Podchaser Logo
Home
DEF CON 22 [Materials] Speeches from the Hacker Convention.

The Dark Tangent

DEF CON 22 [Materials] Speeches from the Hacker Convention.

A daily podcast
Good podcast? Give it some love!
DEF CON 22 [Materials] Speeches from the Hacker Convention.

The Dark Tangent

DEF CON 22 [Materials] Speeches from the Hacker Convention.

Episodes
DEF CON 22 [Materials] Speeches from the Hacker Convention.

The Dark Tangent

DEF CON 22 [Materials] Speeches from the Hacker Convention.

A daily podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of DEF CON 22 [Materials] Speeches from the Hacker Convention.

Mark All
Search Episodes...
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools Zack Fasel Managing Partner, Urbane SecurityMany struggle in their job with the decision of what events to log in battle against costly increases to their licensing
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdfVeil-Pillage: Post-exploitation 2.0Will Schroeder SECURITY RESEARCHER, VERIS GROUPThe Veil-Framewo
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Ozavci/DEFCON-22-Fatih-Ozavci-VoIP-Wars-Attack-of-the-Cisco-Phones-UPDATED.pdfVoIP Wars: Attack of the Cisco PhonesFatih Ozavci SENIOR SECURITY CONSULTANT, SENSE OF SECURIT
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/White-deVilliers/DEFCON-22-Dominic-White-Ian-de-Villiers-Manna-from-Heaven-Detailed-UPDATED.pdfManna from Heaven: Improving the state of wireless rogue AP attacksDominic Wh
Slides here: https://defcon.org/images/defcon-22/dc-22-presentations/Self/DEFCON-22-Blake-Self-cisc0ninja-Dont-DDOS-me-bro-UPDATED.pdfDon't DDoS Me Bro: Practical DDoS DefenseBlake Self SENIOR SECURITY ARCHITECTShawn "cisc0ninja" Burrell SO
Michele Fincher - How to you Feel about your Mother.. Psych and The SE
Blinding The Surveillance StateChristopher Soghoian Principal Technologist, American Civil Liberties UnionWe live in a surveillance state. Law enforcement and intelligence agencies have access to a huge amount of data about us, enabling them
Chris Hadnagy - What Your Body Tells Me - Body Language for the SE
A Survey of Remote Automotive Attack SurfacesCharlie Miller Security Engineer, TwitterChris Valasek Director of Threat Intelligence, IOActiveAutomotive security concerns have gone from the fringe to the mainstream with security researchers
Brent White - Corporate Espionage - Gathering Actionable Intelligence Via Covert Operations
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Zoz/DEFCON-22-Zoz-Dont-Fuck-It-Up-UPDATED.pdfDon't Fuck It Up!Zoz ROBOTICS ENGINEEROnline antics used to be all about the lulz; now they're all about the pervasive surveil
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Balazs/DEFCON-22-Zoltan-Balazs-Bypass-firewalls-application-whitelists-in-20-seconds-UPDATED.pdfBypass firewalls, application white lists, secure remote desktops under 20 se
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Hecker/DEFCON-22-Weston-Hecker-Burner-Phone-DDOS-UPDATED.pdfBurner Phone DDOS 2 dollars a day : 70 Calls a MinuteWeston Hecker SR SYSTEMS SECURITY ANALYST/ NETWORK SECURITY
Slides Here:https://www.defcon.org/images/defcon-22/dc-22-presentations/McGrew/DEFCON-22-Wesley-McGrew-Instrumenting-Point-of-Sale-Malware.pdfAdditional Materials available: https://www.defcon.org/images/defcon-22/dc-22-presentations/McGrew/
Slides Here:https://www.defcon.org/images/defcon-22/dc-22-presentations/Strazzere-Sawyer/DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdfAndroid Hacker Protection Level 0Tim Strazzere LEAD RESEARCH & RESPONSE ENGINE
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schrodinger/DEFCON-22-Tess-Schrodinger-Raxacoricofallapatorius-With-Love-Case-Studies.pdfFrom Raxacoricofallapatorius With Love: Case Studies In Insider ThreatTess Schrodin
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Petrov-Gaivoronski/DEFCON-22-Ivan-Petrov-Svetlana-Gaivoronski-ShellCodes-for-ARM-Updated.pdfExtra Materials are available here: https://defcon.org/images/defcon-22/dc-22-pre
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Macaulay/DEFCON-22-Shane-Macaulay-Weird-Machine-Motivated-Practical-Page-Table-Shellcode-UPDATED.pdfWeird-Machine Motivated Practical Page Table Shellcode & Finding Out What
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Tal/DEFCON-22-Shahar-TaI-I-hunt-TR-069-admins-UPDATED.pdfI Hunt TR-069 Admins: Pwning ISPs Like a BossShahar Tal SECURITY & VULNERABILITY RESEARCH TEAM LEADER, CHECK POINT
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Erven-Merdinger/DEFCON-22-Scott-Erven-and-Shawn-Merdinger-Just-What-The-DR-Ordered-UPDATED.pdfJust What The Doctor Ordered?Scott Erven FOUNDER & PRESIDENT SECMEDIC, INCSha
Hacking the FBI: How & Why to Liberate Government RecordsRyan Noah Shapiro PhD candidate, Massachusetts Institute of TechnologyAfter narrowly avoiding a lengthy activism-related prison sentence, I began PhD work at MIT in part to map out the
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.Ryan Lackey Founder, CryptoSeal, Inc.Marc Rogers Principal Security Researcher, LookoutThe Grugq Information Security ResearcherSometimes, hiding the existence of a
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Kazanciyan-Hastings/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdfInvestigating PowerShell AttacksRyan Kazanciyan TECHNICAL DIRECTOR, MAND
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Rowley/DEFCON-22-Robert-Rowley-Detecting-Defending-Against-Surveillance-State.pdfDetecting and Defending Against a Surveillance StateRobert RowleySECURITY RESEARCHER, TRUST
Slides Here:https://defcon.org/images/defcon-22/dc-22-presentations/Theime/DEFCON-22-Theime-Truth-Through-Fiction-Updated.pdfThe Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security StateRichard Thieme THIE
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features