DEF CON 26 video and slides/DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.mp4 |
31.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - 0x200b - Detecting Blue Team Research Through Targeted Ads.srt |
28 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.mp4 |
40.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Alexandre Borges - Ring 0_Ring-2 Rootkits- Bypassing Defenses.srt |
23 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.mp4 |
80.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator.srt |
69 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.mp4 |
50.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Alguacil and Murillo Moya - Playback a TLS 1 point 3 story.srt |
33 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.mp4 |
24.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Andrea Marcelli - Looking for the perfect signature an automatic YARA rules generation algorithm in the AI-era.srt |
20 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.mp4 |
28.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Bai and Zheng - One bite and all your dreams will come true Analyzing and Attacking Apple Kernel Drivers.srt |
21 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Balmas and Itkin - What the Fax.srt |
50 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.mp4 |
65.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Berta and De Los Santos - Rock appround the clock Tracking malware developers by Android AAPT timezone disclosure bug.srt |
32 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.mp4 |
40.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Bui and Rao - Last mile authentication problem Exploiting the missing link in end-to-end secure communication.srt |
40 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.mp4 |
61.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Champion and Law - Building the Hacker Tracker.srt |
35 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.mp4 |
112.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86 CPUs.srt |
66 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.mp4 |
52.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Christopher Domas - The ring 0 facade awakening the processors inner demons.srt |
31 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.mp4 |
104 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Damien virtualabs Cauquil - You had better secure your BLE devices or we'll kick your butts.srt |
40 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.mp4 |
55.5 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Daniel Crowley and Panel - Outsmarting the Smart City.srt |
36 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.mp4 |
148.5 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Daniel Zolnikov - The story of a Young Politicians Successful Efforts to Fight Surveillance and Pass the Nations Strongest Privacy Bills.srt |
64 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.mp4 |
56 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - David Melendez Cano - Project Interceptor Avoiding Counter-Drone Systems with Nanodrones.srt |
26 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.mp4 |
99 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Delta Zero and Azeem Aqil - Your Voice is My Passport.srt |
39 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.mp4 |
49.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dennis Giese - Having fun with IoT Reverse Engineering and Hacking of Xiaomi IoT Devices.srt |
56 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.mp4 |
126.5 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Douglas McKee - 80 to 0 in Under 5 Seconds Falsifying a Medical Patients Vitals.srt |
66 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dr Cindy Poppins AKA Svea Eckert and Panel - Inside the Fake Science Factory.srt |
86 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.mp4 |
80.5 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill.srt |
44 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.mp4 |
68 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dr Rasthofer and Panel - All Your Family Secrets Belong to Us Worrisome Security Issues in Tracker Apps.srt |
47 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.mp4 |
69.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Dr. Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System.srt |
56 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.mp4 |
59.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Egypt and Vu - One-liners to Rule Them All.srt |
44 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.mp4 |
249.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things You Were Afraid to Ask.srt |
94 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.mp4 |
59.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Eric Sesterhenn - In Soviet Russia Smartcard Hacks You.srt |
21 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Eyal Itkin, Yaniv Balmas - What the Fax-!.mp4 |
67.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.mp4 |
44.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Foster and Ayrey - Lost and Found Certificates Dealing with Residual Certificates for Pre-owned Domains.srt |
31 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.mp4 |
107.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries.srt |
51 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.mp4 |
112.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Gabriel Ryan - Bypassing Port-Security In 2018 Defeating MacSEC and 802 1x-2010.srt |
64 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 |
90.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Galloway and Yunusov - For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.srt |
50 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.mp4 |
41.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray.srt |
21 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.mp4 |
66.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code and Binaries.srt |
51 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.mp4 |
22 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Guang Gong - Pwning the toughest target the exploit chain of winning the largest bug bounty in the history of ASR program.srt |
16 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.mp4 |
69.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - HuiYu and Qian - Breaking Smart Speakers We are Listening to You.srt |
37 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.mp4 |
58.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Ian Haken - Automated Discovery of Deserialization Gadget Chains.srt |
59 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.mp4 |
24.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Izycki and Colli - Digital Leviathan a comprehensive list of Nation-State Big Brothers from huge to little ones.srt |
20 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.mp4 |
45.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Jeanette Manfra - Securing our Nations Election Infrastructure.srt |
26 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.mp4 |
107.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Joe Grand - Searching for the Light Adventures with OpticSpy.srt |
69 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.mp4 |
119.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Joe Rozner - Synfuzz Building a Grammar Based Re-targetable Test Generation Framework.srt |
49 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.mp4 |
96 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Johnson and Stavrou - Vulnerable Out of the Box An Evaluation of Android Carrier Devices.srt |
46 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.mp4 |
53.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Josep Pi Rodriguez - Breaking Extreme Networks WingOS How to own millions of devices running on Aircrafts Government Smart cities and more.srt |
48 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.mp4 |
63.5 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Josh Mitchell - Ridealong Adventures Critical Issues with Police Body Cameras.srt |
46 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.mp4 |
49.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Kim and Choi - Your Watch Can Watch You Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch.srt |
32 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.mp4 |
60 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities.srt |
55 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.mp4 |
69.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Krotofil and Wetzels - Through the Eyes of the Attacker Designing Embedded Systems Exploits for Industrial Control Systems.srt |
69 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.mp4 |
47.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Lane Broadbent - Trouble in the tubes How internet routing security breaks down and how you can do it at home.srt |
54 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.mp4 |
89.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Levinson and Borges - Ill See Your Missile and Raise You A MIRV An overview of the Genesis Scripting Engine.srt |
62 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.mp4 |
139.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Levison and hon1nbo - Booby Trapping Boxes.srt |
48 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.mp4 |
36.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Maggie Mayhem - Sex Work After SESTA FOSTA.srt |
25 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.mp4 |
67.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Maksim Shudrak - Fuzzing Malware For Fun & Profit Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware.srt |
37 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.mp4 |
41.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems.srt |
27 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.mp4 |
36.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Matt King - Micro-Renovator Bringing Processor Firmware up to Code.srt |
20 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.mp4 |
110.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Matt Wixey - Betrayed by the keyboard How what you type can give you away.srt |
51 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.mp4 |
58.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Morgan Indrora Gangwere - It's Assembler Jim but not as we know it abusing binaries from embedded devices for fun and profit.srt |
43 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.mp4 |
58.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Nafeez - Compression Oracle Attacks on VPN Networks.srt |
46 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.mp4 |
20.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators.srt |
14 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.mp4 |
56.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Nick Cano - Relocation Bonus Attacking the Windows Loader Makes Analysts Switch Careers.srt |
39 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.mp4 |
163.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Nirenberg and Buchwald - Reverse Engineering hacking documentary series.srt |
56 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.mp4 |
53.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Orange Tsai - Breaking Paser Logic Take Your Path Normalization Off and Pop 0days Out.srt |
38 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.mp4 |
139.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Ossmann and Spill - Revolting Radios.srt |
55 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Panel - DC 101 PANEL.mp4 |
186.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Panel - DC 101 PANEL.srt |
54 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.mp4 |
108.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks.srt |
38 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.mp4 |
24.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls.srt |
26 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.mp4 |
56.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Patrick Wardle - The Mouse is Mightier than the Sword.srt |
56 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.mp4 |
172.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Richard Thieme - The Road to Resilience How Real Hacking Redeems this Damnable Profession.srt |
53 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.mp4 |
99.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron IoT Automation Systems.srt |
42 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.mp4 |
79.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain.srt |
53 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.mp4 |
73.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Rob Joyce - Building Absurd Christmas Light Shows.srt |
41 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.mp4 |
126.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Rob Joyce - NSA Talks Cybersecurity.srt |
52 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.mp4 |
48.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Romailler and Amiet - Reaping and breaking keys at scale when crypto meets big data.srt |
19 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.mp4 |
32.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly.srt |
24 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.mp4 |
43.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Rowan Phipps - ThinSIM-based Attacks on Mobile Money Systems.srt |
44 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.mp4 |
44 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Ruo Ando - Asura A huge PCAP file analyzer for anomaly packets detection using massive multithreading.srt |
15 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.mp4 |
22.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Sanat Sharma - House of Roman a leakless Heap Fengshui to Achieve RCE on PIE Binaries.srt |
20 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.mp4 |
53.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband.srt |
62 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.mp4 |
133.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Sean Metcalf - Exploiting Active Directory Administrator Insecurities.srt |
61 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.mp4 |
38.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Sheng-Hao Ma - Playing Malware Injection with Exploit thoughts.srt |
16 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.mp4 |
73.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Shkatov and Michael - UEFI Exploitation for the Masses.srt |
47 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.mp4 |
87.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Si and Agent X - Wagging The Tail - Covert Passive Surveillance And How To Make Their Life Difficult.srt |
50 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.mp4 |
41.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Slava Makkaveev - Man-In-The-Disk.srt |
17 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.mp4 |
58.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Steven Danneman - Your Banks Digital Side Door.srt |
51 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.mp4 |
357.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - The Dark Tangent - DEF CON 26 Closing Ceremonies.srt |
91 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.mp4 |
157.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - The Dark Tangent - Welcome To DEF CON & Badge Maker Talk.srt |
46 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.mp4 |
173.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - The Dark Tangent and Panel - Panel DEF CON GROUPS.srt |
56 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.mp4 |
141.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs.srt |
58 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.mp4 |
55.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures.srt |
41 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.mp4 |
35.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Truman Kain - Dragnet Your Social Engineering Sidekick.srt |
23 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.mp4 |
39.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit.srt |
28 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.mp4 |
47.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Wesley McGrew - An Attacker Looks at Docker Approaching Multi-Container Applications.srt |
51 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.mp4 |
36.2 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - West and Campbell - barcOwned Popping shells with your cereal box.srt |
23 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - William Martin - One-Click to OWA.mp4 |
36.5 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - William Martin - One-Click to OWA.srt |
25 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.mp4 |
104.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - William Martin - SMBetray Backdooring and breaking signatures.srt |
44 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.mp4 |
28.8 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Controller.srt |
17 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.mp4 |
50.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Yu Wang - Attacking the macOS Kernel Graphics Driver.srt |
27 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.mp4 |
29.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zach and Alex - Infecting The Embedded Supply Chain.srt |
26 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.mp4 |
45.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zeng and Panel - Lora Smart Water Meter Security Analysis.srt |
21 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.mp4 |
27.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 sandbox.srt |
17 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.mp4 |
101 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs Vulnerability.srt |
39 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.mp4 |
47.7 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - Zhenxuan Bai and Panel - You May Have Paid More Than You Imagine Replay Attacks on Ethereum Smart Contracts.srt |
25 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4 |
21 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking.srt |
25 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.mp4 |
29.9 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - m010ch - Please do not Duplicate Attacking the Knox Box and Other Keyed Alike Systems.srt |
26 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.mp4 |
88.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - sghctoma - All Your Math are Belong to Us.srt |
33 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.mp4 |
61.6 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - singe - Practical and Improved Wifi MitM with Mana.srt |
50 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.mp4 |
54.5 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - smea - Jailbreaking the 3DS through 7 years of hardening.srt |
67 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.mp4 |
76.4 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - yawnbox - Privacy Infrastructure Challenges and Opportunities.srt |
36 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.mp4 |
41.3 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear.srt |
21 KB |
DEF CON 26 video and slides/DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.mp4 |
50.1 MB |
DEF CON 26 video and slides/DEF CON 26 Conference - zerosum0x0 - Demystifying MS17-010 Reverse Engineering the ETERNAL Exploits.srt |
58 KB |