Latest Hacker conference Podcast Episodes

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Mike Sconzo - I Am Packer And So Can You - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:27 ★★★ - 4 ratings
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mike-Sconzo-I-am-packer-and-so-can-you.pdf I Am Packer And So Can You Mike Sconzo Security Researcher Automating packer and compiler/toolchain detection can be tricky and best and downri...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Michael Schrenk - Applied Intelligence: Using Information That's Not There - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:27 ★★★ - 4 ratings
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Michael-Schrenk-Applied-Intelligence-UPDATED.pdf Applied Intelligence: Using Information That's Not There Michael Schrenk Security Researcher Organizations continue to unknowingly leak t...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Bruce Potter - A Hacker’s Guide to Risk - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:27 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Bruce-Potter-Hackers-Guide-to-Risk.pdf A Hacker’s Guide to Risk Bruce Potter The Shmoo Group When the latest and greatest vulnerability is announced, the media and PR frenzy can be dizzy...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

John Menerick - Backdooring Git - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:26 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-John-Menerick-Backdooring-Git.pdf Backdooring Git John Menerick Security @ NetSuite Join us for a fun-filled tour of source control management and services to talk about how to backdoor ...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Dennis Maldonado - Are We Really Safe? - Bypassing Access Control Systems - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:26 ★★★ - 4 ratings
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Dennis-Maldonado-Are-we-really-safe-bypassing-access-control-systems-UPDATED.pdf Are We Really Safe? - Bypassing Access Control Systems Dennis Maldonado Security Consultant - KLC Consulti...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

LI Jun & YANG Qing - I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:26 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Li-Jun-Yang-Qing-I-AM-A-NEWBIE-YET-I-CAN-HACK-ZIGBEE.pdf I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices LI Jun Graduate student from CUIT(Chengdu Unive...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:26 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Gerard-Laygui-Forensic-Artifacts-Pass-The-Hash-Attack.pdf Forensic Artifacts From a Pass the Hash Attack Gerard Laygui Security Researcher A pass the hash (PtH) attack is one of the most...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Ian Kline - LTE Recon and Tracking with RTLSDR - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:26 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ian-Kline-LTE-Recon-and-Tracking-with-RTLSDR.pdf LTE Recon and Tracking with RTLSDR Ian Kline Wolf Den Associates Since RTLSDR became a consumer grade RX device, numerous talks and open ...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Eijah - Crypto for Hackers - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:26 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Eijah-Crypto-for-Hackers-UPDATED.pdf Workshop Materials:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Eijah-Crypto-for-Hackers-Workshop.pdf Crypto for H...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

David Huerta - Alice and Bob are Really Confused - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:26 ★★★ - 4 ratings
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-David-Huerta-Alice-and-Bob-are-Really-Confused.pdf Alice and Bob are Really Confused David Huerta Cryptoparty Organizer There have been over 20 cryptoparties in New York City, in which p...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Jason Haddix - How to Shot Web: Web and mobile hacking in 2015 - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:25 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Jason-Haddix-How-Do-I-shot-Web.pdf How to Shot Web: Web and mobile hacking in 2015 Jason Haddix Director of Technical Operations, Bugcrowd 2014 was a year of unprecedented participation ...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Justin Engler - Secure Messaging for Normal People - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:25 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Justin-Engler-Secure-Messaging-For-Normal-People.pdf Whitepaper here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Justin-Engler-Secure-Messaging-For-N...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Grant Bugher - It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:24 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Grant-Bugher-Obtaining-and-Detecting-Domain-Persistence.pdf It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence Grant Bugher Perimeter Grid When a Windows domain is ...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Zach Fasel - Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools </buzzwords>

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:34
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools Zack Fasel Managing Partner, Urbane Security Many struggle in their job with the decision of what events to log in battle against costly increases to their licensing of a commercial SIEM or other logging solution. Lev...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Will Schroeder - Veil-Pillage: Post-exploitation 2.

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:31
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf Veil-Pillage: Post-exploitation 2.0 Will Schroeder SECURITY RESEARCHER, VERIS GROUP The Veil-Framework is a project that aims to bridge the gap betwee...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Fatih Ozavci - VoIP Wars: Attack of the Cisco Phones

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:30
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Ozavci/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf VoIP Wars: Attack of the Cisco Phones Fatih Ozavci SENIOR SECURITY CONSULTANT, SENSE OF SECURITY Many hosted VoIP service providers are using Cis...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Dominic White and Ian de Villiers - Manna from Heaven: Improving the state of wireless rogue AP attacks

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:29
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/White-deVilliers/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf Manna from Heaven: Improving the state of wireless rogue AP attacks Dominic White CTO, SENSEPOST Ian de Villiers SENIOR ANALYST,...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:29
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Self/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf Don't DDoS Me Bro: Practical DDoS Defense Blake Self SENIOR SECURITY ARCHITECT Shawn "cisc0ninja" Burrell SOLDIERX CREW Layer 7 DDoS attacks have been on the...


DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Christopher Soghoian - Blinding The Surveillance State

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:18
Blinding The Surveillance State Christopher Soghoian Principal Technologist, American Civil Liberties Union We live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them to learn intimate, private details about our lives...


DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:15
A Survey of Remote Automotive Attack Surfaces Charlie Miller Security Engineer, Twitter Chris Valasek Director of Threat Intelligence, IOActive Automotive security concerns have gone from the fringe to the mainstream with security researchers showing the susceptibility of the modern vehicle t...


DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Zoz - Don't Fuck It Up!

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:04
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Zoz/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf Don't Fuck It Up! Zoz ROBOTICS ENGINEER Online antics used to be all about the lulz; now they're all about the pervasive surveillance. Whether you're the director of a TLA just t...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Zoltán Balázs - Bypass firewalls, application white lists, secure remote desktops under 20 seconds

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:03
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Balazs/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf Bypass firewalls, application white lists, secure remote desktops under 20 seconds Zoltán Balázs CHIEF TECHNOLOGY OFFICER AT MRG...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:02
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Hecker/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf Burner Phone DDOS 2 dollars a day : 70 Calls a Minute Weston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY Phone DDOS research. Current proof of concept is ...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Wesley McGrew- Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:01
Slides Here:https://www.defcon.org/images/defcon-22/dc-22-presentations/McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf Additional Materials available: https://www.defcon.org/images/defcon-22/dc-22-presentations/McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 01:00
Slides Here:https://www.defcon.org/images/defcon-22/dc-22-presentations/Strazzere-Sawyer/DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf Android Hacker Protection Level 0 Tim Strazzere LEAD RESEARCH & RESPONSE ENGINEER Jon Sawyer CTO OF APPLIED CYBERSECURITY LLC Ob...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Tess Schrodinger - From Raxacoricofallapatorius With Love: Case Studies In Insider Threat

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:59
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schrodinger/DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf From Raxacoricofallapatorius With Love: Case Studies In Insider Threat Tess Schrodinger Espionage, honey pots, encryption, and lies. C...

DEF CON 22 [Materials] Speeches from the Hacker Convention. artwork

Svetlana Gaivoronski and Ivan Petrov - Shellcodes for ARM: Your Pills Don't Work on Me, x86

DEF CON 22 [Materials] Speeches from the Hacker Convention. - December 14, 2014 00:59
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Petrov-Gaivoronski/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf Extra Materials are available here: https://defcon.org/images/defcon-22/dc-22-presentations/Petrov-Gaivoronski/DEFCON-22-Ivan-Petrov-...

Related Hacker conference Topics