Author thumbnail

killab66661

Defcon 18

8,869 views
147 items
Last updated on Mar 2, 2014
public playlist
Defcon 18 - Mobile Privacy  - Marco Bonetti - Part.mov
23:47
Defcon 18 - Meet the EFF - Kevin Bankston Eva Galperin Jennifer Granick - part.mov
50:43
Defcon 18 - Mastering the Nmap Scripting Engine - Fyodor - David Fifield - part.mov
42:01
Defcon 18 - masSEXploitation- Michael Brooks - Part.mov
37:33
Defcon 18 - Malware migration to gaming consoles-ahn ki chan ha dong joo - Part.mov
45:50
Defcon 18 - Malware Freak Show 2- Nicholas J Percoco Jibran Llyas - Part.mov
45:32
Defcon 18 - Live Fire exercise - Kenneth Geers - Part .mov
41:29
Defcon 18 - Like a Boss Attacking JBoss - Part.mov
19:25
Defcon 18 - Letting the air out of the tire pressure monitoring Systems - Part.mov
20:21
Defcon 18 - Legal Developments in hardware Hacking - Jennifer Granick Matt zimmerman - Part .mov
45:26
Defcon 18   Kim Jong il and me how to build a cyber army to defeat the U S   Charlie Miller   Part
46:01
Defcon 18 - Kantana Multiboot Security Suite - JP Dunning - Part.mov
36:17
Defcon 18 - Jackpotting Automated Teller machines Redux- Barnaby Jack - Part.mov
39:56
Defcon 18   Insecurity Engineerign of physical security systems   Marc Weber Tobias Tobais Bluzmanis Matt Fiddler   part
45:02
Defcon 18 - Industrial Cyber Security-  Wade Polk Paul Malkewicz J Novak- Part.mov
49:23
Defcon 18 - Implementing IPv6 at ARIN - Matt Ryanczak - Part .mov
45:30
Defcon 18 - How to hack millions of routers- Craig Heffner - Part.mov
35:17
Defcon 18 - How I met your girlfriend - Samy Kamkar - Part .mov
37:51
Defcon 18 - Hardware Hacking for software guys - Dave King  - Part .mov
46:30
Defcon 18 - Hacking with hardware - Monta Elkins - Part.mov
34:05
Defcon 18   Hacking Facebook Privacy   Part
29:54
Defcon 18   Hacking DOCSIS for fun and profit  Blake Self bitemytaco   Part
45:40
Defcon 18   Hacking and protecting Oracle database Vault   Esteban Martinez Fayo   Part
54:48
Defcon 18   Hacking  Net applications   Jon McCoy  Part
40:59
Defcon 18   Getting social with the smart grid    Justin Morehouse Tony Flick   Part
42:04
Defcon 18   Getting Root   Richard Thieme   Part
53:01
Defcon 18   From no way to zeroday  Joshua Wise   Part
52:13
Defcon 18   FOCA2 The FOCA strikes Back   Chema Alonso Jose Palazon aka palako   Part
38:19
Defcon 18   Facial Recognition   Josua Marpet   Part
45:21
Defcon 18   Extream range RFID Tracking   Chris Paget    Part
46:37
Defcon 18   Evilgrade You still have pending upgrades   Part
22:41
Defcon 18   Electroinic Weaponry or how to rule the world while shpping at radio shack  Mage2   Part
20:43
Defcon 18   Drivesploit 0 Wayne hung  Part
49:35
Defcon 18   Defcon security Jam III Now in 3 d  Panel   Part
1:42:53
Defcon 18   Decoding reCAPTCHA   chad houck Jason Lee   Part
34:24
Defcon 18   Deceiving the heavens to cross the sea   Jayson E Street   Part
47:29
Defcon 18   Cyber terrorism and the security of the national drinking water infrastructure   John McNabb   Part
49:18
Defcon 18   Constricting the web  Nathan Hamiel Marcin wielgszewski    Part
45:54
Defcon 18   ChaosVPN for Playing CTFs   mc fly ryd vyrus no Maam  Part
42:36
Defcon 18   Changing threats to privacy   Moxie Marlinspike   Part
42:50
Defcon 18   Bypassing Smart Card Vulnerabilities in Atmel   Johnathan Lee Neil Pahl   Part
29:49
Defcon 18   Build your own security operations center for little or no money  Josh Pyorre Chris McKenny   Part
43:45
Defcon 18   Browser based Defenses   James Shewmaker   Part
50:28
Defcon 18   Breaking Bluetooth by being bored   JP Dunning    Part
36:53
Defcon 18   Blitzableiter the release  Feliz FX Lindner   Part
52:42
Defcon 18   Black ops of fundamental defense web edition   Dan Kamisky   Part
57:51
Defcon 18   Big Brother on the Big Screen   Nicolde Ozer Kevin Bankston   Part
52:44
Defcon 18   Be a Mentor   Marisa Fagan   Part
19:21
Defcon 18   Bad Memories   Part
41:30
Defcon 18   Attack the Key   Schuyler Towne datagram   Part
49:56
Defcon 18   App Attack    Kevin Mahaffey John Hering   Part
40:01
Defcon 18   Antique Exploitation   Jon Oberheide   Part
17:20
Defcon 18   AnObservatory for the SSLiverse   Part
49:34
Defcon 18   an examination of the adeqacy of the laws related to cyber warfare    Dondi West   Part
35:27
Defcon 18   Advanced format string attacks   Paul Haas   Part
31:16
Defcon 18   A New approach to forensic methodology   David C smith Samuel Petreski    Part
46:15
Defcon 18   2010   SMART Project   Blake Self Wayne Zage Dolores Zage   Part
21:24
Defcon 18   2010   SHODAN for Penetration Testers  Michael Schearer   Part
42:39
Defcon 18   2010   Securing MMOs A Security Professionals View From the Inside   metr0   Part
46:09
Defcon 18   2010   Search and Seizure and golfballs   Jim Rennie Eric Rachner   Part
45:33
Defcon 18   2010   Open Letter Call to action   Panel   Part
47:21
Defcon 18   2010   Of Bytes and Bullets   Panel   Part
53:49
Defcon 18   2010   Kartograph Finding a needle in a haystack or how to apply reverse engineering techniques to cheat at video games   Elie Bursztin Jocelyn Lagarenne   Part
43:08
Defcon 18   2010   Gaming in the Glass Safe   Games DRM and Privacy   Ferdinand Schober   Part
50:55
Defcon 18   2010   Function Hooking for Mac OSX and Linux   Joe Damato   Part
33:36
Defcon 18   2010   ExploitSpotting Locating Vulnerabilities out of vendor patches automatically   Jeongwook Oh   Part
50:33
Defcon 18   2010   Exploiting WebSphere Application Servers JSP Engine   Ed Schaller   Part
34:50
Defcon 18   2010   Exploiting Internet Surveillance Systems   Decius   Part
42:33
Defcon 18   2010   Exploitation on ARM Technique and Bypassing Defense Mechanisms   Itzhak zuk Avraham   Part
32:25
Defcon 18   2010   Balancing the Pwn Trade Deficit   Val Smith Colin Ames Anthony Lai   Part
40:09
Defcon 18   2010   0box Analyzer   Wayne Huang Jeremy Chiu Benson Wu   Part
34:46
Defcon 18   Passive DNS Hardening
50:49
Defcon 18   007 44
39:20
Defcon 18    VirGraff101   Part
38:47
Defcon 18    DCFluX in Moon bouncer   Part
48:42
Defcon 18 -The night the lights whent out in vegas - Barrett Weisshaar Garret Picchioni - Part.mov
49:21
Defcon 18  So many ways to slap a Yo Ho Xploiting yoville and facebook for fun and profit   Tom stracener sean barnum chrish peterson  Part
42:08
Defcon 18 -PCI Compromising controls and compromising security  - Jack Daniel Panel - Part .mov
56:39
Defcon 18 -My life as a spyware developer - Garry Pejski - Part.mov
40:01
Defcon 18 -IPv6 No Longer Optional  - John Curran - Part .mov
49:13
Defcon 18 -HD Voice - Dough Mohney - Part.mov
48:14
Defcon 18 -Exploiting SCADA Systems - Jeremy Brown - Part .mov
27:36
Defcon 18 -Cyber crime and warfare charting dangerous waters - ifach lan amit - Part.mov
51:38
Defcon 18 - Your boss is a duchebag...how about you - Luiz efffn Eduardo - part.mov
22:45
Defcon 18 - You spent all that money and you still got owned - Joseph McCray - Part .mov
34:36
Defcon 18 - WPA Too - Md Sohail Ahmad - Part.mov
43:00
Defcon 18 - WiMax Hacking 2010  - Pierce Goldy a Smig Sanitybit - Part .mov
45:11
Defcon 18 - Weponizing Lady GaGa Psycosonic Attacks - Brad Smith - Part .mov
44:41
Defcon 18 - Welcome and making the DEFCON 18 Badge-  Dark Tangent Joe Grand- Part .mov
1:09:34
Defcon 18 - Web Services we just dont need- Mike Bailey - Part .mov
51:11
Defcon 18 - We dont need no stinkin badges - shawn merdinger - Part.mov
38:37
Defcon 18 - Wardriving the smart grid - Shawn Moyer Nathan Kelter - part.mov
50:42
Defcon 18 - Trolling reverse_engineers with math - frank^2 - part.mov
31:56
Defcon 18   Training the Next Generation of Harware Hackers   Andrew Kongs   Dr Gerald Kane   part
17:26
Defcon 18   Toolsmithing an IDA bridge case study for building a reverse engineering tool   adam pridgen Mat Wollenweber   Part
36:25
Defcon 2012 - DNS Systemic Vulnerabilities and Risk Management A Discussion - Panel - Part.mov
50:15
Defcon 2010 - Your ISP and the Government Best Friends Forever - Christopher Soghoian.mov
43:06
Defcon 2010 - Who cares about IPv6 - Sam Bowne - Part.mov
26:57
Defcon 2010 - Web application fingerprint with static files - Patric Tomas - Part.mov
21:39
Defcon 2010 - Token kidnapping's Revenge - Cesar Cerrudo - Part.mov
55:17