DEF CON 26 villages/DEF CON 26 AI VILLAGE - Clarence Chio and Panel - Opening Remarks.mp4 |
12.1 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Alex Long - AI DevOps Behind the Scenes of a Global Anti-Virus Companys Machine Learning Infrastructure.mp4 |
42 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Andrew Morris - Identifying and correlating anomalies in Internet-wide scan traffic to newsworthy security events - Video.mp4 |
63.8 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Andy Applebaum - Automated Planning for the Automated Red Team.mp4 |
92 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Ariel Herbert-Voss - Machine Learning Model Hardening For Fun and Profit.mp4 |
46.6 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Aylin Caliskan - The great power of AI Algorithmic mirrors of society.mp4 |
137.7 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Brian Genz - Generating Labeled Data From Adversary Simulations With MITRE ATTACK.mp4 |
136.3 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Chris Gardner - Chatting with your programs to find vulnerabilities.mp4 |
52.1 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Clarence Chio and Panel - Closing notes and prizes.mp4 |
3.3 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Fedor Sakharov - Detecting Web Attacks with Recurrent Neural Networks.mp4 |
86.1 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Ivan Torroledo - DeepPhish Simulating the Malicious Use of AI.mp4 |
60.3 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Kang Li - Beyond Adversarial Learning Security Risks in AI Implementations.mp4 |
35.9 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Li Chen - GAN to the dark side A case study of attacking machine-learning systems to empower defenses.mp4 |
77.2 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Mansour Ahmadi - IntelliAV Building an Effective On-Device Android Malware Detector.mp4 |
76.7 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Mark Mager - Stop and Step Away from the Data Rapid Anomaly Detection via Ransom Note File Classification.mp4 |
107.8 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Matt - It is a Beautiful Day in the Malware Neighborhood.mp4 |
73.2 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Raphael Norwitz - StuxNNet Practical Live Memory Attacks on Machine Learning Systems.mp4 |
52.3 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Rob Brandon - JMPgate Accelerating reverse engineering into hyperspace using AI.mp4 |
91.3 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Shankar and Kumar - Towards a framework to quantitatively assess AI safety challenges open questions and opportunities.mp4 |
72.8 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - Sven Cattell - Adversarial Stickers.mp4 |
82.3 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - TonTon Huang - Hunting the Ethereum Smart Contract Color-inspired Inspection of Potential Attacks.mp4 |
84.7 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - bodaceacat and Panel - Responsible Offensive Machine Learning .mp4 |
141.6 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - drhyrum and Panel - Malware Panel.mp4 |
98.3 MB |
DEF CON 26 villages/DEF CON 26 AI VILLAGE - infosecanon Heather Lawrence - The current state of adversarial machine learning.mp4 |
62.3 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Anonimal - An Introduction to Kovri.mp4 |
142.7 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Anonimal - Monero Projects Vulnerability Response Process.mp4 |
41.1 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Diego rehrar Salazar - Village summary.mp4 |
100 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Fluffy Pony - Moneros Emerging Applications.mp4 |
83.8 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Francisco ArticMine Cabañas - Scaling and Economic Implications of the Adaptive Blocksize in Monero.mp4 |
102.1 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Howard hyc Chu - Keynote Speech Inside Monero.mp4 |
158.1 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Justin Ehrenhofer - Examining Moneros Ring Signatures.mp4 |
67.6 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Marko Bencun - A Rundown of Security Issues in Crypto Software Wallets.mp4 |
84.4 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Michael Schloh - We Dont Need No Stinkin Badges - Video.mp4 |
86.4 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Michael Schloh - We Program Our Stinkin Badges.mp4 |
93.6 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Pearson and Honigwachs - Hacking a Crypto Payment Gateway.mp4 |
39 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Philip Martin - BCOS keynote speech.mp4 |
188.6 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Shamiq and Panel - Moderator Justin Ehrenhofers Greatest Questions.mp4 |
210.7 MB |
DEF CON 26 villages/DEF CON 26 BCOS - Monero Village - Welcome Speech.mp4 |
117.4 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Anne Kim - Selfie or Mugshot .mp4 |
107.3 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - BiaSciLab - WaterBot The Hackable Plant Control System.mp4 |
68.5 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Chris Roberts - Our Evolutionary Path in 45 Minutes or Full Speed Off the Edge of the Cliff .mp4 |
103.1 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - DAY ONE.mp4 |
554.6 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Erin Foster Hefley - Hacking Human Fetuses.mp4 |
141.5 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Gerald R Scott - Workplace Accommodation for Autisics.mp4 |
127.6 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Guy Propper - Exploiting Immune Defenses Can Malware Learn from Biological Viruses.mp4 |
52.4 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Joel Murphy - Biohacking Village Microfluidics Badge.mp4 |
48.2 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - John Dumlap - DNA Encryption Bioencryption to Store Secrets in Living Organisms.mp4 |
62.4 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Michael Laufer - The Four Thieves Vinegar Collective.mp4 |
189.7 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Vee - PWN to Own My Heart.mp4 |
110.6 MB |
DEF CON 26 villages/DEF CON 26 BIO HACKING VILLAGE - Vlad Gostomelsky - Jumping the Epidermal Barrier.mp4 |
67.9 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - Andy Applebaum - Stop Drop and Assess your SOC.mp4 |
63.9 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - IrishMASMS - Evolving Security Operations to the Year 2020.mp4 |
63.4 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - LadyRed6 - SAEDAY - Subversion and Espionage Directed Against You.mp4 |
80 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - Plug and mwguy - How Not to Suck at Vulnerability Management at Scale.mp4 |
60.2 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - Rik van Duijn and Leandro Velasco - Open Source Endpoint Monitoring.mp4 |
74.5 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - Xavier Ashe - Cloud Security Myths.mp4 |
72.9 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - jtpereyda - Hacking Your Dev Job to Save the World - Where Programming and Hacking Meet.mp4 |
35.2 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - rainbow tables - Automating DFIR The Counter Future.mp4 |
39 MB |
DEF CON 26 villages/DEF CON 26 BLUE TEAM VILLAGE - sm0kem - Effective Log and Events Management.mp4 |
25.3 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Alzantot and Sharma - Practical adversarial attacks against challenging models environments.mp4 |
65.5 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Guo, and Cuevas - Recent progress in adversarial deep learning attack and defense - Video.mp4 |
50.3 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Hou and Zhou - Transferable Adversarial Perturbations.mp4 |
27.9 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Joseph Clements - Hardware Trojan Attacks on Neural Networks.mp4 |
74.7 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Li and Jiao - How to leverage the open-source information to make an effective adversarial attack defense against deep learning model.mp4 |
71 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Taori and Kamsetty - Targeted Adversarial Examples for Black Box Audio Systems - Video.mp4 |
50.7 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Weilin Xu and Panel - The Vanishing Trick for Self-driving Cars.mp4 |
88.1 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Zhao and Zhao - Adversarial 2 Training.mp4 |
19.5 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE - Zhuang Zhang and Panel - Weapons for Dog Fight Adapting Malware to Anti-Detection based on GAN.mp4 |
54.2 MB |
DEF CON 26 villages/DEF CON 26 CAAD VILLAGE -Xingxing Wei and Panel - Boosting Adversarial Attacks with Momentum.mp4 |
29.8 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Adrian and Alex - An Overview of Hydroponic Grow Techniques.mp4 |
76.9 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Annie Rouse - The Real History of Marijuana Prohibition.mp4 |
109.3 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Beth Schechter - About the Open Cannabis Project.mp4 |
90.1 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Cristina Munoz - Weed Hacking A Pragmatic Primer For Home Grows.mp4 |
82.5 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Harry Moreno - Diagnosing Sick Plants with Computer Vision .mp4 |
35 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Keith Conway and Frank - The Invisible Hands Tending the Secret Greens.mp4 |
94.5 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Kevin Chen - THC Producing Genetically Modified Yeast - Video.mp4 |
49.3 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Mark Lewis - Hacking Phenotypic Pathways In Cannabis.mp4 |
109.3 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Mayor Chad Wanke - Primer On Dealing with Local Gov for Legal Cannabis.mp4 |
149.2 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Michael Hiller- The Ongoing Federal Lawsuit Against Jeff Sessions.mp4 |
87.8 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Rex - Cruising the Cannabis Highway Major Breaches in Cannabis Software.mp4 |
77.7 MB |
DEF CON 26 villages/DEF CON 26 CANNABIS VILLAGE - Weed Anon - Compliance and Infosec Within the Cannabis Industry.mp4 |
66.4 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Ben - CANT.mp4 |
115 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Ben - Misbehavior Detection in V2X networks.mp4 |
119.4 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Ben Gardiner - CAN Signal Extraction from OpenXC with Radare2.mp4 |
79 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Dan Regalado - Meet Salinas the first ever SMS-commanded Car Infotainment RAT.mp4 |
217.7 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Eric Evenchick - Go Hack Cars.mp4 |
45.2 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Jerry Gamblin - So You Want To Hack A Car.mp4 |
34.6 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - KEVIN2600 - Grand theft auto Digital key hacking.mp4 |
116 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Nathaniel Boggs - Automotive Exploitation Sandbox A Hands-on Educational Introduction to Embedded Device Exploitation.mp4 |
61.7 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Philip Lapczynski - Automotive Flash Bootloaders Exposing automotive ECU updates.mp4 |
124.3 MB |
DEF CON 26 villages/DEF CON 26 CAR HACKING VILLAGE - Vlad - Automotive Evidence Collection Automotive Driving Aids and Liability.mp4 |
66.9 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Barnhart-Magen and Caltum - JARVIS never saw it coming.mp4 |
68.9 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Brendan OConnor - Probably an Irreverent Overview of the GDPR.mp4 |
182.5 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Catarineu and Modi - Anonymous rate-limiting in services with Direct Anonymous Attestation.mp4 |
42.1 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Caudill and Hornby - Announcing the Underhanded Crypto Contest Winners.mp4 |
18.1 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Christian Paquin - Integrating post-quantum crypto into real-life applications.mp4 |
73.5 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Cowley and Taggart - Two-Steps to Owning MFA.mp4 |
58.1 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Dr Adam Everspaugh - Revolutionizing Authentication with Oblivious Cryptography.mp4 |
40 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Hardin and Dalsen - Sluts Bullies and Best Selves Rethinking Digital Privacy Education.mp4 |
24.5 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Jeff Kosseff - Hamiltons Private Key American Exceptionalism and the Right to Anonymity.mp4 |
200.8 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Mahrud Sayrafi - Opportunistic Onion More Protection Some of the Time .mp4 |
29.4 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Marie Fromm - Cloud Encryption How to not suck at securing your encryption keys.mp4 |
118.6 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Matt Cheung - Prototyping Cryptographic Protocols With Charm.mp4 |
