Quantcast
Channel: Tuts 4 You : Forum
Viewing all articles
Browse latest Browse all 2730

DEFCON : Wondering If We Have More Speakers to Share With You? Wonder

$
0
0

The short answer is 'Yes'. The long answer is the rest of this post. So. Many. Presentations.

You probably want to go get your reading glasses. Or black-market cyber eyes. Eye strain is a real possibility, and we care about your optic health.

Remember – take care of your eyes and they'll take care of you.

DragonLady: An Investigation of SMS Fraud Operations in Russia
Ryan W. Smith

The Government and UFOs: A Historical Analysis
Richard Thieme

Analyzing and Counter-Attacking Attacker Implanted Devices Case Study:Pwn Plug
Wesley McGrew

Business logic flaws in mobile operators services
Bogdan Alecu

A Password is Not Enough: Why Disk Encryption Is Broken And How We Might Fix It
Daniel Selifonov

PowerPwning: Post-Exploiting By Overpowering PowerShell
Joe Bialek

Doing Bad Things to 'Good' Security Appliances
Phorkus and Evilrob

Collaborative Penetration Testing with Lair
Tom Steele and Dan Kottman

Android WebLogin: Google's Skeleton Key
Craig Young

BoutiqueKit: Playing WarGames with Expensive Rootkits and Malware
Josh "m0nk" Thomas

Hardware Hacking with Microcontrollers: A Panel Discussion
Joe Grand, RenderMan, FirmWarez, LosT and Mark 'Smitty' Smith

This Presentation Will Self-destruct in 45 Minutes: A Forensic Deep Dive into Self-destructing Message Apps
Drea London and Kyle O'Meara

10000 Yen into the Sea
Flipper

Fear the Evil FOCA: IPv6 Attacks in Internet Connections
Chema Alonso

Let's Screw with nmap
Gregory Pickett

Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions
Andy Davis

The Bluetooth Device Database
Ryan Holeman

C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood
Jacob Thompson

Suicide Risk Assessment and Intervention Tactics
Amber Baldet

Conducting Massive Attacks with Open Source Distributed Computing
Alejandro Caceres

Resting on Your Laurels Will Get You Pwned: Effectively Code Reviewing REST Applications to Avoid Getting Powned
Abraham Kang and Dinis Cruz

Fast Forensics Using Simple Statistics and Cool Tools
John Ortiz

Forensic Fails - Shift + Delete Won't Help You Here
Eric Robi and Michael Perklin

EDS: Exploitation Detection System
Amr Thabet

HiveMind: Distributed File Storage Using JavaScript Botnets
Sean Malone

OTP, It won't save you from free rides!
bughardy and Eagle1753

Utilizing Popular Websites for Malicious Purposes Using RDI
Daniel Chechik and Anat (Fox) Davidi

gitDigger: Creating Useful Wordlists From Public GitHub Repositories
Jaime Filson (WiK) and Rob Fuller (Mubix)

Evolving Exploits Through Genetic Algorithms
soen

Proliferation
Ambassador Joseph DeTrani

The Growing Irrelevance of US Government Cybersecurity Intelligence Information
Mark Weatherford

Meet the VCs
Ping Li, Matt Ocko, Phil Paul, Eileen Burbridge

From Nukes to Cyber - Alternative Approaches for Proactive Defense and Mission Assurance
Lt Gen Robert Elder, USAF (Retired

An Open Letter - The White Hat's Dilemma: Professional Ethics
Alex Stamos

The Policy Wonk Lounge
Sameer Bhalotra, Robert Brese, Lt. Gen. Robert Elder, Bruce McConnell, Mark Weatherford


View the full article

Viewing all articles
Browse latest Browse all 2730

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>