DEFCONConference
DEFCONConference
  • Видео 4 006
  • Просмотров 24 911 732

Видео

DEF CON 31 DCGVR Village - Jayson Street - KeynoteDEF CON 31 DCGVR Village - Jayson Street - Keynote
DEF CON 31 DCGVR Village - Jayson Street - Keynote
Просмотров 2,1 тыс.25 дней назад
Keynote presentation from DEF CON 31 DCGVR Village
DEF CON 31 DCGVR Village - Abhijeet Singh - Taking Down Applications With LogicDEF CON 31 DCGVR Village - Abhijeet Singh - Taking Down Applications With Logic
DEF CON 31 DCGVR Village - Abhijeet Singh - Taking Down Applications With Logic
Просмотров 1,6 тыс.25 дней назад
Presentation from DEF CON 31 DCGVR Village
DEF CON 31 DCGVR Village - JBO - The Curse Of The NcursesDEF CON 31 DCGVR Village - JBO - The Curse Of The Ncurses
DEF CON 31 DCGVR Village - JBO - The Curse Of The Ncurses
Просмотров 93425 дней назад
Presentation from DEF CON 31 DCGVR Village
DEF CON 31 DCGVR Village - Joe Mast - BootsquadDEF CON 31 DCGVR Village - Joe Mast - Bootsquad
DEF CON 31 DCGVR Village - Joe Mast - Bootsquad
Просмотров 44125 дней назад
Presentation from DEF CON 31 DCGVR Village
DEF CON 31 DCGVR Village - datalocaltmp - VR WorkspacesDEF CON 31 DCGVR Village - datalocaltmp - VR Workspaces
DEF CON 31 DCGVR Village - datalocaltmp - VR Workspaces
Просмотров 50025 дней назад
presentation from DEF CON 31 DCGVR Village
DEF CON 31 DCGVR Village - Squiddy - Gender Inclusive Health Information SystemDEF CON 31 DCGVR Village - Squiddy - Gender Inclusive Health Information System
DEF CON 31 DCGVR Village - Squiddy - Gender Inclusive Health Information System
Просмотров 75325 дней назад
Presentation from DEF CON 31 DCGVR Village
DEF CON 31 DCGVR Village - Sam Colaizzi - Hey Crypto BroDEF CON 31 DCGVR Village - Sam Colaizzi - Hey Crypto Bro
DEF CON 31 DCGVR Village - Sam Colaizzi - Hey Crypto Bro
Просмотров 77625 дней назад
Presentation from the DEF CON 31 DCGVR Village
DEF CON 31 DCGVR Village - hoodiepony - Ghost On The WireDEF CON 31 DCGVR Village - hoodiepony - Ghost On The Wire
DEF CON 31 DCGVR Village - hoodiepony - Ghost On The Wire
Просмотров 87625 дней назад
Talks from the DEF CON 31 DEF CON Groups Virtuality Village
DEF CON 31 DCGVR Village - Allen Baranov -What Is A GRC HackerDEF CON 31 DCGVR Village - Allen Baranov -What Is A GRC Hacker
DEF CON 31 DCGVR Village - Allen Baranov -What Is A GRC Hacker
Просмотров 6 тыс.3 месяца назад
Talks from the DEF CON 31 DEF CON Groups Virtuality Village
DEF CON 31 - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks - Ceri CoburnDEF CON 31 - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks - Ceri Coburn
DEF CON 31 - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks - Ceri Coburn
Просмотров 20 тыс.9 месяцев назад
The Windows Active Directory authority and the MIT/Heimdal Kerberos stacks found on Linux/Unix based hosts often coexist in harmony within the same Kerberos realm. This talk and tool demonstration will show how this marriage is a match made in hell. Microsoft's Kerberos stack relies on non standard data to identify it's users. MIT/Heimdal Kerberos stacks do not support this non standard way of ...
DEF CON 31 - Staying Undetected Using the Windows Container Isolation Framework - Daniel AvinoamDEF CON 31 - Staying Undetected Using the Windows Container Isolation Framework - Daniel Avinoam
DEF CON 31 - Staying Undetected Using the Windows Container Isolation Framework - Daniel Avinoam
Просмотров 17 тыс.9 месяцев назад
The use of containers became an integral part of any resource-efficient and secure environment. Starting from Windows Server 2016, Microsoft released its version of this solution called Windows Containers, which offers either a process or Hyper-V isolation modes. In both cases, an efficient file system separation should be provided. On one hand, each container should be able to access system fi...
DEF CON 31 - Contextualizing The Vulkan Leaks & State Sponsored Offensive Ops - Joe SlowikDEF CON 31 - Contextualizing The Vulkan Leaks & State Sponsored Offensive Ops - Joe Slowik
DEF CON 31 - Contextualizing The Vulkan Leaks & State Sponsored Offensive Ops - Joe Slowik
Просмотров 10 тыс.9 месяцев назад
In March 2023, journalists and investigators released analysis of “the Vulkan files.” Consisting of documents associated with a Russian company working with intelligence and military authorities, the papers revealed a variety of ambitious programs such as “Scan-V” and“Amezit.” Both programs, in the sense that they offer capabilities to acquire, maintain, and task infrastructure for cyber and in...
DEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer AttiasDEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer Attias
DEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer Attias
Просмотров 20 тыс.9 месяцев назад
Public transportation payment systems have undergone significant changes over the years. Recently, mobile payment solutions have become increasingly popular, allowing passengers to pay for their fare using their smartphones or other mobile devices. The evolution of public transportation payment systems has been driven by the need for faster, more convenient, and more secure payment methods, and...
DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3rDEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r
DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r
Просмотров 126 тыс.9 месяцев назад
Ever wake up and ask yourself: “Damn, how could I make email security suck even more today”? Tired of your Red Teams phishing emails not landing in your targets inbox? Do you dislike Boston (the city) and love Satan? If you answered yes to any of those questions you should come to this talk! I'll be showing you how to spoof emails from 2 million domains (while also “bypassing” SPF & DMARC!) by ...
DEF CON 31 Car Hacking Village - Automotive USB Fuzzing - Euntae Jang, Donghyon Jeong, Jonghyuk SongDEF CON 31 Car Hacking Village - Automotive USB Fuzzing - Euntae Jang, Donghyon Jeong, Jonghyuk Song
DEF CON 31 Car Hacking Village - Automotive USB Fuzzing - Euntae Jang, Donghyon Jeong, Jonghyuk Song
Просмотров 7 тыс.9 месяцев назад
Recently, automotive industry is performing USB fuzzing in an inefficient way for automobiles. Usually, fuzzing is performed by commercial media fuzzers, but the fuzzers are not directly connected to the vehicle during fuzzing. So, it requires much manual efforts of testers. In this talk, we propose efficient way to perform USB fuzzing to actual vehicles. We describe how to perform USB fuzzing ...

Комментарии

  • @Theole6.6
    @Theole6.6 13 часов назад

    Him showing his pgp encryption account list was cool

  • @Theole6.6
    @Theole6.6 13 часов назад

    I was on aloha bay forever lol never got caught hehe

  • @dakoderii4221
    @dakoderii4221 День назад

    Kazakhstan has some crazy "monuments" consisting of phallic symbols and a 5 pointed star with a barbecue joint inside. They serve barbecue ala "Fried Green Tomatoes" style.

  • @davidresig8679
    @davidresig8679 5 дней назад

    Obviously it was him and 33 other people

  • @robadzso
    @robadzso 5 дней назад

    Good stuff. Sisu right there.

  • @yakovdavidovich7943
    @yakovdavidovich7943 6 дней назад

    One of the best non-technical presentations ever at Defcon, IMO.

  • @maxdemontbron9720
    @maxdemontbron9720 6 дней назад

    He sounds like he's about to dive off a cliff onto hard ground while being held at gunpoint but otherwise very informative 😊

  • @mr.meatbeat9894
    @mr.meatbeat9894 8 дней назад

    Well done guys

  • @lalanotlistening
    @lalanotlistening 8 дней назад

    yikes

  • @gushy305
    @gushy305 8 дней назад

    2:50 note to self

  • @marceloteles1154
    @marceloteles1154 8 дней назад

    Wtf I work in the Vending Machine business have to see this😂

  • @Demost2
    @Demost2 9 дней назад

    I honestly think this will never be uncifered, its been to long to it to be reasonable to decifer.

  • @bluetrepidation
    @bluetrepidation 10 дней назад

    Great presentation. I wonder how the BMS determines the state of charge and how that has been changed over the years?

  • @self-taughtdev
    @self-taughtdev 10 дней назад

    Did I misunderstand? It wounds like some kid found a bug in Uber, reported it to uber so they could fix it, and uber paid him a bug bounty. Did the kid publicly dump Uber's data? Why did they get felonies?

  • @coldfear50
    @coldfear50 10 дней назад

    He gets no pussy

  • @raghavmahajan3341
    @raghavmahajan3341 11 дней назад

    I can't believe that this third world country called USA doesn't just have a backend source of truth for this. And that too on such old Mifare classic cards.

  • @Osentalka
    @Osentalka 11 дней назад

    30 years too late...

  • @IlyaPshenichny
    @IlyaPshenichny 11 дней назад

    in feb 24 2022 the largest internet provider was downed at about 4AM (about the invasion started). They wiped most of communication equipment and it took about a week to repair it (operator needed a physical access to equipment, but it was hard because of heavy random shellings of the city). National cell operator Kyivstar was attacked in december 2023 and they also wiped data. It took two days to renew voice communications and a day more for internet connectivity. Nine days after attack they stated that system is working 100% again

  • @marko90000
    @marko90000 12 дней назад

    Russian people should just learn to not use the same phones that ware used with other russian cards inside of ukrainian network cover the cameras by default do not use normal microphones by default have headphones to attach and additionally for officers and officials use satellite phones on your own satellites for communication of military commanders. Also do not mind to use the ground based mobile military stations radio communication relay vehicles of military that are encrypted well enough with changing ciphers and changing functions to encrypt the communication. Dont be stupid like Nazis. Make teams who attack your own infrastructure and communications in russia.

