DefCon 32

DATE

NAME

CATEGORIE

CATEGORIE

WEB

10.8.24

DEF CON 32 - Aapo Oksman - Leveraging private APNs for mobile network traffic analysis demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Aapo Oksman - Leveraging private APNs for mobile network traffic analysis.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Adnan Khan John Stawinski - Grand Theft Actions Abusing Self-Hosted GitHub Runners at Scale-dc gato x.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Adnan Khan John Stawinski - Grand Theft Actions Abusing Self-Hosted GitHub Runners at Scale-pytorch demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Adnan Khan John Stawinski - Grand Theft Actions Abusing Self-Hosted GitHub Runners at Scale.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Alexander Rubin Martin Rakhmanov - Atomic Honeypot A MySQL Honeypot That Drops Shells.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Alon Leviev - Windows Downdate Downgrade Attacks Using Windows Updates.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Andrew Case Austin Sellers Golden Richard David McDonald Gustavo Moreira - Defeating EDR Evading Malware with Memory Forensics.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Anthony Kava -Solving the Lover Stalker Killer Murder with strings grep and Perl.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - atlas - automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Babak Javadi Aaron Levy Nick Draffen - High Intensity Deconstruction Chronicles of a Cryptographic Heist.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Bramwell Brizendine Shiva Shashank Kusuma - Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Ceri Coburn Dirk-jan Mollema - Abusing Windows Hello Without a Severed Hand - Shwmae Demo v1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Ceri Coburn Dirk-jan Mollema - Abusing Windows Hello Without a Severed Hand.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain - DEMO 1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain - DEMO 2.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain - DEMO 3.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain - DEMO 4.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain - DEMO 5.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain - DEMO 6.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain - DEMO 7.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain - DEMO 8.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Chanin Kim Myeonghun Pak Myeongjin Shin - Watchers being watched Exploiting the Surveillance System and its supply chain.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Charles Fol - Iconv set the charset to RCE exploiting the glibc to hack the PHP engine-demo-blind-v1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Charles Fol - Iconv set the charset to RCE exploiting the glibc to hack the PHP engine-demo-magento-v1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Charles Fol - Iconv set the charset to RCE exploiting the glibc to hack the PHP engine-demo-roundcube-v1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Charles Fol - Iconv set the charset to RCE exploiting the glibc to hack the PHP engine.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Damien Cauquil Romain Cayre - One for all and all for WHAD wireless shenanigans made easy-videos.rar

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Damien Cauquil Romain Cayre - One for all and all for WHAD wireless shenanigans made easy.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Daniel Bohannon Sabajete Elezaj - MaLDAPtive LDAP Obfuscation Deobfuscation and Detection.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Daniel Messer - A Shadow Librarian in Broad Daylight Fighting back against ever encroaching capitalism.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - David Meléndez Gabriela (Gabs) Garcia - Abusing legacy railroad signaling systems.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Dennis Giese Braelynn - Open sesame - or how vulnerable is your stuff in electronic lockers.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Eduard Agavriloae Matei Josephs - AWS CloudQuarry - Digging for Secrets in Public AMIs-demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Eduard Agavriloae Matei Josephs - AWS CloudQuarry - Digging for Secrets in Public AMIs.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Enrique Nissim Krzysztof Okupski - AMD Sinkclose Universal Ring-2 Privilege Escalation Demo1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Enrique Nissim Krzysztof Okupski - AMD Sinkclose Universal Ring-2 Privilege Escalation Demo2.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Enrique Nissim Krzysztof Okupski - AMD Sinkclose Universal Ring-2 Privilege Escalation Redacted.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Erwin Karincic Woody - Mobile Mesh RF Network Exploitation - Getting the Tea from goTenna.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - General Paul M Nakasone - Spies and Bytes Victory in the Digital Age.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Harriet Farlow - On Your Oceans 11 Team Im the AI Guy (technically Girl).pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - HD Moore Rob King - Sshamble Unexpected Exposures in the Secure Shell.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - HD Moore Rob King - Sshamble Unexpected Exposures in the Secure Shell.rar

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Helvio Carvalho Junior - HookChain A new perspective for Bypassing EDR Solutions - demo1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Helvio Carvalho Junior - HookChain A new perspective for Bypassing EDR Solutions - demo2.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Helvio Carvalho Junior - HookChain A new perspective for Bypassing EDR Solutions - demo3.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Helvio Carvalho Junior - HookChain A new perspective for Bypassing EDR Solutions.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - HexRabbit Chen - Clash, Burn, and Exploit - Manipulate Filters to Pwn kernelCTF.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jacob Shams - Securing CCTV Cameras Against Blind Spots.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jake Jepson Rik Chatterjee - Compromising an Electronic Logging Device and Creating a Truck2Truck Worm.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jeffrey Hofmann Colby Morgan - Discovering and exploiting local attacks against the 1Password MacOS desktop application - demo 1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jeffrey Hofmann Colby Morgan - Discovering and exploiting local attacks against the 1Password MacOS desktop application - exploit materials.rar

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jeffrey Hofmann Colby Morgan - Discovering and exploiting local attacks against the 1Password MacOS desktop application.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jeffrey Knockel Mona Wang - The not-so-silent type Breaking network crypto in almost every popular Chinese keyboard app-demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jeffrey Knockel Mona Wang - The not-so-silent type Breaking network crypto in almost every popular Chinese keyboard app.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - JiaQing Huang Hao Zheng Yue Liu - Dragon SlayingGuide Bug Hunting In VMware Device Virtualization.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jim Rush Tomais Williamson - NTLM - The Last Ride demo 1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jim Rush Tomais Williamson - NTLM - The Last Ride demo 2.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jim Rush Tomais Williamson - NTLM - The Last Ride.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Jon DiMaggio - Behind Enemy Lines - Going undercover to breach the LockBit Ransomware Operation.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Joseph Cox - Inside the FBIs Secret Encrypted Phone Company Anom.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Ken Gannon Ilyes Beghdadi - Xiaomi The Money Our Toronto Pwn2Own Exploit and Behind The Scenes Story-exploit.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Ken Gannon Ilyes Beghdadi - Xiaomi The Money Our Toronto Pwn2Own Exploit and Behind The Scenes Story.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Martin Doyhenard - Gotta Cache em all bending the rules of web cache exploitation.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matt Burch - Where’s the Money - Defeating ATM Disk Encryption-demo1.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matt Burch - Where’s the Money - Defeating ATM Disk Encryption-demo2.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matt Burch - Where’s the Money - Defeating ATM Disk Encryption-demo3.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matt Burch - Where’s the Money - Defeating ATM Disk Encryption-demo4.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matt Burch - Where’s the Money - Defeating ATM Disk Encryption-demo5.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matt Burch - Where’s the Money - Defeating ATM Disk Encryption-demo6.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matt Burch - Where’s the Money - Defeating ATM Disk Encryption-white paper.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matt Burch - Where’s the Money - Defeating ATM Disk Encryption.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Matthew Bryant - The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Max Libra Kersten - No Symbols When Reversing No Problem Bring Your Own.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Michael Gorelik Arnold Osipov - Outlook Unleashing RCE Chaos CVE-2024-30103 & CVE-2024-38021-Demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Michael Gorelik Arnold Osipov - Outlook Unleashing RCE Chaos CVE-2024-30103 & CVE-2024-38021.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Michael Orlitzky - Laundering Money demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Michael Orlitzky - Laundering Money.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Michael Torres - Sudos and Sudon'ts - Peering inside Sudo for Windows - Demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Michael Torres - Sudos and Sudon'ts - Peering inside Sudo for Windows.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Michal Grygarek Martin Petran Hayyan Ali - Nano-Enigma Uncovering the Secrets Within eFuse Memories Demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Michal Grygarek Martin Petran Hayyan Ali - Nano-Enigma Uncovering the Secrets Within eFuse Memories.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Mikhail Shcherbakov - Exploiting the Unexploitable Insights from the Kibana Bug Bounty.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Mixæl Swan Laufer - Eradicating Hepatitis C With BioTerrorism.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Moritz Abrell - Unlocking the Gates - Hacking a secure Industrial Remote Access Solution.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Nick Frichette - Kicking in the Door to the Cloud - Exploiting Cloud Provider Vulnerabilities for Initial Access.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Or Yair Shmuel Cohen - QuickShell Sharing is caring about an RCE attack chain on Quick Share file acceptance bypass demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Or Yair Shmuel Cohen - QuickShell Sharing is caring about an RCE attack chain on Quick Share rce demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Or Yair Shmuel Cohen - QuickShell Sharing is caring about an RCE attack chain on Quick Share.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Paul Gerste - SQL Injection Isn't Dead Smuggling Queries at the Protocol Level.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Pete Stegemeyer - A Treasure Trove of Failures What Historys Greatest Heist Can Teach Us About Defense In Depth.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Ron Ben-Yizhak David Shandalov - SHIM me what you got - Manipulating Shim and Office for Code Injection.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Ryan Johnson - Android App Usage and Cell Tower Location Private Sensitive Available to Anyone - samsung app usage kpermon.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Ryan Johnson - Android App Usage and Cell Tower Location Private Sensitive Available to Anyone - samsung cell tower leak.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Ryan Johnson - Android App Usage and Cell Tower Location Private Sensitive Available to Anyone.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - S1nn3r - Smishing Smackdown Unraveling the Threads of USPS Smishing and Fighting Back.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Sam Curry - Hacking Millions of Modems (and Investigating Who Hacked My Modem).pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Samy Kamkar -Optical Espionage Using Lasers to Hear Keystrokes Through Glass Windows.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Silvia Puglisi Roger Dingledine - Measuring the Tor Network.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - stacksmashing - ACE up the Sleeve From getting JTAG on the iPhone 15 to hacking into Apples new USB-C Controller.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Stephen Sims - The Rise and Fall of Binary Exploitation.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Suha Sabi Hussain - Incubated Machine Learning Exploits Backdooring ML Pipelines Using Input-Handling Bugs.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Thomas Boejstrup Johansen - Why are you still using my server for your internet access.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Thomas Roccia - The XZ Backdoor Story The Undercover Operation That Set the Internet on Fire.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Thomas Sermpinis - The hack the crash and two smoking barrels (And all the times I (almost) killed an engineer).pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Timm Lauser Jannis Hamborg - Redefining V2G - How to use your vehicle as a game controller.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Tom Cross Greg Conti - Deception & Counter Deception - Defending Yourself in a World Full of Lies.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Tony Sager - Stranger in a Changed Land.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Vangelis Stykas - Behind Enemy Lines Engaging and disrupting Ransomware Web Panels.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Vincent Lenders Johannes Willbold Robin Bisping - Breaking the Beam Exploiting VSAT Satellite Modems from the Earths Surface-demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Vincent Lenders Johannes Willbold Robin Bisping - Breaking the Beam Exploiting VSAT Satellite Modems from the Earths Surface.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Vladyslav Zubkov Martin Strohmeier - Exploiting Bluetooth - from your car to the bank account$$.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - WangJunJie Zhang YiSheng He - Defeating magic by magic Using ALPC security features to compromise RPC services-launch-system-shell.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - WangJunJie Zhang YiSheng He - Defeating magic by magic Using ALPC security features to compromise RPC services.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Wesley McGrew - Reverse Engineering MicroPython Frozen Modules Data Structures Reconstruction and Reading Bytecode.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Xavier Zhang - Mutual authentication is optional-downgrade.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Xavier Zhang - Mutual authentication is optional-SE.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Xavier Zhang - Mutual authentication is optional.pdf

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Xiling Gong Eugene Rodionov Xuan Xing - The Way to Android Root Exploiting Your GPU on Smartphone - demo.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Yisroel Mirsky Roy Weiss Daniel Ayzenshteyn Guy Amit - Your AI Assistant has a Big Mouth A New Side-Channel Attack-Demonstration Microsoft.mp4

Congress

Congress

DefCon

10.8.24

DEF CON 32 - Yisroel Mirsky Roy Weiss Daniel Ayzenshteyn Guy Amit - Your AI Assistant has a Big Mouth A New Side-Channel Attack.pdf

Congress

Congress

DefCon