DEFCON
DEF CON Safe Mode — Biohacking Village — Vulnerability Disclosure Panel
Humans write code, humans make mistakes, and hackers are here to help. While this has been true since the beginning…Подробнее
DEF CON Safe Mode Biohacking Village — Mo Ali, Amy Abernethy — Fireside Chat
Discussions around: — Intersection of big data and patient rights — Real World Data and how to best serve patients…Подробнее
DEF CON Safe Mode — The Dark Tangent and Lostboy — Welcome to DEF CON Safe Mode and Badge Talk
Welcome to DEF CON Safe Mode! DT welcomes you, tells you how we got here and what we’re trying to…Подробнее
DEF CON Safe Mode — Trey Keown and Brenda So — Applied Cash Eviction through ATM Exploitation
ATMs are networked computers that dispense cash, so naturally they’re uniquely interesting devices to examine. We all remember ATM jackpotting…Подробнее
DEF CON Safe Mode — Ismail Melih Tas, Kubilay Ahmet Kucuk — Practical VoIPUC Hacking Using Mr SIP
In this talk, we will introduce the most comprehensive offensive VoIP security tool ever developed, Mr.SIP (comprehensive version). We will…Подробнее
DEF CON Safe Mode — Christopher Wade — Beyond Root
Rooting a smartphone is often considered the ultimate method to allow a user to take complete control of their device.…Подробнее
DEF CON Safe Mode — Jiska Classen and Francesco Gringoli — Spectra—New Wireless Escalation Targets
Wireless coexistence enables high-performance communication on platforms with a small form factor despite overlapping frequency bands. On-chip coexistence is essential…Подробнее
DEF CON Safe Mode — Sean Metcalf — Hacking the Hybrid Cloud
Most companies have moved into the cloud and on-premises applications and systems remain. This configuration is reasonably referred to as…Подробнее
DEF CON Safe Mode — Michael Stay — How we recovered XXX,000 in Bitcoin from an encrypted zip file
About six months ago, a Russian guy contacted me on LinkedIn with an intriguing offer. He had hundreds of thousands…Подробнее
DEF CON Safe Mode — Wesley Neelen and Rik van Duijn — Hacking Traffic Lights
New systems are connected to the internet every day to make our lives easier or more comfortable. We are starting…Подробнее
DEF CON Safe Mode — Jack Baker — Finding and Exploiting Bugs in Multiplayer Game Engines
Unreal Engine 4 and Unity3D dominate the multiplayer gaming landscape. They’re also complicated pieces of software written in C and…Подробнее
DEF CON Safe Mode — Joshua Maddux — When TLS Hacks You
Lots of people try to attack the security of TLS. But what if we use TLS to attack other things?…Подробнее
DEF CON Safe Mode — Eyal Itkin — Dont Be Silly It’s Only a Lightbulb
A few years ago, a team of academic researchers showed how they can take over and control smart lightbulbs, and…Подробнее
DEF CON Safe Mode — Slava Makkaveev — Pwn2Own Qualcomm Compute DSP for Fun and Profit
Qualcomm Snapdragon SoC integrates multiple subsystems, each one is customized for a particular application domain. Compute digital-signal processor (cDSP) is…Подробнее
DEF CON Safe Mode — Paul Marrapese — Abusing P2P to Hack 3 Million Cameras
To a hacker, making a bug-ridden IoT device directly accessible to the Internet sounds like an insanely bad idea. But…Подробнее
DEF CON Safe Mode — Patrick Kiley — Reverse Engineering a Tesla Battery Mgmt. System for Moar Power
Tesla released the P85D in 2014. At that time the vehicle came with «insane mode» acceleration with a 0-60 time…Подробнее
DEF CON Safe Mode — Feng Xiao — Discovering Hidden Properties to Attack Node js Ecosystem
Node.js is widely used for developing both server-side and desktop applications. It provides a cross-platform execution environment for JavaScript programs.…Подробнее
DEF CON Safe Mode — Oleksandr Mirosh, Alvaro Munoz — Scribbling Outside the Lines of Template Sec
Now more than ever, digital communication and collaboration are essential to the modern human experience. Shared digital content is everywhere…Подробнее
DEF CON Safe Mode — Hadrien Barral and Rémi Géraud Stewart — DNSSECTION A practical attack on DN
Domain Name System (DNS) is an ubiquitous and essential component of the Internet. It performs translations between identifiers and resources…Подробнее
DEF CON Safe Mode — Bill Graydon — Exploiting Key Space Vulnerabilities in the Physical World
Imagine being able to get together with a few of your co-workers, look at your office keys and derive a…Подробнее
DEF CON Safe Mode — Elie Bursztein — A Hacker’s Guide to Reducing Side Channel Attack Surfaces
In recent years, deep-learning based side-channel attacks have been proven to be very effective and opened the door to automated…Подробнее
DEF CON Safe Mode — Gal Zror — Don’t Ruck Us Again The Exploit Returns
From the researchers who brought to you «»Don’t Ruck Us Too Hard»» comes a brand new follow-up research. This summer!…Подробнее
DEF CON Safe Mode — Dylan Ayrey and Allison Donovan — Lateral Movement & Privilege Escalation in GCP
Google Cloud’s security model in many ways is quite different from AWS. Spark jobs, Cloud Functions, Jupyter Notebooks, and more…Подробнее
DEF CON Safe Mode — ayoul3 — Only Takes a Spark Popping a Shell on 1000 Nodes
Apache Spark is one of the major players if not the leader when it comes to distributed computing and processing.…Подробнее
DEF CON Safe Mode — Bill Demirkapi — Demystifying Modern Windows Rootkits
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the…Подробнее
DEF CON Safe Mode — James Pavur — Whispers Among the Stars
Space is changing. The number of satellites in orbit will increase from around 2,000 today to more than 15,000 by…Подробнее
DEF CON Safe Mode — Christian “quaddi” Dameff MD and panel — D0 N0 H4RM Healthcare Security
It is certainly a time of discovery- though the truths revealed by the COVID-19 crisis can be bitter and bleak.…Подробнее
DEF CON Safe Mode — Erik Hunstad — Domain Fronting is Dead, Long Live Domain Fronting Using TLS 1.3
Domain fronting, the technique of circumventing internet censorship and monitoring by obfuscating the domain of an HTTPS connection was killed…Подробнее
DEF CON Safe Mode — Peleg Hadar and Tomer Bar — After Stuxnet Printing still the Stairway to Heaven
In 2010, Stuxnet, the most powerful malware in the world revealed itself, causing physical damage to Iranian nuclear enrichment centrifuges.…Подробнее