50:55
[DEFCON 19] "Get Off of My Cloud": Cloud Credential Compromise and Exposure
TalksDump
50:54
[DEFCON 19] "Whoever Fights Monsters..." Aaron Barr, Anonymous, and Ourselves
1:33:27
[DEFCON 19] A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux
40:37
[DEFCON 19] Abusing HTML5
32:22
[DEFCON 19] An Insider's Look at International Cyber Security Threats and Trends
49:34
[DEFCON 19] And That's How I Lost My Eye: Exploring Emergency Data Destruction
44:19
[DEFCON 19] Archive Team: A Distributed Preservation of Service Attack
23:02
[DEFCON 19] Are You In Yet? The CISO's View of Pentesting
54:19
[DEFCON 19] Ask EFF: The Year in Digital Civil Liberties
47:33
[DEFCON 19] Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
46:27
[DEFCON 19] Attacking and Defending the Smart Grid
1:25:05
[DEFCON 19] Balancing The Pwn Trade Deficit -- APT Secrets in Asia
49:06
[DEFCON 19] Battery Firmware Hacking
21:26
[DEFCON 19] Beat to 1337: Creating A Successful University Cyber Defense Organization
50:27
[DEFCON 19] Big Brother on the Big Screen: Fact/Fiction?
45:14
[DEFCON 19] Bit-squatting: DNS Hijacking Without Exploitation
52:20
[DEFCON 19] Black Ops of TCP/IP 2011
47:08
[DEFCON 19] Blinkie Lights: Network Monitoring with Arduino
45:45
[DEFCON 19] Build your own Synthetic Aperture Radar
51:49
[DEFCON 19] Building The DEF CON Network, Making A Sandbox For 10,000 Hackers
33:00
[DEFCON 19] Bulletproofing The Cloud: Are We Any Closer To Security?
45:07
[DEFCON 19] Cellular Privacy: A Forensic Analysis of Android Network Traffic
52:57
[DEFCON 19] Chip & PIN is Definitely Broken
51:38
[DEFCON 19] Cipherspaces/Darknets: An Overview Of Attack Strategies
42:46
[DEFCON 19] Covert Post-Exploitation Forensics With Metasploit
48:43
[DEFCON 19] DCFluX in: License to Transmit
41:10
[DEFCON 19] Deceptive Hacking: How Misdirection Can Be Used To Steal Information
39:16
[DEFCON 19] DEF CON Awards
1:43:33
[DEFCON 19] DEF CON Comedy Jam IV, A New Hope For The Fail Whale
42:15
[DEFCON 19] DIY Non-Destructive Entry
49:53
[DEFCON 19] Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
14:32
[DEFCON 19] Don't Fix It In Software
42:44
[DEFCON 19] Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests
50:39
[DEFCON 19] Economics of Password Cracking in the GPU Era
44:12
[DEFCON 19] Familiarity Breeds Contempt
46:05
[DEFCON 19] Federation and Empire
18:23
[DEFCON 19] Fingerbank - Open DHCP Fingerprints Database
51:40
[DEFCON 19] Former Keynotes - The Future
41:31
[DEFCON 19] From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
49:26
[DEFCON 19] Getting F***ed On the River
36:14
[DEFCON 19] Getting SSLizzard
27:16
[DEFCON 19] Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously
48:41
[DEFCON 19] Hacking .Net Applications: The Black Arts
46:59
[DEFCON 19] Hacking and Forensicating an Oracle Database Server
38:02
[DEFCON 19] Hacking and Securing DB2 LUW Databases
45:49
[DEFCON 19] Hacking Google Chrome OS
50:43
[DEFCON 19] Hacking MMORPGs for Fun and Mostly Profit
19:59
[DEFCON 19] Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
30:21
[DEFCON 19] Hacking Your Victims Over Power Lines
21:34
[DEFCON 19] Handicapping the US Supreme Court: Can We Get Rich by Forceful Browsing?
14:36
[DEFCON 19] How Haunters Void Warranties
48:29
[DEFCON 19] How To Get Your Message Out When Your Government Turns Off The Internet
35:58
[DEFCON 19] I Am Not a Doctor but I Play One on Your Network
40:00
[DEFCON 19] I'm Your MAC(b)Daddy
48:31
[DEFCON 19] Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs
46:06
[DEFCON 19] Internet Kiosk Terminals : The Redux
41:28
[DEFCON 19] IP4 TRUTH: The IPocalypse is a LIE
26:00
[DEFCON 19] Jugaad -- Linux Thread Injection Kit
14:23
[DEFCON 19] Kernel Exploitation Via Uninitialized Stack
39:10
[DEFCON 19] Key Impressioning
10:53
[DEFCON 19] Kinectasploit: Metasploit Meets Kinect
47:21
[DEFCON 19] Lives On The Line: Securing Crisis Maps In Libya, Sudan, And Pakistan
46:34
[DEFCON 19] Look At What My Car Can Do
41:43
[DEFCON 19] Malware Freak Show 3: They're pwning er'body out there!
36:49
[DEFCON 19] Mamma Don't Let Your Babies Grow Up to be Pen Testers
42:40
[DEFCON 19] Metasploit vSploit Modules
41:42
[DEFCON 19] Mobile App Moolah: Profit taking with Mobile Malware
45:15
[DEFCON 19] Net Neutrality Panel
40:51
[DEFCON 19] Network Application Firewalls: Exploits and Defense
47:27
[DEFCON 19] Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit
44:39
[DEFCON 19] Operational Use of Offensive Cyber
48:21
[DEFCON 19] Owned Over Amateur Radio: Remote Kernel Exploitation in 2011
51:02
[DEFCON 19] PacketFence, The Open Source Nac: What We've Done In The Last Two Years
48:36
[DEFCON 19] Panel - Meet The Federal Agent 2.0
46:19
[DEFCON 19] Panel - Network Security Podcast
56:35
[DEFCON 19] Panel: Is it 0-day or 0-care?
1:50:41
[DEFCON 19] PCI 2.0: Still Compromising Controls and Compromising Security
27:25
[DEFCON 19] Pervasive Cloaking
16:49
[DEFCON 19] Phishing and Online Scam in China
49:43
[DEFCON 19] Physical Memory Forensics for Cache
47:25
[DEFCON 19] PIG: Finding Truffles Without Leaving A Trace
16:21
[DEFCON 19] Pillaging DVCS Repos For Fun And Profit
43:03
[DEFCON 19] Port Scanning Without Sending Packets
47:34
[DEFCON 19] Represent! Defcon Groups, Hackerspaces, and You
44:15
[DEFCON 19] Runtime Process Insemination
38:10
[DEFCON 19] Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
50:29
[DEFCON 19] SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas
44:41
[DEFCON 19] Security When Nano Seconds Count
45:39
[DEFCON 19] Seven Ways to Hang Yourself with Google Android
46:48
[DEFCON 19] Smartfuzzing The Web: Carpe Vestra Foramina
30:06
[DEFCON 19] Smile for the Grenade! "Camera Go Bang!"
42:48
[DEFCON 19] Sneaky PDF
44:37
[DEFCON 19] Sounds Like Botnet
48:30
[DEFCON 19] Speaking with Cryptographic Oracles
46:22
[DEFCON 19] SSL And The Future Of Authenticity
51:21
[DEFCON 19] Staring into the Abyss: The Dark Side of Crime-fighting, Security
46:29
[DEFCON 19] Staying Connected during a Revolution or Disaster
40:47
[DEFCON 19] Steal Everything, Kill Everyone, Cause Total Financial Ruin!
19:40
[DEFCON 19] Steganography and Cryptography 101
49:49
[DEFCON 19] Strategic Cyber Security