Vídeos DEF CON 25
Aunque no son todos los vídeos de la DEF CON 25, ya hay bastantes disponibles. Aquí tenéis una lista organizada en varias secciones:
Main Track 1
- Cheng - The spear to break the security wall of S7CommPlus
- Christopher Domas - Breaking the x86 Instruction Set
- Damien Cauquil - Weaponizing the BBC Micro Bit
- Dennis Maldonado - Real time RFID Cloning in the Field
- Daniel Bohannon, Lee Holmes - Revoke Obfuscation: PowerShell Obfuscation
- Duncan Woodbury, Nicholas Haltmeyer - Linux Stack Based V2X Framework
- Dor Azouri - BITSInject
- Dimitry Snezhkov - Abusing Webhooks for Command and Control
- Gerald Steere, Sean Metcalf - Hacking the Cloud
- Gabriel Ryan - The Black Art of Wireless Post Exploitation
- Hanno Bõck - Abusing Certificate Transparency Logs
- Gil Cohen - Call the plumber: You have a leak in your named pipe
- Hyrum Anderson - Evading next gen AV using AI
- Itzik Kotler, Amit Klein - The Adventures of AV and the Leaky Sandbox
- Ilja van Sprundel - Are all BSDs are created equally? A survey of BSD kerne
- Jeff Moss and Panel - DEF CON Groups Panel
- Jason Haddix - Introducing HUNT Data Driven Web Hacking & Manual Testing
- Joe Rozner - Wiping out CSRF
- JoSh Pitts - Teaching Old Shellcode New Tricks
- K2 - UnFucking Forensics: Active Passive memory hacking debugging
- Luke Young - Thereâs no place like 127.001: Achieving reliable DNS rebinding
- Lee Holmes - Get $pwnd: Attacking Battle Hardened Windows Server
- Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authe
- Marc Newlin, Logan Lamb, Chris Grayson - CableTap: Wirelessly Tapping Home Networks
- Matt Knight - Radio Exploitation 101
- Matt Joyce - Amateur Digital Archeology
- Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level
- Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shui
- Mikhail Sosonkin - Hacking travel routers like it’s 1999
- Nick Cano - XenoScan Scanning Memory Like a Boss
- Nathan Seidle -Open Source Safe Cracking Robots: Combinations Under 1 Hour
- Redezem - PEIMA Using Power Laws to address Denial of Service Attacks
- Professor Plum - Digital Vengeance Exploiting the Most Notorious C&C Toolki
- Philip Tully, Michael T Raggo - A Picture is Worth a Thousand Words, Literally
- Saif El Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects
- Ryan Baxendale - Microservices and FaaS for Offensive Security
- Romain Coltel, Yves Le Provost - WSUSpendu: How to hang WSUS clients
- Sean Dillon, Zach Harding - Koadic C: Windows COM Command & Control Framework
- Scott Behrens, Jeremy Heffner - Application DoS In Microservice Architectures
- Salvador Mendoza - Exploiting 0ld Mag stripe information with New technology
- spaceB0x - Exploiting Continuous Integration (CI) and Automated Build systems
- Trey Forgety - Inside the âMeet Desaiâ Attack Defending Distributed Targets
- Tomer Cohen - Game of Chromes: Owning the Web with Zombie Chrome Extensions
- Thomas Mathew, Dhia Mahjoub - Malicious CDNs
- DEF CON 25 -The Dark Tangent, Def Con Goons - DEF CON Closing Ceremonies
- The Dark Tangent - Welcome to DEF CON 25
- Alvaro Muñoz, Alexandr Mirosh - Friday the 13th JSON attacks
- Avi Bashan, Slava Makkaveev - Everything to know about Android packers
- William Knowles - Persisting with Microsoft Office Abusing Extensibility Options
- XlogicX - Assembly Language is Too High Level
- Artem Kondratenko - Cisco Catalyst Exploitation
- Josh Schwartz, John Cramb - MEATPISTOL, A Modular Malware Implant Framework
- Andy Robbins, Will Schroeder - Designing Active Directory DACL Backdoors
Packet Hacking Village
- Chris Wysopal - How Hackers Changed the Security Industry
- Catherine Ullman, Chris Roberts - Breaking the Bad News
AFK2
- HighWiz, Malware Unicorn, Niki7a, Roamer, Wiseacre, Shaggy - DEF CON 101 Panel
- Inbar Raz, Eden Schochat - From One Country, One Floppy to Startup Nation
- Jason Hernandez, Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies
- John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome
- Matt Wixey - See no evil, hear no evil: Hacking invisibly & silently with light & sound
- Octane - Untrustworthy Hardware and How to Fix It
- Snide Owen - Phone system testing and other fun tricks
- Whitney Merrill, Terrell McSweeny - Tick, Tick, Tick Boom You’re Dead: Tech & the FTC
- Jason Staggs - Breaking Wind: Adventures Hacking Wind Farm Control Networks
Biohacking Village
- Stanislav Naydin, Vlad Gostomelsky - Medical Device Ethics
- Amanda Plimpton, Evan Anderson - Psychoactive Chemicals in Combat
- Christopher Frenz - Standardizing Deployment Of Medical Devices
- Kevin Sacco - Tales of A Healthcare Hacker
- Szkatulski Lawless - How Your Doctor Might Be Trying To Kill You
- Trevor Goodman - Hack Your Senses: Sensory Augementation
- Travis Lawrence - Hacking the Second Genetic Code
- Tim Cannon - The Moral Imperative of Biohacking
- Tess Schrodinger - Total Recall: Implicit Learning As Crypto
- Ryan Schmoll, Peter Hefley - Trigraph: Ethereum-based Teleradiology
- Robin Farmanfarmaian - The Patient as CEO
- RenderMan - Hacking The Internet of Dongs
- Paul Ashley - The Future is Fake Identities
- Meow Ludo Meow Meow - DIYBioweapons and Regulation
- Louis Auguste Jr - Microscopes Are Stupid
- Jun Axup - The Brave New World of Bio Entrepreneurship
- John Bass - Medical Industry Disrupt: Blockchain
- Jeffrey Tibbetts - Biohackers Die
- Jay Radcliffe - The Scientific Method in Security Research
- Gingerbread - Neurogenic Peptides Smart Drugs 4 Minute Mile
- Edward You - Biotechnology Needs A Security Patch Badly
- Amirs Panel - Ethics in BioHacking
- C00p3r, Cur50r - Implantable Technology Show and Tell
Mobile
- Yuwue Zheng, Lin Huang - Ghost Telephonist Impersonates You Through LTE CSF
- David Robinson - Using GPS Spoofing to control time
- Haoqi Shan, Jian Yuan - Man in the NFC
- Chaosdata - Ghost in the Droid: Possessing Android Applications with ParaSpectre
R00tz
- Tarah - How To Explain Crypto To Practically Anyone
- Rsnake Robert Hansen - Searching The Invisible Internet
- Patrick McCanna - Tips for Internet Privacy at College
- Leonard Bailey - Everything You Need To Know About The US Dept of Justice
- Erin Owens - Drone Wars
- Erin Owens - Hacking & Robotics v2 point 0
- EFF, Nic0 - Opening Ceremonies:A Place Where Kids Learn White Hat Hacking
- Deviant - Home Depot and A Plan of Attack for Hackers
- David Weinman - Introduction To Cheat Engine
- Cory Doctorow - You are not a Digital Native and that’s OK
- Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer
- Aron Rosenberg, Aaron Standridge - Hacking an Insecure WiFi Camera
- Alex Stamos, CSO Facebook - Keynote
Cryptocurrency
- Matt Suiche - Porosity A Decompiler For Blockchain Based Smart Contracts Bytecode
- Josh Datko, Chris Quartier - Breaking Bitcoin Hardware Wallets
- Konstantinos Karagiannis - Hacking Smart Contracts
Recon Village
- Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Recon
- Tracy Maleeff - Into the Bird’s Nest: A Comprehensive Look at Twitter
- Winner Announcement Prize Distribution
- Simon Roses - OSINT Tactics on Source Code and Developers
- Shane MacDougal - Keynote: Seeing is Believing The Future of Recon
- Mikhail Sasonkin - Up Close and Personal: Keeping an Eye On Mobile
- Leah Figueroa - FERPA: Only Grades Are Safe; OSINT In Higher Education
- Kunal Aggarwal - DataSploit Open Source Assistant for OSINT
- Jason Haddix - Domain Discovery:Expanding Your Scope Like A Boss
- Inbar Raz - Do Tinder Bots Dream of Electric Toys
- Guillermo Buendia, Yael Esquivel - How To Obtain 100 Facebooks a Day
- Dakota Nelson -Total Recoll
- Anthony Russell - Building Google For Criminal Enterprises
- Andrew Hay - An Introduction to Graph Theory for OSINT
- Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love Story
Car Hacking Village
- Corey Theun - Heavy Truck and Electronic Logging Devices
- Weston Hecker - Grand Theft Radio Stopping SDR Relay Attacks
- Vlad Gostomelsky - GPS System Integrity
- Tim b1tbane, Mitch Johnson, ehntoo - That’s No Car Its a Network
- Sheila Ayelen Berta, Claudio Caracciolo - The Bicho
- Sameer Dixit, Vlad Gostomelsky - Abusing Smart Cars with QR Codes
- Montalbano, Gillispie, Connett - Attacking Wireless Interfaces
- Jeffrey Quesnelle - An Introduction to AUTOSAR Secure Onboard
- Woodbury, Haltmeyer - Linux Stack Based V2X Framework
- Badge Life: DEFCON Unofficial Badges Panel
- Mickey Shkatov, Jesse Michael, Oleksandr Bazhaniuk - Driving down the rabbit hole
AFK
- Rhett Greenhagen - Skip Tracing For Fun and Profit
- J0n J4rv1s - Surveillance Capitalism Will Continue til Morale Improves
- [Deleted video]
- Gus Fritschie, Evan Teitelman - Backdooring the Lottery and Other Security Tales
- Svea Eckert, Andreas Dewes - Dark Data
- Yan Shoshitaishvili - 25 Years of Program Analysis
- Chris Sumner - Rage Against the Weaponized AI Propaganda Machine
- Ryan Lackey - Cypherpunks History
- Kevin Sacco - Tales of A Healthcare Hacker
Wifi Village
- Aardvark, Darkmatter - WIGLE Like You Mean It Maximizing Your Wardriving
- Woody, Tim Kuester - GODUMPiNG packet sniffing the Gotenna
- Vivek Ramachandran, Nishant Sharma, Ashish Bhangale- Deceptacon
- Robert Ghilduta - Designing An Automatic Gain Control
- Nick Delewski - Failsafe: Yet Another SimpliSafe Attack Vector
- Matt Blaze - Sigint for the rest of us
- Eric Escobar - SecureWorks: SDR Replay Attacks On Home Security Systems
- Balint Seeber - Hacking Some More of the Wireless World
- Andrew Strutt - Suitcase Repeater Build for UHF 70cm
- Andrew Strutt - POCSAG Amateur Pager Network
- Alexander Zakarov - Large Scale Wireless Monitoring: KISMET Packet Sniffer
Voting Village
- Jake Braun - Securing the Election Office A Local Response
- Joseph Hall, David Jefferson - Common Misconceptions and False Parallels
- Matt Blaze - How did we get here? A history of voting technology
- Mary Brady, Josh Franklin - The State of US Voting System Security
- Joseph Hall - Election Hacking: Legal Considerations from the Civil Side
- Harri Hursti - Brief history of election machine hacking
- General Douglas Lute - National Security Implications of Voting Attacks
- Barbara Simons, David Jefferson - Election Systems: More Than the Booth
SE Village
- Billy Boatright - Nor Lose The Common Touch
- Fahey Owens - Beyond Phishing â Building & Sustaining a Corporate SE Program
- Robert Wood - Thematic Social Engineering
- Yaiza Rubio, Félix Brezo - Heavy Diving For Credentials
- Tyler Rosonke - Social Engineering With Web Analytics
- Jayson Street - Strategies on Securing Your Banks and Enterprises
- Helen Thackray - Hackers Gonna Hack , But Do They Know Why?
- Chris Hadnagy - SE vs Predator: Using SE In Ways I Never Thought
- Brent White, Tim Roberts - Skills For A Red Teamer
- John Nye -The Human Factor Why Are We So Bad at Security
- Michele Fincher - Are You Killing Your Security Program?
- Keith Conway, Cameron Craig - Change Agents How to Affect Corp. Culture
ICS Village
- Arnaud Soullié - Fun with Modbus 0x5a Nothing New Still Relevant?
- DEF CON 25 ICS Village Blake Johnson Dissecting Industrial Wireless Implementations
- Bryson Bort, Atlas - Grid Insecurity and How to Really Fix This Shit
- Chris Sistrunk - What’s the DFIRence for ICS
- Joe Weiss - Cyber Security Issues with Level 0 through 1 Devices
- Thomas Brandsetter - InSecurity in Building Automation
Privacy
- Cooper Quintin, Kashmir Hill - The Internet Already Knows I’m Pregnant
- Jim Nitterauer - DNS: Devious Name Services Destroying Privacy & Anonymity w/o consent
- Peyton Engel - Learning about Government Surveillance Software
- Roger Dingledine - Next Generation Tor Onion Services
- Richard Thieme - When Privacy Goes Poof! Why It’s Gone and Never Coming Back
- Tess Schrodinger - Total Recall Implanting Passwords in Cognitive Memory
- Weston Hecker - Opt Out or Deauth Trying! AntiTracking Bots & Keystroke Injection
IoT
- Steinthor Bjarnason, Jason Jones - The call is coming from inside the house
- Sarah Zatko - CITL and the Digital Standard: A Year Later
- Zenofex, 0x00string, CJ 000, Maximus64 - All Your Things Are Belong To Us
- Francis Brown, David Latimer - Putting the Emerging Drone Defense Market to the Test
- Andrew Tierney, Ken Munro - IoT From DVRs to Dildos
- Alex Jay Balan - IoT: The Gift That Keeps on Giving
- Aaron Guzman - Hide Yo Keys, Hide Yo Car
- Aaron Alva, Mark Eichorn - IoT Updates to Help Protect Consumers
- Deral Heiland - The Internet of Vulnerabilities
- Dan Regalado - Inside the Alaris Infusion Pump, not too much medicine, plz
- Brian Knopf - Redesigning PKI For IoT Because Crypto is Hard
- Vladimir Dashchenko, Sergey Temnikov - Pwning the Industrial IoT
- Vivek Ramachandran, Nishant Sharma, Ashish Bhangale - IIDS: IDS FOR IOT
- Rick Ramgattie - Rethinking the Researcher-Vendor Relationshipe
- Caleb Madrigal - Controlling IoT devices with crafted radio signals
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec