[You must be registered and logged in to see this image.]DEF CON Community - DEFCON 19 (2011)
English | M4V : AVC1, 800x600, ~800 Kbps (avg) | AAC, 48000 Hz, 2 ch., 16 bits, 64 Kbps | 18.29 GB
Genre: eLearning
DEF CON (also written as DEFCON or Defcon) is one of the world's largest annual hacker conventions, held every year in Las Vegas, Nevada. The first DEF CON took place in June 1993. Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, crackers, cyber-criminals, security researchers, and hackers with a general interest in computer code, computer architecture, phone phreaking, hardware modification, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as social events and contests in everything from creating the longest Wi-Fi connection and cracking computer systems to who can most effectively cool a beer in the Nevada heat. Dark Tangent - Closing Ceremonies - Video and Slides
The Dark Tangent and LosTboY - Welcome - Making of the badge - Slides
Panel - Network Security Podcast - Slides
Panel - Meet The Federal Agent 2.0 - Slides
Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks - Slides
Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too - Slides
Chema Alonso and Juan Garrido - Dust Your Feed RSS Belongs To You! Avoid Censorship! - Slides
Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE - Slides
James Myrcurial Arlen - Security When Nano Seconds Count - Slides
Mike Arpaia and Ted Reed - Beat to 1337 Creating A Successful University Cyber Defense Organization - Slides
Adam Baldwin - Pillaging DVCS Repos For Fun And Profit - Slides
Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken - Slides
Bruce Grymoire Barnett - Deceptive Hacking How Misdirection Can Be Used To Steal Information Without Being Detected - Slides
Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database - Slides
Olivier Bilodeau - PacketFence The Open Source Nac What Weve Done In The Last Two Years - Slides
Emmanuel Bouillon - Federation and Empire - Slides
Sam Bowne - Three Generations of DoS Attacks - Slides
David Bryan and Luiz Eduardo - Building The DEF CON Network Making A Sandbox For 10000 Hackers - Slides
Jeff Bryner - Kinectasploit Metasploit Meets Kinect - Slides
Jamie Butler - Physical Memory Forensics for Cache - Slides
Carey Rude and Vandevanter - Metasploit vSploit Modules - Slides
George Chamales - Lives On The Line Securing Crisis Maps In Libya Sudan And Pakistan - Slides
Ming Chow - Abusing HTML5 - Slides
Mouse and Renderman - Familiarity Breeds Contempt - Slides
Christopher Cleary - Operational Use of Offensive Cyber - Slides
Tyler Cohen - Look At What My Car Can Do - Slides
Kees Cook - Kernel Exploitation Via Uninitialized Stack - Slides
Greg Conti - The Art and Science of Security Research - Slides
Paul Craig - Internet Kiosk Terminals The Redux - Slides
Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies - Slides
Daniel Crowley - Speaking with Cryptographic Oracles - Slides
Phil Cryer - Taking Your Ball And Going Home Building Your Own Secure Storage Space That Mirrors Dropbox Functionality - Slides
Panel - PCI 2 Still Compromising Controls and Compromising Security - Slides
Panel - Former Keynotes The Future - Slides
datagram - Introduction to Tamper Evident Devices - Slides
Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us - Slides
Deviant Ollam - Safe to Armed in Seconds A Study of Epic Fails of Popular Gun Safes - Slides
Whitfield Diffie and Moxie Marlinspike - Slides
Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation - Slides
Alva Skip Duckwall - A Bridge Too Far Defeating Wired 8021x with a Transparent Bridge Using Linux - Slides
Nelson Elhage - Virtualization Under Attack Breaking out of KVM - Slides
Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network - Slides
Patrick Engebretson and Josh Pauli - Mamma Dont Let Your Babies Grow Up to be Pen Testers - Slides
eskimo - Steganography and Cryptography 101 - Slides
Eston Abraham and Johnson - Dont Drop the SOAP Real World Web Service Testing for Web Hackers - Slides
Ben Feinstein and Jeff Jarmoc - Get Off of My Cloud Cloud Credential Compromise and Exposure - Slides
Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing - Slides
Gus Fritschie and Mike Wright - Getting F On the River - Slides
Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic - Slides
Daniel Garcia - UPnP Mapping - Slides
Andrew Gavin - Gone in 60 Minutes Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP - Slides
Kenneth Geers - Strategic Cyber Security An Evaluation of Nation-State Cyber Attack Mitigation Strategies - Slides
Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security - Slides
Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang - Slides
Panel - Represent Defcon Groups Hackerspaces and You - Slides
Panel - Smartfuzzing the Web Carpe Vestra Foramina - Slides
Rob Havelt and Wendel Guglielmetti Henrique - Earth vs The Giant Spider Amazingly True Stories of Real Penetration Tests - Slides
Deral Heiland - From Printer To Pwnd Leveraging Multifunction Printers During Penetration Testing - Slides
Thomas Holt and Max Kilger - Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict - Slides
Rick Howard - An Insiders Look at International Cyber Security Threats and Trends - Slides
Hubris and a5h3r4h - Anonymous Cyber War - Slides
Mikko Hypponen - The History and the Evolution of Computer Viruses - Slides
Hackajar - Economics of Password Cracking in the GPU Era - Slides
Aseem Jakhar - Jugaad Linux Thread Injection Kit - Slides
Matt Joyce - The Art of Trolling - Slides
Dan Kaminsky - Black Ops of TCPIP 2011 - Slides
Dave Kennedy - Hacking Your Victims Over Power Lines - Slides
Brian Kennish - Tracking the Trackers How Our Browsing History Is Leaking into the Cloud - Slides
Alexander Kornbrust - Hacking and Securing DB2 LUW Databases - Slides
Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet - Slides
Matt Krick - DCFluX in License to Transmit - Slides
Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia - Slides
Lawson Potter and Deviant Ollam - And Thats How I Lost My Eye Exploring Emergency Data Destruction - Slides
Grayson Lenik - Im Your MACbDaddy - Slides
Katy Levinson - Dont Fix It In Software - Slides
Steven Levy - We Owe it All to the Hackers - Slides
Ryan Linn - PIG Finding Truffles Without Leaving A Trace - Slides
David Litchfield - Hacking and Forensicating an Oracle Database Server - Slides
Johnny Long - Johnny Long and Hackers for Charity - Slides
William Manning - Pervasive Cloaking - Slides
Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security - Slides
Moxie Marlinspike - SSL And The Future Of Authenticity - Slides
Jon McCoy - Hacking Net Applications The Black Arts - Slides
Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit - Slides
John McNabb - Vulnerabilities of Wireless Water Meter Networks - Slides
Charlie Miller - Battery Firmware Hacking - Slides
Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale - Slides
Steve Ocepek - Blinkie Lights Network Monitoring with Arduino - Slides
Panel - Ask EFF The Year in Digital Civil Liberties - Slides
Kyle Osborn and Matt Johanson - Hacking Google Chrome OS - Slides
Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP - Slides
Nicole Ozer - Big Brother on the Big Screen - Slides
Nicholas Percoco and Paul Kehrer - Getting SSLizzard - Slides
Nicholas Percoco and Jibran Ilyas - Malware Freak Show 3 Theyre pwning erbody out there - Slides
Nicholas Percoco and Sean Schulte - This is REALLY not the droid youre looking for - Slides
Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit - Slides
Gregory Pickett - Port Scanning Without Sending Packets - Slides
Jason Pittman - My password is FullOfFail The Core Problem with Authentication and How We Can Overcome It - Slides
Mahmud Ab Rahman - Sneaky PDF - Slides
Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST - Slides
Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves - Slides
Michael Robinson - What Time Are You Anyway - Slides
The Dark Tangent and Russ Rogers - DEF CON Awards - Slides
Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011 - Slides
Michael Scarito - Build your own Synthetic Aperture Radar - Slides
Panel - Net Neutrality Panel - Slides
Michael theprez98 Schearer - WTF Happened to the Constitution The Right to Privacy in the Digital Age - Slides
Jason Scott - Archive Team A Distributed Preservation of Service Attack - Slides
Justin Searle - Attacking and Defending the Smart Grid - Slides
Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware - Slides
Shrdlu - Are You In Yet The CISOs View of Pentesting - Slides
Skunkworks - Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin - Slides
Reeves Smith - How Haunters Void Warranties - Slides
Panel - SCADA and PLCs in Correctional Facilities The Nightmare Before Christmas - Slides
Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin - Slides
Sumner alien and alison b - Weaponizing Cyberpsychology and Subverting Cybervetting for Fun Profit and Subterfuge - Slides
Bruce Sutherland - How To Get Your Message Out When Your Government Turns Off The Internet - Slides
Martin Holst Swende and Patrik Karlsson - Web Application Analysis With Owasp Hatkit - Slides
Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform - Slides
Richard Thieme - Staring into the Abyss The Dark Side of Crime-fighting Security and Professional Intelligence - Slides
Tobias Fiddler and Bluzmanis - Insecurity An Analysis Of Current Commercial And Government Security Lock Designs - Slides
Schuyler Towne - DIY Non-Destructive Entry - Slides
Marketa Trimble - The Future of Cybertravel Legal Implications of the Evasion of Geolocation - Slides
Shawn Webb - Runtime Process Insemination - Slides
Matt scriptjunkie Weeks - Network Nightmare Ruling The Nightlife Between Shutdown And Boot With Pxesploit - Slides
Yekaterina Tsipenyuk ONeil and Erika Chin - Seven Ways to Hang Yourself with Google Android - Slides
Jos Weyers - Key Impressioning - Slides
Thomas Wilhelm - Staying Connected during a Revolution or Disaster - Slides
Andrew Wilson and Michael Brooks - Traps of Gold - Slides
Brad Woodberg - Network Application Firewalls Exploits and Defense - Slides
Joey Zhu - Phishing and Online Scam in China - Slides
Zoz and Andrea Bianchi - Vanquishing Voyeurs Secure Ways To Authenticate Insecurely - Slides
Panel - Is it 0-day or 0-care - Slides