DEF CON 29
视频
|
2021-11-15 06:08
|
2024-12-26 02:02
|
144
|
41.52 GB
|
453
|
- DEF CON 29 badge/Firmware/Source/DC29/src/ASF/common/utils/parts.h41.7KB
- DEF CON 29 badge/Firmware/Source/DC29/src/asf.h4.41KB
- DEF CON 29 badge/Firmware/Source/Defcon29.atsln962B
- DEF CON 29 contests/Auto Driving CTF/DEF CON 29 AutoDrivingCTF - Zhisheng - DemoChallenges.mp48.08MB
- DEF CON 29 music/DEF CON 29 OST - flac/01 - Skittish & Bus - The Signal (featuring The Dark Tangent).flac62.21MB
- DEF CON 29 music/DEF CON 29 OST - flac/02 - Archwisp - Throw It Back (featuring Jotunvillur).flac47.59MB
- DEF CON 29 music/DEF CON 29 OST - flac/03 - RBM - The Incident.flac111.04MB
- DEF CON 29 music/DEF CON 29 OST - flac/04 - Seeker - Modulations.flac94.02MB
- DEF CON 29 music/DEF CON 29 OST - flac/05 - Mystery Club - Starlight (GOASTS Human In The Loop Remix).flac58.11MB
- DEF CON 29 music/DEF CON 29 OST - flac/06 - Mateusz Drozd - Station X1 Galaxy Citron.flac32.36MB
- DEF CON 29 music/DEF CON 29 OST - flac/07 - bash explode - serial.flac39.27MB
- DEF CON 29 music/DEF CON 29 OST - flac/08 - Synd - Close Your Eyes.flac68.45MB
- DEF CON 29 music/DEF CON 29 OST - flac/09 - DJ Spin & Tonic - Val's Dragon.flac38.15MB
- DEF CON 29 music/DEF CON 29 OST - flac/10 - 1336 - Synapticity.flac31.51MB
- DEF CON 29 music/DEF CON 29 OST - flac/11 - pbarry25 - We're All Alike (Original Mix).flac32.81MB
- DEF CON 29 music/DEF CON 29 OST - flac/12 - c64 - Sunsetting.flac47.68MB
- DEF CON 29 music/DEF CON 29 OST - flac/13 - Autocorrect - Outside.flac20.34MB
- DEF CON 29 music/DEF CON 29 OST - flac/14 - Yung Innanet - Unbound (Max James Remix).flac32.81MB
- DEF CON 29 music/DEF CON 29 OST - flac/15 - int eighty - No Answer.flac28.47MB
- DEF CON 29 music/DEF CON 29 OST - flac/16 - Damn The Data - Can't Stop The Signal.flac56.59MB
- DEF CON 29 music/DEF CON 29 OST - flac/17 - Mikal kHill - Spent Our Lives On Fire (featuring Tribe One).flac33.12MB
- DEF CON 29 music/DEF CON 29 OST - flac/18 - Ohm-I - Domain (featuring Yung Innanet) (Remix).flac50.96MB
- DEF CON 29 music/DEF CON 29 OST - flac/19 - KEN BAE BG - Barking For Broccoli (featuring Marni Doll & Boppy Stitch) (DEF CON 29 Edit).flac46.72MB
- DEF CON 29 music/DEF CON 29 OST - flac/20 - Rushfell - Bad Wisdom.flac63.93MB
- DEF CON 29 music/DEF CON 29 OST - flac/21 - Dual Core - The Same Time.flac35.18MB
- DEF CON 29 music/DEF CON 29 live music - flac/Abstrct - Thusday Night.flac419.33MB
- DEF CON 29 music/DEF CON 29 live music - flac/Acid T - Thursday Night.flac385.53MB
- DEF CON 29 music/DEF CON 29 live music - flac/Ctrl_RSM - Sat Night.flac350.04MB
- DEF CON 29 music/DEF CON 29 live music - flac/Ctrl_rsm - Thursday Night.flac364.79MB
- DEF CON 29 music/DEF CON 29 live music - flac/Dr. McGrew - Thursday Night.flac369.73MB
- DEF CON 29 music/DEF CON 29 live music - flac/FuzzyNop - Friday Night.flac375.15MB
- DEF CON 29 music/DEF CON 29 live music - flac/Kriz Klink - Saturday Night.flac335.07MB
- DEF CON 29 music/DEF CON 29 live music - flac/Magik Plan - Friday Night.flac304.46MB
- DEF CON 29 music/DEF CON 29 live music - flac/Miss Jackalope - Saturday Night.flac485.89MB
- DEF CON 29 music/DEF CON 29 live music - flac/N0x08 - Friday Night.flac417.74MB
- DEF CON 29 music/DEF CON 29 live music - flac/Ohm i - Saturday Night.flac301.4MB
- DEF CON 29 music/DEF CON 29 live music - flac/Scotch and Bubbles - Friday Night.flac417.04MB
- DEF CON 29 music/DEF CON 29 live music - flac/St3rling - Thursday Night.flac402.38MB
- DEF CON 29 music/DEF CON 29 live music - flac/Terrestrial Access Network - Pool Friday.flac381.68MB
- DEF CON 29 music/DEF CON 29 live music - flac/Thaad - Friday Night.flac389.5MB
- DEF CON 29 music/DEF CON 29 live music - flac/Yesterday & Tomorrow - Pool Friday.flac367.17MB
- DEF CON 29 music/DEF CON 29 live music - flac/Z3NPI - Pool Friday.flac401.99MB
- DEF CON 29 music/DEF CON 29 live music - flac/Zebbler Encanti Experience - Saturday Night.flac350.47MB
- DEF CON 29 music/DEF CON 29 live music - video/Abstrct - Thusday Night.mp4797.88MB
- DEF CON 29 music/DEF CON 29 live music - video/Acid T - Thursday Night.mp4781.24MB
- DEF CON 29 music/DEF CON 29 live music - video/Ctrl RSM - Saturday Night.mp4714.73MB
- DEF CON 29 music/DEF CON 29 live music - video/Ctrl RSM - Thursday Night.mp4776.57MB
- DEF CON 29 music/DEF CON 29 live music - video/Dr. McGrew - Thursday Night.mp4780.79MB
- DEF CON 29 music/DEF CON 29 live music - video/FuzzyNop - Friday Night.mp4793.26MB
- DEF CON 29 music/DEF CON 29 live music - video/Kriz Klink - Saturday Night.mp4782.32MB
- DEF CON 29 music/DEF CON 29 live music - video/Magik Plan - Friday Night.mp4633.4MB
- DEF CON 29 music/DEF CON 29 live music - video/Miss Jackalope - Saturday Night.mp4914.35MB
- DEF CON 29 music/DEF CON 29 live music - video/N0x08 - Friday Night.mp4806.58MB
- DEF CON 29 music/DEF CON 29 live music - video/Ohm i - Saturday Night.mp4752.12MB
- DEF CON 29 music/DEF CON 29 live music - video/Scotch and Bubbles - Friday Night.mp4805.6MB
- DEF CON 29 music/DEF CON 29 live music - video/St3rling - Thursday Night.mp4827.67MB
- DEF CON 29 music/DEF CON 29 live music - video/Thaad - Friday Night.mp4771.75MB
- DEF CON 29 music/DEF CON 29 live music - video/Zebbler Encanti Experience - Saturday Night.mp4806.73MB
- DEF CON 29 video and slides/DEF CON 29 - Adam Zabrocki Alexander Matrosov - Glitching RISC-V chips - MTVEC corruption for hardening ISA.mp4117.43MB
- DEF CON 29 video and slides/DEF CON 29 - Agent X - A Look Inside Security at the New York Times - Live.mp482.68MB
- DEF CON 29 video and slides/DEF CON 29 - Agent X - A Look Inside Security at the New York Times.mp487.11MB
- DEF CON 29 video and slides/DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys.mp436.83MB
- DEF CON 29 video and slides/DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS-man Comes For Us All.mp496.64MB
- DEF CON 29 video and slides/DEF CON 29 - Barak Sternberg - Extension-Land - exploits and rootkits in your browser extensions.mp494.09MB
- DEF CON 29 video and slides/DEF CON 29 - Barak Sternberg - Extension-Land Exploits and Rootkits in Your Browser Extensions - Live.mp454.09MB
- DEF CON 29 video and slides/DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza - Writing Golang Malware.mp4112.59MB
- DEF CON 29 video and slides/DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires.mp498.83MB
- DEF CON 29 video and slides/DEF CON 29 - Bill Woodcock - Defending Against Nation-state (legal) Attack - Live.mp455.33MB
- DEF CON 29 video and slides/DEF CON 29 - Brian Hong - Sleight of ARM - Demystifying Intel Houdini.mp483.04MB
- DEF CON 29 video and slides/DEF CON 29 - Cedric Owens - Gone Apple Pickin - Red Teaming macOS Environments in 2021.mp4118.05MB
- DEF CON 29 video and slides/DEF CON 29 - Chad Seaman - UPnProxyPot - fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire.mp479.41MB
- DEF CON 29 video and slides/DEF CON 29 - Christian Dameff, Jeff Tully, Panel - Do No Harm A Healthcare Security Conversation - Live.mp4198.14MB
- DEF CON 29 video and slides/DEF CON 29 - Christian quaddi Dameff MD, Jeff r3plicant Tully MD, Jessica Wilkerson, Josh Corman - Do No harm - Health Panel.mp4128.6MB
- DEF CON 29 video and slides/DEF CON 29 - Christopher Wade - Breaking Secure Bootloaders.mp482.85MB
- DEF CON 29 video and slides/DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIP.mp482.31MB
- DEF CON 29 video and slides/DEF CON 29 - Cory Doctorow - Privacy Without Monopoly.mp481.08MB
- DEF CON 29 video and slides/DEF CON 29 - Dan Petro - You're Doing IoT RNG - Demo.mp43.33MB
- DEF CON 29 video and slides/DEF CON 29 - Dan Petro - You're Doing IoT RNG.mp4102.2MB
- DEF CON 29 video and slides/DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - Live.mp470.21MB
- DEF CON 29 video and slides/DEF CON 29 - David Dworken - Worming through IDEs.mp433.62MB
- DEF CON 29 video and slides/DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security - Liberating your vacuum from the cloud.mp455.3MB
- DEF CON 29 video and slides/DEF CON 29 - Dennis Giese - Robots with lasers and cameras but no security Liberating your vacuum from the cloud - Live.mp463.91MB
- DEF CON 29 video and slides/DEF CON 29 - Dimitry Op Nomad Snezhkov - Racketeer Toolkit. Prototyping Controlled Ransomware Operations.mp445.22MB
- DEF CON 29 video and slides/DEF CON 29 - Dimitry Op Nomad Snezhkov - Your House is My House - Use of Offensive Enclaves In Adversarial Operations.mp442.79MB
- DEF CON 29 video and slides/DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock, Timothy Lee - Hacking Humans with AI as a Service.mp462.08MB
- DEF CON 29 video and slides/DEF CON 29 - Guillaume Fournier Sylvain Afchain Sylvain Baubeau - eBPF, I thought we were friends.mp4167.06MB
- DEF CON 29 video and slides/DEF CON 29 - Hao Xing Zekai Wu - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain.mp476.54MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo1-WhatIsAContainer.mp42.21MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo2-Breakout.mp44.41MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout-Demo3-Mainframe.mp44.06MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Coldwater Chad Rikansrud (Bigendian Smalls) - The Real-Life Story of the First Mainframe Container Breakout.mp461.99MB
- DEF CON 29 video and slides/DEF CON 29 - Ian Vitek - Central bank digital currency, threats and vulnerabilities.mp480.02MB
- DEF CON 29 video and slides/DEF CON 29 - Ionut Cernica - Hack the hackers- Leaking data over SSL-TLS.mp446.52MB
- DEF CON 29 video and slides/DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability.mp470.74MB
- DEF CON 29 video and slides/DEF CON 29 - James Kettle - HTTP2 - The Sequel is Always Worse.mp482.16MB
- DEF CON 29 video and slides/DEF CON 29 - Javadi, Draffen, Betts, Jensterle - The PACS Man Comes for Us All - Live.mp492.87MB
- DEF CON 29 video and slides/DEF CON 29 - Jeff Dileo - Instrument and Find Out - Writing Parasitic Tracers for High Level Languages.mp445.28MB
- DEF CON 29 video and slides/DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Demo.mp46.26MB
- DEF CON 29 video and slides/DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - Live.mp466.34MB
- DEF CON 29 video and slides/DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows.mp494.37MB
- DEF CON 29 video and slides/DEF CON 29 - Jiska Alexander Heinrich - Wibbly Wobbly, Timey Wimey - Whats Really Inside Apples U1 Chip.mp467.69MB
- DEF CON 29 video and slides/DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 1.mp4653.08KB
- DEF CON 29 video and slides/DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - Demo 2.mp4741.43KB
- DEF CON 29 video and slides/DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems.mp450.48MB
- DEF CON 29 video and slides/DEF CON 29 - Joseph Gabay - DoS Denial of Shopping - Analyzing and Exploiting Physical Shopping Cart Immobilization Systems - Live.mp438.71MB
- DEF CON 29 video and slides/DEF CON 29 - Justin Perdok - Hi I'm DOMAIN Steve, please let me access VLAN2 - Demo Palo Alto.mp42.35MB
- DEF CON 29 video and slides/DEF CON 29 - Justin Perdok - Hi I'm DOMAIN Steve, please let me access VLAN2 - Demo SonicWall.mp41.66MB
- DEF CON 29 video and slides/DEF CON 29 - Justin Perdok - Hi I'm DOMAIN Steve, please let me access VLAN2.mp468.17MB
- DEF CON 29 video and slides/DEF CON 29 - Kelly Kaoudis Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language.mp478.78MB
- DEF CON 29 video and slides/DEF CON 29 - Laura Abbott Rick Altherr - Breaking TrustZone-M - Privilege Escalation on LPC55S69.mp4124.6MB
- DEF CON 29 video and slides/DEF CON 29 - Mars Cheng Selmon Yang - Taking Apart and Taking Over ICS & SCADA Ecosystems - A Case Study of Mitsubishi Electric.mp4145.29MB
- DEF CON 29 video and slides/DEF CON 29 - Martin Doyhenard - Response Smuggling- Pwning HTTP-1.1 Connections.mp481.52MB
- DEF CON 29 video and slides/DEF CON 29 - Matthew Bryant - Hacking G Suite - The Power of Dark Apps Script Magic.mp488.96MB
- DEF CON 29 video and slides/DEF CON 29 - Matthew Bryant - Hacking G Suite The Power of dark Apps Script Magic - Live.mp451.08MB
- DEF CON 29 video and slides/DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge.mp479.58MB
- DEF CON 29 video and slides/DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge - Live.mp493.24MB
- DEF CON 29 video and slides/DEF CON 29 - Mickey Shkatov Jesse Michael - High-Stakes Updates - BIOS RCE OMG WTF BBQ.mp461.39MB
- DEF CON 29 video and slides/DEF CON 29 - Orange Tsai - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server.mp4101.31MB
- DEF CON 29 video and slides/DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - Demo.mp410.28MB
- DEF CON 29 video and slides/DEF CON 29 - PatH - Warping Reality - creating and countering the next generation of Linux rootkits using eBPF.mp486.43MB
- DEF CON 29 video and slides/DEF CON 29 - Patrick Wardle - Bundles of Joy - Breaking macOS via Subverted Applications Bundles.mp497.34MB
- DEF CON 29 video and slides/DEF CON 29 - Paz Hameiri - TEMPEST radio station.mp4134.76MB
- DEF CON 29 video and slides/DEF CON 29 - Policy Panel - Hackers into the UN - Engaging in the cyber discussions on war and peace - Live.mp498MB
- DEF CON 29 video and slides/DEF CON 29 - Policy Panel - Ransomware’s Big Year - From Nuisance to Scourge - Live.mp4161.41MB
- DEF CON 29 video and slides/DEF CON 29 - Policy Panel - Rebooting Critical Infrastructure Protection - Live.mp4155.48MB
- DEF CON 29 video and slides/DEF CON 29 - Rex Guo Junyuan Zeng - Phantom Attack - Evading System Call Monitoring.mp462.39MB
- DEF CON 29 video and slides/DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Demo.mp46.19MB
- DEF CON 29 video and slides/DEF CON 29 - Reza Soosahabi Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond.mp496.47MB
- DEF CON 29 video and slides/DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW - A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - Live.mp466.77MB
- DEF CON 29 video and slides/DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E-I-E-I CAR.mp492.88MB
- DEF CON 29 video and slides/DEF CON 29 - Richard Thieme AKA neuralcowboy - UFOs - Misinformation, Disinformation, and the Basic Truth.mp491.84MB
- DEF CON 29 video and slides/DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee - Signal analysis and RE of a proprietary audio-data encoding protocol.mp495.95MB
- DEF CON 29 video and slides/DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning.mp4125.78MB
- DEF CON 29 video and slides/DEF CON 29 - Roy Davis - No Key-No PIN-No Combo - No Problem P0wning ATMs For Fun and Profit.mp4101.97MB
- DEF CON 29 video and slides/DEF CON 29 - Sach - MAVSH - Attacking from Above - Live.mp476.61MB
- DEF CON 29 video and slides/DEF CON 29 - Sagi Sheinfeld Eyal Karni Yaron Zinar - Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes.mp491.35MB
- DEF CON 29 video and slides/DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - Live.mp439.24MB
- DEF CON 29 video and slides/DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack.mp466.78MB
- DEF CON 29 video and slides/DEF CON 29 - Seth Kintigh - Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance.mp481.57MB
- DEF CON 29 video and slides/DEF CON 29 - Sheila A. Berta - The Unbelievable Insecurity of the Big Data Stack.mp495.67MB
- DEF CON 29 video and slides/DEF CON 29 - Shir Tamari Ami Luttwak - A new class of DNS vulnerabilities affecting many DNS-as-Service platforms.mp454.06MB
- DEF CON 29 video and slides/DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain.mp441.78MB
- DEF CON 29 video and slides/DEF CON 29 - Slava Makkaveev - Do you like to read - I know how to take over your Kindle with an e-book - Demo.mp41.58MB
- DEF CON 29 video and slides/DEF CON 29 - Slava Makkaveev - Do you like to read - I know how to take over your Kindle with an e-book.mp446.95MB
- DEF CON 29 video and slides/DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen.mp484.61MB
- DEF CON 29 video and slides/DEF CON 29 - The Dark Tangent - Closing Ceremonies - Live.mp4356.79MB
- DEF CON 29 video and slides/DEF CON 29 - The Dark Tangent, Panel - DEF CON 102 - Live.mp4169.28MB
- DEF CON 29 video and slides/DEF CON 29 - Thomas Roth - Hacking the Apple AirTags.mp472.83MB
- DEF CON 29 video and slides/DEF CON 29 - Tianze Ding - Vulnerability Exchange - One Domain Account For More Than Exchange Server RCE.mp469.68MB
- DEF CON 29 video and slides/DEF CON 29 - Tom Van Goethem Mathy Vanhoef - Timeless Timing Attacks.mp4198.54MB
- DEF CON 29 video and slides/DEF CON 29 - Tomer Bar Eran Segal - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us.mp460.3MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 1.mp42.26MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 2.mp42.74MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 3.mp41MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 4.mp42.45MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 5.mp44.7MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 6.mp41.88MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once)-Demo 7.mp42.01MB
- DEF CON 29 video and slides/DEF CON 29 - Vivek Nair, Ph.D. - Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once).mp452.72MB
- DEF CON 29 video and slides/DEF CON 29 - Yuhao Weng Steven Seeley Zhiniang Peng - don't Dare to Exploit - An Attack Surface Tour of SharePoint Server.mp464.55MB
- DEF CON 29 video and slides/DEF CON 29 - Zhipeng Huo Yuebin Sun Chuanda Ding - Caught you - reveal and exploit IPC logic bugs inside Apple.mp463.76MB
- DEF CON 29 video and slides/DEF CON 29 - hyp3ri0n aka Alejandro Caceres, Jason Hopper - PunkSPIDER and IOStation - Making a Mess All Over the Internet.mp492.1MB
- DEF CON 29 video logos/DC29 logo - 3d swril.mp439.04MB
- DEF CON 29 video logos/DC29 logo - Flowing purple blob wave.mp416.42MB
- DEF CON 29 video logos/DC29 logo - Xwing targeting computer.mp425.94MB
- DEF CON 29 video logos/DC29 logo - blob.mp431.34MB
- DEF CON 29 video logos/DC29 logo - fly over wavy grid.mp438.9MB
- DEF CON 29 video logos/DC29 logo - green fast sweep.mp417.63MB
- DEF CON 29 video logos/DC29 logo - green glitchy.mp419.69MB
- DEF CON 29 video logos/DC29 logo - origami.mp439.05MB
- DEF CON 29 video logos/DC29 logo - wavy crystal.mp439.04MB
- DEF CON 29 video logos/DC29 logo - wire tunnel fast.mp438.88MB
- DEF CON 29 videos by Alex Chaveriat/DEF CON - The Good, the Bad, and the Awkward.mp414.1MB
- DEF CON 29 videos by Alex Chaveriat/Debriefing My DEF CON 29... and Gourry.mp417.09MB
- DEF CON 29 videos by Alex Chaveriat/HACKING DEFCON with a URINAL CAKE.mp423.59MB
- DEF CON 29 videos by Alex Chaveriat/Hack a Airplane [Aerospace Village] - DEF CON 29.mp418.72MB
- DEF CON 29 videos by Alex Chaveriat/Hack a Boat [SEA-TF Maritime Hacking] Contest - DEF CON 29.mp416.41MB
