Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Rob Bathurst (evilrob) & Jeff Thomas (xaphan) - Canary: Keeping Your Dick Pics Safe(r)
|
Nov 03, 2015 |
Zoz - And That's How I Lost My Other Eye: Further Explorations In Data Destruction
|
Oct 30, 2015 |
Zack Fasel - Seeing through the Fog
|
Oct 30, 2015 |
Terrell McSweeny & Ashkan Soltani - How to Hack Government: Technologists as Policy Makers
|
Oct 30, 2015 |
Sean Pierce - Abusing native Shims for Post Exploitation
|
Oct 30, 2015 |
Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots
|
Oct 30, 2015 |
Runa A. Sandvik & Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle
|
Oct 30, 2015 |
Robert Graham and David Maynor - HamSammich – long distance proxying over radio
|
Oct 30, 2015 |
Richard Thieme - Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0
|
Oct 30, 2015 |
Peter Shipley - Insteon - False Security and Deceptive Documentation
|
Oct 30, 2015 |
Panel - ThunderStrike 2- Sith Strike
|
Oct 30, 2015 |
Panel - Licensed to Pwn - Weaponization and Regulation of Security Research
|
Oct 30, 2015 |
Panel - Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
|
Oct 30, 2015 |
Panel - Contests Closing Ceremonies
|
Oct 30, 2015 |
Matt Cagle & Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy War
|
Oct 30, 2015 |
Marc Rogers & Kevin Mahaffey - How to Hack a Tesla Model S
|
Oct 30, 2015 |
Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS
|
Oct 30, 2015 |
Geoff Walton & Dave Kennedy - Pivoting Without Rights – Introducing Pivoter
|
Oct 30, 2015 |
Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID
|
Oct 30, 2015 |
Damon Small - Beyond the Scan: The Value Proposition of Vulnerability Assessment - 101 Track
|
Oct 30, 2015 |
DaKahuna & satanklawz - Introduction to SDR and the Wireless Village - 101 Track
|
Oct 30, 2015 |
Tottenkoph & IrishMASMS - Hackers Hiring Hackers - How to Do Things Better - 101 Track
|
Oct 30, 2015 |
1057 - Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey - RICKASTLEY
|
Oct 30, 2015 |
Dr. Phil Polstra - Hacker in the Wires - 101 Track
|
Oct 23, 2015 |
Marina Krotofil & Jason Larsen - Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
|
Oct 23, 2015 |
John Seymour - "Quantum" Classification of Malware
|
Oct 23, 2015 |
Topher Timzen & Ryan Allen - Hijacking Arbitrary .NET Application Control Flow - 101 Track
|
Oct 23, 2015 |
Charlie Miller - Remote exploitation of an unaltered passenger vehicle
|
Oct 22, 2015 |
AmmonRa - How to hack your way out of home detention
|
Oct 22, 2015 |
Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track
|
Oct 22, 2015 |
Patrick "Unregistered436" McNeil & "Snide" Owen - Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present - 101 Track
|
Oct 22, 2015 |
Miaubiz - Put on your tinfo_t hat if youre my type
|
Oct 22, 2015 |
Nir Valtman & Moshe Ferber - From 0 To Secure In 1 Minute — Securing IAAS
|
Oct 22, 2015 |
Vivek Ramachandran - Chigula — A framework for Wi-Fi Intrusion Detection and Forensics
|
Oct 22, 2015 |
Aditya K Sood - Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
|
Oct 22, 2015 |
Jose Selvi - Breaking SSL Using Time Synchronisation Attacks
|
Oct 22, 2015 |
Bart Kulach (Bartlomiej Jakub Kulach - Hack the Legacy! IBM i (aka AS/400) Revealed
|
Oct 22, 2015 |
Ryan Mitchell - Separating Bots from the Humans
|
Oct 22, 2015 |
Marte L0ge - Tell me who you are and I will tell you your lock patter
|
Oct 22, 2015 |
Jean-Philippe Aumasson - Quantum Computers vs. Computers Security
|
Oct 22, 2015 |
Andres Blanco & Andres Gazzoli - 80211 Massive Monitoring
|
Oct 22, 2015 |
Panel - DEF CON Comedy Inception: How many levels deep can we go?
|
Oct 22, 2015 |
Patrick Wardle - Stick That In Your root Pipe and Smoke It
|
Oct 22, 2015 |
Ryan O'Neill - Advances in Linux Process Forensics Using ECFS
|
Oct 22, 2015 |
Teddy Reed & Nick Anderson - Hardware and Trust Security: Explain it like I’m 5
|
Oct 22, 2015 |
Daniel “unicornFurnace” Crowley & Damon Smith - Bugged Files: Is Your Document Telling on You?
|
Oct 22, 2015 |
Weston Hecker - Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”
|
Oct 22, 2015 |
Ken Westin - Confessions of a Professional Cyber Stalker
|
Oct 22, 2015 |
Colin O'Flynn - Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit
|
Oct 22, 2015 |
Joshua Smith - High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
|
Oct 22, 2015 |
Panel - WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
|
Oct 22, 2015 |
Wesley McGrew - I Hunt Penetration Testers: More Weaknesses in Tools and Procedures
|
Oct 22, 2015 |
Patrick Wardle - 'DLL Hijacking' on OS X? #@%& Yeah!
|
Oct 22, 2015 |
Tom Cross aka Decius & Collin Anderson - Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?
|
Oct 22, 2015 |
Christian (@xntrik) Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF
|
Oct 22, 2015 |
Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers
|
Oct 22, 2015 |
David An - When the Secretary of State says Please Stop Hacking Us
|
Oct 22, 2015 |
Ryan Castellucci - Cracking Cryptocurrency Brainwallets
|
Oct 22, 2015 |
Ian Latter - Remote Access - the APT
|
Oct 22, 2015 |
Cory Doctorow - Fighting Back in the War on General Purpose Computers
|
Oct 21, 2015 |
Sean Metcalf - Red vs. Blue: Modern Active Directory Attacks & Defense
|
Oct 21, 2015 |
Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications
|
Oct 21, 2015 |
DT and 1057 - Welcome to DEF CON 23
|
Oct 21, 2015 |
DEF CON 23 - Closing Ceremonies
|
Oct 21, 2015 |
Ricky "HeadlessZeke" Lawshae - Let's Talk About SOAP, Baby. Let's Talk About UPNP
|
Oct 21, 2015 |
Omer Coskun - Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
|
Oct 21, 2015 |
David Mortman - Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You
|
Oct 21, 2015 |
Panel - Ask the EFF - The Year in Digital Civil Liberties
|
Oct 21, 2015 |
Philip Young & Chad "Bigendian Smalls” Rikansrud - Security Necromancy: Further Adventures in Mainframe Hacking
|
Oct 21, 2015 |
Dan Kaminsky - I want these * bugs off my * Internet
|
Oct 21, 2015 |
Mike Ryan & Richo Healey - Hacking Electric Skateboards: Vehicle Research For Mortals
|
Oct 21, 2015 |
Yan Shoshitaishvili & Fish Wang - Angry Hacking - the next generation of binary analysis
|
Oct 21, 2015 |
Panel - F*ck the attribution, show us your .idb!
|
Oct 21, 2015 |
Michael Walker & Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF
|
Oct 21, 2015 |
Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns
|
Oct 21, 2015 |
Chris Rock - I Will Kill You
|
Oct 16, 2015 |
Rich Kelley - Harness - Powershell Weaponization Made Easy
|
Oct 16, 2015 |
Lin Huang & Qing Yang - Low-cost GPS simulator – GPS spoofing by SDR
|
Oct 16, 2015 |
Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars
|
Oct 16, 2015 |
Alejandro Mayorkas - Working together to keep the Internet safe and secure
|
Oct 16, 2015 |
Etienne Martineau - Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core
|
Oct 16, 2015 |
Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware
|
Oct 16, 2015 |
Michael Robinson & Alan Mitchell - Knocking my neighbor’s kid’s cruddy drone offline
|
Oct 16, 2015 |
Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman - Abusing Adobe Reader’s JavaScript APIs
|
Oct 16, 2015 |
Gregory Picket - Staying Persistent in Software Defined Networks
|
Oct 16, 2015 |
Eric Van Albert & Zach Banks - Looping Surveillance Cameras through Live Editing of Network Streams
|
Oct 16, 2015 |
Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service
|
Oct 16, 2015 |
Dan “AltF4” Petro & Oscar Salaza - Hacking Smart Safes: On the "Brink" of a Robbery
|
Oct 16, 2015 |
Mickey Shkatov & Jesse Michael - Scared Poopless – LTE and your laptop
|
Oct 16, 2015 |
Dr. Phil Polstra - One Device to Pwn Them All
|
Oct 16, 2015 |
Craig Young - How to Train Your RFID Hacking Tools
|
Oct 16, 2015 |
Atlas - Fun with Symboliks
|
Oct 16, 2015 |
Yuwei Zheng & Haoqi Shan - Build a free cellular traffic capture tool with a vxworks based femoto
|
Oct 16, 2015 |
Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - 101 Track
|
Oct 16, 2015 |
Paul Amicelli & David Baptiste - How to secure the keyboard chain
|
Oct 16, 2015 |
Peter Desfigies, Joshua Brierton, Naveed Ul Islam - Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - 101 Track
|
Oct 16, 2015 |
Saif El-Sherei & Etienne Stalmans - Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers - 101 Track
|
Oct 16, 2015 |
Sarah Edwards - Ubiquity Forensics - Your iCloud and You - 101 Track
|
Oct 16, 2015 |
Tony Trummer & Tushar Dalvi - QARK: Android App Exploit and SCA Tool - 101 Track
|
Oct 16, 2015 |
Zack Allen & Rusty Bower - Malware in the Gaming Micro-economy
|
Oct 16, 2015 |
Yaniv Balmas & Lior Oppenheim - Key-Logger, Audio, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster
|
Oct 16, 2015 |
Vivek Ramachandran - Chellam – A Wi-Fi IDS Firewall for Windows
|
Oct 15, 2015 |
Tamas Szakaly - Shall We Play a Game?
|
Oct 15, 2015 |
Mahdi Namazifar - Detecting Randomly Generated Strings; A Language Based Approach
|
Oct 15, 2015 |
Bruce Schneier - Questions and Answers
|
Oct 15, 2015 |
Panel - DEF CON 101 The Panel
|
Oct 15, 2015 |
Ronny Bull & Jeanna Matthews - Exploring Layer 2 Network Security in Virtualized Environments
|
Oct 09, 2015 |
Collin Cassidy, Robert Lee, Eireann Leverett - Switches Get Stitches
|
Oct 09, 2015 |
Eric (XlogicX) Davisson - REvisiting RE:DoS
|
Oct 09, 2015 |
Alessandro Di Federico & Yan Shoshitaishvili - Dark side of the ELF - leveraging dynamic loading to pwn noobs
|
Oct 09, 2015 |
Chris Domas - REpsych: Psychological Warfare in Reverse Engineering
|
Oct 09, 2015 |
Nadeem Douba - BurpKit - Using WebKit to Own the Web
|
Oct 09, 2015 |
Joshua J. Drake - Stagefright: Scary Code in the Heart of Android
|
Oct 09, 2015 |
Joe FitzPatrick & Matt King - NSA Playset: JTAG Implants
|
Oct 09, 2015 |
Matteo Becarro & Matteo Collura - Extracting the Painful (blue)tooth
|
Sep 22, 2015 |
Fernando Arnaboldi - Abusing XSLT for Practical Attacks - 101 Track
|
Sep 22, 2015 |
Amit Ashbel & Maty Siman - Game of Hacks: Play, Hack & Track - 101 Track
|
Sep 22, 2015 |
Brent White - Hacking Web Apps - 101 Track
|
Sep 22, 2015 |
Mark Ryan Talabis - The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic - 101 Track
|
Sep 22, 2015 |
Chris Sistrunk - NSM 101 for ICS - 101 Track
|
Sep 22, 2015 |
Mike Sconzo - I Am Packer And So Can You - 101 Track
|
Sep 22, 2015 |
Michael Schrenk - Applied Intelligence: Using Information That's Not There - 101 Track
|
Sep 22, 2015 |
Bruce Potter - A Hacker’s Guide to Risk - 101 Track
|
Sep 22, 2015 |
John Menerick - Backdooring Git - 101 Track
|
Sep 22, 2015 |
Dennis Maldonado - Are We Really Safe? - Bypassing Access Control Systems - 101 Track
|
Sep 22, 2015 |
LI Jun & YANG Qing - I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices - 101 Track
|
Sep 22, 2015 |
Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - 101 Track
|
Sep 22, 2015 |
Ian Kline - LTE Recon and Tracking with RTLSDR - 101 Track
|
Sep 22, 2015 |
Eijah - Crypto for Hackers - 101 Track
|
Sep 22, 2015 |
David Huerta - Alice and Bob are Really Confused - 101 Track
|
Sep 22, 2015 |
Jason Haddix - How to Shot Web: Web and mobile hacking in 2015 - 101 Track
|
Sep 22, 2015 |
Justin Engler - Secure Messaging for Normal People - 101 Track
|
Sep 22, 2015 |
Grant Bugher - It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence - 101 Track
|
Sep 22, 2015 |