Jump to content
Usr6

Defcon 21 Archives Speaker Materials

Recommended Posts

Posted (edited)

SPEAKER MATERIALS - LIST OF PRESENTATIONS:

Abraham Kang and Dinis Cruz

DEFCON-21-Kang-Cruz-RESTing-On-Your-Laurels-Will-Get-You-Pwned.pdf

Alejandro Caceres

DEFCON-21-Caceres-Massive-Attacks-With-Distributed-Computing.pdf

Alexandre Pinto

DEFCON-21-Pinto-Defending-Networks-Machine-Learning-WP.pdf

DEFCON-21-Pinto-Defending-Networks-Machine-Learning.pdf

Amber Baldet

DEFCON-21-Baldet-Suicide-Intervention-Risk-Assessment-Tactics.pdf

Andy Davis

DEFCON-21-Davis-Revealing-Embedded-Fingerprints.pdf

Balint Seeber

DEFCON-21-Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf

Bogdan Alecu

DEFCON-21-Bogdan-Alecu-Attacking-SIM-Toolkit-with-SMS-WP.pdf

DEFCON-21-Bogdan-Alecu-Business-Logic-Flaws-in-MO.pdf

Brendan O'Connor

DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf

Brian Gorenc and Jasiel Spelman

DEFCON-21-Gorenc-Spelman-Java-Every-days-WP.pdf

DEFCON-21-Gorenc-Spelman-Java-Every-days.pdf

Chris John Riley

DEFCON-21-Riley-Defense-by-Numbers.pdf

Chris Sumner and Randall Wald

DEFCON-21-Sumner-Wald-Prediciting-Susceptibility-To-Social-Bots-On-Twitter.pdf

Christine Dudley

DEFCON-21-Dudley-Privacy-In-DSRC-Connected-Vehicles.pdf

Craig Young

DEFCON-21-Young-Google-Skeleton-Key.pdf

---Extras

DEFCON-21-Craig-Young-Android-PoC-StockView-with-SSL.apk

DEFCON-21-Craig-Young-Android-PoC-StockView.apk

DEFCON-21-Craig-Young-Android-PoC-TubeApp.apk

DEFCON-21-Craig-Young-StockView-ExampleCode.java

Crowley and Panel

DEFCON-21-Crowley-Savage-Bryan-Home-Invasion-2.0-WP.pdf

DEFCON-21-Crowley-Savage-Bryan-Home-Invasion-2.0.pdf

| ---Extras

---upnp_request_gen

LICENSE.txt

readme.txt

upnp_request_gen.php

Dan Griffin

DEFCON-21-Dan-Griffin-Protecting-Data.pdf

Daniel Chechik

DEFCON-21-Chechik-Utilizing-Popular-Websites-for-Malicious-Purposes-Using-RDI.pdf

