<- back to youtube channels
VideoIDLengthSize
Brent Stone - Reverse Engineering 17+ Cars in Less than 10 Minutes - DEF CON 27 ConferenceKkgxFplsTnM17:4672M
Bug Crowd - Lets get technical and hunt harder video - DEF CON 27 Recon Villagezj50_lMV-pI31:28137M
DEF CON 15 - Patrik Karlsson - SQL InjectionQzZyFcjQ25Y39:2280M
DEF CON 17 - Kevin Johnson and Panel - Injectable Exploitsi6YJ5AcuBFU41:13201M
DEF CON 2020 NYE MISS JACKALOPE DJ Music VideoXKyqli9qFM849:511G
DEF CON 2020 NYE Skittish & Bus DJ Music VideoUt6d6SaS3e445:591G
DEF CON 2020 NYE Yesterday & Tomorrow DJ Music VideoV9kae0iTr6E50:371G
DEF CON 22 - Brian Gorenc and Matt Molinyawe - Building Your Own SMS⧸MMS Fuzzerzn6D-iVcRwg22:30121M
DEF CON 23 - 1057 - RICK ASTLEYgzjMrSknbEI46:30288M
DEF CON 23 - McSweeny and Soltani - How to Hack Gov: Technologists as Policy Makersyj18lz1dwEc50:44279M
DEF CON 23 - Michael Walker and Jordan Wiens - Machine vs Machine: DARPAs Fully Automated CTFejPghbtAG5845:30300M
DEF CON 25 - Sean Dillon, Zach Harding - Koadic C: Windows COM Command & Control FrameworkHJ_8VUgYzMw44:44104M
DEF CON 26 BCOS Monero Village - Howard hyc Chu - Inside Monero9SuzXZj9FIk53:38402M
DEF CON 26 RECON VILLAGE - Lloyd Miller - Applied OSINT For Politics Turning Open Data Into NewsRfT5-EPy7qc46:21292M
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows - LIVE4J4RT4oMYdA47:51163M
DEF CON 29 - Joseph Gabay - DoS Denial of Shopping Analyzing and Exploiting Physical Shopping CartfBICDODmCPI31:12189M
DEF CON 29 - Michael and Katie Whitely, The Dark Tangent - Making the DEF CON 29 Badge - LIVEig8NFHX8wgE46:35693M
DEF CON 29 - The Dark Tangent - Closing Ceremonies Livey0S417FXWTg01:53:241G
DEF CON 29 - Policy Panel - HACKERS INTO THE UN Cyber Discussions on War and Peace - LIVEDwpkF2alTOQ49:36785M
DEF CON 29 - Agent X - A look inside security at the New York TimesU2-8MNx8nsg49:28537M
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA KeysBRsXsUEIU7020:01193M
DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS man Comes For Us AllNARJrwX_KFY40:09515M
DEF CON 29 - Barak Sternberg - Extension Land Exploits and Rootkits in Browser Extensions - LIVEn4iV_XMRNe837:25388M
DEF CON 29 - Barak Sternberg - Extension Land: Exploits and Rootkits in Your Browser ExtensionsPpSftQuCEDw48:55497M
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza: Writing Golang Malware3RQb05ITSyk45:29826M
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm WiresLiz9R_QxSgk45:11232M
DEF CON 29 - Brian Hong - Sleight of ARM: Demystifying Intel Houdini9oQ5XjA1aq044:02282M
DEF CON 29 - Cedric Owens - Gone Apple Pickin: Red Teaming MacOS Environments in 2021IiMladUbL6E52:04566M
DEF CON 29 - Chad Seaman - UPnProxyPot: Fake the Funk, Become a Blackhat Proxy, MITM their TLS...mHCGNUsrTf045:02418M
DEF CON 29 - Christian Dameff MD, Jeff Tully MD, Jessica Wilkerson, Josh Corman - Do No Harm - LIVEPf4HJNGcMXg01:23:37727M
DEF CON 29 - Christian Dameff MD, Jeff Tully MD, Jessica Wilkerson, Josh Corman - Do No Harm - PANELphtBJciRz5457:58584M
DEF CON 29 - Christopher Wade - Breaking Secure Bootloadersz4gIxdFfJDg40:58300M
DEF CON 29 - Claire Vacherot - Sneak into buildings with KNXnetIPQofeTV39kQE34:55369M
DEF CON 29 - Cory Doctorow - Privacy Without MonopolydeRRR5B1hwI29:09546M
DEF CON 29 - Dan Petro - You're Doing IoT RNGZuqw0-jZh9Y40:04439M
DEF CON 29 - Dan Petro, Alan Cecil - You're Doing IOT RNG - LIVEjXJ9f9DBaVk44:30456M
DEF CON 29 - David Dworken - Worming through IDEspzqu_qaoNuY22:49172M
DEF CON 29 - Dimitry 'Op Nomad' Snezhkov - Use of Offensive Enclaves In Adversarial OperationsWWGkaGBtn2Q21:21312M
DEF CON 29 - Dimitry 'Op Nomad' Snezhkov - Racketeer Toolkit: Prototyping Controlled Ransomware OpsVJ8aqReB11820:38239M
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock - Hacking Humans with AI as a ServicetWWhRbzhkrg26:28272M
DEF CON 29 - Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau - eBPF, I thought we were friends!5zixNDolLrg48:54292M
DEF CON 29 - Hao Xing, Zekai Wu - How I use a JSON 0day to Steal Your Money on the BlockchainpUexrXOGCkE39:46438M
DEF CON 29 - hyp3ri0n aka Alejandro Caceres Jason Hopper - PunkSPIDER and IOStation: Making a MessDlS_sl4hTWg45:36602M
DEF CON 29 - Ian Coldwater, Chad Rikansrud - Real Life Story of the 1st Mainframe Container Breakout7DXF7YDBf-g42:13107M
DEF CON 29 - Ian Vitek - Central Bank Digital Currency, Threats and Vulnerabilities-MK0bn3Ys_M53:37315M
DEF CON 29 - Ionut Cernica - Hack the hackers Leaking data over SSL TLSWNXEuFaRUkU19:28296M
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver VulnerabilityiWu_xHI4aDI42:35337M
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver VulnerabilityvdesswZYz-842:35337M
DEF CON 29 - James Kettle - HTTP2: The Sequel is Always WorserHxVVeM9R-M40:04230M
DEF CON 29 - Jeff Dileo - Instrument and Find Out: Parasitic Tracers for High Level LanguagesIy1BNywebpY21:56250M
DEF CON 29 - Jenko Hwong - New Phishing Attacks Exploiting OAuth Authentication Flows9slRYvpKHp445:58551M
DEF CON 29 - Jesse 'Agent X' Krembs - A Look Inside Security at the New York Times - LIVEPbBxG2Npl-M47:21567M
DEF CON 29 - Kelly Kaoudis, Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing_o1RPJAe4kU39:38241M
DEF CON 29 - Laura Abbott, Rick Altherr -Breaking TrustZone M: Privilege Escalation on LPC55S69eKKgaGbcq4o49:25571M
DEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA EcosystemsL0w_aE4jRFw42:18316M
DEF CON 29 - Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 ConnectionssuxDcYViwao45:33442M
DEF CON 29 - Matthew Bryant - Hacking G Suite The Power of Dark Apps Script Magic - LIVE6YimrCDK19A42:42255M
DEF CON 29 - Matthew Bryant - Hacking G Suite: The Power of Dark Apps Script Magic6AsVUS79gLw43:51314M
DEF CON 29 - MAVSH - Attacking from Above - LIVECJZ2gCLopyU51:32407M
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 BadgeH3kdq40PY3s27:47410M
DEF CON 29 - Mickey Shkatov, Jesse Michael - High Stakes Updates: BIOS RCE OMG WTF BBQqxWfkSonK7M38:51375M
DEF CON 29 - Orange Tsai - ProxyLogon Just Tip of the Iceberg, New Attack Surface on Exchange Server5mqid-7zp8k47:37668M
DEF CON 29 - Panel - Rebooting Critical Infrastructure Protection - LIVEZLGBHxs7rTU49:57927M
DEF CON 29 - PatH - Warping Reality: Creating and Countering the Next Generation of Linux Rootkitsg6SKWT7sROQ43:05485M
DEF CON 29 - Patrick Wardle - Bundles of Joy: Breaking MacOS via Subverted Applications BundlesraSTgFqYaoc44:42633M
DEF CON 29 - Paz Hameiri - TEMPEST Radio Stationm9WkEwshNKc45:00539M
DEF CON 29 - Policy Panel - Ransomware’s Big Year From Nuisance to Scourge - LIVExpvtdJV5DnU51:07921M
DEF CON 29 - Rex Guo, Junyuan Zeng - Phantom Attack: Evading System Call MonitoringyaAdM8pWKG839:28227M
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW A Novel Covert Communication Scheme - LIVEJeTsJCfBE5U44:24439M
DEF CON 29 - Reza Soosahabi, Chuck McAuley - SPARROW: A Novel Covert Communication SchemeoaLIo9HwW-g44:29170M
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E I E I CARcIcbAMO6sxo43:40204M
DEF CON 29 - Richard Thieme AKA neuralcowboy - UFOs: Misinformation, Disinfo, and the Basic TruthmExktWB0qz444:09603M
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee?JpL3lySZNeM45:58489M
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanningJl-CU6G4Ofc45:23361M
DEF CON 29 - Roy Davis - No Key No PIN No Combo No Problem Pwning ATMs For Fun and Profit9cG-JL0LHYw47:13420M
DEF CON 29 - Sagi Sheinfeld, Eyal Karni, Yaron Zinar - Using M(achine)ITM to Attack Active DirectorylYrNH5hmorY46:43390M
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try AttackVOIvEqjJNOY38:16293M
DEF CON 29 - Salvador Mendoza - PINATA PIN Automatic Try Attack - LIVEmeRL_JXDQpk27:06220M
DEF CON 29 - Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMIsDCIjcUEFj047:29265M
DEF CON 29 - Sheila A Berta - The Unbelievable Insecurity of the Big Data Stackvl9hk4fQdos41:33369M
DEF CON 29 - Shir Tamari, Ami Luttwak - New class of DNS Vulns Affecting DNS-as-Service Platforms72uzIZPyVjI26:12354M
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of VulnszpouLO-GXLo27:1281M
DEF CON 29 - Slava Makkaveev - I know how to take over your Kindle with an e-book1jM_r-pe8Ss18:59218M
DEF CON 29 - Tamas K Lengyel - Fuzzing Linux with Xen_dXC_I2ybr443:00313M
DEF CON 29 - The Dark Tangent, Panel - DEF CON 102 - LIVEBWXAmImiNZA45:12894M
DEF CON 29 - Thomas Roth - Hacking the Apple AirTagspaxErRRsrTU38:31145M
DEF CON 29 - Tianze Ding - Vulnerability Exchange: One Domain Account For More Than Exchange Server7h38rI8KT3045:46262M
DEF CON 29 - Tom Van Goethem, Mathy Vanhoef - Timeless Timing Attackss5w4RG7-Y6g42:27305M
DEF CON 29 - Tomer Bar, Eran Segal - 2021 Our Journey Back To The Future Of Windows VulnerabilitiesVxNi5pVDZU042:16401M
DEF CON 29 - Vivek Nair - Time Turner Hacking RF Attendance Systems To Be in Two Places at OnceNdAIeXy2zoY22:02336M
DEF CON 29 - Yuhao Weng, Steven Seeley, Zhiniang Peng - An Attack Surface Tour of SharePoint ServermVXrl4W1jOU43:17317M
DEF CON 29 - Zabrocki, Matrosov - Glitching RISC-V chips: MTVEC corruption for hardening ISAiz_Y1lOtX0852:45744M
DEF CON 29 - Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in AppleoAMZxKsZQp040:02214M
DEF CON 29 -Jiska, Alexander Heinrich - Wibbly Wobbly, Timey Wimey Whats Inside Apples U1 chipk1H7fiVlTPA39:37404M
DEF CON 29 -Joseph Gabay - DoS Denial of Shopping: Analyzing and Exploiting Shopping Cart SystemsLmSyb0kBvGE22:23367M
DEF CON 29 -Justin Perdok - Hi Im DOMAIN Steve, Please Let Me Access VLAN2lDCoyxIhTN835:08362M
DEF CON 29 Adversary Village - Abhijith B R - Village Kick OffkdSFjjPZFpo08:53143M
DEF CON 29 Adversary Village - Atul & Harshal - Tenacity An Adversary Emulation Tool for PersistenceJ1liEq2R_rE29:13271M
DEF CON 29 Adversary Village - Carlos Polop - New Generation of PEAS9_fJv_weLU030:25450M
DEF CON 29 Adversary Village - Cheryl Biswas - Signed, Sealed, Delivered Comparing Chinese APTsVAHBq2pKZGY44:44339M
DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework0Z3VadqyFiM46:51464M
DEF CON 29 Adversary Village - Daniel Isler - How I got COVID in a RedTeam SE and Physical IntrusionXhGfswtnzmY30:05408M
DEF CON 29 Adversary Village - David Hunt - Prelude OperatorkzeKtqxk3cM29:36410M
DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary SimulationsVorzjbpoQZc01:45:451G
DEF CON 29 Adversary Village - Gil Biton - Scaling Up Offensive PipelinesEHEohd2iZRA37:01498M
DEF CON 29 Adversary Village - Jonas Knudsen -Tool Demo: ImproHound Identify AD Tiering ViolationsFRSVu0GBR3w26:34267M
DEF CON 29 Adversary Village - Jose Garduno - C2Centipede APT level C2 communications for common revm6ygA5oPSQo47:53650M
DEF CON 29 Adversary Village - Juneau Jones - Game Theory: Understanding and Strategy and DeceptionOJb-omL2TtM25:00178M
DEF CON 29 Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC Failures with RedELK_7LJUjzdgiY45:41701M
DEF CON 29 Adversary Village - Mark Loveless - A Short History and An Example AttackXuNqM-0Ufx029:50491M
DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypass Catch My Payload If You Can69xsb_TeazA41:47435M
DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulationyi1epKf0lcM38:22468M
DEF CON 29 Adversary Village - Mauro Eldritch, Luis Ramirez - Everything is a C2 if you're braveTWcBySQgfBE41:44315M
DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversaryq-C_Pjbrgec30:37280M
DEF CON 29 Adversary Village - Samuel Kimmons - Intro to Adversary Emulationc9uUwNPCIDY30:39433M
DEF CON 29 Adversary Village - Sanne Maasakkers - Phish Like An APTeJPx-Vr-U8E29:38340M
DEF CON 29 Adversary Village - Sergey Chubarov - From OnPrem to the Cloud: Hybrid AD Attack PathHv2wZLb5Lsw34:21298M
DEF CON 29 Adversary Village - Shantanu Khandelwal - Red Team Credentials Recon: OLD with a TWISTBXD7ieT1V5k26:12342M
DEF CON 29 Adversary Village - Stephan Wampouille - Autonomous Lateral Movement8Wlj0a_Kqw013:2793M
DEF CON 29 Aerospace Village - Elizabeth Wharton - Lost In Space No one Can Hear Your Breachf-CIRpSpRDY58:52646M
DEF CON 29 Aerospace Village - Alex Lomas, Phil Eveleigh - Hacking Legacy IFEC in old 747suo9nwfbbTFI21:49156M
DEF CON 29 Aerospace Village - Allan Tart - Holistic View of a Flight with Crowd Sourced DataV0Vad2q6xUA25:46122M
DEF CON 29 Aerospace Village - Brandon Bailey - Unboxing the Spacecraft Software BlackBox HuntingNkAkL3odXks39:34145M
DEF CON 29 Aerospace Village - Darren Cofer - Steal This Drone High Assurance Cyber Military SystemsX9rsv4YIShY24:3879M
DEF CON 29 Aerospace Village - James Pavur - Threat Modeling for Space Hitchhikers7FH6mb7iwIQ25:2786M
DEF CON 29 Aerospace Village - Jason Whelan - Defending the Unmanned Aerial VehicleGT-Fl4bKgXs25:4494M
DEF CON 29 Aerospace Village - Joshua Smailes - CPDLC Man in the Middle AttacksONV7OsoRLM024:26128M
DEF CON 29 Aerospace Village - Kevin Hood - Developing Aerospace Security 3D Training ModelsHlp8CQA5xJI19:2363M
DEF CON 29 Aerospace Village - Leeloo Granger - Evaluating Wireless Attacks on Real World AvionicsZ-WYRI4cBY415:1896M
DEF CON 29 Aerospace Village - Matt Gaffney - VDP in Aviation Experiences and Lessons LearntHH6EjTl7oJk30:14157M
DEF CON 29 Aerospace Village - Nicholas Childs - Don’t fear the BUS, it won’t run you overoiQ6_vWOxqE29:58163M
DEF CON 29 Aerospace Village - Panel - Hack A Sat 2 The Good, The Bad and the Cyber SecurekjmiPyVSuSI30:48616M
DEF CON 29 Aerospace Village - Panel - True Story - Hackers in the Aerospace SectorpG5hWEwqQjY27:37250M
DEF CON 29 Aerospace Village - Pearce Barry - Collecting CANs a Bridge Less TravelledopNmUR-889s27:5761M
DEF CON 29 Aerospace Village - Ronald Brobert - Fuzzing NASA Core Flight System SoftwareYtExxB-ayo026:37118M
DEF CON 29 Aerospace Village - Steve Luczynski, Larry Grossman - Federal Perspective on AerospaceyeAFnhSnjIE30:00246M
DEF CON 29 BIC Village - Keith Chapman - The Action Plan for Cyber DiversityrjowVs_0XLc20:57157M
DEF CON 29 BIC Village - Maurice Turner - Tackling The Remnants of Systematic Discrimination in Techh7y3-9VST7814:3936M
DEF CON 29 BIC Village - Nico Smith - 40 Cores and A CPUrd0LgoP9yo833:31194M
DEF CON 29 BIC Village - Ochaun Marshall - The OPSEC of ProtestingQaIqN8cvVRE26:58177M
DEF CON 29 Biohacking Village - Sounil Yu - Cyber Defense Matrix in Healthcare9ZecqDOxpp827:17124M
DEF CON 29 Biohacking Village - Aaron Guzman - OWASP & CSA IoT Impacting Medical Security9m1lFlBYUGM39:14108M
DEF CON 29 Biohacking Village - Alex Hoekstra - Open Source Vaccine Developer Kits VDKsVKlH-em9XaA28:16138M
DEF CON 29 Biohacking Village - Alex Pearlman - A Cohort of Pirate ShipsM0OWUcjv5v418:0283M
DEF CON 29 Biohacking Village - Alissa Knight, Mitch Parker - Playing with FHIRwrNyd60XPMg47:07131M
DEF CON 29 Biohacking Village - Andrea Downing -No Aggregation Without Representation_7eO0FoOk9M39:06292M
DEF CON 29 Biohacking Village - Christian Dameff, Jeff Tully - The Future State of HealthcarerRynLAr0Urk30:1880M
DEF CON 29 Biohacking Village - Jennifer Goldsack, Jessilyn Dunn - The Digital PhysiomeOXDz-ErBKKk48:54274M
DEF CON 29 Biohacking Village - Lucia Savage, @BadHippa -A Talk with @BadHIPPA,jREnTm2QeE442:08415M
DEF CON 29 Biohacking Village - Mariam Elgabry - Internet of Ingestible Things Security by DesignaVOytk6ItjE13:1178M
DEF CON 29 Biohacking Village - Matt McMahon, Shannon Lantzy - The Economics of CybersecurityKWMUHSYkZIc20:5680M
DEF CON 29 Biohacking Village - Mixæl Laufer - The Little ThingsL7cF98LtKbo25:44410M
DEF CON 29 Biohacking Village - Nia Johnson - Reflections on Race, Health, and EquityaS7hCyw9Q0Q45:58506M
DEF CON 29 Biohacking Village - Ohad Zaidenberg - Fishing or HuntingNcDtynphGA050:53218M
DEF CON 29 Biohacking Village - Panel - Cloud security for Healthcare and Life SciencesRtunCgVQoW401:03:22337M
DEF CON 29 Biohacking Village - Pia Zaragoza, Joel Isaac -HC Innovation with People of All AbilitiesdBxzye7iDP031:2092M
DEF CON 29 Biohacking Village - RedDragon - Chinese Military Bioweapons and Intimidation Operations0M14yenB4TQ32:21120M
DEF CON 29 Biohacking Village - Rob Suarez - Why you should join the Biohacking VillageF2l-5XkbWDs15:2495M
DEF CON 29 Biohacking Village - Thom Dixon - Securing the Internet of Biological ThingsrRtEiUJ-sH819:0662M
DEF CON 29 Biohacking Village - Vee Schmitt, Ken Kato - Red vs Blue vs GreenYH_kdkoJKjw38:29174M
DEF CON 29 Blockchain Village - Josh McIntyre - Subtle Ways to Lose Your CryptocurrencyP7Y_jpsn7kQ40:12179M
DEF CON 29 Blockchain Village - Anto Joseph - Flash Loans DemystifiedlxTwFmGlM3039:2185M
DEF CON 29 Blockchain Village - Byeongcheol Yoo - Will Secure Element Strengthen Crypto Wallets0rdpLlh13V444:45102M
DEF CON 29 Blockchain Village - Colin Cantrell - Scaling Blockchains A Novel ApproachLAxpGVkzIBI01:03:23239M
DEF CON 29 Blockchain Village - Dabao Wong - Understanding Unlimited Approval in EthereumOjbc_6_8JjA49:4080M
DEF CON 29 Blockchain Village - Gokul Alex, Tejaswa Rastogi - Preventing Sandwich AttackspRq1B9mMdkE01:05:19144M
DEF CON 29 Blockchain Village - Michael Lewellen - Ethereum Hacks & How to Stop ThemtyrGSQmJ-gk45:17134M
DEF CON 29 Blockchain Village - Peter Kacherginsky - COSTA Coinbase Secure Trait AnalyzerzO0Y5ChlMXI25:1563M
DEF CON 29 Blockchain Village - Reddcoin & TechAdept - CTF Contestaoz3e_BClEI14:1589M
DEF CON 29 Blockchain Village - Shinchul Park, Seungjoo Kim - Blockchain as a Threat Modeling Tooleo1b1CohnD438:08127M
DEF CON 29 Blockchain Village - Yaz Khoury - Surviving 51 Percent Attackswgv9TFP6M5046:27159M
DEF CON 29 Blue Team Village - Henry - How do you ALL THE CLOUDS96tgp9ht5Ag26:17125M
DEF CON 29 Blue Team Village - Meisam Eslahi - Scope X Hunt in the OceanbDUZ5HuF63429:56192M
DEF CON 29 Blue Team Village - Ch33r10, Jorge Orchilles - BTV Presents Threat Report Roulette8viQbHQjJQM55:54410M
DEF CON 29 Blue Team Village - Charles Rumford - Uncomfortable NetworkingbMc2pvZMxAc30:35100M
DEF CON 29 Blue Team Village - Drimacus - Leveraging NGFWs for Threat HuntingWT5TCzzkINI23:30114M
DEF CON 29 Blue Team Village - Gert-Jan Bruggink - This is what we thought would happen in 2021a3UtMuz_GSA28:05283M
DEF CON 29 Blue Team Village - Igal Flegmann - I know who has access to my cloud, do youyCv799Tgr8U10:2754M
DEF CON 29 Blue Team Village - John Bambenek - Adventures in Pro Bono Digital Forensics WorkXEHHpb4wAwU51:55252M
DEF CON 29 Blue Team Village - Karl Lovink, - Use DNS to detect domains abused for phishingWtAS6i5Fp2M48:38408M
DEF CON 29 Blue Team Village - Logjamming Tales of innovation, intrigue, & shenanigansTFwHEfND8Xo36:14400M
DEF CON 29 Blue Team Village - Mark Morowczynski - Modern Authentication for the Security AdmingMjLC2PwKFo45:28301M
DEF CON 29 Blue Team Village - Mike Cohen - Velociraptor Dig DeeperTBWisjyP3zY34:37229M
DEF CON 29 Blue Team Village - muteki - Year of Mentoring BTV’s Meet a Mentor Turns One-6wG9oEPDu432:40184M
DEF CON 29 Blue Team Village - Rabbit - Structured Analytical Techniques for Improving Info SecIAHjwop8BE032:17184M
DEF CON 29 Blue Team Village - Renzon Cruz - Forensicating Endpoint Artifacts in Cloud Storage SvcsfvCX7DP8rw432:24206M
DEF CON 29 Blue Team Village - Sebastian Provost - Yeet the leet with OsqueryYJkkYLM5GXY47:32173M
DEF CON 29 Blue Team Village - Wendy Edwards - What Machine Learning Can and Can't Do for SecurityFfdnTJ0gVDs24:31117M
DEF CON 29 Car Hacking Village - Ben Gardiner - Commercial Transportation Trucking Hackingd7_vUB76NAI46:06629M
DEF CON 29 Car Hacking Village - Samir Bhagwat - Fuzzing CAN CAN FD ECU's and NetworkIMZ8DD4lTAY40:20390M
DEF CON 29 Car Hacking Village - Ben Nassi -Remote Adversarial Phantom Attacks on Tesla, MobileyeSZGz5jEW_YQ38:48402M
DEF CON 29 Car Hacking Village - Bill Hatzer - From CTF to CVEU4bmzbu436c36:03356M
DEF CON 29 Car Hacking Village - Don Hatfield - Build Automotive Gateways with EasenHp9cNLBC8I36:01325M
DEF CON 29 Car Hacking Village - Eric Gershman - Safety 3rd Defeating Chevy StabiliTrakkBWg4I9795w23:09243M
DEF CON 29 Car Hacking Village - Huajiang Chen, Wu Ming - Remotely Rooting Charging StationsxxrcM_lTvbw26:01227M
DEF CON 29 Car Hacking Village - Jay Turla - Bug Hunter's Guide to Bashing for Car Hacking Bug BashL7AwMhguR6s51:55522M
DEF CON 29 Car Hacking Village - KEYNOTE - Ready, Fire Aim Hacking State and Federal Law Enforcement7pnwpF94WCM30:04338M
DEF CON 29 Car Hacking Village - Lennert Wouters - Compromising the Tesla Model X keyless entryypQXtVQgxLo26:58273M
DEF CON 29 Car Hacking Village - Nick Ashworth - Vehicle ID and Tracking via Passive Keyless Entryb63CCwjYL4I50:43490M
DEF CON 29 Cloud Village - Rodrigo Montoro - CSPM2CloudTrail Extending CSPM Tools7HPXHNB95iU20:1334M
DEF CON 29 Cloud Village - Felipe Pr0teus - Hunting for AWS Exposed ResourcesuLI24keCKFs26:3166M
DEF CON 29 Cloud Village - Jayesh Singh Chauhan - Opening NoteeKkXNriy08w09:3322M
DEF CON 29 Cloud Village - Alexandre Sieira - Attack Vectors for APIs w AWS API Gateway Lambda AuthuovvDjfC9gg38:41119M
DEF CON 29 Cloud Village - Batuhan Sancak - Azure Active Directory Hacking Wars97xrQ5KxGrg39:0760M
DEF CON 29 Cloud Village - Cassandra Young - Exploiting the O365 Duo 2FA Misconfigurationf2sThEAA7xs13:4230M
DEF CON 29 Cloud Village - Daniel Prizmant - Windows Server Containers are BrokentdX5l67BcDo35:1385M
DEF CON 29 Cloud Village - Igal Flegmann - I know who has access to my cloud, do youAY8RBt5J1mg21:5385M
DEF CON 29 Cloud Village - Joshua - Understanding Google Cloud Misconfiguration Using GCP GoatLL3rhzWcJAE38:24100M
DEF CON 29 Cloud Village - Karl Fosaaen - Extracting all the Azure PasswordsOES9RU0WTH046:55114M
DEF CON 29 Cloud Village - Kavisha Sheth - AWS Cloud Attack Vectors and Security ControlsP1nTUY77wjU39:3784M
DEF CON 29 Cloud Village - Kevin Chen - PK WHYCou-3LC3L9g11:4591M
DEF CON 29 Cloud Village - Madhu Akula - Kubernetes Goat Kubernetes Security LearningxMy4ZkImE4k23:13105M
DEF CON 29 Cloud Village - Magno Logan - Workshop Kubernetes Security 101 Best Practices9cnG22GwkDs02:30:01460M
DEF CON 29 Cloud Village - Mazin Ahmed - Attack Vectors on Terraform Environments2mb12QDytP434:4668M
DEF CON 29 Cloud Village - Michael Raggo - Identifying Toxic Combinations of PermissionsRjFOI-iQCno34:36121M
DEF CON 29 Cloud Village - Mohammed Aldoub - Using Barq to Perform AWS Post-ExploitationRJR8r56tpN021:00110M
DEF CON 29 Cloud Village - Rami McCarthy - Cloud Security OrienteeringTysZX_tzU9I41:1594M
DEF CON 29 Cloud Village - Rod Soto - Detection Challenges in Cloud Connected Credential Attacks6emlF2aQKw046:2184M
DEF CON 29 Cloud Village - Wes Lambert - Onions In the Cloud Make the CISO ProudikQEgqt1q6s01:39:18311M
DEF CON 29 Cloud Village - Yuval Avrahami - WhoC Peeking under the hood of CaaS offeringsGRswD4bdYN416:1832M
DEF CON 29 Crypto and Privacy Village - Day 22tlXXuc2_H006:22:253G
DEF CON 29 Crypto and Privacy Village - Day 1MQtg0qg9VoM08:36:525G
DEF CON 29 Ham Radio Village - Bryan Fields - Spectrum Coordination for Amateur RadiofH-yyTZffAk01:05:06432M
DEF CON 29 Ham Radio Village - Eric Escobar - Getting started with low power⧸long distance CommsjHTc7oGM2wk24:0592M
DEF CON 29 Ham Radio Village - Gregg Horton - How to Contact the ISS with a $30 Radioatw9a7J8u_k21:16121M
DEF CON 29 Ham Radio Village - Jon Marler - Amateur Radio Digital Modes Primer-btN8T6WvYg56:24225M
DEF CON 29 Ham Radio Village - Kurtis Kopf - An Introduction to RF Test EquipmentVo3tVjoYAFM01:13:563G
DEF CON 29 Ham Radio Village - Tyler Gardner - Amateur Radio Mesh Networking9opTlr5TPsA37:32291M
DEF CON 29 HHV - rehr - Walkthrough of DC28 HHV Challenge SolutionsP-6XXUgvqng48:53291M
DEF CON 29 HHV - Ben Gardiner - A Lazy Solve of @mediumrehr's HHV Challenge 6MZnnKl8xDTw36:18426M
DEF CON 29 HHV - Bradan Lane - The PortaProg ProjectrAvEzyzbecs39:52392M
DEF CON 29 HHV - Federico Lucifredi - Hardware Hacking 101 Rogue Keyboards and Spy CablessgwJ_oohjRU50:15357M
DEF CON 29 HHV - Gigs - The Black Box and the Brain Box When Electronics and Deception CollidedKjVh-XUeYc17:03153M
DEF CON 29 ICS Village - Aaron Boyd - Living off the Land in an ICS OT Penetration TestDLKpsjtVvlc25:13103M
DEF CON 29 ICS Village - Dan Gunter - Consider the Data SourceQhFNcGuFRzM49:30168M
DEF CON 29 ICS Village - Dieter Sarrazyn - Fortifying ICS Hardening and TestingpujzX8vkkMU25:1085M
DEF CON 29 ICS Village - Don C Weber - Scripts and Tools to Help Your ICS InfoSec JourneyWxIn7fy4LK424:43154M
DEF CON 29 ICS Village - Hash Saehi - Smart Meters I'm Hacking Infrastructure and So Should YoufKnSU1eB_7422:07359M
DEF CON 29 ICS Village - ICS Village Opening and IntroductionQL_sZvwS7-w02:4811M
DEF CON 29 ICS Village - Javier Perez, Juan Escobar - ICS Intrusion KillChain Explainedbe8qnq93dZc28:44202M
DEF CON 29 ICS Village - Joe Slowik - Crippling the Grid Examination of Dependencies & Cyber VulnsMwsOCLtzH0A22:0547M
DEF CON 29 ICS Village - John Ellis, Julia Atkinson - Attract, Develop, & Retain ICS WorkforcePUM4ZnmMtBM12:4745M
DEF CON 29 ICS Village - Lauren Zabierek - Collaborative Cyber Defense & Enhanced Threat IntelDixZG7HCTt828:38293M
DEF CON 29 ICS Village - Mary Brooks - ICS Jeopardy2h2RmcjUY3M43:57168M
DEF CON 29 ICS Village - Meet Can Kilic - Do We Really Want to Live in the Cyberpunk WorldqbXpGfAsObY24:31161M
DEF CON 29 ICS Village - Nico Leidecker, Moritz Thomas - Building ICS Firing Range in Our Kitchen3C2iRzecnWI27:18180M
DEF CON 29 ICS Village - Otis Alexander - Highlighting the Importance of Detection ContextgR9EFvdSYqQ22:0575M
DEF CON 29 ICS Village - Panel - Protecting Critical Infrastructure from RansomwareXenfD667Flg54:49631M
DEF CON 29 ICS Village - Panel - ICS CTI Information Sharing Between Brazil and the United StatesUAbn3y4SX8M31:40299M
DEF CON 29 ICS Village - Panel - Students Performing ICS Security Assessments_5rDpbX0gnc24:08226M
DEF CON 29 ICS Village - PW Singer - Keynote Reading the Future with Useful FictiondHdkDINfpW029:21226M
DEF CON 29 ICS Village - Sara Fluchs, Vivek Ponnada - Top 20 Secure PLC Coding Practices5y0cq732zqk46:09208M
DEF CON 29 ICS Village - Seth Grove - Network Traffic Analysis with MalcolmJYpkbPVnatA01:37:06661M
DEF CON 29 ICS Village - Sharon Brizinov, Uri Katz - Down Exploiting Vulnerabilities In the OT CloudCOhXUjtCVMU30:0186M
DEF CON 29 ICS Village - Stefan Stephenson-Moe - Detecting Attackers with State Estimation_geVHVHUtFI27:18219M
DEF CON 29 ICS Village - Thomas Pace - Leveraging SBOMs to Enhance ICS Securityy-1MWtgGb4w28:32148M
DEF CON 29 ICS Village - Tim Yardley - Beetlejuice The Lessons We Should Have LearnedZaxjEmonLUA25:44126M
DEF CON 29 Payment Village - Vahagn Vardanyan - Racing CryptoexchangesFHnYo_BjNew12:4621M
DEF CON 29 Payment Village - Hector Cuevas Cruz - ATM Transaction Reversal Frauds7m0C8n8ZMDo41:05179M
DEF CON 29 Payment Village - Meadow Ellis - Automated Tear MachineslNnxb5mnwyk40:36766M
DEF CON 29 Payment Village - Timur Yunusov - When businesses decide to enrol cryptocurrency cards9ZaHuV4erUE19:0839M
DEF CON 29 Recon Village - Kala Kinyon - OSINT for Sex WorkersNj-FqBapY2o23:02103M
DEF CON 29 Recon Village - Rae - Using OSINT to Aid in Human Trafficking and Smuggling Cases-cBNQGzVDeM30:17185M
DEF CON 29 Recon Village - Ritu Gil - So You Want to OPSEC, EhdaXNSvb_S3w23:1087M
DEF CON 29 Recon Village - Andy Dennis - Using Passive DNS for gathering Business Intelligence7egAj-8juK029:45113M
DEF CON 29 Recon Village - Anthony Kava - GOV Doppelgänger Your Häx Dollars at Work_Mo6U7_B7gs29:51222M
DEF CON 29 Recon Village - Ben S - Future of Asset Managementpvk4iOLKbaw41:07451M
DEF CON 29 Recon Village - Ladislav Baco - How Vigilant Researchers Can Uncover APT Attacks6PoroGGBt8E29:15117M
DEF CON 29 Recon Village - Manabu Niseki - Adversary Infrastructure Tracking with Mihari6bBmxsihyRA20:4696M
DEF CON 29 Recon Village - MasterChen - Can I Make My Own Social Threat ScoreCc-Y6TmTCHM29:01145M
DEF CON 29 Recon Village - Mauro Eldritch - Venator Hunting & Smashing Trolls on TwitterJaDvfAAzbhw47:03275M
DEF CON 29 Recon Village - Mishaal Khan - People Hunting A Pentesters Perspectivev7GWqQLoWvc28:14297M
DEF CON 29 Recon Village - Nick Roy - OSINT and the Hermit KingdomHLzv8TVMQHo42:01226M
DEF CON 29 Recon Village - Ryan Elkins - How to Build Cloud Based Recon Automation at Scalei2ouX0js9n845:16214M
DEF CON 29 Recon Village - Tushar Verma - The Bug Hunter’s Recon MethodologyYKFG4IAaTRo15:3855M
DEF CON 29 Recon Village - Utku Sen - Finding Hidden Gems via URL Shortener ServicesBlcORtyfKWk19:16141M
DEF CON 29 Red Team Village - A discussion about the Red Team Village CyberWraithHmYb9F-Npdw38:05381M
DEF CON 29 Red Team Village - CTF Day 2aYbkzPSNT5E04:40:562G
DEF CON 29 Red Team Village - Bruce Schneier - AI and Red Team Village Panelt1w8-_AHCGs01:36:29917M
DEF CON 29 Red Team Village - CTF Day 1ccLKzqBLmAg00:5010M
DEF CON 29 Red Team Village - CTF Day 3EpeO_wJ0JCI02:54:15944M
DEF CON 29 Red Team Village - CTF Recap and Upcoming Events3vZjOtFyUY025:37263M
DEF CON 29 Red Team Village - Panel - The future of AI, Machine Learning, and Offensive Securitygv0yMVFwCM401:00:14787M
DEF CON 29 Red Team Village - Russ Hanneman - Message about the Red Team Village CTFcwrlwetRz8k00:3912M
DEF CON 29 Voting Village - Brianna Lennon and Eric Fey - High Turnout, Wide MarginsOYCPQ7mUt6Y25:5460M
DEF CON 29 Voting Village - Barb Byrum - Hack the ConspiraciesgVC9zjZ6KnI26:52108M
DEF CON 29 Voting Village - BiaSciLab - Secrets of Social Media PsyOpskvPdQj-ikvA26:52111M
DEF CON 29 Voting Village - Bob Sullivan - A Journalist’s Perspective on Fake Newsp5gqmtTBe5410:4066M
DEF CON 29 Voting Village - Carsten Schürmann - How to Weaponize RLAs to Discredit an ElectionTxXMRWTpZlY31:09165M
DEF CON 29 Voting Village - Commissioner Thomas Hicks, EAC - Keynote RemarksctO-86QxBto19:33159M
DEF CON 29 Voting Village - Harri Hursti - Welcome RemarksAbo24w-CYR825:24101M
DEF CON 29 Voting Village - Harri Hursti - NH SB43 Forensic AuditxwlYmcUjB8k48:18296M
DEF CON 29 Voting Village - Kevin Skoglund - Are Barcodes on Ballots BadrO_OAcZYDQM29:5653M
DEF CON 29 Voting Village - Maurice Turner - Why Hacking Voters Is Easier Than Hacking Ballots5_pj8ZyixQ828:33326M
DEF CON 29 Voting Village - Sang Oun Lee - Keeping Your Information Security Policy Up to DatewNu4wAAQY-824:28140M
DEF CON 29 Voting Village - Sebastian Bay - Social Media Security = Election SecurityOWY9EC6jaNg20:5162M
DEF CON 29 Voting Village - Susan Greenhalgh - Wireless OdysseyGAt0-ZedlVY25:00122M
DEF CON 29 Voting Village - Tod Beardsley - A Deep Dive on Vulnerability DisclosurecP3HuNsIi4g27:06104M
DEF CON 29- Dennis Giese - Robots with lasers and cameras but no security Liberating your vacuumEWqFxQpRbv833:34123M
DEF CON 3 3 - Exploiting Vulns in EV Charging Comms - Jan Berens, Marcell Szakály, Sebastian KöhlerkQVszh5ER1M55:11233M
DEF CON 33 - Breaking into thousands of cloud based VPNs with 1 bug -David Cash, Rich WarrenRNXCnJvE1Zg38:48143M
DEF CON 33 - Hard Hat Brigade Creations Q&A - MrBill, M0nkeyDrag0n, CoD_SegfaultPK6F4LdwwOU36:38163M
DEF CON 33 - Live Music - Thursday Night - N8-97xg_1a66E01:00:501G
DEF CON 33 Voting Village - Risk Limiting Audits: What They Are and Aren't - Philip Starkf-QuFskAyOM58:04271M
DEF CON 33 - Bypassing Intent Destination Checks, LaunchAnyWhere Privilege Escalation - Qidan HekSJBEZkJ4vM46:31163M
DEF CON 33 - Decision Making in Adversarial Automation - Bobby Kuzma, Michael Odell9to68PN5rRU26:54155M
DEF CON 33 - How malicious packages on npm bypass existing security tools - Paul McCartyemhocCFs9N432:38152M
DEF CON 33 - How Nation-State Hackers Turn Human Error into Catastrophic Failures - N Case, J McCoy77AixFQKwVI36:03103M
DEF CON 33 - Mac PRT Cookie Theft & Entra ID Persistence - Shang-De Jiang, Dong-Yi Ye, Tung-lin LeeT13YfM8z0lE41:13248M
DEF CON 33 - Making a custom Hashcat module to solve a decade-old puzzle challenge - Joseph Gabay74_4Q329PH848:24341M
DEF CON 33 - The Missing Link: Draytek’s New RCEs Complete the Chain - O. Gianatiempo & G. AznarezCUZhORHp27U24:52108M
DEF CON 33 - 'We are currently clean on OPSEC' - The Signalgate Saga - Micah 'micahflee' Lee5VlhsT5Kbsk42:07141M
DEF CON 33 - 10 Years of IoT Village: nsights in the World of IoT - Stephen Bono, Rachael TubbsV23bcIGHe7k20:49218M
DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' JacobszSBf2CMKlBk39:56105M
DEF CON 33 - Access Control Done Right the First Time - Tim Clevenger6OFZjlym4r022:5195M
DEF CON 33 - Access to secure dependency management everywhere w Nix- T Berek, F Zakaria & D BakerCdNrvUrG_HM53:01869M
DEF CON 33 - All your keyboards are belong to us! - Federico LucifrediKeNBWILSlC437:34225M
DEF CON 33 - Amber64 - Mining Hacker History from Over 500k Commodore 64 Disks - Wesley McGrewPqPMyhA4NSI44:13203M
DEF CON 33 - AppleStorm - Unmasking the Privacy Risks of Apple Intelligence - Yoav MagidBNmJ3qBP9GE38:21270M
DEF CON 33 - Ask EFF - Cooper Quintin, Lisa Femia, Thorin Klosowski, Alexis Hancock, Hannah ZhaoQmkyPl2UZHY48:35951M
DEF CON 33 - AutoDetection & Exploitation of DOM Clobbering Vuln at Scale - Zhengyu Liu, Jianjia YuJL2PT1Dac3g37:42244M
DEF CON 33 - Automated Unpacking & Deobfuscation of Nested VM-Based Protectors - Agostino PanicouCZRf3v3EUI38:41146M
DEF CON 33 - Back to Basics: Building Resilient Cyber Defenses - Yael GrauerY4ziT89VmAk21:3972M
DEF CON 33 - Bare Metal Reverse Engineering - SolaSeczfxKbsLKb3E22:0594M
DEF CON 33 - BiC Village - B I C Pick DEF CON 33 Badge Walkthrough - Eli McRaeBczXjBh6bsM14:4484M
DEF CON 33 - BiC Village - Embedded System Design vs Traditional Software Design - Ian G HarrisS4jr6k52sNU49:46252M
DEF CON 33 - BiC Village - Breaking Down Bias in the Cyber Stack - Kaleeque Pierce, Jess HoffmanOEMnm1GAYlQ01:00:30557M
DEF CON 33 - BiC Village - Cyber Game Changers Women Who Lead, Secure and Inspire - PanelqN9qduX-fFM43:13287M
DEF CON 33 - BiC Village - Following Threat Actors Rhythm to Give Them More Blues - Malachi WalkerF_BTn1FjbHU37:11201M
DEF CON 33 - BiC Village - From Wake Island to the War Room - Nykolas MuldrowtWaBeES6b5425:53100M
DEF CON 33 - BiC Village - How AI Is Revolutionizing Phishing Attacks & Defenses - Levone Campbell7IFsoRaYYgs32:30232M
DEF CON 33 - BiC Village - How Basketball Officiating Shaped a Cybersec Career - Jason BrooksXbSK6mvNL8c29:24158M
DEF CON 33 - BiC Village - Petty Proteins When Molecules Go Rogue& Why Cyberbiosecurity - Tia PopeZqjADCvE5UQ41:01197M
DEF CON 33 - BiC Village - Price of Progress: Ethical Cybersecurity in Tech Communities - Joy Toney98LptR2jhqM43:59197M
DEF CON 33 - BiC Village - The African Cybercrime Economy -Remi AfonIfmVPqBUAMc46:46265M
DEF CON 33 - BiC Village - The Truth, Whole Truth and Nothing b⧸t Truth of Cybersec - Louis DeweavermU9djJSqdBQ57:00390M
DEF CON 33 - Bio Cryptography is the Game Genie in a post quantum dystopia - James Utley, PhDZx0G6znf_qQ19:3578M
DEF CON 33 - Blurred Lines: Evolving Tactics of North Korean Cyber Threat Actors - Seongsu Parkj5gxdWd5sMg26:5290M
DEF CON 33 - Breakin 'Em All – Overcoming Pokemon Go's Anti Cheat Mechanism - Tal Skverer2En96Cg9BFw47:24107M
DEF CON 33 - Breaking into thousands of cloud-based VPNs with one bug - David Cash, Rich Warren1mTg32BTZlA38:48148M
DEF CON 33 - Breaking Wi-Fi Easy Connect: A Security Analysis of DPP - George ChatzisofroniougMNZiDfeRPQ40:48225M
DEF CON 33 - Building a Malware Museum - Mikko Hypponenu7-OFXLLsmU40:11196M
DEF CON 33 - Building Onramps for Emergency Web Archiving in Ukraine and Beyond - Quinn Dombrowski4uV61EHLKKA35:49163M
DEF CON 33 - Building the first open source hackable Quantum Sensor - Mark Carney, Victoria KumaranldgMBEnJxms43:43242M
DEF CON 33 - Bypassing Intent Destination Checks, LaunchAnyWhere Privilege Escalation - Qidan Hee7UnYV-m23c46:31172M
DEF CON 33 - Carding is Dead, Long Live Carding - Federico Valentini, Allesandro StrinoJSDwexw90zs37:32125M
DEF CON 33 - Carding, Sabotage & Survival: A Darknet Market Veteran’s Story - Godman666tZwaPDqXTgs42:18214M
DEF CON 33 - Cash, Drugs, and Guns - Why Your Safes Aren't Safe - Mark Omo, James RowleyN3SXVOVUD1s41:54140M
DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew BrandtMsRo12h0mrg35:11119M
DEF CON 33 - China's Health Sector Ambitions and Info Needs - Amelia Shapirobp4E9ri5Xd425:08101M
DEF CON 33 - Client or Server? Hidden Sword of Damocles in Kafka - Ji'an Zhou, Ying Zhu, ZiYang ' LiSa6Onq53TsY34:12122M
DEF CON 33 - Cloned Vishing : A case study - Katherine RackliffeJPCKg_3XLP818:53109M
DEF CON 33 - Conjuring Hardware Failures for Cross-ring Privilege Escalation - Christopher DomasB6dC_KVLn6Q45:02235M
DEF CON 33 - Context Aware Anomaly Detection in Automotive CAN Without Decoding - Ravi RajputVchCd-o25z018:4160M
DEF CON 33 - Countering Forensics Software by Baiting Them - Weihan Goh, Joseph Lim & Isaac SoonnUh9GVVhjD823:04122M
DEF CON 33 - Creating a Virtual Ship Environment Optimized for Cybersecurity Use - Jeff GreerWHD8NAY9BhU23:0094M
DEF CON 33 - Critically Neglected: Cybersecurity for buildings - Thomas Pope-ElW725i8z423:12127M
DEF CON 33 - Crossing the Line: Advanced Techniques to Breach the OT DMZ - Christopher NourrieQf7oNWKGL2I17:2067M
DEF CON 33 - Cryptocurrency Opening Keynote - Michael Schloh MsvB, Chad Calease & Param D Pithadia6fPUzKlZDfA25:28101M
DEF CON 33 - Cryptocurrency Weekend Keynote Chelsea Button, Alfonso Tinoco & Elaine ShiBGuaIun8qiA25:4086M
DEF CON 33 - CTRAPS-CTAP Impersonation, API Confusion Attacks on FIDO2 - M Casagrande, D AntonioliWZChYxX5i_I37:25245M
DEF CON 33 - Cyber Volunteering&Community Defense 1 yr in - DC Franklin - S Powazek, J Braun, A OgeeLdiawBeYOCc45:31246M
DEF CON 33 - Cybersecurity in Latin America - Stories of Resilience & Innovation - Giovanni Forerobr2RPtCOzB017:1075M
DEF CON 33 - Dark Capabilities - When Tech Companies Become Threat Actors - Greg Conti, Tom CrossI5N7Ro-aTh438:33135M
DEF CON 33 - Data Duplication Village - Fungible Threats - Mauro Edritch, Nelson ColontAKcNZNxy5g32:03242M
DEF CON 33 - Data Duplication Village - Tracking 300K+ Drives -4TZ3F5bv2T001:00:00501M
DEF CON 33 - DC101 Panel - Alethe Denis, Nikita Kronenberg , zziks, Nicole Schwartz, Nina Alliia-LpnWwc8Y35:08402M
DEF CON 33 - DDoS: The Next Generation - Andrew CockburnVlOUGECw6kc38:13285M
DEF CON 33 - Dead Reckoning: Hijacking Marine Autopilots - Carson Green & Rik ChatterjeetFrZ75IECjg20:30119M
DEF CON 33 - Deepfake Image and Video Detection - Mike RaggoGPqL9_muXJA48:46141M
DEF CON 33 - Defending Reddit at Scale - Pratik Lotia & Spencer KochyGYR-tE0ljw26:27120M
DEF CON 33 - Designing and Participating in AI Bug Bounty Programs - Dane Sherrets, Shlomie Liberowe109g1uauCg51:53240M
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson6U_CepoMSl423:55103M
DEF CON 33 - Elevators 101 - Bobby Graydon, Ege FeyziogluLrzGrp8L1XI36:44199M
DEF CON 33 - Emulating Embedded Linux Devices at Scale w LightTouch Firmware Rehosting - S Polkef-LTMUFQzjQ38:27132M
DEF CON 33 - Escaping the Privacy Sandbox wClientside Deanonymization Attacks - Eugene Lim-oaH8XE_yMQ34:38198M
DEF CON 33 - Escaping the Privacy Sandbox with Client Side Deanonymization Attacks - Eugene LimcFFhHXPsilw25:56153M
DEF CON 33 - Evolution of Drain Attacks - Utvecklas & GeorgeY3IohAauLfE21:2370M
DEF CON 33 - Examining Access Control Vulnerabilities in GraphQL: A Feeld Case Study - Bogdan TironmPo-an8BUXc25:1989M
DEF CON 33 - Exploiting Security Side Channels in E2E Encrypted Msngrs - G Gegenheuber, M GuntherBgneDTH81EY40:42177M
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick WalshO7BI4jfEFwA48:22132M
DEF CON 33 - Fear vs Physics: Diagnosing Grid Chaos - Emma Stewart930l_omgN1w20:04114M
DEF CON 33 - Fighting a Digital Blockade: View from Taiwan - Herming Chiueh, Jason Vogt, Frank SmithCvMVJjPcusI38:33251M
DEF CON 33 - Finding and Exploiting Kernel Vulnerabilities in the eBPF Subsystem - Agostino PanicoTXs5F-7-2aE36:01174M
DEF CON 33 - Fingerprint-Based Bot Blocking & Dynamic Deception - Adel KarimiG7twgn-gi9k43:18146M
DEF CON 33 - Fingerprinting Maritime NMEA2000 Networks - Constantine Macris TheDini & Anissa EliasLbIAmMXCjZ025:33124M
DEF CON 33 - Firmware Decryption: For, and By, the Cryptographically Illiterate - Craig HeffnerTcxVExGxEtk20:53402M
DEF CON 33 - From Pwn to Plan: Turning Physical Exploits Into Upgrades - ShawnNURO3NgtXUQ55:43239M
DEF CON 33 - From Shanghai to the Shore: Threats in Global Shipping -K Miltenberger, N Fredericksenohre4ObUzoo20:4792M
DEF CON 33 - Full Disclosure, Full Color: Story of This Year's BBV Badge - Abhinav PandagalePYFssJoDP1c24:37109M
DEF CON 33 - Game Hacking 101 - Julian 'Julez' DunningXSzXaD6A73s39:56176M
DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin YukItqWJHN_dI39:43133M
DEF CON 33 - Ghost Calls - Abusing Web Conferencing for Covert Command & Control - Adam CrosserYVoF_mI8MIw42:04219M
DEF CON 33 - Go Malware Meets IoT - Challenges, Blind Spots, and Botnets - Asher DavilaTtPicirB6G447:36227M
DEF CON 33 - Gold Bug - Puzzle Panel with Friends - The Gold Bug Team 2025V_w5u9lONN053:47270M
DEF CON 33 - Hacker Jeopardy FridayG6WNcAK29hw01:56:191G
DEF CON 33 - Hacker Jeopardy Saturday5gGUh9-oPhk01:38:311G
DEF CON 33 - Hacker v. Triage - Inside Bug Bounty Battleground - Richard Hyunho Im, Denis SmajlovićD6p8-XAHOJU46:45203M
DEF CON 33 - Hacking a head unit with malicious PNG - Danilo ErazoQKHJZ1K-7p023:50109M
DEF CON 33 - Hacking Context for Auto Root Cause and Attack Flow Discovery - Ezz Tahounk2r3JrodFaI01:03:45298M
DEF CON 33 - Hacking Hotel Locks: The Saflok Vulnerabilities Expanded -Noah Holland, Josh StiebelZODLZuy6H4U38:04191M
DEF CON 33 - Hacking OBD II Emissions Testing - ArchwispjVkgYkZV8Co13:3885M
DEF CON 33 - Hacking Space to Defend It: Generating IoBs with SPARTA - Brandon BaileyUL_c4K5dTuc25:35121M
DEF CON 33 - Hacking the Nautical Rules of the Road Turn Left for Global Pwnage - Amp & DataWDPOk0GxxEo25:40123M
DEF CON 33 - Help! Linux in my Webcam! (•_•) - Mickey Shkatov, Jesse MichaelrO785smLLrU41:25214M
DEF CON 33 - Here and Now: Exploiting the Human Layer at the Right Moment - Daniel IslervvDostysRAU20:47126M
DEF CON 33 - HoloConnect AI - From Space to Biohacking - Dr. Fernando De La Peña LlacaNVr-rO4aJL413:5559M
DEF CON 33 - How a vuln in dealer software could've unlocked your car - E Zveare, R PiyushU1VKazuvGrc35:22118M
DEF CON 33 - How AI + Hardware can Transform Point of Care Workflows - PamirAIjVFOiYCBcvc20:4480M
DEF CON 33 - How AI + Hardware can Transforming Point-of-Care Workflows - PamirAI-5bArYeJ3sU12:5258M
DEF CON 33 - How API flaws led to admin access to 1k+ USA dealers & control of yr car - Eaton ZveareqNuS0rvqc8c22:2667M
DEF CON 33 - How Computers Kill People: Marine Systems - Michael DeVolld & Austin Reids1-4KoND6wM21:04111M
DEF CON 33 - How Extra Features In Contactless Payments Break Security, What We Can Do - Tom Chotia_fGpR4Fqni035:03370M
DEF CON 33 - How Not to IoT:Lessons in Security Failures - Zoltan "zh4ck" BalazsTTdK1lbM5VI43:27197M
DEF CON 33 - How NOT to Perform Covert Entry Assessments - Brent White, Tim RobertsDNP_fHTMy8455:51198M
DEF CON 33 - How to Fake a Badge like a Pro: Counterfeiting Event Credentials - Russell PhillipsWq09JxymiFQ21:21164M
DEF CON 33 - How to secure unique ecosystem shipping 1 billion+ cores? - Adam Zabrocki, Marko MiticKhWtkZmOPn437:05136M
DEF CON 33 - HTTP 1 1 Must Die! The Desync Endgame - James 'albinowax' KettlePUCyExOr3sE36:31138M
DEF CON 33 - Hull Integrity: Applying MOSAICS to Naval Mission Systems - Michael FrankA6AkQrXDgQ414:1054M
DEF CON 33 - Incident Response from a Maritime Sysadmin’s War Room - Kit Louttit, Steve Winstono6-H-3Sx6i026:42127M
DEF CON 33 - Infecting the Boot to Own the Kernel - Alejandro Vazquez, Maria San JoseiS0XJVyxA3M39:28181M
DEF CON 33 - Inside Look at a Chinese Operational Relay Network - Michael Torres, Zane Hoffmane93V9TWnxJo33:32163M
DEF CON 33 - Intro to Common Industrial Protocol Exploitation - Trevor FlynnS7mPcEPaKHU23:24127M
DEF CON 33 - Intro to Physical Security Bypass - Karen Ng, Matthew CancillatTAISQqmxWQ57:03153M
DEF CON 33 - Investigating Threat Actor Targeting Researchers, Academics - C Tafani-Dereeper, M MuiriTGnoDEYlog35:39160M
DEF CON 33 - Invoking Gemini Agents with a Google Calendar Invite - Ben Nassi, Or Yair, Stav CohenCUxbDRR0A8I45:36214M
DEF CON 33 - Journey to the center of PSTN - I became a phone company. You should too - Enzo DamatocA-ZQJ8EZSs44:22170M
DEF CON 33 - Kill Chain Reloaded: Abuse legacy paths fr stealth persistence - A Hernando, B Martinez6D29iw3B2nM43:05181M
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris MonteirocYZmRp90hss32:55119M
DEF CON 33 - Killing Killnet - Alex HoldenwVY47hNzgJk21:48133M
DEF CON 33 - Let AI Autogenerate Neural ASR Rules for OT Attacks via NLP - Mars Cheng & Jr Wei-HuangMJV5FQztfi422:0384M
DEF CON 33 - Letthemin: Facilitating High Value Purple Teams Using Assumed Compromise - Sarah HumexM8nodIw1_E27:37176M
DEF CON 33 - Live Music - Friday Night - Daemon ChadeauDyVM3bImh_c59:39994M
DEF CON 33 - Live Music - Friday Night - Elipscion0DJy7oDbJCs58:42693M
DEF CON 33 - Live Music - Saturday Night - 0xdadePbXdFEkc4ns28:53481M
DEF CON 33 - Live Music - Saturday Night - DJ nullQECf5jCM6yw05:3295M
DEF CON 33 - Live Music - Saturday Night - Dual CoreYAH_aNsCf4g35:20763M
DEF CON 33 - Live Music - Thursday Night - Fling8_wMwOnGP1Q53:55886M
DEF CON 33 - Live Music - Thursday Night - HecksevenMnxM0O0jQso44:13837M
DEF CON 33 - LLM Identifies Info Stealer Vector & Extracts IoCs -Olivier Bilodeau, Estelle RuellanPHtTXqlViVk49:49365M
DEF CON 33 - Loading Models, Launching Shells: Abusing AI File Formats fr Code Execution - C ParzianIHzn9BiH6rY18:4065M
DEF CON 33 - Locked Down, Not Locked Out: How I Escaped Yr Secure Operator Workstation - Aaron Boyd0r_trFFPVYc24:3599M
DEF CON 33 - Making the DEF CON 33 Badge - Mary8kbuGgH2eQ12:1589M
DEF CON 33 - Man in the Malware: Intercepting Adversarial Communications - Ben 'polygonben' Follandlv-hua5b_9s33:07145M
DEF CON 33 - Managing Bug Bounties @ Scale - Gabriel Nitu, Jay Dancer, PayPal, Ryan Nolette & GoshakYKHs2XJWmXU58:42526M
DEF CON 33 - Mastering Apple Endpoint Security for Advanced macOS Malware Detection - Patrick WardleAgYGwZjcsLo51:46351M
DEF CON 33 - Metal-as-a-Disservice: Exploiting Legacy Flaws in Cutting Edge Clouds - Bill DemirkapiEtGhHCr3VLE46:16207M
DEF CON 33 - Mind the Data Voids: Hijacking Copilot Trust - Tobias DiehlNgjyBKfqJEs19:28120M
DEF CON 33 - Modern Odometer Manipulation - collin & oblivionFYHvL8V_m-Q26:2090M
DEF CON 33 - Moonlight Defender : Purple Teaming in Space! - Ben HawkinsNHvvrhFU6XQ20:50111M
DEF CON 33 - Navigating the Invisible - Mehmet Onder Key, Furkan AydoganJgKUrRaKo7o13:4264M
DEF CON 33 - Never enough about cameras: Firmware keys hidden under the rug - Alexandru LazarN4Cnso2Vbmw26:11135M
DEF CON 33 - New Red Team Networking Techniques for Initial Access and Evasion -Shu-Hao, Tung 123ojpmdFRLCnACJM42:23163M
DEF CON 33 - No Brain No Gain - Mehmet Önder Key, Temel Demir & Dr Ahmet Furkan Aydogan_ENNd1XMPyk56:58227M
DEF CON 33 - No Spook Leaves Randomness to Chance - Shaanan CohneyOYGtNa0pJec54:57371M
DEF CON 33 - No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol - Tom TervoortdFYR2oOK8wg36:19166M
DEF CON 33 - Not Just a Pipeline Leak: Reconstructing Real Attack Behind tj-actions - Aviad Hahami-CSbWpj_IZM42:08165M
DEF CON 33 - Off Grid Datarunning in Oppresive Regimes: Sneakernet and Pirate Box - Robert MenesDJHiSbPskHc18:5676M
DEF CON 33 - One Key, Two Key, I Just Stole Your goTenna Key - Erwin 'Dollarhyde' Karincic, WoodyDvtFoREyB0A42:48252M
DEF CON 33 - Operational Twilight: APTs, OT, & geopolitics of a dying climate - Cybelle OliveiraEkp5iMPEgVw23:46143M
DEF CON 33 - Orion: Fuzzing Workflow Automation - Max Bazalii, Marius FleischerNbWDhk-9k_k44:21372M
DEF CON 33 - OSINT Enabled Ghost Mode: Counter Surveillance for Everyday People - Desiree Wilson9-a4OhOChss21:4994M
DEF CON 33 - OverLAPS: Overriding LAPS Logic - Antoine GoichotstGRkxldg-U21:1978M
DEF CON 33 - Passing the Torch - Mentoring and Protecting Our Students - Navaar Johnson, Sam CominiAviifoOuaBE54:52205M
DEF CON 33 - Passkeys Pwned:Turning WebAuthn Against Itself - S Pratap Singh, J Lin, D SeetohGG4gAhbhPH833:39122M
DEF CON 33 - Paywall Optional: Stream for Free w⧸ New Technique, RRE - Farzan KarimUdNhZ17t8M420:1894M
DEF CON 33 - Pirates of the North Sea - John Andre Bjørkhaug-_fXLWaP4Zmo23:43133M
DEF CON 33 - Planting C4: Cross Compatible External C2 for Your Implants - Scott TaylorO0-0u4zJWEM16:2254M
DEF CON 33 - Playing Dirty w⧸o Cheating - Getting Banned for Fun - S Collins, M Muench, T ChothiaFXIScbxJTZw38:37135M
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K KaragiannisOkVYJx1iLNs39:29115M
DEF CON 33 - Pre-Auth RCE, Arbitrary SMS & Adjacent Attacks on 5G and 4G_LTE Routers - Edward WarrenRxx07Ubmcuc27:13203M
DEF CON 33 - Preventing One of The Largest Supply Chain Attacks in History - Maksim ShudrakIv6VyOaG22c37:58212M
DEF CON 33 - Preventing One of The Largest Supply-Chain Attacks in History - Maksim ShudrakjraaS3lUP0I37:58227M
DEF CON 33 - Private, Private, Private Access Everywhere - Meghan JacquotluZgICpW0Kw29:31113M
DEF CON 33 - Prompt Scan Exploit AI’s Journey Through 0Days and 1000 Bugs - D. Jurado & J. NoguesOkgHfu4lXY21:3883M
DEF CON 33 - QRAMM: The Cryptographic Migration to a Post Quantum World - Emily Fane, Abdel Sy FaneSfWOqqDZEWI22:29429M
DEF CON 33 - Quantum Resistant Healthcare - Katarina AmrichovaKpxHU5NPsPk28:23108M
DEF CON 33 - Quiet Confidence An Introvert's Journey to Technical Public Speaking - Emma FangCUQGpoko8_019:4684M
DEF CON 33 - RATs & Socks abusing Google Services - Valerio 'MrSaighnal' AlessandronicXZJlKLBBGE15:5873M
DEF CON 33 - Real Exploits, Testbed Validation, Policy Gaps in Maritime Connectivity - Juwon ChoWc9GPvu-Yso24:37105M
DEF CON 33 - Rebadged, Relabeled, Rooted: Pwnage via Solar Supply Chain - Anthony Rose, Jake KrasnovaKCSoAtxEHc32:33246M
DEF CON 33 - Reclaim Tech: A Community Movement - Janet Vertesi, Andy Hulltwi2m77YxQ019:1182M
DEF CON 33 - ReclaimTech: A community movement - Janet Vertesi, Andy HullYr3SzRHmIxk25:08132M
DEF CON 33 - Reconfigurable HSMs: Future Proofing Hardware Security - Pablo Trujillo9slY1DllYhw24:59104M
DEF CON 33 - Recording PCAPs from Stingrays With a $20 Hotspot - Cooper Quintin, oopsbagelmeC2JqNAbCA39:51145M
DEF CON 33 - Red Russians: How Russian APT groups follow offensive security research - Will ThomasbpUxuOdfGHM24:17115M
DEF CON 33 - Red Teaming Space: Hacking the Final Frontier - Tim FowlerKjDaPwtYte424:31114M
DEF CON 33 - Redefining Purple Teaming for Max impact - A Pennington, S Marrone, L ProehlwU7xaXDupZo40:50562M
DEF CON 33 - Referral Beware, Your Rewards Are Mine - Whit @un1tycyb3r TaylortQRE9U1q2mk24:32119M
DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben 'nahamsec' SadeghipourmYC-rQ-HZaw50:08218M
DEF CON 33 - Remote code execution via MIDI messages - Anna Antonenko87Ce_D8T7oI39:18118M
DEF CON 33 - Resilient & Reconfigurable Maritime Comms - Avinash Srinivasan, Brien CroteauN0XFOS1kHaM24:47109M
DEF CON 33 - ReVault! Compromised by your Secure SoC - Philippe LaulheretSRALfyEspms42:00197M
DEF CON 33 - Reverse Engineering Marine Engines: Make powerboats do your bidding - Alex LormanAYi5mEWAHzY24:33171M
DEF CON 33 - Reversing approaches to extract embedded scripts in macOS malware - Patrick WardleBvRZHRlMsoU21:21122M
DEF CON 33 - RF Village - Small Packet of Bits That Can Save or Destabilize a City - Manuel Rabid3C-_TaYht6846:38764M
DEF CON 33 - RF Village - Warflying in a Cessna, Part II -Matthew Thomassen, Sean McKeeverKwI2daso3ug24:41420M
DEF CON 33 - RF Village - You might be a Wardriver if - MrBill, CoD_SegfaultPsfM_ZDgffU14:17197M
DEF CON 33 - RF Village - Airborne WiFi: Rogue Waves in the Sky - m0nkeydrag0n9iXHZHwc2MY26:11373M
DEF CON 33 - RF Village - Layer 2 Liberation: Things Your AP Never Dreamed Of - Allan Riordan BallB6_my_bDSx025:04454M
DEF CON 33 - RF Village - McJumpBox Leveraging free corporate Wifi for fun⧸profit - LoaningRpkYQDaEKMo44:38381M
DEF CON 33 - RF Village - Meshtastic Command & Control - Eric Escobar-e9V_hlWlVo39:11732M
DEF CON 33 - RF Village - Meshtastic Under the Microscope From Chirps to Chat - Allan Riordan BallSM1XSxP6W7828:41148M
DEF CON 33 - RF Village - Open Source Cellular Test Beds for the EFF Rayhunter - Ron BrobergRkIz4VcsEdo26:26395M
DEF CON 33 - RF Village - Running a Software Defined Radio CTF using challengectl - Dan Perret98_3eRPuuYM40:11483M
DEF CON 33 - RF Village - So What The Heck Is This Radio Stuff Anyway - Exploding Lemurv76lYD5odfA43:24275M
DEF CON 33 - RF Village - Tactical Flipper Zero You Have 1 Hour and No Other Equipment - Grey Foxb8-uDKkfw5c34:40184M
DEF CON 33 - RF Village - The dirty laundry of stored value washing cards - Aidan Nakache, EquipBNOmouHeAOw30:57508M
DEF CON 33 - Rusty pearls: Postgres RCE on cloud databases - Tal 'TLP' Peleg, Coby AbramseroPf1N-pAk18:30144M
DEF CON 33 - Safeguarding the Industrial Frontier OT SOC & Incident Response - Adam RobbieAXN3sTAr9R420:06105M
DEF CON 33 - Satellite Networks Under Siege: Cybersecurity Challenges of Targeted DDoS - Roee IdanxMfXqtcni_I24:15159M
DEF CON 33 - Scamming Scammers - Weaponizing OSS Against Pig Butchering, Organized Crime - Erin West0KGhP4qjmXk53:58355M
DEF CON 33 - SCCM: The tree that always bears bad fruits - Mehdi 'kalimer0x00' ElyassaepyI3b8Vl0M38:56149M
DEF CON 33 - Secure Code Is Critical Infrastructure: Hacking Policy for Public Good - Tanya Janca3V-URruNQck29:20143M
DEF CON 33 - Secure software dependency management everywhere with Nix - Tom Berek, Farid ZakariaxecOnPOxc3w53:01908M
DEF CON 33 - Securing Agentic AI Systems and Multi-Agent Workflows - Andra Lezza, Jeremiah Edwards5fJ6u--GkSk33:46100M
DEF CON 33 - Shaking Out Shells with SSHamble - HD MooreXHoH4ic8fX820:27123M
DEF CON 33 - Silent Leaks: Harvesting Secrets from Shared Linux Environments - Cernica Ionut Cosminig8ZMiPwrAw19:5783M
DEF CON 33 - Siriously Leaky: Exploring Overlooked Attack Surfaces in Apple's Ecosystem - Richard ImMWvpOW-PRJI45:07196M
DEF CON 33 - Smart Bus Smart Hacking: Free WiFi to Total Control - Kai Ching Wang, Chiao-Lin YuAOp0QtUORBc21:05140M
DEF CON 33 - Smart Devices, Dumb Resets:Testing Firmware Persistence in Commercial IoT - Matei JoserLnlLLKISyY28:54124M
DEF CON 33 - So Long, and Thanks for All the Phish - Harrison Sand, Erlend LeiknestJ4tG7nRUyU36:09189M
DEF CON 33 - So you want to make a badge? Badge Creation 101 - Jeff Geispergere6dmGupBsJk33:52189M
DEF CON 33 - Sometimes you find bugs, sometimes bugs find you - Jasmin Landry JR0ch17Tglq1WT1wpA25:5464M
DEF CON 33 - SSH Honeypots and Walkthrough Workshops: A History - Ryan MitchellTXUSC5YEDPo34:44130M
DEF CON 33 - SSH-nanigans - Busting Open the Mainframes Iron Fortress through Unix - Philip YoungJ3f9axtJsCw46:24312M
DEF CON 33 - State of Open Source in the Federal Government - Jordan KasperS_Ly_eXY65k37:01276M
DEF CON 33 - State of the Pops: Mapping the Digital Waters - Vlatko Kosturjak & MJ CasadomVqNxvfaVGg27:44141M
DEF CON 33 - Stories from a Tor dev - Roger 'arma' DingledinedjM70O0SnsY42:47266M
DEF CON 33 - Take all my money – penetrating ATMs - Fredrik SandstomauoEA8ZD8YA24:05113M
DEF CON 33 - The 2025 Pwnie Awards - Ian Roos, Mark TrumpbourGpx6JsZ0Vzw36:34380M
DEF CON 33 - The Anatomy of a Crypto Scam - Nick Percoco & KitbogauLpCI6CV3Uw55:36158M
DEF CON 33 - The depths that marketers will plummet to - 4dw@r3arvFqkI477021:1084M
DEF CON 33 - The Ghost of Internet Explorer in Windows - George Hughey, Rohit Mothe8cb_OF_6Ek844:17250M
DEF CON 33 - The PowerPoint Glove - Parsia HakimianSJ-kfVUoENk23:21153M
DEF CON 33 - The Things know What You Did Last Session - Will BaggettHqNgsnO5IoU23:25103M
DEF CON 33 - The Ultimate Hack : Applying Lessons Learned from the loss of TITAN - John MaugerdmgjTGuAo3820:15119M
DEF CON 33 - The UnRightful Heir My dMSA Is Your New Domain Admin - Yuval GordonftNaF20RWt433:34225M
DEF CON 33 - The Worst ICS OT Love Story Ever Told - Mike HolcombruVlunKr4BY26:53102M
DEF CON 33 - The Worst ICS⧸OT Love Story Every Told - 2025 Mike HolcombiVmS5dPjggU26:07102M
DEF CON 33 - There and Back Again: Detecting OT Devices Across Protocol Gateways - Rob KingYBPYYk8FIkc21:53127M
DEF CON 33 - They deployed Health AI on us: We’re bringing the rights & red teams - Andrea DowningVT-xl42KIpI26:1994M
DEF CON 33 - Thinking Like a Hacker in the Age of AI - Richard 'neuralcowboy' Thiemet3bKDBtdSw847:31856M
DEF CON 33 - Thinking like an attacker is no longer optional - Abhijith 'Abx' B R, Keenan SkellyPZLmzbyYs2g36:43459M
DEF CON 33 - Third Party Access Granted : Postmortem on Student Privacy - Sharlene Toney06CZrbjy9qM36:05153M
DEF CON 33 - Threat Dynamics on the Seas - John Mauger, & Michael Sulmeyer & Adam SegalHJYTMhbtKVU41:19283M
DEF CON 33 - TotalTest Simulations 2 Oh! From Exploits to Economics - Nebu Varghese2EYYmncELXs25:32123M
DEF CON 33 - TSPU: Russia's Firewall and Defending Against Digital Repression - Benjamin Mixon-BacazcdEX1ZgXzY41:23204M
DEF CON 33 - Tunnelpocalypse - Rich ComptonqjyMK_OBgzQ28:11135M
DEF CON 33 - Turning Camera Surveillance on its Axis - Noam MoshewM8kOq4VVt821:2879M
DEF CON 33 - Turning Microsoft's Login Page into our Phishing Infrastructure - Keanu 'RedByte' NysB4pVpByWOcI42:58221M
DEF CON 33 - Turning your Active Directory into the attacker’s C2 - Quentin Roland, Wilfried Bécard_l9_lNUCjP443:05264M
DEF CON 33 - Uncovering the Secrets of Tire Pressure Monitoring Systems - Yago LizarribarK5Kltw5kQpM25:5782M
DEF CON 33 - Unmasking the Snitch Puck: IoT surveillance tech in the school bathroom - Reynaldo, nyxWCnojaEpF2I40:04131M
DEF CON 33 - Unveiling IoT Vulns: From Backdoors to Bureaucracy - Kai-Ching Wang, Chiao-Lin YuL4cMPw2uDtc19:4592M
DEF CON 33 - Unveiling the Perils of the TorchScript Engine in PyTorch - Ji'an Zhou, Lishuo SongiVerhbedK_034:46116M
DEF CON 33 - VDP in Aviation How it shouldn't be done! - Matt GaffneyoI3zxDWldKE21:27220M
DEF CON 33 - Veilid la revoluçion : Your data is yours to own - Katelyn Bowden & Paul MillerC8F5kvm2B5s23:06183M
DEF CON 33 - Vibe School: Making dumb devices smart with AI - Dr Katie Paxton FearCM_8gKlz2-o22:27111M
DEF CON 33 - Virtualization Based Insecurity: Weaponizing VBS Enclaves - Ori DavidDqC4LZTTCa036:29165M
DEF CON 33 - Voice Cloning Air Traffic Control: Vulnerabilities at Runway Crossings - Andrew LoganJKwxsGYcZq422:3897M
DEF CON 33 - Voting Village - DMCA Security Research Exemption and Election Security - Tori NobleXVJd08ehNs455:24301M
DEF CON 33 - Voting Village - It's Not Safe Yet: Online Voting in Practice - Michael Specterg0GXWp4QmAs36:04174M
DEF CON 33 - Voting Village - A NY Legal Challenge to ExpressVote XL's Barcode Use - Susan LerneredxqLUizSWE20:54202M
DEF CON 33 - Voting Village - A Review of Post Election Audits in Swing States - Susan Greenhalgh5mWnGZWUEMQ28:29153M
DEF CON 33 - Voting Village - CARVER Vuln Analysis & US Voting System - Moore, Young, BaggettrqMNllTo6wc44:27388M
DEF CON 33 - Voting Village - History and Significance of the TTBR and PEASWG - Debra BowenF_Xz9rMgWzE55:47276M
DEF CON 33 - Voting Village - Is E2E Verifiability a Magic Bullet for Online Voting - John OdumgMvNKsl65NA27:35157M
DEF CON 33 - Voting Village - Reflections on TTBR & Everest - Bowen, Blaze, Clark, Hoke, MulliganeRW2YjY0QuM29:01221M
DEF CON 33 - Voting Village - Regulatory Failures with Ballot Marking Devices - Marnie Mahoneyy1zZtEm_rvk27:48171M
DEF CON 33 - Voting Village - When Insiders Are the Threat - Burbank, Greenhalgh, Marks, JeffersonOyUNja7QSv857:57345M
DEF CON 33 - Voting Village - When the Paper Trail Leads Nowhere - Ian PattonURWjVRUDNiI26:34201M
DEF CON 33 - Voting Village - "Fortress Island" Physical Security in Voting Systems - Drew Springallyvbe6n82f0I33:32282M
DEF CON 33 - Voting Village- Evidence Based Elections and Software Independence - Ron Rivest8rIM5aTApKo44:00235M
DEF CON 33 - Vulns to end your space mission - A. Olchawa, M. Starcik, R. Fradique & A.BoulaichTAtG8rofxxE17:3268M
DEF CON 33 - Welcome to DEF CON 33 - The Dark TangentEo5lwnTft8U21:45323M
DEF CON 33 - What Game Hackers teach us about Offensive Security & Red Teaming - Joe 'Juno' AureliozfhiZnjJLT430:08125M
DEF CON 33 - What is Dead May Never Die: The Immortality of SDK Bugs - Richard LawshaeMTZ9_IfZ7Bk12:05177M
DEF CON 33 - What’s Really in the Box? The Case for Hardware Provenance and HBOMs - Allan FriedmanQARwgoJ-IbA24:22201M
DEF CON 33 - Where’s My Crypto, Dude? The Ultimate Guide to Crypto Money Laundering - Thomas Roccia1uNneo9L_jU30:02100M
DEF CON 33 - Whose Slide Is It Anyway?i-wKxAAeWt839:25696M
DEF CON 33 - Win-DoS Epidemic - Abusing RPC for Win-DoS & Win-DDoS - Or Yair, Shahak MoragJLMsfH2MVCE37:16159M
DEF CON 33 - Winners of DARPA’s AI Cyber Challenge - Andrew Carney, Jason Roos, Stephen WinchelltouJ5uLlXjQ41:31385M
DEF CON 33 - You snooze you lose: RPC Racer winning RPC endpoints against services - Ron Ben YizhakvBz8TBVxwk435:36155M
DEF CON 33 - Your Passkey is Weak: Phishing the Unphishable - Chad Spensky, Ph Dxdl08cPDgtE24:12110M
DEF CON 33 -BiC Village -Let's Lose the Shock: Mystery of Linux - A Pain Free Intro - DJ DavisR_rpuLpfMZM55:49269M
DEF CON 33 -BitUnlocker: Leverage Windows Recovery to Extract BitLocker Secrets - Leviev, Ben SimonCc6vrQSVMII38:26106M
DEF CON 33 -Voting Village - Protecting Election Researchers Globally - Miracle Owolabi5qmpv44knF814:5192M
DEF CON 33 3- Red teaming fraud prevention systems with GenAI - Karthik Tadinada, Martyn HigsonEiXbzVlNYro46:16230M
DEF CON 33 BiC Village - Sydney Johns RE for the Rest of Us An Introduction to Reverse Engineeringh9ewUS6FTFQ41:00224M
DEF CON 33 Voting Village - Welcome and IntroductionsYBcJEiP_k7k10:4486M
DEF CON 33 Voting Village - Dominion ICX Simple Hacks Daunting Recoveries - Springall, Davis, MarksgRU0-z1of2Y46:06161M
DEF CON China Party - Cooper Quintin- Detecting Fake 4G Base Stations in Real Timeq68V-s12RKE24:18170M
DEF CON China Party 2021 Miss JackalopersHSkRAt8Gg01:40:143G
DEF CON China Party 2021 - CocktailConxIAgnPGlcwg01:14:17710M
DEF CON China Party 2021 - DEF CON Culture - Dead AddictcGzcNyyiCHs29:58189M
DEF CON China Party 2021 - IOT Fails Learning from Sex Toys How Not to Suck - RenderManxtDb_Casjjw49:54140M
DEF CON China Party 2021 - Keynote Interview Excerpt - Steve Wozniak, The Dark Tangenty16QQilQGsg05:2054M
DEF CON China Party 2021 - Malware Included Imported 3d Party JS as Attack Vectors - Michael Schrenk0uekC_dWERw27:2773M
DEF CON China Party 2021 - Whispers Among the Stars - James Pavur90_4kKpgFuw29:5068M
DEF CON China Party 2021- Wall of Sheep: Hilarious Fails and the Sheep Behind Them - Riverside4ZabsNgMHCM10:5582M
DEF CON Safe Mode - Hacker Jeopardy - Friday Night86SgQcklkU801:43:36985M
DEF CON Safe Mode - Whose Slide Is It Anyway - 1 of 200njwXnHAnY01:13:321G
DEF CON Safe Mode Aerospace Village - Liz Wharton - Airport Hacking Choose Your Own Adventure86u_aYpEma038:27106M
DEF CON Safe Mode Car Hacking Village - Derrick - All Aboard the CAN Bus or MotorcycleYSApvBDIVCM29:08282M
DEF CON Safe Mode DC Groups - DC201 New Jersey - Show and Tell90wL1kpmEXQ48:3278M
DEF CON Safe Mode DC Groups Village - DC644 Tijuana - Espionagej3GqTPgTeq413:3740M
DEF CON Safe Mode IoT Village - Dewank Pant, Shruti Lohani - Your Connected World Isn't Yours Now4Hefeu9lxvs46:471M
DEF CON Safe Mode Voting Village - A Panel with the Feds on Election Security Introductionr8eJLT9Byvg04:017M
DEF CON SE VILLAGE - Silvers and Banks - On the Hunt Hacking the Hunt GroupvgKAxd_4s0A50:55344M
DEFCON 29 IoT Village - Alexi Kojenov - I used AppSec Skills to Hack IoT and So Can YouP6dI2IFI34039:08161M
DEFCON 29 IoT Village - Cheryl Biswas - Mind the Gap Managing Insecurity in Enterprise IoTwQd63Tb7C_Q42:37316M
DEFCON 29 IoT Village - Elazari Tarkhanyan and Cheruvu - Establishing IoT TrustworthinessCqWr9kC6nMw46:19243M
DEFCON 29 IoT Village - Hadad and Kaufman - Reverse Supply Chain AttacknGwZ6qbQCKY25:49173M
DEFCON 29 IoT Village - Harshit Agrawal - Defending IoT in the Future of High Tech WarfareRh8IZhhUKV852:25417M
DEFCON 29 IoT Village - Hutch - Alexa Have You Been CompromisediVKYA774LJc40:35259M
DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0daysxUb190HQtjA42:49300M
DEFCON 29 IoT Village - Juneau - Strategic Trust and Deception in the Internet of ThingscR1c2wRU4G020:0191M
DEFCON 29 IoT Village - Ken Pyle - BLUEMONDAY Series Exploitation and Mapping of Vulnerable Devices3cfGguMi9IU53:44377M
DEFCON 29 IoT Village - Messdaghi and Eddy - Representation MattersJGD22OzD39M33:14313M
DEFCON 29 IoT Village - Petro and Cecil - You're Doing IoT RNGdzS1Zf-1Uzo40:04294M
DEFCON 29 IoT Village - Ria Cheruvu - Ethics at the EdgeKN_mA-RpiRs30:22231M
DEFCON 29 IoT Village - Ross and Balazs - MIPS X the Next IoT FrontierV5P2eEhhwUU33:22239M
DEFCON 29 IoT Village - Sessler and Hendricks - IoT Devices as Government Witnesses7ymcofBUPWc37:25364M
DEFCON 29 IoT Village - Ted Harrington - When Penetration Testing Isn't Penetration Testing At AllJfXNqQQgImU30:08185M
DEFCON 29 IoT Village - Tim Jensen EapolSniper - IoT Testing Crash CourseSUtDb3ZaPqY46:47237M
DEFCON 29 IoT Village - Victor Hanna - LED Light LunacyNGkRPpwWDLM28:55198M
DEFCON 29 IoT Village - Waylon Grange - 1.21 Gigawatts Vulnerabilities in Solar PanelsHyZLKIHU9v828:57231M
DEFE CON 33 - Deploying Deception in Depth for ICS - Brent Muir_ghyf3J92UQ22:18103M
Flipping Locks - Remote Badge Cloning with the Flipper Zero and More - Langston Clements & Dan Gogaro-EkKjj_wc37:03115M
Hacker History Project - The Dark Tangent Interviewed at DEF CON 5 - courtesy of ZDnetohXjTIAmo1U06:4827M
Save the Date - DEF CON's first New Year's Eve party!dUsm26MlA7M00:302M