- DEF CON 29 videos by Alex Chaveriat/Hack a Satellite [Hack-A-Sat] Contest - DEF CON 29.mp420.77MB
- DEF CON 29 videos by Alex Chaveriat/Hackers and Paper Airplanes [Aerospace Village] - DEF CON 29.mp47.52MB
- DEF CON 29 videos by Alex Chaveriat/Hardware Hacking Village [with Kralik] - DEF CON 29.mp49.97MB
- DEF CON 29 videos by Alex Chaveriat/Hats off for HelmetCon - DEF CON 29.mp411.79MB
- DEF CON 29 videos by Alex Chaveriat/Hooked to a Lie Detector [Tor Badge] - DEF CON 29 #badgelife.mp415.57MB
- DEF CON 29 videos by Alex Chaveriat/Internet Controlled Helmet [with JRWR] - DEF CON 29.mp421.02MB
- DEF CON 29 videos by Alex Chaveriat/Let's Get Paranoid with Tin Foil Hat [with Krux] - DEF CON 29.mp47.37MB
- DEF CON 29 videos by Alex Chaveriat/Meeting DEF CON 29 Goer [alt bier] #badgelife.mp44.65MB
- DEF CON 29 videos by Alex Chaveriat/Motorcycle Hacking at the Car Hacking Village - DEF CON 29.mp417.37MB
- DEF CON 29 videos by Alex Chaveriat/My DEF CON 29 just got WEIRD - THANK YOU.mp425.76MB
- DEF CON 29 videos by Alex Chaveriat/My Favorite DEF CON Low-Tech Hacking Story #Shorts.mp41.91MB
- DEF CON 29 videos by Alex Chaveriat/My HELMET is hacking the WIRELESS spectrum - DEF CON 29.mp422.72MB
- DEF CON 29 videos by Alex Chaveriat/Propagate the Signal [with JRWR] - DEF CON 29 #badgelife.mp44.22MB
- DEF CON 29 videos by Alex Chaveriat/Sending a Image Over Ham Radio - DEF CON 29.mp45.7MB
- DEF CON 29 videos by Alex Chaveriat/Space Rover Hacking [Aerospace Village] - DEF CON 29.mp426.22MB
- DEF CON 29 videos by Alex Chaveriat/The DEFCON Darknet Badge Spreads STDs to Hackers.mp45.71MB
- DEF CON 29 videos by Alex Chaveriat/Theremin Badge at DEF CON #badgelife #Shorts.mp4615.92KB
- DEF CON 29 videos by Alex Chaveriat/Unofficial DEF CON 29 Badges #badgelife - Pre-Con Look.mp426.07MB
- DEF CON 29 videos by Alex Chaveriat/We just - enjoyed - PEPPERCON at DEF CON 29.mp48.22MB
- DEF CON 29 videos by Alex Chaveriat/What Happened At DEF CON 29.mp4194.34MB
- DEF CON 29 videos by Alex Chaveriat/What is DEF CON Scavenger Hunt - DEF CON 29.mp48.43MB
- DEF CON 29 videos by Alex Chaveriat/What is the Ham Radio Village - DEF CON 29.mp415.36MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Abhijith B R - Village kick-off.mp420.9MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for Persistence.mp452.5MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Carlos Polop - New generation of PEAS.mp469.87MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTs behind Software Supply Chain Attacks.mp490.44MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework.mp490.74MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Daniel Isler - How I got COVID in a RedTeam-SE and physical intrusion for attack sim.mp465.25MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - David Hunt - Prelude Operator.mp470.36MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations.mp4283.99MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Gil Biton - Scaling Up Offensive Pipelines.mp466.64MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Jonas Bulow Knudsen Tool Demo ImproHound - Identify AD tiering violations.mp451.39MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common reverse HTTP shell tools.mp4110MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Juneau Jones - Game Theory Understanding and Strategy and Deception.mp433.84MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Keynote - David Kennedy.mp487.05MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC failures with RedELK.mp4108.78MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Mark Loveless - A Short History and An Example Attack.mp467.2MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can.mp480.39MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation.mp467.89MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Mauro Eldritch & Luis Ramirez - Everything is a C2 if you're brave enough.mp458.64MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversary.mp439.5MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Samuel Kimmons - Intro to Adversary Emulation.mp464.48MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Sanne Maasakkers - Phish Like An APT.mp459.56MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Sergey Chubarov - From On-Prem to the Cloud - Hybrid AD attack path.mp461.86MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Shantanu Khandelwal - Red Team Credentials Reconnaissance (OLD with a TWIST).mp456.71MB
- DEF CON 29 villages/DEF CON 29 Adversary Village - Stephan Wampouille - Autonomous lateral movement.mp421.21MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747s.mp420.84MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced Data.mp423.59MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox - Hunting for Vulnerabilities.mp433.98MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Darren Cofer - Steal This Drone High-Assurance Cyber Military Systems.mp419.74MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Frank Pount, Vito, Steve Wood, Capt. Aaron Bolen - Hack-A-Sat 2 - The Good, the Bad and the Cyber-Secure.mp4134.17MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - James Pavue - Threat Modeling for Space Hitchhikers.mp421.9MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Jason Whelan - Defending the Unmanned Aerial Vehicle - Advancements in UAV Intrusion Detection.mp420.69MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Joshua Smailes - CPDLC - Man-in-the-middle attacks and how to defend against them.mp424.66MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training Models.mp419.42MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real-World Avionics Hardware.mp420.56MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Lost In Space - No-one Can Hear Your Breach (Choose Wisely).mp4124.58MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Matt Gaffney - VDP in aviation - Experiences and lessons learnt as a researcher.mp427.74MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you over.mp435.34MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less Travelled.mp418.89MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System Software.mp426.15MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Steve Luczynski and Larry Grossman - Federal Perspective on Aerospace Cybersecurity.mp456.55MB
