39:31
[DEFCON 21] 10000 Yen into the Sea
TalksDump
45:05
[DEFCON 21] A Password is Not Enough: Why disk encryption is broken and how we might fix it
19:38
[DEFCON 21] A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading
20:27
[DEFCON 21] Abusing NoSQL Databases
44:48
[DEFCON 21] ACL Steganography - Permissions to Hide Your Porn
48:11
[DEFCON 21] Adventures in Automotive Networks and Control Units
1:33:03
[DEFCON 21] All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
49:50
[DEFCON 21] An Open Letter - The White Hat's Dilemma: Professional Ethics
23:28
[DEFCON 21] Android WebLogin: Google's Skeleton Key
1:47:55
[DEFCON 21] Ask the EFF: The Year in Digital Civil Liberties
43:50
[DEFCON 21] Backdoors, Government Hacking and The Next Crypto Wars
36:52
[DEFCON 21] Blucat: Netcat For Bluetooth
26:34
[DEFCON 21] BoutiqueKit: Playing WarGames with expensive rootkits and malwar
19:05
[DEFCON 21] Building an Android IDS on Network Level
33:27
[DEFCON 21] Business logic flaws in mobile operators services
45:44
[DEFCON 21] BYO-Disaster and Why Corporate Wireless Security Still Sucks
47:52
[DEFCON 21] BYOD PEAP Show
23:25
[DEFCON 21] C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood
18:37
[DEFCON 21] Collaborative Penetration Testing With Lair
23:48
[DEFCON 21] Combatting Mac OSX/iOS Malware with Data Visualization
48:51
[DEFCON 21] Conducting massive attacks with open source distributed computing
16:20
[DEFCON 21] Data Evaporation from SSDs
44:31
[DEFCON 21] De-Anonymizing Alt.Anonymous.Messages
1:41:27
[DEFCON 21] Decapping Chips the [Easy] Hard Way
1:50:16
[DEFCON 21] DEF CON Comedy Jam Part VI, Return of the Fail
44:47
[DEFCON 21] Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
18:53
[DEFCON 21] Defeating SEAndroid
47:59
[DEFCON 21] Defending Networks with Incomplete Information: A Machine Learning Approach
49:33
[DEFCON 21] Defense by numbers: Making problems for script kiddies and scanner monkeys
37:02
[DEFCON 21] DNS May Be Hazardous to Your Health
1:05:40
[DEFCON 21] Do-It-Yourself Cellular IDS
40:28
[DEFCON 21] Doing Bad Things to 'Good' Security Appliances
40:29
[DEFCON 21] DragonLady: An Investigation of SMS Fraud Operations in Russia
44:10
[DEFCON 21] Dude, WTF in my car?
45:16
[DEFCON 21] EDS: Exploitation Detection System
18:31
[DEFCON 21] Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)
38:58
[DEFCON 21] EMET 4.0 PKI Mitigation
41:20
[DEFCON 21] Evil DoS Attacks and Strong Defenses
23:35
[DEFCON 21] Evolving Exploits Through Genetic Algorithms
20:25
[DEFCON 21] Examining the Bitsquatting Attack Surface
33:03
[DEFCON 21] Exploiting Music Streaming with JavaScript
45:13
[DEFCON 21] Fast Forensics Using Simple Statistics and Cool Tools
31:19
[DEFCON 21] Fear the Evil FOCA: IPv6 attacks in Internet connections
47:10
[DEFCON 21] Forensic Fails - Shift + Delete won't help you here
51:28
[DEFCON 21] From Nukes to Cyber
18:04
[DEFCON 21] Getting The Goods With smbexec
20:22
[DEFCON 21] gitDigger: Creating useful wordlists from public GitHub repositories
47:32
[DEFCON 21] Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
21:50
[DEFCON 21] GoPro or GTFO: A Tale of Reversing an Embedded System
49:08
[DEFCON 21] Hacking Driverless Vehicles
29:47
[DEFCON 21] Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
50:25
[DEFCON 21] Hardware Hacking with Microcontrollers: A Panel Discussion
39:54
[DEFCON 21] HiveMind: Distributed File Storage Using JavaScript Botnets
42:52
[DEFCON 21] Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices
26:53
[DEFCON 21] How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers
36:58
[DEFCON 21] How to Disclose or Sell an Exploit Without Getting in Trouble
20:06
[DEFCON 21] How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages
21:39
[DEFCON 21] How to use CSP to stop XSS
15:26
[DEFCON 21] HTTP Time Bandit
46:47
[DEFCON 21] I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning
46:10
[DEFCON 21] Insecurity - A Failure of Imagination
43:16
[DEFCON 21] Java Every-Days: Exploiting Software Running on 3 Billion Devices
47:06
[DEFCON 21] JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces
32:21
[DEFCON 21] Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
37:33
[DEFCON 21] Kill 'em All - DDoS Protection Total Annihilation!
42:55
[DEFCON 21] Legal Aspects of Full Spectrum Computer Network (Active) Defense
43:21
[DEFCON 21] Let's screw with nmap
40:33
[DEFCON 21] Made Open: Hacking Capitalism
1:41:24
[DEFCON 21] Making Of The DEF CON Documentary
47:13
[DEFCON 21] Meet the VCs
15:42
[DEFCON 21] MITM All The IPv6 Things
42:59
[DEFCON 21] Noise Floor: Exploring the world of unintentional radio emissions
18:10
[DEFCON 21] Offensive Forensics: CSI for the Bad Guy
19:51
[DEFCON 21] Open Public Sensors, Trend Monitoring and Data Fusion
19:32
[DEFCON 21] OTP, It won't save you from free rides!
39:24
[DEFCON 21] Phantom Network Surveillance UAV / Drone
29:35
[DEFCON 21] Please Insert Inject More Coins
41:48
[DEFCON 21] PowerPreter: Post Exploitation Like a Boss
22:27
[DEFCON 21] PowerPwning: Post-Exploiting By Overpowering PowerShell
42:44
[DEFCON 21] Predicting Susceptibility to Social Bots on Twitter
45:14
[DEFCON 21] Privacy In DSRC Connected Vehicles
44:21
[DEFCON 21] Proliferation
22:00
[DEFCON 21] Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
41:27
[DEFCON 21] Prowling Peer-to-Peer Botnets After Dark
40:55
[DEFCON 21] Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
18:36
[DEFCON 21] Pwn'ing You(r) Cyber Offenders
46:00
[DEFCON 21] Recognize Awards
25:31
[DEFCON 21] Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
37:03
[DEFCON 21] RFID Hacking: Live Free or RFID Hard
48:55
[DEFCON 21] Safety of the Tor network
22:25
[DEFCON 21] So You Think Your Domain Controller is Secure?
41:55
[DEFCON 21] Social Engineering: The Gentleman Thief
45:20
[DEFCON 21] Stalking a City for Fun and Frivolity
42:29
[DEFCON 21] Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)
52:21
[DEFCON 21] Suicide Risk Assessment and Intervention Tactics
44:12
[DEFCON 21] The ACLU Presents: NSA Surveillance and More
23:49
[DEFCON 21] The Bluetooth Device Database
45:01
[DEFCON 21] The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!
48:27
[DEFCON 21] The Dark Arts of OSINT
24:12
[DEFCON 21] The dawn of Web 3.0: website mapping and vulnerability scanning in 3D
41:06
[DEFCON 21] The Dirty South -- Getting Justified with Technology