DEFCON 22 presentations available
[DEF CON, named after the alert state system defined by the USA Army rating (Defense Condition) from 1 to 5 (cf. War Games) is one of the largest hacker world conferences, drawing interests from all over the world including from the NSA, FBI and other (information, but not only) security intelligences.
There is a 2013 documentary about it
▻http://vimeo.com/69695831]
#DEFCON 22 was held August 7 to August 10, 2014 in Las Vegas
You can find torrents of information here:
▻https://www.defcon.org/html/defcon-22/dc-22-index.html
You can find the archives with tons of presentations, pdfs, videos here:
▻https://www.defcon.org/html/links/dc-archives/dc-22-archive.html
It is always a gold mind of information. Here are some of the subject titles:
Detecting Bluetooth Surveillance Systems
Dropping Docs on Darknets: How People Got Caught
How to Disclose an Exploit Without Getting in Trouble
Reverse Engineering Mac Malware
The Monkey in the Middle: A pentesters guide to playing in traffic.
Is This Your Pipe? Hijacking the Build Pipeline.
Home Alone with localhost: Automating Home Defense
RF Penetration Testing, Your Air Stinks
Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
An Introduction to Back Dooring Operating Systems for Fun and Trolling
Android Hacker Protection Level 0
Blinding The Surveillance State
Client-Side HTTP Cookie Security: Attack and Defense
Bypass firewalls, application white lists, secure remote desktops under 20 seconds
Through the Looking-Glass, and What Eve Found There
Summary of Attacks Against BIOS and Secure Boot
The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns
Hacking US (and UK, Australia, France, etc.) traffic control systems
Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go
Steganography in Commonly Used HF Radio Protocols
Mass Scanning the Internet: Tips, Tricks, Results
Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering
Stolen Data Markets: An Economic and Organizational Assessment
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.
Dark Mail
Catching Malware En Masse: DNS and IP Style
RFIDler: SDR.RFID.FTW
Attacking the Internet of Things using Time
A Survey of Remote Automotive Attack Surfaces
Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring
Abusing Software Defined Networks
NSA Playset : GSM Sniffing
Cyberhijacking Airplanes: Truth or Fiction?
Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance
Detecting and Defending Against a Surveillance State
Don’t DDoS Me Bro: Practical DDoS Defense
Hacking the FBI: How & Why to Liberate Government Records
The Internet of Fails: Where IoT Has Gone Wrong and How We’re Making It Right
I Hunt TR-069 Admins: Pwning ISPs Like a Boss
Practical Aerial Hacking & Surveillance