DEF CON 9 – Robert Grill and Michael Cohen – Windows NT and Novell Host Based Intrusion Detection *
Description from DEF CON 9 Speaker’s Page: Windows NT and Novell Host Based Intrusion Detection Using Native Logging and 3rd
Read MoreDescription from DEF CON 9 Speaker’s Page: Windows NT and Novell Host Based Intrusion Detection Using Native Logging and 3rd
Read MoreMatt “scriptjunkie” Weeks – Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit https://www.defcon.org/images/defcon-19/dc-19-presentations/Weeks/DEFCON-19-Weeks-Network-Nightmare.pdf The best techniques for
Read MoreRobert Edmonds & Paul Vixie – Passive DNS Hardening Passive DNS replication is a technique invented by Florian Weimer for
Read MoreOAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app
Read MoreWe present a novel class of DNS vulnerabilities that affects multiple DNS-as-a-Service (DNSaaS) providers. The vulnerabilities have been proven and
Read MoreOpenness to responsibly disclosed external vulnerability research is crucial for modern software maintainers and security teams. Changes in upstream dependency
Read MoreDEF CON 16 – John Fitzpatrick: Virtually Hacking Own the VMware box and you get half the servers on the
Read MoreIn this video i try out Hack The Box latest feature PWN BOX. Can you really just play HTB only
Read MoreFuzzing: Finding Your Own Bugs and 0days! Speaker: Rodolpho Concurde (ROd0X) Abstract: This presentation has as objective to explain how
Read MoreWhite paper Available Here: http://media.defcon.org/DEF CON 23/DEF CON 23 presentations/Ronny Bull & Jeanna Matthews – UPDATED/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf Cloud service providers offer
Read More