DEF CON 32 Creator Stage Talks
108 videos • 4,278 views • by DEFCONConference
1
DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman
DEFCONConference
Download
2
DEF CON 32 - What To Expect When You’re Exploiting: 0Days Baby Monitors & Wi-Fi Cams - Mager, Forte
DEFCONConference
Download
3
DEF CON 32 - Using AI Computer Vision in Your OSINT Data Analysis - Mike Raggo
DEFCONConference
Download
4
DEF CON 32 - Offensive Security Testing Safeguarding the Final Frontier - Andrzej Olchawa
DEFCONConference
Download
5
DEF CON 32 - XR for All: Accessibility and Privacy for Disabled Users - Dylan Fox
DEFCONConference
Download
6
DEF CON 32 - How State Laws Meant to Protect Children Raise Other Risks - Anthony Hendricks
DEFCONConference
Download
7
DEF CON 32 - Winning the Game of Active Directory - Brandon Colley
DEFCONConference
Download
8
DEF CON 32 - Warflying in a Cessna - Matt Thomassen, Sean McKeever
DEFCONConference
Download
9
DEF CON 32 - V2GEvil: Ghost in the Wires - Pavel Khunt & Thomas Sermpinis aka Cr0wTom
DEFCONConference
Download
10
DEF CON 32 - War Games Red Team for OT Based on Real World Case Studies- Shishir Gupta
DEFCONConference
Download
11
DEF CON 32 - You got a lighter I need to do some Electroporation - J. Utley, P. Rhodes, J. Hill
DEFCONConference
Download
12
DEF CON 32 - The Past, Present, and Future of Bioweapons - Panel
DEFCONConference
Download
13
DEF CON 32 - The Interplay between Safety and Security in Aviation Systems - Lillian Ash Baker
DEFCONConference
Download
14
DEF CON 32 - RF Attacks on Aviation's Defense Against Mid-Air Collisions - G. Longo, V. Lenders
DEFCONConference
Download
15
DEF CON 32 - Physical OSINT - Lukas McCullough
DEFCONConference
Download
16
DEF CON 32 - Curious Case of Alice&Bob: What You Can Do as Digital Investigators - Catherine Ullman
DEFCONConference
Download
17
DEF CON 32 - So you wanna know how to make badges - c0ldbru
DEFCONConference
Download
18
DEF CON 32 - Psychic Paper: Making eink access badges accessible for anyone - Joshua Herman
DEFCONConference
Download
19
DEF CON 32 - Preparing for the Future: A Discussion of our Rapidly Evolving Threat Landscape - Panel
DEFCONConference
Download
20
DEF CON 32 - Student Engagement Doesn't Have to Suck - Dr Muhsinah Morris
DEFCONConference
Download
21
DEF CON 32 - Reverse engineering and hacking Ecovacs robots - Dennis Giese, Braelynn Hacker
DEFCONConference
Download
22
DEF CON 32 - Reflections on a Decade in Bug Bounties - Nikhil Shrivastava & Charlie Waterhouse
DEFCONConference
Download
23
DEF CON 32 - Programming a CTS-V Gauge Cluster into an ATS-V, out of pure spite - Varjitt Jeeva
DEFCONConference
Download
24
DEF CON 32 - Practical Exploitation of DoS in Bug Bounty - Roni Lupin Carta
DEFCONConference
Download
25
DEF CON 32 - Porn & Privacy - ET
DEFCONConference
Download
26
DEF CON 32 - Open Source Hacker V. Government Lawyer - Rebecca Lively, Eddie Zaneski
DEFCONConference
Download
27
DEF CON 32 - Detecting persistent threats on Draytek devices - Octavio Gianatiempo, Gastón Aznarez
DEFCONConference
Download
28
DEF CON 32 - Sneaky Extensions The MV3 Escape Artists - Vivek Ramachandran, Shourya Pratap Singh
DEFCONConference
Download
29
DEF CON 32 - SBOMs the Hard Way Hacking Bob the Minion - Larry Pesce
DEFCONConference
Download
30
DEF CON 32 - Pick Your Poison: Navigating a secure clean energy transition - Emma Stewart
DEFCONConference
Download
31
DEF CON 32 - Safecracking for Everyone - Jared Dygert
DEFCONConference
Download
32
DEF CON 32 - Small Satellite Modeling and Defender Software - Kyle Murbach
DEFCONConference
Download
33
DEF CON 32 - Signature-Based Detection Using Network Timing - Josh Pyorre
DEFCONConference
Download
34
DEF CON 32 - RFID 101 - Ege Feyzioglu & Andrew M
DEFCONConference
Download
35
DEF CON 32 - Bypass 101- Bill Graydon
DEFCONConference
Download
36
DEF CON 32 - Breaking Boundaries: Popping Shells in the Airgap w $10 & Arduino Magic - Daniel Beard
DEFCONConference
Download
37
DEF CON 32 - Exposing the Occultations in Large Off-Grid Solar Systems - Dan Berte & Alexandru Lazar
DEFCONConference
Download
38
DEF CON 32 - Analyzing the Security of Satellite Based Air Traffic Control -Martin Strohmeier
DEFCONConference
Download
39
DEF CON 32 - A dive into world of Aircraft PKI - Matt Gaffney
DEFCONConference
Download
40
DEF CON 32 - UDSonCAN Attacks Discovering Safety Critical Risks by Fuzzing - Seunghee Han
DEFCONConference
Download
41
DEF CON 32 - The Village Peoples' Panel What Really Goes On in a Village - Panel
DEFCONConference
Download
42
DEF CON 32 - Bluetooth Blues: Unmasking CVE 2023-52709-The TI BLE5-Stack Attack - Kevin Mitchell
DEFCONConference
Download
43
DEF CON 32 - The wild and wonderful world of early Microprocessors w/a focus on 6502 - Michael Brown
DEFCONConference
Download
44
DEF CON 32 - Building a secure resilient nationwide EV charging network - Harry Krejsa, Sarah Hipel
DEFCONConference
Download
45
DEF CON 32 - Behind the Badge:How we used hardware to make AV badge - Adam Batori, Robert Pafford
DEFCONConference
Download
46
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini
DEFCONConference
Download
47
DEF CON 32 - Access Control Done Right the First Time - Tim Clevenger
DEFCONConference
Download
48
DEF CON 32 - 3DU Homo ex Machina - Lacey Harbour
DEFCONConference
Download
49
DEF CON 32 - Attacks on GenAI data & using vector encryption to stop them - Patrick Walsh, Bob Wall
DEFCONConference
Download
50
DEF CON 32 - Simulating attacks against hydroelectric power plants - Julia Dewitz-Würzelberger
DEFCONConference
Download
51
DEF CON 32 - Travel Better Expedient Digital Defense - Grey Fox
DEFCONConference
Download
52
DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner
DEFCONConference
Download
53
DEF CON 32 - Bridging Space and Medicine - Fernando De La Peña Llaca
DEFCONConference
Download
54
DEF CON 32 - Tough Adversary Don’t Blame Sun Tzu - Gregory Carpenter, DrPH
DEFCONConference
Download
55
DEF CON 32 - The Risk and Reward of Distributed Industrial Control - Joe Slowik
DEFCONConference
Download
56
DEF CON 32 - Color Blasted Badge Making: How Hard Could It Be - Abhinav Panda, Bradán Lane
DEFCONConference
Download
57
DEF CON 32 - Famous and Not So Famous Unsolved Codes - Elonka Dunin & Klaus
DEFCONConference
Download
58
DEF CON 32 - An adversarial approach to Airline Revenue Management Proving Ground - Craig Lester
DEFCONConference
Download
59
DEF CON 32 - Navigating the Turbulent Skies of Aviation Cyber Regulation - M. Weigand, S. Wagner
DEFCONConference
Download
60
DEF CON 32 - Exposing Attacks Hiding in the Sheer Noise of False Positives - E Tahoun, L Hamida
DEFCONConference
Download
61
DEF CON 32 - Data On Demand The challenges of building a privacy focused AI Device - Matt Domko
DEFCONConference
Download
62
DEF CON 32 - D0N0H4RM Cyber STEM Storytime - Panel
DEFCONConference
Download
63
DEF CON 32 - Hacker vs AI perspectives from an ex spy - Harriet Farlow
DEFCONConference
Download
64
DEF CON 32 - Responding to Breaches, Ransomware, and State Sponsored Threat Actors - Panel
DEFCONConference
Download
65
DEF CON 32 - DIY Pharmaceuticals - Michael Laufer
DEFCONConference
Download
66
DEF CON 32 - How we built our REDACTED THING this year, 5n4ck3y, && AMA Badge Panel - AND!XOR
DEFCONConference
Download
67
DEF CON 32 - Got 99 problems but prompt injection ain't pineapple - Chloé Messdaghi, Kasimir Schulz
DEFCONConference
Download
68
DEF CON 32 - Custom, cheap, easy, and safe badges without starting from scratch - securelyfitz
DEFCONConference
Download
69
DEF CON 32 - Bypass 102 - Terry Luan & Karen Ng
DEFCONConference
Download
70
DEF CON 32 - From Easy Wins to Epic Challenges: Bounty Hunter Edition - Daniel Blaklis Le Gall
DEFCONConference
Download
71
DEF CON 32 - Exploiting Bluetooth from your car to the bank account - Vladyslav Zubkov, Martin Str
DEFCONConference
Download
72
DEF CON 32 - Hunters and Gatherers A Deep Dive into the World of Bug Bounties - Panel
DEFCONConference
Download
73
DEF CON 32 - Eradicating Hepatitis C with BioTerrorism - Mixæl Swan Laufer
DEFCONConference
Download
74
DEF CON 32 - Human Dignity in AI and Tech Policy - Jan Trzaskowski
DEFCONConference
Download
75
DEF CON 32 - Leveraging AI for Smarter Bug Bounties - Diego Jurado & Joel Niemand Sec Noguera
DEFCONConference
Download
76
DEF CON 32 - ICS 101 - Bryson Bort, Tom VanNorman
DEFCONConference
Download
77
DEF CON 32 - GPS spoofing it's about time, not just position - Ken Munro
DEFCONConference
Download
78
DEF CON 32 - MFT Malicious Fungible Tokens - Mauro Eldritch, Cybelle Oliveira
DEFCONConference
Download
79
DEF CON 32 - Master Splinter’s initial physical access dojo - Daniel Isler
DEFCONConference
Download
80
DEF CON 32 - GUR RIBYHGVBA BS PELCGBTENCUL - Jeff Man
DEFCONConference
Download
81
DEF CON 32 - Fitness of Physical Red Teamers - Lucas Rooyakkers & Billy Graydon
DEFCONConference
Download
82
DEF CON 32 - I am still the Captain now! - Paul Brownridge
DEFCONConference
Download
83
DEF CON 32 - Evading Modern Defenses When Phishing with Pixels - Melvin Langvik
DEFCONConference
Download
84
DEF CON 32 - Locksport Competitions: Compete in the Olympics of Locks -Matt Burrough
DEFCONConference
Download
85
DEF CON 32 - Manufacturing Lessons Learned, Lessons Taught - Tim Chase
DEFCONConference
Download
86
DEF CON 32 - Introduction to IPv6 - Denis Smajlović
DEFCONConference
Download
87
DEF CON 32 - MoWireless MoProblems: Modular Wireless Survey Sys. & Data Analytics - G Horvath, W Tam
DEFCONConference
Download
88
DEF CON 32 - Dysfunctional Unity The Road to Nowhere - Michael v3ga Aguilar
DEFCONConference
Download
89
DEF CON 32 - Exploiting Voice Cloning in Adversarial Simulation - Mark Foudy
DEFCONConference
Download
90
DEF CON 32 - MicroHard More Like MicroEasy to Exploit - Ricky Lawshae
DEFCONConference
Download
91
DEF CON 32 - Incubated ML Exploits: Backdooring ML Pipelines w Input Handling Bugs - Suha Hussain
DEFCONConference
Download
92
DEF CON 32 - National Labs Use of XR - Martin Pratt
DEFCONConference
Download
93
DEF CON 32 - Decoding Galah, an LLM Powered Web Honeypot - Adel Karimi
DEFCONConference
Download
94
DEF CON 32 - Ground Control to Major Threat Hacking the Space Link Extension Protocol - Andrzej Olch
DEFCONConference
Download
95
DEF CON 32 - Kubernetes Attack Simulation The Definitive Guide - Leo Tsaousis
DEFCONConference
Download
96
DEF CON 32 - How I hacked Learning Codes of the key job of a car assembled in my country - D. Erazo
DEFCONConference
Download
97
DEF CON 32 - Doors, Cameras, & Mantraps Oh my! - The Magician
DEFCONConference
Download
98
DEF CON 32 - Exploiting Bluetooth from your car to the bank account$$ - Yso & Martin Strohmeier
DEFCONConference
Download
99
DEF CON 32 - How I Developed a Low Cost Raspberry Pi Based Device for ADS B Spoof - Angelina Tsuboi
DEFCONConference
Download
100
DEF CON 32 - From Theory to Reality Demonstrating the Simplicity of SPARTA Techniques - Randi Tinney
DEFCONConference
Download
101
DEF CON 32 - Fool us Once, fool us twice Hacking Norwegian Banks - Per Thorsheim
DEFCONConference
Download
102
DEF CON 32 Finding 0days in Vilo Home Routers Justin Mott & Ava Petersen
DEFCONConference
Download
103
DEF CON 32 - Top 10 Cybersecurity Trends in Critical Infrastructure for 2024 - Mars Cheng
DEFCONConference
Download
104
DEF CON 32 - Inside Dash Cam Custom Protocols and Discovered 0days - Hyo Jin Lee & Hanryeol Park
DEFCONConference
Download
105
DEF CON 32 No Symbols When Reversing No Problem Bring Your Own Max ‘Libra’ Kersten
DEFCONConference
Download
106
DEF CON 32 - Efficient Bug Bounty Automation Techniques - Gunnar Andrews
DEFCONConference
Download
107
DEF CON 32 Cybersecurity Schoolhouse Rock Avi McGrady
DEFCONConference
Download
108
DEF CON 32 - Differential privacy beyond algorithm: Challenges for deployment - Rachel Cummings
DEFCONConference
Download