leading SSL VPNs.m4a

78.8 MB

DEF CON 27 Conference - Orange Tsai - Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs.txt

38.4 KB

DEF CON 27 Conference - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.m4a

79.5 MB

DEF CON 27 Conference - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.txt

50.3 KB

DEF CON 27 Conference - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.m4a

70.0 MB

DEF CON 27 Conference - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.txt

45.8 KB

DEF CON 27 Conference - Patrick Wardle - Harnessing Weapons of Mac Destruction.m4a

84.0 MB

DEF CON 27 Conference - Patrick Wardle - Harnessing Weapons of Mac Destruction.txt

54.4 KB

DEF CON 27 Conference - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.m4a

74.1 MB

DEF CON 27 Conference - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.txt

39.6 KB

DEF CON 27 Conference - Philippe Laulheret - Intro to Hardware Hacking.m4a

79.4 MB

DEF CON 27 Conference - Philippe Laulheret - Intro to Hardware Hacking.txt

62.3 KB

DEF CON 27 Conference - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.m4a

72.4 MB

DEF CON 27 Conference - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.txt

51.3 KB

DEF CON 27 Conference - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.m4a

64.9 MB

DEF CON 27 Conference - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.txt

34.9 KB

DEF CON 27 Conference - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.m4a

74.1 MB

DEF CON 27 Conference - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.txt

43.4 KB

DEF CON 27 Conference - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.m4a

98.2 MB

DEF CON 27 Conference - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.txt

64.3 KB

DEF CON 27 Conference - The Dark Tangent - Closing Ceremonies.m4a

194.2 MB

DEF CON 27 Conference - The Dark Tangent - Closing Ceremonies.txt

111.7 KB

DEF CON 27 Conference - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.m4a

32.0 MB

DEF CON 27 Conference - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.txt

21.4 KB

DEF CON 27 Conference - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.m4a

66.7 MB

DEF CON 27 Conference - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.txt

35.7 KB

DEF CON 27 Conference - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.m4a

66.2 MB

DEF CON 27 Conference - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.txt

36.0 KB

DEF CON 27 Conference - WillC - Phreaking Elevators.m4a

68.9 MB

DEF CON 27 Conference - WillC - Phreaking Elevators.txt

40.6 KB

DEF CON 27 Conference - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.m4a

58.8 MB

DEF CON 27 Conference - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.txt

28.1 KB

DEF CON 27 Conference - XiaoHuiHui - All the 4G Modules Could Be Hacked.m4a

81.2 MB

DEF CON 27 Conference - XiaoHuiHui - All the 4G Modules Could Be Hacked.txt

38.4 KB

DEF CON 27 Conference - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.m4a

67.1 MB

DEF CON 27 Conference - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.txt

31.7 KB

DEF CON 27 Conference - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.m4a

55.7 MB

DEF CON 27 Conference - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.txt

27.0 KB

DEF CON 27 Conference - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.m4a

71.6 MB

DEF CON 27 Conference - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.txt

47.1 KB

DEF CON 27 Conference - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Others Auto Infractions.txt

25.6 KB

DEF CON 27 Conference - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined.m4a

41.4 MB

DEF CON 27 Conference - finalphoenix - Rise of the Hypebots Scripting Streetwear.m4a

74.6 MB

DEF CON 27 Conference - finalphoenix - Rise of the Hypebots Scripting Streetwear.txt

41.9 KB

DEF CON 27 Conference - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.m4a

71.9 MB

DEF CON 27 Conference - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.txt

44.5 KB

DEF CON 27 Conference - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.m4a

41.5 MB

DEF CON 27 Conference - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.txt

26.1 KB

DEF CON 27 Conference - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.m4a

63.3 MB

DEF CON 27 Conference - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.txt

43.2 KB

DEF CON 27 Conference - smea - Adventures In Smart Buttplug Penetration testing.m4a

78.7 MB

DEF CON 27 Conference - smea - Adventures In Smart Buttplug Penetration testing.txt

60.4 KB

DEF CON 27 Conference - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.m4a

77.1 MB

DEF CON 27 Conference - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.txt

52.3 KB

/.../DEF CON 27 conference audio opus/

DEF CON 27 Conference - Alexandre Borges - NET Malware Threats Internals And Reversing.opus

39.0 MB

DEF CON 27 Conference - Alexandre Borges - NET Malware Threats Internals And Reversing.txt

34.8 KB

DEF CON 27 Conference - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.opus

48.9 MB

DEF CON 27 Conference - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.txt

57.6 KB

DEF CON 27 Conference - Alon Weinberg - Please Inject Me a x64 Code Injection.opus

15.4 MB

DEF CON 27 Conference - Alon Weinberg - Please Inject Me a x64 Code Injection.txt

17.4 KB

DEF CON 27 Conference - Alvaro Muñoz - SSO Wars The Token Menace.opus

31.2 MB

DEF CON 27 Conference - Alvaro Muñoz - SSO Wars The Token Menace.txt

39.2 KB

DEF CON 27 Conference - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.opus

42.5 MB

DEF CON 27 Conference - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.txt

54.6 KB

DEF CON 27 Conference - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.opus

19.6 MB

DEF CON 27 Conference - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.txt

25.4 KB

DEF CON 27 Conference - Anish Athalye - Want Strong Isolation Just Reset Your Processor.opus

35.8 MB

DEF CON 27 Conference - Anish Athalye - Want Strong Isolation Just Reset Your Processor.txt

60.6 KB

DEF CON 27 Conference - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.opus

24.4 MB

DEF CON 27 Conference - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.txt

38.1 KB

DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.opus

26.7 MB

DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.txt

32.6 KB

DEF CON 27 Conference - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.opus

40.9 MB

DEF CON 27 Conference - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.txt

43.5 KB

DEF CON 27 Conference - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.opus

36.8 MB

DEF CON 27 Conference - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.txt

47.8 KB

DEF CON 27 Conference - Bill Graydon - Duplicating Restricted Mechanical Keys.opus

38.4 MB

DEF CON 27 Conference - Bill Graydon - Duplicating Restricted Mechanical Keys.txt

52.3 KB

DEF CON 27 Conference - Bill Swearingen - HAKC THE POLICE.opus

37.6 MB

DEF CON 27 Conference - Bill Swearingen - HAKC THE POLICE.txt

44.3 KB

DEF CON 27 Conference - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.opus

35.5 MB

DEF CON 27 Conference - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.txt

43.6 KB

DEF CON 27 Conference - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.opus

15.6 MB

DEF CON 27 Conference - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.txt

22.9 KB

DEF CON 27 Conference - Bruce Schneier - Information Security in the Public Interest.opus

36.3 MB

DEF CON 27 Conference - Bruce Schneier - Information Security in the Public Interest.txt

41.5 KB

DEF CON 27 Conference - Campbell Murray - GSM We Can Hear Everyone Now.opus

32.6 MB

DEF CON 27 Conference - Campbell Murray - GSM We Can Hear Everyone Now.txt

40.5 KB

DEF CON 27 Conference - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.opus

27.9 MB

DEF CON 27 Conference - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.txt

32.5 KB

DEF CON 27 Conference - Christopher Wade - Tag-side attacks against NFC.opus

32.8 MB

DEF CON 27 Conference - Christopher Wade - Tag-side attacks against NFC.txt

47.7 KB

DEF CON 27 Conference - Contests and Events - Contests Awards Ceremony.opus

50.1 MB

DEF CON 27 Conference - Contests and Events - Contests Awards Ceremony.txt

63.5 KB

DEF CON 27 Conference - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.opus

33.0 MB

DEF CON 27 Conference - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.txt

37.3 KB

DEF CON 27 Conference - Daniel Romero - Why You Should Fear Your mundane Office Equipment.opus

39.7 MB

DEF CON 27 Conference - Daniel Romero - Why You Should Fear Your mundane Office Equipment.txt

45.7 KB

DEF CON 27 Conference - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.opus

41.8 MB

DEF CON 27 Conference - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.txt

49.2 KB

DEF CON 27 Conference - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.opus

39.9 MB

DEF CON 27 Conference - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.txt

48.1 KB

DEF CON 27 Conference - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.opus

34.8 MB

DEF CON 27 Conference - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.txt

44.3 KB

DEF CON 27 Conference - Douglas McKee - HVACking Understand the Delta Between Security and Reality.opus

38.6 MB

DEF CON 27 Conference - Douglas McKee - HVACking Understand the Delta Between Security and Reality.txt

52.0 KB

DEF CON 27 Conference - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.opus

19.5 MB

DEF CON 27 Conference - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.txt

26.4 KB

DEF CON 27 Conference - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.opus

36.5 MB

DEF CON 27 Conference - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.txt

46.9 KB

DEF CON 27 Conference - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.opus

30.9 MB

DEF CON 27 Conference - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.txt

41.2 KB

DEF CON 27 Conference - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.opus

36.4 MB

DEF CON 27 Conference - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.txt

46.6 KB

DEF CON 27 Conference - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.opus

36.5 MB

DEF CON 27 Conference - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.txt

40.7 KB

DEF CON 27 Conference - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.opus

20.1 MB

DEF CON 27 Conference - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.txt

24.9 KB

DEF CON 27 Conference - Hadrien Barral - The ABC of Next-Gen Shellcoding.opus

30.8 MB

DEF CON 27 Conference - Hadrien Barral - The ABC of Next-Gen Shellcoding.txt

36.4 KB

DEF CON 27 Conference - Hila Cohen - Malproxy Leave Your Malware at Home.opus

33.4 MB

DEF CON 27 Conference - Hila Cohen - Malproxy Leave Your Malware at Home.txt

40.8 KB

DEF CON 27 Conference - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.opus

43.3 MB

DEF CON 27 Conference - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.txt

47.5 KB

DEF CON 27 Conference - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.opus

33.5 MB

DEF CON 27 Conference - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.txt

43.2 KB

DEF CON 27 Conference - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.opus

31.6 MB

DEF CON 27 Conference - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.txt

40.9 KB

DEF CON 27 Conference - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.opus

46.9 MB

DEF CON 27 Conference - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.txt

58.9 KB

DEF CON 27 Conference - Jayson Grace - MOSE Using Configuration Management for Evil.opus

39.4 MB

DEF CON 27 Conference - Jayson Grace - MOSE Using Configuration Management for Evil.txt

42.8 KB

DEF CON 27 Conference - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.opus

42.2 MB

DEF CON 27 Conference - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.txt

60.0 KB

DEF CON 27 Conference - Jens Müller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.opus

19.2 MB

DEF CON 27 Conference - Jens Müller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.txt

22.7 KB

DEF CON 27 Conference - Jesse Michael - Get Off the Kernel if You Cant Drive.opus

43.0 MB

DEF CON 27 Conference - Jesse Michael - Get Off the Kernel if You Cant Drive.txt

48.4 KB

DEF CON 27 Conference - Jmaxxz - Your Car is My Car.opus

33.8 MB

DEF CON 27 Conference - Jmaxxz - Your Car is My Car.txt

43.4 KB

DEF CON 27 Conference - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.opus

51.8 MB

DEF CON 27 Conference - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.txt

74.4 KB

DEF CON 27 Conference - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.opus

32.7 MB

DEF CON 27 Conference - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.txt

45.5 KB

DEF CON 27 Conference - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.opus

40.7 MB

DEF CON 27 Conference - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.txt

55.8 KB

DEF CON 27 Conference - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.opus

33.3 MB

DEF CON 27 Conference - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.txt

44.6 KB

DEF CON 27 Conference - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.opus

30.3 MB

DEF CON 27 Conference - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.txt

27.2 KB

DEF CON 27 Conference - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.opus

39.5 MB

DEF CON 27 Conference - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.txt

54.4 KB

DEF CON 27 Conference - Kyle Gwinnup - Next Generation Process Emulation with Binee.opus

33.4 MB

DEF CON 27 Conference - Kyle Gwinnup - Next Generation Process Emulation with Binee.txt

55.9 KB

DEF CON 27 Conference - Leon Jacobs - Meticulously Modern Mobile Manipulations.opus

31.0 MB

DEF CON 27 Conference - Leon Jacobs - Meticulously Modern Mobile Manipulations.txt

44.3 KB

DEF CON 27 Conference - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.opus

37.8 MB

DEF CON 27 Conference - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.txt

41.7 KB

DEF CON 27 Conference - Marina Simakov - Relaying Credentials Has Never Been Easier.opus

38.3 MB

DEF CON 27 Conference - Marina Simakov - Relaying Credentials Has Never Been Easier.txt

45.3 KB

DEF CON 27 Conference - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.opus

34.3 MB

DEF CON 27 Conference - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.txt

46.9 KB

DEF CON 27 Conference - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.opus

40.4 MB

DEF CON 27 Conference - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.txt

52.7 KB

DEF CON 27 Conference - Michael Stepankin - Apache Solr Injection.opus

14.2 MB

DEF CON 27 Conference - Michael Stepankin - Apache Solr Injection.txt

15.8 KB

DEF CON 27 Conference - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.opus

20.3 MB

DEF CON 27 Conference - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.txt

24.4 KB

DEF CON 27 Conference - Nicolas Oberli - Poking the S in SD cards.opus

17.9 MB

DEF CON 27 Conference - Nicolas Oberli - Poking the S in SD cards.txt

19.3 KB

DEF CON 27 Conference - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.opus

30.3 MB

DEF CON 27 Conference - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.txt

34.0 KB

DEF CON 27 Conference - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.opus

17.8 MB

DEF CON 27 Conference - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.txt

23.5 KB

DEF CON 27 Conference - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware .opus

47.2 MB

DEF CON 27 Conference - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware .txt

57.4 KB

DEF CON 27 Conference - Omer Gull - SELECT code execution FROM USING SQLite.opus

40.5 MB

DEF CON 27 Conference - Omer Gull - SELECT code execution FROM USING SQLite.txt

42.1 KB

DEF CON 27 Conference - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.opus

35.5 MB

DEF CON 27 Conference - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.txt

47.6 KB

DEF CON 27 Conference - Orange Tsai - Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs.opus

40.6 MB

DEF CON 27 Conference - Orange Tsai - Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs.txt

38.4 KB

DEF CON 27 Conference - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.opus

39.1 MB

DEF CON 27 Conference - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.txt

50.3 KB

DEF CON 27 Conference - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.opus

37.3 MB

DEF CON 27 Conference - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.txt

45.8 KB

DEF CON 27 Conference - Patrick Wardle - Harnessing Weapons of Mac Destruction.opus

46.5 MB

DEF CON 27 Conference - Patrick Wardle - Harnessing Weapons of Mac Destruction.txt

54.4 KB

DEF CON 27 Conference - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.opus

37.7 MB

DEF CON 27 Conference - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.txt

39.6 KB

DEF CON 27 Conference - Philippe Laulheret - Intro to Hardware Hacking.opus

38.9 MB

DEF CON 27 Conference - Philippe Laulheret - Intro to Hardware Hacking.txt

62.3 KB

DEF CON 27 Conference - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.opus

39.8 MB

DEF CON 27 Conference - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.txt

51.3 KB

DEF CON 27 Conference - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.opus

30.9 MB

DEF CON 27 Conference - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.txt

34.9 KB

DEF CON 27 Conference - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.opus

37.6 MB

DEF CON 27 Conference - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.txt

43.4 KB

DEF CON 27 Conference - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.opus

46.6 MB

DEF CON 27 Conference - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.txt

64.3 KB

DEF CON 27 Conference - The Dark Tangent - Closing Ceremonies.opus

95.5 MB

DEF CON 27 Conference - The Dark Tangent - Closing Ceremonies.txt

111.7 KB

DEF CON 27 Conference - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.opus

15.8 MB

DEF CON 27 Conference - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.txt

21.4 KB

DEF CON 27 Conference - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.opus

34.8 MB

DEF CON 27 Conference - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.txt

35.7 KB

DEF CON 27 Conference - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.opus

31.3 MB

DEF CON 27 Conference - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.txt

36.0 KB

DEF CON 27 Conference - WillC - Phreaking Elevators.opus

34.8 MB

DEF CON 27 Conference - WillC - Phreaking Elevators.txt

40.6 KB

DEF CON 27 Conference - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.opus

27.7 MB

DEF CON 27 Conference - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.txt

28.1 KB

DEF CON 27 Conference - XiaoHuiHui - All the 4G Modules Could Be Hacked.opus

43.9 MB

DEF CON 27 Conference - XiaoHuiHui - All the 4G Modules Could Be Hacked.txt

38.4 KB

DEF CON 27 Conference - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.opus

35.6 MB

DEF CON 27 Conference - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.txt

31.7 KB

DEF CON 27 Conference - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.opus

26.9 MB

DEF CON 27 Conference - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.txt

27.0 KB

DEF CON 27 Conference - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.opus

35.4 MB

DEF CON 27 Conference - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.txt

47.1 KB

DEF CON 27 Conference - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Auto Infractions.opus

21.6 MB

DEF CON 27 Conference - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Others Auto Infractions.txt

25.6 KB

DEF CON 27 Conference - finalphoenix - Rise of the Hypebots Scripting Streetwear.opus

38.3 MB

DEF CON 27 Conference - finalphoenix - Rise of the Hypebots Scripting Streetwear.txt

41.9 KB

DEF CON 27 Conference - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.opus

36.6 MB

DEF CON 27 Conference - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.txt

44.5 KB

DEF CON 27 Conference - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.opus

19.6 MB

DEF CON 27 Conference - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.txt

26.1 KB

DEF CON 27 Conference - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.opus

31.3 MB

DEF CON 27 Conference - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.txt

43.2 KB

DEF CON 27 Conference - smea - Adventures In Smart Buttplug Penetration testing.opus

42.1 MB

DEF CON 27 Conference - smea - Adventures In Smart Buttplug Penetration testing.txt

60.4 KB

DEF CON 27 Conference - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.opus

39.6 MB

DEF CON 27 Conference - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.txt

52.3 KB

/.../DEF CON 27 villages audio flac/

DEF CON 27 AI Village - AI Village Organizers - Opening Remarks.flac

294.9 KB

DEF CON 27 AI Village - Angelo Oliveira - Fighting Malware with Deep Learning.flac

51.1 MB

DEF CON 27 AI Village - Anna Skelton - Analyzing the Effects of Deepfakes on Market Manipulation.flac

76.4 MB

DEF CON 27 AI Village - Barton Rhodes - Securing your kubeflow clusters.flac

71.1 MB

DEF CON 27 AI Village - Bob Lord - Misinformation Keynote.flac

69.9 MB

DEF CON 27 AI Village - Dr Ethan Rudd - Loss Is More Improving Malware Detectors by Learning Additional Tasks.flac

94.8 MB

DEF CON 27 AI Village - Hyrum Anderson - Competitions in Infosec ML.flac

31.1 MB

DEF CON 27 AI Village - Jason Mancuso - Machine Learnings Privacy Problem.flac

90.3 MB

DEF CON 27 AI Village - Jesus Solano - Behavioral Biometrics and Context Analytics Risk Based Authentication Re-Imagined.flac

77.8 MB

DEF CON 27 AI Village - Jon Hawes - A buyers guide to the market promise of automagic AI-enabled detection and response.flac

116.8 MB

DEF CON 27 AI Village - Kenya Yoshimur - Clairvoyance concurrent lip-reading for the smart masses.flac

50.0 MB

DEF CON 27 AI Village - Lauren Putvin - Exploratory Data Analysis Why and How in Python.flac

88.4 MB

DEF CON 27 AI Village - Laurin Weissinger - Regulating AI and Algorithms Lessons from Safety and Security Certifications and Audits.flac

46.4 MB

DEF CON 27 AI Village - Rand Waltzman - Disinformation Its the Thought that Counts.flac

104.5 MB

DEF CON 27 AI Village - Richard Harang - A Tutorial on Hacking Facial Recognition Systems.flac

80.3 MB

DEF CON 27 AI Village - Roei Amit - How to Get over your malicious extensions using deep learning.flac

64.7 MB

DEF CON 27 AI Village - Ryan Kovar - Datasciencery by the Splunk Field.flac

63.3 MB

DEF CON 27 AI Village - Samantha Cole - Deep Fakes Panel.flac

170.2 MB

DEF CON 27 AI Village - Siwei Lyu - Seeing is deceiving The rise of AI-synthesized fake media.flac

102.0 MB

DEF CON 27 AI Village - Tal Leibovich - From Noisy Distorted data-sets to excellent prediction models.flac

123.7 MB

DEF CON 27 AI Village - Walter Scheirer - Backdooring Convolutional Neural Networks via Targeted Weight Perturbations.flac

64.9 MB

DEF CON 27 AI Village - X1.flac

22.7 MB

DEF CON 27 AI Village - Yisroel Mirsky - Automated Injection and Removal of Medical Evidence in CT and MRI Scans.flac

55.4 MB

DEF CON 27 Appsec Village - Anthony Kava - How bad could it be Inside Law Enforcement and Local gov AppSec.flac

113.2 MB

DEF CON 27 Appsec Village - Erez Yalon - Welcome and Introductions.flac

301.9 KB

DEF CON 27 Appsec Village - Guy Barnhart-Magen - Crypto Failures and how to avoid them.flac

108.7 MB

DEF CON 27 Appsec Village - Jillian Ratliff - Vulnerabilities that Hide from Your Tools.flac

82.1 MB

DEF CON 27 Appsec Village - Jim Manico - Keynote The Unabridged History of Application Security.flac

155.4 MB

DEF CON 27 Appsec Village - Joe Schottman - Purple Team Strategies for Application Security.flac

69.0 MB

DEF CON 27 Appsec Village - Rafael Santos - huskyCI Finding Security Flaws in CI Before Deploying Them.flac

80.9 MB

DEF CON 27 Appsec Village - YanYan Wang - Automate Pen-Testing in Dockerized CI CD Environment.flac

118.2 MB

DEF CON 27 Aviation Village - Art Manion - Ideas whose time has come CVD SBOM and SOTA.flac

83.7 MB

DEF CON 27 Aviation Village - Dr Will Roper - Hacking the airforce and beyond.flac

70.4 MB

DEF CON 27 Aviation Village - Exploding Lemur - In The Air And On The Air Aviation Radio Systems.flac

81.2 MB

DEF CON 27 Aviation Village - Harshad Sathaye - Wireless Attacks on Aircraft Instrument Landing Systems.flac

85.9 MB

DEF CON 27 Aviation Village - Karl Koscher - An Introduction to the ARINC standards.flac

67.5 MB

DEF CON 27 Aviation Village - Ken and Alex - A Hackers First Solo Airplane Avionics Security 101.flac

125.7 MB

DEF CON 27 Aviation Village - Panel - The Long Haul The State of Aviation Policy.flac

146.8 MB

DEF CON 27 Aviation Village - Patrick Kiley - CAN Bus in Aviation Investigating CAN Bus in Avionics.flac

35.2 MB

DEF CON 27 Aviation Village - Tarah Wheeler - Common Online Security Fails In Pilot Training.flac

77.2 MB

DEF CON 27 Aviation Village - Zoltan Madarassy - Behind the scenes of hacking airplanes.flac

104.8 MB

DEF CON 27 Bio Hacking Village - Alex Pearlman - DIY Medicine The Ethics of Hacking Pharma.flac

93.8 MB

DEF CON 27 Bio Hacking Village - Andrea Downing - A Previvors Story of Uncovering Massive Zero Day Vulnerability.flac

74.8 MB

DEF CON 27 Bio Hacking Village - Corey M Hudson - From Buffer Overflowing Genomics Tools to Securing Biomedical File Formats.flac

96.8 MB

DEF CON 27 Bio Hacking Village - Dr Avi Rubin - A Complete View of the Attack Surface of a Networked Medical Device.flac

82.4 MB

DEF CON 27 Bio Hacking Village - Dr Harish Manyam - Doctor Hacker Panel.flac

202.9 MB

DEF CON 27 Bio Hacking Village - Eric D Perakslis - Employ Cybersecurity Techniques Against the Threat of Medical Information.flac

69.6 MB

DEF CON 27 Bio Hacking Village - JC Vega - How to Level Up Experiential Learning through Gamification.flac

74.2 MB

DEF CON 27 Bio Hacking Village - JJ Hastings - The L33T Shall Inherit the Cosmos.flac

79.9 MB

DEF CON 27 Bio Hacking Village - Jay Lagario - Hacking Wetware with Open Source Software and Hardware.flac

113.6 MB

DEF CON 27 Bio Hacking Village - Jean Rintoul - Spectra Open Biomedical Imaging.flac

91.0 MB

DEF CON 27 Bio Hacking Village - Najla Lindsay - Forensic Science and Information Security Lifetime Lovers Part-time Friends.flac

83.9 MB

DEF CON 27 Bio Hacking Village - Nick Titus - Building a New Decentralized Internet With the Nodes Implanted in Our Bodies.flac

75.1 MB

DEF CON 27 Bio Hacking Village - Panel - Medical Simulations Panel.flac

149.9 MB

DEF CON 27 Bio Hacking Village - Rachel Smith - Liven Up Augmenting Materials for Bio-Hybrid Functionality.flac

76.9 MB

DEF CON 27 Bio Hacking Village - Steve Lewis - Cyberbiosecurity and the Full Stack Biotechnologist.flac

90.9 MB

DEF CON 27 Bio Hacking Village - Turtle Snap - Malware and Biology.flac

58.9 MB

DEF CON 27 Bio Hacking Village - Wayne Penn - Amputees and Prostetics Challenges.flac

179.2 MB

DEF CON 27 Block Chain Village - Mark Nesbitt - What Is Bitcoin.flac

47.3 MB

DEF CON 27 Block Chain Village - Brian Vohaska - Forcing a trustworthy notion of sequential time.flac

76.4 MB

DEF CON 27 Block Chain Village - Mark Nesbitt - Hacking Cryptocurrencies.flac

72.0 MB

DEF CON 27 Block Chain Village - Mila Paul - Alice and Bobs Big Secret.flac

67.8 MB

DEF CON 27 Block Chain Village - Panel - Privacy Enabler or Hindrance to the Success of Blockchain based currencies.flac

99.8 MB

DEF CON 27 Block Chain Village - Philip Martin - Responding to Firefox 0-days.flac

89.1 MB

DEF CON 27 Block Chain Village - Rod Soto - A Smart Contract Killchain How the first Blockchain APT was caught.flac

88.1 MB

DEF CON 27 Block Chain Village - Ron Stoner - The CryptoCurrency Security Standard CCSS.flac

114.2 MB

DEF CON 27 Blue Team Village - Carlos Garay - Memhunter Automated Hunting Of A Memory Resident Malware At Scale.flac

126.5 MB

DEF CON 27 Blue Team Village - Cathy Ullman - A Theme Of Fear Hacking The Paradigm.flac

124.6 MB

DEF CON 27 Blue Team Village - Christine Le - Blue Team Guide For Fresh Eyes.flac

61.7 MB

DEF CON 27 Blue Team Village - Georgios Kapoglis - Serverless Log Analysis On AWS.flac

89.5 MB

DEF CON 27 Blue Team Village - Lacie Fan - Killsuit How The Equation Group Remained Out Of Sight For Years.flac

76.8 MB

DEF CON 27 Blue Team Village - Lak Shmi Sudheer - Who Dis Who Dis The Right Way To Authenticate.flac

139.1 MB

DEF CON 27 Blue Team Village - Mark Orlando - When A Plan Comes Together Building a SOC A-Team.flac

47.9 MB

DEF CON 27 Blue Team Village - Norman Lundt - Extending Zeek For ICS Defense.flac

56.2 MB

DEF CON 27 Blue Team Village - Scoubi - BloodHound From Red to Blue 1 point 5.flac

107.8 MB

DEF CON 27 Blue Team Village - Shawn Thomas - An Introduction To Malware Analysis.flac

115.5 MB

DEF CON 27 Blue Team Village - Siyu Zhu - Evaded Microsoft ATA.flac

97.0 MB

DEF CON 27 Blue Team Village - ch33r10 - The Cyber Threat Intelligence Mindset.flac

75.7 MB

DEF CON 27 Blue Team Village - claushoumann - Security Strategy for Small-Medium Business.flac

121.0 MB

DEF CON 27 Blue Team Village - dumby - Anatomy Of A Megabreach Equifax Report.flac

135.1 MB

DEF CON 27 Car Hacking Village - Aaron Cornelius - Intro to UDS.flac

79.6 MB

DEF CON 27 Car Hacking Village - Elijah Roberts - Tell Me Lies Automotive LIDAR and Low-Tech Obfuscation.flac

68.1 MB

DEF CON 27 Car Hacking Village - Greg Hogan - Reverse Engineering and Flashing ECU Firmware Updates.flac

127.9 MB

DEF CON 27 Car Hacking Village - Ken Munro - Lojackd pwning car alarms vehicle trackers and immobilisers.flac

53.0 MB

DEF CON 27 Car Hacking Village - Lennert Wouters - Fast Furious and Insecure Passive Keyless Entry and Start Systems in Modern Supercars.flac

65.1 MB

DEF CON 27 Car Hacking Village - Neiko Rivera - Infotainment Hacking.flac

47.6 MB

DEF CON 27 Car Hacking Village - Rotem Bar - Hacking into Automotive Clouds.flac

90.9 MB

DEF CON 27 Car Hacking Village - Victor Murray - Legal Over-the-Air Spoofing of GNSS and its Effects on Autonomous Vehicles.flac

45.2 MB

DEF CON 27 Cloud Village - Ayman Elsawah - Using Paretos Primciple for Securing AWS with SCPs.flac

88.7 MB

DEF CON 27 Cloud Village - Chris Le Roy - Build to Hack Hack to Build.flac

90.6 MB

DEF CON 27 Cloud Village - Erick Galinkin - Your Blacklist is Dead Airgap Everything.flac

66.8 MB

DEF CON 27 Cloud Village - James Strassburg - Scaling Security in the Cloud with Open Source.flac

95.1 MB

DEF CON 27 Cloud Village - Jenko Hwong - Exploiting AWS loopholes with temporary credentials.flac

85.2 MB

DEF CON 27 Cloud Village - Rod Soto - Using Splunk or ELK for Auditing AWS GCP Azure Security Posture.flac

65.8 MB

DEF CON 27 Cloud Village - Rotem Bar - Hacking into Automative Clouds.flac

81.4 MB

DEF CON 27 Cloud Village - Setu Parimi - PacBot Policy as Code from T-Mobile OSS.flac

64.6 MB

DEF CON 27 Cloud Village - Tanya Janca - DYI Azure Security Assesment.flac

101.4 MB

DEF CON 27 Crypto and Privacy Village - Ben Brecht - MITM mixed mode butterfly key privacy attack.flac

70.1 MB

DEF CON 27 Crypto and Privacy Village - Cat Murdock - Black Mirror You are your own privacy nightmare.flac

130.6 MB

DEF CON 27 Crypto and Privacy Village - Cathie Yun - Implementing a Zero Knowledge Proof or How to Write Bulletproofs in Rust.flac

93.4 MB

DEF CON 27 Crypto and Privacy Village - Chris Hanlon - TLS decryption attacks and back-doors to secure systems.flac

67.4 MB

DEF CON 27 Crypto and Privacy Village - Christian Paquin - Migrating to quantum-safe cryptography to protect against quantum hackers.flac

57.0 MB

DEF CON 27 Crypto and Privacy Village - Ethan Gregory Dodge - Scrubber An open source compilation to protect journalistic sources.flac

41.0 MB

DEF CON 27 Crypto and Privacy Village - Harlo Holmes - Tiplines Today.flac

131.4 MB

DEF CON 27 Crypto and Privacy Village - Karl Koscher - Enabling HTTPS for home network devices using Lets Encrypt.flac

59.7 MB

DEF CON 27 Crypto and Privacy Village - Kate Rose - Adversarial Fashion Sartorial Hacking to Combat Surveillance.flac

145.6 MB

DEF CON 27 Crypto and Privacy Village - Katelyn Bowden - Fighting non consensual pornography the BADASS way.flac

106.0 MB

DEF CON 27 Crypto and Privacy Village - Mark B Cooper - How PKI and SHAKEN STIR Will Fix the Global Robocall Problem.flac

128.1 MB

DEF CON 27 Crypto and Privacy Village - Mike Kiser - I am Spartacus And You Can Be Too Ensuring Privacy through Obfuscation.flac

134.6 MB

DEF CON 27 Crypto and Privacy Village - Riana Pfefferkorn - Giving Cops the Finger Compelled Device Decryption and 5th Amendment.flac

65.3 MB

DEF CON 27 Crypto and Privacy Village - Sarah McCarthy - Stop right now Quantum-Safe Instantaneous Vehicle to Vehicle communication.flac

36.7 MB

DEF CON 27 Crypto and Privacy Village - Steve Thomas - Easy PAKE Oven.flac

93.3 MB

DEF CON 27 Crypto and Privacy Village - Suchismita Pahi - How to Effectively Integrate Your Privacy Legal and Security Teams.flac

107.9 MB

DEF CON 27 Crypto and Privacy Village - Tiffany Li - Stop Facebook From Buying Your Brain Facial Recognition DNA and Biometric Privacy.flac

77.7 MB

DEF CON 27 Crypto and Privacy Village - Tyler Kell - Towards Usable Dining Cryptographer Networks with Howl.flac

53.2 MB

DEF CON 27 Crypto and Privacy Village - Vitor Ventura - Snoop all Telegram messages.flac

52.3 MB

DEF CON 27 DroneWars Village - Ryan Schonfeld - SWARM.flac

80.3 MB

DEF CON 27 Ethics Village - Anthony Ferrante - Coffee Talk.flac

118.5 MB

DEF CON 27 Ethics Village - Dr Suzanne Schwartz FDA - Coffee Talk.flac

123.2 MB

DEF CON 27 Ethics Village - Jake Williams - Ethical Issues in Cyber Attribution.flac

326.3 MB

DEF CON 27 Ethics Village - Kyle Wiens - Void If Removed Securing Our Right to Repair.flac

285.8 MB

DEF CON 27 Ethics Village - Liz OSullivan - Is It Ethical to Work On Autonomous Weapon Systems.flac

246.0 MB

DEF CON 27 Ethics Village - Panel - Law Professor Round Robin.flac

143.4 MB

DEF CON 27 Ethics Village - Renderman - Rant on Disclosure.flac

271.9 MB

DEF CON 27 Ethics Village - Tom Kopchak - Teaching Consulting Pentesting and Ethics.flac

348.6 MB

DEF CON 27 Ethics Village - Wendy Edwards - Who is Tracking Your Body Health Apps and Your Privacy.flac

129.1 MB

DEF CON 27 Hack the Sea Village - Andrew Tierney - Pwning a mobile drilling rig Hacking an oil rig.flac

83.8 MB

DEF CON 27 Hack the Sea Village - Brian Satira - Opening Remarks.flac

19.2 MB

DEF CON 27 Hack the Sea Village - Cris DeWitt - Maritime Cyber Policy Panel.flac

117.7 MB

DEF CON 27 Hack the Sea Village - David Belasco - Finding Flaws in a Satcom Terminal.flac

72.9 MB

DEF CON 27 Hack the Sea Village - Josh Steinman - National Security Council and Special Assitant for Cyber.flac

56.2 MB

DEF CON 27 Hack the Sea Village - Julian Blanco - C2 over Maritime AIS and commercial aggregation websites.flac

49.4 MB

DEF CON 27 Hack the Sea Village - Stephan Gerling - Yacht Hacking from SatCOM to engine control.flac

166.7 MB

DEF CON 27 Hack the Sea Village - Weston Hecker - PENTESTING How to Get into the Field Explained.flac

73.6 MB

DEF CON 27 Ham Radio Village - Jason - The RF Dark Arts.flac

61.0 MB

DEF CON 27 Ham Radio Village - Mark KR6ZY - Hunting tape measure yagis and offset attenuators.flac

49.3 MB

DEF CON 27 Hardware Hacking Village - Allison Marie Naaktgeboren - Reversing Corruption in Seagate HDD Translators.flac

100.2 MB

DEF CON 27 Hardware Hacking Village - Benjamin Lafois - Another Car Hacking Approach.flac

123.1 MB

DEF CON 27 Hardware Hacking Village - Wang Kang - Infrared New Threats Meet Old Devices.flac

56.2 MB

DEF CON 27 ICS Village - Austin Scott - Purple Teaming ICS Networks.flac

80.0 MB

DEF CON 27 ICS Village - Bryson Bort - ICS IOT Threat Landscape.flac

73.4 MB

DEF CON 27 ICS Village - Chris Kubecka - Hack the World and Galaxy with OSINT.flac

90.9 MB

DEF CON 27 ICS Village - Daniel dos Santos - Abusing the IoT in Smart Buildings.flac

82.3 MB

DEF CON 27 ICS Village - Douglas McKee - HVACking Understand the difference Between Security and Reality.flac

81.2 MB

DEF CON 27 ICS Village - Jack Oden - IT OT Convergence Are We There Yet.flac

75.7 MB

DEF CON 27 ICS Village - Joe Slowik - CRASHOVERRIDE Re-Assessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack.flac

92.2 MB

DEF CON 27 ICS Village - Joseph Bingham - SCADA What the next Stuxnet will look like and how to prevent it.flac

73.8 MB

DEF CON 27 ICS Village - Monta Elkins - Nation State Supply Chain Attacks for Dummies or Chipping Cisco Firewalls.flac

88.0 MB

DEF CON 27 ICS Village - Ryan Leirvik - Pin the tail on the cyber owner.flac

69.3 MB

DEF CON 27 ICS Village - Sharon Brizinov - Changium IPiosa most magical change IP packets in the wild.flac

76.4 MB

DEF CON 27 IoT Village - Alex Jay Balan - Next-gen IoT Botnets 3 moar ownage.flac

108.0 MB

DEF CON 27 IoT Village - Amit Elazari - Regulatory Trends in IoT Security and impact on the research community.flac

97.1 MB

DEF CON 27 IoT Village - BITFI You Wouldnt Steal My Cloins.flac

79.0 MB

DEF CON 27 IoT Village - Bertin Bervis - Mixing industrial protocols with web application security flaws in order to exploit OT devices.flac

99.5 MB

DEF CON 27 IoT Village - Daniel Wegemer - Fitbit Firmware Hacking - The Current State of the Heart.flac

121.0 MB

DEF CON 27 IoT Village - Dennis Giese - Privacy leaks in smart devices Extracting data from used smart home devices.flac

130.8 MB

DEF CON 27 IoT Village - Elvis Collado - Greenwaves and Ham.flac

107.2 MB

DEF CON 27 IoT Village - Hyejin Jeong - HACK DMI PWNING HDMI FOR FUN AND PROFIT.flac

86.4 MB

DEF CON 27 IoT Village - Lee Brotherston - A Glorious Celebration of IoT Security.flac

77.9 MB

DEF CON 27 IoT Village - M Can Kurnaz - Get your next roadtrip for free Long live the vulnerable EV charging points.flac

44.8 MB

DEF CON 27 IoT Village - Maxwell Dulin - Hacking the Zyxel NAS 326 from the Perspective of a n00b.flac

70.8 MB

DEF CON 27 IoT Village - Michael Raggo - Spy versus Spy who is watching who.flac

77.4 MB

DEF CON 27 IoT Village - Panel - IoT Security and Manufacturers Q and A Panel.flac

137.0 MB

DEF CON 27 IoT Village - Rick Ramgattie - SOHOpelessly Broken 2 point 0.flac

118.6 MB

DEF CON 27 Monero Village - AJ Santos - Houston we have a problem 86R HB 4371 is a no-go.flac

65.1 MB

DEF CON 27 Monero Village - Allan Stevo - AirBNB for Retail Internet A Distrubuted Internet Technology with Monero.flac

72.4 MB

DEF CON 27 Monero Village - Allan Stevo - InfoSec vs Hacker The War for the Soul of a Technology.flac

49.6 MB

DEF CON 27 Monero Village - Amir Montazery - The Cost of Good Open Source Software.flac

55.5 MB

DEF CON 27 Monero Village - Cathie Yun - Bulletproofs - deep dive.flac

102.5 MB

DEF CON 27 Monero Village - Daniel Kim - Keynote Speech Monero Introduction and Investor Perspective.flac

165.3 MB

DEF CON 27 Monero Village - Diego - Monero is UGLY and DIFFICULT to use.flac

70.9 MB

DEF CON 27 Monero Village - Dr Jeremy Gillula - Encrypting the Web Isnt Enough How EFF Plans to Encrypt the Entire Internet.flac

116.3 MB

DEF CON 27 Monero Village - Francisco Cabanas - The Critical Role of the Minimum Block Reward Trail Emission in Monero.flac

51.4 MB

DEF CON 27 Monero Village - Gus Clarke - Tale of Two Tongues Examining Two Mimblewimble Protocols and More.flac

55.1 MB

DEF CON 27 Monero Village - Justin Ehrenhofer - Improving Monero Release Schedule.flac

76.6 MB

DEF CON 27 Monero Village - Kristy-Leigh Minehan - The Future of Accessible Mining.flac

63.3 MB

DEF CON 27 Monero Village - Reuben Yap - Handling Broken cryptography and building a new one.flac

63.1 MB

DEF CON 27 Monero Village - Robin Renwick - Perspective of Privacy Blockchain as a Boundary Object.flac

46.3 MB

DEF CON 27 Monero Village - Sarang Noether PhD - If You Like It Then You Should Have Put a Ring Signature On It.flac

69.6 MB

DEF CON 27 Monero Village - Vik Sharma - Creating cake from Scratch.flac

25.6 MB

DEF CON 27 Packet Hacking Village - Adam - Security to Make the CFO Happy.flac

45.0 MB

DEF CON 27 Packet Hacking Village - Besim Altinok - Wi-Fi Threat Modeling and Monitoring.flac

108.3 MB

DEF CON 27 Packet Hacking Village - Cesare Pizzi - Sandbox Creative Usage For Fun and Pro Blems.flac

56.3 MB

DEF CON 27 Packet Hacking Village - Cheryl Biswas - Patching It is Complicated.flac

92.0 MB

DEF CON 27 Packet Hacking Village - D9 - Hacking Corporate Org Socialization One Day You Are Out and the Next Day You Pwn the Org.flac

124.8 MB

DEF CON 27 Packet Hacking Village - Emilio Couto - CIRCO Cisco Implant Raspberry Controlled Operations.flac

126.0 MB

DEF CON 27 Packet Hacking Village - Gleb Esman - Solving Crimes with Wireless GeoFencing and Multi-Zone Correlation Analytics.flac

118.6 MB

DEF CON 27 Packet Hacking Village - Jay Beale - Attacking and Defending Kubernetes.flac

152.1 MB

DEF CON 27 Packet Hacking Village - Jay Dimartino - The Art of Detection.flac

121.7 MB

DEF CON 27 Packet Hacking Village - Jeff Man - Rethinking Security Given the Spectre of a Meltdown.flac

139.3 MB

DEF CON 27 Packet Hacking Village - Joseph Muniz - Old Tech vs New Adversaries Round 1.flac

91.8 MB

DEF CON 27 Packet Hacking Village - Matt Nash - Head in the Clouds.flac

99.6 MB

DEF CON 27 Packet Hacking Village - Mike Raggo - StegoAugmented Malware.flac

117.2 MB

DEF CON 27 Packet Hacking Village - Russell Butturini - Phishing Freakonomics.flac

138.7 MB

DEF CON 27 Packet Hacking Village - Sam Erb - Hunting Certificates and Servers.flac

41.1 MB

DEF CON 27 Packet Hacking Village - Tom Kopchak - Lessons Learned from Running a National Penetration Testing Competition.flac

138.2 MB

DEF CON 27 Packet Hacking Village - Travis Palmer - First-Try DNS Cache Poisoning with IPv4 and IPv6 Fragmentation.flac

131.3 MB

DEF CON 27 Packet Hacking Village - Utku Sen - Generating Personalized Wordlists With NLP by Analyzing Tweets.flac

66.3 MB

DEF CON 27 Packet Hacking Village - Winnona DeSombre - Bestsellers in the Underground Economy Measuring Malware Popularity by Forum.flac

75.4 MB

DEF CON 27 Recon Village - Adrian Korn - The OSINT space is Growing Are we Ready.flac

79.1 MB

DEF CON 27 Recon Village - Alina Dorina - Using Cloud Services for Dial-In Reconnaissance Automation.flac

60.5 MB

DEF CON 27 Recon Village - Anthony Rose - Hack to Basics Adapting Exploit Frameworks to Evade Microsoft ATP.flac

90.5 MB

DEF CON 27 Recon Village - Bug Crowd - Lets get technical and hunt harder.flac

90.4 MB

DEF CON 27 Recon Village - Jaime Sanchez - Derevolutionizing OS Fingerprinting the cat and mouse game.flac

77.8 MB

DEF CON 27 Recon Village - Jeff Foley - Advanced Recon with OWASP Amass.flac

81.2 MB

DEF CON 27 Recon Village - Joe Gray -DECEPTICON OPSEC to Slow the OSINT.flac

105.2 MB

DEF CON 27 Recon Village - Kala Kinyon - Use Responsibly Recon Like an insider threat for Best User Training ROI.flac

58.1 MB

DEF CON 27 Recon Village - Martin Vigo - From email address to phone number.flac

66.3 MB

DEF CON 27 Recon Village - Master Chen - A URL Shortened By Any Other Name.flac

61.3 MB

DEF CON 27 Recon Village - Mitchell Parker - Building an OSINT and Recon Program to address Healthcare Information Security.flac

100.3 MB

DEF CON 27 Recon Village - Richard Gold - Asset Discovery Making Sense of the Ocean of OSINT.flac

92.3 MB

DEF CON 27 Recon Village - Robert Sell - Hack the Planet Hackers Influencing Positive Change.flac

82.3 MB

DEF CON 27 Recon Village - Seyfullah KILIÇ - OSINT Approach in Big-Data.flac

63.4 MB

DEF CON 27 Recon Village - Susan - Social Media The New Court of Public opinion.flac

64.8 MB

DEF CON 27 Recon Village - Utku Sen - Generating Personalized Wordlists by Analyzing Targets Tweets.flac

51.9 MB

DEF CON 27 Recon Village - Wicked Clown - Finding the needle in the twitter haystack.flac

30.5 MB

DEF CON 27 Recon Village - William Suthers - PIE - A hardware based Prebellico Intelligence Exfiltration Botnet.flac

133.0 MB

DEF CON 27 Red Team Offensive Village - Adrian Sanabria - Red Team Framework RTF.flac

169.7 MB

DEF CON 27 Red Team Offensive Village - Alvaro Folgado - SiestaTime A Red Team Automation Tool for Long-term Implants.flac

86.6 MB

DEF CON 27 Red Team Offensive Village - Casey Erdmann - BadSalt Adversarial DevOps.flac

87.6 MB

DEF CON 27 Red Team Offensive Village - Charles Herring - Breaking NBAD and UEBA Detection.flac

83.6 MB

DEF CON 27 Red Team Offensive Village - Chris McCoy - Through the Looking Glass Own the Data Center.flac

95.5 MB

DEF CON 27 Red Team Offensive Village - Nathan Sweaney - Casting with the Pros Tips and Tricks for Effective Phishing.flac

96.1 MB

DEF CON 27 Social Engineering Village - Andrew Nicholson - Hacking Hollywood.flac

84.1 MB

DEF CON 27 Social Engineering Village - Billy Boatright - Swing Away How to Conquer Impostor Syndrome.flac

70.5 MB

DEF CON 27 Social Engineering Village - Chris Hadnagy - SEVillage 10 Year Anniversary a Look Back at what has changed.flac

150.8 MB

DEF CON 27 Social Engineering Village - Chris Kirsch - Getting Psychic Cold Reading Techniques for Fortune Tellers and Social Engineers.flac

89.3 MB

DEF CON 27 Social Engineering Village - Chris Pritchard - Basics of Social Engineering aKa How I break into Casinos Airports and CNI.flac

60.8 MB

DEF CON 27 Social Engineering Village - Daniel Isler - The Voice Told Me To Do It.flac

72.9 MB

DEF CON 27 Social Engineering Village - Edward Miro - Rideshare OSINT Car Based SE For Fun and Profit.flac

82.5 MB

DEF CON 27 Social Engineering Village - Jayson Street - I PWN thee I PWN thee not.flac

134.4 MB

DEF CON 27 Social Engineering Village - Marcus Liotta - Leveraging the Insider Threat oh and how to be Awesome.flac

85.3 MB

DEF CON 27 Social Engineering Village - Micah Zenko - Red Teaming Insights and Examples from Beyond the Infosec Community.flac

82.7 MB

DEF CON 27 Social Engineering Village - Perry Carpenter - The Aspies Guide to Social Engineering Your Way Through Life.flac

88.8 MB

DEF CON 27 Social Engineering Village - Rebecca Long - Hacking Your Career Through Social Engineering.flac

79.8 MB

DEF CON 27 Social Engineering Village - Robin Dreeke - Sizing People Up.flac

141.4 MB

DEF CON 27 Social Engineering Village - Robin Dreeke - The SEPodcast Episode 120 Live Guest Robin Dreeke.flac

221.7 MB

DEF CON 27 Social Engineering Village - Ryan MacDougall - OSINT in the Real World.flac

75.1 MB

DEF CON 27 Social Engineering Village - Shane McCombs - Why vigilantism doesnt work.flac

75.4 MB

DEF CON 27 Social Engineering Village - Wayne Ronaldson - RED TEAMING FROM DOWN UNDER.flac

88.3 MB

DEF CON 27 Social Engineering Village -R Paul Wilson - R Paul Wilson.flac

85.7 MB

DEF CON 27 Voting Village - Alex Stanev - Machine Voting The Bulgarian Experience.flac

81.4 MB

DEF CON 27 Voting Village - Amber McReynolds - Putting Voters First Expanding Options to Vote.flac

60.0 MB

DEF CON 27 Voting Village - Brian Varner - Beyond the Voting Machine Other High Value Targets in Todays Election System.flac

62.6 MB

DEF CON 27 Voting Village - Chris Krebs - Chris Krebs.flac

43.1 MB

DEF CON 27 Voting Village - Dr Linton Salmon - The DARPA SSITH Program at DEFCON.flac

71.0 MB

DEF CON 27 Voting Village - Dr Philip Stark - Trustworthy Elections Evidence and Dispute Resolution.flac

73.5 MB

DEF CON 27 Voting Village - Eric Geller - State and Local Preparations on Election Security in the Aftermath of the Mueller Report.flac

142.2 MB

DEF CON 27 Voting Village - Evanna Hu - While the Bots Distracted You Overt Russian Information Operations.flac

77.2 MB

DEF CON 27 Voting Village - Ion Sancho - The Multiple Factors Preventing Fair Effective and Secure Elections in America.flac

88.1 MB

DEF CON 27 Voting Village - Jack Cable - Bootstrapping Vulnerability Disclosure For Election Systems.flac

66.8 MB

DEF CON 27 Voting Village - Jake Braun - Lessons Learned DEF CON Voting.flac

94.3 MB

DEF CON 27 Voting Village - Jason Hill - Asssessing Election Infrastructure.flac

66.0 MB

DEF CON 27 Voting Village - John Odum - Addressing the Election Security Threats Posed by Very Small Jurisdictions.flac

72.0 MB

DEF CON 27 Voting Village - Joseph Marks - Panel.flac

235.7 MB

DEF CON 27 Voting Village - Kartikeya Kandula - Unclear Ballot Automated Ballot Image Manipulation.flac

77.4 MB

DEF CON 27 Voting Village - Kate Trimble - Ideas Whose Time Has Come CVD SBOM and SOTA.flac

78.1 MB

DEF CON 27 Voting Village - Kevin Collier - What Role Can Journalists Play in Securing Elections.flac

142.4 MB

DEF CON 27 Voting Village - Kimberly Young-McLear - Organizational Cybernetics A Key to Resilience for the Digital Village.flac

64.9 MB

DEF CON 27 Voting Village - Marian Schneider - If the Voting Systems are Insecure Lets just Vote on Our Phones.flac

54.6 MB

DEF CON 27 Voting Village - Rahul Patel - Incident Lifecycle and Incident Response Management Planning.flac

69.5 MB

DEF CON 27 Voting Village - Ron Wyden - Keynote Remarks Senator Ron Wyden.flac

85.8 MB

DEF CON 27 Voting Village - Sherri Ramsay - 2020 Ready or Not.flac

102.5 MB

DEF CON 27 Voting Village - Tod Beardsley - Securing Voting Systems Beyond Paper Ballots.flac

67.4 MB

DEF CON 27 Wireless Village - Alex Zakhorov - Antennas for Surveillance.flac

76.1 MB

DEF CON 27 Wireless Village - Andres Blanco - Love is in the Air.flac

56.2 MB

DEF CON 27 Wireless Village - Babak Javadi - Basics of Hacking Physical Access Control Systems and Beyond.flac

185.2 MB

DEF CON 27 Wireless Village - Besim ALTINOK - edu-driving.flac

61.7 MB

DEF CON 27 Wireless Village - Eric Johnson - Wi-Fi 6 Deep Dive.flac

214.0 MB

DEF CON 27 Wireless Village - Eric Reuter - Reversing Wireless model railroad control system.flac

36.4 MB

DEF CON 27 Wireless Village - Guillemo Pilleux - Hacking Wi-Fi.flac

113.8 MB

DEF CON 27 Wireless Village - Hak5Crew - Introducing new Hak5 gear.flac

127.8 MB

DEF CON 27 Wireless Village - Lennart Koopmann - nzyme - A New WiFi Defense System.flac

105.8 MB

DEF CON 27 Wireless Village - Nishant Sharma - Developing Wifi Access Point.flac

129.6 MB

DEF CON 27 Wireless Village - Ted - Are you interested in Kismet.flac

50.8 MB

DEF CON 27 Wireless Village - Woody - The Ford Hack Raptor Captor.flac

158.9 MB

DEF CON 27 Wireless Village - m1n1 - Hunting Mobile Rogue Access Points with Wireless Mesh Implants.flac

127.2 MB

DEF CON 27 Wireless Village - s0lst1c3 - War Never Changes Attacks Against WPA3s Enhanced Open.flac

88.3 MB

DEF CON 27 Wireless Village - the Ricks - WCTF Gear Talk.flac

312.6 MB

/.../DEF CON 27 villages audio m4a/

DEF CON 27 AI Village - AI Village Organizers - Opening Remarks.m4a

315.4 KB

DEF CON 27 AI Village - Angelo Oliveira - Fighting Malware with Deep Learning.m4a

14.9 MB

DEF CON 27 AI Village - Anna Skelton - Analyzing the Effects of Deepfakes on Market Manipulation.m4a

17.2 MB

DEF CON 27 AI Village - Barton Rhodes - Securing your kubeflow clusters.m4a

17.9 MB

DEF CON 27 AI Village - Bob Lord - Misinformation Keynote.m4a

16.1 MB

DEF CON 27 AI Village - Dr Ethan Rudd - Loss Is More Improving Malware Detectors by Learning Additional Tasks.m4a

22.9 MB

DEF CON 27 AI Village - Hyrum Anderson - Competitions in Infosec ML.m4a

7.4 MB

DEF CON 27 AI Village - Jason Mancuso - Machine Learnings Privacy Problem.m4a

23.6 MB

DEF CON 27 AI Village - Jesus Solano - Behavioral Biometrics and Context Analytics Risk Based Authentication Re-Imagined.m4a

18.6 MB

DEF CON 27 AI Village - Jon Hawes - A buyers guide to the market promise of automagic AI-enabled detection and response.m4a

26.4 MB

DEF CON 27 AI Village - Kenya Yoshimur - Clairvoyance concurrent lip-reading for the smart masses.m4a

13.1 MB

DEF CON 27 AI Village - Lauren Putvin - Exploratory Data Analysis Why and How in Python.m4a

18.7 MB

DEF CON 27 AI Village - Laurin Weissinger - Regulating AI and Algorithms Lessons from Safety and Security Certifications and Audits.m4a

13.0 MB

DEF CON 27 AI Village - Rand Waltzman - Disinformation Its the Thought that Counts.m4a

25.8 MB

DEF CON 27 AI Village - Richard Harang - A Tutorial on Hacking Facial Recognition Systems.m4a

19.6 MB

DEF CON 27 AI Village - Roei Amit - How to Get over your malicious extensions using deep learning.m4a

14.0 MB

DEF CON 27 AI Village - Ryan Kovar - Datasciencery by the Splunk Field.m4a

16.3 MB

DEF CON 27 AI Village - Samantha Cole - Deep Fakes Panel.m4a

32.6 MB

DEF CON 27 AI Village - Siwei Lyu - Seeing is deceiving The rise of AI-synthesized fake media.m4a

21.9 MB

DEF CON 27 AI Village - Tal Leibovich - From Noisy Distorted data-sets to excellent prediction models.m4a

27.0 MB

DEF CON 27 AI Village - Walter Scheirer - Backdooring Convolutional Neural Networks via Targeted Weight Perturbations.m4a

13.2 MB

DEF CON 27 AI Village - X1.m4a

5.4 MB

DEF CON 27 AI Village - Yisroel Mirsky - Automated Injection and Removal of Medical Evidence in CT and MRI Scans.m4a

14.2 MB

DEF CON 27 Appsec Village - Anthony Kava - How bad could it be Inside Law Enforcement and Local gov AppSec.m4a

24.3 MB

DEF CON 27 Appsec Village - Erez Yalon - Welcome and Introductions.m4a

333.7 KB

DEF CON 27 Appsec Village - Guy Barnhart-Magen - Crypto Failures and how to avoid them.m4a

22.6 MB

DEF CON 27 Appsec Village - Jillian Ratliff - Vulnerabilities that Hide from Your Tools.m4a

17.9 MB

DEF CON 27 Appsec Village - Jim Manico - Keynote The Unabridged History of Application Security.m4a

33.9 MB

DEF CON 27 Appsec Village - Joe Schottman - Purple Team Strategies for Application Security.m4a

13.7 MB

DEF CON 27 Appsec Village - Rafael Santos - huskyCI Finding Security Flaws in CI Before Deploying Them.m4a

17.8 MB

DEF CON 27 Appsec Village - YanYan Wang - Automate Pen-Testing in Dockerized CI CD Environment.m4a

25.2 MB

DEF CON 27 Aviation Village - Art Manion - Ideas whose time has come CVD SBOM and SOTA.m4a

16.8 MB

DEF CON 27 Aviation Village - Dr Will Roper - Hacking the airforce and beyond.m4a

13.4 MB

DEF CON 27 Aviation Village - Exploding Lemur - In The Air And On The Air Aviation Radio Systems.m4a

15.3 MB

DEF CON 27 Aviation Village - Harshad Sathaye - Wireless Attacks on Aircraft Instrument Landing Systems.m4a

17.2 MB

DEF CON 27 Aviation Village - Karl Koscher - An Introduction to the ARINC standards.m4a

12.8 MB

DEF CON 27 Aviation Village - Ken and Alex - A Hackers First Solo Airplane Avionics Security 101.m4a

24.7 MB

DEF CON 27 Aviation Village - Panel - The Long Haul The State of Aviation Policy.m4a

27.1 MB

DEF CON 27 Aviation Village - Patrick Kiley - CAN Bus in Aviation Investigating CAN Bus in Avionics.m4a

6.6 MB

DEF CON 27 Aviation Village - Tarah Wheeler - Common Online Security Fails In Pilot Training.m4a

15.1 MB

DEF CON 27 Aviation Village - Zoltan Madarassy - Behind the scenes of hacking airplanes.m4a

19.4 MB

DEF CON 27 Bio Hacking Village - Alex Pearlman - DIY Medicine The Ethics of Hacking Pharma.m4a

18.9 MB

DEF CON 27 Bio Hacking Village - Andrea Downing - A Previvors Story of Uncovering Massive Zero Day Vulnerability.m4a

16.5 MB

DEF CON 27 Bio Hacking Village - Corey M Hudson - From Buffer Overflowing Genomics Tools to Securing Biomedical File Formats.m4a

21.6 MB

DEF CON 27 Bio Hacking Village - Dr Avi Rubin - A Complete View of the Attack Surface of a Networked Medical Device.m4a

18.6 MB

DEF CON 27 Bio Hacking Village - Dr Harish Manyam - Doctor Hacker Panel.m4a

37.6 MB

DEF CON 27 Bio Hacking Village - Eric D Perakslis - Employ Cybersecurity Techniques Against the Threat of Medical Information.m4a

15.4 MB

DEF CON 27 Bio Hacking Village - JC Vega - How to Level Up Experiential Learning through Gamification.m4a

17.6 MB

DEF CON 27 Bio Hacking Village - JJ Hastings - The L33T Shall Inherit the Cosmos.m4a

17.2 MB

DEF CON 27 Bio Hacking Village - Jay Lagario - Hacking Wetware with Open Source Software and Hardware.m4a

24.9 MB

DEF CON 27 Bio Hacking Village - Jean Rintoul - Spectra Open Biomedical Imaging.m4a

22.7 MB

DEF CON 27 Bio Hacking Village - Najla Lindsay - Forensic Science and Information Security Lifetime Lovers Part-time Friends.m4a

19.0 MB

DEF CON 27 Bio Hacking Village - Nick Titus - Building a New Decentralized Internet With the Nodes Implanted in Our Bodies.m4a

16.8 MB

DEF CON 27 Bio Hacking Village - Panel - Medical Simulations Panel.m4a

29.2 MB

DEF CON 27 Bio Hacking Village - Rachel Smith - Liven Up Augmenting Materials for Bio-Hybrid Functionality.m4a

16.7 MB

DEF CON 27 Bio Hacking Village - Steve Lewis - Cyberbiosecurity and the Full Stack Biotechnologist.m4a

17.5 MB

DEF CON 27 Bio Hacking Village - Turtle Snap - Malware and Biology.m4a

11.9 MB

DEF CON 27 Bio Hacking Village - Wayne Penn - Amputees and Prostetics Challenges.m4a

36.2 MB

DEF CON 27 Block Chain Village - Mark Nesbitt - What Is Bitcoin.m4a

12.0 MB

DEF CON 27 Block Chain Village - Brian Vohaska - Forcing a trustworthy notion of sequential time.m4a

19.5 MB

DEF CON 27 Block Chain Village - Mark Nesbitt - Hacking Cryptocurrencies.m4a

17.3 MB

DEF CON 27 Block Chain Village - Mila Paul - Alice and Bobs Big Secret.m4a

17.5 MB

DEF CON 27 Block Chain Village - Panel - Privacy Enabler or Hindrance to the Success of Blockchain based currencies.m4a

22.1 MB

DEF CON 27 Block Chain Village - Philip Martin - Responding to Firefox 0-days.m4a

21.5 MB

DEF CON 27 Block Chain Village - Rod Soto - A Smart Contract Killchain How the first Blockchain APT was caught.m4a

21.6 MB

DEF CON 27 Block Chain Village - Ron Stoner - The CryptoCurrency Security Standard CCSS.m4a

27.6 MB

DEF CON 27 Blue Team Village - Carlos Garay - Memhunter Automated Hunting Of A Memory Resident Malware At Scale.m4a

23.8 MB

DEF CON 27 Blue Team Village - Cathy Ullman - A Theme Of Fear Hacking The Paradigm.m4a

23.5 MB

DEF CON 27 Blue Team Village - Christine Le - Blue Team Guide For Fresh Eyes.m4a

12.0 MB

DEF CON 27 Blue Team Village - Georgios Kapoglis - Serverless Log Analysis On AWS.m4a

16.6 MB

DEF CON 27 Blue Team Village - Lacie Fan - Killsuit How The Equation Group Remained Out Of Sight For Years.m4a

15.1 MB

DEF CON 27 Blue Team Village - Lak Shmi Sudheer - Who Dis Who Dis The Right Way To Authenticate.m4a

27.7 MB

DEF CON 27 Blue Team Village - Mark Orlando - When A Plan Comes Together Building a SOC A-Team.m4a

9.5 MB

DEF CON 27 Blue Team Village - Norman Lundt - Extending Zeek For ICS Defense.m4a

10.4 MB

DEF CON 27 Blue Team Village - Scoubi - BloodHound From Red to Blue 1 point 5.m4a

23.9 MB

DEF CON 27 Blue Team Village - Shawn Thomas - An Introduction To Malware Analysis.m4a

21.4 MB

DEF CON 27 Blue Team Village - Siyu Zhu - Evaded Microsoft ATA.m4a

20.7 MB

DEF CON 27 Blue Team Village - ch33r10 - The Cyber Threat Intelligence Mindset.m4a

15.4 MB

DEF CON 27 Blue Team Village - claushoumann - Security Strategy for Small-Medium Business.m4a

24.0 MB

DEF CON 27 Blue Team Village - dumby - Anatomy Of A Megabreach Equifax Report.m4a

25.6 MB

DEF CON 27 Car Hacking Village - Aaron Cornelius - Intro to UDS.m4a

16.6 MB

DEF CON 27 Car Hacking Village - Elijah Roberts - Tell Me Lies Automotive LIDAR and Low-Tech Obfuscation.m4a

14.4 MB

DEF CON 27 Car Hacking Village - Greg Hogan - Reverse Engineering and Flashing ECU Firmware Updates.m4a

22.3 MB

DEF CON 27 Car Hacking Village - Ken Munro - Lojackd pwning car alarms vehicle trackers and immobilisers.m4a

10.9 MB

DEF CON 27 Car Hacking Village - Lennert Wouters - Fast Furious and Insecure Passive Keyless Entry and Start Systems in Modern Supercars.m4a

14.4 MB

DEF CON 27 Car Hacking Village - Neiko Rivera - Infotainment Hacking.m4a

9.2 MB

DEF CON 27 Car Hacking Village - Rotem Bar - Hacking into Automotive Clouds.m4a

20.0 MB

DEF CON 27 Car Hacking Village - Victor Murray - Legal Over-the-Air Spoofing of GNSS and its Effects on Autonomous Vehicles.m4a

10.5 MB

DEF CON 27 Cloud Village - Ayman Elsawah - Using Paretos Primciple for Securing AWS with SCPs.m4a

17.1 MB

DEF CON 27 Cloud Village - Chris Le Roy - Build to Hack Hack to Build.m4a

17.1 MB

DEF CON 27 Cloud Village - Erick Galinkin - Your Blacklist is Dead Airgap Everything.m4a

14.9 MB

DEF CON 27 Cloud Village - James Strassburg - Scaling Security in the Cloud with Open Source.m4a

17.2 MB

DEF CON 27 Cloud Village - Jenko Hwong - Exploiting AWS loopholes with temporary credentials.m4a

17.2 MB

DEF CON 27 Cloud Village - Rod Soto - Using Splunk or ELK for Auditing AWS GCP Azure Security Posture.m4a

15.3 MB

DEF CON 27 Cloud Village - Rotem Bar - Hacking into Automative Clouds.m4a

18.3 MB

DEF CON 27 Cloud Village - Setu Parimi - PacBot Policy as Code from T-Mobile OSS.m4a

14.8 MB

DEF CON 27 Cloud Village - Tanya Janca - DYI Azure Security Assesment.m4a

19.6 MB

DEF CON 27 Crypto and Privacy Village - Ben Brecht - MITM mixed mode butterfly key privacy attack.m4a

18.1 MB

DEF CON 27 Crypto and Privacy Village - Cat Murdock - Black Mirror You are your own privacy nightmare.m4a

28.5 MB

DEF CON 27 Crypto and Privacy Village - Cathie Yun - Implementing a Zero Knowledge Proof or How to Write Bulletproofs in Rust.m4a

21.2 MB

DEF CON 27 Crypto and Privacy Village - Chris Hanlon - TLS decryption attacks and back-doors to secure systems.m4a

16.5 MB

DEF CON 27 Crypto and Privacy Village - Christian Paquin - Migrating to quantum-safe cryptography to protect against quantum hackers.m4a

13.9 MB

DEF CON 27 Crypto and Privacy Village - Ethan Gregory Dodge - Scrubber An open source compilation to protect journalistic sources.m4a

10.0 MB

DEF CON 27 Crypto and Privacy Village - Harlo Holmes - Tiplines Today.m4a

30.5 MB

DEF CON 27 Crypto and Privacy Village - Karl Koscher - Enabling HTTPS for home network devices using Lets Encrypt.m4a

11.6 MB

DEF CON 27 Crypto and Privacy Village - Kate Rose - Adversarial Fashion Sartorial Hacking to Combat Surveillance.m4a

28.6 MB

DEF CON 27 Crypto and Privacy Village - Katelyn Bowden - Fighting non consensual pornography the BADASS way.m4a

25.8 MB

DEF CON 27 Crypto and Privacy Village - Mark B Cooper - How PKI and SHAKEN STIR Will Fix the Global Robocall Problem.m4a

30.5 MB

DEF CON 27 Crypto and Privacy Village - Mike Kiser - I am Spartacus And You Can Be Too Ensuring Privacy through Obfuscation.m4a

28.8 MB

DEF CON 27 Crypto and Privacy Village - Riana Pfefferkorn - Giving Cops the Finger Compelled Device Decryption and 5th Amendment.m4a

16.6 MB

DEF CON 27 Crypto and Privacy Village - Sarah McCarthy - Stop right now Quantum-Safe Instantaneous Vehicle to Vehicle communication.m4a

8.6 MB

DEF CON 27 Crypto and Privacy Village - Steve Thomas - Easy PAKE Oven.m4a

22.6 MB

DEF CON 27 Crypto and Privacy Village - Suchismita Pahi - How to Effectively Integrate Your Privacy Legal and Security Teams.m4a

24.6 MB

DEF CON 27 Crypto and Privacy Village - Tiffany Li - Stop Facebook From Buying Your Brain Facial Recognition DNA and Biometric Privacy.m4a

15.4 MB

DEF CON 27 Crypto and Privacy Village - Tyler Kell - Towards Usable Dining Cryptographer Networks with Howl.m4a

10.6 MB

DEF CON 27 Crypto and Privacy Village - Vitor Ventura - Snoop all Telegram messages.m4a

14.2 MB

DEF CON 27 DroneWars Village - Ryan Schonfeld - SWARM.m4a

17.1 MB

DEF CON 27 Ethics Village - Anthony Ferrante - Coffee Talk.m4a

24.7 MB

DEF CON 27 Ethics Village - Dr Suzanne Schwartz FDA - Coffee Talk.m4a

25.2 MB

DEF CON 27 Ethics Village - Jake Williams - Ethical Issues in Cyber Attribution.m4a

57.6 MB

DEF CON 27 Ethics Village - Kyle Wiens - Void If Removed Securing Our Right to Repair.m4a

59.6 MB

DEF CON 27 Ethics Village - Liz OSullivan - Is It Ethical to Work On Autonomous Weapon Systems.m4a

51.3 MB

DEF CON 27 Ethics Village - Panel - Law Professor Round Robin.m4a

27.1 MB

DEF CON 27 Ethics Village - Renderman - Rant on Disclosure.m4a

58.7 MB

DEF CON 27 Ethics Village - Tom Kopchak - Teaching Consulting Pentesting and Ethics.m4a

58.9 MB

DEF CON 27 Ethics Village - Wendy Edwards - Who is Tracking Your Body Health Apps and Your Privacy.m4a

27.2 MB

DEF CON 27 Hack the Sea Village - Andrew Tierney - Pwning a mobile drilling rig Hacking an oil rig.m4a

15.1 MB

DEF CON 27 Hack the Sea Village - Brian Satira - Opening Remarks.m4a

3.4 MB

DEF CON 27 Hack the Sea Village - Cris DeWitt - Maritime Cyber Policy Panel.m4a

23.3 MB

DEF CON 27 Hack the Sea Village - David Belasco - Finding Flaws in a Satcom Terminal.m4a

13.6 MB

DEF CON 27 Hack the Sea Village - Josh Steinman - National Security Council and Special Assitant for Cyber.m4a

9.5 MB

DEF CON 27 Hack the Sea Village - Julian Blanco - C2 over Maritime AIS and commercial aggregation websites.m4a

9.3 MB

DEF CON 27 Hack the Sea Village - Stephan Gerling - Yacht Hacking from SatCOM to engine control.m4a

33.1 MB

DEF CON 27 Hack the Sea Village - Weston Hecker - PENTESTING How to Get into the Field Explained.m4a

13.2 MB

DEF CON 27 Ham Radio Village - Jason - The RF Dark Arts.m4a

13.7 MB

DEF CON 27 Ham Radio Village - Mark KR6ZY - Hunting tape measure yagis and offset attenuators.m4a

9.3 MB

DEF CON 27 Hardware Hacking Village - Allison Marie Naaktgeboren - Reversing Corruption in Seagate HDD Translators.m4a

20.8 MB

DEF CON 27 Hardware Hacking Village - Benjamin Lafois - Another Car Hacking Approach.m4a

26.3 MB

DEF CON 27 Hardware Hacking Village - Wang Kang - Infrared New Threats Meet Old Devices.m4a

12.0 MB

DEF CON 27 ICS Village - Austin Scott - Purple Teaming ICS Networks.m4a

15.1 MB

DEF CON 27 ICS Village - Bryson Bort - ICS IOT Threat Landscape.m4a

13.3 MB

DEF CON 27 ICS Village - Chris Kubecka - Hack the World and Galaxy with OSINT.m4a

16.9 MB

DEF CON 27 ICS Village - Daniel dos Santos - Abusing the IoT in Smart Buildings.m4a

16.1 MB

DEF CON 27 ICS Village - Douglas McKee - HVACking Understand the difference Between Security and Reality.m4a

15.3 MB

DEF CON 27 ICS Village - Jack Oden - IT OT Convergence Are We There Yet.m4a

13.6 MB

DEF CON 27 ICS Village - Joe Slowik - CRASHOVERRIDE Re-Assessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack.m4a

17.5 MB

DEF CON 27 ICS Village - Joseph Bingham - SCADA What the next Stuxnet will look like and how to prevent it.m4a

14.0 MB

DEF CON 27 ICS Village - Monta Elkins - Nation State Supply Chain Attacks for Dummies or Chipping Cisco Firewalls.m4a

16.6 MB

DEF CON 27 ICS Village - Ryan Leirvik - Pin the tail on the cyber owner.m4a

12.4 MB

DEF CON 27 ICS Village - Sharon Brizinov - Changium IPiosa most magical change IP packets in the wild.m4a

14.5 MB

DEF CON 27 IoT Village - Alex Jay Balan - Next-gen IoT Botnets 3 moar ownage.m4a

22.2 MB

DEF CON 27 IoT Village - Amit Elazari - Regulatory Trends in IoT Security and impact on the research community.m4a

20.6 MB

DEF CON 27 IoT Village - BITFI You Wouldnt Steal My Cloins.m4a

15.9 MB

DEF CON 27 IoT Village - Bertin Bervis - Mixing industrial protocols with web application security flaws in order to exploit OT devices.m4a

20.6 MB

DEF CON 27 IoT Village - Daniel Wegemer - Fitbit Firmware Hacking - The Current State of the Heart.m4a

25.2 MB

DEF CON 27 IoT Village - Dennis Giese - Privacy leaks in smart devices Extracting data from used smart home devices.m4a

26.8 MB

DEF CON 27 IoT Village - Elvis Collado - Greenwaves and Ham.m4a

20.7 MB

DEF CON 27 IoT Village - Hyejin Jeong - HACK DMI PWNING HDMI FOR FUN AND PROFIT.m4a

19.3 MB

DEF CON 27 IoT Village - Lee Brotherston - A Glorious Celebration of IoT Security.m4a

15.1 MB

DEF CON 27 IoT Village - M Can Kurnaz - Get your next roadtrip for free Long live the vulnerable EV charging points.m4a

8.8 MB

DEF CON 27 IoT Village - Maxwell Dulin - Hacking the Zyxel NAS 326 from the Perspective of a n00b.m4a

15.6 MB

DEF CON 27 IoT Village - Michael Raggo - Spy versus Spy who is watching who.m4a

15.4 MB

DEF CON 27 IoT Village - Panel - IoT Security and Manufacturers Q and A Panel.m4a

27.8 MB

DEF CON 27 IoT Village - Rick Ramgattie - SOHOpelessly Broken 2 point 0.m4a

23.3 MB

DEF CON 27 Monero Village - AJ Santos - Houston we have a problem 86R HB 4371 is a no-go.m4a

15.6 MB

DEF CON 27 Monero Village - Allan Stevo - AirBNB for Retail Internet A Distrubuted Internet Technology with Monero.m4a

17.4 MB

DEF CON 27 Monero Village - Allan Stevo - InfoSec vs Hacker The War for the Soul of a Technology.m4a

11.5 MB

DEF CON 27 Monero Village - Amir Montazery - The Cost of Good Open Source Software.m4a

12.9 MB

DEF CON 27 Monero Village - Cathie Yun - Bulletproofs - deep dive.m4a

21.3 MB

DEF CON 27 Monero Village - Daniel Kim - Keynote Speech Monero Introduction and Investor Perspective.m4a

42.5 MB

DEF CON 27 Monero Village - Diego - Monero is UGLY and DIFFICULT to use.m4a

16.1 MB

DEF CON 27 Monero Village - Dr Jeremy Gillula - Encrypting the Web Isnt Enough How EFF Plans to Encrypt the Entire Internet.m4a

30.1 MB

DEF CON 27 Monero Village - Francisco Cabanas - The Critical Role of the Minimum Block Reward Trail Emission in Monero.m4a

13.1 MB

DEF CON 27 Monero Village - Gus Clarke - Tale of Two Tongues Examining Two Mimblewimble Protocols and More.m4a

10.6 MB

DEF CON 27 Monero Village - Justin Ehrenhofer - Improving Monero Release Schedule.m4a

16.4 MB

DEF CON 27 Monero Village - Kristy-Leigh Minehan - The Future of Accessible Mining.m4a

14.1 MB

DEF CON 27 Monero Village - Reuben Yap - Handling Broken cryptography and building a new one.m4a

13.4 MB

DEF CON 27 Monero Village - Robin Renwick - Perspective of Privacy Blockchain as a Boundary Object.m4a

10.7 MB

DEF CON 27 Monero Village - Sarang Noether PhD - If You Like It Then You Should Have Put a Ring Signature On It.m4a

16.9 MB

DEF CON 27 Monero Village - Vik Sharma - Creating cake from Scratch.m4a

6.2 MB

DEF CON 27 Packet Hacking Village - Adam - Security to Make the CFO Happy.m4a

11.7 MB

DEF CON 27 Packet Hacking Village - Besim Altinok - Wi-Fi Threat Modeling and Monitoring.m4a

26.6 MB

DEF CON 27 Packet Hacking Village - Cesare Pizzi - Sandbox Creative Usage For Fun and Pro Blems.m4a

14.0 MB

DEF CON 27 Packet Hacking Village - Cheryl Biswas - Patching It is Complicated.m4a

22.0 MB

DEF CON 27 Packet Hacking Village - D9 - Hacking Corporate Org Socialization One Day You Are Out and the Next Day You Pwn the Org.m4a

28.7 MB

DEF CON 27 Packet Hacking Village - Emilio Couto - CIRCO Cisco Implant Raspberry Controlled Operations.m4a

30.7 MB

DEF CON 27 Packet Hacking Village - Gleb Esman - Solving Crimes with Wireless GeoFencing and Multi-Zone Correlation Analytics.m4a

28.9 MB

DEF CON 27 Packet Hacking Village - Jay Beale - Attacking and Defending Kubernetes.m4a

32.9 MB

DEF CON 27 Packet Hacking Village - Jay Dimartino - The Art of Detection.m4a

25.1 MB

DEF CON 27 Packet Hacking Village - Jeff Man - Rethinking Security Given the Spectre of a Meltdown.m4a

32.1 MB

DEF CON 27 Packet Hacking Village - Joseph Muniz - Old Tech vs New Adversaries Round 1.m4a

19.5 MB

DEF CON 27 Packet Hacking Village - Matt Nash - Head in the Clouds.m4a

22.1 MB

DEF CON 27 Packet Hacking Village - Mike Raggo - StegoAugmented Malware.m4a

24.4 MB

DEF CON 27 Packet Hacking Village - Russell Butturini - Phishing Freakonomics.m4a

31.1 MB

DEF CON 27 Packet Hacking Village - Sam Erb - Hunting Certificates and Servers.m4a

9.4 MB

DEF CON 27 Packet Hacking Village - Tom Kopchak - Lessons Learned from Running a National Penetration Testing Competition.m4a

32.2 MB

DEF CON 27 Packet Hacking Village - Travis Palmer - First-Try DNS Cache Poisoning with IPv4 and IPv6 Fragmentation.m4a

28.6 MB

DEF CON 27 Packet Hacking Village - Utku Sen - Generating Personalized Wordlists With NLP by Analyzing Tweets.m4a

14.2 MB

DEF CON 27 Packet Hacking Village - Winnona DeSombre - Bestsellers in the Underground Economy Measuring Malware Popularity by Forum.m4a

14.6 MB

DEF CON 27 Recon Village - Adrian Korn - The OSINT space is Growing Are we Ready.m4a

16.1 MB

DEF CON 27 Recon Village - Alina Dorina - Using Cloud Services for Dial-In Reconnaissance Automation.m4a

12.4 MB

DEF CON 27 Recon Village - Anthony Rose - Hack to Basics Adapting Exploit Frameworks to Evade Microsoft ATP.m4a

17.2 MB

DEF CON 27 Recon Village - Bug Crowd - Lets get technical and hunt harder.m4a

16.8 MB

DEF CON 27 Recon Village - Jaime Sanchez - Derevolutionizing OS Fingerprinting the cat and mouse game.m4a

18.2 MB

DEF CON 27 Recon Village - Jeff Foley - Advanced Recon with OWASP Amass.m4a

15.9 MB

DEF CON 27 Recon Village - Joe Gray -DECEPTICON OPSEC to Slow the OSINT.m4a

22.2 MB

DEF CON 27 Recon Village - Kala Kinyon - Use Responsibly Recon Like an insider threat for Best User Training ROI.m4a

12.4 MB

DEF CON 27 Recon Village - Martin Vigo - From email address to phone number.m4a

14.5 MB

DEF CON 27 Recon Village - Master Chen - A URL Shortened By Any Other Name.m4a

13.9 MB

DEF CON 27 Recon Village - Mitchell Parker - Building an OSINT and Recon Program to address Healthcare Information Security.m4a

22.7 MB

DEF CON 27 Recon Village - Richard Gold - Asset Discovery Making Sense of the Ocean of OSINT.m4a

22.6 MB

DEF CON 27 Recon Village - Robert Sell - Hack the Planet Hackers Influencing Positive Change.m4a

16.3 MB

DEF CON 27 Recon Village - Seyfullah KILIÇ - OSINT Approach in Big-Data.m4a

13.8 MB

DEF CON 27 Recon Village - Susan - Social Media The New Court of Public opinion.m4a

11.9 MB

DEF CON 27 Recon Village - Utku Sen - Generating Personalized Wordlists by Analyzing Targets Tweets.m4a

11.0 MB

DEF CON 27 Recon Village - Wicked Clown - Finding the needle in the twitter haystack.m4a

7.3 MB

DEF CON 27 Recon Village - William Suthers - PIE - A hardware based Prebellico Intelligence Exfiltration Botnet.m4a

28.1 MB

DEF CON 27 Red Team Offensive Village - Adrian Sanabria - Red Team Framework RTF.m4a

38.9 MB

DEF CON 27 Red Team Offensive Village - Alvaro Folgado - SiestaTime A Red Team Automation Tool for Long-term Implants.m4a

19.2 MB

DEF CON 27 Red Team Offensive Village - Casey Erdmann - BadSalt Adversarial DevOps.m4a

22.8 MB

DEF CON 27 Red Team Offensive Village - Charles Herring - Breaking NBAD and UEBA Detection.m4a

18.5 MB

DEF CON 27 Red Team Offensive Village - Chris McCoy - Through the Looking Glass Own the Data Center.m4a

23.5 MB

DEF CON 27 Red Team Offensive Village - Nathan Sweaney - Casting with the Pros Tips and Tricks for Effective Phishing.m4a

22.6 MB

DEF CON 27 Social Engineering Village - Andrew Nicholson - Hacking Hollywood.m4a

16.3 MB

DEF CON 27 Social Engineering Village - Billy Boatright - Swing Away How to Conquer Impostor Syndrome.m4a

14.1 MB

DEF CON 27 Social Engineering Village - Chris Hadnagy - SEVillage 10 Year Anniversary a Look Back at what has changed.m4a

28.2 MB

DEF CON 27 Social Engineering Village - Chris Kirsch - Getting Psychic Cold Reading Techniques for Fortune Tellers and Social Engineers.m4a

17.8 MB

DEF CON 27 Social Engineering Village - Chris Pritchard - Basics of Social Engineering aKa How I break into Casinos Airports and CNI.m4a

14.3 MB

DEF CON 27 Social Engineering Village - Daniel Isler - The Voice Told Me To Do It.m4a

15.0 MB

DEF CON 27 Social Engineering Village - Edward Miro - Rideshare OSINT Car Based SE For Fun and Profit.m4a

16.1 MB

DEF CON 27 Social Engineering Village - Jayson Street - I PWN thee I PWN thee not.m4a

28.7 MB

DEF CON 27 Social Engineering Village - Marcus Liotta - Leveraging the Insider Threat oh and how to be Awesome.m4a

17.0 MB

DEF CON 27 Social Engineering Village - Micah Zenko - Red Teaming Insights and Examples from Beyond the Infosec Community.m4a

17.2 MB

DEF CON 27 Social Engineering Village - Perry Carpenter - The Aspies Guide to Social Engineering Your Way Through Life.m4a

18.1 MB

DEF CON 27 Social Engineering Village - Rebecca Long - Hacking Your Career Through Social Engineering.m4a

15.5 MB

DEF CON 27 Social Engineering Village - Robin Dreeke - Sizing People Up.m4a

28.5 MB

DEF CON 27 Social Engineering Village - Robin Dreeke - The SEPodcast Episode 120 Live Guest Robin Dreeke.m4a

39.9 MB

DEF CON 27 Social Engineering Village - Ryan MacDougall - OSINT in the Real World.m4a

15.6 MB

DEF CON 27 Social Engineering Village - Shane McCombs - Why vigilantism doesnt work.m4a

16.4 MB

DEF CON 27 Social Engineering Village - Wayne Ronaldson - RED TEAMING FROM DOWN UNDER.m4a

18.3 MB

DEF CON 27 Social Engineering Village -R Paul Wilson - R Paul Wilson.m4a

17.9 MB

DEF CON 27 Voting Village - Alex Stanev - Machine Voting The Bulgarian Experience.m4a

16.6 MB

DEF CON 27 Voting Village - Amber McReynolds - Putting Voters First Expanding Options to Vote.m4a

12.7 MB

DEF CON 27 Voting Village - Brian Varner - Beyond the Voting Machine Other High Value Targets in Todays Election System.m4a

13.1 MB

DEF CON 27 Voting Village - Chris Krebs - Chris Krebs.m4a

7.9 MB

DEF CON 27 Voting Village - Dr Linton Salmon - The DARPA SSITH Program at DEFCON.m4a

17.2 MB

DEF CON 27 Voting Village - Dr Philip Stark - Trustworthy Elections Evidence and Dispute Resolution.m4a

15.6 MB

DEF CON 27 Voting Village - Eric Geller - State and Local Preparations on Election Security in the Aftermath of the Mueller Report.m4a

30.4 MB

DEF CON 27 Voting Village - Evanna Hu - While the Bots Distracted You Overt Russian Information Operations.m4a

15.2 MB

DEF CON 27 Voting Village - Ion Sancho - The Multiple Factors Preventing Fair Effective and Secure Elections in America.m4a

18.0 MB

DEF CON 27 Voting Village - Jack Cable - Bootstrapping Vulnerability Disclosure For Election Systems.m4a

13.6 MB

DEF CON 27 Voting Village - Jake Braun - Lessons Learned DEF CON Voting.m4a

19.0 MB

DEF CON 27 Voting Village - Jason Hill - Asssessing Election Infrastructure.m4a

13.4 MB

DEF CON 27 Voting Village - John Odum - Addressing the Election Security Threats Posed by Very Small Jurisdictions.m4a

14.6 MB

DEF CON 27 Voting Village - Joseph Marks - Panel.m4a

47.4 MB

DEF CON 27 Voting Village - Kartikeya Kandula - Unclear Ballot Automated Ballot Image Manipulation.m4a

15.2 MB

DEF CON 27 Voting Village - Kate Trimble - Ideas Whose Time Has Come CVD SBOM and SOTA.m4a

16.2 MB

DEF CON 27 Voting Village - Kevin Collier - What Role Can Journalists Play in Securing Elections.m4a

28.6 MB

DEF CON 27 Voting Village - Kimberly Young-McLear - Organizational Cybernetics A Key to Resilience for the Digital Village.m4a

13.0 MB

DEF CON 27 Voting Village - Marian Schneider - If the Voting Systems are Insecure Lets just Vote on Our Phones.m4a

11.5 MB

DEF CON 27 Voting Village - Rahul Patel - Incident Lifecycle and Incident Response Management Planning.m4a

14.2 MB

DEF CON 27 Voting Village - Ron Wyden - Keynote Remarks Senator Ron Wyden.m4a

17.1 MB

DEF CON 27 Voting Village - Sherri Ramsay - 2020 Ready or Not.m4a

20.6 MB

DEF CON 27 Voting Village - Tod Beardsley - Securing Voting Systems Beyond Paper Ballots.m4a

13.4 MB

DEF CON 27 Wireless Village - Alex Zakhorov - Antennas for Surveillance.m4a

17.5 MB

DEF CON 27 Wireless Village - Andres Blanco - Love is in the Air.m4a

14.5 MB

DEF CON 27 Wireless Village - Babak Javadi - Basics of Hacking Physical Access Control Systems and Beyond.m4a

36.2 MB

DEF CON 27 Wireless Village - Besim ALTINOK - edu-driving.m4a

16.9 MB

DEF CON 27 Wireless Village - Eric Johnson - Wi-Fi 6 Deep Dive.m4a

44.3 MB

DEF CON 27 Wireless Village - Eric Reuter - Reversing Wireless model railroad control system.m4a

9.8 MB

DEF CON 27 Wireless Village - Guillemo Pilleux - Hacking Wi-Fi.m4a

28.5 MB

DEF CON 27 Wireless Village - Hak5Crew - Introducing new Hak5 gear.m4a

27.3 MB

DEF CON 27 Wireless Village - Lennart Koopmann - nzyme - A New WiFi Defense System.m4a

23.0 MB

DEF CON 27 Wireless Village - Nishant Sharma - Developing Wifi Access Point.m4a

29.7 MB

DEF CON 27 Wireless Village - Ted - Are you interested in Kismet.m4a

10.9 MB

DEF CON 27 Wireless Village - Woody - The Ford Hack Raptor Captor.m4a

33.8 MB

DEF CON 27 Wireless Village - m1n1 - Hunting Mobile Rogue Access Points with Wireless Mesh Implants.m4a

24.9 MB

DEF CON 27 Wireless Village - s0lst1c3 - War Never Changes Attacks Against WPA3s Enhanced Open.m4a

22.6 MB

DEF CON 27 Wireless Village - the Ricks - WCTF Gear Talk.m4a

73.4 MB

/.../DEF CON 27 villages audio opus/

DEF CON 27 AI Village - AI Village Organizers - Opening Remarks.opus

205.7 KB

DEF CON 27 AI Village - Angelo Oliveira - Fighting Malware with Deep Learning.opus

23.9 MB

DEF CON 27 AI Village - Anna Skelton - Analyzing the Effects of Deepfakes on Market Manipulation.opus

28.6 MB

DEF CON 27 AI Village - Barton Rhodes - Securing your kubeflow clusters.opus

29.9 MB

DEF CON 27 AI Village - Bob Lord - Misinformation Keynote.opus

24.0 MB

DEF CON 27 AI Village - Dr Ethan Rudd - Loss Is More Improving Malware Detectors by Learning Additional Tasks.opus

38.0 MB

DEF CON 27 AI Village - Hyrum Anderson - Competitions in Infosec ML.opus

12.0 MB

DEF CON 27 AI Village - Jason Mancuso - Machine Learnings Privacy Problem.opus

37.9 MB

DEF CON 27 AI Village - Jesus Solano - Behavioral Biometrics and Context Analytics Risk Based Authentication Re-Imagined.opus

25.8 MB

DEF CON 27 AI Village - Jon Hawes - A buyers guide to the market promise of automagic AI-enabled detection and response.opus

41.1 MB

DEF CON 27 AI Village - Kenya Yoshimur - Clairvoyance concurrent lip-reading for the smart masses.opus

20.6 MB

DEF CON 27 AI Village - Lauren Putvin - Exploratory Data Analysis Why and How in Python.opus

28.1 MB

DEF CON 27 AI Village - Laurin Weissinger - Regulating AI and Algorithms Lessons from Safety and Security Certifications and Audits.opus

19.9 MB

DEF CON 27 AI Village - Rand Waltzman - Disinformation Its the Thought that Counts.opus

40.6 MB

DEF CON 27 AI Village - Richard Harang - A Tutorial on Hacking Facial Recognition Systems.opus

30.0 MB

DEF CON 27 AI Village - Roei Amit - How to Get over your malicious extensions using deep learning.opus

21.3 MB

DEF CON 27 AI Village - Ryan Kovar - Datasciencery by the Splunk Field.opus

27.4 MB

DEF CON 27 AI Village - Samantha Cole - Deep Fakes Panel.opus

49.1 MB

DEF CON 27 AI Village - Siwei Lyu - Seeing is deceiving The rise of AI-synthesized fake media.opus

33.1 MB

DEF CON 27 AI Village - Tal Leibovich - From Noisy Distorted data-sets to excellent prediction models.opus

40.1 MB

DEF CON 27 AI Village - Walter Scheirer - Backdooring Convolutional Neural Networks via Targeted Weight Perturbations.opus

21.4 MB

DEF CON 27 AI Village - X1.opus

9.2 MB

DEF CON 27 AI Village - Yisroel Mirsky - Automated Injection and Removal of Medical Evidence in CT and MRI Scans.opus

23.3 MB

DEF CON 27 Appsec Village - Anthony Kava - How bad could it be Inside Law Enforcement and Local gov AppSec.opus

33.9 MB

DEF CON 27 Appsec Village - Erez Yalon - Welcome and Introductions.opus

234.2 KB

DEF CON 27 Appsec Village - Guy Barnhart-Magen - Crypto Failures and how to avoid them.opus

34.0 MB

DEF CON 27 Appsec Village - Jillian Ratliff - Vulnerabilities that Hide from Your Tools.opus

25.7 MB

DEF CON 27 Appsec Village - Jim Manico - Keynote The Unabridged History of Application Security.opus

49.0 MB

DEF CON 27 Appsec Village - Joe Schottman - Purple Team Strategies for Application Security.opus

19.8 MB

DEF CON 27 Appsec Village - Rafael Santos - huskyCI Finding Security Flaws in CI Before Deploying Them.opus

23.3 MB

DEF CON 27 Appsec Village - YanYan Wang - Automate Pen-Testing in Dockerized CI CD Environment.opus

36.3 MB

DEF CON 27 Aviation Village - Art Manion - Ideas whose time has come CVD SBOM and SOTA.opus

26.0 MB

DEF CON 27 Aviation Village - Dr Will Roper - Hacking the airforce and beyond.opus

20.6 MB

DEF CON 27 Aviation Village - Exploding Lemur - In The Air And On The Air Aviation Radio Systems.opus

23.6 MB

DEF CON 27 Aviation Village - Harshad Sathaye - Wireless Attacks on Aircraft Instrument Landing Systems.opus

27.8 MB

DEF CON 27 Aviation Village - Karl Koscher - An Introduction to the ARINC standards.opus

19.3 MB

DEF CON 27 Aviation Village - Ken and Alex - A Hackers First Solo Airplane Avionics Security 101.opus

37.3 MB

DEF CON 27 Aviation Village - Panel - The Long Haul The State of Aviation Policy.opus

41.0 MB

DEF CON 27 Aviation Village - Patrick Kiley - CAN Bus in Aviation Investigating CAN Bus in Avionics.opus

9.6 MB

DEF CON 27 Aviation Village - Tarah Wheeler - Common Online Security Fails In Pilot Training.opus

21.1 MB

DEF CON 27 Aviation Village - Zoltan Madarassy - Behind the scenes of hacking airplanes.opus

29.7 MB

DEF CON 27 Bio Hacking Village - Alex Pearlman - DIY Medicine The Ethics of Hacking Pharma.opus

34.4 MB

DEF CON 27 Bio Hacking Village - Andrea Downing - A Previvors Story of Uncovering Massive Zero Day Vulnerability.opus

27.3 MB

DEF CON 27 Bio Hacking Village - Corey M Hudson - From Buffer Overflowing Genomics Tools to Securing Biomedical File Formats.opus

35.6 MB

DEF CON 27 Bio Hacking Village - Dr Avi Rubin - A Complete View of the Attack Surface of a Networked Medical Device.opus

34.4 MB

DEF CON 27 Bio Hacking Village - Dr Harish Manyam - Doctor Hacker Panel.opus

56.8 MB

DEF CON 27 Bio Hacking Village - Eric D Perakslis - Employ Cybersecurity Techniques Against the Threat of Medical Information.opus

24.4 MB

DEF CON 27 Bio Hacking Village - JC Vega - How to Level Up Experiential Learning through Gamification.opus

29.9 MB

DEF CON 27 Bio Hacking Village - JJ Hastings - The L33T Shall Inherit the Cosmos.opus

27.9 MB

DEF CON 27 Bio Hacking Village - Jay Lagario - Hacking Wetware with Open Source Software and Hardware.opus

43.7 MB

DEF CON 27 Bio Hacking Village - Jean Rintoul - Spectra Open Biomedical Imaging.opus

36.0 MB

DEF CON 27 Bio Hacking Village - Najla Lindsay - Forensic Science and Information Security Lifetime Lovers Part-time Friends.opus

32.1 MB

DEF CON 27 Bio Hacking Village - Nick Titus - Building a New Decentralized Internet With the Nodes Implanted in Our Bodies.opus

29.9 MB

DEF CON 27 Bio Hacking Village - Panel - Medical Simulations Panel.opus

43.0 MB

DEF CON 27 Bio Hacking Village - Rachel Smith - Liven Up Augmenting Materials for Bio-Hybrid Functionality.opus

28.6 MB

DEF CON 27 Bio Hacking Village - Steve Lewis - Cyberbiosecurity and the Full Stack Biotechnologist.opus

27.8 MB

DEF CON 27 Bio Hacking Village - Turtle Snap - Malware and Biology.opus

22.3 MB

DEF CON 27 Bio Hacking Village - Wayne Penn - Amputees and Prostetics Challenges.opus

61.3 MB

DEF CON 27 Block Chain Village - Mark Nesbitt - What Is Bitcoin.opus

19.4 MB

DEF CON 27 Block Chain Village - Brian Vohaska - Forcing a trustworthy notion of sequential time.opus

32.1 MB

DEF CON 27 Block Chain Village - Mark Nesbitt - Hacking Cryptocurrencies.opus

28.5 MB

DEF CON 27 Block Chain Village - Mila Paul - Alice and Bobs Big Secret.opus

27.6 MB

DEF CON 27 Block Chain Village - Panel - Privacy Enabler or Hindrance to the Success of Blockchain based currencies.opus

37.8 MB

DEF CON 27 Block Chain Village - Philip Martin - Responding to Firefox 0-days.opus

33.4 MB

DEF CON 27 Block Chain Village - Rod Soto - A Smart Contract Killchain How the first Blockchain APT was caught.opus

35.2 MB

DEF CON 27 Block Chain Village - Ron Stoner - The CryptoCurrency Security Standard CCSS.opus

45.5 MB

DEF CON 27 Blue Team Village - Carlos Garay - Memhunter Automated Hunting Of A Memory Resident Malware At Scale.opus

38.4 MB

DEF CON 27 Blue Team Village - Cathy Ullman - A Theme Of Fear Hacking The Paradigm.opus

35.0 MB

DEF CON 27 Blue Team Village - Christine Le - Blue Team Guide For Fresh Eyes.opus

18.2 MB

DEF CON 27 Blue Team Village - Georgios Kapoglis - Serverless Log Analysis On AWS.opus

25.8 MB

DEF CON 27 Blue Team Village - Lacie Fan - Killsuit How The Equation Group Remained Out Of Sight For Years.opus

24.1 MB

DEF CON 27 Blue Team Village - Lak Shmi Sudheer - Who Dis Who Dis The Right Way To Authenticate.opus

44.2 MB

DEF CON 27 Blue Team Village - Mark Orlando - When A Plan Comes Together Building a SOC A-Team.opus

15.2 MB

DEF CON 27 Blue Team Village - Norman Lundt - Extending Zeek For ICS Defense.opus

16.2 MB

DEF CON 27 Blue Team Village - Scoubi - BloodHound From Red to Blue 1 point 5.opus

34.7 MB

DEF CON 27 Blue Team Village - Shawn Thomas - An Introduction To Malware Analysis.opus

33.7 MB

DEF CON 27 Blue Team Village - Siyu Zhu - Evaded Microsoft ATA.opus

32.3 MB

DEF CON 27 Blue Team Village - ch33r10 - The Cyber Threat Intelligence Mindset.opus

21.5 MB

DEF CON 27 Blue Team Village - claushoumann - Security Strategy for Small-Medium Business.opus

38.7 MB

DEF CON 27 Blue Team Village - dumby - Anatomy Of A Megabreach Equifax Report.opus

39.0 MB

DEF CON 27 Car Hacking Village - Aaron Cornelius - Intro to UDS.opus

27.8 MB

DEF CON 27 Car Hacking Village - Elijah Roberts - Tell Me Lies Automotive LIDAR and Low-Tech Obfuscation.opus

23.7 MB

DEF CON 27 Car Hacking Village - Greg Hogan - Reverse Engineering and Flashing ECU Firmware Updates.opus

34.5 MB

DEF CON 27 Car Hacking Village - Ken Munro - Lojackd pwning car alarms vehicle trackers and immobilisers.opus

18.9 MB

DEF CON 27 Car Hacking Village - Lennert Wouters - Fast Furious and Insecure Passive Keyless Entry and Start Systems in Modern Supercars.opus

21.8 MB

DEF CON 27 Car Hacking Village - Neiko Rivera - Infotainment Hacking.opus

15.8 MB

DEF CON 27 Car Hacking Village - Rotem Bar - Hacking into Automotive Clouds.opus

34.7 MB

DEF CON 27 Car Hacking Village - Victor Murray - Legal Over-the-Air Spoofing of GNSS and its Effects on Autonomous Vehicles.opus

16.2 MB

DEF CON 27 Cloud Village - Ayman Elsawah - Using Paretos Primciple for Securing AWS with SCPs.opus

27.6 MB

DEF CON 27 Cloud Village - Chris Le Roy - Build to Hack Hack to Build.opus

26.4 MB

DEF CON 27 Cloud Village - Erick Galinkin - Your Blacklist is Dead Airgap Everything.opus

24.0 MB

DEF CON 27 Cloud Village - James Strassburg - Scaling Security in the Cloud with Open Source.opus

26.6 MB

DEF CON 27 Cloud Village - Jenko Hwong - Exploiting AWS loopholes with temporary credentials.opus

26.5 MB

DEF CON 27 Cloud Village - Rod Soto - Using Splunk or ELK for Auditing AWS GCP Azure Security Posture.opus

24.3 MB

DEF CON 27 Cloud Village - Rotem Bar - Hacking into Automative Clouds.opus

32.5 MB

DEF CON 27 Cloud Village - Setu Parimi - PacBot Policy as Code from T-Mobile OSS.opus

25.1 MB

DEF CON 27 Cloud Village - Tanya Janca - DYI Azure Security Assesment.opus

28.0 MB

DEF CON 27 Crypto and Privacy Village - Ben Brecht - MITM mixed mode butterfly key privacy attack.opus

32.7 MB

DEF CON 27 Crypto and Privacy Village - Cat Murdock - Black Mirror You are your own privacy nightmare.opus

49.7 MB

DEF CON 27 Crypto and Privacy Village - Cathie Yun - Implementing a Zero Knowledge Proof or How to Write Bulletproofs in Rust.opus

36.7 MB

DEF CON 27 Crypto and Privacy Village - Chris Hanlon - TLS decryption attacks and back-doors to secure systems.opus

29.4 MB

DEF CON 27 Crypto and Privacy Village - Christian Paquin - Migrating to quantum-safe cryptography to protect against quantum hackers.opus

23.5 MB

DEF CON 27 Crypto and Privacy Village - Ethan Gregory Dodge - Scrubber An open source compilation to protect journalistic sources.opus

18.1 MB

DEF CON 27 Crypto and Privacy Village - Harlo Holmes - Tiplines Today.opus

51.8 MB

DEF CON 27 Crypto and Privacy Village - Karl Koscher - Enabling HTTPS for home network devices using Lets Encrypt.opus

17.2 MB

DEF CON 27 Crypto and Privacy Village - Kate Rose - Adversarial Fashion Sartorial Hacking to Combat Surveillance.opus

44.0 MB

DEF CON 27 Crypto and Privacy Village - Katelyn Bowden - Fighting non consensual pornography the BADASS way.opus

44.9 MB

DEF CON 27 Crypto and Privacy Village - Mark B Cooper - How PKI and SHAKEN STIR Will Fix the Global Robocall Problem.opus

57.3 MB

DEF CON 27 Crypto and Privacy Village - Mike Kiser - I am Spartacus And You Can Be Too Ensuring Privacy through Obfuscation.opus

40.8 MB

DEF CON 27 Crypto and Privacy Village - Riana Pfefferkorn - Giving Cops the Finger Compelled Device Decryption and 5th Amendment.opus

24.0 MB

DEF CON 27 Crypto and Privacy Village - Sarah McCarthy - Stop right now Quantum-Safe Instantaneous Vehicle to Vehicle communication.opus

14.2 MB

DEF CON 27 Crypto and Privacy Village - Steve Thomas - Easy PAKE Oven.opus

40.1 MB

DEF CON 27 Crypto and Privacy Village - Suchismita Pahi - How to Effectively Integrate Your Privacy Legal and Security Teams.opus

42.8 MB

DEF CON 27 Crypto and Privacy Village - Tiffany Li - Stop Facebook From Buying Your Brain Facial Recognition DNA and Biometric Privacy.opus

24.0 MB

DEF CON 27 Crypto and Privacy Village - Tyler Kell - Towards Usable Dining Cryptographer Networks with Howl.opus

15.3 MB

DEF CON 27 Crypto and Privacy Village - Vitor Ventura - Snoop all Telegram messages.opus

24.0 MB

DEF CON 27 DroneWars Village - Ryan Schonfeld - SWARM.opus

26.5 MB

DEF CON 27 Ethics Village - Anthony Ferrante - Coffee Talk.opus

39.3 MB

DEF CON 27 Ethics Village - Dr Suzanne Schwartz FDA - Coffee Talk.opus

44.5 MB

DEF CON 27 Ethics Village - Jake Williams - Ethical Issues in Cyber Attribution.opus

93.5 MB

DEF CON 27 Ethics Village - Kyle Wiens - Void If Removed Securing Our Right to Repair.opus

98.3 MB

DEF CON 27 Ethics Village - Liz OSullivan - Is It Ethical to Work On Autonomous Weapon Systems.opus

89.8 MB

DEF CON 27 Ethics Village - Panel - Law Professor Round Robin.opus

43.2 MB

DEF CON 27 Ethics Village - Renderman - Rant on Disclosure.opus

100.2 MB

DEF CON 27 Ethics Village - Tom Kopchak - Teaching Consulting Pentesting and Ethics.opus

89.8 MB

DEF CON 27 Ethics Village - Wendy Edwards - Who is Tracking Your Body Health Apps and Your Privacy.opus

45.0 MB

DEF CON 27 Hack the Sea Village - Andrew Tierney - Pwning a mobile drilling rig Hacking an oil rig.opus

23.4 MB

DEF CON 27 Hack the Sea Village - Brian Satira - Opening Remarks.opus

5.2 MB

DEF CON 27 Hack the Sea Village - Cris DeWitt - Maritime Cyber Policy Panel.opus

38.3 MB

DEF CON 27 Hack the Sea Village - David Belasco - Finding Flaws in a Satcom Terminal.opus

20.3 MB

DEF CON 27 Hack the Sea Village - Josh Steinman - National Security Council and Special Assitant for Cyber.opus

14.8 MB

DEF CON 27 Hack the Sea Village - Julian Blanco - C2 over Maritime AIS and commercial aggregation websites.opus

14.1 MB

DEF CON 27 Hack the Sea Village - Stephan Gerling - Yacht Hacking from SatCOM to engine control.opus

46.3 MB

DEF CON 27 Hack the Sea Village - Weston Hecker - PENTESTING How to Get into the Field Explained.opus

21.9 MB

DEF CON 27 Ham Radio Village - Jason - The RF Dark Arts.opus

23.8 MB

DEF CON 27 Ham Radio Village - Mark KR6ZY - Hunting tape measure yagis and offset attenuators.opus

13.5 MB

DEF CON 27 Hardware Hacking Village - Allison Marie Naaktgeboren - Reversing Corruption in Seagate HDD Translators.opus

33.8 MB

DEF CON 27 Hardware Hacking Village - Benjamin Lafois - Another Car Hacking Approach.opus

38.7 MB

DEF CON 27 Hardware Hacking Village - Wang Kang - Infrared New Threats Meet Old Devices.opus

17.6 MB

DEF CON 27 ICS Village - Austin Scott - Purple Teaming ICS Networks.opus

23.4 MB

DEF CON 27 ICS Village - Bryson Bort - ICS IOT Threat Landscape.opus

19.7 MB

DEF CON 27 ICS Village - Chris Kubecka - Hack the World and Galaxy with OSINT.opus

27.2 MB

DEF CON 27 ICS Village - Daniel dos Santos - Abusing the IoT in Smart Buildings.opus

22.1 MB

DEF CON 27 ICS Village - Douglas McKee - HVACking Understand the difference Between Security and Reality.opus

24.6 MB

DEF CON 27 ICS Village - Jack Oden - IT OT Convergence Are We There Yet.opus

20.0 MB

DEF CON 27 ICS Village - Joe Slowik - CRASHOVERRIDE Re-Assessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack.opus

26.5 MB

DEF CON 27 ICS Village - Joseph Bingham - SCADA What the next Stuxnet will look like and how to prevent it.opus

20.9 MB

DEF CON 27 ICS Village - Monta Elkins - Nation State Supply Chain Attacks for Dummies or Chipping Cisco Firewalls.opus

23.7 MB

DEF CON 27 ICS Village - Ryan Leirvik - Pin the tail on the cyber owner.opus

18.0 MB

DEF CON 27 ICS Village - Sharon Brizinov - Changium IPiosa most magical change IP packets in the wild.opus

20.8 MB

DEF CON 27 IoT Village - Alex Jay Balan - Next-gen IoT Botnets 3 moar ownage.opus

34.1 MB

DEF CON 27 IoT Village - Amit Elazari - Regulatory Trends in IoT Security and impact on the research community.opus

32.0 MB

DEF CON 27 IoT Village - BITFI You Wouldnt Steal My Cloins.opus

24.6 MB

DEF CON 27 IoT Village - Bertin Bervis - Mixing industrial protocols with web application security flaws in order to exploit OT devices.opus

29.8 MB

DEF CON 27 IoT Village - Daniel Wegemer - Fitbit Firmware Hacking - The Current State of the Heart.opus

36.4 MB

DEF CON 27 IoT Village - Dennis Giese - Privacy leaks in smart devices Extracting data from used smart home devices.opus

38.3 MB

DEF CON 27 IoT Village - Elvis Collado - Greenwaves and Ham.opus

32.6 MB

DEF CON 27 IoT Village - Hyejin Jeong - HACK DMI PWNING HDMI FOR FUN AND PROFIT.opus

28.7 MB

DEF CON 27 IoT Village - Lee Brotherston - A Glorious Celebration of IoT Security.opus

23.2 MB

DEF CON 27 IoT Village - M Can Kurnaz - Get your next roadtrip for free Long live the vulnerable EV charging points.opus

13.1 MB

DEF CON 27 IoT Village - Maxwell Dulin - Hacking the Zyxel NAS 326 from the Perspective of a n00b.opus

23.5 MB

DEF CON 27 IoT Village - Michael Raggo - Spy versus Spy who is watching who.opus

22.7 MB

DEF CON 27 IoT Village - Panel - IoT Security and Manufacturers Q and A Panel.opus

41.6 MB

DEF CON 27 IoT Village - Rick Ramgattie - SOHOpelessly Broken 2 point 0.opus

37.2 MB

DEF CON 27 Monero Village - AJ Santos - Houston we have a problem 86R HB 4371 is a no-go.opus

24.7 MB

DEF CON 27 Monero Village - Allan Stevo - AirBNB for Retail Internet A Distrubuted Internet Technology with Monero.opus

28.2 MB

DEF CON 27 Monero Village - Allan Stevo - InfoSec vs Hacker The War for the Soul of a Technology.opus

18.2 MB

DEF CON 27 Monero Village - Amir Montazery - The Cost of Good Open Source Software.opus

25.3 MB

DEF CON 27 Monero Village - Cathie Yun - Bulletproofs - deep dive.opus

38.1 MB

DEF CON 27 Monero Village - Daniel Kim - Keynote Speech Monero Introduction and Investor Perspective.opus

67.4 MB

DEF CON 27 Monero Village - Diego - Monero is UGLY and DIFFICULT to use.opus

29.4 MB

DEF CON 27 Monero Village - Dr Jeremy Gillula - Encrypting the Web Isnt Enough How EFF Plans to Encrypt the Entire Internet.opus

54.8 MB

DEF CON 27 Monero Village - Francisco Cabanas - The Critical Role of the Minimum Block Reward Trail Emission in Monero.opus

22.5 MB

DEF CON 27 Monero Village - Gus Clarke - Tale of Two Tongues Examining Two Mimblewimble Protocols and More.opus

19.0 MB

DEF CON 27 Monero Village - Justin Ehrenhofer - Improving Monero Release Schedule.opus

29.0 MB

DEF CON 27 Monero Village - Kristy-Leigh Minehan - The Future of Accessible Mining.opus

22.1 MB

DEF CON 27 Monero Village - Reuben Yap - Handling Broken cryptography and building a new one.opus

21.9 MB

DEF CON 27 Monero Village - Robin Renwick - Perspective of Privacy Blockchain as a Boundary Object.opus

16.7 MB

DEF CON 27 Monero Village - Sarang Noether PhD - If You Like It Then You Should Have Put a Ring Signature On It.opus

30.5 MB

DEF CON 27 Monero Village - Vik Sharma - Creating cake from Scratch.opus

10.6 MB

DEF CON 27 Packet Hacking Village - Adam - Security to Make the CFO Happy.opus

16.7 MB

DEF CON 27 Packet Hacking Village - Besim Altinok - Wi-Fi Threat Modeling and Monitoring.opus

35.8 MB

DEF CON 27 Packet Hacking Village - Cesare Pizzi - Sandbox Creative Usage For Fun and Pro Blems.opus

19.1 MB

DEF CON 27 Packet Hacking Village - Cheryl Biswas - Patching It is Complicated.opus

30.8 MB

DEF CON 27 Packet Hacking Village - D9 - Hacking Corporate Org Socialization One Day You Are Out and the Next Day You Pwn the Org.opus

42.6 MB

DEF CON 27 Packet Hacking Village - Emilio Couto - CIRCO Cisco Implant Raspberry Controlled Operations.opus

42.4 MB

DEF CON 27 Packet Hacking Village - Gleb Esman - Solving Crimes with Wireless GeoFencing and Multi-Zone Correlation Analytics.opus

44.0 MB

DEF CON 27 Packet Hacking Village - Jay Beale - Attacking and Defending Kubernetes.opus

48.9 MB

DEF CON 27 Packet Hacking Village - Jay Dimartino - The Art of Detection.opus

38.8 MB

DEF CON 27 Packet Hacking Village - Jeff Man - Rethinking Security Given the Spectre of a Meltdown.opus

49.0 MB

DEF CON 27 Packet Hacking Village - Joseph Muniz - Old Tech vs New Adversaries Round 1.opus

29.0 MB

DEF CON 27 Packet Hacking Village - Matt Nash - Head in the Clouds.opus

31.2 MB

DEF CON 27 Packet Hacking Village - Mike Raggo - StegoAugmented Malware.opus

34.8 MB

DEF CON 27 Packet Hacking Village - Russell Butturini - Phishing Freakonomics.opus

49.9 MB

DEF CON 27 Packet Hacking Village - Sam Erb - Hunting Certificates and Servers.opus

15.5 MB

DEF CON 27 Packet Hacking Village - Tom Kopchak - Lessons Learned from Running a National Penetration Testing Competition.opus

54.2 MB

DEF CON 27 Packet Hacking Village - Travis Palmer - First-Try DNS Cache Poisoning with IPv4 and IPv6 Fragmentation.opus

41.4 MB

DEF CON 27 Packet Hacking Village - Utku Sen - Generating Personalized Wordlists With NLP by Analyzing Tweets.opus

20.8 MB

DEF CON 27 Packet Hacking Village - Winnona DeSombre - Bestsellers in the Underground Economy Measuring Malware Popularity by Forum.opus

23.6 MB

DEF CON 27 Recon Village - Adrian Korn - The OSINT space is Growing Are we Ready.opus

24.2 MB

DEF CON 27 Recon Village - Alina Dorina - Using Cloud Services for Dial-In Reconnaissance Automation.opus

18.5 MB

DEF CON 27 Recon Village - Anthony Rose - Hack to Basics Adapting Exploit Frameworks to Evade Microsoft ATP.opus

26.4 MB

DEF CON 27 Recon Village - Bug Crowd - Lets get technical and hunt harder.opus

23.6 MB

DEF CON 27 Recon Village - Jaime Sanchez - Derevolutionizing OS Fingerprinting the cat and mouse game.opus

28.2 MB

DEF CON 27 Recon Village - Jeff Foley - Advanced Recon with OWASP Amass.opus

22.2 MB

DEF CON 27 Recon Village - Joe Gray -DECEPTICON OPSEC to Slow the OSINT.opus

33.1 MB

DEF CON 27 Recon Village - Kala Kinyon - Use Responsibly Recon Like an insider threat for Best User Training ROI.opus

19.1 MB

DEF CON 27 Recon Village - Martin Vigo - From email address to phone number.opus

20.8 MB

DEF CON 27 Recon Village - Master Chen - A URL Shortened By Any Other Name.opus

20.5 MB

DEF CON 27 Recon Village - Mitchell Parker - Building an OSINT and Recon Program to address Healthcare Information Security.opus

30.4 MB

DEF CON 27 Recon Village - Richard Gold - Asset Discovery Making Sense of the Ocean of OSINT.opus

32.5 MB

DEF CON 27 Recon Village - Robert Sell - Hack the Planet Hackers Influencing Positive Change.opus

25.9 MB

DEF CON 27 Recon Village - Seyfullah KILIÇ - OSINT Approach in Big-Data.opus

21.8 MB

DEF CON 27 Recon Village - Susan - Social Media The New Court of Public opinion.opus

18.7 MB

DEF CON 27 Recon Village - Utku Sen - Generating Personalized Wordlists by Analyzing Targets Tweets.opus

16.5 MB

DEF CON 27 Recon Village - Wicked Clown - Finding the needle in the twitter haystack.opus

10.9 MB

DEF CON 27 Recon Village - William Suthers - PIE - A hardware based Prebellico Intelligence Exfiltration Botnet.opus

39.3 MB

DEF CON 27 Red Team Offensive Village - Adrian Sanabria - Red Team Framework RTF.opus

58.0 MB

DEF CON 27 Red Team Offensive Village - Alvaro Folgado - SiestaTime A Red Team Automation Tool for Long-term Implants.opus

24.9 MB

DEF CON 27 Red Team Offensive Village - Casey Erdmann - BadSalt Adversarial DevOps.opus

34.0 MB

DEF CON 27 Red Team Offensive Village - Charles Herring - Breaking NBAD and UEBA Detection.opus

28.5 MB

DEF CON 27 Red Team Offensive Village - Chris McCoy - Through the Looking Glass Own the Data Center.opus

30.8 MB

DEF CON 27 Red Team Offensive Village - Nathan Sweaney - Casting with the Pros Tips and Tricks for Effective Phishing.opus

31.9 MB

DEF CON 27 Social Engineering Village - Andrew Nicholson - Hacking Hollywood.opus

25.8 MB

DEF CON 27 Social Engineering Village - Billy Boatright - Swing Away How to Conquer Impostor Syndrome.opus

20.8 MB

DEF CON 27 Social Engineering Village - Chris Hadnagy - SEVillage 10 Year Anniversary a Look Back at what has changed.opus

43.0 MB

DEF CON 27 Social Engineering Village - Chris Kirsch - Getting Psychic Cold Reading Techniques for Fortune Tellers and Social Engineers.opus

28.6 MB

DEF CON 27 Social Engineering Village - Chris Pritchard - Basics of Social Engineering aKa How I break into Casinos Airports and CNI.opus

21.9 MB

DEF CON 27 Social Engineering Village - Daniel Isler - The Voice Told Me To Do It.opus

22.8 MB

DEF CON 27 Social Engineering Village - Edward Miro - Rideshare OSINT Car Based SE For Fun and Profit.opus

24.9 MB

DEF CON 27 Social Engineering Village - Jayson Street - I PWN thee I PWN thee not.opus

45.3 MB

DEF CON 27 Social Engineering Village - Marcus Liotta - Leveraging the Insider Threat oh and how to be Awesome.opus

25.6 MB

DEF CON 27 Social Engineering Village - Micah Zenko - Red Teaming Insights and Examples from Beyond the Infosec Community.opus

24.8 MB

DEF CON 27 Social Engineering Village - Perry Carpenter - The Aspies Guide to Social Engineering Your Way Through Life.opus

28.7 MB

DEF CON 27 Social Engineering Village - Rebecca Long - Hacking Your Career Through Social Engineering.opus

25.0 MB

DEF CON 27 Social Engineering Village - Robin Dreeke - Sizing People Up.opus

50.0 MB

DEF CON 27 Social Engineering Village - Robin Dreeke - The SEPodcast Episode 120 Live Guest Robin Dreeke.opus

61.6 MB

DEF CON 27 Social Engineering Village - Ryan MacDougall - OSINT in the Real World.opus

25.0 MB

DEF CON 27 Social Engineering Village - Shane McCombs - Why vigilantism doesnt work.opus

25.1 MB

DEF CON 27 Social Engineering Village - Wayne Ronaldson - RED TEAMING FROM DOWN UNDER.opus

27.1 MB

DEF CON 27 Social Engineering Village -R Paul Wilson - R Paul Wilson.opus

27.7 MB

DEF CON 27 Voting Village - Alex Stanev - Machine Voting The Bulgarian Experience.opus

23.7 MB

DEF CON 27 Voting Village - Amber McReynolds - Putting Voters First Expanding Options to Vote.opus

17.9 MB

DEF CON 27 Voting Village - Brian Varner - Beyond the Voting Machine Other High Value Targets in Todays Election System.opus

18.7 MB

DEF CON 27 Voting Village - Chris Krebs - Chris Krebs.opus

11.5 MB

DEF CON 27 Voting Village - Dr Linton Salmon - The DARPA SSITH Program at DEFCON.opus

25.3 MB

DEF CON 27 Voting Village - Dr Philip Stark - Trustworthy Elections Evidence and Dispute Resolution.opus

23.1 MB

DEF CON 27 Voting Village - Eric Geller - State and Local Preparations on Election Security in the Aftermath of the Mueller Report.opus

46.5 MB

DEF CON 27 Voting Village - Evanna Hu - While the Bots Distracted You Overt Russian Information Operations.opus

24.1 MB

DEF CON 27 Voting Village - Ion Sancho - The Multiple Factors Preventing Fair Effective and Secure Elections in America.opus

26.5 MB

DEF CON 27 Voting Village - Jack Cable - Bootstrapping Vulnerability Disclosure For Election Systems.opus

22.3 MB

DEF CON 27 Voting Village - Jake Braun - Lessons Learned DEF CON Voting.opus

28.7 MB

DEF CON 27 Voting Village - Jason Hill - Asssessing Election Infrastructure.opus

21.5 MB

DEF CON 27 Voting Village - John Odum - Addressing the Election Security Threats Posed by Very Small Jurisdictions.opus

23.2 MB

DEF CON 27 Voting Village - Joseph Marks - Panel.opus

77.4 MB

DEF CON 27 Voting Village - Kartikeya Kandula - Unclear Ballot Automated Ballot Image Manipulation.opus

22.2 MB

DEF CON 27 Voting Village - Kate Trimble - Ideas Whose Time Has Come CVD SBOM and SOTA.opus

24.9 MB

DEF CON 27 Voting Village - Kevin Collier - What Role Can Journalists Play in Securing Elections.opus

41.9 MB

DEF CON 27 Voting Village - Kimberly Young-McLear - Organizational Cybernetics A Key to Resilience for the Digital Village.opus

21.4 MB

DEF CON 27 Voting Village - Marian Schneider - If the Voting Systems are Insecure Lets just Vote on Our Phones.opus

17.1 MB

DEF CON 27 Voting Village - Rahul Patel - Incident Lifecycle and Incident Response Management Planning.opus

21.7 MB

DEF CON 27 Voting Village - Ron Wyden - Keynote Remarks Senator Ron Wyden.opus

25.8 MB

DEF CON 27 Voting Village - Sherri Ramsay - 2020 Ready or Not.opus

30.4 MB

DEF CON 27 Voting Village - Tod Beardsley - Securing Voting Systems Beyond Paper Ballots.opus

22.3 MB

DEF CON 27 Wireless Village - Alex Zakhorov - Antennas for Surveillance.opus

20.0 MB

DEF CON 27 Wireless Village - Andres Blanco - Love is in the Air.opus

22.2 MB

DEF CON 27 Wireless Village - Babak Javadi - Basics of Hacking Physical Access Control Systems and Beyond.opus

54.7 MB

DEF CON 27 Wireless Village - Besim ALTINOK - edu-driving.opus

25.3 MB

DEF CON 27 Wireless Village - Eric Johnson - Wi-Fi 6 Deep Dive.opus

57.6 MB

DEF CON 27 Wireless Village - Eric Reuter - Reversing Wireless model railroad control system.opus

16.4 MB

DEF CON 27 Wireless Village - Guillemo Pilleux - Hacking Wi-Fi.opus

43.3 MB

DEF CON 27 Wireless Village - Hak5Crew - Introducing new Hak5 gear.opus

37.5 MB

DEF CON 27 Wireless Village - Lennart Koopmann - nzyme - A New WiFi Defense System.opus

31.1 MB

DEF CON 27 Wireless Village - Nishant Sharma - Developing Wifi Access Point.opus

35.4 MB

DEF CON 27 Wireless Village - Ted - Are you interested in Kismet.opus

13.1 MB

DEF CON 27 Wireless Village - Woody - The Ford Hack Raptor Captor.opus

47.9 MB

DEF CON 27 Wireless Village - m1n1 - Hunting Mobile Rogue Access Points with Wireless Mesh Implants.opus

36.2 MB

DEF CON 27 Wireless Village - s0lst1c3 - War Never Changes Attacks Against WPA3s Enhanced Open.opus

35.4 MB

DEF CON 27 Wireless Village - the Ricks - WCTF Gear Talk.opus

107.0 MB

/DEF CON 27 badge/

DEFCON-27-Joe-Grand-Badge.pdf

33.1 MB

/Development Environment/

MCUXpressoIDE_10.2.1_795.exe

713.9 MB

SDK_2.4.1_FRDM-KL27Z.zip

31.3 MB

/Firmware/

.cproject

78.4 KB

.project

0.9 KB

dc27_badge LinkServer Debug.launch

13.9 KB

dc27_badge LinkServer Release.launch

11.4 KB

dc27_badge.mex

38.6 KB

/Firmware/.settings/

language.settings.xml

1.3 KB

org.eclipse.cdt.codan.core.prefs

11.3 KB

/Firmware/CMSIS/

MKL27Z644.h

361.2 KB

MKL27Z644_features.h

93.0 KB

arm_common_tables.h

6.2 KB

arm_const_structs.h

3.0 KB

arm_math.h

253.5 KB

cmsis_armcc.h

28.4 KB

cmsis_armclang.h

56.9 KB

cmsis_compiler.h

9.0 KB

cmsis_gcc.h

62.6 KB

cmsis_iccarm.h

27.6 KB

cmsis_version.h

1.7 KB

core_armv8mbl.h

97.1 KB

core_armv8mml.h

171.1 KB

core_cm0plus.h

46.9 KB

fsl_device_registers.h

2.8 KB

mpu_armv7.h

7.5 KB

mpu_armv8.h

11.0 KB

system_MKL27Z644.c

7.7 KB

system_MKL27Z644.h

8.1 KB

/Firmware/Debug/

.DS_Store

6.1 KB

dc27_badge.axf

649.2 KB

dc27_badge.hex

137.8 KB

dc27_badge.map

268.6 KB

dc27_badge_Debug.ld

5.3 KB

dc27_badge_Debug_library.ld

0.4 KB

dc27_badge_Debug_memory.ld

1.3 KB

makefile

1.7 KB

objects.mk

0.2 KB

sources.mk

0.5 KB

/Firmware/Debug/CMSIS/

subdir.mk

1.2 KB

system_MKL27Z644.d

0.5 KB

system_MKL27Z644.o

284.2 KB

/Firmware/Debug/board/

board.d

0.1 KB

board.o

31.6 KB

clock_config.d

0.7 KB

clock_config.o

296.3 KB

peripherals.d

1.1 KB

peripherals.o

312.4 KB

pin_mux.d

0.8 KB

pin_mux.o

308.1 KB

subdir.mk

1.4 KB

/Firmware/Debug/drivers/

fsl_clock.d

0.6 KB

fsl_clock.o

311.5 KB

fsl_common.d

0.6 KB

fsl_common.o

289.9 KB

fsl_cop.d

0.7 KB

fsl_cop.o

292.8 KB

fsl_crc.d

0.7 KB

fsl_crc.o

297.7 KB

fsl_flexio.d

0.7 KB

fsl_flexio.o

313.7 KB

fsl_ftfx_cache.d

1.0 KB

fsl_ftfx_cache.o

306.0 KB

fsl_ftfx_controller.d

0.9 KB

fsl_ftfx_controller.o

331.5 KB

fsl_ftfx_flash.d

1.0 KB

fsl_ftfx_flash.o

331.6 KB

fsl_ftfx_flexnvm.d

1.0 KB

fsl_ftfx_flexnvm.o

295.6 KB

fsl_gpio.d

0.7 KB

fsl_gpio.o

300.1 KB

fsl_i2c.d

0.7 KB

fsl_i2c.o

350.6 KB

fsl_lptmr.d

0.7 KB

fsl_lptmr.o

294.8 KB

fsl_lpuart.d

0.7 KB

fsl_lpuart.o

337.0 KB

fsl_pit.d

0.7 KB

fsl_pit.o

293.2 KB

fsl_smc.d

1.1 KB

fsl_smc.o

310.0 KB

fsl_tpm.d

0.7 KB

fsl_tpm.o

311.0 KB

fsl_uart.d

0.7 KB

fsl_uart.o

335.3 KB

subdir.mk

2.4 KB

/Firmware/Debug/source/

dc27_badge.d

2.0 KB

dc27_badge.o

458.6 KB

mtb.d

0.0 KB

mtb.o

22.3 KB

semihost_hardfault.d

0.1 KB

semihost_hardfault.o

20.4 KB

subdir.mk

1.4 KB

/Firmware/Debug/startup/

startup_mkl27z644.d

0.1 KB

startup_mkl27z644.o

33.6 KB

subdir.mk

1.2 KB

/Firmware/Debug/utilities/

fsl_assert.d

0.8 KB

fsl_assert.o

289.2 KB

fsl_debug_console.d

1.0 KB

fsl_debug_console.o

296.6 KB

fsl_io.d

0.9 KB

fsl_io.o

303.2 KB

fsl_log.d

0.9 KB

fsl_log.o

295.8 KB

fsl_notifier.d

0.8 KB

fsl_notifier.o

294.4 KB

fsl_str.d

0.8 KB

fsl_str.o

311.4 KB

subdir.mk

1.6 KB

/Firmware/board/

board.c

2.0 KB

board.h

2.1 KB

clock_config.c

6.9 KB

clock_config.h

2.7 KB

peripherals.c

12.8 KB

peripherals.h

4.7 KB

pin_mux.c

15.5 KB

pin_mux.h

18.6 KB

/Firmware/drivers/

fsl_clock.c

12.2 KB

fsl_clock.h

27.1 KB

fsl_common.c

6.5 KB

fsl_common.h

26.7 KB

fsl_cop.c

3.7 KB

fsl_cop.h

6.9 KB

fsl_crc.c

11.6 KB

fsl_crc.h

7.3 KB

fsl_flash.h

2.5 KB

fsl_flexio.c

11.1 KB

fsl_flexio.h

31.9 KB

fsl_ftfx_adapter.h

20.1 KB

fsl_ftfx_cache.c

22.2 KB

fsl_ftfx_cache.h

5.5 KB

fsl_ftfx_controller.c

49.5 KB

fsl_ftfx_controller.h

39.0 KB

fsl_ftfx_features.h

4.2 KB

fsl_ftfx_flash.c

49.1 KB

fsl_ftfx_flash.h

29.7 KB

fsl_ftfx_flexnvm.c

15.1 KB

fsl_ftfx_flexnvm.h

28.3 KB

fsl_ftfx_utilities.h

3.8 KB

fsl_gpio.c

8.8 KB

fsl_gpio.h

19.9 KB

fsl_i2c.c

61.0 KB

fsl_i2c.h

34.6 KB

fsl_lptmr.c

6.2 KB

fsl_lptmr.h

13.8 KB

fsl_lpuart.c

61.7 KB

fsl_lpuart.h

37.7 KB

fsl_pit.c

5.0 KB

fsl_pit.h

11.3 KB

fsl_port.h

19.8 KB

fsl_smc.c

13.5 KB

fsl_smc.h

17.5 KB

fsl_tpm.c

29.1 KB

fsl_tpm.h

26.2 KB

fsl_uart.c

45.4 KB

fsl_uart.h

33.6 KB

/Firmware/source/

LPBroadcast_NXH_DC27.eep.h

130.4 KB

dc27_badge.c

95.1 KB

mtb.c

3.3 KB

semihost_hardfault.c

5.3 KB

/Firmware/startup/

startup_mkl27z644.c

21.1 KB

/Firmware/utilities/

fsl_assert.c

2.5 KB

fsl_debug_console.c

11.2 KB

fsl_debug_console.h

7.8 KB

fsl_debug_console_conf.h

7.3 KB

fsl_io.c

27.9 KB

fsl_io.h

4.3 KB

fsl_log.c

18.0 KB

fsl_log.h

4.7 KB

fsl_notifier.c

8.6 KB

fsl_notifier.h

13.2 KB

fsl_str.c

44.1 KB

fsl_str.h

3.4 KB

/Hardware/

dc27_bdg_assembly.pdf

225.9 KB

dc27_bdg_block_diagram.pdf

34.4 KB

dc27_bdg_bom.pdf

90.0 KB

dc27_bdg_schematic.pdf

344.6 KB

/Test Procedure/

dc27_bdg_test_procedure.pdf

1.1 MB

dc27_program.cmd

1.0 KB

/DEF CON 27 ctf/

OOO DEF CON Quals 2019 leaderboard.htm

79.2 KB

OOO DEF CON Quals 2019 rules.htm

6.2 KB

OOO DEF CON Quals 2019 scoreboard.htm

287.5 KB

OOO DEF CON Quals 2019 solves.htm

965.3 KB

OOO DEF CON Quals 2019.htm

17.6 KB

/.../OOO DEF CON Quals 2019 leaderboard_files/

lcars.css

24.4 KB

main.css

4.6 KB

main.js

327.6 KB

/.../OOO DEF CON Quals 2019 rules_files/

lcars.css

24.4 KB

main.css

4.6 KB

main.js

327.6 KB

/.../OOO DEF CON Quals 2019 scoreboard_files/

lcars.css

24.4 KB

main.css

4.6 KB

main.js

327.6 KB

/.../OOO DEF CON Quals 2019 solves_files/

lcars.css

24.4 KB

main.css

4.6 KB

main.js

327.6 KB

/.../OOO DEF CON Quals 2019_files/

lcars.css

24.4 KB

main.css

4.6 KB

main.js

327.6 KB

/DEF CON 27 music/

DC27 Master Playlist.txt

1.1 KB

DEF CON 27 Music Flyer.jpg

638.7 KB

DEF CON 27 OST README.txt

1.7 KB

DEF CON 27 Original Soundtrack - Back.png

702.2 KB

DEF CON 27 Original Soundtrack - Front.jpg

1.7 MB

DEF CON 27 Original Soundtrack - Tracklist.txt

0.7 KB

/.../DEF CON 27 OST - AAC VBR 224k/

01 - Skittish & Bus - The Future.m4a

7.8 MB

02 - Language Arts - Luckiness (Kilmanjaro Remix).m4a

7.3 MB

03 - Amplitude Problem & YTCracker - Enter My World (Max James Remix).m4a

8.2 MB

04 - Archwisp - Kids Wanna Get High.m4a

7.0 MB

05 - Xorcist - Calling Occupants.m4a

12.4 MB

06 - The TroubleShooters - March From War.m4a

8.7 MB

07 - Ascendant - Outlets of The Sky.m4a

15.5 MB

08 - Left-Right - Guide.m4a

9.5 MB

09 - Mikal kHill - TimeCrunch (featuring Dual Core, Keyza Soulsay, Mega Ran).m4a

6.7 MB

10 - Ninjula - Fire (Data Trashing Remix).m4a

8.6 MB

11 - Steven Comeau - Flesh (v3).m4a

12.3 MB

12 - Pronobozo - The Underground.m4a

8.6 MB

13 - Terrestrial Access Network - Fax To Mars.m4a

8.3 MB

14 - Vesica - Communication.m4a

10.3 MB

15 - Dustin Haze - Antichamber.m4a

7.0 MB

16 - Clockwork Echo - Prophetik.m4a

9.1 MB

17 - Gaddy & Rhizomorphic - Belladonna.m4a

7.2 MB

DEF CON 27 OST README.txt

1.7 KB

back.png

702.2 KB

front.jpg

1.7 MB

tracklist.txt

0.7 KB

/.../DEF CON 27 OST - FLAC/

01 - Skittish & Bus - The Future.flac

28.2 MB

02 - Language Arts - Luckiness (Kilmanjaro Remix).flac

24.2 MB

03 - Amplitude Problem & YTCracker - Enter My World (Max James Remix).flac

27.2 MB

04 - Archwisp - Kids Wanna Get High.flac

27.4 MB

05 - Xorcist - Calling Occupants.flac

38.0 MB

06 - The TroubleShooters - March From War.flac

27.5 MB

07 - Ascendant - Outlets of The Sky.flac

53.9 MB

08 - Left-Right - Guide.flac

30.7 MB

09 - Mikal kHill - TimeCrunch (featuring Dual Core, Keyza Soulsay, Mega Ran).flac

21.5 MB

10 - Ninjula - Fire (Data Trashing Remix).flac

30.9 MB

11 - Steven Comeau - Flesh (v3).flac

51.9 MB

12 - Pronobozo - The Underground.flac

32.2 MB

13 - Terrestrial Access Network - Fax To Mars.flac

28.6 MB

14 - Vesica - Communication.flac

35.2 MB

15 - Dustin Haze - Antichamber.flac

22.5 MB

16 - Clockwork Echo - Prophetik.flac

39.2 MB

17 - Gaddy & Rhizomorphic - Belladonna.flac

22.2 MB

DEF CON 27 OST README.txt

1.7 KB

back.png

702.2 KB

front.jpg

1.7 MB

/.../DEF CON 27 OST - Opus VBR 384k/

01 - Skittish & Bus - The Future.opus

13.7 MB

02 - Language Arts - Luckiness (Kilmanjaro Remix).opus

14.3 MB

03 - Amplitude Problem & YTCracker - Enter My World (Max James Remix).opus

11.1 MB

04 - Archwisp - Kids Wanna Get High.opus

14.0 MB

05 - Xorcist - Calling Occupants.opus

18.0 MB

06 - The TroubleShooters - March From War.opus

12.5 MB

07 - Ascendant - Outlets of The Sky.opus

25.5 MB

08 - Left-Right - Guide.opus

14.0 MB

09 - Mikal kHill - TimeCrunch (featuring Dual Core, Keyza Soulsay, Mega Ran).opus

10.4 MB

10 - Ninjula - Fire (Data Trashing Remix).opus

13.9 MB

11 - Steven Comeau - Flesh (v3).opus

20.3 MB

12 - Pronobozo - The Underground.opus

12.2 MB

13 - Terrestrial Access Network - Fax To Mars.opus

15.0 MB

14 - Vesica - Communication.opus

16.6 MB

15 - Dustin Haze - Antichamber.opus

10.9 MB

16 - Clockwork Echo - Prophetik.opus

14.1 MB

17 - Gaddy & Rhizomorphic - Belladonna.opus

13.0 MB

DEF CON 27 OST README.txt

1.7 KB

back.png

702.2 KB

front.jpg

1.7 MB

tracklist.txt

0.7 KB

/.../DEF CON 27 live music - aac 224k/

DC27 Master Playlist.txt

1.1 KB

DEF CON 27 01 Eight B.t.m4a

116.7 MB

DEF CON 27 02 Amplitude Problem.m4a

64.8 MB

DEF CON 27 03 YT cracker.m4a

121.3 MB

DEF CON 27 04 Dual Core.m4a

76.5 MB

DEF CON 27 05 Magik Plan.m4a

70.1 MB

DEF CON 27 06 Terrestrial Access Network.m4a

91.5 MB

DEF CON 27 07 Icetre Normal.m4a

108.1 MB

DEF CON 27 08 Miss Jackalope.m4a

125.9 MB

DEF CON 27 09 Dj Sterling.m4a

112.3 MB

DEF CON 27 10 Skittish & Bus.m4a

100.7 MB

DEF CON 27 11 Miss Jackalope.m4a

107.6 MB

DEF CON 27 12 Zebbler Encati Experince.m4a

113.1 MB

DEF CON 27 13 Rabbit In The Moon.m4a

119.7 MB

DEF CON 27 14 Ninjula.m4a

205.1 MB

DEF CON 27 Music Flyer.jpg

638.7 KB

/.../DEF CON 27 live music - flac/

DC27 Master Playlist.txt

1.1 KB

DEF CON 27 01 Eight B.t.flac

518.8 MB

DEF CON 27 02 Amplitude Problem.flac

271.1 MB

DEF CON 27 03 YT cracker.flac

490.9 MB

DEF CON 27 04 Dual Core.flac

300.7 MB

DEF CON 27 05 Magik Plan.flac

283.0 MB

DEF CON 27 06 Terrestrial Access Network.flac

452.9 MB

DEF CON 27 07 Icetre Normal.flac

447.8 MB

DEF CON 27 08 Miss Jackalope.flac

535.2 MB

DEF CON 27 09 Dj Sterling.flac

531.3 MB

DEF CON 27 10 Skittish & Bus.flac

458.5 MB

DEF CON 27 11 Miss Jackalope.flac

506.5 MB

DEF CON 27 12 Zebbler Encati Experince.flac

458.8 MB

DEF CON 27 13 Rabbit In The Moon.flac

514.8 MB

DEF CON 27 14 Ninjula.flac

999.8 MB

DEF CON 27 Music Flyer.jpg

638.7 KB

/.../DEF CON 27 live music - opus 384k/

DC27 Master Playlist.txt

1.1 KB

DEF CON 27 01 Eight B.t.opus

181.8 MB

DEF CON 27 02 Amplitude Problem.opus

109.6 MB

DEF CON 27 03 YT cracker.opus

207.5 MB

DEF CON 27 04 Dual Core.opus

132.6 MB

DEF CON 27 05 Magik Plan.opus

113.1 MB

DEF CON 27 06 Terrestrial Access Network.opus

170.6 MB

DEF CON 27 07 Icetre Normal.opus

164.8 MB

DEF CON 27 08 Miss Jackalope.opus

191.8 MB

DEF CON 27 09 Dj Sterling.opus

181.5 MB

DEF CON 27 10 Skittish & Bus.opus

158.9 MB

DEF CON 27 11 Miss Jackalope.opus

172.5 MB

DEF CON 27 12 Zebbler Encati Experince.opus

171.8 MB

DEF CON 27 13 Rabbit In The Moon.opus

175.6 MB

DEF CON 27 14 Ninjula.opus

326.9 MB

DEF CON 27 Music Flyer.jpg

638.7 KB

/DEF CON 27 presentations/

DEFCON-27-Alexandre-Borges-dotNET-Malware-Threats.pdf

5.5 MB

DEFCON-27-Alon-Weinberg-Please-inject-me-a-x64-code-injection-Demo.mp4

6.4 MB

DEFCON-27-Alon-Weinberg-Please-inject-me-a-x64-code-injection.pdf

827.5 KB

DEFCON-27-Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace-Demo-Videos.zip

73.9 MB

DEFCON-27-Alvaro-Munoz-Oleksandr-Mirosh-SSOWars-The-Token-Menace.pdf

1.4 MB

DEFCON-27-Amit-Waisel-and-Hila-Cohen-malproxy-demo.mp4

55.8 MB

DEFCON-27-Amit-Waisel-and-Hila-Cohen-malproxy.pdf

3.6 MB

DEFCON-27-Andreas-Baumhof-Are-Quantum-Computers-Really-A-Threat-To-Cryptography.pdf

3.9 MB

DEFCON-27-Andy-Grant-Unpacking-pkgs.mp4

3.0 MB

DEFCON-27-Andy-Grant-Unpacking-pkgs.pdf

1.1 MB

DEFCON-27-Anish-Athalye-Strong-Isolation.pdf

19.0 MB

DEFCON-27-Ariel-Adversariel-Herbert-Voss-Dont-Red-Team-AI-like-a-Chump.pdf

14.7 MB

DEFCON-27-Ben-Morris-More-Keys-Than-A-Piano-Finding-Secrets-In-Publicly-Exposed-Ebs-Volumes.pdf

14.2 MB

DEFCON-27-Ben-Sadeghipour-Owning-the-clout-through-SSRF-and-PDF-generators.pdf

2.4 MB

DEFCON-27-Bernhard-Mueller-The-Ether-Wars.pdf

3.9 MB

DEFCON-27-Bill-Graydon-Restricted-Keys.pdf

43.9 MB

DEFCON-27-Bill-Swearingen-HAKC-The-Police.pdf

31.6 MB

DEFCON-27-Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.compressed.pdf

8.6 MB

DEFCON-27-Brad-Dixon-Cheating-in-eSports-How-to-cheat-at-virtual-cycling-using-USB-hacks.pdf

54.6 MB

DEFCON-27-Brent-Stone-Reverse-Enginerring-17-Cars-Video-Demo.mp4

4.5 MB

DEFCON-27-Brent-Stone-Reverse-Enginerring-17-Cars.pdf

5.4 MB

DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET-DEMO-1.mp4

6.8 MB

DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET-DEMO.mp4

6.8 MB

DEFCON-27-Brizendine-Stroschein-The-JOP-ROCKET.pdf

5.6 MB

DEFCON-27-Campbell-Murray-GSM-We-can-hear-everyone-now.pdf

800.7 KB

DEFCON-27-Christopher-Roberts-DEMO-1.mp4

3.3 MB

DEFCON-27-Christopher-Roberts-DEMO-2.mp4

1.4 MB

DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-1.wmv

66.5 MB

DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-2.wmv

10.0 MB

DEFCON-27-Christopher-Roberts-Firmware-Slap-DEMO-3.wmv

39.8 MB

DEFCON-27-Christopher-Roberts-Firmware-Slap.pdf

12.1 MB

DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC.pdf

4.4 MB

DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming.PDF

4.1 MB

DEFCON-27-Dan-Regalado-ARM-Syscalls.mp4

2.1 MB

DEFCON-27-Dan-Regalado-Defcon27AliDan.pdf

10.0 MB

DEFCON-27-Daniel-Romero-and-Mario-Rivas-Why-you-should-fear-your-mundane-office.pdf

4.0 MB

DEFCON-27-DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips.pdf

14.9 MB

DEFCON-27-Dirk-jan-Mollema-Im-in-your-cloud-pwning-your-azure-environment.pdf

2.7 MB

DEFCON-27-Douglas-McKee-HVACking-Understanding-the-Delta-Between-Security-and-Reality.pdf

9.1 MB

DEFCON-27-Elliott-Thompson-Mi-Casa-Su-Casa-Video-Demonstration.mp4

10.0 MB

DEFCON-27-Elliott-Thompson-Mi-Casa-Su-Casa.pdf

31.0 MB

DEFCON-27-Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera-Demo.mp4

9.1 MB

DEFCON-27-Eyal-Itkin-Say-Cheese-How-I-Ransomwared-Your-DSLR-Camera.pdf

14.8 MB

DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin.pdf

3.5 MB

DEFCON-27-Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design-Demo.mp4

2.4 MB

DEFCON-27-Gregory-Pickett-Breaking-The-Back-End-It-Is-Not-Always-A-Bug.-Sometimes-It-Is-Just-Bad-Design.pdf

3.2 MB

DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding.pdf

5.1 MB

DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoiP-Configuration-Interfaces.pdf

6.2 MB

DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Extras.zip

36.0 MB

DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All.pdf

1.6 MB

DEFCON-27-Jack-Baker-Hacking-Web-Assembly-Games.pdf

7.9 MB

DEFCON-27-Jacob-Baines-Help-Me-Vulnerabilities.-Youre-My-Only-Hope.pdf

27.9 MB

DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil.pdf

5.6 MB

DEFCON-27-Jeff-Dileo-Evil-eBPF-In-Depth.pdf

1.2 MB

DEFCON-27-Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-on-Email-End-to-End-Encryption.pdf

3.0 MB

DEFCON-27-Jesse-Michael-Get-off-the-kernel-if-you-cant-drive.pdf

2.4 MB

DEFCON-27-Jmaxxz-Your-Car-is-My-Car.pdf

6.8 MB

DEFCON-27-Joe-Grand-Badge.pdf

33.1 MB

DEFCON-27-Joe-Grand-The-DEFCON-27-Badge.pdf

33.1 MB

DEFCON-27-Joseph-Cox-How-You-Can-Buy-ATT-T-Mobile-and-Sprint-Real-Time-Location-Data-on-the-Black-Market.pdf

14.4 MB

DEFCON-27-Joseph-Menn-Change-the-World-cDc-Style.pdf

445.7 KB

DEFCON-27-Joshua-Maddux-API-Induced-SSRF.pdf

1.1 MB

DEFCON-27-Junyu-Zhou-and-Ce-Qin-and-Jianing-Wang-Web2Own-Attacking-Desktop-Apps-From-Web-Securitys-Perspective.pdf

6.9 MB

DEFCON-27-Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pdf

153.3 MB

DEFCON-27-Katherine-Pratt-Hacking-Your-Thoughts-Batman-Forever-meets-Black-Mirror.pptx

43.5 MB

DEFCON-27-Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee-Demo.mp4

10.7 MB

DEFCON-27-Kyle-Gwinnup-Next-Generation-Process-Emulation-with-Binee.pdf

826.0 KB

DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations.pdf

178.4 MB

DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-AFL-How-to-Improve-Coverage-guided-Fuzzing-and-Find-New-Zero-days-in-Tough-Targets.pdf

4.0 MB

DEFCON-27-Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-Driven-by-Malware.pdf

23.4 MB

DEFCON-27-Masarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-support-video-luminati-sdk-demo.mp4

3.3 MB

DEFCON-27-Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf

2.5 MB

DEFCON-27-Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht-WINDOWS-DEMO.mp4

4.5 MB

DEFCON-27-Michael-Leibowitz-and-Topher-Timzen-EDR-Is-Coming-Hide-Yo-Sht.pdf

1.5 MB

DEFCON-27-Michael-Stepankin-Apache-Solr-Injection.pdf

24.3 MB

DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mkv

318.3 KB

DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards-DEMO.mp4

1.2 MB

DEFCON-27-Nicolas-Oberli-Poking-the-S-in-SD-cards.PDF

2.2 MB

DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance.pdf

7.8 MB

DEFCON-27-Nina-Kollars-Confessions-of-a-Nespresso-Money-Mule.pdf

1.4 MB

DEFCON-27-Omer-Gull-SELECT-code-execution-FROM-USING-SQLite-Demo.mp4

2.8 MB

DEFCON-27-Omer-Gull-SELECT-code-execution-FROM-USING-SQLite.pdf

7.5 MB

DEFCON-27-Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits-Demo.mp4

4.4 MB

DEFCON-27-Omer-Yair-Exploiting-Windows-Exploit-Mitigation-for-ROP-Exploits.pdf

10.1 MB

DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video.zip

201.6 MB

DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs.pdf

7.0 MB

DEFCON-27-Panel-DC101-The-Panel.pdf

3.8 MB

DEFCON-27-Patrick-Wardle-Harnessing-Weapons-of-Mac-Destruction.pdf

240.4 MB

DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks.pdf

8.0 MB

DEFCON-27-Phar-No-Mas-How-One-Side-Channel-Flaw-Opens-Atm-Pharmacies-and-Government-Secrets-Up-to-Attack.pdf

42.1 MB

DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Demo-Video.mp4

4.4 MB

DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Extended-Version.pdf

35.1 MB

DEFCON-27-Roger-Dingledine-TOR-Censorship-Arms-Race.pdf

4.5 MB

DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers.pdf

31.8 MB

DEFCON-27-Travis-Palmer-First-try-DNS-Cache-Poisoning-with-IPv4-and-IPv6-Fragmentation.pdf

3.8 MB

DEFCON-27-Truman-Kain-Surveillance-Detection-Scout-Demo.mp4

10.7 MB

DEFCON-27-Truman-Kain-Surveillance-Detection-Scout.pdf

64.5 MB

DEFCON-27-Wenxiang-Qian-Yuxiang-Li-Huiyu-Wu-Breaking-Google-Home-Exploit-It-with-SQLite-Magellan.pdf

3.4 MB

DEFCON-27-WillC-Phreaking-Elevators.pdf

5.8 MB

DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf

9.3 MB

DEFCON-27-Xiaohuihui-All-The-4G-Modules-Could-Be-Hacked.pdf

14.6 MB

DEFCON-27-Xiling-Gong-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air.pdf

2.5 MB

DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-How-to-Easily-Bypass-the-Latest-NTLM-Relay-Mitigations.pdf

60.3 MB

DEFCON-27-Zhang-Xiangqian-Liu-Huiming-Your-secret-files-are-mine.pdf

201.8 MB

DEFCON-27-albinowax-HTTP-Desync-Attacks-demo.mp4

7.3 MB

DEFCON-27-albinowax-HTTP-Desync-Attacks-whitepaper.pdf

405.4 KB

DEFCON-27-albinowax-HTTP-Desync-Attacks.pdf

7.9 MB

DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer-Demo.mp4

2.0 MB

DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer.pdf

3.2 MB

DEFCON-27-droogie-go-null-yourself.pdf

50.6 MB

DEFCON-27-finalphoenix-Rise-of-the-Hypebots.pdf

56.5 MB

DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss-MF910-CSRF-Demo.mp4

220.0 KB

DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss.pdf

9.4 MB

DEFCON-27-jiska-fabian-vacuum-cleaning-security.pdf

1.7 MB

DEFCON-27-smea-Adventures-in-smart-buttplug-penetration-testing.pdf

3.1 MB

/.../DEFCON-27-Anish-Athalye-Demo-Video/

Anish Athalye - Strong Isolation - Demo 1 of 7.mp4

3.0 MB

Anish Athalye - Strong Isolation - Demo 2 of 7.mp4

2.5 MB

Anish Athalye - Strong Isolation - Demo 3 of 7.mp4

2.4 MB

Anish Athalye - Strong Isolation - Demo 4 of 7.mp4

1.5 MB

Anish Athalye - Strong Isolation - Demo 5 of 7.mp4

2.0 MB

Anish Athalye - Strong Isolation - Demo 6 of 7.mp4

5.8 MB

Anish Athalye - Strong Isolation - Demo 7 of 7.mp4

2.3 MB

/.../DEFCON-27-Bernhard-Mueller-Demo-Videos/

DEFCON-27-Bernhard-Mueller-demo_01_destructible.mp4

633.7 KB

DEFCON-27-Bernhard-Mueller-demo_02_ethernaut.mp4

853.4 KB

DEFCON-27-Bernhard-Mueller-demo_03_graph.mp4

2.4 MB

DEFCON-27-Bernhard-Mueller-demo_04_scrooge.mp4

2.9 MB

/.../DEFCON-27-Bill-Graydon-Demo-Videos/

Graydon - Restricted Keys - HPC keyway adapter.mp4

2.2 MB

Graydon - Restricted Keys - SC1 cut.mp4

608.4 KB

Graydon - Restricted Keys - m3 slider cut.mp4

3.8 MB

Graydon - Restricted Keys - mul-t-lock drill press.mp4

2.0 MB

Graydon - Restricted Keys - standard profile cut.mp4

937.8 KB

/.../DEFCON-27-Christopher-Wade-Tag-side-attacks-against-NFC-Demo-Videos/

Christopher Wade - Demo 1.mp4

215.6 KB

Christopher Wade - Demo 2.mp4

363.6 KB

Christopher Wade - Demo 3.mp4

501.8 KB

Christopher Wade - Demo 4.mp4

404.9 KB

/.../DEFCON-27-Damien-Cauquil-Defeating-Bluetooth-Low-Energy-5-PRNG-for-fun-and-jamming-Demo-Video/

Damien Cauquil - 1.simulating_csa2_attack.mp4

1.6 MB

Damien Cauquil - 1.simulating_csa2_attack_1.mp4

1.6 MB

Damien Cauquil - 2.sniffing_csa2.mp4

464.2 KB

Damien Cauquil - 2.sniffing_csa2_1.mp4

464.2 KB

Damien Cauquil - 3.jamming_csa2.mp4

17.5 MB

Damien Cauquil - 3.jamming_csa2_1.mp4

17.5 MB

/.../DEFCON-27-Dimitry-Snezhkov-Demo-Video/

DEFCON-27-DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips-1080.mp4

3.1 MB

DEFCON-27-DimitrySnezhkov-Zombie-Ant-Farm-Practical-Tips-Demo.mp4

7.2 MB

/.../DEFCON-27-Dirk-jan-Mollema-Demo-Videos/

Dirk-jan Mollema - Im in your cloud pwning your azure environment - demo1.mp4

231.2 KB

Dirk-jan Mollema - Im in your cloud pwning your azure environment - mfademo.mp4

2.4 MB

Dirk-jan Mollema - Im in your cloud pwning your azure environment - notepad.mp4

204.7 KB

/.../DEFCON-27-Douglas-McKee-Demo-Video/

Douglas McKee - HVACKing Demo 2.mp4

2.4 MB

Douglas McKee - HVACKing Demo 3.mp4

6.8 MB

Douglas McKee HVACKing Demo 1.mp4

2.7 MB

/.../DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Demo-Video/

DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo1-iPad-5sec.mp4

40.5 MB

DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo2-hook-control.mp4

5.2 MB

DEFCON-27-Gerald-Doussot-Roger-Meyer-State-of-DNS-Rebinding-Attack-and-Prevention-Techniques-and-the-Singularity-of-Origin-rebind-demo3-automation.mp4

7.6 MB

/.../DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-Extras/

DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-armv8.mp4

2.2 MB

DEFCON-27-Hadrien-Barral-The-ABC-of-Next-Gen-Shellcoding-english.mp4

2.1 MB

hash.mp4

447.5 KB

slash.mp4

454.2 KB

tick.mp4

606.9 KB

/.../DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Demo-Video/

DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-1.mp4

1.7 MB

DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-2.mp4

2.2 MB

DEFCON-27-Huber-and-Roskosch-I-m-on-Your-Phone-Listening-Attacking-VoIP-Configuration-Interfaces-Demo-3.mp4

833.5 KB

/.../DEFCON-27-Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-All-Demo-Video/

Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllAtomBombing.mp4

287.8 KB

Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllGhostWriting.mp4

390.4 KB

Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllSetWindowsLongPtr.mp4

427.6 KB

Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllStackBomber.mp4

427.1 KB

Itzik-Kotler-Amit-Klein-Gotta-Catch-Them-AllnmapMap.mp4

612.9 KB

/.../DEFCON-27-Jack-Baker-Hacking-Web-Assembly-Games-Demo-Video/

Jack-Baker-Hacking-Web-Assembly-Games-Demo-1.mp4

3.7 MB

Jack-Baker-Hacking-Web-Assembly-Games-Demo-2.mp4

5.4 MB

/.../DEFCON-27-Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-Video/

Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-1.mp4

4.4 MB

Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-2.mp4

2.4 MB

Jayson-Grace-MOSE-Using-Configuration-Management-for-Evil-Demo-3.mp4

3.7 MB

/.../DEFCON-27-Jeff-Dileo-Evil-eBPF-In-Depth-Extras/

Jeff-Dileo-Evil-eBPF-In-Depth-DEMO-call.mp4

323.4 KB

Jeff-Dileo-Evil-eBPF-In-Depth-DEMO-reduce.mp4

96.0 KB

/.../DEFCON-27-Jens-Mueller-Re-Whats-up-Johnny-Covert-Content-Attacks-Extras/

Jens Mueller-demo-decryption-oracle.ogv

9.0 MB

Jens Mueller-demo-signing-oracle.ogv

3.6 MB

/.../DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/OpenRemoteStart-master/

.gitignore

0.4 KB

LICENSE

1.5 KB

README.md

2.5 KB

project.properties

0.1 KB

/.../DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/OpenRemoteStart-master/images/

Labeled_DataLink.jpg

236.0 KB

Schematic.png

97.8 KB

/.../DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Code-6e0e599/OpenRemoteStart-master/src/

fortin.h

0.8 KB

fortinprocessor.cpp

1.6 KB

fortinprocessor.h

1.1 KB

openremotestart.ino

25.7 KB

ringbuffer.cpp

0.7 KB

ringbuffer.h

0.4 KB

shell.cpp

4.0 KB

shell.h

0.6 KB

/.../DEFCON-27-Jmaxxz-Your-Car-is-My-Car-Demo-Videos/

Jmaxxz - 0 - BenchCarTour.mp4

1.4 MB

Jmaxxz - 1 - StartingBenchCarRf.mp4

1.0 MB

Jmaxxz - 10 - StartImprezaWithoutTransponder.mp4

2.3 MB

Jmaxxz - 11 -StartMiniWIthoutKey.mp4

1.3 MB

Jmaxxz - 2 - CloneExistingRemote_ShortEdit - UPDATED V2.mp4

3.5 MB

Jmaxxz - 2 -CloneExistingRemote.mp4

6.0 MB

Jmaxxz - 3 - StartCar.mp4

6.2 MB

Jmaxxz - 4 - DriveOff - UPDATED V2.mp4

6.9 MB

Jmaxxz - 4 - DriveOff.mp4

9.0 MB

Jmaxxz - 5 - DisableWheelLockAndDrive.mp4

7.0 MB

Jmaxxz - 6 - StartCarAfterStop.mp4

1.5 MB

Jmaxxz - 9 - SqliStartCar.mp4

2.1 MB

/.../DEFCON-27-Joshua-Maddux-API-Induced-SSRF-Demo-Video/

Joshua Maddux - API-Induced SSRF - Demo 1 appr-wrapper.mp4

4.6 MB

Joshua Maddux - API-Induced SSRF - Demo 2 webkitorg.mp4

1.9 MB

Joshua Maddux - API-Induced SSRF - Demo 3 twilio.mp4

1.4 MB

/.../DEFCON-27-Leon-Jacobs-Meticulously-Modern-Mobile-Manipulations-Demo-Video/

Leon Jacobs - 1. http-file-browser.mp4

7.7 MB

Leon Jacobs - 2. heap-ios-tiktok.mp4

38.0 MB

Leon Jacobs - 3. reflection-jar-socket.mp4

6.6 MB

Leon Jacobs - 4. ios-flex-plugin.mp4

4.1 MB

Leon Jacobs - 5. android-stetho.mp4

12.9 MB

Leon Jacobs - 6. jenkins-ci.mov.mp4

7.4 MB

/.../DEFCON-27-Maksim-Shudrak-Zero-Bugs-Found-Hold-My-Beer-Extras/

afl_main_screen_fast.mkv

28.1 MB

manul_main.mkv

14.9 MB

zeek_1.mkv

5.8 MB

/.../DEFCON-27-Nikhil-Mittal-RACE-Minimal-Rights-and-ACE-for-Active-Directory-Dominance-Demo-Video/

Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo2-ModifyServicePermissions.mp4

7.0 MB

Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo3-JEAToDC.mp4

1.8 MB

Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo4-DumpDCHash.mp4

2.6 MB

Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance - Demo5-CompromiseForestRoot.mp4

15.6 MB

Nikhil - RACE - Minimal Rights and ACE for Active Directory Dominance- Demo1-PSRemotingToDC.mp4

4.0 MB

/.../DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs-Demo-Video/

Orange-Tsai-and-Meh Chang-Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs-demo_fortigate.mp4

61.3 MB

Orange-Tsai-and-Meh Chang-Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs-demo_pulsesecure_v1.mp4

143.1 MB

/.../DEFCON-27-Pedro-Cabrera-SDR-Against-Smart-TVs-URL-and-Channel-Injection-Attacks-Demo-Video/

1_video.mov

74.9 MB

1_video.mp4

2.8 MB

2_video.mp4

192.9 MB

PedroCabrera - SDR Against Smart TVs_video10-B+M.mov

185.6 MB

PedroCabrera - SDR Against Smart TVs_video10-B+M.mp4

6.7 MB

PedroCabrera - SDR Against Smart TVs_video3-NotFinal.mp4

5.8 MB

PedroCabrera - SDR Against Smart TVs_video3.mp4

173.2 MB

PedroCabrera - SDR Against Smart TVs_video4.mp4

3.6 MB

PedroCabrera - SDR Against Smart TVs_video5_inject_URL.mp4

10.4 MB

PedroCabrera - SDR Against Smart TVs_video6-IISS-SDR.mp4

5.7 MB

PedroCabrera - SDR Against Smart TVs_video7-IISS-DNS.mp4

6.1 MB

PedroCabrera - SDR Against Smart TVs_video8-KL.mp4

5.6 MB

PedroCabrera - SDR Against Smart TVs_video9-Mi.mp4

3.5 MB

/.../DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers-Demo-Video/

CARSECU_demo.mp4

3.4 MB

EUSART_demo.mp4

2.0 MB

ROP_demo.mp4

394.8 KB

/.../DEFCON-27-Xiling-Gong-and-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air-Demo-Video/

demo - xiling gong, peter pi - exploiting qualcomm wlan and modem over the air.mp4

6.4 MB

demo - xiling gong, peter pi - exploiting qualcomm wlan and modem over the air_1.mp4

6.4 MB

/.../DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-Demo-Video/

Zinar Simakov - epa_bypass_final.mp4

11.7 MB

Zinar Simakov - session_key_final.mp4

5.7 MB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/

build.gradle

0.8 KB

readme.md

0.4 KB

sqlite-jdbc-3.23.1.jar

6.7 MB

turbo-intruder-all.jar

38.5 MB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/classes/java/main/burp/

BulkScan.class

5.1 KB

BulkScanItem.class

1.7 KB

BulkScanLauncher.class

2.7 KB

BurpExtender.class

1.9 KB

ChunkContentScan.class

4.8 KB

ConfigListener.class

0.2 KB

ConfigMenu$1.class

0.8 KB

ConfigMenu.class

1.8 KB

ConfigurableSettings.class

7.4 KB

CustomScanIssue.class

2.1 KB

LaunchSuggestedAttack.class

2.2 KB

OfferBulkScan.class

1.8 KB

PartialParam.class

1.0 KB

RandomComparator.class

0.7 KB

Req.class

1.5 KB

Resp.class

1.9 KB

Scan.class

6.1 KB

ScanPool.class

1.3 KB

SmuggleMenu$1.class

1.0 KB

SmuggleMenu$2.class

1.0 KB

SmuggleMenu.class

2.0 KB

SmuggleScanBox.class

9.9 KB

SuggestAttack.class

1.7 KB

TriggerBulkScan.class

1.8 KB

Utilities.class

21.6 KB

ZgrabLoader.class

3.6 KB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/libs/

desynchronize-all.jar

46.8 MB

desynchronize.jar

49.5 KB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/resources/main/

CL-TE.py

0.8 KB

TE-CL.py

1.2 KB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/tmp/fatJar/

MANIFEST.MF

0.0 KB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/build/tmp/jar/

MANIFEST.MF

0.0 KB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/out/artifacts/smuggleScan/

smuggleScan.jar

6.7 MB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/out/production/smuggleScan/META-INF/

smuggleScan.kotlin_module

0.0 KB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/resources/

CL-TE.py

0.8 KB

TE-CL.py

1.2 KB

/.../DEFCON-27-albinowax-HTTP-Desync-Attacks-tool/src/burp/

BulkScan.java

18.9 KB

BurpExtender.java

1.2 KB

ChunkContentScan.java

10.9 KB

ConfigurableSettings.java

7.6 KB

DualContentScan.java

4.9 KB

SmuggleHelper.java

1.0 KB

SmuggleMenu.java

1.7 KB

SmuggleScanBox.java

16.3 KB

SuggestAttack.java

2.5 KB

Utilities.java

26.0 KB

ZgrabLoader.java

2.3 KB

/.../DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Demo-Video/

DEFCON-27-finalphoenix-Rise-of-the-Hypebots-Complicated Bot.mp4

860.0 KB

DEFCON-27-finalphoenix-Rise-of-the-Hypebots-botsThatBot.mp4

2.1 MB

DEFCON-27-finalphoenix-Rise-of-the-Hypebots-fancy-monitor.mp4

1.5 MB

DEFCON-27-finalphoenix-Rise-of-the-Hypebots-puppeteerBot.mp4

4.6 MB

DEFCON-27-finalphoenix-Rise-of-the-Hypebots-simple-monitor.mp4

921.3 KB

/

DEF CON 27 program.pdf

47.0 MB

DEF CON 27 receipt.pdf

535.9 KB

DEF CON 27 video.mp4

18.7 MB

DEF CON 27.torrent

147.3 KB

voting-village-report-defcon27-hires.pdf

57.0 MB

voting-village-report-defcon27.pdf

4.0 MB

/DEF CON 27 short story contest/

10yearproject by p0wnyb0y.txt

8.4 KB

A Warm Embrace by MrBill.txt

13.3 KB

DefCon First and Foremost by base64xor.txt

12.1 KB

Intrepid Ones by Robotron.txt

9.7 KB

JOE VS. THE SYSTEM by Triple-H.txt

11.3 KB

Rearguard - by darkart.txt

12.2 KB

Technology's Promise by Anonymous.docx

8.4 KB

[1st Place] Dye Sublimation by Selene Sun.txt

12.1 KB

[2nd Place] Parsnips by David Hash Miller.txt

22.4 KB

[Peoples Choice] Red Balloons Over China by FengJiu.txt

34.6 KB

late-night-takedown-by-druid.txt

9.7 KB

/DEF CON 27 video and slides/

DEF CON 27 Conference - Alexandre Borges - NET Malware Threats Internals And Reversing.mp4

79.1 MB

DEF CON 27 Conference - Alexandre Borges - NET Malware Threats Internals And Reversing.srt

34.2 KB

DEF CON 27 Conference - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.mp4

215.5 MB

DEF CON 27 Conference - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.srt

62.9 KB

DEF CON 27 Conference - Alon Weinberg - Please Inject Me a x64 Code Injection.mp4

50.4 MB

DEF CON 27 Conference - Alon Weinberg - Please Inject Me a x64 Code Injection.srt

18.6 KB

DEF CON 27 Conference - Alvaro Munoz - SSO Wars The Token Menace.mp4

99.6 MB

DEF CON 27 Conference - Alvaro Muñoz - SSO Wars The Token Menace.srt

42.1 KB

DEF CON 27 Conference - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.mp4

129.6 MB

DEF CON 27 Conference - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.srt

59.7 KB

DEF CON 27 Conference - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.mp4

60.4 MB

DEF CON 27 Conference - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.srt

27.8 KB

DEF CON 27 Conference - Anish Athalye - Want Strong Isolation Just Reset Your Processor.mp4

117.2 MB

DEF CON 27 Conference - Anish Athalye - Want Strong Isolation Just Reset Your Processor.srt

67.6 KB

DEF CON 27 Conference - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.mp4

84.7 MB

DEF CON 27 Conference - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.srt

42.2 KB

DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.mp4

73.3 MB

DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.srt

35.2 KB

DEF CON 27 Conference - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.mp4

123.9 MB

DEF CON 27 Conference - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.srt

45.6 KB

DEF CON 27 Conference - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.mp4

104.2 MB

DEF CON 27 Conference - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.srt

52.2 KB

DEF CON 27 Conference - Bill Graydon - Duplicating Restricted Mechanical Keys.mp4

143.0 MB

DEF CON 27 Conference - Bill Graydon - Duplicating Restricted Mechanical Keys.srt

56.6 KB

DEF CON 27 Conference - Bill Swearingen - HAKC THE POLICE.mp4

118.3 MB

DEF CON 27 Conference - Bill Swearingen - HAKC THE POLICE.srt

48.4 KB

DEF CON 27 Conference - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.mp4

112.0 MB

DEF CON 27 Conference - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.srt

47.6 KB

DEF CON 27 Conference - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.mp4

44.7 MB

DEF CON 27 Conference - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.srt

25.1 KB

DEF CON 27 Conference - Bruce Schneier - Information Security in the Public Interest.mp4

145.2 MB

DEF CON 27 Conference - Bruce Schneier - Information Security in the Public Interest.srt

43.8 KB

DEF CON 27 Conference - Campbell Murray - GSM We Can Hear Everyone Now.mp4

106.3 MB

DEF CON 27 Conference - Campbell Murray - GSM We Can Hear Everyone Now.srt

43.2 KB

DEF CON 27 Conference - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.mp4

82.4 MB

DEF CON 27 Conference - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.srt

34.4 KB

DEF CON 27 Conference - Christopher Wade - Tag-side attacks against NFC.mp4

88.6 MB

DEF CON 27 Conference - Christopher Wade - Tag-side attacks against NFC.srt

53.0 KB

DEF CON 27 Conference - Contests and Events - Contests Awards Ceremony.mp4

267.8 MB

DEF CON 27 Conference - Contests and Events - Contests Awards Ceremony.srt

68.8 KB

DEF CON 27 Conference - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.mp4

94.8 MB

DEF CON 27 Conference - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.srt

39.1 KB

DEF CON 27 Conference - Daniel Romero - Why You Should Fear Your mundane Office Equipment.mp4

125.8 MB

DEF CON 27 Conference - Daniel Romero - Why You Should Fear Your mundane Office Equipment.srt

48.9 KB

DEF CON 27 Conference - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.mp4

180.5 MB

DEF CON 27 Conference - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.srt

51.9 KB

DEF CON 27 Conference - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.mp4

125.9 MB

DEF CON 27 Conference - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.srt

51.0 KB

DEF CON 27 Conference - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.mp4

113.5 MB

DEF CON 27 Conference - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.srt

47.8 KB

DEF CON 27 Conference - Douglas McKee - HVACking Understand the Delta Between Security and Reality.mp4

103.6 MB

DEF CON 27 Conference - Douglas McKee - HVACking Understand the Delta Between Security and Reality.srt

57.4 KB

DEF CON 27 Conference - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.mp4

48.5 MB

DEF CON 27 Conference - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.srt

28.9 KB

DEF CON 27 Conference - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.mp4

102.6 MB

DEF CON 27 Conference - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.srt

51.7 KB

DEF CON 27 Conference - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.mp4

104.6 MB

DEF CON 27 Conference - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.srt

44.8 KB

DEF CON 27 Conference - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.mp4

119.1 MB

DEF CON 27 Conference - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.srt

50.7 KB

DEF CON 27 Conference - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.mp4

104.5 MB

DEF CON 27 Conference - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.srt

43.0 KB

DEF CON 27 Conference - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.mp4

67.1 MB

DEF CON 27 Conference - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.srt

26.5 KB

DEF CON 27 Conference - Hadrien Barral - The ABC of Next-Gen Shellcoding.mp4

91.0 MB

DEF CON 27 Conference - Hadrien Barral - The ABC of Next-Gen Shellcoding.srt

38.9 KB

DEF CON 27 Conference - Hila Cohen - Malproxy Leave Your Malware at Home.mp4

98.8 MB

DEF CON 27 Conference - Hila Cohen - Malproxy Leave Your Malware at Home.srt

44.4 KB

DEF CON 27 Conference - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.mp4

144.5 MB

DEF CON 27 Conference - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.srt

50.9 KB

DEF CON 27 Conference - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.mp4

112.3 MB

DEF CON 27 Conference - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.srt

47.6 KB

DEF CON 27 Conference - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.mp4

108.3 MB

DEF CON 27 Conference - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.srt

43.1 KB

DEF CON 27 Conference - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.mp4

134.1 MB

DEF CON 27 Conference - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.srt

65.1 KB

DEF CON 27 Conference - Jayson Grace - MOSE Using Configuration Management for Evil.mp4

115.1 MB

DEF CON 27 Conference - Jayson Grace - MOSE Using Configuration Management for Evil.srt

45.9 KB

DEF CON 27 Conference - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.mp4

110.9 MB

DEF CON 27 Conference - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.srt

66.0 KB

DEF CON 27 Conference - Jens Muller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.mp4

61.8 MB

DEF CON 27 Conference - Jens Müller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.srt

24.2 KB

DEF CON 27 Conference - Jesse Michael - Get Off the Kernel if You Cant Drive.mp4

138.6 MB

DEF CON 27 Conference - Jesse Michael - Get Off the Kernel if You Cant Drive.srt

51.0 KB

DEF CON 27 Conference - Jmaxxz - Your Car is My Car.mp4

134.4 MB

DEF CON 27 Conference - Jmaxxz - Your Car is My Car.srt

47.7 KB

DEF CON 27 Conference - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.mp4

213.7 MB

DEF CON 27 Conference - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.srt

82.9 KB

DEF CON 27 Conference - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.mp4

107.3 MB

DEF CON 27 Conference - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.srt

50.2 KB

DEF CON 27 Conference - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.mp4

209.0 MB

DEF CON 27 Conference - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.srt

61.4 KB

DEF CON 27 Conference - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.mp4

113.2 MB

DEF CON 27 Conference - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.srt

48.8 KB

DEF CON 27 Conference - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.mp4

105.5 MB

DEF CON 27 Conference - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.srt

26.7 KB

DEF CON 27 Conference - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.mp4

90.7 MB

DEF CON 27 Conference - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.srt

60.7 KB

DEF CON 27 Conference - Kyle Gwinnup - Next Generation Process Emulation with Binee.mp4

114.9 MB

DEF CON 27 Conference - Kyle Gwinnup - Next Generation Process Emulation with Binee.srt

61.5 KB

DEF CON 27 Conference - Leon Jacobs - Meticulously Modern Mobile Manipulations.mp4

99.1 MB

DEF CON 27 Conference - Leon Jacobs - Meticulously Modern Mobile Manipulations.srt

49.3 KB

DEF CON 27 Conference - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.mp4

109.1 MB

DEF CON 27 Conference - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.srt

45.0 KB

DEF CON 27 Conference - Marina Simakov - Relaying Credentials Has Never Been Easier.mp4

105.0 MB

DEF CON 27 Conference - Marina Simakov - Relaying Credentials Has Never Been Easier.srt

49.1 KB

DEF CON 27 Conference - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.mp4

80.5 MB

DEF CON 27 Conference - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.srt

51.9 KB

DEF CON 27 Conference - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.mp4

121.0 MB

DEF CON 27 Conference - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.srt

58.0 KB

DEF CON 27 Conference - Michael Stepankin - Apache Solr Injection.mp4

31.4 MB

DEF CON 27 Conference - Michael Stepankin - Apache Solr Injection.srt

16.2 KB

DEF CON 27 Conference - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.mp4

44.3 MB

DEF CON 27 Conference - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.srt

26.9 KB

DEF CON 27 Conference - Nicolas Oberli - Poking the S in SD cards.mp4

54.5 MB

DEF CON 27 Conference - Nicolas Oberli - Poking the S in SD cards.srt

20.0 KB

DEF CON 27 Conference - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.mp4

87.0 MB

DEF CON 27 Conference - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.srt

35.9 KB

DEF CON 27 Conference - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.mp4

54.2 MB

DEF CON 27 Conference - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.srt

25.7 KB

DEF CON 27 Conference - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.mp4

130.4 MB

DEF CON 27 Conference - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware .srt

62.8 KB

DEF CON 27 Conference - Omer Gull - SELECT code execution FROM USING SQLite.mp4

111.0 MB

DEF CON 27 Conference - Omer Gull - SELECT code execution FROM USING SQLite.srt

45.3 KB

DEF CON 27 Conference - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.mp4

113.6 MB

DEF CON 27 Conference - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.srt

52.3 KB

DEF CON 27 Conference - Orange Tsai - Infiltrating Corporate Intranet Like NSA Pre-auth RCE on Leading SSL VPNs.mp4

140.0 MB

DEF CON 27 Conference - Orange Tsai - Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs.srt

38.7 KB

DEF CON 27 Conference - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.mp4

185.1 MB

DEF CON 27 Conference - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.srt

54.8 KB

DEF CON 27 Conference - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.mp4

182.0 MB

DEF CON 27 Conference - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.srt

50.1 KB

DEF CON 27 Conference - Patrick Wardle - Harnessing Weapons of Mac Destruction.mp4

134.2 MB

DEF CON 27 Conference - Patrick Wardle - Harnessing Weapons of Mac Destruction.srt

60.1 KB

DEF CON 27 Conference - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.mp4

123.3 MB

DEF CON 27 Conference - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.srt

43.0 KB

DEF CON 27 Conference - Philippe Laulheret - Intro to Hardware Hacking.mp4

127.6 MB

DEF CON 27 Conference - Philippe Laulheret - Intro to Hardware Hacking.srt

69.0 KB

DEF CON 27 Conference - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.mp4

133.8 MB

DEF CON 27 Conference - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.srt

56.8 KB

DEF CON 27 Conference - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.mp4

100.6 MB

DEF CON 27 Conference - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.srt

36.3 KB

DEF CON 27 Conference - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.mp4

115.8 MB

DEF CON 27 Conference - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.srt

46.2 KB

DEF CON 27 Conference - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.mp4

252.6 MB

DEF CON 27 Conference - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.srt

70.3 KB

DEF CON 27 Conference - The Dark Tangent - Closing Ceremonies.mp4

502.2 MB

DEF CON 27 Conference - The Dark Tangent - Closing Ceremonies.srt

120.1 KB

DEF CON 27 Conference - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.mp4

46.7 MB

DEF CON 27 Conference - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.srt

23.3 KB

DEF CON 27 Conference - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.mp4

173.3 MB

DEF CON 27 Conference - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.srt

36.8 KB

DEF CON 27 Conference - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.mp4

94.9 MB

DEF CON 27 Conference - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.srt

37.4 KB

DEF CON 27 Conference - WillC - Phreaking Elevators.mp4

108.0 MB

DEF CON 27 Conference - WillC - Phreaking Elevators.srt

42.9 KB

DEF CON 27 Conference - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.mp4

84.0 MB

DEF CON 27 Conference - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.srt

28.5 KB

DEF CON 27 Conference - XiaoHuiHui - All the 4G Modules Could Be Hacked.mp4

124.5 MB

DEF CON 27 Conference - XiaoHuiHui - All the 4G Modules Could Be Hacked.srt

42.7 KB

DEF CON 27 Conference - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.mp4

85.9 MB

DEF CON 27 Conference - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.srt

31.8 KB

DEF CON 27 Conference - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.mp4

74.3 MB

DEF CON 27 Conference - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.srt

27.4 KB

DEF CON 27 Conference - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.mp4

90.5 MB

DEF CON 27 Conference - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.srt

52.0 KB

DEF CON 27 Conference - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Others Auto Infractions.srt

27.3 KB

DEF CON 27 Conference - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined.mp4

75.3 MB

DEF CON 27 Conference - finalphoenix - Rise of the Hypebots Scripting Streetwear.mp4

124.7 MB

DEF CON 27 Conference - finalphoenix - Rise of the Hypebots Scripting Streetwear.srt

44.2 KB

DEF CON 27 Conference - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.mp4

94.6 MB

DEF CON 27 Conference - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.srt

48.5 KB

DEF CON 27 Conference - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.mp4

64.5 MB

DEF CON 27 Conference - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.srt

28.3 KB

DEF CON 27 Conference - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.mp4

100.8 MB

DEF CON 27 Conference - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.srt

47.3 KB

DEF CON 27 Conference - smea - Adventures In Smart Buttplug Penetration testing.mp4

97.5 MB

DEF CON 27 Conference - smea - Adventures In Smart Buttplug Penetration testing.srt

67.2 KB

DEF CON 27 Conference - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.mp4

125.2 MB

DEF CON 27 Conference - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.srt

58.8 KB

/DEF CON 27 villages/

DEF CON 27 AI Village - AI Village Organizers - Opening Remarks.mp4

3.9 MB

DEF CON 27 AI Village - Angelo Oliveira - Fighting Malware with Deep Learning.mp4

110.2 MB

DEF CON 27 AI Village - Anna Skelton - Analyzing the Effects of Deepfakes on Market Manipulation.mp4

119.5 MB

DEF CON 27 AI Village - Barton Rhodes - Securing your kubeflow clusters.mp4

102.4 MB

DEF CON 27 AI Village - Bob Lord - Misinformation Keynote.mp4

71.5 MB

DEF CON 27 AI Village - Dr Ethan Rudd - Loss Is More Improving Malware Detectors by Learning Additional Tasks.mp4

143.1 MB

DEF CON 27 AI Village - Hyrum Anderson - Competitions in Infosec ML.mp4

40.8 MB

DEF CON 27 AI Village - Jason Mancuso - Machine Learnings Privacy Problem.mp4

110.0 MB

DEF CON 27 AI Village - Jesus Solano - Behavioral Biometrics and Context Analytics Risk Based Authentication Re-Imagined.mp4

85.3 MB

DEF CON 27 AI Village - Jon Hawes - A buyers guide to the market promise of automagic AI-enabled detection and response.mp4

155.0 MB

DEF CON 27 AI Village - Kenya Yoshimur - Clairvoyance concurrent lip-reading for the smart masses.mp4

78.6 MB

DEF CON 27 AI Village - Lauren Putvin - Exploratory Data Analysis Why and How in Python.mp4

94.7 MB

DEF CON 27 AI Village - Laurin Weissinger - Regulating AI and Algorithms Lessons from Safety and Security Certifications and Audits.mp4

72.4 MB

DEF CON 27 AI Village - Rand Waltzman - Disinformation Its the Thought that Counts.mp4

156.7 MB

DEF CON 27 AI Village - Richard Harang - A Tutorial on Hacking Facial Recognition Systems.mp4

108.3 MB

DEF CON 27 AI Village - Roei Amit - How to Get over your malicious extensions using deep learning.mp4

76.8 MB

DEF CON 27 AI Village - Ryan Kovar - Datasciencery by the Splunk Field.mp4

116.9 MB

DEF CON 27 AI Village - Samantha Cole - Deep Fakes Panel.mp4

255.4 MB

DEF CON 27 AI Village - Siwei Lyu - Seeing is deceiving The rise of AI-synthesized fake media.mp4

111.8 MB

DEF CON 27 AI Village - Walter Scheirer - Backdooring Convolutional Neural Networks via Targeted Weight Perturbations.mp4

67.7 MB

DEF CON 27 AI Village - X1 - CTFS and DATA DATA DATA.mp4

36.8 MB

DEF CON 27 AI Village - Yisroel Mirsky - Automated Injection and Removal of Medical Evidence in CT and MRI Scans.mp4

101.4 MB

DEF CON 27 Appsec Village - Anthony Kava - How bad could it be Inside Law Enforcement and Local gov AppSec.mp4

139.0 MB

DEF CON 27 Appsec Village - Erez Yalon - Welcome and Introductions.mp4

4.3 MB

DEF CON 27 Appsec Village - Guy Barnhart-Magen - Crypto Failures and how to avoid them.mp4

148.3 MB

DEF CON 27 Appsec Village - Jillian Ratliff - Vulnerabilities that Hide from Your Tools.mp4

89.0 MB

DEF CON 27 Appsec Village - Jim Manico - Keynote The Unabridged History of Application Security.mp4

198.9 MB

DEF CON 27 Appsec Village - Joe Schottman - Purple Team Strategies for Application Security.mp4

59.7 MB

DEF CON 27 Appsec Village - Rafael Santos - huskyCI Finding Security Flaws in CI Before Deploying Them.mp4

107.5 MB

DEF CON 27 Appsec Village - YanYan Wang - Automate Pen-Testing in Dockerized CI CD Environment.mp4

121.1 MB

DEF CON 27 Aviation Village - Art Manion - Ideas whose time has come CVD SBOM and SOTA.mp4

88.6 MB

DEF CON 27 Aviation Village - Dr Will Roper - Hacking the airforce and beyond.mp4

102.2 MB

DEF CON 27 Aviation Village - Exploding Lemur - In The Air And On The Air Aviation Radio Systems.mp4

64.0 MB

DEF CON 27 Aviation Village - Harshad Sathaye - Wireless Attacks on Aircraft Instrument Landing Systems.mp4

88.8 MB

DEF CON 27 Aviation Village - Karl Koscher - An Introduction to the ARINC standards.mp4

58.6 MB

DEF CON 27 Aviation Village - Ken and Alex - A Hackers First Solo Airplane Avionics Security 101.mp4

132.8 MB

DEF CON 27 Aviation Village - Panel - The Long Haul The State of Aviation Policy.mp4

142.8 MB

DEF CON 27 Aviation Village - Patrick Kiley - CAN Bus in Aviation Investigating CAN Bus in Avionics.mp4

33.4 MB

DEF CON 27 Aviation Village - Tarah Wheeler - Common Online Security Fails In Pilot Training.mp4

61.6 MB

DEF CON 27 Aviation Village - Zoltan Madarassy - Behind the scenes of hacking airplanes.mp4

92.0 MB

DEF CON 27 Bio Hacking Village - Alex Pearlman - DIY Medicine The Ethics of Hacking Pharma.mp4

65.2 MB

DEF CON 27 Bio Hacking Village - Andrea Downing - A Previvors Story of Uncovering Massive Zero Day Vulnerability.mp4

64.2 MB

DEF CON 27 Bio Hacking Village - Corey M Hudson - From Buffer Overflowing Genomics Tools to Securing Biomedical File Formats.mp4

86.3 MB

DEF CON 27 Bio Hacking Village - Dr Avi Rubin - A Complete View of the Attack Surface of a Networked Medical Device.mp4

99.0 MB

DEF CON 27 Bio Hacking Village - Dr Harish Manyam - Doctor Hacker Panel.mp4

306.4 MB

DEF CON 27 Bio Hacking Village - Eric D Perakslis - Employ Cybersecurity Techniques Against the Threat of Medical Information.mp4

71.1 MB

DEF CON 27 Bio Hacking Village - JC Vega - How to Level Up Experiential Learning through Gamification.mp4

83.6 MB

DEF CON 27 Bio Hacking Village - JJ Hastings - The L33T Shall Inherit the Cosmos.mp4

119.2 MB

DEF CON 27 Bio Hacking Village - Jay Lagario - Hacking Wetware with Open Source Software and Hardware.mp4

91.4 MB

DEF CON 27 Bio Hacking Village - Jean Rintoul - Spectra Open Biomedical Imaging.mp4

93.9 MB

DEF CON 27 Bio Hacking Village - Najla Lindsay - Forensic Science and Information Security Lifetime Lovers Part-time Friends.mp4

75.7 MB

DEF CON 27 Bio Hacking Village - Nick Titus - Building a New Decentralized Internet With the Nodes Implanted in Our Bodies.mp4

97.2 MB

DEF CON 27 Bio Hacking Village - Panel - Medical Simulations Panel.mp4

227.6 MB

DEF CON 27 Bio Hacking Village - Rachel Smith - Liven Up Augmenting Materials for Bio-Hybrid Functionality.mp4

82.7 MB

DEF CON 27 Bio Hacking Village - Steve Lewis - Cyberbiosecurity and the Full Stack Biotechnologist.mp4

79.2 MB

DEF CON 27 Bio Hacking Village - Turtle Snap - Malware and Biology.mp4

60.6 MB

DEF CON 27 Bio Hacking Village - Wayne Penn - Amputees and Prostetics Challenges.mp4

154.7 MB

DEF CON 27 Block Chain Village - Brian Vohaska - Forcing a trustworthy notion of sequential time.mp4

82.7 MB

DEF CON 27 Block Chain Village - Mark Nesbitt - Hacking Cryptocurrencies.mp4

134.0 MB

DEF CON 27 Block Chain Village - Mark Nesbitt - What Is Bitcoin.mp4

48.3 MB

DEF CON 27 Block Chain Village - Mila Paul - Alice and Bobs Big Secret.mp4

76.4 MB

DEF CON 27 Block Chain Village - Panel - Privacy Enabler or Hindrance to the Success of Blockchain based currencies.mp4

172.2 MB

DEF CON 27 Block Chain Village - Philip Martin - Responding to Firefox 0-days.mp4

83.4 MB

DEF CON 27 Block Chain Village - Rod Soto - A Smart Contract Killchain How the first Blockchain APT was caught.mp4

169.2 MB

DEF CON 27 Block Chain Village - Ron Stoner - The CryptoCurrency Security Standard CCSS.mp4

124.3 MB

DEF CON 27 Blue Team Village - Carlos Garay - Memhunter Automated Hunting Of A Memory Resident Malware At Scale.mp4

94.8 MB

DEF CON 27 Blue Team Village - Cathy Ullman - A Theme Of Fear Hacking The Paradigm.mp4

76.5 MB

DEF CON 27 Blue Team Village - Christine Le - Blue Team Guide For Fresh Eyes.mp4

44.1 MB

DEF CON 27 Blue Team Village - Georgios Kapoglis - Serverless Log Analysis On AWS.mp4

67.1 MB

DEF CON 27 Blue Team Village - Lacie Fan - Killsuit How The Equation Group Remained Out Of Sight For Years.mp4

49.8 MB

DEF CON 27 Blue Team Village - Lak Shmi Sudheer - Who Dis Who Dis The Right Way To Authenticate.mp4

117.1 MB

DEF CON 27 Blue Team Village - Mark Orlando - When A Plan Comes Together Building a SOC A-Team.mp4

32.6 MB

DEF CON 27 Blue Team Village - Norman Lundt - Extending Zeek For ICS Defense.mp4

34.4 MB

DEF CON 27 Blue Team Village - Scoubi - BloodHound From Red to Blue 1 point 5.mp4

93.0 MB

DEF CON 27 Blue Team Village - Shawn Thomas - An Introduction To Malware Analysis.mp4

90.7 MB

DEF CON 27 Blue Team Village - Siyu Zhu - Evaded Microsoft ATA.mp4

72.5 MB

DEF CON 27 Blue Team Village - ch33r10 - The Cyber Threat Intelligence Mindset.mp4

56.4 MB

DEF CON 27 Blue Team Village - claushoumann - Security Strategy for Small-Medium Business.mp4

110.3 MB

DEF CON 27 Blue Team Village - dumby - Anatomy Of A Megabreach Equifax Report.mp4

77.8 MB

DEF CON 27 Car Hacking Village - Aaron Cornelius - Intro to UDS.mp4

84.3 MB

DEF CON 27 Car Hacking Village - Elijah Roberts - Tell Me Lies Automotive LIDAR and Low-Tech Obfuscation.mp4

90.5 MB

DEF CON 27 Car Hacking Village - Greg Hogan - Reverse Engineering and Flashing ECU Firmware Updates.mp4

103.3 MB

DEF CON 27 Car Hacking Village - Ken Munro - Lojackd pwning car alarms vehicle trackers and immobilisers.mp4

52.3 MB

DEF CON 27 Car Hacking Village - Lennert Wouters - Fast Furious and Insecure Passive Keyless Entry and Start Systems.mp4

70.9 MB

DEF CON 27 Car Hacking Village - Neiko Rivera - Infotainment Hacking.mp4

54.4 MB

DEF CON 27 Car Hacking Village - Rotem Bar - Hacking into Automotive Clouds.mp4

104.3 MB

DEF CON 27 Car Hacking Village - Victor Murray - Legal Over-the-Air Spoofing of GNSS and its Effects on Autonomous Vehicles.mp4

52.9 MB

DEF CON 27 Cloud Village - Ayman Elsawah - Using Paretos Primciple for Securing AWS with SCPs.mp4

118.6 MB

DEF CON 27 Cloud Village - Chris Le Roy - Build to Hack Hack to Build.mp4

110.6 MB

DEF CON 27 Cloud Village - Erick Galinkin - Your Blacklist is Dead Airgap Everything.mp4

79.0 MB

DEF CON 27 Cloud Village - James Strassburg - Scaling Security in the Cloud with Open Source.mp4

108.1 MB

DEF CON 27 Cloud Village - Jenko Hwong - Exploiting AWS loopholes with temporary credentials.mp4

94.1 MB

DEF CON 27 Cloud Village - Rod Soto - Using Splunk or ELK for Auditing AWS GCP Azure Security Posture.mp4

103.1 MB

DEF CON 27 Cloud Village - Rotem Bar - Hacking into Automative Clouds.mp4

133.2 MB

DEF CON 27 Cloud Village - Setu Parimi - PacBot Policy as Code from T-Mobile OSS.mp4

89.3 MB

DEF CON 27 Cloud Village - Tanya Janca - DYI Azure Security Assesment.mp4

136.4 MB

DEF CON 27 Crypto and Privacy Village - Ben Brecht - MITM mixed mode butterfly key privacy attack.mp4

72.3 MB

DEF CON 27 Crypto and Privacy Village - Cat Murdock - Black Mirror You are your own privacy nightmare.mp4

129.6 MB

DEF CON 27 Crypto and Privacy Village - Cathie Yun - Implementing a Zero Knowledge Proof or How to Write Bulletproofs in Rust.mp4

94.7 MB

DEF CON 27 Crypto and Privacy Village - Chris Hanlon - TLS decryption attacks and back-doors to secure systems.mp4

71.9 MB

DEF CON 27 Crypto and Privacy Village - Christian Paquin - Migrating to quantum-safe crypto to protect.mp4

49.4 MB

DEF CON 27 Crypto and Privacy Village - Ethan Gregory Dodge - Scrubber An open source compilation to protect journalistic sources.mp4

42.6 MB

DEF CON 27 Crypto and Privacy Village - Harlo Holmes - Tiplines Today.mp4

128.3 MB

DEF CON 27 Crypto and Privacy Village - Karl Koscher - Enabling HTTPS for home network devices using Lets Encrypt.mp4

41.9 MB

DEF CON 27 Crypto and Privacy Village - Kate Rose - Adversarial Fashion Sartorial Hacking to Combat Surveillance.mp4

111.3 MB

DEF CON 27 Crypto and Privacy Village - Katelyn Bowden - Fighting non consensual pornography the BADASS way.mp4

114.6 MB

DEF CON 27 Crypto and Privacy Village - Mark B Cooper - How PKI and SHAKEN STIR Will Fix the Global Robocall Problem.mp4

109.0 MB

DEF CON 27 Crypto and Privacy Village - Mike Kiser - I am Spartacus And You Can Be Too Ensuring Privacy through Obfuscation.mp4

131.4 MB

DEF CON 27 Crypto and Privacy Village - Riana Pfefferkorn - Compelled Device Decryption and the 5th Amendment.mp4

59.2 MB

DEF CON 27 Crypto and Privacy Village - Sarah McCarthy - Stop right now Quantum-Safe Instantaneous Vehicle to Vehicle communication.mp4

36.1 MB

DEF CON 27 Crypto and Privacy Village - Steve Thomas - Easy PAKE Oven.mp4

87.1 MB

DEF CON 27 Crypto and Privacy Village - Suchismita Pahi - How to Effectively Integrate Your Companys Privacy Legal and Sec.mp4

199.5 MB

DEF CON 27 Crypto and Privacy Village - Tiffany Li - Stop Facebook From Buying Your Privacy.mp4

69.0 MB

DEF CON 27 Crypto and Privacy Village - Tyler Kell - Towards Usable Dining Cryptographer Networks with Howl.mp4

43.8 MB

DEF CON 27 Crypto and Privacy Village - Vitor Ventura - Snoop all Telegram messages.mp4

63.9 MB

DEF CON 27 DroneWars Village - Ryan Schonfeld - SWARM.mp4

69.8 MB

DEF CON 27 Ethics Village - Anthony Ferrante - Coffee Talk.mp4

185.3 MB

DEF CON 27 Ethics Village - Dr Suzanne Schwartz FDA - Coffee Talk.mp4

207.0 MB

DEF CON 27 Ethics Village - Jake Williams - Ethical Issues in Cyber Attribution.mp4

228.0 MB

DEF CON 27 Ethics Village - Kyle Wiens - Void If Removed Securing Our Right to Repair.mp4

293.1 MB

DEF CON 27 Ethics Village - Liz OSullivan - Is It Ethical to Work On Autonomous Weapon Systems.mp4

205.5 MB

DEF CON 27 Ethics Village - Panel - Law Professor Round Robin.mp4

223.1 MB

DEF CON 27 Ethics Village - Renderman - Rant on Disclosure.mp4

221.4 MB

DEF CON 27 Ethics Village - Tom Kopchak - Teaching Consulting Pentesting and Ethics.mp4

274.2 MB

DEF CON 27 Ethics Village - Wendy Edwards - Who is Tracking Your Body Health Apps and Your Privacy.mp4

122.6 MB

DEF CON 27 Hack the Sea Village - Andrew Tierney - Pwning a mobile drilling rig Hacking an oil rig.mp4

105.1 MB

DEF CON 27 Hack the Sea Village - Brian Satira - Opening Remarks.mp4

14.7 MB

DEF CON 27 Hack the Sea Village - Cris DeWitt - Maritime Cyber Policy Panel.mp4

186.3 MB

DEF CON 27 Hack the Sea Village - David Belasco - Finding Flaws in a Satcom Terminal.mp4

77.4 MB

DEF CON 27 Hack the Sea Village - Josh Steinman - National Security Council and Special Assitant for Cyber.mp4

78.0 MB

DEF CON 27 Hack the Sea Village - Julian Blanco - C2 over Maritime AIS and commercial aggregation websites.mp4

54.8 MB

DEF CON 27 Hack the Sea Village - Stephan Gerling - Yacht Hacking from SatCOM to engine control.mp4

204.1 MB

DEF CON 27 Hack the Sea Village - Weston Hecker - PENTESTING How to Get into the Field Explained.mp4

72.9 MB

DEF CON 27 Ham Radio Village - Jason - The RF Dark Arts.mp4

86.6 MB

DEF CON 27 Ham Radio Village - Mark KR6ZY - Hunting tape measure yagis and offset attenuators.mp4

69.9 MB

DEF CON 27 Hardware Hacking Village - Allison Marie Naaktgeboren - Reversing Corruption in Seagate HDD Translators.mp4

160.8 MB

DEF CON 27 Hardware Hacking Village - Benjamin Lafois - Another Car Hacking Approach.mp4

193.9 MB

DEF CON 27 Hardware Hacking Village - Wang Kang - Infrared New Threats Meet Old Devices.mp4

55.0 MB

DEF CON 27 ICS Village - Austin Scott - Purple Teaming ICS Networks.mp4

71.7 MB

DEF CON 27 ICS Village - Bryson Bort - ICS IOT Threat Landscape.mp4

67.3 MB

DEF CON 27 ICS Village - Chris Kubecka - Hack the World and Galaxy with OSINT.mp4

99.5 MB

DEF CON 27 ICS Village - Daniel dos Santos - Abusing the IoT in Smart Buildings.mp4

73.5 MB

DEF CON 27 ICS Village - Douglas McKee - HVACking Understand the difference Between Security and Reality.mp4

85.3 MB

DEF CON 27 ICS Village - Jack Oden - IT OT Convergence Are We There Yet.mp4

65.2 MB

DEF CON 27 ICS Village - Joe Slowik - CRASHOVERRIDE Re-Assessing the 2016 Ukraine Electric Power Event.mp4

84.5 MB

DEF CON 27 ICS Village - Joseph Bingham - SCADA What the next Stuxnet will look like and how to prevent it.mp4

77.8 MB

DEF CON 27 ICS Village - Monta Elkins - Nation State Supply Chain Attacks for Dummies or Chipping Cisco Firewalls.mp4

70.8 MB

DEF CON 27 ICS Village - Ryan Leirvik - Pin the tail on the cyber owner.mp4

99.7 MB

DEF CON 27 ICS Village - Sharon Brizinov - Changium IPiosa most magical change IP packets in the wild.mp4

78.7 MB

DEF CON 27 IoT Village - Alex Jay Balan - Next-gen IoT Botnets 3 moar ownage.mp4

120.0 MB

DEF CON 27 IoT Village - Amit Elazari - Regulatory Trends in IoT Security and impact on the research community.mp4

88.9 MB

DEF CON 27 IoT Village - BITFI You Wouldnt Steal My Cloins.mp4

67.3 MB

DEF CON 27 IoT Village - Bertin Bervis - Mixing industrial protocols with web application security flaws in order to exploit OT devices.mp4

81.9 MB

DEF CON 27 IoT Village - Daniel Wegemer - Fitbit Firmware Hacking - The Current State of the Heart.mp4

94.4 MB

DEF CON 27 IoT Village - Dennis Giese - Privacy leaks in smart devices Extracting data from used smart home devices.mp4

107.4 MB

DEF CON 27 IoT Village - Elvis Collado - Greenwaves and Ham.mp4

101.2 MB

DEF CON 27 IoT Village - Hyejin Jeong - HACK DMI PWNING HDMI FOR FUN AND PROFIT.mp4

60.1 MB

DEF CON 27 IoT Village - Lee Brotherston - A Glorious Celebration of IoT Security.mp4

63.5 MB

DEF CON 27 IoT Village - M Can Kurnaz - Get your next roadtrip for free Long live the vulnerable EV charging points.mp4

35.0 MB

DEF CON 27 IoT Village - Maxwell Dulin - Hacking the Zyxel NAS 326 from the Perspective of a n00b.mp4

65.1 MB

DEF CON 27 IoT Village - Michael Raggo - Spy versus Spy who is watching who.mp4

58.8 MB

DEF CON 27 IoT Village - Panel - IoT Security and Manufacturers Q and A Panel.mp4

96.2 MB

DEF CON 27 IoT Village - Rick Ramgattie - SOHOpelessly Broken 2 point 0.mp4

147.7 MB

DEF CON 27 Monero Village - AJ Santos - Houston we have a problem 86R HB 4371 is a no-go.mp4

88.4 MB

DEF CON 27 Monero Village - Allan Stevo - InfoSec vs Hacker The War for the Soul of a Technology.mp4

92.1 MB

DEF CON 27 Monero Village - Amir Montazery - The Cost of Good Open Source Software.mp4

87.6 MB

DEF CON 27 Monero Village - Cathie Yun - Bulletproofs - deep dive.mp4

136.4 MB

DEF CON 27 Monero Village - Daniel Kim - Keynote Speech Monero Introduction and Investor Perspective.mp4

204.5 MB

DEF CON 27 Monero Village - Diego - Monero is UGLY and DIFFICULT to use.mp4

135.8 MB

DEF CON 27 Monero Village - Dr Jeremy Gillula - Encrypting the Web Isnt Enough How EFF Plans to Encrypt the Entire Internet.mp4

210.2 MB

DEF CON 27 Monero Village - Francisco Cabanas - The Critical Role of the Minimum Block Reward Trail Emission in Monero.mp4

83.6 MB

DEF CON 27 Monero Village - Gus Clarke - Tale of Two Tongues Examining Two Mimblewimble Protocols and More.mp4

79.5 MB

DEF CON 27 Monero Village - Justin Ehrenhofer - Improving Monero Release Schedule.mp4

106.0 MB

DEF CON 27 Monero Village - Kristy-Leigh Minehan - The Future of Accessible Mining.mp4

88.4 MB

DEF CON 27 Monero Village - Reuben Yap - Handling Broken cryptography and building a new one.mp4

86.2 MB

DEF CON 27 Monero Village - Robin Renwick - Perspective of Privacy Blockchain as a Boundary Object.mp4

60.2 MB

DEF CON 27 Monero Village - Sarang Noether PhD - If You Like It Then You Should Have Put a Ring Signature On It.mp4

106.0 MB

DEF CON 27 Monero Village - Vik Sharma - Creating cake from Scratch.mp4

33.9 MB

DEF CON 27 Packet Hacking Village - Adam - Security to Make the CFO Happy.mp4

41.6 MB

DEF CON 27 Packet Hacking Village - Besim Altinok - Wi-Fi Threat Modeling and Monitoring.mp4

116.3 MB

DEF CON 27 Packet Hacking Village - Cesare Pizzi - Sandbox Creative Usage For Fun and Pro Blems.mp4

47.3 MB

DEF CON 27 Packet Hacking Village - Cheryl Biswas - Patching It is Complicated.mp4

71.6 MB

DEF CON 27 Packet Hacking Village - D9 - Hacking Corporate Org Socialization One Day You Are Out and the Next Day You Pwn the Org.mp4

108.3 MB

DEF CON 27 Packet Hacking Village - Emilio Couto - CIRCO Cisco Implant Raspberry Controlled Operations.mp4

144.4 MB

DEF CON 27 Packet Hacking Village - Gleb Esman - Solving Crimes with Wireless GeoFencing and Multi-Zone Correlation Analytics.mp4

120.7 MB

DEF CON 27 Packet Hacking Village - Jay Beale - Attacking and Defending Kubernetes.mp4

115.4 MB

DEF CON 27 Packet Hacking Village - Jay Dimartino - The Art of Detection.mp4

81.3 MB

DEF CON 27 Packet Hacking Village - Jeff Man - Rethinking Security Given the Spectre of a Meltdown.mp4

124.5 MB

DEF CON 27 Packet Hacking Village - Joseph Muniz - Old Tech vs New Adversaries Round 1.mp4

70.2 MB

DEF CON 27 Packet Hacking Village - Matt Nash - Head in the Clouds.mp4

80.2 MB

DEF CON 27 Packet Hacking Village - Mike Raggo - StegoAugmented Malware.mp4

89.3 MB

DEF CON 27 Packet Hacking Village - Russell Butturini - Phishing Freakonomics.mp4

122.5 MB

DEF CON 27 Packet Hacking Village - Sam Erb - Hunting Certificates and Servers.mp4

33.5 MB

DEF CON 27 Packet Hacking Village - Tom Kopchak - Lessons Learned from Running a National Penetration Testing Competition.mp4

115.3 MB

DEF CON 27 Packet Hacking Village - Travis Palmer - First-Try DNS Cache Poisoning with IPv4 and IPv6 Fragmentation.mp4

103.8 MB

DEF CON 27 Packet Hacking Village - Utku Sen - Generating Personalized Wordlists With NLP by Analyzing Tweets.mp4

53.1 MB

DEF CON 27 Packet Hacking Village - Winnona DeSombre - Bestsellers in the Underground Economy Measuring Malware Popularity by Forum.mp4

96.9 MB

DEF CON 27 Recon Village - Adrian Korn - The OSINT space is Growing Are we Ready.mp4

62.7 MB

DEF CON 27 Recon Village - Alina Dorina - Using Cloud Services for Dial-In Reconnaissance Automation.mp4

58.2 MB

DEF CON 27 Recon Village - Anthony Rose - Hack to Basics Adapting Exploit Frameworks to Evade Microsoft ATP.mp4

83.7 MB

DEF CON 27 Recon Village - Bug Crowd - Lets get technical and hunt harder.mp4

78.6 MB

DEF CON 27 Recon Village - Jaime Sanchez - Derevolutionizing OS Fingerprinting the cat and mouse game.mp4

97.7 MB

DEF CON 27 Recon Village - Jeff Foley - Advanced Recon with OWASP Amass.mp4

72.8 MB

DEF CON 27 Recon Village - Joe Gray -DECEPTICON OPSEC to Slow the OSINT.mp4

143.2 MB

DEF CON 27 Recon Village - Kala Kinyon - Use Responsibly Recon Like an insider threat for Best User Training ROI.mp4

58.8 MB

DEF CON 27 Recon Village - Martin Vigo - From email address to phone number.mp4

103.2 MB

DEF CON 27 Recon Village - Master Chen - A URL Shortened By Any Other Name.mp4

60.2 MB

DEF CON 27 Recon Village - Mitchell Parker - Building an OSINT and Recon Program to address Healthcare Information Security.mp4

100.0 MB

DEF CON 27 Recon Village - Richard Gold - Asset Discovery Making Sense of the Ocean of OSINT.mp4

106.4 MB

DEF CON 27 Recon Village - Robert Sell - Hack the Planet Hackers Influencing Positive Change.mp4

70.2 MB

DEF CON 27 Recon Village - Seyfullah KILIC - OSINT Approach in Big-Data.mp4

107.2 MB

DEF CON 27 Recon Village - Susan - Social Media The New Court of Public opinion.mp4

89.2 MB

DEF CON 27 Recon Village - Utku Sen - Generating Personalized Wordlists by Analyzing Targets Tweets.mp4

43.0 MB

DEF CON 27 Recon Village - Wicked Clown - Finding the needle in the twitter haystack.mp4

37.0 MB

DEF CON 27 Recon Village - William Suthers - PIE - A hardware based Prebellico Intelligence Exfiltration Botnet.mp4

140.2 MB

DEF CON 27 Red Team Offensive Village - Adrian Sanabria - Red Team Framework RTF.mp4

161.6 MB

DEF CON 27 Red Team Offensive Village - Alvaro Folgado - SiestaTime an Automation Tool for Long-term Implants and Infrastructure Deployment.mp4

91.9 MB

DEF CON 27 Red Team Offensive Village - Casey Erdmann - BadSalt Adversarial DevOps.mp4

97.1 MB

DEF CON 27 Red Team Offensive Village - Charles Herring - Breaking NBAD and UEBA Detection.mp4

73.2 MB

DEF CON 27 Red Team Offensive Village - Chris McCoy - Through the Looking Glass Own the Data Center.mp4

97.1 MB

DEF CON 27 Red Team Offensive Village - Nathan Sweaney - Casting with the Pros Tips and Tricks for Effective Phishing.mp4

88.7 MB

DEF CON 27 Social Engineering Village - Andrew Nicholson - Hacking Hollywood.mp4

100.9 MB

DEF CON 27 Social Engineering Village - Billy Boatright - Swing Away How to Conquer Impostor Syndrome.mp4

94.9 MB

DEF CON 27 Social Engineering Village - Chris Hadnagy - SEVillage 10 Year Anniversary a Look Back at what has changed.mp4

218.6 MB

DEF CON 27 Social Engineering Village - Chris Kirsch - Getting Psychic Cold Reading Techniques.mp4

121.6 MB

DEF CON 27 Social Engineering Village - Chris Pritchard - The Basics of Social Engineering How I break in.mp4

81.6 MB

DEF CON 27 Social Engineering Village - Daniel Isler - The Voice Told Me To Do It.mp4

93.6 MB

DEF CON 27 Social Engineering Village - Edward Miroy- Rideshare OSINT Car Based SE For Fun and Profit.mp4

86.7 MB

DEF CON 27 Social Engineering Village - Jayson Street - I PWN thee I PWN thee not.mp4

216.8 MB

DEF CON 27 Social Engineering Village - Marcus Liotta - Leveraging the Insider Threat oh and how to be Awesome.mp4

117.7 MB

DEF CON 27 Social Engineering Village - Micah Zenko - Red Teaming Insights and Examples from Beyond the Infosec Community.mp4

82.2 MB

DEF CON 27 Social Engineering Village - Perry Carpenter - The Aspies Guide to Social Engineering Your Way Through Life.mp4

124.5 MB

DEF CON 27 Social Engineering Village - Rebecca Long - Hacking Your Career Through Social Engineering.mp4

85.3 MB

DEF CON 27 Social Engineering Village - Robin Dreeke - Sizing People Up.mp4

197.0 MB

DEF CON 27 Social Engineering Village - Robin Dreeke - The SEPodcast Episode 120 Live Guest Robin Dreeke.mp4

326.5 MB

DEF CON 27 Social Engineering Village - Ryan MacDougall - OSINT in the Real World.mp4

91.7 MB

DEF CON 27 Social Engineering Village - Shane McCombs - Why vigilantism doesnt work.mp4

91.5 MB

DEF CON 27 Social Engineering Village - Wayne Ronaldson - RED TEAMING FROM DOWN UNDER.mp4

139.9 MB

DEF CON 27 Social Engineering Village -R Paul Wilson - R Paul Wilson.mp4

138.9 MB

DEF CON 27 Voting Village - Alex Stanev - Machine Voting The Bulgarian Experience.mp4

104.4 MB

DEF CON 27 Voting Village - Amber McReynolds - Putting Voters First Expanding Options to Vote.mp4

59.1 MB

DEF CON 27 Voting Village - Brian Varner - Beyond the Voting Machine Other High Value Targets in Todays Election System.mp4

64.3 MB

DEF CON 27 Voting Village - Chris Krebs - Chris Krebs.mp4

61.8 MB

DEF CON 27 Voting Village - Dr Linton Salmon - The DARPA SSITH Program at DEFCON.mp4

100.9 MB

DEF CON 27 Voting Village - Dr Philip Stark - Trustworthy Elections Evidence and Dispute Resolution.mp4

81.2 MB

DEF CON 27 Voting Village - Eric Geller - State and Local Preparations on Election Security in the Aftermath of the Mueller Report.mp4

250.0 MB

DEF CON 27 Voting Village - Evanna Hu - While the Bots Distracted You Overt Russian Information Operations.mp4

80.5 MB

DEF CON 27 Voting Village - Ion Sancho - A First Hand Look at the Multiple Factors Preventing Secure Elections in America.mp4

142.5 MB

DEF CON 27 Voting Village - Jack Cable - Bootstrapping Vulnerability Disclosure For Election Systems.mp4

67.6 MB

DEF CON 27 Voting Village - Jake Braun - Lessons Learned DEF CON Voting.mp4

96.5 MB

DEF CON 27 Voting Village - Jason Hill - Asssessing Election Infrastructure.mp4

107.2 MB

DEF CON 27 Voting Village - John Odum - Addressing the Election Security Threats Posed by Very Small Jurisdictions.mp4

115.5 MB

DEF CON 27 Voting Village - Joseph Marks - Panel.mp4

391.0 MB

DEF CON 27 Voting Village - Kartikeya Kandula - Unclear Ballot Automated Ballot Image Manipulation.mp4

75.3 MB

DEF CON 27 Voting Village - Kate Trimble - Ideas Whose Time Has Come CVD SBOM and SOTA.mp4

82.4 MB

DEF CON 27 Voting Village - Kevin Collier - What Role Can Journalists Play in Securing Elections.mp4

225.1 MB

DEF CON 27 Voting Village - Kimberly Young-McLear - Organizational Cybernetics A Key to Resilience for the Digital Village.mp4

74.3 MB

DEF CON 27 Voting Village - Marian Schneider - If the Voting Systems are Insecure Lets just Vote on Our Phones.mp4

51.2 MB

DEF CON 27 Voting Village - Rahul Patel - Incident Lifecycle and Incident Response Management Planning.mp4

83.6 MB

DEF CON 27 Voting Village - Ron Wyden - Keynote Remarks Senator Ron Wyden.mp4

138.3 MB

DEF CON 27 Voting Village - Sherri Ramsay - 2020 Ready or Not.mp4

157.0 MB

DEF CON 27 Voting Village - Tod Beardsley - Securing Voting Systems Beyond Paper Ballots.mp4

62.8 MB

DEF CON 27 Wireless Village - Alex Zakhorov - Antennas for Surveillance.mp4

56.2 MB

DEF CON 27 Wireless Village - Andres Blanco - Love is in the Air.mp4

49.1 MB

DEF CON 27 Wireless Village - Babak Javadi - Basics of Hacking Physical Access Control Systems and Beyond.mp4

228.6 MB

DEF CON 27 Wireless Village - Besim ALTINOK - edu-driving.mp4

74.4 MB

DEF CON 27 Wireless Village - Eric Johnson - Wi-Fi 6 Deep Dive.mp4

173.0 MB

DEF CON 27 Wireless Village - Eric Reuter - Reversing Wireless model railroad control system.mp4

44.8 MB

DEF CON 27 Wireless Village - Guillemo Pilleux - Hacking Wi-Fi.mp4

226.8 MB

DEF CON 27 Wireless Village - Hak5Crew - Introducing new Hak5 gear.mp4

176.4 MB

DEF CON 27 Wireless Village - Lennart Koopmann - nzyme - A New WiFi Defense System.mp4

104.6 MB

DEF CON 27 Wireless Village - Nishant Sharma - Developing Wifi Access Point.mp4

131.1 MB

DEF CON 27 Wireless Village - Ted - Are you interested in Kismet.mp4

44.9 MB

DEF CON 27 Wireless Village - Woody - The Ford Hack Raptor Captor.mp4

135.5 MB

DEF CON 27 Wireless Village - m1n1 - Hunting Mobile Rogue Access Points with Wireless Mesh Implants.mp4

126.8 MB

DEF CON 27 Wireless Village - s0lst1c3 - War Never Changes Attacks Against WPA3s Enhanced Open.mp4

130.7 MB

DEF CON 27 Wireless Village - the Ricks - WCTF Gear Talk.mp4

353.0 MB

/DEF CON 27 workshops/

DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion-Notes.pdf

2.1 MB

DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf

4.9 MB

DEFCON-27-Workshop-Dino-Covotsos-Hack-to-basics.pdf

6.0 MB

DEFCON-27-Workshop-Guillaume-Ross-Defending-environments-and-hunting-malware-with-osquery-Updated.pdf

16.0 MB

DEFCON-27-Workshop-Guillaume-Ross-Defending-environments-and-hunting-malware-with-osquery.pdf

11.3 MB

DEFCON-27-Workshop-Hugo-Trovao-and-Rushikesh-Nandedkar-scapyDojo-v1.pdf

2.5 MB

DEFCON-27-Workshop-Isaac-Evans-Discover-Exploit-and-Eradicate-Entire-Vulnerability-Classes-at-Scale-Handout.pdf

666.7 KB

DEFCON-27-Workshop-Isaac-Evans-Discover-Exploit-and-Eradicate-Entire-Vulnerability-Classes-at-Scale-Slides-Updated.pdf

6.5 MB

DEFCON-27-Workshop-Isaac-Evans-Discover-Exploit-and-Eradicate-Entire-Vulnerability-Classes-at-Scale-Slides.pdf

3.2 MB

DEFCON-27-Workshop-Josh-Reynolds-FROM-EK-to-Dek-Manual.pdf

1.3 MB

DEFCON-27-Workshop-Josh-Reynolds-FROM-EK-to-Dek-Slides.pdf

2.5 MB

DEFCON-27-Workshop-Kristy-Westphal-Analysis-101.pdf

4.5 MB

DEFCON-27-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf

1.9 MB

DEFCON-27-Workshop-Mauricio-Velazco-Writing-Custom-Paylods.pdf

4.1 MB

DEFCON-27-Workshop-Polito-Hacking-the-Android-APK.pdf

2.0 MB

DEFCON-27-Workshop-Richard-Gold-Mind-The-Gap.pdf

3.8 MB

DEFCON-27-Workshop-Ryan-Chapman-Understanding-and-Analyzing-Weaponized-Carrier-Files-Updated.pdf

9.5 MB

DEFCON-27-Workshop-Ryan-Chapman-Understanding-and-Analyzing-Weaponized-Carrier-Files.pdf

4.1 MB

DEFCON-27-Workshop-Yacin-Nadji-Hands-On-Adverserial-Machine-Learning.pdf

14.9 MB

DEFCON-27-Workshop-eigentourist-Hacking-with-Monads.pdf

4.1 MB

DEFCON-27-Workshops-Elad-Shamir-and-Matt-Bush-Constructing-Kerberos-Attacks-with-Delegation-Primitives.pdf

20.0 MB

/update/.disk/

archive_trace

0.0 KB

info

0.1 KB

mkisofs

0.6 KB

/update/EFI/boot/

bootia32.efi

290.8 KB

bootx64.efi

1.3 MB

grubx64.efi

1.2 MB

/update/boot/grub/

dejavu-bold-14.pf2

191.2 KB

dejavu-bold-16.pf2

212.1 KB

efi.img

2.9 MB

grub.cfg

1.5 KB

loopback.cfg

0.0 KB

splash.png

19.6 KB

unicode.pf2

2.4 MB

/update/boot/grub/i386-efi/

acpi.mod

9.9 KB

adler32.mod

1.3 KB

ahci.mod

15.6 KB

all_video.mod

0.5 KB

aout.mod

1.0 KB

appleldr.mod

3.2 KB

archelp.mod

3.1 KB

at_keyboard.mod

4.3 KB

ata.mod

5.7 KB

backtrace.mod

1.7 KB

bfs.mod

7.1 KB

bitmap.mod

2.4 KB

bitmap_scale.mod

3.8 KB

blocklist.mod

2.2 KB

boot.mod

2.1 KB

bsd.mod

31.0 KB

bswap_test.mod

2.4 KB

btrfs.mod

14.9 KB

bufio.mod

2.2 KB

cat.mod

3.0 KB

cbfs.mod

4.2 KB

cbls.mod

3.6 KB

cbmemc.mod

2.5 KB

cbtable.mod

1.0 KB

cbtime.mod

2.9 KB

chain.mod

5.3 KB

cmdline_cat_test.mod

3.1 KB

cmp.mod

2.0 KB

cmp_test.mod

4.7 KB

command.lst

3.7 KB

cpio.mod

2.8 KB

cpio_be.mod

2.9 KB

cpuid.mod

1.8 KB

crc64.mod

1.7 KB

crypto.lst

0.9 KB

crypto.mod

5.1 KB

cryptodisk.mod

10.2 KB

cs5536.mod

3.9 KB

ctz_test.mod

1.9 KB

date.mod

2.3 KB

datehook.mod

1.8 KB

datetime.mod

1.2 KB

disk.mod

2.4 KB

diskfilter.mod

10.9 KB

div.mod

1.0 KB

div_test.mod

5.6 KB

dm_nv.mod

1.9 KB

echo.mod

2.0 KB

efi_gop.mod

8.0 KB

efi_uga.mod

4.6 KB

efifwsetup.mod

1.6 KB

efinet.mod

6.1 KB

ehci.mod

16.1 KB

elf.mod

4.2 KB

eval.mod

1.5 KB

exfat.mod

5.5 KB

exfctest.mod

1.5 KB

ext2.mod

6.4 KB

extcmd.mod

4.6 KB

fat.mod

5.6 KB

file.mod

17.2 KB

fixvideo.mod

2.0 KB

font.mod

12.7 KB

fs.lst

0.2 KB

gcry_arcfour.mod

1.7 KB

gcry_blowfish.mod

8.3 KB

gcry_camellia.mod

33.6 KB

gcry_cast5.mod

16.4 KB

gcry_crc.mod

10.7 KB

gcry_des.mod

19.2 KB

gcry_dsa.mod

2.3 KB

gcry_idea.mod

3.0 KB

gcry_md4.mod

3.2 KB

gcry_md5.mod

3.8 KB

gcry_rfc2268.mod

2.4 KB

gcry_rijndael.mod

19.5 KB

gcry_rmd160.mod

8.3 KB

gcry_rsa.mod

2.1 KB

gcry_seed.mod

15.2 KB

gcry_serpent.mod

17.1 KB

gcry_sha1.mod

8.0 KB

gcry_sha256.mod

4.3 KB

gcry_sha512.mod

9.0 KB

gcry_tiger.mod

12.4 KB

gcry_twofish.mod

36.9 KB

gcry_whirlpool.mod

24.9 KB

gdb.mod

25.3 KB

geli.mod

6.2 KB

gettext.mod

5.1 KB

gfxmenu.mod

41.6 KB

gfxterm.mod

10.1 KB

gfxterm_background.mod

3.0 KB

gfxterm_menu.mod

5.1 KB

gptsync.mod

4.0 KB

grub.cfg

0.2 KB

gzio.mod

8.4 KB

halt.mod

4.1 KB

hashsum.mod

5.4 KB

hdparm.mod

7.3 KB

help.mod

2.6 KB

hexdump.mod

3.2 KB

hfs.mod

7.1 KB

hfsplus.mod

8.0 KB

hfspluscomp.mod

3.2 KB

http.mod

6.1 KB

iorw.mod

2.9 KB

jfs.mod

6.2 KB

jpeg.mod

6.3 KB

keylayouts.mod

5.1 KB

keystatus.mod

2.0 KB

ldm.mod

6.7 KB

legacy_password_test.mod

14.5 KB

legacycfg.mod

31.5 KB

linux.mod

12.9 KB

linux16.mod

8.2 KB

linuxefi.mod

6.4 KB

loadbios.mod

3.1 KB

loadenv.mod

6.1 KB

loopback.mod

3.1 KB

ls.mod

4.2 KB

lsacpi.mod

4.8 KB

lsefi.mod

3.7 KB

lsefimmap.mod

2.7 KB

lsefisystab.mod

3.0 KB

lsmmap.mod

1.9 KB

lspci.mod

4.9 KB

lssal.mod

2.7 KB

luks.mod

7.0 KB

lvm.mod

7.0 KB

lzopio.mod

5.3 KB

macbless.mod

3.3 KB

macho.mod

7.7 KB

mdraid09.mod

2.0 KB

mdraid09_be.mod

2.1 KB

mdraid1x.mod

2.0 KB

memrw.mod

2.9 KB

minicmd.mod

3.5 KB

minix2.mod

3.8 KB

minix2_be.mod

3.9 KB

minix3.mod

3.7 KB

minix3_be.mod

3.9 KB

minix_be.mod

3.8 KB

mmap.mod

6.8 KB

moddep.lst

5.1 KB

morse.mod

2.4 KB

mpi.mod

28.5 KB

msdospart.mod

2.5 KB

mul_test.mod

2.1 KB

multiboot.mod

13.3 KB

multiboot2.mod

15.5 KB

nativedisk.mod

4.4 KB

net.mod

57.1 KB

newc.mod

3.1 KB

normal.mod

120.0 KB

ntfs.mod

10.4 KB

ntfscomp.mod

4.4 KB

odc.mod

2.9 KB

offsetio.mod

1.6 KB

ohci.mod

10.5 KB

part_acorn.mod

1.6 KB

part_amiga.mod

1.9 KB

part_apple.mod

2.1 KB

part_bsd.mod

2.9 KB

part_dfly.mod

1.8 KB

part_dvh.mod

1.5 KB

part_gpt.mod

2.4 KB

part_msdos.mod

2.3 KB

part_plan.mod

1.8 KB

part_sun.mod

1.5 KB

part_sunpc.mod

1.7 KB

partmap.lst

0.1 KB

parttool.lst

0.0 KB

parttool.mod

5.0 KB

password.mod

1.9 KB

password_pbkdf2.mod

2.9 KB

pata.mod

4.9 KB

pbkdf2.mod

1.5 KB

pbkdf2_test.mod

2.2 KB

pcidump.mod

2.5 KB

play.mod

2.5 KB

png.mod

7.6 KB

priority_queue.mod

1.6 KB

probe.mod

2.7 KB

procfs.mod

2.4 KB

progress.mod

2.2 KB

raid5rec.mod

1.4 KB

raid6rec.mod

2.2 KB

random.mod

2.5 KB

read.mod

1.5 KB

reboot.mod

1.7 KB

regexp.mod

51.9 KB

reiserfs.mod

9.0 KB

relocator.mod

17.9 KB

romfs.mod

4.3 KB

scsi.mod

4.8 KB

serial.mod

9.3 KB

setjmp.mod

0.7 KB

setjmp_test.mod

1.7 KB

setpci.mod

5.4 KB

shift_test.mod

2.5 KB

signature_test.mod

6.6 KB

sleep.mod

2.3 KB

sleep_test.mod

2.3 KB

spkmodem.mod

2.1 KB

squash4.mod

7.3 KB

syslinuxcfg.mod

18.3 KB

terminal.lst

0.2 KB

terminal.mod

4.8 KB

terminfo.mod

12.4 KB

test.mod

5.4 KB

test_blockarg.mod

1.4 KB

testload.mod

2.7 KB

testspeed.mod

2.4 KB

tftp.mod

5.7 KB

tga.mod

4.5 KB

time.mod

1.6 KB

tr.mod

2.5 KB

trig.mod

1.8 KB

true.mod

1.2 KB

udf.mod

8.0 KB

ufs1.mod

5.4 KB

ufs1_be.mod

5.8 KB

ufs2.mod

5.5 KB

uhci.mod

6.7 KB

usb.mod

10.8 KB

usb_keyboard.mod

4.0 KB

usbms.mod

7.0 KB

usbserial_common.mod

2.0 KB

usbserial_ftdi.mod

2.4 KB

usbserial_pl2303.mod

2.7 KB

usbserial_usbdebug.mod

1.5 KB

usbtest.mod

3.6 KB

verify.mod

12.4 KB

video.lst

0.0 KB

video.mod

6.0 KB

video_bochs.mod

5.7 KB

video_cirrus.mod

6.1 KB

video_colors.mod

5.7 KB

video_fb.mod

21.2 KB

videoinfo.mod

3.9 KB

videotest.mod

4.1 KB

videotest_checksum.mod

2.4 KB

xfs.mod

7.6 KB

xnu.mod

27.9 KB

xnu_uuid.mod

2.2 KB

xnu_uuid_test.mod

2.0 KB

xzio.mod

16.1 KB

zfscrypt.mod

5.6 KB

/update/boot/grub/live-theme/

theme.txt

1.1 KB

/.../x86_64-efi/

acpi.mod

15.4 KB

adler32.mod

1.9 KB

ahci.mod

22.7 KB

all_video.mod

0.7 KB

aout.mod

1.5 KB

appleldr.mod

5.2 KB

archelp.mod

4.5 KB

at_keyboard.mod

7.1 KB

ata.mod

8.9 KB

backtrace.mod

2.5 KB

bfs.mod

9.3 KB

bitmap.mod

3.1 KB

bitmap_scale.mod

5.3 KB

blocklist.mod

3.1 KB

boot.mod

3.2 KB

bsd.mod

47.9 KB

bswap_test.mod

3.3 KB

btrfs.mod

19.6 KB

bufio.mod

2.9 KB

cat.mod

4.4 KB

cbfs.mod

5.7 KB

cbls.mod

6.2 KB

cbmemc.mod

3.8 KB

cbtable.mod

1.4 KB

cbtime.mod

4.5 KB

chain.mod

8.4 KB

cmdline_cat_test.mod

4.7 KB

cmp.mod

2.9 KB

cmp_test.mod

6.6 KB

command.lst

3.6 KB

cpio.mod

4.3 KB

cpio_be.mod

4.3 KB

cpuid.mod

2.6 KB

crc64.mod

2.2 KB

crypto.lst

0.9 KB

crypto.mod

6.9 KB

cryptodisk.mod

15.7 KB

cs5536.mod

3.8 KB

ctz_test.mod

2.7 KB

date.mod

3.2 KB

datehook.mod

3.0 KB

datetime.mod

1.9 KB

disk.mod

3.1 KB

diskfilter.mod

14.6 KB

div.mod

1.4 KB

div_test.mod

8.2 KB

dm_nv.mod

2.7 KB

echo.mod

3.0 KB

efi_gop.mod

12.5 KB

efi_uga.mod

7.0 KB

efifwsetup.mod

2.2 KB

efinet.mod

10.1 KB

ehci.mod

25.4 KB

elf.mod

6.2 KB

eval.mod

2.2 KB

exfat.mod

8.0 KB

exfctest.mod

2.3 KB

ext2.mod

8.8 KB

extcmd.mod

6.9 KB

fat.mod

8.1 KB

file.mod

25.2 KB

fixvideo.mod

3.0 KB

font.mod

17.0 KB

fs.lst

0.2 KB

gcry_arcfour.mod

2.4 KB

gcry_blowfish.mod

9.0 KB

gcry_camellia.mod

28.4 KB

gcry_cast5.mod

14.8 KB

gcry_crc.mod

11.9 KB

gcry_des.mod

16.4 KB

gcry_dsa.mod

3.4 KB

gcry_idea.mod

4.0 KB

gcry_md4.mod

4.2 KB

gcry_md5.mod

4.6 KB

gcry_rfc2268.mod

3.2 KB

gcry_rijndael.mod

20.5 KB

gcry_rmd160.mod

7.9 KB

gcry_rsa.mod

3.4 KB

gcry_seed.mod

13.3 KB

gcry_serpent.mod

16.7 KB

gcry_sha1.mod

7.6 KB

gcry_sha256.mod

5.2 KB

gcry_sha512.mod

6.0 KB

gcry_tiger.mod

13.2 KB

gcry_twofish.mod

33.5 KB

gcry_whirlpool.mod

22.9 KB

geli.mod

9.3 KB

gettext.mod

8.4 KB

gfxmenu.mod

58.8 KB

gfxterm.mod

16.8 KB

gfxterm_background.mod

4.4 KB

gfxterm_menu.mod

7.8 KB

gptsync.mod

5.3 KB

grub.cfg

0.2 KB

gzio.mod

11.4 KB

halt.mod

6.7 KB

hashsum.mod

8.5 KB

hdparm.mod

11.2 KB

help.mod

3.9 KB

hexdump.mod

4.4 KB

hfs.mod

10.0 KB

hfsplus.mod

10.6 KB

hfspluscomp.mod

4.3 KB

http.mod

9.3 KB

iorw.mod

4.5 KB

jfs.mod

8.6 KB

jpeg.mod

8.8 KB

keylayouts.mod

6.4 KB

keystatus.mod

3.0 KB

ldm.mod

8.0 KB

legacy_password_test.mod

15.9 KB

legacycfg.mod

44.6 KB

linux.mod

20.3 KB

linux16.mod

12.3 KB

linuxefi.mod

10.1 KB

loadbios.mod

4.6 KB

loadenv.mod

9.3 KB

loopback.mod

4.7 KB

ls.mod

6.6 KB

lsacpi.mod

7.1 KB

lsefi.mod

5.2 KB

lsefimmap.mod

3.6 KB

lsefisystab.mod

4.2 KB

lsmmap.mod

2.9 KB

lspci.mod

7.2 KB

lssal.mod

3.8 KB

luks.mod

9.7 KB

lvm.mod

9.5 KB

lzopio.mod

7.4 KB

macbless.mod

4.9 KB

macho.mod

10.7 KB

mdraid09.mod

2.8 KB

mdraid09_be.mod

2.8 KB

mdraid1x.mod

2.6 KB

memrw.mod

4.5 KB

minicmd.mod

5.6 KB

minix2.mod

5.6 KB

minix2_be.mod

5.7 KB

minix3.mod

5.6 KB

minix3_be.mod

5.7 KB

minix_be.mod

5.6 KB

mmap.mod

9.4 KB

moddep.lst

5.0 KB

morse.mod

3.3 KB

mpi.mod

42.9 KB

msdospart.mod

3.7 KB

mul_test.mod

2.4 KB

multiboot.mod

20.0 KB

multiboot2.mod

23.4 KB

nativedisk.mod

6.6 KB

net.mod

87.3 KB

newc.mod

4.5 KB

normal.mod

173.1 KB

ntfs.mod

15.1 KB

ntfscomp.mod

5.7 KB

odc.mod

4.3 KB

offsetio.mod

2.2 KB

ohci.mod

15.8 KB

part_acorn.mod

2.3 KB

part_amiga.mod

2.6 KB

part_apple.mod

3.0 KB

part_bsd.mod

4.2 KB

part_dfly.mod

2.6 KB

part_dvh.mod

2.2 KB

part_gpt.mod

3.2 KB

part_msdos.mod

3.0 KB

part_plan.mod

2.5 KB

part_sun.mod

2.2 KB

part_sunpc.mod

2.5 KB

partmap.lst

0.1 KB

parttool.lst

0.0 KB

parttool.mod

7.3 KB

password.mod

2.9 KB

password_pbkdf2.mod

4.4 KB

pata.mod

7.4 KB

pbkdf2.mod

2.0 KB

pbkdf2_test.mod

3.4 KB

pcidump.mod

3.5 KB

play.mod

4.0 KB

png.mod

10.2 KB

priority_queue.mod

2.2 KB

probe.mod

4.3 KB

procfs.mod

3.8 KB

progress.mod

3.1 KB

raid5rec.mod

2.0 KB

raid6rec.mod

3.2 KB

random.mod

3.6 KB

read.mod

2.3 KB

reboot.mod

1.8 KB

regexp.mod

75.2 KB

reiserfs.mod

13.7 KB

relocator.mod

26.0 KB

romfs.mod

5.7 KB

scsi.mod

7.0 KB

serial.mod

14.6 KB

setjmp.mod

1.0 KB

setjmp_test.mod

2.6 KB

setpci.mod

8.3 KB

shift_test.mod

3.2 KB

signature_test.mod

8.7 KB

sleep.mod

3.5 KB

sleep_test.mod

3.3 KB

spkmodem.mod

3.2 KB

squash4.mod

9.9 KB

syslinuxcfg.mod

29.7 KB

terminal.lst

0.2 KB

terminal.mod

6.8 KB

terminfo.mod

18.8 KB

test.mod

7.6 KB

test_blockarg.mod

2.0 KB

testload.mod

3.8 KB

testspeed.mod

3.5 KB

tftp.mod

8.6 KB

tga.mod

6.4 KB

time.mod

2.3 KB

tr.mod

3.7 KB

trig.mod

2.1 KB

true.mod

1.9 KB

udf.mod

11.0 KB

ufs1.mod

7.7 KB

ufs1_be.mod

7.8 KB

ufs2.mod

7.7 KB

uhci.mod

10.1 KB

usb.mod

15.5 KB

usb_keyboard.mod

5.8 KB

usbms.mod

10.9 KB

usbserial_common.mod

2.9 KB

usbserial_ftdi.mod

3.4 KB

usbserial_pl2303.mod

3.8 KB

usbserial_usbdebug.mod

2.3 KB

usbtest.mod

5.5 KB

verify.mod

19.7 KB

video.lst

0.0 KB

video.mod

8.9 KB

video_bochs.mod

8.4 KB

video_cirrus.mod

9.0 KB

video_colors.mod

10.0 KB

video_fb.mod

28.2 KB

videoinfo.mod

5.3 KB

videotest.mod

5.5 KB

videotest_checksum.mod

3.8 KB

xfs.mod

10.4 KB

xnu.mod

41.4 KB

xnu_uuid.mod

3.3 KB

xnu_uuid_test.mod

3.3 KB

xzio.mod

19.8 KB

zfscrypt.mod

8.4 KB

/update/isolinux/

advanced.cfg

0.2 KB

boot.cat

2.0 KB

hdt.c32

165.2 KB

install.cfg

0.3 KB

isolinux.bin

38.9 KB

isolinux.cfg

0.1 KB

ldlinux.c32

119.3 KB

libcom32.c32

170.0 KB

libgpl.c32

67.5 KB

libmenu.c32

23.7 KB

libutil.c32

22.7 KB

live.cfg

0.4 KB

menu.cfg

0.3 KB

splash.png

40.7 KB

stdmenu.cfg

0.5 KB

vesamenu.c32

26.8 KB

/update/live/

filesystem.packages

26.0 KB

filesystem.packages-remove

0.0 KB

filesystem.size

0.0 KB

 

Total files 3012


Copyright © 2024 FileMood.com