Search results for DEF CON 25 Hacker Conference CON 25/DEF CON 25 presentations/DEF$ python c2960-lanbasek9-m-12.2 ... DEF CON 25 Hacker ... Subject: DEF CON 25 Presentation Keywords: DEF CON Conference,

Explore all categories to find your favorite topic

Opt Out or Deauth Trying ! Anti-Tracking Bots Radios and Keystroke Injection Weston Hecker Principal Application Security Engineer NCR Twitter @Westonhecker A Little About…

GPS SPOOFING Low-cost GPS simulator HUANG Lin, YANG Qing Unicorn Team – Radio and Hardware Security Research Qihoo 360 Technology Co. Ltd. Who we are? Unicorn Team • …

Ghost Telephonist Impersonates You Through LTE CSFB Yuwei ZHENG, Lin HUANG Qing YANG, Haoqi SHAN, Jun LI UnicornTeam, 360 Technology July 30, 017 Who We Are •  360 Technology…

CableTap Wirelessly Tapping your Home Network Marc Newlin Bastille Networks marc@bastilleio @marcnewlin Logan Lamb Bastille Networks logan@bastilleio Christopher Grayson…

SP 0:00:00 PLAY Whitney B Merrill Attorney Hacker @wbm312 Tech the FTC Terrell McSweeny Commissioner Federal Trade Commission @TMcSweenyFTC DISCLOSURE The views expressed…

Unboxing Android Everything you wanted to know about Android packers Slava Makkaveev Avi Bashan Who Are We? @Avi R&D Team Leader at Check Point, former security researcher…

Hacking travel routers like it’s 1999 Mikhail Sosonkin Mikhail Sosonkin “Synack leverages the best combination of humans and technology to discover security vulnerabilities…

Un Fucking Forensics Ac#vePassive memory hackingdebugging K2 Director @IOACTIVE hBps:github.comK2 About me? • Hacker for a while •  inVtero.net •  Memory analysis…

Breaking Bitcoin Hardware Wallets Glitches cause stitches! Josh Datko Chris Quartier Kirill Belyayev Updated: 20170707 Link Drop! All updated references, notes, links, can…

Exploiting 0ld Mag-stripe Information with New Technology Salvador Mendoza Twitter: @Netxing Blog: salmgnet About Me ● Security Researcher ● Samsung Pay: Tokenized Numbers…

Ghost Telephonist Impersonates You Through LTE CSFB Yuwei ZHENG Lin HUANG Qing YANG Haoqi SHAN Jun LI UnicornTeam 360 Technology July 30 017 Who We Are •  360 Technology…

Koadic C3 COM Command Control DEF CON 25 - July 2017 Agenda ● Current open-source malware options for red teams ● Koadic C3 ○ Advanced JScriptVBScript RAT ● The hell…

Linux-Stack Based V2X Framework: SocketV2V All You Need to Hack Connected Vehicles Duncan Woodbury Nicholas Haltmeyer {p3n3troot0r@protonmailcom ginsback@protonmailcom} DEFCON…

Breaking Wind: Adventures in Hacking Wind Farm Control Networks Jason Staggs, Ph.D. University of Tulsa Tulsa, Oklahoma whoami • Security researcher – Focus in control…

Friday the 13th: JSON Attacks Alvaro Muñoz @pwntester Oleksandr Mirosh HPE Security whoami • Alvaro Muñoz • Security Research with HPE • Int3pids CTF player • @pwntester…

Evading next-gen AV using AI Hyrum Anderson hyrum@endgamecom @drhyrum inhyrumanderson https:githubcomendgameincgym-malware Rules for static analysis x1 rule malware { strings:…

Using GPS Spoofing to Control TimeDave/Karit (@nzkarit) ZX SecurityDefcon 2017www.zxsecurity.co.nz @nzkaritDraft for Defcon Media serverA final copy will be posted on https://zxsecurity.co.nz/events.html…

Revolting Radios Get it It’s a pun! Thanks Mike Walters Ang Cui Schuyler St Leger Taylor Streetman Sergey Bratus Travis Goodspeed A little background “One of the things…