Quick Overview: Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have ... Have you considered that in certain situations the way hackers exploit vulnerabilities over the network can be predictable? In this talk we will tell the story of an insane exploit we used to compromise the otherwise secure KASM Workspaces software.

Def Con 30 Ionut Cernica - Detailed Overview & Context

Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have ... Have you considered that in certain situations the way hackers exploit vulnerabilities over the network can be predictable? In this talk we will tell the story of an insane exploit we used to compromise the otherwise secure KASM Workspaces software. Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ... Snubs interviews the folks who bring you the Blacks in CyberSecurity Village. When Liberty Safe was found to have provided safe unlock codes to authorities, it made us wonder; how was it even possible for ...

Physical security is an important consideration when designing a comprehensive security solution. There are loads of ways to get ... This talk will cover the unique threats and challenges of working in information security for a news organization. Some best ...

Photo Gallery

DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Services
DEF CON 29 - Ionut Cernica - Hack the hackers  Leaking data over SSL TLS
RSTCon #2 - Ionut Cernica - Hack the hackers: Leaking data over SSL/TLS
RSTCon #3 - Ionut Cernica - Deanonymization of TOR HTTP hidden services
DEF CON 30 - Samuel Erb, Justin Gardner - Crossing the KASM - a Webapp Pentest Story
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris
DEF CON 30 ICS Village   SEAtf Competition
DEF CON 30 - Blacks in CyberSecurity Village Interview
DEF CON 33 - Cash, Drugs, and Guns - Why Your Safes Aren't Safe - Mark Omo, James Rowley
DEF CON 33 - Intro to Physical Security Bypass - Karen Ng, Matthew Cancilla
DEF CON 29 - Agent X - A look inside security at the New York Times
DEF CON 31 - Defeating VPN Always On - Maxime Clementz
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored