Quick Overview: Last year we almost zero-day'd the world with the publication of Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ... BLE devices are now all the rage. What makes a purpose built tracking device like the AirTag all that different from the majority of ...

Def Con 31 Ringhopper How - Detailed Overview & Context

Last year we almost zero-day'd the world with the publication of Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ... BLE devices are now all the rage. What makes a purpose built tracking device like the AirTag all that different from the majority of ... Veilid is an open-source, peer-to-peer, mobile-first networked application framework, with a flagship secure messaging ... It is 60 years since the first publication of the ASCII standard, something we now very much take for granted. ASCII introduced the ... Firmware and software binaries are littered with private keys, legitimate CA-blessed certificates, and encryption keys—but hardly ...

For too long, web race-condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks ... Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ... To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ... C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ... Spooky authentication at a distance outlines a new and innovative post-exploitation technique to proxy common authentication ... With billions of users worldwide, mobile messaging apps like WhatsApp and Signal have become critical for personal and ...

The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ... Smart shopping cart wheels are electronic wheels with a mechanical braking mechanism meant to prevent cart removal or ... Have you ever wondered how you can access your family pictures on your home network-attached storage (NAS) device remotely ... The enshittification of the internet follows a predictable trajectory: first, platforms are good to their users; then they abuse their ...

Photo Gallery

DEF CON 31 - Ringhopper - How We Almost Zero day’d the World - Benny Zeltser, Jonathan Lusky
DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas
DEF CON 31 - Snoop On To Them, As They Snoop On To Us -  Alan Meekins
DEF CON 31 - The Internals of Veilid, a New Decentralized Application Framework - DilDog, Medus4
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater
DEF CON 31 - Private Keys in Public Places - Tom Pohl
DEF CON 31 -  Smashing the State Machine the True Potential of Web Race Conditions - James Kettle
Def Con 31 Conference Guide for First-Timers From OG @jhaddixP
DEF CON 31 - Weaponizing Plain Text  ANSI Escape Sequences as a Forensic Nightmare - STÖK
DEF CON 31 - Attacking And Securing the Pixel Modem  - Karimi,  Xing , Gong, Rodionov
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored