Quantcast
Channel: DEF CON 23 [Audio] Speeches from the Hacker Convention
Browsing latest articles
Browse All 133 View Live

DaKahuna & satanklawz - Introduction to SDR and the Wireless Village - 101 Track

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-Wifi-Village.pdf Introduction to SDR and the...

View Article



Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track

Materials Available Here: https://media.defcon.org/DEF CON 23/DEF CON 23 presentations/DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy-UPDATED.pdf Linux Containers: Future or Fantasy?...

View Article

Patrick "Unregistered436" McNeil & "Snide" Owen - Sorry, Wrong Number:...

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-McNeil-Owen-Sorry-Wrong-Number.pdf...

View Article

Dr. Phil Polstra - Hacker in the Wires - 101 Track

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf Extras here:...

View Article

Damon Small - Beyond the Scan: The Value Proposition of Vulnerability...

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Damon-Small-Beyond-the-Scan.pdf Beyond the Scan: The Value Proposition of Vulnerability...

View Article


Topher Timzen & Ryan Allen - Hijacking Arbitrary .NET Application Control...

Materials Available Here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-UPDATED.pdf...

View Article

Tottenkoph & IrishMASMS - Hackers Hiring Hackers - How to Do Things Better -...

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker.pdf Hackers Hiring Hackers - How to Do Things...

View Article

AmmonRa - How to hack your way out of home detention

Materials Available Here; https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-ammonRA-How-to-hack-your-way-out-of-home-detention-UPDATED.pdf How to hack your way out of...

View Article


Rob Bathurst (evilrob) & Jeff Thomas (xaphan) - Canary: Keeping Your Dick...

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick-Pics-Safer.pdf Canary: Keeping Your Dick Pics...

View Article


1057 - Responsible Incident: Covert Keys Against Subverted Technology...

Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey LosT We're no strangers to love You know the rules and so do I A full commitment's what I'm thinking of You...

View Article

Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots

Medical Devices: Pwnage and Honeypots Scott Erven Associate Director, Protiviti Mark Collao Security Consultant, Protiviti We know medical devices are exposed to the Internet both directly and...

View Article

Marina Krotofil & Jason Larsen - Rocking the Pocket Book: Hacking Chemical...

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-UPDATED.pdf...

View Article

Zoz - And That's How I Lost My Other Eye: Further Explorations In Data...

And That's How I Lost My Other Eye: Further Explorations In Data Destruction Zoz Robotics Engineer and Security Researcher How much more paranoid are you now than you were four years ago? Warrantless...

View Article


Sean Pierce - Abusing native Shims for Post Exploitation

Abusing native Shims for Post Exploitation Sean Pierce Technical Intelligence Analyst for iSIGHT Partners Shims offer a powerful rootkit-like framework that is natively implemented in most all modern...

View Article

Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF...

RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID Francis Brown Partner - Bishop Fox Shubham Shah Security Analyst at Bishop Fox Have you ever attended an RFID hacking presentation and walked...

View Article


Panel - Contests Closing Ceremonies

: Presenting the results and awards for the DEF CON 23 Contests and Events.

View Article

Peter Shipley - Insteon - False Security and Deceptive Documentation

Insteon' False Security And Deceptive Documentation Peter Shipley Security Researcher Ryan Gooler Insteon is a leading home automation solution for controlling lights, locks, alarms, and much more....

View Article


Robert Graham and David Maynor - HamSammich – long distance proxying over radio

HamSammich – long distance proxying over radio Robert Graham Erratasec.com David Maynor Erratasec.com The ProxyHam talk was mysteriously canceled. However, it’s easy to replicate the talk from the...

View Article

Runa A. Sandvik & Michael Auger - When IoT attacks - Hacking a Linux-powered...

When IoT attacks: hacking a Linux-powered rifle Runa A. Sandvik Michael Auger TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly...

View Article

Matt Cagle & Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy War

Who Will Rule the Sky? The Coming Drone Policy Wars Matt Cagle Technology and Civil Liberties Policy Attorney, ACLU of Northern California Eric Cheng General Manager, DJI SF and Director of Aerial...

View Article

Panel - Licensed to Pwn - Weaponization and Regulation of Security Research

Licensed to Pwn: The Weaponization and Regulation of Security Research Jim Denaro Dave Aitel Matt Blaze Nate Cardozo Mara Tam Catherine “Randy” Wheeler Security research is under attack. Updates to the...

View Article


Marc Rogers & Kevin Mahaffey - How to Hack a Tesla Model S

How to Hack a Tesla Model S Marc Rogers Principle Security Researcher for CloudFlare Kevin Mahaffey CTO of Lookout Inc The Tesla Model S is the most connected car in the world. It might surprise you to...

View Article


Panel - ThunderStrike 2- Sith Strike

ThunderStrike 2: Sith Strike Trammel Hudson Vice President, Two Sigma Investments Xeno Kovah Co-founder, LegbaCore, LLC Corey Kallenberg Co-Founder, LegbaCore, LLC The number of vulnerabilities in...

View Article

Charlie Miller - Remote exploitation of an unaltered passenger vehicle

Remote Exploitation of an Unaltered Passenger Vehicle Charlie Miller Security engineer at Twitter Chris Valasek Director of Vehicle Security Research at IOActive Although the hacking of automobiles is...

View Article

Geoff Walton & Dave Kennedy - Pivoting Without Rights – Introducing Pivoter

Pivoting Without Rights – Introducing Pivoter Geoff Walton Senior Security Consultant for Cleveland-based TrustedSec Dave Kennedy (ReL1K/HackingDave), founder of TrustedSec and Binary Defense Systems...

View Article


Miaubiz - Put on your tinfo_t hat if youre my type

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Miaubiz-Put-on-Your-Tinfo_t-Hat.pdf Put on your tinfo_t hat if you're my type miaubiz Senior...

View Article

Joshua Smith - High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC-UPDATED.pdf High-Def Fuzzing:...

View Article

Colin O'Flynn - Don't Whisper my Chips: Sidechannel and Glitching for Fun and...

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Colin-O%27Flynn-Dont-Whisper-My-Chips.pdf Don't Whisper my Chips: Sidechannel and Glitching...

View Article

Ken Westin - Confessions of a Professional Cyber Stalker

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ken-Westin-Confessions-of-a-Cyberstalker.pdf Confessions of a Professional Cyber Stalker Ken...

View Article



Weston Hecker - Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Weston-Hecker-Goodbye-Memory-Scraping-Malware.pdf Goodbye Memory Scraping Malware: Hold Out...

View Article

Daniel “unicornFurnace” Crowley & Damon Smith - Bugged Files: Is Your...

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Daniel-Crowley-Damon-Smith-Bugged-Files.pdf Bugged Files: Is Your Document Telling on You?...

View Article

Zack Fasel - Seeing through the Fog

Seeing through the Fog Zack Fasel Urbane Security Yes. "The Cloud" (drink). Even though many of us would much like to see use of public clouds decline, they're not going away any time soon. And with...

View Article

Teddy Reed & Nick Anderson - Hardware and Trust Security: Explain it like I’m 5

Hardware and Trust Security: Explain it like I’m 5 Teddy Reed Security Engineer Facebook Nick Anderson Research Scientist There are a lot of presentations and suggestions that indicate HSMs, TrustZone,...

View Article


Ryan O'Neill - Advances in Linux Process Forensics Using ECFS

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-O%27Neil-Advances-in-Linux-Forensics-ECFS.pdf Advances in Linux Process Forensics Using...

View Article

John Seymour - "Quantum" Classification of Malware

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-UPDATED.pdf Whitepaper here:...

View Article

Patrick Wardle - Stick That In Your root Pipe and Smoke It

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Patrick-Wardle-Stick-that-in-your-(Root)Pipe-and-Smoke-it-UPDATED.pdf Stick That In Your...

View Article


Panel - DEF CON Comedy Inception: How many levels deep can we go?

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Panel-Comedy-Inception-Amanda-Berlin-Blue-Team-Hell.pdf DEF CON Comedy Inception: How many...

View Article


Andres Blanco & Andres Gazzoli - 80211 Massive Monitoring

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Andres-Blanco-802.11-Massive-Monitoring-UPDATED.pdf 802.11 Massive Monitoring Andres Blanco Sr...

View Article

Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors...

Investigating the Practicality and Cost of Abusing Memory Errors with DNS Luke Young Information Security Engineer, Hydrant Labs LLC In a world full of targeted attacks and complex exploits this talk...

View Article

Terrell McSweeny & Ashkan Soltani - How to Hack Government: Technologists as...

How to Hack Government: Technologists as Policy Makers Terrell McSweeny Commissioner, Federal Trade Commission Ashkan Soltani Chief Technologist, Federal Trade Commission As the leading federal agency...

View Article

Jean-Philippe Aumasson - Quantum Computers vs. Computers Security

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phillip-Aumasson-Quantum-Computers-vs-Computers-Security.pdf Quantum Computers vs. Computers...

View Article


Marte L0ge - Tell me who you are and I will tell you your lock patter

Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marte-L0ge-I-will-Tell-you-your-Lock-Pattern-UPDATED.pdf Tell me who you are and I will tell...

View Article

Ryan Mitchell - Separating Bots from the Humans

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ryan-Mitchell-Separating-Bots-from-Humans.pdf Separating Bots from the Humans Ryan Mitchell...

View Article


Bart Kulach (Bartlomiej Jakub Kulach - Hack the Legacy! IBM i (aka AS/400)...

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pdf Hack the Legacy! IBM i (aka AS/400) Revealed....

View Article

Jose Selvi - Breaking SSL Using Time Synchronisation Attacks

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jose-Selvi-Breaking-SSL-Using-Time-Synchronisation-Attacks.pdf Breaking SSL Using Time...

View Article


Aditya K Sood - Dissecting the Design of SCADA Web Human Machine Interfaces...

Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities Aditya K Sood Architect - Threat Research Labs, Elastica inc. Human Machine Interfaces (HMIs) are the...

View Article

Vivek Ramachandran - Chigula — A framework for Wi-Fi Intrusion Detection and...

Chigula — a framework for Wi-Fi Intrusion Detection and Forensics Vivek Ramachandran, Founder, SecurityTube.net and Pentester Academy Most of Wi-Fi Intrusion Detection & Forensics is done today...

View Article

Nir Valtman & Moshe Ferber - From 0 To Secure In 1 Minute — Securing IAAS

Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Nir-Valtman-Moshe-Ferber-From-zero-to-secure-in-1-minute-UPDATED.pdf From 0 To Secure In 1...

View Article

Panel - Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web

Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web Peter Eckersley Electronic Frontier Foundation James Kasten Electronic Frontier Foundation Yan Zhu Electronic Frontier Foundation...

View Article


Richard Thieme - Hacking the Human Body/brain: Identity Shift, the Shape of a...

Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0 Richard Thieme Author and Professional Speaker, ThiemeWorks This presentation is beyond fiction. Current research...

View Article

Browsing latest articles
Browse All 133 View Live




Latest Images