Daniel Selifonov

DEFCON-21-Selifonov-A-Password-is-Not-Enough-Why-Disk-Encryption-is-Broken.pdf

Eric Fulton and Daniel Zolnikov

DEFCON-21-Fulton-Zolnikov-The-Politics-of-Privacy-and-Technology.pdf

Eric Milam

DEFCON-21-Milam-Getting-The-Goods-With-smbexec.pdf

Eric Robi and Michael Perklin

DEFCON-21-Robi-Perklin-Forensic-Fails.txt

Etemadieh and Panel

DEFCON-21-Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf

Fatih Ozavci

DEFCON-21-Ozavci-VoIP-Wars-Return-of-the-SIP.pdf

| ---Extras

DEFCON-21-viproy-voipkit.tgz

Flipper

DEFCON-21-Flipper-10000-Yen.pdf

| ---Extras

| Defcon 21 - 10000 Yen Source Code.txt

| OpenGlider BoM.pdf

| OpenGlider V0.1.x_t.txt

| x35 coordinates.sldcrv.txt

|

---OpenGlider IGES Files

Franz Payer

DEFCON-21-Payer-Exploiting-Music-Streaming-with-JavaScript.pdf

Gregory Pickett

DEFCON-21-Pickett-Lets-Screw-With-NMAP.pdf

| ---Extras

DEFCON-21-Pickett-Lets-Screw-With-NMAP-Specifications.pdf

DEFCON-21-Pickett-Lets-Screw-With-NMAP-Transformations.pdf

platform.zip

scans.zip

Hunter Scott

DEFCON-21-Scott-Security-in-Cognitive-Radio-Networks.pdf

Jacob Thompson

DEFCON-21-Thompson-CREAM-Cache-Rules-Evidently-Ambiguous-Misunderstood.pdf

Jaeson Schultz

DEFCON-21-Schultz-Examining-the-Bitsquatting-Attack-Surface-WP.pdf

Jason Staggs

DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf

DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper.pdf

| ---Extras

DEFCON-21-CANClockProof-of-ConceptDemo.wmv

DEFCON-21-CANClockSource.pde

DEFCON-21-MINI-Cooper-Crash-Test.wmv

Jim Denaro

DEFCON-21-Denaro-How-to-Disclose-or-Sell-an-Exploit.pdf

Joe Bialek

DEFCON-21-Bialek-PowerPwning-Post-Exploiting-by-Overpowering-Powershell.pdf

| ---Extras

DEFCON-21-Invoke-ReflectivePEInjection.ps1.txt

Joe Grand

DEFCON-21-Grand-JTAGulator.pdf

| ---Extras

| DEFCON-21-jtagulatorassembly.pdf

| DEFCON-21-jtagulatorblockdiagram.pdf

| DEFCON-21-jtagulatorbom.pdf

| DEFCON-21-jtagulatorschematic.pdf

| DEFCON-21-jtagulatortestproc.pdf

|

Firmware 1.1 (b9b49b3)

---Gerbers B

John Ortiz

DEFCON-21-Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf

| ---Extras

DEFCON-21-Ortiz-TOOLSCustom.zip

DEFCON-21-Ortiz-TOOLSFreeDownload.zip

Joseph Paul Cohen

| ---Extras

| DEFCON-21-blucat.base64

|

---blucat-r50

Justin Engler and Paul Vines

DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking-WP.pdf

DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking.pdf

| ---Extras

DEFCON-21-Codepartslistinstructions.zip

Justin Hendricks

DEFCON-21-Justin-Hendricks-So-You-Think-Your-Domain-Controller-Is-Secure.pdf

Karl Koscher and Eric Butler

DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf

Lawrence and Panel

DEFCON-21-Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf

| ---Extras

DEFCON-21-config.scad

DEFCON-21-key.scad

Marc Weber Tobias and Tobias Bluzmanis

DEFCON-21-Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf

Marion Marschalek

DEFCON-21-Marschalek-Thorny-Malware.pdf

| ---Extras

DEFCON-21-Marschalek-MalwareBase64.txt

DEFCON-21-Marschalek-Thorny-Malware-Analysis-Report.pdf

Melissa Elliott

DEFCON-21-Elliott-noisefloor-URLS-reference.txt

Michael Perklin

DEFCON-21-Perklin-ACL-Steganography.pdf.pdf

| ---Extras

| ACLEncode.sln

| README.txt

|

Michael Schrenk

DEFCON-21-Schrenk-How-my-Botnet-Defeated-Russian-Hackers.pdf

Ming Chow

DEFCON-21-Chow-Abusing-NoSQL-Databases.pdf

Neil Sikka

DEFCON-21-Sikka-EMET-4.0-PKI-Mitigation.pdf

Nicolas Oberli

DEFCON-21-Oberli-Please-Insert-Inject-More-Coins.pdf

Nikhil Mittal

DEFCON-21-Mittal-Powerpreter-Post-Exploitation-Like-a-Boss.pdf

| ---Extras

Nikhil_Mittal_Powerpreter_Code.psm1

Pau Oliva Fora

DEFCON-21-Fora-Defeating-SEAndroid.pdf

Philip Polstra

DEFCON-21-Polstra-We-are-Legion-Pentesting.pdf

| ---Extras

DEFCON-21-Philip-Polstra-code.py.txt

Phorkus and Evilrob

DEFCON-21-Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf

Piotr Duszynski

DEFCON-21-Duszynski-Cyber-Offenders.pdf

Pukingmonkey

DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf

| ---Extras

01_ALPR_detector_proof_of_concept.mp4

02_ezpass_detector_of_open_road_tolling.mp4

03_ezpass_detector_of_hidden_reader.mp4

04_ezpass_detector_of_hidden_reader_with_toll_tag_sensor.mp4

DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds-(1).mp4

DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds.mp4

arduino-micro

Remy Baumgarten

DEFCON-21-Baumgarten-Mach-O-Viz-WP.pdf

DEFCON-21-Baumgarten-Mach-O-Viz.pdf

Richard Thieme

DEFCON-21-Richard-Thieme-UFOs-and-Govt.pdf

| ---Extras

DEFCON-21-Richard Thieme-UFOs-and-Govt-Resources.txt

Ricky HIll

DEFCON-21-Ricky-Hill-Phantom-Drone.pdf

Robert Clark

DEFCON-21-Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense.pdf

Robert Stucke

DEFCON-21-Stucke-DNS-Hazards.pdf

Runa A Sandvik

DEFCON-21-Sandvik-Safety-of-the-Tor-Network.pdf

Ryan Holeman

DEFCON-21-Holeman-The-Bluetooth-Device-Database.pdf

---Extras

---src

analytics

Sam Bowne

DEFCON-21-Bowne-SSD-Data-Evap.pdf

Sam Bowne and Matthew Prince

DEFCON-21-Bowne-Prince-Evil-DoS-Attacks-and-Strong-Defenses.pdf

Scott Behrens and Brent Bandelgar

DEFCON-21-Behrens-Bandelgar-MITM-All-The-IPv6-Things.pdf

Teal Rogers and Alejandro Caceres

DEFCON-21-Rogers-Caceres-The-Dawn-of-Web-30.pdf

Tom Keenan

DEFCON-21-Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf

Tom Steele and Dan Kottman

DEFCON-21-Steele-Kottman-Collaborative-Penetration-Testing-With-Lair.pdf

Tony Mui and Wai-leng

DEFCON-21-Miu-Lee-Kill-em-All-DDoS-Protection-Total-Annihilation.pdf

| ---Extras

Vaagn Toukharian and Tigran Gevorgyan

DEFCON-21-Toukharian-Gevorgyan-HTTP-Time-Bandit.pdf

Wesley McGrew

DEFCON-21-McGrew-Pwn-The-Pwn-Plug .pdf

DEFCON-21-McGrew-Pwn-The-Pwn-Plug-WP.pdf

| ---Extras

DEFCON-21-community1.1vswireless1.1.txt

DEFCON-21-exploitpacketpayload.dat

DEFCON-21-originalubootenv.txt

DEFCON-21-ubi.py

WiK and Mubix

DEFCON-21-WiK-Mubix-gitDigger.pdf

Zak Blacher

DEFCON-21-Blacher-Transcending-Cloud-Limitations.pdf

| ---Extras

DEFCON-21-Scripted-Demo.tar

DEFCON-21-source-Code-dpk-master.zip

Zoz

DEFCON-21-Zoz-Hacking-Driverless-Vehicles.pdf

bughardy and Eagle1753

DEFCON-21-bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT-WP.pdf

DEFCON-21-bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT.pdf

m0nk

DEFCON-21-m0nk-BoutiqueKit.pdf

soen

DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf

Download: http://www.mediafire.com/download/15p2r0tk1787h30/Defcon_21_-_2013_Speaker_Presentations_DVD.zip

Mirror: https://rstforums.com/fisiere/defcon.zip

Sursa:

contagio: Defcon 21 Archives Speaker Materials

Edited by Nytro
  • Upvote 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...