Channel Avatar

DEFCONConference @UC6Om9kAkl32dWlDSNlDS9Iw@youtube.com

None subscribers - no pronouns set

This is the official DEF CON YouTube channel. What is DEF CO


36:39
DEF CON 31 DCGVR Village - Jayson Street - Keynote
39:51
DEF CON 31 DCGVR Village - Abhijeet Singh - Taking Down Applications With Logic
45:00
DEF CON 31 DCGVR Village - JBO - The Curse Of The Ncurses
44:02
DEF CON 31 DCGVR Village - Joe Mast - Bootsquad
39:12
DEF CON 31 DCGVR Village - datalocaltmp - VR Workspaces
26:01
DEF CON 31 DCGVR Village - Squiddy - Gender Inclusive Health Information System
01:13:54
DEF CON 31 DCGVR Village - Sam Colaizzi - Hey Crypto Bro
29:04
DEF CON 31 DCGVR Village - hoodiepony - Ghost On The Wire
44:11
DEF CON 31 DCGVR Village - Allen Baranov -What Is A GRC Hacker
17:57
DEF CON 31 - There Are No Mushroom Clouds in Cyberwar - Mieke Eoyang
39:49
DEF CON 31 - Ringhopper - How We Almost Zero day’d the World - Benny Zeltser, Jonathan Lusky
37:04
DEF CON 31 Car Hacking Village - Abusing CAN Bus Spec for DoS in Embedded Systems - Martin Petran
40:22
DEF CON 31 - The GitHub Actions Worm - Asi Greenholts
40:07
DEF CON 31 - Defeating VPN Always On - Maxime Clementz
35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas
39:44
DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez
45:40
DEF CON 31 - Breaking BMC The Forgotten Key to the Kingdom - Alex Tereshkin, Adam Zabrocki
47:34
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater
37:33
DEF CON 31 Car Hacking Village - Automotive USB Fuzzing - Euntae Jang, Donghyon Jeong, Jonghyuk Song
37:23
DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r
33:49
DEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer Attias
44:37
DEF CON 31 - Contextualizing The Vulkan Leaks & State Sponsored Offensive Ops - Joe Slowik
37:17
DEF CON 31 - Staying Undetected Using the Windows Container Isolation Framework - Daniel Avinoam
19:54
DEF CON 31 - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks - Ceri Coburn
01:53:33
DEF CON 31 - Closing Ceremonies & Awards - The Dark Tangent, DEF CON Senior Staff
32:02
DEF CON 31 XR Village - Push All the Buttons Digital Twinning w Idaho National Labs - Kolton Heaps
42:47
DEF CON 31 - Badge of Shame Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas
01:03:03
DEF CON 31 - DC101 Welcome to DEF CON - Panel
45:57
DEF CON 31 - Advanced ROP Framework Pushing ROP to Its Limits - Brizendine, Kusuma
50:09
DEF CON 31 - certmitm Automatic Exploitation of TLS Certificate Validation Vulns - Aapo Oksman
37:23
DEF CON 31 - Calling it a 0 Day - Hacking at PBX UC Systems - good pseudonym
38:48
DEF CON 31 - All information looks like noise until you break the code - Pekoske, Lyngaas, Easterly
45:25
DEF CON 31 - Defending KA-SAT - Mark Colaluca and Nick Saunders
45:43
DEF CON 31 - An Audacious Plan to Halt the Internet's Enshittification - Cory Doctorow
44:24
DEF CON 31 - Exploring Linux Memory Manipulation for Stealth and Evasion - Polop, Gutierrez
43:39
DEF CON 31 - A Pain in the NAS Exploiting Cloud Connectivity to PWN your NAS - Moshe, Brizinov
18:03
DEF CON 31 - Assessing Security of Certificates at Scale - David McGrew, Brandon Enright, Andrew Chi
39:21
DEF CON 31 - Exploiting OPC UA - Practical Attacks Against OPC UA Architectures - Moshe, Brizinov
19:00
DEF CON 31 - Welcome to DEF CON 31 - The Dark Tangent
36:42
DEF CON 31 - Backdoor in the Core - Altering Intel x86 Instruction Set at Runtime - Krog, Skovsende
27:56
DEF CON 31 XR VIllage - Augmented Reality and Implications on Mobile Security - Whitney Phillips
18:54
DEF CON 31 - Making The DEF CON 31 Badge Mar Williams
19:55
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła
41:11
DEF CON 31 - Review on the Less Traveled Road - 9 Yrs of Overlooked MikroTik PreAuth RCE - NiNi Chen
34:35
DEF CON 31 - Apples Predicament - NSPredicate Exploitation on macOS and iOS - Austin Emmitt
44:24
DEF CON 31 - Secretary of the Department of Homeland Security - Alejandro Mayorkas
44:51
DEF CON 31 - Using SIM Tunneling to Travel at Light Speed - Adrian Dabrowski, Gabriel Gegenhuber
29:50
DEF CON 31 - Civil Cyber Defense - Tiffany Rad and Austin Shamlin
39:04
DEF CON 31 - Defender Pretender When Windows Defender Updates Become a Security Risk -Bar, Attias
45:36
DEF CON 31 Packet Hacking Village - Death by 1000 Likes - Will Kay
40:14
DEF CON 31 - Azure B2C 0Day - An Exploit Chain from Public Keys to Microsoft Bug Bounty - John Novak
54:15
DEF CON 31 - Contest Closing Ceremonies & Awards - Contest Goons
34:45
DEF CON 31 - A SSLippery Slope - Unraveling Hidden Dangers of Certificate Misuse - Bill Demirkapi
18:11
DEF CON 31 - Clocks Have Ears - Timing/ Browser Based Local Network Port Scanner - Dongsung Kim
35:41
DEF CON 31 - #NoFilter Abusing Windows Filtering Platform for privilege escalation - Ron Ben Yizhak
43:11
DEF CON 31 - Fantastic Ethertypes and Where to Find Them - Ricky Lawshae
48:11
DEF CON 31 - Attacking And Securing the Pixel Modem - Karimi, Xing , Gong, Rodionov
41:42
DEF CON 31 Policy - Beyond the Breach Cyber Policy + Hacker Perspectives - Panel
45:24
DEF CON 31 - Route to bugs - Analyzing the Security of BGP Message Parsing - dos Santos, Guiot
45:56
DEF CON 31 - Internet Censorship What Governments Have in Store for You -Panel