/DEF CON 18/DEF CON 18 slides x265/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 18 Hacking Conference Presentation By A.P. Delchi - Physical Security You Are Doing It Wrong - Slides.mp444.6 MiB2015-Aug-13 05:22
DEF CON 18 Hacking Conference Presentation By Adam Pridgen and Matt Wollenweber - Toolsmithing an IDA Bridge - Slides.mp425.1 MiB2015-Aug-13 05:51
DEF CON 18 Hacking Conference Presentation By Adrian Crenshaw - Programmable HID USB Keystroke Dongle - Slides.mp441.0 MiB2015-Aug-13 06:39
DEF CON 18 Hacking Conference Presentation By Ahn Ki-Chan and Ha Dong-Joo - Malware Migrating to Gaming Consoles - Slides.mp441.3 MiB2015-Aug-13 07:34
DEF CON 18 Hacking Conference Presentation By Andrew Kongs and Dr. Gerald Kane - Training the Next Generation of Hardware Hackers - Slides.mp413.1 MiB2015-Aug-13 07:50
DEF CON 18 Hacking Conference Presentation By BONUS- BLACK HAT- Barnaby Jack - Jackpotting Automated Teller Machines Redux - Slides.mp433.1 MiB2015-Aug-13 10:27
DEF CON 18 Hacking Conference Presentation By Barnaby Jack - Jackpotting Automated Teller Machines Redux - Slides.mp411.1 MiB2015-Aug-17 21:35
DEF CON 18 Hacking Conference Presentation By Barrett Weisshaar and Garret Picchioni - The Night The Lights Went Out In Vegas - Slides.mp432.1 MiB2015-Aug-13 08:55
DEF CON 18 Hacking Conference Presentation By Blake Self and bitemytaco - Hacking DOCSIS For Fun and Profit - Slides.mp437.9 MiB2015-Aug-13 09:34
DEF CON 18 Hacking Conference Presentation By Blake Self with Wayne and Dolores Zage - SMART Project - Slides.mp415.9 MiB2015-Aug-13 09:51
DEF CON 18 Hacking Conference Presentation By Brad Smith - Weaponizing Lady GaGa - Slides.mp432.4 MiB2015-Aug-13 11:03
DEF CON 18 Hacking Conference Presentation By Brandon Nesbit - The Games We Play - Slides.mp431.3 MiB2015-Aug-13 11:37
DEF CON 18 Hacking Conference Presentation By Bruce Potter and Logan Lodge - This Needs to be Fixed - Slides.mp425.5 MiB2015-Aug-13 12:09
DEF CON 18 Hacking Conference Presentation By Cesar Cerrudo - Token Kidnappings Revenge - Slides.mp448.9 MiB2015-Aug-13 13:01
DEF CON 18 Hacking Conference Presentation By Chad Houck and Jason Lee - Decoding reCAPTCHA - Slides.mp426.0 MiB2015-Aug-13 13:27
DEF CON 18 Hacking Conference Presentation By Charlie Miller - Kim Jong-il and Me - Slides.mp443.2 MiB2015-Aug-13 14:06
DEF CON 18 Hacking Conference Presentation By Chema Alonso and Jose Palazon - Connection String Parameter Attacks - Slides.mp438.9 MiB2015-Aug-13 14:49
DEF CON 18 Hacking Conference Presentation By Chema Alonso and Jose Palazon - FOCA2 The FOCA Strikes Back - Slides.mp440.3 MiB2015-Aug-13 15:33
DEF CON 18 Hacking Conference Presentation By Chris Conley - Hacking Facebook Privacy - Slides.mp419.2 MiB2015-Aug-13 15:59
DEF CON 18 Hacking Conference Presentation By Chris Paget - Extreme-Range RFID Tracking - Slides.mp430.8 MiB2015-Aug-13 16:32
DEF CON 18 Hacking Conference Presentation By Chris Paget - Practical Cellphone Spying - Slides.mp463.4 MiB2015-Aug-17 21:35
DEF CON 18 Hacking Conference Presentation By Christopher Soghoian - Your ISP and the Government BFF - Slides.mp431.4 MiB2015-Aug-13 17:46
DEF CON 18 Hacking Conference Presentation By Craig Heffner - How to Hack Millions of Routers - Slides.mp422.9 MiB2015-Aug-13 18:09
DEF CON 18 Hacking Conference Presentation By Dan Kaminsky - Black Ops Of Defense Web Edition - Slides.mp444.0 MiB2015-Aug-13 18:55