  • @theflowpowa42oshow
    @theflowpowa42oshow 12 дней назад

    F Russia

  • @paganisttc
    @paganisttc 13 дней назад

    wat r yu talking about

  • @ramdonko6661
    @ramdonko6661 14 дней назад

    -TY

  • @danman1012
    @danman1012 14 дней назад

    Jews did it

  • @theotherguy6282
    @theotherguy6282 14 дней назад

    11 years and counting, nice

  • @macdonald_duck
    @macdonald_duck 15 дней назад

    Cory Doctorow is a part of all this

  • @user-jk8kn3ij8o
    @user-jk8kn3ij8o 16 дней назад

    There’s no way to abort. Everyone is compromised.

  • @DinnerTimeFan
    @DinnerTimeFan 16 дней назад

    Imagine going to defcon in 1993 and being told it would inevitably turn into this corporate cringefest. It hits all the notes for what some scummy corporations think young hackers are.

  • @samykamkar
    @samykamkar 17 дней назад

    i miss you Dan! rip <3

  • @Spachtel83
    @Spachtel83 17 дней назад

    BIG Data = the more data, the less security! 😕 seems a little bit underated with only 4k views and 5 comments.

  • @cristiansoave5752
    @cristiansoave5752 18 дней назад

    Thanks Len. Rip Satoshi.❤

  • @bondfall0072
    @bondfall0072 18 дней назад

    This is an excellent speech, but i wish they didn't mute the crowd. They add so much life to this already funny speech.

  • @DavidKafor
    @DavidKafor 18 дней назад

    الناس مش مهتمه ب sysmon إلا بعد الاختراق 😂 Good video ❤

  • @userx2079
    @userx2079 19 дней назад

    It has to be him or Len. Or both of them (?) It's definitely someone from that Mojo/ cypherpunk/ academic/ PGP circle.

  • @abhinavdeep4812
    @abhinavdeep4812 19 дней назад

    Very insightful 👏

  • @ndymany4049
    @ndymany4049 19 дней назад

    Hello i'm Richarson . I am in a project where I have to deploy packet fence , i have install it and have access to the the GUI interface of Packet Fence ; but now i don't really know how and where to start to configure the detection of device on my network , the integration of an existing Active Directory for authenticating of the device. Please i need you to help me, thank you

  • @AWPologize
    @AWPologize 19 дней назад

    never thought that such vulnerabilities like access control can be escalated to denial of service attack. Cool stuffs

  • @lerneninverschiedenenforme7513
    @lerneninverschiedenenforme7513 19 дней назад

    this talk seems a little too unpopular…

  • @jessicareyna8135
    @jessicareyna8135 19 дней назад

    😮😮

  • @petermcrory5194
    @petermcrory5194 20 дней назад

    tldr >tribes

  • @renakunisaki
    @renakunisaki 20 дней назад

    I think the scariest part of this is learning that enterprise systems are using fancy macro recording for automation.

  • @bobbobby1624
    @bobbobby1624 20 дней назад

    you look like you have a small wireframe bed in front of young you're lecturing someone just trying to sleep

  • @vladwhitechurch1001
    @vladwhitechurch1001 20 дней назад

    Thanks for information!

  • @5rv9KY
    @5rv9KY 20 дней назад

    PS4 PPPWNed

  • @CoconutPete
    @CoconutPete 21 день назад

    LMAO Inshitternet

  • @user-ew7vl3kj5i
    @user-ew7vl3kj5i 21 день назад

    Man wtf

  • @user-wh8qe7wf7n
    @user-wh8qe7wf7n 21 день назад

    Bro is a genius

  • @fagletrado1972
    @fagletrado1972 22 дня назад

    futuro de las prisiones

  • @miscosas
    @miscosas 22 дня назад

    omg why defcon doing that vr presentations? the main diff to watch defcon was the atmosphere of the videos and presentations :(

  • @jesusaguilar6194
    @jesusaguilar6194 22 дня назад

    I hope you realize that this DefCon talk is bad. Not because of who the presenter is or the political stance this talk takes. It is bad because it is irrelevant to the core of DefCon, which is as I had believed for so many years, a hacking convention targeted to the non licensed and licensed people. Unless you are showing how to exploit a system/hardware/social event it’s generally irrelevant to this. I believe that by you doing this talk you harm the LGB community making it more acceptable to dislike Queer people and come off as a real “PickMe” person, giving those who claim that lgbTQ are always shoving it down everyone’s throat further examples to point to. Reconsider your life choices and learn some shame.

  • @coderhex1675
    @coderhex1675 22 дня назад

    I still dont believe that she is real. She is an AI or she is trans-gender.