AI for Red Team and Malware Development – Kirk Trychel | CypherCon 6.0
(S6:E58) AI for Red Team and Malware Development – Kirk Trychel – CypherCon 6.0 – Wisconsin AI for Red Team
Read More(S6:E58) AI for Red Team and Malware Development – Kirk Trychel – CypherCon 6.0 – Wisconsin AI for Red Team
Read MoreMatt “scriptjunkie” Weeks – Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit https://www.defcon.org/images/defcon-19/dc-19-presentations/Weeks/DEFCON-19-Weeks-Network-Nightmare.pdf The best techniques for
Read MoreRobert Edmonds & Paul Vixie – Passive DNS Hardening Passive DNS replication is a technique invented by Florian Weimer for
Read MoreOAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app
Read MoreWe present a novel class of DNS vulnerabilities that affects multiple DNS-as-a-Service (DNSaaS) providers. The vulnerabilities have been proven and
Read MoreMost forms of WPA2-EAP have been broken for nearly a decade. EAP-TTLS and EAP-PEAP have long been susceptible to evil
Read MoreOpenness to responsibly disclosed external vulnerability research is crucial for modern software maintainers and security teams. Changes in upstream dependency
Read MoreDEF CON 16 – John Fitzpatrick: Virtually Hacking Own the VMware box and you get half the servers on the
Read MoreWhite paper Available Here: http://media.defcon.org/DEF CON 23/DEF CON 23 presentations/Ronny Bull & Jeanna Matthews – UPDATED/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf Cloud service providers offer
Read MoreDNS fragmentation attacks are a more recent series of cache poisoning attacks on resolvers. Even if DNSSEC is fully implemented,
Read More