Vídeos DEF CON 26
Aquí os dejo los vídeos que se han publicado de DEF CON 26). Ya tenéis entretenimiento para el fin de semana que se avecina.
Recuerda que también tienes el material disponible.
- Rob Joyce - NSA Talks Cybersecurity
- Eyal Itkin, Yaniv Balmas - What the Fax?!
- Josh Mitchell - Ridealong Adventures: Critical Issues with Police Body Cameras
- Svea, Suggy, Till - Inside the Fake Science Factory
- Ladar Levison, hon1nbo - Booby Trapping Boxes
- 0x200b - Detecting Blue Team Research Through Targeted Ads
- [Si, Agent X - Wagging the Tail:Covert Passive Surveillance](https://www.youtube.com/watch?v=tYFOXeItRFM&list=PL9fPq3eQfaaD0cf5c7wkzMoj2kifz GO4U&index=8&t=0s)
- Alexei Bulazel - Reverse Engineering Windows Defenders Emulator
- Alfonso Alguacil and Murillo Moya - Playback a TLS 1 point 3 story
- Bui and Rao - Last mile authentication problem Exploiting the missing link
- Champion and Law - Building the Hacker Tracker
- Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86
- Christopher Domas - The Ring 0 Facade Awakening the Processors Inner Demons
- Damien virtualabs Cauquil - You had better secure your BLE devices
- Douglas McKee - 80 to 0 in Under 5 Seconds
- Daniel Crowley and Panel - Outsmarting the Smart City
- delta zero and Azeem Aqil - Your Voice is My Passport
- Daniel Zolnikov - A Politicians Successful Efforts to Fight Surveillance
- Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill Video
- Dr Rasthofer and Panel - Worrisome Security Issues in Tracker Apps
- Dr Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software
- Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other Things
- Foster and Ayrey - Dealing with Residual Certificates for Pre-owned Domains
- Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries
- Gabriel Ryan - Bypassing Port Security In 2018 Defeating MacSEC and 802 1x 2010
- George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray
- Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source Code
- Guang Gong - Pwning theToughest Target, the Largest Bug Bounty in the History of ASR
- HuiYu and Qian - Breaking Smart Speakers We are Listening to You
- Ian Haken - Automated Discovery of Deserialization Gadget Chains
- Izycki and Colli - Digital Leviathan A Comprehensive List of Nation State Big Brothers
- Jeanette Manfra - Securing our Nations Election Infrastructure
- Joe Rozner - Synfuzz Building a Grammar Based Retargetable Test Generation Framework
- Johnson and Stavrou - Vulnerable Out of the Box - Evaluation of Android Carrier Devices
- Josep Pi Rodriguez - WingOS: How to Own Millions of Devices .
- Kim and Choi - Your Watch Can Watch You! Pitfalls in the Samsung Gear Smartwatch
- Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools
- Krotofil , Wetzels - Thru the Eyes of the Attacker Designing Embedded Systems for ICS
- Lane Broadbent - Trouble in the Tubes How Internet Routing Security Breaks Down
- ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRF
- Levinson and Borges - Ill See Your Missile and Raise You A MIRV
- Maggie Mayhem - Sex Work After SESTA FOSTA
- Maksim Shudrak - Fuzzing Malware For Fun and Profit
- Martin Vigo - Compromising Online Accounts by Cracking Voicemail Systems
- Matt King - Micro Renovator Bringing Processor Firmware up to Code
- Galloway, Yunusov - For the Love of Money Finding and Exploiting Vulns in mPOS Systems
- Zhenxuan Bai and Panel - Replay Attacks on Ethereum Smart Contracts
- Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs
- Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 Sandbox
- zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits
- zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart Bear
- Zeng and Panel - Lora Smart Water Meter Security Analysis
- Zach and Alex - Infecting The Embedded Supply Chain
- Yu Wang - Attacking the macOS Kernel Graphics Driver
- yawnbox - Privacy Infrastructure Challenges and Opportunities
- Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN Con
- William Martin - SMBetray Backdooring and Breaking Signatures
- William Martin - One Click to OWA
- West and Campbell - barcOwned Popping Shells with Your Cereal Box
- Wesley McGrew - An Attacker Looks at Docker Approaching Multi Container Applications
- Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small Profit
- Truman Kain - Dragnet Your Social Engineering Sidekick
- Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures
- The Tarquin - Weaponizing Unicode Homographs Beyond IDNs
- The Dark Tangent and Panel - DEF CON GROUPS
- The Dark Tangent - Welcome To DEF CON & Badge Maker Talk
- The Dark Tangent - DEF CON 26 Closing Ceremonies
- Steven Danneman - Your Banks Digital Side Door
- smea - Jailbreaking the 3DS Through 7 Years of Hardening
- Slava Makkaveev - Man In The Disk
- singe - Practical and Improved Wifi MitM with Mana
- Shkatov and Michael - UEFI Exploitation for the Masses
- Sheng Hao Ma - Playing Malware Injection with Exploit Thoughts
- sghctoma - All Your Math are Belong to Us
- Sean Metcalf - Exploiting Active Directory Administrator Insecurities
- Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband
- Sanat Sharma - House of Roman a Leakless Heap Fengshui to Achieve RCE on PIE Binaries
- Ruo Ando - Asura PCAP File Analyzer for Anomaly Packets Detection
- Rowan Phipps - ThinSIM based Attacks on Mobile Money Systems
- Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly
- Romailler and Amiet - Reaping and Breaking Keys at Scale When Crypto Meets Big Data
- Rob Joyce - Building Absurd Christmas Light Shows
- Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise Blockchain
- Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking Crestron
- Richard Thieme - The Road to Resilience How Real Hacking Redeems a Damnable Profession
- Patrick Wardle - The Mouse is Mightier than the Sword
- Patrick Wardle - Fire and Ice Making and Breaking macOS Firewalls
- Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks
- Panel - DC 101 Panel
- Ossmann and Spill - Revolting Radios
- Orange Tsai - Breaking Parser Logic Take Your Path Normalization Off and Pop 0Days Out
- Nirenberg and Buchwald - Reverse Engineering Hacking Documentary Series
- Nick Cano - Relocation Bonus Attacking the Windows Loader
- Nevermoe - One Step Ahead of Cheaters Instrumenting Android Emulators
- Morgan Indrora Gangwere - (Ab)using Binaries from Embedded Devices for Fun and Profit
- Alexandre Borges - Ring 0 Ring 2 Rootkits Bypassing Defenses
- Berta and De Los Santos - Rock appround the Clock Tracking Malware Developers
- David Melendez Cano - Avoiding CounterDrone Systems with NanoDrones
- Eric Sesterhenn - In Soviet Russia Smartcard Hacks You
- Bai and Zheng - Analyzing and Attacking Apple Kernel Drivers
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec