29C3: ISP's black box (EN)
Speaker: Luka Perkov provisioning behind the scene This talk is aimed to give an insight into CPE WAN Management Protocol
Read moreSpeaker: Luka Perkov provisioning behind the scene This talk is aimed to give an insight into CPE WAN Management Protocol
Read moreOAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app
Read moreWe present a novel class of DNS vulnerabilities that affects multiple DNS-as-a-Service (DNSaaS) providers. The vulnerabilities have been proven and
Read moreMost forms of WPA2-EAP have been broken for nearly a decade. EAP-TTLS and EAP-PEAP have long been susceptible to evil
Read moreOpenness to responsibly disclosed external vulnerability research is crucial for modern software maintainers and security teams. Changes in upstream dependency
Read moreWhite paper Available Here: http://media.defcon.org/DEF CON 23/DEF CON 23 presentations/Ronny Bull & Jeanna Matthews – UPDATED/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf Cloud service providers offer
Read moreDNS fragmentation attacks are a more recent series of cache poisoning attacks on resolvers. Even if DNSSEC is fully implemented,
Read more