DEF CON 24

Photo unavailable
Category:
Date:
06/08/19 at 12:05am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
122.4 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
efc27b434532c1b1891eed777c3a661521ccf39f


File list

  • DEF CON 24
  • icon DEF CON 24 audio/DEF CON 24 Conference - 3AlarmLampScooter - DIY Nukeproofing - a new dig at data-mining.lrc 23 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - 3AlarmLampScooter - DIY Nukeproofing - a new dig at data-mining.m4a 36.5 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - 3AlarmLampScooter - DIY Nukeproofing - a new dig at data-mining.opus 12.7 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Aaron Luo - Drones Hijacking - multi-dimensional attack vectors - countermeasures.lrc 20.1 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Aaron Luo - Drones Hijacking - multi-dimensional attack vectors - countermeasures.m4a 85.3 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Aaron Luo - Drones Hijacking - multi-dimensional attack vectors - countermeasures.opus 31.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Adam Donenfeld - Stumping the Mobile Chipset.lrc 39.2 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Adam Donenfeld - Stumping the Mobile Chipset.m4a 94 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Adam Donenfeld - Stumping the Mobile Chipset.opus 30.5 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Alex Chapman and Paul Stone - Toxic Proxies - Bypassing HTTPS.lrc 52.6 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Alex Chapman and Paul Stone - Toxic Proxies - Bypassing HTTPS.m4a 108.3 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Alex Chapman and Paul Stone - Toxic Proxies - Bypassing HTTPS.opus 30.9 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Allan Cecil - Robot Hacks - TASBot Exploits Consoles with Custom Controllers.lrc 47.9 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Allan Cecil - Robot Hacks - TASBot Exploits Consoles with Custom Controllers.m4a 83.4 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Allan Cecil - Robot Hacks - TASBot Exploits Consoles with Custom Controllers.opus 29.7 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Amro Abdelgawad - The Remote Metamorphic Engine - Detecting - Evading - Attacking.lrc 49.4 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Amro Abdelgawad - The Remote Metamorphic Engine - Detecting - Evading - Attacking.m4a 74 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Amro Abdelgawad - The Remote Metamorphic Engine - Detecting - Evading - Attacking.opus 33.4 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Anch - So you think you want to be a penetration tester.lrc 40.6 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Anch - So you think you want to be a penetration tester.m4a 102.3 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Anch - So you think you want to be a penetration tester.opus 28.6 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Andy Robbins - Rohan Vazarkar - Will Schroeder - Six Degrees of Domain Admin.lrc 49.8 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Andy Robbins - Rohan Vazarkar - Will Schroeder - Six Degrees of Domain Admin.m4a 97 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Andy Robbins - Rohan Vazarkar - Will Schroeder - Six Degrees of Domain Admin.opus 32.5 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Ang Cui - A Monitor Darkly - Reversing and Exploiting Ubiquitous.lrc 41.6 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Ang Cui - A Monitor Darkly - Reversing and Exploiting Ubiquitous.m4a 70 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Ang Cui - A Monitor Darkly - Reversing and Exploiting Ubiquitous.opus 23.6 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Anthony Rose - Ben Ramsey - Picking Bluetooth Low Energy Locks a Quarter Mile Away.lrc 51.5 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Anthony Rose - Ben Ramsey - Picking Bluetooth Low Energy Locks a Quarter Mile Away.m4a 104.3 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Anthony Rose - Ben Ramsey - Picking Bluetooth Low Energy Locks a Quarter Mile Away.opus 27.3 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Benjamin Holland - Developing Managed Code Rootkits for Java Runtime Environment.lrc 48.1 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Benjamin Holland - Developing Managed Code Rootkits for Java Runtime Environment.m4a 104.5 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Benjamin Holland - Developing Managed Code Rootkits for Java Runtime Environment.opus 27.6 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Bertin Bervis Bonilla and James Jara - Exploiting seismological networks Remotely.lrc 34.7 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Bertin Bervis Bonilla and James Jara - Exploiting seismological networks Remotely.m4a 101.1 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Bertin Bervis Bonilla and James Jara - Exploiting seismological networks Remotely.opus 28.1 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brad Dixon - pin2pwn - How to Root an Embedded Linux Box with a Sewing Needle.lrc 17.3 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brad Dixon - pin2pwn - How to Root an Embedded Linux Box with a Sewing Needle.m4a 33.4 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brad Dixon - pin2pwn - How to Root an Embedded Linux Box with a Sewing Needle.opus 11.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brad Woodberg - Malware Command and Control Channels - A journey into darkness.lrc 61.6 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brad Woodberg - Malware Command and Control Channels - A journey into darkness.m4a 113.7 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brad Woodberg - Malware Command and Control Channels - A journey into darkness.opus 32.9 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brian Gorenc and Fritz Sands - State of the Union for SCADA HMI Vulnerabilities.lrc 46.2 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brian Gorenc and Fritz Sands - State of the Union for SCADA HMI Vulnerabilities.m4a 104 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Brian Gorenc and Fritz Sands - State of the Union for SCADA HMI Vulnerabilities.opus 28.4 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Bryant Zadegan and Ryan Lester - Abusing Web Standards for AppSec Glory.lrc 51.7 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Bryant Zadegan and Ryan Lester - Abusing Web Standards for AppSec Glory.m4a 114.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Bryant Zadegan and Ryan Lester - Abusing Web Standards for AppSec Glory.opus 32.6 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Chris Eagle - Sk3wlDbg - Emulating many of the things with Ida.lrc 57.5 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Chris Eagle - Sk3wlDbg - Emulating many of the things with Ida.m4a 100.7 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Chris Eagle - Sk3wlDbg - Emulating many of the things with Ida.opus 33.9 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Chris Rock - How to overthrow a Government.lrc 36.9 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Chris Rock - How to overthrow a Government.m4a 92.7 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Chris Rock - How to overthrow a Government.opus 31.5 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - CINCVolFLT - AK3R303 - NG911 - The Next Gen of Emergency Ph0nage.lrc 63 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - CINCVolFLT - AK3R303 - NG911 - The Next Gen of Emergency Ph0nage.m4a 117.9 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - CINCVolFLT - AK3R303 - NG911 - The Next Gen of Emergency Ph0nage.opus 32.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Clarence Chio - Machine Duping 101 - Pwning Deep Learning Systems.lrc 46.2 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Clarence Chio - Machine Duping 101 - Pwning Deep Learning Systems.m4a 117.6 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Clarence Chio - Machine Duping 101 - Pwning Deep Learning Systems.opus 30.3 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dan AltF4 Petro - Reversing Video Games to Create an Unbeatable AI Player.lrc 58.4 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dan AltF4 Petro - Reversing Video Games to Create an Unbeatable AI Player.m4a 119.1 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dan AltF4 Petro - Reversing Video Games to Create an Unbeatable AI Player.opus 30.4 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - DC101 - DEF CON 101 Panel.lrc 81.2 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - DC101 - DEF CON 101 Panel.m4a 241.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - DC101 - DEF CON 101 Panel.opus 62.6 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Delta Zero and KingPhish3r - Weaponizing Data Science for Social Engineering.lrc 54.3 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Delta Zero and KingPhish3r - Weaponizing Data Science for Social Engineering.m4a 99.5 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Delta Zero and KingPhish3r - Weaponizing Data Science for Social Engineering.opus 33.6 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dr Paul Vixie - Frontrunning The Frontrunners.lrc 18.2 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dr Paul Vixie - Frontrunning The Frontrunners.m4a 39.8 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dr Paul Vixie - Frontrunning The Frontrunners.opus 12.9 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dr Phil - Mouse Jiggler Offense and Defense.lrc 44.4 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dr Phil - Mouse Jiggler Offense and Defense.m4a 105.3 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Dr Phil - Mouse Jiggler Offense and Defense.opus 31 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Elie Bursztein - Celine Bursztein - Jean Michel Picod - Cheating at Poker.lrc 31.8 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Elie Bursztein - Celine Bursztein - Jean Michel Picod - Cheating at Poker.m4a 63.8 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Elie Bursztein - Celine Bursztein - Jean Michel Picod - Cheating at Poker.opus 20.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Evan Booth Fort - Jittery MacGyver - Building a Bionic Hand out of a Coffee Maker.lrc 45.1 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Evan Booth Fort - Jittery MacGyver - Building a Bionic Hand out of a Coffee Maker.m4a 102 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Evan Booth Fort - Jittery MacGyver - Building a Bionic Hand out of a Coffee Maker.opus 33.4 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Fred Bret-Mounet - All Your Solar Panels are belong to Me.lrc 18.5 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Fred Bret-Mounet - All Your Solar Panels are belong to Me.m4a 53.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Fred Bret-Mounet - All Your Solar Panels are belong to Me.opus 15.4 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Grant Bugher - Bypassing Captive Portals and Limited Networks.lrc 18.5 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Grant Bugher - Bypassing Captive Portals and Limited Networks.m4a 36.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Grant Bugher - Bypassing Captive Portals and Limited Networks.opus 12.9 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Guevara Noubir and Amirali Sanatinia - Exposing Snooping Tor HSDir Relays.lrc 24.7 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Guevara Noubir and Amirali Sanatinia - Exposing Snooping Tor HSDir Relays.m4a 53.1 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Guevara Noubir and Amirali Sanatinia - Exposing Snooping Tor HSDir Relays.opus 17.3 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Hacker Jeopardy Part 1.m4a 209.8 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Hacker Jeopardy Part 1.opus 69.4 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Hacker Jeopardy Part 2.m4a 201 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Hacker Jeopardy Part 2.opus 70.2 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Haoqi Shan and Wanqiao Zhang - Forcing a Targeted LTE phone into Unsafe Network.lrc 26.2 KB
    icon DEF CON 24 audio/DEF CON 24 Conference - Haoqi Shan and Wanqiao Zhang - Forcing a Targeted LTE phone into Unsafe Network.m4a 69.8 MB
    icon DEF CON 24 audio/DEF CON 24 Conference - Haoqi Shan and Wanqiao Zhang - Forcing a Targeted LTE phone into Unsafe Network.opus 23.9 MB
    icon DEF CON 24 Program.pdf 18.4 MB
    icon DEF CON 24 Receipt.pdf 12.5 MB

Similar Torrents