/DEF CON 19/DEF CON 19 slides/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 19 Hacking Conference Presentation By - Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks - Slides.m4v105.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Adam Baldwin - Pillaging DVCS Repos For Fun And Profit - Slides.m4v55.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies - Slides.m4v168.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Alexander Kornbrust - Hacking and Securing DB2 LUW Databases - Slides.m4v80.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Alva Skip Duckwall - A Bridge Too Far Defeating Wired 8021x with a Transparent Bridge Using Linux - Slides.m4v292.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Andrew Wilson and Michael Brooks - Traps of Gold - Slides.m4v117.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation - Slides.m4v158.3 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Aseem Jakhar - Jugaad Linux Thread Injection Kit - Slides.m4v90.8 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken - Slides.m4v181.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Ben Feinstein and Jeff Jarmoc - Get Off of My Cloud Cloud Credential Compromise and Exposure - Slides.m4v167.3 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Brad Woodberg - Network Application Firewalls Exploits and Defense - Slides.m4v142.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Brian Kennish - Tracking the Trackers How Our Browsing History Is Leaking into the Cloud - Slides.m4v50.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Bruce Sutherland - How To Get Your Message Out When Your Government Turns Off The Internet - Slides.m4v147.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Carey Rude and Vandevanter - Metasploit vSploit Modules - Slides.m4v133.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Charlie Miller - Battery Firmware Hacking - Slides.m4v162.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too - Slides.m4v134.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Dust Your Feed RSS Belongs To You! Avoid Censorship! - Slides.m4v109.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Christopher Cleary - Operational Use of Offensive Cyber - Slides.m4v149.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Dan Kaminsky - Black Ops of TCPIP 2011 - Slides.m4v177.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011 - Slides.m4v110.0 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Daniel Crowley - Speaking with Cryptographic Oracles - Slides.m4v151.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Daniel Garcia - UPnP Mapping - Slides.m4v55.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Dave Kennedy - Hacking Your Victims Over Power Lines - Slides.m4v106.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - David Bryan and Luiz Eduardo - Building The DEF CON Network Making A Sandbox For 10000 Hackers - Slides.m4v172.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - David Litchfield - Hacking and Forensicating an Oracle Database Server - Slides.m4v161.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Deral Heiland - From Printer To Pwnd Leveraging Multifunction Printers During Penetration Testing - Slides.m4v147.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Deviant Ollam - Safe to Armed in Seconds A Study of Epic Fails of Popular Gun Safes - Slides.m4v130.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Emmanuel Bouillon - Federation and Empire - Slides.m4v134.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic - Slides.m4v103.3 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Eston Abraham and Johnson - Dont Drop the SOAP Real World Web Service Testing for Web Hackers - Slides.m4v170.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing - Slides.m4v62.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us - Slides.m4v132.0 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - George Chamales - Lives On The Line Securing Crisis Maps In Libya Sudan And Pakistan - Slides.m4v145.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Grayson Lenik - Im Your MACbDaddy - Slides.m4v132.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Greg Conti - The Art and Science of Security Research - Slides.m4v148.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Gregory Pickett - Port Scanning Without Sending Packets - Slides.m4v142.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Gus Fritschie and Mike Wright - Getting F On the River - Slides.m4v172.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Hackajar - Economics of Password Cracking in the GPU Era - Slides.m4v146.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Hubris and a5h3r4h - Anonymous Cyber War - Slides.m4v197.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet - Slides.m4v123.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - James Myrcurial Arlen - Security When Nano Seconds Count - Slides.m4v149.8 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Jamie Butler - Physical Memory Forensics for Cache - Slides.m4v143.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP - Slides.m4v141.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Jason Scott - Archive Team A Distributed Preservation of Service Attack - Slides.m4v153.1 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin - Slides.m4v136.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Jeff Bryner - Kinectasploit Metasploit Meets Kinect - Slides.m4v38.0 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware - Slides.m4v94.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security - Slides.m4v157.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Joey Zhu - Phishing and Online Scam in China - Slides.m4v57.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - John McNabb - Vulnerabilities of Wireless Water Meter Networks - Slides.m4v160.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Jon McCoy - Hacking Net Applications The Black Arts - Slides.m4v163.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Jos Weyers - Key Impressioning - Slides.m4v132.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit - Slides.m4v167.0 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Justin Searle - Attacking and Defending the Smart Grid - Slides.m4v159.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Katy Levinson - Dont Fix It In Software - Slides.m4v138.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Kees Cook - Kernel Exploitation Via Uninitialized Stack - Slides.m4v38.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Kyle Osborn and Matt Johanson - Hacking Google Chrome OS - Slides.m4v125.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia - Slides.m4v277.0 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Lawson Potter and Deviant Ollam - And Thats How I Lost My Eye Exploring Emergency Data Destruction - Slides.m4v158.3 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Mahmud Ab Rahman - Sneaky PDF - Slides.m4v121.0 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Marketa Trimble - The Future of Cybertravel Legal Implications of the Evasion of Geolocation - Slides.m4v123.