/DEF CON 17/DEF CON 17 slides/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEFCON 17 Hacking Conference Presentation By Alek Amrani - Session Donation - Slides.m4v55.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Andrea Barisani and Daniele Bianco - Sniffing Keystrockes with Lasers and Voltmeters - Slides.m4v144.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Antione Gademer and Corentin Cheron - Low cost Spying Quadrotor for Global Security Applications - Slides.m4v113.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Ava Latrope - eXercise in Messaging and Presence Pwnage - Slides.m4v69.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Beth Noid and Nick Farr - Robot Shark Laser What Hackerspaces Do - Slides.m4v120.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Bosse Eriksson- Runtime Kernel Patching on Mac OS X - Slides.m4v63.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Brandon Dixon - Attacking SMS its no longer your BFF - Slides.m4v67.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Bruce Potter and Logan Lodge - Fragging Game Servers - Slides.m4v137.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Bruce Schneier - Question and Answer Session - Slides.m4v157.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Charlie Vedaa and Anonymous - Proxy Prank o Matic - Slides.m4v71.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Chema Alonso and Jose Palazon - Tactical Fingerprinting Using Metadata Hidden Info and Lost Data - Slides.m4v128.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Chris Gates and Mario Ceballos - Breaking the Unbreakable Oracle with Metasploit - Slides.m4v124.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Chris Paget - RFID Mythbusting - Slides.m4v117.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Christopher Mooney and James Luedke - Subverting the World of Warcraft API - Slides.m4v169.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Christopher Soghoian - Manipulation and Abuse of the Consumer Credit Reporting Agencies - Slides.m4v63.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Cody Pollet and George Louthan - Hack like the Movie Stars A Big Screen Multi Touch Network Monitor - Slides.m4v65.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Da Beave and JFalcon - AAPL Automated Analog Telephone Logging - Slides.m4v66.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Dan Kaminsky - Something about Network Security - Slides.m4v207.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Daniel Raygoza - Automated Malware Similarity Analysis - Slides.m4v61.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Danny Quist and Lorie Liebrock - Reverse Engineering by Crayon - Slides.m4v164.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Dark Tangent - Closing Ceremonies - Slides.m4v403.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Dark Tangent and Joe Grand - Welcome and Badge Hacking Talk - Slides.m4v129.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Datagram - Lockpicking Forensics - Slides.m4v174.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By David Mortman and Panel - Defcon Security Jam 2 The Fails Keep on Coming - Slides.m4v348.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By David Rook - The Security Risks of Web 2.0 - Slides.m4v181.8 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Dead Addict - Unfair Use Speculations on the Future of Privacy - Video.m4v158.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Dead Addict - Defcon 1 A Personal Account - Slides.m4v155.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Digividual - Sharepoint 2007 Knowledge Network Exposed - Slides.m4v57.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Digividual - Socailly Owned in the Cloud - Slides.m4v38.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Dominic Spill Michael Ossmann and Mark Steward - Bluetooth Smells like Chicken - Slides.m4v180.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Douglas C Merrill - Is that you Baby or Just a Bridge in the Sky - Slides.m4v112.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Edward Zaborowski - Doppleganger The Webs Evil Twin - Slides.m4v49.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Efrain Torres - Metasploit Goes Web - Slides.m4v44.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Efstratios Gavas - Asymetric Defense How to fight off the NSA Red Team - Slides.m4v51.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Egypt - Automatic Browser Fingerprinting and Exploitation with Metasploit - Slides.m4v126.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Endgrain Dan Kaminsky and Tiffany Rad - Hello My Name is hostname - Slides.m4v124.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Erez Metula - Managed Code Rootkits Hooking into Runtime Enviroments - Slides.m4v162.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By FX - Router Exploitation - Slides.m4v163.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Fred Von Lohman and Jennifer Granick - Jailbreaking and the Law of Reversing - Slides.m4v129.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Goldy and Pierce - Intro to WiMAX Hacking - Slides.m4v98.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Grant Jordan - Stealing Profits from Stock Market Spammers - Slides.m4v172.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Gregory Fleischer - Attacking Tor and the Application Layer - Slides.m4v163.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Haroon Meer and Marco Slaviero - Clobbering the Cloud - Slides.m4v191.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Iftach Ian Amit - Down the Rabbit Hole Uncovering a Criminal Server - Slides.m4v152.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Itzik Kotler and Tomer Bitton - The Day of the Updates - Slides.m4v126.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By James Myrcurial Arlen and Tiffany Rad - Your Mind Legal Status Rights and Securing Yourself - Slides.m4v114.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jason Schlesinger - Cloud Security in Map Reduce - Slides.m4v45.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jason Scott - That Awesome Time I Was Sued for Two Billion Dollars - Slides.m4v86.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jay Beale and Justin Searle - The Middler 2.0 Its Not Just for Web Apps Anymore - Slides.m4v199.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jayson E Street - Bag Full of Rock Dispelling the Myths and Discussing the Facts of Global Cyber Warfare - Slides.m4v134.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jeff Yestrumskas and Matt Flick - Cross Site Scripting Anonymous Browser 2.0 - Slides.m4v51.8 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jennifer Granick - The year in Computer Crime Cases - Slides.m4v158.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jhind - Catching DNS Tunnels with AI - Slides.m4v155.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jim Rennie - So you got Arrested in Vegas - Slides.m4v128.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Joe Grand Jake Appelbaum and Chirs Tarnovsky - Smart Parking Meters -Slides.m4v144.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Joe Grand and Zoz - The Projects of Prototype This - Slides.m4v162.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Joe Grand and Zoz - The Projects of Prototype This - Video and Slides.m4v169.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Joey Calca and Ryan Anguiano - Hadoop Apaches Open Source Implementation of Googles MapReduce Framework- Slides.m4v132.8 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Johnny Long - Three Point Oh - Slides.m4v114.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jon R Kibler and Mike Cooper - Hack The Textbook - Slides.m4v64.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Jon Rose - Deblaze A Remote Method Enumeration Tool for Flex Servers - Slides.m4v74.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Joseph McCray - Advanced SQL Injection - Slides.m4v102.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Josh Marks and Rob Rehrig - Hacking the Wiimote and WiiFit to help the Disabled - Slides.m4v58.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Joshua Abraham and Robert Hansen - Unmasking You - Slides.m4v104.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By KC Phreakmonkey Budd and Taylor Dr Kaos Banks - Old Skool Brought Back A 1964 Modem Demo - Slides.m4v173.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Kenshoto - WarGamez Redux - Slides.m4v73.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Kevin Estis - Hacking the Apple TV - Slides.m4v155.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Kevin Johnson and Panel - Injectable Exploits Two New Tools for Pwning Web Apps and Browsers - Slides.m4v146.8 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Lee Kushner and Mike Murray - Effective Information Security Career Planning - Slides.m4v175.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Luiz effffn Eduardo - 30k Look at WiFi - Slides.m4v135.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By MD Sohail Ahmad and Prabhash Dhyani - WiFish Finder Who Will Bite the Bait - Slides.m4v63.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Marc Weber Tobias and Panel - Invisible Access Electronic Access Control Audit Trails and High Security - Slides.m4v165.8 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Mark Ryan Del Moral Talabis - Dangerous Minds The Art of Guerrilla Data Mining - Slides.m4v133.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Matt Richard and Steven Adair - 0-day gh0stnet and the Inside Story of the Adobe JBIG2 Vulnerability - Slides.m4v141.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Michael Brooks and David Aslanian - BitTorrent Hacks - Slides.m4v106.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Michael L Davis - Who Invented the Proximity Card - Slides.m4v91.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Michael Ligh and Matthew Richard - Making Fun of your Malware - Slides.m4v145.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Michael Schrenk - Screen Scraper Tricks Extracting Data from Difficult Websites - Slides.m4v140.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Mike Bailey and Russ McRee - CSRF Yeah it Still Works - Slides.m4v137.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Mike Zusman - Criminal Charges Not Pursued Hacking PKI - Slides.m4v134.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Moxie Marilinspike - More Tricks for Defeating - Slides.m4v145.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Muhaimin Dzulfakar - Advanced MySQL Exploitation - Slides.m4v52.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Ne0nRa1n and Keith Biddulph - Hacking Sleep How to Build Your Very Own Sleep Lab - Slides.m4v122.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Nicholas Percoco and Jibran Ilyas - Malware Freak Show - Video and Slides.m4v167.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Nicholas Percoco and Jibran Ilyas - Malware Freak Show -Slides.m4v167.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Nick Harbour - Win at Reversing Tracing and Sandboxing Through Inline Hooling - Slides.m4v138.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Panel - DEFCON 101 - Slides.m4v320.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Panel - Hardare Black Magic Building Devices with FPGAs - Slides.m4v576.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Panel - Meet the Feds - Video.m4v189.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Panel - MetaSploit Panel - Slides.m4v463.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Paul F Renda - Injecting EMP into Digital Devices - Slides.m4v174.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Pedro hkm Joaquini - Attacks Against 2wire Residential Gateway Routers - Slides.m4v56.8 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Peter Gutmann - The Psychology of Security Unusability - Slides.m4v157.5 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Pratap Prabhu and Yingbo Song - Smashing the Stack with Hydra - Slides.m4v74.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Psifertx - Matimum CTF Getting the most out of Capture the Flag - Slides.m4v118.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Rafael Dominiguez Vega - USB Attacks Fun with Plug and 0wn - Slides.m4v94.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Richard Thieme - Hacking Biohacking and the Future of Humanity - Slides.m4v171.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Ricky Lawshae - Picking Electronic Locks using TCP Sequence Prediction - Slides.m4v34.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Righter Kunkel - Air Traffic Control Insecurity and ADS B - Slides.m4v175.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Rob Degulielmo - Con Kung Fu Defending Yourself - Slides.m4v62.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Robert Clark - Computer and Internet Security Law A Year in Review 2008 - 2009 - Slides.m4v197.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Robert Lentz - Perspective of the DoD CSO - Slides.m4v139.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Roberto Suggi Liverani and Nick Freeman - Abusing Firefox Addons - Slides.m4v128.1 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Rod Beckstrom - Beckstroms Law A Model for Valuing Networks and Security - Slides.m4v144.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Roger Dingledine - Why Tor is Slow and What We Are Doing About It - Slides.m4v149.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By RogueClown - Hackerspaces The Legal Bases - Slides.m4v151.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Sam Bowne - Hijacking Web 2.0 Sites with SSLstrip Hands on Training - Slides.m4v127.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Sandy Mouse Clark and Edw0rd -De Gustibus or Hacking your Tastebuds - Slides.m4v124.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Scott Moulton - RAID Recovery Recover Your PORN By Sight and Sound - Slides.m4v171.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Sean Boyce - Design and Implementation of a Quantum True number Generator - Slides.m4v51.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Sean Taylor - Binary Obfuscation from the Top Down Obfuscating Executables Without Writing Assembly - Slides.m4v148.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Shawn Moyer and Nathan Hamiel - Weaponizing the Web New Attacks on User Generated Content - Slides.m4v184.8 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Sherri Davidoff - Death of Anonymous Travel - Slides.m4v326.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Sho Ho - FOE Feeding Controversial News to Censored Countries - Slides.m4v123.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Stephen Afterburn Janansky and Nick Waite - Hardware Trojans Infiltrating the Faraday Cage - Slides.m4v67.4 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Steve and Kristie Dunker - Personal Disaster Prepardness - Slides.m4v86.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Summit Siddharth - The Making of the Second SQL Injection Worm - Slides.m4v63.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Thomas Holt and Panel - Identifying Exploring and Predicting Threats in the Russian Hacker Community - Slides.m4v156.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Thomas Wilhelm - Hacking with the iPod Touch - Slides.m4v151.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Tom Eston and Kevin Johnson - Social Zombies Your Friends want to Eat Your Brains - Slides.m4v91.2 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Tony Flick - Hacking the Smart Grid - Slides.m4v53.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Tottenkoph - Good Vibrations Hacking Motion Sickness on the Cheap - Slides.m4v37.3 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Travis Goodspeed - An Open JTAG Debugger - Slides.m4v128.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Travis Goodspeed - Locally Exploiting Wireless Sensors - Slides.m4v148.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Tyler Pitchford - Search and Seizure Explained - Slides.m4v171.7 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Valsmith Colin Ames and David Kerb - MetaPhish - Slides.m4v206.6 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Videoman - Hacking with GNURadio - Slides.m4v138.9 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By Zulu Meet - PLA Information Warfare Development Timeline and Nodal Analysis - Slides.m4v189.0 MiB2013-May-29 07:00
DEFCON 17 Hacking Conference Presentation By etd - Dradis Framework Sharing Information Will Get You Root - Slides.m4v83.6 MiB2013-May-29 07:00
DEFCON 17 hacking conference presentation by Jason Ostrom and Arjun Sambamoorthy - Advancing Video Application Attacks - slides.m4v171.0 MiB2013-May-29 07:00
DEFCON 17 hacking conference presentation by Joe Grand Chris Tarnovsky and Jake Appelbaum - Smart Parking Meter Implementations - slides.m4v141.7 MiB2013-May-29 07:00
DEFCON 17 hacking conference presentation by Moxie Marlinspike - More Tricks for Defeating SSL - slides.m4v142.2 MiB2013-May-29 07:00