Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools Zack Fasel Managing Partner, Urbane SecurityMany struggle in their job with the decision of what events to log in battle against costly increases to their licensing
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Ozavci/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdfVoIP Wars: Attack of the Cisco PhonesFatih Ozavci SENIOR SECURITY CONSULTANT, SENSE OF SECURIT
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/White-deVilliers/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdfManna from Heaven: Improving the state of wireless rogue AP attacksDominic Wh
Blinding The Surveillance StateChristopher Soghoian Principal Technologist, American Civil Liberties UnionWe live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them
A Survey of Remote Automotive Attack SurfacesCharlie Miller Security Engineer, TwitterChris Valasek Director of Threat Intelligence, IOActiveAutomotive security concerns have gone from the fringe to the mainstream with security researchers
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Zoz/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdfDon't Fuck It Up!Zoz ROBOTICS ENGINEEROnline antics used to be all about the lulz; now they're all about the pervasive surveil
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Balazs/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdfBypass firewalls, application white lists, secure remote desktops under 20 se
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Hecker/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdfBurner Phone DDOS 2 dollars a day : 70 Calls a MinuteWeston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schrodinger/DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdfFrom Raxacoricofallapatorius With Love: Case Studies In Insider ThreatTess Schrodin
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Petrov-Gaivoronski/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdfExtra Materials are available here: https://defcon.org/images/defcon-22/dc-22-pre
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Tal/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdfI Hunt TR-069 Admins: Pwning ISPs Like a BossShahar Tal SECURITY & VULNERABILITY RESEARCH TEAM LEADER, CHECK POINT
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Erven-Merdinger/DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdfJust What The Doctor Ordered?Scott Erven FOUNDER & PRESIDENT SECMEDIC, INCSha
Hacking the FBI: How & Why to Liberate Government RecordsRyan Noah Shapiro PhD candidate, Massachusetts Institute of TechnologyAfter narrowly avoiding a lengthy activism-related prison sentence, I began PhD work at MIT in part to map out the
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.Ryan Lackey Founder, CryptoSeal, Inc.Marc Rogers Principal Security Researcher, LookoutThe Grugq Information Security ResearcherSometimes, hiding the existence of a
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Rowley/DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdfDetecting and Defending Against a Surveillance StateRobert RowleySECURITY RESEARCHER, TRUST
Slides Here:https://defcon.org/images/defcon-22/dc-22-presentations/Theime/DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdfThe Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security StateRichard Thieme THIE