DEF CON 23 presentations/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Extras.rar |
106.3 MB |
DEF CON 23 presentations/DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy-UPDATED.pdf |
1.3 MB |
DEF CON 23 presentations/DEFCON-23-Alessandro-Di-Federico-Leakless-How-The-ELF-ruined-Christmas.pdf |
329 KB |
DEF CON 23 presentations/DEFCON-23-Amit-Ashbel-Maty-Siman-Game-of-Hacks-Play-Hack-and-Track-UPDATED.pdf |
1.5 MB |
DEF CON 23 presentations/DEFCON-23-ammonRA-How-to-hack-your-way-out-of-home-detention-UPDATED.pdf |
1.3 MB |
DEF CON 23 presentations/DEFCON-23-Andres-Blanco-802.11-Massive-Monitoring-UPDATED.pdf |
1.7 MB |
DEF CON 23 presentations/DEFCON-23-Atlas-Fun-With-Symboliks.pdf |
9.8 MB |
DEF CON 23 presentations/DEFCON-23-Ballenthin-Graeber-Teodorescu-WMI-Attacks-Defense-Forensics.pdf |
2.7 MB |
DEF CON 23 presentations/DEFCON-23-Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pdf |
2 MB |
DEF CON 23 presentations/DEFCON-23-Brent-White-Hacking-Web-Apps-WP.pdf |
122 KB |
DEF CON 23 presentations/DEFCON-23-Bruce-Potter-Hackers-Guide-to-Risk.pdf |
527 KB |
DEF CON 23 presentations/DEFCON-23-Cassidy-Leverett-Lee-Switches-Get-Stitches.pdf |
2.2 MB |
DEF CON 23 presentations/DEFCON-23-Chris-Domas-REpsych.pdf |
3.6 MB |
DEF CON 23 presentations/DEFCON-23-Chris-Rock-I-Will-Kill-You-How-to-Get-Away-with-Murder.pdf |
2 MB |
DEF CON 23 presentations/DEFCON-23-Chris-Sistrunk-NSM-101-for-ICS.pdf |
3.4 MB |
DEF CON 23 presentations/DEFCON-23-Colby-Moore-Spread-Spectrum-Satcom-Hacking.pdf |
34 KB |
DEF CON 23 presentations/DEFCON-23-Colin-O'Flynn-Dont-Whisper-My-Chips.pdf |
3.4 MB |
DEF CON 23 presentations/DEFCON-23-Collin-Anderson-Tom-Cross-Export-Controls-on-Intrusion-Software.pdf |
778 KB |
DEF CON 23 presentations/DEFCON-23-Craig-Young-Extras.rar |
3 KB |
DEF CON 23 presentations/DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-UPDATED.pdf |
58.6 MB |
DEF CON 23 presentations/DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-WP-UPDATED.pdf |
2.5 MB |
DEF CON 23 presentations/DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-Wifi-Village.pdf |
859 KB |
DEF CON 23 presentations/DEFCON-23-Damon-Small-Beyond-the-Scan.pdf |
1.7 MB |
DEF CON 23 presentations/DEFCON-23-Daniel-Crowley-Damon-Smith-Bugged-Files.pdf |
595 KB |
DEF CON 23 presentations/DEFCON-23-Daniel-Selifonov-Drinking-from-LETHE.pdf |
509 KB |
DEF CON 23 presentations/DEFCON-23-David-An-When-the-Secretary-of-State-says-Stop-Hacking-us.pdf |
1.2 MB |
DEF CON 23 presentations/DEFCON-23-David-Huerta-Alice-and-Bob-are-Really-Confused.pdf |
4 MB |
DEF CON 23 presentations/DEFCON-23-David-Mortman-Docker-UPDATED.pdf |
286 KB |
DEF CON 23 presentations/DEFCON-23-Dennis-Maldonado-Are-we-really-safe-bypassing-access-control-systems-UPDATED.pdf |
46.8 MB |
DEF CON 23 presentations/DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins-References.txt |
689 B |
DEF CON 23 presentations/DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins.pdf |
397 KB |
DEF CON 23 presentations/DEFCON-23-Eijah-Crypto-for-Hackers-UPDATED.pdf |
2.3 MB |
DEF CON 23 presentations/DEFCON-23-Eijah-Crypto-for-Hackers-Workshop.pdf |
628 KB |
DEF CON 23 presentations/DEFCON-23-Eric-Van-Albert-Zack-Banks-Looping-Surveillance-Cameras-like-in-the-Movies.pdf |
1.9 MB |
DEF CON 23 presentations/DEFCON-23-Eric-XlogicX-Davisson-ReDoS.pdf |
2.1 MB |
DEF CON 23 presentations/DEFCON-23-Etienne-Martineau-Inter-VM-Data-Exfiltration.pdf |
1.5 MB |
DEF CON 23 presentations/DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick-Pics-Safer.pdf |
125 KB |
DEF CON 23 presentations/DEFCON-23-Fatih-Ozavci-The-Art-of-VoIP-Workshop-UPDATED.pdf |
4.1 MB |
DEF CON 23 presentations/DEFCON-23-Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Attacks-UPDATED.pdf |
1.4 MB |
DEF CON 23 presentations/DEFCON-23-Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Attacks-WP-UPDATED.pdf |
1 MB |
DEF CON 23 presentations/DEFCON-23-Fluxist-Unbootable-Exploiting-Paylock-Smartboot.pdf |
910 KB |
DEF CON 23 presentations/DEFCON-23-Gerard-Laygui-Forensic-Artifacts-Pass-The-Hash-Attack.pdf |
820 KB |
DEF CON 23 presentations/DEFCON-23-Grant-Bugher-Obtaining-and-Detecting-Domain-Persistence.pdf |
5.8 MB |
DEF CON 23 presentations/DEFCON-23-Gregory-Pickett-Extras.rar |
247 KB |
DEF CON 23 presentations/DEFCON-23-Gregory-Pickett-Staying-Persistant-in-Software-Defined-Networks.pdf |
1.1 MB |
DEF CON 23 presentations/DEFCON-23-Hariri-Spelman-Gorenc-Abusing-Adobe-Readers-JavaScript-APIs.pdf |
497 KB |
DEF CON 23 presentations/DEFCON-23-Ian-Kline-LTE-Recon-and-Tracking-with-RTLSDR.pdf |
344 KB |
DEF CON 23 presentations/DEFCON-23-Ian-Latter-Remote-Access-the-APT.pdf |
945 KB |
DEF CON 23 presentations/DEFCON-23-Ionut-Popescu-NetRipper-WP.pdf |
451 KB |
DEF CON 23 presentations/DEFCON-23-Ionut-Popescu-NetRipper.pdf |
2.3 MB |
DEF CON 23 presentations/DEFCON-23-Jason-Haddix-How-Do-I-shot-Web.pdf |
2.3 MB |
DEF CON 23 presentations/DEFCON-23-Jeremy-Dorrough-USB-Attack-to-Decrypt-Wi-Fi-Communications.pdf |
1.3 MB |
DEF CON 23 presentations/DEFCON-23-Joe-FitzPatrick-Matt-King-Extras.rar |
3.4 MB |
DEF CON 23 presentations/DEFCON-23-Joe-FitzPatrick-Matt-King-NSA-Playset-JTAG-Implants-UPDATED.pdf |
3.1 MB |
DEF CON 23 presentations/DEFCON-23-John-Menerick-Backdooring-Git.pdf |
4.3 MB |
DEF CON 23 presentations/DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-UPDATED.pdf |
1.8 MB |
DEF CON 23 presentations/DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-WP-UPDATED.pdf |
344 KB |
DEF CON 23 presentations/DEFCON-23-Jose-Selvi-Breaking-SSL-Using-Time-Synchronisation-Attacks.pdf |
2.2 MB |
DEF CON 23 presentations/DEFCON-23-Joshua-Drake-Stagefright-Scary-Code-in-the-Heart-of-Android-UPDATED.pdf |
267 KB |
DEF CON 23 presentations/DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC-UPDATED.pdf |
9.7 MB |
DEF CON 23 presentations/DEFCON-23-Justin-Engler-Secure-Messaging-For-Normal-People-WP.pdf |
1.7 MB |
DEF CON 23 presentations/DEFCON-23-Justin-Engler-Secure-Messaging-For-Normal-People.pdf |
381 KB |
DEF CON 23 presentations/DEFCON-23-Ken-Westin-Confessions-of-a-Cyberstalker.pdf |
2.6 MB |
DEF CON 23 presentations/DEFCON-23-Lance-Buttars-Nemus-Hacking-SQL-Injection-for-Remote-Code-Execution-on-a-LAMP-UPDATED.pdf |
1.1 MB |
DEF CON 23 presentations/DEFCON-23-Li-Jun-Yang-Qing-I-AM-A-NEWBIE-YET-I-CAN-HACK-ZIGBEE.pdf |
1.9 MB |