DEF CON 18 Hacking Conference Presentation By Daniel Burroughs - Open Public Sensors and Trend Monitoring - Slides.mp417.3 MiB2015-Aug-13 19:16
DEF CON 18 Hacking Conference Presentation By Dark Tangent and Joe Grand - Welcome and Making the Badge - Slides.mp446.4 MiB2015-Aug-13 20:02
DEF CON 18 Hacking Conference Presentation By Dave King - Hardware Hacking for Software Guys - Slides.mp436.8 MiB2015-Aug-13 21:21
DEF CON 18 Hacking Conference Presentation By David Bryan and Michael Anderson - Cloud Computing and a WMD - Slides.mp426.0 MiB2015-Aug-13 21:49
DEF CON 18 Hacking Conference Presentation By David C Smith and Samuel Petreski - A New Approach to Forensic Methodology - Slides.mp432.5 MiB2015-Aug-13 22:25
DEF CON 18 Hacking Conference Presentation By David Kennedy and Josh Kelley - Powershell omfg - Slides.mp429.7 MiB2015-Aug-13 22:58
DEF CON 18 Hacking Conference Presentation By David Maynor and Paul Judge - Searching For Malware - Slides.mp450.6 MiB2015-Aug-17 21:35
DEF CON 18 Hacking Conference Presentation By Decius - Exploiting Internet Surveillance Systems - Slides.mp432.1 MiB2015-Aug-14 00:11
DEF CON 18 Hacking Conference Presentation By Dennis Brown - How Hackers Won the Zombie Apocalypse - Slides.mp424.5 MiB2015-Aug-14 00:35
DEF CON 18 Hacking Conference Presentation By Dennis Brown - Resilient Botnet Command and Control with Tor - Slides.mp430.7 MiB2015-Aug-14 01:09
DEF CON 18 Hacking Conference Presentation By Deviant Ollam and Toool - The Search for Perfect Handcuffs - Slides.mp447.4 MiB2015-Aug-14 02:12
DEF CON 18 Hacking Conference Presentation By Dondi West - Adequacy of the Laws Related to Cyber Warfare - Slides.mp428.8 MiB2015-Aug-14 02:47
DEF CON 18 Hacking Conference Presentation By Doug Mohney - HD Voice - The Overdue Revolution - Slides.mp434.1 MiB2015-Aug-14 03:27
DEF CON 18 Hacking Conference Presentation By Ed Schaller - Exploiting WebSphere Application Servers JSP Engine - Slides.m4v.mp427.2 MiB2015-Aug-14 03:55
DEF CON 18 Hacking Conference Presentation By Elie Bursztein and Jocelyn Lagarenne - Kartograph - Slides.mp439.9 MiB2015-Aug-14 04:44
DEF CON 18 Hacking Conference Presentation By Elie Bursztein and Panel - Bad Memories - Slides.mp428.3 MiB2015-Aug-14 05:16
DEF CON 18 Hacking Conference Presentation By Esteban Martinez Fayo - Hacking and Protecting Oracle Database Vault - Slides.mp444.6 MiB2015-Aug-14 06:04
DEF CON 18 Hacking Conference Presentation By Felix FX Lindner - Blitzableiter - Slides.mp436.6 MiB2015-Aug-14 06:41
DEF CON 18 Hacking Conference Presentation By Ferdinand Schober - Gaming in the Glass Safe - Slides.mp435.0 MiB2015-Aug-14 07:24
DEF CON 18 Hacking Conference Presentation By Francisco Amato and Federico Kirschbaum - Evilgrade and You Still Have Pending Upgrades - Slides.mp422.4 MiB2015-Aug-14 07:48
DEF CON 18 Hacking Conference Presentation By Frank Breedijk - Seccubus - Analyzing Vulnerability Assessment Data the Easy Way - Slides.mp424.5 MiB2015-Aug-14 08:17
DEF CON 18 Hacking Conference Presentation By Fyodor and David Fifield - Mastering the Nmap Scripting Engine - Slides.mp440.3 MiB2015-Aug-14 09:30
DEF CON 18 Hacking Conference Presentation By G Mark Hardy - Tales from the Crypto - Slides.mp435.6 MiB2015-Aug-14 10:09
DEF CON 18 Hacking Conference Presentation By Garry Pejski - My Life as a Spyware Developer - Slides.mp426.5 MiB2015-Aug-14 10:41
DEF CON 18 Hacking Conference Presentation By Granick Bankston Hofmann and Opsahl - The Law of Laptop Search and Seizure - Slides.mp465.4 MiB2015-Aug-14 12:41
DEF CON 18 Hacking Conference Presentation By Greg Conti - Our Instrumented Lives - Slides.mp427.8 MiB2015-Aug-14 13:10
DEF CON 18 Hacking Conference Presentation By HONEY - Ripping Media Off Of the Wire - Slides.mp431.3 MiB2015-Aug-14 13:43
DEF CON 18 Hacking Conference Presentation By Huang Chiu and Wu - 0box Analyzer - Slides.mp425.6 MiB2015-Aug-14 14:11
DEF CON 18 Hacking Conference Presentation By Iftach Ian Amit- Cyber Crime War Charting Dangerous Waters - Slides.mp441.8 MiB2015-Aug-14 15:05
DEF CON 18 Hacking Conference Presentation By JP Dunning - Breaking Bluetooth by Being Bored - Slides.mp425.5 MiB2015-Aug-15 05:05
DEF CON 18 Hacking Conference Presentation By JP Dunning - Katana Portable Multi-Boot Security Suite - Slides.mp424.9 MiB2015-Aug-15 05:34
DEF CON 18 Hacking Conference Presentation By Jack Daniel and Panel - PCI and Compromising Controls and Compromising Security - Slides.mp435.2 MiB2015-Aug-14 15:37
DEF CON 18 Hacking Conference Presentation By James Arlen - SCADA and ICS How to Avoid Cyberdouchery - Slides.mp447.2 MiB2015-Aug-14 16:36
DEF CON 18 Hacking Conference Presentation By James Shewmaker - Browser Based Defenses - Slides.mp433.5 MiB2015-Aug-14 17:12
DEF CON 18 Hacking Conference Presentation By Jason Scott - You are Stealing It Wrong 30 Years of Inter-Pirate Battles - Slides.mp441.0 MiB2015-Aug-14 17:50
DEF CON 18 Hacking Conference Presentation By Jayson E Street - Deceiving the Heavens to Cross the Sea - Slides.mp431.7 MiB2015-Aug-14 18:24
DEF CON 18 Hacking Conference Presentation By Jeff Bryner - Google Toolbar The NARC Within - Slides.mp410.6 MiB2015-Aug-14 18:35
DEF CON 18 Hacking Conference Presentation By Jennifer Granick and Matt Zimmerman - Legal Developments in Hardware Hacking - Slides.mp429.1 MiB2015-Aug-14 19:00
DEF CON 18 Hacking Conference Presentation By Jeongwook Oh - Exploit Spotting Locating Vulnerabilities Out of Vendor Patches Automatically - Slides.mp439.1 MiB2015-Aug-14 19:45
DEF CON 18 Hacking Conference Presentation By Jeremy Brown - Exploiting SCADA Systems - Slides.mp418.5 MiB2015-Aug-14 20:13
DEF CON 18 Hacking Conference Presentation By Jim Rennie and Eric Rachner - Search & Seizure & Golfballs - Slides.mp460.6 MiB2015-Aug-14 21:41
DEF CON 18 Hacking Conference Presentation By Jimi Fiekert - The Anatomy of Drug Testing - Slides.mp431.0 MiB2015-Aug-14 22:10
DEF CON 18 Hacking Conference Presentation By Joe Damato - Function Hooking for Mac OSX and Linux - Slides.mp423.7 MiB2015-Aug-14 22:36
DEF CON 18 Hacking Conference Presentation By Joe Grand and Dark Tangent - Welcome And Behind The Scenes Of The DEFCON Badge - Slides.mp483.8 MiB2015-Aug-17 21:36
DEF CON 18 Hacking Conference Presentation By John Curran - IPv6 No Longer Optional - Slides.mp432.5 MiB2015-Aug-14 23:09
DEF CON 18 Hacking Conference Presentation By John McNabb - Cyberterrorism and the Security of the National Drinking Water Infrastructure - Slides.mp435.9 MiB2015-Aug-14 23:48
DEF CON 18 Hacking Conference Presentation By Jon McCoy - Hacking Net Applications A Dynamic Attack - Slides.mp436.4 MiB2015-Aug-15 00:33
DEF CON 18 Hacking Conference Presentation By Jon Oberheide - Antique Exploitation aka Terminator - Slides.mp411.7 MiB2015-Aug-15 00:46
DEF CON 18 Hacking Conference Presentation By Jonathan Lee and Neil Pahl - Bypassing Smart-Card Authentication and Blocking Debiting - Slides.mp424.0 MiB2015-Aug-15 01:26
DEF CON 18 Hacking Conference Presentation By Joseph McCray - You Spent All That Money and You Still Got Owned - Slides.mp424.0 MiB2015-Aug-15 01:56
DEF CON 18 Hacking Conference Presentation By Josh Pyorre and Chris McKenney - Build Your Own Security Ops Center - Slides.mp433.9 MiB2015-Aug-15 02:40
DEF CON 18 Hacking Conference Presentation By Joshua Marpet - Facial Recognition - Slides.mp434.7 MiB2015-Aug-15 03:50
DEF CON 18 Hacking Conference Presentation By Joshua Wise - From No Way to 0-day - Slides.mp437.4 MiB2015-Aug-15 04:33
DEF CON 18 Hacking Conference Presentation By Justin Morehouse and Tony Flick - Getting Social with the Smart Grid - Slides.mp428.1 MiB2015-Aug-15 06:03
DEF CON 18 Hacking Conference Presentation By Kenneth Geers - Live Fire Exercise Baltic Cyber Shield 2010 - Slides.mp428.3 MiB2015-Aug-15 06:30
DEF CON 18 Hacking Conference Presentation By Kevin Mahaffey and John Hering - App Attack - Slides.mp428.8 MiB2015-Aug-15 07:05
DEF CON 18 Hacking Conference Presentation By Lai Appelbaum and Oberheide - The Power of Chinese Security - Slides.mp433.7 MiB2015-Aug-15 07:42
DEF CON 18 Hacking Conference Presentation By Leigh Honeywell and follower - Physical Computing and Virtual Security - Slides.mp431.1 MiB2015-Aug-15 08:16
DEF CON 18 Hacking Conference Presentation By Lineberry Richardson and Wyatt - These Aren't the Permissions - Slides.mp435.3 MiB2015-Aug-15 08:56
DEF CON 18 Hacking Conference Presentation By Luiz Eduardo -Your Boss is a Douchebag How About You - Slides.mp415.3 MiB2015-Aug-15 09:13
DEF CON 18 Hacking Conference Presentation By Mage2 - Electronic Weaponry - Slides.mp414.8 MiB2015-Aug-15 09:28
DEF CON 18 Hacking Conference Presentation By Marcia Hofmann - How To Get Your FBI File - Slides.mp432.1 MiB2015-Aug-15 10:18
DEF CON 18 Hacking Conference Presentation By Marco Bonetti - Mobile Privacy - Slides.mp418.4 MiB2015-Aug-15 10:54
DEF CON 18 Hacking Conference Presentation By Marisa Fagan - Be a Mentor - Slides.mp412.6 MiB2015-Aug-15 11:09
DEF CON 18 Hacking Conference Presentation By Matias Madou and Jacob West - Repelling the Wily Insider - Slides.mp435.3 MiB2015-Aug-15 11:58
DEF CON 18 Hacking Conference Presentation By Matt Krick - DCFluX in Moon-Bouncer - Slides.mp435.1 MiB2015-Aug-15 12:39
DEF CON 18 Hacking Conference Presentation By Matt Ryanczak - Implementing IPv6 at ARIN - Slides.mp430.1 MiB2015-Aug-15 13:15
DEF CON 18 Hacking Conference Presentation By Max Kelly - Perspectives in Cybersecurity and Cyberwarfare - Slides.mp424.8 MiB2015-Aug-15 13:47
DEF CON 18 Hacking Conference Presentation By Md Sohail Ahmad - WPA Too - Slides.mp434.1 MiB2015-Aug-15 14:38
DEF CON 18 Hacking Conference Presentation By Md Sohail Ahmad - WPA Too! - Slides.mp451.7 MiB2015-Aug-17 21:36
DEF CON 18 Hacking Conference Presentation By Michael Brooks - masSEXploitation - Slides.mp438.7 MiB2015-Aug-15 16:03
DEF CON 18 Hacking Conference Presentation By Michael Schearer - SHODAN for Penetration Testers - Slides.mp430.6 MiB2015-Aug-15 16:39
DEF CON 18 Hacking Conference Presentation By Mike Bailey - Web Services We Just Do Not Need - Slides.mp4145.8 MiB2015-Aug-15 21:06
DEF CON 18 Hacking Conference Presentation By Mike Metzger - Letting the Air Out of Tire Pressure Monitoring Systems - Slides.mp414.3 MiB2015-Aug-15 21:24
