<- back to youtube channels
VideoIDLengthSize
- Paul Amicelli & Baptiste David - How to secure the Keyboard ChainW5B-zjaDzfU22:42114M
3D Printing Presentation from Dr3t of DC719oUY8aQqCSRU13:5258M
Adam - Security to Make the CFO Happy - DEF CON 27 Packet Hacking Village8LfcgPWtV7818:55102M
Adrian Korn - The OSINT space is Growing Are we Ready video - DEF CON 27 Recon VillagenH3b7lNcl2E28:43116M
albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conferencew-eJM2Pc0KI41:32383M
Alex Jay Balan - Next gen IoT Botnets 3 moar ownage - DEF CON 27 IoT VillageCjOlzH8Jhs840:55113M
Alexandre Borges - .NET Malware Threats: Internals And Reversing - DEF CON 27 ConferenceUB3pVTO5izU48:09228M
Ali Islam - Weaponizing Hypervisors to Beat Car and Medical Device Attacks - DEF CON 27 ConferencePgqk5YdDabU52:34558M
Alina Dorina - Using Cloud Services for Dial In Reconnaissance Automation - DEF CON 27 Recon VillageCZwm3PcxDOs21:5799M
Alon Weinberg - Please Inject Me, a x64 Code Injection - DEF CON 27 ConferencedKrNJhbGgHY17:35136M
Alvaro Muñoz - SSO Wars: The Token Menace - DEF CON 27 ConferenceObxxXU8GRMI37:29233M
Amit Elazari - Regulatory Trends in IoT and impact on research community - DEF CON 27 IoT VillagezhJomUeVW9435:42255M
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference86HwtH2v14w48:42211M
Andres Blanco - Love is in the Air video - DEF CON 27 Wireless Villageq5vf_BJj52g24:3596M
Andrew Nicholson - Hacking Hollywood - DEF CON 27 Social Engineering Village4LdwU71Gpi429:21104M
Andrew T - BITFI You Wouldnt Steal My Cloins - DEF CON 27 IoT VillageW8bTI7QZI3g28:45190M
Andrew Tierney - Pwning a mobile drilling rig Hacking an oil rig - DEF CON 27 Hack the Sea VillageJoJ6uzIsQNs27:44234M
Androsia Securing data in process for your Android Apps - Samit Anwer - DEF CON China Beta1GoXnRpp0cQ45:29151M
Andy Grant - Unpacking Pkgs A Look Inside MacOS Installer Packages - DEF CON 27 ConferencekCXhIYtODBg22:08149M
Anish Athalye - Want Strong Isolation Just Reset Your Processor - DEF CON 27 ConferenceAgCNPc5RfL844:18234M
Anthony Rose - Hack to Basics Adapting Exploit Frameworks to Evade Micros - DEF CON 27 Recon VillageapooENo_riY30:41224M
Ariel Herbert Voss - Dont Red Team AI Like a Chump - DEF CON 27 Conferenceivlc1yPw76A28:40289M
Babak Javadi - Basics of Hacking Physical Access Control Systems - DEF CON 27 Wireless VillageLS5OQHUJaJE01:02:52375M
Ben Brecht - MITM mixed mode butterfly key privacy attack - DEF CON 27 Crypto and Privacy VillageuhbKB_5u6jE32:53203M
Ben Sadeghipour - Owning The Clout Through Server Side Request Forgery - DEF CON 27 Conferenceo-tL9ULF0KI28:36176M
Bernhard Mueller - The Ether Wars Exploits counter exploits and honeypots - DEF CON 27 ConferenceQd9ubry-c_M47:42278M
Bertin Bervis - Mixing industrial protocols with web application security - DEF CON 27 IoT VillageTFkm0EN3Azk37:43221M
Besim ALTINOK - edu driving - DEF CON 27 Wireless VillagetfF9sCr9Cec29:28135M
Besim Altinok - Wi Fi Threat Modeling and Monitoring - DEF CON 27 Packet Hacking VillagepfkConx9j-s43:50185M
Bill Demirkapi - Are Your Childs Records at Risk The Current State of School - DEF CON 27 ConferenceHTj6zZd2jXE42:13411M
Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conferenceij0c-236O0k46:19300M
Bill Swearingen - HAKC THE POLICE - DEF CON 27 ConferencevQtLms02PFM41:17192M
Billy Boatright - Swing Away Conquer Impostor Syndrome - DEF CON 27 Social Engineering VillageuIhQhAu7EYk26:36220M
Blasted Bits - ZOZ - DEF CON China Beta1abx5kqOnG859:07276M
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conferencepq9t0VEIMio39:03500M
Brent Stone - Reverse Engineering 17+ Cars in Less than 10 Minutes - DEF CON 27 ConferenceKkgxFplsTnM17:4672M
Brian Satira - Opening Remarks - DEF CON 27 Hack the Sea VillageWonKnDVpmQ806:0729M
Bruce Schneier - Information Security in the Public Interest - DEF CON 27 ConferenceG0WRV7gosRA42:47922M
Bug Crowd - Lets get technical and hunt harder video - DEF CON 27 Recon Villagezj50_lMV-pI31:28137M
Bugs Aren't Random Unifying Building & Breaking in Modern Age - Dan Kaminsky - DEF CON China Betaf3cyCg7itOI01:00:43271M
Campbell Murray - GSM We Can Hear Everyone Now - DEF CON 27 ConferenceYlqJCPk2OvQ38:24169M
Cat Murdock - Black Mirror You are yr own privacy nightmare - DEF CON 27 Crypto and Privacy VillageGg0M0BjWvE053:29347M
Cathie Yun - Implementing a Zero Knowledge Proof - DEF CON 27 Crypto and Privacy VillagesOKh7WQgwpw38:06168M
Cesare Pizzi - Sandbox Creative Usage For Fun and Problems - DEF CON 27 Packet Hacking VillagerwEUY2p7WOI21:10122M
Cheryl Biswas - Patching It is Complicated - DEF CON 27 Packet Hacking Village8VrzovOrho836:54170M
Chris Hadnagy - SEVillage 10 Year Anniversary a Look Back - DEF CON 27 Social Engineering Villageb8hrjSef0E851:38396M
Chris Hanlon - TLS decryption attacks and back doors - DEF CON 27 Crypto and Privacy VillageYG33kAaFs6Q30:56183M
Chris Kirsch - Psychic Cold Reading Techniques - DEF CON 27 Social Engineering VillageBCxBkBzQrzs32:08226M
Chris Pritchard - The Basics of Social Engineering - DEF CON 27 Social Engineering VillagetCRT3QFzwm824:36193M
Christian Paquin - Migrating to quantum safe crypto - DEF CON 27 Crypto and Privacy VillageIqCw19bKE6c25:34152M
Christopher Roberts - Firmware Slap Automating Discovery Exploitable Vulns - DEF CON 27 ConferenceYwEQt4i_AUo32:47291M
Christopher Wade - Tag side attacks against NFC - DEF CON 27 ConferenceOQVz7y2EyHM35:52233M
Contests and Events - Contests Awards Ceremony video - DEF CON 27 ConferencePNDlM0RbtX401:00:52864M
Cris DeWitt - Maritime Cyber Policy Panel - DEF CON 27 Hack the Sea VillagePemUvR1-iAo42:32410M
Cult of the Dead Cow - Change the World, cDc Style - DEF CON 27 Conferencetr4PEQ-g7r846:19566M
D9 - Hacking Corporate Org Socialization - DEF CON 27 Packet Hacking VillageJsyEHGepP7w51:50188M
Damien Cauquil - Defeating Bluetooth Low Energy 5 PRNG for Fun and Jamming - DEF CON 27 ConferencewkIdpK7mAk437:14455M
Daniel Crowley - Key Search Attacks Against Modern Symmetric Ciphers - DEF CON 27 ConferenceubzNkvq6lVo49:05500M
Daniel Isler - The Voice Told Me To Do It - DEF CON 27 Social Engineering Village3ngeKL06Ph427:46174M
Daniel Romero - Why You Should Fear Your mundane Office Equipment - DEF CON 27 Conference3X-ZnlyGuWc44:54481M
Daniel Wegemer - Fitbit Firmware Hacking The Current State of the Heart - DEF CON 27 IoT VillagePycp5b_EPTY43:29173M
DC30 DCGVR - How To Start And Run A DEF CON GroupNbB2Keq3WFw59:51349M
DC30 DCGVR Talks - AWS Metadata Privilege EscalationDkTh_Zptu-Y30:28142M
DC30 DCGVR Talks - Fun with bookmarksZ82FSqCO9U031:33150M
DC30 DCGVR Talks - Advanced Packet Wrangling With TCPdumpLloLFZtMyEA38:08219M
DC30 DCGVR Talks - Careful Who You Colab WithqWJKL5xk6kU29:21133M
DC30 DCGVR Talks - Glitter Nail Polish vs the Evil MaideuOGB3GR7oo31:56161M
DC30 DCGVR Talks - How getting a free phone got me to report critical vulnsnjxybInmIX450:03251M
DC30 DCGVR Talks - When FireFox Gets AngryBIkHLDB008g01:26:39396M
DC801 Group Spotlight4ZrjuNIOdb013:55400M
DEF CON - Brian Gorenc. Fritz Sands - State of the Union for SCADA HMI Vulnerabilitiest3EHOA5fpYk44:20171M
DEF CON - Panel - Guests N Goblins: Exposing Wi Fi Exfiltration Risks and MitigationH_Kp7Bul4I033:19100M
DEF CON 11 - Gregoire Gentil - Hack Any WebsitebYP9DLPzkRU21:4433M
DEF CON 12 - Bev Harris & Rebecca Mercuri, Part 2 - Hack the Vote: Election 2004iQut9nqH8SI01:03:41116M
DEF CON 12 - Doug Mohney, DIGEX At the Dawn of the Commercial InternetuxMq-x9rlJM45:4689M
DEF CON 12 - Fingerprinting with MorphGK-eiV_NuGg50:28117M
DEF CON 12 - FX and Halvar - Take it from hereJwot7S6NmLE02:12:24234M
DEF CON 12 - Gene Cronk, IPv6 PrimerSfF0LssVk1E43:5195M
DEF CON 12 - Greg Conti, Network Attack VisualizationXATakIdyZdk50:24105M
DEF CON 12 - Grifter, Russ Rogers and Tierra, Project PrometheusS8ZdDGRuFLM50:0887M
DEF CON 12 - h1kari,Smart Card Security: From GSM to Parking MetersC41jp9S50eg51:451M
DEF CON 12 - Ian Clarke, Freenet: Taming the World's Largest TamagotchiYAOhLkWpNWE51:1599M
DEF CON 12 - Ian Vitek, Exploring Terminal Services, The Last 12 Month of Research.9bqKOd3fcM847:35100M
DEF CON 12 - IcE tRe, Virus, Worms and Trojans: Where are we going?VuZekLpVNs830:4069M
DEF CON 12 - j0hnny long, Google Hacking- The Return of the Googledorks1U66eEpSysE40:5869M
DEF CON 12 - Jamie Butler,VICE - Catch the Hookers!HKlgJzms8yQ41:4576M
DEF CON 12 - Jason Scott, Digitizations And DocumentaryL5JlGJ0CHeA50:4390M
DEF CON 12 - Jesee Krembs and Nicholas Farr, The Hacker Foundation: An IntroductionfaazFI_M2j026:1148M
DEF CON 12 - Jon Callas, How Do We Get The World To Use Message SecurityqL4a7N_EEfg48:2795M
DEF CON 12 - Jon Callas, How Do We Get The World To Use Message Securitys7WNKX_cNyw48:4895M
DEF CON 12 - Joshua Teitelbaum and Peter Leung, CryptoMail Encrypted E-Mail for AllRdORT6bbmgw33:0076M
DEF CON 12 - Kevin Mahaffey, Smile, You're on Candid CameraM123pK8RvBA11:3819M
DEF CON 12 - Len Sassaman, Mixmaster vs. Reliable: A Comparison of Two Anonymous RemailershotqSaYZDw448:36111M
DEF CON 12 - Lucky 225, Phreaking in the Age of Voice Over IPs0nhHlLQAZA29:0255M
DEF CON 12 - Lukas Grunwald, RF-ID and Smart-Labes: Myth, Technology and AttacksTdSeqaowT7k30:5758M
DEF CON 12 - Max Mullen - Hack Your Carl6lcDFKhBnQ36:1465M
DEF CON 12 - Maximillian Dornseif, Far More Than You Ever Wanted To TellO_uKvi-fwhI51:1891M
DEF CON 12 - Michael Rash, Advanced Netfilter; Content Replacement (ala Snort_inline)DPo7eeq0JuE51:44109M
DEF CON 12 - Michael T. Raggo , Steganography, Steganalysis and CryptanalysisITBCkzEat4034:1161M
DEF CON 12 - n0namehere, Real World Privacy, How to Leave Less of A Trail in LifemcAy53PsnXs46:34101M
DEF CON 12 - Nathan Hamiel (Ichabod Ver7),Down with the RIAAbAnyTn8PzE445:2392M
DEF CON 12 - Ne0nRa1n - Better than Life - Manipulation of The Human Brain With The Use of MachinesgKrYvgwwjxg55:05105M
DEF CON 12 - Nothingface, Automotive NetworksxboQgRMTN3w46:4983M
DEF CON 12 - Panel - Meet the FedsYE2XzttRi1Y39:1664M
DEF CON 12 - Panel, Ask EFF: Discussion and Q⧸A on the State of Digital Liberties6zNfmUSKj3E01:48:16175M
DEF CON 12 - Richard Thieme,Quantum Hacking: In Search of a Unified TheoryWYgl6Rs2y9o20:1932M
DEF CON 12 - Sarah Gordon,What Do You Mean, Privacy?1iq9w5Tn_DQ15:2330M
DEF CON 12 - Scott Fullam, Introduction to Hardware HackingvBvY-2hXyAY41:2381M
DEF CON 12 - Sean O'Toole, Mutating the MutatorsuUMGwAenAzA12:5227M
DEF CON 12 - Sensepost, When the Tables TurnGoxRlMHeO4M47:2094M
DEF CON 12 - spoonm and HD Moore, Bubonic Buffer OverflowbsiVl_dqka001:06:40130M
DEF CON 12 - The Shmoo Group - Wireless WeaponryRtEsqbhX1Us35:4576M
DEF CON 12 - Todd Moore, Cracking Net2PhoneNmAdquDqa5I13:5725M
DEF CON 12 - Tony Arcieri, PDTP :The Peer Distributed Transfer ProtocolEvRtzVlnYr438:5884M
DEF CON 12 - Tzi-cker Chiueh, Program Semantics Aware Intrusion Detectionnd3QMeHmcRM38:5486M
DEF CON 12 - Wendy Seltzer and Seth Schoen, Hacking the SpectrumJ1WBInenXH048:0182M
DEF CON 12 -Nick Mathewson, Snake Oil Anonymity: How To Spot It, And How Not To Write It5Go34e4RXLc40:5185M
DEF CON 12 -Thorsten Holz and Others - NoSEBrEaK Defeating HoneynetsIcjLdwxKeeg54:391M
DEF CON 13 - Alex Stamos & Scott Stender, Attacking Web ServicesjrKC3N4-ONg01:43:51244M
DEF CON 13 - Alexey Smirnov & Tzi-cker Chiueh, DIRA: Automatic Detection3bqHd7JZlo455:36121M
DEF CON 13 - Ben Kurtz, A Linguistic Platform for Threat Development1hJAEJNxlN050:0669M
DEF CON 13 - Broward Horne, Meme Mining for Fun and ProfitB0PGHXcs6O452:0096M
DEF CON 13 - Christian Grothoff, Lost In TranslationQY0icR--2gI31:3055M
DEF CON 13 - Chuck Willis, Trends in Licensing of Security ToolsyKQGdtpjoa449:4289M
DEF CON 13 - CISO Q&A with Dark TangentwLQNs0vqxsk50:56104M
DEF CON 13 - Dan Kaminsky, Black Ops of TCP 2005hA_fKQo_ovE01:02:58113M
DEF CON 13 - Daniel Burroughs, Auto-adapting Stealth Communication ChannelsawG8-KiHPAQ29:2153M
DEF CON 13 - Daniel Burroughs, Development of An Undergraduate Security ProgramevRnPybzMPw29:4655M
DEF CON 13 - David Cowan - The Information Security Industry: $3 Billion of Snake Oil1QC6TdhYcEQ50:3996M
DEF CON 13 - David Hulton, The Next Generation of Cryptanalytic HardwareIRTZTktq8mg41:1674M
DEF CON 13 - Dean Pierce, Brandon Edwards & Anthony Lineberry, Bypassing Authenticated WirelessCwi8VZn0Egc14:2324M
DEF CON 13 - Defcon Panel Discussion of regional DC Groupse98YT5TB21047:0583M
DEF CON 13 - Deral Heiland, The Insecure Workstation II "Bob Reloaded"Ni4LlXQxbBo39:1174M
DEF CON 13 - Deviant Ollam, Introduction to Lockpicking and Physical SecurityIQ6QzsRKpQU02:23:45274M
DEF CON 13 - Elizabeth Stark & Fred Benenson, The Revolution Will Not Be CopyrightedyaFzUiCagik57:12106M
DEF CON 13 - Elizabeth Stark and Fred Benenson - The Revolution Will Not Be CopyrightedZEj25yGvuQk48:3193M
DEF CON 13 - Fyodor, Hacking NmapV2BXeMTfrt042:0985M
DEF CON 13 - Greg Conti, Countering Denial of Information AttacksILYDLSkRwZ844:4577M
DEF CON 13 - Ian Clarke & Oskar Sandberg, Routing in the Dark-AyNbPwg0BI47:5584M
DEF CON 13 - Jason Scott, Why Tech Documentaries are Impossible8FP3o_L_Ujo01:03:33146M
DEF CON 13 - Jay Beale, Introducing the Bastille Hardening Assessment Toolwdnb2GL9Jxs47:3088M
DEF CON 13 - Jennifer Granick, Top Ten Legal Issues in Computer SecurityWNsKYEoKmFA01:17:27158M
DEF CON 13 - Jim Christy and various other Feds, Meet the Fed7Vi956UVRcg49:1397M
DEF CON 13 - Jim "FalconRed" Rennie, Licensing Agreements 101: The Creative Commons LicenseBmsmzc4cxtY45:3681M
DEF CON 13 - jives, Passive Host AuditingeOirJfpnIU824:1239M
DEF CON 13 - Johnny Long, Death of a Thousand cuts - ForensicsZVpZwKHLEH436:3766M
DEF CON 13 - Johnny Long, Google Hacking for Penetration Testersfo1BR9itwOY49:5487M
DEF CON 13 - Jonathan Levin, The Dark side of Winsock6r-p-ryBMLU49:2990M
DEF CON 13 - Julian Grizzard, Surgical Recovery from Kernel-Level Rootkit Installationsz55n-XgEQEY49:0495M
DEF CON 13 - Kenneth Geers, Hacking in a Foreign Language: A Network Security Guide to RussiaFPo_ItdUNVs50:20108M
DEF CON 13 - Kevin McCarthy, The Six Year Old Hacker: No More Script KiddiesMXl0QiCRiW432:1659M
DEF CON 13 - Keynote: Dr. Linton WellsVYyDlGgAW6k59:20122M
DEF CON 13 - Kristofer Erickson, The Power to Map: How Cyberspace Is Imagined Through CartographyVxRV-_yDgyQ27:1651M
DEF CON 13 - Leonard Gallion, A Safecracking Double Feature: Dial "B" For BackDialing5gMEFQbqE9g45:1288M
DEF CON 13 - Major Malfunction, Old Skewl Hacking - InfraRed61Fo-zg-DqI48:0385M
DEF CON 13 - Marc Weber Tobias & Matt Fiddler, Physical Security Bypass Techniquesb3uMDcZ0djQ44:56113M
DEF CON 13 - Marshall Beddoe, Reverse Engineering Network Protocols using BioinformaticsYLDWBSyjkAc55:5196M
DEF CON 13 - Matthew L. Shuchman ("Pilgrim") , Building WarDriving Hardware WorkshopTOBX-xRBNjw37:5070M
DEF CON 13 - Metalstorm, Trust Transience: Post Intrusion SSH HijackingKdjdN6gIHGs48:0796M
DEF CON 13 - Mystic, Hacking the Mind (Influence and NLP)h4dHmsxfROM52:17101M
DEF CON 13 - NMRC Collective,The NMRC Warez 2005 ExtravaganzaZucV6IikHnI34:4882M
DEF CON 13 - Ofir Arkin, A New Hybrid Approach for Infrastructure Discovery, Monitoring and ControlBUrm7ppmJOU53:2095M
DEF CON 13 - Ofir Arkin, On the Current State of Remote Active OS FingerprintingsjzxM420_As35:2261M
DEF CON 13 - Panel - Legal and Ethical Aspects of WardrivingjUkGGQrpdXQ37:4573M
DEF CON 13 - Patty L. Walsh, Muckraker, Hackers and the MediapX_534X8vQE40:49110M
DEF CON 13 - Paul Graham, Inequality and RiskRpD_Sz_ZWPk26:5348M
DEF CON 13 - Paul Vixie & Gadi Evron, Internet Survivability, Threats and Efforts8GNoomn7iuo58:38101M
DEF CON 13 - Paul Vixie, The Internets March of FollyFNxkQU7Z74I49:35108M
DEF CON 13 - Philip R. Zimmermann, The Unveiling of My Next Big Project: ZPhoned8bqbdfe-rU52:4195M
DEF CON 13 - Raffael Marty, Visual Security Event AnalysisrOhkX3fPJb044:1981M
DEF CON 13 - Raven, Pen-testing the BackbonewQRIgUuXlfw49:48116M
DEF CON 13 - Robert E. Lee & Jack C. Louis: Introducing Unicornscan - Riding the UnicornJOeHiUJ438Q44:5074M
DEF CON 13 - Robert Morris, ATM Network VulnerabilitiestkNuhnvm37c30:0448M
DEF CON 13 - Robert "hack ajar" Imhoff-Dousharm,Credit CardsM0P6oyNQZqg48:3788M
DEF CON 13 - Roberto Preatoni & Fabio Ghioni, Assymetric Digital Warfare9Goy-8-E6Ig54:59106M
DEF CON 13 - RS, Forensic Data Acquisition ToolsZSgB1yfEQfY49:2599M
DEF CON 13 - Sam Thingpen - From Cyberspace to Hyperspaceac0rjtDCO0433:1356M
DEF CON 13 - Sensepost, Automation - Deus ex Machina or Rube Goldberg Machine?5D-BmblIymU01:24:24152M
DEF CON 13 - Sherri Sparks & Jamie Butler, "Shadow Walker" - Raising The Bar For Rootkit DetectionQ89pjQ2kqow55:59145M
DEF CON 13 - Shmoo Group - Shmoo-Fu: Hacker Goo, Goofs, and Gear with the ShmoovaWK3kOBFb801:15:22136M
DEF CON 13 - StankDawg, Hacking Google AdWordsnzRN4_X4KtQ49:5286M
DEF CON 13 - Steve Dunker Esq, The Hacker's Guide to Search and Arrestv2aG5tulEo054:23109M
DEF CON 13 - Strom Carlson & Black Ratchet, Be Your Own Telephone Company... With AsteriskSWgmBi_9unY01:44:59265M
DEF CON 13 - The Dark Tangent, Award Ceremoniesw09rbilifJU01:36:14213M
DEF CON 13 - The Hacker Foundation, Doing Not-For-Profit Tech: The Hacker Foundation Year in ReviewLPk91z-GJio48:1368M
DEF CON 13 - Thomas J. Holt, No Women Allowed? Exploring Gender Differences In HackingM1s3Up2-rFA20:5039M
DEF CON 13 - Tony Howlett, GeoIP Blocking, A Controversial But (Sometimes) Effective ApproachwV6S-grHF3E26:0345M
DEF CON 13 - Wes Brown & Scott Dunlop, Mosquito - Secure Remote Code Execution Frameworkvy8La7dt5v428:1648M
DEF CON 13 - Wesley Tanner and Nick Lane-Smith: End-to-End Voice Encryption over GSMqxTsadG3mAM41:5980M
DEF CON 14 - Amber Schroader and Tyler Cohen - Cyber Crime Foiled Once Again?eH2jv0rudR447:2769M
DEF CON 14 - EFF: Panel: Ask EFF: The Year in Digital Civil LibertiesIVW7cAEXM9o52:41205M
DEF CON 14 - EFF: PANEL: EFF v. AT&T: Your World, Delivered (to the NSA)fY7cLC-bKpg50:35241M
DEF CON 14 - James Christy: PANEL: Meet the Feds: 'OODA Loop and the Science of Securityna8n5EKXM-851:55270M
DEF CON 14 - Johnny Long - Death by 1000 cutsEPvK9XHFigQ53:30140M
DEF CON 14 - Major Malfunction - Magstripe MadnessITihB1c3dHw49:00106M
DEF CON 14 - Marc Weber Tobias: Things That Go "Bump" in the nighta3Gzu9NSjNc42:3595M
DEF CON 14 - Melanie Rieback: A Hacker's Guide to RFID Spoofing and JammingPVt_DyR-z5M50:08136M
DEF CON 14 - Panel: Internet Wars 20065qg4KOX7adI01:42:02243M
DEF CON 14 - Paul Simmonds: The Jericho Forum and ChallengeVN4NyIAdXQY42:01148M
DEF CON 14 - Paul Vixie and David Dagon : Malware Repository RequirementgR3qKxmnAOs51:40125M
DEF CON 14 - Peleus Uhley: Kiosk SecurityIXYpc38sgSQ48:0282M
DEF CON 14 - Peter Gutmann: Phishing Tips and Techniques: Tackle, Rigging, and How & When to PhishhsbgSWxX8Nc49:26865K
DEF CON 14 - R.P. Murphy: Covert Channels using IPv6⧸ICMPv6Jzv0pljNTjo42:1483M
DEF CON 14 - Raffael Marty: Visual Log Analysis - The Beauty of GraphszVjbKk5r53Q52:3193M
DEF CON 14 - Renderman and Thorn - Church of WifisB_MhLpm6PM42:5950M
DEF CON 14 - Richard Thieme: Beyond Social Engineering: Tools for Reinventing YourselfQquLPI29zzY53:25242M
DEF CON 14 - Rick Hill: WarRocketing. Network Stumbling 50 sq. miles in less than 60 sec.eorqtvFtq7M37:19114M
DEF CON 14 - Rick Wesson: Abuse and the Global Infection RatenulUXnqKcW849:04105M
DEF CON 14 - Robert Clark: Legal Aspects of Internet & Computer Network Defense - A Year in Review896QLoQljM852:3588M
DEF CON 14 - Robert Clark: Legal Aspects of Internet & Computer Network DefenseRXHIyY3fWW801:15:52203M
DEF CON 14 - Robert J. Hansen: Trust, But Verify: Auditing Proprietary DRE SystemsLvSfr2L53YI48:4862M
DEF CON 14 - Scott Moulton: Rebuilding HARD DRIVES for Data Recovery; Anatomy of a Hard DriveQNasotOQosI41:55147M
DEF CON 14 - Seth Hardy: Your Name, Your Shoe Size, Your Identity? What do we Trust in this Web?5JtxaQdE2wc46:32819K
DEF CON 15 - Aviv Raff and Iftach Ian Amit - The Inherent Insecurity of Widgets4-LPpm7Es2g48:0452M
DEF CON 15 - Patrik Karlsson - SQL InjectionQzZyFcjQ25Y39:2280M
DEF CON 17 - etd - Dradis Framework Sharing Information Will Get You RootzEpG1Ugqgnc26:16472K
DEF CON 17 - Kevin Johnson and Panel - Injectable Exploitsi6YJ5AcuBFU41:13201M
DEF CON 17 - Pedro hkm Joaquin - Attacks Against 2wire Residential Gateway RoutersTx0DivWaDkA15:5344M
DEF CON 18 - Jack Daniel & Panel - PCI, Compromising Controls and Compromising Security_zMYjApFWds56:38116M
DEF CON 19 - Marcus J. Carey, David Rude and Will Vandevanter - Metasploit vSploit ModulesAT6OZcANdvU40:47120M
DEF CON 19 - Nicholas J. Percoco, Sean Schulte - This is REALLY not the droid you're looking for...4WUkd8CR7Os32:0159M
DEF CON 20 - Andrew King - Detecting Reflective InjectionZB1yD8LlFns26:2350M
DEF CON 20 - Ang Cui - Embedded Device Firmware Vulnerability Hunting Using FRAKEKy_f-etWy821:5866M
DEF CON 20 - Chema Alonso and Manu "The Sur"- Owning Bad Guys {And Mafia} With Javascript BotnetsxBvRNvKmVOw39:35147M
DEF CON 20 - Chris Anderson - Drones!lzYquLKj1oo51:10284M
DEF CON 20 - Chris Conley - Bad (and Sometimes Good) Tech Policy: It's Not Just a DC ThingYilCKh7T8Ro23:2561M
DEF CON 20 - Chris Tarnovsky - Attacking TPM Part 2 A Look at the ST19WP18 TPM DeviceBp26rPw90Dc47:44270M
DEF CON 20 - Chris "TheSuggmeister" Sumner and Randall Wald - Can Twitter Expose Psychopath Killers?Zky9Nla3mRQ48:28155M
DEF CON 20 - Christopher Soghoian - Can you track me now?j23vcWqXUdw01:39:49273M
DEF CON 20 - Conti, Shay and Hartzog - Life Inside a Skinner Box9g4dof07JwA46:2090M
DEF CON 20 - Cory Docotorow - Beyond the War on General Purpose Computing Whats Inside the Box84zl75ODzHc23:0761M
DEF CON 20 - Cutaway - Looking Into The Eye Of The MetertAJRHwRr2dk48:36164M
DEF CON 20 - Dan Griffin - Hacking Measured Boot and UEFI9owW2q6SJew45:48117M
DEF CON 20 - Dan Kaminsky - Black OpsMQCinkFpW2401:04:58231M
DEF CON 20 - Dan Zulla - Improving Web Vulnerability Scanning7cgWrnPeIKs52:06122M
DEF CON 20 - Darkred - Not-So-Limited Warranty: Target Attacks on Warranties for Fun and ProfitTbMAUT1cn9M09:2156M
DEF CON 20 - Dave Brown - DIY Electric Care4pqdk-U2RE42:10165M
DEF CON 20 - David "thelightcosine" Maloney - Weaponizing the Windows APIcZ-evXHTWIQ33:0099M
DEF CON 20 - Eddie Lee - NFC Hacking: The Easy WayeL_CdCWreOw34:06102M
DEF CON 20 - egypt - Post Metasploitation Improving Accuracy and Efficiency7c5AdP1HEtk50:19172M
DEF CON 20 - Elie Bursztein and Patrick Samy - Fuzzing Online Gamesexs1ut5OEyA37:01691K
DEF CON 20 - FX and Greg - Hacking [Redacted] RoutersU8fu05Em3Lg33:1757M
DEF CON 20 - General Keith B. Alexander - Shared Values, Shared ResponsibilityNP2ET9XqEPs48:54192M
DEF CON 20 - Jason A. Novak and Andrea (Drea) London - SQL ReInjectorOk0cNVulBRk33:35146M
DEF CON 20 - Jason Ostrom, Karl Feinauer, William Borskey - The End of the PSTN As You Know It-Sk0izFfPW050:01172M
DEF CON 20 - Jayson E. Street - How to Channel Your Inner Henry RollinsMVR1JzNAhRo17:3637M
DEF CON 20 - Jeff Bryner - KinectasploitV2: Kinect Meets 20 Security Tools7NawiEI5tXA30:17132M
DEF CON 20 - Jim Christy and Panel - Meet the Feds 1: Law EnforcementjfG4RnmhrSE51:29162M
DEF CON 20 - Jim Christy and Panel Meet the Feds 2: Policy R&DE1GbqQ6Cg_c51:02155M
DEF CON 20 - Jim Rennie, Jennifer Granick - MegaUpload: Guilty or Not GuiltyY4SR1_1tmI048:55114M
DEF CON 20 - Joe Grand and Zoz More Projects of Prototype This!u93xykcu3Fs51:24394M
DEF CON 20 - John Floren - Hellaphone: Replacing the Java in AndroidEpTTU4lcR1Q36:5974M
DEF CON 20 - Jonathan Brossard - Hardware Backdooring is PracticalMqbvxrJqrPU46:3293M
DEF CON 20 - Josh Brashars - Exploit Archaeology: Raiders of the Lost Payphoneszn9GNdaXQDA49:22119M
DEF CON 20 - Josh "m0nk" Thomas and Jeff "stoker" Robble - Off-Grid Communications with AndroidsTpJuWcCsR050:01124M
DEF CON 20 - Katy Levinson - Robots You're Doing It Wrong 2dQ6rgUXCP8Q49:50189M
DEF CON 20 - Kenneth Geers - The Art of Cyberwaralo7Fv6ywkc47:02267M
DEF CON 20 - Kevin Poulsen - Answers Your Questions8s4b2ZKyPHc54:39151M
DEF CON 20 - Linda C Butler - The Open Cyber Challenge PlatformBrEnn_j1PM820:1372M
DEF CON 20 - LosT - Making the DEF CON 20 BadgeKaHvZ8tkeH445:39102M
DEF CON 20 - Marc Weber Tobias, Matt Fiddler, and Tobias Bluzmanis - Safes and Containersmu9USTP_0ZQ52:17296M
DEF CON 20 - Mark Weatherford - The Christopher Columbus Rule and DHSeKSZFY7ZTxo48:0679M
DEF CON 20 - Marlinspike Hulton and Ray - Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2gkPvZDcrLFk29:37162M
DEF CON 20 - Martin Gallo - Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol1YOPyHvhHUg40:08110M
DEF CON 20 - Matthew Duggan - Not So Super Notes2jts615dr1E23:5654M
DEF CON 20 - Matthew Toussain and Christopher Shields - SubterfugetIPq41_lqJU39:00117M
DEF CON 20 - Michael Coppola - Owning the Network: Adventures in Router RootkitssWdqSG9IydA50:09172M
DEF CON 20 - Michael Perklin - Anti-Forensics and Anti-Anti-ForensicsBCnjKEFOH1M49:11111M
DEF CON 20 - Michael Robinson and Chris Taylor - Spy vs Spy: Spying on Mobile Device SpywarenTFY-URUHMw50:10132M
DEF CON 20 - Mickey Shkatov and Toby Kohlenberg - We Have You by the GadgetsfTtrLFubDc841:31104M
DEF CON 20 - Nadeem Douba - Sploitego - Maltego's (Local) Partner in CrimeLyz7-3D6Yak27:31118M
DEF CON 20 - Nick Galbreath - New Techniques in SQLi ObfuscationL19EKHtW8TY20:5661M
DEF CON 20 - Panel - DEF CON Comedy Jam V, V for Vendetta7Ny_uaSZhiE01:50:11266M
DEF CON 20 - Panel - Meet the EFFxYiMLKtn_u450:20106M
DEF CON 20 - Panel - The Making of DEF CON 20TnOoTFSvn3U51:04175M
DEF CON 20 - Panel: Corman - World War 3.0: Chaos, Control & the BattleIiCc3hoOiF849:26132M
DEF CON 20 - Panel: DT Jericho and Russ Rogers - DC RECOGNIZE AwardsW7eWImSZoqM44:54110M
DEF CON 20 - Paul Vixie and Andrew Fried - The DCWG DebriefingE9n2dQ7Fv6A45:47143M
DEF CON 20 - Paul Wilson - The Art of the Con3NexHkzVBy449:5490M
DEF CON 20 - Peter Hannay - Exchanging DemandsEznuimhycvk43:15116M
DEF CON 20 - Phil Polstra - Bypassing Endpoint Security for $20 or LessbEckoZ3KpTY43:53254M
DEF CON 20 - Priest - QA with the Men (and Women) in BlackM2as4OmL4Q053:47165M
DEF CON 20 - Raphael Mudge - Cortana: Rise of the Automated Red Team7asByNBhC1U47:43180M
DEF CON 20 - Rebecca "bx" Shapiro and Sergey Bratus - Programming Weird Machines with ELF MetadataV5KsUm1KfZE46:15158M
DEF CON 20 - RenderMan - Hacker + Airplanes = No Good Can Come Of ThismY2uiLfXmaI50:56169M
DEF CON 20 - Richard Thieme - Twenty Years Back Twenty Years AheadNSVn8gHaD9449:36205M
DEF CON 20 - Robert Deaton - DivaShark - Monitor your Flow6q_7vWGe3RA23:5169M
DEF CON 20 - Robert Portvliet and Brad Antoniewicz - The Safety DancesiYIRxcTfVc49:59354M
DEF CON 20 - Ryan Holeman - Passive Bluetooth Monitoring in ScapyP4akUvCB0S025:0071M
DEF CON 20 - Ryan Reynolds and Jonathan Claudius - Stamp Out Hash Corruption! Crack All The Things!ILJT93H5Usc41:07149M
DEF CON 20 - Sandy Clark and Matt Blaze - SIGINT and Traffic Analysis for the Rest of Us2NEY48V99go47:40109M
DEF CON 20 - Sergio 'flacman' Valderrama and Carlos Alberto Rodriguez - ScyllaQRmQ7xnXAB415:4847M
DEF CON 20 - Shawn Henry - Changing the Security ParadigmcHJfX4aS3IU46:50195M
DEF CON 20 - Svetlana Gaivoronski and Dennis Gamayunov - DemorpheuswOD8_YJKG8s14:2053M
DEF CON 20 - Thomas Cannon - Into the Droid: Gaining Access to Android User DataMOYqgIhQ3y045:14102M
DEF CON 20 - Thor - Socialized Data Using Social Media as a Cyber MuleUe7T2p4VvBw36:3487M
DEF CON 20 - Tim Maletic and Christopher Pogue - OPFOR 4EverTbKhFW4xK5047:30215M
DEF CON 20 - Tom Perrine - Creating an A1 Security Kernel in the 1980sfjJjppHPcdA49:4562M
DEF CON 20 - Viss - Drinking From the Caffeine Firehose We Know as Shodan-T-3buBwMEQ24:32103M
DEF CON 20 - Wesley McGrew - SCADA HMI and Microsoft BobiV4Mt0DLLDw43:51147M
DEF CON 20 - Xeno Kovah and Corey Kallenberg - No More HooksODZ44NqJeWs48:1495M
DEF CON 20 - Zack Fasel - Owned in 60 Seconds: From Network Guest to Windows Domain Adminn3i07GnOLO835:5085M
DEF CON 20 Documentary 20min Preview - 720pJWo4EATAUzA19:28260M
DEF CON 20 Documentary Bonus Clips - A ToastM91Pqt0ysVo00:571M
DEF CON 20 Documentary Bonus Clips - A Top Qualitty ProductionI4CKiELC8-I02:094M
DEF CON 20 Documentary Bonus Clips - Alexis Park Home ImprovementAlawNjasyqA01:152M
DEF CON 20 Documentary Bonus Clips - Another Vegas StorysP8YA0XOpR800:5522K
DEF CON 20 Documentary Bonus Clips - Barkode and BloodkodePjKsnk_imdo02:397M
DEF CON 20 Documentary Bonus Clips - Bed Jumping Mafia_QG6IYmpxCU02:145M
DEF CON 20 Documentary Bonus Clips - Being a Party HostE2vP2ruA_VE02:276M
DEF CON 20 Documentary Bonus Clips - CDC muxedC9WjzBThpUg07:53243K
DEF CON 20 Documentary Bonus Clips - Creme BruleeOapHByMR9N801:367M
DEF CON 20 Documentary Bonus Clips - Mongolian BeefmHPtkxLcfak02:377M
DEF CON 20 Documentary Bonus Clips - Not the Same AnymoreCfi5cAefVX403:4510M
DEF CON 20 Documentary Bonus Clips - Peggy and Her Three HackersuzBI-k8PYxA02:0951K
DEF CON 20 Documentary Bonus Clips - Porn SantaQobMwWfs-jU03:1918M
DEF CON 20 Documentary Bonus Clips - Richard ThiemeayWmp0vwBwo02:425M
DEF CON 20 Documentary Bonus Clips - Service Hallways on SegwayQ1ewWPg7rRI02:5810M
DEF CON 20 Documentary Bonus Clips - The LayovermimVbJ45Uag00:481M
DEF CON 20 Documentary Bonus Clips - The OrganizationVOxIKM1cZoo02:105M
DEF CON 20 Documentary Bonus Clips - VeraNG9pWy6ANg88A02:168M
DEF CON 20 Documentary Bonus Clips - We Make No Money From YouL5qwIdVJ8Qk01:253M
DEF CON 2020 NYE MISS JACKALOPE DJ Music VideoXKyqli9qFM849:511G
DEF CON 2020 NYE Skittish & Bus DJ Music VideoUt6d6SaS3e445:591G
DEF CON 2020 NYE Yesterday & Tomorrow DJ Music VideoV9kae0iTr6E50:371G
DEF CON 2020 NYE - Hacker JeopardyGXdnAvDDPJ800:197M
DEF CON 2020 NYE - Hacker Jeopardy Tiebreaker - Church of Wifi vs Show&TELNETgOruB8NXGvs01:16:12374M
DEF CON 21 - Melissa Elliott - Noise Floor Exploring Unintentional Radio Emissions5N1C3WB8c0o42:58332M
DEF CON 21 - ZOZ - Hacking Driverless Vehiclesk5E28fp4oc049:08295M
DEF CON 22 - Paul Such 0x222 and Agix - Playing with Car Firmware or How to Brick your CartVLatTmNI3818:51116M
DEF CON 22 - Alexandre Moneger - Generating ROP payloads from numbersl_14h0r7qA842:24268M
DEF CON 22 - Andrew Hunt - Raspberry MoCA - A recipe for compromisenSqV78le3jU22:19138M
DEF CON 22 - Anton Sapozhnikov - Acquire current user hashes without admin privilegesbji0VMXl10826:59243M
DEF CON 22 - Blake Self and Shawn "cisc0ninja" Burrell - Don't DDoS Me Bro: Practical DDoS DefensevbdyG0l_b3M40:00292M
DEF CON 22 - Brady Bloxham - Getting Windows to Play with Itselfdq2Hv7J9fvk38:0288M
DEF CON 22 - Brent White - Corporate EspionageD2N6FclMMTg36:59266M
DEF CON 22 - Brian Gorenc and Matt Molinyawe - Building Your Own SMS⧸MMS Fuzzerzn6D-iVcRwg22:30121M
DEF CON 22 - Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems_j9lELCSZQw47:37330M
DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack SurfacestnYO4U0h_wY50:24359M
DEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SERfLj7y0Xf2Y58:15471M
DEF CON 22 - Chris Littlebury - Home Alone with localhost: Automating Home Defense2IeU7Cck0hI46:09200M
DEF CON 22 - Christopher Campbell - The $env:PATH less Traveled-SqAlpANtIs18:2875M
DEF CON 22 - Christopher Campbell - The Secret Life of Krbtgt7HdcEQGQZDU17:05137M
DEF CON 22 - Christopher Soghoian - Blinding The Surveillance StatepM8e0Dbzopk41:32308M
DEF CON 22 - Dameff, Tully, and Hefley - Hacking 911: Adventures in Disruption, Destruction & DeathmBOLml3yLBY45:20293M
DEF CON 22 - Dr. Paul Vixie - Domain Name Problems and Solutions5D4wssff0jg42:44251M
DEF CON 22 - Graham, Mcmillan, and Tentler - Mass Scanning the Internet: Tips, Tricks, ResultsnX9JXI4l3-E48:47412M
DEF CON 22 - Kallenberg and Kovah - Extreme Privilege Escalation On Windows 8⧸UEFI Systems [d6VCri6sY].f136.mp400:00114M
DEF CON 22 - Panel - PropLANE: Kind of keeping the NSA from watching you peeH7kPoJXtE6Y48:57313M
DEF CON 22 - Panel - Summary of Attacks Against BIOS and Secure BootQDSlWa9xQuA45:39329M
DEF CON 22 - Phil Zimmermann - How To Get Phone Companies To Just Say No To WiretappingHuHm1vzzm1g51:03162M
DEF CON 22 - Philip “Soldier of Fortran” Young - From root to SPECIAL: Pwning IBM MainframesXfl4spvM5DI21:50161M
DEF CON 22 - Pierce and Loki - NSA Playset : GSM Sniffingwzyuioto4y846:34284M
DEF CON 22 - Richard Klafter (Free) and Eric Swanson (Lachesis) - Check Your Fingerprints3LZhFFm1tK016:4247M
DEF CON 22 - Robert Rowley - Detecting and Defending Against a Surveillance Stated5jqV06Yijw43:0782M
DEF CON 22 - Ryan Kazanciyan and Matt Hastings, Investigating PowerShell AttacksqF06PFcezLs37:14286M
DEF CON 22 - Ryan Lackey & Marc Rogers & theGrugq - Masquerade_KyfJW2lHtk42:15301M
DEF CON 22 - Ryan Noah Shapiro - Hacking the FBI - How & Why to Liberate Government RecordsH2eTlyd7r5450:4393M
DEF CON 22 - Scott Erven and Shawn Merdinger - Just What The Doctor Ordered?wTEMSBXtkAc01:28:04611M
DEF CON 22 - Shahar Tal - I Hunt TR-069 Admins: Pwning ISPs Like a Bossrz0SNEFZ8h032:01286M
DEF CON 22 - Shane Macaulay - Weird-Machine Motivated Practical Page Table ShellcodetfFbQvglaxU42:02334M
DEF CON 22 - Svetlana Gaivoronski and Ivan Petrov - Shellcodes for ARMvOz40Zk8lEw38:09297M
DEF CON 22 - Tess Schrodinger - From Raxacoricofallapatorius With LoveCxkJyibPfEo47:50351M
DEF CON 22 - Tim Strazzere and Jon Sawyer - Android Hacker Protection Level 0vLU92bNeIdI47:46100M
DEF CON 22 - Wesley McGrew- Instrumenting Point-of-Sale MalwareIFNb3ciJZkQ46:15299M
DEF CON 22 - Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a MinuteEDci2gb3ruQ41:40120M
DEF CON 22 - Will Schroeder - Veil-Pillage: Post-exploitation 2.KYYIluNXgMw41:11199M
DEF CON 22 - Zoltán Balázs - Bypass firewalls, application white lists...ssE_mwSEH9U42:17307M
DEF CON 23 - Panel - DEF CON Comedy InceptionXA1h8L5S9I401:39:25203M
DEF CON 23 - Teddy Reed and Nick Anderson - Hardware and Trust Security ELI52gbooa3tO5o45:22302M
DEF CON 23 - Balmas and Oppenheim - How To Turn Your KVM Into a Raging Key Logging Monster5OHfwgosq0843:15108M
DEF CON 23 - Bart Kulach - Hack the Legacy: IBM I aka AS400 RevealedJsqUZ3xGdLc45:44255M
DEF CON 23 - Christian Frichot - Hooked: Browser Meshed Networks with WebRTC and BeEFBrmCOdRHq8I46:06259M
DEF CON 23 - El Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code PathsjnBhb6DiP2k21:26136M
DEF CON 23 - Jean Philippe Aumasson - Quantum Computers vs Computers SecuritykIWcpSzW4xY32:16197M
DEF CON 23 - Michael Schrenk - Applied Intelligence: Using Information Thats Not ThereUJeKNl461d838:30288M
DEF CON 23 - Peter Shipley - Insteon: False Security and Deceptive Documentationdy1LTQLmPtM35:32260M
DEF CON 23 - Rich Kelley - Harness: Powershell Weaponization Made Easysgi73boZ9Xk20:37111M
DEF CON 23 - 1057 - RICK ASTLEYgzjMrSknbEI46:30288M
DEF CON 23 - Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 TrackiN6QbszB1R844:40299M
DEF CON 23 - Aditya K Sood - Dissecting the Design of SCADA Web HMIs: Hunting VulnsjX5cz4jI3yk36:44241M
DEF CON 23 - Alejandro Mayorkas - Working together to keep the Internet safe and secureu6dHxhPXcNM46:29463M
DEF CON 23 - Amit Ashbel & Maty Siman - Game of Hacks: Play, Hack & Track - 101 Track6wiBl3lohu431:2999M
DEF CON 23 - AmmonRa - How to Hack Your Way out of Home Detentionz8VkZCCWqgg36:46188M
DEF CON 23 - Atlas - Fun with Symboliks9HL6MljOX0o42:20265M
DEF CON 23 - Beccaro and Collura - Extracting the Painful Blue ToothUAFddrsqnQY43:02215M
DEF CON 23 - BioHacking Village - Alejandro Hernández - Brain Waves Surfing - (In)security in EEGc7FMVb_5SBM50:18333M
DEF CON 23 - BioHacking Village - Alex Smith - Cloning Access Cards to ImplantsjSzUwF9RfJw18:52102M
DEF CON 23 - BioHacking Village - Johan Sosa - Genetic engineering - GMO for fun and profitX9b_2jlILTg49:31234M
DEF CON 23 - BioHacking Village - Keoni Gandall - Biohacking at HomeNuYM10pweMs23:41131M
DEF CON 23 - BioHacking Village - Michael Goetzman - Social Implications of DNA AcquisitionRYMedhgjswU23:36149M
DEF CON 23 - BioHacking Village - Panel - The Anatomy of DIY Implantable DevicesVUSzRg4KWe830:23162M
DEF CON 23 - BioHacking Village - Walter Powell - Parallels in BioSec and InfoSec-WaR8xakXKg17:31100M
DEF CON 23 - BioHacking Village - Whitlock and Aganovic - Physiology from the Perspective of ControlIs1f5KxtNCQ53:01289M
DEF CON 23 - Brent White - Hacking Web AppsI8AhfDEKUQ438:19254M
DEF CON 23 - Bruce Potter - A Hacker's Guide to Riskaa4g2VSqlxM53:29441M
DEF CON 23 - Bruce Schneier - Questions and AnswersbjopJ-_vAUE46:34591M
DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger VehicleOobLb1McxnI46:21326M
DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse EngineeringHlUe0TUHOIc38:48213M
DEF CON 23 - Chris Rock - I Will Kill You9FdHq3WfJgs31:2874M
DEF CON 23 - Chris Sistrunk - NSM 101 for ICS - 101 TrackH6AWRziR02838:47145M
DEF CON 23 - Colby Moore - Spread Spectrum Satcom Hacking2aBXpho5b7w40:27195M
DEF CON 23 - Colin Flynn - Dont Whisper my Chips: Sidechannel and Glitching for Fun and ProfitBHqrA8lzz2o42:56145M
DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose ComputerspT6itfUUsoQ50:56489M
DEF CON 23 - Craig Young - How to Train Your RFID Hacking ToolskVMAgiJlQkI30:17158M
DEF CON 23 - Cross and Anderson - Do Export Controls on Intrusion Software Threaten Vuln ResearchMnylr3nH7kY45:32143M
DEF CON 23 - Crypto and Privacy Village - Carlson and Doherty - Breaking CBCv0IsYNDMV7A52:31285M
DEF CON 23 - Crypto and Privacy Village - Craig Young - Smart Home InvasionVWEhaZdUVW822:09126M
DEF CON 23 - Crypto and Privacy Village - Freddy Martinez - IMSI CatchersJyTb5mJOYLo31:20145M
DEF CON 23 - Crypto and Privacy Village - Marina - Hacking Quantum Cryptography1Fp6ibfOQ4Y46:17331M
DEF CON 23 - Crypto and Privacy Village - Nick Sullivan - CFSSL the evolution of a PKI toolkitU7WGLJSesw021:48136M
DEF CON 23 - Crypto and Privacy Village - Robert Olson - Teaching Privacy Using Red Team StrategiesEGm1ux3H6jY01:00:14360M
DEF CON 23 - DaKahuna and satanklawz - Introduction to SDR and the Wireless VillageF9kKo190_oE40:36250M
DEF CON 23 - Damon Small - Beyond the Scan The Value Proposition of Vuln Assessmentd6IRn7v_r6Y45:46130M
DEF CON 23 - Dan Petro and Oscar Salaza - Hacking Smart Safes: On the Brink of a RobberyaCOzE1_dDBY45:58218M
DEF CON 23 - Daniel Crowley and Damon Smith - Bugged Files: Is Your Doc Telling on You?M3vP-wughPo46:14194M
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption VulnsvE4WAHLKw_843:08221M
DEF CON 23 - David An - When the Secretary of State says Please Stop Hacking UsXF_5t547Qfg20:30109M
DEF CON 23 - David Huerta - Alice and Bob are Really Confusedpkh7gUm82QY43:40286M
DEF CON 23 - David Mortman - Docker, Docker Give Me The News: I Got A Bad Case Of Securing You7ouzigqFUWU43:22315M
DEF CON 23 - Dennis Maldonado - Are We Really Safe? - Bypassing Access Control Systems-cZ7eDV2n5Y46:17428M
DEF CON 23 - Di Federico and Shoshitaishvili - Dark Side of the ELFaGoDYa7Kbec46:21182M
DEF CON 23 - Dr Phil Polstra - Hacker in the Wiresb0IB6z9fry838:58249M
DEF CON 23 - Dr Phil Polstra - One Device to Pwn Them AllF9cYW7oPNw434:3397M
DEF CON 23 - DT and 1057 - Welcome to DEF CONQrhlY29Pu4c40:27223M
DEF CON 23 - Eijah - Crypto for HackerslTngMxmymX455:51407M
DEF CON 23 - Eric XlogicX Davisson - REvisiting RE DoSHbih2lG2v0s43:58128M
DEF CON 23 - Etienne Martineau - The art of cache timing covert channel on x86 multi core7X772EBdvnM38:00307M
DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical AttacksFCtcza-pP8U34:31147M
DEF CON 23 - Francis Brown, Shubham Shah - RFIDiggity: Guide to Hacking HF NFC & UHF RFIDYcHjUJmeK4o54:05411M
DEF CON 23 - Geoff Walton and Dave Kennedy - Pivoting Without Rights: Introducing PivoteruHuzC45O9sw49:33321M
DEF CON 23 - Gerard Laygui - Forensic Artifacts From a Pass the Hash Attackm6W9LlMvNfI40:28272M
DEF CON 23 - Graham and Maynor - HamSammich – Long Distance Proxying Over RadioTcuSb5AknhI27:20182M
DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain PersistencegajEuuC2-Dk46:26294M
DEF CON 23 - Gregory Picket - Staying Persistent in Software Defined NetworkszHDAg8UVTLc45:04162M
DEF CON 23 - Hardware Hacking Village - Dr. Tran - Introduction to LockpickingrkrSauOgSdc14:3197M
DEF CON 23 - Hardware Hacking Village - Machinist - Mechanical Engineering for Noobs0Dj9TFztZxA45:26130M
DEF CON 23 - Hardware Hacking Village - Matt DuHarte - Introduction to USB and FuzzingKWOTXypBt4E44:37176M
DEF CON 23 - Hardware Hacking Village - Nikhil Mittal - Hacking with Human Interface Devices_ZyU8Mlibdw45:30159M
DEF CON 23 - Hardware Hacking Village - Soldering 101 - Melting metal for fun and profitu6qVTMNY9Fo12:1474M
DEF CON 23 - Ian Kline - LTE Recon and Tracking with RTLSDRti8_NozsT_I13:3990M
DEF CON 23 - Ian Latter - Remote Access the APTlfiBu8-RCdc39:58233M
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration TestersYcC3p3HYxA041:5677M
DEF CON 23 - IoT Village - Aaron Guzman - Security - the IoT WorldVOvzsnIQPyA43:40248M
DEF CON 23 - IoT Village - Brian Knopf - Yes You Can Walk on WateraTirAI-B-dI44:47257M
DEF CON 23 - IoT Village - Daniel Miessler - IoT Attack Surface MappingRhxHHD790nw28:21172M
DEF CON 23 - IoT Village - K Reid Wrightman - Vulnerability Inheritance in PLCs-7tdfFRLBuY38:55189M
DEF CON 23 - IoT Village - Kenneth Shaw - The Grid - A Multiplayer Game of Destruction2QFaPLoN65Y37:40120M
DEF CON 23 - IoT Village - Wesley Wineberg - Cameras Thermostats and Home Automation ControllersmajPZcqlVjI59:52397M
DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015-FAjxUOKbdI48:23228M
DEF CON 23 - Jeremy Dorrough - USB Attack to Decrypt Wi Fi CommunicationsUWOxzfRUwis38:50266M
DEF CON 23 - Joe FitzPatrick and Matt King - NSA Playset: JTAG ImplantsoGuZNmBZbjk44:58318M
DEF CON 23 - John Seymour - Quantum Classification of Malwarew8VNY9k8i6o29:45118M
DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attackshkw9tFnJk8k49:37220M
DEF CON 23 - Joshua J Drake - Stagefright: Scary Code in the Heart of AndroidLxo4zhKe5hA47:32293M
DEF CON 23 - Joshua Smith - High Def Fuzzing: Exploring Vulnerabilities in HDMI CEC *zWoyC6wDDfU47:52269M
DEF CON 23 - Justin Engler - Secure Messaging for Normal PeopleS_YRo0iPjYc50:10422M
DEF CON 23 - Ken Westin - Confessions of a Professional Cyber StalkerTyel1gfSjl440:44276M
DEF CON 23 - Krotofil, Larsen - Rocking the Pocket Book: Hacking Chem PlantsAL8L76n0Q9w50:07443M
DEF CON 23 - Lin Huang and Qing Yang - Low cost GPS simulator: GPS spoofing by SDRjwJKMti_aw036:54250M
DEF CON 23 - Lock Picking Village - Chris Pentacoff - Intro to LockpickingIQDZCcdw4Z413:5065M
DEF CON 23 - Lock Picking Village - Jos Weyers - Key ImpressioningqLIYb8PMZbg33:44231M
DEF CON 23 - Lock Picking Village - Preston Thomas - Intro to Lockpicking 1fU7-r83Nx3Y26:36132M
DEF CON 23 - Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors4b5disac9g441:44137M
DEF CON 23 - Mahdi Namazifar - Detecting Randomly Generated Strings70q5ojxNuv420:4493M
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model SKX_0c9R4Fng49:48138M
DEF CON 23 - Mark Ryan Talabis - The Bieber Project: Adventures in Buying Internet TrafficdES9uttXcCY43:17127M
DEF CON 23 - Marquis-Boire, Marschalek, Guarnieril - F the attribution, show us your .idbVwn9QIp4abU54:43415M
DEF CON 23 - Marte Loge - Tell me who you are and I will tell you your lock pattern6Z5NtzFA7Z817:5794M
DEF CON 23 - Matt Cagle and Eric Cheng - Who Will Rule the Sky: The Coming Drone PolicyzlPKy3bZUkE48:07325M
DEF CON 23 - McNeil and Owen - Sorry Wrong Number: Mysteries Of The Phone SystemUlZQSRWF5Q048:23397M
DEF CON 23 - McSweeny and Soltani - How to Hack Gov: Technologists as Policy Makersyj18lz1dwEc50:44279M
DEF CON 23 - miaubiz - Put on Your Tinfo_t Hat if You're My TypepH6oKCAxg5A16:4686M
DEF CON 23 - Michael Walker and Jordan Wiens - Machine vs Machine: DARPAs Fully Automated CTFejPghbtAG5845:30300M
DEF CON 23 - Mickey Shkatov & Jesse Michael - Scared Poopless – LTE and your laptopq4pRYZjzL_E44:26284M
DEF CON 23 - Mike Ryan and Richo Healey - Hacking Electric SkateboardsJZ3EB68v_B044:51196M
DEF CON 23 - Mike Sconzo - I Am Packer And So Can You VideojCIT7rXX8y046:01341M
DEF CON 23 - Mike Walker and Jordan Wiens - Machine vs. Machine: Inside DARPA’s Fully Automated CTFgnyCbU7jGYA45:08382M
DEF CON 23 - Nadeem Douba - BurpKit: Using WebKit to Own the WebcsMN9sEiDUI29:26185M
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP StackUz6G_YAQb2U38:46284M
DEF CON 23 - Nir Valtman and Moshe Ferber - From 0 To Secure In 1 Min: Securing IAASKxLESIJeMmk47:06207M
DEF CON 23 - Omer Coskun - Why Nation-State malwares target Telco NetworksDx5DNcMStyc47:18161M
DEF CON 23 - Packet Capture Village - Bob Simpson - MITM 101 - Easy Traffic Interception TechniquesbImHBLFrrdc33:36260M
DEF CON 23 - Packet Capture Village - Brian Wohlwinder and Andrew Beard - I See You0eRkQOlFn5032:00147M
DEF CON 23 - Packet Capture Village - David Schwartzberg - Hacking the Next Generation [HC1hmVdA4].f1300:00205M
DEF CON 23 - Packet Capture Village - David Schwartzberg - Hacking the Next Generation [HC1ychmVd].f251.webmN/A12M
DEF CON 23 - Packet Capture Village - Elliot Brink - Global Honeypot Trendsrjd-r4WA0PU37:24278M
DEF CON 23 - Packet Capture Village - Grecs - Creating REAL Threat Intelligence With EvernoteZUp6uOkHIcI52:16348M
DEF CON 23 - Packet Capture Village - Jay Beale - Jailing Programs via Docker_yd2rzd949458:36388M
DEF CON 23 - Packet Capture Village - Joseph Muniz & Aamir Lakhani - Pen Testing with Raspberry PiSvQi6bkm-5A26:44230M
DEF CON 23 - Packet Capture Village - Karl Koscher - Sniffing SCADA4vPptUmyv4U29:40235M
DEF CON 23 - Packet Capture Village - Leon Ward - The Packets Made Me Do It - Using OpenFPCr_qViQBX7jE46:55309M
DEF CON 23 - Packet Capture Village - Lokesh Pidawekar - Hackers Practice GroundW7gSE7msPiU40:57307M
DEF CON 23 - Packet Capture Village - Michael Raggo - Mobile Data Loss - Threats and CountermeasuresnnRo-sCnLas35:30268M
DEF CON 23 - Packet Capture Village - Mike Raggo - Remaining Covert in an Overt WorldkBBhlhLqBjQ31:50272M
DEF CON 23 - Packet Capture Village - Ming Chow - Tools and Techniques Used at the Wall of Sheep63zB7nCnqU017:5476M
DEF CON 23 - Packet Capture Village - Monzy Merza - Real World Automation for Rapid ResponseyAzULqBllXc17:14136M
DEF CON 23 - Packet Capture Village - Nikhil Mittal - Powershell for Penetraton TestersPezFo2Y1BUA50:58300M
DEF CON 23 - Packet Capture Village - Paul Vixie - Passive DNS Collection and Analysisyb_KxMA2w2I44:52255M
DEF CON 23 - Packet Capture Village - Robert Simmons - The Digital Cockroach Bait Station4e-ENa1ygC037:51272M
DEF CON 23 - Packet Capture Village - Ron Taylor - Violating Web Servicesab3gjFkUa1A36:48291M
DEF CON 23 - Packet Capture Village - Sam Bowne - Is Your Android App SecureJJr6hxcOB1Y47:12269M
DEF CON 23 - Packet Capture Village - Theodora Titonis - How Machine Learning Finds Malware2cQRSPFSY-s44:49317M
DEF CON 23 - Packet Capture Village - Tony Martin - From XSS to Root on Your NASsh9ROo4OKsk28:4465M
DEF CON 23 - Packet Capture Village - Vivek Ramachandran - 80211 Monitoring with PCAP2XML - SQLite4yHko5upDSQ47:15311M
DEF CON 23 - Packet Capture Village - Wayne Crowder - Fishing To PhishinglPsK_1Bi4dM43:53407M
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIsJUt9PiMyRsA36:5788M
DEF CON 23 - Panel - Ask the EFF: The Year in Digital Civil LibertiesUfdGrkDp3TA01:39:081G
DEF CON 23 - Panel - Closing Ceremonies02v0qalqsSU01:26:44330M
DEF CON 23 - Panel - Contests Closing Ceremonies2P7r5g4SkuY27:25171M
DEF CON 23 - Panel - DEF CON 101: The Panel8gRJs8jcyWc01:21:27183M
DEF CON 23 - Panel - Lets Encrypt Minting Free Certs to Encrypt the Entire WebYa6t8nMclos52:35356M
DEF CON 23 - Panel - Licensed to Pwn: Weaponization and Regulation of Security Research9TdJOM5p--w01:45:56411M
DEF CON 23 - Panel - Switches Get StitchesyaY3rtA37Uc43:42336M
DEF CON 23 - Panel - ThunderStrike 2: Sith StrikeLNvYeUxwmTw44:46177M
DEF CON 23 - Panel - WhyMI so Sexy: WMI Attacks - Real Time Defense and Advanced ForensicsxBd6p-Lz3kE01:45:26474M
DEF CON 23 - Patrick Wardle - DLL Hijacking on OS XPGVNja2MNws45:10205M
DEF CON 23 - Patrick Wardle - Stick That In Your root Pipe and Smoke ItpbpaUuGLS5g40:53199M
DEF CON 23 - Priest - Impromptu Spot the Fed7GODPk-MzKE14:29122M
DEF CON 23 - Qing Yang - Im A Newbie Yet I Can Hack ZigBeexgNT05l6Jlw21:37171M
DEF CON 23 - Richard Thieme - Hacking the Human Body and BrainKDPLV4S6hgQ51:23182M
DEF CON 23 - Ricky Lawshae - Let's Talk About SOAP Baby, Let's Talk About UPNPdT0b5DWq9b843:29237M
DEF CON 23 - Rob Bathurst and Jeff Thomas - Canary: Keeping Your Dick Pics SaferD7Vkxa3Ujzk48:14155M
DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline5CzURm7OpAA47:34150M
DEF CON 23 - Ronny Bull and Jeanna Matthews -Exploring Layer 2 Security in Virtualized EnvironmentsRaA5dEIqzzQ47:17259M
DEF CON 23 - Runa Sandvik, Michael Auger - Hacking a Linux-Powered RiflePEpuEprQ5VU40:48243M
DEF CON 23 - Ryan Castellucci - Cracking CryptoCurrency Brainwalletsfoil0hzl4Pg42:49284M
DEF CON 23 - Ryan Mitchell - Separating Bots from the HumansPADKIdSPOsc24:25181M
DEF CON 23 - Ryan Oneill - Advances in Linux Process Forensics Using ECFSfCJJnJ84MSE46:34192M
DEF CON 23 - Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to WirelesUNgvShN4USU45:31255M
DEF CON 23 - Sarah Edwards - Ubiquity Forensics: Your iCloud and YouM_nlPopsHMo44:33213M
DEF CON 23 - Scott Erven and Mark Collao -Medical Devices: Pwnage and HoneypotsZusL2BY6_XU44:14200M
DEF CON 23 - Sean Metcalfe - Red vs Blue: Modern Active Directory Attacks & DefenserknpKIxT7NM50:24357M
DEF CON 23 - Sean Pierce - Abusing Native Shims for Post ExploitationLOsesi3QkXY47:42381M
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysisoznsT-ptAbk45:57294M
DEF CON 23 - Social Engineering Village - Adam Compton & Eric Gershman - SpeedPhishing Frameworkw-Rk8WnnFaE40:13252M
DEF CON 23 - Social Engineering Village - Chris Hadnagy - A Peek Behind the Blue MaskO5lXUSMGQ2I55:29312M
DEF CON 23 - Social Engineering Village - Dave Kennedy - Understanding End-User AttacksUJdxrhERDyM51:17235M
DEF CON 23 - Social Engineering Village - Ian Harris - Understanding Social Engineering AttacksH3gfMkvw76o51:45277M
DEF CON 23 - Social Engineering Village - Jayson E. Street - Breaking in Bad2vdvINDmlX852:38171M
DEF CON 23 - Social Engineering Village - John Ridpath - Shakespeare and Social EngineeringjFNJqW9-8_033:11122M
DEF CON 23 - Social Engineering Village - Michele Fincher - I Didn’t Think it was LoadedmZw_ewKKccU37:07182M
DEF CON 23 - Social Engineering Village - Noah Beddome - Yellow Means Proceed with CautiontOSyKhv4TfA55:37239M
DEF CON 23 - Social Engineering Village - Tim Newberry - Twitter ISIL and TechJU-Qn-hiKX052:57263M
DEF CON 23 - Tamas Szakaly - Shall We Play a GameXxyRDkmNMHg40:52296M
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA ToolmQ522hFmNt847:07358M
DEF CON 23 - Topher Timzen and Ryan Allen - Hijacking Arbitrary NET Application Control FgatYe_oriJw39:18257M
DEF CON 23 - Tottenkoph and IrishMASMS - Hackers Hiring HackersBtjbvWCICI852:16231M
DEF CON 23 - Van Albert and Banks - Looping Surveillance Cameras through Live EditingRoOqznZUClI41:25341M
DEF CON 23 - Vehicle Hacking Village - Eric Evenchick - SocketCANYm8xFGO0llY27:4776M
DEF CON 23 - Vehicle Hacking Village - Josh Corman - Safer Sooner Automotive Cyber SafetyIO-MrkyHPpI52:04181M
DEF CON 23 - Vehicle Hacking Village - Nathan Hoch - The Badge and PAWN: Customizing the BadgenK4nufSjR3g45:44250M
DEF CON 23 - Vivek Rakmachandran - Chellam: A Wi Fi IDS Firewall for WindowsMIArq4d-V8A34:02140M
DEF CON 23 - Vivek Rakmachandran - Chigula: Framework for Wi Fi IDS and ForensicsdKrzkr2qUPo44:27280M
DEF CON 23 - Wesley McGrew - I Hunt Penetration Testers: More Weaknesses in Tools and ProcedurespSGAu4PZ7bw41:39155M
DEF CON 23 - Weston Hecker - Goodbye Memory Scraping MalwareH4cpZlnANGk37:46280M
DEF CON 23 - Wireless Village - Balint Seeber - SIGINT & Blind Signal Analysis w⧸ GNU Radio & SDRdrsgh_PZmJ801:54:24780M
DEF CON 23 - Wireless Village - Catatonic - Tospo Virus: Weaponizing WiFi Pineapple Vulnerabilities5kiYszJ3ogo01:22:49232M
DEF CON 23 - Wireless Village - Cyb3r Assassin - Wireless Pentesting: So Easy a Cave Man Can Do ItkMq7uzWY_jI01:15:30331M
DEF CON 23 - Wireless Village - JoshInGeneral - Meeting People Over WiFi9SIMe0yMy7835:2289M
DEF CON 23 - Wireless Village - Karl Koscher - DSP for SDRy3O-t2UfL0o37:59241M
DEF CON 23 - Wireless Village - Kitchen and Kinne - Sniffin WiFi Sippin Pineapple JuicevsOuOlKbjH453:20326M
DEF CON 23 - Wireless Village - Michael Calabro - Software Defined Radio Performance Trades & Tweaks0WzM4K35jIU46:10123M
DEF CON 23 - Wireless Village - Tim Oshea - GNU Radio Tools for Radio Wrangling⧸Spectrum DominationCrHNlu8TbJg50:35126M
DEF CON 23 - Wireless Village - Travis Goodspeed, Sergey Bratus - PSK31 Modulation PolyglotsNoS5dD2kDDs56:42324M
DEF CON 23 - Wireless Village - V. Ramachandran - Automatic Live WPA WPA2 Attacks and WPA Supplicantcd75pICSyFM51:58278M
DEF CON 23 - Wireless Village - Vivek Ramachandran and Thomas Dotreppe - WPA Enterprise HackingTOxch8ZBi2I01:22:34406M
DEF CON 23 - Wireless Village - Wireless Warrior - Covert Wireless Practical Hacker LPI LPDwfX-XCgs9iQ01:03:44245M
DEF CON 23 - Young and Rikansrud - Security Necromancy : Further Adventures in Mainframe HackingLgmqiugpVyU48:30356M
DEF CON 23 - Yuriy Bulygin - Attacking Hypervisors Using Firmware and HardwareXGAGfXSbOh044:16280M
DEF CON 23 - Zack Allen and Rusty Bower - Malware in the Gaming Micro EconomynjLmXeS9GFM42:19220M
DEF CON 23 - Zack Fasel - Seeing through the FogzaSn0wrtwQE34:39232M
DEF CON 23 - Zheng and Shan - Build a free cell traffic capture tool with vxworks1DJQPMRdZ_I42:31172M
DEF CON 23 - Zoz - And That's How I Lost My Other Eye...Explorations in Data Destruction (Fixed)-bpX8YvNg6Y53:09313M
DEF CON 23 -John Menerick - Backdooring GitlXf9nlTmnK440:10283M
DEF CON 23 Conference - Andres Blanco, Andres Gazzoli - 80211 Massive MonitoringuUCv9TQ9B7I37:43177M
DEF CON 23 Trailer - Declassified!rNdLm1O5uoY01:1327M
DEF CON 24 - Przemek Jaroszewski - Hacking boarding passes for fun and profitqnq0UfOUTlM45:21263M
DEF CON 24 - Adam Donenfeld - Stumping the Mobile ChipsetvAo76EjL_m440:46223M
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPSfSt3pNzr79E44:56241M
DEF CON 24 - Allan Cecil - Robot Hacks: TASBot Exploits Consoles with Custom Controllers9ZrNWiBzqUE41:57145M
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic EngineQvxNo9j70DU48:24235M
DEF CON 24 - Anch - So you think you want to be a penetration testerKaat-T71N3A41:58396M
DEF CON 24 - Andy Robbins. Rohan Vazarkar, Will Schroeder - Six Degrees of Domain AdminwP8ZCczC1OU44:35237M
DEF CON 24 - Ang Cui - A Monitor Darkly: Reversing and Exploiting Ubiquitous OSD ControllerszvP2FEfOSsk34:09166M
DEF CON 24 - Anthony Rose, Ben Ramsey - Picking Bluetooth Low Energy Locks a Quarter Mille AwayKrOReHwjCKI42:22109M
DEF CON 24 - ashmastaflash - SITCH:Inexpensive Coordinated GSM Anomaly DetectionYDALL62Nz0k40:59252M
DEF CON 24 - Benjamin Holland - Developing Managed Code Rootkits for JREzomaLPN2KNY42:55140M
DEF CON 24 - Bertin Bervis Bonilla, James Jara - Exploiting seismological networks RemvizcnvCkRsg43:45145M
DEF CON 24 - bigezy and saci - An introduction to Pinworm : MITM for your metadataM0Rg_x5Nf9432:40203M
DEF CON 24 - Brad Dixon - pin2pwn: How to Root an Embedded Linux Box with a Sewing NeedlKRNTv3oXDkE15:0142M
DEF CON 24 - Brad Woodberg - Malware Command and Control Channels: A journey into darknessv7XcyCjUTWk48:34199M
DEF CON 24 - Bryant Zadegan, Ryan Lester - Abusing Web Standards for AppSec Glory9xE0200CPjU45:21105M
DEF CON 24 - Chris Eagle, Sk3wlDbg - Emulating many of the things with Ida6wypIgRi3cw51:36256M
DEF CON 24 - CINCVolFLT, AK3R303 - NG911: The Next Gen of Emergency Ph0nage2JztRvdIY1w45:12234M
DEF CON 24 - Clarence Chio - Machine Duping 101: Pwning Deep Learning SystemsJAGDpJFFM2A44:12188M
DEF CON 24 - Dan AltF4 Petro Reversing Video Games to Create an Unbeatable AI Player05v1-DJjma846:40329M
DEF CON 24 - DC101 - DEF CON 101 PanelUGVi3ZX5IqM01:32:24723M
DEF CON 24 - Delta Zero, KingPhish3r - Weaponizing Data Science for Social Engineeringl7U0pDcsKLg44:42190M
DEF CON 24 - Dr Paul Vixie - Frontrunning The FrontrunnersC1E1UlC9bFM17:5251M
DEF CON 24 - Dr Phil - Mouse Jiggler: Offense and Defense5Nk6iDryW0Y45:18217M
DEF CON 24 - Elie Bursztein, Celine Bursztein, - Cheating at PokerbU6bosBN5D028:1369M
DEF CON 24 - Evan Booth - Jittery MacGyver: Building a Bionic Hand out of a CoffeetZwjgc7X-2E46:00351M
DEF CON 24 - Fred Bret Mounet - All Your Solar Panels are belong to MeOB5lAtLG4WU22:23126M
DEF CON 24 - goldfisk, follower - Breaking the Internet of Vibrating Thingsv1d0Xa2njVg20:0583M
DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited NetworksGhUUzGBjhXQ16:1646M
DEF CON 24 - Guevara Noubir, Amirali Sanatinia - Exposing Snooping Tor HSDir RelayscJWsJ47joAQ24:1497M
DEF CON 24 - Haoqi Shan, Wanqiao Zhang - Forcing a Targeted LTE phone into Unsafe NetwNn8Pwz9MxSA31:00127M
DEF CON 24 - Hendrik Schmidt, Brian Butterly - Attacking BaseStationsm_y7OosNTRc42:24196M
DEF CON 24 - Hunter Scott - RT to Win: 50 lines of Python made me the luckiest guy on TwitteriAOOdYsK7MM17:1770M
DEF CON 24 - int0x80 - Anti Forensics AF_fZfDGWpP4U37:24146M
DEF CON 24 - Jake Kambic - Cunning with CNG: Soliciting Secrets from SchannelKGmJMHyHJjE41:1695M
DEF CON 24 - Jake Kouns - Cyber Who Done It: Attribution Analysis Through Arrest History3rlWr1dF_Lk42:39104M
DEF CON 24 - James Loureiro. Georgi Geshev - Platform Agnostic Kernel FuzzingM8ThCIfVXow44:1699M
DEF CON 24 - Javier Vazquez Vidal, Ferdinand Noelscher - CAN i haz car secret plzgx35otoHQgw22:36103M
DEF CON 24 - Jay Beale and Larry Pesce - Phishing without Failure and Frustrationr4yqeuWlJqM46:15336M
DEF CON 24 - Jay Healey - Feds and 0Days: From Before Heartbleed to After FBI Apple [bK6D8VF0Q].f136.mp400:0094M
DEF CON 24 - Jay Healey - Feds and 0Days: From Before Heartbleed to After FBI Apple [bK6D8VKjQ].f251-9N/A33M
DEF CON 24 - Jennifer Granick - Slouching Towards Utopia - The State of the Internet DreamGWXQGMcx9cs51:50237M
DEF CON 24 - Jianhao Liu, Chen Yan, Wenyuan Xu - Can You Trust Autonomous Vehicles?orWqKWvIW_044:04351M
DEF CON 24 - Jmaxxz - Backdooring the FrontdoorMMB1CkZi6t438:37136M
DEF CON 24 - Joe FitzPatrick, Joe Grand - 101 Ways to Brick your HardwareacNu_JFJe5045:42120M
DEF CON 24 - Joe Grand and Zoz - BSODomizer HD: A mischievous FPGA HDMI platformEshjrNOs2ps45:49211M
DEF CON 24 - Jonathan Brossard - Intro to Wichcraft Compiler Collection1cgtr7VW7gY43:21250M
DEF CON 24 - Jonathan Christofer Demay - Auditing 6LoWPAN Networks using Standard ToolssDcB2uSbxw029:56157M
DEF CON 24 - Jonathan Christofer Demay, Arnaud Lebrun - CANSPY: Auditing CAN DevicesvTsdxNGS_xc17:39168M
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101UYgBLUhHrCw43:17249M
DEF CON 24 - JusticeBeaver - Discovering and Triangulating Rogue Cell TowersbbDAa0syz5A32:0797M
DEF CON 24 - K2 - BlockFighting with a Hooker: BlockfFghter2!WL0bM590_AA38:40144M
DEF CON 24 - Kai Zhong - 411: A framework for managing security alertsLQyqhrDl7f841:23129M
DEF CON 24 - Karyn Benson - Examining the Internet's pollutionwjva6ZJyhwE37:5894M
DEF CON 24 - Ladar Levison - Compelled Decryption: State of the Art in Doctrinal PerversityJQiDGH2OW6k34:44127M
DEF CON 24 - Linuz, Medic - Sticky Keys To The Kingdom: Pre auth RCEEAYtRQKfna022:2583M
DEF CON 24 - LosT - Hacker Fundamentals and Cutting Through AbstractionkSuq3Ry9PLQ38:37172M
DEF CON 24 - Lucas Lundgren, Neal Hindocha - Light Weight Protocol: Critical Implicationso7qDVZr0t2c45:14170M
DEF CON 24 - Luke Young - Attacking Network Infrastructure to Generate a 4 Tbs DDoSFi-nI-Faj4I36:18121M
DEF CON 24 - Marc Newlin - MouseJack: Injecting Keystrokes into Wireless Mice00A36VABIA442:34123M
DEF CON 24 - MasterChen - Weaponize Your Feature Codes5RrvZicVoZw42:09217M
DEF CON 24 - Matteo Beccaro and Matteo Collura - Abusing Smart Citiesii_nCvLVJpg38:25174M
DEF CON 24 - Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOSGu4UJR9nZqM20:1165M
DEF CON 24 - Mickey Shkatov, Panel How to Make Your Own DEF CON Black BadgemMFWznJwguE47:14198M
DEF CON 24 - Mike Walker, Arati Prabhakar - DARPA Cyber Grand Challenge Award CeremonyO-ASHNgSO-I26:07259M
DEF CON 24 - Mudge Zatko and Sarah Zatko - Project CITLGhO9vyW1f7w45:11158M
DEF CON 24 - Nate Cardozo - Crypto State of the LawYN_qVqgRlx444:34198M
DEF CON 24 - Panel - Ask the EFF [abaCzYrw4].f136.mp400:00104M
DEF CON 24 - Panel - Ask the EFF [abaCrwrO4].f251N/A17M
DEF CON 24 - Panel - Closing CeremoniesbfuRKriDDYQ01:20:02345M
DEF CON 24 - Panel - MR ROBOT Panel_bBrj6QBPW001:20:41737M
DEF CON 24 - Patrick Wardle - Ive got 99 Problems, but LittleSnitch aint onesRcHt-sxcPI20:0163M
DEF CON 24 - Plore - Side channel attacks on high security electronic safe lockslXFpCV646E019:5987M
DEF CON 24 - regilero - Hiding Wookiees in HTTP: HTTP smugglingdVU9i5PsMPY35:40147M
DEF CON 24 - Richard Thieme - Playing Through Pain: The Impact of Secrets and Dark KnowledgeyGrcHhfUZDk49:42490M
DEF CON 24 - Ricky 'HeadlessZeke' Lawshae - Network Attacks Against Physical Security Systemsp_J2pR1CxJo25:57116M
DEF CON 24 - RISE OF THE MACHINESA9ew4jdLjYY01:4315M
DEF CON 24 - Ronny Bull, Dr Matthews, Kaitlin Trumbull - Attacks in Virtualized EnvironmentstdG7gYb2P4o45:01165M
DEF CON 24 - Shane Steiger Are You Playing with a Full DeckhZVcOxUxVEQ41:29221M
DEF CON 24 - Shellphish - Panel: Cyber Grand ShellphishtEtlFUEWrEY50:55357M
DEF CON 24 - Six Volts and Haystack - Cheap Tools for Hacking Heavy TrucksPDlkcKtkeOE21:2349M
DEF CON 24 - Stephan Huber and Siegfried Rasthofer - Smartphone Antivirus and Apps_aLhKmIT-Fo35:43140M
DEF CON 24 - Tamas Szakaly - Help! Ive got ANTs0CHAgcnkxg439:22105M
DEF CON 24 - Terrell McSweeny and Lorrie Cranor - Research on the Machines: Help the FTCWjhyiSktrxY43:45310M
DEF CON 24 - The Bob Ross Fan Club - Propaganda: You and your devicesKep8r-5AtTc40:18207M
DEF CON 24 - Tim Estell and Katea Murray - NPRE: Eavesdropping on the Machines4al5xfdI_xs35:09150M
DEF CON 24 - Tom Kopchak - Sentient Storage: Do SSDs Have a Mind of Their OwnC5JoC4-qsO044:17162M
DEF CON 24 - Ulf Frisk - Direct Memory Attack the KernelfXthwl6ShOg43:19182M
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and Point of Sale SystemsmV_0k9Fh59044:19261M
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and POS systems_Q3HuQnRtbU44:19261M
DEF CON 24 - Weston Hecker - Hacking Next Gen ATMs From Capture to CashoutFgIk_oIK2SM30:0595M
DEF CON 24 - Willa Cassandra Riggins, abyssknight - Esoteric ExfiltrationjB99bBYK_AE18:48109M
DEF CON 24 - Yonathan Klijnsma and Dan Tentler - Stargate: Pivoting Through VNCImO3QSFxLak19:5668M
DEF CON 24 - Zack Fasel, Erin Jacobs - Attacks Against Top Consumer ProductsXkJ2tH21Wf843:1991M
DEF CON 24 - Zero Chaos and Granolocks - Realtime bluetooth device detection Blue HydraTgXh22RlrZo31:21168M
DEF CON 24 Car Hacking Village - Ben Breckt - Vehicle to Infrastructure V2XsenXEtIxUjk37:52376M
DEF CON 24 Car Hacking Village - Jun Li - Deep Learning on CAN BUS1QSo5sOfXtI01:00:12155M
DEF CON 24 Car Hacking Village - Jun Li, Yuan Jian - Security Flaws in Automotive Immobilizerp3SJp-7LSNs01:05:01392M
DEF CON 24 Car Hacking Village - Ken Munro - The Mitsubishi Hack ExplainedaeWlfvJ5pEo24:06249M
DEF CON 24 Car Hacking Village - Nathan Hoch - Hacking the CHV Badge4hiyrqlFanU11:2348M
DEF CON 24 Car Hacking Village - Nathan Hoch - Understanding Heavy Truck Event DataoAlFnYYmOGQ27:36174M
DEF CON 24 Car Hacking Village - Trevor Roest - Using Yard Stick One for FOB FunA91UZCP4f-U13:0480M
DEF CON 24 Conference Rogan Dawes and Dominic White Universal Serial aBUSeHTrQHZtNyBw44:56240M
DEF CON 24 Conference Zack Fasel and Erin Jacobs I Fight For The Users Episode Iw2A9x1pVXGk43:19189M
DEF CON 24 Conference - Aaron Luo - Drones Hijacking: Multidimensional attack vectors and countermeaR6RZ5KqSVcg45:39229M
DEF CON 24 Conference - Jonathan Mayer, Panel - Meet the FedsEPIVjqExh9s43:36191M
DEF CON 24 Crypto and Privacy Village - Alisha Kloc - Logs Aren't Enough2vB3H5kumVc43:52179M
DEF CON 24 Crypto and Privacy Village - Andrew Brandt - Blue Coat SSL Visibility Exposedw90mcTU2P9001:02:55387M
DEF CON 24 Crypto and Privacy Village - David Wong - How to Backdoor Diffie-Hellman90EYVy35gsY38:24187M
DEF CON 24 Crypto and Privacy Village - Greg Norcie - My Usability Goes to 11 A Hackers Guide to UseSyitnCnCIFE34:27220M
DEF CON 24 Crypto and Privacy Village - Mat Caughron, Trey Blalock - Revocation the Frailty of PKI2GtoAycltxM44:20345M
DEF CON 24 Crypto and Privacy Village - Panel - Catching a CheatTY1aWIdaWj454:27316M
DEF CON 24 Internet of Things Village Damien Cauquil Btlejuice The Bluetooth Smart Mitm Framewor [lcn07Tcl0].f136.mp400:00327M
DEF CON 24 Internet of Things Village Damien Cauquil Btlejuice The Bluetooth Smart Mitm Framewor [lcn0clnS0].f251N/A58M
DEF CON 24 Internet of Things Village - Elvis Collado - Reversing and Exploiting Embedded Devicesr4XntiyXMnA47:21299M
DEF CON 24 Internet of Things Village - Jeff Kitson - Tranewreck67LwoFsSdiA52:04284M
DEF CON 24 Internet of Things Village - Panel - FTC.M9u_8OUMtSU42:28329M
DEF CON 24 SE Village - Chris Hadnagy - 7 Jedi Mind Tricks: Influence Your Target without a WordVFnCRVWBISY51:26368M
DEF CON 24 SE Village - Cyni Winegard, Bethany Ward - Human Hacking: You ARE the Weak LinkfHDxu2sgGMQ51:44366M
DEF CON 24 SE Village - David Kennedy -The Wizard of Oz - Painting a Reality Through Deception4uN44YfsQPk51:17186M
DEF CON 24 SE Village - Fadli Sidek - Advanced SE Techniques and The Rise of cyber scamszYw8tDLJOxg50:53196M
DEF CON 24 SE Village - James Powell - You Are Being ManipulatedhL-6uRfoGvU35:08211M
DEF CON 24 SE Village - Jayson Street - Total Fail: and Bad Mistakes, I've Made a Fewl1OFH_H8PjQ51:19421M
DEF CON 24 SE Village - Mattias Borg - SCAM CALL : Call Dropped [1zTs4Q6IY].f1300:0033M
DEF CON 24 SE Village - Mattias Borg - SCAM CALL : Call Dropped [1zTsfs4Q6IYf251-8.webmN/A6M
DEF CON 24 SE Village - Panel - The Live SE Podcast 84CzoDDE6S3p059:43378M
DEF CON 24 SE Village - Robert Anderson - US Interrogation Techniques and SEG_lmXqBUtZc52:24316M
DEF CON 24 SE Village - Steven Zani - How to Un Work Your Job7BmBiWbQO2o29:42160M
DEF CON 24 SE Village - Tomohisa Ishikawa - Cultural Differences in SEqoTUYQd3RvU50:04291M
DEF CON 24 Wireless Village - Kat Sweet - I Amateur Radio And So Can YouiP_s0fFrf8M40:05169M
DEF CON 24 Wireless Village - Balint Seeber - SDR Tips and TricksyZ5G0nYSM9801:46:08518M
DEF CON 24 Wireless Village - Brian Butterly and Stefan Kiese - Introducing the HackMeRFVe4rmGOq6dM38:46221M
DEF CON 24 Wireless Village - Caleb Mays and Ben Ramsey - Insteon Inste off Inste open0QmOb15a8xw18:5039M
DEF CON 24 Wireless Village - Gabriel Ryan - Slaving Rogue Access Points w⧸ Python & Cheap HardwdtNUFGnToQs19:46101M
DEF CON 24 Wireless Village - Iyer and Nandedkar - Covert Cupid Under 11 Veil Approach for Covert9wpcDMYJsuM28:4063M
DEF CON 24 Wireless Village - Jose Gutierrez and Ben Ramsey - How Do I BLE HackingoP6sx2cObrY20:32108M
DEF CON 24 Wireless Village - Matt Knight - Reversting LoRa Deconstructing a Next Gen Proprietary LPKEjlkZA2olE49:26211M
DEF CON 24 Wireless Village - Village People - Wireless Capture the Flag Inbrief-z_HcOpPnog45:18179M
DEF CON 24 Wireless Village - Village People - WCTF Day 2 KickoffAWpdetj0Zdk19:52135M
DEF CON 25 - Chris Sumner - Rage Against the Weaponized AI Propaganda Machineg5Hx86H3-mc44:05126M
DEF CON 25 - Gus Fritschie, Evan Teitelman - Backdooring the Lottery and Other Security Tales49KU9NDcCgI37:3397M
DEF CON 25 - Trey Forgety - Inside the “Meet Desai” Attack Defending Distributed TargetsjAv-le5-NE039:20153M
DEF CON 25 - Chris Thompson - MS Just Gave the Blue Team Tactical NukesLUtluTaEAUU47:06184M
DEF CON 25 - Dimitry Snezhkov - Abusing Webhooks for Command and Control6Sq0gNp_vQY21:3658M
DEF CON 25 - Elie Bursztein - How We Created the First SHA 1 CollisionNbHL0SYlrSQ37:17164M
DEF CON 25 - Gabriel Ryan - The Black Art of Wireless Post Exploitationn5_xb9E4G_U45:36116M
DEF CON 25 - Plore - Popping a Smart GunJ3f0p3vTY-c42:00169M
DEF CON 25 - XlogicX - Assembly Language is Too High LeveleunYrrcxXfw45:14148M
DEF CON 25 - Andy Robbins, Will Schroeder - Designing Active Directory DACL Backdoors_nGpZ1ydzS843:24167M
DEF CON 25 - Artem Kondratenko - Cisco Catalyst ExploitationVQGqseMDEIs40:32349M
DEF CON 25 - Avi Bashan, Slava Makkaveev - Everything to know about Android packersU1XeGYDFp9A32:0280M
DEF CON 25 - Caleb Madrigal - Controlling IoT devices with crafted radio signalsqhuhJ9Oe9vA32:52118M
DEF CON 25 - Chaosdata - Ghost in the Droid: Possessing Android Applications with ParaSpectreohjTWylMGEA18:2743M
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus93lyRgZYxKw15:3762M
DEF CON 25 - Christopher Domas - Breaking the x86 Instruction SetajccZ7LdvoQ40:40105M
DEF CON 25 - Cooper Quintin, Kashmir Hill - The Internet Already Knows I'm Pregnantl0SdACyiLDA37:02110M
DEF CON 25 - Damien Cauquil - Weaponizing the BBC Micro BitI9AqIaMjYcw34:23131M
DEF CON 25 - Daniel Bohannon, Lee Holmes - Revoke Obfuscation: PowerShell Obfuscationk5ToL0J7uL045:16141M
DEF CON 25 - David Robinson - Using GPS Spoofing to control timeisiuTNh5P3435:22111M
DEF CON 25 - Dennis Maldonado - Real time RFID Cloning in the FieldkUduHIygbY820:3356M
DEF CON 25 - Dor Azouri - BITSInjectUedRQgF06kI19:41133M
DEF CON 25 - Duncan Woodbury, Nicholas Haltmeyer - Linux Stack Based V2X FrameworkJQ9ldk5L96Y43:32157M
DEF CON 25 - Francis Brown, David Latimer - Putting the Emerging Drone Defense Market to the TestLXFnyDihdl042:36109M
DEF CON 25 - Garry Kasparov - The Brain's Last Standfp7Pq7_tHsY48:07232M
DEF CON 25 - Gerald Steere, Sean Metcalf - Hacking the CloudLufXEPTlPak43:03278M
DEF CON 25 - Gil Cohen - Call the plumber: You have a leak in your named pipe6xt0lEj-sac37:07146M
DEF CON 25 - Hanno Bõck - Abusing Certificate Transparency LogsTMNeSnjZfCI30:2280M
DEF CON 25 - Haoqi Shan, Jian Yuan - Man in the NFCpXmmNe5uo-434:19222M
DEF CON 25 - HighWiz, Malware Unicorn, Niki7a, Roamer, Wiseacre, Shaggy - DEF CON 101 Panel1MTLdC3S8ak01:50:50368M
DEF CON 25 - Hyrum Anderson - Evading next gen AV using AIFGCle6T0Jpc18:3546M
DEF CON 25 - Ilja van Sprundel - Are all BSDs are created equally? A survey of BSD kerne1j1UaLsPv3k48:08153M
DEF CON 25 - Inbar Raz, Eden Shochat - From One Country, One Floppy to Startup NationLJhhXH4QlRo47:03220M
DEF CON 25 - Itzik Kotler, Amit Klein - The Adventures of AV and the Leaky SandboxYZKAPKNY09g40:30238M
DEF CON 25 - James Langevin, Will Hurd - DC to DEF CON Q&A40frKOU3jHk46:34285M
DEF CON 25 - Jason Haddix - Introducing HUNT Data Driven Web Hacking & Manual Testing0CU75vPfIS429:1974M
DEF CON 25 - Jason Hernandez, Sam Richards, Jerod MacDonald-Evoy - Tracking Spies in the SkiesgFsPnIbzEco40:38253M
DEF CON 25 - Jeff Moss and Panel - DEF CON Groups Panel_d8I8cq1p_Q51:22173M
DEF CON 25 - Jim Nitterauer - DNS: Devious Name Services Destroying Privacy & Anonymity w⧸o consentgnUZddaPvUA40:25135M
DEF CON 25 - Joe Rozner - Wiping out CSRF9h6bJpDeBnQ43:05217M
DEF CON 25 - John Sotos - Genetic Diseases to Guide Digital Hacks of the Human GenomeHKQDSgBHPfY49:47180M
DEF CON 25 - Josh Datko, Chris Quartier - Breaking Bitcoin Hardware WalletshAtoRrxFBWs18:5250M
DEF CON 25 - JoSh Pitts - Teaching Old Shellcode New Tricksjk1VAuPH4-w32:0868M
DEF CON 25 - K2 - UnFucking Forensics: Active Passive memory hacking debugging1Dh889lemcI14:3640M
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart ContractsWIEessi3ntk38:35274M
DEF CON 25 - Lee Holmes - Get $pwnd: Attacking Battle Hardened Windows ServerahxMOAAani822:1569M
DEF CON 25 - Luke Young - There’s no place like 127.001: Achieving reliable DNS rebindingQ0JG_eKLcws41:32323M
DEF CON 25 - Marc Newlin, Logan Lamb, Chris Grayson - CableTap: Wirelessly Tapping Home NetworksLxfsT4wLAfU41:17152M
DEF CON 25 - Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced autheJvormRcth9w39:42179M
DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a MicrochipgRWjd6o4LO429:19199M
DEF CON 25 - Matt Joyce - Amateur Digital ArcheologyctwUkz_0gbg43:48126M
DEF CON 25 - Matt Knight - Radio Exploitation 101HTVPmF8u7Yg32:39247M
DEF CON 25 - Matt Suiche - Porosity A Decompiler For Blockchain Based Smart Contracts Bytecoded7EcNyuJy2g36:22159M
DEF CON 25 - Matt Wixey - See no evil, hear no evil: Hacking invisibly & silently with light & soundgFTiD7EnVjU43:36350M
DEF CON 25 - Max Bazaliy - Jailbreaking Apple WatcheJpbi-Qz6Jc36:1288M
DEF CON 25 - Mickey Shkatov, Jesse Michael, Oleksandr Bazhaniuk - Driving down the rabbit hole5QBOmr_ZyLo38:05100M
DEF CON 25 - Mikhail Sosonkin - Hacking travel routers like it's 1999QmiXUPCe8-k19:37130M
DEF CON 25 - Min Zheng, Xiangyu Liu - macOS:iOS Kernel Debugging and Heap Feng Shuijqrw-VpYekY26:02199M
DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next levelGu_5kkErQ6Y31:04118M
DEF CON 25 - Nathan Seidle - Open Source Safe Cracking Robotsv9vIcfLrmiA27:25145M
DEF CON 25 - Nathan Seidle -Open Source Safe Cracking Robots: Combinations Under 1 Hour7qNZ4PTCkS427:2588M
DEF CON 25 - Nick Cano - XenoScan Scanning Memory Like a BossqGPQSyaA61s39:44110M
DEF CON 25 - Octane - Untrustworthy Hardware and How to Fix It6dCdusRSFLw19:1159M
DEF CON 25 - Patrick Wardle - Offensive Malware Analysis: Dissecting OSX FruitFlyq7VZtCUphgg20:2754M
DEF CON 25 - Peyton Engel - Learning about Government Surveillance Software7Obeod8X7Do19:3548M
DEF CON 25 - Philip Tully, Michael T Raggo - A Picture is Worth a Thousand Words, LiterallypJSyOq9xj3o46:09109M
DEF CON 25 - Professor Plum - Digital Vengeance Exploiting the Most Notorious C&C ToolkifPhkmAdWH-I33:3785M
DEF CON 25 - Redezem - PEIMA Using Power Laws to address Denial of Service Attacks_Lc3O0nCfIw19:4757M
DEF CON 25 - Richard Thieme - When Privacy Goes Poof! Why It's Gone and Never Coming BackatDgnkvzD8I45:24224M
DEF CON 25 - Roger Dingledine - Next Generation Tor Onion ServicesDi7qAVidy1Y43:07289M
DEF CON 25 - Romain Coltel, Yves Le Provost - WSUSpendu: How to hang WSUS clientsksHhtKvY49g17:41109M
DEF CON 25 - Ryan Baxendale - Microservices and FaaS for Offensive SecurityhVF9EEwIqR823:0283M
DEF CON 25 - Saif El Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects2chDv_wTymc43:54123M
DEF CON 25 - Salvador Mendoza - Exploiting 0ld Mag stripe information with New technologypvYXMV9uuU415:39124M
DEF CON 25 - Sarah Zatko - CITL and the Digital Standard: A Year LaterBufzX-zeZvQ37:33180M
DEF CON 25 - Scott Behrens, Jeremy Heffner - Application DoS In Microservice Architecturesa29ILArKjGo40:25104M
DEF CON 25 - Sean Dillon, Zach Harding - Koadic C: Windows COM Command & Control FrameworkHJ_8VUgYzMw44:44104M
DEF CON 25 - Snide Owen - Phone system testing and other fun tricksjt6dpEqsda439:0394M
DEF CON 25 - spaceB0x - Exploiting Continuous Integration (CI) and Automated Build systemsmpUDqo7tIk841:0099M
DEF CON 25 - Steinthor Bjarnason, Jason Jones - The call is coming from inside the houseqMQwENS30pg35:11138M
DEF CON 25 - SupaFraud - Official DEF CON Teaser VideoFNtVqHaWFbU01:0840M
DEF CON 25 - Svea Eckert, Andreas Dewes - Dark Data1nvYGi7-Lxo38:55350M
DEF CON 25 - Tess Schrodinger - Total Recall Implanting Passwords in Cognitive MemoryUjsL7K2ga4A37:34186M
DEF CON 25 - The Dark Tangent - Welcome to DEF CON 25ZCUlwHsT6QA14:46106M
DEF CON 25 - Thomas Mathew, Dhia Mahjoub - Malicious CDNsAbJCOVLQbjs45:54122M
DEF CON 25 - Tomer Cohen - Game of Chromes: Owning the Web with Zombie Chrome ExtensionspR4HwDOFacY31:02109M
DEF CON 25 - Vasilios Mavroudis, Dan Cvrcek - Trojan tolerant Hardware & Supply Chain SecurityOOyhfylJXhM36:2275M
DEF CON 25 - Vulc@n, Panel - The Last CTF Talk You’ll Ever Need: AMA with 20 years of CTF OrganizersMbIDrs-mB2001:51:19417M
DEF CON 25 - Weston Hecker - Opt Out or Deauth Trying! AntiTracking Bots & Keystroke InjectionIXciNThY76436:29205M
DEF CON 25 - Whitney Merrill, Terrell McSweeny - Tick, Tick, Tick Boom You're Dead: Tech & the FTC7E5hmStBocQ44:55304M
DEF CON 25 - William Knowles - Persisting with Microsoft Office Abusing Extensibility Options6uovKSEPU2Q18:27124M
DEF CON 25 - Yan Shoshitaishvili - 25 Years of Program AnalysisXL9kWQ3YpLo49:45334M
DEF CON 25 - Yuwue Zheng, Lin Huang - Ghost Telephonist Impersonates You Through LTE CSFnZI2W94vYLA42:07114M
DEF CON 25 - Zenofex, 0x00string, CJ 000, Maximus64 - All Your Things Are Belong To UsClDO4PyMI-g59:43162M
DEF CON 25 -The Dark Tangent, Def Con Goons - DEF CON Closing CeremoniesLy7uurZ2d9A01:23:28359M
DEF CON 25 BioHacking Village - Jay Radcliffe - The Scientific Method in Security ResearchUkA9JOUcFi450:16160M
DEF CON 25 BioHacking Village - Tess Schrodinger - Total Recall: Implicit Learning As CryptolNs2TXUb33g24:52106M
DEF CON 25 BioHacking Village - Stanislav Naydin, Vlad Gostomelsky - Medical Device Ethicsg3lvY5an4-E26:20232M
DEF CON 25 BioHacking Village - Amanda Plimpton, Evan Anderson - Psychoactive Chemicals in CombatlKBzOdsGonQ25:4591M
DEF CON 25 BioHacking Village - Amirs Panel - Ethics in BioHacking5FMSedKwekE53:01413M
DEF CON 25 BioHacking Village - C00p3r, Cur50r - Implantable Technology Show and TellVyJftVIjDNo19:3877M
DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing Deployment Of Medical DevicesODiZc04CzgE21:5268M
DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Patch BadlyqDEJMc9JiJ025:22203M
DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides Smart Drugs 4 Minute MileKPwjn17XQfs24:0891M
DEF CON 25 BioHacking Village - Jeffrey Tibbetts - Biohackers Dienn0kglB46BU25:0259M
DEF CON 25 BioHacking Village - John Bass - Medical Industry Disrupt: BlockchainvD4uSu_uwrw23:0366M
DEF CON 25 BioHacking Village - Jun Axup - The Brave New World of Bio Entrepreneurship9pjOdhvIL1o19:39100M
DEF CON 25 BioHacking Village - Kevin Sacco - Tales of A Healthcare Hackerij7uuY-3eXk28:5381M
DEF CON 25 BioHacking Village - Louis Auguste Jr - Microscopes Are Stupid6VCj8MitA6M21:02108M
DEF CON 25 BioHacking Village - Meow Ludo Meow Meow - DIYBioweapons and RegulationVoqHJxf8hWQ23:32182M
DEF CON 25 BioHacking Village - Paul Ashley - The Future is Fake Identities1Sft5aJ2Olo29:54124M
DEF CON 25 BioHacking Village - RenderMan - Hacking The Internet of DongseaLd9gcKTJQ25:3673M
DEF CON 25 BioHacking Village - Robin Farmanfarmaian - The Patient as CEO4LKPRmEpfTc18:2668M
DEF CON 25 BioHacking Village - Ryan Schmoll, Peter Hefley - Trigraph: Ethereum-based TeleradiologyM-WApMYWfFM21:22104M
DEF CON 25 BioHacking Village - Szkatulski Lawless - How Your Doctor Might Be Trying To Kill YouKwT2j0vkf5E25:43119M
DEF CON 25 BioHacking Village - Tim Cannon - The Moral Imperative of BiohackinggfBdUzsz8cM18:2273M
DEF CON 25 BioHacking Village - Travis Lawrence - Hacking the Second Genetic CodeHgsY1yvoRdQ18:2490M
DEF CON 25 BioHacking Village - Trevor Goodman - Hack Your Senses: Sensory Augementationmv-ensBMPIY25:0373M
DEF CON 25 Car Hacking Village - Montalbano, Gillispie, Connett - Attacking Wireless InterfacesknEV4u7yJdU34:23139M
DEF CON 25 Car Hacking Village - Tim b1tbane, Mitch Johnson, ehntoo - That's No Car Its a NetworkLmBixGkhEuI35:21237M
DEF CON 25 Car Hacking Village - Weston Hecker - Grand Theft Radio Stopping SDR Relay Attacks0O3pwRHYYKg25:20157M
DEF CON 25 Car Hacking Village - Badge Life: DEFCON Unofficial Badges Panel-aJUUdKRy_k49:51259M
DEF CON 25 Car Hacking Village - Corey Theun - Heavy Truck and Electronic Logging DevicesuIj7wkAoJ6Y31:57116M
DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - An Introduction to AUTOSAR Secure OnboardX4szarzU3Rc43:45152M
DEF CON 25 Car Hacking Village - Sameer Dixit, Vlad Gostomelsky - Abusing Smart Cars with QR CodesEzSVIaykTs024:0362M
DEF CON 25 Car Hacking Village - Sheila Ayelen Berta, Claudio Caracciolo - The BichoheKMPMahF2E32:0697M
DEF CON 25 Car Hacking Village - Vlad Gostomelsky - GPS System Integrity9Wg4lzMasMo23:5171M
DEF CON 25 Car Hacking Village - Woodbury, Haltmeyer - Linux Stack Based V2X FrameworkFEpMtMLAxOU28:3094M
DEF CON 25 Conference - Alvaro Muñoz, Alexandr Mirosh - Friday the 13th JSON attacksZBfBYoK_Wr037:59103M
DEF CON 25 Conference - Denton Gentry - I Know What You Are by the Smell of Your Wifin_gSJkswdhU19:22110M
DEF CON 25 Conference - Jason Staggs - Breaking Wind: Adventures Hacking Wind Farm Control NetworksDfNwWQAOdks23:03103M
DEF CON 25 Conference - Josh Schwartz, John Cramb - MEATPISTOL, A Modular Malware Implant FrameworkdbIdo9ilEIY36:46220M
DEF CON 25 Crypto and Privacy Village - Alisha Kloc - Privacy is Not An Add On:Designing for PrivacynVx7BMYypy832:00185M
DEF CON 25 Crypto and Privacy Village - Andrew Brandt - SSL Visibility Revisted: A Year In Privacy ICKfm414YsjU47:23207M
DEF CON 25 Crypto and Privacy Village - David Huerta - Alice and Bob are Slightly Less ConfusedeCEWUtrAsCw30:12138M
DEF CON 25 Crypto and Privacy Village - David Wong - SHA 3 vs The WorldBJnjAF2cz4857:02143M
DEF CON 25 Crypto and Privacy Village - Jake Williams -The Symantec SSL Debacle Lessons LearnedcepMMRPuzvU52:32309M
DEF CON 25 Crypto and Privacy Village - Joel Wallenstrom, Robby Mook - A New Political ErakLU1f34UmpU55:23399M
DEF CON 25 Crypto and Privacy Village - Joseph Birr Pixton - Rustls Modern Fast Safer TLSSsHLEuiyPI831:06139M
DEF CON 25 Crypto and Privacy Village - Kenneth Geers - Traffic Analysis in CyberspaceKwilB5FmGeo24:06166M
DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has MOYxI43Zb-Fs42:26458M
DEF CON 25 Crypto and Privacy Village - Lee Brotherston - Blue Team TLS HugsRT6VqSkQQtI25:3982M
DEF CON 25 Crypto and Privacy Village - Mark Mager - Cryptanalysis in the Time of Ransomware0TF9NLsGCHA41:33119M
DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty ComputationAfWRDgOBMQU25:1364M
DEF CON 25 Crypto and Privacy Village - Punky Duero - The Key Management Facility of The Root DNSSEC26j5lLymitM25:04123M
DEF CON 25 Crypto and Privacy Village - Shea Nangle - Operational Security Lessons From The Dark WebGda4QVGHFOk28:0849M
DEF CON 25 Crypto and Privacy Village - Tomas Susanka - Security Analysis of the Telegram IMhvGyog57gwI20:33106M
DEF CON 25 Crypto and Privacy Village - Trey Forgety - Protecting Users' PrivacyfoeFGczCun850:06322M
DEF CON 25 Crypto Village - J0n J4rv1s - Surveillance Capitalism Will Continue til Morale Improveshn5VN72ZjDE01:06:32129M
DEF CON 25 Crypto Village - Ryan Lackey - Cypherpunks Historyl0q37IJi-CQ25:3299M
DEF CON 25 ICS Village Blake Johnson Dissecting Industrial Wireless ImplementationsI-TCfl0Jm2M31:4771M
DEF CON 25 ICS Village - Thomas Brandsetter - InSecurity in Building AutomationG9ESeUWfYbs30:0475M
DEF CON 25 ICS Village - Arnaud Soullié - Fun with Modbus 0x5a Nothing New Still Relevant?A_B69Rifu1g24:1054M
DEF CON 25 ICS Village - Bryson Bort, Atlas - Grid Insecurity and How to Really Fix This Shity0fHJiDWLPs31:3094M
DEF CON 25 ICS Village - Chris Sistrunk - What's the DFIRence for ICSBHL8HbgXoT830:15105M
DEF CON 25 ICS Village - Joe Weiss - Cyber Security Issues with Level 0 through 1 DevicesUgvVaniZhsk36:4685M
DEF CON 25 IoT Village - Aaron Alva, Mark Eichorn - IoT Updates to Help Protect ConsumersVeiVYob-ioM25:16165M
DEF CON 25 IoT Village - Aaron Guzman - Hide Yo Keys, Hide Yo CarSCCdlFHrj3835:1490M
DEF CON 25 IoT Village - Alex Jay Balan - IoT: The Gift That Keeps on GivingUpxNkBvejf842:06186M
DEF CON 25 IoT Village - Andrew Tierney, Ken Munro - IoT From DVRs to DildosjNqo3uAYsBk36:56195M
DEF CON 25 IoT Village - Brian Knopf - Redesigning PKI For IoT Because Crypto is HardoeKm2qkarak45:11242M
DEF CON 25 IoT Village - Dan Regalado - Inside the Alaris Infusion Pump, not too much medicine, plzw4sChnS4DrI31:4678M
DEF CON 25 IoT Village - Deral Heiland - The Internet of VulnerabilitiesuhYLfhXNlUc48:20340M
DEF CON 25 IoT Village - Rick Ramgattie - Rethinking the Researcher-Vendor RelationshipeIFHshxqGgXk24:1779M
DEF CON 25 IoT Village - Vivek Ramachandran, Nishant Sharma, Ashish Bhangale - IIDS: IDS FOR IOTzRkgfS0bkys41:14148M
DEF CON 25 IoT Village - Vladimir Dashchenko, Sergey Temnikov - Pwning the Industrial IoTcJcRDKN61rY22:4986M
DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing9edSBCEY_Fw52:04126M
DEF CON 25 Packet Hacking Village - Ankur Tyagi - Visual Network and File Forensicsu2M14Q5JD_s28:58105M
DEF CON 25 Packet Hacking Village - Brute Logic - XSS For the winIzwCS0WhI_w15:2647M
DEF CON 25 Packet Hacking Village - Catherine Ullman, Chris Roberts - Breaking the Bad NewsaexJa6cgA9Y44:52110M
DEF CON 25 Packet Hacking Village - Chris Wysopal - How Hackers Changed the Security IndustrysrJXU7DVo7Y47:40108M
DEF CON 25 Packet Hacking Village - Damon Small - Layer 8 and Why People are the Most Importantjdtm_2IoW2A40:01135M
DEF CON 25 Packet Hacking Village - Daniel Adinolfi, Anthony Singleton - CVE IDs_X5VmbdkJ1s46:40202M
DEF CON 25 Packet Hacking Village - Eric Capuano - Fortune 100 InfoSec on a State Government BudgetKPbTHdbLoi849:45154M
DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop ScenariosS4WguNB8s-457:47384M
DEF CON 25 Packet Hacking Village - Gabriel Ryan - The Black Art of Wireless Post ExploitationBp2JE-4VinY52:17298M
DEF CON 25 Packet Hacking Village - Gilberto Bertin - Past, Present and Future of High Speed PacketO38eY1VsWm820:1797M
DEF CON 25 Packet Hacking Village - Gita Ziabari -Yalda: Automated Bulk IntelligenceGqAiirvD9Tg27:04110M
DEF CON 25 Packet Hacking Village - Leah Figueroa - Iron Sights for Your Datadm6bsXuYEkg22:4575M
DEF CON 25 Packet Hacking Village - Megan Roddie - Strengthen Secops By Leveraging Neurodiversity6jN8kNyO0-k16:3399M
DEF CON 25 Packet Hacking Village - Michael Gianarakis ,Keith Lee - Portiazq3t_hmyXpU32:46139M
DEF CON 25 Packet Hacking Village - Mike Raggo, Chet Hosmer - Covert TCP with a TwistIIrzbzzNFjw56:08222M
DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Chance of PersistenceFAWv-4WsIP033:5991M
DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach, WTF Really HappeneduXB4AiQw98s54:33197M
DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain NameizfL_tBO8Hg23:04121M
DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot Mumz8vPrXFa3Ws40:11100M
DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound Deceiving Doman Admin Hunterself8NK1GR-M34:55285M
DEF CON 25 Packet Hacking Village - Vivek Ramachandran,Thomas d'Otreppe - Make a 802.11AC MonitorgOGytFSomA001:00:11166M
DEF CON 25 Recon Village Jonathan Cran Attack Surface Discovery With IntriguekWrdxuFaEVg31:27152M
DEF CON 25 Recon Village - Jason Haddix - Domain Discovery:Expanding Your Scope Like A BossNUsJpquFq0Q42:09218M
DEF CON 25 Recon Village - Leah Figueroa - FERPA: Only Grades Are Safe; OSINT In Higher EducationriNxsbko4xw37:36105M
DEF CON 25 Recon Village - Tracy Maleeff - Into the Bird's Nest: A Comprehensive Look at Twitterx6ZFxpx1M5035:05140M
DEF CON 25 Recon Village - Winner Announcement Prize DistributiongCMEi7gTh0A16:19113M
DEF CON 25 Recon Village - Abhijeth Dugginapeddi - Recon and Bug Bounties What A Great Love StoryvCBAQKLAagA29:1366M
DEF CON 25 Recon Village - Andrew Hay - An Introduction to Graph Theory for OSINTEijTmwSgqmA35:0173M
DEF CON 25 Recon Village - Anthony Russell - Building Google For Criminal EnterpriseseHp2ZhyIryc41:37202M
DEF CON 25 Recon Village - Dakota Nelson -Total RecolluPbDySi-p2w11:0231M
DEF CON 25 Recon Village - Guillermo Buendia, Yael Esquivel - How To Obtain 100 Facebooks a DayUs1nEden6Fg21:2551M
DEF CON 25 Recon Village - Inbar Raz - Do Tinder Bots Dream of Electric Toysd5eV36wR5Ew29:0868M
DEF CON 25 Recon Village - Kunal Aggarwal - DataSploit Open Source Assistant for OSINTeun-2BMo6qY19:13101M
DEF CON 25 Recon Village - Mikhail Sasonkin - Up Close and Personal: Keeping an Eye On Mobilek0mRkhbptiA15:2698M
DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and ProfituBy2N0NmS2o43:22108M
DEF CON 25 Recon Village - Shane MacDougal - Keynote: Seeing is Believing The Future of ReconzhrXOQqJUvA44:21107M
DEF CON 25 Recon Village - Simon Roses - OSINT Tactics on Source Code and Developersaw0X7TimkXQ43:02345M
DEF CON 25 Recon Village - Tyler Rorabaugh - DFIR Automation Orchestration Tools For OSINT Reconc6QV8y6KZ7819:0070M
DEF CON 25 Rootz Asylum - Alex Stamos, CSO Facebook - KeynoteNB4fPiCc-jc14:26130M
DEF CON 25 Rootz Asylum - Aron Rosenberg, Aaron Standridge - Hacking an Insecure WiFi Cameraz9QgSU1r0ek11:4238M
DEF CON 25 Rootz Asylum - Corban Villa - Arm Mounted Weaponized Platform and Anime Viewer4o9nKWI0lXM07:1168M
DEF CON 25 Rootz Asylum - Cory Doctorow - You are not a Digital Native and that's OKc5Sen9CBCu020:29142M
DEF CON 25 Rootz Asylum - David Weinman - Introduction To Cheat Enginex-LRfh_-IGI21:5166M
DEF CON 25 Rootz Asylum - Deviant - Home Depot and A Plan of Attack for HackersPb026p1igoY13:1639M
DEF CON 25 Rootz Asylum - EFF, Nic0 - Opening Ceremonies:A Place Where Kids Learn White Hat HackingOIVvRP9-b4M09:48103M
DEF CON 25 Rootz Asylum - Erin Owens - Drone Warsf8PCzwxmEAo22:0385M
DEF CON 25 Rootz Asylum - Erin Owens - Hacking & Robotics v2 point 06wM5Q31zXKM14:05123M
DEF CON 25 Rootz Asylum - Leonard Bailey - Everything You Need To Know About The US Dept of JusticeFTOPI-YAmao14:48112M
DEF CON 25 Rootz Asylum - Patrick McCanna - Tips for Internet Privacy at CollegefAo3_Jl74j415:2551M
DEF CON 25 Rootz Asylum - Rsnake Robert Hansen - Searching The Invisible InternetzPjgUqeQbVA07:5827M
DEF CON 25 Rootz Asylum - Tarah - How To Explain Crypto To Practically AnyonegUhqA2PRtw010:2890M
DEF CON 25 SE Village - Billy Boatright - Nor Lose The Common Touche_TQTDrRyWI31:11120M
DEF CON 25 SE Village - Brent White, Tim Roberts - Skills For A Red TeameryJCq8ajdd0U51:08182M
DEF CON 25 SE Village - Chris Hadnagy - SE vs Predator: Using SE In Ways I Never ThoughtPNuPkpLuaws52:14121M
DEF CON 25 SE Village - Fahey Owens - Beyond Phishing – Building & Sustaining a Corporate SE ProgramVeXlppLn5H430:48123M
DEF CON 25 SE Village - Helen Thackray - Hackers Gonna Hack , But Do They Know Why?TTx7mHzyX8c50:30110M
DEF CON 25 SE Village - Jayson Street - Strategies on Securing Your Banks and EnterprisesiLPI0EGs6kY56:19178M
DEF CON 25 SE Village - John Nye -The Human Factor Why Are We So Bad at SecurityMgXhjUzi_I048:25222M
DEF CON 25 SE Village - Keith Conway, Cameron Craig - Change Agents How to Affect Corp. CulturemYRXlCGMP0Q46:13137M
DEF CON 25 SE Village - Michele Fincher - Are You Killing Your Security Program?AZw8WugNyIQ29:21119M
DEF CON 25 SE Village - Robert Wood - Thematic Social EngineeringRw0aJQnYXq039:11189M
DEF CON 25 SE Village - Tyler Rosonke - Social Engineering With Web Analytics3bb87rb70jU32:54103M
DEF CON 25 SE Village - Yaiza Rubio, Félix Brezo - Heavy Diving For CredentialsmxI_2On_fG830:42113M
DEF CON 25 Voting Village - Jake Braun - Securing the Election Office A Local Responsev5UcuY33Hic31:25322M
DEF CON 25 Voting Village - Barbara Simons, David Jefferson - Election Systems: More Than the Booth7Cw_7XFpNms50:06321M
DEF CON 25 Voting Village - General Douglas Lute - National Security Implications of Voting AttacksK7lew7XlgKk42:10434M
DEF CON 25 Voting Village - Harri Hursti - Brief history of election machine hackingImgaEqOQlSQ44:46125M
DEF CON 25 Voting Village - Joseph Hall - Election Hacking: Legal Considerations from the Civil SideQLmREgJxFJI50:03146M
DEF CON 25 Voting Village - Joseph Hall, David Jefferson - Common Misconceptions and False ParallelsccfNSAfAyis49:12260M
DEF CON 25 Voting Village - Mary Brady, Josh Franklin - The State of US Voting System Security9uBzqiYMzLg52:00189M
DEF CON 25 Voting Village - Matt Blaze - How did we get here? A history of voting technologyx1RmNXQAydg55:39302M
DEF CON 25 Wifi Village - Aardvark, Darkmatter - WIGLE Like You Mean It Maximizing Your WardrivingfSsTgazmHCw48:17444M
DEF CON 25 Wifi Village - Alexander Zakarov - Large Scale Wireless Monitoring: KISMET Packet Snifferj899007bkqQ38:59105M
DEF CON 25 Wifi Village - Andrew Strutt - POCSAG Amateur Pager NetworkTeJptg1vKY828:3583M
DEF CON 25 Wifi Village - Andrew Strutt - Suitcase Repeater Build for UHF 70cmCoQsYhFSjtg31:4797M
DEF CON 25 Wifi Village - Balint Seeber - Hacking Some More of the Wireless WorldpsuEzxFJnZY01:46:31357M
DEF CON 25 Wifi Village - Eric Escobar - SecureWorks: SDR Replay Attacks On Home Security SystemsPI-LyQGwrmE19:5966M
DEF CON 25 Wifi Village - Matt Blaze - Sigint for the rest of us7awwG9aaR4c01:05:54181M
DEF CON 25 Wifi Village - Nick Delewski - Failsafe: Yet Another SimpliSafe Attack VectoriV0fGMwHVyE52:50303M
DEF CON 25 Wifi Village - Robert Ghilduta - Designing An Automatic Gain ControlgAwbe-G1t-A51:11132M
DEF CON 25 Wifi Village - Vivek Ramachandran, Nishant Sharma, Ashish Bhangale- DeceptaconpA4MuhebEwA36:31259M
DEF CON 25 Wifi Village - Woody, Tim Kuester - GODUMPiNG packet sniffing the GotennapKP74WGa_s056:22207M
DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator2NawGCUOYT446:46100M
DEF CON 26 - Champion and Law - Building the Hacker TrackerLcPMwCUA5dY27:1457M
DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86jmTwlEh8L7g46:04156M
DEF CON 26 - Christopher Domas - The Ring 0 Facade Awakening the Processors Inner DemonsXH0F9r0siTI21:2849M
DEF CON 26 - Damien virtualabs Cauquil - You had better secure your BLE devicesVHJfd9h6G2s41:3999M
DEF CON 26 - Daniel Zolnikov - A Politicians Successful Efforts to Fight SurveillanceCnB0FYndVMI46:41133M
DEF CON 26 - Martin Vigo - Compromising Online Accounts by Cracking Voicemail SystemsZpZbTPYB3cU20:01102M
DEF CON 26 - Foster and Ayrey - Dealing with Residual Certificates for Pre-owned DomainsgZ9_-YQ4hoY21:1395M
DEF CON 26 - Guang Gong - Pwning theToughest Target, the Largest Bug Bounty in the History of ASRI0nJ9Cke00Q24:4751M
DEF CON 26 - Ian Haken - Automated Discovery of Deserialization Gadget ChainswPbW6zQ52w841:10137M
DEF CON 26 - Knight and Speers - Designing and Applying Extensible RF Fuzzing Tools9K1_ISLS5UE39:0975M
DEF CON 26 - Krotofil , Wetzels - Thru the Eyes of the Attacker Designing Embedded Systems for ICS3x4MukvjEm851:02170M
DEF CON 26 - Maksim Shudrak - Fuzzing Malware For Fun and Profitbzc44WPxoxE35:1294M
DEF CON 26 - Morgan Indrora Gangwere - (Ab)using Binaries from Embedded Devices for Fun and ProfitIhOzBFZ3rts35:17123M
DEF CON 26 - Nirenberg and Buchwald - Reverse Engineering Hacking Documentary Series6FzGGKnzO2049:16267M
DEF CON 26 - sghctoma - All Your Math are Belong to Usw-jVUSw_7ko45:56228M
DEF CON 26 - Slava Makkaveev - Man In The Diskvvfs0u1or3M18:0389M
DEF CON 26 - smea - Jailbreaking the 3DS Through 7 Years of HardeningWNUsKx2euFw47:2869M
DEF CON 26 - Steven Danneman - Your Banks Digital Side DoorfhUHVGTa8mQ49:4571M
DEF CON 26 - Zheng and Bai - Fasten your seatbelts We are escaping iOS 11 SandboxXD2CHFuaKI818:2161M
DEF CON 26 - 0x200b - Detecting Blue Team Research Through Targeted AdswlKqyuefE1E18:2674M
DEF CON 26 - Alexandre Borges - Ring 0 Ring 2 Rootkits Bypassing Defenses7AEMxaZhdLU32:2254M
DEF CON 26 - Alfonso Alguacil and Murillo Moya - Playback a TLS 1 point 3 storyZY-MYd_OvwE37:33119M
DEF CON 26 - Andrea Marcelli - Looking for the perfect signature an automatic YARA rulesDz0C55Azn1Y18:5340M
DEF CON 26 - Bai and Zheng - Analyzing and Attacking Apple Kernel Drivers07VqX4bbXTI24:2378M
DEF CON 26 - Berta and De Los Santos - Rock appround the Clock Tracking Malware Developerswd5OU9NvxjU35:0281M
DEF CON 26 - Bui and Rao - Last mile authentication problem Exploiting the missing linktLihGD_ugBk32:3752M
DEF CON 26 - Daniel Crowley and Panel - Outsmarting the Smart City5z-rKz5ABgI34:5998M
DEF CON 26 - David Melendez Cano - Avoiding CounterDrone Systems with NanoDronespVmFxJPOu9I37:5378M
DEF CON 26 - delta zero and Azeem Aqil - Your Voice is My Passport2uoOkIUB43Q35:2890M
DEF CON 26 - Douglas McKee - 80 to 0 in Under 5 SecondsndliGvT5pYA45:39119M
DEF CON 26 - Dr Matthews and Panel - A DEF CON Guide to Adversarial Testing of Software4cscBvDYP-Q44:55123M
DEF CON 26 - Dr Holtmanns and Singh - 4G Who is Paying Your Cellular Phone Bill VideozIU_wVm6lrE41:4288M
DEF CON 26 - Dr Rasthofer and Panel - Worrisome Security Issues in Tracker Appse9PdX-NmCSg41:57157M
DEF CON 26 - Elinor Mills and Panel - The L0pht Testimony 20 Years Later and Other ThingsnoE4o-roAWM01:04:08311M
DEF CON 26 - Eric Sesterhenn - In Soviet Russia Smartcard Hacks YouZ4w8Vbr-IFU21:02122M
DEF CON 26 - Eyal Itkin, Yaniv Balmas - What the Fax?!qLCE8spVX9Q44:1568M
DEF CON 26 - Franklin and Franklin - Defending the 2018 Midterm Elections from Foreign Adversaries711YmI_hrVs45:45138M
DEF CON 26 - Gabriel Ryan - Bypassing Port Security In 2018 Defeating MacSEC and 802 1x 2010lX4ZnQ-pfWQ42:42103M
DEF CON 26 - Galloway, Yunusov - For the Love of Money Finding and Exploiting Vulns in mPOS SystemsacBSfc9Csew42:3094M
DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-RayhJBunGHIvKE18:3691M
DEF CON 26 - Greenstadt and Dr Caliskan - De-anonymizing Programmers from Source CodeFj6wfGcKFlI42:27154M
DEF CON 26 - HuiYu and Qian - Breaking Smart Speakers We are Listening to You3sLC0XaqvMg42:56114M
DEF CON 26 - Izycki and Colli - Digital Leviathan A Comprehensive List of Nation State Big BrothersTZL_leHf1Ho19:5168M
DEF CON 26 - Jeanette Manfra - Securing our Nations Election InfrastructurewquO3jEwHes19:3491M
DEF CON 26 - Joe Rozner - Synfuzz Building a Grammar Based Retargetable Test Generation FrameworkHCK0yeGQI-U44:14257M
DEF CON 26 - Johnson and Stavrou - Vulnerable Out of the Box - Evaluation of Android Carrier DevicesR2brQvQeTvM44:12117M
DEF CON 26 - Josep Pi Rodriguez - WingOS: How to Own Millions of Devices .fo88O1i-Z3M42:07150M
DEF CON 26 - Josh Mitchell - Ridealong Adventures: Critical Issues with Police Body CamerasX34taF1R7sU45:47144M
DEF CON 26 - Kim and Choi - Your Watch Can Watch You! Pitfalls in the Samsung Gear Smartwatch3IdgBwbOT-g36:31128M
DEF CON 26 - Ladar Levison, hon1nbo - Booby Trapping BoxesXrzIjxO8MOs42:14306M
DEF CON 26 - Lane Broadbent - Trouble in the Tubes How Internet Routing Security Breaks DownHIM4UwibBo446:27110M
DEF CON 26 - ldionmarcil - Edge Side Include Injection Abusing Caching Servers into SSRFVUZGZnpSg8I19:1851M
DEF CON 26 - Levinson and Borges - Ill See Your Missile and Raise You A MIRV04WeAwSQja046:29224M
DEF CON 26 - m010ch - Please Do Not Duplicate Attacking the Knox Boxf4rPDF993qs18:4733M
DEF CON 26 - Matt King - Micro Renovator Bringing Processor Firmware up to CodenN1f8gE7rV017:3084M
DEF CON 26 - Matt Wixey - Betrayed by the Keyboard How What You Type Can Give You AwayXt17ZlQbF9o40:1695M
DEF CON 26 - Nevermoe - One Step Ahead of Cheaters Instrumenting Android EmulatorsL3AniAxp_G420:0049M
DEF CON 26 - Nick Cano - Relocation Bonus Attacking the Windows LoaderSseZ_t9DToo32:35126M
DEF CON 26 - Orange Tsai - Breaking Parser Logic Take Your Path Normalization Off and Pop 0Days Out28xWcRegncw43:16130M
DEF CON 26 - Ossmann and Spill - Revolting RadiostCQaMrRuIqA44:57121M
DEF CON 26 - Panel - DC 101 PanellM8TaHwkgyw50:14144M
DEF CON 26 - Paternotte and van Ommeren - It WISNt Me Attacking Industrial Wireless Mesh Networks-WfP2VVhTt039:22142M
DEF CON 26 - Patrick Wardle - Fire and Ice Making and Breaking macOS FirewallsUlT5KFTMn2k20:0769M
DEF CON 26 - Patrick Wardle - The Mouse is Mightier than the SwordgLrB7enpbiw45:3983M
DEF CON 26 - Ricky HeadlessZeke Lawshae - Who Controls the Controllers Hacking CrestronBNAqdEpsYxc45:09227M
DEF CON 26 - Riedesel and Hakimian - Tineola Taking a Bite Out of Enterprise BlockchainxKYIde5jh_840:04173M
DEF CON 26 - Rob Joyce - Building Absurd Christmas Light Showsx64mrVwuuqs39:49132M
DEF CON 26 - Rob Joyce - NSA Talks CybersecuritygmgV4r25XxA43:5266M
DEF CON 26 - Romailler and Amiet - Reaping and Breaking Keys at Scale When Crypto Meets Big DataZ7cLRE6t1Q819:4595M
DEF CON 26 - Rousseau and Seymour - Finding Xori Malware Analysis Triage with Automated Disassembly-MaO-lmteeQ20:3374M
DEF CON 26 - Rowan Phipps - ThinSIM based Attacks on Mobile Money SystemsnvI1i9njjt033:3299M
DEF CON 26 - Ruo Ando - Asura PCAP File Analyzer for Anomaly Packets DetectionfJM-VWDRV6M22:2697M
DEF CON 26 - Sanat Sharma - House of Roman a Leakless Heap Fengshui to Achieve RCE on PIE BinariesbFHvcAWlfNA21:3441M
DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm BasebandU_awEXRp72k46:18120M
DEF CON 26 - Sean Metcalf - Exploiting Active Directory Administrator Insecuritiesze1UcSLOypw43:39125M
DEF CON 26 - Sheng Hao Ma - Playing Malware Injection with Exploit Thoughtszjtqs07kQgk21:23104M
DEF CON 26 - Shkatov and Michael - UEFI Exploitation for the MassesCxqNgjMZAbk45:05133M
DEF CON 26 - Si, Agent X - Wagging the Tail:Covert Passive SurveillancetYFOXeItRFM47:14207M
DEF CON 26 - singe - Practical and Improved Wifi MitM with ManaeYsGyvGxlpI37:5371M
DEF CON 26 - Svea, Suggy, Till - Inside the Fake Science Factoryras_VYgA77Q01:56:08421M
DEF CON 26 - The Dark Tangent - DEF CON 26 Closing CeremoniesN5_dNdp8SNc01:31:43974M
DEF CON 26 - The Dark Tangent - Welcome To DEF CON & Badge Maker TalkPQXCTOKRrNQ42:59341M
DEF CON 26 - The Dark Tangent and Panel - DEF CON GROUPSFkhPhFNb8EM44:06422M
DEF CON 26 - The Tarquin - Weaponizing Unicode Homographs Beyond IDNsEc1OOiG4RMA45:41112M
DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures-KHel7SyXsU40:2872M
DEF CON 26 - Truman Kain - Dragnet Your Social Engineering SidekickKXTZ4BMEzjo18:3088M
DEF CON 26 - UberKitten, magicspacekiwi - barcOwned Popping Shells with Your Cereal BoxWy79TLkqArg20:4679M
DEF CON 26 - Vincent Tan - Hacking BLE Bicycle Locks for Fun and a Small ProfitO-caTVpHWoY30:18102M
DEF CON 26 - Wesley McGrew - An Attacker Looks at Docker Approaching Multi Container Applications-Ug2vmRiI8g40:11118M
DEF CON 26 - William Martin - One Click to OWAFlx5KdHOhqc20:5659M
DEF CON 26 - William Martin - SMBetray Backdooring and Breaking SignaturesBTksOzOcPPk37:32235M
DEF CON 26 - Xiao and Panel - Hacking the Brain Customize Evil Protocol to Pwn an SDN ConSiZ-i8CxLic18:3166M
DEF CON 26 - yawnbox - Privacy Infrastructure Challenges and Opportunitiescs6a1i4Owic32:01146M
DEF CON 26 - Yu Wang - Attacking the macOS Kernel Graphics DriverTEKOm0J2sHQ35:24127M
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply ChainXeiET4FuGjE21:5469M
DEF CON 26 - Zeng and Panel - Lora Smart Water Meter Security Analysisb7ekygjC3so23:20106M
DEF CON 26 - zenofex - Dissecting the Teddy Ruxpin Reverse Engineering the Smart BearC7SIL_JNSto18:4451M
DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL ExploitsHsievGJQG0w48:14104M
DEF CON 26 - Zheng and Panel - Your Peripheral Has Planted Malware An Exploit of NXP SOCs0_E2NxpCAfw48:39108M
DEF CON 26 - Zhenxuan Bai and Panel - Replay Attacks on Ethereum Smart ContractsuBU3Myiauls39:03114M
DEF CON 26 = Richard Thieme - The Road to Resilience How Real Hacking Redeems a Damnable ProfessionWHpFSIYlVoc45:57155M
DEF CON 26 AI VILLAGE - Clarence Chio and Panel - Opening Remarks3WOKByCwViw03:1433M
DEF CON 26 AI VILLAGE - infosecanon - The Current State of Adversarial Machine LearningTlAUp1S-6W016:14166M
DEF CON 26 AI VILLAGE - Alex Long - AI DevOps Behind the Scenes of a Global AV CompanyeNpHytykSuw14:00103M
DEF CON 26 AI VILLAGE - Andrew Morris - Identifying and Correlating Anomalies in Internetwide ScanD09MkTeQfOQ23:08153M
DEF CON 26 AI VILLAGE - Andy Applebaum - Automated Planning for the Automated Red TeamzLVmbOdIhIs27:29189M
DEF CON 26 AI VILLAGE - Ariel Herbert Voss - Machine Learning Model Hardening For Fun and ProfitUyL3yN2R7hs17:57114M
DEF CON 26 AI VILLAGE - Aylin Caliskan - The Great Power of AI Algorithmic Mirrors of Societywr5EeYXA5ys35:37181M
DEF CON 26 AI VILLAGE - bodaceacat and Panel - Responsible Offensive Machine LearningWXSiExdfMKU36:37387M
DEF CON 26 AI VILLAGE - Brian Genz - Generating Labeled Data From Adversary Sims with MITRE ATT&CKe0UREvVVdPk38:25325M
DEF CON 26 AI VILLAGE - Chris Gardner - Chatting with Your Programs to Find VulnerabilitiesNuF8FnfFw8I13:1973M
DEF CON 26 AI VILLAGE - Clarence Chio and Panel - Closing Notes and PrizesV6owAidDwss00:528M
DEF CON 26 AI VILLAGE - drhyrum and Panel - Malware PanelEN9_YfBDwk825:16208M
DEF CON 26 AI VILLAGE - Fedor Sakharov - Detecting Web Attacks with Recurrent Neural NetworksiwE_yi2ndT432:41219M
DEF CON 26 AI VILLAGE - Ivan Torroledo - DeepPhish Simulating the Malicious Use of AIKOkAgRNBZmY15:27155M
DEF CON 26 AI VILLAGE - Kang Li - Beyond Adversarial Learning Security Risks in AI ImplementationsK_bAghxEXAc13:3987M
DEF CON 26 AI VILLAGE - Mark Mager - Rapid Anomaly Detection via Ransom Note File Classification_LLWBAABImE38:58351M
DEF CON 26 AI VILLAGE - Matt - It is a Beautiful Day in the Malware NeighborhoodhNC36piJ80Q27:27159M
DEF CON 26 AI VILLAGE - Raphael Norwitz - StuxNNet Practical Live Memory Attacks on Machine Learninglhi0CkoHGHY19:5653M
DEF CON 26 AI VILLAGE - Rob Brandon - JMPgate Accelerating Reverse Engineering Into HyperspaceR76ZN_kRn_c35:14198M
DEF CON 26 AI VILLAGE - Shankar and Kumar - Towards a Framework to Quantitatively Assess AI Safety_EM-Q4-ym5431:3080M
DEF CON 26 AI VILLAGE - Sven Cattell - Adversarial Patchesy1w2srpQ4u822:03152M
DEF CON 26 AI VILLAGE - TonTon Huang - Hunting the Ethereum Smart Contract Color Inspired InspectionvpeUD0muCB026:4783M
DEF CON 26 BCOS Monero Village - Shamiq and Panel - Greatest QuestionsvIQq1sAe0Dw01:04:41309M
DEF CON 26 BCOS - Monero Village - Welcome SpeechV8avoNBRbGE39:34402M
DEF CON 26 BCOS Monero Village - Anonimal - An Introduction to KovriPRSRHakFS3g01:44:26164M
DEF CON 26 BCOS Monero Village - Anonimal- Monero Projects Vulnerability Response ProcessRrCAuxXssRM22:16112M
DEF CON 26 BCOS Monero Village - Diego rehrar Salazar - Village SummaryGfpucsrX6Is44:45219M
DEF CON 26 BCOS Monero Village - Fluffy Pony - Moneros Emerging ApplicationsLjM3GTBaUvo42:23208M
DEF CON 26 BCOS Monero Village - Francisco ArticMine Cabañas - Scaling and Economic Implications0EKuEfOI86I01:02:09193M
DEF CON 26 BCOS Monero Village - Howard hyc Chu - Inside Monero9SuzXZj9FIk53:38402M
DEF CON 26 BCOS Monero Village - Justin Ehrenhofer - Examining Moneros Ring SignaturesSAzYkg3wuHs32:2567M
DEF CON 26 BCOS Monero Village - Marko Bencun - A Rundown of Security Issues in Crypto WalletsljSA51FZKdE25:12276M
DEF CON 26 BCOS Monero Village - Michael Schloh - We Dont Need No Stinkin BadgesV9fbWEfUpC823:55223M
DEF CON 26 BCOS Monero Village - Michael Schloh - We Program Our Stinkin BadgesAqC-zIKGYa801:07:08320M
DEF CON 26 BCOS Monero Village - Pearson and Honigwachs - Hacking a Crypto Payment GatewaypIzJ5OXo8M013:31111M
DEF CON 26 BCOS Monero Village - Philip Martin - BCOS KeynotelIGbNTbMd-A01:02:10689M
DEF CON 26 BIO HACKING VILLAGE - Erin Foster Hefley - Hacking Human Fetusesu8TYdVN3CZE37:14305M
DEF CON 26 BIO HACKING VILLAGE - Anne Kim - Selfie or MugshotJni4o947OjA37:14160M
DEF CON 26 BIO HACKING VILLAGE - BiaSciLab - WaterBot The Hackable Plant Control SystemAZ9uRYzTLOI19:21126M
DEF CON 26 BIO HACKING VILLAGE - Chris Roberts - Our Evolutionary Path in 45 Minutes9JnX1Ra0bLQ33:56186M
DEF CON 26 BIO HACKING VILLAGE - DAY ONEuDxVS8ok4Iw02:21:341G
DEF CON 26 BIO HACKING VILLAGE - Gerald R Scott - Workplace Accommodation for AutisicsZj7DR7JoPnU34:21308M
DEF CON 26 BIO HACKING VILLAGE - Guy Propper - Exploiting Immune Defenses Can Malware Learn from BioMYxBIy0hB1822:04152M
DEF CON 26 BIO HACKING VILLAGE - Joel Murphy - Biohacking Village Microfluidics BadgeNm4n-XhqERY14:3870M
DEF CON 26 BIO HACKING VILLAGE - John Dunlap - DNA Encryption Bioencryption to Store Secretssw_D-12S1G026:11156M
DEF CON 26 BIO HACKING VILLAGE - Michael Laufer - The Four Thieves Vinegar CollectiveFzqEJM8B0h451:53328M
DEF CON 26 BIO HACKING VILLAGE - Vee - PWN to Own My HeartskUydi_4bIA45:34114M
DEF CON 26 BIO HACKING VILLAGE -Vlad Gostomelsky - Jumping the Epidermal BarrierfZKAQ_HCvSI18:47175M
DEF CON 26 BLUE TEAM VILLAGE - Andy Applebaum - Stop Drop and Assess your SOCSMKVkpzGhOs40:3678M
DEF CON 26 BLUE TEAM VILLAGE - IrishMASMS - Evolving Security Operations to the Year 2020m-FcPVJ3x-041:3579M
DEF CON 26 BLUE TEAM VILLAGE - Rik van Duijn and Leandro Velasco - Open Source Endpoint Monitoringqs6sTVffx8Q42:3090M
DEF CON 26 BLUE TEAM VILLAGE - jtpereyda - Hacking Your Dev Job to Save the WorldXsJi_1LabJw36:0296M
DEF CON 26 BLUE TEAM VILLAGE - LadyRed6 - SAEDAY Subversion and Espionage Directed Against YouvSfTm5GVWDM49:20106M
DEF CON 26 BLUE TEAM VILLAGE - Plug, mwguy - How Not to Suck at Vulnerability Management at ScaleR5iP2dX88gE41:29158M
DEF CON 26 BLUE TEAM VILLAGE - rainbow tables - Automating DFIR The Counter Futurejr0ZWGM2TDk28:2249M
DEF CON 26 BLUE TEAM VILLAGE - sm0kem - Effective Log and Events Management3yYD3CYiwx420:2974M
DEF CON 26 BLUE TEAM VILLAGE - Xavier Ashe - Cloud Security MythsW_O7mziH3vM44:5287M
DEF CON 26 CAAD VILLAGE - Guo, and Cuevas - Recent Progress in Adversarial Deep Learningi_6YSQdq-K018:38116M
DEF CON 26 CAAD VILLAGE - Joseph Clements - Hardware Trojan Attacks on Neural Networks0At0g4IIbAQ24:38159M
DEF CON 26 CAAD VILLAGE - Zhao and Zhao - Adversarial 2 TraininggcrqC7M5uec11:3348M
DEF CON 26 CAAD VILLAGE - Zhuang Zhang and Panel - Weapons for Dog Fight Adapting MalwareSDg5FzTvyPM22:58125M
DEF CON 26 CAAD VILLAGE - Weilin Xu and Panel - The Vanishing Trick for Self driving CarsiUwQjm8x-5w27:30178M
DEF CON 26 CAAD VILLAGE - Alzantot and Sharma - Practical Adversarial Attacksttmm2yo74z832:39160M
DEF CON 26 CAAD VILLAGE - Hou and Zhou - Transferable Adversarial PerturbationsBIpz4n0RWO409:5258M
DEF CON 26 CAAD VILLAGE - Li and Jiao - How to Leverage the Open Source Information__5H-MopPts37:16169M
DEF CON 26 CAAD VILLAGE - Taori and Kamsetty - Targeted Adversarial Examples for Black Box AudioofPPObIXdpI21:43120M
DEF CON 26 CAAD VILLAGE - Xingxing Wei and Panel - Boosting Adversarial Attacks with MomentumPu2WQnU0GzA17:2878M
DEF CON 26 CANNABIS VILLAGE - Rex - Cruising Cannabis Highway Major Breaches in Cannabis Software0-jABMp5n4k35:56187M
DEF CON 26 CANNABIS VILLAGE - Adrian and Alex - An Overview of Hydroponic Grow TechniquesSkAnOUZFnok42:3289M
DEF CON 26 CANNABIS VILLAGE - Annie Rouse - The Real History of Marijuana ProhibitionxlectGfuPmQ42:37100M
DEF CON 26 CANNABIS VILLAGE - Beth Schechter - About the Open Cannabis ProjectIN8GUKVZQCg42:18224M
DEF CON 26 CANNABIS VILLAGE - Cristina Munoz - Weed Hacking A Pragmatic Primer For Home GrowsOia6me5QrbQ48:4294M
DEF CON 26 CANNABIS VILLAGE - Harry Moreno - Diagnosing Sick Plants with Computer VisionCsRYAUlb6_E21:1252M
DEF CON 26 CANNABIS VILLAGE - Keith Conway and Frank - The Invisible Hands Tending the Secret GreensaE317y990qI47:02275M
DEF CON 26 CANNABIS VILLAGE - Kevin Chen - THC Producing Genetically Modified Yeast1gUXtBuI-tY28:3679M
DEF CON 26 CANNABIS VILLAGE - Mark Lewis - Hacking Phenotypic Pathways In CannabisMg5qlHHCocY47:13102M
DEF CON 26 CANNABIS VILLAGE - Mayor Chad Wanke - Primer On Dealing with Local Gov for Legal CannabisSgKAoFgYIuo49:04128M
DEF CON 26 CANNABIS VILLAGE - Michael Hiller - The Ongoing Federal Lawsuit Against Jeff SessionsZHNC9QqT3wg39:0485M
DEF CON 26 CANNABIS VILLAGE - Weed Anon - Compliance and Infosec Within the Cannabis IndustryUE3KlV3p2l824:27159M
DEF CON 26 CAR HACKING VILLAGE - Ben - CANTTRn_Rz2JIYQ48:40267M
DEF CON 26 CAR HACKING VILLAGE - Ben - Misbehavior Detection in V2X Networksgipx2tR1v9c52:19122M
DEF CON 26 CAR HACKING VILLAGE - Ben Gardiner - CAN Signal Extraction from OpenXC with Radare2UoevuAS-4dM23:40255M
DEF CON 26 CAR HACKING VILLAGE - Dan Regalado - Meet Salinas, 1st SMS commanded Car Infotainment RATj3dfgTKa7pQ01:00:59232M
DEF CON 26 CAR HACKING VILLAGE - Eric Evenchick - Go Hack CarsPlOj0Mt-2NM14:17154M
DEF CON 26 CAR HACKING VILLAGE - Jerry Gamblin - So You Want To Hack A CarYFMqGyWyWCo12:0238M
DEF CON 26 CAR HACKING VILLAGE - KEVIN2600 - Grand Theft Auto Digital Key Hackingv6uCBNfIfMM45:41118M
DEF CON 26 CAR HACKING VILLAGE - Nathaniel Boggs - Automotive Exploitation SandboxbK3SFDKvkHQ22:48170M
DEF CON 26 CAR HACKING VILLAGE - Phil Lapczynski - Flash Bootloaders Exposing Automotive ECU updatesRQBf3x6SCu034:19131M
DEF CON 26 CAR HACKING VILLAGE - Vlad - Evidence Collection Automotive Driving Aids and Liabilityi3S9wiHF8c022:5070M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Adam Everspaugh - Revolutionizing Auth with Oblivious CryptoHVKHvndazbU26:4970M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Barnhart Magen and Caltum - JARVIS never saw it comingObz_FHriEnw45:4790M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Brendan OConnor - Probably an Irreverent Overview of GDPRiY1lu3ak27U52:40184M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Catarineu and Modi - Anonymous Rate Limiting in ServicesEblwm-h9sWs27:45111M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Caudill, Hornby - Announcing the Underhanded Crypto ContestSYUBOLIbxPE11:5427M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Christian Paquin - Integrating Post Quantum CryptoSCdaYAFx7hw46:4589M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Cowley and Taggart - Two Steps to Owning MFAi8Hj9TpFpjY47:4782M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Hardin and Dalsen - Rethinking Digital Privacy Education7-Z1HF4W90M16:4166M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Jeff Kosseff - Hamiltons Private Key American ExceptionalismudybyX0Vht452:34564M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Mahrud Sayrafi - Opportunistic OniontEQgkSuxNk419:2676M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Marie Fromm - Cloud Encryption How to not suck7q4Bi8SJmSE45:49208M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Matt Cheung - Prototyping Cryptographic ProtocolsrB8CyUYRE9g47:14188M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Nicholas Doiron - Geolocation and Homomorphic EncryptionySl2ywGiFkw20:3889M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Nox - Cicada What Puzzles Can Teach Us About CryptographysVU4k2gRe_Y34:3067M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Pigeon - Jailed by a Google SearchRcPpbWurw4U18:1931M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Reyes, Elazari, On Wont Somebody Think of the ChildrenkpntbgFbEcs23:57233M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Scott Arciszewski - No Way JOSE! Designing CryptographyRijGNytjbOI29:12120M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Shi and Cai - Building a Cryptographic Backdoor in OpenSSLqo5RPvL2UuQ12:3653M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Tess Schrodinger - Cryptography Codes and Secret Writingrj8y6sQavRE01:18:00250M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Urquhart - Hiding in plain sight Disguising HTTPS trafficpPu15-rYQw835:36119M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Wall, Frederickson - Library 4 Pairing-based TransformCryptoxo8rfF6o-Gw44:28207M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Wendy Knox Everette - Green Locks for You and MenfQG7GOCL-g20:1574M
DEF CON 26 CRYPTO AND PRIVACY VILLAGE - Yueting Lee - CATs A Tale of Scalable AuthenticationauADZBYcG1M20:4581M
DEF CON 26 DATA DUPLICATION VILLAGE - Mauro Caseres - Owning Gluster FS with GEVAUDANqU-9MsxjW7A26:28151M
DEF CON 26 DATA DUPLICATION VILLAGE - Lior Kolnik - The Memory Remains Cold Drive Memory ForensicssI6D_CrMr-Q24:22149M
DEF CON 26 DATA DUPLICATION VILLAGE - Andy Klein - Facts figures, fun from managing 100000 HDDsG4-cF1BMnTc57:42189M
DEF CON 26 DATA DUPLICATION VILLAGE - Jessica Smith - Beginners Guide to Musical Scales of Cyberwar3J6r59Tl7iI39:30172M
DEF CON 26 ETHICS VILLAGE - Ethical Disclosure and the Reduction of Harm6XkwY_F-9ko36:47221M
DEF CON 26 ETHICS VILLAGE - Accountability w⧸o accountability A censorship measurement case studyJHE8DTFzBP034:53367M
DEF CON 26 ETHICS VILLAGE - David Scott Lewis - Hack Back Not An Option But A NecessityGcgIfYLCrDQ01:32:51313M
DEF CON 26 ETHICS VILLAGE - Ethics for Security PractitionersbmqstIIna4o52:48544M
DEF CON 26 ETHICS VILLAGE - Ethics of Technology in Humanitarian and Disaster ResponseDWr6ou_751401:01:51293M
DEF CON 26 ETHICS VILLAGE - Nations and Nationalism and Cyber SecuritydLXsL1Fx9U401:28:26245M
DEF CON 26 ETHICS VILLAGE - Responsible Disclosure PaneloogQ1OwC05M46:09495M
DEF CON 26 HARDWARE HACKING VILLAGE - Commodore Z - The Cactus 6502 Blinkenlights 40 Years LateZlyHcgpL5aw50:09120M
DEF CON 26 HARDWARE HACKING VILLAGE - David Melendez Cano - Building Drones the Hard Way5GSxa_VgOvk35:12160M
DEF CON 26 HARDWARE HACKING VILLAGE - John Aho - WiFi Beacons will give you up1XoxtcBGga027:13147M
DEF CON 26 HARDWARE HACKING VILLAGE - Mike Davis - Hacking your HackRF4Gw7l0DBR0g19:5187M
DEF CON 26 HARDWARE HACKING VILLAGE - Salvador Mendoza - NFC Payments The Art of Relay & ReplayMVU3gbPnk0g26:3864M
DEF CON 26 ICA VILLAGE - Thomas VanNorman - A SOC in the SandboxI_npMq0o48013:1272M
DEF CON 26 ICA VILLAGE - Brandon Workentin - A CTF That TeachesQnbjqTv9zto29:48324M
DEF CON 26 ICA VILLAGE - Bryson Bort - TOR for The IOT aka TORT ReformKD0ZvYB72jQ30:01194M
DEF CON 26 ICA VILLAGE - DeSantis and Pacho - Analyzing VPNFilters Modbus Module2ds0yDzuLhs41:54228M
DEF CON 26 ICA VILLAGE - Harris and Aguayo - Securing Critical Infrastructure through Side ChannelhI93jhqXB0U28:39169M
DEF CON 26 ICA VILLAGE - Joe Slowik - Behavior Based Defense in ICS EnvironmentsiFOGPZazgFI35:35190M
DEF CON 26 ICA VILLAGE - Keiser and Barenz - How can industrial IoT be protectedDx3fFpYwokU20:23127M
DEF CON 26 ICA VILLAGE - Mike Godfrey - How We Cost Our Client 1 point 2M with 4 lines of codew6Ng8OEnI3g28:08112M
DEF CON 26 ICA VILLAGE - Monta Elkins - Disassembly and Hacking of Firmware Where You Least ExpectCYfNAG9MFY035:3583M
DEF CON 26 IoT VILLAGE - Amit Elazari - Internet of Laws Navigating to IoT Hacking Legal LandscapedFvICfeLueU36:43249M
DEF CON 26 IoT VILLAGE - Ben Nassi - Attacking Commercial Smart Irrigation SystemsM5S2-PdvGc439:24122M
DEF CON 26 IoT VILLAGE - David Tomaschik - Im the One Who Doesnt Knock Unlocking Doors from NetworkSwOy0zRW5Dk38:11220M
DEF CON 26 IoT VILLAGE - Dennis Giese - How to modify ARM Cortex M based firmware A step by step appQvxa6o2oNS047:03114M
DEF CON 26 IoT VILLAGE - Erez Yalon - Your Smart Scale is Leaking More than Your Weight-YnxRe_Y_bo30:3771M
DEF CON 26 IoT VILLAGE - John Dunlap - FPGAs a new attack surface for embedded adversariesRjd3DP5W8Z029:1366M
DEF CON 26 IoT VILLAGE - Lee and Park - Exploiting the IoT hub What happened to my homepo_NeAECffA34:5790M
DEF CON 26 IoT VILLAGE - Matt Wixey - Worms that fight back Nematodes as an antidote for IoT malwareSrVeLNGcbBE37:29203M
DEF CON 26 IoT VILLAGE - Ramgattie and Holcomb - IoT Village Keynote The Road To SOHOpelessly Broken04v2Us5eTLU27:25107M
DEF CON 26 IoT VILLAGE - Stephen Hilt - The Sound of a Targeted Attack Attacking IoT SpeakerszzgmWlCfCRU29:2282M
DEF CON 26 IoT VILLAGE - Veronica Schmitt - Internet of Medicine The ultimate key to Rooting the humvZLD6pUtqQM41:29143M
DEF CON 26 PACKET HACKING VILLAGE - Alex Stanev - wpa sec The Largest Online WPA Handshake DatabaseZjTmrakUc3o18:1741M
DEF CON 26 PACKET HACKING VILLAGE - Andrew Johnson - Building a Teaching SOCMCHbyVLHjAE18:0957M
DEF CON 26 PACKET HACKING VILLAGE - Caleb Madrigal - Mapping Wi Fi Networks and TriggeringGpfUe5slVqo35:3084M
DEF CON 26 PACKET HACKING VILLAGE - Chen and Yang - Grand Theft Auto Digital Key HackingTS9LOaFDRFE40:30239M
DEF CON 26 PACKET HACKING VILLAGE - Chris Hanlon - Holes in the Foundation of Modern Securityf4Is62csQQk24:58105M
DEF CON 26 PACKET HACKING VILLAGE - Ed Miles - Bitsquatting Passive DNS HijackingyKeB8c6Kz_g16:3588M
DEF CON 26 PACKET HACKING VILLAGE - Garett Montgomery - Target Based Security ModelnRNMH2AB-rM42:17234M
DEF CON 26 PACKET HACKING VILLAGE - gh057 - Microcontrollers and Single Board Computers for Hackingdm_GbEaB4hM28:1895M
DEF CON 26 PACKET HACKING VILLAGE - Gita Ziabari = How to Tune Automation to Avoid False PositiveshHmxZxJ-eEY17:4781M
DEF CON 26 PACKET HACKING VILLAGE - Hadar Yudovich, Panel - Tricking Hackers with OSINTVKwBlKoh8fE19:3439M
DEF CON 26 PACKET HACKING VILLAGE - Jay Turla - Car Infotainment Hacking Methodology, Attack SurfF0mYkI2FJ_430:55181M
DEF CON 26 PACKET HACKING VILLAGE - Kat Sweet = Rethinking Role Based Security EducationvDDWWAZ-GkE41:46391M
DEF CON 26 PACKET HACKING VILLAGE - Lokesh Pidawekar - An OSINT Approach to 3rd Party Cloud Servicesb9B3Dn40rQ022:20108M
DEF CON 26 PACKET HACKING VILLAGE - Muniz and Lakhani - Fishing for Phishers Enterprise Strikes BackPXd09Tj8CF443:31152M
DEF CON 26 PACKET HACKING VILLAGE - Pedro Fortuna - Protecting Crypto Exchanges From MIB AttacksngsR6ExHbmo51:17215M
DEF CON 26 PACKET HACKING VILLAGE - Robert Olson - Analysis of Cybersecurity Educational Standards6SKL0QWcFTc20:5750M
DEF CON 26 PACKET HACKING VILLAGE - Rogan Dawes - Mallet A Proxy for Arbitrary Traffic7kGFqYu07jg51:58225M
DEF CON 26 PACKET HACKING VILLAGE - Sam Erb - Defense in Depth The Path to SGX at AkamaigU6Zehq-eXM18:1588M
DEF CON 26 PACKET HACKING VILLAGE - Silas Cutler - Capturing in Hard to Reach PlacesSsAQJ-qx2EI14:0467M
DEF CON 26 PACKET HACKING VILLAGE - TryCatchHCF - PacketWhisper Stealthily Exfiltrating Data9CoZUulhiwo50:1398M
DEF CON 26 PACKET HACKING VILLAGE = Sen and Sinturk - Normalizing Empires Traffic to Evade IDSCz1duUCIM-g21:4258M
DEF CON 26 R00TZ ASYLUM VILLAGE - Day 1EDJGuJVIoZY01:37:46411M
DEF CON 26 R00TZ ASYLUM VILLAGE - Day 2-wcUTMqb8as01:43:29418M
DEF CON 26 RECON VILLAGE - Andrew Mohawk - KEYNOTE From Breach to BustdUC0IocFm4k36:33172M
DEF CON 26 RECON VILLAGE - Anshuman Bhartiya, Glenn Grant - Bug Bounty Hunting on Steroids7WYjSDZxFYc37:45203M
DEF CON 26 RECON VILLAGE - Caleb Madrigal - Mapping wifi networks for interesting traffic patterns4w8aS1VfAak21:1843M
DEF CON 26 RECON VILLAGE - chenb0x - Stalker In A Haystackx3QbTP0HTuQ34:1572M
DEF CON 26 RECON VILLAGE - Dino Covotsos - Hacking the international RFQ Process killthebuzzwords5ttxIMlNKDc28:21281M
DEF CON 26 RECON VILLAGE - Ethan Dodge - How WHOIS Data Uncovered $32b Connected to Mormon Churchp859ySfD7MQ16:3240M
DEF CON 26 RECON VILLAGE - evilbotnet - OpenPiMap Hacking the hackers with OSINT Raspberry PisT606xnmY1DA13:5364M
DEF CON 26 RECON VILLAGE - Jacob Wilkin - Mapping Social Media with Facial RecognitionejEkjbAyAMc07:5724M
DEF CON 26 RECON VILLAGE - Jennifer Roderick - 1983 Im born 2018 Im taking on the bad guysWmV_4Ys_uMk18:0985M
DEF CON 26 RECON VILLAGE - jhaddix - Emergent Recon fresh methodology and tools for hackers in 2011j6MNApbYtE01:07:42384M
DEF CON 26 RECON VILLAGE - Lloyd Miller - Applied OSINT For Politics Turning Open Data Into NewsRfT5-EPy7qc46:21292M
DEF CON 26 RECON VILLAGE - marc dacosta - Adventures in the dark web of government data8f4b9Ij6-cs28:1058M
DEF CON 26 RECON VILLAGE - mauroeldritch - I fought the law and law lost Video9k8qmH1lVrg43:43147M
DEF CON 26 RECON VILLAGE - mgianarakis - Supercharge Your Web Recon With CommonspeakGxkuBFUfnL821:5735M
DEF CON 26 RECON VILLAGE - Recon Village Team - Hackathon and CTF Prizes VideoEq2jax963xw11:5079M
DEF CON 26 RECON VILLAGE - Recon Village Team - Hackathon Product ShowcaseB-UQdIBOSa022:3883M
DEF CON 26 RECON VILLAGE - trustartech - WhiteRabbit Combining Threat Intelligence Public Blockchain-1Gn_qiMWpY27:1050M
DEF CON 26 RECON VILLAGE - Undisclosed - Targeted User Analytics and Human HoneypotsK6LJnr29JPo21:1864M
DEF CON 26 RECON VILLAGE - Undisclosed - Winning a SANS 504 CTF without winning a SANS CTF8_vWIBGebP821:10119M
DEF CON 26 RECON VILLAGE - upgoingstar and sudhanshu c - Closing NoteqTERuof4Mfc02:2416M
DEF CON 26 RECON VILLAGE - upgoingstar, sudhanshu c - Opening Note3UWQ1fEYAMg03:3524M
DEF CON 26 RECON VILLAGE - victoris - Prebellico 100 Perfect Passive Pre-engagement⧸Post Compromiseb5VpLUl0Yws37:51277M
DEF CON 26 RECON VILLAGE - WebBreacher - Core OSINT Keeping Track of and Reporting All the ThingsF2u6H90eMMg38:4460M
DEF CON 26 RECON VILLAGE - xillwillx - skiptracer Ghetto OSINT for Broke Hackers3mEOkwrxfsU27:25138M
DEF CON 26 RECON VILLAGE - yamakira - Building Visualisation Platforms for OSINT Data Using OSS_r-1Z3yQVa401:37:17212M
DEF CON 26 RECON VILLAGE -WebBreacher - Introducing YOGA Your OSINT Graphical AnalyzerApB1FibIquE15:24160M
DEF CON 26 SE VILLAGE - Aunshul Rege - Social Engineering Course Projects for Undergradszp5FxnuFg7g50:45105M
DEF CON 26 SE VILLAGE - Neil Fallon - MIster Sinatra Will Hack You NowcVx5Y1OE-KE50:5893M
DEF CON 26 SE VILLAGE - Billy Boatright - In-N-Out – That’s What It’s All AboutYJHR2XUGrpg36:0190M
DEF CON 26 SE VILLAGE - Chris Hadnagy and Panel - Hunting Predators SE Style9XTUbgaDBFg50:41446M
DEF CON 26 SE VILLAGE - Chris Roberts - Welcome to 2018 Full Speed to the Edge of the AbyssYAuRghpZyto50:26148M
DEF CON 26 SE VILLAGE - Hannah Silvers - My Stripper Name Is Bubbles SunsetxyF7VyFRqjY28:0763M
DEF CON 26 SE VILLAGE - Pongolyn - Swarm Intelligence and Augmented Reality GamingbPTymsk1I_E30:5057M
DEF CON 26 SE VILLAGE - Ryan MacDougall - From Introvert to SE The JourneyCHv3HwVMRg839:2386M
DEF CON 26 SE VILLAGE- Kathleen Mullin - Social Engineering From a CISOs PerspectiveF1sbd7hFFy431:05161M
DEF CON 26 VOTING VILLAGE - Diego Aranha - Return of Software Vulns in Brazilian Voting MachinesTkoCnyhmorg25:1853M
DEF CON 26 VOTING VILLAGE - Carsten Schurmann - A Comprehensive Forensic Analysis of WINVote VotingCXYCtSwkWf824:3999M
DEF CON 26 VOTING VILLAGE - J Alex Halderman - Election Security Threats and Solutions4K0YZcbbzhc27:1872M
DEF CON 26 VOTING VILLAGE - Jake Braun and Panel - Recap of Voting Village 2017 Lessons LearnedlJse3DNFbaY42:04188M
DEF CON 26 VOTING VILLAGE - Joseph Kiniry - Trustworthy Elections5s8SjbYbtdo27:2767M
DEF CON 26 VOTING VILLAGE - Maggie MacAlpine - Mechanics and Pitfalls of Auditing with ScannersvC5ycx1w90409:5861M
DEF CON 26 VOTING VILLAGE - Matthew Bernhard - Lightning Talk A Crash Course on Election Security9xVnP7dY2vA12:0658M
DEF CON 26 VOTING VILLAGE - Neal Kelley and Panel - State, Local Perspectives on Election SecurityhyTPB7OsYu855:33367M
DEF CON 26 VOTING VILLAGE - Robert Karas - Defending Election Security A National Security PriorityT9fIPgoikYw45:30485M
DEF CON 26 WIRELESS VILLAGE Aadvark and Panel Wardrivers Anonymous Video44OLG05smQw01:28:15458M
DEF CON 26 WIRELESS VILLAGE - recompiler - Attacking Gotenna NetworksNouu0hWIGho20:3961M
DEF CON 26 WIRELESS VILLAGE - Dunlap - Learning to Listen Machine Learning for Adaptive WirelessnctbeAfCZP828:5895M
DEF CON 26 WIRELESS VILLAGE - Pandeya and Temple - RFNoC Accelerating The Spectrum with the FPGAxG7Pin6otAU28:25122M
DEF CON 26 WIRELESS VILLAGE - Balint Seeber - SDR Basics ClassCCNzzedU3gE56:18174M
DEF CON 26 WIRELESS VILLAGE - Balint Seeber - SirenJack Cracking a Secure Emergency Siren System6OVo_6ZRo4Q55:25235M
DEF CON 26 WIRELESS VILLAGE - Eric Reuter - Introduction to Railroad TelemetryvloWB0LHT_455:41137M
DEF CON 26 WIRELESS VILLAGE - FAZ - Exploring the 802 15 4 Attack SurfacesU7PlIM-nEE20:0778M
DEF CON 26 WIRELESS VILLAGE - Handorf and Spill - Its not wifi stories in wireless REf3QfBm95dB458:37237M
DEF CON 26 WIRELESS VILLAGE - Kitchen and Kinne - Little Fluffy Pineapple CloudsI8Sir9VgmiE54:25108M
DEF CON 26 WIRELESS VILLAGE - ryan holeman - BLE CTFlx5MAOyu9N016:1668M
DEF CON 26 WIRELESS VILLAGE - stev0 - BSSI finding foxes with acoustic help piClickerBRf3WGekgHc16:4838M
DEF CON 26 WIRELESS VILLAGE - t0ddpar0dy - Hunting Rogue APs Hard LessonsjGYrE3Jw-e029:5653M
DEF CON 26 WIRELESS VILLAGE - Travis Goodspeed - Goodwatch UpdaterrwZjXIJ02M33:0770M
DEF CON 26 WIRELESS VILLAGE - wasabi - Can you hear me now DEF CONlhHM6TX2RrI36:1367M
DEF CON 26 WIRELESS VILLAGE - Zero Chaos and Mellendick - Blue SonarxIUdtlFRdKk47:22117M
DEF CON 26 WIRELESS VILLAGE - Zero Chaos and Wasabi - WEP and WPA Cracking 1018uZdajW1hdI57:19249M
DEF CON 27 Demo Labs CFP extended to May 12!uX5o7Xvo7Zg00:121M
DEF CON 28 Safe Mode Career Hacking Village - Bryson Bort - Entrepreneurial AdventuresxyEEvxJKd5E41:45138M
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - LIVE4J4RT4oMYdA47:51163M
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping Analyzing and Exploiting Physical Shopping CartfBICDODmCPI31:12189M
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge - LIVEig8NFHX8wgE46:35693M
DEF CON 29 - The Dark Tangent - Closing Ceremonies Livey0S417FXWTg01:53:241G
DEF CON 29 - Policy Panel - HACKERS INTO THE UN Cyber Discussions on War and Peace - LIVEDwpkF2alTOQ49:36785M
DEF CON 29 - Agent X - A look inside security at the New York TimesU2-8MNx8nsg49:28537M
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA KeysBRsXsUEIU7020:01193M
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS man Comes For Us AllNARJrwX_KFY40:09515M
DEF CON 29 - Barak Sternberg - Extension Land Exploits and Rootkits in Browser Extensions - LIVEn4iV_XMRNe837:25388M
DEF CON 29 - Barak Sternberg - Extension Land: Exploits and Rootkits in Your Browser ExtensionsPpSftQuCEDw48:55497M
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza: Writing Golang Malware3RQb05ITSyk45:29826M
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm WiresLiz9R_QxSgk45:11232M
DEF CON 29 - Brian Hong - Sleight of ARM: Demystifying Intel Houdini9oQ5XjA1aq044:02282M
DEF CON 29 - Cedric Owens - Gone Apple Pickin: Red Teaming MacOS Environments in 2021IiMladUbL6E52:04566M
DEF CON 29 - Chad Seaman - UPnProxyPot: Fake the Funk, Become a Blackhat Proxy, MITM their TLS...mHCGNUsrTf045:02418M
DEF CON 29 - Christian Dameff MD, Jeff Tully MD, Jessica Wilkerson, Josh Corman - Do No Harm - LIVEPf4HJNGcMXg01:23:37727M
DEF CON 29 - Christian Dameff MD, Jeff Tully MD, Jessica Wilkerson, Josh Corman - Do No Harm - PANELphtBJciRz5457:58584M
DEF CON 29 - Christopher Wade - Breaking Secure Bootloadersz4gIxdFfJDg40:58300M
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIPQofeTV39kQE34:55369M
DEF CON 29 - Cory Doctorow - Privacy Without MonopolydeRRR5B1hwI29:09546M
DEF CON 29 - Dan Petro - You're Doing IoT RNGZuqw0-jZh9Y40:04439M
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - LIVEjXJ9f9DBaVk44:30456M
DEF CON 29 - David Dworken - Worming through IDEspzqu_qaoNuY22:49172M
DEF CON 29 - Dimitry 'Op Nomad' Snezhkov - Use of Offensive Enclaves In Adversarial OperationsWWGkaGBtn2Q21:21312M
DEF CON 29 - Dimitry 'Op Nomad' Snezhkov - Racketeer Toolkit: Prototyping Controlled Ransomware OpsVJ8aqReB11820:38239M
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock - Hacking Humans with AI as a ServicetWWhRbzhkrg26:28272M
DEF CON 29 - Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau - eBPF, I thought we were friends!5zixNDolLrg48:54292M
DEF CON 29 - Hao Xing, Zekai Wu - How I use a JSON 0day to Steal Your Money on the BlockchainpUexrXOGCkE39:46438M
DEF CON 29 - hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation: Making a MessDlS_sl4hTWg45:36602M
DEF CON 29 - Ian Coldwater, Chad Rikansrud - Real Life Story of the 1st Mainframe Container Breakout7DXF7YDBf-g42:13107M
DEF CON 29 - Ian Vitek - Central Bank Digital Currency, Threats and Vulnerabilities-MK0bn3Ys_M53:37315M
DEF CON 29 - Ionut Cernica - Hack the hackers Leaking data over SSL TLSWNXEuFaRUkU19:28296M
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver VulnerabilityiWu_xHI4aDI42:35337M
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver VulnerabilityvdesswZYz-842:35337M
DEF CON 29 - James Kettle - HTTP2: The Sequel is Always WorserHxVVeM9R-M40:04230M
DEF CON 29 - Jeff Dileo - Instrument and Find Out: Parasitic Tracers for High Level LanguagesIy1BNywebpY21:56250M
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows9slRYvpKHp445:58551M
DEF CON 29 - Jesse 'Agent X' Krembs - A Look Inside Security at the New York Times - LIVEPbBxG2Npl-M47:21567M
DEF CON 29 - Kelly Kaoudis, Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing_o1RPJAe4kU39:38241M
DEF CON 29 - Laura Abbott, Rick Altherr -Breaking TrustZone M: Privilege Escalation on LPC55S69eKKgaGbcq4o49:25571M
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA EcosystemsL0w_aE4jRFw42:18316M
DEF CON 29 - Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 ConnectionssuxDcYViwao45:33442M
DEF CON 29 - Matthew Bryant - Hacking G Suite The Power of Dark Apps Script Magic - LIVE6YimrCDK19A42:42255M
DEF CON 29 - Matthew Bryant - Hacking G Suite: The Power of Dark Apps Script Magic6AsVUS79gLw43:51314M
DEF CON 29 - MAVSH - Attacking from Above - LIVECJZ2gCLopyU51:32407M
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 BadgeH3kdq40PY3s27:47410M
DEF CON 29 - Mickey Shkatov, Jesse Michael - High Stakes Updates: BIOS RCE OMG WTF BBQqxWfkSonK7M38:51375M
DEF CON 29 - Orange Tsai - ProxyLogon Just Tip of the Iceberg, New Attack Surface on Exchange Server5mqid-7zp8k47:37668M
DEF CON 29 - Panel - Rebooting Critical Infrastructure Protection - LIVEZLGBHxs7rTU49:57927M
DEF CON 29 - PatH - Warping Reality: Creating and Countering the Next Generation of Linux Rootkitsg6SKWT7sROQ43:05485M
DEF CON 29 - Patrick Wardle - Bundles of Joy: Breaking MacOS via Subverted Applications BundlesraSTgFqYaoc44:42633M
DEF CON 29 - Paz Hameiri - TEMPEST Radio Stationm9WkEwshNKc45:00539M
DEF CON 29 - Policy Panel - Ransomware’s Big Year From Nuisance to Scourge - LIVExpvtdJV5DnU51:07921M
DEF CON 29 - Rex Guo, Junyuan Zeng - Phantom Attack: Evading System Call MonitoringyaAdM8pWKG839:28227M
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW A Novel Covert Communication Scheme - LIVEJeTsJCfBE5U44:24439M
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW: A Novel Covert Communication SchemeoaLIo9HwW-g44:29170M
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E I E I CARcIcbAMO6sxo43:40204M
DEF CON 29 - Richard Thieme AKA neuralcowboy - UFOs: Misinformation, Disinfo, and the Basic TruthmExktWB0qz444:09603M
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee?JpL3lySZNeM45:58489M
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanningJl-CU6G4Ofc45:23361M
DEF CON 29 - Roy Davis - No Key No PIN No Combo No Problem Pwning ATMs For Fun and Profit9cG-JL0LHYw47:13420M
DEF CON 29 - Sagi Sheinfeld, Eyal Karni, Yaron Zinar - Using M(achine)ITM to Attack Active DirectorylYrNH5hmorY46:43390M
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try AttackVOIvEqjJNOY38:16293M
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - LIVEmeRL_JXDQpk27:06220M
DEF CON 29 - Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMIsDCIjcUEFj047:29265M
DEF CON 29 - Sheila A Berta - The Unbelievable Insecurity of the Big Data Stackvl9hk4fQdos41:33369M
DEF CON 29 - Shir Tamari, Ami Luttwak - New class of DNS Vulns Affecting DNS-as-Service Platforms72uzIZPyVjI26:12354M
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of VulnszpouLO-GXLo27:1281M
DEF CON 29 - Slava Makkaveev - I know how to take over your Kindle with an e-book1jM_r-pe8Ss18:59218M
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen_dXC_I2ybr443:00313M
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102 - LIVEBWXAmImiNZA45:12894M
DEF CON 29 - Thomas Roth - Hacking the Apple AirTagspaxErRRsrTU38:31145M
DEF CON 29 - Tianze Ding - Vulnerability Exchange: One Domain Account For More Than Exchange Server7h38rI8KT3045:46262M
DEF CON 29 - Tom Van Goethem, Mathy Vanhoef - Timeless Timing Attackss5w4RG7-Y6g42:27305M
DEF CON 29 - Tomer Bar, Eran Segal - 2021 Our Journey Back To The Future Of Windows VulnerabilitiesVxNi5pVDZU042:16401M
DEF CON 29 - Vivek Nair - Time Turner Hacking RF Attendance Systems To Be in Two Places at OnceNdAIeXy2zoY22:02336M
DEF CON 29 - Yuhao Weng, Steven Seeley, Zhiniang Peng - An Attack Surface Tour of SharePoint ServermVXrl4W1jOU43:17317M
DEF CON 29 - Zabrocki, Matrosov - Glitching RISC-V chips: MTVEC corruption for hardening ISAiz_Y1lOtX0852:45744M
DEF CON 29 - Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in AppleoAMZxKsZQp040:02214M
DEF CON 29 -Jiska, Alexander Heinrich - Wibbly Wobbly, Timey Wimey Whats Inside Apples U1 chipk1H7fiVlTPA39:37404M
DEF CON 29 -Joseph Gabay - DoS Denial of Shopping: Analyzing and Exploiting Shopping Cart SystemsLmSyb0kBvGE22:23367M
DEF CON 29 -Justin Perdok - Hi Im DOMAIN Steve, Please Let Me Access VLAN2lDCoyxIhTN835:08362M
DEF CON 29 Adversary Village - Abhijith B R - Village Kick OffkdSFjjPZFpo08:53143M
DEF CON 29 Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for PersistenceJ1liEq2R_rE29:13271M
DEF CON 29 Adversary Village - Carlos Polop - New Generation of PEAS9_fJv_weLU030:25450M
DEF CON 29 Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTsVAHBq2pKZGY44:44339M
DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework0Z3VadqyFiM46:51464M
DEF CON 29 Adversary Village - Daniel Isler - How I got COVID in a RedTeam SE and Physical IntrusionXhGfswtnzmY30:05408M
DEF CON 29 Adversary Village - David Hunt - Prelude OperatorkzeKtqxk3cM29:36410M
DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary SimulationsVorzjbpoQZc01:45:451G
DEF CON 29 Adversary Village - Gil Biton - Scaling Up Offensive PipelinesEHEohd2iZRA37:01498M
DEF CON 29 Adversary Village - Jonas Knudsen -Tool Demo: ImproHound Identify AD Tiering ViolationsFRSVu0GBR3w26:34267M
DEF CON 29 Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common revm6ygA5oPSQo47:53650M
DEF CON 29 Adversary Village - Juneau Jones - Game Theory: Understanding and Strategy and DeceptionOJb-omL2TtM25:00178M
DEF CON 29 Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC Failures with RedELK_7LJUjzdgiY45:41701M
DEF CON 29 Adversary Village - Mark Loveless - A Short History and An Example AttackXuNqM-0Ufx029:50491M
DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can69xsb_TeazA41:47435M
DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulationyi1epKf0lcM38:22468M
DEF CON 29 Adversary Village - Mauro Eldritch, Luis Ramirez - Everything is a C2 if you're braveTWcBySQgfBE41:44315M
DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversaryq-C_Pjbrgec30:37280M
DEF CON 29 Adversary Village - Samuel Kimmons - Intro to Adversary Emulationc9uUwNPCIDY30:39433M
DEF CON 29 Adversary Village - Sanne Maasakkers - Phish Like An APTeJPx-Vr-U8E29:38340M
DEF CON 29 Adversary Village - Sergey Chubarov - From OnPrem to the Cloud: Hybrid AD Attack PathHv2wZLb5Lsw34:21298M
DEF CON 29 Adversary Village - Shantanu Khandelwal - Red Team Credentials Recon: OLD with a TWISTBXD7ieT1V5k26:12342M
DEF CON 29 Adversary Village - Stephan Wampouille - Autonomous Lateral Movement8Wlj0a_Kqw013:2793M
DEF CON 29 Aerospace Village - Elizabeth Wharton - Lost In Space No one Can Hear Your Breachf-CIRpSpRDY58:52646M
DEF CON 29 Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747suo9nwfbbTFI21:49156M
DEF CON 29 Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced DataV0Vad2q6xUA25:46122M
DEF CON 29 Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox HuntingNkAkL3odXks39:34145M
DEF CON 29 Aerospace Village - Darren Cofer - Steal This Drone High Assurance Cyber Military SystemsX9rsv4YIShY24:3879M
DEF CON 29 Aerospace Village - James Pavur - Threat Modeling for Space Hitchhikers7FH6mb7iwIQ25:2786M
DEF CON 29 Aerospace Village - Jason Whelan - Defending the Unmanned Aerial VehicleGT-Fl4bKgXs25:4494M
DEF CON 29 Aerospace Village - Joshua Smailes - CPDLC Man in the Middle AttacksONV7OsoRLM024:26128M
DEF CON 29 Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training ModelsHlp8CQA5xJI19:2363M
DEF CON 29 Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real World AvionicsZ-WYRI4cBY415:1896M
DEF CON 29 Aerospace Village - Matt Gaffney - VDP in Aviation Experiences and Lessons LearntHH6EjTl7oJk30:14157M
DEF CON 29 Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you overoiQ6_vWOxqE29:58163M
DEF CON 29 Aerospace Village - Panel - Hack A Sat 2 The Good, The Bad and the Cyber SecurekjmiPyVSuSI30:48616M
DEF CON 29 Aerospace Village - Panel - True Story - Hackers in the Aerospace SectorpG5hWEwqQjY27:37250M
DEF CON 29 Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less TravelledopNmUR-889s27:5761M
DEF CON 29 Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System SoftwareYtExxB-ayo026:37118M
DEF CON 29 Aerospace Village - Steve Luczynski, Larry Grossman - Federal Perspective on AerospaceyeAFnhSnjIE30:00246M
DEF CON 29 BIC Village - Keith Chapman - The Action Plan for Cyber DiversityrjowVs_0XLc20:57157M
DEF CON 29 BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in Techh7y3-9VST7814:3936M
DEF CON 29 BIC Village - Nico Smith - 40 Cores and A CPUrd0LgoP9yo833:31194M
DEF CON 29 BIC Village - Ochaun Marshall - The OPSEC of ProtestingQaIqN8cvVRE26:58177M
DEF CON 29 Biohacking Village - Sounil Yu - Cyber Defense Matrix in Healthcare9ZecqDOxpp827:17124M
DEF CON 29 Biohacking Village - Aaron Guzman - OWASP & CSA IoT Impacting Medical Security9m1lFlBYUGM39:14108M
DEF CON 29 Biohacking Village - Alex Hoekstra - Open Source Vaccine Developer Kits VDKsVKlH-em9XaA28:16138M
DEF CON 29 Biohacking Village - Alex Pearlman - A Cohort of Pirate ShipsM0OWUcjv5v418:0283M
DEF CON 29 Biohacking Village - Alissa Knight, Mitch Parker - Playing with FHIRwrNyd60XPMg47:07131M
DEF CON 29 Biohacking Village - Andrea Downing -No Aggregation Without Representation_7eO0FoOk9M39:06292M
DEF CON 29 Biohacking Village - Christian Dameff, Jeff Tully - The Future State of HealthcarerRynLAr0Urk30:1880M
DEF CON 29 Biohacking Village - Jennifer Goldsack, Jessilyn Dunn - The Digital PhysiomeOXDz-ErBKKk48:54274M
DEF CON 29 Biohacking Village - Lucia Savage, @BadHippa -A Talk with @BadHIPPA,jREnTm2QeE442:08415M
DEF CON 29 Biohacking Village - Mariam Elgabry - Internet of Ingestible Things Security by DesignaVOytk6ItjE13:1178M
DEF CON 29 Biohacking Village - Matt McMahon, Shannon Lantzy - The Economics of CybersecurityKWMUHSYkZIc20:5680M
DEF CON 29 Biohacking Village - Mixæl Laufer - The Little ThingsL7cF98LtKbo25:44410M
DEF CON 29 Biohacking Village - Nia Johnson - Reflections on Race, Health, and EquityaS7hCyw9Q0Q45:58506M
DEF CON 29 Biohacking Village - Ohad Zaidenberg - Fishing or HuntingNcDtynphGA050:53218M
DEF CON 29 Biohacking Village - Panel - Cloud security for Healthcare and Life SciencesRtunCgVQoW401:03:22337M
DEF CON 29 Biohacking Village - Pia Zaragoza, Joel Isaac -HC Innovation with People of All AbilitiesdBxzye7iDP031:2092M
DEF CON 29 Biohacking Village - RedDragon - Chinese Military Bioweapons and Intimidation Operations0M14yenB4TQ32:21120M
DEF CON 29 Biohacking Village - Rob Suarez - Why you should join the Biohacking VillageF2l-5XkbWDs15:2495M
DEF CON 29 Biohacking Village - Thom Dixon - Securing the Internet of Biological ThingsrRtEiUJ-sH819:0662M
DEF CON 29 Biohacking Village - Vee Schmitt, Ken Kato - Red vs Blue vs GreenYH_kdkoJKjw38:29174M
DEF CON 29 Blockchain Village - Josh McIntyre - Subtle Ways to Lose Your CryptocurrencyP7Y_jpsn7kQ40:12179M
DEF CON 29 Blockchain Village - Anto Joseph - Flash Loans DemystifiedlxTwFmGlM3039:2185M
DEF CON 29 Blockchain Village - Byeongcheol Yoo - Will Secure Element Strengthen Crypto Wallets0rdpLlh13V444:45102M
DEF CON 29 Blockchain Village - Colin Cantrell - Scaling Blockchains A Novel ApproachLAxpGVkzIBI01:03:23239M
DEF CON 29 Blockchain Village - Dabao Wong - Understanding Unlimited Approval in EthereumOjbc_6_8JjA49:4080M
DEF CON 29 Blockchain Village - Gokul Alex, Tejaswa Rastogi - Preventing Sandwich AttackspRq1B9mMdkE01:05:19144M
DEF CON 29 Blockchain Village - Michael Lewellen - Ethereum Hacks & How to Stop ThemtyrGSQmJ-gk45:17134M
DEF CON 29 Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait AnalyzerzO0Y5ChlMXI25:1563M
DEF CON 29 Blockchain Village - Reddcoin & TechAdept - CTF Contestaoz3e_BClEI14:1589M
DEF CON 29 Blockchain Village - Shinchul Park, Seungjoo Kim - Blockchain as a Threat Modeling Tooleo1b1CohnD438:08127M
DEF CON 29 Blockchain Village - Yaz Khoury - Surviving 51 Percent Attackswgv9TFP6M5046:27159M
DEF CON 29 Blue Team Village - Henry - How do you ALL THE CLOUDS96tgp9ht5Ag26:17125M
DEF CON 29 Blue Team Village - Meisam Eslahi - Scope X Hunt in the OceanbDUZ5HuF63429:56192M
DEF CON 29 Blue Team Village - Ch33r10, Jorge Orchilles - BTV Presents Threat Report Roulette8viQbHQjJQM55:54410M
DEF CON 29 Blue Team Village - Charles Rumford - Uncomfortable NetworkingbMc2pvZMxAc30:35100M
DEF CON 29 Blue Team Village - Drimacus - Leveraging NGFWs for Threat HuntingWT5TCzzkINI23:30114M
DEF CON 29 Blue Team Village - Gert-Jan Bruggink - This is what we thought would happen in 2021a3UtMuz_GSA28:05283M
DEF CON 29 Blue Team Village - Igal Flegmann - I know who has access to my cloud, do youyCv799Tgr8U10:2754M
DEF CON 29 Blue Team Village - John Bambenek - Adventures in Pro Bono Digital Forensics WorkXEHHpb4wAwU51:55252M
DEF CON 29 Blue Team Village - Karl Lovink, - Use DNS to detect domains abused for phishingWtAS6i5Fp2M48:38408M
DEF CON 29 Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigansTFwHEfND8Xo36:14400M
DEF CON 29 Blue Team Village - Mark Morowczynski - Modern Authentication for the Security AdmingMjLC2PwKFo45:28301M
DEF CON 29 Blue Team Village - Mike Cohen - Velociraptor Dig DeeperTBWisjyP3zY34:37229M
DEF CON 29 Blue Team Village - muteki - Year of Mentoring BTV’s Meet a Mentor Turns One-6wG9oEPDu432:40184M
DEF CON 29 Blue Team Village - Rabbit - Structured Analytical Techniques for Improving Info SecIAHjwop8BE032:17184M
DEF CON 29 Blue Team Village - Renzon Cruz - Forensicating Endpoint Artifacts in Cloud Storage SvcsfvCX7DP8rw432:24206M
DEF CON 29 Blue Team Village - Sebastian Provost - Yeet the leet with OsqueryYJkkYLM5GXY47:32173M
DEF CON 29 Blue Team Village - Wendy Edwards - What Machine Learning Can and Can't Do for SecurityFfdnTJ0gVDs24:31117M
DEF CON 29 Car Hacking Village - Ben Gardiner - Commercial Transportation Trucking Hackingd7_vUB76NAI46:06629M
DEF CON 29 Car Hacking Village - Samir Bhagwat - Fuzzing CAN CAN FD ECU's and NetworkIMZ8DD4lTAY40:20390M
DEF CON 29 Car Hacking Village - Ben Nassi -Remote Adversarial Phantom Attacks on Tesla, MobileyeSZGz5jEW_YQ38:48402M
DEF CON 29 Car Hacking Village - Bill Hatzer - From CTF to CVEU4bmzbu436c36:03356M
DEF CON 29 Car Hacking Village - Don Hatfield - Build Automotive Gateways with EasenHp9cNLBC8I36:01325M
DEF CON 29 Car Hacking Village - Eric Gershman - Safety 3rd Defeating Chevy StabiliTrakkBWg4I9795w23:09243M
DEF CON 29 Car Hacking Village - Huajiang Chen, Wu Ming - Remotely Rooting Charging StationsxxrcM_lTvbw26:01227M
DEF CON 29 Car Hacking Village - Jay Turla - Bug Hunter's Guide to Bashing for Car Hacking Bug BashL7AwMhguR6s51:55522M
DEF CON 29 Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement7pnwpF94WCM30:04338M
DEF CON 29 Car Hacking Village - Lennert Wouters - Compromising the Tesla Model X keyless entryypQXtVQgxLo26:58273M
DEF CON 29 Car Hacking Village - Nick Ashworth - Vehicle ID and Tracking via Passive Keyless Entryb63CCwjYL4I50:43490M
DEF CON 29 Cloud Village - Rodrigo Montoro - CSPM2CloudTrail Extending CSPM Tools7HPXHNB95iU20:1334M
DEF CON 29 Cloud Village - Felipe Pr0teus - Hunting for AWS Exposed ResourcesuLI24keCKFs26:3166M
DEF CON 29 Cloud Village - Jayesh Singh Chauhan - Opening NoteeKkXNriy08w09:3322M
DEF CON 29 Cloud Village - Alexandre Sieira - Attack Vectors for APIs w AWS API Gateway Lambda AuthuovvDjfC9gg38:41119M
DEF CON 29 Cloud Village - Batuhan Sancak - Azure Active Directory Hacking Wars97xrQ5KxGrg39:0760M
DEF CON 29 Cloud Village - Cassandra Young - Exploiting the O365 Duo 2FA Misconfigurationf2sThEAA7xs13:4230M
DEF CON 29 Cloud Village - Daniel Prizmant - Windows Server Containers are BrokentdX5l67BcDo35:1385M
DEF CON 29 Cloud Village - Igal Flegmann - I know who has access to my cloud, do youAY8RBt5J1mg21:5385M
DEF CON 29 Cloud Village - Joshua - Understanding Google Cloud Misconfiguration Using GCP GoatLL3rhzWcJAE38:24100M
DEF CON 29 Cloud Village - Karl Fosaaen - Extracting all the Azure PasswordsOES9RU0WTH046:55114M
DEF CON 29 Cloud Village - Kavisha Sheth - AWS Cloud Attack Vectors and Security ControlsP1nTUY77wjU39:3784M
DEF CON 29 Cloud Village - Kevin Chen - PK WHYCou-3LC3L9g11:4591M
DEF CON 29 Cloud Village - Madhu Akula - Kubernetes Goat Kubernetes Security LearningxMy4ZkImE4k23:13105M
DEF CON 29 Cloud Village - Magno Logan - Workshop Kubernetes Security 101 Best Practices9cnG22GwkDs02:30:01460M
DEF CON 29 Cloud Village - Mazin Ahmed - Attack Vectors on Terraform Environments2mb12QDytP434:4668M
DEF CON 29 Cloud Village - Michael Raggo - Identifying Toxic Combinations of PermissionsRjFOI-iQCno34:36121M
DEF CON 29 Cloud Village - Mohammed Aldoub - Using Barq to Perform AWS Post-ExploitationRJR8r56tpN021:00110M
DEF CON 29 Cloud Village - Rami McCarthy - Cloud Security OrienteeringTysZX_tzU9I41:1594M
DEF CON 29 Cloud Village - Rod Soto - Detection Challenges in Cloud Connected Credential Attacks6emlF2aQKw046:2184M
DEF CON 29 Cloud Village - Wes Lambert - Onions In the Cloud Make the CISO ProudikQEgqt1q6s01:39:18311M
DEF CON 29 Cloud Village - Yuval Avrahami - WhoC Peeking under the hood of CaaS offeringsGRswD4bdYN416:1832M
DEF CON 29 Crypto and Privacy Village - Day 22tlXXuc2_H006:22:253G
DEF CON 29 Crypto and Privacy Village - Day 1MQtg0qg9VoM08:36:525G
DEF CON 29 Ham Radio Village - Bryan Fields - Spectrum Coordination for Amateur RadiofH-yyTZffAk01:05:06432M
DEF CON 29 Ham Radio Village - Eric Escobar - Getting started with low power⧸long distance CommsjHTc7oGM2wk24:0592M
DEF CON 29 Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radioatw9a7J8u_k21:16121M
DEF CON 29 Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer-btN8T6WvYg56:24225M
DEF CON 29 Ham Radio Village - Kurtis Kopf - An Introduction to RF Test EquipmentVo3tVjoYAFM01:13:563G
DEF CON 29 Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking9opTlr5TPsA37:32291M
DEF CON 29 HHV - rehr - Walkthrough of DC28 HHV Challenge SolutionsP-6XXUgvqng48:53291M
DEF CON 29 HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challenge 6MZnnKl8xDTw36:18426M
DEF CON 29 HHV - Bradan Lane - The PortaProg ProjectrAvEzyzbecs39:52392M
DEF CON 29 HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy CablessgwJ_oohjRU50:15357M
DEF CON 29 HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception CollidedKjVh-XUeYc17:03153M
DEF CON 29 ICS Village - Aaron Boyd - Living off the Land in an ICS OT Penetration TestDLKpsjtVvlc25:13103M
DEF CON 29 ICS Village - Dan Gunter - Consider the Data SourceQhFNcGuFRzM49:30168M
DEF CON 29 ICS Village - Dieter Sarrazyn - Fortifying ICS Hardening and TestingpujzX8vkkMU25:1085M
DEF CON 29 ICS Village - Don C Weber - Scripts and Tools to Help Your ICS InfoSec JourneyWxIn7fy4LK424:43154M
DEF CON 29 ICS Village - Hash Saehi - Smart Meters I'm Hacking Infrastructure and So Should YoufKnSU1eB_7422:07359M
DEF CON 29 ICS Village - ICS Village Opening and IntroductionQL_sZvwS7-w02:4811M
DEF CON 29 ICS Village - Javier Perez, Juan Escobar - ICS Intrusion KillChain Explainedbe8qnq93dZc28:44202M
DEF CON 29 ICS Village - Joe Slowik - Crippling the Grid Examination of Dependencies & Cyber VulnsMwsOCLtzH0A22:0547M
DEF CON 29 ICS Village - John Ellis, Julia Atkinson - Attract, Develop, & Retain ICS WorkforcePUM4ZnmMtBM12:4745M
DEF CON 29 ICS Village - Lauren Zabierek - Collaborative Cyber Defense & Enhanced Threat IntelDixZG7HCTt828:38293M
DEF CON 29 ICS Village - Mary Brooks - ICS Jeopardy2h2RmcjUY3M43:57168M
DEF CON 29 ICS Village - Meet Can Kilic - Do We Really Want to Live in the Cyberpunk WorldqbXpGfAsObY24:31161M
DEF CON 29 ICS Village - Nico Leidecker, Moritz Thomas - Building ICS Firing Range in Our Kitchen3C2iRzecnWI27:18180M
DEF CON 29 ICS Village - Otis Alexander - Highlighting the Importance of Detection ContextgR9EFvdSYqQ22:0575M
DEF CON 29 ICS Village - Panel - Protecting Critical Infrastructure from RansomwareXenfD667Flg54:49631M
DEF CON 29 ICS Village - Panel - ICS CTI Information Sharing Between Brazil and the United StatesUAbn3y4SX8M31:40299M
DEF CON 29 ICS Village - Panel - Students Performing ICS Security Assessments_5rDpbX0gnc24:08226M
DEF CON 29 ICS Village - PW Singer - Keynote Reading the Future with Useful FictiondHdkDINfpW029:21226M
DEF CON 29 ICS Village - Sara Fluchs, Vivek Ponnada - Top 20 Secure PLC Coding Practices5y0cq732zqk46:09208M
DEF CON 29 ICS Village - Seth Grove - Network Traffic Analysis with MalcolmJYpkbPVnatA01:37:06661M
DEF CON 29 ICS Village - Sharon Brizinov, Uri Katz - Down Exploiting Vulnerabilities In the OT CloudCOhXUjtCVMU30:0186M
DEF CON 29 ICS Village - Stefan Stephenson-Moe - Detecting Attackers with State Estimation_geVHVHUtFI27:18219M
DEF CON 29 ICS Village - Thomas Pace - Leveraging SBOMs to Enhance ICS Securityy-1MWtgGb4w28:32148M
DEF CON 29 ICS Village - Tim Yardley - Beetlejuice The Lessons We Should Have LearnedZaxjEmonLUA25:44126M
DEF CON 29 Payment Village - Vahagn Vardanyan - Racing CryptoexchangesFHnYo_BjNew12:4621M
DEF CON 29 Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds7m0C8n8ZMDo41:05179M
DEF CON 29 Payment Village - Meadow Ellis - Automated Tear MachineslNnxb5mnwyk40:36766M
DEF CON 29 Payment Village - Timur Yunusov - When businesses decide to enrol cryptocurrency cards9ZaHuV4erUE19:0839M
DEF CON 29 Recon Village - Kala Kinyon - OSINT for Sex WorkersNj-FqBapY2o23:02103M
DEF CON 29 Recon Village - Rae - Using OSINT to Aid in Human Trafficking and Smuggling Cases-cBNQGzVDeM30:17185M
DEF CON 29 Recon Village - Ritu Gil - So You Want to OPSEC, EhdaXNSvb_S3w23:1087M
DEF CON 29 Recon Village - Andy Dennis - Using Passive DNS for gathering Business Intelligence7egAj-8juK029:45113M
DEF CON 29 Recon Village - Anthony Kava - GOV Doppelgänger Your Häx Dollars at Work_Mo6U7_B7gs29:51222M
DEF CON 29 Recon Village - Ben S - Future of Asset Managementpvk4iOLKbaw41:07451M
DEF CON 29 Recon Village - Ladislav Baco - How Vigilant Researchers Can Uncover APT Attacks6PoroGGBt8E29:15117M
DEF CON 29 Recon Village - Manabu Niseki - Adversary Infrastructure Tracking with Mihari6bBmxsihyRA20:4696M
DEF CON 29 Recon Village - MasterChen - Can I Make My Own Social Threat ScoreCc-Y6TmTCHM29:01145M
DEF CON 29 Recon Village - Mauro Eldritch - Venator Hunting & Smashing Trolls on TwitterJaDvfAAzbhw47:03275M
DEF CON 29 Recon Village - Mishaal Khan - People Hunting A Pentesters Perspectivev7GWqQLoWvc28:14297M
DEF CON 29 Recon Village - Nick Roy - OSINT and the Hermit KingdomHLzv8TVMQHo42:01226M
DEF CON 29 Recon Village - Ryan Elkins - How to Build Cloud Based Recon Automation at Scalei2ouX0js9n845:16214M
DEF CON 29 Recon Village - Tushar Verma - The Bug Hunter’s Recon MethodologyYKFG4IAaTRo15:3855M
DEF CON 29 Recon Village - Utku Sen - Finding Hidden Gems via URL Shortener ServicesBlcORtyfKWk19:16141M
DEF CON 29 Red Team Village - A discussion about the Red Team Village CyberWraithHmYb9F-Npdw38:05381M
DEF CON 29 Red Team Village - CTF Day 2aYbkzPSNT5E04:40:562G
DEF CON 29 Red Team Village - Custom Mechanical Keyboard BuildLhAenkBXBjM01:23:171G
DEF CON 29 Red Team Village - Bruce Schneier - AI and Red Team Village Panelt1w8-_AHCGs01:36:29917M
DEF CON 29 Red Team Village - CTF Day 1ccLKzqBLmAg00:5010M
DEF CON 29 Red Team Village - CTF Day 3EpeO_wJ0JCI02:54:15944M
DEF CON 29 Red Team Village - CTF Recap and Upcoming Events3vZjOtFyUY025:37263M
DEF CON 29 Red Team Village - Panel - The future of AI, Machine Learning, and Offensive Securitygv0yMVFwCM401:00:14787M
DEF CON 29 Red Team Village - Russ Hanneman - Message about the Red Team Village CTFcwrlwetRz8k00:3912M
DEF CON 29 Voting Village - Brianna Lennon and Eric Fey - High Turnout, Wide MarginsOYCPQ7mUt6Y25:5460M
DEF CON 29 Voting Village - Barb Byrum - Hack the ConspiraciesgVC9zjZ6KnI26:52108M
DEF CON 29 Voting Village - BiaSciLab - Secrets of Social Media PsyOpskvPdQj-ikvA26:52111M
DEF CON 29 Voting Village - Bob Sullivan - A Journalist’s Perspective on Fake Newsp5gqmtTBe5410:4066M
DEF CON 29 Voting Village - Carsten Schürmann - How to Weaponize RLAs to Discredit an ElectionTxXMRWTpZlY31:09165M
DEF CON 29 Voting Village - Commissioner Thomas Hicks, EAC - Keynote RemarksctO-86QxBto19:33159M
DEF CON 29 Voting Village - Harri Hursti - Welcome RemarksAbo24w-CYR825:24101M
DEF CON 29 Voting Village - Harri Hursti - NH SB43 Forensic AuditxwlYmcUjB8k48:18296M
DEF CON 29 Voting Village - Kevin Skoglund - Are Barcodes on Ballots BadrO_OAcZYDQM29:5653M
DEF CON 29 Voting Village - Maurice Turner - Why Hacking Voters Is Easier Than Hacking Ballots5_pj8ZyixQ828:33326M
DEF CON 29 Voting Village - Sang Oun Lee - Keeping Your Information Security Policy Up to DatewNu4wAAQY-824:28140M
DEF CON 29 Voting Village - Sebastian Bay - Social Media Security = Election SecurityOWY9EC6jaNg20:5162M
DEF CON 29 Voting Village - Susan Greenhalgh - Wireless OdysseyGAt0-ZedlVY25:00122M
DEF CON 29 Voting Village - Tod Beardsley - A Deep Dive on Vulnerability DisclosurecP3HuNsIi4g27:06104M
DEF CON 29- Dennis Giese - Robots with lasers and cameras but no security Liberating your vacuumEWqFxQpRbv833:34123M
DEF CON 3 3 - Exploiting Vulns in EV Charging Comms - Jan Berens, Marcell Szakály, Sebastian KöhlerkQVszh5ER1M55:11233M
DEF CON 30 - Crypto and Privacy interview with SilklyY3bO1knSY04:07126M
DEF CON 30 - ICS Village InterviewmY7D1Kb-LIs05:38116M
DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer OverflowsMkfk2UcmA-838:52223M
DEF CON 30 - Jeffrey Hofmann - PreAuth RCE Chains on an MDM - KACE SMAvPVtC7VHEmU35:58228M
DEF CON 30 - LiveCTF - Day 3G5R912yhHGs03:51:052G
DEF CON 30 - Martin Doyhenard - Internet Server Error - Exploiting Interprocess CommunicationpLosVyt8L9Q48:26429M
DEF CON 30 - Melvin Langvik - Taking a Dump In The Cloud27fv-maYVm040:11636M
DEF CON 30 - Misinformation Village InterviewDhaIKxOpjxo02:1518M
DEF CON 30 - Nick Powers, Steven Flores – ClickOnce AbUse for Trusted Code ExecutioncyHxoKvD8Ck44:24675M
DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCspNNOUiR8EQo22:22451M
DEF CON 30 - Thomas Roth , Solana - JIT - Lessons from fuzzing a smart contract compiler8E7XOHQiRPE31:49183M
DEF CON 30 - Arik Atar - Top performing account crackers business modules, architecture, techniqueRUjofATOhFk44:57610M
DEF CON 30 - Asaf Gilboa, Ron Ben-Yitzhak - Abusing Windows Error Reporting to Dump LSASS-QRr_8pvOiY27:02363M
DEF CON 30 - Aviv Sassoon -The Journey From Isolated Container to Cluster AdminK3auibuYf4E35:40495M
DEF CON 30 - Dagan Henderson, Will Kline - The Call is Coming From Inside The Cluster0pN-x1q-PZs37:33441M
DEF CON 30 - RECON VILLAGE CTFhcjMOkTCn1M01:1533M
DEF CON 30 - A Random Walk around DEF CONs3Dy5lDLb1802:0823M
DEF CON 30 - Aaditya Purani, Max Garrett - ElectroVolt - Pwning Popular Desktop AppsOlq6XnZ4Pwo44:47333M
DEF CON 30 - Aerospace BadgeBU2_aLkopXo05:37115M
DEF CON 30 - Aerospace Village InterviewU-I_SxVCmKE01:4714M
DEF CON 30 - After Hours Vol. 1 - The Deluge6ilyMyCJTB001:4132M
DEF CON 30 - Andrew Logan - Tracking Military Ghost Helicopters over Washington DCKYuBf2HpXJg18:5252M
DEF CON 30 - App Sec Village InterviewZS2cemvD00U01:0010M
DEF CON 30 - Aviv Sasson - The Journey From an Isolated Container to Cluster Admin in Service FabricMX4S74AlLug43:16695M
DEF CON 30 - Behind the CTFwiPhvC_2oY003:2959M
DEF CON 30 - Ben Barnea, Ophir Harpaz - Exploring Ancient Ruins to Find Modern BugslDvNKHGPsJg45:26294M
DEF CON 30 - Ben Gardiner - Trailer Shouting - Talking PLC4TRUCKS Remotely with an SDRNa8K_fVEzQo43:49486M
DEF CON 30 - Bill Graydon - Defeating Moving Elements in High Security Keys3OmyVJDjTr445:45916M
DEF CON 30 - Blacks in CyberSecurity Village InterviewWrvuvW1b8gw04:07108M
DEF CON 30 - Blue Team VillageqA_LggJz5vI04:3881M
DEF CON 30 - Blue Team Village InterviewZyC4_R4qtYs09:11240M
DEF CON 30 - Car Hacking Village Interviewi-qhx2-dyyk04:38127M
DEF CON 30 - Car Hacking Village vol. 1V83A3qNV9Io03:2276M
DEF CON 30 - Cesare Pizzi - Old Malware, New tools: Ghidra and Commodore 64Dl7l7gdr34o46:22961M
DEF CON 30 - Chris Inglis, Kim Zetter - A Policy Fireside Chat with the National Cyber DirectorxWY0Yw8a7fM44:17819M
DEF CON 30 - Closing Ceremonies and Awards-354i0Sl8tA02:06:211G
DEF CON 30 - Cloud VillageYX6NtLXdbRA02:5574M
DEF CON 30 - Cloud Village interview8MYOOj7LpLU03:5481M
DEF CON 30 - ColdwaterQ - Backdooring Pickles: A decade only made things worselECEXFtVjig19:30265M
DEF CON 30 - Contests Closing Ceremonies and AwardsYN1MNQWFTTc58:49709M
DEF CON 30 - Cory Doctorow, Christian Dameff, Jeff Tully - Why Patients Should Hack Med Tech_i1BF5YGS0w43:34286M
DEF CON 30 - Crypto and Privacy Villageo0ms3NrCpNw03:1569M
DEF CON 30 - Daniel Jensen - Hunting Bugs in the TropicskMgXtuJdP3c43:22541M
DEF CON 30 - DEF CON After Hours Vol 2QP1pznODlSs02:0023M
DEF CON 30 - DEF CON CTF-S70ZdApfwU24:36328M
DEF CON 30 - DEF CON MusiccBTz0aiDYaQ02:0317M
DEF CON 30 - DEF CON Policy Dept - What is it, what are we trying to do for hackers in PolicyWorld?QuG4hqmPTMw59:46831M
DEF CON 30 - DEF CON X Hak5 collab!1sI_NkAimmE29:301G
DEF CON 30 - Demo Labsda5TFN8rR5E04:54111M
DEF CON 30 - Eran Segal - The COW Container On Windows Who Escaped the SiloXte4IKnRqao38:29339M
DEF CON 30 - Eugene Lim- You Have 1 New Appwntment - Hacking Proprietary iCalendar Properties2q-E2AKUxJ433:39274M
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)Uwwg4gKpy-M39:18208M
DEF CON 30 - Gamer HatMOM87FWMrMY00:5733M
DEF CON 30 - Girls Hack Village InterviewmTnclPn-diQ02:5716M
DEF CON 30 - Hadrien Barral - Emoji Shellcoding: 🛠️, 🧌, and 🤯E8puAkalMRQ43:29415M
DEF CON 30 - Ham Radio Village Interview 22IGEhg1bptE06:03189M
DEF CON 30 - Hardware Hacking Village InterviewTJn07pY_UwU08:54268M
DEF CON 30 - Harley Geiger, Leonard Bailey - Hacking Law is for Hackersduz7UXxR7tc01:27:39853M
DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Servicesv45_tkKCJ5418:12198M
DEF CON 30 - Jen Easterly - Walk This Way: What Run DMC & Aerosmith Can Teach On Future of CybersecOFDuhi7VClQ55:01489M
DEF CON 30 - Jonathan Leitschuh - Scaling the Security Researcher to Eliminate OSS VulnerabilitiesUgGhEfdUSvQ44:20293M
DEF CON 30 - Jose Pico, Fernando Perera - Wireless Keystroke Injection via Bluetooth Low Energy_gBwmN325GU37:06268M
DEF CON 30 - Joseph Ravichandran - The PACMAN Attack: Breaking PAC on Apple M1 with Hardware AttacksWRNZhP4CVgE37:28734M
DEF CON 30 - Kenneth Geers - Computer Hacks in the Russia-Ukraine Wary9cIiL-2IWc20:54115M
DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User TerminalmyKs04lfuy835:48565M
DEF CON 30 - LiveCTF - Day 2AJnPlFh_etI09:56:255G
DEF CON 30 - LiveCTF - Day 1 Part One1-J9rWFA8gg05:08:393G
DEF CON 30 - Lockpick Village InterviewPGfaBQ9sRm403:4519M
DEF CON 30 - Miana E Windall, Micsen - Digital Skeleton KeysG2EE_yA7OyI19:54153M
DEF CON 30 - Michael Bargury - Low Code High Risk - Enterprise Domination via Low Code AbuseD3A62Rzozq440:08349M
DEF CON 30 - Michael Bargury - No-Code Malware - Windows 11 at Your Servicee8PEIOa6W9M32:13386M
DEF CON 30 - Minh Duong - The Big Rick - How I Rickrolled My High School District, Got Away With It3PAauAy-Fb420:49298M
DEF CON 30 - MKFactor Badge talkA6bFMqx2LpU14:20247M
DEF CON 30 - Moritz Abrell - Phreaking 2.0 - Abusing Microsoft Teams Direct RoutingLXxcVi2MMe820:49139M
DEF CON 30 - Octavio Gianatiempo, Octavio Galland - Hidden Attack Surface of OEM IoT devicesveicfLvqcOs39:15276M
DEF CON 30 - Omri Misgav - Running Rootkits Like A Nation-State HackerxwMXDo0YDro23:45177M
DEF CON 30 - Packet Hacking Village Interviewslsw68EnsH800:593M
DEF CON 30 - Panel - Emerging Technical Cyber Policy TopicsZ_PbYH88d3k01:17:52947M
DEF CON 30 - Panel - Moving Regulation Upstream - Focus on the Role of Digital Service ProvidersxquZHy2ipGY01:55:011G
DEF CON 30 - Patrick Wardle, Tom McGuire - Deja Vu - Uncovering Stolen Algorithms in Commercial Prod_Alvk_Fmqc820:56319M
DEF CON 30 - Paul Roberts - Brazil Redux - Short Circuiting Tech-Enabled Dystopia Right to RepairX27Sw7r6gB801:16:341G
DEF CON 30 - Perimeter Breached! Hacking an access control system - Sam Quinn Steve PovolnyMGcSj5BKIz802:3070M
DEF CON 30 - Physical Security Village Interview8NL--ilPm5A06:15209M
DEF CON 30 - Red Team Village interviewX-vgG5zAd9M03:2634M
DEF CON 30 - RedAlert ICS CTFK-AWssR7OWA06:24167M
DEF CON 30 - Rogues Village Interview4wbjzXwMBc005:54125M
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor01oeaBb85Xc48:29146M
DEF CON 30 - Sam Quinn, Steve Povolny - Perimeter Breached Hacking an Access Control System2htQvpvFex443:10208M
DEF CON 30 - Samuel Erb, Justin Gardner - Crossing the KASM - a Webapp Pentest StoryNwMY1umhpgg32:07465M
DEF CON 30 - Scavenger Hunt - FlamethrowerOdiSma-BDGQ01:2737M
DEF CON 30 - Scavenger HuntW_h45WRHFYk01:2648M
DEF CON 30 - Sick Codes - Hacking the Farm = Breaking Badly into Agricultural Devicesz2_TLz9TpwY47:59234M
DEF CON 30 - Silk - Open Research InstitutewxmMrwFVc4g06:13155M
DEF CON 30 - Silk - BlacksinCyber Village Interviewgo4kkRIwjQ802:1552M
DEF CON 30 - Silk - Car Hacking TeamVwmKnlLKmBM05:1995M
DEF CON 30 - Silk - Darknet Team ChatLvvhvhqDV9k03:3888M
DEF CON 30 - Silk - DEF CON Memorial InterviewPv33I_GXOGA12:35223M
DEF CON 30 - Silk - Hack FortresscINgbB4IeQU06:13148M
DEF CON 30 - Silk - Hacker KaraokeCGoM35pojcU04:1650M
DEF CON 30 - Silk - How to Lock PickTmyRF_bcddI21:34426M
DEF CON 30 - Silk - nuucsodabRTS-NTT7iQ12:46297M
DEF CON 30 - Silk - Plane Hacking6DHi-qC1jww16:39444M
DEF CON 30 - Silk - XOR Machine7Ds8M38GqP802:5987M
DEF CON 30 - Silk vs. the NOC3HH1UibUBC404:40121M
DEF CON 30 - Silk- GoKartszf4oHEqAHQA04:05131M
DEF CON 30 - Slava Makkaveev - Digging into Xiaomis TEE to to Get to Chinese MoneyhuAJpikYBdk23:17321M
DEF CON 30 - stacksmashing - The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking8p3Oi4DL0eI20:13152M
DEF CON 30 - Stewart Scott, Trey Herr - Dragon Tails: Supply-side Security& Intl Vuln Disclosure LawuYTbxNtZ1z415:4382M
DEF CON 30 - Tamper Evident VillageslhdowWjSuU08:23184M
DEF CON 30 - Tarek Abdelmotaleb, Dr. Bramwell Brizendine - Weaponizing Windows SyscallsME7IGHPcSKw25:43780K
DEF CON 30 - The Dark Tangent and MK Factor - Welcome to DEF CON and The Making of the DEF CON Badge4Llav8BceRo41:17421M
DEF CON 30 - Thijs Alkemade - Process injection: breaking all macOS security layers w⧸a single vulnfjTvgPM0Tf039:19519M
DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations securityStSLxFbVz0M46:01926M
DEF CON 30 - Tristan Miller - Reversing the Original Xbox Live ProtocolsHLyZfZMu-5E49:45347M
DEF CON 30 - Violin Ninjar63ycQyA0cg03:3683M
DEF CON 30 - Voting Machine Village interviewBfmXTxf_4Xo01:5213M
DEF CON 30 - Voting Machine Village InterviewyL3yYk2UOEo09:54244M
DEF CON 30 - Wietze Beukema - Save Environment Variable - Hijacking Legit Apps w Minimal FootprintLxjnI5h_kls41:52314M
DEF CON 30 - Zachary Minneker - How To Get MUMPS Thirty Years Later - Hacking the Govt w FOIAd CodenSbN7p39SrA42:54741M
DEF CON 30 BiC Village - Alexis Hancock - The Man in the MiddlebIXFWZuMHr429:5798M
DEF CON 30 BiC Village - Birhanu Eshete - State of the Model7bKGljbnJQI59:23250M
DEF CON 30 BiC Village - Damian Grant - DEI in Cybersecurity Breaking through the barrier9pv3dqbTz4w20:0756M
DEF CON 30 BiC Village - Kassandra Pierre, Nathan Chung - Neurodiversity in CybersecurityXf2p0k8woGs46:12226M
DEF CON 30 BiC Village - Ochuan Marshall - The Last Log4J Talk You Ever NeedqGDpBCEKvlQ43:47391M
DEF CON 30 BiC Village - Segun Olaniyan- Growth Systems for Cybersecurity Enthusiastss-iLGZQTYaM59:43181M
DEF CON 30 BiC Village - Stephanie Barnes - A Bridge Across the Digital DividedRL9NtegG6M35:27211M
DEF CON 30 Blue Team Village - Anton Ovrutsky - Hunting Malicious Office MacroslrcAl_WD0HY29:23188M
DEF CON 30 Blue Team Village - Connor Morley - Malicious memory techniques on Windows & how to spot2Xw-wUWGWg859:34357M
DEF CON 30 Blue Team Village - Filipi Pires - Malware Hunting Discovering techniques in PDFAGr25lmSflk51:38350M
DEF CON 30 Blue Team Village - Gilmar Esteves, Filipi Peres - Horusec Brazilian SAST help Worldr6Q3zhqoboE21:11199M
DEF CON 30 Blue Team Village - Mark Morowczynski - Security posture of MacOS and Linux Azure ADPnXG6IT3zyA01:04:40382M
DEF CON 30 Blue Team Village - Matt Scheurer - Lend me your IR'smfkZZXTsBII58:32414M
DEF CON 30 Blue Team Village - Meisam Eslahi - Threat Hunt Trilogy A Beast in the ShadowAqk9SGPbI3c54:53476M
DEF CON 30 Blue Team Village - Project Obsidian - IR Final Reporting Made ExcitingRtuKU9SNFGg30:05169M
DEF CON 30 Blue Team Village - Project Obsidian - Kill Chain 3 Endpoint Forensics Walkthrought2h-Mz27iSI29:16294M
DEF CON 30 Blue Team Village - Project Obsidian - Mise En Place for Investigations47L9tS0eORE46:14290M
DEF CON 30 Blue Team Village - Project Obsidian - Using Chainsaw to Identify Malicious Activityd4YfkoqCV_s21:29246M
DEF CON 30 Blue Team Village - Project Obsidian - Creating a Custom Velociraptor Collector9CB5NmXghek17:56104M
DEF CON 30 Blue Team Village - Project Obsidian - CTH Hunting for Adversary's Schedulefn-Nd5MtUEA49:34416M
DEF CON 30 Blue Team Village - Project Obsidian - CTH Sniffing Compromise Hunting for Bloodhound1oco6TSaVRo41:07330M
DEF CON 30 Blue Team Village - Project Obsidian - CTH The Logs are GoneYN0dbIzWQNM36:27161M
DEF CON 30 Blue Team Village - Project Obsidian - CTI Generating Threat Intelligence from IncidentcYqToDl_W2A30:53158M
DEF CON 30 Blue Team Village - Project Obsidian - IR It all starts here, scoping the incident6R5BsxG_zSM38:21193M
DEF CON 30 Blue Team Village - Project Obsidian - IR OODA An hour in incident responder lifeyn9DmRMo_so34:05164M
DEF CON 30 Blue Team Village - Project Obsidian - REM Phishing In The Morning - Abundance of SamplesM6B88CZxViE35:51300M
DEF CON 30 Blue Team Village - Sarthak Tankja - Even my Dad is a Threat Modelerr4bdnuN84J023:23139M
DEF CON 30 Blue Team Village - Saurabh Chaudhary - YARA Rules to Rule them All-upNhwmNGp817:2875M
DEF CON 30 Blue Team Village -Project Obsidian - REM Long Walks On The Beach Analyzing PowerShellsG-7XB2333hE43:28267M
DEF CON 30 Blue Team Village -Project Obsidian - The Importance of Sysmon for Investigations2And6u5yxLw20:42143M
DEF CON 30 Blue Team Village- Project Obsidian - CTH Go Phish Visualizing Basic MalicePln9ZYafKyE41:05237M
DEF CON 30 Car Hacking Village - Ayyapan Rajesh - Security like the 80s How I stole your RFg4SxSTqv-Bk39:4074M
DEF CON 30 Car Hacking Village - David Rogers - Integrating Mileage Clocking Into a Simulator Rig9q2rHkiPwLk45:00531M
DEF CON 30 Car Hacking Village - Evadsnibor - Getting Naughty on CAN bus with CHV BadgeItPVA3x77EQ01:04:36648M
DEF CON 30 Car Hacking Village - Jay Turla - canTot A CAN Bus Hacking FrameworkOBC0v5KDcJg30:00295M
DEF CON 30 Car Hacking Village - Kamel - RFCommotion Invisible Serial Ports Flying Through the AirX59D3OangiM45:00428M
DEF CON 30 Car Hacking Village - Kartheek Lade - CANalyse 2.0 Vehicle Network Analysis & Attack Tooly0rGBc2jy7450:0091M
DEF CON 30 Car Hacking Village - Kevin2600, Li Swei - Biometrics System Hacking of the Smart Vehicle_mPW_iul97M40:00521M
DEF CON 30 Car Hacking Village - Mohammed Shine - Remote Exploitation of Honda CarsBKzkZPz3n_c30:00276M
DEF CON 30 Car Hacking Village - Soohwan Oh, Jonghyuk Song, Jeongho Yang - Smart Black Box FuzzingC1_ZIXZVIBg30:00247M
DEF CON 30 ICS Village SEAtf CompetitionUsPFuBt_GOY05:4872M
DEF CON 30 ICS Village - Fast Forwardb1VcOqaYs7c01:3143M
DEF CON 30 ICS Village - SEAtf SetupdouawM9UqHc01:1417M
DEF CON 30 Retail Hacking Village - Spicy Wasabi - Rock The Cash Boxpg3guV3UrY446:01161M
DEF CON 31 - Hacker Badges Interview - video team7lL1Fo3Wp5c04:0856M
DEF CON 31 - Smashing the State Machine the True Potential of Web Race Conditions - James KettletKJzsaB1ZvI42:18118M
DEF CON 31 - Tinfoil Hat Contest - Video TeamGxNJ9jEjyLE04:3049M
DEF CON 31 - Voting Village Interview - video teamTFu2pEWqO_410:36139M
DEF CON 31 - AI Village Interview - video teamrH_s0SpUQTM03:0084M
DEF CON 31 - An Audacious Plan to Halt the Internet's Ensh*ttification - Cory DoctorowrimtaSgGz_445:42301M
DEF CON 31 - Car Hacking Village - Exploiting Wireless Side Channels in EV Charging - Kohler, BakerAM4IRwWokwY44:46250M
DEF CON 31 - Car Hacking Village Interview - video team2YyyTkMdWik06:03128M
DEF CON 31 - Demystifying (& Bypassing) macOS's Background Task Management - Patrick WardleGOoqEVhvNw847:10153M
DEF CON 31 - Fireside Chat with the National Cyber Director - Kemba WaldenieKgIDOPyNw50:18521M
DEF CON 31 - Foxhunt Interview - video teamGwft7ZVlLLQ03:2534M
DEF CON 31 - From Feature to Weapon Breaking Microsoft Teams and SharePoint - Nestori SyynimaaQaf6JMXXvnU34:21182M
DEF CON 31 - Game Changing Advances in Windows Shellcode Analysis - Brizendine, Kersten, Hinceldg0K2wMxwE43:28561M
DEF CON 31 - Getting a Migraine - Unique SIP Bypass on MacOS - Or, Pearse, BohrazxZesAN-TEk42:39147M
DEF CON 31 - Hack the Box Interview - Video Teamk4ZV9v9nRBQ03:1142M
DEF CON 31 - Hack the Future - Why Congress & White House Support AI Red Teaming - Austin CarsonQWaW23sraZ845:03342M
DEF CON 31 - Hack-A-Sat Interview - video teamq2trWkuVSGw04:3644M
DEF CON 31 - Hacker Boxes Interview - video teamz13QA6n_N-002:0928M
DEF CON 31 - Hacker Court Interactive Scenario - winn0na, and PanelKoWeYEOSBOg59:41834M
DEF CON 31 - Hacker Memorial Interview - video teamuxkurgqx_ZI05:2788M
DEF CON 31 - HL7Magic Medical Data Hacking Made Easy - Katie InnsYFbAuhnUEQQ21:36194M
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris1JT_lTfK69Q45:04207M
DEF CON 31 - IOT Village Interview - video teamB8Tz9a-MJQo08:1660M
DEF CON 31 - J4 Gate, The Hustler Poker Cheating Scandal investigation - Scott Melnick6sCRRSBTyYA44:50252M
DEF CON 31 - Leveraging macOS Networking Frameworks to Heuristically Detect Malware - Patrick WardleBZhaTbF4W4k48:29296M
DEF CON 31 - LLMs at the Forefront Pioneering the Future of Fuzz Testing - Xk9gt7MNXPDY43:38587M
DEF CON 31 - Lockpicking Village Interview - video teamDsTEbsNM2G003:0826M
DEF CON 31 - Look Ma Im the CEO - Real Time Video and Audio Deep Fake -Gal ZrorW8fbKYjbFD420:53158M
DEF CON 31 - Meduza - Exiled Pirate Media Outlet Breaks Thru the Kremlin Propaganda Firewall - AlexpTRiT7je5fA33:35393M
DEF CON 31 - mTLS When Certificate Authentication Done Wrong Michael StepankinQNwQ90hI87419:2952M
DEF CON 31 - ndays are also 0days - Bohan Liu, Zheng Wang, GuanCheng LiN7QnYp1w1Xs39:50145M
DEF CON 31 - Packet Hacking Village - Pwning the Pwners with Mindware - Frank D9 DiGiovanniIfKRhIR9kng40:48226M
DEF CON 31 - Password Cracking Village Interview - video teamHFgIDy0ijLE06:0078M
DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade31xrNuH1RV437:00178M
DEF CON 31 - Policy How Hackers Can Work with Govt to Protect High Risk Communities - Panel90-o_mlUBms34:53196M
DEF CON 31 - Policy Village Interview - video teamjDgYDNqDPI004:0235M
DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chickk2Vx7hstOKY41:53214M
DEF CON 31 - Private Keys in Public Places - Tom Pohl7t_ntuSXniw40:06432M
DEF CON 31 - Private Until Presumed Guilty - Allison Young, Diane Akerman4FecAiofbHY44:49286M
DEF CON 31 - Prototype Pollution Leads to Remote Code Execution in NodeJS - Shcherbakov, BalliugCVTbfDecwI20:17110M
DEF CON 31 - Red Team Village Preview - video teamnCEGBQyMxK402:5862M
DEF CON 31 - Reproductive Justice in the Age of Digital Surveillance - McSherry, Bertash, BarnettGdn_jKdABo452:57882M
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew6j4en3EbP3w44:14125M
DEF CON 31 - Revolutionizing ELF binary patching w Shiva - ElfMasterTDMWejaucdg45:48243M
DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie KirkBq7Z3X4xwCE41:59172M
DEF CON 31 - Scavenger Hunt Interview - video team0nwYCaHS7TA05:4546M
DEF CON 31 - Second Breakfast Implicit & Mutation Based Serialization Vulns in NET - Jonathan Birchv0fraChyonQ35:04191M
DEF CON 31 - Securing Critical Versions of your Reality - Suzanne Borders Keenan SkellyOJ7a_dnKXnA45:39633M
DEF CON 31 - Shall We Play a Game - Craig MartellVLqu06vVDGA47:09710M
DEF CON 31 - Small Leaks, Billions Of Dollars - Nikolaos Makriyannis, Oren YomtovLfZcS_G-Zcs33:08363M
DEF CON 31 - Snoop On To Them, As They Snoop On To Us - Alan MeekinscO1JSzAdPM823:2275M
DEF CON 31 - SODA Machine with DualD - video teampmW6lMCEaJc02:2365M
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos7oAZK8x_mL045:01244M
DEF CON 31 - Spread Spectrum techniques for anti drone evasion David Melendez, Gabriela Garcia8Ng91UY3D2M41:26305M
DEF CON 31 - StackMoonwalk - Alessandro Magnosi, Arash Parsa, Athanasios Tserpelis_2lH90C2nOM39:41138M
DEF CON 31 - Still Vulnerable Out of the Box - Ryan Johnson, Mohamed Elsabagh, Angelos StavroumYLa1f6LoLI43:05256M
DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight BlueiGINoIYQwak01:10:13266M
DEF CON 31 - The Hackers, The Lawyers, And The Defense Fund - Geiger, Opsahl, McCain, Croc9Tqp-qJ0__Q43:36573M
DEF CON 31 - The Internals of Veilid, a New Decentralized Application Framework - DilDog, Medus4Kb1lKscAMDQ41:1692M
DEF CON 31 - Tin Foil Hat Contest Interviews - video teamE9bzhZQVtzM04:23112M
DEF CON 31 - Top Tips for new DEF CON Attendees - video teamezo0Lf-7l6M16:17132M
DEF CON 31 - Track the Planet! Mapping IDs, Monitoring Presence in the Azure Ecosystem - nyxgeek4AY5uS3yFjE31:56102M
DEF CON 31 - Turning my virtual wallet into a skimming device - Borgogno, BarrionuevoNGhamH4_CZY42:17504M
DEF CON 31 - Unlocking Doors from Half a Continent Away - Trevor Stevado, Sam HaskinsrogtZjpyoVQ37:57122M
DEF CON 31 - Unlocking Hidden Powers in Xtensa based Qualcomm Wifi Chips - Daniel WegemerQMO2vMBcx7Y36:5199M
DEF CON 31 - Unparalleled RDP Monitoring Reveal Attackers Tradecraft -Bergeron, BilodeauDjm53qUPhVY44:20340M
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis GieseAfMfYOUYZvc44:25182M
DEF CON 31 - VDA Shenanigans Attacking & Defending the Truck Part that Gets Left Behind - Ford, ReuyX0_e4Szn5s28:37169M
DEF CON 31 - Video Based Cryptanalysis Extracting Keys from Power LEDs - Ben Nassi, Ofek Vayner2a_vVt96JhE43:44127M
DEF CON 31 - Visual Studio Code is Why I Have Workspace Trust Issues - Chauchefoin, GerstesdiHfVhPso438:25247M
DEF CON 31 - War Stories - Finding Foes and Yourself with Latency Trilateration - Lorenzo Cococcia_iAffzWxexA20:4389M
DEF CON 31 - War Stories - Youre Not George Clooney, and This Isnt Oceans 11 - Andrew BrandtRRjre0dnOGQ44:18269M
DEF CON 31 - Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing - Joseph GabayiprBprAFXCk38:24446M
DEF CON 31 - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖK3T2Al3jdY3840:31212M
DEF CON 31 -DARPA AI Cyber Challenge Announcement - Perri Adams, PanelDFnxrsEvs7M21:26259M
DEF CON 31 Adversary Wars Interview - video teamPtK-01D6ozQ04:5549M
DEF CON 31 Car Hacking Village - How an Auto Security Researcher Had His Car Stolen - Tabor, TindellXZK5TvnJjXg45:37577M
DEF CON 31 Data Dupe Village - What 10 Years of Drive Stats Data Can Tell Us - Andy KleinYhWyaZ__fL845:26212M
DEF CON 31 Packet Hacking Village - OSINT for Physical Security Intelligence - Raggo, HosmerT6br9iG5PH437:51207M
DEF CON 31 Packet Hacking Village - The Importance of Arts and Crafts in ThreatOps - Pete HayR26pGUKU6ME43:39263M
DEF CON 31 Packet Hacking Village - WINE Pairing with Malware - Jared Strouds_YqtMhTr4k32:12198M
DEF CON 31 Policy - Blocking Pathways into Cybercrime Current Efforts, Future Opportunities - Panel16rrxMS7YX848:31322M
DEF CON 31 Policy - Demystifing Hacking for Government Officials - PanelMuo__x35ju847:53549M
DEF CON 31 Policy - A Global Approach to Tackling Software Resilience - PanelODzAs7eJ98801:47:401G
DEF CON 31 Policy - All Your Vulns Are Belong to Terms and Conditions -Baawazw6J7A51:53867M
DEF CON 31 Policy - Cyber Policy Adrift - Panel6Igptw_KDFA51:34704M
DEF CON 31 Policy - Navigating the Digital Frontier Advancing Cyber Diplomacy - PanelV93p147ag9854:49911M
DEF CON 31 Trailer!0klQiFT1BBE02:3750M
DEF CON 31 War Stories - A Different Uber Post Mortem - Joe Sullivan-Pqz3C9gNCw49:19339M
DEF CON 31 War Stories - A Series of Unfortunate Events - Ben Sadeghipour, Corben LeoHw5jSmmcDl034:09156M
DEF CON 31 War Stories - CON trolling the Weather - Paz Hameiri9R-mWbxMN4I37:50233M
DEF CON 31 War Stories - Cracking Cicada 3301 - Taiiwo, Artorias, Puck, TheClockworkBirdEU1ftYdZkkI41:58452M
DEF CON 31 War Stories - Designing RFID Implants Flipping the Bird Opens Doors - Miana Ella WindallOyRxapMjLP044:35283M
DEF CON 31 War Stories - Legend of Zelda Use After Free - Allan CecilrCxRjjLs6z046:43321M
DEF CON 31 War Stories - Living Next Door to Russia - Mikko Hypponenm9_feSPH47I47:46308M
DEF CON 31 War Stories - New Isn’t Always Novel Grep Your Way to $20K at Pwn2Own - Horseman, HanleyvBFKVUQvESM37:03204M
DEF CON 31 War Stories - Nuthin But A G Thang Evolution of Cellular Networks - Tracy Mosleyt4SHqKyDmH843:28254M
DEF CON 31 War Stories - The Risks of Pointing Out the Emperor is Buck Naked - Renderman, Tom DangfL1osBUEScY46:02199M
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper QuintinzccAvgC4UxU20:3061M
DEF CON 31 War Stories - UNConventional Cybercrime - Bad Treaty Becoming Law - Rodriguez, Budington8cANuTuAkds25:19108M
DEF CON 31 XR Village - The History of XR From Fiction to Reality - Starr Brown, Bob GourleyO1xhxAie7ac15:45209M
DEF CON 31 XRVillage - Fireside Chat - Brittan HellerNnwa_45AQbs49:15934M
DEF CON 31- Lions & Tigers and Fancy Bears, Oh My! A Cautionary Tale - Jen Easterly, Scott Shapirogj7CptsKXYU34:52347M
DEF CON 32 - How State Laws Meant to Protect Children Raise Other Risks - Anthony HendricksTuAZXkMCgXI21:59307M
DEF CON 32 - 1 for All, All for WHAD: wireless shenanigans made easy - Romain Cayre, Damien Cauquil4xjRgr4dbzU44:40459M
DEF CON 32 - 3DU Homo ex Machina - Lacey HarbourYvqWlZK_fks23:43414M
DEF CON 32 - A dive into world of Aircraft PKI - Matt Gaffneysjd5LrzHus025:06137M
DEF CON 32 - A Shadow Librarian: Fighting back against encroaching capitalism - Daniel MesseIJT6_OcY_dc43:02334M
DEF CON 32 - Abusing legacy railroad signaling systems - David Meléndez, Gabriela Gabs GarciaRHhyrcgm7n442:51680M
DEF CON 32 - Abusing Windows Hello Without a Severed Hand - Ceri Coburn, Dirk jan MollemamFJ-NUnFBac41:58207M
DEF CON 32 - Access Control Done Right the First Time - Tim ClevengerWscuQr5X1kc24:21256M
DEF CON 32 - AIxCC Closing CeremoniesFDVcF28PPnI37:51693M
DEF CON 32 - AMD Sinkclose-Universal Ring2 Privilege Escalation - Enrique Nissim, Krzysztof OkupskikEIJFsOgEBY43:34371M
DEF CON 32 - Analyzing the Security of Satellite Based Air Traffic Control -Martin StrohmeiervJWzTt2ANAQ24:05132M
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew BelliniYPcOwKtRuDQ54:12216M
DEF CON 32 - AppSec Considerations From the Casino Industry - Aleise McGowan, Tennisha Martink7odY9gCxaI18:22144M
DEF CON 32 - Atomic Honeypot-A MySQL Honeypot That Drops Shells - Alexander Rubin, Martin Rakhmanov8oAxv7UBZJA21:58231M
DEF CON 32 - Attacks on GenAI data & using vector encryption to stop them - Patrick Walsh, Bob WallLxg9YyFJ8s026:18169M
DEF CON 32 - Autos, alcohol, blood, sweat, & creative reversing obfuscated Car Modding tool - AtlasuKvkBchZkA040:52460M
DEF CON 32 - AWS CloudQuarry: Digging for secrets in public AMIs - Eduard Agavriloae, Matei Josephs7k3zOylPKbM39:32323M
DEF CON 32 - Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel - Vangelis StykasT5K4ABfzkhI38:58327M
DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggiodLOUzF6_Y5436:20293M
DEF CON 32 - Behind the Badge:How we used hardware to make AV badge - Adam Batori, Robert PafforddDFtkjYx0V821:02138M
DEF CON 32 - Bluetooth Blues: Unmasking CVE 2023-52709-The TI BLE5-Stack Attack - Kevin Mitchellmrb_3z5OP2M26:30204M
DEF CON 32 - BOLABuster-Harnessing LLMs for Automating BOLA Detection - Ravid Mazon, Jay Chen9bNv3XkhjQA32:40200M
DEF CON 32 - Breaching AWS Through Shadow Resources - Yakir Kadkoda, Michael Katchinskiy, Ofek Itachm9QVfYVJ7R837:11273M
DEF CON 32 - Breaking Boundaries: Popping Shells in the Airgap w $10 & Arduino Magic - Daniel BeardzqGB07UaI6A24:18138M
DEF CON 32 - Breaking network crypto in popular Chinese keyboard apps - Jeffrey Knockel, Mona WangRgCI3GOXLr048:34301M
DEF CON 32 - Breaking Secure Web Gateways for Fun and Profit -Vivek Ramachandran, Jeswin MathaimBZQnJ1MWYI47:09191M
DEF CON 32 - Breaking the Beam:Exploiting VSAT Modems from Earth - Lenders, Willbold, Bisping-pxmly8xeas39:39285M
DEF CON 32 - Bridging Space and Medicine - Fernando De La Peña Llaca8BC0oHu5QGQ35:31187M
DEF CON 32 - Building a secure resilient nationwide EV charging network - Harry Krejsa, Sarah HipelUmBNgn_9-zY22:54330M
DEF CON 32 - Bypass 101- Bill GraydonqY0Yb8_R3a022:28141M
DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Tom Cross, Greg ContigHqDEMrqTjE42:54212M
DEF CON 32 - Curious Case of Alice&Bob: What You Can Do as Digital Investigators - Catherine Ullmansp91zygVcmE53:53495M
DEF CON 32 - DC101 - PanelzGgPm2LeM8A45:08922M
DEF CON 32 - DEF CON Closing Ceremonies & AwardsGdeKrNlvG8g02:14:272G
DEF CON 32 - Defeating Secure Code Review GPT Hallucinations - Wang Zhilong, Xinzhi LuoWsRSzJsrWAw17:57211M
DEF CON 32 - Detecting persistent threats on Draytek devices - Octavio Gianatiempo, Gastón AznarezBiBMsw0N_mQ35:42222M
DEF CON 32 - Exposing the Occultations in Large Off-Grid Solar Systems - Dan Berte & Alexandru LazarwCt-93lEIME18:05190M
DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - StacksmashingcFW0sYSo7ZM36:54143M
DEF CON 32 - How To Keep IoT From Becoming An IoTrash - Roberts, Wysopal, Doctorow, Wheeler, GiesetA7bpp8qXxI46:421G
DEF CON 32 - Lessons Learned from Building & Defending LLM Applications - Javan Rasokat, Andra Lezza2-C7xSJ9rhI27:04195M
DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James KettlezOPjz-sPyQM42:3790M
DEF CON 32 - MaLDAPtive: Obfuscation and De-Obfuscation - Daniel Bohannon, Sabajete ElezajmKRS5Iyy7Qo46:42551M
DEF CON 32 - Manipulating Shim and Office for Code Injection - Ron Ben-Yizhak, David Shandalov-Z34ya4rb8A41:12333M
DEF CON 32 - Offensive Security Testing Safeguarding the Final Frontier - Andrzej OlchawaYtMutNk8RpY14:0184M
DEF CON 32 - OH MY DC Abusing OIDC all the way to your cloud - Aviad Hahamiasd33hSRJKU37:39140M
DEF CON 32 - On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) - Harriet FarlowpTSEViCwAig37:41683M
DEF CON 32 - Open Sesame: how vulnerable is your stuff in electronic lockers -Dennis Giese, braelynnGPODCSvZMyM40:08219M
DEF CON 32 - Open Source Hacker V. Government Lawyer - Rebecca Lively, Eddie ZaneskiTqLRpUmpBWY34:47644M
DEF CON 32 - Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows - samy kamkarR5nMqju6crY45:34242M
DEF CON 32 - Physical OSINT - Lukas McCulloughksbFhXdF2EI15:43100M
DEF CON 32 - Pick Your Poison: Navigating a secure clean energy transition - Emma StewartPZfM1ehcfmU30:45179M
DEF CON 32 - Porn & Privacy - ETRyuDq0cjap021:09240M
DEF CON 32 - Practical Exploitation of DoS in Bug Bounty - Roni Lupin Cartab7WlUofPJpU30:34383M
DEF CON 32 - Preparing for the Future: A Discussion of our Rapidly Evolving Threat Landscape - PaneldGSPysbdvJo13:32251M
DEF CON 32 - Process Injection Attacks w ROP - Bramwell Brizendine, Shiva Shashank Kusuma1Hx-PzyGtX022:47264M
DEF CON 32 - Programming a CTS-V Gauge Cluster into an ATS-V, out of pure spite - Varjitt JeevahnUG3hB0qVI15:1688M
DEF CON 32 - Psychic Paper: Making eink access badges accessible for anyone - Joshua HermanssLu8xHMwSk26:50162M
DEF CON 32 - QuickShell Sharing is caring abt RCE attack chain on QuickShare - Or Yair, Shmuel CohenwT9gyOeN6zY45:07372M
DEF CON 32 - Redefining V2G: How to use your vehicle as game controller -Timm Lauser, Jannis HamborgDh220NQIkaQ38:59274M
DEF CON 32 - Reflections on a Decade in Bug Bounties - Nikhil Shrivastava & Charlie Waterhouseh86p7pcZmL859:12828M
DEF CON 32 - Relative Path File Injection The Next Evolution in RPO - Ian Hickey3y_6oSZwLr029:10158M
DEF CON 32 - Reverse engineering and hacking Ecovacs robots - Dennis Giese, Braelynn Hacker_wUsM0Mlenc41:40271M
DEF CON 32 - Reverse Engineering MicroPython Frozen Modules - Wesley McGrewQXa29AJqdRc43:22281M
DEF CON 32 - RF Attacks on Aviation's Defense Against Mid-Air Collisions - G. Longo, V. Lendersp1H6-0clP7U26:21176M
DEF CON 32 - RFID 101 - Ege Feyzioglu & Andrew M0Zn5nj0NZVo20:56157M
DEF CON 32 - Safecracking for Everyone - Jared Dygert6qTLxglm2fs29:21183M
DEF CON 32 - SBOMs the Hard Way Hacking Bob the Minion - Larry PesceCxrwpij2MSQ20:54290M
DEF CON 32 - Secret Life of Rogue Device: Lost IT Assets on the Public Marketplace - Matthew BryantQgeEHdAmJDg30:15225M
DEF CON 32 - Secrets & Shadows: Leveraging Big Data for Vulnerability Discovery - Bill Demirkapi-KXgcWuv-Ug42:24391M
DEF CON 32 - Securing CCTV Cameras Against Blind Spots - Jacob ShamshB6rtwoyyrg16:08115M
DEF CON 32 - Securing Frontends at Scale;Paving our Way to Post XSS World - jen ozmen, Aaron ShimvEzLsRXjatw24:41241M
DEF CON 32 - Signature-Based Detection Using Network Timing - Josh Pyorre6lJ26UG9hLU42:43550M
DEF CON 32 - Simulating attacks against hydroelectric power plants - Julia Dewitz-WürzelbergerO48DBFT02eU22:40185M
DEF CON 32 - Small Satellite Modeling and Defender Software - Kyle Murbach42OjQtrJQ5s24:40159M
DEF CON 32 - Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back - S1nn3rgLOv67LlIQs30:34219M
DEF CON 32 - Sneaky Extensions The MV3 Escape Artists - Vivek Ramachandran, Shourya Pratap SinghAS_bSDxTU4w20:31125M
DEF CON 32 - So you wanna know how to make badges - c0ldbrup4zQ9oOQl9w46:09315M
DEF CON 32 - Social Engineering Like you’re Picard - Jayson E Streetkc25CttuDmw46:49239M
DEF CON 32 - Solving the Lover, Stalker, Killer Murder with strings, grep, and Perl - Anthony Kava_1GvHMlzXOY21:56374M
DEF CON 32 - Speed Bumps and Speed HacksP: Adventures in Car Mfg Security - Paulo Silva, David Sopasp8NMZoPM8Yc31:30183M
DEF CON 32 - Spies and Bytes: Victory in the Digital Age - General Paul M NakasoneFd6v9NXmszM44:101G
DEF CON 32 - Splitting the email atom exploiting parsers to bypass access controls - Gareth HeyesJERBqoTllaE36:15251M
DEF CON 32 - SQL Injection Isn't Dead Smuggling Queries at the Protocol Level - Paul GersteTfg1B8u1yvE38:13132M
DEF CON 32 - Sshamble Unexpected Exposures in the Secure Shell - HD Moore, Rob KingG7GwXu684JY45:23438M
DEF CON 32 - Stranger in a Changed Land - Tony SagerUCHguFqzAOQ29:20433M
DEF CON 32 - Student Engagement Doesn't Have to Suck - Dr Muhsinah MorrisdvV0y7gKCro24:20142M
DEF CON 32 - Sudos and Sudon’ts: Peering inside Sudo for Windows - Michael Torres-iNezAL_EF027:20217M
DEF CON 32 - Taming the Beast: Inside Llama 3 Red Team Process - Grattafiori, Evtimov, BittonUQaNjwLhAmo32:22217M
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix6SNy0u6pYOc32:29114M
DEF CON 32 - The edges of Surveilance System and its supply chain - Chanin Kim, Myounghun Pakv6VMEeUcqzo43:48301M
DEF CON 32 - The hack, the crash and two smoking barrels. - Thomas SermpinisMDndWJxfP-U39:38411M
DEF CON 32 - The Immortal Retrofuturism of Mainframes and How to Keep Them Safe- Michelle Eggers1upEyCKVpkI25:47181M
DEF CON 32 - The Interplay between Safety and Security in Aviation Systems - Lillian Ash BakernGDTVPnTDOw20:04155M
DEF CON 32 - The Past, Present, and Future of Bioweapons - PanelslpJQmm3L8k33:03204M
DEF CON 32 - The Pwnie AwardsjEexnbk9kaI49:41889M
DEF CON 32 - The Rise and Fall of Binary Exploitation - Stephen SimscHsRxkfxvq847:40351M
DEF CON 32 - The Risk and Reward of Distributed Industrial Control - Joe Slowik13o-MQtANpo26:35175M
DEF CON 32 - The Village Peoples' Panel What Really Goes On in a Village - PanelvRjB6TutzuM55:111G
DEF CON 32 - The Way To Android Root: Exploiting Smartphone GPU - Xiling Gong, Eugene RodionovBN07rjaNqXk46:18279M
DEF CON 32 - The wild and wonderful world of early Microprocessors w⧸a focus on 6502 - Michael BrownldsK81hGs_Q53:29321M
DEF CON 32 - The XZ Backdoor Story: The Undercover Op That Set the Internet on Fire - Thomas RocciahwuIb-Vv2Ew41:41316M
DEF CON 32 - Threat Modeling in the Age of AI - Adam ShostacktYOJeChUM4M26:25369M
DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater GardnerTqKb7h8VFcA50:37168M
DEF CON 32 - Tough Adversary Don’t Blame Sun Tzu - Gregory Carpenter, DrPHA-J3jGofYN822:45118M
DEF CON 32 - Transforming AppSec Protecting 'Everything as Code' - Kunal BhattacharyaWG_oXtUTEoI44:58594M
DEF CON 32 - Travel Better Expedient Digital Defense - Grey FoxJbnHaBY0sWM22:09177M
DEF CON 32 - Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters - Allan CeciljALLbBisg_843:49745M
DEF CON 32 - UDSonCAN Attacks Discovering Safety Critical Risks by Fuzzing - Seunghee HanzkoTwQRXMz023:29130M
DEF CON 32 - Unlocking the Gates Hacking a secure Industrial Remote Access Solution - Moritz Abrellfc6c2hP86Wk18:2547M
DEF CON 32 - Unlocking the Gates: Understanding Authentication Bypass Vulnerabilities - Vikas Khannagg5zsWyZJ9030:31168M
DEF CON 32 - Unsaflok: Hacking millions of hotel locks - Lennert Wouters, Ian Carroll4cx0RUV7i0s41:32234M
DEF CON 32 - Using AI Computer Vision in Your OSINT Data Analysis - Mike RaggoTK3A510jArc52:39333M
DEF CON 32 - Using EPSS for Better Management Vulnerability Management - Jerry Gamblin02ElRMhArcQ24:31127M
DEF CON 32 - V2GEvil: Ghost in the Wires - Pavel Khunt & Thomas Sermpinis aka Cr0wTomUi2etjRyrUE24:19155M
DEF CON 32 - War Games Red Team for OT Based on Real World Case Studies- Shishir GuptaUtz4o7CJmAU23:08126M
DEF CON 32 - Warflying in a Cessna - Matt Thomassen, Sean McKeeveranrgU7LjN1A24:28214M
DEF CON 32 - Web2 Meets Web3 Hacking Decentralized Applications - Peiyu WangQipdGm6HffM24:15136M
DEF CON 32 - Welcome to DEF CON 32 - The Dark Tangentvad7FiHlgMU20:16711M
DEF CON 32 - What History’s Greatest Heist Can Teach Us About Defense In Depth - Pete Stegemeyerpri4EJ0634c29:47349M
DEF CON 32 - What To Expect When You’re Exploiting: 0Days Baby Monitors & Wi-Fi Cams - Mager, FortecaY7ls4G46040:01141M
DEF CON 32 - Where’s the Money-Defeating ATM Disk Encryption - Matt BurchlF8NEsl3-kQ38:33240M
DEF CON 32 - Whose Slide Is It AnywayWZJJgkftzOs52:301G
DEF CON 32 - Why are you still using my server for your internet access - Thomas Boejstrup JohansenuwsykPWa5Lc39:09159M
DEF CON 32 - Windows Downdate: Downgrade Attacks Using Windows Updates - Alon LevievHHmxuxQ7bE835:17223M
DEF CON 32 - Winning the Game of Active Directory - Brandon ColleyM-2d3sM3I2o43:04665M
DEF CON 32 - Xiaomi The Money : Our Toronto Pwn2Own Exploit & BTS Story - Ken Gannon, Ilyes BeghdadiB0A8F_Izmj039:01287M
DEF CON 32 - XR for All: Accessibility and Privacy for Disabled Users - Dylan FoxLysMyDrOGn422:55376M
DEF CON 32 - You got a lighter I need to do some Electroporation - J. Utley, P. Rhodes, J. Hill-ad-Y18pY5427:14180M
DEF CON 32 - Your AI Assistant has a Big Mouth: A New Side Channel Attack - Yisroel MirskyI1RqhGGRmHY39:58307M
DEF CON 32 - Your CI CD Pipeline Is Vulnerable, But It's Not Your Fault - Elad Pticha, Oreen Livni3dHZ-l3XSsE25:44160M
DEF CON 32 -Ticking SQLi - IggybVKtcu82a8w25:08312M
DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad ShortmanzBP2deuPQTg53:21201M
DEF CON 33 - Breaking into thousands of cloud based VPNs with 1 bug -David Cash, Rich WarrenRNXCnJvE1Zg38:48143M
DEF CON 33 - Hard Hat Brigade Creations Q&A - MrBill, M0nkeyDrag0n, CoD_SegfaultPK6F4LdwwOU36:38163M
DEF CON 33 - Live Music - Thursday Night - N8-97xg_1a66E01:00:501G
DEF CON 33 Recon Village - A Playbook for Integration Servers - Ryan Bonner, Guðmundur Karlssonwgf5GKrY3nc22:0184M
DEF CON 33 Recon Village - Pretty Good Pivot - Simwindie6mykx1zS1yo37:50126M
DEF CON 33 Video Team - Torvik from Tulip Tree TechAdQwcvijMXA33:17266M
DEF CON 33 Voting Village - Risk Limiting Audits: What They Are and Aren't - Philip Starkf-QuFskAyOM58:04271M
DEF CON 33 - Bypassing Intent Destination Checks, LaunchAnyWhere Privilege Escalation - Qidan HekSJBEZkJ4vM46:31163M
DEF CON 33 - Decision Making in Adversarial Automation - Bobby Kuzma, Michael Odell9to68PN5rRU26:54155M
DEF CON 33 - How malicious packages on npm bypass existing security tools - Paul McCartyemhocCFs9N432:38152M
DEF CON 33 - How Nation-State Hackers Turn Human Error into Catastrophic Failures - N Case, J McCoy77AixFQKwVI36:03103M
DEF CON 33 - Mac PRT Cookie Theft & Entra ID Persistence - Shang-De Jiang, Dong-Yi Ye, Tung-lin LeeT13YfM8z0lE41:13248M
DEF CON 33 - Making a custom Hashcat module to solve a decade-old puzzle challenge - Joseph Gabay74_4Q329PH848:24341M
DEF CON 33 - The Missing Link: Draytek’s New RCEs Complete the Chain - O. Gianatiempo & G. AznarezCUZhORHp27U24:52108M
DEF CON 33 - 'We are currently clean on OPSEC' - The Signalgate Saga - Micah 'micahflee' Lee5VlhsT5Kbsk42:07141M
DEF CON 33 - 10 Years of IoT Village: nsights in the World of IoT - Stephen Bono, Rachael TubbsV23bcIGHe7k20:49218M
DEF CON 33 - 40 Years Of Phrack: Hacking, Zines & Digital Dissent -richinseattle, Netspooky, ChompieTW-D1I27E0842:30231M
DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' JacobszSBf2CMKlBk39:56105M
DEF CON 33 - Access Control Done Right the First Time - Tim Clevenger6OFZjlym4r022:5195M
DEF CON 33 - Access to secure dependency management everywhere w Nix- T Berek, F Zakaria & D BakerCdNrvUrG_HM53:01869M
DEF CON 33 - All your keyboards are belong to us! - Federico LucifrediKeNBWILSlC437:34225M
DEF CON 33 - Amber64 - Mining Hacker History from Over 500k Commodore 64 Disks - Wesley McGrewPqPMyhA4NSI44:13203M
DEF CON 33 - AppleStorm - Unmasking the Privacy Risks of Apple Intelligence - Yoav MagidBNmJ3qBP9GE38:21270M
DEF CON 33 - Ask EFF - Cooper Quintin, Lisa Femia, Thorin Klosowski, Alexis Hancock, Hannah ZhaoQmkyPl2UZHY48:35951M
DEF CON 33 - AutoDetection & Exploitation of DOM Clobbering Vuln at Scale - Zhengyu Liu, Jianjia YuJL2PT1Dac3g37:42244M
DEF CON 33 - Automated Unpacking & Deobfuscation of Nested VM-Based Protectors - Agostino PanicouCZRf3v3EUI38:41146M
DEF CON 33 - Back to Basics: Building Resilient Cyber Defenses - Yael GrauerY4ziT89VmAk21:3972M
DEF CON 33 - Bare Metal Reverse Engineering - SolaSeczfxKbsLKb3E22:0594M
DEF CON 33 - BiC Village - B I C Pick DEF CON 33 Badge Walkthrough - Eli McRaeBczXjBh6bsM14:4484M
DEF CON 33 - BiC Village - Embedded System Design vs Traditional Software Design - Ian G HarrisS4jr6k52sNU49:46252M
DEF CON 33 - BiC Village - Breaking Down Bias in the Cyber Stack - Kaleeque Pierce, Jess HoffmanOEMnm1GAYlQ01:00:30557M
DEF CON 33 - BiC Village - Cyber Game Changers Women Who Lead, Secure and Inspire - PanelqN9qduX-fFM43:13287M
DEF CON 33 - BiC Village - Following Threat Actors Rhythm to Give Them More Blues - Malachi WalkerF_BTn1FjbHU37:11201M
DEF CON 33 - BiC Village - From Wake Island to the War Room - Nykolas MuldrowtWaBeES6b5425:53100M
DEF CON 33 - BiC Village - How AI Is Revolutionizing Phishing Attacks & Defenses - Levone Campbell7IFsoRaYYgs32:30232M
DEF CON 33 - BiC Village - How Basketball Officiating Shaped a Cybersec Career - Jason BrooksXbSK6mvNL8c29:24158M
DEF CON 33 - BiC Village - Petty Proteins When Molecules Go Rogue& Why Cyberbiosecurity - Tia PopeZqjADCvE5UQ41:01197M
DEF CON 33 - BiC Village - Price of Progress: Ethical Cybersecurity in Tech Communities - Joy Toney98LptR2jhqM43:59197M
DEF CON 33 - BiC Village - The African Cybercrime Economy -Remi AfonIfmVPqBUAMc46:46265M
DEF CON 33 - BiC Village - The Truth, Whole Truth and Nothing b⧸t Truth of Cybersec - Louis DeweavermU9djJSqdBQ57:00390M
DEF CON 33 - Bio Cryptography is the Game Genie in a post quantum dystopia - James Utley, PhDZx0G6znf_qQ19:3578M
DEF CON 33 - Blurred Lines: Evolving Tactics of North Korean Cyber Threat Actors - Seongsu Parkj5gxdWd5sMg26:5290M
DEF CON 33 - Breakin 'Em All – Overcoming Pokemon Go's Anti Cheat Mechanism - Tal Skverer2En96Cg9BFw47:24107M
DEF CON 33 - Breaking into thousands of cloud-based VPNs with one bug - David Cash, Rich Warren1mTg32BTZlA38:48148M
DEF CON 33 - Breaking Wi-Fi Easy Connect: A Security Analysis of DPP - George ChatzisofroniougMNZiDfeRPQ40:48225M
DEF CON 33 - Building a Malware Museum - Mikko Hypponenu7-OFXLLsmU40:11196M
DEF CON 33 - Building Onramps for Emergency Web Archiving in Ukraine and Beyond - Quinn Dombrowski4uV61EHLKKA35:49163M
DEF CON 33 - Building the first open source hackable Quantum Sensor - Mark Carney, Victoria KumaranldgMBEnJxms43:43242M
DEF CON 33 - Bypassing Intent Destination Checks, LaunchAnyWhere Privilege Escalation - Qidan Hee7UnYV-m23c46:31172M
DEF CON 33 - Carding is Dead, Long Live Carding - Federico Valentini, Allesandro StrinoJSDwexw90zs37:32125M
DEF CON 33 - Carding, Sabotage & Survival: A Darknet Market Veteran’s Story - Godman666tZwaPDqXTgs42:18214M
DEF CON 33 - Cash, Drugs, and Guns - Why Your Safes Aren't Safe - Mark Omo, James RowleyN3SXVOVUD1s41:54140M
DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew BrandtMsRo12h0mrg35:11119M
DEF CON 33 - China's Health Sector Ambitions and Info Needs - Amelia Shapirobp4E9ri5Xd425:08101M
DEF CON 33 - Client or Server? Hidden Sword of Damocles in Kafka - Ji'an Zhou, Ying Zhu, ZiYang ' LiSa6Onq53TsY34:12122M
DEF CON 33 - Cloned Vishing : A case study - Katherine RackliffeJPCKg_3XLP818:53109M
DEF CON 33 - Conjuring Hardware Failures for Cross-ring Privilege Escalation - Christopher DomasB6dC_KVLn6Q45:02235M
DEF CON 33 - Context Aware Anomaly Detection in Automotive CAN Without Decoding - Ravi RajputVchCd-o25z018:4160M
DEF CON 33 - Countering Forensics Software by Baiting Them - Weihan Goh, Joseph Lim & Isaac SoonnUh9GVVhjD823:04122M
DEF CON 33 - Creating a Virtual Ship Environment Optimized for Cybersecurity Use - Jeff GreerWHD8NAY9BhU23:0094M
DEF CON 33 - Critically Neglected: Cybersecurity for buildings - Thomas Pope-ElW725i8z423:12127M
DEF CON 33 - Crossing the Line: Advanced Techniques to Breach the OT DMZ - Christopher NourrieQf7oNWKGL2I17:2067M
DEF CON 33 - Cryptocurrency Opening Keynote - Michael Schloh MsvB, Chad Calease & Param D Pithadia6fPUzKlZDfA25:28101M
DEF CON 33 - Cryptocurrency Weekend Keynote Chelsea Button, Alfonso Tinoco & Elaine ShiBGuaIun8qiA25:4086M
DEF CON 33 - CTRAPS-CTAP Impersonation, API Confusion Attacks on FIDO2 - M Casagrande, D AntonioliWZChYxX5i_I37:25245M
DEF CON 33 - Cyber Volunteering&Community Defense 1 yr in - DC Franklin - S Powazek, J Braun, A OgeeLdiawBeYOCc45:31246M
DEF CON 33 - Cybersecurity in Latin America - Stories of Resilience & Innovation - Giovanni Forerobr2RPtCOzB017:1075M
DEF CON 33 - Dark Capabilities - When Tech Companies Become Threat Actors - Greg Conti, Tom CrossI5N7Ro-aTh438:33135M
DEF CON 33 - Data Duplication Village - Fungible Threats - Mauro Edritch, Nelson ColontAKcNZNxy5g32:03242M
DEF CON 33 - Data Duplication Village - Tracking 300K+ Drives -4TZ3F5bv2T001:00:00501M
DEF CON 33 - DC101 Panel - Alethe Denis, Nikita Kronenberg , zziks, Nicole Schwartz, Nina Alliia-LpnWwc8Y35:08402M
DEF CON 33 - DDoS: The Next Generation - Andrew CockburnVlOUGECw6kc38:13285M
DEF CON 33 - Dead Reckoning: Hijacking Marine Autopilots - Carson Green & Rik ChatterjeetFrZ75IECjg20:30119M
DEF CON 33 - Deepfake Image and Video Detection - Mike RaggoGPqL9_muXJA48:46141M
DEF CON 33 - Defending Reddit at Scale - Pratik Lotia & Spencer KochyGYR-tE0ljw26:27120M
DEF CON 33 - Designing and Participating in AI Bug Bounty Programs - Dane Sherrets, Shlomie Liberowe109g1uauCg51:53240M
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson6U_CepoMSl423:55103M
DEF CON 33 - Elevators 101 - Bobby Graydon, Ege FeyziogluLrzGrp8L1XI36:44199M
DEF CON 33 - Emulating Embedded Linux Devices at Scale w LightTouch Firmware Rehosting - S Polkef-LTMUFQzjQ38:27132M
DEF CON 33 - Escaping the Privacy Sandbox wClientside Deanonymization Attacks - Eugene Lim-oaH8XE_yMQ34:38198M
DEF CON 33 - Escaping the Privacy Sandbox with Client Side Deanonymization Attacks - Eugene LimcFFhHXPsilw25:56153M
DEF CON 33 - Evolution of Drain Attacks - Utvecklas & GeorgeY3IohAauLfE21:2370M
DEF CON 33 - Examining Access Control Vulnerabilities in GraphQL: A Feeld Case Study - Bogdan TironmPo-an8BUXc25:1989M
DEF CON 33 - Exploiting Security Side Channels in E2E Encrypted Msngrs - G Gegenheuber, M GuntherBgneDTH81EY40:42177M
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick WalshO7BI4jfEFwA48:22132M
DEF CON 33 - Fear vs Physics: Diagnosing Grid Chaos - Emma Stewart930l_omgN1w20:04114M
DEF CON 33 - Fighting a Digital Blockade: View from Taiwan - Herming Chiueh, Jason Vogt, Frank SmithCvMVJjPcusI38:33251M
DEF CON 33 - Finding and Exploiting Kernel Vulnerabilities in the eBPF Subsystem - Agostino PanicoTXs5F-7-2aE36:01174M
DEF CON 33 - Fingerprint-Based Bot Blocking & Dynamic Deception - Adel KarimiG7twgn-gi9k43:18146M
DEF CON 33 - Fingerprinting Maritime NMEA2000 Networks - Constantine Macris TheDini & Anissa EliasLbIAmMXCjZ025:33124M
DEF CON 33 - Firmware Decryption: For, and By, the Cryptographically Illiterate - Craig HeffnerTcxVExGxEtk20:53402M
DEF CON 33 - From Pwn to Plan: Turning Physical Exploits Into Upgrades - ShawnNURO3NgtXUQ55:43239M
DEF CON 33 - From Shanghai to the Shore: Threats in Global Shipping -K Miltenberger, N Fredericksenohre4ObUzoo20:4792M
DEF CON 33 - Full Disclosure, Full Color: Story of This Year's BBV Badge - Abhinav PandagalePYFssJoDP1c24:37109M
DEF CON 33 - Game Hacking 101 - Julian 'Julez' DunningXSzXaD6A73s39:56176M
DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin YukItqWJHN_dI39:43133M
DEF CON 33 - Ghost Calls - Abusing Web Conferencing for Covert Command & Control - Adam CrosserYVoF_mI8MIw42:04219M
DEF CON 33 - Go Malware Meets IoT - Challenges, Blind Spots, and Botnets - Asher DavilaTtPicirB6G447:36227M
DEF CON 33 - Gold Bug - Puzzle Panel with Friends - The Gold Bug Team 2025V_w5u9lONN053:47270M
DEF CON 33 - Hacker Jeopardy FridayG6WNcAK29hw01:56:191G
DEF CON 33 - Hacker Jeopardy Saturday5gGUh9-oPhk01:38:311G
DEF CON 33 - Hacker v. Triage - Inside Bug Bounty Battleground - Richard Hyunho Im, Denis SmajlovićD6p8-XAHOJU46:45203M
DEF CON 33 - Hacking a head unit with malicious PNG - Danilo ErazoQKHJZ1K-7p023:50109M
DEF CON 33 - Hacking Context for Auto Root Cause and Attack Flow Discovery - Ezz Tahounk2r3JrodFaI01:03:45298M
DEF CON 33 - Hacking Hotel Locks: The Saflok Vulnerabilities Expanded -Noah Holland, Josh StiebelZODLZuy6H4U38:04191M
DEF CON 33 - Hacking OBD II Emissions Testing - ArchwispjVkgYkZV8Co13:3885M
DEF CON 33 - Hacking Space to Defend It: Generating IoBs with SPARTA - Brandon BaileyUL_c4K5dTuc25:35121M
DEF CON 33 - Hacking the Nautical Rules of the Road Turn Left for Global Pwnage - Amp & DataWDPOk0GxxEo25:40123M
DEF CON 33 - Help! Linux in my Webcam! (•_•) - Mickey Shkatov, Jesse MichaelrO785smLLrU41:25214M
DEF CON 33 - Here and Now: Exploiting the Human Layer at the Right Moment - Daniel IslervvDostysRAU20:47126M
DEF CON 33 - HoloConnect AI - From Space to Biohacking - Dr. Fernando De La Peña LlacaNVr-rO4aJL413:5559M
DEF CON 33 - How a vuln in dealer software could've unlocked your car - E Zveare, R PiyushU1VKazuvGrc35:22118M
DEF CON 33 - How AI + Hardware can Transform Point of Care Workflows - PamirAIjVFOiYCBcvc20:4480M
DEF CON 33 - How AI + Hardware can Transforming Point-of-Care Workflows - PamirAI-5bArYeJ3sU12:5258M
DEF CON 33 - How API flaws led to admin access to 1k+ USA dealers & control of yr car - Eaton ZveareqNuS0rvqc8c22:2667M
DEF CON 33 - How Computers Kill People: Marine Systems - Michael DeVolld & Austin Reids1-4KoND6wM21:04111M
DEF CON 33 - How Extra Features In Contactless Payments Break Security, What We Can Do - Tom Chotia_fGpR4Fqni035:03370M
DEF CON 33 - How Not to IoT:Lessons in Security Failures - Zoltan "zh4ck" BalazsTTdK1lbM5VI43:27197M
DEF CON 33 - How NOT to Perform Covert Entry Assessments - Brent White, Tim RobertsDNP_fHTMy8455:51198M
DEF CON 33 - How to Fake a Badge like a Pro: Counterfeiting Event Credentials - Russell PhillipsWq09JxymiFQ21:21164M
DEF CON 33 - How to secure unique ecosystem shipping 1 billion+ cores? - Adam Zabrocki, Marko MiticKhWtkZmOPn437:05136M
DEF CON 33 - HTTP 1 1 Must Die! The Desync Endgame - James 'albinowax' KettlePUCyExOr3sE36:31138M
DEF CON 33 - Hull Integrity: Applying MOSAICS to Naval Mission Systems - Michael FrankA6AkQrXDgQ414:1054M
DEF CON 33 - Incident Response from a Maritime Sysadmin’s War Room - Kit Louttit, Steve Winstono6-H-3Sx6i026:42127M
DEF CON 33 - Infecting the Boot to Own the Kernel - Alejandro Vazquez, Maria San JoseiS0XJVyxA3M39:28181M
DEF CON 33 - Inside Look at a Chinese Operational Relay Network - Michael Torres, Zane Hoffmane93V9TWnxJo33:32163M
DEF CON 33 - Intro to Common Industrial Protocol Exploitation - Trevor FlynnS7mPcEPaKHU23:24127M
DEF CON 33 - Intro to Physical Security Bypass - Karen Ng, Matthew CancillatTAISQqmxWQ57:03153M
DEF CON 33 - Investigating Threat Actor Targeting Researchers, Academics - C Tafani-Dereeper, M MuiriTGnoDEYlog35:39160M
DEF CON 33 - Invoking Gemini Agents with a Google Calendar Invite - Ben Nassi, Or Yair, Stav CohenCUxbDRR0A8I45:36214M
DEF CON 33 - Journey to the center of PSTN - I became a phone company. You should too - Enzo DamatocA-ZQJ8EZSs44:22170M
DEF CON 33 - Kill Chain Reloaded: Abuse legacy paths fr stealth persistence - A Hernando, B Martinez6D29iw3B2nM43:05181M
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris MonteirocYZmRp90hss32:55119M
DEF CON 33 - Killing Killnet - Alex HoldenwVY47hNzgJk21:48133M
DEF CON 33 - Let AI Autogenerate Neural ASR Rules for OT Attacks via NLP - Mars Cheng & Jr Wei-HuangMJV5FQztfi422:0384M
DEF CON 33 - Letthemin: Facilitating High Value Purple Teams Using Assumed Compromise - Sarah HumexM8nodIw1_E27:37176M
DEF CON 33 - Live Music - Friday Night - Daemon ChadeauDyVM3bImh_c59:39994M
DEF CON 33 - Live Music - Friday Night - Elipscion0DJy7oDbJCs58:42693M
DEF CON 33 - Live Music - Saturday Night - 0xdadePbXdFEkc4ns28:53481M
DEF CON 33 - Live Music - Saturday Night - DJ nullQECf5jCM6yw05:3295M
DEF CON 33 - Live Music - Saturday Night - Dual CoreYAH_aNsCf4g35:20763M
DEF CON 33 - Live Music - Thursday Night - Fling8_wMwOnGP1Q53:55886M
DEF CON 33 - Live Music - Thursday Night - HecksevenMnxM0O0jQso44:13837M
DEF CON 33 - LLM Identifies Info Stealer Vector & Extracts IoCs -Olivier Bilodeau, Estelle RuellanPHtTXqlViVk49:49365M
DEF CON 33 - Loading Models, Launching Shells: Abusing AI File Formats fr Code Execution - C ParzianIHzn9BiH6rY18:4065M
DEF CON 33 - Locked Down, Not Locked Out: How I Escaped Yr Secure Operator Workstation - Aaron Boyd0r_trFFPVYc24:3599M
DEF CON 33 - Making the DEF CON 33 Badge - Mary8kbuGgH2eQ12:1589M
DEF CON 33 - Man in the Malware: Intercepting Adversarial Communications - Ben 'polygonben' Follandlv-hua5b_9s33:07145M
DEF CON 33 - Managing Bug Bounties @ Scale - Gabriel Nitu, Jay Dancer, PayPal, Ryan Nolette & GoshakYKHs2XJWmXU58:42526M
DEF CON 33 - Mastering Apple Endpoint Security for Advanced macOS Malware Detection - Patrick WardleAgYGwZjcsLo51:46351M
DEF CON 33 - Metal-as-a-Disservice: Exploiting Legacy Flaws in Cutting Edge Clouds - Bill DemirkapiEtGhHCr3VLE46:16207M
DEF CON 33 - Mind the Data Voids: Hijacking Copilot Trust - Tobias DiehlNgjyBKfqJEs19:28120M
DEF CON 33 - Modern Odometer Manipulation - collin & oblivionFYHvL8V_m-Q26:2090M
DEF CON 33 - Moonlight Defender : Purple Teaming in Space! - Ben HawkinsNHvvrhFU6XQ20:50111M
DEF CON 33 - Navigating the Invisible - Mehmet Onder Key, Furkan AydoganJgKUrRaKo7o13:4264M
DEF CON 33 - Never enough about cameras: Firmware keys hidden under the rug - Alexandru LazarN4Cnso2Vbmw26:11135M
DEF CON 33 - New Red Team Networking Techniques for Initial Access and Evasion -Shu-Hao, Tung 123ojpmdFRLCnACJM42:23163M
DEF CON 33 - No Brain No Gain - Mehmet Önder Key, Temel Demir & Dr Ahmet Furkan Aydogan_ENNd1XMPyk56:58227M
DEF CON 33 - No Spook Leaves Randomness to Chance - Shaanan CohneyOYGtNa0pJec54:57371M
DEF CON 33 - No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol - Tom TervoortdFYR2oOK8wg36:19166M
DEF CON 33 - Not Just a Pipeline Leak: Reconstructing Real Attack Behind tj-actions - Aviad Hahami-CSbWpj_IZM42:08165M
DEF CON 33 - Off Grid Datarunning in Oppresive Regimes: Sneakernet and Pirate Box - Robert MenesDJHiSbPskHc18:5676M
DEF CON 33 - One Key, Two Key, I Just Stole Your goTenna Key - Erwin 'Dollarhyde' Karincic, WoodyDvtFoREyB0A42:48252M
DEF CON 33 - One Modem to Brick Them All -Vulns in EV Charging Comms - Jan Berens, Marcell SzakalySQz4nySj4hg43:2381M
DEF CON 33 - Operational Twilight: APTs, OT, & geopolitics of a dying climate - Cybelle OliveiraEkp5iMPEgVw23:46143M
DEF CON 33 - Orion: Fuzzing Workflow Automation - Max Bazalii, Marius FleischerNbWDhk-9k_k44:21372M
DEF CON 33 - OSINT Enabled Ghost Mode: Counter Surveillance for Everyday People - Desiree Wilson9-a4OhOChss21:4994M
DEF CON 33 - OverLAPS: Overriding LAPS Logic - Antoine GoichotstGRkxldg-U21:1978M
DEF CON 33 - Passing the Torch - Mentoring and Protecting Our Students - Navaar Johnson, Sam CominiAviifoOuaBE54:52205M
DEF CON 33 - Passkeys Pwned:Turning WebAuthn Against Itself - S Pratap Singh, J Lin, D SeetohGG4gAhbhPH833:39122M
DEF CON 33 - Paywall Optional: Stream for Free w⧸ New Technique, RRE - Farzan KarimUdNhZ17t8M420:1894M
DEF CON 33 - Pirates of the North Sea - John Andre Bjørkhaug-_fXLWaP4Zmo23:43133M
DEF CON 33 - Planting C4: Cross Compatible External C2 for Your Implants - Scott TaylorO0-0u4zJWEM16:2254M
DEF CON 33 - Playing Dirty w⧸o Cheating - Getting Banned for Fun - S Collins, M Muench, T ChothiaFXIScbxJTZw38:37135M
DEF CON 33 - Policy PrevieweBkduAj_Ruc01:2316M
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K KaragiannisOkVYJx1iLNs39:29115M
DEF CON 33 - Pre-Auth RCE, Arbitrary SMS & Adjacent Attacks on 5G and 4G_LTE Routers - Edward WarrenRxx07Ubmcuc27:13203M
DEF CON 33 - Preventing One of The Largest Supply Chain Attacks in History - Maksim ShudrakIv6VyOaG22c37:58212M
DEF CON 33 - Preventing One of The Largest Supply-Chain Attacks in History - Maksim ShudrakjraaS3lUP0I37:58227M
DEF CON 33 - Private, Private, Private Access Everywhere - Meghan JacquotluZgICpW0Kw29:31113M
DEF CON 33 - Prompt Scan Exploit AI’s Journey Through 0Days and 1000 Bugs - D. Jurado & J. NoguesOkgHfu4lXY21:3883M
DEF CON 33 - QRAMM: The Cryptographic Migration to a Post Quantum World - Emily Fane, Abdel Sy FaneSfWOqqDZEWI22:29429M
DEF CON 33 - Quantum Resistant Healthcare - Katarina AmrichovaKpxHU5NPsPk28:23108M
DEF CON 33 - Quiet Confidence An Introvert's Journey to Technical Public Speaking - Emma FangCUQGpoko8_019:4684M
DEF CON 33 - RATs & Socks abusing Google Services - Valerio 'MrSaighnal' AlessandronicXZJlKLBBGE15:5873M
DEF CON 33 - Real Exploits, Testbed Validation, Policy Gaps in Maritime Connectivity - Juwon ChoWc9GPvu-Yso24:37105M
DEF CON 33 - Rebadged, Relabeled, Rooted: Pwnage via Solar Supply Chain - Anthony Rose, Jake KrasnovaKCSoAtxEHc32:33246M
DEF CON 33 - Reclaim Tech: A Community Movement - Janet Vertesi, Andy Hulltwi2m77YxQ019:1182M
DEF CON 33 - ReclaimTech: A community movement - Janet Vertesi, Andy HullYr3SzRHmIxk25:08132M
DEF CON 33 - Reconfigurable HSMs: Future Proofing Hardware Security - Pablo Trujillo9slY1DllYhw24:59104M
DEF CON 33 - Recording PCAPs from Stingrays With a $20 Hotspot - Cooper Quintin, oopsbagelmeC2JqNAbCA39:51145M
DEF CON 33 - Red Russians: How Russian APT groups follow offensive security research - Will ThomasbpUxuOdfGHM24:17115M
DEF CON 33 - Red Teaming Space: Hacking the Final Frontier - Tim FowlerKjDaPwtYte424:31114M
DEF CON 33 - Redefining Purple Teaming for Max impact - A Pennington, S Marrone, L ProehlwU7xaXDupZo40:50562M
DEF CON 33 - Referral Beware, Your Rewards Are Mine - Whit @un1tycyb3r TaylortQRE9U1q2mk24:32119M
DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben 'nahamsec' SadeghipourmYC-rQ-HZaw50:08218M
DEF CON 33 - Remote code execution via MIDI messages - Anna Antonenko87Ce_D8T7oI39:18118M
DEF CON 33 - Resilient & Reconfigurable Maritime Comms - Avinash Srinivasan, Brien CroteauN0XFOS1kHaM24:47109M
DEF CON 33 - ReVault! Compromised by your Secure SoC - Philippe LaulheretSRALfyEspms42:00197M
DEF CON 33 - Reverse Engineering Marine Engines: Make powerboats do your bidding - Alex LormanAYi5mEWAHzY24:33171M
DEF CON 33 - Reversing approaches to extract embedded scripts in macOS malware - Patrick WardleBvRZHRlMsoU21:21122M
DEF CON 33 - RF Village - Small Packet of Bits That Can Save or Destabilize a City - Manuel Rabid3C-_TaYht6846:38764M
DEF CON 33 - RF Village - Warflying in a Cessna, Part II -Matthew Thomassen, Sean McKeeverKwI2daso3ug24:41420M
DEF CON 33 - RF Village - You might be a Wardriver if - MrBill, CoD_SegfaultPsfM_ZDgffU14:17197M
DEF CON 33 - RF Village - Airborne WiFi: Rogue Waves in the Sky - m0nkeydrag0n9iXHZHwc2MY26:11373M
DEF CON 33 - RF Village - Layer 2 Liberation: Things Your AP Never Dreamed Of - Allan Riordan BallB6_my_bDSx025:04454M
DEF CON 33 - RF Village - McJumpBox Leveraging free corporate Wifi for fun⧸profit - LoaningRpkYQDaEKMo44:38381M
DEF CON 33 - RF Village - Meshtastic Command & Control - Eric Escobar-e9V_hlWlVo39:11732M
DEF CON 33 - RF Village - Meshtastic Under the Microscope From Chirps to Chat - Allan Riordan BallSM1XSxP6W7828:41148M
DEF CON 33 - RF Village - Open Source Cellular Test Beds for the EFF Rayhunter - Ron BrobergRkIz4VcsEdo26:26395M
DEF CON 33 - RF Village - Running a Software Defined Radio CTF using challengectl - Dan Perret98_3eRPuuYM40:11483M
DEF CON 33 - RF Village - So What The Heck Is This Radio Stuff Anyway - Exploding Lemurv76lYD5odfA43:24275M
DEF CON 33 - RF Village - Tactical Flipper Zero You Have 1 Hour and No Other Equipment - Grey Foxb8-uDKkfw5c34:40184M
DEF CON 33 - RF Village - The dirty laundry of stored value washing cards - Aidan Nakache, EquipBNOmouHeAOw30:57508M
DEF CON 33 - Rusty pearls: Postgres RCE on cloud databases - Tal 'TLP' Peleg, Coby AbramseroPf1N-pAk18:30144M
DEF CON 33 - Safeguarding the Industrial Frontier OT SOC & Incident Response - Adam RobbieAXN3sTAr9R420:06105M
DEF CON 33 - Satellite Networks Under Siege: Cybersecurity Challenges of Targeted DDoS - Roee IdanxMfXqtcni_I24:15159M
DEF CON 33 - Scamming Scammers - Weaponizing OSS Against Pig Butchering, Organized Crime - Erin West0KGhP4qjmXk53:58355M
DEF CON 33 - SCCM: The tree that always bears bad fruits - Mehdi 'kalimer0x00' ElyassaepyI3b8Vl0M38:56149M
DEF CON 33 - Secure Code Is Critical Infrastructure: Hacking Policy for Public Good - Tanya Janca3V-URruNQck29:20143M
DEF CON 33 - Secure software dependency management everywhere with Nix - Tom Berek, Farid ZakariaxecOnPOxc3w53:01908M
DEF CON 33 - Securing Agentic AI Systems and Multi-Agent Workflows - Andra Lezza, Jeremiah Edwards5fJ6u--GkSk33:46100M
DEF CON 33 - Shaking Out Shells with SSHamble - HD MooreXHoH4ic8fX820:27123M
DEF CON 33 - Silent Leaks: Harvesting Secrets from Shared Linux Environments - Cernica Ionut Cosminig8ZMiPwrAw19:5783M
DEF CON 33 - Siriously Leaky: Exploring Overlooked Attack Surfaces in Apple's Ecosystem - Richard ImMWvpOW-PRJI45:07196M
DEF CON 33 - Smart Bus Smart Hacking: Free WiFi to Total Control - Kai Ching Wang, Chiao-Lin YuAOp0QtUORBc21:05140M
DEF CON 33 - Smart Devices, Dumb Resets:Testing Firmware Persistence in Commercial IoT - Matei JoserLnlLLKISyY28:54124M
DEF CON 33 - So Long, and Thanks for All the Phish - Harrison Sand, Erlend LeiknestJ4tG7nRUyU36:09189M
DEF CON 33 - So you want to make a badge? Badge Creation 101 - Jeff Geispergere6dmGupBsJk33:52189M
DEF CON 33 - Sometimes you find bugs, sometimes bugs find you - Jasmin Landry JR0ch17Tglq1WT1wpA25:5464M
DEF CON 33 - SSH Honeypots and Walkthrough Workshops: A History - Ryan MitchellTXUSC5YEDPo34:44130M
DEF CON 33 - SSH-nanigans - Busting Open the Mainframes Iron Fortress through Unix - Philip YoungJ3f9axtJsCw46:24312M
DEF CON 33 - State of Open Source in the Federal Government - Jordan KasperS_Ly_eXY65k37:01276M
DEF CON 33 - State of the Pops: Mapping the Digital Waters - Vlatko Kosturjak & MJ CasadomVqNxvfaVGg27:44141M
DEF CON 33 - Stories from a Tor dev - Roger 'arma' DingledinedjM70O0SnsY42:47266M
DEF CON 33 - Take all my money – penetrating ATMs - Fredrik SandstomauoEA8ZD8YA24:05113M
DEF CON 33 - The 2025 Pwnie Awards - Ian Roos, Mark TrumpbourGpx6JsZ0Vzw36:34380M
DEF CON 33 - The Anatomy of a Crypto Scam - Nick Percoco & KitbogauLpCI6CV3Uw55:36158M
DEF CON 33 - The depths that marketers will plummet to - 4dw@r3arvFqkI477021:1084M
DEF CON 33 - The Ghost of Internet Explorer in Windows - George Hughey, Rohit Mothe8cb_OF_6Ek844:17250M
DEF CON 33 - The PowerPoint Glove - Parsia HakimianSJ-kfVUoENk23:21153M
DEF CON 33 - The Things know What You Did Last Session - Will BaggettHqNgsnO5IoU23:25103M
DEF CON 33 - The Ultimate Hack : Applying Lessons Learned from the loss of TITAN - John MaugerdmgjTGuAo3820:15119M
DEF CON 33 - The UnRightful Heir My dMSA Is Your New Domain Admin - Yuval GordonftNaF20RWt433:34225M
DEF CON 33 - The Worst ICS OT Love Story Ever Told - Mike HolcombruVlunKr4BY26:53102M
DEF CON 33 - The Worst ICS⧸OT Love Story Every Told - 2025 Mike HolcombiVmS5dPjggU26:07102M
DEF CON 33 - There and Back Again: Detecting OT Devices Across Protocol Gateways - Rob KingYBPYYk8FIkc21:53127M
DEF CON 33 - They deployed Health AI on us: We’re bringing the rights & red teams - Andrea DowningVT-xl42KIpI26:1994M
DEF CON 33 - Thinking Like a Hacker in the Age of AI - Richard 'neuralcowboy' Thiemet3bKDBtdSw847:31856M
DEF CON 33 - Thinking like an attacker is no longer optional - Abhijith 'Abx' B R, Keenan SkellyPZLmzbyYs2g36:43459M
DEF CON 33 - Third Party Access Granted : Postmortem on Student Privacy - Sharlene Toney06CZrbjy9qM36:05153M
DEF CON 33 - Threat Dynamics on the Seas - John Mauger, & Michael Sulmeyer & Adam SegalHJYTMhbtKVU41:19283M
DEF CON 33 - TotalTest Simulations 2 Oh! From Exploits to Economics - Nebu Varghese2EYYmncELXs25:32123M
DEF CON 33 - TSPU: Russia's Firewall and Defending Against Digital Repression - Benjamin Mixon-BacazcdEX1ZgXzY41:23204M
DEF CON 33 - Tunnelpocalypse - Rich ComptonqjyMK_OBgzQ28:11135M
DEF CON 33 - Turning Camera Surveillance on its Axis - Noam MoshewclvPznv5v421:5443M
DEF CON 33 - Turning Camera Surveillance on its Axis - Noam MoshewM8kOq4VVt821:2879M
DEF CON 33 - Turning Microsoft's Login Page into our Phishing Infrastructure - Keanu 'RedByte' NysB4pVpByWOcI42:58221M
DEF CON 33 - Turning your Active Directory into the attacker’s C2 - Quentin Roland, Wilfried Bécard_l9_lNUCjP443:05264M
DEF CON 33 - Uncovering the Secrets of Tire Pressure Monitoring Systems - Yago LizarribarK5Kltw5kQpM25:5782M
DEF CON 33 - Unmasking the Snitch Puck: IoT surveillance tech in the school bathroom - Reynaldo, nyxWCnojaEpF2I40:04131M
DEF CON 33 - Unveiling IoT Vulns: From Backdoors to Bureaucracy - Kai-Ching Wang, Chiao-Lin YuL4cMPw2uDtc19:4592M
DEF CON 33 - Unveiling the Perils of the TorchScript Engine in PyTorch - Ji'an Zhou, Lishuo SongiVerhbedK_034:46116M
DEF CON 33 - VDP in Aviation How it shouldn't be done! - Matt GaffneyoI3zxDWldKE21:27220M
DEF CON 33 - Veilid la revoluçion : Your data is yours to own - Katelyn Bowden & Paul MillerC8F5kvm2B5s23:06183M
DEF CON 33 - Vibe School: Making dumb devices smart with AI - Dr Katie Paxton FearCM_8gKlz2-o22:27111M
DEF CON 33 - Virtualization Based Insecurity: Weaponizing VBS Enclaves - Ori DavidDqC4LZTTCa036:29165M
DEF CON 33 - Voice Cloning Air Traffic Control: Vulnerabilities at Runway Crossings - Andrew LoganJKwxsGYcZq422:3897M
DEF CON 33 - Voting Village - DMCA Security Research Exemption and Election Security - Tori NobleXVJd08ehNs455:24301M
DEF CON 33 - Voting Village - It's Not Safe Yet: Online Voting in Practice - Michael Specterg0GXWp4QmAs36:04174M
DEF CON 33 - Voting Village - A NY Legal Challenge to ExpressVote XL's Barcode Use - Susan LerneredxqLUizSWE20:54202M
DEF CON 33 - Voting Village - A Review of Post Election Audits in Swing States - Susan Greenhalgh5mWnGZWUEMQ28:29153M
DEF CON 33 - Voting Village - CARVER Vuln Analysis & US Voting System - Moore, Young, BaggettrqMNllTo6wc44:27388M
DEF CON 33 - Voting Village - History and Significance of the TTBR and PEASWG - Debra BowenF_Xz9rMgWzE55:47276M
DEF CON 33 - Voting Village - Is E2E Verifiability a Magic Bullet for Online Voting - John OdumgMvNKsl65NA27:35157M
DEF CON 33 - Voting Village - Reflections on TTBR & Everest - Bowen, Blaze, Clark, Hoke, MulliganeRW2YjY0QuM29:01221M
DEF CON 33 - Voting Village - Regulatory Failures with Ballot Marking Devices - Marnie Mahoneyy1zZtEm_rvk27:48171M
DEF CON 33 - Voting Village - When Insiders Are the Threat - Burbank, Greenhalgh, Marks, JeffersonOyUNja7QSv857:57345M
DEF CON 33 - Voting Village - When the Paper Trail Leads Nowhere - Ian PattonURWjVRUDNiI26:34201M
DEF CON 33 - Voting Village - "Fortress Island" Physical Security in Voting Systems - Drew Springallyvbe6n82f0I33:32282M
DEF CON 33 - Voting Village- Evidence Based Elections and Software Independence - Ron Rivest8rIM5aTApKo44:00235M
DEF CON 33 - Vulns to end your space mission - A. Olchawa, M. Starcik, R. Fradique & A.BoulaichTAtG8rofxxE17:3268M
DEF CON 33 - Welcome to DEF CON 33 - The Dark TangentEo5lwnTft8U21:45323M
DEF CON 33 - What Game Hackers teach us about Offensive Security & Red Teaming - Joe 'Juno' AureliozfhiZnjJLT430:08125M
DEF CON 33 - What is Dead May Never Die: The Immortality of SDK Bugs - Richard LawshaeMTZ9_IfZ7Bk12:05177M
DEF CON 33 - What’s Really in the Box? The Case for Hardware Provenance and HBOMs - Allan FriedmanQARwgoJ-IbA24:22201M
DEF CON 33 - Where’s My Crypto, Dude? The Ultimate Guide to Crypto Money Laundering - Thomas Roccia1uNneo9L_jU30:02100M
DEF CON 33 - Whose Slide Is It Anyway?i-wKxAAeWt839:25696M
DEF CON 33 - Win-DoS Epidemic - Abusing RPC for Win-DoS & Win-DDoS - Or Yair, Shahak MoragJLMsfH2MVCE37:16159M
DEF CON 33 - Winners of DARPA’s AI Cyber Challenge - Andrew Carney, Jason Roos, Stephen WinchelltouJ5uLlXjQ41:31385M
DEF CON 33 - You snooze you lose: RPC Racer winning RPC endpoints against services - Ron Ben YizhakvBz8TBVxwk435:36155M
DEF CON 33 - Your Passkey is Weak: Phishing the Unphishable - Chad Spensky, Ph Dxdl08cPDgtE24:12110M
DEF CON 33 -BiC Village -Let's Lose the Shock: Mystery of Linux - A Pain Free Intro - DJ DavisR_rpuLpfMZM55:49269M
DEF CON 33 -BitUnlocker: Leverage Windows Recovery to Extract BitLocker Secrets - Leviev, Ben SimonCc6vrQSVMII38:26106M
DEF CON 33 -Voting Village - Protecting Election Researchers Globally - Miracle Owolabi5qmpv44knF814:5192M
DEF CON 33 3- Red teaming fraud prevention systems with GenAI - Karthik Tadinada, Martyn HigsonEiXbzVlNYro46:16230M
DEF CON 33 BiC Village - Sydney Johns RE for the Rest of Us An Introduction to Reverse Engineeringh9ewUS6FTFQ41:00224M
DEF CON 33 Preview - Aerospace Village PromoT8w5M_RL-9c02:4218M
DEF CON 33 Preview - AIXCC - Andrew CarneylQDOIFZgBs403:0441M
DEF CON 33 Preview - Cryptocurrency PreviewmHFcecX4RIA03:2182M
DEF CON 33 Preview - Hardware Hacking VillageleKO6dphHBY03:0315M
DEF CON 33 Preview - Malware Village6BIBQUmJgac02:3810M
DEF CON 33 Recon Village - Mapping the Shadow War From Estonia to Ukraine - Evgueni Erchovy-1_nKM8DRQ20:47105M
DEF CON 33 Recon Village - CTI Agent Automated Battlecards from CTI Reports - Mohamed NabeelY8xMr2JwyjU25:10133M
DEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John DilgenesKyHO5WjPU32:30157M
DEF CON 33 Recon Village - Attack Surface in Motion - Muslim KoserN7w6FklAmVA42:25202M
DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela RosaoHjQSpcP66423:2172M
DEF CON 33 Recon Village - Building Local Knowledge Graphs for OSINT - Donald PellegrinoyIUfntW_TxY41:11184M
DEF CON 33 Recon Village - Discord OSINT - Zach MalinichXp4lWpD20Mo37:49147M
DEF CON 33 Recon Village - enumeraite: AI Assisted Web Attack Surface Enumeration - Özgün KültekinIzsBS_E2RVY40:29214M
DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan IvanovaSOiPxOBs1E43:37206M
DEF CON 33 Recon Village - Investigating Foreign Tech from Online Retailers - Michael PorteraMAtllbHmxP428:05131M
DEF CON 33 Recon Village - OSINT & Modern Recon Uncover Global VPN Infrastructure - Vladimir Tokarev4HGFlZZfWc839:53198M
DEF CON 33 Recon Village - OSINT Signals Pop Quiz - Master ChenL-ZqeZbiWn826:19152M
DEF CON 33 Recon Village - Plug and Prey Scanning and Scoring Browser Extensions - Nishant SharmaWH6QRkoDlhk28:58159M
DEF CON 33 Recon Village - Robin The Archaeologist of the Dark Web - Apurv Singh GautamP4p1PyEFzww20:12113M
DEF CON 33 VIdeo - TeamHackerPagerOmfyox5kxUQ16:17143M
DEF CON 33 Video Team - ICS Village Treatment PlantD_3mUd7shX402:1137M
DEF CON 33 Video Team - IllumiconTaue9SWH3Os15:44305M
DEF CON 33 Video Team - AIxCC 42 Beyond BugsOv8GSLqoPvQ15:52139M
DEF CON 33 Video Team - DEF CON RUN with Shepard and Pandas9GM13q8ltY02:5630M
DEF CON 33 Video Team - Andra Lezza on Being a DC SpeakerqYwZoW_dDtw03:4346M
DEF CON 33 Video Team - Ch0wn35B2zAdGceCIQ04:0464M
DEF CON 33 Video Team - Contest Update - Tiberiusq6ri2BTily406:0031M
DEF CON 33 Video Team - Darren Kitchen Hak5 PagerTPLRmpIbQuQ05:0863M
DEF CON 33 Video Team - DDOS Communitysg120BaNHQI09:25178M
DEF CON 33 Video Team - DEF CON NextGenhkhuImaSXCs19:40122M
DEF CON 33 Video Team - DEFCON AIxCC Lacrosse TeamYdJ6NoxzuKs15:54160M
DEF CON 33 Video Team - Jordan Kasper on Open Source in Governmentbsls-3hXH4M16:12182M
DEF CON 33 Video Team - KevOps Sellout Pool Party at the SaharaK8fjM9k_AUY02:2945M
DEF CON 33 Video Team - Mar Williams3YT_tOKHSDA09:45172M
DEF CON 33 Video Team - Mobile Hacking CommunitynmYb3Znr4Gc09:18179M
DEF CON 33 Video Team - Retro Tech Community & Badge Life LIVE - d3dbot x psyop x grrrizzzzb5zL6IijpYA18:27292M
DEF CON 33 Video Team - TipsyBadgehKLow2hkLxQ05:0079M
DEF CON 33 VIdeo Team -Hacker Hangout - Kari, DT, Silk073cCPvNit425:46208M
DEF CON 33 Voting Village - Welcome and IntroductionsYBcJEiP_k7k10:4486M
DEF CON 33 Voting Village - Dominion ICX Simple Hacks Daunting Recoveries - Springall, Davis, MarksgRU0-z1of2Y46:06161M
DEF CON 7 - Gh0st - Phreaking and PBX tricksN5aAu8CCQY051:5686M
DEF CON 7 - Panel - Meet the Fedsw04oWPhecow56:1094M
DEF CON 8 - Xs - LDAPyif0EhykeMk37:4281M
DEF CON 9 - Adam Bresson - Data Mining with PHP *i8Wg0qiipcs41:09255M
DEF CON 9 - Anders Ingeborn - Designing Small Payloads *Vs3DgRL9qJM35:1397M
DEF CON 9 - Anonymous - Credit Card Fraud *yii9bT1Ytsc51:54251M
DEF CON 9 - Barry Stiefel - NAT for Newbies and Not So Newbies *eY_RYmfMRqI01:35:55458M
DEF CON 9 - Biing Jong Lin - Survey of Country-Wide Web Server Security *OQ23rPFUk2Y34:0095M
DEF CON 9 - Brenno de Winter - IP V6 Security *ZZSJnLd3PL031:5885M
DEF CON 9 - Bruce Schneier Answers Questions *Bk-kIfGf-iw58:19161M
DEF CON 9 - Bryan Glancey - Weakest Link *cVlFgHvtbjg01:05:26303M
DEF CON 9 - Cult of the Dead Cow - Activism Panel *2ne2qxoyBv054:37243M
DEF CON 9 - Cyberethical Survivor *b2ZcGbPPrqQ01:18:25354M
DEF CON 9 - Cyrus Peikari - An Open Source International Attenuated Computer Virus *1sD2YsVCzZQ42:36144M
DEF CON 9 - Dan Kaminsky - Gateway Cryptography *TAdD8mKvEnc48:09223M
DEF CON 9 - Dario Diaz - Digital Millenium Copyright Act *OcoXc2fny7w50:54306M
DEF CON 9 - Dennis Salguero - The Business Side of Starting Your Own Consulting Firm *WRa0filqk4w32:41157M
DEF CON 9 - Enrique Sanchez - Distributed Intrusion Detection System Evasion *U2kU2vcen-o31:4086M
DEF CON 9 - Freaky - OSX and Macintosh Security *ZdTvTF0Wf-047:21169M
DEF CON 9 - FX - Attacking Control Routing and Tunneling Protocols *-M37rdfDouo41:01138M
DEF CON 9 - Ian Goldberg - Arranging an Anonymous Rendezvous *EELxDct2gJw55:1598M
DEF CON 9 - Jason Peel - Cypherpunk-Grade Covert Network Channels *eeJ0VdWYz1M49:53241M
DEF CON 9 - Jennifer Granick - European Cybercrime Treaty *FXAMHrZY6k850:29237M
DEF CON 9 - Jim Christy - Meet the FED Panel *9kQ7fLkf8tg01:00:20326M
DEF CON 9 - K2 - Polymorphic Shell Code API *6Lya3B86Hks01:04:34303M
DEF CON 9 - Keith Nugent - Windows 2000 Security: How to lock down your Win2k boxes *buCb7iVkZA801:41:33284M
DEF CON 9 - Kevin McPeake - Falling Dominos *OuqD1daUz7001:29:39418M
DEF CON 9 - Len Sassaman - What is SSL a CA and FreeCert *y3BAfiQN8Lk47:03187M
DEF CON 9 - Marcus Andersson - Firewalling Wireless Devices *eQM8_cWa0qI53:04248M
DEF CON 9 - Mark Grimes - TCPIP Intelligent Agents The Future of Electronic Warfare and Defense *kjA_dPP4Aec01:07:54331M
DEF CON 9 - Michael Wilson - Hacker Doctrine in Information WarfareAGY75PIjlhA55:20257M
DEF CON 9 - Nick Farr - Designing Secure Interfaces "for Dummies" *rpNS2I5r5L047:41223M
DEF CON 9 - Ofir Arkin - Introducing X Playing Tricks With ICMP *ISUew5U9GyQ55:41264M
DEF CON 9 - Optyx - Kernel Intrusion System *r2Rc0aLjp2w31:02145M
DEF CON 9 - Peter Shipley - 802.11b War Driving and Lan Jacking *bWH-3OZJ0vo57:13164M
DEF CON 9 - Phil King - 8 bits and 8 pins More Fun with Microcontroller Hacking *jTPpesQ2_Aw01:02:23297M
DEF CON 9 - Raven Alder - Perl Script That Tracks DoS Attacks *ooqlxFmSIro34:35166M
DEF CON 9 - Richard Thieme - Hacking in a Context of Pan-global Culture *Wai_EssEbIc01:03:41303M
DEF CON 9 - Rob Schein - Evaluating VPN Solutions *B_WDD_D8s0Q01:11:32201M
DEF CON 9 - Robert Graham - The Principals of Cyber Anarchy *Zz_fRP6A6UM37:03177M
DEF CON 9 - Robert Grill and Michael Cohen - Windows NT and Novell Host Based Intrusion Detection *cOxHiBhJUbM39:59186M
DEF CON 9 - Robert Muncy -Securing Cisco Routers *uFpDINk2lBs27:33128M
DEF CON 9 - Sharad - Security & Privacy *CRwerEchg5c53:25168M
DEF CON 9 - Shatter - FAQ The Newbies *Fq_ua1tmZEo01:01:57216M
DEF CON 9 - Simple Nomad - Widdershins De evolution and the Politics of Technology *fAqaSvYe_3M47:50115M
DEF CON 9 - Technodragon - Hardware Mods *umrIUZddOBE48:26226M
DEF CON 9 - The Defendant - So You Got Your Lame Ass Sued *49kiyXPnrFw57:16214M
DEF CON 9 - The Defendant - So You Got Your Lame Ass Sued *r0k-luiPHcg57:16266M
DEF CON 9 - Thomas J. Munn - Using Open BSD, snort, Linux, and a few other tricks *n4cUmZavnnA49:15239M
DEF CON 9 - Thor - Grabbing User Credentials via W2k ODBC Libraries *HTJZSriE8ec37:33123M
DEF CON 9 - Tim Mullen - RestrictAnonymous: Enumeration and the Null user *HJzqeSA7IFQ24:54116M
DEF CON 9 - William Tafoya - Hacking the Mind *DQKYZtGXPts47:01115M
DEF CON China Party - Cooper Quintin- Detecting Fake 4G Base Stations in Real Timeq68V-s12RKE24:18170M
DEF CON China Party 2021 Miss JackalopersHSkRAt8Gg01:40:143G
DEF CON China Party 2021 - CocktailConxIAgnPGlcwg01:14:17710M
DEF CON China Party 2021 - DEF CON Culture - Dead AddictcGzcNyyiCHs29:58189M
DEF CON China Party 2021 - IOT Fails Learning from Sex Toys How Not to Suck - RenderManxtDb_Casjjw49:54140M
DEF CON China Party 2021 - Keynote Interview Excerpt - Steve Wozniak, The Dark Tangenty16QQilQGsg05:2054M
DEF CON China Party 2021 - Malware Included Imported 3d Party JS as Attack Vectors - Michael Schrenk0uekC_dWERw27:2773M
DEF CON China Party 2021 - Whispers Among the Stars - James Pavur90_4kKpgFuw29:5068M
DEF CON China Party 2021- Wall of Sheep: Hilarious Fails and the Sheep Behind Them - Riverside4ZabsNgMHCM10:5582M
DEF CON Groups - Jayson E. Street - New Year's DCG UpdateWVPm25l3OJ413:00142M
DEF CON GROUPS 2018 - April Wright - Boston - DC617vaXaAvN_DRM02:5797M
DEF CON GROUPS 2018 - Jun Li - Beijingf6gXqCDbkT809:37240M
DEF CON Groups January 2018gS-gX3QLYno10:0142M
DEF CON Lockpicking table @ HACKED -TriBeCa Film FestivalaQ37in74tlk00:555M
DEF CON NOC - Everything you wanted to know about the DEF CON NOC - DEF CON 27 Conference3niJdmhdJBk57:17931M
DEF CON Policy - International Cyber Policy 101 - PanelJmjWz3XVfEg01:29:52916M
DEF CON Safe Mode Aerospace Village What I Learned Trying to Hack a 737Uw-8H5x-NzQ27:49208M
DEF CON Safe Mode Cooper Quintin Detecting Fake 4G Base Stations in Real Time Q&AUVwOlZ3xitc29:48264M
DEF CON Safe Mode Erik Hunstad Domain Fronting is Dead Long Live Domain Fronting Q&Ay3PZ3C4xGCc29:35160M
DEF CON Safe Mode Hacker Jeopardy Saturday71w3bOMw7uE01:21:01662M
DEF CON Safe Mode Ham Radio Village K0BAK The K0BAK News Van 1 of 2U78rLGttTq459:34300M
DEF CON Safe Mode Lock Bypass Village - Bill Graydon - OSINT of Facilities by Physical ReconbgENH9EBqq832:07253M
DEF CON Safe Mode Lock Bypass Village - Karen Ng - Bypass 1013yKZqiYGYnA28:46225M
DEF CON Safe Mode Recon Village - Ladislav Baco - Hunting for Blue Mockingbird CoinminersPWeKDjMtC9M24:2086M
DEF CON Safe Mode - Christian “quaddi” Dameff MD and panel - D0 N0 H4RM Q and Aw-BtSUTdTk053:08298M
DEF CON Safe Mode - Feng Xiao - Discovering Hidden Properties to Attack NodeJS Ecosystem Q&Ane4_dr0OdUo31:26145M
DEF CON Safe Mode - Gal Zror - Don't Ruck Us Again The Exploit Returns Q&ApqCaaB_EieY26:45219M
DEF CON Safe Mode - James Pavur - Whispers Among the Stars Q and AY-0oHxzpJ-828:45196M
DEF CON Safe Mode - Voting Village - Day 2 Opening RemarkspdL4bbDn1Aw04:0337M
DEF CON Safe Mode -Jack Baker - Finding and Exploiting Bugs in Multiplayer Game Engines Q&A1GiM-44q_QM29:58161M
DEF CON Safe Mode -Jiska Classen and Francesco Gringoli - Spectra New Q and AQNERjp0c2Z429:47167M
DEF CON Safe Mode ICS Village - ac0rn, atlas 0f d00m - Vivisecting PowerPCcuDR7rvEWPM01:03:481G
DEF CON Safe Mode Lock Picking Village - zeefeene - High Security Wafer Locks An OxymoronFxaQw4CUaP849:01307M
DEF CON Safe Mode Password Village - Getting Started with HashcatMBTJ8f6Fsmg23:49527M
DEF CON Safe Mode Voting Village - Presentation IntrosjZpL6tH-1sk34:2963M
DEF CON Safe Mode - Joshua Maddux - When TLS Hacks You Q&AKsDJ5z5Vx_M28:00163M
DEF CON Safe Mode - Alvaro Muñoz and Oleksandr Mirosh - Room For Escape Scribbling Outside The Lines-XOs_bnZjgg31:45160M
DEF CON Safe Mode - Ask the EFF: Meet the EFA Q&A8ERCa8e6vRQ01:39:15266M
DEF CON Safe Mode - Ayoul3 - Only Takes a Spark - Popping a Shell on 1000 Nodes Q&AFKMc7LgHeck27:35242M
DEF CON Safe Mode - Badass Bowden - Fireside Lounge Shrek Juggs and Toxic Trolls Q& AY4KizB8a7Cg01:03:21399M
DEF CON Safe Mode - Bill Demirkapi - Demystifying Modern Windows Rootkits Q&Ah2HGzfV_gUQ30:30182M
DEF CON Safe Mode - Bill Graydon - Exploiting Key Space Vulnerabilities in the Physical World Q&AvgP4p87Gx_M28:11168M
DEF CON Safe Mode - Bill Graydon - Exploiting Key Space Vulnerabilities in the Physical WorldGccmPoUeeyg01:46:151G
DEF CON Safe Mode - Career Hacking Village - National Service PaneleicUXYrJmEo37:03270M
DEF CON Safe Mode - Christopher Wade - Beyond Root Custom Firmware For Embedded Mobile Chipsets Q&AnpY5XLaRMlA31:20192M
DEF CON Safe Mode - CTF - Shift 1 Public Recap77mK3lbkedw01:03:15408M
DEF CON Safe Mode - CTF - Final in game RecapHafPDfgXT_o59:28243M
DEF CON Safe Mode - CTF - Quals WelcomerJm7yTIXyAw03:1156M
DEF CON Safe Mode - Dylan Ayrey and Allison Donovan - Lateral Movement and Privilege Escalation7OfLeGWRExI26:32253M
DEF CON Safe Mode - Elie Bursztein - A Hacker's Guide to Reducing Side Channel Attack SurfacesnGKfWD5BnRI33:28178M
DEF CON Safe Mode - Eyal Itkin - Don't Be Silly It's Only a Lightbulb Q&A8l54YnRxCQI31:26155M
DEF CON Safe Mode - Hacker Jeopardy - Friday Night86SgQcklkU801:43:36985M
DEF CON Safe Mode - Hadar and Bar - After Stuxnet Printing still the Stairway to Heaven Q and AD-Oa3mOoGDU23:31109M
DEF CON Safe Mode - Hadrien Barral , Rémi Géraud Stewart - DNSSECTION Q and AZRKsf2Zw--032:07198M
DEF CON Safe Mode - Ismail Melih Tas and Kubilay Ahmet Kucuk - Practical VoIPUC Hacking w Mr SIP Q&A8i9MNu15z_E27:40268M
DEF CON Safe Mode - Jake Labelle - Getting Shells on zOS with Surrogat Chains Q&AmbPgDJ4misk29:06169M
DEF CON Safe Mode - Michael Stay - How we recovered XXX,000 in Bitcoin from an zip file Q&ANs-WujgsCt429:09193M
DEF CON Safe Mode - Mickey Shkatov and Jesse Michael - Bytes In Disguise Q&AfoXy68u4fao29:51215M
DEF CON Safe Mode - Patrick Kiley - Reverse Engineering a Tesla Battery Mgmt. System for Moar PowerDycvqZTw-1836:26111M
DEF CON Safe Mode - Patrick Kiley - Reverse Engineering the Tesla Battery Management System Q&AdAft0m4oL_Q30:38279M
DEF CON Safe Mode - Patrick Wardle - Office Drama on macOS Q&AlsqE84_DNKU27:57242M
DEF CON Safe Mode - Paul Marrapese - Abusing P2P to Hack 3 Million Cameras Q and AJyEpuQyqtbU31:09136M
DEF CON Safe Mode - Sean Metcalf - Hacking the Hybrid Cloud Q&AH26ElMkweiw33:59216M
DEF CON Safe Mode - Shlomi Oberman, Moshe Kol, Ariel Schon - The Ripple20 Q and AVZNzY-cfQ7M31:03194M
DEF CON Safe Mode - Voting Village - Day 2 Closing Remarksbn5Oyk9C-5034:53648M
DEF CON Safe Mode - Whose Slide Is It Anyway - 1 of 200njwXnHAnY01:13:321G
DEF CON Safe Mode - Whose Slide Is It Anyway - 2 of 2vVC5SzYW3eU48:25430M
DEF CON Safe Mode -CTF - Shift 1 Streamhd0gkciEsn010:4028M
DEF CON Safe Mode Aerospace Village - Alex Lomas - Introduction to ACARS_9nUChpnNUI26:0155M
DEF CON Safe Mode Aerospace Village - David Robinson - General Aviation GA Electronic Flight BagsPiSI6OoqD1w43:47100M
DEF CON Safe Mode Aerospace Village - Laura Chappell - Deep Space Networking7QDEyQmPRjU35:20146M
DEF CON Safe Mode Aerospace Village - Liz Wharton - Airport Hacking Choose Your Own Adventure86u_aYpEma038:27106M
DEF CON Safe Mode Aerospace Village - Matt Gaffney - MITM The Mystery in the MiddlefEv2vZ5yUac53:3695M
DEF CON Safe Mode Aerospace Village - Opening Remarks-agEI9QFdTc36:31129M
DEF CON Safe Mode Aerospace Village - Panel - Hackers and ISACs9DwQgJ1cTnY48:15415M
DEF CON Safe Mode Aerospace Village - Alex Lomas - TCAS and ILS Spoofing DemonstrationblclSdJ71vo09:4421M
DEF CON Safe Mode Aerospace Village - Alex Lomas, Ken Munro -747 Walkthru From a Hacker PerspectiveV0zH5e6og2g25:00151M
DEF CON Safe Mode Aerospace Village - Ali Abdollahi - Hacking Airplane A2G Systems4Lqh-JvgX_M16:5646M
DEF CON Safe Mode Aerospace Village - Allan Tart, Fabian Landis - Low Cost VHF ReceiveryEP7fT4Z-Uw23:0644M
DEF CON Safe Mode Aerospace Village - Brandon Bailey - Exploiting SpacecraftWFhoV1c0rlc46:46105M
DEF CON Safe Mode Aerospace Village - Cornelius, Brown - Cybersecurity & Aviation RegulationnPx1wRgoFeA49:2681M
DEF CON Safe Mode Aerospace Village - Dadgar, Zaimiri, Dorosti - Attacking Flight Management SystemsjVRCTyrSUH427:2447M
DEF CON Safe Mode Aerospace Village - Eric Escobar - Talking to SatelliteswurZ4fCaHIo46:4297M
DEF CON Safe Mode Aerospace Village - Feyt, Rowell, LeRray - Critical Aerospace CybersecurityhwEWwTU01Wk30:1069M
DEF CON Safe Mode Aerospace Village - Gui Michel - Breakdown of the FAA Privacy ICAO Address Program4w44NpnFGBw19:3237M
DEF CON Safe Mode Aerospace Village - Harshad Sathaye - GPS Spoofing 101kh6lczeGP3U22:4539M
DEF CON Safe Mode Aerospace Village - Harshad Sathaye - A Deeper Dive into ILS and ADS B SpoofingR0ucHFBw8W022:3952M
DEF CON Safe Mode Aerospace Village - James Pavur - Trust and Truth in SSArkT8mxbWaIU24:3857M
DEF CON Safe Mode Aerospace Village - Liz Wharton - Airport Hacking Choose Your Own Adventuren04DAvO1vf838:2775M
DEF CON Safe Mode Aerospace Village - Martin Strohmeier - Dissecting Wireless Privacy in AviationrSDQDhB7Qtg20:0636M
DEF CON Safe Mode Aerospace Village - Matt Murray - Satellite Orbits 101Qsb703Z3y3A10:4850M
DEF CON Safe Mode Aerospace Village - Matt Smith - Pilot Reactions to Attacks on Avionic SystemscfPoHOrIpH021:4249M
DEF CON Safe Mode Aerospace Village - Michael Vanguardia - Secure Airplane Development Lifecyclex68Q_t9OPqw24:2486M
DEF CON Safe Mode Aerospace Village - PamMelroy - Cybersecurity Lessons Learned in Human Spaceflightpieaylw38cY43:57147M
DEF CON Safe Mode Aerospace Village - Panel - Building Connections Across the Aviation EcosystemXZ0dS-ayQA001:00:07186M
DEF CON Safe Mode Aerospace Village - Panel - Hacking Aerospace Cybersecurity Regulation2ykwT5DHPeU49:04198M
DEF CON Safe Mode Aerospace Village - Patrick Kiley - Experimental Aviation Risks and RewardsAisXxU1yodo26:56126M
DEF CON Safe Mode Aerospace Village - Rick Hansen - Software Defined Radios for Aerospace CyberzdPj6USdRZc23:47145M
DEF CON Safe Mode Aerospace Village - Understanding Space Through a Cybersecurity LensEYId2Y1oVSI02:57:23440M
DEF CON Safe Mode Aerospace Village - Workshop - Simulated Satellite Communications on Raspberry PinuIzTMf6wI816:1941M
DEF CON Safe Mode Aerospace Village -Jay Angus - Checklist for Aviation Vulnerability Disclosure9OVQBL6Sab820:1434M
DEF CON Safe Mode AI Village - Nahid Farhady - A Dive into Privacy-Preserving Machine LearningEtv-GGjkcJE20:36309M
DEF CON Safe Mode AI Village - comathematician - Hyperlocal Drift Detection with Goko-F-eCJHSw9s28:42548M
DEF CON Safe Mode AI Village - Erick Galinkin - Babys First 100 MLsec WordsXo2KZCbJWCg29:46291M
DEF CON Safe Mode AI Village - GTKlondike Hacking with Skynet - How AI is Empowering Adversaries1ATu9tC4b0448:52303M
DEF CON Safe Mode AI Village - Hyrum Anderson, Zoltan Balaz - Machine Learning Competition 2020zD51Q8ZU6S021:3280M
DEF CON Safe Mode AI Village - Imeyerov - Project Domino Citizen Data Science Against COVID misinfotHhi83yUl_k27:45649M
DEF CON Safe Mode AI Village - Journal Club Live - Fawkes Facial RecognitiondJTuvt1nAo053:351G
DEF CON Safe Mode AI Village - Journal Club Live - Pursuit of Exploitable Bugs in Machine LearningNkroi-fjlys57:451G
DEF CON Safe Mode AI Village - Lee, Saxe - Detecting SE emails with a Bleeding Edge Neural ModelO4NV2ZR2MtQ49:24556M
DEF CON Safe Mode AI Village - Nahid Farhady - Spectrum Framework for ML based Threat MonitoringH7KfmNNkXiY23:54438M
DEF CON Safe Mode AI Village - Vahid Behdazan - Security Challenges in Deep Reinforcement Learningu5SPg9XDqGM57:37447M
DEF CON Safe Mode AI Village - Workshop - Adversarial Machine Learning Attacking AMSI ProvidersF0i5qmSOye801:29:51760M
DEF CON Safe Mode AppSec Village - Gregg Horton, Ryan Slama - 10,000 Dependencies Under the SeaYgsoBP2ahmU19:1759M
DEF CON Safe Mode AppSec Village - Amar, Molveau - Turning Offsec Mindset to Developer's Toolsetw1A8-cJFBRg46:56578M
DEF CON Safe Mode AppSec Village - Chloe Messdaghi - The Elephant in the Room: BurnoutXS_aNuUk6I050:27408M
DEF CON Safe Mode AppSec Village - Christian Schneider - Threagile Agile Threat Modeling8I5feMif_zk28:10324M
DEF CON Safe Mode AppSec Village - David Sopas, Paulo Silva - API inSecurity TOP 10As5JJ_Eh_aY36:14374M
DEF CON Safe Mode AppSec Village - David Waldrop - The DevOps and Agile Security ToolkitZZkE7nPOtjE50:17472M
DEF CON Safe Mode AppSec Village - Fredrick “Flee” Lee - What Bruce Lee Can Teach Us About AppSeclhLI5bNK4vQ40:39495M
DEF CON Safe Mode AppSec Village - Jarrod Overson - Hackium a Browser for Web HackersNB5eJulTw-039:05549M
DEF CON Safe Mode AppSec Village - Kelley Robinson - 2FA in 2020 and BeyondP4B0ClcJZ_426:22272M
DEF CON Safe Mode AppSec Village - Maddie Stone - Who's secure who's not who makes that choicet-5Qc7OOkKI49:04589M
DEF CON Safe Mode AppSec Village - Mario Areias - Threat Modelling the Death StarYpT8Euc0mm445:05553M
DEF CON Safe Mode AppSec Village - Mehmet D Ince - A Heaven for Hackers: Breaking a Web SecurityUujbUSVQBq048:02635M
DEF CON Safe Mode AppSec Village - Parsia Hakimian - localghost Escaping the Browser SandboxdFi1SNutf4A36:57296M
DEF CON Safe Mode AppSec Village - Pedro Umbelino ,João Morais - Android Bug ForagingQmcXtfLU1Xw41:41489M
DEF CON Safe Mode AppSec Village - Philipp Krenn - Secure Your Code Injections and LoggingPqf4y518xhQ46:19438M
DEF CON Safe Mode AppSec Village - Phillip Marlow - Can't Touch This Detecting Lateral MovementABLRgRITe2M20:10157M
DEF CON Safe Mode AppSec Village - Vandana Verma Sehgal - Running an appsec program w⧸ open source-HV2SZCggA057:07712M
DEF CON Safe Mode Biohacking Village - Panel - How Independent Researchers work with MDMsnDXS19Dpa0A01:16:10918M
DEF CON Safe Mode Biohacking Village - Sam Cervantes - Open Ventilator Remote Monitoring ProjectlYluZbfIZTI31:24308M
DEF CON Safe Mode Biohacking Village - Andrea Downing - Infodemic: Threat ModelsO9DpdM9bws018:0993M
DEF CON Safe Mode Biohacking Village - Bill Hagestad - Chinese Military Lab Mission + COVID-19IffbD0gOXVY28:36314M
DEF CON Safe Mode Biohacking Village - Bryson Bort - MedICS1Ii4tct5io037:22332M
DEF CON Safe Mode Biohacking Village - Curry, Dougherty - INCLUDES NO DIRT: Threat ModelingJSEDAqOfI4856:15557M
DEF CON Safe Mode Biohacking Village - Dameff, Tully - How COVID19 Changed Cyber Disaster MedicinegX5D14zObuQ44:09308M
DEF CON Safe Mode Biohacking Village - Diabetes Panel4a2Kmq74z5A44:11434M
DEF CON Safe Mode Biohacking Village - Jack Twiddy - How to Grow a Brain in a JarO_4bcdeFFYs22:45194M
DEF CON Safe Mode Biohacking Village - Lucia C Savage - What's Up with Proposed Privacy LegislationlcUrWDCUyCU32:27437M
DEF CON Safe Mode Biohacking Village - Mitchell Parker Panel - Advancing Medical Device Securityrvop42q9eUE51:01506M
DEF CON Safe Mode Biohacking Village - Mix录 Laufer - Making Next Generation Drugs at Homeg7vgMbHwtsI27:29245M
DEF CON Safe Mode Biohacking Village - Negre, McMahon- Securing Medical Devices on a ShoestringBSxmfJ0m4-M01:47:24817M
DEF CON Safe Mode Biohacking Village - Nina Alli - Keynote7BpHCT1AdqI01:29:071G
DEF CON Safe Mode Biohacking Village - Sam Cervantes - Open Ventilator Remote Monitoring ProjectmQEcWpn2msQ31:24308M
DEF CON Safe Mode Biohacking Village - Sarah Blossom - Institutional Review Board for BiohackershEHk1h0SRWM14:12180M
DEF CON Safe Mode Biohacking Village - Seth Carmody - Why is Security Hard?RXAt8lE2TNI23:18170M
DEF CON Safe Mode Biohacking Village - Veronica Schmitt - Medical Tech: How Do We Unf*ck Thingsbs82dyw7zcU27:35218M
DEF CON Safe Mode Biohacking Village - Vidya Murthy - The Underestimated Threat Vector: HomogeneityV_LQgxRG7y011:27150M
DEF CON Safe Mode Biohacking Village - Yong Bee Lim - Understanding DIYBio and Community Labs6Ct7HiWxEFw55:48479M
DEF CON Safe Mode Blockchain Village - Martin Abbatemarco - 7 Phases Of Smart Contract HackinggGUOjtri4n830:4773M
DEF CON Safe Mode Blockchain Village - Josh McIntyre - Chaintuts - Bitcoin Address GeneratorJIe63nm5aNo28:3885M
DEF CON Safe Mode Blockchain Village - Peiyu Wang - Exploit Insecure Crypto WalletzuO-Y_aum0I30:5649M
DEF CON Safe Mode Blockchain Village - Peter Kacherginsky - Attacking & Defending Blockchain Nodesht-oztt7kns45:1292M
DEF CON Safe Mode Blockchain Village - Peter Kacherginsky - KeynoteZRnXDG15nKU53:45108M
DEF CON Safe Mode Blockchain Village - Rastogi Gokul - Verifiable Delay Functions Preventing DDoSOoIaTQhUi8E57:33122M
DEF CON Safe Mode Blockchain Village - Ron Stoner - Securing The CosmosBlc5CsXkQmg52:1287M
DEF CON Safe Mode Blockchain Village - Ryan Rubin - Is DeFi Ready for Prime TimeFb6os7noZiA57:20418M
DEF CON Safe Mode Blockchain Village - Ryan Rubin - Is DeFi Ready for Prime Time Q and AB_TX4J4lZlI06:028M
DEF CON Safe Mode Blockchain Village - Suhyeon Lee - Blockchain for Cyber DefenseKtPR8Dno60E43:1782M
DEF CON Safe Mode Blue Team Village - Intro7cBNuXO34jo08:3778M
DEF CON Safe Mode Blue Team Village - Promo SlideshowYv4w519l_YE10:26126M
DEF CON Safe Mode Blue Team Village - Allen Baranov - How To Stop A Virus With A SpreadsheetTMpIiDVd6D821:21145M
DEF CON Safe Mode Blue Team Village - Bashar Shamma - Moloch OPENSOC CTF TOOL DEMOvLie_B3ZqvE20:15138M
DEF CON Safe Mode Blue Team Village - Canary - Thinkst Canary OPENSOC CTF Tool DemoRKETKYMK3W432:39155M
DEF CON Safe Mode Blue Team Village - ch33r10 - Indicators Of Emulation23Jr-kMkiQc36:04243M
DEF CON Safe Mode Blue Team Village - Connor Morley - OuterHaven UEFI Memory SpacecTKrVGVFp5k36:35273M
DEF CON Safe Mode Blue Team Village - corvusactual - No Question Teamviewer Police and ConsequencecoGmg69YMVM24:31160M
DEF CON Safe Mode Blue Team Village - Holger Unterbrink - Reversing With Dynamic Data Resolverr_RaQHHz7q059:31389M
DEF CON Safe Mode Blue Team Village - Josh - Suricata OPENSOC CTF Tool DemoUPBrpY2SMpg31:49151M
DEF CON Safe Mode Blue Team Village - Juan Francisco Bolivar & Jose Miguel Marichal - 0365 SquattingC8qQ3uKbXsA18:3993M
DEF CON Safe Mode Blue Team Village - JunWei Song & KunYu Chen - QuarkEngineXK-yqHPnsvc30:42205M
DEF CON Safe Mode Blue Team Village - Lennart Koopmann - Graylog OPENSOC CTF Tool DemoRoGh-X0wEvk43:54188M
DEF CON Safe Mode Blue Team Village - Mangatas Tondang - Detecting The Not PowerShell GangdWTZ71S3pe431:34176M
DEF CON Safe Mode Blue Team Village - Mike Cohen - Velociraptor OPENSOC CTF Tool Demo_5Sy7L6HErQ42:37190M
DEF CON Safe Mode Blue Team Village - Panel - Incident Response PanelfyFdoMKyNU801:16:23416M
DEF CON Safe Mode Blue Team Village - Panel - Meet A Mentor ProgramaK3kWXH-3vE01:29:12517M
DEF CON Safe Mode Blue Team Village - Whitney Champion - Osquery OPENSOC CTF Tool DemoqFVTy4TgtZk08:3129M
DEF CON Safe Mode Blue Team Village - zeek - Zeek OPENSOC CTF Tool DemovCGbwM7zrS432:56173M
DEF CON Safe Mode Blue Team Village -Jake Smith & Jack McDowell - Building BLUESPAWN-8QC0CdCbuc52:01250M
DEF CON Safe Mode Blue Team Village -Tim Johnson - Kibana: OPENSOC CTF Tool Demoj9OD8GFU4NM30:42169M
DEF CON Safe Mode Car Hacking Village - Marcelo Sacchetin - ChupaCarBrah-rwXSVT7kNo41:34510M
DEF CON Safe Mode Car Hacking Village - Brent Stone - CAN be super secure Bit Smashing FTW_DDJbY2-2A020:43233M
DEF CON Safe Mode Car Hacking Village - Dan Salloum, Thomas Hayes - Before J1939arRTd-0hq3025:32293M
DEF CON Safe Mode Car Hacking Village - Derrick - All Aboard the CAN Bus or MotorcycleYSApvBDIVCM29:08282M
DEF CON Safe Mode Career Hacking Village - Amelie Koran - The Individual Contributor to Tech Executi847bHTR57NQ28:09196M
DEF CON Safe Mode Career Hacking Village - Bob Wheeler - Veteran Transition TipsUsO5SvFvSAY39:16130M
DEF CON Safe Mode Career Hacking Village - Jenai Marinkovic - Future Proofing Your CareerKCnVCdasZMc24:00100M
DEF CON Safe Mode Career Hacking Village - Panel - Drinks With RecruitersGVJTwNa7IuI51:56395M
DEF CON Safe Mode Career Hacking Village - Roy Wattanasin - Key Ingredients for the Job InterviewsoyoG3FCh-Rg35:2986M
DEF CON Safe Mode Career Hacking Village - Steven Bernstein - Cons & CareersgidqgoF41LQ50:53113M
DEF CON Safe Mode Crypto and Privacy Village - Emily Crose - Fun with FOIA7utszstxBUM37:00174M
DEF CON Safe Mode Crypto and Privacy Village - Zhanna Malekos Smith - Fear Uncertainty and Doubt0AcKJXdeseA25:28180M
DEF CON Safe Mode Crypto and Privacy Village - Cathy Gellis, Riana Pfefferkorn - Fireside Chat678EW8v09z801:08:33560M
DEF CON Safe Mode Crypto and Privacy Village - Hanno Böck - STARTTLS is Dangerous7Sbx8okI9Xw45:20200M
DEF CON Safe Mode Crypto and Privacy Village - Mansi Sheth - How to store sensitive info in 2020?4Tn71-1GN2044:38281M
DEF CON Safe Mode Crypto and Privacy Village - Per Thorsheim - Hacking like Paris HiltonYx-0PdSGb8I48:16472M
DEF CON Safe Mode Crypto and Privacy Village - Porter Adams and Emily Stamm - Online VotingE6qXM-UibdA28:0078M
DEF CON Safe Mode Crypto and Privacy Village -Kelley Robinson- What if we had TLS for phone numbers?SxanoyVA8g425:26148M
DEF CON Safe Mode DC Groups - DC201 New Jersey - Show and Tell90wL1kpmEXQ48:3278M
DEF CON Safe Mode DC Groups - DC212 New York City - Remote PresentingHKs8isufnLU23:5942M
DEF CON Safe Mode DC Groups Village - DC603 Vermont - DNSfbzG570_gVI49:4494M
DEF CON Safe Mode DC Groups Village - Jayson Street - Keynoteisnp54q47VI25:3350M
DEF CON Safe Mode DC Groups Village - DC0471 - Trivandrum Red TeamingLTgJm2cZbaA44:5087M
DEF CON Safe Mode DC Groups Village - DC11562 Santiago - Stories of a Hacker in the Health SectorUw53Fjuhkko01:18:26320M
DEF CON Safe Mode DC Groups Village - DC574 South Bend - OSINTB8AKlitPKSI18:2254M
DEF CON Safe Mode DC Groups Village - DC619, DC858 San Diego - Saving Yourself from MicrosoftbeqFjnS1W3Q43:2582M
DEF CON Safe Mode DC Groups Village - DC644 Tijuana - Espionagej3GqTPgTeq413:3740M
DEF CON Safe Mode DC Groups Village - quaddi - Medical Device SecuritySGZqpM7W_p847:0191M
DEF CON Safe Mode Demo Labs - Chris Nevin - CarnivoreLJFuydx-HtE52:38142M
DEF CON Safe Mode Demo Labs - Matthew Creel - redlureZtCMnKHZJUM29:0276M
DEF CON Safe Mode Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF1NIQs82n3nw30:37228M
DEF CON Safe Mode Demo Labs - Emilio Couto - CIRCO v2jBobjt_8W6o36:18299M
DEF CON Safe Mode Demo Labs - Jakub Botwicz - CotopaxiqkEZ9X5gLv428:50263M
DEF CON Safe Mode Demo Labs - Olivier Bilodeau - PyRDP1q2Eo3x3u0g40:00241M
DEF CON Safe Mode Demo Labs - Tamoaki Tani - malconfscan with cuckooI95HCADP6As19:3166M
DEF CON Safe Mode Demo Labs - Vincent Rose - StarkillerkphstBd9PU419:5858M
DEF CON Safe Mode Demo Labs - Viral Maniar - PhirauteevTDQF3dW2sg21:26225M
DEF CON Safe Mode Ethics Village - Travis LeBlanc - US Privacy and Civil Liberties Oversight BoardbS10sRfpKyE49:16153M
DEF CON Safe Mode Hack The Seas Village - Gary Kessler - Hacker Challenge Single Point PredictionuZ3TQRrplT415:2238M
DEF CON Safe Mode Hack The Seas Village - Gary Kessler - Build a Raspberry AISfLuQIY7HlvY01:13:51167M
DEF CON Safe Mode Hack The Seas Village - Andrew Tierney - Speed 2 The Poseidon AdventurejKrrD0Ue7Kk27:36138M
DEF CON Safe Mode Hack The Seas Village - Gary Kessler - AIS Spoofing Attacks and Some ToolsXNtS0wQIyjY01:03:17263M
DEF CON Safe Mode Hack The Seas Village - Gary Kessler - Build an AIS receiver with a Raspberry PiThoizEv4QV054:13274M
DEF CON Safe Mode Hack The Seas Village - Grant Romundt - Hacking the SeaPodVirhO41bYs058:00312M
DEF CON Safe Mode Hack The Seas Village - Nina Kollars - 40,000 Leagues UUV Death MatchPCgRO1qtIPg56:55374M
DEF CON Safe Mode Hack The Seas Village - Stephen Gerling - Yacht PwnedpERP151VFY048:55242M
DEF CON Safe Mode Ham Radio Village - Ham Radio Snail Mail NTS and the Radiogram Format1wAdJOFS6Vg01:35:57472M
DEF CON Safe Mode Ham Radio Village - Panel Discussion - What makes a good operatortMT28NXbKW030:39682M
DEF CON Safe Mode Ham Radio Village - Eric Escobar - Talking to SatellitesXyrmdDVQN_A50:301G
DEF CON Safe Mode Ham Radio Village - Baloo - APRS DemofBj-HI7uyho38:07285M
DEF CON Safe Mode Ham Radio Village - K0BAK - The K0BAK News Van 2 of 2y7MX6-I3Stc12:4362M
DEF CON Safe Mode Ham Radio Village - Pancake - So you have an SDRwDMsh7TJuqw51:10649M
DEF CON Safe Mode Ham Radio Village - Swissninja - The OSTRWERK Initiative-3ehROEVXmw46:081G
DEF CON Safe Mode Ham Radio Village - Tyler Gardner - Single Board Computers In Amateur RadiopR_0ZA-nsdA45:071G
DEF CON Safe Mode Hardware Hacking Village - Joseph Long - HackerBox 0057 Build6W9r0ip_IDc42:06551M
DEF CON Safe Mode Hardware Hacking Village - Farith Mauro and Luis Mendoza - Onkeypress Hack1shC1dbLg0420:2356M
DEF CON Safe Mode Hardware Hacking Village - Federico Lucifredi -Hardware Hacking 101qAxJBx8GiN050:42180M
DEF CON Safe Mode Hardware Hacking Village - Joseph Long - Learn to Solder the Badge Buddy KitCI1hEpa2Zh837:39293M
DEF CON Safe Mode ICS Village - ICS SecOps Active Defense Concept with Effective Incident ResponseDcOtj8oPMJo31:23669M
DEF CON Safe Mode ICS Village - Chris Kubecka - Operationalizing Cyber NormsLE3eJeGum7E27:22630M
DEF CON Safe Mode ICS Village - Demirel Temel - Playing with ElectricityH2RjbQ0YpAU59:251G
DEF CON Safe Mode ICS Village - Marie Otis - MITRE ICS ATT&CKEphRqE09uQk23:21500M
DEF CON Safe Mode ICS Village - Chris Krebs- KeynotePENObjJR32E14:43129M
DEF CON Safe Mode ICS Village - Fernandez, Gomez - Industrial Cybersecurity in MexicoM32Y7USSGWY24:52558M
DEF CON Safe Mode ICS Village - Joe Slowik - Mission Kill Process Targeting in ICS Attacks-ch322ff4-Y31:18214M
DEF CON Safe Mode ICS Village - Marina Krotofil - Confessions of an Offensive ICS ResearcherhUju8adf4MQ58:101G
DEF CON Safe Mode ICS Village - Tim Yardley - Building a Physical Testbed for Blackstart RestoratlGPDmOjaOO457:181G
DEF CON Safe Mode IoT Village - Barak Sternberg - Hacking smart devices for fun and profitl18wjygqrKM43:01283M
DEF CON Safe Mode IoT Village - Besim Altinok and Anil Celik - IoT Hacking Stories in Real LifeGZsT2FgFRZ816:3078M
DEF CON Safe Mode IoT Village - Chloé Messdaghi - How to Get Rights for HackersV6lElrPNntQ27:53157M
DEF CON Safe Mode IoT Village - Deral Heiland - Getting Started Building an IoT Hardware Hacking LabztYnPAl3kCE01:13:48600M
DEF CON Safe Mode IoT Village - Deral Heiland - NAND Flash Recovering File SystemsC6munjMprzU01:03:21393M
DEF CON Safe Mode IoT Village - Dewank Pant, Shruti Lohani - Your Connected World Isn't Yours Now4Hefeu9lxvs46:471M
DEF CON Safe Mode IoT Village - Dr Amit Bar On, Anahit Tarkhanyan Future of IoT Sec BaselinesrGNKbXIddUc40:48207M
DEF CON Safe Mode IoT Village - Garrett Enochs - Introduction to U Boot Interaction and Hackingy6tzcV_mY6801:18:00565M
DEF CON Safe Mode IoT Village - Jonathan Stines - Learning to Use Logic AnalyzersAzxjBwdK2BE01:15:53457M
DEF CON Safe Mode IoT Village - Kat Fitzgerald - IoT Honeypots and Taming Rogue AppliancestuRhD4GLRpU45:10337M
DEF CON Safe Mode IoT Village - Mark Bereza - VULNtron 4 CVEs Turn a Teleconference Bot into a SpymxQCORr0IJk42:00275M
DEF CON Safe Mode IoT Village - Matthew Byrdwell - Stepped on a NailJEcBhCsBJjA01:00:38481M
DEF CON Safe Mode IoT Village - Netspooky - Hella Booters, Why IoT Botnets Aren't Going AnywheregDZoHorF42E44:25307M
DEF CON Safe Mode IoT Village - Panel - The Joy of Coordinating Vulnerability Disclosureq7R031FNjqk43:27400M
DEF CON Safe Mode IoT Village - Parker Wiksell - Vulnerability Trends in the Supply ChainQthk-M9xVmc43:35305M
DEF CON Safe Mode IoT Village - Sanjana Sarda - Kicking Devices,Taking CVEs: Zoomer Guide to Hacking0G2g-tLMK7030:47195M
DEF CON Safe Mode IoT Village - t1v0 - In Search of the Perfect UPnP ToolkbnTVQg7ZOo29:10210M
DEF CON Safe Mode IoT Village - Troy Brown - Pandemic In Plaintext11qWHjoLT5U20:43145M
DEF CON Safe Mode Lock Bypass Village - Robert Graydon - DIY Bypass ToolsEzL72_OzMK018:0191M
DEF CON Safe Mode Lock Bypass Village - Bill Graydon - Alarms and Access Controlled DoorshGUMUG9VLKU53:53277M
DEF CON Safe Mode Lock Picking Village - Jared Dygart - Safecracking for EveryonehjT-H_S2XAE39:05197M
DEF CON Safe Mode Lock Picking Village - Austin Marck - Keystone to the KingdomCN-oeROUYnk26:47633M
DEF CON Safe Mode Lock Picking Village - John the Greek - Bobby Pins, More Effective Than LockpicksY34oVq5juQ423:39461M
DEF CON Safe Mode Lock Picking Village - N∅thing - How I defeated the Western Electric 30cwHpXsmnd-XA48:29512M
DEF CON Safe Mode Lock Picking Village - N∅thing - Intro to High Security Locks and LockpickingXLCO_Ev6e_458:591G
DEF CON Safe Mode Lock Picking Village - Preston Thomas - Law School for LockpickersHGg9mypLcH028:28112M
DEF CON Safe Mode Lock Picking Village - Steven Collins - Cuff Stuffi_e4anGal1w07:5826M
DEF CON Safe Mode Lockpick Village - Preston Thomas -Intro To LockpickingoZe7uvVmG7c22:34100M
DEF CON Safe Mode Monero Village - rehrar - Monero Wallet BasicsU5PyZT0VUwU29:44131M
DEF CON Safe Mode Monero Village - ArticMine - Transaction Capacity and Feesa206226v9zY27:06117M
DEF CON Safe Mode Monero Village - rehrar - Closing Talkmc-BHxjmu2U05:3757M
DEF CON Safe Mode Monero Village - Sarang - Open Office Q&ArhwD4c86CfI52:561G
DEF CON Safe Mode Monero Village - Meme CompetitioncqsDml_A9LU01:22:55780M
DEF CON Safe Mode Monero Village - Michael - Badge Clinic 2kKqTs5qXjjk58:48604M
DEF CON Safe Mode Monero Village - Michael Schloh von Bennewitz - Badge ClinicrADsW7_TCo056:45499M
DEF CON Safe Mode Monero Village - Monero TriviaeM0mq30DQdc36:17110M
DEF CON Safe Mode Monero Village - Randy Brito - Locha Mesh: Monero Off the Gridm9G0tQZhQDI22:4798M
DEF CON Safe Mode Monero Village - rehrar - Decentralization in a Centralized WorldNSFDlF95GhI31:3572M
DEF CON Safe Mode Monero Village - rehrar - Welcome Talki5UHDpNReVw04:58117M
DEF CON Safe Mode Monero Village - Reuben - Zcoin Competitiongb1TJjg_gJg26:2551M
DEF CON Safe Mode Monero Village - sgp - You're Not the Money Printer Coinbase Outputs64t7Z5p3yIo25:4065M
DEF CON Safe Mode Monero Village - zkao - Bitcoin Monero Atomic SwapsQdPgAl3nBH829:06125M
DEF CON Safe Mode Packet Hacking Village - Catherine Ullman - Dumpster Fires 6 Things About IRsBHCKuwjtwk41:11232M
DEF CON Safe Mode Password Village - Lets crack rockyou txt without using rockyou txt8FtXntEsZdU01:49:381G
DEF CON Safe Mode Password Village - Dr Matt Weir - Practical PCFG Password Cracking Q⧸AuGpOLOjHp_I11:39279M
DEF CON Safe Mode Password Village - Dr Matt Weir - Practical PCFG Password Crackingrri9vBYR60M46:051G
DEF CON Safe Mode Password Village - EvilMog - From Printers to Silver TicketsM9htSTug9TQ12:25217M
DEF CON Safe Mode Password Village - Getting Started with HashcatGr_1_LDUZSY23:49296M
DEF CON Safe Mode Password Village - Hank Leininger - PathWell Dynamic Password Strength Enforcement-712GV6mtRY50:291G
DEF CON Safe Mode Password Village - Jeremi Gosney - Cracking at Extreme Scale4Ell1Tt23NI40:33274M
DEF CON Safe Mode Payment Village - Aleksei Stennikov - PoS Terminal Security UncoveredgtbS3Gr264w34:36119M
DEF CON Safe Mode Payment Village - Arkadiy Litvinenko - Online Banking SecurityX0ZnVVxy04U51:58218M
DEF CON Safe Mode Payment Village - Leigh Anne Galloway - Welcome to the Payment VillageEI14PtTmOzI04:2730M
DEF CON Safe Mode Payment Village - Menaka BaskerPillai - Architecting Modern Payment GatewaysvgJ6ZdwPoqA34:03180M
DEF CON Safe Mode Payment Village - Steven Murdoch - Making Sense of EMV Card DatauOR508ZN2qY37:52128M
DEF CON Safe Mode Payment Village - Uri Rivner - Identity Crisis: Online Account Opening FraudMvsb_Z1Xorw40:44102M
DEF CON Safe Mode Recon Village - Mauro Eldritch - COVID 1984 Propaganda⧸Surveillance in a PandemicC-RglDXbYjc31:1194M
DEF CON Safe Mode Recon Village - Chloe Messdaghi - Burnout is RealJeS-z9P8afg39:1798M
DEF CON Safe Mode Recon Village - Ladislav Baco - Hunting for Blue Mockingbird CoinminersiI077rK6HPI24:2091M
DEF CON Safe Mode Recon Village - Levi - Ambly the Darknet SpiderM2GBkLanb-845:21294M
DEF CON Safe Mode Recon Village - Master Chen - Twitter Word PhrequencywLnONhbqgXE31:3988M
DEF CON Safe Mode Recon Village - Mauro Eldritch - COVID 1984 Pandemic Propaganda and SurveillanceQqy1RiasOR431:1173M
DEF CON Safe Mode Red Team Village - Ali Abdollahi - Bypassing in Mobile Network from Red Team POVASS4GlpwuGA23:22181M
DEF CON Safe Mode Red Team Village - Chris Kubecka - Pwn the WorldJHrrOGjHiXQ57:25477M
DEF CON Safe Mode Red Team Village - Eduardo Arriols - Catch Me if You Canl5Y-laZRDPs01:00:08488M
DEF CON Safe Mode Red Team Village - Evan Anderson - Gray Hat SSH SSHenanigansasm1GoNYObM50:54341M
DEF CON Safe Mode Red Team Village - Jason Haddix - The Bug Hunters MethodologyqPlpN4BVnRY01:16:00671M
DEF CON Safe Mode Red Team Village - Kürşat Akıncı, Mert Can Coşkuner -Android Malware AdventuresBa8XfRYOvsE22:17178M
DEF CON Safe Mode Red Team Village - Mendoza, Cáseres - Sounds Legit Don't Trust That Speaker2nH3L4vlDVE35:29361M
DEF CON Safe Mode Red Team Village - Adam Pennington - Emulating Adversary w Imperfect IntelligencecXlWY3OnjO057:24460M
DEF CON Safe Mode Red Team Village - Allie Mellen - Trust but Verify Maintaining Democracy99Ugm92xW2E35:48240M
DEF CON Safe Mode Red Team Village - Alvaro Ruedo - Total E(A)gressionZxKLbij9XCM22:29178M
DEF CON Safe Mode Red Team Village - Ankur Chowdhary - Autonomous Security Analysis & PentestingHnKh1-nyaTg48:12359M
DEF CON Safe Mode Red Team Village - Anthony Rose, Jake Krasnov - APTs ❤️PowerShell You Should TooGhfiNTsxqxA59:36478M
DEF CON Safe Mode Red Team Village - Apurv Gautam - AutomatingThreat Hunting on the Dark WebjE_Lak6xrg045:31298M
DEF CON Safe Mode Red Team Village - Ch33r10 - Indicators of Emulation Spicy Adversary Emulation7WUDnFleC5Y45:05386M
DEF CON Safe Mode Red Team Village - Chloe Messdaghi - The Art of Balancing a Burnout TalkGHs7ZBMlPZs51:57362M
DEF CON Safe Mode Red Team Village - Chris Cottrell - Guerrilla Red Team Decentralizing AdversaryrEXh3TAZTtk54:40457M
DEF CON Safe Mode Red Team Village - Chris Wysopal - Red Teaming: Born from the Hacking Community1RvzPtwy_tQ30:06223M
DEF CON Safe Mode Red Team Village - Corey Ham, Matt Eidelberg - Breaking the Attack Chain-JPevbBHIOY58:21418M
DEF CON Safe Mode Red Team Village - Daniel Miessler - Mechanizing Methodology Automating DiscoveryL_qoz2_Qyhk19:40148M
DEF CON Safe Mode Red Team Village - Erdener Uyan, Gökberk Gülgün -Executing Red Team ScenariosQouX0zVE43435:19269M
DEF CON Safe Mode Red Team Village - Forrest Fuqua - What College Kids Always Get Wrongu5QtuuMNYFo49:24526M
DEF CON Safe Mode Red Team Village - Gabriel Ryan - dropengine Malleable Payload Creation FrameworkiiK2vBRMMSs53:45393M
DEF CON Safe Mode Red Team Village - Guillermo Buendia - Swift SPID SPEI Basic Hacking TechniquesUsBMPasl7eQ24:28209M
DEF CON Safe Mode Red Team Village - Ibad Shah - From Discovery to DisclosureWD--zLozFOI15:0089M
DEF CON Safe Mode Red Team Village - Jonathan Helmus - Student Roadmap to Becoming a PentesterV4hti6UlCf001:00:44485M
DEF CON Safe Mode Red Team Village - Jorge Orchilles - Deep Dive into Adversary Emulation RansomwareTelqSCdwi1046:11424M
DEF CON Safe Mode Red Team Village - Justin Hutchens - Bypassing Multifactor Auth w⧸ Realtime ReplaycXZHtMM8JYw42:49411M
DEF CON Safe Mode Red Team Village - Kat Fitzgerald - Securing and Pentesting k8s MonsterkYfVc1y94jA52:30397M
DEF CON Safe Mode Red Team Village - Kaustubh - Offensive Embedded ExploitationpL0w-dECE1I01:06:15511M
DEF CON Safe Mode Red Team Village - Kyle Benac - Android Application ExploitationUbT1KRxq9GQ01:00:37489M
DEF CON Safe Mode Red Team Village - Lee Wangenheim - Modern Password Cracking as a MethodologyMrIuEDjp94o50:49459M
DEF CON Safe Mode Red Team Village - Leron Gray - Bypass Python 38 Audit Hooks or Nah?92O_kBDD_aw40:12401M
DEF CON Safe Mode Red Team Village - Madhu Akula - Kubernetes Goat Vulnerable by DesignaEaSZJRbnTo57:00607M
DEF CON Safe Mode Red Team Village - Mathy Vanhoef - Protecting WiFi Beacons from Outside Forgerieshs2Md7407c020:10133M
DEF CON Safe Mode Red Team Village - Mauro Casere - Evil Genius Why You Shouldnt Trust that KeyboardS8geErf2Sos22:45158M
DEF CON Safe Mode Red Team Village - Mazin Ahmed - Hacking Zoom a Hackers Journey into Zoom SecsKDbcwHTrWA52:51552M
DEF CON Safe Mode Red Team Village - Mert Coskuner- RedTeamOps Managing Red Team InfrastructurePk9o7FtUXeM23:45168M
DEF CON Safe Mode Red Team Village - Michael Wylie - Enumerating Cloud File Storage GemsxUbKyFw-lds52:48348M
DEF CON Safe Mode Red Team Village - NahamSec, Barnes - Knock Knock Identifying Assets in the CloudbWtGC6-tqDs59:05441M
DEF CON Safe Mode Red Team Village - Nicolas Mattiocco - Red Flavour of SOC AutomationO9WR2YEs0Zk45:05303M
DEF CON Safe Mode Red Team Village - Noa Novogroder - Back to the Future CompSci and System BiologyUoEBtwk-_a001:04:06684M
DEF CON Safe Mode Red Team Village - Petros Koutrompis - OU Having a Laugh -qUbDWzqhA4Y30:16221M
DEF CON Safe Mode Red Team Village - Phillip Wylie - Inside the Mind of a Threat Actork8-G6oCHNHM38:26258M
DEF CON Safe Mode Red Team Village - Ray Doyle - Weaponized XSS Moving Beyond Alertksq7e6UUDag38:41350M
DEF CON Safe Mode Red Team Village - Rod Soto - Have My Keys Been Pwned API EditionBrDXfmQF1Ec42:24392M
DEF CON Safe Mode Red Team Village - Ryan Ekins - Notebooks Datasets & Clouds for AutomationPc7h9S_UTac52:24749M
DEF CON Safe Mode Red Team Village - Sajal Thomas - Modern Red Team TradecraftPOrREdNw7j801:00:00430M
DEF CON Safe Mode Red Team Village - Shay Nehmad - Making Breach and Attack Simulation AccessibleA2FQNBwBwD851:18698M
DEF CON Safe Mode Red Team Village - Tim Wadhwa-Brown - All of the Threats Intelligence Modeling7ryw3A_pFGY51:00367M
DEF CON Safe Mode Red Team Village - Travis Palmer - Passwd Cracking Beyond 15 Chars, Under $500_bYDbr853Uw42:17350M
DEF CON Safe Mode Red Team Village - Tyler Boykin - 50 Shades of Sudo AbuseC5MvdBM6Nq857:46452M
DEF CON Safe Mode Red Team Village - Vandana Sehgal - Zero Trust a Vision for Securing CloudeuSsqXO53GY38:27256M
DEF CON Safe Mode Red Team Village - Walter Cuestas - Initial Compromise Through Web SidexxPe2X_hbOY41:02288M
DEF CON Safe Mode Red Team Village -Austin Marck - erpwnage Red Team Approach to Targeting SAP1v8jOr3ju9423:53233M
DEF CON Safe Mode Red Team Village -Pablo Gonzalez - ATTPwn Adversarial Emulation0lE5oHqZV0s45:56379M
DEF CON Safe Mode Rogues Village - 0x90 - Outs Forces and Equivoque: How Magicians SpeakBr0bkfRmWFQ57:33609M
DEF CON Safe Mode Rogues Village - James Harrison - Pickpocketing at Home9rS8emBPz6I33:58524M
DEF CON Safe Mode Rogues Village - Simon Weckert - Google Maps HacksOfiolrXZirE32:20315M
DEF CON Safe Mode Voting Village - A Panel with the Feds on Election Security (intro only)LAPHhT5q5dY04:017M
DEF CON Safe Mode Voting Village - Chairman Benjamin Hovland - US Election Assistance CommissionENh9k2Wsr3016:5555M
DEF CON Safe Mode Voting Village - Senator Ron Wydend8lcsf510GE13:1255M
DEF CON Safe Mode Voting Village - A Panel with the Feds on Election Security Introductionr8eJLT9Byvg04:017M
DEF CON Safe Mode Voting Village - Ben Dubow - How Influence Warfare Subverts DemocracyOVvHZAUlIvU22:3571M
DEF CON Safe Mode Voting Village - BiaSciLab - Don't Go PostalfdRC26RF27I17:3078M
DEF CON Safe Mode Voting Village - BiaSciLab - Don't Go Postal7PjeC4UGexs17:3082M
DEF CON Safe Mode Voting Village - Cable, Zaheer - Heightened Election Sec Risks Amidst a PandemicXmoo1UvxRjk24:5570M
DEF CON Safe Mode Voting Village - Cordero Delgadillo - A Lawyer's Reflections on ElectionsrFgT-Kv_UFo37:33212M
DEF CON Safe Mode Voting Village - Day 1 Closing RemarksJQhYmGs1dYg30:12211M
DEF CON Safe Mode Voting Village - Day 1 Opening Remarksw-BD1fmaRco27:06215M
DEF CON Safe Mode Voting Village - Forrest Senti, Mattie Gullixson - Secure the Vote StandardsG9tzo93e1yU14:4946M
DEF CON Safe Mode Voting Village - Jody Westby - Policy Approach to Resolving Cybersecurity Problems1MIna3Fy3mU29:2082M
DEF CON Safe Mode Voting Village - John Odum - Security Challenges Posed by StateL_gnJzpqbL829:13163M
DEF CON Safe Mode Voting Village - Kylee ZabelH6BCMYR9_WQ26:3399M
DEF CON Safe Mode Voting Village - Michael A Specter - The Ballot is Busted before the Blockchain_FHHXJ1AVm426:4657M
DEF CON Safe Mode Voting Village - Nimit Sawhney - Analysis of Data from Mobile Voting Pilotsr-FDnr8po2A23:2985M
DEF CON Safe Mode Voting Village - Panel - A Panel With The Feds on Election SecurityJxkIwLVTxlk01:00:35993M
DEF CON Safe Mode Voting Village - Philip Stark intro only0ae0Ez85L1k01:101M
DEF CON Safe Mode Voting Village - Rep Jackie Speier - Voting Village Keynote Remarkse5aw3_hqg4c16:4057M
DEF CON Safe Mode Voting Village - Sang Oun Lee - Review of Remote Voting in Response to COVID-19UF5RhUXqkBQ18:2233M
DEF CON Safe Mode Voting Village - Secure the Vote - Hack a Faxmcb1w5OQwRs16:2225M
DEF CON Safe Mode Voting Village - Stark Xie -Testing Can't Tell If Ballot Devices Alter Elections608X-5oVLZw24:2160M
DEF CON Safe Mode Voting Village - Stephanie Singer - Protecting Elections with Data ScienceF3xvQvpOuec28:48152M
DEF CON Safe Mode Voting Village - Steve Newell - Leveraging Electronic Balloting Options in COVIDM-Glp9LPBbg18:0659M
DEF CON Safe Mode Voting Village - Susan Greenhalgh - Remote Online Balloting DeliveryFR_f22NdIp418:0656M
DEF CON Safe Mode Wireless Village - FreqyXin - The Basics Of Breaking BLE v3X2ARyfjzxhY01:10:19582M
DEF CON Safe Mode Wireless Village - Eric Escobar - Wireless Blue TeamNtiqbJi33EY23:25143M
DEF CON Safe Mode Wireless Village - cemaxecuter - DragonOS How I kept busy during COVID19JHD9whqzzK430:30321M
DEF CON Safe Mode Wireless Village - wifisecguy - Introduction to WiFi SecurityYzFGBGWKAlE01:06:07475M
DEF CON Safe Mode Wireless Village - wytshadow - Wicked Wardriving with gps and glonassswCSBFO-w6M33:21348M
DEF CON Safe ModeBlockchain Village - Peiyu Wang - Exploit Insecure Crypto WalletoJaNiXVvE8830:5649M
DEF CON Safe ModeBlue Team Village - Olaf Hartong, Mauricio Velazco - Purple On My MindaJf2jPTqkVM01:05:09350M
DEF CON SE VILLAGE - Silvers and Banks - On the Hunt Hacking the Hunt GroupvgKAxd_4s0A50:55344M
DEF COPN 32 - 0 0 0 0 Day Exploiting Localhost APIs From The Browser - Avi Lumel skyGal ElbazGAEOBhsqJI427:14146M
DEFCON 29 IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can YouP6dI2IFI34039:08161M
DEFCON 29 IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoTwQd63Tb7C_Q42:37316M
DEFCON 29 IoT Village - Elazari Tarkhanyan and Cheruvu - Establishing IoT TrustworthinessCqWr9kC6nMw46:19243M
DEFCON 29 IoT Village - Hadad and Kaufman - Reverse Supply Chain AttacknGwZ6qbQCKY25:49173M
DEFCON 29 IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech WarfareRh8IZhhUKV852:25417M
DEFCON 29 IoT Village - Hutch - Alexa Have You Been CompromisediVKYA774LJc40:35259M
DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0daysxUb190HQtjA42:49300M
DEFCON 29 IoT Village - Juneau - Strategic Trust and Deception in the Internet of ThingscR1c2wRU4G020:0191M
DEFCON 29 IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices3cfGguMi9IU53:44377M
DEFCON 29 IoT Village - Messdaghi and Eddy - Representation MattersJGD22OzD39M33:14313M
DEFCON 29 IoT Village - Petro and Cecil - You're Doing IoT RNGdzS1Zf-1Uzo40:04294M
DEFCON 29 IoT Village - Ria Cheruvu - Ethics at the EdgeKN_mA-RpiRs30:22231M
DEFCON 29 IoT Village - Ross and Balazs - MIPS X the Next IoT FrontierV5P2eEhhwUU33:22239M
DEFCON 29 IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses7ymcofBUPWc37:25364M
DEFCON 29 IoT Village - Ted Harrington - When Penetration Testing Isn't Penetration Testing At AllJfXNqQQgImU30:08185M
DEFCON 29 IoT Village - Tim Jensen EapolSniper - IoT Testing Crash CourseSUtDb3ZaPqY46:47237M
DEFCON 29 IoT Village - Victor Hanna - LED Light LunacyNGkRPpwWDLM28:55198M
DEFCON 29 IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar PanelsHyZLKIHU9v828:57231M
DEFCON 33 Video Team - AIxCC with ShellPhishPiJwIUGJGmw32:37256M
DEFCON Documentary Teaser Trailer7s1j1cBw55E03:4434M
DEFE CON 33 - Deploying Deception in Depth for ICS - Brent Muir_ghyf3J92UQ22:18103M
Dennis Giese - Privacy leaks Extracting data from used smart home devices - DEF CON 27 IoT VillageIit4SmzQ2Uo46:20302M
Dimitry Snezhkov - Zombie Ant Farm Practical Tips for Playing Hide and Seek - DEF CON 27 ConferenceEd-LTOZmCeA47:26235M
Dirk jan Mollema - Im In Your Cloud Pwning Your Azure Environment - DEF CON 27 Conferencexei8lAPitX842:05245M
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 ConferenceuJP061PUxgY40:06333M
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 ConferencePMihX693mPE22:21230M
droogie - Go NULL Yourself - DEF CON 27 ConferenceTwRE2QK1Ibc23:57324M
Edward Miro - Rideshare OSINT CarBased SE For Fun and Profit - DEF CON 27 Social Engineering VillageozQXIMbuUG828:27223M
Elie Bursztein - Deep Learning Revolutionizing Side Channel Cryptanalysis - DEF CON 27 ConferenceQXTricqAtPk40:20401M
Elliott Thompson - MI CASA SU CASA My 19216811 is Your 19216811 - DEF CON 27 ConferenceJGezOYIfOWQ36:50550M
Elvis Collado - Greenwaves and Ham - DEF CON 27 IoT Villagee1_vfnnsesw37:27274M
Emilio Couto - CIRCO Cisco Implant Raspberry Controlled Ops - DEF CON 27 Packet Hacking VillageG-ZRdMpVuWY50:10345M
Eric Johnson - Wi Fi 6 Deep Dive - DEF CON 27 Wireless Village73q3kVKzBmc01:16:17307M
Eric Reuter - Reversing Wireless model railroad control system - DEF CON 27 Wireless VillageAJHfl6Dmo7g17:5480M
Ethan Dodge - Scrubber An OSS compilation to protect sources - DEF CON 27 Crypto and Privacy Village75dATldR3Yg18:30127M
Evolution of the Hacker Community in Asia - Jayson Street - DEF CON China BetaRWdNvt4KYgE35:36135M
Eyal Itkin - Say Cheese How I Ransomwared Your DSLR Camera - DEF CON 27 Conferenceq1xTJO6ZnC043:16251M
finalphoenix - Rise of the Hypebots Scripting Streetwear - DEF CON 27 ConferenceRsC4VGztDlg43:40416M
Flipping Locks - Remote Badge Cloning with the Flipper Zero and More - Langston Clements & Dan Gogaro-EkKjj_wc37:03115M
g richter - Reverse Engineering 4g Hotspots for Fun Bugs Net Financial Loss - DEF CON 27 ConferenceMD9zS1GMlK841:38214M
Gerald Doussot - State of DNS Rebinding Attacks & Singularity of Origin - DEF CON 27 Conferencey9-0lICNjOQ42:02290M
Gleb Esman - Solving Crimes with Wireless GeoFencing - DEF CON 27 Packet Hacking VillageGJAsALPHnkY49:10324M
Gregory Pickett - Breaking the Back End Sometimes it's Just Bad Design - DEF CON 27 Conferencez5cXNLeTn9U23:54245M
Guillemo Pilleux - Hacking Wi Fi - DEF CON 27 Wireless Village4a_f23Me1Qg51:42281M
Hacker History Project - The Dark Tangent Interviewed at DEF CON 5 - courtesy of ZDnetohXjTIAmo1U06:4827M
Hadrian Barral - The ABC of Next Gen Shellcoding - DEF CON 27 ConferenceqHj1kquKNk036:15325M
Hak5Crew - Introducing new Hak5 gear - DEF CON 27 Wireless Villagegj6DnxkjuIM49:22282M
Harlo Holmes - Tiplines Today - DEF CON 27 Crypto and Privacy VillagetrFQj6fEic454:15370M
Hila Cohen, Amit Waisel - Malproxy Leave Your Malware at Home - DEF CON 27 ConferenceGYZx0oJU1nI37:35254M
Hyejin Jeong - HACK DMI PWNING HDMI FOR FUN AND PROFIT - DEF CON 27 IoT VillagekDlA3hVB9Os33:59112M
I Am Groot: Examining the Guardians of Windows 10 Security - Chuanda Ding - DEF CON China Betaa0AB76YNMlQ23:26170M
Itzik Kotler - Process Injection Techniques Gotta Catch Them All - DEF CON 27 ConferenceGq6-1xrmFHQ47:57477M
Jack Baker - Hacking WebAssembly Games with Binary Instrumentation - DEF CON 27 ConferenceSa1QzhPNHTc38:16266M
Jacob Baines - Help Me Vulnerabilities You're My Only Hope - DEF CON 27 ConferencemST-9k6m3ug42:13318M
Jaime Sanchez - Derevolutionizing OS Fingerprinting cat and mouse game - DEF CON 27 Recon VillagepsxxT00KavM32:41167M
Jatin Kataria - 100 seconds of Solitude Defeating Cisco Trust Anchor - DEF CON 27 ConferenceT3VPvPTrwB048:08586M
Jay Beale - Attacking and Defending Kubernetes - DEF CON 27 Packet Hacking Village2fmAuR3rnBo54:50311M
Jay Dimartino - The Art of Detection - DEF CON 27 Packet Hacking Village68-sFqv4FJE43:58152M
Jayson Grace - MOSE Using Configuration Management for Evil - DEF CON 27 ConferencecA0LGfxQS2g41:57319M
Jayson Interviews Adrian from DC2744, Garden Route South AfricafHRgB6x78d403:09117M
Jayson Street - I PWN thee I PWN thee not - DEF CON 27 Social Engineering VillageD5kg3jZ0Kcw50:12488M
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 ConferenceyrrxFZfyEsw46:59357M
Jeff Foley - Advanced Recon with OWASP Amass video - DEF CON 27 Recon VillageES6OKjgW36w29:18203M
Jeff Man - Rethinking Security Given the Spectre of a Meltdown - DEF CON 27 Packet Hacking VillageBitqDHxlxYc53:36327M
Jens Muller - Covert Attacks on Email End-to-End Encryption - DEF CON 27 Conference2vFMSJLaOOQ22:42112M
Jesse Michael - Get Off the Kernel if You Can't Drive - DEF CON 27 ConferencetzWq5iUiKKg48:49451M
Jiska - Vacuum Cleaning Security Pinky and The Brain Edition - DEF CON 27 Conferencek5nj7Jhwn9c23:58159M
Jmaxxz - Your Car is My Car - DEF CON 27 Conferencew8SG2V3n4-U41:03653M
Joe Grand - Behind the Scenes of the DEF CON 27 Badge - DEF CON 27 ConferencegnZQcWIX02A56:06385M
Joe Gray- DECEPTICON OPSEC to Slow the OSINT video - DEF CON 27 Recon VillagenB6XFIYGg5o40:44350M
Joseph Cox - How You Can Buy ATT TMobile and Sprint Real Time Location Data - DEF CON 27 Conference3e6n7jDDmj038:35597M
Joseph Muniz- Old Tech vs New Adversaries Round 1 - DEF CON 27 Packet Hacking VillageoP6Ch4gLcV031:59138M
Josh Steinman - NSC and Special Assistant for Cyber - DEF CON 27 Hack the Sea VillageIw2gA4MOW7s17:55122M
Joshua Maddux - API Induced SSRF How ApplePay Scattered Vulns Across the Web - DEF CON 27 Conferencem4BxIf9PUx040:47203M
Julian Blanco - C2 over Maritime AIS and commercial aggregation - DEF CON 27 Hack the Sea VillagewRWh6FVIFeo16:4195M
Junyu Zhou - Web2Own Attacking Desktop Apps fromWeb Security's Perspective - DEF CON 27 ConferenceuXUA24xJsRQ37:30415M
Kala Kinyon - Use Responsibly Recon Like an insider threat for Best User - DEF CON 27 Recon VillageypV1jAw7xzg21:3992M
Karl Koscher - Enabling HTTPS for home network devices - DEF CON 27 Crypto and Privacy Villageaxid9LMWExM20:3171M
Kate Rose - Adversarial Fashion Sartorial Hacking - DEF CON 27 Crypto and Privacy VillagejVcGZ_Ak4NI49:46130M
Katelyn Bowden - Fighting non consensual pornography - DEF CON 27 Crypto and Privacy VillageR1LaCiK6Q9047:49184M
Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror - DEF CON 27 Conference9roY9yBFddc40:58431M
Kent Britain⧸WA5VJB - Antennas for Surveillance - DEF CON 27 Wireless VillagevaQYt7KcVDQ28:10101M
Kyle Gwinnup - Next Generation Process Emulation with Binee - DEF CON 27 Conferencez4OvVFw5pYI43:50366M
Lee Brotherston - A Glorious Celebration of IoT Security - DEF CON 27 IoT VillagePfBMKOannnI27:31128M
Lennart Koopmann - nzyme - A New WiFi Defense System - DEF CON 27 Wireless VillageHUX5vA6VGLs38:02176M
Leon Jacobs - Meticulously Modern Mobile Manipulations - DEF CON 27 Conference7LKXSYFrYAM36:43302M
Lessons learned from five years of DEF CON CTF - Vito Genovese - DEF CON China BetaGZ6Zk1tP9JU32:37257M
M Can Kurnaz - Your next roadtrip free - vulnerable EV charging points - DEF CON 27 IoT Villageo06fhoRb__A16:0197M
m1n1 - Hunting Mobile Rogue Access Points with Wireless Mesh Implants - DEF CON 27 Wireless VillageoTcitUA9mhg46:02224M
Maksim Shudrak - How To Improve Coverage Guided Fuzzing Find New 0days - DEF CON 27 Conference4BkAxMfHSzI40:30428M
Marcus Liotta - Leveraging the Insider Threat - DEF CON 27 Social Engineering VillagefLmgP2h5O8s31:10204M
Marina Simakov - Relaying Credentials has Never Been Easier - DEF CON 27 ConferencevIISsfLh4iM44:26297M
Mark B Cooper - PKI and SHAKEN STIR Will Fix Robocalls - DEF CON 27 Crypto and Privacy VillagerH0X6-lxygk55:35221M
Martin Vigo - From Email Address to Phone Number - DEF CON 27 Recon Village13gPxMUKYPE24:53236M
Master Chen - A URL Shortened By Any Other Name video - DEF CON 27 Recon VillageDEbnP0bmq3Y24:03163M
Matt Nash - Head in the Clouds - DEF CON 27 Packet Hacking VillagebWfDNcibdIY37:41130M
Matt Wixey - Sound Effects Exploring Acoustic Cyberweapons - DEF CON 27 ConferenceftCULiYV7Wg36:47286M
Maxwell Dulin - Hacking the Zyxel NAS 326 from the Perspective of a n00b - DEF CON 27 IoT Villagetzl-0vmOiMQ28:36176M
Micah Zenko - Red Teaming Insights and Examples from Beyond - DEF CON 27 Social Engineering VillageTGzMR9GfnIs29:51157M
Michael Leibowitz - EDR is Coming Hide Yo Sh!t - DEF CON 27 Conferenceq2KUufrjoRo45:06395M
Michael Raggo - Spy versus Spy who is watching who - DEF CON 27 IoT VillageI4oGquBGBRM28:11110M
Michael Stepankin - Apache Solr Injection- DEF CON 27 Conferencexf2E64o4hWc16:20117M
Mike Kiser - Ensuring Privacy through Obfuscation - DEF CON 27 Crypto and Privacy VillageU1wb4_bIVbc49:30236M
Mike Raggo - StegoAugmented Malware - DEF CON 27 Packet Hacking VillageSS6v3g87nos41:51166M
Mike Spicer - I Know What U Did Last Summer 3 Yrs Wireless Monitoring DEFCON - DEF CON 27 Conferencexfau16cyzMM20:2085M
Mitchell Parker - Building OSINT and Recon Program to address Healthcare - DEF CON 27 Recon Village2rS7E5ObCmk40:22176M
Nicolas Oberli - Poking the S in SD Cards - DEF CON 27 ConferenceTlLdqqVa4eI20:25176M
Nikhil Mittal - RACE Minimal Rights and ACE for Active Directory Dominance - DEF CON 27 ConferenceM7Z5h6reGc436:29223M
Nina Kollars - Confessions of an Nespresso Money Mule - DEF CON 27 Conference2IT2oAzTcvU19:55123M
Nishant Sharma - Developing Wifi Access Point - DEF CON 27 Wireless Village36NBthgdN-c48:31335M
Olivier Bilodeau - Industry of Social Media Manipulation Driven by Malware - DEF CON 27 ConferenceF9pR37dos8M49:24167M
Omer Gull - SELECT code execution from using SQlite - DEF CON 27 ConferenceHRbwkpnV1Rw40:55222M
Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits - DEF CON 27 ConferencegIJOtP1AC3A42:13392M
Orange Tsai - Infiltrating Corporate Intranet Like NSA Preauth RCE - DEF CON 27 Conference1IoythC_pIY45:58490M
Panel - DEF CON to help hackers anonymously submit bugs to the government - DEF CON 27 ConferencebfHVm7MGSYU46:11665M
Panel - Hacking Congress The Enemy Of My Enemy Is My Friend - DEF CON 27 ConferencetfRFV7NSeSI40:48549M
Panel - IoT Security and Manufacturers Q and A Panel - DEF CON 27 IoT Villagezl83bZEumC050:17189M
Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 ConferenceInL3YA_6P6s48:50786M
Pedro Cabrera Camara - SDR Against Smart TVs URL Channel Injection Attacks - DEF CON 27 ConferencepmYM5sBtIGs42:56230M
Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village5IraysvK38A31:49295M
phar - No Mas How Side Channel Flaw Opens ATM Pharmacies and Gov to Attack - DEF CON 27 ConferenceviU8Qs1Sccg36:56261M
Philippe Laulheret - Intro to Hardware Hacking - DEF CON 27 ConferenceHuCbr2588-w46:07334M
R Paul Wilson - R Paul Wilson - DEF CON 27 Social Engineering Village9awwtHVLbfI32:05312M
Rebecca Long - Hacking Your Career Thru Social Engineering - DEF CON 27 Social Engineering VillageD0w-R7Q9a0Y27:54216M
Riana Pfefferkorn - Compelled Device Decryption and 5A - DEF CON 27 Crypto and Privacy Village1NF99lSdKCE28:24149M
Richard Gold - Asset Discovery Making Sense of the Ocean of OSINT - DEF CON 27 Recon VillageSrbl8AvN5Wo39:05275M
Rick Ramgattie - SOHOpelessly Broken 2 point 0 - DEF CON 27 IoT VillagejEX9YMbzFXs44:05349M
Robert Sell - Hack the Planet Hackers Influencing Positive Change - DEF CON 27 Recon VillageRWh4RH5XkkE29:24195M
Robin Dreeke - Sizing People Up - DEF CON 27 Social Engineering VillageH3XR4QrJyxA53:47345M
Robin Dreeke - The SEPodcast Ep 120 Live Guest Robin Dreeke - DEF CON 27 Social Engineering VillageBhoSQyVTsa401:13:43787M
Roger Dingledine - The Tor Censorship Arms Race The Next Chapter - DEF CON 27 ConferenceZB8ODpw_om841:52722M
Russell Butturini - Phishing Freakonomics - DEF CON 27 Packet Hacking Village6NuaZjO-VVs54:22314M
Ryan MacDougall - OSINT in the Real World - DEF CON 27 Social Engineering VillageDSEGmdzs9Kg29:20162M
s0lst1c3 - War Never Changes Attacks Against WPA3s Enhanced Open - DEF CON 27 Wireless Villagexo_iUfbCyN440:50299M
Sam Erb - Hunting Certificates and Servers - DEF CON 27 Packet Hacking Village1pqCqz3JzXE16:5065M
Sarah McCarthy - Quantum Safe Instantaneous Vehicle Comms - DEF CON 27 Crypto and Privacy VillageeblBo40VlRs15:08105M
Save the Date - DEF CON's first New Year's Eve party!dUsm26MlA7M00:302M
Senator Ron Wyden - Can You Track Me Now - DEF CON 27 ConferenceLylMvKFdwJU38:34684M
Seyfullah KILIÇ - OSINT Approach in Big Data - DEF CON 27 Recon VillagebI5jTobouW424:45163M
Shane McCombs - Why vigilantism doesnt work - DEF CON 27 Social Engineering VillageXWZZDCnCRXs30:14171M
Sheila Ayelen Berta - Backdooring Hardware by Injecting Malicious Payloads - DEF CON 27 Conference2Tik3ut9Wa037:43234M
smea - Adventures In Smart Buttplug Penetration testing - DEF CON 27 ConferenceRnxcPeemHSc45:34196M
Spreading Malware with Google Nice Quilombo - Fabian Cuchietti Gonzalo Sanchez - DEF CON China Betazrz68asfckk23:30409M
Stephan Gerling - Yacht Hacking from SatCOM to engine control - DEF CON 27 Hack the Sea Villagevt2t75RoCDY58:12475M
Stephan Huber - Im on Your Phone Listening Attacking VoIP Config Interfaces - DEF CON 27 Conference4Ing58vWkx043:03154M
Steve Thomas - Easy PAKE Oven - DEF CON 27 Crypto and Privacy Village28SM5ILpHEE43:39183M
Suchismita Pahi - How to Integrate Privacy Legal Security - DEF CON 27 Crypto and Privacy VillageNSuII5D76kI45:07259M
Susan - Social Media The New Court of Public opinion - DEF CON 27 Recon VillagezCHHAnPK3DE20:38159M
Ted - Are you inteRESTed in Kismet? - DEF CON 27 Wireless Village_XlIKCMy3AM18:09116M
The Dark Tangent - Closing Ceremonies - DEF CON 27 Conference_pbGZg46hBk01:53:071G
The Ricks - WCTF Gear Talk - DEF CON 27 Wireless Village3eSo5v35rpw02:10:47786M
Tiffany Li - Facial Recognition DNA and Biometric Privacy - DEF CON 27 Crypto and Privacy VillagebxbazQ6wJlU26:50110M
Title: DEF CON 32 - DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen - Jen Easterly, Jeff MossQCoRhK7u9qw48:131G
Tom Kopchak - Lessons Learned Running a Pentesting Competition - DEF CON 27 Packet Hacking VillageW_tX2dhXm5s56:43221M
Travis Palmer - First Try DNS Cache Poisoning with IPv4 and IPv6 - DEF CON 27 Packet Hacking VillagejM4wKCGvbp048:13194M
Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot - DEF CON 27 ConferencecFkaobkRyyI18:27142M
Tyler Kell - Towards Usable Dining Crypto Networks w Howl - DEF CON 27 Crypto and Privacy VillageOr-RN4MoE3U19:1872M
Utku Sen - Generating Personalized Wordlists by Analyzing Targets Tweets - DEF CON 27 Recon VillageR3XuI9JUFDA19:3568M
Utku Sen - Personalized Wordlists With NLP by Analyzing Tweets - DEF CON 27 Packet Hacking Village4AtmC7P0vzc24:4489M
Vitor Ventura - Snoop all Telegram messages - DEF CON 27 Crypto and Privacy Village8BmZBnS30As26:01100M
Wayne Ronaldson - RED TEAMING FROM DOWN UNDER - DEF CON 27 Social Engineering VillageIJ0MuyzaaaY33:58240M
Wenxiang Qian - Breaking Google Home Exploit It with SQLite - DEF CON 27 ConferenceYBwT7PU6QU438:36159M
Wicked Clown - Finding the needle in the Twitter haystack - DEF CON 27 Recon Village9FnE3Y9YMJs12:4973M
WillC - Phreaking Elevators - DEF CON 27 ConferenceNoZ7ujJhb3k40:00666M
William Suthers - PIE HW based Prebellico Intel Exfiltration Botnet - DEF CON 27 Recon VillageyDvcBeP5ekI48:39412M
Winnona DeSombre - Bestsellers in the Underground Economy - DEF CON 27 Packet Hacking VillageajMwvsJTz5825:04126M
Woody - The Ford Hack Raptor Captor video - DEF CON 27 Wireless Village9gfg8gk3lVw58:35229M
xBen Benmap Morris - Finding Secrets in Publicly Exposed Ebs Volumes - DEF CON 27 ConferenceHXM1rBk_wXs44:49433M
Xiangqian Zhang - Bugfinding & Exploit Techniques Android File Transfer Apps - DEF CON 27 Conference9gkconldTAU34:14308M
XiaoHuiHui - All the 4G Modules Could Be Hacked - DEF CON 27 ConferenceOORUkEsannA47:22341M
Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space - DEF CON 27 ConferenceDJFxhShJ6Ns38:57328M
Xiling Gong - Exploiting Qualcomm WLAN and Modem Over the Air - DEF CON 27 ConferenceKxdfX9NxfA432:26193M
You logged into my account - Daizibukaikou - DEF CON China BetammrvFoF1wh445:04153M
YouTube Housekeeping Alert2b8AWLTq67w00:409M