Quick Overview: In this work, we present the novel results of our research on Intel CPU microcode. Building upon prior research on Intel Goldmont ... Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ... For too long, web race-condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks ...

Def Con 31 Backdoor In - Detailed Overview & Context

In this work, we present the novel results of our research on Intel CPU microcode. Building upon prior research on Intel Goldmont ... Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ... For too long, web race-condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks ... In this talk, we will present a 0-day vulnerability found in the Google Cloud Platform (GCP) affecting all Google users, which ... Complexity is increasing. Trust eroding. In the wake of Spectre and Meltdown, when it seems that things cannot get any darker for ... In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and analysis of the ...

Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ... The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ... When a Windows domain is compromised, an attacker has several options to create Spooky authentication at a distance outlines a new and innovative post-exploitation technique to proxy common authentication ... As our homes become smarter and more connected we come up with new ways of reasoning about our privacy and security. The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly ...

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ... In 2018, a secure communications app called Anom started to gain popularity among organized criminals. Soon, top tier drug ... Wow, this took a LOT of editing time! While I'm glad that we recorded my talk in the TOOOL Lockpick Village, as you can see in the ...

Photo Gallery

DEF CON 31 - Backdoor in the Core - Altering Intel x86 Instruction Set at Runtime -  Krog, Skovsende
DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas
DEF CON 31 -  Smashing the State Machine the True Potential of Web Race Conditions - James Kettle
DEF CON 31 - GhostToken Exploiting Google Cloud Platform to Create Unremovable Trojan Apps - Skverer
DEF CON 26  - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86
DEF CON 31 - Tetra Tour de Force Jailbreaking Digital Radios & Base Stations for Fun - Midnight Blue
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris
DEF CON 31 - Revolutionizing ELF binary patching w Shiva   - ElfMaster
DEF CON 23 - Grant Bugher -  Obtaining and Detecting Domain Persistence
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos
DEF CON 24 Crypto and Privacy Village - David Wong - How to Backdoor Diffie-Hellman
DEF CON 24 - Jmaxxz - Backdooring the Frontdoor
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored