With overwhelming response for Defcon 22 Top Talks, we decided to present Defcon 23 again. Let us know which were your favorite talks?
Important Note:
All presentations are courtesy Defcon and is presented as-is without any modification
Some of the descriptions below are taken from Defcon website (www.defcon.org)
You need to Sign in/Sign up to view the presentations. (It's free)
Bruce-Potter-Hackers-Guide-to-Risk
Measuring risk in two words, assessing, managing and measuring risk. This can be a guide for security researchers to measure risk in day to day life.
Colin-O'Flynn-Dont-Whisper-My-Chips
The nature of this talk was hands-on. It presents to you how weak security in embedded hardware systems are. More surprising all of the hacks could be done with open source tools.
Craig-Young-How-To-Train-Your-RFID-Hacking-Tools
Learn how to use the tools, how to develop new firmware etc. with examples. It includes architecture of Proxmark3.
Damon-Small-Beyond-the-Scan
Getting into the depths of Vulnerability Assessment, this presentation will highlight the importance of VA for security in an organization.
Daniel-Crowley-Damon-Smith-Bugged-Files
Files communicate to Endpoints when opened eg. microsoft word, PDF. This ability can have an interesting perspective in terms of security concerns. It delves into possible scenarios of exploit.
Dennis-Maldonado-Are-we-really-safe-bypassing-access-control-systems
Maybe your access control systems are accessed by some one else. That being said, here's the talk that demonstrated the walk through access control systems like a breeze. Maybe our dependence on them needs a thought.
Eric-Van-Albert-Zack-Banks-Looping-Surveillance-Cameras Through Live Editing Of Network Streams
Remember the CCTV in the movies looping the same incidents again and again. That's exactly what happens here and best we learnt how it happens. Better still, it is possible to modify this to level of high sophistication.
Etienne-Martineau-Inter-VM-Data-Exfiltration
It states multi-core covert channel between co-located VMs are real. From fundamentals of cache line encoding to techniques & challenges-know it all.
Gerard-Laygui-Forensic-Artifacts-Pass-The-Hash-Attack
A useful guide for system admins to help understand the extent of devastation of the attack and some fundamentals to help if the forensic expert isn't around.
Grant-Bugher-Obtaining-and-Detecting-Domain-Persistence
If a windows domain is hacked into with domain administrator privileges, this talk explains how to detect this incident and rule it out.
Ian-Latter-Remote-Access-the-APT
This focuses on new TGXf technique, which can allow data transfer by by-passing present security measures like Perimeter or End Point Security.
Joshua-Drake-Stagefright-Scary-Code-in-the-Heart-of-Android
Android vulnerabilities- speaker explains reaching Stagefright Multimedia Framework and various other vulnerabilities.
Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC
Justin-Engler-Secure-Messaging-For-Normal-People-W
Ken-Westin-Confessions-of-a-Cyberstalker
Lance-Buttars-Nemus-Hacking-SQL-Injection-for-Remote-Code-Execution-on-a-LAMP-UPDATED
Lin-Huang-Qing-Yang-GPS-Spoofing
Marte-L0ge-I-will-Tell-you-your-Lock-Pattern-UPDATED
Michael-Robinson-Knocking-My-Neighbors-Kids-Drone-Offline-UPDATED
Comments