DEF CON® 22 Hacking Conference

/dc-22-index.html

  • DEFCON 22 presentations available

    [DEF CON, named after the alert state system defined by the USA Army rating (Defense Condition) from 1 to 5 (cf. War Games) is one of the largest hacker world conferences, drawing interests from all over the world including from the NSA, FBI and other (information, but not only) security intelligences.

    There is a 2013 documentary about it
    http://vimeo.com/69695831]

    #DEFCON 22 was held August 7 to August 10, 2014 in Las Vegas
    You can find torrents of information here:
    https://www.defcon.org/html/defcon-22/dc-22-index.html

    You can find the archives with tons of presentations, pdfs, videos here:
    https://www.defcon.org/html/links/dc-archives/dc-22-archive.html

    It is always a gold mind of information. Here are some of the subject titles:

    Detecting Bluetooth Surveillance Systems
    Dropping Docs on Darknets: How People Got Caught
    How to Disclose an Exploit Without Getting in Trouble
    Reverse Engineering Mac Malware
    The Monkey in the Middle: A pentesters guide to playing in traffic.
    Is This Your Pipe? Hijacking the Build Pipeline.
    Home Alone with localhost: Automating Home Defense
    RF Penetration Testing, Your Air Stinks
    Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
    An Introduction to Back Dooring Operating Systems for Fun and Trolling
    Android Hacker Protection Level 0
    Blinding The Surveillance State
    Client-Side HTTP Cookie Security: Attack and Defense
    Bypass firewalls, application white lists, secure remote desktops under 20 seconds
    Through the Looking-Glass, and What Eve Found There
    Summary of Attacks Against BIOS and Secure Boot
    The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns
    Hacking US (and UK, Australia, France, etc.) traffic control systems
    Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go
    Steganography in Commonly Used HF Radio Protocols
    Mass Scanning the Internet: Tips, Tricks, Results
    Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering
    Stolen Data Markets: An Economic and Organizational Assessment
    Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.
    Dark Mail
    Catching Malware En Masse: DNS and IP Style
    RFIDler: SDR.RFID.FTW
    Attacking the Internet of Things using Time
    A Survey of Remote Automotive Attack Surfaces
    Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring
    Abusing Software Defined Networks
    NSA Playset : GSM Sniffing
    Cyberhijacking Airplanes: Truth or Fiction?
    Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance
    Detecting and Defending Against a Surveillance State
    Don’t DDoS Me Bro: Practical DDoS Defense
    Hacking the FBI: How & Why to Liberate Government Records
    The Internet of Fails: Where IoT Has Gone Wrong and How We’re Making It Right
    I Hunt TR-069 Admins: Pwning ISPs Like a Boss
    Practical Aerial Hacking & Surveillance