Latest Dc22 Podcast Episodes
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Zach Fasel - Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools </buzzwords>
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:34Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools Zack Fasel Managing Partner, Urbane Security Many struggle in their job with the decision of what events to log in battle against costly increases to their licensing of a commercial SIEM or other logging solution. Lev...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Will Schroeder - Veil-Pillage: Post-exploitation 2.
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:31Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf Veil-Pillage: Post-exploitation 2.0 Will Schroeder SECURITY RESEARCHER, VERIS GROUP The Veil-Framework is a project that aims to bridge the gap betwee...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Fatih Ozavci - VoIP Wars: Attack of the Cisco Phones
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:30Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Ozavci/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf VoIP Wars: Attack of the Cisco Phones Fatih Ozavci SENIOR SECURITY CONSULTANT, SENSE OF SECURITY Many hosted VoIP service providers are using Cis...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Dominic White and Ian de Villiers - Manna from Heaven: Improving the state of wireless rogue AP attacks
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:29Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/White-deVilliers/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf Manna from Heaven: Improving the state of wireless rogue AP attacks Dominic White CTO, SENSEPOST Ian de Villiers SENIOR ANALYST,...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:29Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Self/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf Don't DDoS Me Bro: Practical DDoS Defense Blake Self SENIOR SECURITY ARCHITECT Shawn "cisc0ninja" Burrell SOLDIERX CREW Layer 7 DDoS attacks have been on the...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Michele Fincher - How to you Feel about your Mother.. Psych and The SE
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:22Michele Fincher - How to you Feel about your Mother.. Psych and The SE
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Christopher Soghoian - Blinding The Surveillance State
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:18Blinding The Surveillance State Christopher Soghoian Principal Technologist, American Civil Liberties Union We live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them to learn intimate, private details about our lives...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Chris Hadnagy - What Your Body Tells Me - Body Language for the SE
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:16Chris Hadnagy - What Your Body Tells Me - Body Language for the SE
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:15A Survey of Remote Automotive Attack Surfaces Charlie Miller Security Engineer, Twitter Chris Valasek Director of Threat Intelligence, IOActive Automotive security concerns have gone from the fringe to the mainstream with security researchers showing the susceptibility of the modern vehicle t...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:13Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Zoz - Don't Fuck It Up!
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:04Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Zoz/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf Don't Fuck It Up! Zoz ROBOTICS ENGINEER Online antics used to be all about the lulz; now they're all about the pervasive surveillance. Whether you're the director of a TLA just t...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Zoltán Balázs - Bypass firewalls, application white lists, secure remote desktops under 20 seconds
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:03Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Balazs/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf Bypass firewalls, application white lists, secure remote desktops under 20 seconds Zoltán Balázs CHIEF TECHNOLOGY OFFICER AT MRG...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:02Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Hecker/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf Burner Phone DDOS 2 dollars a day : 70 Calls a Minute Weston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY Phone DDOS research. Current proof of concept is ...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Wesley McGrew- Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:01Slides Here:https://www.defcon.org/images/defcon-22/dc-22-presentations/McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf Additional Materials available: https://www.defcon.org/images/defcon-22/dc-22-presentations/McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:00Slides Here:https://www.defcon.org/images/defcon-22/dc-22-presentations/Strazzere-Sawyer/DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf Android Hacker Protection Level 0 Tim Strazzere LEAD RESEARCH & RESPONSE ENGINEER Jon Sawyer CTO OF APPLIED CYBERSECURITY LLC Ob...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Tess Schrodinger - From Raxacoricofallapatorius With Love: Case Studies In Insider Threat
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:59Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schrodinger/DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf From Raxacoricofallapatorius With Love: Case Studies In Insider Threat Tess Schrodinger Espionage, honey pots, encryption, and lies. C...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Svetlana Gaivoronski and Ivan Petrov - Shellcodes for ARM: Your Pills Don't Work on Me, x86
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:59Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Petrov-Gaivoronski/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf Extra Materials are available here: https://defcon.org/images/defcon-22/dc-22-presentations/Petrov-Gaivoronski/DEFCON-22-Ivan-Petrov-...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Shane Macaulay - Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:58Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Macaulay/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System Shane Macaulay DIRECTOR O...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Shahar Tal - I Hunt TR-069 Admins: Pwning ISPs Like a Boss
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:58Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Tal/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf I Hunt TR-069 Admins: Pwning ISPs Like a Boss Shahar Tal SECURITY & VULNERABILITY RESEARCH TEAM LEADER, CHECK POINT SOFTWARE TECHNOLOGIES Residential gateway (/SOHO r...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Scott Erven and Shawn Merdinger - Just What The Doctor Ordered?
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:57Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Erven-Merdinger/DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf Just What The Doctor Ordered? Scott Erven FOUNDER & PRESIDENT SECMEDIC, INC Shawn Merdinger HEALTHCARE SECURITY RESEARCHER You h...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government Records
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:55Hacking the FBI: How & Why to Liberate Government Records Ryan Noah Shapiro PhD candidate, Massachusetts Institute of Technology After narrowly avoiding a lengthy activism-related prison sentence, I began PhD work at MIT in part to map out the criminalization of political dissent in Post-9/11 ...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Ryan Lackey & Marc Rogers & theGrugq - Masquerade - How a Helpful Man-in-the-Middle Can Help You Evade Monitoring
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:51Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring. Ryan Lackey Founder, CryptoSeal, Inc. Marc Rogers Principal Security Researcher, Lookout The Grugq Information Security Researcher Sometimes, hiding the existence of a communication is as important as hiding the conte...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:48Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Kazanciyan-Hastings/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf Investigating PowerShell Attacks Ryan Kazanciyan TECHNICAL DIRECTOR, MANDIANT Matt Hastings CONSULTANT, MANDIANT Over the ...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Robert Rowley - Detecting and Defending Against a Surveillance State
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:46Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Rowley/DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf Detecting and Defending Against a Surveillance State Robert RowleySECURITY RESEARCHER, TRUSTWAVE SPIDERLABS This talk is based on semi-recent ...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Richard Thieme - The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:34Slides Here:https://defcon.org/images/defcon-22/dc-22-presentations/Theime/DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdf The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State Richard Thieme THIEMEWORKS Over a decade ago, a friend at the Nationa...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Richard Klafter (Free) and Eric Swanson (Lachesis) - Check Your Fingerprints: Cloning the Strong Set
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:33Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Klafter-Swanson/DEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf Check Your Fingerprints: Cloning the Strong Set Richard Klafter (Free) SENIOR SOFTWARE ENGINEER, OPTIMIZELY Eric S...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Pierce and Loki - NSA Playset : GSM Sniffing
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:31Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Pierce-Loki/DEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf NSA Playset : GSM Sniffing Pierce SECURITY RESEARCHER Loki SECURITY RESEARCHER A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widel...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Phil Zimmermann - How To Get Phone Companies To Just Say No To Wiretapping
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:30How To Get Phone Companies To Just Say No To Wiretapping Phil Zimmermann President & Co-Founder Silent Circle Phil is going to talk about his latest projects, which are helping several mobile carriers to provide their customers with wiretap-free phone services. These carriers are breaking ran...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Philip “Soldier of Fortran” Young - From root to SPECIAL: Pwning IBM Mainframes
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:29Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Young/DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf From root to SPECIAL: Pwning IBM Mainframes Philip “Soldier of Fortran” Young 1.1 million transactions are run through mainframes every sec...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:26Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Such/DEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf Playing with Car Firmware or How to Brick your Car Paul Such 0x222 FOUNDER OF SCRT Agix SCRT A lot of papers have already been done/produced on hacking cars throu...
Related Dc22 Topics