69.9 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Matt Urquhart - Hiding in plain sight Disguising HTTPS traffic with domain-fronting.mp4 |
122.5 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Nicholas Doiron - Geolocation and Homomorphic Encryption.mp4 |
34.8 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Nox - Cicada What the Puzzles Can Teach Us About Cryptography and Privacy.mp4 |
44.9 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Pigeon - Jailed by a Google Search the Surveillance State's War on Self-induced Abortion.mp4 |
20.3 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Reyes and Elazari Bar On - Wont Somebody Think of the Children - Examining COPPA Compliance at Scale.mp4 |
90.1 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Scott Arciszewski - No Way JOSE! Designing Cryptography Features for Mere Mortals.mp4 |
35.5 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Shi and Cai - Building a Cryptographic Backdoor in OpenSSL.mp4 |
15.7 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Tess Schrodinger - Cryptography Codes and Secret Writing An Introduction to Secret Communications.mp4 |
228 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Wall and Frederickson - Implementing a Library for Pairing-based Transform Cryptography.mp4 |
62 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Wendy Knox Everette - Green Locks for You and Me.mp4 |
22.6 MB |
DEF CON 26 villages/DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Yueting Lee - CATs - A Tale of Scalable Authentication.mp4 |
24.1 MB |
DEF CON 26 villages/DEF CON 26 DATA DUPLICATION VILLAGE - Andy Klein - Facts figures and fun from managing 100000 hard drives.mp4 |
102.6 MB |
DEF CON 26 villages/DEF CON 26 DATA DUPLICATION VILLAGE - Jessica Malekos Smith - The Beginners Guide to the Musical Scales of Cyberwar.mp4 |
83.3 MB |
DEF CON 26 villages/DEF CON 26 DATA DUPLICATION VILLAGE - Lior Kolnik - The Memory Remains - Cold drive memory forensics 101.mp4 |
39.1 MB |
DEF CON 26 villages/DEF CON 26 DATA DUPLICATION VILLAGE - Mauro Caseres - Owning Gluster FS with GEVAUDAN.mp4 |
41.2 MB |
DEF CON 26 villages/DEF CON 26 ETHICS VILLAGE - Accountability without accountability- A censorship measurement case study.mp4 |
130.7 MB |
DEF CON 26 villages/DEF CON 26 ETHICS VILLAGE - David Scott Lewis - Hack Back Not An Option But A Necessity.mp4 |
223.6 MB |
DEF CON 26 villages/DEF CON 26 ETHICS VILLAGE - Ethical Disclosure and the Reduction of Harm.mp4 |
140.7 MB |
DEF CON 26 villages/DEF CON 26 ETHICS VILLAGE - Ethics for Security Practitioners.mp4 |
205.1 MB |
DEF CON 26 villages/DEF CON 26 ETHICS VILLAGE - Ethics of Technology in Humanitarian and Disaster Response.mp4 |
184.6 MB |
DEF CON 26 villages/DEF CON 26 ETHICS VILLAGE - Nations and Nationalism and Cyber Security - Navigating Difficult Relationships in the Private Infosec Space.mp4 |
310.9 MB |
DEF CON 26 villages/DEF CON 26 ETHICS VILLAGE - Responsible Disclosure Panel.mp4 |
171 MB |
DEF CON 26 villages/DEF CON 26 HARDWARE HACKING VILLAGE - Brian Milliron - Disabling Intel ME in Firmware.mp4 |
39.9 MB |
DEF CON 26 villages/DEF CON 26 HARDWARE HACKING VILLAGE - Commodore Z - The Cactus 6502 Blinkenlights 40 Years Late.mp4 |
116.2 MB |
DEF CON 26 villages/DEF CON 26 HARDWARE HACKING VILLAGE - David Melendez Cano - Building Drones the Hard Way.mp4 |
63.2 MB |
DEF CON 26 villages/DEF CON 26 HARDWARE HACKING VILLAGE - John Aho - WiFi Beacons will give you up.mp4 |
69.8 MB |
DEF CON 26 villages/DEF CON 26 HARDWARE HACKING VILLAGE - Mike Davis - Hacking your HackRF.mp4 |
33.7 MB |
DEF CON 26 villages/DEF CON 26 HARDWARE HACKING VILLAGE - Salvador Mendoza - NFC Payments - The Art of Relay & Replay Attacks.mp4 |
61.3 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Brandon Workentin - A CTF That Teaches Challenging the Next Generation of ICS Ethical Hackers.mp4 |
109 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Bryson Bort - TOR for The IOT aka TORT Reform.mp4 |
98.7 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - DeSantis and Pacho - Analyzing VPNFilters Modbus Module.mp4 |
81.1 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Harris and Aguayo - Securing Critical Infrastructure through Side-Channel Monitoring.mp4 |
77.3 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Joe Slowik - Behavior-Based Defense in ICS Environments Leveraging Minor Incidents to Protect Against Major Attacks.mp4 |
76.3 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Keiser and Barenz - How can industrial IioT be protected from the great unwashed masses of IoT devices.mp4 |
53.7 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Krotofil and Winnicki - Reverse Engineering Physical Processes in Industrial Control Systems.mp4 |
38.7 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Mike Godfrey - How We Cost Our Client 1 point 2M with 4 lines of code and less than 2 Hours.mp4 |
99.1 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Monta Elkins - Disassembly and Hacking of Firmware Where You Least Expect It- In Your Tools- with live hacking demonstration.mp4 |
92.5 MB |
DEF CON 26 villages/DEF CON 26 ICS VILLAGE - Thomas VanNorman - A SOC in the Sandbox.mp4 |
35.1 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Amit Elazari - Internet of Laws Navigating to IoT Hacking Legal Landscape.mp4 |
110 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Ben Nassi - Attacking Commercial Smart Irrigation Systems.mp4 |
138.9 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - David Tomaschik - Im the One Who Doesnt Knock Unlocking Doors from the Network.mp4 |
97.4 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Dennis Giese - How-to modify ARM Cortex-M based firmware A step-by-step approach for Xiaomi devices.mp4 |
114.5 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Erez Yalon - Your Smart Scale is Leaking More than Your Weight.mp4 |
73.4 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - John Dunlap - FPGAs a new attack surface for embedded adversaries.mp4 |
72.7 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Lee and Park - Exploiting the IoT hub What happened to my home.mp4 |
97.1 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Matt Wixey - Worms that fight back Nematodes as an antidote for IoT malware.mp4 |
82.4 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Ramgattie and Holcomb - IoT Village Keynote The Road To SOHOpelessly Broken.mp4 |
81.7 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Stephen Hilt - The Sound of a Targeted Attack- Attacking IoT Speakers.mp4 |
81.3 MB |
DEF CON 26 villages/DEF CON 26 IoT VILLAGE - Veronica Schmitt - Internet of Medicine The ultimate key to Rooting the human being.mp4 |
153.5 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Alex Stanev - wpa-sec The Largest Online WPA Handshake Database.mp4 |
40.2 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Andrew Gish-Johnson - Building a Teaching SOC.mp4 |
35.8 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Caleb Madrigal - Mapping Wi-Fi Networks and Triggering on Interesting Traffic Patterns.mp4 |
69.6 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Chen and Yang - Grand Theft Auto Digital Key Hacking.mp4 |
75.4 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Chris Hanlon - Swiss Cheese Holes in the Foundation of Modern Security - CERT VU919801.mp4 |
32.8 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Ed Miles - Bitsquatting Passive DNS Hijacking.mp4 |
33.1 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Garett Montgomery - Target-Based Security Model.mp4 |
86.4 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Gita Ziabari - How to Tune Automation to Avoid False Positives.mp4 |
28.5 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Hadar Yudovich and Panel - Turning Deception Outside-In Tricking Attackers with OSINT.mp4 |
35.4 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Jay Turla - Car Infotainment Hacking Methodology and Attack Surface Scenarios.mp4 |
69.4 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Kat Sweet - Rethinking Role-Based Security Education.mp4 |
153.7 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Lokesh Pidawekar - An OSINT Approach to Third Party Cloud Service Provider Evaluation.mp4 |
36.9 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Muniz and Lakhani - Fishing for Phishers The Enterprise Strikes Back.mp4 |
91.6 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Pedro Fortuna - Protecting Crypto Exchanges From a New Wave of Man-in-the-Browser Attacks.mp4 |
78.8 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Robert Olson - An Analysis of Cybersecurity Educational Standards.mp4 |
32.7 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Rogan Dawes - Mallet A Proxy for Arbitrary Traffic.mp4 |
145.3 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Sam Erb - Defense in Depth The Path to SGX at Akamai.mp4 |
30.3 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Sen and Sinturk - Normalizing Empires Traffic to Evade Anomaly-Based IDS.mp4 |
34 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - Silas Cutler - Capturing in Hard to Reach Places.mp4 |
23.7 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - TryCatchHCF - PacketWhisper Stealthily Exfiltrating Data and Defeating Attribution Using DNS and Text-Based Steganography.mp4 |
87.1 MB |
DEF CON 26 villages/DEF CON 26 PACKET HACKING VILLAGE - gh057 - Microcontrollers and Single Board Computers for Hacking Fun and Profit.mp4 |
56.7 MB |
DEF CON 26 villages/DEF CON 26 R00TZ ASYLUM VILLAGE - Day 1.mp4 |
385 MB |
DEF CON 26 villages/DEF CON 26 R00TZ ASYLUM VILLAGE - Day 2.mp4 |
316.5 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - AndrewMohawk - KEYNOTE - From Breach to Bust A short story of graphing and grey data.mp4 |
65.3 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - Jacob_Wilkin - Mapping Social Media with Facial Recognition.mp4 |
15.3 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - Recon Village Team - Hackathon Product Showcase.mp4 |
48.4 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - Recon Village Team - Hackathon and CTF Prizes.mp4 |
35.4 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - Undisclosed - 1983 Im born 2018 Im taking on the bad guys.mp4 |
36.8 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - Undisclosed - Targeted User Analytics and Human Honeypots.mp4 |
38.2 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - Undisclosed - Winning a SANS 504 CTF without winning a SANS CTF.mp4 |
49.2 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - WebBreacher - Core OSINT Keeping Track of and Reporting All the Things.mp4 |
28.9 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - WebBreacher - Introducing YOGA Your OSINT Graphical Analyzer.mp4 |
59.5 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - anshuman_bh - Bug Bounty Hunting on Steroids.mp4 |
89.3 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - caleb madrigal - Mapping wifi networks and triggering on interesting traffic patterns.mp4 |
34.1 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - chenb0x - Stalker In A Haystack.mp4 |
72.7 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - egd io - How WHOIS Data Uncovered 32 Billion Connected to the Mormon Church.mp4 |
13.7 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - evilbotnet - OpenPiMap - Hacking the hackers with OSINT Raspberry Pis and Data Analysis.mp4 |
23.6 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - jhaddix - Emergent Recon - fresh methodology and tools for hackers in 2018.mp4 |
246.9 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - lloydamiller - Applied OSINT For Politics Turning Open Data Into News.mp4 |
147.1 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - marc_dacosta - Adventures in the dark web of government data.mp4 |
53.8 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - mauroeldritch - I fought the law and law lost.mp4 |
140.2 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - mgianarakis - Supercharge Your Web Recon With Commonspeak and Evolutionary Wordlists.mp4 |
18.6 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - telspacesystems - Hacking the international RFQ Process killthebuzzwords.mp4 |
107.7 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - trustartech - WhiteRabbit Combining Threat Intelligence Public Blockchain Data and Machine Learning to go Down the Dirty Money Rabbit Hole.mp4 |
28.6 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - upgoingstar and sudhanshu c - Closing Note.mp4 |
9.1 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - upgoingstar and sudhanshu c - Opening Note.mp4 |
13.2 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - victoris - Prebellico - 100 Perfect Passive Pre-Engagement and Post Compromise Network Reconnaissance Tool.mp4 |
85.5 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - xillwillx - skiptracer - ghetto OSINT for broke hackers.mp4 |
50.3 MB |
DEF CON 26 villages/DEF CON 26 RECON VILLAGE - yamakira - Building visualisation platforms for OSINT data using open source solutions.mp4 |
214.8 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Aunshul Rege - Social Engineering Course Projects for Undergraduate Students.mp4 |
102.4 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Billy Boatright - Billy Boatright.mp4 |
90 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Chris Hadnagy and Panel - Hunting Predetors SE Style.mp4 |
197.3 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Chris Roberts - Welcome to 2018 - Full Speed to the Edge of the Cliff.mp4 |
184 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Hannah Silvers - My Stripper Name Is Bubbles Sunset.mp4 |
68.9 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Kathleen Mullin - Social Engineering From a CISOs Perspective.mp4 |
72.2 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Neil Fallon - Neil Fallon.mp4 |
108.9 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Pongo - Swarm Intellegence and Augmented Reality Gaming - Video.mp4 |
49.1 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Ryan MacDougall - From Introvert to SE.mp4 |
84.1 MB |
DEF CON 26 villages/DEF CON 26 SOCIAL ENGINEERING VILLAGE - Silvers and Banks - On the Hunt Hacking the Hunt Group.mp4 |
177.4 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - Carsten Schurmann - A Comprehensive Forensic Analysis of WINVote Voting Machines.mp4 |
77.3 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - Diego Aranha - The Return of Software Vulnerabilities in the Brazilian Voting Machine.mp4 |
56 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - J Alex Halderman - Current Policy Responses to Election Security Concerns.mp4 |
75.5 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - Jake Braun and Panel - Recap of Voting Village 2017 - Lessons Learned.mp4 |
161.4 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - Joseph Kiniry - Defending Democracy Together End-to-End Verifiable Voting for All.mp4 |
60.9 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - Maggie MacAlpine - Title TBD.mp4 |
27.2 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - Matthew Bernhard - Lightning Talk A Crash Course on Election Security.mp4 |
25.3 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - Neal Kelley and Panel - Lunch Keynote State and Local Perspectives on Election Security.mp4 |
217.2 MB |
DEF CON 26 villages/DEF CON 26 VOTING VILLAGE - Robert Karas - Defending Election Security A National Security Priority.mp4 |
176 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Aadvark and Panel - Wardrivers Anonymous.mp4 |
344.7 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Balint Seeber - SDR Basics Class.mp4 |
97 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Balint Seeber - SirenJack Cracking a Secure Emergency Warning Siren System.mp4 |
85 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Eric Reuter - Introduction to Railroad Telemetry.mp4 |
79.8 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - FAZ - Exploring the 802 15 4 attack surface.mp4 |
29.6 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Handorf and Spill - Its not wifi stories in wireless reverse engineering.mp4 |
86.2 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - John Dunlap - Learning to Listen Machine Learning for Adaptive Wireless Adversary Detection.mp4 |
38.3 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Kitchen and Kinne - Little Fluffy Pineapple Clouds - Commanding a Fleet of Wireless Fruit.mp4 |
99.4 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Pandeya and Temple - RFNoC Accelerating The Spectrum with the FPGA.mp4 |
43 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Travis Goodspeed - Goodwatch Update.mp4 |
57.2 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Zero Chaos and Mellendick - Blue Sonar.mp4 |
93.7 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - Zero Chaos and Wasabi - WEP and WPA Cracking 101.mp4 |
91 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - recompiler - Attacking Gotenna Networks.mp4 |
37.2 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - ryan holeman - BLE CTF.mp4 |
23.4 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - stev0 - BSSI - finding foxes with acoustic help - piClicker.mp4 |
34.3 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - t0ddpar0dy - Hunting Rogue APs Hard Lessons.mp4 |
42.3 MB |
DEF CON 26 villages/DEF CON 26 WIRELESS VILLAGE - wasabi - Can you hear me now DEF CON.mp4 |
50.5 MB |
DEF CON 26 villages/Voting Machine Village/August 22 2018 - Letter to ESS.pdf |
422 KB |