Vídeos de la Defcon 19
Ya están disponibles los vídeos de la Defcon 19:
- Dark Tangent and LosTboY - Welcome and Making of the DEF CON Badge
- Panel - Network Security Podcast
- Panel - Meet The Federal Agent 2.0
- Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks
- Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too
- Chema Alonso and Juan Garrido - Dust Your Feed RSS Belongs To You! Avoid Censorship!
- Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE
- James Myrcurial Arlen - Security When Nano Seconds Count
- Mike Arpaia and Ted Reed - Beat to 1337 Creating A Successful University Cyber Defense Organization
- Adam Baldwin - Pillaging DVCS Repos For Fun And Profit
- Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken
- Bruce Grymoire Barnett - Deceptive Hacking How Misdirection Can Be Used To Steal Information Without Being Detected
- Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database
- Olivier Bilodeau - PacketFence The Open Source Nac What Weve Done In The Last Two Years
- Emmanuel Bouillon - Federation and Empire
- Sam Bowne - Three Generations of DoS Attacks
- David Bryan and Luiz Eduardo - Building The DEF CON Network Making A Sandbox For 10000 Hackers
- Jeff Bryner - Kinectasploit Metasploit Meets Kinect
- Jamie Butler - Physical Memory Forensics for Cache
- Carey Rude and Vandevanter - Metasploit vSploit Modules
- George Chamales - Lives On The Line Securing Crisis Maps In Libya Sudan And Pakistan
- Ming Chow - Abusing HTML5
- Mouse and Renderman - Familiarity Breeds Contempt
- Christopher Cleary - Operational Use of Offensive Cyber
- Tyler Cohen - Look At What My Car Can Do
- Kees Cook - Kernel Exploitation Via Uninitialized Stack
- Greg Conti - The Art and Science of Security Research
- Paul Craig - Internet Kiosk Terminals The Redux
- Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies
- Daniel Crowley - Speaking with Cryptographic Oracles
- Phil Cryer - Taking Your Ball And Going Home Building Your Own Secure Storage Space That Mirrors Dropbox Functionality
- Panel - PCI 2 Still Compromising Controls and Compromising Security
- Panel - Former Keynotes The Future
- datagram - Introduction to Tamper Evident Devices
- Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us
- Deviant Ollam - Safe to Armed in Seconds A Study of Epic Fails of Popular Gun Safes
- Whitfield Diffie and Moxie Marlinspike
- Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation
- Alva Skip Duckwall - A Bridge Too Far Defeating Wired 8021x with a Transparent Bridge Using Linux
- Nelson Elhage - Virtualization Under Attack Breaking out of KVM
- Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network
- Patrick Engebretson and Josh Pauli - Mamma Dont Let Your Babies Grow Up to be Pen Testers
- eskimo - Steganography and Cryptography 101
- Eston Abraham and Johnson - Dont Drop the SOAP Real World Web Service Testing for Web Hackers
- Ben Feinstein and Jeff Jarmoc - Get Off of My Cloud Cloud Credential Compromise and Exposure
- Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing
- Gus Fritschie and Mike Wright - Getting F***** On the River
- Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic
- Daniel Garcia - UPnP Mapping
- Andrew Gavin - Gone in 60 Minutes Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
- Kenneth Geers - Strategic Cyber Security An Evaluation of Nation-State Cyber Attack Mitigation Strategies
- Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security
- Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang
- Panel - Represent Defcon Groups Hackerspaces and You
- Panel - Smartfuzzing the Web Carpe Vestra Foramina
- Rob Havelt and Wendel Guglielmetti Henrique - Earth vs The Giant Spider Amazingly True Stories of Real Penetration Tests
- Deral Heiland - From Printer To Pwnd Leveraging Multifunction Printers During Penetration Testing
- Thomas Holt and Max Kilger - Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
- Rick Howard - An Insiders Look at International Cyber Security Threats and Trends
- Hubris and a5h3r4h - Anonymous Cyber War
- Mikko Hypponen - The History and the Evolution of Computer Viruses
- Hackajar - Economics of Password Cracking in the GPU Era
- Aseem Jakhar - Jugaad Linux Thread Injection Kit
- Matt Joyce - The Art of Trolling
- Dan Kaminsky - Black Ops of TCPIP 2011
