Channel Avatar

HackersOnBoard @UChGDEluRG9r5kCecRAQTx_Q@youtube.com

72K subscribers - no pronouns :c

Hi there, This collection deserves the research and trainin


43:04
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces
01:53:08
DEF CON 27 - The Dark Tangent - Closing Ceremonies
44:50
DEF CON 27 - More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes
40:48
DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend
42:56
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks
37:43
DEF CON 27 - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers
32:26
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air
48:51
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction
38:57
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space
34:15
DEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors
38:37
DEF CON 27 - Wenxiang Qian - Breaking Google Home: Exploit It with SQLite(Magellan)
41:52
DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter
49:24
DEF CON 27 - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware
40:00
DEF CON 27 - WillC - Phreaking Elevators
18:28
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot
46:07
DEF CON 27 - Intro to Embedded Hacking-How you can find a decade old bug in widely deployed devices
57:17
DEF CON 27 - All the things you wanted to know about the DEF CON NOC and we won't tell you about
47:22
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked
45:34
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing
42:13
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits
46:11
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government
38:35
DEF CON 27 - Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster
36:29
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance
19:55
DEF CON 27 - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud
36:56
DEF CON 27 - No Mas How One Side-Channel Flaw Opens Atm Pharmacies & Government Secrets Up to Attack
45:58
DEF CON 27 - Infiltrating Corporate Intranet Like NSA _Pre-auth RCE on Leading SSL VPNs
40:56
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite
38:25
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now
42:48
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest
41:32
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door
52:34
DEF CON 27 - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks
48:09
DEF CON 27 - Alexandre Borges - NET Malware Threats Internals And Reversing
32:48
DEF CON 27 - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware
37:29
DEF CON 27 - Alvaro Munoz - SSO Wars The Token Menace
44:54
DEF CON 27 - Daniel Romero - Why You Should Fear Your mundane Office Equipment
22:22
DEF CON 27 - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery
28:37
DEF CON 27 - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery
48:42
DEF CON 27 - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography
17:47
DEF CON 27 - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes
22:08
DEF CON 27 - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws
36:51
DEF CON 27 - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811
46:19
DEF CON 27 - Bill Graydon - Duplicating Restricted Mechanical Keys
17:35
DEF CON 27 - Alon Weinberg - Please Inject Me a x64 Code Injection
47:57
DEF CON 27 - Itzik Kotler - Process Injection Techniques Gotta Catch Them All
39:03
DEF CON 27 - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks
49:05
DEF CON 27 - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers
42:05
DEF CON 27 - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment
43:41
DEF CON 27 - finalphoenix - Rise of the Hypebots Scripting Streetwear
01:00:52
DEF CON 27 - Contests and Events - Contests Awards Ceremony
44:18
DEF CON 27 - Anish Athalye - Want Strong Isolation Just Reset Your Processor
40:06
DEF CON 27 - Douglas McKee - HVACking Understand the Delta Between Security and Reality
37:15
DEF CON 27 - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming
23:57
DEF CON 27 - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined
47:26
DEF CON 27 - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs
41:18
DEF CON 27 - Bill Swearingen - HAKC THE POLICE
47:42
DEF CON 27 - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum
42:13
DEF CON 27 - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec
43:17
DEF CON 27 - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera
28:40
DEF CON 27 - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump
40:21
DEF CON 27 - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis