DEFCON

NETWORK ADMINISTRATIONSWindows serverwindows server dhcp

DEF CON 19 – Matt "scriptjunkie" Weeks – Network Nightmare: Ruling The Nightlife

Matt “scriptjunkie” Weeks – Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit https://www.defcon.org/images/defcon-19/dc-19-presentations/Weeks/DEFCON-19-Weeks-Network-Nightmare.pdf The best techniques for

Read More
Linux serverNETWORK ADMINISTRATIONSsmtp server liux

DEF CON 29 – Jenko Hwong – New Phishing Attacks Exploiting OAuth Authentication Flows

OAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app

Read More
DNS Server linuxLinux serverNETWORK ADMINISTRATIONS

DEF CON 29 – Shir Tamari, Ami Luttwak – New class of DNS Vulns Affecting DNS-as-Service Platforms

We present a novel class of DNS vulnerabilities that affects multiple DNS-as-a-Service (DNSaaS) providers. The vulnerabilities have been proven and

Read More
Computer NetworksNETWORKS

DEF CON 29 – Kelly Kaoudis, Sick Codes – Rotten code, aging standards, & pwning IPv4 parsing

Openness to responsibly disclosed external vulnerability research is crucial for modern software maintainers and security teams. Changes in upstream dependency

Read More
NETWORK ADMINISTRATIONSWindows serverwindows server dhcp

DEF CON 16 – John Fitzpatrick: Virtually Hacking

DEF CON 16 – John Fitzpatrick: Virtually Hacking Own the VMware box and you get half the servers on the

Read More
OPERATING SYSTEMSOS Linux

HOW TO PLAY HTB WITHOUT A VPN OR KALI LINUX (PWN BOX)

In this video i try out Hack The Box latest feature PWN BOX. Can you really just play HTB only

Read More
linux ftp serverLinux serverNETWORK ADMINISTRATIONS

Fuzzing: Finding Your Own Bugs and 0days! by Rodolpho Concurde (ROd0X)

Fuzzing: Finding Your Own Bugs and 0days! Speaker: Rodolpho Concurde (ROd0X) Abstract: This presentation has as objective to explain how

Read More
NETWORK ADMINISTRATIONSWindows serverwindows server dhcp

DEF CON 23 – Ronny Bull and Jeanna Matthews -Exploring Layer 2 Security in Virtualized Environments

White paper Available Here: http://media.defcon.org/DEF CON 23/DEF CON 23 presentations/Ronny Bull & Jeanna Matthews – UPDATED/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf Cloud service providers offer

Read More