FileMood

Download DEF CON 29

DEF CON 29

Name

DEF CON 29

 DOWNLOAD Copy Link

Total Size

399.2 GB

Total Files

4328

Last Seen

2024-11-04 02:11

Hash

0427A8545C10142EE678C269A490A193934ECE76

/

DEF CON 29 program.pdf

13.2 MB

DEF CON 29 receipt.pdf

550.3 KB

/DEF CON 29 art contest/

Hacker Empress - Pandemic Love (2020) DC29.jpeg

1.7 MB

Inna Vasilye-Pika DC29.jpg

13.6 MB

Jorge Amezuca DC29.jpg

6.9 MB

Lucy Nguyen DC29.png

488.1 KB

Malin Hess DC29.png

4.9 MB

/DEF CON 29 badge/

DEF CON 29 badge.rar

1.4 GB

/.../Auto Driving CTF/

DEF CON 29 AutoDriving CTF - Junjie Shen - adcprog_env.rar

94.2 MB

DEF CON 29 AutoDriving CTF - Junjie Shen - advnpc_env.rar

169.7 MB

DEF CON 29 AutoDriving CTF - Junjie Shen - gpsspoof_env.rar

164.2 MB

DEF CON 29 AutoDriving CTF - Junjie Shen - lanedet_env.rar

178.0 MB

DEF CON 29 AutoDrivingCTF - Zhisheng - DemoChallenges.mp4

8.5 MB

DEF CON 29 AutoDrivingCTF - Zhisheng - Intro.txt

0.9 KB

DEF CON 29 AutoDrivingCTF - Zhisheng - logo.png

335.8 KB

/.../Sticker Design Contest/

DEF CON 29 Sicker Contest - 1.png

422.9 KB

DEF CON 29 Sicker Contest - 2.png

1.2 MB

DEF CON 29 Sicker Contest - 3.png

2.0 MB

DEF CON 29 Sicker Contest - 4.png

9.9 MB

DEF CON 29 Sicker Contest - 5.png

2.3 MB

DEF CON 29 Sicker Contest - 6.png

6.2 MB

DEF CON 29 Sicker Contest - 7.png

2.7 MB

DEF CON 29 Sicker Contest - 8.png

98.8 KB

DEF CON 29 Sicker Contest - 9.png

3.2 MB

DEF CON 29 Sicker Contest - 10.png

3.0 MB

DEF CON 29 Sicker Contest - 11.png

272.1 KB

DEF CON 29 Sicker Contest - 12.png

2.8 MB

/.../OOO DEF CON 29 CTF Finals/

ctf-announcements-text.txt

26.7 KB

current_score_info.json

142.5 KB

DEF CON 29 - OOO CTF finals pcaps.rar

3.7 GB

end.sql.gz

38.5 MB

info.html

4.0 KB

latest.json

4.1 MB

OOO - DEF CON CTF.htm

22.3 KB

score_data.json

3.0 MB

service_info.json

202.9 KB

/.../OOO - DEF CON CTF_files/

aflike.png

331.8 KB

ooo-logo-175.png

43.3 KB

scoreboard.png

150.3 KB

style.css

5.0 KB

/.../OOO DEF CON 29 CTF Quals/

baby-a-fallen-lap-ray_anonymized_pcaps.rar

36.1 MB

back-to-qoo_anonymized_pcaps.rar

467.3 MB

cozen_anonymized_pcaps.rar

312.1 GB

DC 29 OOO CTF - Quals Map.png

1.2 MB

DEF CON CTF 2021 QUALS OOO - DEF CON CTF.htm

9.5 KB

exploit-for-dummies_anonymized_pcaps.rar

1.1 GB

gran-a-fallen-lap-ray_anonymized_pcaps.rar

23.7 MB

mama-a-fallen-lap-ray_anonymized_pcaps.rar

18.9 MB

mooosl_anonymized_pcaps.rar

97.4 MB

mra_anonymized_pcaps.rar

54.1 MB

nooombers_anonymized_pcaps.rar

343.1 MB

nooopster_anonymized_pcaps.rar

7.2 GB

OOO DEF CON CTF Quals - Challenges.htm

13.6 KB

OOO DEF CON CTF Quals - Rules.htm

8.4 KB

OOO DEF CON CTF Quals - Scoreboard.htm

132.6 KB

OOO DEF CON CTF Quals - Solves.htm

841.5 KB

pooow-buddy_anonymized_pcaps.rar

33.2 MB

pooow-pal_anonymized_pcaps.rar

5.4 GB

qoo-or-ooo_anonymized_pcaps.rar

271.1 MB

rick_anonymized_pcaps.rar

318.2 MB

scoreboard.png

328.9 KB

segnalooo_anonymized_pcaps.rar

58.0 MB

threefactooorx_anonymized.pcaps.rar

440.6 MB

tiamat_anonymized_pcaps.rar

489.5 MB

/.../DEF CON CTF 2021 QUALS OOO - DEF CON CTF_files/

ooo-logo-175.png

43.3 KB

scoreboard.png

328.9 KB

style.css

5.0 KB

/.../OOO DEF CON CTF Quals - Challenges_files/

2.js

283.1 KB

bootstrap.css

155.8 KB

main.css

5.1 KB

main.js

23.0 KB

/.../OOO DEF CON CTF Quals - Rules_files/

2.js

283.1 KB

bootstrap.css

155.8 KB

main.css

5.1 KB

main.js

23.0 KB

/.../OOO DEF CON CTF Quals - Scoreboard_files/

2.js

283.1 KB

bootstrap.css

155.8 KB

main.css

5.1 KB

main.js

23.0 KB

/.../OOO DEF CON CTF Quals - Solves_files/

2.js

283.1 KB

bootstrap.css

155.8 KB

main.css

5.1 KB

main.js

23.0 KB

/DEF CON 29 events/

ToxicBBQ-History-Continuous.pdf

2.9 MB

ToxicBBQ-History-Zine-Printable.pdf

8.6 MB

/.../DEF CON 29 live music - flac/

Abstrct - Thusday Night.flac

439.7 MB

Acid T - Thursday Night.flac

404.3 MB

Ctrl_RSM - Sat Night.flac

367.0 MB

Ctrl_rsm - Thursday Night.flac

382.5 MB

Dr. McGrew - Thursday Night.flac

387.7 MB

FuzzyNop - Friday Night.flac

393.4 MB

Kriz Klink - Saturday Night.flac

351.3 MB

Magik Plan - Friday Night.flac

319.3 MB

Miss Jackalope - Saturday Night.flac

509.5 MB

N0x08 - Friday Night.flac

438.0 MB

Ohm i - Saturday Night.flac

316.0 MB

Scotch and Bubbles - Friday Night.flac

437.3 MB

St3rling - Thursday Night.flac

421.9 MB

Terrestrial Access Network - Pool Friday.flac

400.2 MB

Thaad - Friday Night.flac

408.4 MB

Yesterday & Tomorrow - Pool Friday.flac

385.0 MB

Z3NPI - Pool Friday.flac

421.5 MB

Zebbler Encanti Experience - Saturday Night.flac

367.5 MB

/.../DEF CON 29 live music - opus 320k/

Abstrct - Thusday Night.opus

141.2 MB

Acid T - Thursday Night.opus

136.0 MB

Ctrl_RSM - Sat Night.opus

126.3 MB

Ctrl_rsm - Thursday Night.opus

134.1 MB

Dr. McGrew - Thursday Night.opus

140.4 MB

FuzzyNop - Friday Night.opus

134.7 MB

Kriz Klink - Saturday Night.opus

145.4 MB

Magik Plan - Friday Night.opus

114.0 MB

Miss Jackalope - Saturday Night.opus

163.3 MB

N0x08 - Friday Night.opus

141.8 MB

Ohm i - Saturday Night.opus

136.4 MB

Scotch and Bubbles - Friday Night.opus

141.6 MB

St3rling - Thursday Night.opus

145.0 MB

Terrestrial Access Network - Pool Friday.opus

158.3 MB

Thaad - Friday Night.opus

135.8 MB

Yesterday & Tomorrow - Pool Friday.opus

154.0 MB

Z3NPI - Pool Friday.opus

128.6 MB

Zebbler Encanti Experience - Saturday Night.opus

154.3 MB

/.../DEF CON 29 live music - video/

01 - Abstrct - DEF CON 29 - Thusday Night.mp4

534.5 MB

02 - Dr. McGrew - DEF CON 29 - Thursday Night.mp4

614.9 MB

03 - Ctrl RSM - DEF CON 29 - Thursday Night.mp4

885.1 MB

04 - Acid T - DEF CON 29 - Thursday Night.mp4

647.6 MB

05 - St3rling - DEF CON 29 - Thursday Night.mp4

796.1 MB

06 - Thaad - DEF CON 29 - Friday Night.mp4

803.5 MB

07 - N0x08 - DEF CON 29 - Friday Night.mp4

984.7 MB

08 - Magik Plan - DEF CON 29 - Friday Night.mp4

761.3 MB

09 - FuzzyNop - DEF CON 29 - Friday Night.mp4

973.9 MB

10 - Scotch and Bubbles - DEF CON 29 - Friday Night.mp4

1.1 GB

11 - Ctrl RSM - DEF CON 29 - Saturday Night.mp4

909.6 MB

12 - Zebbler Encanti Experience - DEF CON 29 - Saturday Night.mp4

1.0 GB

13 - Miss Jackalope - DEF CON 29 - Saturday Night.mp4

1.1 GB

14 - Ohm i - DEF CON 29 - Saturday Night.mp4

381.6 MB

15 - Kriz Klink - DEF CON 29 - Saturday Night.mp4

945.7 MB

/.../DEF CON 29 OST - flac/

01 - Skittish & Bus - The Signal (featuring The Dark Tangent).flac

65.2 MB

02 - Archwisp - Throw It Back (featuring Jotunvillur).flac

49.9 MB

03 - RBM - The Incident.flac

116.4 MB

04 - Seeker - Modulations.flac

98.6 MB

05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).flac

60.9 MB

06 - Mateusz Drozd - Station X1 Galaxy Citron.flac

33.9 MB

07 - bash explode - serial.flac

41.2 MB

08 - Synd - Close Your Eyes.flac

71.8 MB

09 - DJ Spin & Tonic - Val's Dragon.flac

40.0 MB

10 - 1336 - Synapticity.flac

33.0 MB

11 - pbarry25 - We're All Alike (Original Mix).flac

34.4 MB

12 - c64 - Sunsetting.flac

50.0 MB

13 - Autocorrect - Outside.flac

21.3 MB

14 - Yung Innanet - Unbound (Max James Remix).flac

34.4 MB

15 - int eighty - No Answer.flac

29.8 MB

16 - Damn The Data - Can't Stop The Signal.flac

59.3 MB

17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).flac

34.7 MB

18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).flac

53.4 MB

19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).flac

49.0 MB

20 - Rushfell - Bad Wisdom.flac

67.0 MB

21 - Dual Core - The Same Time.flac

36.9 MB

cover.png

379.3 KB

DEF CON 29 OST README.txt

2.2 KB

/.../DEF CON 29 OST - opus 320k/

01 - Skittish & Bus - The Signal (featuring The Dark Tangent).opus

12.2 MB

02 - Archwisp - Throw It Back (featuring Jotunvillur).opus

10.8 MB

03 - RBM - The Incident.opus

21.5 MB

04 - Seeker - Modulations.opus

18.2 MB

05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).opus

13.6 MB

06 - Mateusz Drozd - Station X1 Galaxy Citron.opus

7.6 MB

07 - bash explode - serial.opus

10.1 MB

08 - Synd - Close Your Eyes.opus

13.0 MB

09 - DJ Spin & Tonic - Val's Dragon.opus

8.2 MB

10 - 1336 - Synapticity.opus

7.0 MB

11 - pbarry25 - We're All Alike (Original Mix).opus

9.7 MB

12 - c64 - Sunsetting.opus

12.7 MB

13 - Autocorrect - Outside.opus

4.7 MB

14 - Yung Innanet - Unbound (Max James Remix).opus

6.5 MB

15 - int eighty - No Answer.opus

6.4 MB

16 - Damn The Data - Can't Stop The Signal.opus

10.5 MB

17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).opus

6.1 MB

18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).opus

11.3 MB

19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).opus

9.4 MB

20 - Rushfell - Bad Wisdom.opus

13.7 MB

21 - Dual Core - The Same Time.opus

7.5 MB

cover.png

379.3 KB

DEF CON 29 OST README.txt

2.2 KB

/DEF CON 29 pictures/

DEF CON 29 Pictures - ASTcell.jpg

1.1 MB

DEF CON 29 Pictures - Cannibal.jpg

6.8 MB

DEF CON 29 Pictures - Zebbler.jpg

114.0 KB

/.../DEF CON 29 Pictures - ASTcell/

DEF CON 29 - ASTcell - 1.png

1.1 MB

DEF CON 29 - ASTcell - 2.png

1.7 MB

DEF CON 29 - ASTcell - 5.png

1.6 MB

DEF CON 29 - ASTcell - 12.png

1.8 MB

DEF CON 29 - ASTcell - 33.png

1.8 MB

DEF CON 29 - ASTcell - 222.jpg

234.5 KB

DEF CON 29 - ASTcell - 3591.jpg

612.2 KB

DEF CON 29 - ASTcell - 3605.jpg

458.5 KB

DEF CON 29 - ASTcell - 3626.jpg

571.7 KB

DEF CON 29 - ASTcell - 3631.jpg

446.6 KB

DEF CON 29 - ASTcell - 3640.jpg

380.0 KB

DEF CON 29 - ASTcell - 3650.jpg

521.9 KB

DEF CON 29 - ASTcell - 3717.jpg

575.3 KB

DEF CON 29 - ASTcell - 3872.jpg

510.4 KB

DEF CON 29 - ASTcell - 3905-2.jpg

534.5 KB

DEF CON 29 - ASTcell - 3976.jpg

461.0 KB

DEF CON 29 - ASTcell - 4006.jpg

620.2 KB

DEF CON 29 - ASTcell - 4037.jpg

463.6 KB

DEF CON 29 - ASTcell - 4057.jpg

444.7 KB

DEF CON 29 - ASTcell - 4097.jpg

485.3 KB

DEF CON 29 - ASTcell - 4130.jpg

350.6 KB

DEF CON 29 - ASTcell - 4131.jpg

407.6 KB

DEF CON 29 - ASTcell - 4137.jpg

493.1 KB

DEF CON 29 - ASTcell - 4204.jpg

502.2 KB

DEF CON 29 - ASTcell - 4229.jpg

380.7 KB

DEF CON 29 - ASTcell - 4300.jpg

696.2 KB

DEF CON 29 - ASTcell - 4343.jpg

536.7 KB

DEF CON 29 - ASTcell - 4358.jpg

465.7 KB

DEF CON 29 - ASTcell - 4381.jpg

407.1 KB

DEF CON 29 - ASTcell - 4405.jpg

368.2 KB

DEF CON 29 - ASTcell - 4450.jpg

404.9 KB

DEF CON 29 - ASTcell - 4497.jpg

1.0 MB

DEF CON 29 - ASTcell - 4551.jpg

787.1 KB

DEF CON 29 - ASTcell - 4564.jpg

538.8 KB

DEF CON 29 - ASTcell - 4591.jpg

273.1 KB

DEF CON 29 - ASTcell - 4611.jpg

482.9 KB

DEF CON 29 - ASTcell - 5530.JPG

36.4 MB

DEF CON 29 - ASTcell - 5537.jpg

230.8 KB

DEF CON 29 - ASTcell - 5540.jpg

337.3 KB

DEF CON 29 - ASTcell - 5551.JPG

39.1 MB

DEF CON 29 - ASTcell - 5555.jpg

225.2 KB

DEF CON 29 - ASTcell - 5576.JPG

40.6 MB

DEF CON 29 - ASTcell - 5579.JPG

40.9 MB

DEF CON 29 - ASTcell - 5592.JPG

44.0 MB

DEF CON 29 - ASTcell - 5593.jpg

224.2 KB

DEF CON 29 - ASTcell - 5598.jpg

224.5 KB

DEF CON 29 - ASTcell - 5599.JPG

36.5 MB

DEF CON 29 - ASTcell - 5620.jpg

237.7 KB

DEF CON 29 - ASTcell - 5624.jpg

214.2 KB

DEF CON 29 - ASTcell - 5625.JPG

40.6 MB

DEF CON 29 - ASTcell - 5626.jpg

229.4 KB

DEF CON 29 - ASTcell - 5669.jpg

215.5 KB

DEF CON 29 - ASTcell - 5692.jpg

196.2 KB

DEF CON 29 - ASTcell - 5744.jpg

245.4 KB

DEF CON 29 - ASTcell - 5764.jpg

175.5 KB

DEF CON 29 - ASTcell - 5773.JPG

41.3 MB

DEF CON 29 - ASTcell - 5774.jpg

190.5 KB

DEF CON 29 - ASTcell - 5797.jpg

230.4 KB

DEF CON 29 - ASTcell - 5800.jpg

172.5 KB

DEF CON 29 - ASTcell - 5803.jpg

246.5 KB

DEF CON 29 - ASTcell - 5808.jpg

226.4 KB

DEF CON 29 - ASTcell - 5810.JPG

40.5 MB

DEF CON 29 - ASTcell - 5840.jpg

196.4 KB

DEF CON 29 - ASTcell - 5857.jpg

240.2 KB

DEF CON 29 - ASTcell - 5869.jpg

227.2 KB

DEF CON 29 - ASTcell - 5875.jpg

219.5 KB

DEF CON 29 - ASTcell - 5902.jpg

214.5 KB

DEF CON 29 - ASTcell - 5907.jpg

279.9 KB

DEF CON 29 - ASTcell - 5912.jpg

223.9 KB

DEF CON 29 - ASTcell - 5940.jpg

215.3 KB

DEF CON 29 - ASTcell - 5961.jpg

264.3 KB

DEF CON 29 - ASTcell - 5981.jpg

240.9 KB

DEF CON 29 - ASTcell - 5988.JPG

42.8 MB

DEF CON 29 - ASTcell - 5992.jpg

166.8 KB

DEF CON 29 - ASTcell - 6012.jpg

175.5 KB

DEF CON 29 - ASTcell - 6151.jpg

281.5 KB

DEF CON 29 - ASTcell - 6171.jpg

217.5 KB

DEF CON 29 - ASTcell - 6187.jpg

174.8 KB

DEF CON 29 - ASTcell - 6198.jpg

323.6 KB

DEF CON 29 - ASTcell - 6208.jpg

276.3 KB

DEF CON 29 - ASTcell - 6224.jpg

171.8 KB

DEF CON 29 - ASTcell - 6300.jpg

152.9 KB

DEF CON 29 - ASTcell - 6317.jpg

267.7 KB

DEF CON 29 - ASTcell - 6318.jpg

261.1 KB

DEF CON 29 - ASTcell - 6339.jpg

204.9 KB

DEF CON 29 - ASTcell - 6353.jpg

240.6 KB

DEF CON 29 - ASTcell - 6402.jpg

233.3 KB

DEF CON 29 - ASTcell - 6422.jpg

212.6 KB

/.../DEF CON 29 Pictures - Cannibal/

DEF CON 29 - Cannibal - 5515.jpg

34.8 MB

DEF CON 29 - Cannibal - 5516.jpg

35.7 MB

DEF CON 29 - Cannibal - 5520.jpg

39.9 MB

DEF CON 29 - Cannibal - 5521.jpg

39.6 MB

DEF CON 29 - Cannibal - 5522.jpg

39.0 MB

DEF CON 29 - Cannibal - 5523.jpg

41.4 MB

DEF CON 29 - Cannibal - 5524.jpg

41.7 MB

DEF CON 29 - Cannibal - 5525.jpg

43.1 MB

DEF CON 29 - Cannibal - 5526.jpg

37.9 MB

DEF CON 29 - Cannibal - 5528.jpg

41.6 MB

DEF CON 29 - Cannibal - 5529.jpg

41.7 MB

DEF CON 29 - Cannibal - 5530.jpg

36.4 MB

DEF CON 29 - Cannibal - 5531.jpg

40.0 MB

DEF CON 29 - Cannibal - 5532.jpg

40.2 MB

DEF CON 29 - Cannibal - 5533.jpg

35.3 MB

DEF CON 29 - Cannibal - 5534.jpg

40.4 MB

DEF CON 29 - Cannibal - 5535.jpg

38.7 MB

DEF CON 29 - Cannibal - 5536.jpg

37.3 MB

DEF CON 29 - Cannibal - 5537.jpg

41.0 MB

DEF CON 29 - Cannibal - 5538.jpg

40.4 MB

DEF CON 29 - Cannibal - 5539.jpg

41.2 MB

DEF CON 29 - Cannibal - 5540.jpg

42.9 MB

DEF CON 29 - Cannibal - 5541.jpg

41.6 MB

DEF CON 29 - Cannibal - 5542.jpg

29.6 MB

DEF CON 29 - Cannibal - 5543.jpg

41.0 MB

DEF CON 29 - Cannibal - 5544.jpg

38.9 MB

DEF CON 29 - Cannibal - 5545.jpg

42.8 MB

DEF CON 29 - Cannibal - 5546.jpg

41.2 MB

DEF CON 29 - Cannibal - 5547.jpg

47.6 MB

DEF CON 29 - Cannibal - 5548.jpg

43.8 MB

DEF CON 29 - Cannibal - 5549.jpg

37.8 MB

DEF CON 29 - Cannibal - 5550.jpg

37.8 MB

DEF CON 29 - Cannibal - 5551.jpg

39.1 MB

DEF CON 29 - Cannibal - 5552.jpg

39.8 MB

DEF CON 29 - Cannibal - 5553.jpg

39.8 MB

DEF CON 29 - Cannibal - 5555.jpg

38.1 MB

DEF CON 29 - Cannibal - 5556.jpg

37.4 MB

DEF CON 29 - Cannibal - 5557.jpg

39.9 MB

DEF CON 29 - Cannibal - 5558.jpg

40.2 MB

DEF CON 29 - Cannibal - 5559.jpg

36.8 MB

DEF CON 29 - Cannibal - 5560.jpg

41.6 MB

DEF CON 29 - Cannibal - 5561.jpg

39.9 MB

DEF CON 29 - Cannibal - 5562.jpg

39.8 MB

DEF CON 29 - Cannibal - 5563.jpg

41.3 MB

DEF CON 29 - Cannibal - 5564.jpg

39.1 MB

DEF CON 29 - Cannibal - 5565.jpg

38.6 MB

DEF CON 29 - Cannibal - 5566.jpg

42.1 MB

DEF CON 29 - Cannibal - 5567.jpg

42.0 MB

DEF CON 29 - Cannibal - 5568.jpg

41.4 MB

DEF CON 29 - Cannibal - 5569.jpg

42.4 MB

DEF CON 29 - Cannibal - 5570.jpg

40.4 MB

DEF CON 29 - Cannibal - 5571.jpg

41.8 MB

DEF CON 29 - Cannibal - 5572.jpg

42.3 MB

DEF CON 29 - Cannibal - 5573.jpg

41.3 MB

DEF CON 29 - Cannibal - 5574.jpg

41.4 MB

DEF CON 29 - Cannibal - 5575.jpg

40.2 MB

DEF CON 29 - Cannibal - 5576.jpg

40.6 MB

DEF CON 29 - Cannibal - 5577.jpg

39.3 MB

DEF CON 29 - Cannibal - 5578.jpg

40.7 MB

DEF CON 29 - Cannibal - 5579.jpg

40.9 MB

DEF CON 29 - Cannibal - 5581.jpg

40.8 MB

DEF CON 29 - Cannibal - 5583.jpg

40.9 MB

DEF CON 29 - Cannibal - 5584.jpg

40.0 MB

DEF CON 29 - Cannibal - 5585.jpg

39.8 MB

DEF CON 29 - Cannibal - 5586.jpg

39.3 MB

DEF CON 29 - Cannibal - 5587.jpg

38.7 MB

DEF CON 29 - Cannibal - 5588.jpg

39.1 MB

DEF CON 29 - Cannibal - 5589.jpg

39.1 MB

DEF CON 29 - Cannibal - 5590.jpg

37.3 MB

DEF CON 29 - Cannibal - 5591.jpg

42.6 MB

DEF CON 29 - Cannibal - 5592.jpg

44.0 MB

DEF CON 29 - Cannibal - 5593.jpg

44.3 MB

DEF CON 29 - Cannibal - 5594.jpg

40.7 MB

DEF CON 29 - Cannibal - 5595.jpg

43.8 MB

DEF CON 29 - Cannibal - 5596.jpg

46.0 MB

DEF CON 29 - Cannibal - 5597.jpg

34.1 MB

DEF CON 29 - Cannibal - 5598.jpg

37.3 MB

DEF CON 29 - Cannibal - 5599.jpg

36.5 MB

DEF CON 29 - Cannibal - 5600.jpg

37.5 MB

DEF CON 29 - Cannibal - 5601.jpg

36.5 MB

DEF CON 29 - Cannibal - 5602.jpg

39.6 MB

DEF CON 29 - Cannibal - 5603.jpg

43.1 MB

DEF CON 29 - Cannibal - 5605.jpg

43.7 MB

DEF CON 29 - Cannibal - 5606.jpg

40.2 MB

DEF CON 29 - Cannibal - 5607.jpg

41.8 MB

DEF CON 29 - Cannibal - 5608.jpg

41.7 MB

DEF CON 29 - Cannibal - 5609.jpg

41.4 MB

DEF CON 29 - Cannibal - 5610.jpg

40.8 MB

DEF CON 29 - Cannibal - 5611.jpg

42.7 MB

DEF CON 29 - Cannibal - 5612.jpg

42.3 MB

DEF CON 29 - Cannibal - 5613.jpg

40.5 MB

DEF CON 29 - Cannibal - 5614.jpg

37.9 MB

DEF CON 29 - Cannibal - 5615.jpg

40.7 MB

DEF CON 29 - Cannibal - 5616.jpg

36.2 MB

DEF CON 29 - Cannibal - 5617.jpg

40.6 MB

DEF CON 29 - Cannibal - 5619.jpg

41.2 MB

DEF CON 29 - Cannibal - 5620.jpg

40.2 MB

DEF CON 29 - Cannibal - 5621.jpg

41.1 MB

DEF CON 29 - Cannibal - 5622.jpg

41.4 MB

DEF CON 29 - Cannibal - 5623.jpg

41.1 MB

DEF CON 29 - Cannibal - 5624.jpg

42.0 MB

DEF CON 29 - Cannibal - 5625.jpg

40.6 MB

DEF CON 29 - Cannibal - 5626.jpg

39.5 MB

DEF CON 29 - Cannibal - 5627.jpg

41.0 MB

DEF CON 29 - Cannibal - 5628.jpg

36.7 MB

DEF CON 29 - Cannibal - 5630.jpg

40.0 MB

DEF CON 29 - Cannibal - 5631.jpg

39.8 MB

DEF CON 29 - Cannibal - 5632.jpg

42.2 MB

DEF CON 29 - Cannibal - 5633.jpg

41.9 MB

DEF CON 29 - Cannibal - 5634.jpg

41.5 MB

DEF CON 29 - Cannibal - 5635.jpg

38.8 MB

DEF CON 29 - Cannibal - 5636.jpg

42.9 MB

DEF CON 29 - Cannibal - 5637.jpg

39.1 MB

DEF CON 29 - Cannibal - 5638.jpg

36.3 MB

DEF CON 29 - Cannibal - 5639.jpg

40.0 MB

DEF CON 29 - Cannibal - 5640.jpg

40.2 MB

DEF CON 29 - Cannibal - 5641.jpg

40.8 MB

DEF CON 29 - Cannibal - 5642.jpg

41.1 MB

DEF CON 29 - Cannibal - 5643.jpg

41.1 MB

DEF CON 29 - Cannibal - 5644.jpg

39.0 MB

DEF CON 29 - Cannibal - 5645.jpg

39.8 MB

DEF CON 29 - Cannibal - 5646.jpg

40.6 MB

DEF CON 29 - Cannibal - 5647.jpg

37.7 MB

DEF CON 29 - Cannibal - 5648.jpg

40.5 MB

DEF CON 29 - Cannibal - 5649.jpg

42.2 MB

DEF CON 29 - Cannibal - 5650.jpg

42.0 MB

DEF CON 29 - Cannibal - 5651.jpg

42.8 MB

DEF CON 29 - Cannibal - 5652.jpg

38.6 MB

DEF CON 29 - Cannibal - 5653.jpg

39.0 MB

DEF CON 29 - Cannibal - 5654.jpg

35.7 MB

DEF CON 29 - Cannibal - 5655.jpg

42.0 MB

DEF CON 29 - Cannibal - 5656.jpg

38.8 MB

DEF CON 29 - Cannibal - 5657.jpg

39.2 MB

DEF CON 29 - Cannibal - 5658.jpg

39.0 MB

DEF CON 29 - Cannibal - 5659.jpg

41.7 MB

DEF CON 29 - Cannibal - 5660.jpg

39.4 MB

DEF CON 29 - Cannibal - 5661.jpg

38.8 MB

DEF CON 29 - Cannibal - 5662.jpg

39.9 MB

DEF CON 29 - Cannibal - 5663.jpg

39.9 MB

DEF CON 29 - Cannibal - 5664.jpg

40.0 MB

DEF CON 29 - Cannibal - 5665.jpg

33.6 MB

DEF CON 29 - Cannibal - 5666.jpg

37.5 MB

DEF CON 29 - Cannibal - 5667.jpg

41.3 MB

DEF CON 29 - Cannibal - 5668.jpg

37.1 MB

DEF CON 29 - Cannibal - 5669.jpg

38.2 MB

DEF CON 29 - Cannibal - 5670.jpg

38.3 MB

DEF CON 29 - Cannibal - 5671.jpg

35.8 MB

DEF CON 29 - Cannibal - 5672.jpg

38.8 MB

DEF CON 29 - Cannibal - 5673.jpg

36.7 MB

DEF CON 29 - Cannibal - 5674.jpg

33.6 MB

DEF CON 29 - Cannibal - 5675.jpg

35.8 MB

DEF CON 29 - Cannibal - 5676.jpg

36.1 MB

DEF CON 29 - Cannibal - 5677.jpg

40.4 MB

DEF CON 29 - Cannibal - 5678.jpg

38.4 MB

DEF CON 29 - Cannibal - 5679.jpg

38.1 MB

DEF CON 29 - Cannibal - 5680.jpg

35.3 MB

DEF CON 29 - Cannibal - 5681.jpg

34.5 MB

DEF CON 29 - Cannibal - 5682.jpg

35.0 MB

DEF CON 29 - Cannibal - 5683.jpg

35.2 MB

DEF CON 29 - Cannibal - 5684.jpg

24.6 MB

DEF CON 29 - Cannibal - 5685.jpg

24.7 MB

DEF CON 29 - Cannibal - 5686.jpg

31.6 MB

DEF CON 29 - Cannibal - 5687.jpg

27.0 MB

DEF CON 29 - Cannibal - 5688.jpg

30.0 MB

DEF CON 29 - Cannibal - 5689.jpg

25.2 MB

DEF CON 29 - Cannibal - 5690.jpg

33.8 MB

DEF CON 29 - Cannibal - 5691.jpg

27.1 MB

DEF CON 29 - Cannibal - 5692.jpg

29.2 MB

DEF CON 29 - Cannibal - 5693.jpg

29.1 MB

DEF CON 29 - Cannibal - 5694.jpg

29.4 MB

DEF CON 29 - Cannibal - 5695.jpg

25.1 MB

DEF CON 29 - Cannibal - 5696.jpg

28.3 MB

DEF CON 29 - Cannibal - 5697.jpg

31.5 MB

DEF CON 29 - Cannibal - 5698.jpg

25.8 MB

DEF CON 29 - Cannibal - 5699.jpg

33.8 MB

DEF CON 29 - Cannibal - 5700.jpg

23.7 MB

DEF CON 29 - Cannibal - 5701.jpg

25.2 MB

DEF CON 29 - Cannibal - 5702.jpg

24.4 MB

DEF CON 29 - Cannibal - 5703.jpg

25.0 MB

DEF CON 29 - Cannibal - 5704.jpg

27.4 MB

DEF CON 29 - Cannibal - 5705.jpg

32.7 MB

DEF CON 29 - Cannibal - 5706.jpg

30.7 MB

DEF CON 29 - Cannibal - 5707.jpg

33.6 MB

DEF CON 29 - Cannibal - 5708.jpg

33.8 MB

DEF CON 29 - Cannibal - 5709.jpg

33.8 MB

DEF CON 29 - Cannibal - 5710.jpg

33.2 MB

DEF CON 29 - Cannibal - 5711.jpg

32.6 MB

DEF CON 29 - Cannibal - 5712.jpg

32.3 MB

DEF CON 29 - Cannibal - 5713.jpg

30.7 MB

DEF CON 29 - Cannibal - 5714.jpg

30.6 MB

DEF CON 29 - Cannibal - 5715.jpg

30.9 MB

DEF CON 29 - Cannibal - 5716.jpg

30.7 MB

DEF CON 29 - Cannibal - 5717.jpg

30.9 MB

DEF CON 29 - Cannibal - 5718.jpg

30.7 MB

DEF CON 29 - Cannibal - 5719.jpg

31.2 MB

DEF CON 29 - Cannibal - 5720.jpg

31.2 MB

DEF CON 29 - Cannibal - 5721.jpg

31.4 MB

DEF CON 29 - Cannibal - 5722.jpg

30.9 MB

DEF CON 29 - Cannibal - 5723.jpg

31.2 MB

DEF CON 29 - Cannibal - 5724.jpg

31.1 MB

DEF CON 29 - Cannibal - 5725.jpg

29.9 MB

DEF CON 29 - Cannibal - 5726.jpg

30.4 MB

DEF CON 29 - Cannibal - 5727.jpg

29.8 MB

DEF CON 29 - Cannibal - 5728.jpg

30.7 MB

DEF CON 29 - Cannibal - 5729.jpg

31.2 MB

DEF CON 29 - Cannibal - 5730.jpg

31.9 MB

DEF CON 29 - Cannibal - 5731.jpg

31.5 MB

DEF CON 29 - Cannibal - 5732.jpg

32.0 MB

DEF CON 29 - Cannibal - 5733.jpg

31.8 MB

DEF CON 29 - Cannibal - 5734.jpg

31.9 MB

DEF CON 29 - Cannibal - 5735.jpg

32.1 MB

DEF CON 29 - Cannibal - 5736.jpg

35.8 MB

DEF CON 29 - Cannibal - 5737.jpg

33.0 MB

DEF CON 29 - Cannibal - 5738.jpg

34.0 MB

DEF CON 29 - Cannibal - 5739.jpg

33.7 MB

DEF CON 29 - Cannibal - 5740.jpg

27.5 MB

DEF CON 29 - Cannibal - 5741.jpg

50.4 MB

DEF CON 29 - Cannibal - 5742.jpg

37.3 MB

DEF CON 29 - Cannibal - 5743.jpg

33.4 MB

DEF CON 29 - Cannibal - 5744.jpg

37.4 MB

DEF CON 29 - Cannibal - 5746.jpg

37.3 MB

DEF CON 29 - Cannibal - 5747.jpg

28.5 MB

DEF CON 29 - Cannibal - 5748.jpg

26.7 MB

DEF CON 29 - Cannibal - 5749.jpg

28.9 MB

DEF CON 29 - Cannibal - 5750.jpg

27.3 MB

DEF CON 29 - Cannibal - 5751.jpg

28.5 MB

DEF CON 29 - Cannibal - 5752.jpg

29.2 MB

DEF CON 29 - Cannibal - 5753.jpg

29.4 MB

DEF CON 29 - Cannibal - 5754.jpg

36.2 MB

DEF CON 29 - Cannibal - 5755.jpg

35.5 MB

DEF CON 29 - Cannibal - 5756.jpg

35.9 MB

DEF CON 29 - Cannibal - 5757.jpg

39.3 MB

DEF CON 29 - Cannibal - 5758.jpg

35.6 MB

DEF CON 29 - Cannibal - 5759.jpg

31.8 MB

DEF CON 29 - Cannibal - 5760.jpg

25.4 MB

DEF CON 29 - Cannibal - 5761.jpg

30.2 MB

DEF CON 29 - Cannibal - 5762.jpg

33.4 MB

DEF CON 29 - Cannibal - 5763.jpg

40.6 MB

DEF CON 29 - Cannibal - 5764.jpg

34.1 MB

DEF CON 29 - Cannibal - 5765.jpg

35.0 MB

DEF CON 29 - Cannibal - 5766.jpg

34.4 MB

DEF CON 29 - Cannibal - 5767.jpg

40.0 MB

DEF CON 29 - Cannibal - 5768.jpg

38.7 MB

DEF CON 29 - Cannibal - 5769.jpg

34.8 MB

DEF CON 29 - Cannibal - 5770.jpg

34.9 MB

DEF CON 29 - Cannibal - 5771.jpg

34.2 MB

DEF CON 29 - Cannibal - 5772.jpg

40.4 MB

DEF CON 29 - Cannibal - 5773.jpg

41.3 MB

DEF CON 29 - Cannibal - 5774.jpg

39.7 MB

DEF CON 29 - Cannibal - 5775.jpg

34.8 MB

DEF CON 29 - Cannibal - 5776.jpg

31.6 MB

DEF CON 29 - Cannibal - 5777.jpg

28.4 MB

DEF CON 29 - Cannibal - 5778.jpg

37.5 MB

DEF CON 29 - Cannibal - 5779.jpg

32.1 MB

DEF CON 29 - Cannibal - 5780.jpg

26.8 MB

DEF CON 29 - Cannibal - 5781.jpg

32.1 MB

DEF CON 29 - Cannibal - 5782.jpg

35.9 MB

DEF CON 29 - Cannibal - 5783.jpg

38.2 MB

DEF CON 29 - Cannibal - 5784.jpg

37.7 MB

DEF CON 29 - Cannibal - 5785.jpg

33.6 MB

DEF CON 29 - Cannibal - 5786.jpg

38.4 MB

DEF CON 29 - Cannibal - 5787.jpg

35.8 MB

DEF CON 29 - Cannibal - 5788.jpg

38.6 MB

DEF CON 29 - Cannibal - 5789.jpg

36.2 MB

DEF CON 29 - Cannibal - 5790.jpg

39.0 MB

DEF CON 29 - Cannibal - 5791.jpg

38.5 MB

DEF CON 29 - Cannibal - 5792.jpg

38.4 MB

DEF CON 29 - Cannibal - 5793.jpg

39.8 MB

DEF CON 29 - Cannibal - 5794.jpg

38.6 MB

DEF CON 29 - Cannibal - 5795.jpg

39.2 MB

DEF CON 29 - Cannibal - 5796.jpg

39.7 MB

DEF CON 29 - Cannibal - 5797.jpg

39.6 MB

DEF CON 29 - Cannibal - 5798.jpg

39.7 MB

DEF CON 29 - Cannibal - 5799.jpg

39.5 MB

DEF CON 29 - Cannibal - 5800.jpg

35.5 MB

DEF CON 29 - Cannibal - 5801.jpg

36.6 MB

DEF CON 29 - Cannibal - 5802.jpg

39.4 MB

DEF CON 29 - Cannibal - 5803.jpg

39.5 MB

DEF CON 29 - Cannibal - 5804.jpg

41.4 MB

DEF CON 29 - Cannibal - 5805.jpg

40.3 MB

DEF CON 29 - Cannibal - 5807.jpg

40.8 MB

DEF CON 29 - Cannibal - 5808.jpg

39.4 MB

DEF CON 29 - Cannibal - 5809.jpg

37.8 MB

DEF CON 29 - Cannibal - 5810.jpg

40.5 MB

DEF CON 29 - Cannibal - 5811.jpg

30.9 MB

DEF CON 29 - Cannibal - 5812.jpg

39.0 MB

DEF CON 29 - Cannibal - 5813.jpg

41.1 MB

DEF CON 29 - Cannibal - 5814.jpg

40.2 MB

DEF CON 29 - Cannibal - 5815.jpg

42.4 MB

DEF CON 29 - Cannibal - 5816.jpg

40.1 MB

DEF CON 29 - Cannibal - 5817.jpg

41.5 MB

DEF CON 29 - Cannibal - 5818.jpg

40.6 MB

DEF CON 29 - Cannibal - 5819.jpg

41.6 MB

DEF CON 29 - Cannibal - 5820.jpg

40.6 MB

DEF CON 29 - Cannibal - 5821.jpg

40.9 MB

DEF CON 29 - Cannibal - 5822.jpg

40.6 MB

DEF CON 29 - Cannibal - 5823.jpg

41.0 MB

DEF CON 29 - Cannibal - 5824.jpg

40.2 MB

DEF CON 29 - Cannibal - 5825.jpg

41.6 MB

DEF CON 29 - Cannibal - 5827.jpg

40.5 MB

DEF CON 29 - Cannibal - 5828.jpg

39.0 MB

DEF CON 29 - Cannibal - 5829.jpg

42.0 MB

DEF CON 29 - Cannibal - 5830.jpg

41.3 MB

DEF CON 29 - Cannibal - 5831.jpg

42.1 MB

DEF CON 29 - Cannibal - 5832.jpg

40.6 MB

DEF CON 29 - Cannibal - 5833.jpg

40.8 MB

DEF CON 29 - Cannibal - 5834.jpg

39.3 MB

DEF CON 29 - Cannibal - 5835.jpg

39.5 MB

DEF CON 29 - Cannibal - 5836.jpg

40.8 MB

DEF CON 29 - Cannibal - 5838.jpg

40.3 MB

DEF CON 29 - Cannibal - 5839.jpg

39.6 MB

DEF CON 29 - Cannibal - 5840.jpg

38.1 MB

DEF CON 29 - Cannibal - 5841.jpg

38.3 MB

DEF CON 29 - Cannibal - 5842.jpg

37.8 MB

DEF CON 29 - Cannibal - 5843.jpg

37.3 MB

DEF CON 29 - Cannibal - 5844.jpg

40.2 MB

DEF CON 29 - Cannibal - 5845.jpg

42.1 MB

DEF CON 29 - Cannibal - 5846.jpg

42.3 MB

DEF CON 29 - Cannibal - 5847.jpg

42.6 MB

DEF CON 29 - Cannibal - 5848.jpg

40.0 MB

DEF CON 29 - Cannibal - 5849.jpg

38.9 MB

DEF CON 29 - Cannibal - 5850.jpg

38.6 MB

DEF CON 29 - Cannibal - 5851.jpg

41.4 MB

DEF CON 29 - Cannibal - 5852.jpg

41.1 MB

DEF CON 29 - Cannibal - 5853.jpg

39.4 MB

DEF CON 29 - Cannibal - 5854.jpg

43.4 MB

DEF CON 29 - Cannibal - 5855.jpg

39.5 MB

DEF CON 29 - Cannibal - 5856.jpg

39.5 MB

DEF CON 29 - Cannibal - 5857.jpg

38.8 MB

DEF CON 29 - Cannibal - 5858.jpg

41.5 MB

DEF CON 29 - Cannibal - 5859.jpg

37.7 MB

DEF CON 29 - Cannibal - 5860.jpg

39.9 MB

DEF CON 29 - Cannibal - 5861.jpg

42.9 MB

DEF CON 29 - Cannibal - 5862.jpg

41.8 MB

DEF CON 29 - Cannibal - 5863.jpg

42.5 MB

DEF CON 29 - Cannibal - 5864.jpg

40.5 MB

DEF CON 29 - Cannibal - 5865.jpg

40.8 MB

DEF CON 29 - Cannibal - 5866.jpg

41.3 MB

DEF CON 29 - Cannibal - 5867.jpg

39.2 MB

DEF CON 29 - Cannibal - 5868.jpg

39.8 MB

DEF CON 29 - Cannibal - 5869.jpg

40.3 MB

DEF CON 29 - Cannibal - 5870.jpg

44.6 MB

DEF CON 29 - Cannibal - 5871.jpg

40.2 MB

DEF CON 29 - Cannibal - 5872.jpg

31.0 MB

DEF CON 29 - Cannibal - 5873.jpg

29.9 MB

DEF CON 29 - Cannibal - 5874.jpg

34.8 MB

DEF CON 29 - Cannibal - 5875.jpg

36.4 MB

DEF CON 29 - Cannibal - 5876.jpg

34.8 MB

DEF CON 29 - Cannibal - 5877.jpg

35.5 MB

DEF CON 29 - Cannibal - 5878.jpg

34.8 MB

DEF CON 29 - Cannibal - 5879.jpg

36.0 MB

DEF CON 29 - Cannibal - 5880.jpg

33.9 MB

DEF CON 29 - Cannibal - 5881.jpg

36.5 MB

DEF CON 29 - Cannibal - 5882.jpg

38.6 MB

DEF CON 29 - Cannibal - 5883.jpg

31.1 MB

DEF CON 29 - Cannibal - 5884.jpg

31.0 MB

DEF CON 29 - Cannibal - 5885.jpg

33.6 MB

DEF CON 29 - Cannibal - 5886.jpg

39.7 MB

DEF CON 29 - Cannibal - 5887.jpg

38.6 MB

DEF CON 29 - Cannibal - 5888.jpg

40.0 MB

DEF CON 29 - Cannibal - 5889.jpg

29.9 MB

DEF CON 29 - Cannibal - 5890.jpg

32.5 MB

DEF CON 29 - Cannibal - 5891.jpg

35.3 MB

DEF CON 29 - Cannibal - 5892.jpg

40.1 MB

DEF CON 29 - Cannibal - 5893.jpg

41.2 MB

DEF CON 29 - Cannibal - 5894.jpg

38.7 MB

DEF CON 29 - Cannibal - 5895.jpg

38.7 MB

DEF CON 29 - Cannibal - 5896.jpg

36.7 MB

DEF CON 29 - Cannibal - 5897.jpg

36.4 MB

DEF CON 29 - Cannibal - 5898.jpg

42.3 MB

DEF CON 29 - Cannibal - 5899.jpg

41.2 MB

DEF CON 29 - Cannibal - 5900.jpg

42.9 MB

DEF CON 29 - Cannibal - 5901.jpg

42.3 MB

DEF CON 29 - Cannibal - 5902.jpg

37.5 MB

DEF CON 29 - Cannibal - 5903.jpg

39.5 MB

DEF CON 29 - Cannibal - 5904.jpg

39.6 MB

DEF CON 29 - Cannibal - 5905.jpg

40.0 MB

DEF CON 29 - Cannibal - 5906.jpg

40.1 MB

DEF CON 29 - Cannibal - 5907.jpg

41.7 MB

DEF CON 29 - Cannibal - 5908.jpg

42.1 MB

DEF CON 29 - Cannibal - 5909.jpg

41.6 MB

DEF CON 29 - Cannibal - 5910.jpg

40.3 MB

DEF CON 29 - Cannibal - 5911.jpg

42.1 MB

DEF CON 29 - Cannibal - 5912.jpg

37.6 MB

DEF CON 29 - Cannibal - 5913.jpg

42.5 MB

DEF CON 29 - Cannibal - 5914.jpg

37.8 MB

DEF CON 29 - Cannibal - 5915.jpg

41.6 MB

DEF CON 29 - Cannibal - 5916.jpg

39.9 MB

DEF CON 29 - Cannibal - 5917.jpg

43.5 MB

DEF CON 29 - Cannibal - 5918.jpg

44.0 MB

DEF CON 29 - Cannibal - 5919.jpg

35.4 MB

DEF CON 29 - Cannibal - 5920.jpg

36.2 MB

DEF CON 29 - Cannibal - 5921.jpg

37.1 MB

DEF CON 29 - Cannibal - 5922.jpg

32.5 MB

DEF CON 29 - Cannibal - 5923.jpg

33.0 MB

DEF CON 29 - Cannibal - 5924.jpg

41.2 MB

DEF CON 29 - Cannibal - 5925.jpg

40.8 MB

DEF CON 29 - Cannibal - 5926.jpg

42.6 MB

DEF CON 29 - Cannibal - 5927.jpg

39.2 MB

DEF CON 29 - Cannibal - 5928.jpg

37.4 MB

DEF CON 29 - Cannibal - 5929.jpg

37.9 MB

DEF CON 29 - Cannibal - 5930.jpg

38.2 MB

DEF CON 29 - Cannibal - 5931.jpg

40.9 MB

DEF CON 29 - Cannibal - 5932.jpg

39.6 MB

DEF CON 29 - Cannibal - 5933.jpg

39.5 MB

DEF CON 29 - Cannibal - 5934.jpg

39.7 MB

DEF CON 29 - Cannibal - 5935.jpg

38.0 MB

DEF CON 29 - Cannibal - 5936.jpg

39.3 MB

DEF CON 29 - Cannibal - 5937.jpg

43.4 MB

DEF CON 29 - Cannibal - 5938.jpg

36.0 MB

DEF CON 29 - Cannibal - 5939.jpg

41.8 MB

DEF CON 29 - Cannibal - 5940.jpg

42.2 MB

DEF CON 29 - Cannibal - 5941.jpg

38.5 MB

DEF CON 29 - Cannibal - 5942.jpg

37.0 MB

DEF CON 29 - Cannibal - 5943.jpg

36.5 MB

DEF CON 29 - Cannibal - 5944.jpg

37.1 MB

DEF CON 29 - Cannibal - 5945.jpg

44.3 MB

DEF CON 29 - Cannibal - 5946.jpg

44.8 MB

DEF CON 29 - Cannibal - 5947.jpg

39.9 MB

DEF CON 29 - Cannibal - 5948.jpg

39.7 MB

DEF CON 29 - Cannibal - 5949.jpg

37.0 MB

DEF CON 29 - Cannibal - 5950.jpg

42.6 MB

DEF CON 29 - Cannibal - 5951.jpg

32.6 MB

DEF CON 29 - Cannibal - 5952.jpg

35.6 MB

DEF CON 29 - Cannibal - 5953.jpg

34.6 MB

DEF CON 29 - Cannibal - 5954.jpg

35.5 MB

DEF CON 29 - Cannibal - 5955.jpg

41.0 MB

DEF CON 29 - Cannibal - 5956.jpg

41.8 MB

DEF CON 29 - Cannibal - 5957.jpg

41.8 MB

DEF CON 29 - Cannibal - 5958.jpg

46.1 MB

DEF CON 29 - Cannibal - 5959.jpg

39.6 MB

DEF CON 29 - Cannibal - 5960.jpg

31.8 MB

DEF CON 29 - Cannibal - 5961.jpg

35.1 MB

DEF CON 29 - Cannibal - 5962.jpg

34.7 MB

DEF CON 29 - Cannibal - 5963.jpg

35.1 MB

DEF CON 29 - Cannibal - 5964.jpg

38.1 MB

DEF CON 29 - Cannibal - 5965.jpg

40.7 MB

DEF CON 29 - Cannibal - 5966.jpg

40.4 MB

DEF CON 29 - Cannibal - 5967.jpg

34.6 MB

DEF CON 29 - Cannibal - 5968.jpg

41.8 MB

DEF CON 29 - Cannibal - 5969.jpg

39.7 MB

DEF CON 29 - Cannibal - 5970.jpg

40.8 MB

DEF CON 29 - Cannibal - 5971.jpg

40.4 MB

DEF CON 29 - Cannibal - 5973.jpg

41.5 MB

DEF CON 29 - Cannibal - 5974.jpg

41.5 MB

DEF CON 29 - Cannibal - 5975.jpg

38.1 MB

DEF CON 29 - Cannibal - 5976.jpg

36.6 MB

DEF CON 29 - Cannibal - 5977.jpg

38.8 MB

DEF CON 29 - Cannibal - 5978.jpg

40.9 MB

DEF CON 29 - Cannibal - 5979.jpg

41.6 MB

DEF CON 29 - Cannibal - 5980.jpg

41.3 MB

DEF CON 29 - Cannibal - 5981.jpg

40.0 MB

DEF CON 29 - Cannibal - 5982.jpg

38.5 MB

DEF CON 29 - Cannibal - 5983.jpg

42.0 MB

DEF CON 29 - Cannibal - 5984.jpg

43.1 MB

DEF CON 29 - Cannibal - 5985.jpg

38.3 MB

DEF CON 29 - Cannibal - 5986.jpg

40.5 MB

DEF CON 29 - Cannibal - 5987.jpg

40.1 MB

DEF CON 29 - Cannibal - 5988.jpg

42.8 MB

DEF CON 29 - Cannibal - 5989.jpg

41.1 MB

DEF CON 29 - Cannibal - 5990.jpg

20.4 MB

DEF CON 29 - Cannibal - 5991.jpg

41.1 MB

DEF CON 29 - Cannibal - 5992.jpg

36.9 MB

DEF CON 29 - Cannibal - 5993.jpg

39.4 MB

DEF CON 29 - Cannibal - 5994.jpg

43.0 MB

DEF CON 29 - Cannibal - 5995.jpg

37.0 MB

DEF CON 29 - Cannibal - 5996.jpg

40.1 MB

DEF CON 29 - Cannibal - 5997.jpg

33.6 MB

DEF CON 29 - Cannibal - 5998.jpg

32.9 MB

DEF CON 29 - Cannibal - 6000.jpg

26.4 MB

DEF CON 29 - Cannibal - 6001.jpg

36.1 MB

DEF CON 29 - Cannibal - 6002.jpg

28.9 MB

DEF CON 29 - Cannibal - 6003.jpg

27.1 MB

DEF CON 29 - Cannibal - 6004.jpg

32.9 MB

DEF CON 29 - Cannibal - 6005.jpg

29.0 MB

DEF CON 29 - Cannibal - 6006.jpg

32.3 MB

DEF CON 29 - Cannibal - 6007.jpg

32.6 MB

DEF CON 29 - Cannibal - 6008.jpg

32.6 MB

DEF CON 29 - Cannibal - 6009.jpg

29.8 MB

DEF CON 29 - Cannibal - 6010.jpg

25.9 MB

DEF CON 29 - Cannibal - 6011.jpg

30.5 MB

DEF CON 29 - Cannibal - 6012.jpg

24.9 MB

DEF CON 29 - Cannibal - 6013.jpg

31.2 MB

DEF CON 29 - Cannibal - 6014.jpg

29.2 MB

DEF CON 29 - Cannibal - 6015.jpg

28.9 MB

DEF CON 29 - Cannibal - 6016.jpg

27.7 MB

DEF CON 29 - Cannibal - 6017.jpg

31.9 MB

DEF CON 29 - Cannibal - 6018.jpg

36.7 MB

DEF CON 29 - Cannibal - 6019.jpg

33.3 MB

DEF CON 29 - Cannibal - 6020.jpg

31.9 MB

DEF CON 29 - Cannibal - 6021.jpg

27.6 MB

DEF CON 29 - Cannibal - 6022.jpg

30.3 MB

DEF CON 29 - Cannibal - 6023.jpg

29.7 MB

DEF CON 29 - Cannibal - 6024.jpg

32.0 MB

DEF CON 29 - Cannibal - 6025.jpg

31.9 MB

DEF CON 29 - Cannibal - 6026.jpg

29.7 MB

DEF CON 29 - Cannibal - 6027.jpg

30.6 MB

DEF CON 29 - Cannibal - 6028.jpg

30.4 MB

DEF CON 29 - Cannibal - 6029.jpg

30.7 MB

DEF CON 29 - Cannibal - 6030.jpg

28.1 MB

DEF CON 29 - Cannibal - 6031.jpg

27.8 MB

DEF CON 29 - Cannibal - 6032.jpg

29.8 MB

DEF CON 29 - Cannibal - 6033.jpg

29.3 MB

DEF CON 29 - Cannibal - 6034.jpg

29.1 MB

DEF CON 29 - Cannibal - 6035.jpg

26.5 MB

DEF CON 29 - Cannibal - 6036.jpg

31.0 MB

DEF CON 29 - Cannibal - 6037.jpg

31.5 MB

DEF CON 29 - Cannibal - 6038.jpg

27.7 MB

DEF CON 29 - Cannibal - 6039.jpg

27.8 MB

DEF CON 29 - Cannibal - 6040.jpg

27.9 MB

DEF CON 29 - Cannibal - 6041.jpg

32.2 MB

DEF CON 29 - Cannibal - 6042.jpg

32.5 MB

DEF CON 29 - Cannibal - 6043.jpg

30.7 MB

DEF CON 29 - Cannibal - 6044.jpg

30.2 MB

DEF CON 29 - Cannibal - 6045.jpg

33.3 MB

DEF CON 29 - Cannibal - 6046.jpg

33.5 MB

DEF CON 29 - Cannibal - 6047.jpg

27.3 MB

DEF CON 29 - Cannibal - 6048.jpg

27.4 MB

DEF CON 29 - Cannibal - 6049.jpg

29.4 MB

DEF CON 29 - Cannibal - 6050.jpg

30.1 MB

DEF CON 29 - Cannibal - 6051.jpg

30.3 MB

DEF CON 29 - Cannibal - 6052.jpg

31.1 MB

DEF CON 29 - Cannibal - 6053.jpg

29.6 MB

DEF CON 29 - Cannibal - 6054.jpg

28.5 MB

DEF CON 29 - Cannibal - 6055.jpg

31.1 MB

DEF CON 29 - Cannibal - 6056.jpg

30.0 MB

DEF CON 29 - Cannibal - 6057.jpg

29.5 MB

DEF CON 29 - Cannibal - 6058.jpg

30.0 MB

DEF CON 29 - Cannibal - 6059.jpg

29.0 MB

DEF CON 29 - Cannibal - 6060.jpg

29.4 MB

DEF CON 29 - Cannibal - 6061.jpg

28.0 MB

DEF CON 29 - Cannibal - 6062.jpg

28.5 MB

DEF CON 29 - Cannibal - 6063.jpg

29.1 MB

DEF CON 29 - Cannibal - 6064.jpg

28.8 MB

DEF CON 29 - Cannibal - 6065.jpg

31.7 MB

DEF CON 29 - Cannibal - 6066.jpg

33.5 MB

DEF CON 29 - Cannibal - 6067.jpg

27.0 MB

DEF CON 29 - Cannibal - 6068.jpg

24.3 MB

DEF CON 29 - Cannibal - 6069.jpg

25.1 MB

DEF CON 29 - Cannibal - 6070.jpg

23.0 MB

DEF CON 29 - Cannibal - 6071.jpg

24.9 MB

DEF CON 29 - Cannibal - 6072.jpg

31.7 MB

DEF CON 29 - Cannibal - 6073.jpg

26.9 MB

DEF CON 29 - Cannibal - 6074.jpg

29.4 MB

DEF CON 29 - Cannibal - 6075.jpg

27.4 MB

DEF CON 29 - Cannibal - 6076.jpg

32.9 MB

DEF CON 29 - Cannibal - 6077.jpg

27.5 MB

DEF CON 29 - Cannibal - 6078.jpg

28.2 MB

DEF CON 29 - Cannibal - 6079.jpg

27.9 MB

DEF CON 29 - Cannibal - 6080.jpg

31.7 MB

DEF CON 29 - Cannibal - 6081.jpg

30.3 MB

DEF CON 29 - Cannibal - 6082.jpg

36.5 MB

DEF CON 29 - Cannibal - 6083.jpg

41.7 MB

DEF CON 29 - Cannibal - 6084.jpg

39.4 MB

DEF CON 29 - Cannibal - 6085.jpg

32.7 MB

DEF CON 29 - Cannibal - 6086.jpg

36.6 MB

DEF CON 29 - Cannibal - 6087.jpg

38.3 MB

DEF CON 29 - Cannibal - 6088.jpg

39.1 MB

DEF CON 29 - Cannibal - 6089.jpg

30.8 MB

DEF CON 29 - Cannibal - 6090.jpg

39.8 MB

DEF CON 29 - Cannibal - 6091.jpg

35.0 MB

DEF CON 29 - Cannibal - 6092.jpg

22.2 MB

DEF CON 29 - Cannibal - 6093.jpg

27.9 MB

DEF CON 29 - Cannibal - 6094.jpg

34.1 MB

DEF CON 29 - Cannibal - 6095.jpg

19.0 MB

DEF CON 29 - Cannibal - 6096.jpg

22.6 MB

DEF CON 29 - Cannibal - 6097.jpg

37.8 MB

DEF CON 29 - Cannibal - 6098.jpg

38.0 MB

DEF CON 29 - Cannibal - 6099.jpg

36.5 MB

DEF CON 29 - Cannibal - 6100.jpg

35.8 MB

DEF CON 29 - Cannibal - 6101.jpg

30.4 MB

DEF CON 29 - Cannibal - 6102.jpg

36.1 MB

DEF CON 29 - Cannibal - 6103.jpg

28.5 MB

/.../DEF CON 29 Pictures - Zebbler/

DEF CON 29 - Zebbler - 1973.jpg

2.3 MB

DEF CON 29 - Zebbler - 1977.jpg

1.8 MB

DEF CON 29 - Zebbler - 2044.jpg

2.1 MB

DEF CON 29 - Zebbler - 2066.jpg

2.4 MB

DEF CON 29 - Zebbler - 2074.jpg

1.8 MB

DEF CON 29 - Zebbler - 2076.heic

1.7 MB

DEF CON 29 - Zebbler - 2077.jpg

1.5 MB

DEF CON 29 - Zebbler - 2081.jpg

1.4 MB

DEF CON 29 - Zebbler - 2085 2.jpg

1.7 MB

DEF CON 29 - Zebbler - 2088 2.heic

1.6 MB

DEF CON 29 - Zebbler - 2092.heic

1.6 MB

DEF CON 29 - Zebbler - 2100.jpg

2.0 MB

DEF CON 29 - Zebbler - 2105.mp4

6.4 MB

DEF CON 29 - Zebbler - 2109.jpg

1.6 MB

DEF CON 29 - Zebbler - 2117.mp4

4.8 MB

DEF CON 29 - Zebbler - 2118.mp4

4.3 MB

DEF CON 29 - Zebbler - 2133.heic

1.8 MB

DEF CON 29 - Zebbler - 2136.jpg

1.8 MB

DEF CON 29 - Zebbler - 2145.mp4

5.8 MB

DEF CON 29 - Zebbler - 2149.jpg

1.2 MB

DEF CON 29 - Zebbler - 2181.jpg

1.0 MB

DEF CON 29 - Zebbler - 2183.jpg

1.7 MB

DEF CON 29 - Zebbler - 2192.jpg

1.6 MB

DEF CON 29 - Zebbler - 2202.jpg

6.3 MB

DEF CON 29 - Zebbler - 2209.jpg

2.0 MB

DEF CON 29 - Zebbler - 2279.jpg

1.2 MB

DEF CON 29 - Zebbler - 2419.jpg

1.9 MB

DEF CON 29 - Zebbler - badge reader hacking wormhole.jpg

7.3 MB

/DEF CON 29 presentations/

_hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation- Making a Mess All Over the Internet.pptx

4.3 MB

Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pdf

4.9 MB

Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.pptx

5.2 MB

Agent X - TBA.pptx

8.4 MB

Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pdf

451.0 KB

Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.pptx

863.4 KB

Babak Javadi Nick Draffen Eric Bettse Anze Jensterle - The PACS-man Comes For Us All.pdf

71.4 MB

Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pdf

2.1 MB

Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.pptx

47.4 MB

Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.key

13.1 MB

Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pdf

15.3 MB

Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.pptx

10.7 MB

Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.pdf

9.6 MB

Brian Hong - Sleight of ARM - Demystifying Intel Houdini.pdf

3.3 MB

Brian Hong - Sleight of ARM - Demystifying Intel Houdini-Slides.pdf

4.8 MB

Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pdf

24.0 MB

Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.pptx

313.3 MB

Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.pdf

2.1 MB

Christopher Wade - Breaking Secure Bootloaders.pdf

1.6 MB

Claire Vacherot - Sneak into buildings with KNXnetIP.pdf

3.0 MB

Dan Petro - Youre Doing IoT RNG.pdf

813.4 KB

David Dworken - Worming through IDEs.pdf

2.0 MB

Dennis Giese - Robots with lasers and cameras but no security- Liberating your vacuum from the cloud.pdf

261.6 MB

Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.pptx

2.9 MB

Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pdf

3.6 MB

Eugene Lim Glenice Tan Tan Kee Hock - Hacking Humans with AI as a Service.pptx

11.2 MB

Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.pdf

4.7 MB

Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.pdf

15.1 MB

Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.pdf

46.4 MB

Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-goose.txt

0.7 KB

Ian Vitek - Central bank digital currency, threats and vulnerabilities.pdf

1.8 MB

Ian Vitek - Central bank digital currency, threats and vulnerabilities.pptx

4.6 MB

Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.pdf

581.0 KB

Jacob Baines - Bring Your Own Print Driver Vulnerability.pdf

5.0 MB

James Kettle - HTTP2 - The Sequel is Always Worse - Slides.pdf

998.7 KB

James Kettle - HTTP2 - The Sequel is Always Worse - Whitepaper.pdf

671.8 KB

Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High(-Level) Languages.pdf

1.3 MB

Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pdf

2.5 MB

Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.pptx

5.4 MB

jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.pdf

4.1 MB

Joseph Gabay - Dos- Denial of Shopping – Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.pdf

12.3 MB

Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.pdf

4.2 MB

Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.odp

6.8 MB

Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.pdf

5.1 MB

Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.pdf

9.8 MB

Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric - tools.zip

1.8 KB

Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.pdf

6.9 MB

Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections - Slides.pdf

726.5 KB

Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.pdf

1.0 MB

Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pdf

5.2 MB

Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.pptx

24.0 MB

Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.pdf

14.0 MB

Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.pdf

2.7 MB

PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.pdf

1.9 MB

Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.pdf

27.8 MB

Paz Hameiri - TEMPEST radio station.pdf

567.3 KB

Paz Hameiri - TEMPEST radio station-Slides.pdf

1.1 MB

Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.pdf

795.1 KB

Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.pdf

5.1 MB

Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pdf

7.7 MB

Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.pptx

30.2 MB

Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.pdf

4.8 MB

Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.pdf

13.0 MB

Rotem Bar - Abusing SAST tools When scanners do more than just scanning.pdf

3.6 MB

Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.pdf

30.1 MB

Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pdf

2.8 MB

Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.pptx

5.6 MB

Salvador Mendoza - PINATA- PIN Automatic Try Attack - Slides.pdf

77.6 MB

Salvador Mendoza - PINATA- PIN Automatic Try Attack.pdf

7.6 MB

Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.pdf

2.7 MB

Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.pdf

14.1 MB

Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.odp

29.5 MB

Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.pdf

14.1 MB

Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Slides.pdf

1.0 MB

Tamas K Lengyel - Fuzzing Linux with Xen.pdf

10.5 MB

Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.pdf

9.5 MB

Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.pdf

7.5 MB

Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pdf

18.0 MB

Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.pptx

21.2 MB

Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pdf

7.1 MB

Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).pptx

13.6 MB

Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.pdf

6.6 MB

Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.pdf

3.9 MB

/DEF CON 29 short story contest/

Democrasoft by Burninator.txt

18.4 KB

FIRST PLACE - Networks by Gwisinkoht.txt

20.9 KB

PEOPLES CHOICE AWARD - FAICT by Serum.txt

31.7 KB

SECOND PLACE - Repository Upload by Alfred Rowdy.txt

8.8 KB

The Indomitable Signal by Panda.txt

13.2 KB

Untitled by phonebook.txt

12.0 KB

/DEF CON 29 video and slides/

DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.mp4

78.8 MB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.mp4

61.5 MB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times.mp4

62.5 MB

DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.mp4

22.3 MB

DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.mp4

67.5 MB

DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.mp4

68.8 MB

DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.mp4

43.2 MB

DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.mp4

75.1 MB

DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.mp4

65.4 MB

DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.mp4

43.0 MB

DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.mp4

51.5 MB

DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.mp4

78.5 MB

DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.mp4

47.9 MB

DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.mp4

142.7 MB

DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.mp4

80.5 MB

DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.mp4

51.2 MB

DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.mp4

40.8 MB

DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.mp4

62.5 MB

DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.mp4

1.7 MB

DEF CON 29 - Dan Petro - You're Doing IoT RNG.mp4

52.6 MB

DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.mp4

53.7 MB

DEF CON 29 - David Dworken - Worming through IDEs.mp4

21.9 MB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.mp4

52.6 MB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.mp4

37.9 MB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.mp4

28.6 MB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.mp4

29.0 MB

DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.mp4

31.2 MB

DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.mp4

91.3 MB

DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.mp4

54.5 MB

DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.mp4

56.9 MB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.mp4

36.4 MB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.mp4

1.3 MB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.mp4

2.5 MB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.mp4

2.5 MB

DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.mp4

45.3 MB

DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.mp4

29.5 MB

DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.mp4

42.0 MB

DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.mp4

49.6 MB

DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.mp4

66.0 MB

DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.mp4

28.9 MB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Demo.mp4

7.2 MB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.mp4

53.7 MB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.mp4

62.8 MB

DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.mp4

47.3 MB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.mp4

724.1 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.mp4

986.7 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.mp4

31.6 MB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.mp4

32.1 MB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2 - Demo Palo Alto.mp4

2.1 MB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2 - Demo SonicWall.mp4

1.7 MB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.mp4

47.6 MB

DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.mp4

35.3 MB

DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.mp4

64.9 MB

DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.mp4

54.9 MB

DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.mp4

47.4 MB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.mp4

42.9 MB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.mp4

55.1 MB

DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.mp4

65.5 MB

DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.mp4

43.1 MB

DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4

58.5 MB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.mp4

5.6 MB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.mp4

54.9 MB

DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.mp4

67.5 MB

DEF CON 29 - Paz Hameiri - TEMPEST radio station.mp4

61.3 MB

DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.mp4

72.7 MB

DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.mp4

112.6 MB

DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.mp4

107.4 MB

DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.mp4

41.7 MB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.mp4

4.3 MB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.mp4

63.9 MB

DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.mp4

54.1 MB

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.mp4

55.9 MB

DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.mp4

57.3 MB

DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.mp4

60.6 MB

DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.mp4

58.9 MB

DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.mp4

71.1 MB

DEF CON 29 - Sach - MAVSH - Attacking from Above.mp4

59.4 MB

DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.mp4

56.7 MB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.mp4

32.3 MB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.mp4

46.5 MB

DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.mp4

51.3 MB

DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.mp4

61.5 MB

DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.mp4

35.2 MB

DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.mp4

27.3 MB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.mp4

1.3 MB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.mp4

24.2 MB

DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.mp4

54.0 MB

DEF CON 29 - The Dark Tangent - Closing Ceremonies.mp4

235.6 MB

DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.mp4

113.0 MB

DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.mp4

43.5 MB

DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.mp4

49.4 MB

DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.mp4

54.7 MB

DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.mp4

43.1 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).mp4

34.2 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.mp4

2.1 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.mp4

2.4 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.mp4

1.1 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.mp4

3.1 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.mp4

3.6 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.mp4

1.9 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.mp4

1.9 MB

DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.mp4

43.0 MB

DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.mp4

39.3 MB

/.../DEF CON 29 video and slides captions/

DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.json

2.5 MB

DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.lrc

63.4 KB

DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.srt

68.4 KB

DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.text

49.6 KB

DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.tsv

57.7 KB

DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.txt

64.0 KB

DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.eng.vtt

63.0 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.json

2.3 MB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.lrc

56.2 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.srt

64.1 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.text

43.9 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.tsv

51.1 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.txt

56.7 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.eng.vtt

58.4 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.json

2.2 MB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.lrc

57.2 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.srt

62.3 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.text

40.3 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.tsv

50.2 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.txt

57.9 KB

DEF CON 29 - Agent X - A Look Inside Security at the New York Times.eng.vtt

56.0 KB

DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.json

903.8 KB

DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.lrc

28.1 KB

DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.srt

21.4 KB

DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.text

17.4 KB

DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.tsv

23.3 KB

DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.txt

28.5 KB

DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.eng.vtt

20.2 KB

DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.json

1.7 MB

DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.lrc

43.1 KB

DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.srt

46.6 KB

DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.text

33.8 KB

DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.tsv

39.2 KB

DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.txt

43.5 KB

DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.eng.vtt

43.0 KB

DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.json

2.3 MB

DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.lrc

65.5 KB

DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.srt

54.6 KB

DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.text

40.5 KB

DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.tsv

55.2 KB

DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.txt

66.5 KB

DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.eng.vtt

50.4 KB

DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.json

1.6 MB

DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.lrc

40.5 KB

DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.srt

47.0 KB

DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.text

31.5 KB

DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.tsv

36.7 KB

DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.txt

40.8 KB

DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.eng.vtt

42.6 KB

DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.json

2.1 MB

DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.lrc

50.7 KB

DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.srt

58.1 KB

DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.text

39.6 KB

DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.tsv

46.1 KB

DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.txt

51.2 KB

DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.eng.vtt

52.9 KB

DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.json

2.0 MB

DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.lrc

49.3 KB

DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.srt

53.2 KB

DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.text

38.5 KB

DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.tsv

44.8 KB

DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.txt

49.8 KB

DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.eng.vtt

49.0 KB

DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.json

1.2 MB

DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.lrc

31.0 KB

DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.srt

35.0 KB

DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.text

24.1 KB

DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.tsv

28.1 KB

DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.txt

31.3 KB

DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack.eng.vtt

31.9 KB

DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.json

1.7 MB

DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.lrc

42.7 KB

DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.srt

46.8 KB

DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.text

33.0 KB

DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.tsv

38.6 KB

DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.txt

43.1 KB

DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.eng.vtt

42.9 KB

DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.json

2.6 MB

DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.lrc

64.9 KB

DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.srt

67.2 KB

DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.text

50.9 KB

DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.tsv

59.2 KB

DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.txt

65.5 KB

DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.eng.vtt

62.5 KB

DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.json

2.0 MB

DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.lrc

49.3 KB

DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.srt

58.6 KB

DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.text

38.4 KB

DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.tsv

44.8 KB

DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.txt

49.8 KB

DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.eng.vtt

52.9 KB

DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.json

4.1 MB

DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.lrc

103.2 KB

DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.srt

113.7 KB

DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.text

79.9 KB

DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.tsv

93.0 KB

DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.txt

104.1 KB

DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.eng.vtt

105.6 KB

DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.json

3.1 MB

DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.lrc

76.8 KB

DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.srt

82.5 KB

DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.text

60.1 KB

DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.tsv

70.0 KB

DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.txt

77.4 KB

DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.eng.vtt

76.1 KB

DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.json

2.2 MB

DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.lrc

57.9 KB

DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.srt

56.0 KB

DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.text

45.5 KB

DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.tsv

52.7 KB

DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.txt

58.4 KB

DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.eng.vtt

53.0 KB

DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.json

1.5 MB

DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.lrc

36.2 KB

DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.srt

40.6 KB

DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.text

28.0 KB

DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.tsv

32.7 KB

DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.txt

36.5 KB

DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.eng.vtt

37.0 KB

DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.json

1.5 MB

DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.lrc

39.2 KB

DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.srt

41.5 KB

DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.text

30.8 KB

DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.tsv

35.6 KB

DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.txt

39.5 KB

DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.eng.vtt

38.5 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.json

84.6 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.lrc

2.2 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.srt

2.2 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.text

1.6 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.tsv

1.9 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.txt

2.3 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.eng.vtt

2.1 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.json

2.1 MB

DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.lrc

51.8 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.srt

57.1 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.text

40.7 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.tsv

47.1 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.txt

52.2 KB

DEF CON 29 - Dan Petro - You're Doing IoT RNG.eng.vtt

52.4 KB

DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.json

2.3 MB

DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.lrc

61.5 KB

DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.srt

64.1 KB

DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.text

43.2 KB

DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.tsv

53.9 KB

DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.txt

62.2 KB

DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.eng.vtt

58.1 KB

DEF CON 29 - David Dworken - Worming through IDEs.eng.json

1.0 MB

DEF CON 29 - David Dworken - Worming through IDEs.eng.lrc

25.6 KB

DEF CON 29 - David Dworken - Worming through IDEs.eng.srt

27.0 KB

DEF CON 29 - David Dworken - Worming through IDEs.eng.text

20.1 KB

DEF CON 29 - David Dworken - Worming through IDEs.eng.tsv

23.2 KB

DEF CON 29 - David Dworken - Worming through IDEs.eng.txt

25.8 KB

DEF CON 29 - David Dworken - Worming through IDEs.eng.vtt

25.1 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.json

2.6 MB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.lrc

64.9 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.srt

67.4 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.text

48.2 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.tsv

57.9 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.txt

65.5 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud - Live.eng.vtt

61.9 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.json

1.7 MB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.lrc

43.5 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.srt

48.9 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.text

32.1 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.tsv

38.6 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.txt

44.0 KB

DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.eng.vtt

44.1 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.json

925.0 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.lrc

25.6 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.srt

22.9 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.text

16.7 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.tsv

21.6 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.txt

26.0 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.eng.vtt

21.2 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.json

840.6 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.lrc

20.5 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.srt

22.5 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.text

16.6 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.tsv

18.7 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.txt

20.7 KB

DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.eng.vtt

20.9 KB

DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.json

1.2 MB

DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.lrc

33.2 KB

DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.srt

34.7 KB

DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.text

25.2 KB

DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.tsv

29.7 KB

DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.txt

33.5 KB

DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.eng.vtt

32.0 KB

DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.json

2.7 MB

DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.lrc

85.6 KB

DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.srt

59.7 KB

DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.text

43.1 KB

DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.tsv

68.0 KB

DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.txt

87.2 KB

DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.eng.vtt

54.6 KB

DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.json

1.4 MB

DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.lrc

36.5 KB

DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.srt

40.4 KB

DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.text

27.3 KB

DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.tsv

32.6 KB

DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.txt

36.8 KB

DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.eng.vtt

36.7 KB

DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.json

2.4 MB

DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.lrc

58.2 KB

DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.srt

68.9 KB

DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.text

45.6 KB

DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.tsv

53.0 KB

DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.txt

58.7 KB

DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.eng.vtt

62.3 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.json

2.2 MB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.lrc

54.5 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.srt

63.9 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.text

42.7 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.tsv

49.6 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.txt

54.9 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.eng.vtt

57.9 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.json

105.6 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.lrc

2.7 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.srt

2.8 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.text

2.1 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.tsv

2.3 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.txt

2.7 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.eng.vtt

2.6 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.json

188.3 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.lrc

4.8 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.srt

5.1 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.text

3.5 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.tsv

4.2 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.txt

4.9 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.eng.vtt

4.7 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.json

130.2 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.lrc

3.2 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.srt

3.2 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.text

2.4 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.tsv

2.8 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.txt

3.3 KB

DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.eng.vtt

3.0 KB

DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.json

1.9 MB

DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.lrc

52.7 KB

DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.srt

46.7 KB

DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.text

32.4 KB

DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.tsv

44.4 KB

DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.txt

53.5 KB

DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.eng.vtt

42.5 KB

DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.json

760.9 KB

DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.lrc

20.0 KB

DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.srt

20.6 KB

DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.text

14.2 KB

DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.tsv

17.3 KB

DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.txt

20.2 KB

DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.eng.vtt

18.9 KB

DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.json

1.7 MB

DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.lrc

47.3 KB

DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.srt

45.2 KB

DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.text

31.3 KB

DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.tsv

40.5 KB

DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.txt

47.9 KB

DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.eng.vtt

41.2 KB

DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.json

2.1 MB

DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.lrc

64.0 KB

DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.srt

46.7 KB

DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.text

36.2 KB

DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.tsv

52.6 KB

DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.txt

65.0 KB

DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.eng.vtt

43.5 KB

DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.json

2.1 MB

DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.lrc

51.5 KB

DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.srt

61.2 KB

DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.text

40.0 KB

DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.tsv

46.7 KB

DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.txt

51.9 KB

DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All.eng.vtt

55.2 KB

DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.json

1.1 MB

DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.lrc

26.3 KB

DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.srt

29.3 KB

DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.text

20.6 KB

DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.tsv

23.8 KB

DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.txt

26.5 KB

DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.eng.vtt

26.9 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.json

2.3 MB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.lrc

54.3 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.srt

72.1 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.text

42.3 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.tsv

49.4 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.txt

54.8 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.eng.vtt

63.6 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.json

1.7 MB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.lrc

40.8 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.srt

50.5 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.text

34.5 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.tsv

38.1 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.txt

41.1 KB

DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.eng.vtt

46.0 KB

DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.json

1.7 MB

DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.lrc

43.7 KB

DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.srt

47.1 KB

DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.text

33.3 KB

DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.tsv

39.4 KB

DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.txt

44.1 KB

DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.eng.vtt

43.2 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.json

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.lrc

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.srt

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.text

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.tsv

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.txt

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.eng.vtt

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.json

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.lrc

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.srt

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.text

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.tsv

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.txt

0.0 KB

DEF CON 29 - Joseph Gabay - Dos Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.eng.vtt

0.0 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.json

1.6 MB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.lrc

38.9 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.srt

42.6 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.text

30.3 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.tsv

35.2 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.txt

39.3 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Live.eng.vtt

39.1 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.json

1.1 MB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.lrc

26.4 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.srt

29.2 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.text

20.7 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.tsv

23.8 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.txt

26.6 KB

DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.eng.vtt

26.8 KB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.json

2.1 MB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.lrc

59.1 KB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.srt

50.0 KB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.text

36.7 KB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.tsv

49.5 KB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.txt

60.0 KB

DEF CON 29 - Justin Perdok - Hi Im DOMAIN Steve, please let me access VLAN2.eng.vtt

46.1 KB

DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.json

1.9 MB

DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.lrc

48.3 KB

DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.srt

52.4 KB

DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.text

37.2 KB

DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.tsv

43.7 KB

DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.txt

48.8 KB

DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.eng.vtt

48.1 KB

DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.json

2.3 MB

DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.lrc

57.6 KB

DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.srt

62.9 KB

DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.text

45.0 KB

DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.tsv

52.4 KB

DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.txt

58.1 KB

DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.eng.vtt

57.8 KB

DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.json

1.6 MB

DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.lrc

38.4 KB

DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.srt

42.4 KB

DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.text

29.7 KB

DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.tsv

34.7 KB

DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.txt

38.7 KB

DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.eng.vtt

38.8 KB

DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.json

2.1 MB

DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.lrc

60.4 KB

DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.srt

47.8 KB

DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.text

38.5 KB

DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.tsv

51.4 KB

DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.txt

61.2 KB

DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.eng.vtt

45.0 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.json

2.5 MB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.lrc

60.8 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.srt

65.4 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.text

47.1 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.tsv

55.1 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.txt

61.3 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic - Live.eng.vtt

60.2 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.json

2.8 MB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.lrc

66.0 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.srt

67.5 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.text

50.6 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.tsv

59.7 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.txt

66.6 KB

DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.eng.vtt

62.7 KB

DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.json

2.0 MB

DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.lrc

46.9 KB

DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.srt

63.5 KB

DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.text

36.7 KB

DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.tsv

42.7 KB

DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.txt

47.3 KB

DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge.eng.vtt

55.9 KB

DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.json

1.2 MB

DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.lrc

27.6 KB

DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.srt

36.7 KB

DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.text

21.4 KB

DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.tsv

24.9 KB

DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.txt

27.8 KB

DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.eng.vtt

32.4 KB

DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.json

1.4 MB

DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.lrc

37.8 KB

DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.srt

42.3 KB

DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.text

29.0 KB

DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.tsv

34.2 KB

DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.txt

38.2 KB

DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.eng.vtt

38.5 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.json

268.1 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.lrc

6.3 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.srt

6.7 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.text

4.9 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.tsv

5.7 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.txt

6.4 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.eng.vtt

6.3 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.json

2.0 MB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.lrc

49.4 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.srt

50.5 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.text

38.6 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.tsv

44.9 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.txt

49.8 KB

DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.eng.vtt

47.1 KB

DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.json

2.1 MB

DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.lrc

59.7 KB

DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.srt

54.5 KB

DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.text

39.4 KB

DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.tsv

51.3 KB

DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.txt

60.5 KB

DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.eng.vtt

50.1 KB

DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.json

1.5 MB

DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.lrc

37.1 KB

DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.srt

43.8 KB

DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.text

28.4 KB

DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.tsv

33.5 KB

DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.txt

37.4 KB

DEF CON 29 - Paz Hameiri - TEMPEST radio station.eng.vtt

39.5 KB

DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.json

2.4 MB

DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.lrc

60.0 KB

DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.srt

63.5 KB

DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.text

47.1 KB

DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.tsv

54.7 KB

DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.txt

60.5 KB

DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace.eng.vtt

58.8 KB

DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.json

3.2 MB

DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.lrc

101.8 KB

DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.srt

71.3 KB

DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.text

48.5 KB

DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.tsv

80.5 KB

DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.txt

103.8 KB

DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge.eng.vtt

64.4 KB

DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.json

2.9 MB

DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.lrc

79.7 KB

DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.srt

74.2 KB

DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.text

52.1 KB

DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.tsv

68.5 KB

DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.txt

80.7 KB

DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection.eng.vtt

67.7 KB

DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.json

1.3 MB

DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.lrc

33.9 KB

DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.srt

36.7 KB

DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.text

26.0 KB

DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.tsv

30.6 KB

DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.txt

34.2 KB

DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.eng.vtt

33.7 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.json

112.5 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.lrc

2.7 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.srt

2.8 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.text

2.1 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.tsv

2.4 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.txt

2.7 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.eng.vtt

2.6 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.json

1.9 MB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.lrc

47.4 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.srt

50.4 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.text

37.1 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.tsv

43.1 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.txt

47.8 KB

DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.vtt

46.6 KB

DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.json

1.9 MB

DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.lrc

48.2 KB

DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.srt

52.4 KB

DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.text

37.4 KB

DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.tsv

43.7 KB

DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.txt

48.6 KB

DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.eng.vtt

48.2 KB

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.json

2.1 MB

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.lrc

58.8 KB

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.srt

52.2 KB

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.text

35.2 KB

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.tsv

49.0 KB

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.txt

59.7 KB

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.eng.vtt

47.3 KB

DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.json

1.8 MB

DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.lrc

44.5 KB

DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.srt

48.5 KB

DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.text

34.8 KB

DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.tsv

40.4 KB

DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.txt

44.8 KB

DEF CON 29 - Richard Thieme AKA neuralcowbo - UFOs - Misinformation, Disinformation, and the Basic Truth.eng.vtt

44.6 KB

DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.json

1.9 MB

DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.lrc

46.8 KB

DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.srt

51.0 KB

DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.text

36.5 KB

DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.tsv

42.5 KB

DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.txt

47.2 KB

DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee- Signal analysis and RE of a proprietary audio-data encoding protocol.eng.vtt

46.9 KB

DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.json

1.6 MB

DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.lrc

39.3 KB

DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.srt

49.4 KB

DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.text

30.4 KB

DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.tsv

35.6 KB

DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.txt

39.7 KB

DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.eng.vtt

44.0 KB

DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.json

2.3 MB

DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.lrc

54.2 KB

DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.srt

65.6 KB

DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.text

42.7 KB

DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.tsv

49.3 KB

DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.txt

54.7 KB

DEF CON 29 - Roy Davis - No Key- No PIN- No Combo- No Problem P0wning ATMs For Fun and Profit.eng.vtt

59.1 KB

DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.json

2.5 MB

DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.lrc

64.9 KB

DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.srt

66.2 KB

DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.text

46.6 KB

DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.tsv

57.5 KB

DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.txt

65.6 KB

DEF CON 29 - Sach - MAVSH - Attacking from Above.eng.vtt

60.6 KB

DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.json

1.7 MB

DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.lrc

47.7 KB

DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.srt

40.4 KB

DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.text

28.9 KB

DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.tsv

39.9 KB

DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.txt

48.5 KB

DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.eng.vtt

37.1 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.json

1.3 MB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.lrc

32.8 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.srt

32.4 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.text

23.0 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.tsv

28.5 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.txt

33.2 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.eng.vtt

29.8 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.json

1.4 MB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.lrc

33.7 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.srt

36.1 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.text

26.2 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.tsv

30.5 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.txt

34.0 KB

DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.eng.vtt

33.3 KB

DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.json

2.0 MB

DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.lrc

46.2 KB

DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.srt

53.0 KB

DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.text

37.5 KB

DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.tsv

42.6 KB

DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.txt

46.6 KB

DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.eng.vtt

48.6 KB

DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.json

1.9 MB

DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.lrc

52.4 KB

DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.srt

46.1 KB

DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.text

32.0 KB

DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.tsv

43.9 KB

DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.txt

53.2 KB

DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.eng.vtt

42.0 KB

DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.json

1.1 MB

DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.lrc

28.6 KB

DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.srt

31.7 KB

DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.text

22.1 KB

DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.tsv

25.8 KB

DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.txt

28.9 KB

DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.eng.vtt

29.0 KB

DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.json

1.5 MB

DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.lrc

36.4 KB

DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.srt

39.4 KB

DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.text

28.4 KB

DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.tsv

32.9 KB

DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.txt

36.8 KB

DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.eng.vtt

36.3 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.json

0.0 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.lrc

0.0 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.srt

0.0 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.text

0.0 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.tsv

0.0 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.txt

0.0 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book - Demo.eng.vtt

0.0 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.json

698.1 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.lrc

20.5 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.srt

17.5 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.text

12.6 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.tsv

16.8 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.txt

20.8 KB

DEF CON 29 - Slava Makkaveev - Do you like to read- I know how to take over your Kindle with an e-book.eng.vtt

16.1 KB

DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.json

2.2 MB

DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.lrc

59.4 KB

DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.srt

49.5 KB

DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.text

36.6 KB

DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.tsv

49.9 KB

DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.txt

60.2 KB

DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.eng.vtt

45.7 KB

DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.json

4.3 MB

DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.lrc

102.4 KB

DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.srt

128.7 KB

DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.text

78.2 KB

DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.tsv

91.5 KB

DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.txt

103.3 KB

DEF CON 29 - The Dark Tangent - Closing Ceremonies.eng.vtt

117.7 KB

DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.json

2.1 MB

DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.lrc

47.4 KB

DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.srt

63.0 KB

DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.text

36.9 KB

DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.tsv

43.0 KB

DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.txt

47.9 KB

DEF CON 29 - The Dark Tangent, Panel - DEF CON 102.eng.vtt

55.6 KB

DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.json

1.9 MB

DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.lrc

52.2 KB

DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.srt

46.2 KB

DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.text

33.6 KB

DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.tsv

44.3 KB

DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.txt

52.9 KB

DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.eng.vtt

42.5 KB

DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.json

1.5 MB

DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.lrc

39.8 KB

DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.srt

43.3 KB

DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.text

30.7 KB

DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.tsv

36.0 KB

DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.txt

40.2 KB

DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.eng.vtt

39.8 KB

DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.json

1.4 MB

DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.lrc

36.2 KB

DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.srt

39.4 KB

DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.text

29.0 KB

DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.tsv

33.2 KB

DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.txt

36.5 KB

DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.eng.vtt

36.5 KB

DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.json

1.7 MB

DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.lrc

51.4 KB

DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.srt

44.0 KB

DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.text

31.0 KB

DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.tsv

42.9 KB

DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.txt

52.2 KB

DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.eng.vtt

40.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.json

1.0 MB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.lrc

27.3 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.srt

27.8 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.text

21.5 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.tsv

24.7 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.txt

27.5 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).eng.vtt

26.0 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.json

42.7 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.lrc

1.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.srt

1.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.text

0.9 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.tsv

1.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.txt

1.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.eng.vtt

1.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.json

48.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.lrc

1.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.srt

1.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.text

0.9 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.tsv

1.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.txt

1.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.eng.vtt

1.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.json

15.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.lrc

0.4 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.srt

0.4 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.text

0.3 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.tsv

0.4 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.txt

0.4 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.eng.vtt

0.4 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.json

39.0 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.lrc

1.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.srt

1.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.text

0.8 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.tsv

1.0 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.txt

1.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.eng.vtt

1.0 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.json

83.0 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.lrc

2.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.srt

2.2 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.text

1.7 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.tsv

1.9 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.txt

2.1 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.eng.vtt

2.0 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.json

35.3 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.lrc

0.9 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.srt

0.8 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.text

0.7 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.tsv

0.8 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.txt

0.9 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.eng.vtt

0.8 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.json

37.5 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.lrc

1.0 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.srt

0.9 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.text

0.8 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.tsv

0.9 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.txt

1.0 KB

DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.eng.vtt

0.9 KB

DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.json

1.5 MB

DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.lrc

39.8 KB

DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.srt

42.0 KB

DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.text

28.0 KB

DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.tsv

34.8 KB

DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.txt

40.3 KB

DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.eng.vtt

38.0 KB

DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.json

1.3 MB

DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.lrc

36.6 KB

DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.srt

38.8 KB

DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.text

26.7 KB

DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.tsv

32.4 KB

DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.txt

36.9 KB

DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.eng.vtt

35.4 KB

/DEF CON 29 video logos/

DEF CON 29 - logo - 3d swril.mp4

4.6 MB

DEF CON 29 - logo - blob.mp4

2.8 MB

DEF CON 29 - logo - Flowing purple blob wave.mp4

1.4 MB

DEF CON 29 - logo - fly over wavy grid.mp4

5.4 MB

DEF CON 29 - logo - green fast sweep.mp4

1.2 MB

DEF CON 29 - logo - green glitchy.mp4

1.6 MB

DEF CON 29 - logo - origami.mp4

8.6 MB

DEF CON 29 - logo - wavy crystal.mp4

5.2 MB

DEF CON 29 - logo - wire tunnel fast.mp4

16.4 MB

DEF CON 29 - logo - Xwing targeting computer.mp4

1.5 MB

/DEF CON 29 videos by Alex Chaveriat/

DEF CON 29 - Video Team - Debriefing My DEF CON 29... and Gourry.mp4

28.0 MB

DEF CON 29 - Video Team - DEF CON - The Good, the Bad, and the Awkward.mp4

20.3 MB

DEF CON 29 - Video Team - Hack a Airplane [Aerospace Village].mp4

41.7 MB

DEF CON 29 - Video Team - Hack a Boat [SEA-TF Maritime Hacking] Contest.mp4

29.7 MB

DEF CON 29 - Video Team - Hack a Satellite [Hack-A-Sat] Contest.mp4

42.6 MB

DEF CON 29 - Video Team - Hackers and Paper Airplanes [Aerospace Village].mp4

12.0 MB

DEF CON 29 - Video Team - HACKING DEFCON with a URINAL CAKE.mp4

31.9 MB

DEF CON 29 - Video Team - Hardware Hacking Village [with Kralik].mp4

21.8 MB

DEF CON 29 - Video Team - Hats off for HelmetCon.mp4

23.3 MB

DEF CON 29 - Video Team - Hooked to a Lie Detector [Tor Badge] #badgelife.mp4

29.6 MB

DEF CON 29 - Video Team - Internet Controlled Helmet [with JRWR].mp4

42.4 MB

DEF CON 29 - Video Team - Let's Get Paranoid with Tin Foil Hat [with Krux].mp4

21.4 MB

DEF CON 29 - Video Team - Meeting DEF CON 29 Goer [alt bier] #badgelife.mp4

6.8 MB

DEF CON 29 - Video Team - Motorcycle Hacking at the Car Hacking Village.mp4

43.4 MB

DEF CON 29 - Video Team - My DEF CON 29 just got WEIRD - THANK YOU.mp4

29.3 MB

DEF CON 29 - Video Team - My Favorite DEF CON Low-Tech Hacking Story #Shorts.mp4

1.7 MB

DEF CON 29 - Video Team - My HELMET is hacking the WIRELESS spectrum.mp4

42.8 MB

DEF CON 29 - Video Team - Propagate the Signal [with JRWR] #badgelife.mp4

9.6 MB

DEF CON 29 - Video Team - Sending a Image Over Ham Radio.mp4

9.4 MB

DEF CON 29 - Video Team - Space Rover Hacking [Aerospace Village].mp4

64.3 MB

DEF CON 29 - Video Team - The DEFCON Darknet Badge Spreads STDs to Hackers.mp4

8.1 MB

DEF CON 29 - Video Team - Theremin Badge at DEF CON #badgelife #Shorts.mp4

600.8 KB

DEF CON 29 - Video Team - Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.mp4

31.7 MB

DEF CON 29 - Video Team - We just - enjoyed - PEPPERCON at DEF CON 29.mp4

12.8 MB

DEF CON 29 - Video Team - What Happened At DEF CON 29.mp4

189.4 MB

DEF CON 29 - Video Team - What is DEF CON Scavenger Hunt.mp4

20.8 MB

DEF CON 29 - Video Team - What is the Ham Radio Village.mp4

20.4 MB

/.../DEF CON 29 videos by Alex Chaveriat captions/

DEF CON 29 - Video Team - Debriefing My DEF CON 29... and Gourry.eng.json

395.4 KB

DEF CON 29 - Video Team - Debriefing My DEF CON 29... and Gourry.eng.lrc

9.9 KB

DEF CON 29 - Video Team - Debriefing My DEF CON 29... and Gourry.eng.srt

11.3 KB

DEF CON 29 - Video Team - Debriefing My DEF CON 29... and Gourry.eng.text

6.7 KB

DEF CON 29 - Video Team - Debriefing My DEF CON 29... and Gourry.eng.tsv

8.4 KB

DEF CON 29 - Video Team - Debriefing My DEF CON 29... and Gourry.eng.txt

10.1 KB

DEF CON 29 - Video Team - Debriefing My DEF CON 29... and Gourry.eng.vtt

10.1 KB

DEF CON 29 - Video Team - DEF CON - The Good, the Bad, and the Awkward.eng.json

334.5 KB

DEF CON 29 - Video Team - DEF CON - The Good, the Bad, and the Awkward.eng.lrc

8.6 KB

DEF CON 29 - Video Team - DEF CON - The Good, the Bad, and the Awkward.eng.srt

9.1 KB

DEF CON 29 - Video Team - DEF CON - The Good, the Bad, and the Awkward.eng.text

5.8 KB

DEF CON 29 - Video Team - DEF CON - The Good, the Bad, and the Awkward.eng.tsv

7.2 KB

DEF CON 29 - Video Team - DEF CON - The Good, the Bad, and the Awkward.eng.txt

8.7 KB

DEF CON 29 - Video Team - DEF CON - The Good, the Bad, and the Awkward.eng.vtt

8.2 KB

DEF CON 29 - Video Team - Hack a Airplane [Aerospace Village].eng.json

339.2 KB

DEF CON 29 - Video Team - Hack a Airplane [Aerospace Village].eng.lrc

8.7 KB

DEF CON 29 - Video Team - Hack a Airplane [Aerospace Village].eng.srt

9.8 KB

DEF CON 29 - Video Team - Hack a Airplane [Aerospace Village].eng.text

6.0 KB

DEF CON 29 - Video Team - Hack a Airplane [Aerospace Village].eng.tsv

7.4 KB

DEF CON 29 - Video Team - Hack a Airplane [Aerospace Village].eng.txt

8.8 KB

DEF CON 29 - Video Team - Hack a Airplane [Aerospace Village].eng.vtt

8.8 KB

DEF CON 29 - Video Team - Hack a Boat [SEA-TF Maritime Hacking] Contest.eng.json

278.3 KB

DEF CON 29 - Video Team - Hack a Boat [SEA-TF Maritime Hacking] Contest.eng.lrc

7.1 KB

DEF CON 29 - Video Team - Hack a Boat [SEA-TF Maritime Hacking] Contest.eng.srt

8.2 KB

DEF CON 29 - Video Team - Hack a Boat [SEA-TF Maritime Hacking] Contest.eng.text

5.2 KB

DEF CON 29 - Video Team - Hack a Boat [SEA-TF Maritime Hacking] Contest.eng.tsv

6.2 KB

DEF CON 29 - Video Team - Hack a Boat [SEA-TF Maritime Hacking] Contest.eng.txt

7.1 KB

DEF CON 29 - Video Team - Hack a Boat [SEA-TF Maritime Hacking] Contest.eng.vtt

7.4 KB

DEF CON 29 - Video Team - Hack a Satellite [Hack-A-Sat] Contest.eng.json

555.4 KB

DEF CON 29 - Video Team - Hack a Satellite [Hack-A-Sat] Contest.eng.lrc

13.1 KB

DEF CON 29 - Video Team - Hack a Satellite [Hack-A-Sat] Contest.eng.srt

14.1 KB

DEF CON 29 - Video Team - Hack a Satellite [Hack-A-Sat] Contest.eng.text

10.2 KB

DEF CON 29 - Video Team - Hack a Satellite [Hack-A-Sat] Contest.eng.tsv

11.7 KB

DEF CON 29 - Video Team - Hack a Satellite [Hack-A-Sat] Contest.eng.txt

13.2 KB

DEF CON 29 - Video Team - Hack a Satellite [Hack-A-Sat] Contest.eng.vtt

13.0 KB

DEF CON 29 - Video Team - Hackers and Paper Airplanes [Aerospace Village].eng.json

129.6 KB

DEF CON 29 - Video Team - Hackers and Paper Airplanes [Aerospace Village].eng.lrc

2.9 KB

DEF CON 29 - Video Team - Hackers and Paper Airplanes [Aerospace Village].eng.srt

4.0 KB

DEF CON 29 - Video Team - Hackers and Paper Airplanes [Aerospace Village].eng.text

2.3 KB

DEF CON 29 - Video Team - Hackers and Paper Airplanes [Aerospace Village].eng.tsv

2.6 KB

DEF CON 29 - Video Team - Hackers and Paper Airplanes [Aerospace Village].eng.txt

3.0 KB

DEF CON 29 - Video Team - Hackers and Paper Airplanes [Aerospace Village].eng.vtt

3.6 KB

DEF CON 29 - Video Team - HACKING DEFCON with a URINAL CAKE.eng.json

474.4 KB

DEF CON 29 - Video Team - HACKING DEFCON with a URINAL CAKE.eng.lrc

11.9 KB

DEF CON 29 - Video Team - HACKING DEFCON with a URINAL CAKE.eng.srt

14.5 KB

DEF CON 29 - Video Team - HACKING DEFCON with a URINAL CAKE.eng.text

9.3 KB

DEF CON 29 - Video Team - HACKING DEFCON with a URINAL CAKE.eng.tsv

10.7 KB

DEF CON 29 - Video Team - HACKING DEFCON with a URINAL CAKE.eng.txt

12.0 KB

DEF CON 29 - Video Team - HACKING DEFCON with a URINAL CAKE.eng.vtt

13.1 KB

DEF CON 29 - Video Team - Hardware Hacking Village [with Kralik].eng.json

212.4 KB

DEF CON 29 - Video Team - Hardware Hacking Village [with Kralik].eng.lrc

4.8 KB

DEF CON 29 - Video Team - Hardware Hacking Village [with Kralik].eng.srt

5.8 KB

DEF CON 29 - Video Team - Hardware Hacking Village [with Kralik].eng.text

3.8 KB

DEF CON 29 - Video Team - Hardware Hacking Village [with Kralik].eng.tsv

4.3 KB

DEF CON 29 - Video Team - Hardware Hacking Village [with Kralik].eng.txt

4.8 KB

DEF CON 29 - Video Team - Hardware Hacking Village [with Kralik].eng.vtt

5.3 KB

DEF CON 29 - Video Team - Hats off for HelmetCon.eng.json

236.3 KB

DEF CON 29 - Video Team - Hats off for HelmetCon.eng.lrc

5.5 KB

DEF CON 29 - Video Team - Hats off for HelmetCon.eng.srt

6.6 KB

DEF CON 29 - Video Team - Hats off for HelmetCon.eng.text

4.3 KB

DEF CON 29 - Video Team - Hats off for HelmetCon.eng.tsv

4.9 KB

DEF CON 29 - Video Team - Hats off for HelmetCon.eng.txt

5.5 KB

DEF CON 29 - Video Team - Hats off for HelmetCon.eng.vtt

6.0 KB

DEF CON 29 - Video Team - Hooked to a Lie Detector [Tor Badge] #badgelife.eng.json

377.9 KB

DEF CON 29 - Video Team - Hooked to a Lie Detector [Tor Badge] #badgelife.eng.lrc

9.1 KB

DEF CON 29 - Video Team - Hooked to a Lie Detector [Tor Badge] #badgelife.eng.srt

11.4 KB

DEF CON 29 - Video Team - Hooked to a Lie Detector [Tor Badge] #badgelife.eng.text

7.0 KB

DEF CON 29 - Video Team - Hooked to a Lie Detector [Tor Badge] #badgelife.eng.tsv

8.1 KB

DEF CON 29 - Video Team - Hooked to a Lie Detector [Tor Badge] #badgelife.eng.txt

9.1 KB

DEF CON 29 - Video Team - Hooked to a Lie Detector [Tor Badge] #badgelife.eng.vtt

10.3 KB

DEF CON 29 - Video Team - Internet Controlled Helmet [with JRWR].eng.json

311.3 KB

DEF CON 29 - Video Team - Internet Controlled Helmet [with JRWR].eng.lrc

7.5 KB

DEF CON 29 - Video Team - Internet Controlled Helmet [with JRWR].eng.srt

8.9 KB

DEF CON 29 - Video Team - Internet Controlled Helmet [with JRWR].eng.text

5.4 KB

DEF CON 29 - Video Team - Internet Controlled Helmet [with JRWR].eng.tsv

6.5 KB

DEF CON 29 - Video Team - Internet Controlled Helmet [with JRWR].eng.txt

7.5 KB

DEF CON 29 - Video Team - Internet Controlled Helmet [with JRWR].eng.vtt

8.0 KB

DEF CON 29 - Video Team - Let's Get Paranoid with Tin Foil Hat [with Krux].eng.json

98.6 KB

DEF CON 29 - Video Team - Let's Get Paranoid with Tin Foil Hat [with Krux].eng.lrc

2.5 KB

DEF CON 29 - Video Team - Let's Get Paranoid with Tin Foil Hat [with Krux].eng.srt

3.0 KB

DEF CON 29 - Video Team - Let's Get Paranoid with Tin Foil Hat [with Krux].eng.text

1.9 KB

DEF CON 29 - Video Team - Let's Get Paranoid with Tin Foil Hat [with Krux].eng.tsv

2.2 KB

DEF CON 29 - Video Team - Let's Get Paranoid with Tin Foil Hat [with Krux].eng.txt

2.5 KB

DEF CON 29 - Video Team - Let's Get Paranoid with Tin Foil Hat [with Krux].eng.vtt

2.7 KB

DEF CON 29 - Video Team - Meeting DEF CON 29 Goer [alt bier] #badgelife.eng.json

79.2 KB

DEF CON 29 - Video Team - Meeting DEF CON 29 Goer [alt bier] #badgelife.eng.lrc

2.0 KB

DEF CON 29 - Video Team - Meeting DEF CON 29 Goer [alt bier] #badgelife.eng.srt

2.2 KB

DEF CON 29 - Video Team - Meeting DEF CON 29 Goer [alt bier] #badgelife.eng.text

1.4 KB

DEF CON 29 - Video Team - Meeting DEF CON 29 Goer [alt bier] #badgelife.eng.tsv

1.7 KB

DEF CON 29 - Video Team - Meeting DEF CON 29 Goer [alt bier] #badgelife.eng.txt

2.0 KB

DEF CON 29 - Video Team - Meeting DEF CON 29 Goer [alt bier] #badgelife.eng.vtt

2.0 KB

DEF CON 29 - Video Team - Motorcycle Hacking at the Car Hacking Village.eng.json

270.1 KB

DEF CON 29 - Video Team - Motorcycle Hacking at the Car Hacking Village.eng.lrc

6.6 KB

DEF CON 29 - Video Team - Motorcycle Hacking at the Car Hacking Village.eng.srt

7.3 KB

DEF CON 29 - Video Team - Motorcycle Hacking at the Car Hacking Village.eng.text

5.2 KB

DEF CON 29 - Video Team - Motorcycle Hacking at the Car Hacking Village.eng.tsv

5.9 KB

DEF CON 29 - Video Team - Motorcycle Hacking at the Car Hacking Village.eng.txt

6.6 KB

DEF CON 29 - Video Team - Motorcycle Hacking at the Car Hacking Village.eng.vtt

6.7 KB

DEF CON 29 - Video Team - My DEF CON 29 just got WEIRD - THANK YOU.eng.json

504.4 KB

DEF CON 29 - Video Team - My DEF CON 29 just got WEIRD - THANK YOU.eng.lrc

11.9 KB

DEF CON 29 - Video Team - My DEF CON 29 just got WEIRD - THANK YOU.eng.srt

14.9 KB

DEF CON 29 - Video Team - My DEF CON 29 just got WEIRD - THANK YOU.eng.text

9.3 KB

DEF CON 29 - Video Team - My DEF CON 29 just got WEIRD - THANK YOU.eng.tsv

10.7 KB

DEF CON 29 - Video Team - My DEF CON 29 just got WEIRD - THANK YOU.eng.txt

12.0 KB

DEF CON 29 - Video Team - My DEF CON 29 just got WEIRD - THANK YOU.eng.vtt

13.4 KB

DEF CON 29 - Video Team - My Favorite DEF CON Low-Tech Hacking Story #Shorts.eng.json

38.5 KB

DEF CON 29 - Video Team - My Favorite DEF CON Low-Tech Hacking Story #Shorts.eng.lrc

1.0 KB

DEF CON 29 - Video Team - My Favorite DEF CON Low-Tech Hacking Story #Shorts.eng.srt

1.0 KB

DEF CON 29 - Video Team - My Favorite DEF CON Low-Tech Hacking Story #Shorts.eng.text

0.8 KB

DEF CON 29 - Video Team - My Favorite DEF CON Low-Tech Hacking Story #Shorts.eng.tsv

0.9 KB

DEF CON 29 - Video Team - My Favorite DEF CON Low-Tech Hacking Story #Shorts.eng.txt

1.0 KB

DEF CON 29 - Video Team - My Favorite DEF CON Low-Tech Hacking Story #Shorts.eng.vtt

1.0 KB

DEF CON 29 - Video Team - My HELMET is hacking the WIRELESS spectrum.eng.json

341.7 KB

DEF CON 29 - Video Team - My HELMET is hacking the WIRELESS spectrum.eng.lrc

8.0 KB

DEF CON 29 - Video Team - My HELMET is hacking the WIRELESS spectrum.eng.srt

9.8 KB

DEF CON 29 - Video Team - My HELMET is hacking the WIRELESS spectrum.eng.text

6.2 KB

DEF CON 29 - Video Team - My HELMET is hacking the WIRELESS spectrum.eng.tsv

7.1 KB

DEF CON 29 - Video Team - My HELMET is hacking the WIRELESS spectrum.eng.txt

8.1 KB

DEF CON 29 - Video Team - My HELMET is hacking the WIRELESS spectrum.eng.vtt

8.9 KB

DEF CON 29 - Video Team - Propagate the Signal [with JRWR] #badgelife.eng.json

89.7 KB

DEF CON 29 - Video Team - Propagate the Signal [with JRWR] #badgelife.eng.lrc

2.3 KB

DEF CON 29 - Video Team - Propagate the Signal [with JRWR] #badgelife.eng.srt

2.8 KB

DEF CON 29 - Video Team - Propagate the Signal [with JRWR] #badgelife.eng.text

1.6 KB

DEF CON 29 - Video Team - Propagate the Signal [with JRWR] #badgelife.eng.tsv

1.9 KB

DEF CON 29 - Video Team - Propagate the Signal [with JRWR] #badgelife.eng.txt

2.3 KB

DEF CON 29 - Video Team - Propagate the Signal [with JRWR] #badgelife.eng.vtt

2.5 KB

DEF CON 29 - Video Team - Sending a Image Over Ham Radio.eng.json

100.8 KB

DEF CON 29 - Video Team - Sending a Image Over Ham Radio.eng.lrc

2.6 KB

DEF CON 29 - Video Team - Sending a Image Over Ham Radio.eng.srt

3.0 KB

DEF CON 29 - Video Team - Sending a Image Over Ham Radio.eng.text

1.7 KB

DEF CON 29 - Video Team - Sending a Image Over Ham Radio.eng.tsv

2.1 KB

DEF CON 29 - Video Team - Sending a Image Over Ham Radio.eng.txt

2.6 KB

DEF CON 29 - Video Team - Sending a Image Over Ham Radio.eng.vtt

2.7 KB

DEF CON 29 - Video Team - Space Rover Hacking [Aerospace Village].eng.json

493.3 KB

DEF CON 29 - Video Team - Space Rover Hacking [Aerospace Village].eng.lrc

12.2 KB

DEF CON 29 - Video Team - Space Rover Hacking [Aerospace Village].eng.srt

13.7 KB

DEF CON 29 - Video Team - Space Rover Hacking [Aerospace Village].eng.text

9.4 KB

DEF CON 29 - Video Team - Space Rover Hacking [Aerospace Village].eng.tsv

10.9 KB

DEF CON 29 - Video Team - Space Rover Hacking [Aerospace Village].eng.txt

12.3 KB

DEF CON 29 - Video Team - Space Rover Hacking [Aerospace Village].eng.vtt

12.5 KB

DEF CON 29 - Video Team - The DEFCON Darknet Badge Spreads STDs to Hackers.eng.json

136.6 KB

DEF CON 29 - Video Team - The DEFCON Darknet Badge Spreads STDs to Hackers.eng.lrc

3.5 KB

DEF CON 29 - Video Team - The DEFCON Darknet Badge Spreads STDs to Hackers.eng.srt

3.8 KB

DEF CON 29 - Video Team - The DEFCON Darknet Badge Spreads STDs to Hackers.eng.text

2.7 KB

DEF CON 29 - Video Team - The DEFCON Darknet Badge Spreads STDs to Hackers.eng.tsv

3.1 KB

DEF CON 29 - Video Team - The DEFCON Darknet Badge Spreads STDs to Hackers.eng.txt

3.5 KB

DEF CON 29 - Video Team - The DEFCON Darknet Badge Spreads STDs to Hackers.eng.vtt

3.5 KB

DEF CON 29 - Video Team - Theremin Badge at DEF CON #badgelife #Shorts.eng.json

3.0 KB

DEF CON 29 - Video Team - Theremin Badge at DEF CON #badgelife #Shorts.eng.lrc

0.1 KB

DEF CON 29 - Video Team - Theremin Badge at DEF CON #badgelife #Shorts.eng.srt

0.1 KB

DEF CON 29 - Video Team - Theremin Badge at DEF CON #badgelife #Shorts.eng.text

0.0 KB

DEF CON 29 - Video Team - Theremin Badge at DEF CON #badgelife #Shorts.eng.tsv

0.1 KB

DEF CON 29 - Video Team - Theremin Badge at DEF CON #badgelife #Shorts.eng.txt

0.1 KB

DEF CON 29 - Video Team - Theremin Badge at DEF CON #badgelife #Shorts.eng.vtt

0.1 KB

DEF CON 29 - Video Team - Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.eng.json

569.6 KB

DEF CON 29 - Video Team - Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.eng.lrc

13.5 KB

DEF CON 29 - Video Team - Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.eng.srt

16.3 KB

DEF CON 29 - Video Team - Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.eng.text

10.6 KB

DEF CON 29 - Video Team - Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.eng.tsv

12.2 KB

DEF CON 29 - Video Team - Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.eng.txt

13.6 KB

DEF CON 29 - Video Team - Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.eng.vtt

14.7 KB

DEF CON 29 - Video Team - We just - enjoyed - PEPPERCON at DEF CON 29.eng.json

121.4 KB

DEF CON 29 - Video Team - We just - enjoyed - PEPPERCON at DEF CON 29.eng.lrc

3.2 KB

DEF CON 29 - Video Team - We just - enjoyed - PEPPERCON at DEF CON 29.eng.srt

3.8 KB

DEF CON 29 - Video Team - We just - enjoyed - PEPPERCON at DEF CON 29.eng.text

1.9 KB

DEF CON 29 - Video Team - We just - enjoyed - PEPPERCON at DEF CON 29.eng.tsv

2.6 KB

DEF CON 29 - Video Team - We just - enjoyed - PEPPERCON at DEF CON 29.eng.txt

3.3 KB

DEF CON 29 - Video Team - We just - enjoyed - PEPPERCON at DEF CON 29.eng.vtt

3.3 KB

DEF CON 29 - Video Team - What Happened At DEF CON 29.eng.json

3.4 MB

DEF CON 29 - Video Team - What Happened At DEF CON 29.eng.lrc

82.0 KB

DEF CON 29 - Video Team - What Happened At DEF CON 29.eng.srt

98.8 KB

DEF CON 29 - Video Team - What Happened At DEF CON 29.eng.text

60.3 KB

DEF CON 29 - Video Team - What Happened At DEF CON 29.eng.tsv

73.0 KB

DEF CON 29 - Video Team - What Happened At DEF CON 29.eng.txt

82.8 KB

DEF CON 29 - Video Team - What Happened At DEF CON 29.eng.vtt

88.5 KB

DEF CON 29 - Video Team - What is DEF CON Scavenger Hunt.eng.json

96.0 KB

DEF CON 29 - Video Team - What is DEF CON Scavenger Hunt.eng.lrc

2.3 KB

DEF CON 29 - Video Team - What is DEF CON Scavenger Hunt.eng.srt

3.0 KB

DEF CON 29 - Video Team - What is DEF CON Scavenger Hunt.eng.text

1.8 KB

DEF CON 29 - Video Team - What is DEF CON Scavenger Hunt.eng.tsv

2.1 KB

DEF CON 29 - Video Team - What is DEF CON Scavenger Hunt.eng.txt

2.3 KB

DEF CON 29 - Video Team - What is DEF CON Scavenger Hunt.eng.vtt

2.7 KB

DEF CON 29 - Video Team - What is the Ham Radio Village.eng.json

330.7 KB

DEF CON 29 - Video Team - What is the Ham Radio Village.eng.lrc

7.9 KB

DEF CON 29 - Video Team - What is the Ham Radio Village.eng.srt

9.5 KB

DEF CON 29 - Video Team - What is the Ham Radio Village.eng.text

5.9 KB

DEF CON 29 - Video Team - What is the Ham Radio Village.eng.tsv

6.9 KB

DEF CON 29 - Video Team - What is the Ham Radio Village.eng.txt

8.0 KB

DEF CON 29 - Video Team - What is the Ham Radio Village.eng.vtt

8.6 KB

/DEF CON 29 villages/

DEF CON 29 - Adversary Village - Abhijith B R - Village kick-off.mp4

14.9 MB

DEF CON 29 - Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.mp4

40.1 MB

DEF CON 29 - Adversary Village - Carlos Polop - New generation of PEAS.mp4

47.7 MB

DEF CON 29 - Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.mp4

52.7 MB

DEF CON 29 - Adversary Village - Daniel Duggan - Designing a C2 Framework.mp4

67.0 MB

DEF CON 29 - Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.mp4

60.5 MB

DEF CON 29 - Adversary Village - David Hunt - Prelude Operator.mp4

37.2 MB

DEF CON 29 - Adversary Village - David Kennedy - Keynote.mp4

56.5 MB

DEF CON 29 - Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.mp4

169.8 MB

DEF CON 29 - Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.mp4

51.6 MB

DEF CON 29 - Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.mp4

39.3 MB

DEF CON 29 - Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.mp4

71.6 MB

DEF CON 29 - Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.mp4

28.7 MB

DEF CON 29 - Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.mp4

62.7 MB

DEF CON 29 - Adversary Village - Mark Loveless - A Short History and An Example Attack.mp4

64.9 MB

DEF CON 29 - Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.mp4

57.9 MB

DEF CON 29 - Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.mp4

56.1 MB

DEF CON 29 - Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.mp4

48.5 MB

DEF CON 29 - Adversary Village - Phillip Wylie - The Way of The Adversary.mp4

34.2 MB

DEF CON 29 - Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.mp4

40.0 MB

DEF CON 29 - Adversary Village - Sanne Maasakkers - Phish Like An APT.mp4

37.2 MB

DEF CON 29 - Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.mp4

42.2 MB

DEF CON 29 - Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).mp4

33.7 MB

DEF CON 29 - Adversary Village - Stephan Wampouille - Autonomous lateral movement.mp4

14.7 MB

DEF CON 29 - Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.mp4

19.5 MB

DEF CON 29 - Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.mp4

20.1 MB

DEF CON 29 - Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.mp4

31.9 MB

DEF CON 29 - Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.mp4

17.3 MB

DEF CON 29 - Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.mp4

102.4 MB

DEF CON 29 - Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.mp4

19.9 MB

DEF CON 29 - Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.mp4

19.2 MB

DEF CON 29 - Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.mp4

18.1 MB

DEF CON 29 - Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.mp4

12.7 MB

DEF CON 29 - Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.mp4

11.8 MB

DEF CON 29 - Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).mp4

95.3 MB

DEF CON 29 - Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.mp4

21.4 MB

DEF CON 29 - Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.mp4

22.9 MB

DEF CON 29 - Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.mp4

17.4 MB

DEF CON 29 - Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.mp4

26.1 MB

DEF CON 29 - Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.mp4

41.0 MB

DEF CON 29 - Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.mp4

40.0 MB

DEF CON 29 - AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.mp4

29.0 MB

DEF CON 29 - AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.mp4

22.0 MB

DEF CON 29 - AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.mp4

53.1 MB

DEF CON 29 - AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.mp4

26.2 MB

DEF CON 29 - AppSec Village - Amir Shaked - CSP is broken, let’s fix it.mp4

22.5 MB

DEF CON 29 - AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.mp4

44.7 MB

DEF CON 29 - AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.mp4

15.7 MB

DEF CON 29 - AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.mp4

17.3 MB

DEF CON 29 - AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.mp4

30.9 MB

DEF CON 29 - AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.mp4

19.6 MB

DEF CON 29 - AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.mp4

20.7 MB

DEF CON 29 - AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.mp4

21.9 MB

DEF CON 29 - AppSec Village - Grant Ongers - Scaling AppSec through Education.mp4

26.1 MB

DEF CON 29 - AppSec Village - James McKee (punkcoder) - Encryption for Developers.mp4

23.6 MB

DEF CON 29 - AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.mp4

28.6 MB

DEF CON 29 - AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.mp4

20.7 MB

DEF CON 29 - AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.mp4

26.2 MB

DEF CON 29 - AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.mp4

46.0 MB

DEF CON 29 - AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.mp4

26.2 MB

DEF CON 29 - AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.mp4

15.5 MB

DEF CON 29 - AppSec Village - Vee - When nothing goes right, push left.mp4

33.8 MB

DEF CON 29 - AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 - AppSec.mp4

30.7 MB

DEF CON 29 - BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.mp4

14.2 MB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.mp4

10.3 MB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industrymp4.mp4

9.2 MB

DEF CON 29 - BIC Village - Nico Smith - 40 Cores and A CPU.mp4

26.1 MB

DEF CON 29 - BIC Village - Ochaun Marshall - The OPSEC of Protesting.mp4

26.1 MB

DEF CON 29 - Biohacking Village - A Cohort of Pirate Ships.mp4

15.2 MB

DEF CON 29 - Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.mp4

57.9 MB

DEF CON 29 - Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.mp4

23.6 MB

DEF CON 29 - Biohacking Village - Cloud security for healthcare and life sciences.mp4

54.6 MB

DEF CON 29 - Biohacking Village - Cyber Defense Matrix in Healthcare.mp4

21.7 MB

DEF CON 29 - Biohacking Village - Fishing or Hunting.mp4

40.4 MB

DEF CON 29 - Biohacking Village - Healthcare Innovation With People of All Abilities.mp4

15.0 MB

DEF CON 29 - Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.mp4

86.4 MB

DEF CON 29 - Biohacking Village - Internet of Ingestible Things Security by Design.mp4

13.6 MB

DEF CON 29 - Biohacking Village - It takes a village Why you should join the Biohacking Village.mp4

16.3 MB

DEF CON 29 - Biohacking Village - Lets Get Real About The Future State of Healthcare.mp4

17.8 MB

DEF CON 29 - Biohacking Village - No Aggregation Without Representation.mp4

42.5 MB

DEF CON 29 - Biohacking Village - Open Source Vaccine Developer Kits (VDKs).mp4

22.3 MB

DEF CON 29 - Biohacking Village - OWASP & CSA IoT Impacting Medical Security.mp4

20.6 MB

DEF CON 29 - Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.mp4

32.6 MB

DEF CON 29 - Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.mp4

33.0 MB

DEF CON 29 - Biohacking Village - Securing the Internet of Biological Things.mp4

12.5 MB

DEF CON 29 - Biohacking Village - The Digital Physiome - How wearables can transform healthcare.mp4

37.0 MB

DEF CON 29 - Biohacking Village - The Economics of Cybersecurity.mp4

16.1 MB

DEF CON 29 - Biohacking Village - The Little Things.mp4

54.2 MB

DEF CON 29 - Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.mp4

30.7 MB

DEF CON 29 - Biohacking Village - The Real Story on Patching Medical Devices.mp4

28.5 MB

DEF CON 29 - Biohacking Village - The Security of Your Digital DNA, from Inception to Death.mp4

29.4 MB

DEF CON 29 - Biohacking Village - Truth, Trust, and Biodefense.mp4

23.3 MB

DEF CON 29 - Biohacking Village - Welcome Keynote.mp4

46.8 MB

DEF CON 29 - Biohacking Village - Wrap Up Video.mp4

2.3 MB

DEF CON 29 - Blockchain Village - Anto Joseph - Flash Loans Demystified.mp4

24.3 MB

DEF CON 29 - Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.mp4

23.6 MB

DEF CON 29 - Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.mp4

58.8 MB

DEF CON 29 - Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.mp4

31.2 MB

DEF CON 29 - Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.mp4

36.3 MB

DEF CON 29 - Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.mp4

36.5 MB

DEF CON 29 - Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.mp4

52.1 MB

DEF CON 29 - Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer.mp4

17.0 MB

DEF CON 29 - Blockchain Village - Reddcoin & TechAdept - CTF Contestl.mp4

13.4 MB

DEF CON 29 - Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.mp4

22.0 MB

DEF CON 29 - Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.mp4

8.6 MB

DEF CON 29 - Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.mp4

37.7 MB

DEF CON 29 - Blue Team Village - Adventures in Pro Bono Digital Forensics Work.mp4

40.9 MB

DEF CON 29 - Blue Team Village - BTV Presents Threat Report Roulette.mp4

59.3 MB

DEF CON 29 - Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.mp4

29.0 MB

DEF CON 29 - Blue Team Village - How do you ALL THE CLOUDS.mp4

21.2 MB

DEF CON 29 - Blue Team Village - I know who has access to my cloud, do you.mp4

9.0 MB

DEF CON 29 - Blue Team Village - Leveraging NGFWs for Threat Hunting.mp4

18.9 MB

DEF CON 29 - Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.mp4

57.4 MB

DEF CON 29 - Blue Team Village - Modern Authentication for the Security Admin.mp4

35.3 MB

DEF CON 29 - Blue Team Village - Scope X Hunt in the Ocean.mp4

28.8 MB

DEF CON 29 - Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.mp4

33.8 MB

DEF CON 29 - Blue Team Village - This is what we thought would happen in 2021.mp4

29.5 MB

DEF CON 29 - Blue Team Village - Uncomfortable Networking.mp4

19.9 MB

DEF CON 29 - Blue Team Village - Use DNS to detect your domains are abused for phishing.mp4

42.5 MB

DEF CON 29 - Blue Team Village - Velociraptor - Dig Deeper.mp4

37.9 MB

DEF CON 29 - Blue Team Village - What Machine Learning Can and Can't Do for Security.mp4

19.7 MB

DEF CON 29 - Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.mp4

30.3 MB

DEF CON 29 - Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank).mp4

34.2 MB

DEF CON 29 - Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.mp4

71.9 MB

DEF CON 29 - Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.mp4

45.2 MB

DEF CON 29 - Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.mp4

56.1 MB

DEF CON 29 - Car Hacking Village - From CTF to CVE - Bill Hatzer.mp4

44.3 MB

DEF CON 29 - Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.mp4

53.0 MB

DEF CON 29 - Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.mp4

45.0 MB

DEF CON 29 - Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.mp4

35.8 MB

DEF CON 29 - Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.mp4

73.6 MB

DEF CON 29 - Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.mp4

52.1 MB

DEF CON 29 - Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.mp4

32.0 MB

DEF CON 29 - Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.mp4

31.6 MB

DEF CON 29 - Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.mp4

96.0 MB

DEF CON 29 - Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.mp4

26.5 MB

DEF CON 29 - Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.mp4

18.0 MB

DEF CON 29 - Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.mp4

17.9 MB

DEF CON 29 - Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.mp4

15.6 MB

DEF CON 29 - Cloud Village - Closing Note - Jayesh Singh Chauhan.mp4

3.3 MB

DEF CON 29 - Cloud Village - Cloud Security Orienteering - Rami McCarthy.mp4

23.0 MB

DEF CON 29 - Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.mp4

9.0 MB

DEF CON 29 - Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.mp4

21.9 MB

DEF CON 29 - Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.mp4

7.3 MB

DEF CON 29 - Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.mp4

25.0 MB

DEF CON 29 - Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.mp4

16.2 MB

DEF CON 29 - Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.mp4

11.9 MB

DEF CON 29 - Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.mp4

21.9 MB

DEF CON 29 - Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.mp4

21.2 MB

DEF CON 29 - Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.mp4

67.1 MB

DEF CON 29 - Cloud Village - Opening Note - Jayesh Singh Chauhan.mp4

4.5 MB

DEF CON 29 - Cloud Village - PK-WHY - Kevin Chen.mp4

14.1 MB

DEF CON 29 - Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.mp4

15.6 MB

DEF CON 29 - Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.mp4

25.1 MB

DEF CON 29 - Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.mp4

15.8 MB

DEF CON 29 - Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.mp4

8.6 MB

DEF CON 29 - Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.mp4

15.8 MB

DEF CON 29 - Crypto and Privacy Village 2021 Day 1.mp4

747.4 MB

DEF CON 29 - Crypto and Privacy Village 2021 Day 2.mp4

511.4 MB

DEF CON 29 - Cyber Warrior Network - The Future of Women in Cybersecurity.mp4

63.2 MB

DEF CON 29 - Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.mp4

46.6 MB

DEF CON 29 - Hack-A-Sat 2 - 2.2.mp4

3.2 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - First Things First.mp4

3.6 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - User segment ground station.mp4

3.2 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Walkthrough.mp4

78.6 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 1 Recap.mp4

90.2 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 2 Kickoff Awards Show.mp4

175.4 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - End Credits.mp4

9.0 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Jeff Moss interview.mp4

12.3 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Moonlighter.mp4

2.8 MB

DEF CON 29 - Hack-A-Sat 2 - Finals Day 1 Kickoff Show.mp4

189.6 MB

DEF CON 29 - Hack-A-Sat 2 - Finals Pam Melroy Interview.mp4

52.4 MB

DEF CON 29 - Hack-A-Sat 2 - FlatSat Digital Twin Overview.mp4

27.9 MB

DEF CON 29 - Hack-A-Sat 2 - Hack A Sat is BACK.mp4

4.1 MB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Finals Preview.mp4

8.2 MB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Quals Explanation.mp4

19.4 MB

DEF CON 29 - Hack-A-Sat 2 - HAS1 Documentary.mp4

30.7 MB

DEF CON 29 - Hack-A-Sat 2 - Intro.mp4

22.7 MB

DEF CON 29 - Hack-A-Sat 2 - Join the Alliance.mp4

4.8 MB

DEF CON 29 - Hack-A-Sat 2 - Only the Best.mp4

3.7 MB

DEF CON 29 - Hack-A-Sat 2 - Panel Cybersecurity Threats.mp4

85.7 MB

DEF CON 29 - Hack-A-Sat 2 - Panel - Cybersecurity Threats.mp4

88.7 MB

DEF CON 29 - Hack-A-Sat 2 - Panel - Realizing Space Commercialization - Who's Got the Chops.mp4

90.2 MB

DEF CON 29 - Hack-A-Sat 2 - Practice that Quick Draw.mp4

3.0 MB

DEF CON 29 - Hack-A-Sat 2 - Project Moonlighter.mp4

6.0 MB

DEF CON 29 - Hack-A-Sat 2 - Showdown is Coming.mp4

5.3 MB

DEF CON 29 - Hack-A-Sat 2 - Space Resiliency & Cyber security.mp4

14.8 MB

DEF CON 29 - Hack-A-Sat 2 - Teaser.mp4

3.6 MB

DEF CON 29 - Hack-A-Sat 2 - The Alliance is Here.mp4

4.3 MB

DEF CON 29 - Hack-A-Sat 2 - The Evolution of Space.mp4

31.7 MB

DEF CON 29 - Ham Radio Village - Bryan Fields - Spectrum Coordination - for Amateur Radio.mp4

62.2 MB

DEF CON 29 - Ham Radio Village - Eric Escobar - Getting started with low power long distance Comms.mp4

16.8 MB

DEF CON 29 - Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio.mp4

20.6 MB

DEF CON 29 - Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer.mp4

44.4 MB

DEF CON 29 - Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment.mp4

207.0 MB

DEF CON 29 - Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking.mp4

35.5 MB

DEF CON 29 - HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.mp4

45.7 MB

DEF CON 29 - HHV - Bradan Lane - The PortaProg Project.mp4

50.6 MB

DEF CON 29 - HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.mp4

47.8 MB

DEF CON 29 - HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.mp4

21.0 MB

DEF CON 29 - HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.mp4

47.0 MB

DEF CON 29 - ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.mp4

5.6 MB

DEF CON 29 - ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).mp4

18.9 MB

DEF CON 29 - ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).mp4

18.2 MB

DEF CON 29 - ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).mp4

20.5 MB

DEF CON 29 - ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).mp4

32.4 MB

DEF CON 29 - ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).mp4

11.7 MB

DEF CON 29 - ICS Village - DEF CON 29 - ICS Village Opening and Introduction.mp4

2.1 MB

DEF CON 29 - ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).mp4

21.2 MB

DEF CON 29 - ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).mp4

23.0 MB

DEF CON 29 - ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).mp4

17.4 MB

DEF CON 29 - ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.mp4

15.3 MB

DEF CON 29 - ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.mp4

36.0 MB

DEF CON 29 - ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).mp4

25.3 MB

DEF CON 29 - ICS Village - ICS Jeopardy.mp4

27.0 MB

DEF CON 29 - ICS Village - ICS Village Opening and Introduction.mp4

2.1 MB

DEF CON 29 - ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.mp4

38.4 MB

DEF CON 29 - ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).mp4

32.1 MB

DEF CON 29 - ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).mp4

19.6 MB

DEF CON 29 - ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).mp4

19.4 MB

DEF CON 29 - ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).mp4

112.4 MB

DEF CON 29 - ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).mp4

25.1 MB

DEF CON 29 - ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).mp4

47.0 MB

DEF CON 29 - ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).mp4

37.0 MB

DEF CON 29 - ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).mp4

46.6 MB

DEF CON 29 - ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.mp4

94.4 MB

DEF CON 29 - IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.mp4

53.5 MB

DEF CON 29 - IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.mp4

38.7 MB

DEF CON 29 - IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.mp4

44.0 MB

DEF CON 29 - IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.mp4

29.3 MB

DEF CON 29 - IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.mp4

61.0 MB

DEF CON 29 - IoT Village - Hutch - Alexa Have You Been Compromised.mp4

43.4 MB

DEF CON 29 - IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.mp4

50.2 MB

DEF CON 29 - IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.mp4

17.7 MB

DEF CON 29 - IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.mp4

48.0 MB

DEF CON 29 - IoT Village - Messdaghi and Eddy - Representation Matters.mp4

33.2 MB

DEF CON 29 - IoT Village - Petro and Cecil - You're Doing IoT RNG.eng.mp4

51.7 MB

DEF CON 29 - IoT Village - Ria Cheruvu - Ethics at the Edge.mp4

37.2 MB

DEF CON 29 - IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.mp4

29.2 MB

DEF CON 29 - IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.mp4

39.8 MB

DEF CON 29 - IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.mp4

31.0 MB

DEF CON 29 - IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.mp4

43.6 MB

DEF CON 29 - IoT Village - Victor Hanna - LED Light Lunacy.mp4

23.3 MB

DEF CON 29 - IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.mp4

38.5 MB

DEF CON 29 - Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.mp4

34.7 MB

DEF CON 29 - Payment Village - Meadow Ellis - Automated Tear Machines.mp4

112.6 MB

DEF CON 29 - Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.mp4

11.1 MB

DEF CON 29 - Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.mp4

6.0 MB

DEF CON 29 - Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.mp4

23.0 MB

DEF CON 29 - Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.mp4

14.1 MB

DEF CON 29 - Recon Village - Can I Make My Own Social Threat Score - MasterChen.mp4

20.6 MB

DEF CON 29 - Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.mp4

15.8 MB

DEF CON 29 - Recon Village - Future of Asset Management - Ben S (Nahamsec).mp4

40.5 MB

DEF CON 29 - Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.mp4

32.6 MB

DEF CON 29 - Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.mp4

19.0 MB

DEF CON 29 - Recon Village - OSINT and the Hermit Kingdom - Nick Roy.mp4

28.8 MB

DEF CON 29 - Recon Village - OSINT for Sex Workers - Kala Kinyon.mp4

13.7 MB

DEF CON 29 - Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.mp4

37.1 MB

DEF CON 29 - Recon Village - So You Want to OPSEC, Eh - Ritu Gil.mp4

15.0 MB

DEF CON 29 - Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.mp4

9.6 MB

DEF CON 29 - Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.mp4

20.2 MB

DEF CON 29 - Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.mp4

20.3 MB

DEF CON 29 - Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.mp4

36.2 MB

DEF CON 29 - Red Team Village - A discussion about the Red Team Village CyberWraith.mp4

55.7 MB

DEF CON 29 - Red Team Village - AI and Red Team Village Panel.mp4

142.6 MB

DEF CON 29 - Red Team Village - Announcing the Red Team Village CyberWraith.mp4

4.7 MB

DEF CON 29 - Red Team Village - CTF Day 1.mp4

1.4 MB

DEF CON 29 - Red Team Village - CTF Day 2.mp4

372.4 MB

DEF CON 29 - Red Team Village - CTF Day 3.mp4

148.0 MB

DEF CON 29 - Red Team Village - CTF Recap and Upcoming Events.mp4

38.9 MB

DEF CON 29 - Red Team Village - Custom Mechanical Keyboard Build.mp4

175.5 MB

DEF CON 29 - Red Team Village - Russ Hanneman's message about the Red Team Village CTF.mp4

1.2 MB

DEF CON 29 - Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.mp4

103.3 MB

DEF CON 29 - Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.mp4

14.5 MB

DEF CON 29 - Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.mp4

9.7 MB

DEF CON 29 - Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.mp4

12.9 MB

DEF CON 29 - Voting Village - Final Thank You.mp4

1.7 MB

DEF CON 29 - Voting Village - Friday Thank You.mp4

1.8 MB

DEF CON 29 - Voting Village - Hack the Conspiracies - Barb Byrum.mp4

19.6 MB

DEF CON 29 - Voting Village - Hacking to Save Democracy - Eddie Perez.mp4

27.4 MB

DEF CON 29 - Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.mp4

15.5 MB

DEF CON 29 - Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.mp4

27.2 MB

DEF CON 29 - Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.mp4

19.4 MB

DEF CON 29 - Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.mp4

16.1 MB

DEF CON 29 - Voting Village - NH SB43 Forensic Audit - Harri Hursti.mp4

48.0 MB

DEF CON 29 - Voting Village - Secrets of Social Media PsyOps - BiaSciLab.mp4

19.3 MB

DEF CON 29 - Voting Village - Social Media Security = Election Security - Sebastian Bay.mp4

12.1 MB

DEF CON 29 - Voting Village - Welcome.mp4

14.6 MB

DEF CON 29 - Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.mp4

26.4 MB

DEF CON 29 - Voting Village - Wireless Odyssey - Susan Greenhalgh.mp4

18.7 MB

/.../DEF CON 29 villages captions/

DEF CON 29 - Adversary Village - Abhijith B R - Village kick-off.eng.json

377.0 KB

DEF CON 29 - Adversary Village - Abhijith B R - Village kick-off.eng.lrc

10.6 KB

DEF CON 29 - Adversary Village - Abhijith B R - Village kick-off.eng.srt

10.6 KB

DEF CON 29 - Adversary Village - Abhijith B R - Village kick-off.eng.text

7.2 KB

DEF CON 29 - Adversary Village - Abhijith B R - Village kick-off.eng.tsv

9.0 KB

DEF CON 29 - Adversary Village - Abhijith B R - Village kick-off.eng.txt

10.7 KB

DEF CON 29 - Adversary Village - Abhijith B R - Village kick-off.eng.vtt

9.7 KB

DEF CON 29 - Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.eng.json

1.1 MB

DEF CON 29 - Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.eng.lrc

27.5 KB

DEF CON 29 - Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.eng.srt

30.6 KB

DEF CON 29 - Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.eng.text

21.3 KB

DEF CON 29 - Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.eng.tsv

24.8 KB

DEF CON 29 - Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.eng.txt

27.7 KB

DEF CON 29 - Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.eng.vtt

28.0 KB

DEF CON 29 - Adversary Village - Carlos Polop - New generation of PEAS.eng.json

1.2 MB

DEF CON 29 - Adversary Village - Carlos Polop - New generation of PEAS.eng.lrc

30.6 KB

DEF CON 29 - Adversary Village - Carlos Polop - New generation of PEAS.eng.srt

32.4 KB

DEF CON 29 - Adversary Village - Carlos Polop - New generation of PEAS.eng.text

23.9 KB

DEF CON 29 - Adversary Village - Carlos Polop - New generation of PEAS.eng.tsv

27.7 KB

DEF CON 29 - Adversary Village - Carlos Polop - New generation of PEAS.eng.txt

30.8 KB

DEF CON 29 - Adversary Village - Carlos Polop - New generation of PEAS.eng.vtt

30.0 KB

DEF CON 29 - Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.eng.json

1.5 MB

DEF CON 29 - Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.eng.lrc

40.4 KB

DEF CON 29 - Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.eng.srt

44.1 KB

DEF CON 29 - Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.eng.text

31.2 KB

DEF CON 29 - Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.eng.tsv

36.6 KB

DEF CON 29 - Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.eng.txt

40.8 KB

DEF CON 29 - Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.eng.vtt

40.5 KB

DEF CON 29 - Adversary Village - Daniel Duggan - Designing a C2 Framework.eng.json

1.7 MB

DEF CON 29 - Adversary Village - Daniel Duggan - Designing a C2 Framework.eng.lrc

41.9 KB

DEF CON 29 - Adversary Village - Daniel Duggan - Designing a C2 Framework.eng.srt

45.7 KB

DEF CON 29 - Adversary Village - Daniel Duggan - Designing a C2 Framework.eng.text

31.8 KB

DEF CON 29 - Adversary Village - Daniel Duggan - Designing a C2 Framework.eng.tsv

37.7 KB

DEF CON 29 - Adversary Village - Daniel Duggan - Designing a C2 Framework.eng.txt

42.3 KB

DEF CON 29 - Adversary Village - Daniel Duggan - Designing a C2 Framework.eng.vtt

41.8 KB

DEF CON 29 - Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.eng.json

873.9 KB

DEF CON 29 - Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.eng.lrc

22.0 KB

DEF CON 29 - Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.eng.srt

28.2 KB

DEF CON 29 - Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.eng.text

16.5 KB

DEF CON 29 - Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.eng.tsv

19.7 KB

DEF CON 29 - Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.eng.txt

22.2 KB

DEF CON 29 - Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.eng.vtt

24.9 KB

DEF CON 29 - Adversary Village - David Hunt - Prelude Operator.eng.json

1.4 MB

DEF CON 29 - Adversary Village - David Hunt - Prelude Operator.eng.lrc

34.7 KB

DEF CON 29 - Adversary Village - David Hunt - Prelude Operator.eng.srt

38.6 KB

DEF CON 29 - Adversary Village - David Hunt - Prelude Operator.eng.text

27.2 KB

DEF CON 29 - Adversary Village - David Hunt - Prelude Operator.eng.tsv

31.5 KB

DEF CON 29 - Adversary Village - David Hunt - Prelude Operator.eng.txt

35.0 KB

DEF CON 29 - Adversary Village - David Hunt - Prelude Operator.eng.vtt

35.4 KB

DEF CON 29 - Adversary Village - David Kennedy - Keynote.eng.json

1.8 MB

DEF CON 29 - Adversary Village - David Kennedy - Keynote.eng.lrc

47.3 KB

DEF CON 29 - Adversary Village - David Kennedy - Keynote.eng.srt

48.7 KB

DEF CON 29 - Adversary Village - David Kennedy - Keynote.eng.text

37.2 KB

DEF CON 29 - Adversary Village - David Kennedy - Keynote.eng.tsv

43.0 KB

DEF CON 29 - Adversary Village - David Kennedy - Keynote.eng.txt

47.7 KB

DEF CON 29 - Adversary Village - David Kennedy - Keynote.eng.vtt

45.4 KB

DEF CON 29 - Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.eng.json

4.8 MB

DEF CON 29 - Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.eng.lrc

126.6 KB

DEF CON 29 - Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.eng.srt

137.9 KB

DEF CON 29 - Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.eng.text

89.8 KB

DEF CON 29 - Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.eng.tsv

110.0 KB

DEF CON 29 - Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.eng.txt

127.8 KB

DEF CON 29 - Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.eng.vtt

127.0 KB

DEF CON 29 - Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.eng.json

1.2 MB

DEF CON 29 - Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.eng.lrc

30.2 KB

DEF CON 29 - Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.eng.srt

31.6 KB

DEF CON 29 - Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.eng.text

23.4 KB

DEF CON 29 - Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.eng.tsv

27.3 KB

DEF CON 29 - Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.eng.txt

30.5 KB

DEF CON 29 - Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.eng.vtt

29.3 KB

DEF CON 29 - Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.eng.json

873.3 KB

DEF CON 29 - Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.eng.lrc

22.6 KB

DEF CON 29 - Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.eng.srt

23.3 KB

DEF CON 29 - Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.eng.text

15.5 KB

DEF CON 29 - Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.eng.tsv

19.6 KB

DEF CON 29 - Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.eng.txt

22.9 KB

DEF CON 29 - Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.eng.vtt

21.1 KB

DEF CON 29 - Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.eng.json

1.5 MB

DEF CON 29 - Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.eng.lrc

36.1 KB

DEF CON 29 - Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.eng.srt

43.7 KB

DEF CON 29 - Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.eng.text

28.0 KB

DEF CON 29 - Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.eng.tsv

32.7 KB

DEF CON 29 - Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.eng.txt

36.5 KB

DEF CON 29 - Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.eng.vtt

39.3 KB

DEF CON 29 - Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.eng.json

1.1 MB

DEF CON 29 - Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.eng.lrc

28.9 KB

DEF CON 29 - Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.eng.srt

30.5 KB

DEF CON 29 - Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.eng.text

22.6 KB

DEF CON 29 - Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.eng.tsv

26.1 KB

DEF CON 29 - Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.eng.txt

29.2 KB

DEF CON 29 - Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.eng.vtt

28.3 KB

DEF CON 29 - Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.eng.json

2.4 MB

DEF CON 29 - Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.eng.lrc

67.3 KB

DEF CON 29 - Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.eng.srt

57.0 KB

DEF CON 29 - Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.eng.text

41.3 KB

DEF CON 29 - Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.eng.tsv

56.6 KB

DEF CON 29 - Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.eng.txt

68.3 KB

DEF CON 29 - Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.eng.vtt

52.4 KB

DEF CON 29 - Adversary Village - Mark Loveless - A Short History and An Example Attack.eng.json

1.1 MB

DEF CON 29 - Adversary Village - Mark Loveless - A Short History and An Example Attack.eng.lrc

28.5 KB

DEF CON 29 - Adversary Village - Mark Loveless - A Short History and An Example Attack.eng.srt

31.0 KB

DEF CON 29 - Adversary Village - Mark Loveless - A Short History and An Example Attack.eng.text

22.2 KB

DEF CON 29 - Adversary Village - Mark Loveless - A Short History and An Example Attack.eng.tsv

25.8 KB

DEF CON 29 - Adversary Village - Mark Loveless - A Short History and An Example Attack.eng.txt

28.7 KB

DEF CON 29 - Adversary Village - Mark Loveless - A Short History and An Example Attack.eng.vtt

28.5 KB

DEF CON 29 - Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.eng.json

2.0 MB

DEF CON 29 - Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.eng.lrc

50.2 KB

DEF CON 29 - Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.eng.srt

54.9 KB

DEF CON 29 - Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.eng.text

39.2 KB

DEF CON 29 - Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.eng.tsv

45.6 KB

DEF CON 29 - Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.eng.txt

50.6 KB

DEF CON 29 - Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.eng.vtt

50.5 KB

DEF CON 29 - Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.eng.json

1.7 MB

DEF CON 29 - Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.eng.lrc

46.1 KB

DEF CON 29 - Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.eng.srt

47.9 KB

DEF CON 29 - Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.eng.text

31.9 KB

DEF CON 29 - Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.eng.tsv

40.3 KB

DEF CON 29 - Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.eng.txt

46.6 KB

DEF CON 29 - Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.eng.vtt

43.3 KB

DEF CON 29 - Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.eng.json

1.7 MB

DEF CON 29 - Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.eng.lrc

43.4 KB

DEF CON 29 - Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.eng.srt

48.2 KB

DEF CON 29 - Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.eng.text

30.7 KB

DEF CON 29 - Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.eng.tsv

38.1 KB

DEF CON 29 - Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.eng.txt

43.9 KB

DEF CON 29 - Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.eng.vtt

43.2 KB

DEF CON 29 - Adversary Village - Phillip Wylie - The Way of The Adversary.eng.json

1.4 MB

DEF CON 29 - Adversary Village - Phillip Wylie - The Way of The Adversary.eng.lrc

35.6 KB

DEF CON 29 - Adversary Village - Phillip Wylie - The Way of The Adversary.eng.srt

37.3 KB

DEF CON 29 - Adversary Village - Phillip Wylie - The Way of The Adversary.eng.text

27.9 KB

DEF CON 29 - Adversary Village - Phillip Wylie - The Way of The Adversary.eng.tsv

32.3 KB

DEF CON 29 - Adversary Village - Phillip Wylie - The Way of The Adversary.eng.txt

35.9 KB

DEF CON 29 - Adversary Village - Phillip Wylie - The Way of The Adversary.eng.vtt

34.6 KB

DEF CON 29 - Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.eng.json

1.5 MB

DEF CON 29 - Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.eng.lrc

38.8 KB

DEF CON 29 - Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.eng.srt

41.1 KB

DEF CON 29 - Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.eng.text

30.4 KB

DEF CON 29 - Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.eng.tsv

35.1 KB

DEF CON 29 - Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.eng.txt

39.1 KB

DEF CON 29 - Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.eng.vtt

38.1 KB

DEF CON 29 - Adversary Village - Sanne Maasakkers - Phish Like An APT.eng.json

1.2 MB

DEF CON 29 - Adversary Village - Sanne Maasakkers - Phish Like An APT.eng.lrc

29.1 KB

DEF CON 29 - Adversary Village - Sanne Maasakkers - Phish Like An APT.eng.srt

34.4 KB

DEF CON 29 - Adversary Village - Sanne Maasakkers - Phish Like An APT.eng.text

22.6 KB

DEF CON 29 - Adversary Village - Sanne Maasakkers - Phish Like An APT.eng.tsv

26.3 KB

DEF CON 29 - Adversary Village - Sanne Maasakkers - Phish Like An APT.eng.txt

29.3 KB

DEF CON 29 - Adversary Village - Sanne Maasakkers - Phish Like An APT.eng.vtt

31.1 KB

DEF CON 29 - Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.eng.json

1.3 MB

DEF CON 29 - Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.eng.lrc

31.4 KB

DEF CON 29 - Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.eng.srt

38.8 KB

DEF CON 29 - Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.eng.text

24.3 KB

DEF CON 29 - Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.eng.tsv

28.3 KB

DEF CON 29 - Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.eng.txt

31.6 KB

DEF CON 29 - Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.eng.vtt

34.7 KB

DEF CON 29 - Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).eng.json

882.3 KB

DEF CON 29 - Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).eng.lrc

22.0 KB

DEF CON 29 - Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).eng.srt

25.6 KB

DEF CON 29 - Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).eng.text

17.1 KB

DEF CON 29 - Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).eng.tsv

19.9 KB

DEF CON 29 - Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).eng.txt

22.2 KB

DEF CON 29 - Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).eng.vtt

23.3 KB

DEF CON 29 - Adversary Village - Stephan Wampouille - Autonomous lateral movement.eng.json

630.7 KB

DEF CON 29 - Adversary Village - Stephan Wampouille - Autonomous lateral movement.eng.lrc

15.0 KB

DEF CON 29 - Adversary Village - Stephan Wampouille - Autonomous lateral movement.eng.srt

17.1 KB

DEF CON 29 - Adversary Village - Stephan Wampouille - Autonomous lateral movement.eng.text

11.7 KB

DEF CON 29 - Adversary Village - Stephan Wampouille - Autonomous lateral movement.eng.tsv

13.5 KB

DEF CON 29 - Adversary Village - Stephan Wampouille - Autonomous lateral movement.eng.txt

15.2 KB

DEF CON 29 - Adversary Village - Stephan Wampouille - Autonomous lateral movement.eng.vtt

15.6 KB

DEF CON 29 - Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.eng.json

906.6 KB

DEF CON 29 - Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.eng.lrc

21.1 KB

DEF CON 29 - Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.eng.srt

26.3 KB

DEF CON 29 - Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.eng.text

17.3 KB

DEF CON 29 - Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.eng.tsv

19.4 KB

DEF CON 29 - Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.eng.txt

21.3 KB

DEF CON 29 - Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.eng.vtt

23.8 KB

DEF CON 29 - Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.eng.json

637.0 KB

DEF CON 29 - Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.eng.lrc

16.8 KB

DEF CON 29 - Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.eng.srt

17.9 KB

DEF CON 29 - Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.eng.text

12.7 KB

DEF CON 29 - Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.eng.tsv

15.0 KB

DEF CON 29 - Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.eng.txt

16.9 KB

DEF CON 29 - Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.eng.vtt

16.5 KB

DEF CON 29 - Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.eng.json

1.9 MB

DEF CON 29 - Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.eng.lrc

47.9 KB

DEF CON 29 - Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.eng.srt

49.7 KB

DEF CON 29 - Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.eng.text

37.4 KB

DEF CON 29 - Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.eng.tsv

43.5 KB

DEF CON 29 - Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.eng.txt

48.3 KB

DEF CON 29 - Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.eng.vtt

46.2 KB

DEF CON 29 - Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.eng.json

925.3 KB

DEF CON 29 - Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.eng.lrc

24.8 KB

DEF CON 29 - Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.eng.srt

25.2 KB

DEF CON 29 - Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.eng.text

19.3 KB

DEF CON 29 - Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.eng.tsv

22.4 KB

DEF CON 29 - Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.eng.txt

25.1 KB

DEF CON 29 - Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.eng.vtt

23.6 KB

DEF CON 29 - Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.eng.json

1.2 MB

DEF CON 29 - Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.eng.lrc

31.7 KB

DEF CON 29 - Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.eng.srt

32.7 KB

DEF CON 29 - Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.eng.text

24.8 KB

DEF CON 29 - Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.eng.tsv

28.7 KB

DEF CON 29 - Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.eng.txt

31.9 KB

DEF CON 29 - Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.eng.vtt

30.4 KB

DEF CON 29 - Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.eng.json

1.2 MB

DEF CON 29 - Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.eng.lrc

32.3 KB

DEF CON 29 - Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.eng.srt

32.5 KB

DEF CON 29 - Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.eng.text

25.3 KB

DEF CON 29 - Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.eng.tsv

29.3 KB

DEF CON 29 - Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.eng.txt

32.6 KB

DEF CON 29 - Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.eng.vtt

30.5 KB

DEF CON 29 - Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.eng.json

1.3 MB

DEF CON 29 - Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.eng.lrc

36.6 KB

DEF CON 29 - Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.eng.srt

33.3 KB

DEF CON 29 - Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.eng.text

25.6 KB

DEF CON 29 - Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.eng.tsv

31.8 KB

DEF CON 29 - Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.eng.txt

37.1 KB

DEF CON 29 - Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.eng.vtt

31.1 KB

DEF CON 29 - Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.eng.json

950.2 KB

DEF CON 29 - Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.eng.lrc

24.8 KB

DEF CON 29 - Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.eng.srt

24.1 KB

DEF CON 29 - Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.eng.text

19.3 KB

DEF CON 29 - Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.eng.tsv

22.4 KB

DEF CON 29 - Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.eng.txt

25.0 KB

DEF CON 29 - Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.eng.vtt

22.8 KB

DEF CON 29 - Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.eng.json

1.0 MB

DEF CON 29 - Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.eng.lrc

26.4 KB

DEF CON 29 - Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.eng.srt

28.4 KB

DEF CON 29 - Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.eng.text

20.8 KB

DEF CON 29 - Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.eng.tsv

23.9 KB

DEF CON 29 - Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.eng.txt

26.7 KB

DEF CON 29 - Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.eng.vtt

26.3 KB

DEF CON 29 - Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.eng.json

475.7 KB

DEF CON 29 - Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.eng.lrc

12.5 KB

DEF CON 29 - Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.eng.srt

12.9 KB

DEF CON 29 - Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.eng.text

9.2 KB

DEF CON 29 - Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.eng.tsv

10.9 KB

DEF CON 29 - Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.eng.txt

12.6 KB

DEF CON 29 - Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.eng.vtt

11.9 KB

DEF CON 29 - Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).eng.json

2.6 MB

DEF CON 29 - Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).eng.lrc

63.0 KB

DEF CON 29 - Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).eng.srt

69.8 KB

DEF CON 29 - Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).eng.text

49.3 KB

DEF CON 29 - Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).eng.tsv

57.4 KB

DEF CON 29 - Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).eng.txt

63.5 KB

DEF CON 29 - Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).eng.vtt

64.0 KB

DEF CON 29 - Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.eng.json

1.5 MB

DEF CON 29 - Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.eng.lrc

36.7 KB

DEF CON 29 - Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.eng.srt

41.1 KB

DEF CON 29 - Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.eng.text

28.7 KB

DEF CON 29 - Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.eng.tsv

33.3 KB

DEF CON 29 - Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.eng.txt

37.0 KB

DEF CON 29 - Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.eng.vtt

37.6 KB

DEF CON 29 - Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.eng.json

1.6 MB

DEF CON 29 - Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.eng.lrc

37.8 KB

DEF CON 29 - Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.eng.srt

44.3 KB

DEF CON 29 - Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.eng.text

29.6 KB

DEF CON 29 - Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.eng.tsv

34.3 KB

DEF CON 29 - Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.eng.txt

38.1 KB

DEF CON 29 - Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.eng.vtt

40.2 KB

DEF CON 29 - Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.eng.json

938.1 KB

DEF CON 29 - Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.eng.lrc

24.6 KB

DEF CON 29 - Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.eng.srt

24.7 KB

DEF CON 29 - Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.eng.text

18.9 KB

DEF CON 29 - Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.eng.tsv

22.1 KB

DEF CON 29 - Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.eng.txt

24.8 KB

DEF CON 29 - Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.eng.vtt

23.1 KB

DEF CON 29 - Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.eng.json

1.1 MB

DEF CON 29 - Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.eng.lrc

26.4 KB

DEF CON 29 - Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.eng.srt

28.5 KB

DEF CON 29 - Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.eng.text

20.5 KB

DEF CON 29 - Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.eng.tsv

23.8 KB

DEF CON 29 - Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.eng.txt

26.6 KB

DEF CON 29 - Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.eng.vtt

26.2 KB

DEF CON 29 - Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.eng.json

1.4 MB

DEF CON 29 - Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.eng.lrc

32.4 KB

DEF CON 29 - Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.eng.srt

35.3 KB

DEF CON 29 - Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.eng.text

25.3 KB

DEF CON 29 - Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.eng.tsv

29.3 KB

DEF CON 29 - Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.eng.txt

32.6 KB

DEF CON 29 - Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.eng.vtt

32.5 KB

DEF CON 29 - Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.eng.json

1.4 MB

DEF CON 29 - Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.eng.lrc

33.0 KB

DEF CON 29 - Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.eng.srt

39.2 KB

DEF CON 29 - Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.eng.text

25.5 KB

DEF CON 29 - Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.eng.tsv

29.7 KB

DEF CON 29 - Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.eng.txt

33.2 KB

DEF CON 29 - Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.eng.vtt

35.3 KB

DEF CON 29 - AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.eng.json

1.5 MB

DEF CON 29 - AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.eng.lrc

38.5 KB

DEF CON 29 - AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.eng.srt

44.0 KB

DEF CON 29 - AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.eng.text

30.0 KB

DEF CON 29 - AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.eng.tsv

34.9 KB

DEF CON 29 - AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.eng.txt

38.8 KB

DEF CON 29 - AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.eng.vtt

40.0 KB

DEF CON 29 - AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.eng.json

1.5 MB

DEF CON 29 - AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.eng.lrc

39.7 KB

DEF CON 29 - AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.eng.srt

41.9 KB

DEF CON 29 - AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.eng.text

29.9 KB

DEF CON 29 - AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.eng.tsv

35.4 KB

DEF CON 29 - AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.eng.txt

40.1 KB

DEF CON 29 - AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.eng.vtt

38.5 KB

DEF CON 29 - AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.eng.json

1.6 MB

DEF CON 29 - AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.eng.lrc

39.9 KB

DEF CON 29 - AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.eng.srt

47.1 KB

DEF CON 29 - AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.eng.text

30.9 KB

DEF CON 29 - AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.eng.tsv

36.2 KB

DEF CON 29 - AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.eng.txt

40.3 KB

DEF CON 29 - AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.eng.vtt

42.5 KB

DEF CON 29 - AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.eng.json

1.2 MB

DEF CON 29 - AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.eng.lrc

33.3 KB

DEF CON 29 - AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.eng.srt

34.6 KB

DEF CON 29 - AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.eng.text

23.6 KB

DEF CON 29 - AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.eng.tsv

29.0 KB

DEF CON 29 - AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.eng.txt

33.7 KB

DEF CON 29 - AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.eng.vtt

31.5 KB

DEF CON 29 - AppSec Village - Amir Shaked - CSP is broken, let’s fix it.eng.json

1.2 MB

DEF CON 29 - AppSec Village - Amir Shaked - CSP is broken, let’s fix it.eng.lrc

30.4 KB

DEF CON 29 - AppSec Village - Amir Shaked - CSP is broken, let’s fix it.eng.srt

32.8 KB

DEF CON 29 - AppSec Village - Amir Shaked - CSP is broken, let’s fix it.eng.text

23.7 KB

DEF CON 29 - AppSec Village - Amir Shaked - CSP is broken, let’s fix it.eng.tsv

27.5 KB

DEF CON 29 - AppSec Village - Amir Shaked - CSP is broken, let’s fix it.eng.txt

30.7 KB

DEF CON 29 - AppSec Village - Amir Shaked - CSP is broken, let’s fix it.eng.vtt

30.2 KB

DEF CON 29 - AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.eng.json

2.5 MB

DEF CON 29 - AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.eng.lrc

60.5 KB

DEF CON 29 - AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.eng.srt

70.1 KB

DEF CON 29 - AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.eng.text

47.2 KB

DEF CON 29 - AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.eng.tsv

55.1 KB

DEF CON 29 - AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.eng.txt

61.0 KB

DEF CON 29 - AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.eng.vtt

63.5 KB

DEF CON 29 - AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.eng.json

1.5 MB

DEF CON 29 - AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.eng.lrc

38.6 KB

DEF CON 29 - AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.eng.srt

41.3 KB

DEF CON 29 - AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.eng.text

30.1 KB

DEF CON 29 - AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.eng.tsv

35.0 KB

DEF CON 29 - AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.eng.txt

38.9 KB

DEF CON 29 - AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.eng.vtt

38.2 KB

DEF CON 29 - AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.eng.json

1.0 MB

DEF CON 29 - AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.eng.lrc

26.3 KB

DEF CON 29 - AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.eng.srt

27.8 KB

DEF CON 29 - AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.eng.text

20.5 KB

DEF CON 29 - AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.eng.tsv

23.8 KB

DEF CON 29 - AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.eng.txt

26.5 KB

DEF CON 29 - AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.eng.vtt

25.8 KB

DEF CON 29 - AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.eng.json

1.5 MB

DEF CON 29 - AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.eng.lrc

40.7 KB

DEF CON 29 - AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.eng.srt

44.2 KB

DEF CON 29 - AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.eng.text

31.4 KB

DEF CON 29 - AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.eng.tsv

36.8 KB

DEF CON 29 - AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.eng.txt

41.0 KB

DEF CON 29 - AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.eng.vtt

40.6 KB

DEF CON 29 - AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.eng.json

1.4 MB

DEF CON 29 - AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.eng.lrc

34.5 KB

DEF CON 29 - AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.eng.srt

39.2 KB

DEF CON 29 - AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.eng.text

27.0 KB

DEF CON 29 - AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.eng.tsv

31.3 KB

DEF CON 29 - AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.eng.txt

34.8 KB

DEF CON 29 - AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.eng.vtt

35.8 KB

DEF CON 29 - AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.eng.json

1.2 MB

DEF CON 29 - AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.eng.lrc

29.2 KB

DEF CON 29 - AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.eng.srt

34.2 KB

DEF CON 29 - AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.eng.text

22.5 KB

DEF CON 29 - AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.eng.tsv

26.3 KB

DEF CON 29 - AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.eng.txt

29.4 KB

DEF CON 29 - AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.eng.vtt

30.9 KB

DEF CON 29 - AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.eng.json

1.6 MB

DEF CON 29 - AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.eng.lrc

45.3 KB

DEF CON 29 - AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.eng.srt

39.2 KB

DEF CON 29 - AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.eng.text

28.3 KB

DEF CON 29 - AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.eng.tsv

38.0 KB

DEF CON 29 - AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.eng.txt

45.9 KB

DEF CON 29 - AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.eng.vtt

36.0 KB

DEF CON 29 - AppSec Village - Grant Ongers - Scaling AppSec through Education.eng.json

2.2 MB

DEF CON 29 - AppSec Village - Grant Ongers - Scaling AppSec through Education.eng.lrc

73.4 KB

DEF CON 29 - AppSec Village - Grant Ongers - Scaling AppSec through Education.eng.srt

47.6 KB

DEF CON 29 - AppSec Village - Grant Ongers - Scaling AppSec through Education.eng.text

35.4 KB

DEF CON 29 - AppSec Village - Grant Ongers - Scaling AppSec through Education.eng.tsv

57.8 KB

DEF CON 29 - AppSec Village - Grant Ongers - Scaling AppSec through Education.eng.txt

74.9 KB

DEF CON 29 - AppSec Village - Grant Ongers - Scaling AppSec through Education.eng.vtt

43.8 KB

DEF CON 29 - AppSec Village - James McKee (punkcoder) - Encryption for Developers.eng.json

1.9 MB

DEF CON 29 - AppSec Village - James McKee (punkcoder) - Encryption for Developers.eng.lrc

46.9 KB

DEF CON 29 - AppSec Village - James McKee (punkcoder) - Encryption for Developers.eng.srt

49.6 KB

DEF CON 29 - AppSec Village - James McKee (punkcoder) - Encryption for Developers.eng.text

36.5 KB

DEF CON 29 - AppSec Village - James McKee (punkcoder) - Encryption for Developers.eng.tsv

42.5 KB

DEF CON 29 - AppSec Village - James McKee (punkcoder) - Encryption for Developers.eng.txt

47.3 KB

DEF CON 29 - AppSec Village - James McKee (punkcoder) - Encryption for Developers.eng.vtt

45.9 KB

DEF CON 29 - AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.eng.json

1.5 MB

DEF CON 29 - AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.eng.lrc

35.6 KB

DEF CON 29 - AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.eng.srt

39.4 KB

DEF CON 29 - AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.eng.text

27.7 KB

DEF CON 29 - AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.eng.tsv

32.3 KB

DEF CON 29 - AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.eng.txt

35.9 KB

DEF CON 29 - AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.eng.vtt

36.1 KB

DEF CON 29 - AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.eng.json

1.5 MB

DEF CON 29 - AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.eng.lrc

35.9 KB

DEF CON 29 - AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.eng.srt

38.9 KB

DEF CON 29 - AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.eng.text

28.3 KB

DEF CON 29 - AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.eng.tsv

32.7 KB

DEF CON 29 - AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.eng.txt

36.2 KB

DEF CON 29 - AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.eng.vtt

35.9 KB

DEF CON 29 - AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.eng.json

1.5 MB

DEF CON 29 - AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.eng.lrc

36.5 KB

DEF CON 29 - AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.eng.srt

39.8 KB

DEF CON 29 - AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.eng.text

28.4 KB

DEF CON 29 - AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.eng.tsv

33.1 KB

DEF CON 29 - AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.eng.txt

36.8 KB

DEF CON 29 - AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.eng.vtt

36.6 KB

DEF CON 29 - AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.eng.json

3.2 MB

DEF CON 29 - AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.eng.lrc

77.8 KB

DEF CON 29 - AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.eng.srt

84.9 KB

DEF CON 29 - AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.eng.text

60.3 KB

DEF CON 29 - AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.eng.tsv

70.5 KB

DEF CON 29 - AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.eng.txt

78.5 KB

DEF CON 29 - AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.eng.vtt

78.4 KB

DEF CON 29 - AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.eng.json

1.2 MB

DEF CON 29 - AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.eng.lrc

29.5 KB

DEF CON 29 - AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.eng.srt

32.8 KB

DEF CON 29 - AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.eng.text

22.8 KB

DEF CON 29 - AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.eng.tsv

26.7 KB

DEF CON 29 - AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.eng.txt

29.8 KB

DEF CON 29 - AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.eng.vtt

30.0 KB

DEF CON 29 - AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.eng.json

1.1 MB

DEF CON 29 - AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.eng.lrc

26.7 KB

DEF CON 29 - AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.eng.srt

31.2 KB

DEF CON 29 - AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.eng.text

20.9 KB

DEF CON 29 - AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.eng.tsv

24.1 KB

DEF CON 29 - AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.eng.txt

26.9 KB

DEF CON 29 - AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.eng.vtt

28.3 KB

DEF CON 29 - AppSec Village - Vee - When nothing goes right, push left.eng.json

2.3 MB

DEF CON 29 - AppSec Village - Vee - When nothing goes right, push left.eng.lrc

57.7 KB

DEF CON 29 - AppSec Village - Vee - When nothing goes right, push left.eng.srt

64.1 KB

DEF CON 29 - AppSec Village - Vee - When nothing goes right, push left.eng.text

45.2 KB

DEF CON 29 - AppSec Village - Vee - When nothing goes right, push left.eng.tsv

52.5 KB

DEF CON 29 - AppSec Village - Vee - When nothing goes right, push left.eng.txt

58.2 KB

DEF CON 29 - AppSec Village - Vee - When nothing goes right, push left.eng.vtt

58.7 KB

DEF CON 29 - AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 - AppSec.eng.json

2.0 MB

DEF CON 29 - AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 - AppSec.eng.lrc

59.1 KB

DEF CON 29 - AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 - AppSec.eng.srt

54.3 KB

DEF CON 29 - AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 - AppSec.eng.text

36.1 KB

DEF CON 29 - AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 - AppSec.eng.tsv

49.4 KB

DEF CON 29 - AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 - AppSec.eng.txt

60.0 KB

DEF CON 29 - AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 - AppSec.eng.vtt

49.0 KB

DEF CON 29 - BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.eng.json

677.1 KB

DEF CON 29 - BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.eng.lrc

17.2 KB

DEF CON 29 - BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.eng.srt

19.7 KB

DEF CON 29 - BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.eng.text

13.3 KB

DEF CON 29 - BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.eng.tsv

15.5 KB

DEF CON 29 - BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.eng.txt

17.4 KB

DEF CON 29 - BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.eng.vtt

17.9 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.eng.json

535.4 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.eng.lrc

14.5 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.eng.srt

15.0 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.eng.text

11.3 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.eng.tsv

13.0 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.eng.txt

14.6 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.eng.vtt

14.0 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industrymp4.eng.json

535.4 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industrymp4.eng.lrc

14.5 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industrymp4.eng.srt

15.0 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industrymp4.eng.text

11.3 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industrymp4.eng.tsv

13.0 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industrymp4.eng.txt

14.6 KB

DEF CON 29 - BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industrymp4.eng.vtt

14.0 KB

DEF CON 29 - BIC Village - Nico Smith - 40 Cores and A CPU.eng.json

1.2 MB

DEF CON 29 - BIC Village - Nico Smith - 40 Cores and A CPU.eng.lrc

28.8 KB

DEF CON 29 - BIC Village - Nico Smith - 40 Cores and A CPU.eng.srt

32.9 KB

DEF CON 29 - BIC Village - Nico Smith - 40 Cores and A CPU.eng.text

23.7 KB

DEF CON 29 - BIC Village - Nico Smith - 40 Cores and A CPU.eng.tsv

26.6 KB

DEF CON 29 - BIC Village - Nico Smith - 40 Cores and A CPU.eng.txt

29.0 KB

DEF CON 29 - BIC Village - Nico Smith - 40 Cores and A CPU.eng.vtt

30.4 KB

DEF CON 29 - BIC Village - Ochaun Marshall - The OPSEC of Protesting.eng.json

918.2 KB

DEF CON 29 - BIC Village - Ochaun Marshall - The OPSEC of Protesting.eng.lrc

23.5 KB

DEF CON 29 - BIC Village - Ochaun Marshall - The OPSEC of Protesting.eng.srt

25.8 KB

DEF CON 29 - BIC Village - Ochaun Marshall - The OPSEC of Protesting.eng.text

18.2 KB

DEF CON 29 - BIC Village - Ochaun Marshall - The OPSEC of Protesting.eng.tsv

21.2 KB

DEF CON 29 - BIC Village - Ochaun Marshall - The OPSEC of Protesting.eng.txt

23.7 KB

DEF CON 29 - BIC Village - Ochaun Marshall - The OPSEC of Protesting.eng.vtt

23.7 KB

DEF CON 29 - Biohacking Village - A Cohort of Pirate Ships.eng.json

824.6 KB

DEF CON 29 - Biohacking Village - A Cohort of Pirate Ships.eng.lrc

19.9 KB

DEF CON 29 - Biohacking Village - A Cohort of Pirate Ships.eng.srt

21.0 KB

DEF CON 29 - Biohacking Village - A Cohort of Pirate Ships.eng.text

15.6 KB

DEF CON 29 - Biohacking Village - A Cohort of Pirate Ships.eng.tsv

17.9 KB

DEF CON 29 - Biohacking Village - A Cohort of Pirate Ships.eng.txt

20.1 KB

DEF CON 29 - Biohacking Village - A Cohort of Pirate Ships.eng.vtt

19.5 KB

DEF CON 29 - Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.eng.json

2.1 MB

DEF CON 29 - Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.eng.lrc

51.0 KB

DEF CON 29 - Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.eng.srt

54.3 KB

DEF CON 29 - Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.eng.text

39.7 KB

DEF CON 29 - Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.eng.tsv

46.3 KB

DEF CON 29 - Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.eng.txt

51.4 KB

DEF CON 29 - Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.eng.vtt

50.1 KB

DEF CON 29 - Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.eng.json

1.5 MB

DEF CON 29 - Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.eng.lrc

36.0 KB

DEF CON 29 - Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.eng.srt

42.5 KB

DEF CON 29 - Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.eng.text

32.1 KB

DEF CON 29 - Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.eng.tsv

34.4 KB

DEF CON 29 - Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.eng.txt

36.2 KB

DEF CON 29 - Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.eng.vtt

39.6 KB

DEF CON 29 - Biohacking Village - Cloud security for healthcare and life sciences.eng.json

2.9 MB

DEF CON 29 - Biohacking Village - Cloud security for healthcare and life sciences.eng.lrc

70.8 KB

DEF CON 29 - Biohacking Village - Cloud security for healthcare and life sciences.eng.srt

77.7 KB

DEF CON 29 - Biohacking Village - Cloud security for healthcare and life sciences.eng.text

59.7 KB

DEF CON 29 - Biohacking Village - Cloud security for healthcare and life sciences.eng.tsv

66.0 KB

DEF CON 29 - Biohacking Village - Cloud security for healthcare and life sciences.eng.txt

71.3 KB

DEF CON 29 - Biohacking Village - Cloud security for healthcare and life sciences.eng.vtt

72.7 KB

DEF CON 29 - Biohacking Village - Cyber Defense Matrix in Healthcare.eng.json

1.2 MB

DEF CON 29 - Biohacking Village - Cyber Defense Matrix in Healthcare.eng.lrc

29.8 KB

DEF CON 29 - Biohacking Village - Cyber Defense Matrix in Healthcare.eng.srt

33.9 KB

DEF CON 29 - Biohacking Village - Cyber Defense Matrix in Healthcare.eng.text

24.9 KB

DEF CON 29 - Biohacking Village - Cyber Defense Matrix in Healthcare.eng.tsv

27.7 KB

DEF CON 29 - Biohacking Village - Cyber Defense Matrix in Healthcare.eng.txt

30.0 KB

DEF CON 29 - Biohacking Village - Cyber Defense Matrix in Healthcare.eng.vtt

31.4 KB

DEF CON 29 - Biohacking Village - Fishing or Hunting.eng.json

2.0 MB

DEF CON 29 - Biohacking Village - Fishing or Hunting.eng.lrc

50.2 KB

DEF CON 29 - Biohacking Village - Fishing or Hunting.eng.srt

56.3 KB

DEF CON 29 - Biohacking Village - Fishing or Hunting.eng.text

39.3 KB

DEF CON 29 - Biohacking Village - Fishing or Hunting.eng.tsv

45.7 KB

DEF CON 29 - Biohacking Village - Fishing or Hunting.eng.txt

50.7 KB

DEF CON 29 - Biohacking Village - Fishing or Hunting.eng.vtt

51.5 KB

DEF CON 29 - Biohacking Village - Healthcare Innovation With People of All Abilities.eng.json

1.3 MB

DEF CON 29 - Biohacking Village - Healthcare Innovation With People of All Abilities.eng.lrc

32.1 KB

DEF CON 29 - Biohacking Village - Healthcare Innovation With People of All Abilities.eng.srt

36.3 KB

DEF CON 29 - Biohacking Village - Healthcare Innovation With People of All Abilities.eng.text

25.0 KB

DEF CON 29 - Biohacking Village - Healthcare Innovation With People of All Abilities.eng.tsv

29.1 KB

DEF CON 29 - Biohacking Village - Healthcare Innovation With People of All Abilities.eng.txt

32.4 KB

DEF CON 29 - Biohacking Village - Healthcare Innovation With People of All Abilities.eng.vtt

33.1 KB

DEF CON 29 - Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.eng.json

2.5 MB

DEF CON 29 - Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.eng.lrc

62.5 KB

DEF CON 29 - Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.eng.srt

63.0 KB

DEF CON 29 - Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.eng.text

49.2 KB

DEF CON 29 - Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.eng.tsv

57.0 KB

DEF CON 29 - Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.eng.txt

63.0 KB

DEF CON 29 - Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.eng.vtt

59.0 KB

DEF CON 29 - Biohacking Village - Internet of Ingestible Things Security by Design.eng.json

503.3 KB

DEF CON 29 - Biohacking Village - Internet of Ingestible Things Security by Design.eng.lrc

13.8 KB

DEF CON 29 - Biohacking Village - Internet of Ingestible Things Security by Design.eng.srt

13.9 KB

DEF CON 29 - Biohacking Village - Internet of Ingestible Things Security by Design.eng.text

10.8 KB

DEF CON 29 - Biohacking Village - Internet of Ingestible Things Security by Design.eng.tsv

12.4 KB

DEF CON 29 - Biohacking Village - Internet of Ingestible Things Security by Design.eng.txt

13.9 KB

DEF CON 29 - Biohacking Village - Internet of Ingestible Things Security by Design.eng.vtt

13.1 KB

DEF CON 29 - Biohacking Village - It takes a village Why you should join the Biohacking Village.eng.json

564.5 KB

DEF CON 29 - Biohacking Village - It takes a village Why you should join the Biohacking Village.eng.lrc

16.5 KB

DEF CON 29 - Biohacking Village - It takes a village Why you should join the Biohacking Village.eng.srt

16.0 KB

DEF CON 29 - Biohacking Village - It takes a village Why you should join the Biohacking Village.eng.text

11.9 KB

DEF CON 29 - Biohacking Village - It takes a village Why you should join the Biohacking Village.eng.tsv

14.4 KB

DEF CON 29 - Biohacking Village - It takes a village Why you should join the Biohacking Village.eng.txt

16.7 KB

DEF CON 29 - Biohacking Village - It takes a village Why you should join the Biohacking Village.eng.vtt

14.9 KB

DEF CON 29 - Biohacking Village - Lets Get Real About The Future State of Healthcare.eng.json

1.4 MB

DEF CON 29 - Biohacking Village - Lets Get Real About The Future State of Healthcare.eng.lrc

36.9 KB

DEF CON 29 - Biohacking Village - Lets Get Real About The Future State of Healthcare.eng.srt

39.9 KB

DEF CON 29 - Biohacking Village - Lets Get Real About The Future State of Healthcare.eng.text

28.9 KB

DEF CON 29 - Biohacking Village - Lets Get Real About The Future State of Healthcare.eng.tsv

33.4 KB

DEF CON 29 - Biohacking Village - Lets Get Real About The Future State of Healthcare.eng.txt

37.2 KB

DEF CON 29 - Biohacking Village - Lets Get Real About The Future State of Healthcare.eng.vtt

36.8 KB

DEF CON 29 - Biohacking Village - No Aggregation Without Representation.eng.json

1.6 MB

DEF CON 29 - Biohacking Village - No Aggregation Without Representation.eng.lrc

40.0 KB

DEF CON 29 - Biohacking Village - No Aggregation Without Representation.eng.srt

42.5 KB

DEF CON 29 - Biohacking Village - No Aggregation Without Representation.eng.text

31.3 KB

DEF CON 29 - Biohacking Village - No Aggregation Without Representation.eng.tsv

36.4 KB

DEF CON 29 - Biohacking Village - No Aggregation Without Representation.eng.txt

40.4 KB

DEF CON 29 - Biohacking Village - No Aggregation Without Representation.eng.vtt

39.3 KB

DEF CON 29 - Biohacking Village - Open Source Vaccine Developer Kits (VDKs).eng.json

1.2 MB

DEF CON 29 - Biohacking Village - Open Source Vaccine Developer Kits (VDKs).eng.lrc

32.4 KB

DEF CON 29 - Biohacking Village - Open Source Vaccine Developer Kits (VDKs).eng.srt

32.1 KB

DEF CON 29 - Biohacking Village - Open Source Vaccine Developer Kits (VDKs).eng.text

25.4 KB

DEF CON 29 - Biohacking Village - Open Source Vaccine Developer Kits (VDKs).eng.tsv

29.3 KB

DEF CON 29 - Biohacking Village - Open Source Vaccine Developer Kits (VDKs).eng.txt

32.7 KB

DEF CON 29 - Biohacking Village - Open Source Vaccine Developer Kits (VDKs).eng.vtt

30.2 KB

DEF CON 29 - Biohacking Village - OWASP & CSA IoT Impacting Medical Security.eng.json

1.5 MB

DEF CON 29 - Biohacking Village - OWASP & CSA IoT Impacting Medical Security.eng.lrc

37.7 KB

DEF CON 29 - Biohacking Village - OWASP & CSA IoT Impacting Medical Security.eng.srt

41.3 KB

DEF CON 29 - Biohacking Village - OWASP & CSA IoT Impacting Medical Security.eng.text

29.1 KB

DEF CON 29 - Biohacking Village - OWASP & CSA IoT Impacting Medical Security.eng.tsv

34.1 KB

DEF CON 29 - Biohacking Village - OWASP & CSA IoT Impacting Medical Security.eng.txt

38.0 KB

DEF CON 29 - Biohacking Village - OWASP & CSA IoT Impacting Medical Security.eng.vtt

37.9 KB

DEF CON 29 - Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.eng.json

2.2 MB

DEF CON 29 - Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.eng.lrc

54.8 KB

DEF CON 29 - Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.eng.srt

62.0 KB

DEF CON 29 - Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.eng.text

42.8 KB

DEF CON 29 - Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.eng.tsv

49.8 KB

DEF CON 29 - Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.eng.txt

55.3 KB

DEF CON 29 - Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.eng.vtt

56.6 KB

DEF CON 29 - Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.eng.json

1.8 MB

DEF CON 29 - Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.eng.lrc

44.4 KB

DEF CON 29 - Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.eng.srt

46.4 KB

DEF CON 29 - Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.eng.text

34.5 KB

DEF CON 29 - Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.eng.tsv

40.2 KB

DEF CON 29 - Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.eng.txt

44.8 KB

DEF CON 29 - Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.eng.vtt

43.0 KB

DEF CON 29 - Biohacking Village - Securing the Internet of Biological Things.eng.json

847.3 KB

DEF CON 29 - Biohacking Village - Securing the Internet of Biological Things.eng.lrc

23.7 KB

DEF CON 29 - Biohacking Village - Securing the Internet of Biological Things.eng.srt

23.6 KB

DEF CON 29 - Biohacking Village - Securing the Internet of Biological Things.eng.text

18.5 KB

DEF CON 29 - Biohacking Village - Securing the Internet of Biological Things.eng.tsv

21.3 KB

DEF CON 29 - Biohacking Village - Securing the Internet of Biological Things.eng.txt

23.9 KB

DEF CON 29 - Biohacking Village - Securing the Internet of Biological Things.eng.vtt

22.2 KB

DEF CON 29 - Biohacking Village - The Digital Physiome - How wearables can transform healthcare.eng.json

2.2 MB

DEF CON 29 - Biohacking Village - The Digital Physiome - How wearables can transform healthcare.eng.lrc

58.4 KB

DEF CON 29 - Biohacking Village - The Digital Physiome - How wearables can transform healthcare.eng.srt

60.7 KB

DEF CON 29 - Biohacking Village - The Digital Physiome - How wearables can transform healthcare.eng.text

45.7 KB

DEF CON 29 - Biohacking Village - The Digital Physiome - How wearables can transform healthcare.eng.tsv

53.1 KB

DEF CON 29 - Biohacking Village - The Digital Physiome - How wearables can transform healthcare.eng.txt

58.9 KB

DEF CON 29 - Biohacking Village - The Digital Physiome - How wearables can transform healthcare.eng.vtt

56.4 KB

DEF CON 29 - Biohacking Village - The Economics of Cybersecurity.eng.json

908.9 KB

DEF CON 29 - Biohacking Village - The Economics of Cybersecurity.eng.lrc

23.5 KB

DEF CON 29 - Biohacking Village - The Economics of Cybersecurity.eng.srt

25.3 KB

DEF CON 29 - Biohacking Village - The Economics of Cybersecurity.eng.text

18.2 KB

DEF CON 29 - Biohacking Village - The Economics of Cybersecurity.eng.tsv

21.1 KB

DEF CON 29 - Biohacking Village - The Economics of Cybersecurity.eng.txt

23.8 KB

DEF CON 29 - Biohacking Village - The Economics of Cybersecurity.eng.vtt

23.3 KB

DEF CON 29 - Biohacking Village - The Little Things.eng.json

1.0 MB

DEF CON 29 - Biohacking Village - The Little Things.eng.lrc

28.4 KB

DEF CON 29 - Biohacking Village - The Little Things.eng.srt

29.6 KB

DEF CON 29 - Biohacking Village - The Little Things.eng.text

18.9 KB

DEF CON 29 - Biohacking Village - The Little Things.eng.tsv

24.3 KB

DEF CON 29 - Biohacking Village - The Little Things.eng.txt

28.7 KB

DEF CON 29 - Biohacking Village - The Little Things.eng.vtt

26.6 KB

DEF CON 29 - Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.eng.json

2.1 MB

DEF CON 29 - Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.eng.lrc

56.9 KB

DEF CON 29 - Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.eng.srt

52.6 KB

DEF CON 29 - Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.eng.text

36.6 KB

DEF CON 29 - Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.eng.tsv

48.3 KB

DEF CON 29 - Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.eng.txt

57.7 KB

DEF CON 29 - Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.eng.vtt

47.9 KB

DEF CON 29 - Biohacking Village - The Real Story on Patching Medical Devices.eng.json

2.9 MB

DEF CON 29 - Biohacking Village - The Real Story on Patching Medical Devices.eng.lrc

70.8 KB

DEF CON 29 - Biohacking Village - The Real Story on Patching Medical Devices.eng.srt

76.3 KB

DEF CON 29 - Biohacking Village - The Real Story on Patching Medical Devices.eng.text

55.4 KB

DEF CON 29 - Biohacking Village - The Real Story on Patching Medical Devices.eng.tsv

64.5 KB

DEF CON 29 - Biohacking Village - The Real Story on Patching Medical Devices.eng.txt

71.4 KB

DEF CON 29 - Biohacking Village - The Real Story on Patching Medical Devices.eng.vtt

70.3 KB

DEF CON 29 - Biohacking Village - The Security of Your Digital DNA, from Inception to Death.eng.json

1.4 MB

DEF CON 29 - Biohacking Village - The Security of Your Digital DNA, from Inception to Death.eng.lrc

37.6 KB

DEF CON 29 - Biohacking Village - The Security of Your Digital DNA, from Inception to Death.eng.srt

39.4 KB

DEF CON 29 - Biohacking Village - The Security of Your Digital DNA, from Inception to Death.eng.text

29.3 KB

DEF CON 29 - Biohacking Village - The Security of Your Digital DNA, from Inception to Death.eng.tsv

34.1 KB

DEF CON 29 - Biohacking Village - The Security of Your Digital DNA, from Inception to Death.eng.txt

38.0 KB

DEF CON 29 - Biohacking Village - The Security of Your Digital DNA, from Inception to Death.eng.vtt

36.5 KB

DEF CON 29 - Biohacking Village - Truth, Trust, and Biodefense.eng.json

1.7 MB

DEF CON 29 - Biohacking Village - Truth, Trust, and Biodefense.eng.lrc

41.0 KB

DEF CON 29 - Biohacking Village - Truth, Trust, and Biodefense.eng.srt

47.3 KB

DEF CON 29 - Biohacking Village - Truth, Trust, and Biodefense.eng.text

32.1 KB

DEF CON 29 - Biohacking Village - Truth, Trust, and Biodefense.eng.tsv

37.2 KB

DEF CON 29 - Biohacking Village - Truth, Trust, and Biodefense.eng.txt

41.4 KB

DEF CON 29 - Biohacking Village - Truth, Trust, and Biodefense.eng.vtt

43.0 KB

DEF CON 29 - Biohacking Village - Welcome Keynote.eng.json

801.7 KB

DEF CON 29 - Biohacking Village - Welcome Keynote.eng.lrc

19.6 KB

DEF CON 29 - Biohacking Village - Welcome Keynote.eng.srt

22.5 KB

DEF CON 29 - Biohacking Village - Welcome Keynote.eng.text

15.2 KB

DEF CON 29 - Biohacking Village - Welcome Keynote.eng.tsv

17.6 KB

DEF CON 29 - Biohacking Village - Welcome Keynote.eng.txt

19.7 KB

DEF CON 29 - Biohacking Village - Welcome Keynote.eng.vtt

20.5 KB

DEF CON 29 - Biohacking Village - Wrap Up Video.eng.json

0.0 KB

DEF CON 29 - Biohacking Village - Wrap Up Video.eng.lrc

0.0 KB

DEF CON 29 - Biohacking Village - Wrap Up Video.eng.srt

0.0 KB

DEF CON 29 - Biohacking Village - Wrap Up Video.eng.text

0.0 KB

DEF CON 29 - Biohacking Village - Wrap Up Video.eng.tsv

0.0 KB

DEF CON 29 - Biohacking Village - Wrap Up Video.eng.txt

0.0 KB

DEF CON 29 - Biohacking Village - Wrap Up Video.eng.vtt

0.0 KB

DEF CON 29 - Blockchain Village - Anto Joseph - Flash Loans Demystified.eng.json

1.1 MB

DEF CON 29 - Blockchain Village - Anto Joseph - Flash Loans Demystified.eng.lrc

26.8 KB

DEF CON 29 - Blockchain Village - Anto Joseph - Flash Loans Demystified.eng.srt

30.2 KB

DEF CON 29 - Blockchain Village - Anto Joseph - Flash Loans Demystified.eng.text

20.5 KB

DEF CON 29 - Blockchain Village - Anto Joseph - Flash Loans Demystified.eng.tsv

24.2 KB

DEF CON 29 - Blockchain Village - Anto Joseph - Flash Loans Demystified.eng.txt

27.1 KB

DEF CON 29 - Blockchain Village - Anto Joseph - Flash Loans Demystified.eng.vtt

27.5 KB

DEF CON 29 - Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.eng.json

1.2 MB

DEF CON 29 - Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.eng.lrc

32.4 KB

DEF CON 29 - Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.eng.srt

35.5 KB

DEF CON 29 - Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.eng.text

25.6 KB

DEF CON 29 - Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.eng.tsv

29.6 KB

DEF CON 29 - Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.eng.txt

32.7 KB

DEF CON 29 - Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.eng.vtt

32.7 KB

DEF CON 29 - Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.eng.json

3.2 MB

DEF CON 29 - Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.eng.lrc

78.6 KB

DEF CON 29 - Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.eng.srt

84.3 KB

DEF CON 29 - Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.eng.text

61.7 KB

DEF CON 29 - Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.eng.tsv

71.6 KB

DEF CON 29 - Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.eng.txt

79.2 KB

DEF CON 29 - Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.eng.vtt

78.0 KB

DEF CON 29 - Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.eng.json

1.5 MB

DEF CON 29 - Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.eng.lrc

38.8 KB

DEF CON 29 - Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.eng.srt

41.6 KB

DEF CON 29 - Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.eng.text

29.8 KB

DEF CON 29 - Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.eng.tsv

35.1 KB

DEF CON 29 - Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.eng.txt

39.2 KB

DEF CON 29 - Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.eng.vtt

38.2 KB

DEF CON 29 - Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.eng.json

2.2 MB

DEF CON 29 - Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.eng.lrc

58.0 KB

DEF CON 29 - Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.eng.srt

63.5 KB

DEF CON 29 - Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.eng.text

44.8 KB

DEF CON 29 - Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.eng.tsv

52.5 KB

DEF CON 29 - Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.eng.txt

58.4 KB

DEF CON 29 - Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.eng.vtt

58.4 KB

DEF CON 29 - Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.eng.json

1.7 MB

DEF CON 29 - Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.eng.lrc

43.4 KB

DEF CON 29 - Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.eng.srt

44.5 KB

DEF CON 29 - Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.eng.text

34.1 KB

DEF CON 29 - Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.eng.tsv

39.5 KB

DEF CON 29 - Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.eng.txt

43.7 KB

DEF CON 29 - Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.eng.vtt

41.5 KB

DEF CON 29 - Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.eng.json

2.5 MB

DEF CON 29 - Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.eng.lrc

63.5 KB

DEF CON 29 - Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.eng.srt

64.6 KB

DEF CON 29 - Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.eng.text

49.8 KB

DEF CON 29 - Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.eng.tsv

57.9 KB

DEF CON 29 - Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.eng.txt

64.1 KB

DEF CON 29 - Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.eng.vtt

60.4 KB

DEF CON 29 - Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer.eng.json

1.1 MB

DEF CON 29 - Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer.eng.lrc

31.1 KB

DEF CON 29 - Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer.eng.srt

29.9 KB

DEF CON 29 - Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer.eng.text

20.8 KB

DEF CON 29 - Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer.eng.tsv

26.6 KB

DEF CON 29 - Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer.eng.txt

31.5 KB

DEF CON 29 - Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait Analyzer.eng.vtt

27.3 KB

DEF CON 29 - Blockchain Village - Reddcoin & TechAdept - CTF Contestl.eng.json

625.1 KB

DEF CON 29 - Blockchain Village - Reddcoin & TechAdept - CTF Contestl.eng.lrc

15.7 KB

DEF CON 29 - Blockchain Village - Reddcoin & TechAdept - CTF Contestl.eng.srt

16.0 KB

DEF CON 29 - Blockchain Village - Reddcoin & TechAdept - CTF Contestl.eng.text

12.2 KB

DEF CON 29 - Blockchain Village - Reddcoin & TechAdept - CTF Contestl.eng.tsv

14.1 KB

DEF CON 29 - Blockchain Village - Reddcoin & TechAdept - CTF Contestl.eng.txt

15.9 KB

DEF CON 29 - Blockchain Village - Reddcoin & TechAdept - CTF Contestl.eng.vtt

15.0 KB

DEF CON 29 - Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.eng.json

964.9 KB

DEF CON 29 - Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.eng.lrc

25.6 KB

DEF CON 29 - Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.eng.srt

30.6 KB

DEF CON 29 - Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.eng.text

21.0 KB

DEF CON 29 - Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.eng.tsv

23.7 KB

DEF CON 29 - Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.eng.txt

25.8 KB

DEF CON 29 - Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.eng.vtt

27.9 KB

DEF CON 29 - Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.eng.json

478.7 KB

DEF CON 29 - Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.eng.lrc

12.7 KB

DEF CON 29 - Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.eng.srt

13.4 KB

DEF CON 29 - Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.eng.text

9.7 KB

DEF CON 29 - Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.eng.tsv

11.3 KB

DEF CON 29 - Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.eng.txt

12.8 KB

DEF CON 29 - Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.eng.vtt

12.4 KB

DEF CON 29 - Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.eng.json

2.3 MB

DEF CON 29 - Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.eng.lrc

66.9 KB

DEF CON 29 - Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.eng.srt

55.8 KB

DEF CON 29 - Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.eng.text

41.3 KB

DEF CON 29 - Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.eng.tsv

56.3 KB

DEF CON 29 - Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.eng.txt

67.8 KB

DEF CON 29 - Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.eng.vtt

51.5 KB

DEF CON 29 - Blue Team Village - Adventures in Pro Bono Digital Forensics Work.eng.json

2.7 MB

DEF CON 29 - Blue Team Village - Adventures in Pro Bono Digital Forensics Work.eng.lrc

66.7 KB

DEF CON 29 - Blue Team Village - Adventures in Pro Bono Digital Forensics Work.eng.srt

72.6 KB

DEF CON 29 - Blue Team Village - Adventures in Pro Bono Digital Forensics Work.eng.text

50.8 KB

DEF CON 29 - Blue Team Village - Adventures in Pro Bono Digital Forensics Work.eng.tsv

60.1 KB

DEF CON 29 - Blue Team Village - Adventures in Pro Bono Digital Forensics Work.eng.txt

67.3 KB

DEF CON 29 - Blue Team Village - Adventures in Pro Bono Digital Forensics Work.eng.vtt

66.4 KB

DEF CON 29 - Blue Team Village - BTV Presents Threat Report Roulette.eng.json

2.4 MB

DEF CON 29 - Blue Team Village - BTV Presents Threat Report Roulette.eng.lrc

58.5 KB

DEF CON 29 - Blue Team Village - BTV Presents Threat Report Roulette.eng.srt

66.6 KB

DEF CON 29 - Blue Team Village - BTV Presents Threat Report Roulette.eng.text

45.6 KB

DEF CON 29 - Blue Team Village - BTV Presents Threat Report Roulette.eng.tsv

53.2 KB

DEF CON 29 - Blue Team Village - BTV Presents Threat Report Roulette.eng.txt

59.0 KB

DEF CON 29 - Blue Team Village - BTV Presents Threat Report Roulette.eng.vtt

60.6 KB

DEF CON 29 - Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.eng.json

1.4 MB

DEF CON 29 - Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.eng.lrc

33.2 KB

DEF CON 29 - Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.eng.srt

38.3 KB

DEF CON 29 - Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.eng.text

25.9 KB

DEF CON 29 - Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.eng.tsv

30.1 KB

DEF CON 29 - Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.eng.txt

33.5 KB

DEF CON 29 - Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.eng.vtt

34.8 KB

DEF CON 29 - Blue Team Village - How do you ALL THE CLOUDS.eng.json

1.1 MB

DEF CON 29 - Blue Team Village - How do you ALL THE CLOUDS.eng.lrc

29.2 KB

DEF CON 29 - Blue Team Village - How do you ALL THE CLOUDS.eng.srt

32.7 KB

DEF CON 29 - Blue Team Village - How do you ALL THE CLOUDS.eng.text

22.8 KB

DEF CON 29 - Blue Team Village - How do you ALL THE CLOUDS.eng.tsv

26.4 KB

DEF CON 29 - Blue Team Village - How do you ALL THE CLOUDS.eng.txt

29.4 KB

DEF CON 29 - Blue Team Village - How do you ALL THE CLOUDS.eng.vtt

29.9 KB

DEF CON 29 - Blue Team Village - I know who has access to my cloud, do you.eng.json

523.3 KB

DEF CON 29 - Blue Team Village - I know who has access to my cloud, do you.eng.lrc

13.1 KB

DEF CON 29 - Blue Team Village - I know who has access to my cloud, do you.eng.srt

14.6 KB

DEF CON 29 - Blue Team Village - I know who has access to my cloud, do you.eng.text

10.3 KB

DEF CON 29 - Blue Team Village - I know who has access to my cloud, do you.eng.tsv

11.8 KB

DEF CON 29 - Blue Team Village - I know who has access to my cloud, do you.eng.txt

13.2 KB

DEF CON 29 - Blue Team Village - I know who has access to my cloud, do you.eng.vtt

13.4 KB

DEF CON 29 - Blue Team Village - Leveraging NGFWs for Threat Hunting.eng.json

1.1 MB

DEF CON 29 - Blue Team Village - Leveraging NGFWs for Threat Hunting.eng.lrc

27.1 KB

DEF CON 29 - Blue Team Village - Leveraging NGFWs for Threat Hunting.eng.srt

29.1 KB

DEF CON 29 - Blue Team Village - Leveraging NGFWs for Threat Hunting.eng.text

21.0 KB

DEF CON 29 - Blue Team Village - Leveraging NGFWs for Threat Hunting.eng.tsv

24.4 KB

DEF CON 29 - Blue Team Village - Leveraging NGFWs for Threat Hunting.eng.txt

27.3 KB

DEF CON 29 - Blue Team Village - Leveraging NGFWs for Threat Hunting.eng.vtt

26.9 KB

DEF CON 29 - Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.eng.json

1.8 MB

DEF CON 29 - Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.eng.lrc

45.4 KB

DEF CON 29 - Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.eng.srt

55.3 KB

DEF CON 29 - Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.eng.text

35.5 KB

DEF CON 29 - Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.eng.tsv

41.2 KB

DEF CON 29 - Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.eng.txt

45.8 KB

DEF CON 29 - Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.eng.vtt

49.7 KB

DEF CON 29 - Blue Team Village - Modern Authentication for the Security Admin.eng.json

3.0 MB

DEF CON 29 - Blue Team Village - Modern Authentication for the Security Admin.eng.lrc

83.8 KB

DEF CON 29 - Blue Team Village - Modern Authentication for the Security Admin.eng.srt

71.1 KB

DEF CON 29 - Blue Team Village - Modern Authentication for the Security Admin.eng.text

52.4 KB

DEF CON 29 - Blue Team Village - Modern Authentication for the Security Admin.eng.tsv

70.9 KB

DEF CON 29 - Blue Team Village - Modern Authentication for the Security Admin.eng.txt

85.0 KB

DEF CON 29 - Blue Team Village - Modern Authentication for the Security Admin.eng.vtt

65.6 KB

DEF CON 29 - Blue Team Village - Scope X Hunt in the Ocean.eng.json

1.3 MB

DEF CON 29 - Blue Team Village - Scope X Hunt in the Ocean.eng.lrc

33.1 KB

DEF CON 29 - Blue Team Village - Scope X Hunt in the Ocean.eng.srt

35.3 KB

DEF CON 29 - Blue Team Village - Scope X Hunt in the Ocean.eng.text

25.8 KB

DEF CON 29 - Blue Team Village - Scope X Hunt in the Ocean.eng.tsv

29.9 KB

DEF CON 29 - Blue Team Village - Scope X Hunt in the Ocean.eng.txt

33.4 KB

DEF CON 29 - Blue Team Village - Scope X Hunt in the Ocean.eng.vtt

32.6 KB

DEF CON 29 - Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.eng.json

1.5 MB

DEF CON 29 - Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.eng.lrc

38.7 KB

DEF CON 29 - Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.eng.srt

42.3 KB

DEF CON 29 - Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.eng.text

30.3 KB

DEF CON 29 - Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.eng.tsv

35.2 KB

DEF CON 29 - Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.eng.txt

39.0 KB

DEF CON 29 - Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.eng.vtt

38.9 KB

DEF CON 29 - Blue Team Village - This is what we thought would happen in 2021.eng.json

1.2 MB

DEF CON 29 - Blue Team Village - This is what we thought would happen in 2021.eng.lrc

30.1 KB

DEF CON 29 - Blue Team Village - This is what we thought would happen in 2021.eng.srt

34.4 KB

DEF CON 29 - Blue Team Village - This is what we thought would happen in 2021.eng.text

23.4 KB

DEF CON 29 - Blue Team Village - This is what we thought would happen in 2021.eng.tsv

27.2 KB

DEF CON 29 - Blue Team Village - This is what we thought would happen in 2021.eng.txt

30.4 KB

DEF CON 29 - Blue Team Village - This is what we thought would happen in 2021.eng.vtt

31.3 KB

DEF CON 29 - Blue Team Village - Uncomfortable Networking.eng.json

1.4 MB

DEF CON 29 - Blue Team Village - Uncomfortable Networking.eng.lrc

39.9 KB

DEF CON 29 - Blue Team Village - Uncomfortable Networking.eng.srt

36.0 KB

DEF CON 29 - Blue Team Village - Uncomfortable Networking.eng.text

25.6 KB

DEF CON 29 - Blue Team Village - Uncomfortable Networking.eng.tsv

33.8 KB

DEF CON 29 - Blue Team Village - Uncomfortable Networking.eng.txt

40.4 KB

DEF CON 29 - Blue Team Village - Uncomfortable Networking.eng.vtt

33.0 KB

DEF CON 29 - Blue Team Village - Use DNS to detect your domains are abused for phishing.eng.json

1.8 MB

DEF CON 29 - Blue Team Village - Use DNS to detect your domains are abused for phishing.eng.lrc

42.5 KB

DEF CON 29 - Blue Team Village - Use DNS to detect your domains are abused for phishing.eng.srt

49.0 KB

DEF CON 29 - Blue Team Village - Use DNS to detect your domains are abused for phishing.eng.text

32.3 KB

DEF CON 29 - Blue Team Village - Use DNS to detect your domains are abused for phishing.eng.tsv

38.3 KB

DEF CON 29 - Blue Team Village - Use DNS to detect your domains are abused for phishing.eng.txt

42.9 KB

DEF CON 29 - Blue Team Village - Use DNS to detect your domains are abused for phishing.eng.vtt

44.3 KB

DEF CON 29 - Blue Team Village - Velociraptor - Dig Deeper.eng.json

1.7 MB

DEF CON 29 - Blue Team Village - Velociraptor - Dig Deeper.eng.lrc

39.9 KB

DEF CON 29 - Blue Team Village - Velociraptor - Dig Deeper.eng.srt

49.6 KB

DEF CON 29 - Blue Team Village - Velociraptor - Dig Deeper.eng.text

31.2 KB

DEF CON 29 - Blue Team Village - Velociraptor - Dig Deeper.eng.tsv

36.2 KB

DEF CON 29 - Blue Team Village - Velociraptor - Dig Deeper.eng.txt

40.3 KB

DEF CON 29 - Blue Team Village - Velociraptor - Dig Deeper.eng.vtt

44.4 KB

DEF CON 29 - Blue Team Village - What Machine Learning Can and Can't Do for Security.eng.json

982.6 KB

DEF CON 29 - Blue Team Village - What Machine Learning Can and Can't Do for Security.eng.lrc

25.3 KB

DEF CON 29 - Blue Team Village - What Machine Learning Can and Can't Do for Security.eng.srt

28.4 KB

DEF CON 29 - Blue Team Village - What Machine Learning Can and Can't Do for Security.eng.text

19.0 KB

DEF CON 29 - Blue Team Village - What Machine Learning Can and Can't Do for Security.eng.tsv

22.5 KB

DEF CON 29 - Blue Team Village - What Machine Learning Can and Can't Do for Security.eng.txt

25.5 KB

DEF CON 29 - Blue Team Village - What Machine Learning Can and Can't Do for Security.eng.vtt

25.8 KB

DEF CON 29 - Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.eng.json

1.5 MB

DEF CON 29 - Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.eng.lrc

37.2 KB

DEF CON 29 - Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.eng.srt

40.4 KB

DEF CON 29 - Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.eng.text

28.9 KB

DEF CON 29 - Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.eng.tsv

33.7 KB

DEF CON 29 - Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.eng.txt

37.6 KB

DEF CON 29 - Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.eng.vtt

37.2 KB

DEF CON 29 - Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank).eng.json

2.1 MB

DEF CON 29 - Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank).eng.lrc

55.1 KB

DEF CON 29 - Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank).eng.srt

56.6 KB

DEF CON 29 - Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank).eng.text

39.2 KB

DEF CON 29 - Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank).eng.tsv

48.3 KB

DEF CON 29 - Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank).eng.txt

55.7 KB

DEF CON 29 - Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank).eng.vtt

51.6 KB

DEF CON 29 - Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.eng.json

1.9 MB

DEF CON 29 - Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.eng.lrc

44.7 KB

DEF CON 29 - Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.eng.srt

51.6 KB

DEF CON 29 - Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.eng.text

34.7 KB

DEF CON 29 - Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.eng.tsv

40.6 KB

DEF CON 29 - Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.eng.txt

45.1 KB

DEF CON 29 - Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.eng.vtt

46.8 KB

DEF CON 29 - Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.eng.json

1.5 MB

DEF CON 29 - Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.eng.lrc

37.9 KB

DEF CON 29 - Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.eng.srt

43.4 KB

DEF CON 29 - Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.eng.text

27.9 KB

DEF CON 29 - Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.eng.tsv

33.7 KB

DEF CON 29 - Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.eng.txt

38.2 KB

DEF CON 29 - Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.eng.vtt

39.0 KB

DEF CON 29 - Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.eng.json

2.1 MB

DEF CON 29 - Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.eng.lrc

53.7 KB

DEF CON 29 - Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.eng.srt

58.9 KB

DEF CON 29 - Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.eng.text

42.1 KB

DEF CON 29 - Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.eng.tsv

48.9 KB

DEF CON 29 - Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.eng.txt

54.1 KB

DEF CON 29 - Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.eng.vtt

54.1 KB

DEF CON 29 - Car Hacking Village - From CTF to CVE - Bill Hatzer.eng.json

1.9 MB

DEF CON 29 - Car Hacking Village - From CTF to CVE - Bill Hatzer.eng.lrc

46.8 KB

DEF CON 29 - Car Hacking Village - From CTF to CVE - Bill Hatzer.eng.srt

53.1 KB

DEF CON 29 - Car Hacking Village - From CTF to CVE - Bill Hatzer.eng.text

32.5 KB

DEF CON 29 - Car Hacking Village - From CTF to CVE - Bill Hatzer.eng.tsv

40.8 KB

DEF CON 29 - Car Hacking Village - From CTF to CVE - Bill Hatzer.eng.txt

47.4 KB

DEF CON 29 - Car Hacking Village - From CTF to CVE - Bill Hatzer.eng.vtt

47.2 KB

DEF CON 29 - Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.eng.json

1.9 MB

DEF CON 29 - Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.eng.lrc

47.4 KB

DEF CON 29 - Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.eng.srt

48.2 KB

DEF CON 29 - Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.eng.text

35.6 KB

DEF CON 29 - Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.eng.tsv

42.5 KB

DEF CON 29 - Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.eng.txt

47.9 KB

DEF CON 29 - Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.eng.vtt

44.6 KB

DEF CON 29 - Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.eng.json

1.4 MB

DEF CON 29 - Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.eng.lrc

36.7 KB

DEF CON 29 - Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.eng.srt

34.7 KB

DEF CON 29 - Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.eng.text

24.3 KB

DEF CON 29 - Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.eng.tsv

31.5 KB

DEF CON 29 - Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.eng.txt

37.2 KB

DEF CON 29 - Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.eng.vtt

31.7 KB

DEF CON 29 - Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.eng.json

1.3 MB

DEF CON 29 - Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.eng.lrc

31.7 KB

DEF CON 29 - Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.eng.srt

33.6 KB

DEF CON 29 - Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.eng.text

24.7 KB

DEF CON 29 - Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.eng.tsv

28.7 KB

DEF CON 29 - Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.eng.txt

32.0 KB

DEF CON 29 - Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.eng.vtt

31.1 KB

DEF CON 29 - Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.eng.json

2.2 MB

DEF CON 29 - Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.eng.lrc

52.2 KB

DEF CON 29 - Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.eng.srt

59.1 KB

DEF CON 29 - Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.eng.text

42.7 KB

DEF CON 29 - Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.eng.tsv

48.3 KB

DEF CON 29 - Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.eng.txt

52.6 KB

DEF CON 29 - Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.eng.vtt

54.5 KB

DEF CON 29 - Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.eng.json

1.4 MB

DEF CON 29 - Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.eng.lrc

36.4 KB

DEF CON 29 - Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.eng.srt

38.0 KB

DEF CON 29 - Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.eng.text

28.4 KB

DEF CON 29 - Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.eng.tsv

33.0 KB

DEF CON 29 - Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.eng.txt

36.7 KB

DEF CON 29 - Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.eng.vtt

35.3 KB

DEF CON 29 - Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.eng.json

801.5 KB

DEF CON 29 - Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.eng.lrc

19.6 KB

DEF CON 29 - Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.eng.srt

23.7 KB

DEF CON 29 - Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.eng.text

15.1 KB

DEF CON 29 - Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.eng.tsv

17.6 KB

DEF CON 29 - Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.eng.txt

19.8 KB

DEF CON 29 - Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.eng.vtt

21.3 KB

DEF CON 29 - Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.eng.json

933.6 KB

DEF CON 29 - Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.eng.lrc

22.6 KB

DEF CON 29 - Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.eng.srt

24.7 KB

DEF CON 29 - Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.eng.text

17.6 KB

DEF CON 29 - Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.eng.tsv

20.4 KB

DEF CON 29 - Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.eng.txt

22.8 KB

DEF CON 29 - Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.eng.vtt

22.8 KB

DEF CON 29 - Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.eng.json

6.5 MB

DEF CON 29 - Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.eng.lrc

189.2 KB

DEF CON 29 - Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.eng.srt

166.7 KB

DEF CON 29 - Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.eng.text

108.6 KB

DEF CON 29 - Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.eng.tsv

151.6 KB

DEF CON 29 - Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.eng.txt

191.9 KB

DEF CON 29 - Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.eng.vtt

154.8 KB

DEF CON 29 - Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.eng.json

1.7 MB

DEF CON 29 - Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.eng.lrc

42.6 KB

DEF CON 29 - Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.eng.srt

45.6 KB

DEF CON 29 - Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.eng.text

33.3 KB

DEF CON 29 - Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.eng.tsv

38.7 KB

DEF CON 29 - Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.eng.txt

42.9 KB

DEF CON 29 - Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.eng.vtt

42.1 KB

DEF CON 29 - Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.eng.json

1.2 MB

DEF CON 29 - Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.eng.lrc

33.7 KB

DEF CON 29 - Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.eng.srt

32.9 KB

DEF CON 29 - Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.eng.text

22.9 KB

DEF CON 29 - Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.eng.tsv

29.1 KB

DEF CON 29 - Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.eng.txt

34.1 KB

DEF CON 29 - Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.eng.vtt

30.0 KB

DEF CON 29 - Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.eng.json

1.5 MB

DEF CON 29 - Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.eng.lrc

39.0 KB

DEF CON 29 - Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.eng.srt

42.6 KB

DEF CON 29 - Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.eng.text

27.5 KB

DEF CON 29 - Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.eng.tsv

34.2 KB

DEF CON 29 - Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.eng.txt

39.5 KB

DEF CON 29 - Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.eng.vtt

38.3 KB

DEF CON 29 - Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.eng.json

914.6 KB

DEF CON 29 - Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.eng.lrc

24.7 KB

DEF CON 29 - Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.eng.srt

31.4 KB

DEF CON 29 - Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.eng.text

18.9 KB

DEF CON 29 - Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.eng.tsv

22.3 KB

DEF CON 29 - Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.eng.txt

24.9 KB

DEF CON 29 - Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.eng.vtt

27.9 KB

DEF CON 29 - Cloud Village - Closing Note - Jayesh Singh Chauhan.eng.json

294.1 KB

DEF CON 29 - Cloud Village - Closing Note - Jayesh Singh Chauhan.eng.lrc

6.8 KB

DEF CON 29 - Cloud Village - Closing Note - Jayesh Singh Chauhan.eng.srt

8.3 KB

DEF CON 29 - Cloud Village - Closing Note - Jayesh Singh Chauhan.eng.text

5.3 KB

DEF CON 29 - Cloud Village - Closing Note - Jayesh Singh Chauhan.eng.tsv

6.1 KB

DEF CON 29 - Cloud Village - Closing Note - Jayesh Singh Chauhan.eng.txt

6.9 KB

DEF CON 29 - Cloud Village - Closing Note - Jayesh Singh Chauhan.eng.vtt

7.5 KB

DEF CON 29 - Cloud Village - Cloud Security Orienteering - Rami McCarthy.eng.json

1.9 MB

DEF CON 29 - Cloud Village - Cloud Security Orienteering - Rami McCarthy.eng.lrc

49.6 KB

DEF CON 29 - Cloud Village - Cloud Security Orienteering - Rami McCarthy.eng.srt

54.3 KB

DEF CON 29 - Cloud Village - Cloud Security Orienteering - Rami McCarthy.eng.text

38.8 KB

DEF CON 29 - Cloud Village - Cloud Security Orienteering - Rami McCarthy.eng.tsv

45.1 KB

DEF CON 29 - Cloud Village - Cloud Security Orienteering - Rami McCarthy.eng.txt

50.0 KB

DEF CON 29 - Cloud Village - Cloud Security Orienteering - Rami McCarthy.eng.vtt

49.9 KB

DEF CON 29 - Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.eng.json

823.3 KB

DEF CON 29 - Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.eng.lrc

20.2 KB

DEF CON 29 - Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.eng.srt

20.1 KB

DEF CON 29 - Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.eng.text

15.7 KB

DEF CON 29 - Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.eng.tsv

18.2 KB

DEF CON 29 - Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.eng.txt

20.3 KB

DEF CON 29 - Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.eng.vtt

18.9 KB

DEF CON 29 - Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.eng.json

1.6 MB

DEF CON 29 - Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.eng.lrc

39.7 KB

DEF CON 29 - Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.eng.srt

43.5 KB

DEF CON 29 - Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.eng.text

30.8 KB

DEF CON 29 - Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.eng.tsv

36.0 KB

DEF CON 29 - Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.eng.txt

40.0 KB

DEF CON 29 - Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.eng.vtt

39.9 KB

DEF CON 29 - Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.eng.json

626.3 KB

DEF CON 29 - Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.eng.lrc

16.4 KB

DEF CON 29 - Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.eng.srt

17.3 KB

DEF CON 29 - Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.eng.text

12.7 KB

DEF CON 29 - Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.eng.tsv

14.7 KB

DEF CON 29 - Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.eng.txt

16.5 KB

DEF CON 29 - Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.eng.vtt

16.1 KB

DEF CON 29 - Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.eng.json

2.4 MB

DEF CON 29 - Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.eng.lrc

66.5 KB

DEF CON 29 - Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.eng.srt

61.5 KB

DEF CON 29 - Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.eng.text

46.8 KB

DEF CON 29 - Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.eng.tsv

58.5 KB

DEF CON 29 - Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.eng.txt

67.2 KB

DEF CON 29 - Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.eng.vtt

57.2 KB

DEF CON 29 - Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.eng.json

929.8 KB

DEF CON 29 - Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.eng.lrc

22.6 KB

DEF CON 29 - Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.eng.srt

26.9 KB

DEF CON 29 - Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.eng.text

17.6 KB

DEF CON 29 - Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.eng.tsv

20.4 KB

DEF CON 29 - Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.eng.txt

22.8 KB

DEF CON 29 - Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.eng.vtt

24.3 KB

DEF CON 29 - Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.eng.json

1.1 MB

DEF CON 29 - Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.eng.lrc

27.9 KB

DEF CON 29 - Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.eng.srt

32.5 KB

DEF CON 29 - Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.eng.text

21.9 KB

DEF CON 29 - Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.eng.tsv

25.2 KB

DEF CON 29 - Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.eng.txt

28.1 KB

DEF CON 29 - Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.eng.vtt

29.5 KB

DEF CON 29 - Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.eng.json

1.7 MB

DEF CON 29 - Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.eng.lrc

42.2 KB

DEF CON 29 - Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.eng.srt

43.9 KB

DEF CON 29 - Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.eng.text

33.0 KB

DEF CON 29 - Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.eng.tsv

38.3 KB

DEF CON 29 - Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.eng.txt

42.6 KB

DEF CON 29 - Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.eng.vtt

40.8 KB

DEF CON 29 - Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.eng.json

1.2 MB

DEF CON 29 - Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.eng.lrc

29.9 KB

DEF CON 29 - Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.eng.srt

30.8 KB

DEF CON 29 - Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.eng.text

23.3 KB

DEF CON 29 - Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.eng.tsv

27.0 KB

DEF CON 29 - Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.eng.txt

30.1 KB

DEF CON 29 - Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.eng.vtt

28.7 KB

DEF CON 29 - Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.eng.json

4.6 MB

DEF CON 29 - Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.eng.lrc

121.3 KB

DEF CON 29 - Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.eng.srt

129.0 KB

DEF CON 29 - Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.eng.text

79.4 KB

DEF CON 29 - Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.eng.tsv

102.2 KB

DEF CON 29 - Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.eng.txt

122.7 KB

DEF CON 29 - Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.eng.vtt

118.0 KB

DEF CON 29 - Cloud Village - Opening Note - Jayesh Singh Chauhan.eng.json

464.3 KB

DEF CON 29 - Cloud Village - Opening Note - Jayesh Singh Chauhan.eng.lrc

11.4 KB

DEF CON 29 - Cloud Village - Opening Note - Jayesh Singh Chauhan.eng.srt

12.8 KB

DEF CON 29 - Cloud Village - Opening Note - Jayesh Singh Chauhan.eng.text

8.4 KB

DEF CON 29 - Cloud Village - Opening Note - Jayesh Singh Chauhan.eng.tsv

10.0 KB

DEF CON 29 - Cloud Village - Opening Note - Jayesh Singh Chauhan.eng.txt

11.5 KB

DEF CON 29 - Cloud Village - Opening Note - Jayesh Singh Chauhan.eng.vtt

11.6 KB

DEF CON 29 - Cloud Village - PK-WHY - Kevin Chen.eng.json

610.2 KB

DEF CON 29 - Cloud Village - PK-WHY - Kevin Chen.eng.lrc

14.5 KB

DEF CON 29 - Cloud Village - PK-WHY - Kevin Chen.eng.srt

17.6 KB

DEF CON 29 - Cloud Village - PK-WHY - Kevin Chen.eng.text

11.4 KB

DEF CON 29 - Cloud Village - PK-WHY - Kevin Chen.eng.tsv

13.0 KB

DEF CON 29 - Cloud Village - PK-WHY - Kevin Chen.eng.txt

14.6 KB

DEF CON 29 - Cloud Village - PK-WHY - Kevin Chen.eng.vtt

15.9 KB

DEF CON 29 - Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.eng.json

1.5 MB

DEF CON 29 - Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.eng.lrc

39.1 KB

DEF CON 29 - Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.eng.srt

40.5 KB

DEF CON 29 - Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.eng.text

30.5 KB

DEF CON 29 - Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.eng.tsv

35.5 KB

DEF CON 29 - Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.eng.txt

39.4 KB

DEF CON 29 - Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.eng.vtt

37.7 KB

DEF CON 29 - Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.eng.json

1.6 MB

DEF CON 29 - Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.eng.lrc

39.1 KB

DEF CON 29 - Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.eng.srt

42.2 KB

DEF CON 29 - Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.eng.text

30.2 KB

DEF CON 29 - Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.eng.tsv

35.4 KB

DEF CON 29 - Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.eng.txt

39.5 KB

DEF CON 29 - Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.eng.vtt

38.8 KB

DEF CON 29 - Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.eng.json

1.0 MB

DEF CON 29 - Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.eng.lrc

25.4 KB

DEF CON 29 - Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.eng.srt

29.0 KB

DEF CON 29 - Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.eng.text

19.7 KB

DEF CON 29 - Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.eng.tsv

22.8 KB

DEF CON 29 - Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.eng.txt

25.6 KB

DEF CON 29 - Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.eng.vtt

26.4 KB

DEF CON 29 - Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.eng.json

654.0 KB

DEF CON 29 - Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.eng.lrc

16.3 KB

DEF CON 29 - Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.eng.srt

18.4 KB

DEF CON 29 - Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.eng.text

12.6 KB

DEF CON 29 - Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.eng.tsv

14.6 KB

DEF CON 29 - Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.eng.txt

16.4 KB

DEF CON 29 - Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.eng.vtt

16.9 KB

DEF CON 29 - Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.eng.json

1.5 MB

DEF CON 29 - Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.eng.lrc

37.4 KB

DEF CON 29 - Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.eng.srt

41.6 KB

DEF CON 29 - Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.eng.text

29.0 KB

DEF CON 29 - Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.eng.tsv

33.8 KB

DEF CON 29 - Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.eng.txt

37.7 KB

DEF CON 29 - Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.eng.vtt

38.1 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 1.eng.json

17.3 MB

DEF CON 29 - Crypto and Privacy Village 2021 Day 1.eng.lrc

448.8 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 1.eng.srt

469.8 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 1.eng.text

335.7 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 1.eng.tsv

397.7 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 1.eng.txt

452.3 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 1.eng.vtt

450.1 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 2.eng.json

11.6 MB

DEF CON 29 - Crypto and Privacy Village 2021 Day 2.eng.lrc

292.4 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 2.eng.srt

333.2 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 2.eng.text

220.4 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 2.eng.tsv

259.8 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 2.eng.txt

294.8 KB

DEF CON 29 - Crypto and Privacy Village 2021 Day 2.eng.vtt

313.1 KB

DEF CON 29 - Cyber Warrior Network - The Future of Women in Cybersecurity.eng.json

2.8 MB

DEF CON 29 - Cyber Warrior Network - The Future of Women in Cybersecurity.eng.lrc

68.3 KB

DEF CON 29 - Cyber Warrior Network - The Future of Women in Cybersecurity.eng.srt

76.4 KB

DEF CON 29 - Cyber Warrior Network - The Future of Women in Cybersecurity.eng.text

53.4 KB

DEF CON 29 - Cyber Warrior Network - The Future of Women in Cybersecurity.eng.tsv

62.2 KB

DEF CON 29 - Cyber Warrior Network - The Future of Women in Cybersecurity.eng.txt

68.8 KB

DEF CON 29 - Cyber Warrior Network - The Future of Women in Cybersecurity.eng.vtt

69.9 KB

DEF CON 29 - Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.eng.json

1.6 MB

DEF CON 29 - Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.eng.lrc

38.3 KB

DEF CON 29 - Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.eng.srt

43.8 KB

DEF CON 29 - Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.eng.text

29.8 KB

DEF CON 29 - Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.eng.tsv

34.7 KB

DEF CON 29 - Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.eng.txt

38.6 KB

DEF CON 29 - Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.eng.vtt

39.9 KB

DEF CON 29 - Hack-A-Sat 2 - 2.2.eng.json

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - 2.2.eng.lrc

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - 2.2.eng.srt

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - 2.2.eng.text

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - 2.2.eng.tsv

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - 2.2.eng.txt

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - 2.2.eng.vtt

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - First Things First.eng.json

28.1 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - First Things First.eng.lrc

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - First Things First.eng.srt

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - First Things First.eng.text

0.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - First Things First.eng.tsv

0.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - First Things First.eng.txt

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - First Things First.eng.vtt

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - User segment ground station.eng.json

26.0 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - User segment ground station.eng.lrc

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - User segment ground station.eng.srt

0.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - User segment ground station.eng.text

0.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - User segment ground station.eng.tsv

0.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - User segment ground station.eng.txt

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Intro - User segment ground station.eng.vtt

0.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Walkthrough.eng.json

4.3 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Walkthrough.eng.lrc

103.1 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Walkthrough.eng.srt

120.9 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Walkthrough.eng.text

80.0 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Walkthrough.eng.tsv

93.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Walkthrough.eng.txt

104.0 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Challenge Walkthrough.eng.vtt

109.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 1 Recap.eng.json

2.8 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 1 Recap.eng.lrc

70.3 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 1 Recap.eng.srt

77.9 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 1 Recap.eng.text

54.5 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 1 Recap.eng.tsv

63.9 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 1 Recap.eng.txt

70.9 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 1 Recap.eng.vtt

71.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 2 Kickoff Awards Show.eng.json

6.8 MB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 2 Kickoff Awards Show.eng.lrc

170.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 2 Kickoff Awards Show.eng.srt

190.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 2 Kickoff Awards Show.eng.text

129.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 2 Kickoff Awards Show.eng.tsv

152.0 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 2 Kickoff Awards Show.eng.txt

172.1 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Day 2 Kickoff Awards Show.eng.vtt

177.2 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - End Credits.eng.json

11.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - End Credits.eng.lrc

0.3 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - End Credits.eng.srt

0.4 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - End Credits.eng.text

0.2 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - End Credits.eng.tsv

0.3 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - End Credits.eng.txt

0.3 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - End Credits.eng.vtt

0.4 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Jeff Moss interview.eng.json

609.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Jeff Moss interview.eng.lrc

15.1 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Jeff Moss interview.eng.srt

17.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Jeff Moss interview.eng.text

11.3 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Jeff Moss interview.eng.tsv

13.3 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Jeff Moss interview.eng.txt

15.3 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Jeff Moss interview.eng.vtt

15.9 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Moonlighter.eng.json

102.9 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Moonlighter.eng.lrc

2.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Moonlighter.eng.srt

2.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Moonlighter.eng.text

2.0 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Moonlighter.eng.tsv

2.3 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Moonlighter.eng.txt

2.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals - Moonlighter.eng.vtt

2.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Day 1 Kickoff Show.eng.json

5.9 MB

DEF CON 29 - Hack-A-Sat 2 - Finals Day 1 Kickoff Show.eng.lrc

150.6 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Day 1 Kickoff Show.eng.srt

165.2 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Day 1 Kickoff Show.eng.text

116.9 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Day 1 Kickoff Show.eng.tsv

135.2 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Day 1 Kickoff Show.eng.txt

151.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Day 1 Kickoff Show.eng.vtt

155.8 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Pam Melroy Interview.eng.json

1.4 MB

DEF CON 29 - Hack-A-Sat 2 - Finals Pam Melroy Interview.eng.lrc

34.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Pam Melroy Interview.eng.srt

37.7 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Pam Melroy Interview.eng.text

27.2 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Pam Melroy Interview.eng.tsv

31.5 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Pam Melroy Interview.eng.txt

35.0 KB

DEF CON 29 - Hack-A-Sat 2 - Finals Pam Melroy Interview.eng.vtt

34.8 KB

DEF CON 29 - Hack-A-Sat 2 - FlatSat Digital Twin Overview.eng.json

243.0 KB

DEF CON 29 - Hack-A-Sat 2 - FlatSat Digital Twin Overview.eng.lrc

6.4 KB

DEF CON 29 - Hack-A-Sat 2 - FlatSat Digital Twin Overview.eng.srt

6.5 KB

DEF CON 29 - Hack-A-Sat 2 - FlatSat Digital Twin Overview.eng.text

4.9 KB

DEF CON 29 - Hack-A-Sat 2 - FlatSat Digital Twin Overview.eng.tsv

5.7 KB

DEF CON 29 - Hack-A-Sat 2 - FlatSat Digital Twin Overview.eng.txt

6.4 KB

DEF CON 29 - Hack-A-Sat 2 - FlatSat Digital Twin Overview.eng.vtt

6.1 KB

DEF CON 29 - Hack-A-Sat 2 - Hack A Sat is BACK.eng.json

3.3 KB

DEF CON 29 - Hack-A-Sat 2 - Hack A Sat is BACK.eng.lrc

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Hack A Sat is BACK.eng.srt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Hack A Sat is BACK.eng.text

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Hack A Sat is BACK.eng.tsv

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Hack A Sat is BACK.eng.txt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Hack A Sat is BACK.eng.vtt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Finals Preview.eng.json

230.9 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Finals Preview.eng.lrc

6.4 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Finals Preview.eng.srt

6.4 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Finals Preview.eng.text

5.0 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Finals Preview.eng.tsv

5.7 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Finals Preview.eng.txt

6.5 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Finals Preview.eng.vtt

6.0 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Quals Explanation.eng.json

268.5 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Quals Explanation.eng.lrc

6.7 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Quals Explanation.eng.srt

7.4 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Quals Explanation.eng.text

5.5 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Quals Explanation.eng.tsv

6.1 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Quals Explanation.eng.txt

6.8 KB

DEF CON 29 - Hack-A-Sat 2 - Hack-A-Sat 2 - Quals Explanation.eng.vtt

6.9 KB

DEF CON 29 - Hack-A-Sat 2 - HAS1 Documentary.eng.json

347.2 KB

DEF CON 29 - Hack-A-Sat 2 - HAS1 Documentary.eng.lrc

9.5 KB

DEF CON 29 - Hack-A-Sat 2 - HAS1 Documentary.eng.srt

9.2 KB

DEF CON 29 - Hack-A-Sat 2 - HAS1 Documentary.eng.text

6.9 KB

DEF CON 29 - Hack-A-Sat 2 - HAS1 Documentary.eng.tsv

8.3 KB

DEF CON 29 - Hack-A-Sat 2 - HAS1 Documentary.eng.txt

9.6 KB

DEF CON 29 - Hack-A-Sat 2 - HAS1 Documentary.eng.vtt

8.6 KB

DEF CON 29 - Hack-A-Sat 2 - Intro.eng.json

84.1 KB

DEF CON 29 - Hack-A-Sat 2 - Intro.eng.lrc

2.3 KB

DEF CON 29 - Hack-A-Sat 2 - Intro.eng.srt

2.3 KB

DEF CON 29 - Hack-A-Sat 2 - Intro.eng.text

1.7 KB

DEF CON 29 - Hack-A-Sat 2 - Intro.eng.tsv

2.0 KB

DEF CON 29 - Hack-A-Sat 2 - Intro.eng.txt

2.3 KB

DEF CON 29 - Hack-A-Sat 2 - Intro.eng.vtt

2.1 KB

DEF CON 29 - Hack-A-Sat 2 - Join the Alliance.eng.json

21.1 KB

DEF CON 29 - Hack-A-Sat 2 - Join the Alliance.eng.lrc

0.5 KB

DEF CON 29 - Hack-A-Sat 2 - Join the Alliance.eng.srt

0.7 KB

DEF CON 29 - Hack-A-Sat 2 - Join the Alliance.eng.text

0.4 KB

DEF CON 29 - Hack-A-Sat 2 - Join the Alliance.eng.tsv

0.5 KB

DEF CON 29 - Hack-A-Sat 2 - Join the Alliance.eng.txt

0.5 KB

DEF CON 29 - Hack-A-Sat 2 - Join the Alliance.eng.vtt

0.6 KB

DEF CON 29 - Hack-A-Sat 2 - Only the Best.eng.json

31.4 KB

DEF CON 29 - Hack-A-Sat 2 - Only the Best.eng.lrc

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Only the Best.eng.srt

0.9 KB

DEF CON 29 - Hack-A-Sat 2 - Only the Best.eng.text

0.6 KB

DEF CON 29 - Hack-A-Sat 2 - Only the Best.eng.tsv

0.7 KB

DEF CON 29 - Hack-A-Sat 2 - Only the Best.eng.txt

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Only the Best.eng.vtt

0.8 KB

DEF CON 29 - Hack-A-Sat 2 - Panel Cybersecurity Threats.eng.json

2.8 MB

DEF CON 29 - Hack-A-Sat 2 - Panel - Cybersecurity Threats.eng.json

2.8 MB

DEF CON 29 - Hack-A-Sat 2 - Panel Cybersecurity Threats.eng.lrc

70.9 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Cybersecurity Threats.eng.lrc

71.5 KB

DEF CON 29 - Hack-A-Sat 2 - Panel Cybersecurity Threats.eng.srt

78.1 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Cybersecurity Threats.eng.srt

77.7 KB

DEF CON 29 - Hack-A-Sat 2 - Panel Cybersecurity Threats.eng.text

55.6 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Cybersecurity Threats.eng.text

55.8 KB

DEF CON 29 - Hack-A-Sat 2 - Panel Cybersecurity Threats.eng.tsv

64.7 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Cybersecurity Threats.eng.tsv

65.1 KB

DEF CON 29 - Hack-A-Sat 2 - Panel Cybersecurity Threats.eng.txt

71.5 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Cybersecurity Threats.eng.txt

72.1 KB

DEF CON 29 - Hack-A-Sat 2 - Panel Cybersecurity Threats.eng.vtt

71.7 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Cybersecurity Threats.eng.vtt

71.5 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Realizing Space Commercialization - Who's Got the Chops.eng.json

2.8 MB

DEF CON 29 - Hack-A-Sat 2 - Panel - Realizing Space Commercialization - Who's Got the Chops.eng.lrc

71.9 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Realizing Space Commercialization - Who's Got the Chops.eng.srt

74.7 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Realizing Space Commercialization - Who's Got the Chops.eng.text

56.2 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Realizing Space Commercialization - Who's Got the Chops.eng.tsv

65.5 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Realizing Space Commercialization - Who's Got the Chops.eng.txt

72.6 KB

DEF CON 29 - Hack-A-Sat 2 - Panel - Realizing Space Commercialization - Who's Got the Chops.eng.vtt

69.4 KB

DEF CON 29 - Hack-A-Sat 2 - Practice that Quick Draw.eng.json

3.8 KB

DEF CON 29 - Hack-A-Sat 2 - Practice that Quick Draw.eng.lrc

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Practice that Quick Draw.eng.srt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Practice that Quick Draw.eng.text

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Practice that Quick Draw.eng.tsv

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Practice that Quick Draw.eng.txt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Practice that Quick Draw.eng.vtt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Project Moonlighter.eng.json

64.8 KB

DEF CON 29 - Hack-A-Sat 2 - Project Moonlighter.eng.lrc

1.7 KB

DEF CON 29 - Hack-A-Sat 2 - Project Moonlighter.eng.srt

1.9 KB

DEF CON 29 - Hack-A-Sat 2 - Project Moonlighter.eng.text

1.4 KB

DEF CON 29 - Hack-A-Sat 2 - Project Moonlighter.eng.tsv

1.6 KB

DEF CON 29 - Hack-A-Sat 2 - Project Moonlighter.eng.txt

1.8 KB

DEF CON 29 - Hack-A-Sat 2 - Project Moonlighter.eng.vtt

1.8 KB

DEF CON 29 - Hack-A-Sat 2 - Showdown is Coming.eng.json

4.0 KB

DEF CON 29 - Hack-A-Sat 2 - Showdown is Coming.eng.lrc

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Showdown is Coming.eng.srt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Showdown is Coming.eng.text

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Showdown is Coming.eng.tsv

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Showdown is Coming.eng.txt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Showdown is Coming.eng.vtt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Space Resiliency & Cyber security.eng.json

273.0 KB

DEF CON 29 - Hack-A-Sat 2 - Space Resiliency & Cyber security.eng.lrc

7.7 KB

DEF CON 29 - Hack-A-Sat 2 - Space Resiliency & Cyber security.eng.srt

6.7 KB

DEF CON 29 - Hack-A-Sat 2 - Space Resiliency & Cyber security.eng.text

5.4 KB

DEF CON 29 - Hack-A-Sat 2 - Space Resiliency & Cyber security.eng.tsv

6.6 KB

DEF CON 29 - Hack-A-Sat 2 - Space Resiliency & Cyber security.eng.txt

7.8 KB

DEF CON 29 - Hack-A-Sat 2 - Space Resiliency & Cyber security.eng.vtt

6.4 KB

DEF CON 29 - Hack-A-Sat 2 - Teaser.eng.json

4.0 KB

DEF CON 29 - Hack-A-Sat 2 - Teaser.eng.lrc

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Teaser.eng.srt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Teaser.eng.text

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Teaser.eng.tsv

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Teaser.eng.txt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - Teaser.eng.vtt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - The Alliance is Here.eng.json

1.2 KB

DEF CON 29 - Hack-A-Sat 2 - The Alliance is Here.eng.lrc

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - The Alliance is Here.eng.srt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - The Alliance is Here.eng.text

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - The Alliance is Here.eng.tsv

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - The Alliance is Here.eng.txt

0.0 KB

DEF CON 29 - Hack-A-Sat 2 - The Alliance is Here.eng.vtt

0.1 KB

DEF CON 29 - Hack-A-Sat 2 - The Evolution of Space.eng.json

424.0 KB

DEF CON 29 - Hack-A-Sat 2 - The Evolution of Space.eng.lrc

11.0 KB

DEF CON 29 - Hack-A-Sat 2 - The Evolution of Space.eng.srt

12.6 KB

DEF CON 29 - Hack-A-Sat 2 - The Evolution of Space.eng.text

8.0 KB

DEF CON 29 - Hack-A-Sat 2 - The Evolution of Space.eng.tsv

9.6 KB

DEF CON 29 - Hack-A-Sat 2 - The Evolution of Space.eng.txt

11.2 KB

DEF CON 29 - Hack-A-Sat 2 - The Evolution of Space.eng.vtt

11.4 KB

DEF CON 29 - Ham Radio Village - Bryan Fields - Spectrum Coordination - for Amateur Radio.eng.json

3.1 MB

DEF CON 29 - Ham Radio Village - Bryan Fields - Spectrum Coordination - for Amateur Radio.eng.lrc

78.3 KB

DEF CON 29 - Ham Radio Village - Bryan Fields - Spectrum Coordination - for Amateur Radio.eng.srt

87.0 KB

DEF CON 29 - Ham Radio Village - Bryan Fields - Spectrum Coordination - for Amateur Radio.eng.text

56.9 KB

DEF CON 29 - Ham Radio Village - Bryan Fields - Spectrum Coordination - for Amateur Radio.eng.tsv

69.4 KB

DEF CON 29 - Ham Radio Village - Bryan Fields - Spectrum Coordination - for Amateur Radio.eng.txt

79.1 KB

DEF CON 29 - Ham Radio Village - Bryan Fields - Spectrum Coordination - for Amateur Radio.eng.vtt

78.7 KB

DEF CON 29 - Ham Radio Village - Eric Escobar - Getting started with low power long distance Comms.eng.json

1.3 MB

DEF CON 29 - Ham Radio Village - Eric Escobar - Getting started with low power long distance Comms.eng.lrc

32.1 KB

DEF CON 29 - Ham Radio Village - Eric Escobar - Getting started with low power long distance Comms.eng.srt

33.5 KB

DEF CON 29 - Ham Radio Village - Eric Escobar - Getting started with low power long distance Comms.eng.text

24.7 KB

DEF CON 29 - Ham Radio Village - Eric Escobar - Getting started with low power long distance Comms.eng.tsv

28.8 KB

DEF CON 29 - Ham Radio Village - Eric Escobar - Getting started with low power long distance Comms.eng.txt

32.4 KB

DEF CON 29 - Ham Radio Village - Eric Escobar - Getting started with low power long distance Comms.eng.vtt

31.0 KB

DEF CON 29 - Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio.eng.json

910.5 KB

DEF CON 29 - Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio.eng.lrc

21.5 KB

DEF CON 29 - Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio.eng.srt

26.2 KB

DEF CON 29 - Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio.eng.text

16.8 KB

DEF CON 29 - Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio.eng.tsv

19.4 KB

DEF CON 29 - Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio.eng.txt

21.7 KB

DEF CON 29 - Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radio.eng.vtt

23.6 KB

DEF CON 29 - Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer.eng.json

2.3 MB

DEF CON 29 - Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer.eng.lrc

54.3 KB

DEF CON 29 - Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer.eng.srt

62.2 KB

DEF CON 29 - Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer.eng.text

42.5 KB

DEF CON 29 - Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer.eng.tsv

49.4 KB

DEF CON 29 - Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer.eng.txt

54.7 KB

DEF CON 29 - Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer.eng.vtt

56.6 KB

DEF CON 29 - Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment.eng.json

2.9 MB

DEF CON 29 - Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment.eng.lrc

70.7 KB

DEF CON 29 - Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment.eng.srt

77.7 KB

DEF CON 29 - Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment.eng.text

52.2 KB

DEF CON 29 - Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment.eng.tsv

62.7 KB

DEF CON 29 - Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment.eng.txt

71.4 KB

DEF CON 29 - Ham Radio Village - Kurtis Kopf - An Introduction to RF Test Equipment.eng.vtt

71.3 KB

DEF CON 29 - Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking.eng.json

1.4 MB

DEF CON 29 - Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking.eng.lrc

37.1 KB

DEF CON 29 - Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking.eng.srt

38.7 KB

DEF CON 29 - Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking.eng.text

28.6 KB

DEF CON 29 - Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking.eng.tsv

33.5 KB

DEF CON 29 - Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking.eng.txt

37.4 KB

DEF CON 29 - Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking.eng.vtt

35.9 KB

DEF CON 29 - HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.eng.json

1.3 MB

DEF CON 29 - HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.eng.lrc

30.2 KB

DEF CON 29 - HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.eng.srt

34.4 KB

DEF CON 29 - HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.eng.text

23.3 KB

DEF CON 29 - HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.eng.tsv

27.3 KB

DEF CON 29 - HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.eng.txt

30.5 KB

DEF CON 29 - HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.eng.vtt

31.3 KB

DEF CON 29 - HHV - Bradan Lane - The PortaProg Project.eng.json

2.0 MB

DEF CON 29 - HHV - Bradan Lane - The PortaProg Project.eng.lrc

52.0 KB

DEF CON 29 - HHV - Bradan Lane - The PortaProg Project.eng.srt

51.9 KB

DEF CON 29 - HHV - Bradan Lane - The PortaProg Project.eng.text

37.5 KB

DEF CON 29 - HHV - Bradan Lane - The PortaProg Project.eng.tsv

45.9 KB

DEF CON 29 - HHV - Bradan Lane - The PortaProg Project.eng.txt

52.6 KB

DEF CON 29 - HHV - Bradan Lane - The PortaProg Project.eng.vtt

47.7 KB

DEF CON 29 - HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.eng.json

2.2 MB

DEF CON 29 - HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.eng.lrc

59.5 KB

DEF CON 29 - HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.eng.srt

57.6 KB

DEF CON 29 - HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.eng.text

37.9 KB

DEF CON 29 - HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.eng.tsv

50.7 KB

DEF CON 29 - HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.eng.txt

60.4 KB

DEF CON 29 - HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.eng.vtt

51.9 KB

DEF CON 29 - HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.eng.json

794.7 KB

DEF CON 29 - HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.eng.lrc

20.2 KB

DEF CON 29 - HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.eng.srt

23.0 KB

DEF CON 29 - HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.eng.text

15.8 KB

DEF CON 29 - HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.eng.tsv

18.2 KB

DEF CON 29 - HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.eng.txt

20.4 KB

DEF CON 29 - HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.eng.vtt

21.0 KB

DEF CON 29 - HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.eng.json

2.2 MB

DEF CON 29 - HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.eng.lrc

49.0 KB

DEF CON 29 - HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.eng.srt

55.6 KB

DEF CON 29 - HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.eng.text

38.3 KB

DEF CON 29 - HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.eng.tsv

44.6 KB

DEF CON 29 - HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.eng.txt

49.4 KB

DEF CON 29 - HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.eng.vtt

50.7 KB

DEF CON 29 - ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.eng.json

556.8 KB

DEF CON 29 - ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.eng.lrc

15.6 KB

DEF CON 29 - ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.eng.srt

15.8 KB

DEF CON 29 - ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.eng.text

12.2 KB

DEF CON 29 - ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.eng.tsv

14.0 KB

DEF CON 29 - ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.eng.txt

15.7 KB

DEF CON 29 - ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.eng.vtt

14.8 KB

DEF CON 29 - ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).eng.json

1.2 MB

DEF CON 29 - ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).eng.lrc

28.6 KB

DEF CON 29 - ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).eng.srt

37.1 KB

DEF CON 29 - ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).eng.text

22.5 KB

DEF CON 29 - ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).eng.tsv

25.9 KB

DEF CON 29 - ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).eng.txt

28.9 KB

DEF CON 29 - ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).eng.vtt

33.0 KB

DEF CON 29 - ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).eng.json

1.1 MB

DEF CON 29 - ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).eng.lrc

28.1 KB

DEF CON 29 - ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).eng.srt

29.3 KB

DEF CON 29 - ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).eng.text

22.0 KB

DEF CON 29 - ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).eng.tsv

25.5 KB

DEF CON 29 - ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).eng.txt

28.4 KB

DEF CON 29 - ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).eng.vtt

27.3 KB

DEF CON 29 - ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).eng.json

1.2 MB

DEF CON 29 - ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).eng.lrc

30.7 KB

DEF CON 29 - ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).eng.srt

33.5 KB

DEF CON 29 - ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).eng.text

24.0 KB

DEF CON 29 - ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).eng.tsv

27.8 KB

DEF CON 29 - ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).eng.txt

30.9 KB

DEF CON 29 - ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).eng.vtt

30.9 KB

DEF CON 29 - ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).eng.json

2.4 MB

DEF CON 29 - ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).eng.lrc

56.2 KB

DEF CON 29 - ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).eng.srt

61.7 KB

DEF CON 29 - ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).eng.text

44.0 KB

DEF CON 29 - ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).eng.tsv

51.2 KB

DEF CON 29 - ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).eng.txt

56.7 KB

DEF CON 29 - ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).eng.vtt

56.7 KB

DEF CON 29 - ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).eng.json

953.3 KB

DEF CON 29 - ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).eng.lrc

23.7 KB

DEF CON 29 - ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).eng.srt

26.3 KB

DEF CON 29 - ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).eng.text

21.4 KB

DEF CON 29 - ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).eng.tsv

22.7 KB

DEF CON 29 - ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).eng.txt

23.8 KB

DEF CON 29 - ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).eng.vtt

25.0 KB

DEF CON 29 - ICS Village - DEF CON 29 - ICS Village Opening and Introduction.eng.json

134.2 KB

DEF CON 29 - ICS Village - DEF CON 29 - ICS Village Opening and Introduction.eng.lrc

3.3 KB

DEF CON 29 - ICS Village - DEF CON 29 - ICS Village Opening and Introduction.eng.srt

3.9 KB

DEF CON 29 - ICS Village - DEF CON 29 - ICS Village Opening and Introduction.eng.text

2.6 KB

DEF CON 29 - ICS Village - DEF CON 29 - ICS Village Opening and Introduction.eng.tsv

3.0 KB

DEF CON 29 - ICS Village - DEF CON 29 - ICS Village Opening and Introduction.eng.txt

3.3 KB

DEF CON 29 - ICS Village - DEF CON 29 - ICS Village Opening and Introduction.eng.vtt

3.5 KB

DEF CON 29 - ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).eng.json

1.1 MB

DEF CON 29 - ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).eng.lrc

26.4 KB

DEF CON 29 - ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).eng.srt

28.5 KB

DEF CON 29 - ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).eng.text

21.3 KB

DEF CON 29 - ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).eng.tsv

24.2 KB

DEF CON 29 - ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).eng.txt

26.6 KB

DEF CON 29 - ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).eng.vtt

26.5 KB

DEF CON 29 - ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).eng.json

1.1 MB

DEF CON 29 - ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).eng.lrc

27.0 KB

DEF CON 29 - ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).eng.srt

28.2 KB

DEF CON 29 - ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).eng.text

21.1 KB

DEF CON 29 - ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).eng.tsv

24.4 KB

DEF CON 29 - ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).eng.txt

27.2 KB

DEF CON 29 - ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).eng.vtt

26.2 KB

DEF CON 29 - ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).eng.json

1.1 MB

DEF CON 29 - ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).eng.lrc

28.1 KB

DEF CON 29 - ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).eng.srt

28.8 KB

DEF CON 29 - ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).eng.text

21.8 KB

DEF CON 29 - ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).eng.tsv

25.3 KB

DEF CON 29 - ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).eng.txt

28.3 KB

DEF CON 29 - ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).eng.vtt

26.8 KB

DEF CON 29 - ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.eng.json

760.4 KB

DEF CON 29 - ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.eng.lrc

20.5 KB

DEF CON 29 - ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.eng.srt

20.6 KB

DEF CON 29 - ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.eng.text

15.6 KB

DEF CON 29 - ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.eng.tsv

18.3 KB

DEF CON 29 - ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.eng.txt

20.7 KB

DEF CON 29 - ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.eng.vtt

19.2 KB

DEF CON 29 - ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.eng.json

1.1 MB

DEF CON 29 - ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.eng.lrc

31.1 KB

DEF CON 29 - ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.eng.srt

31.7 KB

DEF CON 29 - ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.eng.text

24.2 KB

DEF CON 29 - ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.eng.tsv

28.1 KB

DEF CON 29 - ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.eng.txt

31.3 KB

DEF CON 29 - ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.eng.vtt

29.6 KB

DEF CON 29 - ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).eng.json

895.6 KB

DEF CON 29 - ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).eng.lrc

22.6 KB

DEF CON 29 - ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).eng.srt

25.6 KB

DEF CON 29 - ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).eng.text

17.7 KB

DEF CON 29 - ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).eng.tsv

20.5 KB

DEF CON 29 - ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).eng.txt

22.8 KB

DEF CON 29 - ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).eng.vtt

23.4 KB

DEF CON 29 - ICS Village - ICS Jeopardy.eng.json

1.9 MB

DEF CON 29 - ICS Village - ICS Jeopardy.eng.lrc

49.3 KB

DEF CON 29 - ICS Village - ICS Jeopardy.eng.srt

63.9 KB

DEF CON 29 - ICS Village - ICS Jeopardy.eng.text

29.6 KB

DEF CON 29 - ICS Village - ICS Jeopardy.eng.tsv

41.3 KB

DEF CON 29 - ICS Village - ICS Jeopardy.eng.txt

50.1 KB

DEF CON 29 - ICS Village - ICS Jeopardy.eng.vtt

54.1 KB

DEF CON 29 - ICS Village - ICS Village Opening and Introduction.eng.json

135.2 KB

DEF CON 29 - ICS Village - ICS Village Opening and Introduction.eng.lrc

3.3 KB

DEF CON 29 - ICS Village - ICS Village Opening and Introduction.eng.srt

3.9 KB

DEF CON 29 - ICS Village - ICS Village Opening and Introduction.eng.text

2.6 KB

DEF CON 29 - ICS Village - ICS Village Opening and Introduction.eng.tsv

3.0 KB

DEF CON 29 - ICS Village - ICS Village Opening and Introduction.eng.txt

3.4 KB

DEF CON 29 - ICS Village - ICS Village Opening and Introduction.eng.vtt

3.6 KB

DEF CON 29 - ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.eng.json

968.7 KB

DEF CON 29 - ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.eng.lrc

23.6 KB

DEF CON 29 - ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.eng.srt

24.9 KB

DEF CON 29 - ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.eng.text

18.5 KB

DEF CON 29 - ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.eng.tsv

21.3 KB

DEF CON 29 - ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.eng.txt

23.8 KB

DEF CON 29 - ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.eng.vtt

23.1 KB

DEF CON 29 - ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).eng.json

1.4 MB

DEF CON 29 - ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).eng.lrc

33.3 KB

DEF CON 29 - ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).eng.srt

36.0 KB

DEF CON 29 - ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).eng.text

26.0 KB

DEF CON 29 - ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).eng.tsv

30.1 KB

DEF CON 29 - ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).eng.txt

33.6 KB

DEF CON 29 - ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).eng.vtt

33.2 KB

DEF CON 29 - ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).eng.json

1.3 MB

DEF CON 29 - ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).eng.lrc

35.6 KB

DEF CON 29 - ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).eng.srt

37.4 KB

DEF CON 29 - ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).eng.text

26.8 KB

DEF CON 29 - ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).eng.tsv

31.8 KB

DEF CON 29 - ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).eng.txt

35.9 KB

DEF CON 29 - ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).eng.vtt

34.4 KB

DEF CON 29 - ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).eng.json

1.1 MB

DEF CON 29 - ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).eng.lrc

29.0 KB

DEF CON 29 - ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).eng.srt

30.6 KB

DEF CON 29 - ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).eng.text

22.7 KB

DEF CON 29 - ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).eng.tsv

26.2 KB

DEF CON 29 - ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).eng.txt

29.2 KB

DEF CON 29 - ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).eng.vtt

28.4 KB

DEF CON 29 - ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).eng.json

4.1 MB

DEF CON 29 - ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).eng.lrc

107.8 KB

DEF CON 29 - ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).eng.srt

104.0 KB

DEF CON 29 - ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).eng.text

82.7 KB

DEF CON 29 - ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).eng.tsv

96.5 KB

DEF CON 29 - ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).eng.txt

108.6 KB

DEF CON 29 - ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).eng.vtt

99.0 KB

DEF CON 29 - ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).eng.json

1.1 MB

DEF CON 29 - ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).eng.lrc

27.2 KB

DEF CON 29 - ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).eng.srt

30.7 KB

DEF CON 29 - ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).eng.text

21.2 KB

DEF CON 29 - ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).eng.tsv

24.5 KB

DEF CON 29 - ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).eng.txt

27.4 KB

DEF CON 29 - ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).eng.vtt

28.1 KB

DEF CON 29 - ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).eng.json

1.1 MB

DEF CON 29 - ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).eng.lrc

28.3 KB

DEF CON 29 - ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).eng.srt

29.9 KB

DEF CON 29 - ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).eng.text

22.2 KB

DEF CON 29 - ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).eng.tsv

25.5 KB

DEF CON 29 - ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).eng.txt

28.5 KB

DEF CON 29 - ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).eng.vtt

27.7 KB

DEF CON 29 - ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).eng.json

2.0 MB

DEF CON 29 - ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).eng.lrc

49.5 KB

DEF CON 29 - ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).eng.srt

53.0 KB

DEF CON 29 - ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).eng.text

38.6 KB

DEF CON 29 - ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).eng.tsv

45.0 KB

DEF CON 29 - ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).eng.txt

49.9 KB

DEF CON 29 - ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).eng.vtt

48.9 KB

DEF CON 29 - ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).eng.json

1.2 MB

DEF CON 29 - ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).eng.lrc

31.7 KB

DEF CON 29 - ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).eng.srt

32.1 KB

DEF CON 29 - ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).eng.text

24.8 KB

DEF CON 29 - ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).eng.tsv

28.7 KB

DEF CON 29 - ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).eng.txt

31.9 KB

DEF CON 29 - ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).eng.vtt

30.0 KB

DEF CON 29 - ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.eng.json

3.2 MB

DEF CON 29 - ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.eng.lrc

74.9 KB

DEF CON 29 - ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.eng.srt

84.0 KB

DEF CON 29 - ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.eng.text

58.7 KB

DEF CON 29 - ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.eng.tsv

68.3 KB

DEF CON 29 - ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.eng.txt

75.6 KB

DEF CON 29 - ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.eng.vtt

76.8 KB

DEF CON 29 - IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.eng.json

1.6 MB

DEF CON 29 - IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.eng.lrc

39.6 KB

DEF CON 29 - IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.eng.srt

46.0 KB

DEF CON 29 - IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.eng.text

30.8 KB

DEF CON 29 - IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.eng.tsv

35.9 KB

DEF CON 29 - IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.eng.txt

40.0 KB

DEF CON 29 - IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.eng.vtt

41.7 KB

DEF CON 29 - IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.eng.json

1.6 MB

DEF CON 29 - IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.eng.lrc

41.6 KB

DEF CON 29 - IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.eng.srt

47.3 KB

DEF CON 29 - IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.eng.text

32.3 KB

DEF CON 29 - IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.eng.tsv

37.8 KB

DEF CON 29 - IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.eng.txt

42.0 KB

DEF CON 29 - IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.eng.vtt

43.1 KB

DEF CON 29 - IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.eng.json

1.9 MB

DEF CON 29 - IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.eng.lrc

50.8 KB

DEF CON 29 - IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.eng.srt

51.5 KB

DEF CON 29 - IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.eng.text

39.6 KB

DEF CON 29 - IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.eng.tsv

46.2 KB

DEF CON 29 - IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.eng.txt

51.3 KB

DEF CON 29 - IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.eng.vtt

48.1 KB

DEF CON 29 - IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.eng.json

954.2 KB

DEF CON 29 - IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.eng.lrc

25.1 KB

DEF CON 29 - IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.eng.srt

26.8 KB

DEF CON 29 - IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.eng.text

19.3 KB

DEF CON 29 - IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.eng.tsv

22.5 KB

DEF CON 29 - IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.eng.txt

25.3 KB

DEF CON 29 - IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.eng.vtt

24.7 KB

DEF CON 29 - IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.eng.json

2.1 MB

DEF CON 29 - IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.eng.lrc

58.1 KB

DEF CON 29 - IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.eng.srt

59.5 KB

DEF CON 29 - IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.eng.text

45.3 KB

DEF CON 29 - IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.eng.tsv

52.9 KB

DEF CON 29 - IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.eng.txt

58.6 KB

DEF CON 29 - IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.eng.vtt

55.4 KB

DEF CON 29 - IoT Village - Hutch - Alexa Have You Been Compromised.eng.json

1.6 MB

DEF CON 29 - IoT Village - Hutch - Alexa Have You Been Compromised.eng.lrc

40.0 KB

DEF CON 29 - IoT Village - Hutch - Alexa Have You Been Compromised.eng.srt

42.6 KB

DEF CON 29 - IoT Village - Hutch - Alexa Have You Been Compromised.eng.text

31.3 KB

DEF CON 29 - IoT Village - Hutch - Alexa Have You Been Compromised.eng.tsv

36.3 KB

DEF CON 29 - IoT Village - Hutch - Alexa Have You Been Compromised.eng.txt

40.3 KB

DEF CON 29 - IoT Village - Hutch - Alexa Have You Been Compromised.eng.vtt

39.4 KB

DEF CON 29 - IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.eng.json

1.9 MB

DEF CON 29 - IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.eng.lrc

45.5 KB

DEF CON 29 - IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.eng.srt

49.9 KB

DEF CON 29 - IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.eng.text

35.4 KB

DEF CON 29 - IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.eng.tsv

41.3 KB

DEF CON 29 - IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.eng.txt

45.8 KB

DEF CON 29 - IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.eng.vtt

45.8 KB

DEF CON 29 - IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.eng.json

858.7 KB

DEF CON 29 - IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.eng.lrc

22.3 KB

DEF CON 29 - IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.eng.srt

23.5 KB

DEF CON 29 - IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.eng.text

17.3 KB

DEF CON 29 - IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.eng.tsv

20.0 KB

DEF CON 29 - IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.eng.txt

22.5 KB

DEF CON 29 - IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.eng.vtt

21.8 KB

DEF CON 29 - IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.eng.json

2.8 MB

DEF CON 29 - IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.eng.lrc

68.8 KB

DEF CON 29 - IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.eng.srt

78.5 KB

DEF CON 29 - IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.eng.text

53.8 KB

DEF CON 29 - IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.eng.tsv

62.7 KB

DEF CON 29 - IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.eng.txt

69.4 KB

DEF CON 29 - IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.eng.vtt

71.5 KB

DEF CON 29 - IoT Village - Messdaghi and Eddy - Representation Matters.eng.json

1.5 MB

DEF CON 29 - IoT Village - Messdaghi and Eddy - Representation Matters.eng.lrc

36.7 KB

DEF CON 29 - IoT Village - Messdaghi and Eddy - Representation Matters.eng.srt

40.0 KB

DEF CON 29 - IoT Village - Messdaghi and Eddy - Representation Matters.eng.text

28.7 KB

DEF CON 29 - IoT Village - Messdaghi and Eddy - Representation Matters.eng.tsv

33.3 KB

DEF CON 29 - IoT Village - Messdaghi and Eddy - Representation Matters.eng.txt

37.0 KB

DEF CON 29 - IoT Village - Messdaghi and Eddy - Representation Matters.eng.vtt

36.8 KB

DEF CON 29 - IoT Village - Petro and Cecil - You're Doing IoT RNG.eng.eng.json

2.1 MB

DEF CON 29 - IoT Village - Petro and Cecil - You're Doing IoT RNG.eng.eng.lrc

51.8 KB

DEF CON 29 - IoT Village - Petro and Cecil - You're Doing IoT RNG.eng.eng.srt

56.9 KB

DEF CON 29 - IoT Village - Petro and Cecil - You're Doing IoT RNG.eng.eng.text

40.7 KB

DEF CON 29 - IoT Village - Petro and Cecil - You're Doing IoT RNG.eng.eng.tsv

47.1 KB

DEF CON 29 - IoT Village - Petro and Cecil - You're Doing IoT RNG.eng.eng.txt

52.2 KB

DEF CON 29 - IoT Village - Petro and Cecil - You're Doing IoT RNG.eng.eng.vtt

52.3 KB

DEF CON 29 - IoT Village - Ria Cheruvu - Ethics at the Edge.eng.json

1.5 MB

DEF CON 29 - IoT Village - Ria Cheruvu - Ethics at the Edge.eng.lrc

41.5 KB

DEF CON 29 - IoT Village - Ria Cheruvu - Ethics at the Edge.eng.srt

40.1 KB

DEF CON 29 - IoT Village - Ria Cheruvu - Ethics at the Edge.eng.text

32.5 KB

DEF CON 29 - IoT Village - Ria Cheruvu - Ethics at the Edge.eng.tsv

37.6 KB

DEF CON 29 - IoT Village - Ria Cheruvu - Ethics at the Edge.eng.txt

41.8 KB

DEF CON 29 - IoT Village - Ria Cheruvu - Ethics at the Edge.eng.vtt

38.0 KB

DEF CON 29 - IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.eng.json

1.3 MB

DEF CON 29 - IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.eng.lrc

31.8 KB

DEF CON 29 - IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.eng.srt

34.4 KB

DEF CON 29 - IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.eng.text

24.7 KB

DEF CON 29 - IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.eng.tsv

28.8 KB

DEF CON 29 - IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.eng.txt

32.1 KB

DEF CON 29 - IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.eng.vtt

31.7 KB

DEF CON 29 - IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.eng.json

2.1 MB

DEF CON 29 - IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.eng.lrc

61.1 KB

DEF CON 29 - IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.eng.srt

51.2 KB

DEF CON 29 - IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.eng.text

38.3 KB

DEF CON 29 - IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.eng.tsv

51.5 KB

DEF CON 29 - IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.eng.txt

62.0 KB

DEF CON 29 - IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.eng.vtt

47.4 KB

DEF CON 29 - IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.eng.json

1.5 MB

DEF CON 29 - IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.eng.lrc

39.8 KB

DEF CON 29 - IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.eng.srt

41.9 KB

DEF CON 29 - IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.eng.text

31.3 KB

DEF CON 29 - IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.eng.tsv

36.1 KB

DEF CON 29 - IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.eng.txt

40.1 KB

DEF CON 29 - IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.eng.vtt

38.9 KB

DEF CON 29 - IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.eng.json

2.2 MB

DEF CON 29 - IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.eng.lrc

52.1 KB

DEF CON 29 - IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.eng.srt

64.9 KB

DEF CON 29 - IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.eng.text

43.0 KB

DEF CON 29 - IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.eng.tsv

48.1 KB

DEF CON 29 - IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.eng.txt

52.5 KB

DEF CON 29 - IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.eng.vtt

58.7 KB

DEF CON 29 - IoT Village - Victor Hanna - LED Light Lunacy.eng.json

1.1 MB

DEF CON 29 - IoT Village - Victor Hanna - LED Light Lunacy.eng.lrc

26.8 KB

DEF CON 29 - IoT Village - Victor Hanna - LED Light Lunacy.eng.srt

29.8 KB

DEF CON 29 - IoT Village - Victor Hanna - LED Light Lunacy.eng.text

21.9 KB

DEF CON 29 - IoT Village - Victor Hanna - LED Light Lunacy.eng.tsv

24.7 KB

DEF CON 29 - IoT Village - Victor Hanna - LED Light Lunacy.eng.txt

27.0 KB

DEF CON 29 - IoT Village - Victor Hanna - LED Light Lunacy.eng.vtt

27.6 KB

DEF CON 29 - IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.eng.json

1.6 MB

DEF CON 29 - IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.eng.lrc

40.3 KB

DEF CON 29 - IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.eng.srt

43.2 KB

DEF CON 29 - IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.eng.text

29.1 KB

DEF CON 29 - IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.eng.tsv

35.3 KB

DEF CON 29 - IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.eng.txt

40.7 KB

DEF CON 29 - IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.eng.vtt

39.1 KB

DEF CON 29 - Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.eng.json

1.8 MB

DEF CON 29 - Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.eng.lrc

42.9 KB

DEF CON 29 - Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.eng.srt

45.5 KB

DEF CON 29 - Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.eng.text

33.6 KB

DEF CON 29 - Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.eng.tsv

39.0 KB

DEF CON 29 - Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.eng.txt

43.2 KB

DEF CON 29 - Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.eng.vtt

42.1 KB

DEF CON 29 - Payment Village - Meadow Ellis - Automated Tear Machines.eng.json

1.6 MB

DEF CON 29 - Payment Village - Meadow Ellis - Automated Tear Machines.eng.lrc

37.6 KB

DEF CON 29 - Payment Village - Meadow Ellis - Automated Tear Machines.eng.srt

41.4 KB

DEF CON 29 - Payment Village - Meadow Ellis - Automated Tear Machines.eng.text

29.3 KB

DEF CON 29 - Payment Village - Meadow Ellis - Automated Tear Machines.eng.tsv

34.2 KB

DEF CON 29 - Payment Village - Meadow Ellis - Automated Tear Machines.eng.txt

38.0 KB

DEF CON 29 - Payment Village - Meadow Ellis - Automated Tear Machines.eng.vtt

38.0 KB

DEF CON 29 - Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.eng.json

622.4 KB

DEF CON 29 - Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.eng.lrc

16.1 KB

DEF CON 29 - Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.eng.srt

16.7 KB

DEF CON 29 - Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.eng.text

12.6 KB

DEF CON 29 - Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.eng.tsv

14.5 KB

DEF CON 29 - Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.eng.txt

16.3 KB

DEF CON 29 - Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.eng.vtt

15.5 KB

DEF CON 29 - Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.eng.json

390.5 KB

DEF CON 29 - Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.eng.lrc

9.9 KB

DEF CON 29 - Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.eng.srt

10.9 KB

DEF CON 29 - Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.eng.text

7.6 KB

DEF CON 29 - Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.eng.tsv

8.8 KB

DEF CON 29 - Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.eng.txt

10.0 KB

DEF CON 29 - Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.eng.vtt

10.1 KB

DEF CON 29 - Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.eng.json

1.8 MB

DEF CON 29 - Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.eng.lrc

50.8 KB

DEF CON 29 - Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.eng.srt

46.8 KB

DEF CON 29 - Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.eng.text

30.9 KB

DEF CON 29 - Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.eng.tsv

42.2 KB

DEF CON 29 - Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.eng.txt

51.5 KB

DEF CON 29 - Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.eng.vtt

42.2 KB

DEF CON 29 - Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.eng.json

538.0 KB

DEF CON 29 - Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.eng.lrc

13.4 KB

DEF CON 29 - Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.eng.srt

15.7 KB

DEF CON 29 - Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.eng.text

10.2 KB

DEF CON 29 - Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.eng.tsv

12.0 KB

DEF CON 29 - Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.eng.txt

13.5 KB

DEF CON 29 - Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.eng.vtt

14.2 KB

DEF CON 29 - Recon Village - Can I Make My Own Social Threat Score - MasterChen.eng.json

1.3 MB

DEF CON 29 - Recon Village - Can I Make My Own Social Threat Score - MasterChen.eng.lrc

31.1 KB

DEF CON 29 - Recon Village - Can I Make My Own Social Threat Score - MasterChen.eng.srt

36.2 KB

DEF CON 29 - Recon Village - Can I Make My Own Social Threat Score - MasterChen.eng.text

25.9 KB

DEF CON 29 - Recon Village - Can I Make My Own Social Threat Score - MasterChen.eng.tsv

28.9 KB

DEF CON 29 - Recon Village - Can I Make My Own Social Threat Score - MasterChen.eng.txt

31.3 KB

DEF CON 29 - Recon Village - Can I Make My Own Social Threat Score - MasterChen.eng.vtt

33.3 KB

DEF CON 29 - Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.eng.json

700.6 KB

DEF CON 29 - Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.eng.lrc

17.8 KB

DEF CON 29 - Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.eng.srt

21.1 KB

DEF CON 29 - Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.eng.text

13.8 KB

DEF CON 29 - Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.eng.tsv

16.0 KB

DEF CON 29 - Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.eng.txt

18.0 KB

DEF CON 29 - Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.eng.vtt

19.1 KB

DEF CON 29 - Recon Village - Future of Asset Management - Ben S (Nahamsec).eng.json

2.7 MB

DEF CON 29 - Recon Village - Future of Asset Management - Ben S (Nahamsec).eng.lrc

70.3 KB

DEF CON 29 - Recon Village - Future of Asset Management - Ben S (Nahamsec).eng.srt

70.8 KB

DEF CON 29 - Recon Village - Future of Asset Management - Ben S (Nahamsec).eng.text

46.2 KB

DEF CON 29 - Recon Village - Future of Asset Management - Ben S (Nahamsec).eng.tsv

60.2 KB

DEF CON 29 - Recon Village - Future of Asset Management - Ben S (Nahamsec).eng.txt

71.2 KB

DEF CON 29 - Recon Village - Future of Asset Management - Ben S (Nahamsec).eng.vtt

63.7 KB

DEF CON 29 - Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.eng.json

2.5 MB

DEF CON 29 - Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.eng.lrc

64.7 KB

DEF CON 29 - Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.eng.srt

66.6 KB

DEF CON 29 - Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.eng.text

46.5 KB

DEF CON 29 - Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.eng.tsv

57.0 KB

DEF CON 29 - Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.eng.txt

65.4 KB

DEF CON 29 - Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.eng.vtt

60.8 KB

DEF CON 29 - Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.eng.json

945.8 KB

DEF CON 29 - Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.eng.lrc

25.4 KB

DEF CON 29 - Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.eng.srt

25.8 KB

DEF CON 29 - Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.eng.text

19.0 KB

DEF CON 29 - Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.eng.tsv

22.6 KB

DEF CON 29 - Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.eng.txt

25.7 KB

DEF CON 29 - Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.eng.vtt

23.9 KB

DEF CON 29 - Recon Village - OSINT and the Hermit Kingdom - Nick Roy.eng.json

2.1 MB

DEF CON 29 - Recon Village - OSINT and the Hermit Kingdom - Nick Roy.eng.lrc

57.3 KB

DEF CON 29 - Recon Village - OSINT and the Hermit Kingdom - Nick Roy.eng.srt

57.5 KB

DEF CON 29 - Recon Village - OSINT and the Hermit Kingdom - Nick Roy.eng.text

38.4 KB

DEF CON 29 - Recon Village - OSINT and the Hermit Kingdom - Nick Roy.eng.tsv

49.4 KB

DEF CON 29 - Recon Village - OSINT and the Hermit Kingdom - Nick Roy.eng.txt

58.0 KB

DEF CON 29 - Recon Village - OSINT and the Hermit Kingdom - Nick Roy.eng.vtt

52.0 KB

DEF CON 29 - Recon Village - OSINT for Sex Workers - Kala Kinyon.eng.json

1.0 MB

DEF CON 29 - Recon Village - OSINT for Sex Workers - Kala Kinyon.eng.lrc

25.5 KB

DEF CON 29 - Recon Village - OSINT for Sex Workers - Kala Kinyon.eng.srt

27.9 KB

DEF CON 29 - Recon Village - OSINT for Sex Workers - Kala Kinyon.eng.text

19.8 KB

DEF CON 29 - Recon Village - OSINT for Sex Workers - Kala Kinyon.eng.tsv

23.0 KB

DEF CON 29 - Recon Village - OSINT for Sex Workers - Kala Kinyon.eng.txt

25.7 KB

DEF CON 29 - Recon Village - OSINT for Sex Workers - Kala Kinyon.eng.vtt

25.7 KB

DEF CON 29 - Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.eng.json

1.3 MB

DEF CON 29 - Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.eng.lrc

29.7 KB

DEF CON 29 - Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.eng.srt

35.0 KB

DEF CON 29 - Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.eng.text

23.3 KB

DEF CON 29 - Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.eng.tsv

26.9 KB

DEF CON 29 - Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.eng.txt

30.0 KB

DEF CON 29 - Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.eng.vtt

31.7 KB

DEF CON 29 - Recon Village - So You Want to OPSEC, Eh - Ritu Gil.eng.json

1.1 MB

DEF CON 29 - Recon Village - So You Want to OPSEC, Eh - Ritu Gil.eng.lrc

27.0 KB

DEF CON 29 - Recon Village - So You Want to OPSEC, Eh - Ritu Gil.eng.srt

30.3 KB

DEF CON 29 - Recon Village - So You Want to OPSEC, Eh - Ritu Gil.eng.text

21.1 KB

DEF CON 29 - Recon Village - So You Want to OPSEC, Eh - Ritu Gil.eng.tsv

24.4 KB

DEF CON 29 - Recon Village - So You Want to OPSEC, Eh - Ritu Gil.eng.txt

27.2 KB

DEF CON 29 - Recon Village - So You Want to OPSEC, Eh - Ritu Gil.eng.vtt

27.7 KB

DEF CON 29 - Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.eng.json

772.7 KB

DEF CON 29 - Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.eng.lrc

18.0 KB

DEF CON 29 - Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.eng.srt

19.2 KB

DEF CON 29 - Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.eng.text

13.8 KB

DEF CON 29 - Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.eng.tsv

16.0 KB

DEF CON 29 - Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.eng.txt

18.2 KB

DEF CON 29 - Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.eng.vtt

17.7 KB

DEF CON 29 - Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.eng.json

1.2 MB

DEF CON 29 - Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.eng.lrc

28.9 KB

DEF CON 29 - Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.eng.srt

33.6 KB

DEF CON 29 - Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.eng.text

22.4 KB

DEF CON 29 - Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.eng.tsv

26.1 KB

DEF CON 29 - Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.eng.txt

29.1 KB

DEF CON 29 - Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.eng.vtt

30.4 KB

DEF CON 29 - Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.eng.json

1.6 MB

DEF CON 29 - Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.eng.lrc

48.8 KB

DEF CON 29 - Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.eng.srt

38.5 KB

DEF CON 29 - Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.eng.text

29.4 KB

DEF CON 29 - Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.eng.tsv

40.6 KB

DEF CON 29 - Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.eng.txt

49.6 KB

DEF CON 29 - Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.eng.vtt

35.8 KB

DEF CON 29 - Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.eng.json

1.7 MB

DEF CON 29 - Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.eng.lrc

43.3 KB

DEF CON 29 - Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.eng.srt

49.7 KB

DEF CON 29 - Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.eng.text

32.8 KB

DEF CON 29 - Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.eng.tsv

38.9 KB

DEF CON 29 - Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.eng.txt

43.7 KB

DEF CON 29 - Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.eng.vtt

44.9 KB

DEF CON 29 - Red Team Village - A discussion about the Red Team Village CyberWraith.eng.json

2.1 MB

DEF CON 29 - Red Team Village - A discussion about the Red Team Village CyberWraith.eng.lrc

46.2 KB

DEF CON 29 - Red Team Village - A discussion about the Red Team Village CyberWraith.eng.srt

54.6 KB

DEF CON 29 - Red Team Village - A discussion about the Red Team Village CyberWraith.eng.text

36.2 KB

DEF CON 29 - Red Team Village - A discussion about the Red Team Village CyberWraith.eng.tsv

42.0 KB

DEF CON 29 - Red Team Village - A discussion about the Red Team Village CyberWraith.eng.txt

46.6 KB

DEF CON 29 - Red Team Village - A discussion about the Red Team Village CyberWraith.eng.vtt

49.4 KB

DEF CON 29 - Red Team Village - AI and Red Team Village Panel.eng.json

3.0 MB

DEF CON 29 - Red Team Village - AI and Red Team Village Panel.eng.lrc

75.6 KB

DEF CON 29 - Red Team Village - AI and Red Team Village Panel.eng.srt

82.1 KB

DEF CON 29 - Red Team Village - AI and Red Team Village Panel.eng.text

57.1 KB

DEF CON 29 - Red Team Village - AI and Red Team Village Panel.eng.tsv

67.1 KB

DEF CON 29 - Red Team Village - AI and Red Team Village Panel.eng.txt

76.3 KB

DEF CON 29 - Red Team Village - AI and Red Team Village Panel.eng.vtt

77.2 KB

DEF CON 29 - Red Team Village - Announcing the Red Team Village CyberWraith.eng.json

26.4 KB

DEF CON 29 - Red Team Village - Announcing the Red Team Village CyberWraith.eng.lrc

0.8 KB

DEF CON 29 - Red Team Village - Announcing the Red Team Village CyberWraith.eng.srt

0.9 KB

DEF CON 29 - Red Team Village - Announcing the Red Team Village CyberWraith.eng.text

0.5 KB

DEF CON 29 - Red Team Village - Announcing the Red Team Village CyberWraith.eng.tsv

0.7 KB

DEF CON 29 - Red Team Village - Announcing the Red Team Village CyberWraith.eng.txt

0.8 KB

DEF CON 29 - Red Team Village - Announcing the Red Team Village CyberWraith.eng.vtt

0.8 KB

DEF CON 29 - Red Team Village - CTF Day 1.eng.json

0.0 KB

DEF CON 29 - Red Team Village - CTF Day 1.eng.lrc

0.0 KB

DEF CON 29 - Red Team Village - CTF Day 1.eng.srt

0.0 KB

DEF CON 29 - Red Team Village - CTF Day 1.eng.text

0.0 KB

DEF CON 29 - Red Team Village - CTF Day 1.eng.tsv

0.0 KB

DEF CON 29 - Red Team Village - CTF Day 1.eng.txt

0.0 KB

DEF CON 29 - Red Team Village - CTF Day 1.eng.vtt

0.0 KB

DEF CON 29 - Red Team Village - CTF Day 2.eng.json

10.0 MB

DEF CON 29 - Red Team Village - CTF Day 2.eng.lrc

259.4 KB

DEF CON 29 - Red Team Village - CTF Day 2.eng.srt

274.0 KB

DEF CON 29 - Red Team Village - CTF Day 2.eng.text

181.4 KB

DEF CON 29 - Red Team Village - CTF Day 2.eng.tsv

223.7 KB

DEF CON 29 - Red Team Village - CTF Day 2.eng.txt

261.9 KB

DEF CON 29 - Red Team Village - CTF Day 2.eng.vtt

257.2 KB

DEF CON 29 - Red Team Village - CTF Day 3.eng.json

2.8 MB

DEF CON 29 - Red Team Village - CTF Day 3.eng.lrc

68.5 KB

DEF CON 29 - Red Team Village - CTF Day 3.eng.srt

79.8 KB

DEF CON 29 - Red Team Village - CTF Day 3.eng.text

49.3 KB

DEF CON 29 - Red Team Village - CTF Day 3.eng.tsv

59.1 KB

DEF CON 29 - Red Team Village - CTF Day 3.eng.txt

69.1 KB

DEF CON 29 - Red Team Village - CTF Day 3.eng.vtt

75.9 KB

DEF CON 29 - Red Team Village - CTF Recap and Upcoming Events.eng.json

1.2 MB

DEF CON 29 - Red Team Village - CTF Recap and Upcoming Events.eng.lrc

28.1 KB

DEF CON 29 - Red Team Village - CTF Recap and Upcoming Events.eng.srt

33.1 KB

DEF CON 29 - Red Team Village - CTF Recap and Upcoming Events.eng.text

21.7 KB

DEF CON 29 - Red Team Village - CTF Recap and Upcoming Events.eng.tsv

25.3 KB

DEF CON 29 - Red Team Village - CTF Recap and Upcoming Events.eng.txt

28.3 KB

DEF CON 29 - Red Team Village - CTF Recap and Upcoming Events.eng.vtt

29.9 KB

DEF CON 29 - Red Team Village - Custom Mechanical Keyboard Build.eng.json

3.7 MB

DEF CON 29 - Red Team Village - Custom Mechanical Keyboard Build.eng.lrc

85.3 KB

DEF CON 29 - Red Team Village - Custom Mechanical Keyboard Build.eng.srt

107.0 KB

DEF CON 29 - Red Team Village - Custom Mechanical Keyboard Build.eng.text

65.9 KB

DEF CON 29 - Red Team Village - Custom Mechanical Keyboard Build.eng.tsv

77.1 KB

DEF CON 29 - Red Team Village - Custom Mechanical Keyboard Build.eng.txt

86.1 KB

DEF CON 29 - Red Team Village - Custom Mechanical Keyboard Build.eng.vtt

96.4 KB

DEF CON 29 - Red Team Village - Russ Hanneman's message about the Red Team Village CTF.eng.json

42.2 KB

DEF CON 29 - Red Team Village - Russ Hanneman's message about the Red Team Village CTF.eng.lrc

1.1 KB

DEF CON 29 - Red Team Village - Russ Hanneman's message about the Red Team Village CTF.eng.srt

1.4 KB

DEF CON 29 - Red Team Village - Russ Hanneman's message about the Red Team Village CTF.eng.text

0.6 KB

DEF CON 29 - Red Team Village - Russ Hanneman's message about the Red Team Village CTF.eng.tsv

0.8 KB

DEF CON 29 - Red Team Village - Russ Hanneman's message about the Red Team Village CTF.eng.txt

1.1 KB

DEF CON 29 - Red Team Village - Russ Hanneman's message about the Red Team Village CTF.eng.vtt

1.2 KB

DEF CON 29 - Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.eng.json

3.0 MB

DEF CON 29 - Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.eng.lrc

72.8 KB

DEF CON 29 - Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.eng.srt

82.1 KB

DEF CON 29 - Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.eng.text

56.9 KB

DEF CON 29 - Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.eng.tsv

66.3 KB

DEF CON 29 - Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.eng.txt

73.4 KB

DEF CON 29 - Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.eng.vtt

74.9 KB

DEF CON 29 - Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.eng.json

1.4 MB

DEF CON 29 - Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.eng.lrc

35.2 KB

DEF CON 29 - Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.eng.srt

36.0 KB

DEF CON 29 - Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.eng.text

24.4 KB

DEF CON 29 - Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.eng.tsv

30.5 KB

DEF CON 29 - Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.eng.txt

35.6 KB

DEF CON 29 - Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.eng.vtt

32.7 KB

DEF CON 29 - Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.eng.json

484.2 KB

DEF CON 29 - Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.eng.lrc

12.3 KB

DEF CON 29 - Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.eng.srt

14.3 KB

DEF CON 29 - Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.eng.text

9.7 KB

DEF CON 29 - Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.eng.tsv

11.1 KB

DEF CON 29 - Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.eng.txt

12.4 KB

DEF CON 29 - Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.eng.vtt

13.0 KB

DEF CON 29 - Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.eng.json

1.5 MB

DEF CON 29 - Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.eng.lrc

41.3 KB

DEF CON 29 - Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.eng.srt

42.2 KB

DEF CON 29 - Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.eng.text

29.2 KB

DEF CON 29 - Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.eng.tsv

36.1 KB

DEF CON 29 - Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.eng.txt

41.8 KB

DEF CON 29 - Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.eng.vtt

38.5 KB

DEF CON 29 - Voting Village - Final Thank You.eng.json

0.0 KB

DEF CON 29 - Voting Village - Final Thank You.eng.lrc

0.0 KB

DEF CON 29 - Voting Village - Final Thank You.eng.srt

0.0 KB

DEF CON 29 - Voting Village - Final Thank You.eng.text

0.0 KB

DEF CON 29 - Voting Village - Final Thank You.eng.tsv

0.0 KB

DEF CON 29 - Voting Village - Final Thank You.eng.txt

0.0 KB

DEF CON 29 - Voting Village - Final Thank You.eng.vtt

0.0 KB

DEF CON 29 - Voting Village - Friday Thank You.eng.json

0.0 KB

DEF CON 29 - Voting Village - Friday Thank You.eng.lrc

0.0 KB

DEF CON 29 - Voting Village - Friday Thank You.eng.srt

0.0 KB

DEF CON 29 - Voting Village - Friday Thank You.eng.text

0.0 KB

DEF CON 29 - Voting Village - Friday Thank You.eng.tsv

0.0 KB

DEF CON 29 - Voting Village - Friday Thank You.eng.txt

0.0 KB

DEF CON 29 - Voting Village - Friday Thank You.eng.vtt

0.0 KB

DEF CON 29 - Voting Village - Hack the Conspiracies - Barb Byrum.eng.json

1.1 MB

DEF CON 29 - Voting Village - Hack the Conspiracies - Barb Byrum.eng.lrc

28.5 KB

DEF CON 29 - Voting Village - Hack the Conspiracies - Barb Byrum.eng.srt

31.1 KB

DEF CON 29 - Voting Village - Hack the Conspiracies - Barb Byrum.eng.text

22.3 KB

DEF CON 29 - Voting Village - Hack the Conspiracies - Barb Byrum.eng.tsv

25.8 KB

DEF CON 29 - Voting Village - Hack the Conspiracies - Barb Byrum.eng.txt

28.8 KB

DEF CON 29 - Voting Village - Hack the Conspiracies - Barb Byrum.eng.vtt

28.6 KB

DEF CON 29 - Voting Village - Hacking to Save Democracy - Eddie Perez.eng.json

1.4 MB

DEF CON 29 - Voting Village - Hacking to Save Democracy - Eddie Perez.eng.lrc

37.2 KB

DEF CON 29 - Voting Village - Hacking to Save Democracy - Eddie Perez.eng.srt

40.3 KB

DEF CON 29 - Voting Village - Hacking to Save Democracy - Eddie Perez.eng.text

29.3 KB

DEF CON 29 - Voting Village - Hacking to Save Democracy - Eddie Perez.eng.tsv

33.8 KB

DEF CON 29 - Voting Village - Hacking to Save Democracy - Eddie Perez.eng.txt

37.5 KB

DEF CON 29 - Voting Village - Hacking to Save Democracy - Eddie Perez.eng.vtt

37.2 KB

DEF CON 29 - Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.eng.json

1.2 MB

DEF CON 29 - Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.eng.lrc

29.6 KB

DEF CON 29 - Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.eng.srt

30.2 KB

DEF CON 29 - Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.eng.text

22.7 KB

DEF CON 29 - Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.eng.tsv

26.6 KB

DEF CON 29 - Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.eng.txt

29.9 KB

DEF CON 29 - Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.eng.vtt

28.1 KB

DEF CON 29 - Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.eng.json

1.4 MB

DEF CON 29 - Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.eng.lrc

34.9 KB

DEF CON 29 - Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.eng.srt

37.5 KB

DEF CON 29 - Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.eng.text

27.3 KB

DEF CON 29 - Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.eng.tsv

31.6 KB

DEF CON 29 - Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.eng.txt

35.2 KB

DEF CON 29 - Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.eng.vtt

34.6 KB

DEF CON 29 - Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.eng.json

895.9 KB

DEF CON 29 - Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.eng.lrc

23.9 KB

DEF CON 29 - Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.eng.srt

25.1 KB

DEF CON 29 - Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.eng.text

18.5 KB

DEF CON 29 - Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.eng.tsv

21.5 KB

DEF CON 29 - Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.eng.txt

24.1 KB

DEF CON 29 - Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.eng.vtt

23.2 KB

DEF CON 29 - Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.eng.json

687.6 KB

DEF CON 29 - Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.eng.lrc

19.8 KB

DEF CON 29 - Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.eng.srt

19.7 KB

DEF CON 29 - Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.eng.text

15.1 KB

DEF CON 29 - Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.eng.tsv

17.7 KB

DEF CON 29 - Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.eng.txt

20.0 KB

DEF CON 29 - Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.eng.vtt

18.5 KB

DEF CON 29 - Voting Village - NH SB43 Forensic Audit - Harri Hursti.eng.json

1.8 MB

DEF CON 29 - Voting Village - NH SB43 Forensic Audit - Harri Hursti.eng.lrc

48.1 KB

DEF CON 29 - Voting Village - NH SB43 Forensic Audit - Harri Hursti.eng.srt

50.1 KB

DEF CON 29 - Voting Village - NH SB43 Forensic Audit - Harri Hursti.eng.text

35.6 KB

DEF CON 29 - Voting Village - NH SB43 Forensic Audit - Harri Hursti.eng.tsv

42.9 KB

DEF CON 29 - Voting Village - NH SB43 Forensic Audit - Harri Hursti.eng.txt

48.5 KB

DEF CON 29 - Voting Village - NH SB43 Forensic Audit - Harri Hursti.eng.vtt

46.0 KB

DEF CON 29 - Voting Village - Secrets of Social Media PsyOps - BiaSciLab.eng.json

1.1 MB

DEF CON 29 - Voting Village - Secrets of Social Media PsyOps - BiaSciLab.eng.lrc

27.4 KB

DEF CON 29 - Voting Village - Secrets of Social Media PsyOps - BiaSciLab.eng.srt

30.4 KB

DEF CON 29 - Voting Village - Secrets of Social Media PsyOps - BiaSciLab.eng.text

21.7 KB

DEF CON 29 - Voting Village - Secrets of Social Media PsyOps - BiaSciLab.eng.tsv

24.9 KB

DEF CON 29 - Voting Village - Secrets of Social Media PsyOps - BiaSciLab.eng.txt

27.7 KB

DEF CON 29 - Voting Village - Secrets of Social Media PsyOps - BiaSciLab.eng.vtt

28.0 KB

DEF CON 29 - Voting Village - Social Media Security = Election Security - Sebastian Bay.eng.json

766.9 KB

DEF CON 29 - Voting Village - Social Media Security = Election Security - Sebastian Bay.eng.lrc

21.0 KB

DEF CON 29 - Voting Village - Social Media Security = Election Security - Sebastian Bay.eng.srt

21.5 KB

DEF CON 29 - Voting Village - Social Media Security = Election Security - Sebastian Bay.eng.text

16.4 KB

DEF CON 29 - Voting Village - Social Media Security = Election Security - Sebastian Bay.eng.tsv

19.0 KB

DEF CON 29 - Voting Village - Social Media Security = Election Security - Sebastian Bay.eng.txt

21.2 KB

DEF CON 29 - Voting Village - Social Media Security = Election Security - Sebastian Bay.eng.vtt

20.1 KB

DEF CON 29 - Voting Village - Welcome.eng.json

0.0 KB

DEF CON 29 - Voting Village - Welcome.eng.lrc

0.0 KB

DEF CON 29 - Voting Village - Welcome.eng.srt

0.0 KB

DEF CON 29 - Voting Village - Welcome.eng.text

0.0 KB

DEF CON 29 - Voting Village - Welcome.eng.tsv

0.0 KB

DEF CON 29 - Voting Village - Welcome.eng.txt

0.0 KB

DEF CON 29 - Voting Village - Welcome.eng.vtt

0.0 KB

DEF CON 29 - Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.eng.json

1.2 MB

DEF CON 29 - Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.eng.lrc

33.6 KB

DEF CON 29 - Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.eng.srt

33.1 KB

DEF CON 29 - Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.eng.text

24.8 KB

DEF CON 29 - Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.eng.tsv

29.7 KB

DEF CON 29 - Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.eng.txt

33.9 KB

DEF CON 29 - Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.eng.vtt

30.7 KB

DEF CON 29 - Voting Village - Wireless Odyssey - Susan Greenhalgh.eng.json

1.0 MB

DEF CON 29 - Voting Village - Wireless Odyssey - Susan Greenhalgh.eng.lrc

26.7 KB

DEF CON 29 - Voting Village - Wireless Odyssey - Susan Greenhalgh.eng.srt

27.4 KB

DEF CON 29 - Voting Village - Wireless Odyssey - Susan Greenhalgh.eng.text

20.8 KB

DEF CON 29 - Voting Village - Wireless Odyssey - Susan Greenhalgh.eng.tsv

24.1 KB

DEF CON 29 - Voting Village - Wireless Odyssey - Susan Greenhalgh.eng.txt

26.9 KB

DEF CON 29 - Voting Village - Wireless Odyssey - Susan Greenhalgh.eng.vtt

25.6 KB

/Hack-A-Sat 2/

Hack-A-Sat 2 Final 2021.rar

495.0 MB

Hack-A-Sat 2 Final Scoreboard.png

873.4 KB

Hack-A-Sat 2 Qualifier 2021 Stats.rar

6.3 MB

Hack-A-Sat 2 Qualifier 2021 Tech Papers.rar

15.1 MB

Hack-A-Sat 2 Qualifier 2021.rar

4.0 MB

/DEF CON 29 workshops/

DEF CON 29 Workshop Anthony Rose Evading Detection A Beginners Guide to Obfuscation.pdf

3.5 MB

DEF CON 29 Workshop Ash Secure Messaging.pdf

2.0 MB

DEF CON 29 Workshop Ben Kurtz Writing Golang Malwar.pdf

11.4 MB

DEF CON 29 Workshop Ben Kurtz Writing Golang Malware Workshop Source.zip

74.4 MB

DEF CON 29 Workshop Eigentourist Hacking The Metal.pdf

1.1 MB

DEF CON 29 Workshop Kristy Westphal Analysis 101 and 102 For Incident Responders.pdf

3.8 MB

DEF CON 29 Workshop Michael Solomon DFIRADA Slides Student.pdf

1.8 MB

DEF CON 29 Workshop Michael Solomon DFIRADA VM Hashes.txt

0.2 KB

DEF CON 29 Workshop Michael Solomon DFIRADA Welcome README.txt

0.9 KB

DEF CON 29 Workshop Philippe Delteil Bug Bounty Workshop.pdf

879.9 KB

DEF CON 29 Workshop Romain Zaikin From Zero to Hero in Web Security Research.pdf

5.6 MB

 

Total files 4328


Copyright © 2024 FileMood.com