DEF CON 32 Main Stage Talks
92 videos • 22,921 views • by DEFCONConference
1
DEF CON 32 - Breaking Secure Web Gateways for Fun and Profit -Vivek Ramachandran, Jeswin Mathai
DEFCONConference
Download
2
DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle
DEFCONConference
Download
3
DEF CON 32 - Abusing Windows Hello Without a Severed Hand - Ceri Coburn, Dirk jan Mollema
DEFCONConference
Download
4
DEF CON 32 - AMDSinkclose - Universal Ring2 Privilege Escalation - Enrique Nissim, Krzysztof Okupski
DEFCONConference
Download
5
DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Tom Cross, Greg Conti
DEFCONConference
Download
6
DEF CON 32 - DEF CON Closing Ceremonies & Awards
DEFCONConference
Download
7
DEF CON 32 - On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) - Harriet Farlow
DEFCONConference
Download
8
DEF CON 32 - Where’s the Money-Defeating ATM Disk Encryption - Matt Burch
DEFCONConference
Download
9
DEF CON 32 - Welcome to DEF CON 32 - The Dark Tangent
DEFCONConference
Download
10
DEF CON 32 - The edges of Surveilance System and its supply chain - Chanin Kim, Myounghun Pak
DEFCONConference
Download
11
DEF CON 32 - OH MY DC Abusing OIDC all the way to your cloud - Aviad Hahami
DEFCONConference
Download
12
DEF CON 32 - MaLDAPtive: Obfuscation and De-Obfuscation - Daniel Bohannon, Sabajete Elezaj
DEFCONConference
Download
13
DEF CON 32 - Open Sesame: how vulnerable is your stuff in electronic lockers -Dennis Giese, braelynn
DEFCONConference
Download
14
DEF CON 32 - 1 for All, All for WHAD: wireless shenanigans made easy - Romain Cayre, Damien Cauquil
DEFCONConference
Download
15
DEF CON 32 - Your AI Assistant has a Big Mouth: A New Side Channel Attack - Yisroel Mirsky
DEFCONConference
Download
16
DEF CON 32 - Windows Downdate: Downgrade Attacks Using Windows Updates - Alon Leviev
DEFCONConference
Download
17
DEF CON 32 - QuickShell Sharing is caring abt RCE attack chain on QuickShare - Or Yair, Shmuel Cohen
DEFCONConference
Download
18
DEF CON 32 - Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back - S1nn3r
DEFCONConference
Download
19
DEF CON 32 - Securing CCTV Cameras Against Blind Spots - Jacob Shams
DEFCONConference
Download
20
DEF CON 32 - Taming the Beast: Inside Llama 3 Red Team Process - Grattafiori, Evtimov, Bitton
DEFCONConference
Download
21
DEF CON 32 - SQL Injection Isn't Dead Smuggling Queries at the Protocol Level - Paul Gerste
DEFCONConference
Download
22
DEF CON 32 - Reverse Engineering MicroPython Frozen Modules - Wesley McGrew
DEFCONConference
Download
23
DEF CON 32 - Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows - samy kamkar
DEFCONConference
Download
24
DEF CON 32 - The hack, the crash and two smoking barrels. - Thomas Sermpinis
DEFCONConference
Download
25
DEF CON 32 - Sshamble Unexpected Exposures in the Secure Shell - HD Moore, Rob King
DEFCONConference
Download
26
DEF CON 32 - Splitting the email atom exploiting parsers to bypass access controls - Gareth Heyes
DEFCONConference
Download
27
DEF CON 32 - Redefining V2G: How to use your vehicle as game controller -Timm Lauser, Jannis Hamborg
DEFCONConference
Download
28
DEF CON 32 - Spies and Bytes: Victory in the Digital Age - General Paul M Nakasone
DEFCONConference
Download
29
DEF CON 32 - Sudos and Sudon’ts: Peering inside Sudo for Windows - Michael Torres
DEFCONConference
Download
30
DEF CON 32 - Manipulating Shim and Office for Code Injection - Ron Ben-Yizhak, David Shandalov
DEFCONConference
Download
31
DEF CON 32 - Process Injection Attacks w ROP - Bramwell Brizendine, Shiva Shashank Kusuma
DEFCONConference
Download
32
DEF CON 32 - Secrets & Shadows: Leveraging Big Data for Vulnerability Discovery - Bill Demirkapi
DEFCONConference
Download
33
DEF CON 32 - Autos, alcohol, blood, sweat, & creative reversing obfuscated Car Modding tool - Atlas
DEFCONConference
Download
34
DEF CON 32 - How To Keep IoT From Becoming An IoTrash - Roberts, Wysopal, Doctorow, Wheeler, Giese
DEFCONConference
Download
35
DEF CON 32 - Threat Modeling in the Age of AI - Adam Shostack
DEFCONConference
Download
36
DEF CON 32 - Breaching AWS Through Shadow Resources - Yakir Kadkoda, Michael Katchinskiy, Ofek Itach
DEFCONConference
Download
37
DEF CON 32 - AMD Sinkclose-Universal Ring2 Privilege Escalation - Enrique Nissim, Krzysztof Okupski
DEFCONConference
Download
38
DEF CON 32 - What History’s Greatest Heist Can Teach Us About Defense In Depth - Pete Stegemeyer
DEFCONConference
Download
39
DEF CON 32 - Unlocking the Gates: Understanding Authentication Bypass Vulnerabilities - Vikas Khanna
DEFCONConference
Download
40
DEF CON 32 - Unlocking the Gates Hacking a secure Industrial Remote Access Solution - Moritz Abrell
DEFCONConference
Download
41
DEF CON 32 - Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters - Allan Cecil
DEFCONConference
Download
42
DEF CON 32 - The XZ Backdoor Story: The Undercover Op That Set the Internet on Fire - Thomas Roccia
DEFCONConference
Download
43
DEF CON 32 - The Pwnie Awards
DEFCONConference
Download
44
DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio
DEFCONConference
Download
45
DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing
DEFCONConference
Download
46
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen Sims
DEFCONConference
Download
47
DEF CON 32 - Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel - Vangelis Stykas
DEFCONConference
Download
48
DEF CON 32 - Abusing legacy railroad signaling systems - David Meléndez, Gabriela Gabs Garcia
DEFCONConference
Download
49
DEF CON 32 - A Shadow Librarian: Fighting back against encroaching capitalism - Daniel Messe
DEFCONConference
Download
50
DEF CON 32 - Secret Life of Rogue Device: Lost IT Assets on the Public Marketplace - Matthew Bryant
DEFCONConference
Download
51
Title: DEF CON 32 - DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen - Jen Easterly, Jeff Moss
DEFCONConference
Download
52
DEF CON 32 - AWS CloudQuarry: Digging for secrets in public AMIs - Eduard Agavriloae, Matei Josephs
DEFCONConference
Download
53
DEF CON 32 - Breaking the Beam:Exploiting VSAT Modems from Earth - Lenders, Willbold, Bisping
DEFCONConference
Download
54
DEF CON 32 - AIxCC Closing Ceremonies
DEFCONConference
Download
55
DEF CON 32 - Unsaflok: Hacking millions of hotel locks - Lennert Wouters, Ian Carroll
DEFCONConference
Download
56
DEF CON 32 - Atomic Honeypot-A MySQL Honeypot That Drops Shells - Alexander Rubin, Martin Rakhmanov
DEFCONConference
Download
57
DEF CON 32 - The Way To Android Root: Exploiting Smartphone GPU - Xiling Gong, Eugene Rodionov
DEFCONConference
Download
58
DEF CON 32 - Nano Enigma Uncovering the Secrets in eFuse Memories - Michal Grygarek, Martin Petr
DEFCONConference
Download
59
DEF CON 32 - Bug Hunting In VMware Device Virtualization - JiaQing Huang, Hao Zheng, Yue Liu
DEFCONConference
Download
60
DEF CON 32 - DC101 - Panel
DEFCONConference
Download
61
DEF CON 32 - Encrypted newspaper ads in the 19th century - Elonka Dunin, Klaus Schmeh
DEFCONConference
Download
62
DEF CON 32 - Clash, Burn, and Exploit Manipulate Filters to Pwn kernelCTF - HexRabbit Chen
DEFCONConference
Download
63
DEF CON 32 - Prime Cuts from Hacker History :40 Years of 31337 - Cult of the Dead Cow and Friends
DEFCONConference
Download
64
DEF CON 32 - Compromising Electronic Logger & Creating Truck2Truck Worm -Jake Jepson, Rik Chatterjee
DEFCONConference
Download
65
DEF CON 32 - DriverJack Turning NTFS and Emulated ROFs into an Infection - Alessandro Magnosi
DEFCONConference
Download
66
DEF CON 32 - If Existing Cyber Vulns Magically Disappeared, What Next - Dr Stefanie Tompkins
DEFCONConference
Download
67
DEF CON 32 - Fireside Chat - The Dark Tangent and DNSA Anne Neuberger
DEFCONConference
Download
68
DEF CON 32 - Changing Global Threat Landscape - Rob Joyce, The Dark Tangent
DEFCONConference
Download
69
DEF CON 32 - Defeating EDR Evading Malware with Memory Forensics - Case, Sellers, Richard, et al.
DEFCONConference
Download
70
DEF CON 32 - Digital Emblems-When markings are required, but you have no rattle-can - Bill Woodcock
DEFCONConference
Download
71
DEF CON 32 - Exploiting the Unexploitable Insights from the Kibana Bug Bounty - Mikhail Shcherbakov
DEFCONConference
Download
72
DEF CON 32 - Using ALPC security features to compromise RPC services - WanJunJie Zhang, Yisheng He
DEFCONConference
Download
73
DEF CON 32 - Outlook Unleashing RCE Chaos CVE 2024 30103 - Michael Gorelik, Arnold Osipov
DEFCONConference
Download
74
DEF CON 32 - Cultivating M4D SK1LLZ In the DEF CON Community - Yan Shoshitaishvili, Perri Adams
DEFCONConference
Download
75
DEF CON 32 - MobileMesh RF Network Exploitation Getting the Tea from goTenna - Erwin Karincic, Woody
DEFCONConference
Download
76
DEF CON 32 - Fireside Chat - The Dark Tangent and National Cyber Director Harry Coker, Jr
DEFCONConference
Download
77
DEF CON 32 - Hi-Intensity Deconstruction: Chronicles of a Cryptographic Heist - Javadi, Levy, Draffe
DEFCONConference
Download
78
DEF CON 32 - Iconv, set the charset to RCE exploiting glibc to hack the PHP engine - Charles Fox
DEFCONConference
Download
79
DEF CON 32 - Leveraging private APNs for mobile network traffic analysis - Aapo Oksman
DEFCONConference
Download
80
DEF CON 32 - HookChain A new perspective for Bypassing EDR Solutions - Helvio Carvalho Junior
DEFCONConference
Download
81
DEF CON 32 - Feet Feud
DEFCONConference
Download
82
DEF CON 32 - Gotta Cache ‘em all bending the rules of web cache exploitation - Martin Doyhenard
DEFCONConference
Download
83
DEF CON 32 - Mutual authentication is optional - Xavier Zhang
DEFCONConference
Download
84
DEF CON 32 - Exploiting Cloud Provider Vulnerabilities for Initial Access - Nick Frichette
DEFCONConference
Download
85
DEF CON 32 - Measuring the Tor Network - Silvia Puglisi, Roger Dingledine
DEFCONConference
Download
86
DEF CON 32 - Laundering Money - Michael Orlitzky
DEFCONConference
Download
87
DEF CON 32 - Finding & exploiting local attacks on 1Password Mac desktop app - J. Hoffman, C. Morgan
DEFCONConference
Download
88
DEF CON 32 - Grand Theft Actions Abusing Self Hosted GitHub Runners - Adnan Khan, John Stawinski
DEFCONConference
Download
89
DEF CON 32 - NTLM The Last Ride - Jim Rush, Tomais Williamson
DEFCONConference
Download
90
DEF CON 32 - Hacker Jeopardy - Night 2
DEFCONConference
Download
91
DEF CON 32 - Disenshittify or die! How hackers can seize the means of computation - Cory Doctorow
DEFCONConference
Download
92
[Private video]
Download