DEF CON 18 Hacking Conference Presentation By Monta Elkins - Hacking with Hardware Introducing URFUKED - Slides.mp423.2 MiB2015-Aug-15 21:52
DEF CON 18 Hacking Conference Presentation By Moxie Marlinspike - Changing Threats To Privacy From TIA to Google - Slides.mp431.2 MiB2015-Aug-15 22:30
DEF CON 18 Hacking Conference Presentation By Nathan Hamiel and Marcin Wielgoszewski - Constricting the Web - Slides.mp436.4 MiB2015-Aug-15 23:17
DEF CON 18 Hacking Conference Presentation By Nguyen Anh Quynh - Operating System Fingerprinting for Virtual Machines - Slides.mp422.6 MiB2015-Aug-16 00:03
DEF CON 18 Hacking Conference Presentation By Nicholas J. Percoco and Christian Papathanasiou - This is Not the Droid You are Looking For - Slides.mp428.0 MiB2015-Aug-16 00:33
DEF CON 18 Hacking Conference Presentation By Nicholas J. Percoco and Jibran Ilyas - Malware Freak Show 2 - Slides.mp438.1 MiB2015-Aug-16 01:16
DEF CON 18 Hacking Conference Presentation By Nicole Ozer and Kevin Bankston - Big Brother on the Big Screen - Slides.mp447.7 MiB2015-Aug-16 02:32
DEF CON 18 Hacking Conference Presentation By Oren Isacson and Alfredo Ortega - Exploiting Digital Cameras - Slides.mp422.9 MiB2015-Aug-16 03:01
DEF CON 18 Hacking Conference Presentation By Panel - ChaosVPN for Playing CTFs - Slides.mp428.7 MiB2015-Aug-16 03:34
DEF CON 18 Hacking Conference Presentation By Panel - DNS Systemic Vulnerabilities and Risk Management - Slides.mp483.5 MiB2015-Aug-16 08:18
DEF CON 18 Hacking Conference Presentation By Panel - Defcon Security Jam III Now in 3-D - Slides.mp479.3 MiB2015-Aug-16 04:59
DEF CON 18 Hacking Conference Presentation By Panel - Meet the Feds - CSI TCP IP - Slides.mp498.4 MiB2015-Aug-16 12:09
DEF CON 18 Hacking Conference Presentation By Panel - Meet the Feds - Policy Privacy Deterrence and Cyber War - Slides.mp461.3 MiB2015-Aug-16 14:30
DEF CON 18 Hacking Conference Presentation By Panel - Of Bytes and Bullets - Slides.mp476.8 MiB2015-Aug-16 18:07
DEF CON 18 Hacking Conference Presentation By Panel - Open Letter - Call to Action - Slides.mp465.6 MiB2015-Aug-16 20:41
DEF CON 18 Hacking Conference Presentation By Panel - oCTF 5 years in 50 minutes - Slides.mp430.4 MiB2015-Aug-16 15:08
DEF CON 18 Hacking Conference Presentation By Panel- Meet the EFF - Slides.mp483.3 MiB2015-Aug-16 23:39
DEF CON 18 Hacking Conference Presentation By Patrick Mullen and Ryan Pentney - Open Source Framework for Advanced IDS - Slides.mp431.2 MiB2015-Aug-17 00:17
DEF CON 18 Hacking Conference Presentation By Paul Haas - Advanced Format String Attacks - Slides.mp425.9 MiB2015-Aug-17 00:43
DEF CON 18 Hacking Conference Presentation By Peter Eckersley - How Unique Is Your Browser - Slides.mp422.8 MiB2015-Aug-17 01:12
DEF CON 18 Hacking Conference Presentation By Peter Eckersley and Jesse Burns - An Observatory for the SSLiverse - Slides.mp433.5 MiB2015-Aug-17 01:48
DEF CON 18 Hacking Conference Presentation By Pierce Goldy aSmig and sanitybit - WiMAX Hacking 2010 - Slides.mp433.1 MiB2015-Aug-17 02:25
DEF CON 18 Hacking Conference Presentation By Polk Malkewicz and Novak - Industrial Cyber Security - Slides.mp436.3 MiB2015-Aug-17 03:07
DEF CON 18 Hacking Conference Presentation By Rain and urbanmonkey -Build a Lie Detector - Slides.mp425.5 MiB2015-Aug-17 03:38
DEF CON 18 Hacking Conference Presentation By Rich Smith - In-memory Reverse Engineering for Obfuscated Python - Slides.mp451.0 MiB2015-Aug-17 04:30
DEF CON 18 Hacking Conference Presentation By Richard Thieme - Getting Root Remote Viewing and Non-Local Consciousness - Slides.mp4100.5 MiB2015-Aug-17 07:44
DEF CON 18 Hacking Conference Presentation By Righter Kunkel - Air Traffic Control Insecurity - Slides.mp414.8 MiB2015-Aug-17 08:04
DEF CON 18 Hacking Conference Presentation By Riley Repko - Enough Cyber Talk Already - Slides.mp429.9 MiB2015-Aug-17 08:34
DEF CON 18 Hacking Conference Presentation By Rob Ragan and Francis Brown - Lord of the Bing - Slides.mp432.7 MiB2015-Aug-17 09:09
DEF CON 18 Hacking Conference Presentation By Robert Edmonds and Paul Vixie - Passive DNS Hardening - Slides.mp436.7 MiB2015-Aug-17 10:09
DEF CON 18 Hacking Conference Presentation By Ryan Linn - Multiplayer Metasploit - Slides.mp435.2 MiB2015-Aug-17 10:45
DEF CON 18 Hacking Conference Presentation By Sam Bowne - Who Cares About IPv6 - Slides.mp422.6 MiB2015-Aug-17 11:10
DEF CON 18 Hacking Conference Presentation By Samy Kamkar - How I Met Your Girlfriend - Slides.mp427.5 MiB2015-Aug-17 11:38
DEF CON 18 Hacking Conference Presentation By Schuyler Towne and datagram - Attack the Key and Own the Lock - Slides.mp485.4 MiB2015-Aug-17 12:52
DEF CON 18 Hacking Conference Presentation By Scott Wolchok - Crawling BitTorrent DHTs for Fun - Slides.mp413.5 MiB2015-Aug-17 13:09
DEF CON 18 Hacking Conference Presentation By Shawn Merdinger - We Dont Need No Stinkin Badges - Slides.mp428.1 MiB2015-Aug-17 13:40
DEF CON 18 Hacking Conference Presentation By Shawn Moyer and Nathan Keltner - Wardriving the Smart Grid - Slides.mp434.3 MiB2015-Aug-17 14:20
DEF CON 18 Hacking Conference Presentation By Sho Ho - FOE The Release of Feed Over Email - Slides.mp411.6 MiB2015-Aug-17 14:33
DEF CON 18 Hacking Conference Presentation By Smith Ames and Lai - Balancing the Pwn Trade Deficit - Slides.mp431.9 MiB2015-Aug-17 15:14
DEF CON 18 Hacking Conference Presentation By Stracener Barnum and Peterson - So Many Ways to Slap A Yo-Ho - Slides.mp430.0 MiB2015-Aug-17 15:50
DEF CON 18 Hacking Conference Presentation By Sumit Siddharth - Hacking Oracle From Web Apps - Slides.mp443.6 MiB2015-Aug-17 16:42
DEF CON 18 Hacking Conference Presentation By The Suggmeister - Social Networking Special Ops - Slides.mp433.9 MiB2015-Aug-17 17:14
DEF CON 18 Hacking Conference Presentation By Tobias Bluzmanis and Fiddler - Locks Lies and Videotape - Slides.mp434.3 MiB2015-Aug-17 18:03
DEF CON 18 Hacking Conference Presentation By Tottenkoph - VirGraff101 An Intro to Virtual Graffiti - Slides.mp427.6 MiB2015-Aug-17 18:30
DEF CON 18 Hacking Conference Presentation By Tyler Krpata - Like a Boss Attacking JBoss - Slides.mp413.1 MiB2015-Aug-17 18:45
DEF CON 18 Hacking Conference Presentation By Wayne Huang - Drivesploit - Slides.mp442.5 MiB2015-Aug-17 19:28
DEF CON 18 Hacking Conference Presentation By Wayne Huang and Kuon Ding - No SQL No Injection - Slides.mp423.5 MiB2015-Aug-17 19:56
DEF CON 18 Hacking Conference Presentation By Weigand Renderman and Kershaw - Build your own UAV 2.0 - Slides.mp448.1 MiB2015-Aug-17 20:59
DEF CON 18 Hacking Conference Presentation By Zoz - Pwned By The Owner - Slides.mp417.6 MiB2015-Aug-17 21:35
DEF CON 18 Hacking Conference Presentation By frank^2 - Trolling Reverse-Engineers with Math - Slides.mp433.1 MiB2015-Aug-14 08:51
DEF CON 18 Hacking Conference Presentation By metr0 - Securing MMOs - Slides.mp430.2 MiB2015-Aug-15 15:12