Search This Blog

Sunday, February 13, 2011

peeches and video presentations to DEFCON 18 (2010)

peeches and video presentations to DEFCON 18 (2010)

peeches and video presentations to DEFCON 18 (2010)
English | H264 410 Kbps | 800 x 600 15.000 fps | MP3 65Kbps | 9.99 GB

Genre: eLearning

Video and video presentations with a hacker conference DefCon 18
Screenshot

peeches and video presentations to DEFCON 18 (2010)

Contents
AP Delchi - Physical Security You Are Doing It Wrong
Adam Pridgen and Matt Wollenweber - Toolsmithing an IDA Bridge
Adrian Crenshaw - Programmable HID USB Keystroke Dongle
Ahn Ki-Chan and Ha Dong-Joo - Malware Migrating to Gaming Consoles
Andrew Kongs and Dr. Gerald Kane - Training the Next Generation of Hardware Hackers
Barnaby Jack - Jackpotting Automated Teller Machines Redux
Blake Self and bitemytaco - Hacking DOCSIS For Fun and Profit
Blake Self with Wayne and Dolores Zage - SMART Project
Brad Smith - Weaponizing Lady GaGa
Brandon Nesbit - The Games We Play
Bruce Potter and Logan Lodge - This Needs to be Fixed
Cesar Cerrudo - Token Kidnappings Revenge
Chad Houck and Jason Lee - Decoding reCAPTCHA
Charlie Miller - Kim Jong-il and Me
Chema Alonso and Jose Palazon - Connection String Parameter Attacks
Chema Alonso and Jose Palazon - FOCA2 The FOCA Strikes Back
Chris Conley - Hacking Facebook Privacy
Chris Paget - Extreme-Range RFID Tracking
Chris Paget - Practical Cellphone Spying
Craig Heffner - How to Hack Millions of Routers
Daniel Burroughs - Open Public Sensors and Trend Monitoring
Dan Kaminsky - Black Ops Of Defense Web Edition
Dark Tangent and Joe Grand - Welcome and Making the Badge
Dave King - Hardware Hacking for Software Guys
David Bryan and Michael Anderson - Cloud Computing and a WMD
David C Smith and Samuel Petreski - A New Approach to Forensic Methodology
David Kennedy and Josh Kelley - Powershell omfg
David Maynor and Paul Judge - Searching for Malware
Decius - Exploiting Internet Surveillance Systems
Dennis Brown - How Hackers Won the Zombie Apocalypse
Dennis Brown - Resilient Botnet Command and Control with Tor
Deviant Ollam and Toool - The Search for Perfect Handcuffs
Dondi West - Adequacy of the Laws Related to Cyber Warfare
Doug Mohney - HD Voice - The Overdue Revolution
Elie Bursztein and Jocelyn Lagarenne - Kartograph
Elie Bursztein and Panel - Bad Memories
Esteban Martinez Fayo - Hacking and Protecting Oracle Database Vault
Felix FX Lindner - Blitzableiter
Ferdinand Schober - Gaming in the Glass Safe
Francisco Amato and Federico Kirschbaum - Evilgrade and You Still Have Pending Upgrades
frank ^ 2 - Trolling Reverse-Engineers with Math
Frank Breedijk - Seccubus - Analyzing Vulnerability Assessment Data the Easy Way
Fyodor and David Fifield - Mastering the Nmap Scripting Engine
Garry Pejski - My Life as a Spyware Developer
G Mark Hardy - Tales from the Crypto
Granick Bankston Hofmann and Opsahl - The Law of Laptop Search and Seizure
Greg Conti - Our Instrumented Lives
HONEY - Ripping Media Off Of the Wire
Huang Chiu and Wu - 0box Analyzer
Iftach Ian Amit-Cyber Crime War Charting Dangerous Waters
Itzhak Avraham Exploitation on ARM
Jack Daniel and Panel - PCI and Compromising Controls and Compromising Security
James Arlen - SCADA and ICS How to Avoid Cyberdouchery
James Shewmaker - Browser Based Defenses
Jason Scott - You are Stealing It Wrong 30 Years of Inter-Pirate Battles
Jayson E Street - Deceiving the Heavens to Cross the Sea
Jeff Bryner - Google Toolbar The NARC Within
Jennifer Granick and Matt Zimmerman - Legal Developments in Hardware Hacking
Jeongwook Oh - Exploit Spotting Locating Vulnerabilities Out of Vendor Patches Automatically
Jeremy Brown - Exploiting SCADA Systems
Jimi Fiekert - The Anatomy of Drug Testing
Jim Rennie and Eric Rachner - Search & Seizure & Golfballs
Joe Damato - Function Hooking for Mac OSX and Linux
John Curran - IPv6 No Longer Optional
John McNabb - Cyberterrorism and the Security of the National Drinking Water Infrastructure
Jonathan Lee and Neil Pahl - Bypassing Smart-Card Authentication and Blocking Debiting
Jon McCoy - Hacking Net Applications A Dynamic Attack
Jon Oberheide - Antique Exploitation aka Terminator
Joseph McCray - You Spent All That Money and You Still Got Owned
Josh Pyorre and Chris McKenney - Build Your Own Security Ops Center - Audio.m4b
Josh Pyorre and Chris McKenney - Build Your Own Security Ops Center
Joshua Marpet - Facial Recognition
Joshua Wise - From No Way to 0-day
JP Dunning - Breaking Bluetooth by Being Bored
JP Dunning - Katana Portable Multi-Boot Security Suite
Justin Morehouse and Tony Flick - Getting Social with the Smart Grid
Kenneth Geers - Live Fire Exercise Baltic Cyber Shield 2010
Kevin Mahaffey and John Hering - App Attack
Lai Appelbaum and Oberheide - The Power of Chinese Security
Leigh Honeywell and follower - Physical Computing and Virtual Security
Lineberry Richardson and Wyatt - These Aren't the Permissions
Luiz Eduardo-Your Boss is a Douchebag How About You
Mage2 - Electronic Weaponry
Marcia Hofmann - How To Get Your FBI File
Marco Bonetti - Mobile Privacy
Marisa Fagan - Be a Mentor
Matias Madou and Jacob West - Repelling the Wily Insider
Matt Krick - DCFluX in Moon-Bouncer
Matt Ryanczak - Implementing IPv6 at ARIN
Max Kelly - Perspectives in Cybersecurity and Cyberwarfare
Md Sohail Ahmad - WPA Too
metr0 - Securing MMOs
Michael Brooks - masSEXploitation
Michael Schearer - SHODAN for Penetration Testers
Mike Bailey - Web Services We Just Do Not Need
Mike Metzger - Letting the Air Out of Tire Pressure Monitoring Systems
Monta Elkins - Hacking with Hardware Introducing URFUKED
Moxie Marlinspike - Changing Threats To Privacy From TIA to Google
Nathan Hamiel and Marcin Wielgoszewski - Constricting the Web
Nguyen Anh Quynh - Operating System Fingerprinting for Virtual Machines
Nicholas J. Percoco and Christian Papathanasiou - This is Not the Droid You are Looking For
Nicholas J. Percoco and Jibran Ilyas - Malware Freak Show 2
Nicole Ozer and Kevin Bankston - Big Brother on the Big Screen
Oren Isacson and Alfredo Ortega - Exploiting Digital Cameras
Panel - ChaosVPN for Playing CTFs
Panel - Defcon Security Jam III Now in 3-D
Panel - DNS Systemic Vulnerabilities and Risk Management
Panel-Meet the EFF
Panel - Meet the Feds - CSI TCP IP
Panel - Meet the Feds - Policy Privacy Deterrence and Cyber War
Panel - oCTF 5 years in 50 minutes
Panel - Of Bytes and Bullets
Patrick Mullen and Ryan Pentney - Open Source Framework for Advanced IDS
Paul Haas - Advanced Format String Attacks
Peter Eckersley - How Unique Is Your Browser
Peter Eckersley and Jesse Burns - An Observatory for the SSLiverse
Pierce Goldy aSmig and sanitybit - WiMAX Hacking 2010
Polk Malkewicz and Novak - Industrial Cyber Security
Rain and urbanmonkey-Build a Lie Detector
Richard Thieme - Getting Root Remote Viewing and Non-Local Consciousness
Rich Smith - In-memory Reverse Engineering for Obfuscated Python
Righter Kunkel - Air Traffic Control Insecurity
Riley Repko - Enough Cyber Talk Already
Robert Edmonds and Paul Vixie - Passive DNS Hardening
Rob Ragan and Francis Brown - Lord of the Bing
Ryan Linn - Multiplayer Metasploit
Sam Bowne - Who Cares About IPv6
Samy Kamkar - How I Met Your Girlfriend
Schuyler Towne and datagram - Attack the Key and Own the Lock
Scott Wolchok - Crawling BitTorrent DHTs for Fun
Shawn Merdinger - We Dont Need No Stinkin Badges
Shawn Moyer and Nathan Keltner - Wardriving the Smart Grid
Sho Ho - FOE The Release of Feed Over Email
Smith Ames and Lai - Balancing the Pwn Trade Deficit
Stracener Barnum and Peterson - So Many Ways to Slap A Yo-Ho
Sumit Siddharth - Hacking Oracle From Web Apps
The Suggmeister - Social Networking Special Ops
Tobias Bluzmanis and Fiddler - Locks Lies and Videotape
Tottenkoph - VirGraff101 An Intro to Virtual Graffiti
Tyler Krpata - Like a Boss Attacking JBoss
Wayne Huang - Drivesploit
Wayne Huang and Kuon Ding - No SQL No Injection
Weigand Renderman and Kershaw - Build your own UAV 2.0
Zoz - Pwned By The Owner

Download from Hotfile:
http://hotfile.com/dl/104217100/e9021a2/defcon_18.part01.rar.html
http://hotfile.com/dl/104217102/e6b6ed4/defcon_18.part02.rar.html
http://hotfile.com/dl/104217108/384a13c/defcon_18.part03.rar.html
http://hotfile.com/dl/104217163/5ce9572/defcon_18.part04.rar.html
http://hotfile.com/dl/104217277/a18ec42/defcon_18.part05.rar.html
http://hotfile.com/dl/104217355/93c860f/defcon_18.part06.rar.html
http://hotfile.com/dl/104217497/c31e623/defcon_18.part07.rar.html
http://hotfile.com/dl/104217552/70813a4/defcon_18.part08.rar.html
http://hotfile.com/dl/104217571/fab61f4/defcon_18.part09.rar.html
http://hotfile.com/dl/104217612/8c607cf/defcon_18.part10.rar.html
http://hotfile.com/dl/104217614/0a46a56/defcon_18.part11.rar.html
http://hotfile.com/dl/104217815/d6be01f/defcon_18.part12.rar.html
http://hotfile.com/dl/104217844/568f82e/defcon_18.part13.rar.html
http://hotfile.com/dl/104217848/3a604d6/defcon_18.part14.rar.html
http://hotfile.com/dl/104217847/f3740a5/defcon_18.part15.rar.html
http://hotfile.com/dl/104217849/bd9d865/defcon_18.part16.rar.html
http://hotfile.com/dl/104217945/b90f75c/defcon_18.part17.rar.html
http://hotfile.com/dl/104218185/bbe7fe7/defcon_18.part18.rar.html
http://hotfile.com/dl/104218190/c7a6762/defcon_18.part19.rar.html
http://hotfile.com/dl/104218214/166e156/defcon_18.part20.rar.html
http://hotfile.com/dl/104218413/a64a5a5/defcon_18.part21.rar.html
http://hotfile.com/dl/104218442/74f6fc4/defcon_18.part22.rar.html
http://hotfile.com/dl/104218452/658ed13/defcon_18.part23.rar.html
http://hotfile.com/dl/104218467/a2a425d/defcon_18.part24.rar.html
http://hotfile.com/dl/104222079/153fe25/defcon_18.part25.rar.html
http://hotfile.com/dl/104220787/39ab8e6/defcon_18.part26.rar.html
http://hotfile.com/dl/104219682/0da20ad/defcon_18.part27.rar.html
http://hotfile.com/dl/104219677/99371b9/defcon_18.part28.rar.html
http://hotfile.com/dl/104219019/af8f762/defcon_18.part29.rar.html
http://hotfile.com/dl/104214680/145ac08/defcon_18.part30.rar.html
http://hotfile.com/dl/104214678/154ebcf/defcon_18.part31.rar.html
http://hotfile.com/dl/104215005/a4e9bb3/defcon_18.part32.rar.html
http://hotfile.com/dl/104215020/4b5ef70/defcon_18.part33.rar.html
http://hotfile.com/dl/104215279/8d7d177/defcon_18.part34.rar.html
http://hotfile.com/dl/104215288/6b252e7/defcon_18.part35.rar.html
http://hotfile.com/dl/104215685/d13e6a1/defcon_18.part36.rar.html
http://hotfile.com/dl/104215703/7b85ff6/defcon_18.part37.rar.html
http://hotfile.com/dl/104215917/737c15d/defcon_18.part38.rar.html
http://hotfile.com/dl/104215928/ff4b8b3/defcon_18.part39.rar.html
http://hotfile.com/dl/104216130/3d36580/defcon_18.part40.rar.html
http://hotfile.com/dl/104216140/549a3fd/defcon_18.part41.rar.html
http://hotfile.com/dl/104216369/3b53a52/defcon_18.part42.rar.html
http://hotfile.com/dl/104216382/5a7f8ed/defcon_18.part43.rar.html
http://hotfile.com/dl/104216653/4464db4/defcon_18.part44.rar.html
http://hotfile.com/dl/104216679/172a571/defcon_18.part45.rar.html
http://hotfile.com/dl/104216950/949f31d/defcon_18.part46.rar.html
http://hotfile.com/dl/104217013/8400a16/defcon_18.part47.rar.html


Download from FIleserve:
http://www.fileserve.com/file/UWYb88R/defcon 18.part01.rar
http://www.fileserve.com/file/ecpAWsj/defcon 18.part02.rar
http://www.fileserve.com/file/WtZuJNa/defcon 18.part03.rar
http://www.fileserve.com/file/hWFrQUF/defcon 18.part04.rar
http://www.fileserve.com/file/6eDucvS/defcon 18.part05.rar
http://www.fileserve.com/file/F2RhYHX/defcon 18.part06.rar
http://www.fileserve.com/file/bYwCd3S/defcon 18.part07.rar
http://www.fileserve.com/file/X54KhGs/defcon 18.part08.rar
http://www.fileserve.com/file/6Uj2NZM/defcon 18.part09.rar
http://www.fileserve.com/file/J45DcFJ/defcon 18.part10.rar
http://www.fileserve.com/file/5DHMwYS/defcon 18.part11.rar
http://www.fileserve.com/file/72Ebk3f/defcon 18.part12.rar
http://www.fileserve.com/file/3zs8hXr/defcon 18.part13.rar
http://www.fileserve.com/file/MCtsRRW/defcon 18.part14.rar
http://www.fileserve.com/file/cRRpzYg/defcon 18.part15.rar
http://www.fileserve.com/file/kAJ4JJg/defcon 18.part16.rar
http://www.fileserve.com/file/zAryryQ/defcon 18.part17.rar
http://www.fileserve.com/file/KFKW6TJ/defcon 18.part18.rar
http://www.fileserve.com/file/uDKGyVe/defcon 18.part19.rar
http://www.fileserve.com/file/P7XTzSN/defcon 18.part20.rar
http://www.fileserve.com/file/3MEckRG/defcon 18.part21.rar
http://www.fileserve.com/file/aucfYVJ/defcon 18.part22.rar
http://www.fileserve.com/file/zCeSr6a/defcon 18.part23.rar
http://www.fileserve.com/file/zstKugM/defcon 18.part24.rar
http://www.fileserve.com/file/HgcnvcK/defcon 18.part25.rar
http://www.fileserve.com/file/K6D7Bxp/defcon 18.part26.rar
http://www.fileserve.com/file/Ru89UjP/defcon 18.part27.rar
http://www.fileserve.com/file/jd9Uv5T/defcon 18.part28.rar
http://www.fileserve.com/file/HMeUEzH/defcon 18.part29.rar
http://www.fileserve.com/file/PAxJAf5/defcon 18.part30.rar
http://www.fileserve.com/file/9RfHzR9/defcon 18.part31.rar
http://www.fileserve.com/file/7HqHDmM/defcon 18.part32.rar
http://www.fileserve.com/file/uzwjYBU/defcon 18.part33.rar
http://www.fileserve.com/file/ZTS9UGk/defcon 18.part34.rar
http://www.fileserve.com/file/KRSxwWZ/defcon 18.part35.rar
http://www.fileserve.com/file/Qv4WKmH/defcon 18.part36.rar
http://www.fileserve.com/file/fukHArE/defcon 18.part37.rar
http://www.fileserve.com/file/9MdVBnk/defcon 18.part38.rar
http://www.fileserve.com/file/CSc2vJf/defcon 18.part39.rar
http://www.fileserve.com/file/q7nHYpe/defcon 18.part40.rar
http://www.fileserve.com/file/pMuE88z/defcon 18.part41.rar
http://www.fileserve.com/file/KrKpwu7/defcon 18.part42.rar
http://www.fileserve.com/file/XNpKujC/defcon 18.part43.rar
http://www.fileserve.com/file/nhMaqX3/defcon 18.part44.rar
http://www.fileserve.com/file/m3jawKy/defcon 18.part45.rar
http://www.fileserve.com/file/V3bf3Ed/defcon 18.part46.rar
http://www.fileserve.com/file/ak8FHQt/defcon 18.part47.rar

No comments:

Post a Comment