- DEF CON 29 villages/DEF CON 29 Aerospace Village - Steve Luczynski, Thomas Bristow, Declyn, Ginny Spicer, Olivia Stella - True Story - Hackers in the Aerospace Sector.mp461.68MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Adam Schaal - A Deep Dive Into Supply Chain Vulnerabilities.mp449.37MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Alex Hoffman - 0-Days & Nat 20's - CVSSv3 Through the Lens of D&D.mp437.5MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Alexei Kojenov - I used AppSec skills to hack IoT, and so can you.mp450.03MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Alton Crossley - Can’t Stop the Code Embrace the Code.mp442.73MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Amir Shaked - CSP is broken, let’s fix it.mp438.03MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - AppSec Village Panel - Colorful AppSec - Pedro Umbelino, Luis Gomes, Tanya Janca, Erez Yalon.mp492.1MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Arjun Gopalakrishna - AppSec 101 A Journey from Engineer to Hacker.mp420.12MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Chen Gour-Arie - Cross-document messaging technology, hack it and use it.mp430.66MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Cheryl Biswas - Signed, Sealed, Delivered Abusing Trust in Supply Chain.mp452.31MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Emanuel Rodrigues - Poking bots for fun and profit.mp433.45MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Erin Browning & Tim Faraci - Scaling static analysis for free.mp435.76MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Gal Nagli - Vulnerability Inheritance - Attacking through 3rd party.mp438.61MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Grant Ongers - Scaling AppSec through Education.mp445.6MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - James McKee (punkcoder) - Encryption for Developers.mp441.62MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Jay Turla - Car Hacking - Bug Hunting Field Guide for Appsec Hackers.mp447.9MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Jeremy Brown - Summer of Fuzz MacOS.mp435.19MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Magno Logan - DevSecOps Merging Security and Software Engineering.mp443.64MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Matthew Coles & Izar Tarandach - DFDs Ain't That Bad.mp477.77MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Mazin Ahmed - Attack Vectors on Terraform Environments.mp424.33MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Vandana Verma Sehgal - The Curious Case of Knowing the Unknown.mp428.25MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Vee - When nothing goes right, push left.mp457.29MB
- DEF CON 29 villages/DEF CON 29 AppSec Village - Yakov Shafranovich - The Poisoned Diary Supply Chain Attacks on Install scripts - DEF CON 29 AppSec.mp457.97MB
- DEF CON 29 villages/DEF CON 29 BIC Village - Keith Chapman - The Action Plan for Cyber Diversity.mp440.2MB
- DEF CON 29 villages/DEF CON 29 BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in the Tech Industry.mp424.16MB
- DEF CON 29 villages/DEF CON 29 BIC Village - Nico Smith - 40 Cores and A CPU.mp450.54MB
- DEF CON 29 villages/DEF CON 29 BIC Village - Ochaun Marshall - The OPSEC of Protesting.mp446.67MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - A Cohort of Pirate Ships.mp427.49MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - A Talk with @BadHIPPA, 2021’s best tweeter on privacy - pandemic.mp4126.02MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Chinese Military Bioweapons and Intimidation Operations - Part 3.mp454.02MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Cloud security for healthcare and life sciences.mp4112.25MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Cyber Defense Matrix in Healthcare.mp436.49MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Fishing or Hunting.mp477.38MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Healthcare Innovation With People of All Abilities.mp429.99MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - How to Not Miss The Point Reflections on Race, Health, and Equity.mp4185.97MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Internet of Ingestible Things Security by Design.mp425.98MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - It takes a village Why you should join the Biohacking Village.mp442.96MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Lets Get Real About The Future State of Healthcare.mp423.96MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - No Aggregation Without Representation.mp465.21MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - OWASP & CSA IoT Impacting Medical Security.mp438.41MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Open Source Vaccine Developer Kits (VDKs).mp426.96MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Playing with FHIR hacking and securing healthcare APIs.mp439.15MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Red vs Blue vs Green - The ultimate battle of opinions.mp471.46MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Securing the Internet of Biological Things.mp425.21MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - The Digital Physiome - How wearables can transform healthcare.mp461.25MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - The Economics of Cybersecurity.mp427.64MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - The Little Things.mp482.32MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - The Next Critical Infrastructure Understanding the Bioeconomy.mp446.28MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - The Real Story on Patching Medical Devices.mp494.49MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - The Security of Your Digital DNA, from Inception to Death.mp460.21MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Truth, Trust, and Biodefense.mp431MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Welcome Keynote.mp484.19MB
- DEF CON 29 villages/DEF CON 29 Biohacking Village - Wrap Up Video.mp42.76MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Anto Joseph - Flash Loans Demystified.mp445.37MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Byeongcheol Yoo - Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets.mp479.32MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Colin Cantrell - Scaling Blockchains - A Novel Approach.mp488.47MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Dabao Wong & Blocksec Team - Towards Understanding the Unlimited Approval in Ethereum.mp433.24MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Gokul Alex & Tejaswa Rastogi - Preventing Sandwich Attacks on DeFi Protocols.mp483.78MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Josh McIntyre - Subtle and Not So Subtle Ways to Lose Your Cryptocurrency.mp454.64MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Michael Lewllen - Ethereum Hacks & How to Stop Them.mp455.75MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Peter Kacherginsky - COSTA (Coinbase Secure Trait Analyzer.mp430.19MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Reddcoin & TechAdept - CTF Contestl.mp425.05MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Scott Carlson - Cybersecurity Strategies for Decentralized Environments.m4a57.95MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Shinchul Park & Seungjoo Kim - Blockchain as a Threat Modeling Thinking Tool.mp442.38MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.mp49.38MB
- DEF CON 29 villages/DEF CON 29 Blockchain Village - Yaz Khoury - Surviving 51 Percent Attacks.mp442.74MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Adventures in Pro Bono Digital Forensics Work.mp451.46MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - BTV Presents Threat Report Roulette.mp474.74MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Forensicating Endpoint Artifacts in the World of Cloud Storage Services.mp434.99MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - How do you ALL THE CLOUDS.mp427.27MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - I know who has access to my cloud, do you.mp411.81MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Leveraging NGFWs for Threat Hunting.mp423.83MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigans from combining data.mp452.15MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Modern Authentication for the Security Admin.mp443.55MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Scope X Hunt in the Ocean.mp437.75MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Structured Analytical Techniques for Improving Information Security Analyses.mp439.23MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - This is what we thought would happen in 2021.mp436.84MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Uncomfortable Networking.mp421.55MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Use DNS to detect your domains are abused for phishing.mp454.2MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Velociraptor - Dig Deeper.mp445.57MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - What Machine Learning Can and Can't Do for Security.mp424.55MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Year of Mentoring BTV’s Meet-a-Mentor Turns One.mp437.69MB
- DEF CON 29 villages/DEF CON 29 Blue Team Village - Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank ).mp441MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - Jay Turla.mp467.84MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - Build Automotive Gateways with Ease - Don Hatfield.mp446.53MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - Commercial Transportation Trucking Hacking - Ben Gardiner.mp457.5MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - From CTF to CVE - Bill Hatzer.mp446.22MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - Fuzzing CAN - CAN FD ECU's and Network - Samir Bhagwat.mp453.36MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement Vehicles - Alissa Knight.mp440.68MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - My other car is your car compromising the Tesla Model X keyless entry system - Lennert Wouters.mp435.21MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - Not so Passive Vehicle Identification and Tracking via Passive Keyless Entry - Nick Ashworth.mp468.96MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - Remote Adversarial Phantom Attacks against Tesla and Mobileye - Ben Nassi.mp451.09MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - Remotely Rooting Charging Station for fun and maybe profit - Huajiang Chen & Wu Ming.mp432.88MB
- DEF CON 29 villages/DEF CON 29 Car Hacking Village - Safety Third Defeating Chevy StabiliTrak for Track Time Fun - Eric Gershman.mp431.69MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - (Workshop) Kubernetes Security 101 Best Practices to Secure your Cluster - Magno Logan.mp4162.33MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - AWS cloud attack vectors and security controls - Kavisha Sheth.mp424.41MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Attack Vectors for APIs Using AWS API Gateway Lambda Authorizers - Alexandre & Leonardo.mp444.98MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Attacking Modern Environments Series Attack Vectors on Terraform Environments - Mazin Ahmed.mp428.02MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Azure Active Directory Hacking Wars - Batuhan Sancak.mp423.67MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures - Rodrigo Montoro.mp414.97MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Closing Note - Jayesh Singh Chauhan.mp45.05MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Cloud Security Orienteering - Rami McCarthy.mp435.98MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Detection Challenges in Cloud Connected Credential Abuse Attacks - Rod Soto.mp431.38MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Exploiting the O365 Duo 2FA Misconfiguration - Cassandra Young.mp412.82MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Extracting all the Azure Passwords - Karl Fosaaen.mp444.36MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Hunting for AWS Exposed Resources - Felipe Pr0teus.mp426.31MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - I know who has access to my cloud, do you - Igal Flegmann.mp422.27MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Identifying Toxic Combinations of Permissions in Your Cloud Infrastructure - Michael Raggo.mp443.29MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Kubernetes Goat - Kubernetes Security Learning - Madhu Akula.mp429.53MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Onions In the Cloud Make the CISO Proud - Wes Lambert.mp4111.88MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Opening Note - Jayesh Singh Chauhan.mp46.39MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - PK-WHY - Kevin Chen.mp421.12MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Shift Left Using Cloud Implementing baseline security into your deployment lifecycle - Avinash Jain.mp424.4MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Understanding common Google Cloud misconfiguration using GCP Goat - Joshua Jebaraj.mp443.12MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Using Barq to perform AWS Post-Exploitation Actions - Mohammed Aldoub.mp423.9MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - WhoC - Peeking under the hood of CaaS offerings - Yuval Avrahami.mp413.04MB
- DEF CON 29 villages/DEF CON 29 Cloud Village - Windows Server Containers are Broken - Here's How You Can Break Out - Daniel Prizmant.mp422.37MB
- DEF CON 29 villages/DEF CON 29 Crypto and Privacy Village 2021 Day 1.mp4814.04MB
- DEF CON 29 villages/DEF CON 29 Crypto and Privacy Village 2021 Day 2.mp4541.84MB
- DEF CON 29 villages/DEF CON 29 Cyber Warrior Network - The Future of Women in Cybersecurity.mp4122.24MB
- DEF CON 29 villages/DEF CON 29 Cyber Warrior Network - The Mission of Air Force Civilians in Total Force Strategy.mp473.95MB
- DEF CON 29 villages/DEF CON 29 HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challeng 6.mp469.23MB
- DEF CON 29 villages/DEF CON 29 HHV - Bradan Lane - The PortaProg Project.mp496.3MB
- DEF CON 29 villages/DEF CON 29 HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy Cables.mp491.1MB
- DEF CON 29 villages/DEF CON 29 HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception Collide.mp428.51MB
- DEF CON 29 villages/DEF CON 29 HHV - rehr - Walkthrough of DC28 HHV Challenge Solutions.mp4168.72MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce.mp47.52MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Beetlejuice The Lessons We Should Have Learned For ICS Cybersecurity (Tim Yardley - UIUC).mp420.78MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Bottom-Up and Top-Down Exploiting Vulnerabilities In the OT Cloud Era (Sharon Brizinov, Uri Katz).mp426.31MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Building an ICS Firing Range in Our Kitchen (Nico Leidecker & Moritz Thomas).mp435.73MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Consider the (Data) Source (Dan Gunter - Insane Forensics).mp437.51MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Crippling the Grid Examination of Dependencies and Cyber Vulnerabilities (Joe Slowik - Gigamon).mp413.77MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Detecting Attackers Using Your Own Sensors with State Estimation (Stefan Stephenson-Moe - Coalfire).mp443.44MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Do We Really Want to Live in the Cyberpunk World (Mert Can Kilic).mp424.92MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Fortifying ICS - Hardening and Testing (Dieter Sarrazyn - Secudea).mp420.98MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Highlighting the Importance of Detection Context using the ATT&CK Evaluations for ICS Results.mp417.36MB
- DEF CON 29 villages/DEF CON 29 ICS Village - ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States.mp459.99MB
- DEF CON 29 villages/DEF CON 29 ICS Village - ICS Intrusion KillChain explained with real simulation (Javier Perez & Juan Escobar).mp446.77MB
- DEF CON 29 villages/DEF CON 29 ICS Village - ICS Jeopardy.mp437MB
- DEF CON 29 villages/DEF CON 29 ICS Village - ICS Village Opening and Introduction.mp44.22MB
- DEF CON 29 villages/DEF CON 29 ICS Village - It Takes a Village (and a generous grant) Students Performing ICS Security Assessments.mp438.43MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Keynote - Reading the Future with Useful Fiction (with PW Singer).mp451.42MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Leveraging SBOMs to Enhance ICS Security (Thomas Pace - NetRise).mp419.75MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Living off the Land in an ICS OT Penetration Test (Aaron Boyd - Dragos).mp418.65MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Network Traffic Analysis with Malcolm (Seth Grover - CISA).mp498.36MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Scripts and Tools to Help Your ICS InfoSec Journey (Don C. Weber - Cutaway Security).mp431.08MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Smart Meters I'm Hacking Infrastructure and So Should You (Hash Salehi).mp434.18MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Top 20 Secure PLC Coding Practices (Sarah Fluchs - admeritia - Vivek Ponnada - GE).mp442.18MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure (Lauren Zabierek).mp434.49MB
- DEF CON 29 villages/DEF CON 29 ICS Village - Your Infrastructure is Encrypted Protecting Critical Infrastructure from Ransomware.mp4106.42MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can You.mp498.79MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoT.mp483.62MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Elazari Tarkhanyan and Cheruvu - The Journey of Establishing IoT Trustworthiness.mp491.78MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Hadad and Kaufman - Reverse Supply Chain Attack.mp457.85MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech Warfare.mp4125.47MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Hutch - Alexa Have You Been Compromised.mp486.94MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days.mp499.63MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Juneau - Strategic Trust and Deception in the Internet of Things.mp441.61MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices at Scale.mp4111.05MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Messdaghi and Eddy - Representation Matters.mp475.2MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Petro and Cecil - You're Doing IoT RNG.mp483.81MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Ria Cheruvu - Ethics at the Edge.mp472.89MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Ross and Balazs - MIPS-X the Next IoT Frontier.mp451.96MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses.mp480.27MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Ted Harrington - When Penetration Testing Isnt Penetration Testing At All.mp466.7MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Tim Jensen EapolSniper - IoT Testing Crash Course.mp497.41MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Victor Hanna - LED Light Lunacy.mp456.45MB
- DEF CON 29 villages/DEF CON 29 IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar Panels.mp471.43MB
- DEF CON 29 villages/DEF CON 29 Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds And how to fight them.mp452.85MB
- DEF CON 29 villages/DEF CON 29 Payment Village - Meadow Ellis - Automated Tear Machines.mp492.43MB
- DEF CON 29 villages/DEF CON 29 Payment Village - Timur Yunusov - What happens when businesses decide to enrol cryptocurrency cards.mp425.2MB
- DEF CON 29 villages/DEF CON 29 Payment Village - Vahagn Vardanyan - Racing cryptoexchanges or how I manipulated the balances.mp421.64MB
- DEF CON 29 villages/DEF CON 29 Recon Village - .GOV Doppelgänger Your Häx Dollars at Work - Anthony Kava.mp437.96MB
- DEF CON 29 villages/DEF CON 29 Recon Village - Adversary Infrastructure Tracking with Mihari - Manabu Niseki.mp422.74MB
- DEF CON 29 villages/DEF CON 29 Recon Village - Can I Make My Own Social Threat Score - MasterChen.mp435.1MB
- DEF CON 29 villages/DEF CON 29 Recon Village - Finding Hidden Gems via URL Shortener Services - Utku Sen.mp421.78MB
- DEF CON 29 villages/DEF CON 29 Recon Village - Future of Asset Management - Ben S (Nahamsec).mp444.77MB
- DEF CON 29 villages/DEF CON 29 Recon Village - How Vigilant Researchers Can Uncover APT Attacks for Fun and Non-Profit - Ladislav Baco.mp431.98MB
- DEF CON 29 villages/DEF CON 29 Recon Village - How to Build Cloud-Based Recon Automation at Scale - Ryan Elkins.mp453.71MB
- DEF CON 29 villages/DEF CON 29 Recon Village - OSINT and the Hermit Kingdom - Nick Roy.mp448.19MB
- DEF CON 29 villages/DEF CON 29 Recon Village - OSINT for Sex Workers - Kala Kinyon.mp424.4MB
- DEF CON 29 villages/DEF CON 29 Recon Village - People Hunting A Pentesters Perspective - Mishaal Khan.mp438.98MB
- DEF CON 29 villages/DEF CON 29 Recon Village - So You Want to OPSEC, Eh - Ritu Gil.mp424.7MB
- DEF CON 29 villages/DEF CON 29 Recon Village - The Bug Hunter’s Recon Methodology - Tushar Verma.mp412.36MB
- DEF CON 29 villages/DEF CON 29 Recon Village - Using OSINT to Aid in Human Trafficking and Smuggling Cases - Rae.mp434.23MB
- DEF CON 29 villages/DEF CON 29 Recon Village - Using Passive DNS for gathering Business Intelligence - Andy Dennis.mp430.04MB
- DEF CON 29 villages/DEF CON 29 Recon Village - Venator Hunting & Smashing Trolls on Twitter - Mauro Eldritch.mp446.94MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - A discussion about the Red Team Village CyberWraith.mp464.42MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - AI and Red Team Village Panel.mp4166.28MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - Announcing the Red Team Village CyberWraith.mp44.11MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - CTF Day 1.mp41.46MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - CTF Day 2.mp4443.93MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - CTF Day 3.mp4212.2MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - CTF Recap and Upcoming Events.mp443.88MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - Custom Mechanical Keyboard Build.mp4158.6MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - Russ Hanneman's message about the Red Team Village CTF.mp41.23MB
- DEF CON 29 villages/DEF CON 29 Red Team Village - The future of Artificial Intelligence, Machine Learning, and Offensive Security.mp4114.14MB
- DEF CON 29 villages/DEF CON 29 Voting Village - A Deep Dive on Vulnerability Disclosure - Tod Beardsley.mp423.16MB
- DEF CON 29 villages/DEF CON 29 Voting Village - A Journalist’s Perspective on Fake News - Bob Sullivan.mp417.45MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Are Barcodes on Ballots Bad - Kevin Skoglund.mp419MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Final Thank You.mp42.24MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Friday Thank You.mp42.76MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Hack the Conspiracies - Barb Byrum.mp431.13MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Hacking to Save Democracy - Eddie Perez.mp432.32MB
- DEF CON 29 villages/DEF CON 29 Voting Village - High Turnout, Wide Margins - Brianna Lennon and Eric Fey.mp416.5MB
- DEF CON 29 villages/DEF CON 29 Voting Village - How to Weaponize RLAs to Discredit an Election - Carsten Schürmann.mp429.03MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Keeping Your Information Security Policy Up to Date - Sang-Oun Lee.mp425.59MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Keynote Remarks Commissioner Thomas Hicks, EAC.mp427.8MB
- DEF CON 29 villages/DEF CON 29 Voting Village - NH SB43 Forensic Audit - Harri Hursti.mp473.17MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Secrets of Social Media PsyOps - BiaSciLab.mp436.06MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Social Media Security = Election Security - Sebastian Bay.mp415.29MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Welcome.mp417.97MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Why Hacking Voters Is Easier Than Hacking Ballots - Maurice Turner.mp454MB
- DEF CON 29 villages/DEF CON 29 Voting Village - Wireless Odyssey - Susan Greenhalgh.mp436.82MB
不会用的朋友看这里
把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载!
亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:[email protected]
概述
838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题
它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息
838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪
838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统