Browsing the "def-con" Tag

IPV666 Address of the Beast – Christopher Grayson, Marc Newlin – DEF CON China 1

January 22nd, 2020 📆 | 7564 Views ⚑

Global adoption of IPv6 continues to grow, with Google reporting IPv6 as 25% of its client traffic. IPv6 comes with

Tagged with:

VoIPShark Open Source VoIP Analysis Platform – N. Sharma, J. Mathai, A. Bhangale – DEF CON China 1

January 22nd, 2020 📆 | 6544 Views ⚑

Leveraging the packet switched network for making phone calls or VoIP has come a long way now. Today, it has

Tagged with:

Andrea Downing – A Previvors Story of Uncovering Massive Zero Day – DEF CON 27 Bio Hacking Village

December 20th, 2019 📆 | 4521 Views ⚑

massive security vulnerability was discovered which allowed PHI to be leaked from closed patient support groups on Facebook. In this

Tagged with:

Dr Jeremy Gillula – Encrypting the Web Isnt Enough – DEF CON 27 Monero Village

December 19th, 2019 📆 | 7524 Views ⚑

Jeremy will be speaking about the EFF’s past and ongoing efforts to encrypt the web. source

Tagged with:

Shawn Thomas – An Introduction To Malware Analysis video – DEF CON 27 Blue Team Village

December 13th, 2019 📆 | 8143 Views ⚑

A mostly live demo of base concepts of malware analysis using a multitude of tools on a Dridex sample pulled

Tagged with:

Chris McCoy – Through the Looking Glass Own the Data Center – DEF CON 27 Red Team Offensive Village

December 13th, 2019 📆 | 6249 Views ⚑

The data center embodies the heart of many businesses on the Internet. It contains much of the information in a

Tagged with:

Casey Erdmann – BadSalt Adversarial DevOps – DEF CON 27 Red Team Offensive Village

December 13th, 2019 📆 | 1937 Views ⚑

SaltStack is robust configuration management utility used by many to achieve DevOps related initiatives in their organizations. Thanks to its

Tagged with:

Alex Jay Balan – Next gen IoT Botnets 3 moar ownage – DEF CON 27 IoT Village

December 5th, 2019 📆 | 6707 Views ⚑

Traditional IoT botnets operate pretty much like shooting fish in a barrel. With an elephant gun. A service running on

Tagged with:

D9 – Hacking Corporate Org Socialization – DEF CON 27 Packet Hacking Village

November 22nd, 2019 📆 | 7228 Views ⚑

There is growing community of hackers who refer to themselves as “Chameleon Hackers” and practice an organizational socialization technique they

Tagged with:

Cheryl Biswas – Patching It is Complicated – DEF CON 27 Packet Hacking Village

November 22nd, 2019 📆 | 4517 Views ⚑

Patching – it’s complicated. Organizations at every level struggle with security updates in a fundamental process that seems more like

Tagged with:

Jay Beale – Attacking and Defending Kubernetes – DEF CON 27 Packet Hacking Village

November 22nd, 2019 📆 | 2269 Views ⚑

Many companies have deployed Kubernetes, but few infosec folks have experience attacking it. We aim to address that shortage, culminating

Tagged with:

Legit-Looking iPhone Lightning Cables That Hack You Will Be Mass Produced and Sold

October 18th, 2019 📆 | 5765 Views ⚑

Soon it may be easier to get your hands on a cable that looks just like a legitimate Apple lightning

Tagged with:

Patrick Wardle – Harnessing Weapons of Mac Destruction – DEF CON 27 Conference

August 20th, 2019 📆 | 6725 Views ⚑

Whenever a new Mac malware specimen is uncovered, it provides a unique insight into the offensive Mac capabilities of hackers

Tagged with:

Learning from HACKER CONs (Bonus Episode) Learning Happy Hour

August 11th, 2019 📆 | 7462 Views ⚑

Have you ever heard of the Hacker conferences of Defcon, Blackhat and/or BSides? Have you been curious about what sort

Tagged with:

Developing Managed Code Rootkits for the Java Runtime Environment

February 16th, 2019 📆 | 4609 Views ⚑

PLEASE SUBSCRIBE, LIKE AND COMMENT TO KEEP THIS CHANNEL ALIVE! Tip Jar: Managed Code Rootkits (MCRs) are terrifying post-exploitation

Tagged with:

Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools

January 28th, 2019 📆 | 2071 Views ⚑

PLEASE SUBSCRIBE, LIKE AND COMMENT TO KEEP THIS CHANNEL ALIVE! Tip Jar: Following previous presentations on the dangers penetration

Tagged with: