Quick Overview: Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ... It is 60 years since the first publication of the ASCII standard, something we now very much take for granted. ASCII introduced the ... For too long, web race-condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks ...

Def Con 31 Weaponizing Plain - Detailed Overview & Context

Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ... It is 60 years since the first publication of the ASCII standard, something we now very much take for granted. ASCII introduced the ... For too long, web race-condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks ... Have you ever wondered how you can access your family pictures on your home network-attached storage (NAS) device remotely ... MacOS is known for an additional layer of privacy controls called TCC - Transparency, Consent, and Control (TCC) that restricts ... The enshittification of the internet follows a predictable trajectory: first, platforms are good to their users; then they abuse their ...

Firmware and software binaries are littered with private keys, legitimate CA-blessed certificates, and encryption keys—but hardly ... Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ... Android devices are constantly improving their security to protect against attackers with physical access, with new protection ... The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ... Cellular networks form large complex compounds for roaming purposes. Thus, geographically-spread testbeds for masurements ... Android malware creators constantly struggle to devise innovative methods to obscure apps and impede reverse engineering.

Post 9/11, the phrase “If you see something, say something” became ubiquitous. If you saw something of concern, better to report ... BLE devices are now all the rage. What makes a purpose built tracking device like the AirTag all that different from the majority of ... Ever wake up and ask yourself: “Damn, how could I make email security suck even more today”? Tired of your Red Teams ... C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

Photo Gallery

DEF CON 31 - Weaponizing Plain Text  ANSI Escape Sequences as a Forensic Nightmare - STÖK
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater
DEF CON 31 -  Smashing the State Machine the True Potential of Web Race Conditions - James Kettle
DEF CON 31 - A Pain in the NAS  Exploiting Cloud Connectivity to PWN your NAS - Moshe, Brizinov
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła
DEF CON 31 - An Audacious Plan to Halt the Internet's Ensh*ttification  - Cory Doctorow
DEF CON 31 - Private Keys in Public Places - Tom Pohl
DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas
DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade
DEF CON 31 - Revolutionizing ELF binary patching w Shiva   - ElfMaster
DEF CON 31 - Using SIM Tunneling to Travel at Light Speed -  Adrian Dabrowski, Gabriel Gegenhuber
DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored