DEF CON 23 [Audio] Speeches from the Hacker Convention

By DEF CON

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by DEF CON

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 4
Reviews: 0
Episodes: 133

Description

The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org

Episode Date
Rob Bathurst (evilrob) & Jeff Thomas (xaphan) - Canary: Keeping Your Dick Pics Safe(r)
Nov 03, 2015
Zoz - And That's How I Lost My Other Eye: Further Explorations In Data Destruction
Oct 30, 2015
Zack Fasel - Seeing through the Fog
Oct 30, 2015
Terrell McSweeny & Ashkan Soltani - How to Hack Government: Technologists as Policy Makers
Oct 30, 2015
Sean Pierce - Abusing native Shims for Post Exploitation
Oct 30, 2015
Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots
Oct 30, 2015
Runa A. Sandvik & Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle
Oct 30, 2015
Robert Graham and David Maynor - HamSammich – long distance proxying over radio
Oct 30, 2015
Richard Thieme - Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0
Oct 30, 2015
Peter Shipley - Insteon - False Security and Deceptive Documentation
Oct 30, 2015
Panel - ThunderStrike 2- Sith Strike
Oct 30, 2015
Panel - Licensed to Pwn - Weaponization and Regulation of Security Research
Oct 30, 2015
Panel - Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
Oct 30, 2015
Panel - Contests Closing Ceremonies
Oct 30, 2015
Matt Cagle & Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy War
Oct 30, 2015
Marc Rogers & Kevin Mahaffey - How to Hack a Tesla Model S
Oct 30, 2015
Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS
Oct 30, 2015
Geoff Walton & Dave Kennedy - Pivoting Without Rights – Introducing Pivoter
Oct 30, 2015
Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID
Oct 30, 2015
Damon Small - Beyond the Scan: The Value Proposition of Vulnerability Assessment - 101 Track
Oct 30, 2015
DaKahuna & satanklawz - Introduction to SDR and the Wireless Village - 101 Track
Oct 30, 2015
Tottenkoph & IrishMASMS - Hackers Hiring Hackers - How to Do Things Better - 101 Track
Oct 30, 2015
1057 - Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey - RICKASTLEY
Oct 30, 2015
Dr. Phil Polstra - Hacker in the Wires - 101 Track
Oct 23, 2015
Marina Krotofil & Jason Larsen - Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
Oct 23, 2015
John Seymour - "Quantum" Classification of Malware
Oct 23, 2015
Topher Timzen & Ryan Allen - Hijacking Arbitrary .NET Application Control Flow - 101 Track
Oct 23, 2015
Charlie Miller - Remote exploitation of an unaltered passenger vehicle
Oct 22, 2015
AmmonRa - How to hack your way out of home detention
Oct 22, 2015
Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track
Oct 22, 2015
Patrick "Unregistered436" McNeil & "Snide" Owen - Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present - 101 Track
Oct 22, 2015
Miaubiz - Put on your tinfo_t hat if youre my type
Oct 22, 2015
Nir Valtman & Moshe Ferber - From 0 To Secure In 1 Minute — Securing IAAS
Oct 22, 2015
Vivek Ramachandran - Chigula — A framework for Wi-Fi Intrusion Detection and Forensics
Oct 22, 2015
Aditya K Sood - Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
Oct 22, 2015
Jose Selvi - Breaking SSL Using Time Synchronisation Attacks
Oct 22, 2015
Bart Kulach (Bartlomiej Jakub Kulach - Hack the Legacy! IBM i (aka AS/400) Revealed
Oct 22, 2015
Ryan Mitchell - Separating Bots from the Humans
Oct 22, 2015
Marte L0ge - Tell me who you are and I will tell you your lock patter
Oct 22, 2015
Jean-Philippe Aumasson - Quantum Computers vs. Computers Security
Oct 22, 2015
Andres Blanco & Andres Gazzoli - 80211 Massive Monitoring
Oct 22, 2015
Panel - DEF CON Comedy Inception: How many levels deep can we go?
Oct 22, 2015
Patrick Wardle - Stick That In Your root Pipe and Smoke It
Oct 22, 2015
Ryan O'Neill - Advances in Linux Process Forensics Using ECFS
Oct 22, 2015
Teddy Reed & Nick Anderson - Hardware and Trust Security: Explain it like I’m 5
Oct 22, 2015
Daniel “unicornFurnace” Crowley & Damon Smith - Bugged Files: Is Your Document Telling on You?
Oct 22, 2015
Weston Hecker - Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”
Oct 22, 2015
Ken Westin - Confessions of a Professional Cyber Stalker
Oct 22, 2015
Colin O'Flynn - Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit
Oct 22, 2015
Joshua Smith - High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
Oct 22, 2015
Panel - WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
Oct 22, 2015
Wesley McGrew - I Hunt Penetration Testers: More Weaknesses in Tools and Procedures
Oct 22, 2015
Patrick Wardle - 'DLL Hijacking' on OS X? #@%& Yeah!
Oct 22, 2015
Tom Cross aka Decius & Collin Anderson - Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?
Oct 22, 2015
Christian (@xntrik) Frichot - Hooked Browser Meshed-Networks with WebRTC and BeEF
Oct 22, 2015
Ionut Popescu - NetRipper - Smart traffic sniffing for penetration testers
Oct 22, 2015
David An - When the Secretary of State says Please Stop Hacking Us
Oct 22, 2015
Ryan Castellucci - Cracking Cryptocurrency Brainwallets
Oct 22, 2015
Ian Latter - Remote Access - the APT
Oct 22, 2015
Cory Doctorow - Fighting Back in the War on General Purpose Computers
Oct 21, 2015
Sean Metcalf - Red vs. Blue: Modern Active Directory Attacks & Defense
Oct 21, 2015
Jeremy Dorrough - USB Attack to Decrypt Wi-Fi Communications
Oct 21, 2015
DT and 1057 - Welcome to DEF CON 23
Oct 21, 2015
DEF CON 23 - Closing Ceremonies
Oct 21, 2015
Ricky "HeadlessZeke" Lawshae - Let's Talk About SOAP, Baby. Let's Talk About UPNP
Oct 21, 2015
Omer Coskun - Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
Oct 21, 2015
David Mortman - Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You
Oct 21, 2015
Panel - Ask the EFF - The Year in Digital Civil Liberties
Oct 21, 2015
Philip Young & Chad "Bigendian Smalls” Rikansrud - Security Necromancy: Further Adventures in Mainframe Hacking
Oct 21, 2015
Dan Kaminsky - I want these * bugs off my * Internet
Oct 21, 2015
Mike Ryan & Richo Healey - Hacking Electric Skateboards: Vehicle Research For Mortals
Oct 21, 2015
Yan Shoshitaishvili & Fish Wang - Angry Hacking - the next generation of binary analysis
Oct 21, 2015
Panel - F*ck the attribution, show us your .idb!
Oct 21, 2015
Michael Walker & Jordan Wiens - Machine vs Machine - DARPAs Fully Automated CTF
Oct 21, 2015
Daniel Selifonov - Drinking from LETHE - Exploiting and mitigating memory corruption vulns
Oct 21, 2015
Chris Rock - I Will Kill You
Oct 16, 2015
Rich Kelley - Harness - Powershell Weaponization Made Easy
Oct 16, 2015
Lin Huang & Qing Yang - Low-cost GPS simulator – GPS spoofing by SDR
Oct 16, 2015
Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars
Oct 16, 2015
Alejandro Mayorkas - Working together to keep the Internet safe and secure
Oct 16, 2015
Etienne Martineau - Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core
Oct 16, 2015
Yuriy Bulygin - Attacking Hypervisors Using Firmware and Hardware
Oct 16, 2015
Michael Robinson & Alan Mitchell - Knocking my neighbor’s kid’s cruddy drone offline
Oct 16, 2015
Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman - Abusing Adobe Reader’s JavaScript APIs
Oct 16, 2015
Gregory Picket - Staying Persistent in Software Defined Networks
Oct 16, 2015
Eric Van Albert & Zach Banks - Looping Surveillance Cameras through Live Editing of Network Streams
Oct 16, 2015
Colby Moore - Spread Spectrum Satcom Hacking - Attacking The GlobalStar Simplex Data Service
Oct 16, 2015
Dan “AltF4” Petro & Oscar Salaza - Hacking Smart Safes: On the "Brink" of a Robbery
Oct 16, 2015
Mickey Shkatov & Jesse Michael - Scared Poopless – LTE and your laptop
Oct 16, 2015
Dr. Phil Polstra - One Device to Pwn Them All
Oct 16, 2015
Craig Young - How to Train Your RFID Hacking Tools
Oct 16, 2015
Atlas - Fun with Symboliks
Oct 16, 2015
Yuwei Zheng & Haoqi Shan - Build a free cellular traffic capture tool with a vxworks based femoto
Oct 16, 2015
Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - 101 Track
Oct 16, 2015
Paul Amicelli & David Baptiste - How to secure the keyboard chain
Oct 16, 2015
Peter Desfigies, Joshua Brierton, Naveed Ul Islam - Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - 101 Track
Oct 16, 2015
Saif El-Sherei & Etienne Stalmans - Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers - 101 Track
Oct 16, 2015
Sarah Edwards - Ubiquity Forensics - Your iCloud and You - 101 Track
Oct 16, 2015
Tony Trummer & Tushar Dalvi - QARK: Android App Exploit and SCA Tool - 101 Track
Oct 16, 2015
Zack Allen & Rusty Bower - Malware in the Gaming Micro-economy
Oct 16, 2015
Yaniv Balmas & Lior Oppenheim - Key-Logger, Audio, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster
Oct 16, 2015
Vivek Ramachandran - Chellam – A Wi-Fi IDS Firewall for Windows
Oct 15, 2015
Tamas Szakaly - Shall We Play a Game?
Oct 15, 2015
Mahdi Namazifar - Detecting Randomly Generated Strings; A Language Based Approach
Oct 15, 2015
Bruce Schneier - Questions and Answers
Oct 15, 2015
Panel - DEF CON 101 The Panel
Oct 15, 2015
Ronny Bull & Jeanna Matthews - Exploring Layer 2 Network Security in Virtualized Environments
Oct 09, 2015
Collin Cassidy, Robert Lee, Eireann Leverett - Switches Get Stitches
Oct 09, 2015
Eric (XlogicX) Davisson - REvisiting RE:DoS
Oct 09, 2015
Alessandro Di Federico & Yan Shoshitaishvili - Dark side of the ELF - leveraging dynamic loading to pwn noobs
Oct 09, 2015
Chris Domas - REpsych: Psychological Warfare in Reverse Engineering
Oct 09, 2015
Nadeem Douba - BurpKit - Using WebKit to Own the Web
Oct 09, 2015
Joshua J. Drake - Stagefright: Scary Code in the Heart of Android
Oct 09, 2015
Joe FitzPatrick & Matt King - NSA Playset: JTAG Implants
Oct 09, 2015
Matteo Becarro & Matteo Collura - Extracting the Painful (blue)tooth
Sep 22, 2015
Fernando Arnaboldi - Abusing XSLT for Practical Attacks - 101 Track
Sep 22, 2015
Amit Ashbel & Maty Siman - Game of Hacks: Play, Hack & Track - 101 Track
Sep 22, 2015
Brent White - Hacking Web Apps - 101 Track
Sep 22, 2015
Mark Ryan Talabis - The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic - 101 Track
Sep 22, 2015
Chris Sistrunk - NSM 101 for ICS - 101 Track
Sep 22, 2015
Mike Sconzo - I Am Packer And So Can You - 101 Track
Sep 22, 2015
Michael Schrenk - Applied Intelligence: Using Information That's Not There - 101 Track
Sep 22, 2015
Bruce Potter - A Hacker’s Guide to Risk - 101 Track
Sep 22, 2015
John Menerick - Backdooring Git - 101 Track
Sep 22, 2015
Dennis Maldonado - Are We Really Safe? - Bypassing Access Control Systems - 101 Track
Sep 22, 2015
LI Jun & YANG Qing - I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices - 101 Track
Sep 22, 2015
Gerard Laygui - Forensic Artifacts From a Pass the Hash Attack - 101 Track
Sep 22, 2015
Ian Kline - LTE Recon and Tracking with RTLSDR - 101 Track
Sep 22, 2015
Eijah - Crypto for Hackers - 101 Track
Sep 22, 2015
David Huerta - Alice and Bob are Really Confused - 101 Track
Sep 22, 2015
Jason Haddix - How to Shot Web: Web and mobile hacking in 2015 - 101 Track
Sep 22, 2015
Justin Engler - Secure Messaging for Normal People - 101 Track
Sep 22, 2015
Grant Bugher - It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence - 101 Track
Sep 22, 2015