Defcon 27
DEF CON 27 - Alexandre Borges - NET Malware Threats Internals And Reversing.mp4
69.0 MiB
2020 May 25 22:59
DEF CON 27 - Alexandre Borges - NET Malware Threats Internals And Reversing.srt
33.3 KiB
2020 May 16 04:15
DEF CON 27 - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.mp4
193.8 MiB
2020 May 25 22:59
DEF CON 27 - Ali Islam - Weaponizing Hypervisors to Fight and Beat Car and Medical Devices Attacks.srt
61.4 KiB
2020 May 16 04:14
DEF CON 27 - Alon Weinberg - Please Inject Me a x64 Code Injection.mp4
45.2 MiB
2020 May 25 22:59
DEF CON 27 - Alon Weinberg - Please Inject Me a x64 Code Injection.srt
18.1 KiB
2020 May 16 04:15
DEF CON 27 - Alvaro Munoz - SSO Wars The Token Menace.mp4
88.8 MiB
2020 May 25 22:59
DEF CON 27 - Alvaro Muñoz - SSO Wars The Token Menace.srt
41.1 KiB
2020 May 16 04:15
DEF CON 27 - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.mp4
115.5 MiB
2020 May 25 22:59
DEF CON 27 - Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography.srt
58.3 KiB
2020 May 16 04:15
DEF CON 27 - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.mp4
54.1 MiB
2020 May 25 22:59
DEF CON 27 - Andy Grant - Unpacking Pkgs A Look Inside Macos Installer Packages And Common Security Flaws.srt
27.1 KiB
2020 May 16 04:15
DEF CON 27 - Anish Athalye - Want Strong Isolation Just Reset Your Processor.mp4
104.8 MiB
2020 May 25 22:59
DEF CON 27 - Anish Athalye - Want Strong Isolation Just Reset Your Processor.srt
66.0 KiB
2020 May 16 04:15
DEF CON 27 - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.mp4
75.8 MiB
2020 May 25 22:59
DEF CON 27 - Ariel Herbert-Voss - Dont Red-Team AI Like a Chump.srt
41.2 KiB
2020 May 16 04:15
DEF CON 27 - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.mp4
65.3 MiB
2020 May 25 22:59
DEF CON 27 - Ben Sadeghipour - Owning The Clout Through Server-Side Request Forgery.srt
34.4 KiB
2020 May 16 04:15
DEF CON 27 - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.mp4
110.3 MiB
2020 May 25 22:59
DEF CON 27 - Bernhard Mueller - The Ether Wars Exploits counter-exploits and honeypots on Ethereum.srt
44.6 KiB
2020 May 16 04:15
DEF CON 27 - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.mp4
93.1 MiB
2020 May 25 22:59
DEF CON 27 - Bill Demirkapi - Are Your Childs Records at Risk The Current State of School Infosec.srt
51.0 KiB
2020 May 16 04:15
DEF CON 27 - Bill Graydon - Duplicating Restricted Mechanical Keys.mp4
127.8 MiB
2020 May 25 22:59
DEF CON 27 - Bill Graydon - Duplicating Restricted Mechanical Keys.srt
55.3 KiB
2020 May 16 04:15
DEF CON 27 - Bill Swearingen - HAKC THE POLICE.mp4
106.2 MiB
2020 May 25 22:59
DEF CON 27 - Bill Swearingen - HAKC THE POLICE.srt
47.3 KiB
2020 May 16 04:15
DEF CON 27 - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.mp4
100.0 MiB
2020 May 25 22:59
DEF CON 27 - Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling Using USB Hacks.srt
46.5 KiB
2020 May 16 04:15
DEF CON 27 - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.mp4
39.8 MiB
2020 May 25 22:59
DEF CON 27 - Brent Stone - Reverse Engineering 17 plus Cars in Less Than 10 Minutes.srt
24.5 KiB
2020 May 16 04:15
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest.mp4
130.3 MiB
2020 May 25 22:59
DEF CON 27 - Bruce Schneier - Information Security in the Public Interest.srt
42.8 KiB
2020 May 16 04:15
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now.mp4
95.1 MiB
2020 May 25 22:59
DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now.srt
42.2 KiB
2020 May 16 04:15
DEF CON 27 - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.mp4
73.4 MiB
2020 May 25 22:59
DEF CON 27 - Christopher Roberts - Firmware Slap Automating Discovery of Exploitable Vulnerabilities in Firmware.srt
33.6 KiB
2020 May 16 04:15
DEF CON 27 - Christopher Wade - Tag-side attacks against NFC.mp4
78.9 MiB
2020 May 25 22:59
DEF CON 27 - Christopher Wade - Tag-side attacks against NFC.srt
51.7 KiB
2020 May 16 04:15
DEF CON 27 - Contests and Events - Contests Awards Ceremony.mp4
241.3 MiB
2020 May 25 22:59
DEF CON 27 - Contests and Events - Contests Awards Ceremony.srt
67.2 KiB
2020 May 16 04:15
DEF CON 27 - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.mp4
85.0 MiB
2020 May 25 22:59
DEF CON 27 - Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming.srt
38.2 KiB
2020 May 16 04:15
DEF CON 27 - Daniel Romero - Why You Should Fear Your mundane Office Equipment.mp4
112.4 MiB
2020 May 25 22:59
DEF CON 27 - Daniel Romero - Why You Should Fear Your mundane Office Equipment.srt
47.8 KiB
2020 May 16 04:15
DEF CON 27 - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.mp4
162.1 MiB
2020 May 25 22:59
DEF CON 27 - Daniel ufurnace Crowley - Practical Key Search Attacks Against Modern Symmetric Ciphers.srt
50.6 KiB
2020 May 16 04:15
DEF CON 27 - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.mp4
112.1 MiB
2020 May 25 22:59
DEF CON 27 - Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek with Linux EDRs.srt
49.8 KiB
2020 May 16 04:15
DEF CON 27 - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.mp4
101.3 MiB
2020 May 25 22:59
DEF CON 27 - Dirk-jan Mollema - Im In Your Cloud Pwning Your Azure Environment.srt
46.6 KiB
2020 May 16 04:15
DEF CON 27 - Douglas McKee - HVACking Understand the Delta Between Security and Reality.mp4
92.3 MiB
2020 May 25 22:59
DEF CON 27 - Douglas McKee - HVACking Understand the Delta Between Security and Reality.srt
56.0 KiB
2020 May 16 04:15
DEF CON 27 - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.mp4
42.9 MiB
2020 May 25 22:59
DEF CON 27 - Dr Bramwell Brizendine - The JOP ROCKET A Supremely Wicked Tool for JOP Gadget Discovery.srt
28.2 KiB
2020 May 16 04:14
DEF CON 27 - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.mp4
91.5 MiB
2020 May 25 22:59
DEF CON 27 - Elie Bursztein - How Deep Learning Is Revolutionizing Side-Channel Cryptanalysis.srt
50.5 KiB
2020 May 16 04:15
DEF CON 27 - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.mp4
93.6 MiB
2020 May 25 22:59
DEF CON 27 - Elliott Thompson - MI CASA-SU CASA My 19216811 is Your 19216811.srt
43.7 KiB
2020 May 16 04:15
DEF CON 27 - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.mp4
106.8 MiB
2020 May 25 22:59
DEF CON 27 - Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera.srt
49.5 KiB
2020 May 16 04:15
DEF CON 27 - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.mp4
93.1 MiB
2020 May 25 22:59
DEF CON 27 - Gerald Doussot - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin.srt
42.0 KiB
2020 May 16 04:15
DEF CON 27 - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.mp4
60.0 MiB
2020 May 25 22:59
DEF CON 27 - Gregory Pickett - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design.srt
25.9 KiB
2020 May 16 04:14
DEF CON 27 - Hadrien Barral - The ABC of Next-Gen Shellcoding.mp4
81.0 MiB
2020 May 25 22:59
DEF CON 27 - Hadrien Barral - The ABC of Next-Gen Shellcoding.srt
37.9 KiB
2020 May 16 04:15
DEF CON 27 - Hila Cohen - Malproxy Leave Your Malware at Home.mp4
88.1 MiB
2020 May 25 22:59
DEF CON 27 - Hila Cohen - Malproxy Leave Your Malware at Home.srt
43.4 KiB
2020 May 16 04:15
DEF CON 27 - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.mp4
129.5 MiB
2020 May 25 22:59
DEF CON 27 - Itzik Kotler - Process Injection Techniques Gotta Catch Them All.srt
49.7 KiB
2020 May 16 04:15
DEF CON 27 - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.mp4
100.8 MiB
2020 May 25 22:59
DEF CON 27 - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation.srt
46.5 KiB
2020 May 16 04:15
DEF CON 27 - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.mp4
96.3 MiB
2020 May 25 22:59
DEF CON 27 - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope.srt
42.1 KiB
2020 May 16 04:15
DEF CON 27 - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.mp4
120.1 MiB
2020 May 25 22:59
DEF CON 27 - Jatin Kataria - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans.srt
63.6 KiB
2020 May 16 04:15
DEF CON 27 - Jayson Grace - MOSE Using Configuration Management for Evil.mp4
102.8 MiB
2020 May 25 22:59
DEF CON 27 - Jayson Grace - MOSE Using Configuration Management for Evil.srt
44.8 KiB
2020 May 16 04:15
DEF CON 27 - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.mp4
98.4 MiB
2020 May 25 22:59
DEF CON 27 - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime.srt
64.5 KiB
2020 May 16 04:15
DEF CON 27 - Jens Muller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.mp4
55.4 MiB
2020 May 25 22:59
DEF CON 27 - Jens Müller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption.srt
23.6 KiB
2020 May 16 04:15
DEF CON 27 - Jesse Michael - Get Off the Kernel if You Cant Drive.mp4
123.6 MiB
2020 May 25 22:59
DEF CON 27 - Jesse Michael - Get Off the Kernel if You Cant Drive.srt
49.8 KiB
2020 May 16 04:15
DEF CON 27 - Jmaxxz - Your Car is My Car.mp4
120.3 MiB
2020 May 25 22:59
DEF CON 27 - Jmaxxz - Your Car is My Car.srt
46.6 KiB
2020 May 16 04:15
DEF CON 27 - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.mp4
191.6 MiB
2020 May 25 22:59
DEF CON 27 - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge.srt
81.0 KiB
2020 May 16 04:15
DEF CON 27 - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.mp4
95.8 MiB
2020 May 25 22:59
DEF CON 27 - Joseph Cox - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market.srt
49.0 KiB
2020 May 16 04:14
DEF CON 27 - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.mp4
188.2 MiB
2020 May 25 22:59
DEF CON 27 - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years.srt
59.9 KiB
2020 May 16 04:15
DEF CON 27 - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.mp4
101.4 MiB
2020 May 25 22:59
DEF CON 27 - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web.srt
47.7 KiB
2020 May 16 04:15
DEF CON 27 - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.mp4
94.3 MiB
2020 May 25 22:59
DEF CON 27 - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective.srt
26.0 KiB
2020 May 16 04:15
DEF CON 27 - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.mp4
80.9 MiB
2020 May 25 22:59
DEF CON 27 - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror.srt
59.3 KiB
2020 May 16 04:15
DEF CON 27 - Kyle Gwinnup - Next Generation Process Emulation with Binee.mp4
102.4 MiB
2020 May 25 22:59
DEF CON 27 - Kyle Gwinnup - Next Generation Process Emulation with Binee.srt
60.0 KiB
2020 May 16 04:15
DEF CON 27 - Leon Jacobs - Meticulously Modern Mobile Manipulations.mp4
88.6 MiB
2020 May 25 22:59
DEF CON 27 - Leon Jacobs - Meticulously Modern Mobile Manipulations.srt
48.1 KiB
2020 May 16 04:15
DEF CON 27 - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.mp4
97.5 MiB
2020 May 25 22:59
DEF CON 27 - Maksim Shudrak - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets.srt
44.0 KiB
2020 May 16 04:15
DEF CON 27 - Marina Simakov - Relaying Credentials Has Never Been Easier.mp4
93.1 MiB
2020 May 25 22:59
DEF CON 27 - Marina Simakov - Relaying Credentials Has Never Been Easier.srt
47.9 KiB
2020 May 16 04:15
DEF CON 27 - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.mp4
71.7 MiB
2020 May 25 22:59
DEF CON 27 - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons.srt
50.7 KiB
2020 May 16 04:15
DEF CON 27 - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.mp4
108.2 MiB
2020 May 25 22:59
DEF CON 27 - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t.srt
56.6 KiB
2020 May 16 04:15
DEF CON 27 - Michael Stepankin - Apache Solr Injection.mp4
27.7 MiB
2020 May 25 22:59
DEF CON 27 - Michael Stepankin - Apache Solr Injection.srt
15.9 KiB
2020 May 16 04:15
DEF CON 27 - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.mp4
39.3 MiB
2020 May 25 22:59
DEF CON 27 - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON.srt
26.2 KiB
2020 May 16 04:15
DEF CON 27 - Nicolas Oberli - Poking the S in SD cards.mp4
48.9 MiB
2020 May 25 22:59
DEF CON 27 - Nicolas Oberli - Poking the S in SD cards.srt
19.5 KiB
2020 May 16 04:15
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.mp4
77.2 MiB
2020 May 25 22:59
DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance.srt
35.0 KiB
2020 May 16 04:15
DEF CON 27 - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.mp4
48.4 MiB
2020 May 25 22:59
DEF CON 27 - Nina Kollars - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud.srt
25.1 KiB
2020 May 16 04:15
DEF CON 27 - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware.mp4
115.9 MiB
2020 May 25 22:59
DEF CON 27 - Olivier Bilodeau - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware .srt
61.3 KiB
2020 May 16 04:14
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite.mp4
99.2 MiB
2020 May 25 22:59
DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite.srt
44.2 KiB
2020 May 16 04:15
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.mp4
101.7 MiB
2020 May 25 22:59
DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits.srt
51.0 KiB
2020 May 16 04:15
DEF CON 27 - Orange Tsai - Infiltrating Corporate Intranet Like NSA Pre-auth RCE on Leading SSL VPNs.mp4
125.2 MiB
2020 May 25 22:59
DEF CON 27 - Orange Tsai - Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs.srt
37.8 KiB
2020 May 16 04:15
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.mp4
166.5 MiB
2020 May 25 22:59
DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government.srt
53.5 KiB
2020 May 16 04:15
DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.mp4
164.0 MiB
2020 May 25 22:59
DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend.srt
48.9 KiB
2020 May 16 04:15
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction.mp4
120.3 MiB
2020 May 25 22:59
DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction.srt
58.7 KiB
2020 May 16 04:15
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.mp4
110.0 MiB
2020 May 25 22:59
DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks.srt
42.0 KiB
2020 May 16 04:15
DEF CON 27 - Philippe Laulheret - Intro to Hardware Hacking.mp4
113.5 MiB
2020 May 25 22:59
DEF CON 27 - Philippe Laulheret - Intro to Hardware Hacking.srt
67.4 KiB
2020 May 16 04:15
DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.mp4
119.6 MiB
2020 May 25 22:59
DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter.srt
55.5 KiB
2020 May 16 04:15
DEF CON 27 - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.mp4
89.8 MiB
2020 May 25 22:59
DEF CON 27 - Sheila Ayelen Berta - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers.srt
35.5 KiB
2020 May 16 04:15
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.mp4
103.6 MiB
2020 May 25 22:59
DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces.srt
45.1 KiB
2020 May 16 04:15
DEF CON 27 - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.mp4
227.6 MiB
2020 May 25 22:59
DEF CON 27 - The DEF CON NOC - All the things you wanted to know about the DEF CON NOC.srt
68.7 KiB
2020 May 16 04:15
DEF CON 27 - The Dark Tangent - Closing Ceremonies.mp4
451.2 MiB
2020 May 25 22:59
DEF CON 27 - The Dark Tangent - Closing Ceremonies.srt
117.3 KiB
2020 May 16 04:15
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.mp4
41.7 MiB
2020 May 25 22:59
DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot.srt
22.7 KiB
2020 May 16 04:15
DEF CON 27 - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.mp4
156.1 MiB
2020 May 25 22:59
DEF CON 27 - US Senator Ron Wyden - Can You Track Me Now Why The Phone Companies Are Such A Privacy Disaster.srt
36.0 KiB
2020 May 16 04:15
DEF CON 27 - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.mp4
84.1 MiB
2020 May 25 22:59
DEF CON 27 - Wenxiang Qian - Breaking Google Home Exploit It with SQLite.srt
36.5 KiB
2020 May 16 04:15
DEF CON 27 - WillC - Phreaking Elevators.mp4
96.6 MiB
2020 May 25 22:59
DEF CON 27 - WillC - Phreaking Elevators.srt
41.9 KiB
2020 May 16 04:15
DEF CON 27 - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.mp4
74.8 MiB
2020 May 25 22:59
DEF CON 27 - Xiangqian Zhang - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors.srt
27.8 KiB
2020 May 16 04:15
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked.mp4
110.9 MiB
2020 May 25 22:59
DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked.srt
41.7 KiB
2020 May 16 04:14
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.mp4
76.2 MiB
2020 May 25 22:59
DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space.srt
31.1 KiB
2020 May 16 04:15
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.mp4
65.9 MiB
2020 May 25 22:59
DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air.srt
26.7 KiB
2020 May 16 04:15
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.mp4
80.3 MiB
2020 May 25 22:59
DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door.srt
50.8 KiB
2020 May 16 04:15
DEF CON 27 - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined for Others Auto Infractions.srt
26.7 KiB
2020 May 16 04:15
DEF CON 27 - droogie - Go NULL Yourself or How I Learned to Start Worrying While Getting Fined.mp4
67.7 MiB
2020 May 25 22:59
DEF CON 27 - finalphoenix - Rise of the Hypebots Scripting Streetwear.mp4
111.6 MiB
2020 May 25 22:59
DEF CON 27 - finalphoenix - Rise of the Hypebots Scripting Streetwear.srt
43.2 KiB
2020 May 16 04:15
DEF CON 27 - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.mp4
83.9 MiB
2020 May 25 22:59
DEF CON 27 - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss.srt
47.4 KiB
2020 May 16 04:15
DEF CON 27 - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.mp4
57.7 MiB
2020 May 25 22:59
DEF CON 27 - jiska - Vacuum Cleaning Security Pinky and the Brain Edition.srt
27.7 KiB
2020 May 16 04:14
DEF CON 27 - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.mp4
89.9 MiB
2020 May 25 22:59
DEF CON 27 - phar - No Mas How One Side-Channel Flaw Opens Atm Pharmacies and Government Secrets Up to Attack.srt
46.2 KiB
2020 May 16 04:15
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing.mp4
86.1 MiB
2020 May 25 22:59
DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing.srt
65.7 KiB
2020 May 16 04:15
DEF CON 27 - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.mp4
112.1 MiB
2020 May 25 22:59
DEF CON 27 - xBen benmap Morris - Finding Secrets In Publicly Exposed Ebs Volumes.srt
57.4 KiB
2020 May 16 04:14