/DEF CON 23/DEF CON 23 presentations/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEFCON-23-3alarmlampscooter-DIY-Nukeproofing.pdf319.0 KiB2015-Jul-21 11:36
DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy-UPDATED.pdf1.3 MiB2015-Aug-14 13:50
DEFCON-23-Alessandro-Di-Federico-Leakless-How-The-ELF-ruined-Christmas.pdf329.4 KiB2015-Jul-21 11:36
DEFCON-23-Amit-Ashbel-Maty-Siman-Game-of-Hacks-Play-Hack-and-Track-UPDATED.pdf1.5 MiB2015-Aug-14 13:51
DEFCON-23-Andres-Blanco-802.11-Massive-Monitoring-UPDATED.pdf1.7 MiB2015-Aug-14 13:52
DEFCON-23-Atlas-Fun-With-Symboliks.pdf9.8 MiB2015-Jul-21 11:38
DEFCON-23-Ballenthin-Graeber-Teodorescu-WMI-Attacks-Defense-Forensics.pdf2.7 MiB2015-Jul-21 11:39
DEFCON-23-Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pdf2.0 MiB2015-Jul-21 11:39
DEFCON-23-Brent-White-Hacking-Web-Apps-WP.pdf122.4 KiB2015-Jul-21 11:39
DEFCON-23-Bruce-Potter-Hackers-Guide-to-Risk.pdf526.8 KiB2015-Jul-21 11:39
DEFCON-23-Cassidy-Leverett-Lee-Switches-Get-Stitches.pdf2.2 MiB2015-Jul-21 11:40
DEFCON-23-Chris-Domas-REpsych.pdf3.6 MiB2015-Jul-21 11:41
DEFCON-23-Chris-Rock-I-Will-Kill-You-How-to-Get-Away-with-Murder.pdf2.0 MiB2015-Jul-21 11:41
DEFCON-23-Chris-Sistrunk-NSM-101-for-ICS.pdf3.4 MiB2015-Jul-21 11:42
DEFCON-23-Colby-Moore-Spread-Spectrum-Satcom-Hacking.pdf33.9 KiB2015-Jul-21 11:42
DEFCON-23-Colin-O'Flynn-Dont-Whisper-My-Chips.pdf3.4 MiB2015-Jul-21 11:42
DEFCON-23-Collin-Anderson-Tom-Cross-Export-Controls-on-Intrusion-Software.pdf778.4 KiB2015-Jul-21 11:42
DEFCON-23-Craig-Young-Extras.rar3.2 KiB2015-Oct-10 03:15
DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-UPDATED.pdf58.6 MiB2015-Aug-22 04:21
DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-WP-UPDATED.pdf2.5 MiB2015-Aug-22 04:28
DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-Wifi-Village.pdf858.8 KiB2015-Jul-21 11:43
DEFCON-23-Damon-Small-Beyond-the-Scan.pdf1.7 MiB2015-Jul-21 11:43
DEFCON-23-Daniel-Crowley-Damon-Smith-Bugged-Files.pdf595.0 KiB2015-Jul-21 05:06
DEFCON-23-Daniel-Selifonov-Drinking-from-LETHE.pdf508.9 KiB2015-Jul-21 11:44
DEFCON-23-David-An-When-the-Secretary-of-State-says-Stop-Hacking-us.pdf1.2 MiB2015-Jul-21 11:44
DEFCON-23-David-Huerta-Alice-and-Bob-are-Really-Confused.pdf4.0 MiB2015-Jul-21 11:44
DEFCON-23-David-Mortman-Docker-UPDATED.pdf285.6 KiB2015-Sep-04 03:30
DEFCON-23-Dennis-Maldonado-Are-we-really-safe-bypassing-access-control-systems-UPDATED.pdf46.8 MiB2015-Aug-25 04:13
DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins-References.txt689 B2015-Jul-16 11:01
DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins.pdf396.6 KiB2015-Jul-21 11:45
DEFCON-23-Eijah-Crypto-for-Hackers-UPDATED.pdf2.3 MiB2015-Sep-22 05:56
DEFCON-23-Eijah-Crypto-for-Hackers-Workshop.pdf628.4 KiB2015-Sep-22 05:56
DEFCON-23-Eric-Van-Albert-Zack-Banks-Looping-Surveillance-Cameras-like-in-the-Movies.pdf1.9 MiB2015-Jul-21 11:45
DEFCON-23-Eric-XlogicX-Davisson-ReDoS.pdf2.1 MiB2015-Jul-21 11:46
DEFCON-23-Etienne-Martineau-Inter-VM-Data-Exfiltration.pdf1.5 MiB2015-Jul-21 11:46
DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick-Pics-Safer.pdf125.4 KiB2015-Jul-21 11:47
DEFCON-23-Fatih-Ozavci-The-Art-of-VoIP-Workshop-UPDATED.pdf4.1 MiB2015-Aug-14 13:52
DEFCON-23-Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Attacks-UPDATED.pdf1.4 MiB2015-Aug-14 13:53
DEFCON-23-Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Attacks-WP-UPDATED.pdf1.0 MiB2015-Aug-14 13:54
DEFCON-23-Fluxist-Unbootable-Exploiting-Paylock-Smartboot.pdf910.0 KiB2015-Jul-21 11:48
DEFCON-23-Gerard-Laygui-Forensic-Artifacts-Pass-The-Hash-Attack.pdf819.6 KiB2015-Jul-21 11:49
DEFCON-23-Grant-Bugher-Obtaining-and-Detecting-Domain-Persistence.pdf5.8 MiB2015-Jul-21 11:49
DEFCON-23-Gregory-Pickett-Extras.rar246.6 KiB2015-Oct-10 03:15
DEFCON-23-Gregory-Pickett-Staying-Persistant-in-Software-Defined-Networks.pdf1.1 MiB2015-Jul-21 11:50
DEFCON-23-Hariri-Spelman-Gorenc-Abusing-Adobe-Readers-JavaScript-APIs.pdf496.7 KiB2015-Jul-21 11:50
DEFCON-23-Ian-Kline-LTE-Recon-and-Tracking-with-RTLSDR.pdf344.2 KiB2015-Jul-21 11:50
DEFCON-23-Ian-Latter-Remote-Access-the-APT.pdf944.9 KiB2015-Jul-21 11:51
DEFCON-23-Ionut-Popescu-NetRipper-WP.pdf451.1 KiB2015-Jul-21 11:51
DEFCON-23-Ionut-Popescu-NetRipper.pdf2.3 MiB2015-Jul-21 11:51
DEFCON-23-Jason-Haddix-How-Do-I-shot-Web.pdf2.3 MiB2015-Jul-21 11:52
DEFCON-23-Jeremy-Dorrough-USB-Attack-to-Decrypt-Wi-Fi-Communications.pdf1.3 MiB2015-Jul-21 11:52
DEFCON-23-Joe-FitzPatrick-Matt-King-Extras.rar3.4 MiB2015-Oct-10 03:14
DEFCON-23-Joe-FitzPatrick-Matt-King-NSA-Playset-JTAG-Implants-UPDATED.pdf3.1 MiB2015-Aug-15 13:26
DEFCON-23-John-Menerick-Backdooring-Git.pdf4.3 MiB2015-Jul-21 11:53
DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-UPDATED.pdf1.8 MiB2015-Aug-25 03:14
DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-WP-UPDATED.pdf344.0 KiB2015-Aug-25 03:14
DEFCON-23-Jose-Selvi-Breaking-SSL-Using-Time-Synchronisation-Attacks.pdf2.2 MiB2015-Jul-21 11:53
DEFCON-23-Joshua-Drake-Stagefright-Scary-Code-in-the-Heart-of-Android-UPDATED.pdf266.9 KiB2015-Aug-14 13:54
DEFCON-23-Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC-UPDATED.pdf9.7 MiB2015-Aug-22 02:26
DEFCON-23-Justin-Engler-Secure-Messaging-For-Normal-People-WP.pdf1.7 MiB2015-Jul-21 13:41
DEFCON-23-Justin-Engler-Secure-Messaging-For-Normal-People.pdf380.6 KiB2015-Jul-21 13:41
DEFCON-23-Ken-Westin-Confessions-of-a-Cyberstalker.pdf2.6 MiB2015-Jul-20 06:18
DEFCON-23-Lance-Buttars-Nemus-Hacking-SQL-Injection-for-Remote-Code-Execution-on-a-LAMP-UPDATED.pdf1.1 MiB2015-Aug-27 23:48
DEFCON-23-Li-Jun-Yang-Qing-I-AM-A-NEWBIE-YET-I-CAN-HACK-ZIGBEE.pdf1.9 MiB2015-Jul-21 11:53
DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf9.3 MiB2015-Jul-18 07:05
DEFCON-23-Mahdi-Namazifar-Detecting-Random-Strings-Language-Based-Approach.pdf363.3 KiB2015-Jul-21 11:54
DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-UPDATED.pdf9.8 MiB2015-Aug-15 13:25
DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-WP-UPDATED.pdf2.0 MiB2015-Aug-14 13:56
DEFCON-23-Mark-Ryan-Talabis-The-Bieber-Project.pdf7.7 MiB2015-Jul-20 09:21
DEFCON-23-Marte-L0ge-I-will-Tell-you-your-Lock-Pattern-UPDATED.pdf755.1 KiB2015-Aug-14 13:57
DEFCON-23-Matteo-Becarro-Matteo-Collura-Extracting-The-Painful-Bluetooth.pdf779.3 KiB2015-Jul-21 11:54
DEFCON-23-Miaubiz-Put-on-Your-Tinfo_t-Hat.pdf744.7 KiB2015-Jul-21 11:54
DEFCON-23-Michael-Robinson-Knocking-My-Neighbors-Kids-Drone-Offline-UPDATED.pdf13.7 MiB2015-Aug-14 10:38
DEFCON-23-Michael-Schrenk-Applied-Intelligence-UPDATED.pdf920.7 KiB2015-Aug-14 13:57
DEFCON-23-Mickey-Shkatov-Jesse-Michael-Scared-poopless-LTE-and-your-laptop-UPDATED.pdf2.5 MiB2015-Aug-14 13:58
DEFCON-23-Mike-Sconzo-I-am-packer-and-so-can-you.pdf6.8 MiB2015-Jul-21 11:55
DEFCON-23-Nadeem-Douba-BurpKit.pdf1.3 MiB2015-Jul-21 11:55
DEFCON-23-Nadeem-Douba-Extras.rar20.2 MiB2015-Oct-10 03:14
DEFCON-23-Nir-Valtman-Moshe-Ferber-From-zero-to-secure-in-1-minute-UPDATED.pdf6.9 MiB2015-Aug-14 10:22
DEFCON-23-Omer-Coskun-Why-Nation-State-Malwares-Target-Telco-Networks-UPDATED.pdf3.4 MiB2015-Aug-14 13:59
DEFCON-23-Panel-Comedy-Inception-Amanda-Berlin-Blue-Team-Hell.pdf388.1 KiB2015-Jul-21 11:55
DEFCON-23-Patrick-McNeil-Guidelines-For-Securing-Your-VoIP-PBX.pdf268.6 KiB2015-Jul-21 11:55
DEFCON-23-Patrick-McNeil-Owen-Sorry-Wrong-Number.pdf2.4 MiB2015-Jul-21 11:56
DEFCON-23-Patrick-Wardle-DLL-Hijacking-on-OSX-UPDATED.pdf44.4 MiB2015-Aug-25 03:15
DEFCON-23-Patrick-Wardle-Stick-that-in-your-(Root)Pipe-and-Smoke-it-UPDATED.pdf22.9 MiB2015-Aug-25 03:14
DEFCON-23-Paul-Amicelli-David-Baptiste-How-to-secure-the-keyboard-chain.pdf416.5 KiB2015-Jul-21 11:57
DEFCON-23-Phil-Polstra-Extras.rar39.2 KiB2015-Oct-10 03:17
DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf831.7 KiB2015-Jul-21 11:57
DEFCON-23-Phil-Polstra-One-device-to-Pwn-them-all.pdf782.2 KiB2015-Jul-21 11:57
DEFCON-23-Phil-Young-Chad-Rikansrud-Extras.rar80.1 KiB2015-Oct-10 03:18
DEFCON-23-Phil-Young-Chad-Rikansrud-Security-Necromancy-Further-Adventures-in-Mainframe-Hacking.pdf4.3 MiB2015-Jul-21 11:57
DEFCON-23-Phillip-Aumasson-Quantum-Computers-vs-Computers-Security.pdf1.7 MiB2015-Jul-21 11:57
DEFCON-23-Rich-Kelley-Harness-Powershell-Weaponization-Made-Easy.pdf404.7 KiB2015-Jul-21 11:57
DEFCON-23-Richo-Healey-Mike-Ryan-Hacking-Electric-Skateboards.pdf1.1 MiB2015-Jul-21 11:57
DEFCON-23-Rickey-Lawshae-Extras.rar3.5 MiB2015-Oct-10 03:19
DEFCON-23-Rickey-Lawshae-Lets-Talk-About-SOAP.pdf381.7 KiB2015-Jul-21 11:57
DEFCON-23-Rodringo-Almeida-Embedded-System-Design-From-Electronics-To-Microkernal-Development-WP.pdf742.2 KiB2015-Jul-21 11:57
DEFCON-23-Rodringo-Almeida-Embedded-System-Design-From-Electronics-To-Microkernal-Development.pdf3.1 MiB2015-Jul-21 11:58
DEFCON-23-Rodringo-Almeida-Extras.rar55.7 KiB2015-Oct-10 03:19
DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-UPDATED.pdf494.6 KiB2015-Aug-14 13:59
DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf189.2 KiB2015-Aug-14 13:59
DEFCON-23-Ronny-Bull-Jeanna-Matthews-Extras.rar106.3 MiB2015-Oct-10 03:19
DEFCON-23-Ryan-Castellucci-Cracking-Cryptocurrency-Brainwallets.pdf179.6 KiB2015-Jul-21 11:58
DEFCON-23-Ryan-Mitchell-Separating-Bots-from-Humans.pdf125.2 KiB2015-Jul-21 11:58
DEFCON-23-Ryan-O'Neil-Advances-in-Linux-Forensics-ECFS.pdf272.6 KiB2015-Jul-21 11:58
DEFCON-23-Saif-El-Sherei-Etienne-Stalmans-SensePost-Introducing-Wadi-Fuzzer.pdf1.0 MiB2015-Jul-21 11:58
DEFCON-23-Sam-Bowne-Workshop-Android-Security-Auditing-Mobile-Apps.pdf7.5 MiB2015-Jul-15 06:41
DEFCON-23-Sam-Bowne-Workshop-Violent-Python.pdf6.9 MiB2015-Jul-15 06:41
DEFCON-23-Samy-Kamkar-Extras.rar51.3 KiB2015-Oct-10 03:20
DEFCON-23-Samy-Kamkar-README.txt518 B2015-Jul-16 14:03
DEFCON-23-Sarah-Edwards-Ubiquity-Forensics.pdf23.9 MiB2015-Jul-16 01:16
DEFCON-23-Sean-Metcalf-Red-vs-Blue-AD-Attack-and-Defense.pdf2.3 MiB2015-Aug-14 14:00
DEFCON-23-Shawn-Webb-HardenedBSD-Internals.pdf226.3 KiB2015-Jul-21 11:58
DEFCON-23-Tamas-Szakaly-Shall-We-Play-A-Game-UPDATED.pdf1.1 MiB2015-Aug-14 10:34
DEFCON-23-Tony-Trummer-Tushar-Dalvi-QARK.pdf1.9 MiB2015-Jul-21 11:58
DEFCON-23-Topher-Timzen-Acquiring-NET-Objects-From-The-Managed-Heap.pdf117.2 KiB2015-Aug-14 14:00
DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-UPDATED.pdf1.0 MiB2015-Aug-14 14:00
DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-WP.pdf109.0 KiB2015-Aug-14 14:00
DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker.pdf1.7 MiB2015-Jul-21 11:59
DEFCON-23-Vivek-Ramachadran-Chellam.pdf1.8 MiB2015-Jul-21 11:59
DEFCON-23-Walker-Wiens-Machine-vs-Machine-DARPA-Fully-Automated-CTF.pdf15.5 MiB2015-Sep-03 08:31
DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers-WP.pdf190.0 KiB2015-Jul-21 11:59
DEFCON-23-Wesley-McGrew-I-Hunt-Penetration-Testers.pdf1.8 MiB2015-Jul-21 11:59
DEFCON-23-Weston-Hecker-Goodbye-Memory-Scraping-Malware.pdf1.7 MiB2015-Jul-21 11:59
DEFCON-23-Yan-Shoshitaishvili-Fish-Wang-Angry-Hacking.pdf2.5 MiB2015-Jul-21 11:59
DEFCON-23-Yaniv-Balmas-Lior-Oppenheim-Key-Logger-Video-Mouse.pdf1.9 MiB2015-Jul-21 11:59
DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-Femto.pdf1.6 MiB2015-Jul-21 11:59
DEFCON-23-Zack-Allen-Rusty-Bower-Malware-In-Gaming.pdf1.3 MiB2015-Jul-21 12:00
DEFCON-23-ammonRA-How-to-hack-your-way-out-of-home-detention-UPDATED.pdf1.3 MiB2015-Aug-14 13:51
DEFCON-23-xntrik-Hooked-Browser-Meshed-Networks-with-webRTC-and-BeEF.pdf1.7 MiB2015-Jul-21 11:59