DEF CON 25 video and slides

Photo unavailable
Category:
Date:
03/29/18 at 7:24am GMT+1
Submitter:
Seeders:
0
Leechers:
0
File size:
15.5 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
640afbdcc2e7d2760a3a6410afe76ddfc8a6b317


File list

  • DEF CON 25 video and slides
  • icon DEF CON 25 Conference - Alvaro Munoz and Alexandr Mirosh - Friday the 13th JSON attacks.srt 44.7 KB
    icon DEF CON 25 Conference - Andrea Matwyshyn and Panel - Panel- Meet The Feds.srt 94.4 KB
    icon DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.mp4 181.2 MB
    icon DEF CON 25 Conference - Andy Robbins and Will Schroeder - Designing Active Directory DACL Backdoors.srt 57.6 KB
    icon DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.mp4 168.9 MB
    icon DEF CON 25 Conference - Artem Kondratenko - Cisco Catalyst Exploitation.srt 37.4 KB
    icon DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.mp4 117 MB
    icon DEF CON 25 Conference - Avi Bashan and Slava Makkaveev - Everything you wanted to know about Android packers.srt 29 KB
    icon DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on z OS.srt 62.1 KB
    icon DEF CON 25 Conference - Ayoul3 - Dealing the perfect hand - Shuffling memory blocks on zOS.mp4 186.4 MB
    icon DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.mp4 137.1 MB
    icon DEF CON 25 Conference - Caleb Madrigal - Controlling IoT devices with crafted radio signals.srt 37.4 KB
    icon DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.mp4 63.4 MB
    icon DEF CON 25 Conference - Chaosdata - Ghost in the Droid- Possessing Android Applications with ParaSpectre.srt 25.7 KB
    icon DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.mp4 61.2 MB
    icon DEF CON 25 Conference - Cheng - The spear to break the security wall of S7CommPlus.srt 8.4 KB
    icon DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.mp4 183.9 MB
    icon DEF CON 25 Conference - Chris Sumner - Rage Against the Weaponized AI Propaganda Machine.srt 52.3 KB
    icon DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.mp4 199.9 MB
    icon DEF CON 25 Conference - Chris Thompson - MS Just Gave the Blue Team Tactical Nukes.srt 53.2 KB
    icon DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set .mp4 169.2 MB
    icon DEF CON 25 Conference - Christopher Domas - Breaking the x86 Instruction Set .srt 62 KB
    icon DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.mp4 136.4 MB
    icon DEF CON 25 Conference - Cooper Quintin and Kashmir Hill - The Internet Already Knows I'm Pregnant.srt 46.4 KB
    icon DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward and TRUMPNUM steps back how can we tell if we're winning.mp4 187.3 MB
    icon DEF CON 25 Conference - Cory Doctorow - BIGNUM steps forward, TRUMPNUM steps back how can we tell if we're winning.srt 55.5 KB
    icon DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.mp4 142.1 MB
    icon DEF CON 25 Conference - Damien Cauquil - Weaponizing the BBC Micro Bit.srt 34.2 KB
    icon DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.mp4 151.8 MB
    icon DEF CON 25 Conference - Dan Petro and Ben Morris - Weaponizing Machine Learning- Humanity Was Overrated Anyway.srt 59.6 KB
    icon DEF CON 25 Conference - Daniel Bohannon and Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.mp4 169.2 MB
    icon DEF CON 25 Conference - Daniel Bohannon, Lee Holmes - Revoke-Obfuscation- PowerShell Obfuscation Detection Using Science.srt 61.2 KB
    icon DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time .mp4 149.1 MB
    icon DEF CON 25 Conference - David Robinson - Using GPS Spoofing to control time .srt 39 KB
    icon DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.mp4 86 MB
    icon DEF CON 25 Conference - Dennis Maldonado - Real-time RFID Cloning in the Field.srt 26.6 KB
    icon DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.mp4 65.5 MB
    icon DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifi.srt 22.2 KB
    icon DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp4 85.8 MB
    icon DEF CON 25 Conference - Dimitry Snezhkov - Abusing Webhooks for Command and Control.srt 23.5 KB
    icon DEF CON 25 Conference - Dor Azouri - BITSInject.mp4 81.1 MB
    icon DEF CON 25 Conference - Dor Azouri - BITSInject.srt 19.5 KB
    icon DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.mp4 182.6 MB
    icon DEF CON 25 Conference - Duncan Woodbury and Nicholas Haltmeyer - Linux-Stack Based V2X Framework- All You Need to Hack Connected Vehicles.srt 48.9 KB
    icon DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.mp4 115.8 MB
    icon DEF CON 25 Conference - Elie Bursztein - How we created the first SHA-1 collision and what it means for hash security.srt 48.4 KB
    icon DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.mp4 162.1 MB
    icon DEF CON 25 Conference - Francis Brown and David Latimer - Game of Drones - Putting the Emerging Drone Defense Market to the Test.srt 58.5 KB
    icon DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.mp4 185.7 MB
    icon DEF CON 25 Conference - Gabriel Ryan - The Black Art of Wireless Post Exploitation.srt 68.6 KB
    icon DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.mp4 200.3 MB
    icon DEF CON 25 Conference - Garry Kasparov - The Brain's Last Stand.srt 55.2 KB
    icon DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.mp4 154.9 MB
    icon DEF CON 25 Conference - Gerald Steere - Sean Metcalf - Hacking the Cloud.srt 56.3 KB
    icon DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your (named) pipe.srt 38.1 KB
    icon DEF CON 25 Conference - Gil Cohen - Call the plumber - you have a leak in your named pipe.mp4 158.8 MB
    icon DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.mp4 144.6 MB
    icon DEF CON 25 Conference - Gus Fritschie and Evan Teitelman - Backdooring the Lottery and Other Security Tales in Gaming.srt 46.2 KB
    icon DEF CON 25 Conference - Hanno Bock - Abusing Certificate Transparency Logs.mp4 90.2 MB
    icon DEF CON 25 Conference - Hanno Bock - Abusing Certificate Transparency Logs.srt 31.7 KB
    icon DEF CON 25 Conference - Haoqi Shan and Jian Yuan - Man in the NFC.mp4 141.3 MB
    icon DEF CON 25 Conference - Haoqi Shan, Jian Yuan - Man in the NFC.srt 32.2 KB
    icon DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.mp4 474.4 MB
    icon DEF CON 25 Conference - HighWiz and Malware Unicorn and Niki7a and Roamer and Wiseacre and Shaggy - DEF CON 101 Panel.srt 123.8 KB
    icon DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.mp4 53.6 MB
    icon DEF CON 25 Conference - Hyrum Anderson - Evading next-gen AV using artificial intelligence.srt 22.4 KB
    icon DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.mp4 203.9 MB
    icon DEF CON 25 Conference - Ilja van Sprundel -  Are all BSDs are created equally_ A survey of BSD kernel vulnerabilities.srt 61.3 KB
    icon DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.mp4 122.6 MB
    icon DEF CON 25 Conference - Inbar Raz and Eden Schochat - From One Country - One Floppy to Startup Nation.srt 54.5 KB
    icon DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.mp4 147.2 MB
    icon DEF CON 25 Conference - Itzik Kotler and Amit Klein - The Adventures of AV and the Leaky Sandbox.srt 40.5 KB
    icon DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.mp4 163.1 MB
    icon DEF CON 25 Conference - James Langevin and Will Hurd - DC to DEF CON- Q&A with Congressmen.srt 52.8 KB
    icon DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.mp4 100.2 MB
    icon DEF CON 25 Conference - Jason Haddix - Introducing HUNT- Data Driven Web Hacking & Manual Testing.srt 37.3 KB
    icon DEF CON 25 Conference - Jason Hernandez and Sam Richards and Jerod MacDonald-Evoy - Tracking Spies in the Skies.mp4 150.9 MB
    icon DEF CON 25 Conference - Jason Hernandez and Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the Skies.srt 48.4 KB
    icon DEF CON 25 Conference - Jason Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.mp4 97.9 MB
    icon DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.mp4 215.7 MB
    icon DEF CON 25 Conference - Jeff Moss and Panel - Panel - DEF CON Groups.srt 66.1 KB
    icon DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.mp4 166.2 MB
    icon DEF CON 25 Conference - Jim Nitterauer - DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent.srt 48.2 KB
    icon DEF CON 25 Conference - Joe Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.mp4 173.3 MB
    icon DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.mp4 179.7 MB
    icon DEF CON 25 Conference - Joe Rozner - Wiping out CSRF.srt 52 KB
    icon DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.mp4 173 MB
    icon DEF CON 25 Conference - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human Genome.srt 56 KB
    icon DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks-.mp4 168.3 MB
    icon DEF CON 25 Conference - Jon Medina - Where are the SDN Security Talks-.srt 49.5 KB
    icon DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.mp4 74.7 MB
    icon DEF CON 25 Conference - Josh Datko and Chris Quartier - Breaking Bitcoin Hardware Wallets.srt 24.1 KB
    icon DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.mp4 94.2 MB
    icon DEF CON 25 Conference - JoSh Pitts - Teaching Old Shellcode New Tricks.srt 33.6 KB
    icon DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL and A Modular Malware Implant Framework.mp4 154.6 MB
    icon DEF CON 25 Conference - Josh Schwartz and John Cramb - MEATPISTOL, A Modular Malware Implant Framework.srt 48 KB
    icon DEF CON 25 Conference - Joson Staggs - Breaking Wind- Adventures in Hacking Wind Farm Control Networks.srt 33.7 KB
    icon DEF CON 25 Conference - Jow Fitzpatrick and Michael Leibowitz - How to roll your own counterfeit hardware security devices.srt 59.3 KB
    icon DEF CON 25 Conference - Vulc@n and Panel - The Last CTF Talk You’ll Ever Need - AMA with 20 years of DEF CON CTF.mp4 474.5 MB

Similar Torrents