Podcasts by DEF CON 22 [Materials] Speeches from the Hacker Convention.
The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our new media server at: https://media.defcon.org
Further podcasts by DEF CON
Podcast on the topic Technologie
All episodes
Zach Fasel - Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools from 2014-12-13T17:34:17
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools
Zack Fasel Managing Partner, Urbane Security
Many struggle in their job with the decision o...
ListenWill Schroeder - Veil-Pillage: Post-exploitation 2. from 2014-12-13T17:31:17
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf
Veil-Pillage: Post-exploitation 2.0
W...
Fatih Ozavci - VoIP Wars: Attack of the Cisco Phones from 2014-12-13T17:30:37
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Ozavci/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdf
VoIP Wars: Attack of the Cisco Phones ...
ListenDominic White and Ian de Villiers - Manna from Heaven: Improving the state of wireless rogue AP attacks from 2014-12-13T17:29:43
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/White-deVilliers/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdf
Manna from Heaven: Im...
ListenBlake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS Defense from 2014-12-13T17:29:25
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Self/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdf
Don't DDoS Me Bro: Practical DDoS Defense
Bla...
Michele Fincher - How to you Feel about your Mother.. Psych and The SE from 2014-12-13T17:22:29
Michele Fincher - How to you Feel about your Mother.. Psych and The SE
ListenChristopher Soghoian - Blinding The Surveillance State from 2014-12-13T17:18:48
Blinding The Surveillance State
Christopher Soghoian Principal Technologist, American Civil Liberties Union
We live in a surveillance state. Law enforcement and intelligence agenci...
ListenChris Hadnagy - What Your Body Tells Me - Body Language for the SE from 2014-12-13T17:16:36
Chris Hadnagy - What Your Body Tells Me - Body Language for the SE
ListenCharlie Miller&Chris Valasek - A Survey of Remote Automotive Attack Surfaces from 2014-12-13T17:15:34
A Survey of Remote Automotive Attack Surfaces
Charlie Miller Security Engineer, Twitter
Chris Valasek Director of Threat Intelligence, IOActive
Automotive security concerns h...
ListenBrent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations from 2014-12-13T17:13:41
Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations
ListenZoz - Don't Fuck It Up! from 2014-12-13T17:04:18
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Zoz/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdf
Don't Fuck It Up!
Zoz ROBOTICS ENGINEER
Online antics used ...
Zoltán Balázs - Bypass firewalls, application white lists, secure remote desktops under 20 seconds from 2014-12-13T17:03:39
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Balazs/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdf
Bypass firewalls, ap...
ListenWeston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute from 2014-12-13T17:02:17
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Hecker/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdf
Burner Phone DDOS 2 dollars a day : 70 Calls a Minute
Wesley McGrew- Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively from 2014-12-13T17:01:29
Slides Here:https://www.defcon.org/images/defcon-22/dc-22-presentations/McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdf
Additional Materials available:
http...
Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0 from 2014-12-13T17:00:38
Slides Here:https://www.defcon.org/images/defcon-22/dc-22-presentations/Strazzere-Sawyer/DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf
Android Hacker Protect...
ListenTess Schrodinger - From Raxacoricofallapatorius With Love: Case Studies In Insider Threat from 2014-12-13T16:59:53
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schrodinger/DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdf
From Raxacoricofallapatoriu...
ListenSvetlana Gaivoronski and Ivan Petrov - Shellcodes for ARM: Your Pills Don't Work on Me, x86 from 2014-12-13T16:59:20
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Petrov-Gaivoronski/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdf
Extra Materials are avai...
ListenShane Macaulay - Weird-Machine Motivated Practical Page Table Shellcode&Finding Out What's Running on Your System from 2014-12-13T16:58:46
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Macaulay/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdf
Weird-Machine Mo...
ListenShahar Tal - I Hunt TR-069 Admins: Pwning ISPs Like a Boss from 2014-12-13T16:58:05
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Tal/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdf
I Hunt TR-069 Admins: Pwning ISPs Like a Boss
Shahar ...
Scott Erven and Shawn Merdinger - Just What The Doctor Ordered? from 2014-12-13T16:57:05
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Erven-Merdinger/DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdf
Just What The Doctor O...
ListenRyan Noah Shapiro - Hacking the FBI - How&Why to Liberate Government Records from 2014-12-13T16:55:13
Hacking the FBI: How & Why to Liberate Government Records
Ryan Noah Shapiro PhD candidate, Massachusetts Institute of Technology
After narrowly avoiding a lengthy activism-related ...
ListenRyan Lackey&Marc Rogers&theGrugq - Masquerade - How a Helpful Man-in-the-Middle Can Help You Evade Monitoring from 2014-12-13T16:51:11
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.
Ryan Lackey Founder, CryptoSeal, Inc.
Marc Rogers Principal Security Researcher, Lookout
The Grugq In...
Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks from 2014-12-13T16:48:27
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Kazanciyan-Hastings/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf
Investigating Po...
ListenRobert Rowley - Detecting and Defending Against a Surveillance State from 2014-12-13T16:46:13
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Rowley/DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdf
Detecting and Defending Against a S...
ListenRichard Thieme - The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State from 2014-12-13T16:34:19
Slides Here:https://defcon.org/images/defcon-22/dc-22-presentations/Theime/DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdf
The Only Way to Tell the Truth is in Fiction: The Dynamics o...
ListenRichard Klafter (Free) and Eric Swanson (Lachesis) - Check Your Fingerprints: Cloning the Strong Set from 2014-12-13T16:33:10
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Klafter-Swanson/DEFCON-22-Richard-Klafter-and-Eric-Swanson-Check-Your-Fingerprints-Cloning-the-Strong-Set.pdf
Check Y...
ListenPierce and Loki - NSA Playset : GSM Sniffing from 2014-12-13T16:31:56
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Pierce-Loki/DEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf
NSA Playset : GSM Sniffing
Pierce SECURITY RESEARCHER
Phil Zimmermann - How To Get Phone Companies To Just Say No To Wiretapping from 2014-12-13T16:30:59
How To Get Phone Companies To Just Say No To Wiretapping
Phil Zimmermann President & Co-Founder Silent Circle
Phil is going to talk about his latest projects, which are helping sev...
ListenPhilip “Soldier of Fortran” Young - From root to SPECIAL: Pwning IBM Mainframes from 2014-12-13T16:29
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Young/DEFCON-22-Philip-Young-From-root-to-SPECIAL-Hacking-IBM-Mainframes-Updated.pdf
From root to SPECIAL: Pwning IB...
ListenPaul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your Car from 2014-12-13T16:26:40
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Such/DEFCON-22-Paul-Such-0x222-Playing-with-Car-Firmware.pdf
Playing with Car Firmware or How to Brick your Car
Listen
Paul McMillan - Attacking the Internet of Things using Time from 2014-12-13T16:25:58
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Mcmillan/DEFCON-22-Paul-Mcmillan-Attacking-the-IOT-Using-timing-attacks.pdf
Attacking the Internet of Things using Ti...
ListenPatrick Wardle and Colby Moore - Optical Surgery; Implanting a DropCam from 2014-12-13T16:23:56
Slides Here; https://defcon.org/images/defcon-22/dc-22-presentations/Moore-Wardle/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf
Optical Surgery; Implanting a DropCam
Patrick Wardle and Colby Moore - Optical Surgery; Implanting a DropCam from 2014-12-13T16:23:56
Slides Here; https://defcon.org/images/defcon-22/dc-22-presentations/Moore-Wardle/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf
Optical Surgery; Implanting a DropCam
Panel - Summary of Attacks Against BIOS and Secure Boot from 2014-12-13T16:23:03
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Bulygin-Bazhaniul-Furtak-Loucaides/DEFCON-22-Bulygin-Bazhaniul-Furtak-Loucaides-Summary-of-attacks-against-BIOS-UPDATED.pdf Listen
Panel - PropLANE: Kind of keeping the NSA from watching you pee from 2014-12-13T16:22:11
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Bathurst-Rogers-Carey-Clarke/DEFCON-22-Bathurst-Rogers-Carey-Clarke-PROPLANE.pdf
PropLANE: Kind of keeping the NSA fr...
ListenPanel- Ephemeral Communications: Why and How? from 2014-12-13T16:21:25
Panel: Ephemeral Communications: Why and How?
Ryan Lackey Founder, CryptoSeal, Inc.
Jon Callas Silent Circle
Elissa Shevinsky Glimpse
Possibly more to come.....
E...
ListenPanel - Diversity in Information Security from 2014-12-13T16:19:34
Panel - Diversity in Information Security
Jennifer Imhoff-Dousharm Informatics student, co-organizer of theSummit, NCWIT affiliate member
Sandy “Mouse” Clark Security Researcher and ...
Panel - DEF CON the Mystery, Myth, and Legend from 2014-12-13T16:17:49
DEF CON the Mystery, Myth and Legend
Panel
It's hard to throw a stone these days without hitting a security/hacking conference. But, when every year the Las Vegas Metro SWAT Team s...
ListenNicole Ozer&Kevin Bankston&Timothy Edgar - Panel - Surveillance on the Silver Screen - Fact or Fiction from 2014-12-13T16:15:20
Panel — Surveillance on the Silver Screen- Fact or Fiction?
Nicole Ozer Technology and Civil Liberties Policy Director, ACLU of California
Kevin Bankston Policy Director, New America...
Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling from 2014-12-13T16:13:09
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Nemus/DEFCON-22-Lance-Buttars-Nemus-Intro-to-backdooring-OS.pdf
An Introduction to Back Dooring Operating System...
ListenDavid Kennedy - Destroying Education and Awareness Programs from 2014-12-13T16:11:07
David Kennedy - Destroying Education and Awareness Programs
ListenDan Kaminsky - Secure Random by Default from 2014-12-13T16:03:34
Secure Random By Default
Dan Kaminsky Chief Scientist, White Ops
As a general rule in security, we have learned that the best way to achieve security is to enable it by default. Ho...
ListenDan Kaminsky - Secure Random by Default from 2014-12-13T16:03:34
Secure Random By Default
Dan Kaminsky Chief Scientist, White Ops
As a general rule in security, we have learned that the best way to achieve security is to enable it by default. Ho...
ListenPanel - Hack All The Things: 20 Devices in 45 Minutes from 2014-12-13T16:00:56
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Heres-Etemadieh-Baker-Nielsen/DEFCON-22-Heres-Etemadieh-Baker-Nielsen-Hack-All-The-Things.pdf
Hack All The Things: 20...
ListenPanel - DEF CON Comedy Jam Part VII, Is This The One With The Whales? from 2014-12-13T15:44:26
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Mortman/DEFCON-22-Fail-Panel-Defcon-Comedy-Jam-VII.pdf
DEF CON Comedy Jam Part VII, Is This The One With The Whales? ...
ListenNir Valtman - Bug Bounty Programs Evolution from 2014-12-13T15:37:43
Slides Here; https://www.defcon.org/images/defcon-22/dc-22-presentations/Valtman/DEFCON-22-Nir-Valtman-Bug-Bounty-Programs-Evolution.pdf
Extra Materials are available here: https://www.d...
ListenNir Valtman - A Journey to Protect Points-of-sale from 2014-12-13T15:36:50
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Valtman/DEFCON-22-Nir-Valtman-A-Journey-To-Protect-POS-UPDATED.pdf
A Journey to Protect Points-of-sale
Nir Valt...
Michael Schrenk - You're Leaking Trade Secrets from 2014-12-13T15:35:43
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schrenk/DEFCON-22-Mike-Schrenk-Youre-Leaking-Trade-Secrets-UPDATED.pdf
You're Leaking Trade Secrets
Michael Sch...
Michael Ossmann - The NSA Playset: RF Retroreflectors from 2014-12-13T15:35:04
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Ossman/DEFCON-22-Michael-Ossmann-Pierce-Toorcamp.pdf
Extra materials available here: https://defcon.org/images/defcon...
ListenMetacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin from 2014-12-13T15:34:23
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Metacortex-Grifter/DEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf
Touring the Darkside of the Internet...
ListenMark Stanislav&Zach Lanier - The Internet of Fails - Where IoT Has Gone Wrong and How We're Making It Right from 2014-12-13T15:29:54
The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right
Mark Stanislav Security Evangelist, Duo Security
Zach Lanier Sr. Security Researcher, Duo Security
Major Malfunction - Old Skewl Hacking - Porn Free! from 2014-12-13T15:25:49
Old Skewl Hacking: Porn Free!
Major Malfunction
Having cut his teeth (and scarred his mind) on hotel Infra-Red controlled TV systems, spent ten years scanning the skies for 'intere...
ListenMaggie Jauregui - Girl… Fault-Interrupted. from 2014-12-13T15:23:09
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Jauregui/DEFCON-22-Maggie-Jauregui-Girl-Fault-Interrupted-Updated.pdf
Girl… Fault-Interrupted.
Maggie Jauregui ...
Lucas Morris and Michael McAtee - ShareEnum: We Wrapped Samba So You Don’t Have To from 2014-12-13T15:22:24
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Morris-McAtee/DEFCON-22-Lucas-Morris-Michael-McAtee-ShareEnum-We-Wrapped-Samba.pdf
ShareEnum: We Wrapped Samba So...
ListenLuca "kaeso" Bruno&Mariano "emdel" Graziano - Through the Looking-Glass, and What Eve Found There from 2014-12-13T15:21:22
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Bruno-Graziano/DEFCON-22-Luca-Bruno-Mariano-Graziano-looking-glass-Updated.pdf
Through the Looking-Glass, and What Ev...
ListenLadar Levison and Stephen Watt - Dark Mail from 2014-12-13T14:23:30
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Levison-Watt/DEFCON-22-Levison-Watt-Dark-Mail-UPDATED.pdf
Dark Mail
Ladar Levison FOUNDER OF LAVABIT, LLC
Listen
Panel - Ask the EFF - The Year in Digital Civil Liberties from 2014-12-13T14:22:24
Panel: Ask the EFF: The Year in Digital Civil Liberties
Kurt Opsahl Deputy General Counsel, Electronic Frontier Foundation
Nate Cardozo EFF Staff Attorney
Mark Jaycox EFF Legis...
Kevin Mitnick - Getting Intimate with Kevin Mitnick from 2014-12-13T14:19:06
There is no one like Kevin.
Kevin Mitnick's Laptop as His HeadOnce one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a truste...
ListenKyle Kelley and Greg Anderson - Is This Your Pipe? Hijacking the Build Pipeline. from 2014-12-13T14:16:23
Slides Here; https://www.defcon.org/images/defcon-22/dc-22-presentations/Kelley-Anderson/DEFCON-22-Kyle-Kelley-Greg-Anderson-Is-this-your-pipe-Updated.pdf
Is This Your Pipe? Hijacking th...
ListenKeren Elazari - Empowering Hackers to Create a Positive Impact from 2014-12-13T14:15:38
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Elazari/DEFCON-22-Keren-Elazari-Empowering-Hackers-UPDATED.pdf
Empowering Hackers to Create a Positive Impact
K...
Kenneth White and Matthew Green - The Open Crypto Audit Project from 2014-12-13T14:15:01
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/White-Green/DEFCON-22-Kenneth-White-and-Matthew-Green-The-Open-Crypto-Audit-Project-Updated.pdf
The Open Crypto Audit...
ListenJoshua Corman and Nicholas J Percoco - The Cavalry Year[0]&a Path Forward for Public Safety from 2014-12-13T14:14:22
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Corman-Percoco/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf
The Cavalry Year[0] & a Path Forward...
ListenJosh Datko and Teddy Reed - NSA Playset: DIY WAGONBED Hardware Implant over I2C from 2014-12-13T14:13:38
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Datko-Reed/DEFCON-22-Josh-Datko-Teddy-Reed-NSA-Playset-DIY-Hardware-Implant-over-l2c-UPDATED.pdf
NSA Playset: DIY WAG...
ListenJohn Menerick - Open Source Fairy Dust from 2014-12-13T14:12:47
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Menerick/DEFCON-22-John-Menerick-Open-Source-Fairy-Dust-UPDATED.pdf
Open Source Fairy Dust
John Menerick SECURI...
Joe Grand aka Kingpin - Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering from 2014-12-13T14:11:44
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Grand/DEFCON-22-Joe-Grand-Deconstructing-the-Circuit-Board-Sandwich.pdf
Deconstructing the Circuit Board Sandwich: Ef...
ListenJoe FitzPatrick and Miles Crabill - NSA Playset: PCIe from 2014-12-13T14:11:10
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Fitzpatrick-Crabill/DEFCON-22-Joe-FitzPatrick-Miles-Crabill-NSA-Playset-PCIe.pdf
NSA Playset: PCIe
Joe Fitz...
Jim Denaro and Tod Beardsley - How to Disclose an Exploit Without Getting in Trouble from 2014-12-13T14:10:09
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Denaro-Beardsley/DEFCON-22-Jim-Denaro-Tod-Beardsley-How-to-Disclose-and-Exploit-UPDATED.pdf
How to Disclose an Ex...
ListenGraham, Mcmillan, and Tentler - Mass Scanning the Internet: Tips, Tricks, Results from 2014-12-13T14:08:46
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Graham-McMillan-Tentler/DEFCON-22-Graham-McMillan-Tentler-Masscaning-the-Internet.pdf
Mass Scanning the Internet: Tip...
ListenJesus Molina - Learn how to control every room at a luxury hotel remotely - the dangers of insecure home automation deployment from 2014-12-13T14:07:12
Slides Here: http://defcon.org/images/defcon-22/dc-22-presentations/Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf
White paper Here: http://defcon.org/images/defcon-22...
ListenJayson E. Street - The Incredible Likeness of being Adorable from 2014-12-13T14:03:23
Jayson E. Street is an author of “Dissecting the hack: The F0rb1dd3n Network” from Syngress. Also creator of http://dissectingthehack.com He has also spoken at DEFCON, DerbyCon, UCON and at seve...
ListenJayson E. Street - Around the world in 80 cons from 2014-12-13T14:00:19
"Around the world in 80 cons” - A Perspective
Jayson E. Street Senior Partner of Krypton Security
After spending 15 years in the hacker / InfoSec community, I thought it was time t...
ListenJesse Michael and Mickey Shkatov - USB for all! from 2014-12-13T13:57:51
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Metacortex-Grifter/DEFCON-22-Metacortex-Grifter-Darkside-of-the-internet.pdf
USB for all!
Jesse Michael SEC...
Jason Healey - Saving the Internet (for the Future) from 2014-12-13T13:51:12
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Healey/DEFCON-22-Jay-Healey-Saving-the-Internet-UPDATED.pdf
Saving the Internet (for the Future)
Jason Healey D...
Jake Kouns and Carsten Eiram - Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! from 2014-12-13T13:50:26
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Kouns-Eiram/DEFCON-22-Kouns-Eiram-Screw-Becoming-A-Pentester-Bug-Bounty-Hunter-UPDATED.pdf
Screw Becoming A Pente...
ListenGregory Pickett - Abusing Software Defined Networks from 2014-12-13T13:49:40
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Pickett/DEFCON-22-Gregory-Pickett-Abusing-Software-Defined-Networks-UPDATED.pdf
Abusing Software Defined Networks
Grant Bugher - Detecting Bluetooth Surveillance Systems from 2014-12-13T13:48:34
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Bugher/DEFCON-22-Grant-Bugher-Detecting-Bluetooth-Surveillance-Systems-Updated.pdf
Detecting Bluetooth Surveillan...
ListenGlenn Wilkinson - Practical Aerial Hacking&Surveillance from 2014-12-13T13:47:35
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Wilkinson/DEFCON-22-Glenn-Wilkinson-Practical-Aerial-Hacking-and-Surveillance.pdf
White Paper Available here: https:/...
ListenGeoff McDonald - Meddle: Framework for Piggy-back Fuzzing and Tool Development from 2014-12-13T13:46:54
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Mcdonald/DEFCON-22-Geoff-Mcdonald-Meddle-Framework-UPDATED.pdf
Meddle: Framework for Piggy-back Fuzzing and Tool ...
ListenGene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog from 2014-12-13T13:46:18
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Bransfeild/DEFCON-22-Gene-Bransfield-Weaponizing-your-Pets-UPDATED.pdf
Weaponizing Your Pets: The War Kitteh and the ...
ListenFelix Leder - NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It from 2014-12-13T13:45:13
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Leder/DEFCON-22-Felix-Leder-NinjaTV.pdf
NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It
Felix Leder...
Eric Smith and Josh Perrymon - Advanced Red Teaming: All Your Badges Are Belong To Us from 2014-12-13T13:44:27
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Smith-Perrymon/DEFCON-22-Smith-Perrymon-All-Your-Badges-Are-Belong-To-Us-UPDATED.pdf
Advanced Red Teaming: All Your B...
ListenEric (XlogicX) Davisson and Ruben Alejandro (chap0) - Abuse of Blind Automation in Security Tools from 2014-12-13T13:43:41
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Davisson-Alejandro/DEFCON-22-Eric-Davisson-Ruben-Alejandro-Abuse-of-Blind-Automation-in-Security-Tools.pdf
Abuse of B...
ListenElie Bursztein and Celine Bursztein - I am a legend: Hacking Hearthstone with machine learning from 2014-12-13T13:42:49
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Bursztein/DEFCON-22-Celine-and-Elie-Bursztein-I-am-a-legend-UPDATED.pdf
I am a legend: Hacking Hearthstone with machi...
ListenEijah - Saving Cyberspace by Reinventing File Sharing from 2014-12-13T13:42:04
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Elijah/DEFCON-22-Eijah-Saving-Cyberspace-by-Reinventing-File-Sharing-Updated.pdf
Saving Cyberspace by Reinventing Fil...
ListenDustin Hoffman and Thomas (TK) Kinsey - What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil) from 2014-12-13T13:40:53
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Hoffman-Kinsey/DEFCON-22-Dustin-Hoffman-and-Thomas-Kinsey-What-the-Watchers-See-UPDATED.pdf
What the Watchers See: Ea...
ListenHolt, Smirnova and Chua - Stolen Data Markets: An Economic and Organizational Assessment from 2014-12-13T13:39:54
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Holt-Smirnova-Chua/DEFCON-22-Holt-Smirnova-Chua-Stolen-Data-Markets-Updated.pdf
Stolen Data Markets: An Economic and ...
ListenDr. Phil Polstra and Captain Polly - Cyberhijacking Airplanes: Truth or Fiction? from 2014-12-13T13:38:22
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Polstra/DEFCON-22-Phil-Polstra-Cyber-hijacking-Airplanes-Truth-or-Fiction-Updated.pdf
Cyberhijacking Airplanes: Truth...
ListenDr. Phil Polstra - Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance from 2014-12-13T13:37:38
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Polstra/DEFCON-22-Phil-Polstra-Am-I-Being-Spied-On.pdf
Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surv...
ListenDr. Paul Vixie - Domain Name Problems and Solutions from 2014-12-13T13:35:45
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Vixie/DEFCON-22-Paul-Vixie-2014-07-15-botnets.pdf
White paper available for download here: https://defcon.org/images/...
ListenDeviant Ollam&Howard Payne - Elevator Hacking - From the Pit to the Penthouse from 2014-12-13T13:34:16
Elevator Hacking - From the Pit to the Penthouse
Deviant Ollam The CORE Group
Howard Payne The CORE Group
Throughout the history of hacker culture, elevators have played a ke...
ListenMahjoub, Reuille, and Toonk - Catching Malware En Masse: DNS and IP Style from 2014-12-13T13:30:34
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Mahjoub-Toonk-Reuille/DEFCON-22-Mahjoub-Reuille-Toonk-Catching-Malware-En-Masse-DNS-IP-Style-UPDATED.pdf
Additional M...
ListenDavid Wyde - Client-Side HTTP Cookie Security: Attack and Defense from 2014-12-13T13:26
Slides: https://defcon.org/images/defcon-22/dc-22-presentations/Wyde/DEFCON-22-David-Wyde-Client-Side-HTTP-Cookie-Security.pdf
Client-Side HTTP Cookie Security: Attack and Defense
...
David Litchfield - Oracle Data Redaction is Broken from 2014-12-13T13:25:15
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Litchfield/DEFCON-22-David-Litchfield-Oracle-Data-Redaction-is-Broken.pdf
Oracle Data Redaction is Broken
David...
David Dorsey - Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go from 2014-12-13T13:24:29
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Dorsey/DEFCON-22-David-Dorsey-Why-Dont-You-Tell-Me-ROP-UPDATED.pdf
Why Don’t You Just Tell Me Where The ROP Isn’t Sup...
ListenDameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction, and Death from 2014-12-13T00:53:46
Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Quaddi-R3plicant-Hefley/DEFCON-22-Quaddi-R3plicant-Hefley-Hacking-911-UPDATED.pdf
Hacking 911: Adventures in Disr...
ListenCorey Kallenberg and Xeno Kovah - Extreme Privilege Escalation On Windows 8/UEFI Systems from 2014-12-13T00:34:30
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Kallenberg/DEFCON-22-Corey-Kallenberg-Extreme-Privilage-Escalation.pdf
Additional Materials available here: https://d...
ListenChristopher Campbell - The Secret Life of Krbtgt from 2014-12-12T22:15:20
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Campbell/DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf
The Secret Life of Krbtgt
Christopher Cam...
Christopher Campbell - The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns from 2014-12-12T22:14:17
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Campbell/DEFCON-22-Christopher-Campbell-Path-Less-Traveled.pdf
The $env:PATH less Traveled is Full of Easy Privilege...
ListenChris Littlebury - Home Alone with localhost: Automating Home Defense from 2014-12-12T22:13:17
Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Littlebury/DEFCON-22-Chris-Littlebury-Home-Alone-with-localhost.pdf
Home Alone with localhost: Automating Home De...
ListenCharlie Vedaa and Mike Larsen - Impostor — Polluting Tor Metadata from 2014-12-12T20:24:13
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Larsen-Vedaa/DEFCON-22-Mike-Larsen-Charlie-Vedaa-Impostor-Polluting-Tor-Metadata.pdf
Impostor — Polluting Tor Metadat...
ListenCesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems from 2014-12-12T18:02:15
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Cerrudo/DEFCON-22-Cesar-Cerrudo-Hacking-Traffic-Control-Systems-UPDATED.pdf
Hacking US (and UK, Australia, France, et...
ListenBrian Gorenc and Matt Molinyawe - Blowing up the Celly - Building Your Own SMS/MMS Fuzzer from 2014-12-12T18:01:30
Slides here; https://defcon.org/images/defcon-22/dc-22-presentations/Gorenc-Molinyawe/DEFCON-22-Brian-Gorenc-Matt-Molinyawe-Blowing-Up-The-Celly-UPDATED.pdf
Blowing up the Celly - Buildi...
ListenBrady Bloxham - Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse from 2014-12-12T18:00:50
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Bloxham/DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf
Getting Windows to Play with Itself: A Hacker's Guide t...
ListenAnton Sapozhnikov - Acquire current user hashes without admin privileges from 2014-12-12T17:59:14
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Sapozhnikov/DEFCON-22-Anton-Sapozhnikov-Acquire-Current-User-Hashes-Without-Admin-Privileges.pdf
Acquire current user...
ListenAndrew Hunt - Raspberry MoCA - A recipe for compromise from 2014-12-12T17:58:27
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Hunt/DEFCON-22-Andrew-Hunt-Raspberry-MoCA-a-recipe-for-compromise-UPDATED.pdf
Additional materials are available for ...
ListenAnch - The Monkey in the Middle: A pentesters guide to playing in traffic. from 2014-12-12T17:41:14
Slides here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Anch/DEFCON-22-Anch-The-Monkey-In-the-Middle.pdf
The Monkey in the Middle: A pentesters guide to playing in traff...
ListenAlexandre Moneger - Generating ROP payloads from numbers from 2014-12-12T17:37:53
Slides Available here: https://defcon.org/images/defcon-22/dc-22-presentations/Molina/DEFCON-22-Jesus-Molina-Learn-how-to-control-every-room.pdf
Extra Materials available here: https://d...
ListenAlex Zacharis and Tsagkarakis Nikolaos - PoS Attacking the Traveling Salesman from 2014-12-12T17:16:32
Presentation Materials available here: https://defcon.org/images/defcon-22/dc-22-presentations/Zacharis-Tsagkarakis/DEFCON-22-Alex Zacharis-Nikolaos-Tsagkarakis-PoS-Attacking-the-Traveling-Sales...
ListenAlex Pinto - Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring from 2014-12-12T17:15:02
Presentation Available here: https://defcon.org/images/defcon-22/dc-22-presentations/Pinto-Maxwell/DEFCON-22-Pinto-Maxwell-Secure-Because-Math-Updated.pdf
Secure Because Math: A Deep Div...
ListenAlex Pinto and Kyle Maxwell - Measuring the IQ of your Threat Intelligence feeds from 2014-12-12T17:14:18
Presentation available here: https://defcon.org/images/defcon-22/dc-22-presentations/Pinto-Maxwell/DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-your-threat-feeds-TIQtest-Updated.pdf
M...
ListenAdrian Crenshaw- Dropping Docs on Darknets: How People Got Caught from 2014-12-12T17:11:14
Presentation available here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf
Dr...
Listen