DEF CON 22

Photo unavailable
Category:
Date:
06/15/20 at 10:52pm GMT+1
Submitter:
Seeders:
0
Leechers:
2
File size:
215.8 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
55f01811f2066506e57dee34d9d448f2d1148177


File list

  • DEF CON 22
  • icon DEF CON 22 audio/DEF CON 22 - Adrian Crenshaw - Dropping Docs on Darknets - How People Got Caught - Audio.lrc 44.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Adrian Crenshaw - Dropping Docs on Darknets - How People Got Caught - Audio.m4b 32.4 MB
    icon DEF CON 22 audio/DEF CON 22 - Adrian Crenshaw - Dropping Docs on Darknets - How People Got Caught.txt 36.6 KB
    icon DEF CON 22 audio/DEF CON 22 - Alex Pinto & Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds - Audio.lrc 42.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Alex Pinto & Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds - Audio.m4b 27 MB
    icon DEF CON 22 audio/DEF CON 22 - Alex Pinto & Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds.txt 36.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Alex Pinto - Secure Because Math - A Deep Dive On Machine Learning - Based Monitoring - Audio.lrc 42.1 KB
    icon DEF CON 22 audio/DEF CON 22 - Alex Pinto - Secure Because Math - A Deep Dive On Machine Learning - Based Monitoring - Audio.m4b 29.4 MB
    icon DEF CON 22 audio/DEF CON 22 - Alex Pinto - Secure Because Math - A Deep Dive On Machine Learning - Based Monitoring.txt 35.2 KB
    icon DEF CON 22 audio/DEF CON 22 - Alex Zacharis & Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman - Audio.lrc 28.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Alex Zacharis & Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman - Audio.m4b 23.4 MB
    icon DEF CON 22 audio/DEF CON 22 - Alex Zacharis & Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman.txt 22.6 KB
    icon DEF CON 22 audio/DEF CON 22 - Alexandre Moneger - Generating ROP payloads from numbers - Audio.lrc 40.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Alexandre Moneger - Generating ROP payloads from numbers - Audio.m4b 26.5 MB
    icon DEF CON 22 audio/DEF CON 22 - Alexandre Moneger - Generating ROP payloads from numbers.txt 33.8 KB
    icon DEF CON 22 audio/DEF CON 22 - Anch - The Monkey in the Middle - A pentesters guide to playing in traffic - Audio.lrc 46.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Anch - The Monkey in the Middle - A pentesters guide to playing in traffic - Audio.m4b 33.6 MB
    icon DEF CON 22 audio/DEF CON 22 - Anch - The Monkey in the Middle - A pentesters guide to playing in traffic.txt 38.7 KB
    icon DEF CON 22 audio/DEF CON 22 - Andrew Hunt - Raspberry MoCA - A recipe for compromise - Audio.lrc 20.9 KB
    icon DEF CON 22 audio/DEF CON 22 - Andrew Hunt - Raspberry MoCA - A recipe for compromise - Audio.m4b 14 MB
    icon DEF CON 22 audio/DEF CON 22 - Andrew Hunt - Raspberry MoCA - A recipe for compromise.txt 17.6 KB
    icon DEF CON 22 audio/DEF CON 22 - Anton Sapozhnikov - Acquire current user hashes without admin privileges - Audio.lrc 17.9 KB
    icon DEF CON 22 audio/DEF CON 22 - Anton Sapozhnikov - Acquire current user hashes without admin privileges - Audio.m4b 16.6 MB
    icon DEF CON 22 audio/DEF CON 22 - Anton Sapozhnikov - Acquire current user hashes without admin privileges.txt 14.8 KB
    icon DEF CON 22 audio/DEF CON 22 - Blake Self & Shawn (cisc0ninja) Burrell - Don't DDoS Me Bro - Practical DDoS Defense - Audio.lrc 44.9 KB
    icon DEF CON 22 audio/DEF CON 22 - Blake Self & Shawn (cisc0ninja) Burrell - Don't DDoS Me Bro - Practical DDoS Defense - Audio.m4b 25.2 MB
    icon DEF CON 22 audio/DEF CON 22 - Blake Self & Shawn (cisc0ninja) Burrell - Don't DDoS Me Bro - Practical DDoS Defense.txt 38.8 KB
    icon DEF CON 22 audio/DEF CON 22 - Brady Bloxham - Getting Windows to Play with Itself - A Hacker's Guide to Windows API Abuse - Audio.lrc 33.7 KB
    icon DEF CON 22 audio/DEF CON 22 - Brady Bloxham - Getting Windows to Play with Itself - A Hacker's Guide to Windows API Abuse - Audio.m4b 23.3 MB
    icon DEF CON 22 audio/DEF CON 22 - Brady Bloxham - Getting Windows to Play with Itself - A Hacker's Guide to Windows API Abuse.txt 27.8 KB
    icon DEF CON 22 audio/DEF CON 22 - Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations - Audio.m4b 23.1 MB
    icon DEF CON 22 audio/DEF CON 22 - Brian Gorenc & Matt Molinyawe - Blowing up the Celly - Building Your Own SMS_MMS Fuzzer - Audio.lrc 19.2 KB
    icon DEF CON 22 audio/DEF CON 22 - Brian Gorenc & Matt Molinyawe - Blowing up the Celly - Building Your Own SMS_MMS Fuzzer - Audio.m4b 14.1 MB
    icon DEF CON 22 audio/DEF CON 22 - Brian Gorenc & Matt Molinyawe - Blowing up the Celly - Building Your Own SMS_MMS Fuzzer.txt 16 KB
    icon DEF CON 22 audio/DEF CON 22 - Cesar Cerrudo - Hacking US (and UK & Australia & France etc.) traffic control systems - Audio.lrc 31.9 KB
    icon DEF CON 22 audio/DEF CON 22 - Cesar Cerrudo - Hacking US (and UK & Australia & France etc.) traffic control systems - Audio.m4b 29.1 MB
    icon DEF CON 22 audio/DEF CON 22 - Cesar Cerrudo - Hacking US (and UK & Australia & France etc.) traffic control systems.txt 27.6 KB
    icon DEF CON 22 audio/DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces - Audio.lrc 37.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces - Audio.m4b 31.2 MB
    icon DEF CON 22 audio/DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces.txt 31.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Charlie Vedaa & Mike Larsen - Impostor - Polluting Tor Metadata - Audio.lrc 17.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Charlie Vedaa & Mike Larsen - Impostor - Polluting Tor Metadata - Audio.m4b 14.2 MB
    icon DEF CON 22 audio/DEF CON 22 - Charlie Vedaa & Mike Larsen - Impostor - Polluting Tor Metadata.txt 14.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SE - Audio.m4b 35.5 MB
    icon DEF CON 22 audio/DEF CON 22 - Chris Littlebury - Home Alone with localhost - Automating Home Defense - Audio.lrc 35.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Chris Littlebury - Home Alone with localhost - Automating Home Defense - Audio.m4b 29.6 MB
    icon DEF CON 22 audio/DEF CON 22 - Chris Littlebury - Home Alone with localhost - Automating Home Defense.txt 29.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Christian (quaddi) Dameff & Jeff (r3plicant) Tully & Peter Hefley - Hacking 911 - Adventures in Disruption & Destruction and Death - Audio.m4b 28 MB
    icon DEF CON 22 audio/DEF CON 22 - Christian (quaddi) Dameff & Jeff (r3plicant) Tully & Peter Hefley - Hacking 911 - Adventures in Disruption Destruction and Death - Audio.lrc 49.8 KB
    icon DEF CON 22 audio/DEF CON 22 - Christian (quaddi) Dameff & Jeff (r3plicant) Tully & Peter Hefley - Hacking 911 - Adventures in Disruption Destruction and Death.txt 42.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Campbell - The $env - PATH less Traveled is Full of Easy Privilege Escalation Vulns - Audio.lrc 16.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Campbell - The $env - PATH less Traveled is Full of Easy Privilege Escalation Vulns - Audio.m4b 11.7 MB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Campbell - The $env - PATH less Traveled is Full of Easy Privilege Escalation Vulns.txt 13.5 KB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Campbell - The Secret Life of Krbtgt - Audio.lrc 14.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Campbell - The Secret Life of Krbtgt - Audio.m4b 11.6 MB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Campbell - The Secret Life of Krbtgt.txt 11.6 KB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Soghoian - Blinding The Surveillance State - Audio.lrc 39 KB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Soghoian - Blinding The Surveillance State - Audio.m4b 26.7 MB
    icon DEF CON 22 audio/DEF CON 22 - Christopher Soghoian - Blinding The Surveillance State.txt 32.7 KB
    icon DEF CON 22 audio/DEF CON 22 - CJ Heres & Amir Etemadieh & Mike Baker & Hans Nielsen - Hack All The Things - 20 Devices in 45 Minutes - Audio.flac.m4b 30.2 MB
    icon DEF CON 22 audio/DEF CON 22 - CJ Heres & Amir Etemadieh & Mike Baker & Hans Nielsen - Hack All The Things - 20 Devices in 45 Minutes - Audio.lrc 39.4 KB
    icon DEF CON 22 audio/DEF CON 22 - CJ Heres & Amir Etemadieh & Mike Baker & Hans Nielsen - Hack All The Things - 20 Devices in 45 Minutes.txt 32.2 KB
    icon DEF CON 22 audio/DEF CON 22 - Corey Kallenberg & Xeno Kovah - Extreme Privilege Escalation On Windows 8 UEFI Systems - Audio.lrc 43.2 KB
    icon DEF CON 22 audio/DEF CON 22 - Corey Kallenberg & Xeno Kovah - Extreme Privilege Escalation On Windows 8 UEFI Systems - Audio.m4b 27.9 MB
    icon DEF CON 22 audio/DEF CON 22 - Corey Kallenberg & Xeno Kovah - Extreme Privilege Escalation On Windows 8 UEFI Systems.txt 36.2 KB
    icon DEF CON 22 audio/DEF CON 22 - Dan Kaminsky - Secure Random Default - Audio.lrc 89.9 KB
    icon DEF CON 22 audio/DEF CON 22 - Dan Kaminsky - Secure Random Default - Audio.m4b 61.6 MB
    icon DEF CON 22 audio/DEF CON 22 - Dan Kaminsky - Secure Random Default.txt 75.1 KB
    icon DEF CON 22 audio/DEF CON 22 - Dark Tangent & LosT - Welcome & Making of the DEF CON Badge - Audio.lrc 36.2 KB
    icon DEF CON 22 audio/DEF CON 22 - Dark Tangent & LosT - Welcome & Making of the DEF CON Badge - Audio.m4b 27.2 MB
    icon DEF CON 22 audio/DEF CON 22 - Dark Tangent & LosT - Welcome & Making of the DEF CON Badge.txt 30.3 KB
    icon DEF CON 22 audio/DEF CON 22 - David Dorsey - Why Dont You Just Tell Me Where The ROP Isnt Suppose To Go - Audio.lrc 12.5 KB
    icon DEF CON 22 audio/DEF CON 22 - David Dorsey - Why Dont You Just Tell Me Where The ROP Isnt Suppose To Go - Audio.m4b 8.1 MB
    icon DEF CON 22 audio/DEF CON 22 - David Dorsey - Why Dont You Just Tell Me Where The ROP Isnt Suppose To Go.txt 10.5 KB
    icon DEF CON 22 audio/DEF CON 22 - David Kennedy - Destroying Education and Awareness Programs - Audio.m4b 32.8 MB
    icon DEF CON 22 audio/DEF CON 22 - David Litchfield - Oracle Data Redaction is Broken - Audio.lrc 28.3 KB
    icon DEF CON 22 audio/DEF CON 22 - David Litchfield - Oracle Data Redaction is Broken - Audio.m4b 32.2 MB
    icon DEF CON 22 audio/DEF CON 22 - David Litchfield - Oracle Data Redaction is Broken.txt 28 KB
    icon DEF CON 22 audio/DEF CON 22 - David Wyde - Client - Side HTTP Cookie Security - Attack and Defense - Audio.lrc 32.4 KB
    icon DEF CON 22 audio/DEF CON 22 - David Wyde - Client - Side HTTP Cookie Security - Attack and Defense - Audio.m4b 21.5 MB
    icon DEF CON 22 audio/DEF CON 22 - David Wyde - Client - Side HTTP Cookie Security - Attack and Defense.txt 27.5 KB
    icon DEF CON 22 audio/DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse - Audio.lrc 58 KB
    icon DEF CON 22 audio/DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse - Audio.m4b 38.3 MB
    icon DEF CON 22 audio/DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse.txt 50.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Dhia Mahjoub & Thibault Reuille & Andree Toonk - Catching Malware En Masse - DNS and IP Style - Audio.lrc 50.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Dhia Mahjoub & Thibault Reuille & Andree Toonk - Catching Malware En Masse - DNS and IP Style - Audio.m4b 28.2 MB
    icon DEF CON 22 audio/DEF CON 22 - Dhia Mahjoub & Thibault Reuille & Andree Toonk - Catching Malware En Masse - DNS and IP Style.txt 42.3 KB
    icon DEF CON 22 audio/DEF CON 22 - Dominic White & Ian de Villiers - Manna from Heaven - Improving the state of wireless rogue AP attacks - Audio.lrc 47.7 KB
    icon DEF CON 22 audio/DEF CON 22 - Dominic White & Ian de Villiers - Manna from Heaven - Improving the state of wireless rogue AP attacks - Audio.m4b 25.6 MB
    icon DEF CON 22 audio/DEF CON 22 - Dominic White & Ian de Villiers - Manna from Heaven - Improving the state of wireless rogue AP attacks.txt 40.7 KB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Phil Polstra & Captain Polly - Cyberhijacking Airplanes - Truth or Fiction - Audio.lrc 39.8 KB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Phil Polstra & Captain Polly - Cyberhijacking Airplanes - Truth or Fiction - Audio.m4b 28.2 MB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Phil Polstra & Captain Polly - Cyberhijacking Airplanes - Truth or Fiction.txt 32.8 KB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Phil Polstra - Am I Being Spied On.. Low-tech Ways Of Detecting High-tech Surveillance - Audio.lrc 33.4 KB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Phil Polstra - Am I Being Spied On.. Low-tech Ways Of Detecting High-tech Surveillance - Audio.m4b 26.3 MB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Phil Polstra - Am I Being Spied On.. Low-tech Ways Of Detecting High-tech Surveillance.txt 28.8 KB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Thomas Holt & Olga Smirnova & Yi-Ting Chua - Stolen Data Markets An Economic and Organizational Assessment - Audio.lrc 47.2 KB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Thomas Holt & Olga Smirnova & Yi-Ting Chua - Stolen Data Markets An Economic and Organizational Assessment - Audio.m4b 28.2 MB
    icon DEF CON 22 audio/DEF CON 22 - Dr. Thomas Holt & Olga Smirnova & Yi-Ting Chua - Stolen Data Markets An Economic and Organizational Assessment.txt 39.9 KB

Similar Torrents