Quick Overview: When a Windows domain is compromised, an attacker has several options to create backdoors, obscure his tracks, and make his ... Join us for a fun-filled tour of source control management and services to talk about how to backdoor software. We will focus on ... The Open Network Install Environment, or ONIE, makes commodity or WhiteBox Ethernet possible. By placing a common, ...
Def Con 23 Grant Bugher - Detailed Overview & Context
When a Windows domain is compromised, an attacker has several options to create backdoors, obscure his tracks, and make his ... Join us for a fun-filled tour of source control management and services to talk about how to backdoor software. We will focus on ... The Open Network Install Environment, or ONIE, makes commodity or WhiteBox Ethernet possible. By placing a common, ... ThruGlassXfer (TGXf) is a new and exciting technique to steal files from a computer through the screen. Any user that has screen ... Common hotspot software like Chilispot and Sputnik allow anyone to set up a restricted WiFi router or Ethernet network with a ... Have you ever attended an RFID hacking presentation and walked away with more questions than answers? This talk will finally ...
Security research is under attack. Updates to the Wassenaar Arrangement in 2013 established among its 41 member nations an ... IMSI Catcher Counter-Surveillance Freddy Martinez This talk will address how activists can detect IMSI Catchers around political ... From day one when you buy a piece of wireless technology, whether it be just a cell phone, laptop or a fitbit, you get a wireless ... The ProxyHam talk was mysteriously canceled. However, it's easy to replicate the talk from the press coverage. In this talk, we ... Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems ... This speech will demonstrate attacking .NET applications at runtime. I will show how to modify running applications with advanced ...
DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain Persistence Snubs interviews the folks who bring you the Blacks in CyberSecurity Village. Most of Wi-Fi Intrusion Detection & Forensics is done today using million dollar products or spending hours applying filters in ...