Quick Overview: When a Windows domain is compromised, an attacker has several options to create backdoors, obscure his tracks, and make his ... Join us for a fun-filled tour of source control management and services to talk about how to backdoor software. We will focus on ... The Open Network Install Environment, or ONIE, makes commodity or WhiteBox Ethernet possible. By placing a common, ...

Def Con 23 Grant Bugher - Detailed Overview & Context

When a Windows domain is compromised, an attacker has several options to create backdoors, obscure his tracks, and make his ... Join us for a fun-filled tour of source control management and services to talk about how to backdoor software. We will focus on ... The Open Network Install Environment, or ONIE, makes commodity or WhiteBox Ethernet possible. By placing a common, ... ThruGlassXfer (TGXf) is a new and exciting technique to steal files from a computer through the screen. Any user that has screen ... Common hotspot software like Chilispot and Sputnik allow anyone to set up a restricted WiFi router or Ethernet network with a ... Have you ever attended an RFID hacking presentation and walked away with more questions than answers? This talk will finally ...

Security research is under attack. Updates to the Wassenaar Arrangement in 2013 established among its 41 member nations an ... IMSI Catcher Counter-Surveillance Freddy Martinez This talk will address how activists can detect IMSI Catchers around political ... From day one when you buy a piece of wireless technology, whether it be just a cell phone, laptop or a fitbit, you get a wireless ... The ProxyHam talk was mysteriously canceled. However, it's easy to replicate the talk from the press coverage. In this talk, we ... Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems ... This speech will demonstrate attacking .NET applications at runtime. I will show how to modify running applications with advanced ...

DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain Persistence Snubs interviews the folks who bring you the Blacks in CyberSecurity Village. Most of Wi-Fi Intrusion Detection & Forensics is done today using million dollar products or spending hours applying filters in ...

Photo Gallery

DEF CON 23 - Grant Bugher -  Obtaining and Detecting Domain Persistence
DEF CON 23 - Panel - DEF CON 101: The Panel
DEF CON 23 -John Menerick - Backdooring Git
DEF CON 23 - Gregory Picket - Staying Persistent in Software Defined Networks
DEF CON 23 - Ian Latter - Remote Access   the APT
DEF CON 23 - David An - When the Secretary of State says Please Stop Hacking Us
DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks
DEF CON 23 - Francis Brown, Shubham Shah - RFIDiggity: Guide to Hacking HF NFC & UHF RFID
DEF CON 23 - Panel - Licensed to Pwn: Weaponization and Regulation of Security Research
DEF CON 23 - Crypto and Privacy Village - Freddy Martinez - IMSI Catchers
DEF CON 23 - Wireless Village - JoshInGeneral - Meeting People Over WiFi
DEF CON 23 - Graham and Maynor - HamSammich – Long Distance Proxying Over Radio
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored