/DEF CON 23/DEF CON 23 audio/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 23 Conference - 1057 - RICKASTLEY - audio.lrc27.9 KiB2015-Nov-25 14:47
DEF CON 23 Conference - 1057 - RICKASTLEY - audio.m4b43.2 MiB2015-Dec-01 15:46
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - audio.lrc41.8 KiB2015-Nov-25 15:06
DEF CON 23 Conference - Aaron Grattafiori - Linux Containers - Future or Fantasy - audio.m4b41.5 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - audio.lrc37.0 KiB2015-Nov-25 15:13
DEF CON 23 Conference - Aditya K Sood - Dissecting the Design of SCADA Web HMIs - Hunting Vulns - audio.m4b34.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Alejandro Mayorkas - Working together to keep the Internet safe and secure - audio.m4b43.2 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - audio.lrc20.2 KiB2015-Nov-25 15:06
DEF CON 23 Conference - Amit Ashbel and Maty Siman - Game of Hacks - Play Hack and Track - audio.m4b29.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - audio.lrc26.2 KiB2015-Nov-25 15:20
DEF CON 23 Conference - AmmonRa - How to hack your way out of home detention - audio.m4b34.2 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - audio.lrc28.5 KiB2015-Nov-25 16:33
DEF CON 23 Conference - Andres Blanco and Andres Gazzoli - 80211 Massive Monitoring - audio.m4b35.0 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - audio.lrc21.3 KiB2015-Nov-25 15:15
DEF CON 23 Conference - Bart Kulach - Hack the Legacy - IBM I aka AS400 Revealed - audio.m4b42.5 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - audio.lrc25.2 KiB2015-Nov-25 15:29
DEF CON 23 Conference - Beccaro and Collura - Extracting the Painful blue-tooth - audio.m4b40.0 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Brent White - Hacking Web Apps - audio.lrc34.4 KiB2015-Nov-25 15:40
DEF CON 23 Conference - Brent White - Hacking Web Apps - audio.m4b35.6 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - audio.lrc38.1 KiB2015-Nov-25 15:00
DEF CON 23 Conference - Bruce Potter - A Hackers Guide to Risk - audio.m4b49.7 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Bruce Schneier - Questions and Answers - audio.lrc40.8 KiB2015-Nov-25 14:55
DEF CON 23 Conference - Bruce Schneier - Questions and Answers - audio.m4b43.2 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - audio.lrc29.8 KiB2015-Nov-25 15:45
DEF CON 23 Conference - Charlie Miller - Remote exploitation of an unaltered passenger vehicle - audio.m4b43.0 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering - audio.lrc24.5 KiB2015-Nov-25 15:45
DEF CON 23 Conference - Chris Domas - Repsych - Psychological Warfare in Reverse Engineering - audio.m4b36.0 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Chris Rock - I Will Kill You - audio.lrc17.8 KiB2015-Nov-25 15:40
DEF CON 23 Conference - Chris Rock - I Will Kill You - audio.m4b28.7 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - audio.lrc31.2 KiB2015-Nov-25 14:54
DEF CON 23 Conference - Chris Sistrunk - NSM 101 for ICS - audio.m4b36.0 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - audio.lrc28.9 KiB2015-Nov-25 16:32
DEF CON 23 Conference - Christian Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF - audio.m4b42.8 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - audio.lrc45.6 KiB2015-Nov-25 15:28
DEF CON 23 Conference - Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service - audio.m4b37.6 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - audio.lrc44.4 KiB2015-Nov-25 15:23
DEF CON 23 Conference - Colin OFlynn - Dont Whisper my Chips - Sidechannel and Glitching for Fun and Profit - audio.m4b39.9 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers - audio.lrc58.2 KiB2015-Nov-25 16:03
DEF CON 23 Conference - Cory Doctorow - Fighting Back in the War on General Purpose Computers - audio.m4b47.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - audio.lrc32.8 KiB2015-Nov-25 15:24
DEF CON 23 Conference - Craig Young - How to Train Your RFID Hacking Tools - audio.m4b28.2 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - audio.lrc41.2 KiB2015-Nov-25 16:33
DEF CON 23 Conference - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln Research - audio.m4b42.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - audio.lrc50.1 KiB2015-Nov-25 16:03
DEF CON 23 Conference - DT and 1057 - Welcome to DEF CON - audio.m4b37.6 MiB2015-Dec-01 15:44
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - audio.lrc24.8 KiB2015-Nov-25 14:42
DEF CON 23 Conference - DaKahuna and satanklawz - Introduction to SDR and the Wireless Village - audio.m4b37.7 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - audio.lrc28.5 KiB2015-Nov-25 14:46
DEF CON 23 Conference - Damon Small - Beyond the Scan - The Value Proposition of Vuln Assessment - audio.m4b42.5 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - audio.lrc34.6 KiB2015-Nov-25 15:46
DEF CON 23 Conference - Dan Kaminsky - I want these bugs off my Internet - audio.m4b44.7 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - audio.lrc44.6 KiB2015-Nov-25 15:29
DEF CON 23 Conference - Daniel Crowley and Damon Smith - Bugged Files - Is Your Doc Telling on You - audio.m4b42.9 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - audio.lrc31.5 KiB2015-Nov-25 15:41
DEF CON 23 Conference - Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns - audio.m4b40.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - audio.lrc22.7 KiB2015-Nov-25 16:11
DEF CON 23 Conference - David An - When the Secretary of State says Please Stop Hacking Us - audio.m4b19.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused - audio.lrc42.0 KiB2015-Nov-25 15:39
DEF CON 23 Conference - David Huerta - Alice and Bob are Really Confused - audio.m4b40.6 MiB2015-Dec-01 15:44
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - audio.lrc41.1 KiB2015-Nov-25 15:48
DEF CON 23 Conference - David Mortman - Docker Docker Give Me The News - I Got A Bad Case Of Securing You - audio.m4b40.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - audio.lrc32.8 KiB2015-Nov-25 15:01
DEF CON 23 Conference - Dennis Maldonado - Are We Really Safe - Bypassing Access Control Systems - audio.m4b43.8 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - audio.lrc31.1 KiB2015-Nov-25 14:48
DEF CON 23 Conference - Di Federico and Shoshitaishvil - Dark Side of the ELF - Leveraging Dynamic Loading to Pwn Noobs - audio.m4b43.0 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - audio.lrc31.5 KiB2015-Nov-25 15:37
DEF CON 23 Conference - Dr Phil Polstra - Hacker in the Wires - audio.m4b36.2 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - audio.lrc29.3 KiB2015-Nov-25 15:24
DEF CON 23 Conference - Dr Phil Polstra - One Device to Pwn Them All - audio.m4b32.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Eijah - Crypto for Hackers - audio.lrc50.1 KiB2015-Nov-25 14:54
DEF CON 23 Conference - Eijah - Crypto for Hackers - audio.m4b51.8 MiB2015-Dec-01 15:44
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - audio.lrc15.6 KiB2015-Nov-25 15:03
DEF CON 23 Conference - El-Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths in Browsers - audio.m4b19.9 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - audio.lrc43.9 KiB2015-Nov-25 16:10
DEF CON 23 Conference - Eric-XlogicX-Davisson - REvisiting RE DoS - audio.m4b40.8 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - audio.lrc36.4 KiB2015-Nov-25 15:37
DEF CON 23 Conference - Etienne Martineau - The art of cache timing covert channel on x86 multi-core - audio.m4b35.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - audio.lrc34.0 KiB2015-Nov-25 15:02
DEF CON 23 Conference - Fernando Arnabold - Abusing XSLT for Practical Attacks - audio.m4b32.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - audio.lrc42.6 KiB2015-Nov-25 15:09
DEF CON 23 Conference - Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID - audio.m4b50.2 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter - audio.lrc48.0 KiB2015-Nov-25 15:52
DEF CON 23 Conference - Geoff Walton and Dave Kennedy - Pivoting Without Rights - Introducing Pivoter- audio.m4b46.0 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - audio.lrc41.4 KiB2015-Nov-25 15:36
DEF CON 23 Conference - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - audio.m4b37.6 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - audio.lrc26.0 KiB2015-Nov-25 15:21
DEF CON 23 Conference - Graham and Maynor - HamSammich - long distance proxying over radio - audio.m4b25.4 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - audio.lrc51.5 KiB2015-Nov-25 15:02
DEF CON 23 Conference - Grant Bugher - Its the Only way to be Sure - Obtaining and Detecting Domain Persistence - audio.m4b43.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - audio.lrc41.2 KiB2015-Nov-25 15:31
DEF CON 23 Conference - Gregory Picket - Staying Persistent in Software Defined Networks - audio.m4b41.9 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - audio.lrc11.5 KiB2015-Nov-25 14:57
DEF CON 23 Conference - Ian Kline - LTE Recon and Tracking with RTLSDR - audio.m4b12.7 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Ian Latter - Remote Access - the APT - audio.lrc39.8 KiB2015-Nov-25 16:10
DEF CON 23 Conference - Ian Latter - Remote Access - the APT - audio.m4b37.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - audio.lrc25.7 KiB2015-Nov-25 16:30
DEF CON 23 Conference - Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers - audio.m4b38.9 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - audio.lrc43.9 KiB2015-Nov-25 15:03
DEF CON 23 Conference - Jason Haddix - How to Shot Web - Web and mobile hacking in 2015 - audio.m4b44.9 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - audio.lrc18.2 KiB2015-Nov-25 15:19
DEF CON 23 Conference - Jean-Philippe Aumasson - Quantum Computers vs Computers Security - audio.m4b30.0 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - audio.lrc38.7 KiB2015-Nov-25 16:04
DEF CON 23 Conference - Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications - audio.m4b36.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - audio.lrc35.3 KiB2015-Nov-25 15:02
DEF CON 23 Conference - Joe FitzPatrick and Matt King - NSA Playset - JTAG Implants - audio.m4b41.8 MiB2015-Dec-01 15:44
DEF CON 23 Conference - John Menerick - Backdooring Git - audio.lrc33.8 KiB2015-Nov-25 15:35
DEF CON 23 Conference - John Menerick - Backdooring Git - audio.m4b37.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - audio.lrc32.1 KiB2015-Nov-25 15:43
DEF CON 23 Conference - John Seymour - Quantum Classification of Malware - audio.m4b27.7 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks - audio.lrc28.7 KiB2015-Nov-25 15:14
DEF CON 23 Conference - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks.m4b45.6 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - audio.lrc37.4 KiB2015-Nov-25 15:18
DEF CON 23 Conference - Joshua J Drake - Stagefright - Scary Code in the Heart of Android - audio.m4b44.1 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - audio.lrc45.5 KiB2015-Nov-25 16:36
DEF CON 23 Conference - Joshua Smith - High-Def Fuzzing - Exploring Vulnerabilities in HDMI-CEC - audio.m4b44.5 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - audio.lrc54.0 KiB2015-Nov-25 15:31
DEF CON 23 Conference - Justin Engler - Secure Messaging for Normal People - audio.m4b46.6 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - audio.lrc46.5 KiB2015-Nov-25 15:25
DEF CON 23 Conference - Ken Westin - Confessions of a Professional Cyber Stalker - audio.m4b37.8 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - audio.lrc42.3 KiB2015-Nov-25 14:59
DEF CON 23 Conference - Krotofil and Larsen - Rocking the Pocket Book - Hacking Chemical Plant for Competition and Extortion - audio.m4b46.5 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - audio.lrc17.1 KiB2015-Nov-25 15:39
DEF CON 23 Conference - Lin Huang and Qing Yang - Low-cost GPS simulator - GPS spoofing by SDR - audio.m4b34.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - audio.lrc16.1 KiB2015-Nov-25 14:58
DEF CON 23 Conference - Mahdi Namazifar - Detecting Randomly Generated Strings - audio.m4b19.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - audio.lrc34.5 KiB2015-Nov-25 15:38
DEF CON 23 Conference - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S - audio.m4b46.2 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - audio.lrc37.2 KiB2015-Nov-25 15:05
DEF CON 23 Conference - Mark Ryan Talabis - The Bieber Project - Adventures in Buying Internet Traffic - audio.m4b40.2 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - audio.lrc33.2 KiB2015-Nov-25 15:44
DEF CON 23 Conference - Marquis-Boire - Marschalek - and Guarnieril - F the attribution - show us your idb - audio.m4b50.8 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - audio.lrc11.2 KiB2015-Nov-25 15:18
DEF CON 23 Conference - Marte L0ge - Tell me who you are and I will tell you your lock pattern - audio.m4b16.7 MiB2015-Dec-01 15:44
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - audio.lrc50.0 KiB2015-Nov-25 15:32
DEF CON 23 Conference - Matt Cagle and Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy Wars - audio.m4b44.7 MiB2015-Dec-01 15:44
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System - audio.lrc48.4 KiB2015-Nov-25 15:35
DEF CON 23 Conference - McNeil and Owen - Sorry Wrong Number - Mysteries Of The Phone System -audio.m4b44.9 MiB2015-Dec-01 15:44
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - audio.lrc48.9 KiB2015-Nov-25 15:46
DEF CON 23 Conference - McSweeny and Soltani - How to Hack Gov - Technologists as Policy Makers - audio.m4b47.1 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - audio.lrc39.4 KiB2015-Nov-25 14:56
DEF CON 23 Conference - Michael Schrenk - Applied Intelligence - Using Information Thats Not There - audio.m4b35.8 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - audio.lrc31.9 KiB2015-Nov-25 15:43
DEF CON 23 Conference - Michael Walker and Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF - audio.m4b42.3 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - audio.lrc23.0 KiB2015-Nov-25 15:26
DEF CON 23 Conference - Mickey Shkatov and Jesse Michael - Scared Poopless - LTE and your laptop - audio.m4b41.3 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - audio.lrc28.5 KiB2015-Nov-25 15:45
DEF CON 23 Conference - Mike Ryan and Richo Healey - Hacking Electric Skateboards - audio.m4b41.6 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - audio.lrc39.0 KiB2015-Nov-25 14:58
DEF CON 23 Conference - Mike Sconzo - I Am Packer And So Can You - audio.m4b42.7 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - audio.lrc22.0 KiB2015-Nov-25 15:09
DEF CON 23 Conference - Nadeem Douba - BurpKit - Using WebKit to Own the Web - audio.m4b27.4 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - audio.lrc33.0 KiB2015-Nov-25 14:56
DEF CON 23 Conference - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - audio.m4b36.0 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - audio.lrc44.0 KiB2015-Nov-25 15:10
DEF CON 23 Conference - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min - Securing IAAS - audio.m4b43.7 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - audio.lrc26.2 KiB2015-Nov-25 15:53
DEF CON 23 Conference - Omer Coskun - Why nation-state malwares target Telco Networks - audio.m4b43.9 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - audio.lrc36.5 KiB2015-Nov-25 15:32
DEF CON 23 Conference - Panel - Abusing Adobe Readers JavaScript APIs - audio.m4b34.3 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties - audio.lrc62.7 KiB2015-Nov-25 15:47
DEF CON 23 Conference - Panel - Ask the EFF - The Year in Digital Civil Liberties - audio.m4b91.9 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - Closing Ceremonies - audio.lrc66.4 KiB2015-Nov-25 15:55
DEF CON 23 Conference - Panel - Closing Ceremonies - audio.m4b80.5 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - Contests Closing Ceremonies - audio.lrc25.4 KiB2015-Nov-25 15:09
DEF CON 23 Conference - Panel - Contests Closing Ceremonies - audio.m4b25.5 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - DEF CON 101 The Panel - audio.lrc73.1 KiB2015-Nov-25 14:45
DEF CON 23 Conference - Panel - DEF CON 101 The Panel - audio.m4b75.6 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - DEF CON Comedy Inception - audio.lrc74.1 KiB2015-Nov-25 16:02
DEF CON 23 Conference - Panel - DEF CON Comedy Inception - audio.m4b92.2 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - audio.lrc22.9 KiB2015-Nov-25 14:47
DEF CON 23 Conference - Panel - Guests N Goblins - Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - audio.m4b31.0 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - audio.lrc37.8 KiB2015-Nov-25 15:08
DEF CON 23 Conference - Panel - Lets Encrypt - Minting Free Certs to Encrypt the Entire Web - audio.m4b48.8 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - audio.lrc93.0 KiB2015-Nov-25 15:37
DEF CON 23 Conference - Panel - Licensed to Pwn - Weaponization and Regulation of Security Research - audio.m4b98.2 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - Switches Get Stitches - audio.lrc26.7 KiB2015-Nov-25 15:30
DEF CON 23 Conference - Panel - Switches Get Stitches - audio.m4b40.6 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - audio.lrc32.4 KiB2015-Nov-25 15:42
DEF CON 23 Conference - Panel - ThunderStrike 2- Sith Strike - audio.m4b41.6 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - audio.lrc86.8 KiB2015-Nov-25 16:35
DEF CON 23 Conference - Panel - WhyMI so Sexy - WMI Attacks - Real-Time Defense and Advanced Forensic Analysis - audio.m4b97.8 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - audio.lrc39.9 KiB2015-Nov-25 16:34
DEF CON 23 Conference - Patrick Wardle - DLL Hijacking on OS X - audio.m4b42.0 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - audio.lrc42.0 KiB2015-Nov-25 15:44
DEF CON 23 Conference - Patrick Wardle - Stick That In Your root Pipe and Smoke It - audio.m4b38.0 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - audio.lrc18.9 KiB2015-Nov-25 15:23
DEF CON 23 Conference - Paul Amicelli & Baptiste David - How to secure the Keyboard Chain - audio.m4b21.1 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - audio.lrc21.6 KiB2015-Nov-25 15:19
DEF CON 23 Conference - Peter Shipley - Insteon - False Security and Deceptive Documentation - audio.m4b33.0 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - audio.lrc51.7 KiB2015-Nov-25 15:27
DEF CON 23 Conference - Petro and Salaza - Hacking Smart Safes - On the Brink of a Robbery - audio.m4b42.7 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - audio.lrc14.9 KiB2015-Nov-25 14:53
DEF CON 23 Conference - Qing YANG - Im A Newbie Yet I Can Hack ZigBee - audio.m4b20.1 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - audio.lrc14.1 KiB2015-Nov-25 15:39
DEF CON 23 Conference - Rich Kelley - Harness - Powershell Weaponization Made Easy - audio.m4b19.2 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - audio.lrc39.1 KiB2015-Nov-25 14:56
DEF CON 23 Conference - Richard Thieme - Hacking the Human Body and Brain - audio.m4b47.7 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - audio.lrc34.1 KiB2015-Nov-25 15:55
DEF CON 23 Conference - Ricky Lawshae - Lets Talk About SOAP Baby - Lets Talk About UPNP - audio.m4b40.4 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - audio.lrc44.9 KiB2015-Nov-25 15:52
DEF CON 23 Conference - Rob Bathurst and Jeff Thomas - Canary - Keeping Your Dick Pics Safer - audio.m4b44.8 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - audio.lrc49.8 KiB2015-Nov-25 15:33
DEF CON 23 Conference - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - audio.m4b44.2 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - audio.lrc51.4 KiB2015-Nov-25 15:30
DEF CON 23 Conference - Ronny Bull and Jeanna Matthews - Exploring Layer 2 Security in Virtualized Environments - audio.m4b43.9 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - audio.lrc44.7 KiB2015-Nov-25 15:23
DEF CON 23 Conference - Runa A Sandvik and Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle - audio.m4b37.9 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - Slides.m4b39.8 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Ryan Castellucci - Cracking Cryptocurrency Brainwallets - audio.lrc37.2 KiB2015-Nov-25 15:20
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - audio.lrc15.4 KiB2015-Nov-25 15:16
DEF CON 23 Conference - Ryan Mitchell - Separating Bots from the Humans - audio.m4b22.7 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - audio.lrc47.0 KiB2015-Nov-25 15:43
DEF CON 23 Conference - Ryan Oneill - Advances in Linux Process Forensics Using ECFS - audio.m4b43.2 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - audio.lrc45.8 KiB2015-Nov-25 15:38
DEF CON 23 Conference - Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars - audio.m4b42.3 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - audio.lrc37.9 KiB2015-Nov-25 15:08
DEF CON 23 Conference - Sarah Edwards - Ubiquity Forensics - Your iCloud and You - audio.m4b41.4 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - audio.lrc30.4 KiB2015-Nov-25 14:49
DEF CON 23 Conference - Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots - audio.m4b41.1 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - audio.lrc50.5 KiB2015-Nov-25 16:09
DEF CON 23 Conference - Sean Metcalf - Red vs Blue - Modern Active Directory Attacks & Defense - audio.m4b46.8 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - audio.lrc38.2 KiB2015-Nov-25 15:07
DEF CON 23 Conference - Sean Pierce - Abusing native Shims for Post Exploitation - audio.m4b44.3 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - audio.lrc29.2 KiB2015-Nov-25 15:44
DEF CON 23 Conference - Shoshitaishvili and Wang - Angry Hacking - The next gen of binary analysis - audio.m4b42.7 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - audio.lrc26.2 KiB2015-Nov-25 15:18
DEF CON 23 Conference - Tamas Szakaly - Shall We Play a Game - audio.m4b38.0 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - audio.lrc47.2 KiB2015-Nov-25 15:41
DEF CON 23 Conference - Teddy Reed and Nick Anderson - Hardware and Trust Security - Explain it like Im 5 - audio.m4b42.1 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - audio.lrc49.2 KiB2015-Nov-25 15:12
DEF CON 23 Conference - Tony Trummer and Tushar Dalvi - QARK - Android App Exploit and SCA Tool - audio.m4b43.8 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - audio.lrc36.1 KiB2015-Nov-25 15:08
DEF CON 23 Conference - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control Flow - audio.m4b36.5 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - audio.lrc41.3 KiB2015-Nov-25 14:45
DEF CON 23 Conference - Tottenkoph and IrishMASMS - Hackers Hiring Hackers - audio.m4b48.5 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - audio.lrc24.7 KiB2015-Nov-25 15:29
DEF CON 23 Conference - Van Albert and Banks - Looping Surveillance Cameras through Live Editing of Network Streams - audio.m4b38.5 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - audio.lrc25.5 KiB2015-Nov-25 14:57
DEF CON 23 Conference - Vivek Ramachandran - Chellam - A Wi-Fi IDS Firewall for Windows - audio.m4b31.6 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - audio.lrc32.9 KiB2015-Nov-25 16:53
DEF CON 23 Conference - Vivek Ramachandran - Chigula - framework for Wi-Fi IDS and Forensics - audio.m4b41.3 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - audio.lrc37.0 KiB2015-Nov-25 16:35
DEF CON 23 Conference - Wesley McGrew - I Hunt Penetration Testers - More Weaknesses in Tools and Procedures - audio.m4b38.7 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - audio.lrc38.6 KiB2015-Nov-25 15:27
DEF CON 23 Conference - Weston Hecker - Goodbye Memory Scraping Malware - audio.m4b35.1 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - audio.lrc37.4 KiB2015-Nov-25 15:27
DEF CON 23 Conference - Yaniv Balmas and Lior Oppenheim - How To Turn Your KVM Into a Raging Key-logging Monster - audio.m4b40.2 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - audio.lrc61.6 KiB2015-Nov-25 15:47
DEF CON 23 Conference - Young and Rikansrud - Security Necromancy - Further Adventures in Mainframe Hacking - audio.m4b45.0 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - audio.lrc38.2 KiB2015-Nov-25 15:33
DEF CON 23 Conference - Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware - audio.m4b41.1 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - audio.lrc36.5 KiB2015-Nov-25 15:18
DEF CON 23 Conference - Zack Allen and Rusty Bower - Malware in the Gaming Micro-economy - audio.m4b39.3 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - audio.lrc38.8 KiB2015-Nov-25 15:39
DEF CON 23 Conference - Zack Fasel - Seeing through the Fog - audio.m4b32.2 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - audio.lrc13.5 KiB2015-Nov-25 15:19
DEF CON 23 Conference - Zheng and Shan - Build a free cell traffic capture tool with vxworks based femoto - audio.m4b39.5 MiB2015-Dec-01 15:45
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - audio.lrc31.7 KiB2015-Nov-25 15:01
DEF CON 23 Conference - Zoz - And Thats How I Lost My Other Eye - Further Explorations In Data Destruction - audio.m4b49.3 MiB2015-Dec-01 15:45
DEF CON 23 Conference - atlas - Fun with Symboliks - audio.lrc28.5 KiB2015-Nov-25 15:40
DEF CON 23 Conference - atlas - Fun with Symboliks - audio.m4b39.3 MiB2015-Dec-01 15:44
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - audio.lrc10.5 KiB2015-Nov-25 16:29
DEF CON 23 Conference - miaubiz - Put on your tinfo_t hat if youre my type - audio.m4b15.6 MiB2015-Dec-01 15:45