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Martin Holst Swende and Patrik Karlsson - Web Application Analysis With Owasp Hatkit - Slides.m4v156.8 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Matt Joyce - The Art of Trolling - Slides.m4v144.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Matt Krick - DCFluX in License to Transmit - Slides.m4v165.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Michael Robinson - What Time Are You Anyway - Slides.m4v51.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Michael Scarito - Build your own Synthetic Aperture Radar - Slides.m4v156.0 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Michael theprez98 Schearer - WTF Happened to the Constitution The Right to Privacy in the Digital Age - Slides.m4v146.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Mike Arpaia and Ted Reed - Beat to 1337 Creating A Successful University Cyber Defense Organization - Slides.m4v76.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform - Slides.m4v142.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Mikko Hypponen - The History and the Evolution of Computer Viruses - Slides.m4v153.8 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Ming Chow - Abusing HTML5 - Slides.m4v140.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Mouse and Renderman - Familiarity Breeds Contempt - Slides.m4v105.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Moxie Marlinspike - SSL And The Future Of Authenticity - Slides.m4v90.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Nelson Elhage - Virtualization Under Attack Breaking out of KVM - Slides.m4v121.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Jibran Ilyas - Malware Freak Show 3 Theyre pwning erbody out there - Slides.m4v148.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Paul Kehrer - Getting SSLizzard - Slides.m4v107.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Sean Schulte - This is REALLY not the droid youre looking for - Slides.m4v97.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Nicole Ozer - Big Brother on the Big Screen - Slides.m4v169.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database - Slides.m4v36.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - PacketFence The Open Source Nac What Weve Done In The Last Two Years - Slides.m4v141.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Ask EFF The Year in Digital Civil Liberties - Slides.m4v183.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale - Slides.m4v344.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Former Keynotes The Future - Slides.m4v170.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Is it 0-day or 0-care - Slides.m4v191.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Meet The Federal Agent 2.0 - Slides.m4v161.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Net Neutrality Panel - Slides.m4v149.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Network Security Podcast - Slides.m4v149.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - PCI 2 Still Compromising Controls and Compromising Security - Slides.m4v362.5 MiB2013-Dec-01 08:00
DEF CON 19 Hacking Conference Presentation By - Panel - Represent Defcon Groups Hackerspaces and You - Slides.m4v160.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - SCADA and PLCs in Correctional Facilities The Nightmare Before Christmas - Slides.m4v176.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Smartfuzzing the Web Carpe Vestra Foramina - Slides.m4v132.8 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves - Slides.m4v168.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Patrick Engebretson and Josh Pauli - Mamma Dont Let Your Babies Grow Up to be Pen Testers - Slides.m4v107.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Paul Craig - Internet Kiosk Terminals The Redux - Slides.m4v164.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security - Slides.m4v101.3 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Reeves Smith - How Haunters Void Warranties - Slides.m4v49.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST - Slides.m4v161.7 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Rick Howard - An Insiders Look at International Cyber Security Threats and Trends - Slides.m4v114.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Ryan Linn - PIG Finding Truffles Without Leaving A Trace - Slides.m4v164.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Sam Bowne - Three Generations of DoS Attacks - Slides.m4v156.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Schuyler Towne - DIY Non-Destructive Entry - Slides.m4v103.5 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Shawn Webb - Runtime Process Insemination - Slides.m4v85.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Shrdlu - Are You In Yet The CISOs View of Pentesting - Slides.m4v79.8 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Skunkworks - Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin - Slides.m4v70.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE - Slides.m4v147.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Steve Ocepek - Blinkie Lights Network Monitoring with Arduino - Slides.m4v170.6 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Steven Levy - We Owe it All to the Hackers - Slides.m4v135.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and LosTboY - Welcome - Making of the badge - Slides.m4v143.8 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and Russ Rogers - DEF CON Awards - Slides.m4v122.1 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Thomas Wilhelm - Staying Connected during a Revolution or Disaster - Slides.m4v164.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network - Slides.m4v126.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Tyler Cohen - Look At What My Car Can Do - Slides.m4v161.3 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang - Slides.m4v108.0 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit - Slides.m4v141.3 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Whitfield Diffie and Moxie Marlinspike - Slides.m4v187.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - William Manning - Pervasive Cloaking - Slides.m4v77.2 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Yekaterina Tsipenyuk ONeil and Erika Chin - Seven Ways to Hang Yourself with Google Android - Slides.m4v106.4 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - Zoz and Andrea Bianchi - Vanquishing Voyeurs Secure Ways To Authenticate Insecurely - Slides.m4v175.3 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - datagram - Introduction to Tamper Evident Devices - Slides.m4v148.9 MiB2013-Jun-03 07:00
DEF CON 19 Hacking Conference Presentation By - eskimo - Steganography and Cryptography 101 - Slides.m4v61.7 MiB2013-Jun-03 07:00