defcon-talks
- 收录时间:2025-03-05 15:48:32
- 文件大小:36GB
- 下载次数:1
- 最近下载:2025-03-05 15:48:32
- 磁力链接:
-
文件列表
- 54816-high_intensity_deconstruction_chronicles_of_a_cryptographic_heist.mp4 913MB
- 54817-listen_to_the_whispers_web_timing_attacks_that_actually_work.mp4 778MB
- 54853-the_pwnie_awards-partial.mp4 763MB
- 54846-exploiting_bluetooth_-_from_your_car_to_the_bank_account.mp4 593MB
- 54828-def_con_unplugged_cocktails_and_cyber_with_jeff_and_jen.mp4 581MB
- 54871-eradicating_hepatitis_c_with_bioterrorism.mp4 579MB
- 54857-the_rise_and_fall_of_binary_exploitation.mp4 574MB
- 54844-bricked_and_abandoned_how_to_keep_the_iot_from_becoming_an_internet_of_trash.mp4 573MB
- 54843-breaking_secure_web_gateways_swg_for_fun_and_profit.mp4 569MB
- 54888-iconv_set_the_charset_to_rce_exploiting_the_glibc_to_hack_the_php_engine-partial.mp4 569MB
- 54902-driverjack_turning_ntfs_and_emulated_read-only_filesystems_in_an_infection_and_persistence_vector.mp4 566MB
- 54830-the_way_to_android_root_exploiting_your_gpu_on_smartphone.mp4 564MB
- 54861-disenshittify_or_die_how_hackers_can_seize_the_means_of_computation_and_build_a_new_good_internet_that_is_hardened_against_our_asshole_bosses_insatiable_horniness_for_enshittification.-partial.mp4 563MB
- 54865-fireside_chat_with_jay_healey_and_national_cyber_director_harry_coker_jr..mp4 558MB
- 54863-amd_sinkclose_universal_ring_-2_privilege_escalation-partial.mp4 556MB
- 54829-optical_espionage_using_lasers_to_hear_keystrokes_through_glass_windows.mp4 554MB
- 54909-your_ai_assistant_has_a_big_mouth_a_new_side-channel_attack.mp4 552MB
- 54914-abusing_legacy_railroad_signaling_systems-partial.mp4 549MB
- 54845-one_for_all_and_all_for_whad_wireless_shenanigans_made_easy.mp4 547MB
- 54835-dc101_panel.mp4 545MB
- 54889-nano-enigma_uncovering_the_secrets_within_efuse_memories-partial.mp4 542MB
- 54884-def_con_academy_cultivating_m4d_sk1llz_in_the_def_con_community.mp4 537MB
- 54823-defeating_edr_evading_malware_with_memory_forensics.mp4 529MB
- 54885-watchers_being_watched_exploiting_the_surveillance_system_and_its_supply_chain.mp4 528MB
- 54825-sshamble_unexpected_exposures_in_the_secure_shell-partial.mp4 526MB
- 54874-troll_trapping_through_tas_tools_-_exposing_speedrunning_cheaters.mp4 522MB
- 54852-reverse_engineering_micropython_frozen_modules_data_structures_reconstruction_and_reading_bytecode.mp4 522MB
- 54896-changing_global_threat_landscape_with_rob_joyce_and_dark_tangent.mp4 517MB
- 54819-fireside_chat_with_dnsa_anne_neuberger-partial.mp4 514MB
- 54882-secrets_and_shadows_leveraging_big_data_for_vulnerability_discovery_at_scale.mp4 513MB
- 54834-android_app_usage_and_cell_tower_location_private._sensitive._available_to_anyone.mp4 510MB
- 54833-abusing_windows_hello_without_a_severed_hand.mp4 509MB
- 54841-leveraging_private_apns_for_mobile_network_traffic_analysis.mp4 507MB
- 54839-sql_injection_isnt_dead_smuggling_queries_at_the_protocol_level-partial.mp4 506MB
- 54854-gotta_cache_‘em_all_bending_the_rules_of_web_cache_exploitation-partial.mp4 505MB
- 54858-quickshell_sharing_is_caring_about_an_rce_attack_chain_on_quick_share-partial.mp4 504MB
- 54876-exploiting_the_unexploitable_insights_from_the_kibana_bug_bounty-partial.mp4 503MB
- 54838-outlook_unleashing_rce_chaos_cve-2024-30103_and_cve-2024-38021.mp4 500MB
- 54870-discovering_and_exploiting_local_attacks_against_the_1password_macos_desktop_application.mp4 500MB
- 54856-shim_me_what_you_got_-_manipulating_shim_and_office_for_code_injection.mp4 496MB
- 54862-grand_theft_actions_abusing_self-hosted_github_runners_at_scale-partial.mp4 495MB
- 54899-the_hack_the_crash_and_two_smoking_barrels._and_all_the_times_i_almost_killed_an_engineer..mp4 494MB
- 54814-open_sesame_-_or_how_vulnerable_is_your_stuff_in_electronic_lockers.mp4 492MB
- 54891-aws_cloudquarry_digging_for_secrets_in_public_amis.mp4 491MB
- 54822-kicking_in_the_door_to_the_cloud_exploiting_cloud_provider_vulnerabilities_for_initial_access.mp4 486MB
- 54898-dragon_slayingguide_bug_hunting_in_vmware_device_virtualization.mp4 486MB
- 54879-unsaflok_hacking_millions_of_hotel_locks.mp4 483MB
- 54877-measuring_the_tor_network.mp4 483MB
- 54883-breaking_the_beam_exploiting_vsat_satellite_modems_from_the_earths_surface.mp4 483MB
- 54826-digital_emblems_when_markings_are_required_under_international_law_but_you_dont_have_a_rattle-can_handy.mp4 480MB
- 54913-incubated_machine_learning_exploits_backdooring_ml_pipelines_using_input-handling_bugs-partial.mp4 469MB
- 54908-redefining_v2g_-_how_to_use_your_vehicle_as_a_game_controller.mp4 469MB
- 54818-making_the_def_con_32_badge.mp4 463MB
- 54831-breaching_aws_accounts_through_shadow_resources.mp4 462MB
- 54878-hookchain_a_new_perspective_for_bypassing_edr_solutions-partial.mp4 448MB
- 54895-windows_downdate_downgrade_attacks_using_windows_updates.mp4 447MB
- 54892-splitting_the_email_atom_exploiting_parsers_to_bypass_access_controls.mp4 435MB
- 54869-ntlm_-_the_last_ride-partial.mp4 429MB
- 54873-ace_up_the_sleeve_from_getting_jtag_on_the_iphone_15_to_hacking_into_apples_new_usb-c_controller.mp4 428MB
- 54867-oh-my-dc_abusing_oidc_all_the_way_to_your_cloud-partial.mp4 424MB
- 54855-smishing_smackdown_unraveling_the_threads_of_usps_smishing_and_fighting_back.mp4 420MB
- 54868-behind_enemy_lines_engaging_and_disrupting_ransomware_web_panels-partial.mp4 411MB
- 54837-taming_the_beast_inside_the_llama_3_red_team_process.mp4 407MB
- 54820-on_your_oceans_11_team_im_the_ai_guy_technically_girl-partial.mp4 406MB
- 54859-sudos_and_sudonts_-_peering_inside_sudo_for_windows.mp4 402MB
- 54864-the_secret_life_of_a_rogue_device_-_lost_it_assets_on_the_public_marketplace.mp4 381MB
- 54851-mutual_authentication_is_optional-partial.mp4 321MB
- 54824-if_existing_cyber_vulnerabilities_magically_disappeared_overnight_what_would_be_next.mp4 300MB
- 54840-atomic_honeypot_a_mysql_honeypot_that_drops_shells-partial.mp4 300MB
- 56208-def_con_franklin_project.mp4 282MB
- 54887-techniques_for_creating_process_injection_attacks_with_advanced_return-oriented_programming.mp4 276MB
- 54850-laundering_money.mp4 249MB
- 54880-compromising_an_electronic_logging_device_and_creating_a_truck2truck_worm.mp4 230MB
- 54894-unlocking_the_gates_hacking_a_secure_industrial_remote_access_solution.mp4 224MB
- 54813-no_symbols_when_reversing_no_problem_bring_your_own-partial.mp4 163MB
- 54525-the_pwnie_awards.mp4 120MB
- 54811-defeating_magic_by_magic:using_alpc_security_features_to_compromise_rpc_services-partial.mp4 64MB
- 54812-spies_and_bytes_victory_in_the_digital_age-partial.mp4 64MB