DEF CON 23 presentations/DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf |
9.3 MB |
DEF CON 23 presentations/DEFCON-23-Luke-Young-Project-Bitfl1p-Memory-Errors-with-DNS-UPDATED.pdf |
7.6 MB |
DEF CON 23 presentations/DEFCON-23-Mahdi-Namazifar-Detecting-Random-Strings-Language-Based-Approach.pdf |
363 KB |
DEF CON 23 presentations/DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-UPDATED.pdf |
9.8 MB |
DEF CON 23 presentations/DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-WP-UPDATED.pdf |
2 MB |
DEF CON 23 presentations/DEFCON-23-Mark-Ryan-Talabis-The-Bieber-Project.pdf |
7.7 MB |
DEF CON 23 presentations/DEFCON-23-Marte-L0ge-I-will-Tell-you-your-Lock-Pattern-UPDATED.pdf |
755 KB |
DEF CON 23 presentations/DEFCON-23-Matteo-Becarro-Matteo-Collura-Extracting-The-Painful-Bluetooth.pdf |
779 KB |
DEF CON 23 presentations/DEFCON-23-Miaubiz-Put-on-Your-Tinfo_t-Hat.pdf |
745 KB |
DEF CON 23 presentations/DEFCON-23-Michael-Robinson-Knocking-My-Neighbors-Kids-Drone-Offline-UPDATED.pdf |
13.7 MB |
DEF CON 23 presentations/DEFCON-23-Michael-Schrenk-Applied-Intelligence-UPDATED.pdf |
921 KB |
DEF CON 23 presentations/DEFCON-23-Mickey-Shkatov-Jesse-Michael-Scared-poopless-LTE-and-your-laptop-UPDATED.pdf |
2.5 MB |
DEF CON 23 presentations/DEFCON-23-Mike-Sconzo-I-am-packer-and-so-can-you.pdf |
6.8 MB |
DEF CON 23 presentations/DEFCON-23-Nadeem-Douba-BurpKit.pdf |
1.3 MB |
DEF CON 23 presentations/DEFCON-23-Nadeem-Douba-Extras.rar |
20.2 MB |
DEF CON 23 presentations/DEFCON-23-Nir-Valtman-Moshe-Ferber-From-zero-to-secure-in-1-minute-UPDATED.pdf |
6.9 MB |
DEF CON 23 presentations/DEFCON-23-Omer-Coskun-Why-Nation-State-Malwares-Target-Telco-Networks-UPDATED.pdf |
3.4 MB |
DEF CON 23 presentations/DEFCON-23-Panel-Comedy-Inception-Amanda-Berlin-Blue-Team-Hell.pdf |
388 KB |
DEF CON 23 presentations/DEFCON-23-Patrick-McNeil-Guidelines-For-Securing-Your-VoIP-PBX.pdf |
269 KB |
DEF CON 23 presentations/DEFCON-23-Patrick-McNeil-Owen-Sorry-Wrong-Number.pdf |
2.4 MB |
DEF CON 23 presentations/DEFCON-23-Patrick-Wardle-DLL-Hijacking-on-OSX-UPDATED.pdf |
44.4 MB |
DEF CON 23 presentations/DEFCON-23-Patrick-Wardle-Stick-that-in-your-(Root)Pipe-and-Smoke-it-UPDATED.pdf |
22.9 MB |
DEF CON 23 presentations/DEFCON-23-Paul-Amicelli-David-Baptiste-How-to-secure-the-keyboard-chain.pdf |
416 KB |
DEF CON 23 presentations/DEFCON-23-Phil-Polstra-Extras.rar |
39 KB |
DEF CON 23 presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf |
832 KB |
DEF CON 23 presentations/DEFCON-23-Phil-Polstra-One-device-to-Pwn-them-all.pdf |
782 KB |
DEF CON 23 presentations/DEFCON-23-Phil-Young-Chad-Rikansrud-Extras.rar |
80 KB |
DEF CON 23 presentations/DEFCON-23-Phil-Young-Chad-Rikansrud-Security-Necromancy-Further-Adventures-in-Mainframe-Hacking.pdf |
4.3 MB |
DEF CON 23 presentations/DEFCON-23-Phillip-Aumasson-Quantum-Computers-vs-Computers-Security.pdf |
1.7 MB |
DEF CON 23 presentations/DEFCON-23-Rich-Kelley-Harness-Powershell-Weaponization-Made-Easy.pdf |
405 KB |
DEF CON 23 presentations/DEFCON-23-Richo-Healey-Mike-Ryan-Hacking-Electric-Skateboards.pdf |
1.1 MB |
DEF CON 23 presentations/DEFCON-23-Rickey-Lawshae-Extras.rar |
3.5 MB |
DEF CON 23 presentations/DEFCON-23-Rickey-Lawshae-Lets-Talk-About-SOAP.pdf |
382 KB |
DEF CON 23 presentations/DEFCON-23-Rodringo-Almeida-Embedded-System-Design-From-Electronics-To-Microkernal-Development-WP.pdf |
742 KB |
DEF CON 23 presentations/DEFCON-23-Rodringo-Almeida-Embedded-System-Design-From-Electronics-To-Microkernal-Development.pdf |
3.1 MB |
DEF CON 23 presentations/DEFCON-23-Rodringo-Almeida-Extras.rar |
56 KB |
DEF CON 23 presentations/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-UPDATED.pdf |
495 KB |
DEF CON 23 presentations/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf |
189 KB |
DEF CON 23 presentations/DEFCON-23-3alarmlampscooter-DIY-Nukeproofing.pdf |
319 KB |
DEF CON 23 presentations/DEFCON-23-Ryan-Castellucci-Cracking-Cryptocurrency-Brainwallets.pdf |
180 KB |
DEF CON 23 presentations/DEFCON-23-Ryan-Mitchell-Separating-Bots-from-Humans.pdf |
125 KB |
DEF CON 23 presentations/DEFCON-23-Ryan-O'Neil-Advances-in-Linux-Forensics-ECFS.pdf |
273 KB |
DEF CON 23 presentations/DEFCON-23-Saif-El-Sherei-Etienne-Stalmans-SensePost-Introducing-Wadi-Fuzzer.pdf |
1 MB |
DEF CON 23 presentations/DEFCON-23-Sam-Bowne-Workshop-Android-Security-Auditing-Mobile-Apps.pdf |
7.5 MB |
DEF CON 23 presentations/DEFCON-23-Sam-Bowne-Workshop-Violent-Python.pdf |
6.9 MB |
DEF CON 23 presentations/DEFCON-23-Samy-Kamkar-Extras.rar |
51 KB |
DEF CON 23 presentations/DEFCON-23-Samy-Kamkar-README.txt |
518 B |
DEF CON 23 presentations/DEFCON-23-Sarah-Edwards-Ubiquity-Forensics.pdf |
23.9 MB |
DEF CON 23 presentations/DEFCON-23-Sean-Metcalf-Red-vs-Blue-AD-Attack-and-Defense.pdf |
2.3 MB |
DEF CON 23 presentations/DEFCON-23-Shawn-Webb-HardenedBSD-Internals.pdf |
226 KB |
DEF CON 23 presentations/DEFCON-23-Tamas-Szakaly-Shall-We-Play-A-Game-UPDATED.pdf |
1.1 MB |
DEF CON 23 presentations/DEFCON-23-Tony-Trummer-Tushar-Dalvi-QARK.pdf |
1.9 MB |
DEF CON 23 presentations/DEFCON-23-Topher-Timzen-Acquiring-NET-Objects-From-The-Managed-Heap.pdf |
117 KB |
DEF CON 23 presentations/DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-UPDATED.pdf |
1 MB |
DEF CON 23 presentations/DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-WP.pdf |
109 KB |
DEF CON 23 presentations/DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker.pdf |
1.7 MB |
DEF CON 23 presentations/DEFCON-23-Vivek-Ramachadran-Chellam.pdf |
1.8 MB |
DEF CON 23 presentations/DEFCON-23-Walker-Wiens-Machine-vs-Machine-DARPA-Fully-Automated-CTF.pdf |
15.5 MB |
DEF CON 23 presentations/DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers-WP.pdf |
190 KB |
DEF CON 23 presentations/DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers.pdf |
1.8 MB |
DEF CON 23 presentations/DEFCON-23-Weston-Hecker-Goodbye-Memory-Scraping-Malware.pdf |
1.7 MB |
DEF CON 23 presentations/DEFCON-23-xntrik-Hooked-Browser-Meshed-Networks-with-webRTC-and-BeEF.pdf |
1.7 MB |
DEF CON 23 presentations/DEFCON-23-Yan-Shoshitaishvili-Fish-Wang-Angry-Hacking.pdf |
2.5 MB |
DEF CON 23 presentations/DEFCON-23-Yaniv-Balmas-Lior-Oppenheim-Key-Logger-Video-Mouse.pdf |
1.9 MB |
DEF CON 23 presentations/DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-Femto.pdf |
1.6 MB |
DEF CON 23 presentations/DEFCON-23-Zack-Allen-Rusty-Bower-Malware-In-Gaming.pdf |
1.3 MB |