Latest Dc22 Podcast Episodes
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Dr. Paul Vixie - Domain Name Problems and Solutions
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:35Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Vixie/DEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf White paper available for download here: https://defcon.org/images/defcon-22/dc-22-presentations/Vixie/DEFCON-22-Paul-Vixie-WP.pdf Domain Name Problems and Solutions Dr. Paul...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:34Elevator Hacking - From the Pit to the Penthouse Deviant Ollam The CORE Group Howard Payne The CORE Group Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking late-night rides upon car tops (don't do that, please!) to the wor...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Mahjoub, Reuille, and Toonk - Catching Malware En Masse: DNS and IP Style
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:30Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Mahjoub-Toonk-Reuille/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf Additional Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Mahjoub-Toonk-Reuille/DEFCON...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
David Wyde - Client-Side HTTP Cookie Security: Attack and Defense
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:26Slides: https://defcon.org/images/defcon-22/dc-22-presentations/Wyde/DEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf Client-Side HTTP Cookie Security: Attack and Defense David Wyde SOFTWARE ENGINEER, CISCO HTTP cookies are an important part of trust on the web. Users often trade the...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
David Litchfield - Oracle Data Redaction is Broken
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:25Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Litchfield/DEFCON-22-David-Litchfield-Oracle-Data-Redaction-is-Broken.pdf Oracle Data Redaction is Broken David Litchfield SECURITY SPECIALIST, DATACOM TSS The Oracle data redaction service is a new feature introduced with O...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
David Dorsey - Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:24Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Dorsey/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go David Dorsey LEAD SECURITY RESEARCHER AT CLICK SECURITY Using a ROP chain to bypass operating sy...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction, and Death
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 08:53Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Quaddi-R3plicant-Hefley/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf Hacking 911: Adventures in Disruption, Destruction, and Death Christian “quaddi” Dameff MD Jeff “r3plicant” Tully MD Peter Hefley SENIOR ...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Corey Kallenberg and Xeno Kovah - Extreme Privilege Escalation On Windows 8/UEFI Systems
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 08:34Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Kallenberg/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf Additional Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Kallenberg/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escala...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Christopher Campbell - The Secret Life of Krbtgt
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 06:15Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Campbell/DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf The Secret Life of Krbtgt Christopher Campbell SECURITY RESEARCHER A tale of peril and woe, Krbtgt is the domain account that you just can't quit. Quiet a...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Christopher Campbell - The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 06:14Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Campbell/DEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns Christopher Campbell SECURITY RESEARCHER 15 years after APT was released for Linux, Micros...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Chris Littlebury - Home Alone with localhost: Automating Home Defense
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 06:13Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Littlebury/DEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf Home Alone with localhost: Automating Home Defense Chris Littlebury SENIOR PENETRATION TESTER, KNOWLEDGE CONSULTING GROUP, INC. Home automation is every...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Charlie Vedaa and Mike Larsen - Impostor — Polluting Tor Metadata
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 04:24Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Larsen-Vedaa/DEFCON-22-Mike-Larsen-Charlie-Vedaa-Impostor-Polluting-Tor-Metadata.pdf Impostor — Polluting Tor Metadata Charlie Vedaa Mike Larsen Just using Tor can bring the cops to your door. While the security community w...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 02:02Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Cerrudo/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf Hacking US (and UK, Australia, France, etc.) traffic control systems Cesar Cerrudo CTO, IOACTIVE LABS Probably many of us have seen that scene from ...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Brian Gorenc and Matt Molinyawe - Blowing up the Celly - Building Your Own SMS/MMS Fuzzer
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 02:01Slides here; https://defcon.org/images/defcon-22/dc-22-presentations/Gorenc-Molinyawe/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf Blowing up the Celly - Building Your Own SMS/MMS Fuzzer Brian Gorenc ZERO DAY INITIATIVE, HP SECURITY RESEARCH Matt Molinyawe ZERO DAY I...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Brady Bloxham - Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 02:00Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Bloxham/DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse Brady Bloxham PRINCIPAL SECURITY CONSULTANT, SILENT BREAK SECURITY Windows APIs are oft...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Anton Sapozhnikov - Acquire current user hashes without admin privileges
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:59Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Sapozhnikov/DEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf Acquire current user hashes without admin privileges Anton Sapozhnikov KPMG If an attacker has only user level access to an inf...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Andrew Hunt - Raspberry MoCA - A recipe for compromise
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:58Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Hunt/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf Additional materials are available for download here: https://defcon.org/images/defcon-22/dc-22-presentations/Hunt/DEFCON-22-Andrew-Hunt-MoCA-Over...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Anch - The Monkey in the Middle: A pentesters guide to playing in traffic.
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:41Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Anch/DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf The Monkey in the Middle: A pentesters guide to playing in traffic. Anch (MIKE GUTHRIE) Prank your friends, collect session information and passwords, edit traffic as it g...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Alexandre Moneger - Generating ROP payloads from numbers
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:37Slides Available here: https://defcon.org/images/defcon-22/dc-22-presentations/Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf Extra Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room-...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Alex Zacharis and Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:16Presentation Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Zacharis-Tsagkarakis/DEFCON-22-Alex Zacharis-Nikolaos-Tsagkarakis-PoS-Attacking-the-Traveling-Salesman.pdf PoS Attacking the Traveling Salesman Alex Zacharis Tsagkarakis Nikolaos CENSUS Our work pr...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Alex Pinto - Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:15Presentation Available here: https://defcon.org/images/defcon-22/dc-22-presentations/Pinto-Maxwell/DEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT We could all have pre...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Alex Pinto and Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:14Presentation available here: https://defcon.org/images/defcon-22/dc-22-presentations/Pinto-Maxwell/DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf Measuring the IQ of your Threat Intelligence feeds Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT Kyle Maxwe...
![DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/82/04/33/820433a7-10a6-87a7-aea8-9e5e71907412/mza_1749050550477263526.jpg/100x100bb.jpg)
Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught
DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:11Presentation available here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf Dropping Docs on Darknets: How People Got Caught Adrian Crenshaw TRUSTEDSEC & IRONGEEK.COM Most of you have p...
Related Dc22 Topics