Junto con las presentaciones de DEF CON 24, ya también tenemos acceso a los vídeos:
WIFI 204 Insteon, Inste off, Inste open WIFI 202 Evil ESP WIFI 201 WCTF Day 2 Kickoff WIFI 105 Introducing the HackMeRF WIFI 104 Handing Full Control of the Radio Spectrum Over to the Machines WIFI 103 How Do IBLE Hacking WIFI 102 Decoding LoRa Exploring Next Gen Wireless WIFI 101 Wireless Capture the Flag Inbrief Weaponizing Data Science for Social Engineering Automated E2E spear phishing on Twit weaponize your feature codes VLAN hopping, ARP poisoning & MITM Attacks in Virtualized Environments Use Their Machines Against Them Loading Code with a Copier Universal Serial aBUSe Remote physical access attacks toxic proxies bypassing HTTPS and VPNs to pwn your online identity The Remote Metamorphic Engine Detecting, Evading, Attacking the AI and Reverse Engin the next gen of emergency ph0nage T1 Jeopardy 2 T1 Jeopardy 1 Stumping the Mobile Chipset sticky keys to the kingdom Stargate Pivoting Through VNC To Own Internal Networks so you think you want to be a pentester Slouching Towards Utopia The State of the Internet Dream Sk3wlDbg Emulating all well many of the things with Ida Six Degrees of Domain Admin Side channel attacks on high security electronic safe locks sentient storage do ssd's have a mind of their own secure penetration testing operations SE 301 The Live SE Podcast SE 205 Advanced Social Engineering Techniques and The Rise of Cyber Scam Industrial SE 204 How to Un Work your job Revolutionism Radicals, and Engineering by Committee SE 203 SCAM CALL Call Dropped SE 202 Total Fail and Bad Mistakes I've Made a Few SE 201 Human Hacking You ARE the weakest link SE 105 You are being manipulated SE 104 US Interrogation Techniques and Social Engineering SE 103 7 Jedi Mind Tricks Influence Your Target without a Word SE 102 The Wizard of Oz Painting a reality through deception SE 101 Does Cultural differences become a barrier for social engineering Samsung Pay Tokenized Numbers, Flaws and Issues Robot Hacks Video Games How TASBot Exploits Consoles with Custom Controllers Retweet to win How 50 lines of Python made me the luckiest guy on Twitter Research on the Machines Help the FTC Protect Privacy & Security real time bluetooh device detection with blue hydra propaganda and you Project CITL Playing Through the Pain The Impact of Secrets and Dark Knowledge Platform Agnostic Kernel Fuzzing pin2pwn How to Root an Embedded Linux Box with a Sewing Needle Picking Bluetooth Low Energy Locks from a Quarter Mile Away phishing without failure and frustration PH 301 Packet Hacking Village, Block 5 PH 202 Packet Hacking Village, Block 4 PH 201 Packet Hacking Village, Block 3 PH 102 Packet Hacking Village, Block 2 PH 101 Packet Hacking Village, Block 1 network protocol reverse engineering Mr Robot Panel MouseJack Injecting Keystrokes into Wireless Mice mouse jiggler offense and defense malware command and control channels a journey into darkness Maelstrom are you plaing with a full deck Machine Duping Pwning deep learning systems LOCK 302 Sesame Style Pad Locks LOCK 203 Intro to LockpickingPower LOCK 202 Intro to LockpickingPower LOCK 201 Intro to LockpickingDuffley LOCK 104 Intro to Lock PickingFitzhugh LOCK 102 Locking Picking 101 LOCK 101 Locking Picking 101 Light Weight Protocol!
Leer más