Defcon 19
116 videos • 188 views • by Mad Science Gaming
1
DEF CON 19 Hacking Conference Presentation By Ming Chow Abusing HTML5 Slides
Christiaan008
Download
2
DEFCON 19: "Get Off of My Cloud": Cloud Credential Compromise and Exposure
Christiaan008
Download
3
DEFCON 19: A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux
Christiaan008
Download
4
DEFCON 19: Amazingly True Stories of Real Penetration Tests
Christiaan008
Download
5
DEFCON 19: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Christiaan008
Download
6
DEFCON 19: An Insider's Look at International Cyber Security Threats and Trends
Christiaan008
Download
7
DEFCON 19: And That's How I Lost My Eye: Exploring Emergency Data Destruction
Christiaan008
Download
8
DEFCON 19: Anonymous Cyber War
Christiaan008
Download
9
DEFCON 19: Archive Team: A Distributed Preservation of Service Attack
Christiaan008
Download
10
DEFCON 19: Are You In Yet? The CISO's View of Pentesting
Christiaan008
Download
11
DEFCON 19: Ask EFF: The Year in Digital Civil Liberties
Christiaan008
Download
12
DEFCON 19: Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
Christiaan008
Download
13
DEFCON 19: Attacking and Defending the Smart Grid
Christiaan008
Download
14
DEFCON 19: Balancing The Pwn Trade Deficit -- APT Secrets in Asia
Christiaan008
Download
15
DEFCON 19: Battery Firmware Hacking
Christiaan008
Download
16
DEFCON 19: Beat to 1337: Creating A Successful University Cyber Defense Organization
Christiaan008
Download
17
DEFCON 19: Bit-squatting: DNS Hijacking Without Exploitation
Christiaan008
Download
18
DEFCON 19: Black Ops of TCP/IP 2011
Christiaan008
Download
19
DEFCON 19: Blinkie Lights: Network Monitoring with Arduino
Christiaan008
Download
20
DEFCON 19: Bosses love Excel, Hackers too.
Christiaan008
Download
21
DEFCON 19: Build your own Synthetic Aperture Radar
Christiaan008
Download
22
DEFCON 19: Building The DEF CON Network, Making A Sandbox For 10,000 Hackers
Christiaan008
Download
23
DEFCON 19: Cellular Privacy: A Forensic Analysis of Android Network Traffic
Christiaan008
Download
24
DEFCON 19: Chip & PIN is Definitely Broken
Christiaan008
Download
25
DEFCON 19: Cipherspaces/Darknets: An Overview Of Attack Strategies
Christiaan008
Download
26
DEFCON 19: Covert Post-Exploitation Forensics With Metasploit
Christiaan008
Download
27
DEFCON 19: DCFluX in: License to Transmit
Christiaan008
Download
28
DEFCON 19: DEF CON Awards
Christiaan008
Download
29
DEFCON 19: DEF CON Comedy Jam IV: A New Hope For The Fail Whale
Christiaan008
Download
30
DEFCON 19: DIY Non-Destructive Entry
Christiaan008
Download
31
DEFCON 19: Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Christiaan008
Download
32
DEFCON 19: Dust: Your Feed RSS Belongs To You! Avoid Censorship!
Christiaan008
Download
33
DEFCON 19: Economics of Password Cracking in the GPU Era
Christiaan008
Download
34
DEFCON 19: Familiarity Breeds Contempt
Christiaan008
Download
35
DEFCON 19: Federation and Empire
Christiaan008
Download
36
DEFCON 19: Fingerbank — Open DHCP Fingerprints Database
Christiaan008
Download
37
DEFCON 19: Former Keynotes - The Future
Christiaan008
Download
38
DEFCON 19: From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
Christiaan008
Download
39
DEFCON 19: Getting SSLizzard
Christiaan008
Download
40
DEFCON 19: Hacking .Net Applications: The Black Arts
Christiaan008
Download
41
DEFCON 19: Hacking and Forensicating an Oracle Database Server
Christiaan008
Download
42
DEFCON 19: Hacking and Securing DB2 LUW Databases
Christiaan008
Download
43
DEFCON 19: Hacking Google Chrome OS
Christiaan008
Download
44
DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit
Christiaan008
Download
45
DEFCON 19: Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
Christiaan008
Download
46
DEFCON 19: Hacking Your Victims Over Power Lines
Christiaan008
Download
47
DEFCON 19: Handicapping the US Supreme Court: Can We Get Rich by Forceful Browsing?
Christiaan008
Download
48
DEFCON 19: How Misdirection Can Be Used To Steal Information Without Being Detected
Christiaan008
Download
49
DEFCON 19: How To Get Your Message Out When Your Government Turns Off The Internet
Christiaan008
Download
50
DEFCON 19: I Am Not a Doctor but I Play One on Your Network
Christiaan008
Download
51
DEFCON 19: I'm Your MAC(b)Daddy
Christiaan008
Download
52
DEFCON 19: Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs
Christiaan008
Download
53
DEFCON 19: Introduction to Tamper Evident Devices
Christiaan008
Download
54
DEFCON 19: IP4 TRUTH: The IPocalypse is a LIE
Christiaan008
Download
55
DEFCON 19: Jugaad -- Linux Thread Injection Kit
Christiaan008
Download
56
DEFCON 19: Kernel Exploitation Via Uninitialized Stack
Christiaan008
Download
57
DEFCON 19: Key Impressioning
Christiaan008
Download
58
DEFCON 19: Kinectasploit: Metasploit Meets Kinect
Christiaan008
Download
59
DEFCON 19: Look At What My Car Can Do
Christiaan008
Download
60
DEFCON 19: Malware Freak Show 3: They're pwning er'body out there!
Christiaan008
Download
61
DEFCON 19: Metasploit vSploit Modules
Christiaan008
Download
62
DEFCON 19: Mobile App Moolah: Profit taking with Mobile Malware
Christiaan008
Download
63
DEFCON 19: Net Neutrality Panel
Christiaan008
Download
64
DEFCON 19: Network Application Firewalls: Exploits and Defense
Christiaan008
Download
65
DEFCON 19: Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit
Christiaan008
Download
66
DEFCON 19: Operational Use of Offensive Cyber
Christiaan008
Download
67
DEFCON 19: Owned Over Amateur Radio: Remote Kernel Exploitation in 2011
Christiaan008
Download
68
DEFCON 19: PacketFence, The Open Source Nac: What We've Done In The Last Two Years
Christiaan008
Download
69
DEFCON 19: Panel: Is it 0-day or 0-care?
Christiaan008
Download
70
DEFCON 19: Panel: Meet The Federal Agent 2.0
Christiaan008
Download
71
DEFCON 19: Panel: Network Security Podcast
Christiaan008
Download
72
DEFCON 19: PCI 2.0: Still Compromising Controls and Compromising Security
Christiaan008
Download
73
DEFCON 19: Pervasive Cloaking
Christiaan008
Download
74
DEFCON 19: Phishing and Online Scam in China
Christiaan008
Download
75
DEFCON 19: Physical Memory Forensics for Cache
Christiaan008
Download
76
DEFCON 19: PIG: Finding Truffles Without Leaving A Trace
Christiaan008
Download
77
DEFCON 19: Port Scanning Without Sending Packets
Christiaan008
Download
78
DEFCON 19: Represent! Defcon Groups, Hackerspaces, and You.
Christiaan008
Download
79
DEFCON 19: Runtime Process Insemination
Christiaan008
Download
80
DEFCON 19: Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
Christiaan008
Download
81
DEFCON 19: Security When Nano Seconds Count
Christiaan008
Download
82
DEFCON 19: Seven Ways to Hang Yourself with Google Android
Christiaan008
Download
83
[Deleted video]
Download
84
DEFCON 19: Sneaky PDF
Christiaan008
Download
85
DEFCON 19: Sounds Like Botnet
Christiaan008
Download
86
DEFCON 19: Speaking with Cryptographic Oracles
Christiaan008
Download
87
DEFCON 19: SSL And The Future Of Authenticity
Christiaan008
Download
88
DEFCON 19: Staying Connected during a Revolution or Disaster
Christiaan008
Download
89
DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin!
Christiaan008
Download
90
DEFCON 19: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
Christiaan008
Download
91
DEFCON 19: Steganography and Cryptography 101
Christiaan008
Download
92
DEFCON 19: The Art and Science of Security Research
Christiaan008
Download
93
DEFCON 19: The Art of Trolling
Christiaan008
Download
94
DEFCON 19: The Dark Side of Crime-fighting, Security, and Professional Intelligence
Christiaan008
Download
95
DEFCON 19: The Future of Cybertravel: Legal Implications of the Evasion of Geolocation
Christiaan008
Download
96
DEFCON 19: The History and the Evolution of Computer Viruses
Christiaan008
Download
97
DEFCON 19: This is REALLY not the droid you're looking for.
Christiaan008
Download
98
DEFCON 19: Three Generations of DoS Attacks (with Audience Participation, as Victims)
Christiaan008
Download
99
DEFCON 19: Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud
Christiaan008
Download
100
DEFCON 19: Traps of Gold
Christiaan008
Download
101
DEFCON 19: UPnP Mapping
Christiaan008
Download
101
DEFCON 19: UPnP Mapping
Christiaan008
Download
102
DEFCON 19: Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely
Christiaan008
Download
103
DEFCON 19: VDLDS — All Your Voice Are Belong To Us
Christiaan008
Download
104
DEFCON 19: Virtualization under attack: Breaking out of KVM
Christiaan008
Download
105
DEFCON 19: VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP
Christiaan008
Download
106
DEFCON 19: Vulnerabilities of Wireless Water Meter Networks
Christiaan008
Download
107
DEFCON 19: We Owe it All to the Hackers
Christiaan008
Download
108
DEFCON 19: We're (The Government) Here To Help: A Look At How FIPS 140 Helps (And Hurts) Security
Christiaan008
Download
109
DEFCON 19: Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge
Christiaan008
Download
110
DEFCON 19: Web Application Analysis With Owasp Hatkit
Christiaan008
Download
111
DEFCON 19: What Time Are You Anyway?
Christiaan008
Download
112
DEFCON 19: When Space Elephants Attack: A DEFCON Challenge for Database Geeks
Christiaan008
Download
113
DEFCON 19: Whitfield Diffie and Moxie Marlinspike
Christiaan008
Download
114
DEFCON 19: Wireless Aerial Surveillance Platform
Christiaan008
Download
115
DEFCON 19: WTF Happened to the Constitution?! The Right to Privacy in the Digital Age
Christiaan008
Download
116
DEFCON19: Pillaging DVCS Repos For Fun And Profit
Christiaan008
Download