Media Summary: Digital signatures are fundamental for verifying the authenticity and integrity of untrusted data in the digital world. They ensure that ... Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ... It is 60 years since the first publication of the ASCII standard, something we now very much take for granted. ASCII introduced the ...

Def Con 31 A Sslippery - Detailed Analysis & Overview

Digital signatures are fundamental for verifying the authenticity and integrity of untrusted data in the digital world. They ensure that ... Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ... It is 60 years since the first publication of the ASCII standard, something we now very much take for granted. ASCII introduced the ... As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ... Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ... C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

The story of the investigation into the device that I believe was used to steal my 2021 Toyota RAV4 in July 2022 using 'CAN ... One common thread runs through a recent wave of (initially, successful) targeted malware attacks I've investigated: The attackers ... For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ... This talk includes a series of favorite hacking stories. From hacking into a prison system to having the ability to publish “fake news” ... OPC-UA is the most popular protocol today in ICS/SCADA and IoT environments for data exchanges from sensors to on-premises ... Android devices are constantly improving their security to protect against attackers with physical access, with new protection ...

Recently, automotive industry is performing USB fuzzing in an inefficient way for automobiles. Usually, fuzzing is performed by ... The use of containers became an integral part of any resource-efficient and secure environment. Starting from Windows Server ... Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ... Badge Designer Mar Williams explains the inspiration, process and challenges of creating the

Photo Gallery

DEF CON 31 - A SSLippery Slope - Unraveling Hidden Dangers of Certificate Misuse - Bill Demirkapi
DEF CON 31 - Weaponizing Plain Text  ANSI Escape Sequences as a Forensic Nightmare - STÖK
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater
DEF CON 31 - Exploring Linux Memory Manipulation for Stealth and Evasion - Polop, Gutierrez
DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas
DEF CON 31 - Boston Infinite Money Glitch (fixed slides)
DEF CON 31 Car Hacking Village - How an Auto Security Researcher Had His Car Stolen - Tabor, Tindell
DEF CON 31 - War Stories - Youre Not George Clooney, and This Isnt Oceans 11 - Andrew Brandt
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin
DEF CON 31 War Stories - A Series of Unfortunate Events - Ben Sadeghipour, Corben Leo
DEF CON 31 - Exploiting OPC UA - Practical Attacks Against OPC UA Architectures - Moshe, Brizinov
Sponsored
Sponsored
View Detailed Profile
DEF CON 31 - A SSLippery Slope - Unraveling Hidden Dangers of Certificate Misuse - Bill Demirkapi

DEF CON 31 - A SSLippery Slope - Unraveling Hidden Dangers of Certificate Misuse - Bill Demirkapi

Digital signatures are fundamental for verifying the authenticity and integrity of untrusted data in the digital world. They ensure that ...

DEF CON 31 - Weaponizing Plain Text  ANSI Escape Sequences as a Forensic Nightmare - STÖK

DEF CON 31 - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖK

Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ...

Sponsored
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater

DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater

It is 60 years since the first publication of the ASCII standard, something we now very much take for granted. ASCII introduced the ...

DEF CON 31 - Exploring Linux Memory Manipulation for Stealth and Evasion - Polop, Gutierrez

DEF CON 31 - Exploring Linux Memory Manipulation for Stealth and Evasion - Polop, Gutierrez

As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ...

DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

DEF CON 31 - Badge of Shame Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ...

Sponsored
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

DEF CON 31 - Boston Infinite Money Glitch (fixed slides)

DEF CON 31 - Boston Infinite Money Glitch (fixed slides)

When you have to fix

DEF CON 31 Car Hacking Village - How an Auto Security Researcher Had His Car Stolen - Tabor, Tindell

DEF CON 31 Car Hacking Village - How an Auto Security Researcher Had His Car Stolen - Tabor, Tindell

The story of the investigation into the device that I believe was used to steal my 2021 Toyota RAV4 in July 2022 using 'CAN ...

DEF CON 31 - War Stories - Youre Not George Clooney, and This Isnt Oceans 11 - Andrew Brandt

DEF CON 31 - War Stories - Youre Not George Clooney, and This Isnt Oceans 11 - Andrew Brandt

One common thread runs through a recent wave of (initially, successful) targeted malware attacks I've investigated: The attackers ...

DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...

DEF CON 31 War Stories - A Series of Unfortunate Events - Ben Sadeghipour, Corben Leo

DEF CON 31 War Stories - A Series of Unfortunate Events - Ben Sadeghipour, Corben Leo

This talk includes a series of favorite hacking stories. From hacking into a prison system to having the ability to publish “fake news” ...

DEF CON 31 - Exploiting OPC UA - Practical Attacks Against OPC UA Architectures - Moshe, Brizinov

DEF CON 31 - Exploiting OPC UA - Practical Attacks Against OPC UA Architectures - Moshe, Brizinov

OPC-UA is the most popular protocol today in ICS/SCADA and IoT environments for data exchanges from sensors to on-premises ...

DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade

DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade

Android devices are constantly improving their security to protect against attackers with physical access, with new protection ...

DEF CON 31 Car Hacking Village - Automotive USB Fuzzing - Euntae Jang, Donghyon Jeong, Jonghyuk Song

DEF CON 31 Car Hacking Village - Automotive USB Fuzzing - Euntae Jang, Donghyon Jeong, Jonghyuk Song

Recently, automotive industry is performing USB fuzzing in an inefficient way for automobiles. Usually, fuzzing is performed by ...

DEF CON 31 - Staying Undetected Using the Windows Container Isolation Framework - Daniel Avinoam

DEF CON 31 - Staying Undetected Using the Windows Container Isolation Framework - Daniel Avinoam

The use of containers became an integral part of any resource-efficient and secure environment. Starting from Windows Server ...

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris

Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ...

DEF CON 31 - Top Tips for new DEF CON Attendees - video team

DEF CON 31 - Top Tips for new DEF CON Attendees - video team

Silk asks attendees of

DEF CON 31 - Making The DEF CON 31 Badge Mar Williams

DEF CON 31 - Making The DEF CON 31 Badge Mar Williams

Badge Designer Mar Williams explains the inspiration, process and challenges of creating the