DEF CON 31
156 videos • 11,970 views • by DEFCONConference
1
DEF CON 31 Trailer!
DEFCONConference
Download
2
DEF CON 31 - Red Team Village Preview - video team
DEFCONConference
Download
3
DEF CON 31 - AI Village Interview - video team
DEFCONConference
Download
4
DEF CON 31 - Hack-A-Sat Interview - video team
DEFCONConference
Download
5
DEF CON 31 - Lockpicking Village Interview - video team
DEFCONConference
Download
6
DEF CON 31 - Scavenger Hunt Interview - video team
DEFCONConference
Download
7
DEF CON 31 - Policy Village Interview - video team
DEFCONConference
Download
8
DEF CON 31 - Top Tips for new DEF CON Attendees - video team
DEFCONConference
Download
9
DEF CON 31 - Tin Foil Hat Contest Interviews - video team
DEFCONConference
Download
10
DEF CON 31 - Car Hacking Village Interview - video team
DEFCONConference
Download
11
DEF CON 31 - Hacker Memorial Interview - video team
DEFCONConference
Download
12
DEF CON 31 - Voting Village Interview - video team
DEFCONConference
Download
13
DEF CON 31 Adversary Wars Interview - video team
DEFCONConference
Download
14
[Private video]
Download
15
DEF CON 31 - Hack the Box Interview - Video Team
DEFCONConference
Download
16
DEF CON 31 - Tinfoil Hat Contest - Video Team
DEFCONConference
Download
17
DEF CON 31 - SODA Machine with DualD - video team
DEFCONConference
Download
18
DEF CON 31 - Password Cracking Village Interview - video team
DEFCONConference
Download
19
DEF CON 31 - IOT Village Interview - video team
DEFCONConference
Download
20
DEF CON 31 - Foxhunt Interview - video team
DEFCONConference
Download
21
DEF CON 31 - Hacker Badges Interview - video team
DEFCONConference
Download
22
DEF CON 31 - War Stories - Finding Foes and Yourself with Latency Trilateration - Lorenzo Cococcia
DEFCONConference
Download
23
DEF CON 31 - War Stories - Youre Not George Clooney, and This Isnt Oceans 11 - Andrew Brandt
DEFCONConference
Download
24
DEF CON 31 - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖK
DEFCONConference
Download
25
DEF CON 31 - Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing - Joseph Gabay
DEFCONConference
Download
26
DEF CON 31 - Visual Studio Code is Why I Have Workspace Trust Issues - Chauchefoin, Gerste
DEFCONConference
Download
27
DEF CON 31 - Video Based Cryptanalysis Extracting Keys from Power LEDs - Ben Nassi, Ofek Vayner
DEFCONConference
Download
28
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese
DEFCONConference
Download
29
DEF CON 31 - Unlocking Hidden Powers in Xtensa based Qualcomm Wifi Chips - Daniel Wegemer
DEFCONConference
Download
30
DEF CON 31 - Unlocking Doors from Half a Continent Away - Trevor Stevado, Sam Haskins
DEFCONConference
Download
31
DEF CON 31 War Stories - UNConventional Cybercrime - Bad Treaty Becoming Law - Rodriguez, Budington
DEFCONConference
Download
32
DEF CON 31 - Turning my virtual wallet into a skimming device - Borgogno, Barrionuevo
DEFCONConference
Download
33
DEF CON 31 - Track the Planet! Mapping IDs, Monitoring Presence in the Azure Ecosystem - nyxgeek
DEFCONConference
Download
34
DEF CON 31 - There Are No Mushroom Clouds in Cyberwar - Mieke Eoyang
DEFCONConference
Download
35
DEF CON 31 - Ringhopper - How We Almost Zero day’d the World - Benny Zeltser, Jonathan Lusky
DEFCONConference
Download
36
DEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer Attias
DEFCONConference
Download
37
DEF CON 31 -DARPA AI Cyber Challenge Announcement - Perri Adams, Panel
DEFCONConference
Download
38
DEF CON 31 - The Hackers, The Lawyers, And The Defense Fund - Geiger, Opsahl, McCain, Croc
DEFCONConference
Download
39
DEF CON 31 - The GitHub Actions Worm - Asi Greenholts
DEFCONConference
Download
40
DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight Blue
DEFCONConference
Download
41
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater
DEFCONConference
Download
42
DEF CON 31 - Still Vulnerable Out of the Box - Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
DEFCONConference
Download
43
DEF CON 31 - Spread Spectrum techniques for anti drone evasion David Melendez, Gabriela Garcia
DEFCONConference
Download
44
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos
DEFCONConference
Download
45
DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r
DEFCONConference
Download
46
DEF CON 31 - StackMoonwalk - Alessandro Magnosi, Arash Parsa, Athanasios Tserpelis
DEFCONConference
Download
47
DEF CON 31 - Snoop On To Them, As They Snoop On To Us - Alan Meekins
DEFCONConference
Download
48
DEF CON 31 - Smashing the State Machine the True Potential of Web Race Conditions - James Kettle
DEFCONConference
Download
49
DEF CON 31 - Small Leaks, Billions Of Dollars - Nikolaos Makriyannis, Oren Yomtov
DEFCONConference
Download
50
DEF CON 31 - Prototype Pollution Leads to Remote Code Execution in NodeJS - Shcherbakov, Balliu
DEFCONConference
Download
51
DEF CON 31 - Second Breakfast Implicit & Mutation Based Serialization Vulns in NET - Jonathan Birch
DEFCONConference
Download
52
DEF CON 31 - Securing Critical Versions of your Reality - Suzanne Borders Keenan Skelly
DEFCONConference
Download
53
DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk
DEFCONConference
Download
54
DEF CON 31 - Route to bugs - Analyzing the Security of BGP Message Parsing - dos Santos, Guiot
DEFCONConference
Download
55
DEF CON 31 - Revolutionizing ELF binary patching w Shiva - ElfMaster
DEFCONConference
Download
56
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew
DEFCONConference
Download
57
DEF CON 31 - Reproductive Justice in the Age of Digital Surveillance - McSherry, Bertash, Barnett
DEFCONConference
Download
58
DEF CON 31 - Car Hacking Village - Exploiting Wireless Side Channels in EV Charging - Kohler, Baker
DEFCONConference
Download
59
DEF CON 31 - Packet Hacking Village - Pwning the Pwners with Mindware - Frank D9 DiGiovanni
DEFCONConference
Download
60
DEF CON 31 - Private Until Presumed Guilty - Allison Young, Diane Akerman
DEFCONConference
Download
61
DEF CON 31 - Private Keys in Public Places - Tom Pohl
DEFCONConference
Download
62
DEF CON 31 - Shall We Play a Game - Craig Martell
DEFCONConference
Download
63
DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chick
DEFCONConference
Download
64
DEF CON 31 - Polynonce - An ECDSA Attack and Polynomial Dance - Nils Amiet, Marco Macchetti
DEFCONConference
Download
65
DEF CON 31 Policy - US Cyber Policy 101 - Panel
DEFCONConference
Download
66
DEF CON 31 Policy - The Coming War on Encryption Part 3 - India McKinney
DEFCONConference
Download
67
DEF CON 31 Policy - Putting Your Money Where Your Cyber Is SW Liability - Andrea Matwyshyn
DEFCONConference
Download
68
DEF CON 31 Policy - Navigating the Digital Frontier Advancing Cyber Diplomacy - Panel
DEFCONConference
Download
69
DEF CON Policy - International Cyber Policy 101 - Panel
DEFCONConference
Download
70
DEF CON 31 - Policy How Hackers Can Work with Govt to Protect High Risk Communities - Panel
DEFCONConference
Download
71
DEF CON 31 Policy - How Can We Encourage More Hackers to Wngage with Policy Makers - Stephens, Kranz
DEFCONConference
Download
72
DEF CON 31 Policy - Demystifing Hacking for Government Officials - Panel
DEFCONConference
Download
73
DEF CON 31 Policy - Cyber Policy Adrift - Panel
DEFCONConference
Download
74
DEF CON 31 Policy - Blocking Pathways into Cybercrime Current Efforts, Future Opportunities - Panel
DEFCONConference
Download
75
DEF CON 31 Policy - Beyond the Breach Cyber Policy + Hacker Perspectives - Panel
DEFCONConference
Download
76
DEF CON 31 Policy - All Your Vulns Are Belong to Terms and Conditions -
DEFCONConference
Download
77
DEF CON 31 Policy - A Global Approach to Tackling Software Resilience - Panel
DEFCONConference
Download
78
DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade
DEFCONConference
Download
79
DEF CON 31 - Attacking And Securing the Pixel Modem - Karimi, Xing , Gong, Rodionov
DEFCONConference
Download
80
DEF CON 31 Packet Hacking Village - OSINT for Physical Security Intelligence - Raggo, Hosmer
DEFCONConference
Download
81
DEF CON 31 War Stories - Nuthin But A G Thang Evolution of Cellular Networks - Tracy Mosley
DEFCONConference
Download
82
DEF CON 31 - Leveraging macOS Networking Frameworks to Heuristically Detect Malware - Patrick Wardle
DEFCONConference
Download
83
DEF CON 31 War Stories - New Isn’t Always Novel Grep Your Way to $20K at Pwn2Own - Horseman, Hanley
DEFCONConference
Download
84
DEF CON 31 - ndays are also 0days - Bohan Liu, Zheng Wang, GuanCheng Li
DEFCONConference
Download
85
DEF CON 31 - mTLS When Certificate Authentication Done Wrong Michael Stepankin
DEFCONConference
Download
86
DEF CON 31 - Meduza - Exiled Pirate Media Outlet Breaks Thru the Kremlin Propaganda Firewall - Alex
DEFCONConference
Download
87
DEF CON 31 - Malware design Abusing Legacy Microsoft Transports and Session Architecture 0 RJ McDown
DEFCONConference
Download
88
DEF CON 31 - What Can We Learn about Hacking in SciFi - Nicolas Minvielle, Xavier Facelina
DEFCONConference
Download
89
DEF CON 31 - Look Ma Im the CEO - Real Time Video and Audio Deep Fake -Gal Zror
DEFCONConference
Download
90
DEF CON 31 - LLMs at the Forefront Pioneering the Future of Fuzz Testing - X
DEFCONConference
Download
91
DEF CON 31 War Stories - Living Next Door to Russia - Mikko Hypponen
DEFCONConference
Download
92
DEF CON 31- Lions & Tigers and Fancy Bears, Oh My! A Cautionary Tale - Jen Easterly, Scott Shapiro
DEFCONConference
Download
93
DEF CON 31 War Stories - Legend of Zelda Use After Free - Allan Cecil
DEFCONConference
Download
94
DEF CON 31 - J4 Gate, The Hustler Poker Cheating Scandal investigation - Scott Melnick
DEFCONConference
Download
95
DEF CON 31 - Internet Censorship What Governments Have in Store for You -Panel
DEFCONConference
Download
96
DEF CON 31 - Unparalleled RDP Monitoring Reveal Attackers Tradecraft -Bergeron, Bilodeau
DEFCONConference
Download
97
DEF CON 31 Car Hacking Village - How an Auto Security Researcher Had His Car Stolen - Tabor, Tindell
DEFCONConference
Download
98
DEF CON 31 - HL7Magic Medical Data Hacking Made Easy - Katie Inns
DEFCONConference
Download
99
DEF CON 31 - Hacker Court Interactive Scenario - winn0na, and Panel
DEFCONConference
Download
100
DEF CON 31 Packet Hacking Village - WINE Pairing with Malware - Jared Stroud
DEFCONConference
Download
101
DEF CON 31 XRVillage - Fireside Chat - Brittan Heller
DEFCONConference
Download
101
DEF CON 31 XRVillage - Fireside Chat - Brittan Heller
DEFCONConference
Download
102
DEF CON 31 Data Dupe Village - What 10 Years of Drive Stats Data Can Tell Us - Andy Klein
DEFCONConference
Download
103
DEF CON 31 XR Village - The History of XR From Fiction to Reality - Starr Brown, Bob Gourley
DEFCONConference
Download
104
DEF CON 31 Packet Hacking Village - The Importance of Arts and Crafts in ThreatOps - Pete Hay
DEFCONConference
Download
105
DEF CON 31 - Hack the Future - Why Congress & White House Support AI Red Teaming - Austin Carson
DEFCONConference
Download
106
DEF CON 31 - Growing the Community of AI Hackers w Generative Red Team - Cattell, Chowdhury, Carson
DEFCONConference
Download
107
DEF CON 31 - GhostToken Exploiting Google Cloud Platform to Create Unremovable Trojan Apps - Skverer
DEFCONConference
Download
108
DEF CON 31 - Getting a Migraine - Unique SIP Bypass on MacOS - Or, Pearse, Bohra
DEFCONConference
Download
109
DEF CON 31 - Game Changing Advances in Windows Shellcode Analysis - Brizendine, Kersten, Hince
DEFCONConference
Download
110
DEF CON 31 - From Feature to Weapon Breaking Microsoft Teams and SharePoint - Nestori Syynimaa
DEFCONConference
Download
111
DEF CON 31 - Fireside Chat with the National Cyber Director - Kemba Walden
DEFCONConference
Download
112
DEF CON 31 - Fantastic Ethertypes and Where to Find Them - Ricky Lawshae
DEFCONConference
Download
113
DEF CON 31 - Exploring Linux Memory Manipulation for Stealth and Evasion - Polop, Gutierrez
DEFCONConference
Download
114
DEF CON 31 - Exploiting OPC UA - Practical Attacks Against OPC UA Architectures - Moshe, Brizinov
DEFCONConference
Download
115
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła
DEFCONConference
Download
116
DEF CON 31 XR Village - Push All the Buttons Digital Twinning w Idaho National Labs - Kolton Heaps
DEFCONConference
Download
117
DEF CON 31 War Stories - Designing RFID Implants Flipping the Bird Opens Doors - Miana Ella Windall
DEFCONConference
Download
118
DEF CON 31 - Defending KA-SAT - Mark Colaluca and Nick Saunders
DEFCONConference
Download
119
DEF CON 31 - Defender Pretender When Windows Defender Updates Become a Security Risk -Bar, Attias
DEFCONConference
Download
120
DEF CON 31 - Defeating VPN Always On - Maxime Clementz
DEFCONConference
Download
121
DEF CON 31 - Closing Ceremonies & Awards - The Dark Tangent, DEF CON Senior Staff
DEFCONConference
Download
122
DEF CON 31 Packet Hacking Village - Death by 1000 Likes - Will Kay
DEFCONConference
Download
123
DEF CON 31 - DC101 Welcome to DEF CON - Panel
DEFCONConference
Download
124
DEF CON 31 War Stories - The Risks of Pointing Out the Emperor is Buck Naked - Renderman, Tom Dang
DEFCONConference
Download
125
DEF CON 31 War Stories - Cracking Cicada 3301 - Taiiwo, Artorias, Puck, TheClockworkBird
DEFCONConference
Download
126
DEF CON 31 - Contest Closing Ceremonies & Awards - Contest Goons
DEFCONConference
Download
127
DEF CON 31 - Staying Undetected Using the Windows Container Isolation Framework - Daniel Avinoam
DEFCONConference
Download
128
DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez
DEFCONConference
Download
129
DEF CON 31 War Stories - CON trolling the Weather - Paz Hameiri
DEFCONConference
Download
130
DEF CON 31 - Civil Cyber Defense - Tiffany Rad and Austin Shamlin
DEFCONConference
Download
131
DEF CON 31 - Using SIM Tunneling to Travel at Light Speed - Adrian Dabrowski, Gabriel Gegenhuber
DEFCONConference
Download
132
DEF CON 31 - Calling it a 0 Day - Hacking at PBX UC Systems - good pseudonym
DEFCONConference
Download
133
DEF CON 31 - Contextualizing The Vulkan Leaks & State Sponsored Offensive Ops - Joe Slowik
DEFCONConference
Download
134
DEF CON 31 - Breaking BMC The Forgotten Key to the Kingdom - Alex Tereshkin, Adam Zabrocki
DEFCONConference
Download
135
DEF CON 31 - Badge of Shame Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas
DEFCONConference
Download
136
DEF CON 31 - Backdoor in the Core - Altering Intel x86 Instruction Set at Runtime - Krog, Skovsende
DEFCONConference
Download
137
DEF CON 31 - Azure B2C 0Day - An Exploit Chain from Public Keys to Microsoft Bug Bounty - John Novak
DEFCONConference
Download
138
DEF CON 31 Car Hacking Village - Automotive USB Fuzzing - Euntae Jang, Donghyon Jeong, Jonghyuk Song
DEFCONConference
Download
139
DEF CON 31 XR VIllage - Augmented Reality and Implications on Mobile Security - Whitney Phillips
DEFCONConference
Download
140
DEF CON 31 - Assessing Security of Certificates at Scale - David McGrew, Brandon Enright, Andrew Chi
DEFCONConference
Download
141
DEF CON 31 - Apples Predicament - NSPredicate Exploitation on macOS and iOS - Austin Emmitt
DEFCONConference
Download
142
DEF CON 31 - An Audacious Plan to Halt the Internet's Enshittification - Cory Doctorow
DEFCONConference
Download
143
DEF CON 31 - All information looks like noise until you break the code - Pekoske, Lyngaas, Easterly
DEFCONConference
Download
144
DEF CON 31 - Advanced ROP Framework Pushing ROP to Its Limits - Brizendine, Kusuma
DEFCONConference
Download
145
DEF CON 31 Car Hacking Village - Abusing CAN Bus Spec for DoS in Embedded Systems - Martin Petran
DEFCONConference
Download
146
DEF CON 31 - A SSLippery Slope - Unraveling Hidden Dangers of Certificate Misuse - Bill Demirkapi
DEFCONConference
Download
147
DEF CON 31 War Stories - A Series of Unfortunate Events - Ben Sadeghipour, Corben Leo
DEFCONConference
Download
148
DEF CON 31 - A Pain in the NAS Exploiting Cloud Connectivity to PWN your NAS - Moshe, Brizinov
DEFCONConference
Download
149
DEF CON 31 War Stories - A Different Uber Post Mortem - Joe Sullivan
DEFCONConference
Download
150
DEF CON 31 - Review on the Less Traveled Road - 9 Yrs of Overlooked MikroTik PreAuth RCE - NiNi Chen
DEFCONConference
Download
151
DEF CON 31 - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks - Ceri Coburn
DEFCONConference
Download
152
DEF CON 31 - #NoFilter Abusing Windows Filtering Platform for privilege escalation - Ron Ben Yizhak
DEFCONConference
Download
153
DEF CON 31 - Welcome to DEF CON 31 - The Dark Tangent
DEFCONConference
Download
154
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin
DEFCONConference
Download
155
DEF CON 31 - Making The DEF CON 31 Badge Mar Williams
DEFCONConference
Download
156
DEF CON 31 - Secretary of the Department of Homeland Security - Alejandro Mayorkas
DEFCONConference
Download