Search results for Abusing Adobe Reader’s JavaScript APIs - DEF CON CON 23/DEF CON 23 presentations/DEFCON...  Introduction

Explore all categories to find your favorite topic

Detecting Reflective InjectionReflective Injection Detection – RID.py Or How I slapped together some python c-types in a week to do what defensive vendors aren't

Java Every-days© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Java Every-days Exploiting

DAVIX Manual 0.5.0Version 0.5.0 Jan P. Monsch, jan döt monsch ät iplosion döt com Raffael Marty, raffy ät secviz döt org 2 / 111 1.1. Introduction

Xploiting Google GadgetsRobert Hansen Tom Stracener DRAFT: Complete slides will be made available after our talk. The Dark Side of Gadgets Complete slides will be made available

Microsoft PowerPoint - martyn_ruks_ibm_networking.pptIBM Networking Attacks . . . . Or the easiest way to own a mainframe without getting the removals men in Martyn Ruks

Technology always failsMifare Classic, The Dutch Transportation Card and Access Control From the Netherlands Self proclaimed geek First program at age 5 Focus on security,

Hardware Black Magic - Building devices with FPGAsDr. Fouad Kiamilev, Professor CVORG Labs Electrical and Computer Engineering University of Delaware Updated Slides and Video

DEF CON 25 Hacker Conference@professor__plum Disclaimer The views expressed herein do not necessarily state or reflect the views of my current or former employers. I am not

Sounds Like BotnetSounds Like Botnet Intro to VoIP • It’s everywhere • Easy to deploy – Most are “plug and talk” with fancy web interfaces

Security Research over Windows kernel Draft v11 $whoami • @zer0mem ~ Peter Hlavaty • Senior Security Researcher at KeenLab Tencent • MSRC100 pwn2own • Focus : kernel…

Finding Xori Malware Analysis Triage with Automated Disassembly Amanda Rousseau Rich Seymour About Us Amanda Rousseau Rich Seymour Sr. Malware Researcher, Endgame, Inc. @malwareunicorn…

Hacking travel routers like it’s 1999 Mikhail Sosonkin Mikhail Sosonkin “Synack leverages the best combination of humans and technology to discover security vulnerabilities…

Easy To Use PDDOS :Burner Phone DDOS 2 Dollars a day:70 Calls a Min Weston Hecker Security Expert Systems Network AnalystPenetrations TesterPresident Of Computer Security…

Untrustworthy Hardware And How to Fix It Seeking Hardware Transparency PRESENT DAY PRESENT TIME ⌷ - ##FPGA ##crypto and #openRISC on Freenode - Shorne and Olofk from #openRISC…

Last mile authentication problem Exploiting the missing link in end-to-end secure communication DEF CON 26 Our team Sid Rao Doctoral Candidate Aalto University Finland Dr…

1 The Tor Project Our mission is to be the global resource for technology advocacy research and education in the ongoing pursuit of freedom of speech privacy rights online…

Ghost Telephonist Impersonates You Through LTE CSFB Yuwei ZHENG Lin HUANG Qing YANG Haoqi SHAN Jun LI UnicornTeam 360 Technology July 30 017 Who We Are •  360 Technology…

How the ELF ruined Christmas Alessandro Di Federico UC Santa Barbara July 18, 2015 Index The exploit The dynamic loader The attacks RELRO Implementation Recap & countermeasures…

HTTP DESYNC ATTACKS SMASHING INTO THE CELL NEXT DOOR James Kettle The Fear Theory Q What topic am I really scared of? A HTTP Request Smuggling Hiding Wookiees in HTTP First…

Hacking BLE Bicycle Locks for Fun A Small Profit 1 whoami • From Sunny Singapore • Senior Security Consultant @ MWR • Mobile and Wireless Geek – BlackHat USA 2016…