Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.
If You Can't Break Crypto, Break the Client
Black Hat USA (2015) - Bypass Surgery - Abusing CDNs with SSRF Flash and DNS
DEF CON 23 (2015) - RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID
Brink's Smart Safe Hacking
AirDroid Exploit Demo
Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer
In this presentation, we explore how to (ab)use free trials to get access to vast amounts of computing power, storage, and pre-made hacking environments.
HOPE X (2014) - Rickrolling your neighbors with Google Chromecast
Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG
RickMote Controller - Hijacking TVs via Google Chromecast
August: Built-in Security in IoT Devices
ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast
RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.