DEF CON 18

Photo unavailable
Category:
Date:
07/22/20 at 1:06am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
28 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
049edf1f61ed66f355f4f386b52c1a4c36a75229


File list

  • DEF CON 18
  • icon DEF CON 18 audio/DEF CON 18 - A.P. Delchi - Physical Security You Are Doing It Wrong - Audio.m4b 19.2 MB
    icon DEF CON 18 audio/DEF CON 18 - Adam Pridgen and Matt Wollenweber - Toolsmithing an IDA Bridge - Audio.m4b 8 MB
    icon DEF CON 18 audio/DEF CON 18 - Adrian Crenshaw - Programmable HID USB Keystroke Dongle - Audio.m4b 12.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Ahn Ki-Chan and Ha Dong-Joo - Malware Migrating to Gaming Consoles - Audio.m4b 9.9 MB
    icon DEF CON 18 audio/DEF CON 18 - Andrew Kongs and Dr. Gerald Kane - Training the Next Generation of Hardware Hackers - Audio.m4b 3.9 MB
    icon DEF CON 18 audio/DEF CON 18 - BarnaJack - Jackpotting Automated Teller Machines Redux - Audio.m4b 8.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Barrett Weisshaar and Garret Picchioni - The Night The Lights Went Out In Vegas - Audio.m4b 10.9 MB
    icon DEF CON 18 audio/DEF CON 18 - Blake Self and bitemytaco - Hacking DOCSIS For Fun and Profit - Audio.m4b 10.2 MB
    icon DEF CON 18 audio/DEF CON 18 - Blake Self with Wayne and Dolores Zage - SMART Project - Audio.m4b 4.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Brad Smith - Weaponizing Lady GaGa - Audio.m4b 9.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Brandon Nesbit - The Games We Play - Audio.m4b 9.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Bruce Potter and Logan Lodge - This Needs to be Fixed - Audio.m4b 8.2 MB
    icon DEF CON 18 audio/DEF CON 18 - Cesar Cerrudo - Token Kidnappings Revenge - Audio.m4b 12.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Chad Houck and Jason Lee - Decoding reCAPTCHA - Audio.m4b 7.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Charlie Miller - Kim Jong-il and Me - Audio.m4b 10.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Chema Alonso and Jose Palazon - Connection String Parameter Attacks - Audio.m4b 8.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Chema Alonso and Jose Palazon - FOCA2 The FOCA Strikes Back - Audio.m4b 8.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Chris Conley - Hacking Facebook Privacy - Audio.m4b 6.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Chris Paget - Extreme-Range RFID Tracking - Audio.m4b 10.2 MB
    icon DEF CON 18 audio/DEF CON 18 - Chris Paget - Practical Cellphone Spying - Audio.m4b 11.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Christopher Soghoian - Your ISP and the Government BFF - Audio.m4b 9.4 MB
    icon DEF CON 18 audio/DEF CON 18 - Craig Heffner - How to Hack Millions of Routers - Audio.m4b 7.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Dan Kaminsky - Black Ops Of Defense Web Edition - Audio.m4b 12.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Daniel Burroughs - Open Public Sensors and Trend Monitoring - Audio.m4b 5.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Dark Tangent and Joe Grand - Welcome and Making the Badge - Audio.m4b 15.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Dave King - Hardware Hacking for Software Guys - Audio.m4b 10.4 MB
    icon DEF CON 18 audio/DEF CON 18 - David Bryan and Michael Anderson - Cloud Computing and a WMD - Audio.m4b 6.8 MB
    icon DEF CON 18 audio/DEF CON 18 - David C Smith and Samuel Petreski - A New Approach to Forensic Methodology - Audio.m4b 10.3 MB
    icon DEF CON 18 audio/DEF CON 18 - David Kennedy and Josh Kelley - Powershell omfg - Audio.m4b 8.5 MB
    icon DEF CON 18 audio/DEF CON 18 - David Maynor and Paul Judge - Searching for Malware - Audio.m4b 9.2 MB
    icon DEF CON 18 audio/DEF CON 18 - Decius - Exploiting Internet Surveillance Systems - Audio.m4b 9.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Dennis Brown - How Hackers Won the Zombie Apocalypse - Audio.m4b 7.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Dennis Brown - Resilient Botnet Command and Control with Tor - Audio.m4b 9.9 MB
    icon DEF CON 18 audio/DEF CON 18 - Deviant Ollam and Toool - The Search for Perfect Handcuffs - Audio.m4b 10.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Dondi West - Adequacy of the Laws Related to Cyber Warfare - Audio.m4b 7.9 MB
    icon DEF CON 18 audio/DEF CON 18 - Doug Mohney - HD Voice - The Overdue Revolution - Audio.m4b 10.7 MB
    icon DEF CON 18 audio/DEF CON 18 - Ed Schaller - Exploiting WebSphere Application Servers JSP Engine - Audio.m4b 7.4 MB
    icon DEF CON 18 audio/DEF CON 18 - Elie Bursztein and Jocelyn Lagarenne - Kartograph - Audio.m4b 9.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Elie Bursztein and Panel - Bad Memories - Audio.m4b 9.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Esteban Martinez Fayo - Hacking and Protecting Oracle Database Vault - Audio.m4b 12.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Felix FX Lindner - Blitzableiter - Audio.m4b 11.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Ferdinand Schober - Gaming in the Glass Safe - Audio.m4b 11.4 MB
    icon DEF CON 18 audio/DEF CON 18 - Francisco Amato and Federico Kirschbaum - Evilgrade and You Still Have Pending Upgrades - Audio.m4b 4.9 MB
    icon DEF CON 18 audio/DEF CON 18 - Frank Breedijk - Seccubus - Analyzing Vulnerability Assessment Data the Easy Way - Audio.m4b 6.7 MB
    icon DEF CON 18 audio/DEF CON 18 - Fyodor and David Fifield - Mastering the Nmap Scripting Engine - Audio.m4b 9.3 MB
    icon DEF CON 18 audio/DEF CON 18 - G Mark Hardy - Tales from the Crypto - Audio.m4b 10.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Garry Pejski - My Life as a Spyware Developer - Audio.m4b 8.7 MB
    icon DEF CON 18 audio/DEF CON 18 - Granick Bankston Hofmann and Opsahl - The Law of Laptop Search and Seizure - Audio.m4b 10.7 MB
    icon DEF CON 18 audio/DEF CON 18 - Greg Conti - Our Instrumented Lives - Audio.m4b 8.8 MB
    icon DEF CON 18 audio/DEF CON 18 - HONEY - Ripping Media Off Of the Wire - Audio.m4b 15.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Huang Chiu and Wu - 0box Analyzer - Audio.m4b 7.7 MB
    icon DEF CON 18 audio/DEF CON 18 - Iftach Ian Amit- Cyber Crime War Charting Dangerous Waters - Audio.m4b 11.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Itzhak Avraham Exploitation on ARM - Audio.m4b 7.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Jack Daniel and Panel - PCI and Compromising Controls and Compromising Security - Audio.m4b 12.7 MB
    icon DEF CON 18 audio/DEF CON 18 - James Arlen - SCADA and ICS How to Avoid Cyberdouchery - Audio.m4b 10.7 MB
    icon DEF CON 18 audio/DEF CON 18 - James Shewmaker - Browser Based Defenses - Audio.m4b 11.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Jason Scott - You are Stealing It Wrong 30 Years of Inter-Pirate Battles - Audio.m4b 12.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Jayson E Street - Deceiving the Heavens to Cross the Sea - Audio.m4b 10.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Jeff Bryner - Google Toolbar The NARC Within - Audio.m4b 2.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Jennifer Granick and Matt Zimmerman - Legal Developments in Hardware Hacking - Audio.m4b 10 MB
    icon DEF CON 18 audio/DEF CON 18 - Jeongwook Oh - Exploit Spotting Locating Vulnerabilities Out of Vendor Patches Automatically - Audio.m4b 11.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Jeremy Brown - Exploiting SCADA Systems - Audio.m4b 6.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Jim Rennie and Eric Rachner - Search & Seizure & Golfballs - Audio.m4b 10 MB
    icon DEF CON 18 audio/DEF CON 18 - Jimi Fiekert - The Anatomy of Drug Testing - Audio.m4b 11.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Joe Damato - Function Hooking for Mac OSX and Linux - Audio.m4b 7.5 MB
    icon DEF CON 18 audio/DEF CON 18 - John Curran - IPv6 No Longer Optional - Audio.m4b 10.9 MB
    icon DEF CON 18 audio/DEF CON 18 - John McNabb - Cyberterrorism and the Security of the National Drinking Water Infrastructure - Audio.m4b 10.7 MB
    icon DEF CON 18 audio/DEF CON 18 - Jon McCoy - Hacking Net Applications A Dynamic Attack - Audio.m4b 15.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Jon Oberheide - Antique Exploitation aka Terminator - Audio.m4b 3.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Jonathan Lee and Neil Pahl - Bypassing Smart-Card Authentication and Blocking Debiting - Audio.m4b 6.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Joseph McCray - You Spent All That Money and You Still Got Owned - Audio.m4b 7.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Josh Pyorre and Chris McKenney - Build Your Own Security Ops Center - Audio.m4b 9.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Joshua Marpet - Facial Recognition - Audio.m4b 10 MB
    icon DEF CON 18 audio/DEF CON 18 - Joshua Wise - From No Way to 0-day - Audio.m4b 11.3 MB
    icon DEF CON 18 audio/DEF CON 18 - JP Dunning - Breaking Bluetooth Being Bored - Audio.m4b 8.1 MB
    icon DEF CON 18 audio/DEF CON 18 - JP Dunning - Katana Portable Multi-Boot Security Suite - Audio.m4b 8 MB
    icon DEF CON 18 audio/DEF CON 18 - Justin Morehouse and Tony Flick - Getting Social with the Smart Grid - Audio.m4b 15.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Kenneth Geers - Live Fire Exercise Baltic Cyber Shield 2010 - Audio.m4b 9.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Kevin Mahaffey and John Hering - App Attack - Audio.m4b 8.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Lai Appelbaum and Oberheide - The Power of Chinese Security - Audio.m4b 9.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Leigh Honeywell and follower - Physical Computing and Virtual Security - Audio.m4b 9.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Lineberry Richardson and Wyatt - These Aren't the Permissions - Audio.m4b 11 MB
    icon DEF CON 18 audio/DEF CON 18 - Luiz Eduardo -Your Boss is a Douchebag How About You - Audio.m4b 5 MB
    icon DEF CON 18 audio/DEF CON 18 - Mage2 - Electronic Weaponry - Audio.m4b 4.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Marcia Hofmann - How To Get Your FBI File - Audio.m4b 9.7 MB
    icon DEF CON 18 audio/DEF CON 18 - Marco Bonetti - Mobile Privacy - Audio.m4b 5.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Marisa Fagan - Be a Mentor - Audio.m4b 4.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Matias Madou and Jacob West - Repelling the Wily Insider - Audio.m4b 11.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Matt Krick - DCFluX in Moon-Bouncer - Audio.m4b 10.9 MB
    icon DEF CON 18 audio/DEF CON 18 - Matt Ryanczak - Implementing IPv6 at ARIN - Audio.m4b 10.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Max Kelly - Perspectives in Cybersecurity and Cyberwarfare - Audio.m4b 8.8 MB
    icon DEF CON 18 audio/DEF CON 18 - Md Sohail Ahmad - WPA Too - Audio.m4b 9.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Michael Brooks - masSEXploitation - Audio.m4b 14.1 MB
    icon DEF CON 18 audio/DEF CON 18 - Michael Schearer - SHODAN for Penetration Testers - Audio.m4b 9.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Mike Bailey - Web Services We Just Do Not Need - Audio.m4b 11.3 MB
    icon DEF CON 18 audio/DEF CON 18 - Mike Metzger - Letting the Air Out of Tire Pressure Monitoring Systems - Audio.m4b 4.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Monta Elkins - Hacking with Hardware Introducing URFUKED - Audio.m4b 7.5 MB
    icon DEF CON 18 audio/DEF CON 18 - Moxie Marlinspike - Changing Threats To Privacy From TIA to Google - Audio.m4b 9.6 MB
    icon DEF CON 18 audio/DEF CON 18 - Nathan Hamiel and Marcin Wielgoszewski - Constricting the Web - Audio.m4b 17.3 MB

Similar Torrents