media.defcon.org
Tags
Common Information
Type | Value |
---|---|
UUID | bb0c8f25-7ded-42a7-a69b-ed424bed0485 |
Fingerprint | 600850381d62544c |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | April 13, 2019, 10:58 p.m. |
Added to db | Feb. 17, 2023, 11:57 p.m. |
Last updated | Sept. 2, 2024, 11:39 p.m. |
Headline | /DEF CON 25/DEF CON 25 presentations/ |
Title | media.defcon.org |
Detected Hints/Tags/Attributes | 51/1/168 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 5 | media.defcon.org |
|
Details | File | 1 | 0ctane-untrustworthy-hardware-updated.pdf |
|
Details | File | 1 | 0ctane-untrustworthy-hardware.pdf |
|
Details | File | 1 | 5a1f-demystifying-kernel-exploitation-by-abusing-gdi-objects-wp.pdf |
|
Details | File | 1 | 5a1f-demystifying-kernel-exploitation-by-abusing-gdi-objects.pdf |
|
Details | File | 1 | alvaro-munoz-json-attacks-wp-updated.pdf |
|
Details | File | 1 | alvaro-munoz-json-attacks.pdf |
|
Details | File | 1 | alvaro-munoz-and-oleksandr-mirosh-json-attacks-updated.pdf |
|
Details | File | 1 | andrew-robbins-and-will-schroeder-an-ace-up-the-sleeve.pdf |
|
Details | File | 1 | artem-kondratenko-cisco-catalyst-exploitation-updated.pdf |
|
Details | File | 1 | artem-kondratenko-cisco-catalyst-exploitation.pdf |
|
Details | File | 1 | ayoul3-dealing-the-perfect-hand-shuffling-memory-blocks-on-zos.pdf |
|
Details | File | 1 | brown-and-latimer-game-of-drones-drone-defense-market-updated.pdf |
|
Details | File | 1 | caleb-madrigal-iot-hacking-with-sdr.pdf |
|
Details | File | 1 | cheng-lei-the-spear-to-break-the-security-wall-of-s7commplus-wp.pdf |
|
Details | File | 1 | cheng-lei-the-spear-to-break-the-security-wall-of-s7commplus.pdf |
|
Details | File | 1 | chris-thompson-ms-just-gave-the-blue-teams-tactical-nukes-updated.pdf |
|
Details | File | 1 | chris-thompson-ms-just-gave-the-blue-teams-tactical-nukes.pdf |
|
Details | File | 1 | christopher-domas-breaking-the-x86-isa-updated.pdf |
|
Details | File | 1 | christopher-domas-breaking-the-x86-isa.pdf |
|
Details | File | 1 | cincvolflt-inside-the-meet-desai-attack.pdf |
|
Details | File | 1 | closing-slides.pdf |
|
Details | File | 1 | coltel-leprovost-wsuspendu-how-to-hang-its-clients-wp.pdf |
|
Details | File | 1 | coltel-leprovost-wsuspendu-how-to-hang-its-clients.pdf |
|
Details | File | 1 | cooper-quintin-the-pregnancy-panopticon-wp-updated.pdf |
|
Details | File | 1 | cooper-quintin-and-kashmir-hill-the-internet-already-knows-im-pregnant-updated.pdf |
|
Details | File | 1 | cory-doctorow-steps-forward-steps-back-how-can-we-tell-if-we-are-winning-updated.pdf |
|
Details | File | 1 | defcon-101-the-panel-updated.pdf |
|
Details | File | 1 | damien-cauquil-weaponizing-the-bbc-microbit-updated.pdf |
|
Details | File | 1 | damien-cauquil-weaponizing-the-bbc-microbit.pdf |
|
Details | File | 1 | daniel-bohannon-and-lee-holmes-revoke-obfuscation.pdf |
|
Details | File | 1 | datko-and-quartier-breaking-bitcoin-hardware-wallets.pdf |
|
Details | File | 1 | denton-gentry-i-know-what-you-are-by-the-smell-of-your-wifi-updated.pdf |
|
Details | File | 1 | denton-gentry-i-know-what-you-are-by-the-smell-of-your-wifi-wp.pdf |
|
Details | File | 1 | denton-gentry-i-know-what-you-are-by-the-smell-of-your-wifi.pdf |
|
Details | File | 1 | dhia-mahjoub-and-thomas-mathew-malicious-cdns-identifying-zbot-domains-en-masse.pdf |
|
Details | File | 1 | dimitry-snezhkov-abusing-web-hooks-updated.pdf |
|
Details | File | 1 | dimitry-snezhkov-abusing-web-hooks.pdf |
|
Details | File | 1 | dor-azouri-bitsinject-wp.pdf |
|
Details | File | 1 | dor-azouri-bitsinject.pdf |
|
Details | File | 1 | eckert-and-dewes-dark-data-updated.pdf |
|
Details | File | 1 | foofus-secret-tools-learning-about-gov-surveillance-software.pdf |
|
Details | File | 1 | fuzzynop-and-ceyx-meatpistol-a-modular-malware-implant-framework-updated.pdf |
|
Details | File | 1 | gabriel-ryan-advanced-wireless-attacks-against-enterprise-networks-course-guide.pdf |
|
Details | File | 1 | gabriel-ryan-advanced-wireless-attacks-against-enterprise-networks-lab-setup-guide.pdf |
|
Details | File | 1 | gabriel-ryan-advanced-wireless-attacks-against-enterprise-networks.pdf |
|
Details | File | 1 | gabriel-ryan-the-black-art-of-wireless-post-exploitation-updated.pdf |
|
Details | File | 1 | gerald-steere-and-sean-metcalf-hacking-the-cloud-updated.pdf |
|
Details | File | 1 | gerald-steere-and-sean-metcalf-hacking-the-cloud.pdf |
|
Details | File | 1 | -pipe-updated.pdf |
|
Details | File | 1 | -pipe.pdf |
|
Details | File | 1 | gus-frischie-and-evan-teitelman-backdooring-the-lottery-updated.pdf |
|
Details | File | 1 | gus-frischie-and-evan-teitelman-backdooring-the-lottery.pdf |
|
Details | File | 1 | hanno-boeck-abusing-certificate-transparency-logs-updated.pdf |
|
Details | File | 1 | hanno-boeck-abusing-certificate-transparency-logs.pdf |
|
Details | File | 1 | haoqi-shan-and-jian-yuan-man-in-the-nfc.pdf |
|
Details | File | 1 | hernandez-richards-macdonald-evoy-tracking-spies-in-the-skies-updated.pdf |
|
Details | File | 1 | hernandez-richards-macdonald-evoy-tracking-spies-in-the-skies.pdf |
|
Details | File | 1 | hyrum-anderson-evading-next-gen-av-using-ai-updated.pdf |
|
Details | File | 1 | hyrum-anderson-evading-next-gen-av-using-ai.pdf |
|
Details | File | 1 | ilja-van-sprundel-bsd-kern-vulns-updated.pdf |
|
Details | File | 1 | ilja-van-sprundel-bsd-kern-vulns.pdf |
|
Details | File | 1 | inbar-and-eden-story-of-early-israeli-hacking-community-updated.pdf |
|
Details | File | 1 | inbar-and-eden-story-of-early-israeli-hacking-community.pdf |
|
Details | File | 1 | itzik-kotler-and-amit-klein-the-adventures-of-av-and-the-leaky-sandbox-wp.pdf |
|
Details | File | 1 | itzik-kotler-and-amit-klein-the-adventures-of-av-and-the-leaky-sandbox.pdf |
|
Details | File | 1 | jason-staggs-breaking-wind-hacking-wind-farm-control-networks-updated.pdf |
|
Details | File | 1 | jason-staggs-breaking-wind-hacking-wind-farm-control-networks.pdf |
|
Details | File | 1 | jesse-michael-and-mickey-shkatov-driving-down-the-rabbit-hole.pdf |
|
Details | File | 1 | jhaddix-hunt-data-driven-web-hacking-and-manual-testing.pdf |
|
Details | File | 1 | jim-nitterauer-dns-devious-name-services-destroying-privacy-anonymity-without-your-consent-updated.pdf |
|
Details | File | 1 | jim-nitterauer-dns-devious-name-services-destroying-privacy-anonymity-without-your-consent.pdf |
|
Details | File | 1 | joe-rozner-wiping-out-csrf-updated.pdf |
|
Details | File | 1 | joe-rozner-wiping-out-csrf.pdf |
|
Details | File | 1 | jon-medina-where-are-all-the-sdn-talks-updated.pdf |
|
Details | File | 1 | josh-pitts-teaching-old-shellcode-new-tricks-updated.pdf |
|
Details | File | 1 | josh-pitts-teaching-old-shellcode-new-tricks.pdf |
|
Details | File | 1 | k2-un-fucking-forensics-updated.pdf |
|
Details | File | 1 | karit-zx-security-using-gps-spoofing-to-control-time-updated.pdf |
|
Details | File | 1 | karit-zx-security-using-gps-spoofing-to-control-time.pdf |
|
Details | File | 1 | konstantinos-karagiannis-hacking-smart-contracts-updated.pdf |
|
Details | File | 1 | konstantinos-karagiannis-hacking-smart-contracts.pdf |
|
Details | File | 1 | lee-holmes-attacking-battle-hardened-windows-server.pdf |
|
Details | File | 1 | macpherson-and-temmingh-finding-useful-info-with-maltego-updated.pdf |
|
Details | File | 1 | marina-simakov-and-igal-gofman-here-to-stay-gaining-persistence-by-abusing-auth-mechanisms-updated.pdf |
|
Details | File | 1 | marina-simakov-and-igal-gofman-here-to-stay-gaining-persistence-by-abusing-auth-mechanisms.pdf |
|
Details | File | 1 | matt-joyce-amateur-digital-archeology-updated.pdf |
|
Details | File | 1 | matt-knight-and-marc-newlin-radio-exploitation-updated.pdf |
|
Details | File | 1 | matt-knight-and-marc-newlin-radio-exploitation-wp-updated.pdf |
|
Details | File | 1 | matt-knight-and-marc-newlin-radio-exploitation-wp.pdf |
|
Details | File | 1 | matt-knight-and-marc-newlin-radio-exploitation.pdf |
|
Details | File | 1 | matt-suiche-porosity-decompiling-ethereum-smart-contracts-updated.pdf |
|
Details | File | 1 | matt-suiche-porosity-decompiling-ethereum-smart-contracts-wp.pdf |
|
Details | File | 1 | matt-suiche-porosity-decompiling-ethereum-smart-contracts.pdf |
|
Details | File | 1 | matt-wixey-see-no-evil-hear-no-evil-updated.pdf |
|
Details | File | 1 | matt-wixey-see-no-evil-hear-no-evil.pdf |
|
Details | File | 1 | max-bazaliy-jailbreaking-apple-watch-updated.pdf |
|
Details | File | 1 | max-bazaliy-jailbreaking-apple-watch.pdf |
|
Details | File | 1 | mickey-jesse-and-oleksander-driving-down-the-rabbit-hole-updated.pdf |
|
Details | File | 1 | mikhail-sosonkin-hacking-travel-routers-like-1999-updated.pdf |
|
Details | File | 1 | mikhail-sosonkin-hacking-travel-routers-like-1999.pdf |
|
Details | File | 1 | min-spark-zheng-macos-ios-kernel-debugging-updated.pdf |
|
Details | File | 1 | min-spark-zheng-macos-ios-kernel-debugging.pdf |
|
Details | File | 1 | morten-schenk-taking-windows-10-kernel-exploitation-to-the-next-level-leveraging-vulns-in-creators-update-wp.pdf |
|
Details | File | 1 | morten-schenk-taking-windows-10-kernel-exploitation-to-the-next-level-leveraging-vulns-in-creators-update.pdf |
|
Details | File | 1 | morten-schenk-taking-windows-10-kernel-exploitation-to-the-next-level-updated.pdf |
|
Details | File | 1 | nathan-seidle-open-source-safe-cracking-robots-updated.pdf |
|
Details | File | 1 | nathan-seidle-open-source-safe-cracking-robots.pdf |
|
Details | File | 1 | newlin-lamb-grayson-cabletap-wirelessly-tapping-your-home-network.pdf |
|
Details | File | 1 | omar-eissa-attacking-autonomic-networks-updated.pdf |
|
Details | File | 1 | omar-eissa-attacking-autonomic-networks.pdf |
|
Details | File | 1 | in-trending-programming-languages-updated.pdf |
|
Details | File | 1 | orange-tsai-a-new-era-of-ssrf-exploiting-url-parser-in-trending-programming-languages.pdf |
|
Details | File | 1 | owen-snide-phone-system-testing-and-other-fun-tricks.pdf |
|
Details | File | 1 | panel-corman-and-congressmen-dc-to-defcon-updated.pdf |
|
Details | File | 1 | patrick-desantis-from-box-to-backdoor-using-old-school-tools-updated.pdf |
|
Details | File | 1 | patrick-desantis-from-box-to-backdoor-using-old-school-tools.pdf |
|
Details | File | 1 | patrick-wardle-death-by-1000-installers-on-macos-updated.pdf |
|
Details | File | 1 | patrick-wardle-offensive-malware-analysis-fruit-fly.pdf |
|
Details | File | 1 | phillip-tully-michael-raggo-a-picture-is-worth-a-thousand-words-literally-updated.pdf |
|
Details | File | 1 | phillip-tully-michael-raggo-a-picture-is-worth-a-thousand-words-literally-wp.pdf |
|
Details | File | 1 | phillip-tully-michael-raggo-a-picture-is-worth-a-thousand-words-literally.pdf |
|
Details | File | 1 | plore-popping-a-smart-gun-updated.pdf |
|
Details | File | 1 | plore-popping-a-smart-gun.pdf |
|
Details | File | 1 | vengeance-exploiting-notorious-toolkits.pdf |
|
Details | File | 1 | professor-plum-digital-vengeance-exploiting-notorious-toolkits-updated.pdf |
|
Details | File | 1 | redezem-peima-using-power-laws-to-address-dos-attacks-updated.pdf |
|
Details | File | 1 | roger-dingledine-next-generation-tor-onion-services-updated.pdf |
|
Details | File | 1 | roger-dingledine-next-generation-tor-onion-services.pdf |
|
Details | File | 1 | ryan-baxendale-microservices-and-faas-for-offensive-security-updated.pdf |
|
Details | File | 1 | ryan-baxendale-microservices-and-faas-for-offensive-security.pdf |
|
Details | File | 1 | salvador-mendoza-exploiting-0ld-magstripe-info-with-new-technology.pdf |
|
Details | File | 1 | scott-behrens-and-jeremy-heffner-starting-the-avalanche-application-dos-in-microservice-architectures.pdf |
|
Details | File | 1 | sean-kanuck-hacking-democracy-updated.pdf |
|
Details | File | 1 | slava-makkaveev-and-avi-bashan-unboxing-android-updated.pdf |
|
Details | File | 1 | slava-makkaveev-and-avi-bashan-unboxing-android.pdf |
|
Details | File | 1 | steinthor-bjarnason-and-jason-jones-the-call-is-coming-from-inside-the-house-updated.pdf |
|
Details | File | 1 | steinthor-bjarnason-and-jason-jones-the-call-is-coming-from-inside-the-house-wp.pdf |
|
Details | File | 1 | steinthor-bjarnason-and-jason-jones-the-call-is-coming-from-inside-the-house.pdf |
|
Details | File | 1 | stephan-huber-and-seigfried-rasthofer-password-manager-investigation-updated.pdf |
|
Details | File | 1 | stephan-huber-and-seigfried-rasthofer-password-manager-investigation.pdf |
|
Details | File | 1 | suggy-sumner-rage-against-the-weaponized-ai-propaganda-machine.pdf |
|
Details | File | 1 | svea-eckert-andreas-dewes-dark-data.pdf |
|
Details | File | 1 | tess-schrodinger-total-recall.pdf |
|
Details | File | 1 | tomer-cohen-game-of-chromes-owning-the-web-with-zombie-chrome-extensions-updated.pdf |
|
Details | File | 1 | tomer-cohen-game-of-chromes-owning-the-web-with-zombie-chrome-extensions-wp.pdf |
|
Details | File | 1 | tomer-cohen-game-of-chromes-owning-the-web-with-zombie-chrome-extensions.pdf |
|
Details | File | 1 | vasillios-mavroudis-trojan-tolerant-hardware-updated.pdf |
|
Details | File | 1 | vasillios-mavroudis-trojan-tolerant-hardware.pdf |
|
Details | File | 1 | weston-hecker-opt-out-or-deauth-trying.pdf |
|
Details | File | 1 | whitney-merrill-and-terrell-mcsweeny-tick-tick-boom-tech-and-the-ftc.pdf |
|
Details | File | 1 | william-knowles-persisting-with-microsoft-office.pdf |
|
Details | File | 1 | woodbury-and-haltmeyer-linux-stack-based-v2x-framework-hack-connected-vehicles-updated.pdf |
|
Details | File | 1 | woodbury-and-haltmeyer-linux-stack-based-v2x-framework-hack-connected-vehicles-wp.pdf |
|
Details | File | 1 | woodbury-and-haltmeyer-linux-stack-based-v2x-framework-hack-connected-vehicles.pdf |
|
Details | File | 1 | xlogicx-assembly-language-is-too-high-level.pdf |
|
Details | File | 1 | yuwei-zheng-unicornteam-ghost-telephonist-updated.pdf |
|
Details | File | 1 | yuwei-zheng-unicornteam-ghost-telephonist.pdf |
|
Details | File | 1 | zardus-25-years-of-program-analysis-updated.pdf |
|
Details | File | 1 | chaosdata-ghost-in-the-droid-paraspectre-updated.pdf |
|
Details | File | 1 | chaosdata-ghost-in-the-droid-paraspectre.pdf |
|
Details | File | 1 | r00killah-and-securelyfitz-secure-tokin-and-doobiekeys.pdf |
|
Details | File | 1 | skud-and-sky-if-you-give-a-mouse-a-microchip-updated.pdf |
|
Details | File | 1 | skud-and-sky-if-you-give-a-mouse-a-microchip.pdf |
|
Details | File | 1 | spaceb0x-exploiting-continuous-integration-updated.pdf |
|
Details | File | 1 | spaceb0x-exploiting-continuous-integration.pdf |
|
Details | File | 1 | trixr4skids-doomed-point-of-sale-systems-updated.pdf |
|
Details | File | 1 | zerosum0x0-alephnaught-koadic-c3.pdf |