With overwhelming response for Defcon 22 Top Talks, we decided to present Defcon 23 again. Let us know which were your favorite talks?

Important Note:

All presentations are courtesy Defcon and is presented as-is without any modification
Some of the descriptions below are taken from Defcon website (www.defcon.org)
You need to Sign in/Sign up to view the presentations. (It's free)

Bruce-Potter-Hackers-Guide-to-Risk

Measuring risk in two words, assessing, managing and measuring risk. This can be a guide for security researchers to measure risk in day to day life.


Colin-O'Flynn-Dont-Whisper-My-Chips

The nature of this talk was hands-on. It presents to you how weak security in embedded hardware systems are. More surprising all of the hacks could be done with open source tools.


Craig-Young-How-To-Train-Your-RFID-Hacking-Tools

Learn how to use the tools, how to develop new firmware etc. with examples. It includes architecture of Proxmark3.


Damon-Small-Beyond-the-Scan

Getting into the depths of Vulnerability Assessment, this presentation will highlight the importance of VA for security in an organization.


Daniel-Crowley-Damon-Smith-Bugged-Files

Files communicate to Endpoints when opened eg. microsoft word, PDF. This ability can have an interesting perspective in terms of security concerns. It delves into possible scenarios of exploit.


Dennis-Maldonado-Are-we-really-safe-bypassing-access-control-systems

Maybe your access control systems are accessed by some one else. That being said, here's the talk that demonstrated the walk through access control systems like a breeze. Maybe our dependence on them needs a thought.


Eric-Van-Albert-Zack-Banks-Looping-Surveillance-Cameras Through Live Editing Of Network Streams

Remember the CCTV in the movies looping the same incidents again and again. That's exactly what happens here and best we learnt how it happens. Better still, it is possible to modify this to level of high sophistication.


Etienne-Martineau-Inter-VM-Data-Exfiltration

It states multi-core covert channel between co-located VMs are real. From fundamentals of cache line encoding to techniques & challenges-know it all.


Gerard-Laygui-Forensic-Artifacts-Pass-The-Hash-Attack

A useful guide for system admins to help understand the extent of devastation of the attack and some fundamentals to help if the forensic expert isn't around.


Grant-Bugher-Obtaining-and-Detecting-Domain-Persistence

If a windows domain is hacked into with domain administrator privileges, this talk explains how to detect this incident and rule it out.


Ian-Latter-Remote-Access-the-APT

This focuses on new TGXf technique, which can allow data transfer by by-passing present security measures like Perimeter or End Point Security.


Joshua-Drake-Stagefright-Scary-Code-in-the-Heart-of-Android

Android vulnerabilities- speaker explains reaching Stagefright Multimedia Framework and various other vulnerabilities.

Joshua-Smith-High-Def-Fuzzing-Exploitation-Over-HDMI-CEC


Justin-Engler-Secure-Messaging-For-Normal-People-W


Ken-Westin-Confessions-of-a-Cyberstalker


Lance-Buttars-Nemus-Hacking-SQL-Injection-for-Remote-Code-Execution-on-a-LAMP-UPDATED


Lin-Huang-Qing-Yang-GPS-Spoofing


Marte-L0ge-I-will-Tell-you-your-Lock-Pattern-UPDATED

Michael-Robinson-Knocking-My-Neighbors-Kids-Drone-Offline-UPDATED

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform