Latest Dc22 Podcast Episodes

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Dr. Paul Vixie - Domain Name Problems and Solutions

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:35
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Vixie/DEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf White paper available for download here: https://defcon.org/images/defcon-22/dc-22-presentations/Vixie/DEFCON-22-Paul-Vixie-WP.pdf Domain Name Problems and Solutions Dr. Paul...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:34
Elevator Hacking - From the Pit to the Penthouse Deviant Ollam The CORE Group Howard Payne The CORE Group Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking late-night rides upon car tops (don't do that, please!) to the wor...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Mahjoub, Reuille, and Toonk - Catching Malware En Masse: DNS and IP Style

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:30
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Mahjoub-Toonk-Reuille/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf Additional Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Mahjoub-Toonk-Reuille/DEFCON...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

David Wyde - Client-Side HTTP Cookie Security: Attack and Defense

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:26
Slides: https://defcon.org/images/defcon-22/dc-22-presentations/Wyde/DEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf Client-Side HTTP Cookie Security: Attack and Defense David Wyde SOFTWARE ENGINEER, CISCO HTTP cookies are an important part of trust on the web. Users often trade the...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

David Litchfield - Oracle Data Redaction is Broken

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:25
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Litchfield/DEFCON-22-David-Litchfield-Oracle-Data-Redaction-is-Broken.pdf Oracle Data Redaction is Broken David Litchfield SECURITY SPECIALIST, DATACOM TSS The Oracle data redaction service is a new feature introduced with O...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

David Dorsey - Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 21:24
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Dorsey/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go David Dorsey LEAD SECURITY RESEARCHER AT CLICK SECURITY Using a ROP chain to bypass operating sy...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction, and Death

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 08:53
Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Quaddi-R3plicant-Hefley/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf Hacking 911: Adventures in Disruption, Destruction, and Death Christian “quaddi” Dameff MD Jeff “r3plicant” Tully MD Peter Hefley SENIOR ...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Corey Kallenberg and Xeno Kovah - Extreme Privilege Escalation On Windows 8/UEFI Systems

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 08:34
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Kallenberg/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf Additional Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Kallenberg/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escala...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Christopher Campbell - The Secret Life of Krbtgt

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 06:15
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Campbell/DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf The Secret Life of Krbtgt Christopher Campbell SECURITY RESEARCHER A tale of peril and woe, Krbtgt is the domain account that you just can't quit. Quiet a...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Christopher Campbell - The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 06:14
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Campbell/DEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns Christopher Campbell SECURITY RESEARCHER 15 years after APT was released for Linux, Micros...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Chris Littlebury - Home Alone with localhost: Automating Home Defense

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 06:13
Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Littlebury/DEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf Home Alone with localhost: Automating Home Defense Chris Littlebury SENIOR PENETRATION TESTER, KNOWLEDGE CONSULTING GROUP, INC. Home automation is every...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Charlie Vedaa and Mike Larsen - Impostor — Polluting Tor Metadata

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 04:24
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Larsen-Vedaa/DEFCON-22-Mike-Larsen-Charlie-Vedaa-Impostor-Polluting-Tor-Metadata.pdf Impostor — Polluting Tor Metadata Charlie Vedaa Mike Larsen Just using Tor can bring the cops to your door. While the security community w...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 02:02
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Cerrudo/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf Hacking US (and UK, Australia, France, etc.) traffic control systems Cesar Cerrudo CTO, IOACTIVE LABS Probably many of us have seen that scene from ...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Brian Gorenc and Matt Molinyawe - Blowing up the Celly - Building Your Own SMS/MMS Fuzzer

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 02:01
Slides here; https://defcon.org/images/defcon-22/dc-22-presentations/Gorenc-Molinyawe/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf Blowing up the Celly - Building Your Own SMS/MMS Fuzzer Brian Gorenc ZERO DAY INITIATIVE, HP SECURITY RESEARCH Matt Molinyawe ZERO DAY I...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Brady Bloxham - Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 02:00
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Bloxham/DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse Brady Bloxham PRINCIPAL SECURITY CONSULTANT, SILENT BREAK SECURITY Windows APIs are oft...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Anton Sapozhnikov - Acquire current user hashes without admin privileges

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:59
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Sapozhnikov/DEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf Acquire current user hashes without admin privileges Anton Sapozhnikov KPMG If an attacker has only user level access to an inf...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Andrew Hunt - Raspberry MoCA - A recipe for compromise

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:58
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Hunt/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf Additional materials are available for download here: https://defcon.org/images/defcon-22/dc-22-presentations/Hunt/DEFCON-22-Andrew-Hunt-MoCA-Over...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Anch - The Monkey in the Middle: A pentesters guide to playing in traffic.

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:41
Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Anch/DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf The Monkey in the Middle: A pentesters guide to playing in traffic. Anch (MIKE GUTHRIE) Prank your friends, collect session information and passwords, edit traffic as it g...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Alexandre Moneger - Generating ROP payloads from numbers

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:37
Slides Available here: https://defcon.org/images/defcon-22/dc-22-presentations/Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf Extra Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room-...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Alex Zacharis and Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:16
Presentation Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Zacharis-Tsagkarakis/DEFCON-22-Alex Zacharis-Nikolaos-Tsagkarakis-PoS-Attacking-the-Traveling-Salesman.pdf PoS Attacking the Traveling Salesman Alex Zacharis Tsagkarakis Nikolaos CENSUS Our work pr...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Alex Pinto - Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:15
Presentation Available here: https://defcon.org/images/defcon-22/dc-22-presentations/Pinto-Maxwell/DEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT We could all have pre...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Alex Pinto and Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:14
Presentation available here: https://defcon.org/images/defcon-22/dc-22-presentations/Pinto-Maxwell/DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf Measuring the IQ of your Threat Intelligence feeds Alex Pinto CHIEF DATA SCIENTIST, MLSEC PROJECT Kyle Maxwe...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 13, 2014 01:11
Presentation available here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf Dropping Docs on Darknets: How People Got Caught Adrian Crenshaw TRUSTEDSEC & IRONGEEK.COM Most of you have p...

Related Dc22 Topics