Vídeos de DEF CON 23
Finalmente se están publicando los vídeos de DEF CON 23. Ya llevan un tiempo publicándolos en listas agrupadas por temas. Todavía no están todos, pero ya hay bastante material. Iremos actualizando esta entrada a medida que vayan publicando más. Por ahora estos son los que hay:
- Automotive Hacks
- Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S
- Vehicle Hacking Village - Josh Corman - Safer Sooner Automotive Cyber Safety
- Vehicle Hacking Village - Eric Evenchick - SocketCAN
- Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to Wireles
- Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle
- Vehicle Hacking Village - Nathan Hoch - The Badge and PAWN: Customizing the Badge
- Internet Of Things
- Runa Sandvik, Michael Auger - Hacking a Linux-Powered Rifle
- Qing Yang - Im A Newbie Yet I Can Hack ZigBee
- IoT Village - Wesley Wineberg - Cameras Thermostats and Home Automation Controllers
- IoT Village - K Reid Wrightman - Vulnerability Inheritance in PLCs
- IoT Village - Kenneth Shaw - The Grid - A Multiplayer Game of Destruction
- IoT Village - Daniel Miessler - IoT Attack Surface Mapping
- IoT Village - Brian Knopf - Yes You Can Walk on Water
- IoT Village - Aaron Guzman - Security - the IoT World
- Wireless
- Graham and Maynor - HamSammich â Long Distance Proxying Over Radio
- DEF CON 23 Conference - Andres Blanco, Andres Gazzoli - 80211 Massive Monitoring
- Wireless Village - Wireless Warrior - Covert Wireless Practical Hacker LPI LPD
- Wireless Village - Vivek Ramachandran and Thomas Dotreppe - WPA Enterprise Hacking
- Wireless Village - V. Ramachandran - Automatic Live WPA WPA2 Attacks and WPA Supplicant
- Wireless Village - Travis Goodspeed, Sergey Bratus - PSK31 Modulation Polyglots
- Wireless Village - Tim Oshea - GNU Radio Tools for Radio Wrangling/Spectrum Domination
- Wireless Village - Michael Calabro - Software Defined Radio Performance Trades & Tweaks
- Wireless Village - Karl Koscher - DSP for SDR
- Wireless Village - JoshInGeneral - Meeting People Over WiFi
- Wireless Village - Kitchen and Kinne - Sniffin WiFi Sippin Pineapple Juice
- Wireless Village - Cyb3r Assassin - Wireless Pentesting: So Easy a Cave Man Can Do It
- Wireless Village - Catatonic - Tospo Virus: Weaponizing WiFi Pineapple Vulnerabilities
- Wireless Village - Balint Seeber - SIGINT & Blind Signal Analysis w/ GNU Radio & SDR
- Crypto
- Panel - Lets Encrypt Minting Free Certs to Encrypt the Entire Web
- Justin Engler - Secure Messaging for Normal People
- Eijah - Crypto for Hackers
- David Huerta - Alice and Bob are Really Confused
- Bruce Schneier - Questions and Answers
- Ryan Castellucci - Cracking CryptoCurrency Brainwallets
- Jose Selvi - Breaking SSL Using Time Synchronisation Attacks
- Crypto and Privacy Village - Robert Olson - Teaching Privacy Using Red Team Strategies
- Crypto and Privacy Village - Nick Sullivan - CFSSL the evolution of a PKI toolkit
- Crypto and Privacy Village - Carlson and Doherty - Breaking CBC
- Crypto and Privacy Village - Craig Young - Smart Home Invasion
- Crypto and Privacy Village - Freddy Martinez - IMSI Catchers
- Crypto and Privacy Village - Marina - Hacking Quantum Cryptography
- Biohacking
- Scott Erven and Mark Collao -Medical Devices: Pwnage and Honeypots
- Richard Thieme - Hacking the Human Body and Brain
- BioHacking Village - Whitlock and Aganovic - Physiology from the Perspective of Control
- BioHacking Village - Walter Powell - Parallels in BioSec and InfoSec
- BioHacking Village - Panel - The Anatomy of DIY Implantable Devices
- BioHacking Village - Alex Smith - Cloning Access Cards to Implants
- BioHacking Village - Johan Sosa - Genetic engineering - GMO for fun and profit
- BioHacking Village - Keoni Gandall - Biohacking at Home
- BioHacking Village - Michael Goetzman - Social Implications of DNA Acquisition
- BioHacking Village - Alejandro Hernández - Brain Waves Surfing - (In)security in EEG
- Hardware and Lockpicking
- Lock Picking Village - Intro to Lockpicking 2
- Lock Picking Village - Intro to Lockpicking 1
- DEF CON 23 - Lock Picking Village - Impressioning
- Hardware Hacking Village - Soldering 101 - Melting metal for fun and profit
- Hardware Hacking Village - Nikhil Mittal - Hacking with Human Interface Devices
- Hardware Hacking Village - Matt DuHarte - Introduction to USB and Fuzzing
- Hardware Hacking Village - Dr. Tran - Introduction to Lockpicking
- Hardware Hacking Village - Machinist - Mechanical Engineering for Noobs
- DEF CON 23 - Teddy Reed and Nick Anderson - Hardware and Trust Security ELI5
- Dan Petro and Oscar Salaza - Hacking Smart Safes: On the Brink of a Robbery
- Mike Ryan and Richo Healey - Hacking Electric Skateboards
- AmmonRa - How to Hack Your Way out of Home Detention
- Packet Hacking Village
- Packet Capture Village - Wayne Crowder - Fishing To Phishing
- Packet Capture Village - Vivek Ramachandran - 80211 Monitoring with PCAP2XML - SQLite
- Packet Capture Village - Tony Martin - From XSS to Root on Your NAS
- Packet Capture Village - Theodora Titonis - How Machine Learning Finds Malware
- Packet Capture Village - Sam Bowne - Is Your Android App Secure
- Packet Capture Village - Robert Simmons - The Digital Cockroach Bait Station
- Packet Capture Village - Ron Taylor - Violating Web Services
- Packet Capture Village - Paul Vixie - Passive DNS Collection and Analysis
- Packet Capture Village - Mike Raggo - Remaining Covert in an Overt World
- Packet Capture Village - Ming Chow - Tools and Techniques Used at the Wall of Sheep
- Packet Capture Village - Monzy Merza - Real World Automation for Rapid Response
- Packet Capture Village - Nikhil Mittal - Powershell for Penetraton Testers
- Packet Capture Village - Jay Beale - Jailing Programs via Docker
- Packet Capture Village - Joseph Muniz & Aamir Lakhani - Pen Testing with Raspberry Pi
- Packet Capture Village - Karl Koscher - Sniffing SCADA
- Packet Capture Village - Leon Ward - The Packets Made Me Do It - Using OpenFPC
- Packet Capture Village - Lokesh Pidawekar - Hackers Practice Ground
- Packet Capture Village - Michael Raggo - Mobile Data Loss - Threats and Countermeasures
- Packet Capture Village - Bob Simpson - MITM 101 - Easy Traffic Interception Techniques
- Packet Capture Village - Brian Wohlwinder and Andrew Beard - I See You
- Packet Capture Village - David Schwartzberg - Hacking the Next Generation
- Packet Capture Village - Elliot Brink - Global Honeypot Trends
- Packet Capture Village - Grecs - Creating REAL Threat Intelligence With Evernote
- Social Engineering
- Social Engineering Village - Tim Newberry - Twitter ISIL and Tech
- Social Engineering Village - Noah Beddome - Yellow Means Proceed with Caution
- Social Engineering Village - Michele Fincher - I Didnât Think it was Loaded
- Social Engineering Village - John Ridpath - Shakespeare and Social Engineering
- Social Engineering Village - Jayson E. Street - Breaking in Bad
- Social Engineering Village - Ian Harris - Understanding Social Engineering Attacks
- Social Engineering Village - Dave Kennedy - Understanding End-User Attacks
- Social Engineering Village - Chris Hadnagy - A Peek Behind the Blue Mask
- Social Engineering Village - Adam Compton & Eric Gershman - SpeedPhishing Framework
- Michael Schrenk - Applied Intelligence: Using Information Thats Not There
- Marte Loge - Tell me who you are and I will tell you your lock pattern
- Ken Westin - Confessions of a Professional Cyber Stalker
- Chris Rock - I Will Kill You
- Panels
- Panel - WhyMI so Sexy: WMI Attacks - Real Time Defense and Advanced Forensics
- Panel - ThunderStrike 2: Sith Strike
- Panel - Switches Get Stitches
- Panel - Licensed to Pwn: Weaponization and Regulation of Security Research
- DEF CON - Panel - Guests N Goblins: Exposing Wi Fi Exfiltration Risks and Mitigation
- DEF CON 23 - Panel - DEF CON Comedy Inception
- Panel - DEF CON 101: The Panel
- Panel - Ask the EFF: The Year in Digital Civil Liberties
- Panel - Abusing Adobe Readers JavaScript APIs
- Attack
- Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers
- Ian Kline - LTE Recon and Tracking with RTLSDR
- Fernando Arnabold - Abusing XSLT for Practical Attacks
- Dr Phil Polstra - One Device to Pwn Them All
- Dr Phil Polstra - Hacker in the Wires
- Damon Small - Beyond the Scan The Value Proposition of Vuln Assessment
- Brent White - Hacking Web Apps
- Aditya K Sood - Dissecting the Design of SCADA Web HMIs: Hunting Vulns
- Craig Young - How to Train Your RFID Hacking Tools
- Francis Brown, Shubham Shah - RFIDiggity: Guide to Hacking HF NFC & UHF RFID
- Geoff Walton and Dave Kennedy - Pivoting Without Rights: Introducing Pivoter
- Jeremy Dorrough - USB Attack to Decrypt Wi Fi Communications
- Mickey Shkatov & Jesse Michael - Scared Poopless â LTE and your laptop
- Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP Stack
- Nadeem Douba - BurpKit: Using WebKit to Own the Web
- Tamas Szakaly - Shall We Play a Game
- Wesley McGrew - I Hunt Penetration Testers: More Weaknesses in Tools and Procedures
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec