DEF CON 26 RECON VILLAGE — Ethan Dodge — How WHOIS Data Uncovered $32b Connected to Mormon Church
It’s always been suspected that the Mormon Church is worth billions of dollars and has a sizable amount of investments…Подробнее
It’s always been suspected that the Mormon Church is worth billions of dollars and has a sizable amount of investments…Подробнее
“How do you apply open source intelligence techniques to politicians, candidates, and others holding the public trust? It’s easier than…Подробнее
Many significant breaches have resulted from adversaries knowing who to target, how to target them and where to target them.…Подробнее
When conducting a web application penetration test understanding and extending the attack surface is an exercise that is critical for…Подробнее
“Your client gives you their requirement, ““find the social media accounts of the target person and any friends they may…Подробнее
“I fought the law and the law lost” is a series of talks that aims to collect vulnerabilities in the…Подробнее
Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining…Подробнее
Bug bounty programs are a hot topic these days. More and more companies are realizing the benefits of running a…Подробнее
Recon is an art AND an science. The landscape for methods of finding hosts to attack is constantly changing. Whether…Подробнее
Sure, WiFi hacking has been around for a while, and everyone knows about tools like airmon-ng, kismet, et al. But…Подробнее
In this presentation, we will demonstrate how to build a machine learning model that uses a merged dataset combining cyber…Подробнее
“Reconnaissance is about gathering information. The information gathered is only as good as the insights and actionable decisions that we…Подробнее
“Performing intelligence gathering on targets is a time consuming process, it typically starts by attempting to find a persons online…Подробнее
“I’m not a programmer. I’m not a hacker‚Ķin the traditional sense. But yet I was born in 1983, so surely…Подробнее
OpenPiMap is the ultimate home/prosumer network utility in order to detect, analyze, and respond to malicious network traffic on a…Подробнее
When attacking modern internal networks, intelligence is everything. Understanding the environment you are operating in can be the difference between…Подробнее
The hard science disciplines (computer science, electrical and computer engineering) have already started investing heavily in cybersecurity education. Security experts,…Подробнее
Without the right tools the engagement can be over before it begins, as upfront resistance can prevent you from entering…Подробнее
Social Engineering is a powerful tool. With the weapons gathered through Open Source Intelligence (OSINT) gathering and well crafted vishing…Подробнее
In 20 years I learned how to step outside my introverted personality to explore the world in a more successful…Подробнее
It was just about 1 year ago that Chris announced the launching of The Innocent Lives Foundation. What has happened…Подробнее
Across the globe for millennia upon millennia, a cabal of social engineers have been working to manipulate realities, collective and…Подробнее
What do a flock of starlings, a colony of warrior ants, and a hundred-person flash mob all have in common…Подробнее
You’re mindlessly scrolling through Facebook when you see your friend share a post and comment, “Mine is Bubbles Sunset!” You…Подробнее
Dynamic duo DEF CON SECTF black badge winner Chris Silvers and ACE Hackware founder Taylor Banks return to the stage…Подробнее
As humans we have four evolutionary paths: 1. We embrace nanotechnology and Bionanotechnology… we become more dependent upon machines and…Подробнее