10:00 - HTTP/2: The Sequel is Always Worseġ0:00 - Gone Apple Pickin': Red Teaming macOS Environments in 2021ġ1:00 - Caught you - reveal and exploit IPC logic bugs inside Appleġ1:00 - 2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with usġ2:00 - Do you like to read? I know how to take over your Kindle with an e-bookġ2:00 - REBOOTING CRITICAL INFRASTRUCTURE PROTECTIONġ2:00 - Your House is My House: Use of Offensive Enclaves In Adversarial Operationsġ2:30 - The Mechanics of Compromising Low Entropy RSA Keysġ3:00 - Sleight of ARM: Demystifying Intel Houdiniġ3:00 - eBPF, I thought we were friends !ġ3:00 - Ransomware's Big Year - from nuisance to "scourge"? - DEF CON Policy Panelġ4:00 - Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming languageġ4:00 - Hacking Humans with AI as a Serviceġ5:00 - Abusing SAST tools! When scanners do more than just scanningġ5:00 - ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server!ġ5:00 - UFOs: Misinformation, Disinformation, and the Basic Truthġ6:00 - The Unbelievable Insecurity of the Big Data Stack: An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructuresġ6:00 - Defending against nation-state (legal) attack: how to build a privacy-protecting service in the era of ubiquitous surveillanceġ6:00 - Bundles of Joy: Breaking macOS via Subverted Applications Bundlesġ7:00 - D0 N0 H4RM: A Healthcare Security Conversationġ7:00 - Warping Reality - creating and countering the next generation of Linux rootkits using eBPFġ7:00 - Phantom Attack: Evading System Call Monitoringġ8:00 - Response Smuggling: Pwning HTTP/1.1 Connectionsġ8:00 - How I use a JSON Deserialization 0day to Steal Your Money On The Blockchainġ0:00 - Privacy Without Monopoly: Paternalism Works Well, But Fails Badlyġ0:00 - Crossover Episode: The Real-Life Story of the First Mainframe Container Breakoutġ0:00 - High-Stakes Updates | BIOS RCE OMG WTF BBQġ1:00 - Wibbly Wobbly, Timey Wimey - What's Really Inside Apple's U1 Chipġ1:00 - UPnProxyPot: fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wireġ2:00 - Bring Your Own Print Driver Vulnerabilityġ2:00 - Racketeer Toolkit.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |