Vídeos de DEF CON 24
- October 14, 2016
- tuxotron
- WIFI 204 Insteon, Inste off, Inste open
- WIFI 202 Evil ESP
- WIFI 201 WCTF Day 2 Kickoff
- WIFI 105 Introducing the HackMeRF
- WIFI 104 Handing Full Control of the Radio Spectrum Over to the Machines
- WIFI 103 How Do IBLE Hacking
- WIFI 102 Decoding LoRa Exploring Next Gen Wireless
- WIFI 101 Wireless Capture the Flag Inbrief
- Weaponizing Data Science for Social Engineering Automated E2E spear phishing on Twit
- weaponize your feature codes
- VLAN hopping, ARP poisoning & MITM Attacks in Virtualized Environments
- Use Their Machines Against Them Loading Code with a Copier
- Universal Serial aBUSe Remote physical access attacks
- toxic proxies bypassing HTTPS and VPNs to pwn your online identity
- The Remote Metamorphic Engine Detecting, Evading, Attacking the AI and Reverse Engin
- the next gen of emergency ph0nage
- T1 Jeopardy 2
- T1 Jeopardy 1
- Stumping the Mobile Chipset
- sticky keys to the kingdom
- Stargate Pivoting Through VNC To Own Internal Networks
- so you think you want to be a pentester
- Slouching Towards Utopia The State of the Internet Dream
- Sk3wlDbg Emulating all well many of the things with Ida
- Six Degrees of Domain Admin
- Side channel attacks on high security electronic safe locks
- sentient storage do ssd's have a mind of their own
- secure penetration testing operations
- SE 301 The Live SE Podcast
- SE 205 Advanced Social Engineering Techniques and The Rise of Cyber Scam Industrial
- SE 204 How to Un Work your job Revolutionism Radicals, and Engineering by Committee
- SE 203 SCAM CALL Call Dropped
- SE 202 Total Fail and Bad Mistakes I've Made a Few
- SE 201 Human Hacking You ARE the weakest link
- SE 105 You are being manipulated
- SE 104 US Interrogation Techniques and Social Engineering
- SE 103 7 Jedi Mind Tricks Influence Your Target without a Word
- SE 102 The Wizard of Oz Painting a reality through deception
- SE 101 Does Cultural differences become a barrier for social engineering
- Samsung Pay Tokenized Numbers, Flaws and Issues
- Robot Hacks Video Games How TASBot Exploits Consoles with Custom Controllers
- Retweet to win How 50 lines of Python made me the luckiest guy on Twitter
- Research on the Machines Help the FTC Protect Privacy & Security
- real time bluetooh device detection with blue hydra
- propaganda and you
- Project CITL
- Playing Through the Pain The Impact of Secrets and Dark Knowledge
- Platform Agnostic Kernel Fuzzing
- pin2pwn How to Root an Embedded Linux Box with a Sewing Needle
- Picking Bluetooth Low Energy Locks from a Quarter Mile Away
- phishing without failure and frustration
- PH 301 Packet Hacking Village, Block 5
- PH 202 Packet Hacking Village, Block 4
- PH 201 Packet Hacking Village, Block 3
- PH 102 Packet Hacking Village, Block 2
- PH 101 Packet Hacking Village, Block 1
- network protocol reverse engineering
- Mr Robot Panel
- MouseJack Injecting Keystrokes into Wireless Mice
- mouse jiggler offense and defense
- malware command and control channels a journey into darkness
- Maelstrom are you plaing with a full deck
- Machine Duping Pwning deep learning systems
- LOCK 302 Sesame Style Pad Locks
- LOCK 203 Intro to LockpickingPower
- LOCK 202 Intro to LockpickingPower
- LOCK 201 Intro to LockpickingDuffley
- LOCK 104 Intro to Lock PickingFitzhugh
- LOCK 102 Locking Picking 101
- LOCK 101 Locking Picking 101
- Light Weight Protocol! Serious Equipment! Critical Implications!
- Let's Get Physical Network Attacks Against Physical Security Systems
- Jittery MacGyver Lessons Learned from Building a Bionic Hand out of a Coffee Maker
- I've got 99 Problems, but LittleSnitch ain't one
- IOT 203 Tranewreck More Internet, More Problems
- IOT 202 Reversing and Exploiting Embedded Devices
- IOT 103 Is Your Internet Light On Protecting Consumers In the Age of Connected Every
- IOT 102 Btlejuice The Bluetooth Smart Mitm Framework
- Introduction the Wichcraft Compiler Collection Towards universal code theft
- inexpensive coordinated gsm anomaly detection
- I Fight For The Users, Episode I Attacks Against Top Consumer Products
- How To Remote Control An Airliner Security Flaws in Avionics
- How to overthrow a Government
- How to Make Your Own DEF CON Black Badge
- how to launch or improve your vulnerablitity research game
- how to generate a 4tbs DDOS for $5
- How to do it Wrong Smartphone Antivirus and Security Applications Under Fire
- How to design distributed systems resilient despite malicious participants
- how to build a processor in 10 minutes or less
- Honey Onions Exposing Snooping Tor HSDir Relays Guevara Noubir & Amirali Sanatinia
- Hiding Wookiees in HTTP HTTP smuggling
- HH 301 Basics of EAGLE CAD and PCB design tips
- HH 201 Basic Firmware Extraction
- HH 102 Why Amateur Radio in the Age of the Internet
- HH 101 Building malicious hardware out of analog circuits
- Help, I've got ANTs!!!
- Hacking Next Gen ATM's From Capture to Cashout
- Hacking Hotel Keys and Point of Sale systems
- hacking boarding passes for fun and profit
- Hacker Machine Interface State of the Union for SCADA HMI Vulnerabilities
- Game over, man! Reversing Video Games to Create an Unbeatable AI Player
- frontrunning the frontrunners
- Forcing a Targeted LTE Cellphone into Unsafe Network
- feds and 0days from before hearthbleed to after FBI apple
- Exploiting and attacking seismological networks remotely
- exploit mitigation techniques on iOS
- Examining the Internet's pollution
- esoteric exfiltration
- escaping the sandbox by not breaking it
- Drunk Hacker History Hacker Stories Powered by C2H6O for Fun & Profit
- Drones Hijacking multi dimensional attack vectors & countermeasures
- DIY Nukeproofing a new dig at data mining
- Discovering and Triangulating Rogue Cell Towers
- Direct Memory Attack the Kernel
- Developing Managed Code Rootkits for the Java Runtime Environment
- DEF CON Welcome & Badge Talk
- def con 101 panel III rise of the noobs
- DC 202
- DARPA Cyber Grand Challenge Award Ceremony
- Cyber Who Done It! Attribution Analysis Through Arrest History
- Cyber Grand Shellphish
- Cunning with CNG Soliciting Secrets from Schannel
- Crypto State of the Law
- CP 301 My Usability Goes to 11 A Hacker's Guide to User Experience Research
- CP 203 Catching a cheat practical exercise in code breaking
- CP 202 Blue Coat SSL Visibility Exposed
- CP 103 How to Backdoor Diffie Hellman
- CP 102 Security Logs Aren't Good Enough
- CP 101 Revocation, the Frailty of PKI
- compelled decryption state of the art doctrinal perversions
- Closing Ceremonies
- Cheap Tools for Hacking Heavy Trucks
- CH 201
- CH 301 Understanding Heavy Truck Event Data
- CH 203 Security Flaws in Automotive Immobilizer
- CH 202 Deep Learning on CAN BUS
- CH 103 Hacking the CHV Badge
- CH 102 The Mitsubishi Hack Explained
- CH 101 Vehicle to Infrastructure V2X
- CANSPY A Framework for Auditing CAN Devices
- Can You Trust Autonomous Vehicles Contactless Attacks
- CAN i haz car secret plz
- Bypassing Captive Portals and Limited Networks
- BSODomizer
- Breaking the Internet of Vibrating Things
- BlockFighting with a Hooker BlockfFghter2!
- BIO 305 Attention Hackers Cannabis Needs Your Help!
- BIO 304 Implants
- BIO 303 Hacking Perception
- BIO 302 CrisprCas9 Newest Tools for Biohacking Fun!
- BIO 301 Nootropics Better Living Through Chemistry or Modern Day Prometheus
- BIO 206 Transcranial Direct Current Stimulation Brain Stimulation the Do It Yourself
- BIO 205 Intro to Brain Based Authentication
- BIO 204 The Next Big Thing in Bioterrorism
- BIO 203 The Era of Bio Big Data Benefits and Challenges for Information Security, He
- BIO 202 The Bioethics of BioHacking
- BIO 201 Oday for the Soul
- Beyond the MCSE Red teaming active directory
- Backdooring the Frontdoor
- auditing 6loWPAN networks
- Attacking BaseStations an Odyssey through a Telco's Network
- Ask the EFF
- anti forensics AF
- An introduction to Pinworm man in the middle for your metadata
- All Your Solar Panels are belong to Me
- ADD 3 SDR Tips and Tricks
- ADD 2 Covert Cupid Under 11 Veil Approach for Covert WiFi
- ADD 1 I Amatuer Radio And So Can You!
- Abusing Bleeding Edge Web Standards for AppSec Glory
- A Monitor Darkly Reversing and Exploiting Ubiquitous
- 401 a frame work for managing security allerts
- 101 ways to brick your hardware
- Abusing Smart Cities the dark age of modern mobility
Junto con las presentaciones de DEF CON 24, ya también tenemos acceso a los vídeos:
Vídeos de Black Hat USA 2016
- October 11, 2016
- tuxotron
- Why This Internet Worked How We Could Lose It and the Role Hackers Play
- A Journey From JNDI/LDAP Manipulation to Remote Code Execution Dream Land
- The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
- Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
- Applied Machine Learning for Data Exfil and Other Fun Topics
- Canspy: A Platform for Auditing Can Devices
- Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization
- Over the Edge: Silently Owning Windows 10's Secure Browser
- How to Make People Click on a Dangerous Link Despite Their Security Awareness
- Certificate Bypass: Hiding and Executing Malware From a Digitally Signed Executable
- Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network
- Drone Attacks on Industrial Wireless: A New Front in Cyber Security
- Hackproofing Oracle Ebusiness Suite
- Using Undocumented CPU Behavior to See Into Kernel Mode and Break Kaslr in the Process
- Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool
- Measuring Adversary Costs to Exploit Commercial Software
- Removing Roadblocks to Diversity
- HEIST: HTTP Encrypted Information Can Be Stolen Through TCP-Windows
- Memory Forensics Using Virtual Machine Introspection for Cloud Computing
- Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- Towards a Holistic Approach in Building Intelligence to Fight Crimeware
- Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root
- The Remote Malicious Butler Did It!
- Xenpwn: Breaking Paravirtualized Devices
- PWNIE
- An Open Collaborative Effort to Ameliorate Android N-Day Root Exploits
- Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages
- 1000 Ways to Die in Mobile Oauth
- A Retrospective on the Use of Export Cryptography
- Windows 10 Segment Heap Internals
- Abusing Bleeding Edge Web Standards for Appsec Glory
- AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
- Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
- Augmenting Static Analysis Using Pintool: Ablation
- An Insider's Guide to Cyber-Insurance and Security Guarantees
- Cunning With Cng: Soliciting Secrets From Schannel
- Beyond the Mcse: Active Directory for the Security Professional
- Does Dropping Usb Drives in Parking Lots and Other Places Really Work?
- Demystifying the Secure Enclave Processor
- I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache
- Breaking Payment Points of Interaction (POI)
- Into the Core: In-Depth Exploration of Windows 10 IoT Core
- Hacking Next-Gen Atms: From Capture to Cashout
- Can You Trust Me Now? An Exploration Into the Mobile Threat Landscape
- Investigating DDOS - Architecture Actors and Attribution
- Intra-Process Memory Protection for Applications on ARM and X86: Leveraging the ELF ABI
- Capturing 0Day Exploits With Perfectly Placed Hardware Traps
- Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators
- HTTP/2 & Quic - Teaching Good Protocols to Do Bad Things
- Pwning Your Java Messaging With Deserialization Vulnerabilities
- Language Properties of Phone Scammers: Cyberdefense At the Level of the Human
- Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy
- The Linux Kernel Hidden Inside Windows 10
- O-Checker: Detection of Malicious Documents Through Deviation From File Format Specifications
- The Tao of Hardware the Te of Implants
- Access Keys Will Kill You Before You Kill the Password
- Hell on Earth: From Browser to System Compromise
- Discovering and Exploiting Novel Security Vulnerabilities in Apple Zeroconf
- BadWPAD
- Breaking Kernel Address Space Layout Randomization (Kaslr) With Intel TSX
- Airbnbeware: Short Term Rentals Long Term Pwnage
- Account Jumping Post Infection Persistency & Lateral Movement in AWS
- Captain Hook: Pirating Avs to Bypass Exploit Mitigations
- Hardening AWS Environments and Automating Incident Response for AWS Compromises
- Crippling HTTPs With Unholy PAC
- Horse Pill: A New Type of Linux Rootkit
- Design Approaches for Security Automation
- Greatfet: Making Goodfet Great Again
- SGX Secure Enclaves in Practice: Security and Crypto Review
- Using EMET to Disable EMET
- Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
- Viral Video - Exploiting Ssrf in Video Converters
- AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasion
- Windows 10 Mitigation Improvements
- Brute-Forcing Lockdown Harddrive Pin Codes
- Building a Product Security Incident Response Team: Learnings From the Hivemind
- Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
- Cyber War in Perspective: Analysis From the Crisis in Ukraine
- Breaking Fido: Are Exploits in There?
- Security Through Design - Making Security Better By Designing for People
- Iran's Soft-War for Internet Dominance
- Side-Channel Attacks on Everyday Applications
- The Risk From Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack
- Unleash the Infection Monkey: A Modern Alternative to Pen-Tests
- OSS Security Maturity: Time to Put on Your Big Boy Pants!
- Watching Commodity Malware Get Sold to a Targeted Actor
- PanGu 9 Internals
- A Lightbulb Worm?
- BadTunnel: How Do I Get Big Brother Power?
- PLC-Blaster: A Worm Living Solely in the PLC
- A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
- Dungeons Dragons and Security
- The Year in Flash
- Dark Side of the DNS Force
- VoIP Wars: the Phreakers Awaken
- Keystone Engine: Next Generation Assembler Framework
- Pindemonium: A DBI-Based Generic Unpacker for Windows Executable
- Web Application Firewalls: Analysis of Detection Logic
- Defense At Hyperscale: Technologies and Policies for a Defensible Cyberspace
Ya también están disponibles de los vídeos de Black Hat USA 2016, así como el material presentado:
Vídeos de GrrCON 2016
- October 10, 2016
- tuxotron
- 116 Security Guards LOL Brent White Tim Roberts
- 115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years
- 318 Welcome to The World of Yesterday Tomorrow Joel Cardella
- 317 On being an Eeyore in Infosec Stefan Edwards
- 217 Phish your employees for fun Kristoffer Marshall
- 216 Binary Ninja Jared Demott
- 316 Piercing the Air Gap Network Steganography for Everyone John Ventura
- 315 So Youve Inherited a Security Department Now What Amanda Berlin
- 215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller
- 214 Tales from the Cryptanalyst Jeff Man
- 114 Breaking Android Apps for Fun and Profit Bill Sempf
- 113 Back to the Future Understanding our future but following the past Kevin Johnson
- 313 Alignment of business and IT Security Shane Harsch
- 213 Money Fame Power Build your success as a security professional Nathan Dragun
- 212 Machine Duping Pwning Deep Learning Systems Clarence Chio
- 211 Magnetic Stripes 101 Tyler Keeton
- 112 Guarding Lunch J Wolfgang Goerlich
- 111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin
- 110 and bad mistakes Ive made a few Jayson Street
- 312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman
- 312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman
- 110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so)
- 210 Encryption Mobility Cloud Oh My Bill Harmer
- 209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma
- 311 Stop attacking your mothers car Charles Parker II
- 208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey
- 207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra
- 310 How to Implement Crypto Poorly Sean Cassidy
- 309 Reality Checking Your AppSec Program Darren Meyer
- 308 Bad Guys Look Just Like You Justin Beard
- 205 Threat Detection Response with Hipara J Brett Cunningham
- 204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado
- 203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0
- 108 Secure Dicks Michael Kemp
- 206 still broken after all these years aka utility security for smarties doug nibbelink
- 307 Getting to the Root of Advanced Threats Before Impact Josh Fazio
- 306 Fighting the Enemy Within Matt Crowe
- 305 How Do You Secure What You Dont Control Dimitri Vlachos
- 304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F
- 303 Make STEHM Great Again David HealWHans Schwartzberg
- 205 Threat Detection Response with Hipara J Brett Cunningham
- 204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado
- 203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0
- 105 Abnormal Behavior Detection in Large Environments Dave Kennedy
- 302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob
- 300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould
- 202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth
- 201 So You Want to Be a Pentester Absolute0x0
- 200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong
- 103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau
- 102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts
- 100 Act Three The Evolution of Privacy Finux
Ya tenemos acceso a los vídeos de las charlas de GrrCON 2016, celebrada en Michigan los pasados 6 y 7 de octubre.
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec