media.defcon.org
Common Information
Type Value
UUID bb0c8f25-7ded-42a7-a69b-ed424bed0485
Fingerprint 600850381d62544c
Analysis status DONE
Considered CTI value 0
Text language
Published April 13, 2019, 10:58 p.m.
Added to db Feb. 17, 2023, 11:57 p.m.
Last updated Sept. 2, 2024, 11:39 p.m.
Headline /DEF CON 25/DEF CON 25 presentations/
Title media.defcon.org
Detected Hints/Tags/Attributes 51/1/168
Attributes
Details Type #Events CTI Value
Details Domain 5
media.defcon.org
Details File 1
0ctane-untrustworthy-hardware-updated.pdf
Details File 1
0ctane-untrustworthy-hardware.pdf
Details File 1
5a1f-demystifying-kernel-exploitation-by-abusing-gdi-objects-wp.pdf
Details File 1
5a1f-demystifying-kernel-exploitation-by-abusing-gdi-objects.pdf
Details File 1
alvaro-munoz-json-attacks-wp-updated.pdf
Details File 1
alvaro-munoz-json-attacks.pdf
Details File 1
alvaro-munoz-and-oleksandr-mirosh-json-attacks-updated.pdf
Details File 1
andrew-robbins-and-will-schroeder-an-ace-up-the-sleeve.pdf
Details File 1
artem-kondratenko-cisco-catalyst-exploitation-updated.pdf
Details File 1
artem-kondratenko-cisco-catalyst-exploitation.pdf
Details File 1
ayoul3-dealing-the-perfect-hand-shuffling-memory-blocks-on-zos.pdf
Details File 1
brown-and-latimer-game-of-drones-drone-defense-market-updated.pdf
Details File 1
caleb-madrigal-iot-hacking-with-sdr.pdf
Details File 1
cheng-lei-the-spear-to-break-the-security-wall-of-s7commplus-wp.pdf
Details File 1
cheng-lei-the-spear-to-break-the-security-wall-of-s7commplus.pdf
Details File 1
chris-thompson-ms-just-gave-the-blue-teams-tactical-nukes-updated.pdf
Details File 1
chris-thompson-ms-just-gave-the-blue-teams-tactical-nukes.pdf
Details File 1
christopher-domas-breaking-the-x86-isa-updated.pdf
Details File 1
christopher-domas-breaking-the-x86-isa.pdf
Details File 1
cincvolflt-inside-the-meet-desai-attack.pdf
Details File 1
closing-slides.pdf
Details File 1
coltel-leprovost-wsuspendu-how-to-hang-its-clients-wp.pdf
Details File 1
coltel-leprovost-wsuspendu-how-to-hang-its-clients.pdf
Details File 1
cooper-quintin-the-pregnancy-panopticon-wp-updated.pdf
Details File 1
cooper-quintin-and-kashmir-hill-the-internet-already-knows-im-pregnant-updated.pdf
Details File 1
cory-doctorow-steps-forward-steps-back-how-can-we-tell-if-we-are-winning-updated.pdf
Details File 1
defcon-101-the-panel-updated.pdf
Details File 1
damien-cauquil-weaponizing-the-bbc-microbit-updated.pdf
Details File 1
damien-cauquil-weaponizing-the-bbc-microbit.pdf
Details File 1
daniel-bohannon-and-lee-holmes-revoke-obfuscation.pdf
Details File 1
datko-and-quartier-breaking-bitcoin-hardware-wallets.pdf
Details File 1
denton-gentry-i-know-what-you-are-by-the-smell-of-your-wifi-updated.pdf
Details File 1
denton-gentry-i-know-what-you-are-by-the-smell-of-your-wifi-wp.pdf
Details File 1
denton-gentry-i-know-what-you-are-by-the-smell-of-your-wifi.pdf
Details File 1
dhia-mahjoub-and-thomas-mathew-malicious-cdns-identifying-zbot-domains-en-masse.pdf
Details File 1
dimitry-snezhkov-abusing-web-hooks-updated.pdf
Details File 1
dimitry-snezhkov-abusing-web-hooks.pdf
Details File 1
dor-azouri-bitsinject-wp.pdf
Details File 1
dor-azouri-bitsinject.pdf
Details File 1
eckert-and-dewes-dark-data-updated.pdf
Details File 1
foofus-secret-tools-learning-about-gov-surveillance-software.pdf
Details File 1
fuzzynop-and-ceyx-meatpistol-a-modular-malware-implant-framework-updated.pdf
Details File 1
gabriel-ryan-advanced-wireless-attacks-against-enterprise-networks-course-guide.pdf
Details File 1
gabriel-ryan-advanced-wireless-attacks-against-enterprise-networks-lab-setup-guide.pdf
Details File 1
gabriel-ryan-advanced-wireless-attacks-against-enterprise-networks.pdf
Details File 1
gabriel-ryan-the-black-art-of-wireless-post-exploitation-updated.pdf
Details File 1
gerald-steere-and-sean-metcalf-hacking-the-cloud-updated.pdf
Details File 1
gerald-steere-and-sean-metcalf-hacking-the-cloud.pdf
Details File 1
-pipe-updated.pdf
Details File 1
-pipe.pdf
Details File 1
gus-frischie-and-evan-teitelman-backdooring-the-lottery-updated.pdf
Details File 1
gus-frischie-and-evan-teitelman-backdooring-the-lottery.pdf
Details File 1
hanno-boeck-abusing-certificate-transparency-logs-updated.pdf
Details File 1
hanno-boeck-abusing-certificate-transparency-logs.pdf
Details File 1
haoqi-shan-and-jian-yuan-man-in-the-nfc.pdf
Details File 1
hernandez-richards-macdonald-evoy-tracking-spies-in-the-skies-updated.pdf
Details File 1
hernandez-richards-macdonald-evoy-tracking-spies-in-the-skies.pdf
Details File 1
hyrum-anderson-evading-next-gen-av-using-ai-updated.pdf
Details File 1
hyrum-anderson-evading-next-gen-av-using-ai.pdf
Details File 1
ilja-van-sprundel-bsd-kern-vulns-updated.pdf
Details File 1
ilja-van-sprundel-bsd-kern-vulns.pdf
Details File 1
inbar-and-eden-story-of-early-israeli-hacking-community-updated.pdf
Details File 1
inbar-and-eden-story-of-early-israeli-hacking-community.pdf
Details File 1
itzik-kotler-and-amit-klein-the-adventures-of-av-and-the-leaky-sandbox-wp.pdf
Details File 1
itzik-kotler-and-amit-klein-the-adventures-of-av-and-the-leaky-sandbox.pdf
Details File 1
jason-staggs-breaking-wind-hacking-wind-farm-control-networks-updated.pdf
Details File 1
jason-staggs-breaking-wind-hacking-wind-farm-control-networks.pdf
Details File 1
jesse-michael-and-mickey-shkatov-driving-down-the-rabbit-hole.pdf
Details File 1
jhaddix-hunt-data-driven-web-hacking-and-manual-testing.pdf
Details File 1
jim-nitterauer-dns-devious-name-services-destroying-privacy-anonymity-without-your-consent-updated.pdf
Details File 1
jim-nitterauer-dns-devious-name-services-destroying-privacy-anonymity-without-your-consent.pdf
Details File 1
joe-rozner-wiping-out-csrf-updated.pdf
Details File 1
joe-rozner-wiping-out-csrf.pdf
Details File 1
jon-medina-where-are-all-the-sdn-talks-updated.pdf
Details File 1
josh-pitts-teaching-old-shellcode-new-tricks-updated.pdf
Details File 1
josh-pitts-teaching-old-shellcode-new-tricks.pdf
Details File 1
k2-un-fucking-forensics-updated.pdf
Details File 1
karit-zx-security-using-gps-spoofing-to-control-time-updated.pdf
Details File 1
karit-zx-security-using-gps-spoofing-to-control-time.pdf
Details File 1
konstantinos-karagiannis-hacking-smart-contracts-updated.pdf
Details File 1
konstantinos-karagiannis-hacking-smart-contracts.pdf
Details File 1
lee-holmes-attacking-battle-hardened-windows-server.pdf
Details File 1
macpherson-and-temmingh-finding-useful-info-with-maltego-updated.pdf
Details File 1
marina-simakov-and-igal-gofman-here-to-stay-gaining-persistence-by-abusing-auth-mechanisms-updated.pdf
Details File 1
marina-simakov-and-igal-gofman-here-to-stay-gaining-persistence-by-abusing-auth-mechanisms.pdf
Details File 1
matt-joyce-amateur-digital-archeology-updated.pdf
Details File 1
matt-knight-and-marc-newlin-radio-exploitation-updated.pdf
Details File 1
matt-knight-and-marc-newlin-radio-exploitation-wp-updated.pdf
Details File 1
matt-knight-and-marc-newlin-radio-exploitation-wp.pdf
Details File 1
matt-knight-and-marc-newlin-radio-exploitation.pdf
Details File 1
matt-suiche-porosity-decompiling-ethereum-smart-contracts-updated.pdf
Details File 1
matt-suiche-porosity-decompiling-ethereum-smart-contracts-wp.pdf
Details File 1
matt-suiche-porosity-decompiling-ethereum-smart-contracts.pdf
Details File 1
matt-wixey-see-no-evil-hear-no-evil-updated.pdf
Details File 1
matt-wixey-see-no-evil-hear-no-evil.pdf
Details File 1
max-bazaliy-jailbreaking-apple-watch-updated.pdf
Details File 1
max-bazaliy-jailbreaking-apple-watch.pdf
Details File 1
mickey-jesse-and-oleksander-driving-down-the-rabbit-hole-updated.pdf
Details File 1
mikhail-sosonkin-hacking-travel-routers-like-1999-updated.pdf
Details File 1
mikhail-sosonkin-hacking-travel-routers-like-1999.pdf
Details File 1
min-spark-zheng-macos-ios-kernel-debugging-updated.pdf
Details File 1
min-spark-zheng-macos-ios-kernel-debugging.pdf
Details File 1
morten-schenk-taking-windows-10-kernel-exploitation-to-the-next-level-leveraging-vulns-in-creators-update-wp.pdf
Details File 1
morten-schenk-taking-windows-10-kernel-exploitation-to-the-next-level-leveraging-vulns-in-creators-update.pdf
Details File 1
morten-schenk-taking-windows-10-kernel-exploitation-to-the-next-level-updated.pdf
Details File 1
nathan-seidle-open-source-safe-cracking-robots-updated.pdf
Details File 1
nathan-seidle-open-source-safe-cracking-robots.pdf
Details File 1
newlin-lamb-grayson-cabletap-wirelessly-tapping-your-home-network.pdf
Details File 1
omar-eissa-attacking-autonomic-networks-updated.pdf
Details File 1
omar-eissa-attacking-autonomic-networks.pdf
Details File 1
in-trending-programming-languages-updated.pdf
Details File 1
orange-tsai-a-new-era-of-ssrf-exploiting-url-parser-in-trending-programming-languages.pdf
Details File 1
owen-snide-phone-system-testing-and-other-fun-tricks.pdf
Details File 1
panel-corman-and-congressmen-dc-to-defcon-updated.pdf
Details File 1
patrick-desantis-from-box-to-backdoor-using-old-school-tools-updated.pdf
Details File 1
patrick-desantis-from-box-to-backdoor-using-old-school-tools.pdf
Details File 1
patrick-wardle-death-by-1000-installers-on-macos-updated.pdf
Details File 1
patrick-wardle-offensive-malware-analysis-fruit-fly.pdf
Details File 1
phillip-tully-michael-raggo-a-picture-is-worth-a-thousand-words-literally-updated.pdf
Details File 1
phillip-tully-michael-raggo-a-picture-is-worth-a-thousand-words-literally-wp.pdf
Details File 1
phillip-tully-michael-raggo-a-picture-is-worth-a-thousand-words-literally.pdf
Details File 1
plore-popping-a-smart-gun-updated.pdf
Details File 1
plore-popping-a-smart-gun.pdf
Details File 1
vengeance-exploiting-notorious-toolkits.pdf
Details File 1
professor-plum-digital-vengeance-exploiting-notorious-toolkits-updated.pdf
Details File 1
redezem-peima-using-power-laws-to-address-dos-attacks-updated.pdf
Details File 1
roger-dingledine-next-generation-tor-onion-services-updated.pdf
Details File 1
roger-dingledine-next-generation-tor-onion-services.pdf
Details File 1
ryan-baxendale-microservices-and-faas-for-offensive-security-updated.pdf
Details File 1
ryan-baxendale-microservices-and-faas-for-offensive-security.pdf
Details File 1
salvador-mendoza-exploiting-0ld-magstripe-info-with-new-technology.pdf
Details File 1
scott-behrens-and-jeremy-heffner-starting-the-avalanche-application-dos-in-microservice-architectures.pdf
Details File 1
sean-kanuck-hacking-democracy-updated.pdf
Details File 1
slava-makkaveev-and-avi-bashan-unboxing-android-updated.pdf
Details File 1
slava-makkaveev-and-avi-bashan-unboxing-android.pdf
Details File 1
steinthor-bjarnason-and-jason-jones-the-call-is-coming-from-inside-the-house-updated.pdf
Details File 1
steinthor-bjarnason-and-jason-jones-the-call-is-coming-from-inside-the-house-wp.pdf
Details File 1
steinthor-bjarnason-and-jason-jones-the-call-is-coming-from-inside-the-house.pdf
Details File 1
stephan-huber-and-seigfried-rasthofer-password-manager-investigation-updated.pdf
Details File 1
stephan-huber-and-seigfried-rasthofer-password-manager-investigation.pdf
Details File 1
suggy-sumner-rage-against-the-weaponized-ai-propaganda-machine.pdf
Details File 1
svea-eckert-andreas-dewes-dark-data.pdf
Details File 1
tess-schrodinger-total-recall.pdf
Details File 1
tomer-cohen-game-of-chromes-owning-the-web-with-zombie-chrome-extensions-updated.pdf
Details File 1
tomer-cohen-game-of-chromes-owning-the-web-with-zombie-chrome-extensions-wp.pdf
Details File 1
tomer-cohen-game-of-chromes-owning-the-web-with-zombie-chrome-extensions.pdf
Details File 1
vasillios-mavroudis-trojan-tolerant-hardware-updated.pdf
Details File 1
vasillios-mavroudis-trojan-tolerant-hardware.pdf
Details File 1
weston-hecker-opt-out-or-deauth-trying.pdf
Details File 1
whitney-merrill-and-terrell-mcsweeny-tick-tick-boom-tech-and-the-ftc.pdf
Details File 1
william-knowles-persisting-with-microsoft-office.pdf
Details File 1
woodbury-and-haltmeyer-linux-stack-based-v2x-framework-hack-connected-vehicles-updated.pdf
Details File 1
woodbury-and-haltmeyer-linux-stack-based-v2x-framework-hack-connected-vehicles-wp.pdf
Details File 1
woodbury-and-haltmeyer-linux-stack-based-v2x-framework-hack-connected-vehicles.pdf
Details File 1
xlogicx-assembly-language-is-too-high-level.pdf
Details File 1
yuwei-zheng-unicornteam-ghost-telephonist-updated.pdf
Details File 1
yuwei-zheng-unicornteam-ghost-telephonist.pdf
Details File 1
zardus-25-years-of-program-analysis-updated.pdf
Details File 1
chaosdata-ghost-in-the-droid-paraspectre-updated.pdf
Details File 1
chaosdata-ghost-in-the-droid-paraspectre.pdf
Details File 1
r00killah-and-securelyfitz-secure-tokin-and-doobiekeys.pdf
Details File 1
skud-and-sky-if-you-give-a-mouse-a-microchip-updated.pdf
Details File 1
skud-and-sky-if-you-give-a-mouse-a-microchip.pdf
Details File 1
spaceb0x-exploiting-continuous-integration-updated.pdf
Details File 1
spaceb0x-exploiting-continuous-integration.pdf
Details File 1
trixr4skids-doomed-point-of-sale-systems-updated.pdf
Details File 1
zerosum0x0-alephnaught-koadic-c3.pdf