![]() ![]() Nullagent rekcahdam - Snoop on to them as they snoop on to us/Īapo Oksman - certmitm automatic exploitation of TLS certificate validation vulnerabilities-demo.mp4Īapo Oksman - certmitm automatic exploitation of TLS certificate validation vulnerabilities.pdfĪdrian atrox Dabrowski Gabriel K. Wojciech Reguła - ELECTRONizing macOS privacy - a new weapon in your red teaming armory/ Thomas Chauchefoin Paul Gerste - Visual Studio Code is why I have (Workspace) Trust issues/ Ryan Johnson Mohamed Elsabagh Angelos Stavrou - Still Vulnerable Out of the Box Revisiting the Security of Prepaid Android Carrier Devices/ Ricky Lawshae - Fantastic Ethertypes and Where to Find Them/ ![]() McDown - Malware design - abusing legacy Microsoft transports and session architecture/ Maxime Clementz - Defeating VPN Always-On/ Laurie Kirk - Runtime Riddles Abusing Manipulation Points in the Android Source/ Katie Inns - HL7Magic Medical Data Hacking Made Easy/ James Horseman Zach Hanley - New Isn't Always Novel Greping Your Way to 20K at Pwn2Own and How You Can Too/ DEF CON 31/DEF CON 31 presentations/ File Name ↓Īndréanne Bergeron Olivier Bilodeau - I Watched You Roll the Die Unparalleled RDP Monitoring Reveal Attackers Tradecraft/Ĭarlos Polop Yago Gutierrez - Exploring Linux Memory Manipulation for Stealth and Evasion Strategies to bypass Read-Only No-Exec and Distroless Environments/ĭan Borgogno Ileana Barrionuevo - Turning my virtual wallet into a skimming device mPOS solutions/ĭan Petro David Vargas - Badge of Shame Breaking into Secure Facilities with OSDP/ĭavid McGrew Brandon Enright Andrew Chi - Assessing the Security of Certificates at Scale/ ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |