DEF CON 22 [Materials] Speeches from the Hacker Convention.
Podcast image
Zach Fasel - Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools </buzzwords>
December 13, 2014
Will Schroeder - Veil-Pillage: Post-exploitation 2.
December 13, 2014
Fatih Ozavci - VoIP Wars: Attack of the Cisco Phones
December 13, 2014
Dominic White and Ian de Villiers - Manna from Heaven: Improving the state of wireless rogue AP attacks
December 13, 2014
Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense
December 13, 2014
Michele Fincher - How to you Feel about your Mother.. Psych and The SE
December 13, 2014
Christopher Soghoian - Blinding The Surveillance State
December 13, 2014
Chris Hadnagy - What Your Body Tells Me - Body Language for the SE
December 13, 2014
Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces
December 13, 2014
Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations
December 13, 2014
Zoz - Don't Fuck It Up!
December 13, 2014
Zoltán Balázs - Bypass firewalls, application white lists, secure remote desktops under 20 seconds
December 13, 2014
Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute
December 13, 2014
Wesley McGrew- Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively
December 13, 2014
Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0
December 13, 2014
Tess Schrodinger - From Raxacoricofallapatorius With Love: Case Studies In Insider Threat
December 13, 2014
Svetlana Gaivoronski and Ivan Petrov - Shellcodes for ARM: Your Pills Don't Work on Me, x86
December 13, 2014
Shane Macaulay - Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System
December 13, 2014
Shahar Tal - I Hunt TR-069 Admins: Pwning ISPs Like a Boss
December 13, 2014
Scott Erven and Shawn Merdinger - Just What The Doctor Ordered?
December 13, 2014
Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records
December 13, 2014
Ryan Lackey & Marc Rogers & theGrugq - Masquerade - How a Helpful Man-in-the-Middle Can Help You Evade Monitoring
December 13, 2014
Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks
December 13, 2014
Robert Rowley - Detecting and Defending Against a Surveillance State
December 13, 2014
Richard Thieme - The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
December 13, 2014
Richard Klafter (Free) and Eric Swanson (Lachesis) - Check Your Fingerprints: Cloning the Strong Set
December 13, 2014
Pierce and Loki - NSA Playset : GSM Sniffing
December 13, 2014
Phil Zimmermann - How To Get Phone Companies To Just Say No To Wiretapping
December 13, 2014
Philip “Soldier of Fortran” Young - From root to SPECIAL: Pwning IBM Mainframes
December 13, 2014
Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car
December 13, 2014
Paul McMillan - Attacking the Internet of Things using Time
December 13, 2014
Paul Drapeau and Brent Dukes - Steganography in Commonly Used HF Radio Protocols
December 13, 2014
Patrick Wardle and Colby Moore - Optical Surgery; Implanting a DropCam
December 13, 2014
Panel - Summary of Attacks Against BIOS and Secure Boot
December 13, 2014
Panel - PropLANE: Kind of keeping the NSA from watching you pee
December 13, 2014
Panel- Ephemeral Communications: Why and How?
December 13, 2014
Panel - Diversity in Information Security
December 13, 2014
Panel - DEF CON the Mystery, Myth, and Legend
December 13, 2014
Nicole Ozer & Kevin Bankston & Timothy Edgar - Panel - Surveillance on the Silver Screen - Fact or Fiction
December 13, 2014
Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling
December 13, 2014
David Kennedy - Destroying Education and Awareness Programs
December 13, 2014
The Dark Tangent & LosT - Welcome and Making of the DEF CON Badge
December 13, 2014
Dan Kaminsky - Secure Random by Default
December 13, 2014
Panel - Hack All The Things: 20 Devices in 45 Minutes
December 13, 2014
Panel - DEF CON Comedy Jam Part VII, Is This The One With The Whales?
December 13, 2014
Panel - Contests Award Ceremony
December 13, 2014
Panel - Closing Ceremonies
December 13, 2014
Nir Valtman - Bug Bounty Programs Evolution
December 13, 2014
Nir Valtman - A Journey to Protect Points-of-sale
December 13, 2014
Michael Schrenk - You're Leaking Trade Secrets
December 13, 2014
Michael Ossmann - The NSA Playset: RF Retroreflectors
December 13, 2014
Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
December 13, 2014
Mark Stanislav & Zach Lanier - The Internet of Fails - Where IoT Has Gone Wrong and How We're Making It Right
December 13, 2014
Major Malfunction - Old Skewl Hacking - Porn Free!
December 13, 2014
Maggie Jauregui - Girl… Fault-Interrupted.
December 13, 2014
Lucas Morris and Michael McAtee - ShareEnum: We Wrapped Samba So You Don’t Have To
December 13, 2014
Luca "kaeso" Bruno & Mariano "emdel" Graziano - Through the Looking-Glass, and What Eve Found There
December 13, 2014
Ladar Levison and Stephen Watt - Dark Mail
December 13, 2014
Panel - Ask the EFF - The Year in Digital Civil Liberties
December 13, 2014
Kevin Mitnick - Getting Intimate with Kevin Mitnick
December 13, 2014
Kyle Kelley and Greg Anderson - Is This Your Pipe? Hijacking the Build Pipeline.
December 13, 2014
Keren Elazari - Empowering Hackers to Create a Positive Impact
December 13, 2014
Kenneth White and Matthew Green - The Open Crypto Audit Project
December 13, 2014
Joshua Corman and Nicholas J Percoco - The Cavalry Year[0] & a Path Forward for Public Safety
December 13, 2014
Josh Datko and Teddy Reed - NSA Playset: DIY WAGONBED Hardware Implant over I2C
December 13, 2014
John Menerick - Open Source Fairy Dust
December 13, 2014
Joe Grand aka Kingpin - Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering
December 13, 2014
Joe FitzPatrick and Miles Crabill - NSA Playset: PCIe
December 13, 2014
Jim Denaro and Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble
December 13, 2014
Graham, Mcmillan, and Tentler - Mass Scanning the Internet: Tips, Tricks, Results
December 13, 2014
Jesus Molina - Learn how to control every room at a luxury hotel remotely - the dangers of insecure home automation deployment
December 13, 2014
Jayson E. Street - The Incredible Likeness of being Adorable
December 13, 2014
Jayson E. Street - Around the world in 80 cons
December 13, 2014
Jesse Michael and Mickey Shkatov - USB for all!
December 13, 2014
Jason Healey - Saving the Internet (for the Future)
December 13, 2014
Jake Kouns and Carsten Eiram - Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!
December 13, 2014
Gregory Pickett - Abusing Software Defined Networks
December 13, 2014
Grant Bugher - Detecting Bluetooth Surveillance Systems
December 13, 2014
Glenn Wilkinson - Practical Aerial Hacking & Surveillance
December 13, 2014
Geoff McDonald - Meddle: Framework for Piggy-back Fuzzing and Tool Development
December 13, 2014
Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog
December 13, 2014
Felix Leder - NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It
December 13, 2014
Eric Smith and Josh Perrymon - Advanced Red Teaming: All Your Badges Are Belong To Us
December 13, 2014
Eric (XlogicX) Davisson and Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools
December 13, 2014
Elie Bursztein and Celine Bursztein - I am a legend: Hacking Hearthstone with machine learning
December 13, 2014
Eijah - Saving Cyberspace by Reinventing File Sharing
December 13, 2014
Dustin Hoffman and Thomas (TK) Kinsey - What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil)
December 13, 2014
Holt, Smirnova and Chua - Stolen Data Markets: An Economic and Organizational Assessment
December 13, 2014
Dr. Phil Polstra and Captain Polly - Cyberhijacking Airplanes: Truth or Fiction?
December 13, 2014
Dr. Phil Polstra - Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance
December 13, 2014
Dr. Paul Vixie - Domain Name Problems and Solutions
December 13, 2014
Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse
December 13, 2014
Mahjoub, Reuille, and Toonk - Catching Malware En Masse: DNS and IP Style
December 13, 2014
David Wyde - Client-Side HTTP Cookie Security: Attack and Defense
December 13, 2014
David Litchfield - Oracle Data Redaction is Broken
December 13, 2014
David Dorsey - Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go
December 13, 2014
Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction, and Death
December 13, 2014
Corey Kallenberg and Xeno Kovah - Extreme Privilege Escalation On Windows 8/UEFI Systems
December 13, 2014
Christopher Campbell - The Secret Life of Krbtgt
December 13, 2014
Christopher Campbell - The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns
December 13, 2014