Podchaser Logo
Home
DEF CON 23 [Audio] Speeches from the Hacker Convention

DEF CON

DEF CON 23 [Audio] Speeches from the Hacker Convention

A daily podcast
Good podcast? Give it some love!
DEF CON 23 [Audio] Speeches from the Hacker Convention

DEF CON

DEF CON 23 [Audio] Speeches from the Hacker Convention

Episodes
DEF CON 23 [Audio] Speeches from the Hacker Convention

DEF CON

DEF CON 23 [Audio] Speeches from the Hacker Convention

A daily podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of DEF CON 23 [Audio] Speeches from the Hacker Convention

Mark All
Search Episodes...
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick-Pics-Safer.pdfCanary: Keeping Your Dick Pics Safe(r)Rob Bathurst (evilrob) Security Engine
And That's How I Lost My Other Eye: Further Explorations In Data DestructionZoz Robotics Engineer and Security ResearcherHow much more paranoid are you now than you were four years ago? Warrantless surveillance and large-scale data confiscati
Seeing through the FogZack Fasel Urbane SecurityYes. "The Cloud" (drink). Even though many of us would much like to see use of public clouds decline, they're not going away any time soon. And with such, a plethora of companies now have revol
How to Hack Government: Technologists as Policy MakersTerrell McSweeny Commissioner, Federal Trade CommissionAshkan Soltani Chief Technologist, Federal Trade CommissionAs the leading federal agency responsible for protecting your privacy ri
Abusing native Shims for Post ExploitationSean Pierce Technical Intelligence Analyst for iSIGHT PartnersShims offer a powerful rootkit-like framework that is natively implemented in most all modern Windows Operating Systems. This talk will fo
Medical Devices: Pwnage and HoneypotsScott Erven Associate Director, ProtivitiMark Collao Security Consultant, ProtivitiWe know medical devices are exposed to the Internet both directly and indirectly, so just how hard is it to take it to th
When IoT attacks: hacking a Linux-powered rifleRuna A. SandvikMichael AugerTrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated system coupling a rifle, an ARM-powered s
HamSammich – long distance proxying over radioRobert Graham Erratasec.comDavid Maynor Erratasec.comThe ProxyHam talk was mysteriously canceled. However, it’s easy to replicate the talk from the press coverage. In this talk, we propose “HamSa
Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0Richard Thieme Author and Professional Speaker, ThiemeWorksThis presentation is beyond fiction.Current research in neuroscience and the extension and au
Insteon' False Security And Deceptive DocumentationPeter Shipley Security ResearcherRyan GoolerInsteon is a leading home automation solution for controlling lights, locks, alarms, and much more. More than forty percent of homes with automat
ThunderStrike 2: Sith StrikeTrammel Hudson Vice President, Two Sigma InvestmentsXeno Kovah Co-founder, LegbaCore, LLCCorey Kallenberg Co-Founder, LegbaCore, LLCThe number of vulnerabilities in firmware disclosed as affecting Wintel PC vend
Licensed to Pwn: The Weaponization and Regulation of Security ResearchJim DenaroDave AitelMatt BlazeNate CardozoMara TamCatherine “Randy” WheelerSecurity research is under attack. Updates to the Wassenaar Arrangement in 2013 established
Let's Encrypt - Minting Free Certificates to Encrypt the Entire WebPeter Eckersley Electronic Frontier FoundationJames Kasten Electronic Frontier FoundationYan Zhu Electronic Frontier FoundationLet's Encrypt is a new certificate authority
: Presenting the results and awards for the DEF CON 23 Contests and Events.
Who Will Rule the Sky? The Coming Drone Policy WarsMatt Cagle Technology and Civil Liberties Policy Attorney, ACLU of Northern CaliforniaEric Cheng General Manager, DJI SF and Director of Aerial Imaging, DJIYour private drone opens up limit
How to Hack a Tesla Model SMarc Rogers Principle Security Researcher for CloudFlareKevin Mahaffey CTO of Lookout IncThe Tesla Model S is the most connected car in the world. It might surprise you to hear that it is also one of the most secu
Investigating the Practicality and Cost of Abusing Memory Errors with DNSLuke Young Information Security Engineer, Hydrant Labs LLCIn a world full of targeted attacks and complex exploits this talk explores an attack that can simplified so e
Pivoting Without Rights – Introducing PivoterGeoff Walton Senior Security Consultant for Cleveland-based TrustedSecDave Kennedy (ReL1K/HackingDave), founder of TrustedSec and Binary Defense SystemsOne of the most challenging steps of a pene
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFIDFrancis Brown Partner - Bishop FoxShubham Shah Security Analyst at Bishop FoxHave you ever attended an RFID hacking presentation and walked away with more questions than answers? Thi
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Damon-Small-Beyond-the-Scan.pdf Beyond the Scan: The Value Proposition of Vulnerability AssessmentDamon Small Security ResearcherVuln
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-Wifi-Village.pdfIntroduction to SDR and the Wireless VillageDaKahunasatanklawzIn many ci
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker.pdfHackers Hiring Hackers - How to Do Things BetterTottenkoph Security Consultant, Rapid7
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially YubikeyLosTWe're no strangers to loveYou know the rules and so do IA full commitment's what I'm thinking ofYou wouldn't get this from any other guyI just
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf Extras here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-UPDATED.pdf Whitepaper here: https://media.defcon.org/DEF%20
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features