DEF CON 19 – Matt "scriptjunkie" Weeks – Network Nightmare: Ruling The Nightlife

Post Views: 10 Matt “scriptjunkie” Weeks – Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit https://www.defcon.org/images/defcon-19/dc-19-presentations/Weeks/DEFCON-19-Weeks-Network-Nightmare.pdf The

Read more

DEF CON 29 – Jenko Hwong – New Phishing Attacks Exploiting OAuth Authentication Flows

Post Views: 30 OAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against

Read more

DEF CON 29 – Shir Tamari, Ami Luttwak – New class of DNS Vulns Affecting DNS-as-Service Platforms

Post Views: 31 We present a novel class of DNS vulnerabilities that affects multiple DNS-as-a-Service (DNSaaS) providers. The vulnerabilities have

Read more

DEF CON 29 – Kelly Kaoudis, Sick Codes – Rotten code, aging standards, & pwning IPv4 parsing

Post Views: 36 Openness to responsibly disclosed external vulnerability research is crucial for modern software maintainers and security teams. Changes

Read more

DEF CON 16 – John Fitzpatrick: Virtually Hacking

Post Views: 33 DEF CON 16 – John Fitzpatrick: Virtually Hacking Own the VMware box and you get half the

Read more

HOW TO PLAY HTB WITHOUT A VPN OR KALI LINUX (PWN BOX)

Post Views: 41 In this video i try out Hack The Box latest feature PWN BOX. Can you really just

Read more

Fuzzing: Finding Your Own Bugs and 0days! by Rodolpho Concurde (ROd0X)

Post Views: 46 Fuzzing: Finding Your Own Bugs and 0days! Speaker: Rodolpho Concurde (ROd0X) Abstract: This presentation has as objective

Read more

DEF CON 23 – Ronny Bull and Jeanna Matthews -Exploring Layer 2 Security in Virtualized Environments

Post Views: 55 White paper Available Here: http://media.defcon.org/DEF CON 23/DEF CON 23 presentations/Ronny Bull & Jeanna Matthews – UPDATED/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf Cloud

Read more