- Dave Kennedy - Hacking Your Victims Over Power Lines
- Brian Kennish - Tracking the Trackers How Our Browsing History Is Leaking into the Cloud
- Alexander Kornbrust - Hacking and Securing DB2 LUW Databases
- Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet
- Matt Krick - DCFluX in License to Transmit
- Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia
- Lawson Potter and Deviant Ollam - And Thats How I Lost My Eye Exploring Emergency Data Destruction
- Grayson Lenik - Im Your MACbDaddy
- Katy Levinson - Dont Fix It In Software
- Steven Levy - We Owe it All to the Hackers
- Ryan Linn - PIG Finding Truffles Without Leaving A Trace
- David Litchfield - Hacking and Forensicating an Oracle Database Server
- Johnny Long - Johnny Long and Hackers for Charity
- William Manning - Pervasive Cloaking
- Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security
- Moxie Marlinspike - SSL And The Future Of Authenticity
- Jon McCoy - Hacking Net Applications The Black Arts
- Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit
- John McNabb - Vulnerabilities of Wireless Water Meter Networks
- Charlie Miller - Battery Firmware Hacking
- Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale
- Steve Ocepek - Blinkie Lights Network Monitoring with Arduino
- Panel - Ask EFF The Year in Digital Civil Liberties
- Kyle Osborn and Matt Johanson - Hacking Google Chrome OS
- Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP
- Nicole Ozer - Big Brother on the Big Screen
- Nicholas Percoco and Paul Kehrer - Getting SSLizzard
- Nicholas Percoco and Jibran Ilyas - Malware Freak Show 3 Theyre pwning erbody out there
- Nicholas Percoco and Sean Schulte - This is REALLY not the droid youre looking for
- Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit
- Gregory Pickett - Port Scanning Without Sending Packets
- Jason Pittman - My password is FullOfFail The Core Problem with Authentication and How We Can Overcome It
- Mahmud Ab Rahman - Sneaky PDF
- Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST
- Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves
- Michael Robinson - What Time Are You Anyway
- The Dark Tangent and Russ Rogers - DEF CON Awards
- Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011
- Michael Scarito - Build your own Synthetic Aperture Radar
- Panel - Net Neutrality Panel
- Michael theprez98 Schearer - WTF Happened to the Constitution The Right to Privacy in the Digital Age
- Jason Scott - Archive Team A Distributed Preservation of Service Attack
- Justin Searle - Attacking and Defending the Smart Grid
- Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware
- Shrdlu - Are You In Yet The CISOs View of Pentesting
- Skunkworks - Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
- Reeves Smith - How Haunters Void Warranties
- Panel - SCADA and PLCs in Correctional Facilities: The Nightmare Before Christmas
- Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin
- Sumner alien and alison b - Weaponizing Cyberpsychology and Subverting Cybervetting for Fun Profit and Subterfuge
- Bruce Sutherland - How To Get Your Message Out When Your Government Turns Off The Internet
- Martin Holst Swende and Patrik Karlsson - Web Application Analysis With Owasp Hatkit
- Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform
- Richard Thieme - Staring into the Abyss The Dark Side of Crime-fighting Security and Professional Intelligence
- Tobias Fiddler and Bluzmanis - Insecurity An Analysis Of Current Commercial And Government Security Lock Designs
- Schuyler Towne - DIY Non-Destructive Entry
- Marketa Trimble - The Future of Cybertravel Legal Implications of the Evasion of Geolocation
- Shawn Webb - Runtime Process Insemination
- Matt scriptjunkie Weeks - Network Nightmare Ruling The Nightlife Between Shutdown And Boot With Pxesploit
- Yekaterina Tsipenyuk ONeil and Erika Chin - Seven Ways to Hang Yourself with Google Android
- Jos Weyers - Key Impressioning
- Thomas Wilhelm - Staying Connected during a Revolution or Disaster
- Andrew Wilson and Michael Brooks - Traps of Gold
- Brad Woodberg - Network Application Firewalls Exploits and Defense
- Joey Zhu - Phishing and Online Scam in China
- Zoz and Andrea Bianchi - Vanquishing Voyeurs Secure Ways To Authenticate Insecurely
- Panel - Is it 0-day or 0-care
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec