34-Barak Sternberg - Extension Land: Exploits and Rootkits in Your Browser Extensions
https://www.youtube.com/watch?v=PpSftQuCEDw
35-Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys
https://www.youtube.com/watch?v=BRsXsUEIU70
36-Rion Carter - Why does my security camera scream like a Banshee?
https://www.youtube.com/watch?v=JpL3lySZNeM
37-Kelly Kaoudis, Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing
https://www.youtube.com/watch?v=_o1RPJAe4kU
38-Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in Apple-@onhex_ir
https://www.youtube.com/watch?v=oAMZxKsZQp0
39-Tom Van Goethem, Mathy Vanhoef - Timeless Timing Attacks
https://www.youtube.com/watch?v=s5w4RG7-Y6g
40-Tianze Ding - Vulnerability Exchange: One Domain Account For More Than Exchange Server
https://www.youtube.com/watch?v=7h38rI8KT30
41-Thomas Roth - Hacking the Apple AirTags
https://www.youtube.com/watch?v=paxErRRsrTU
42-Tamas K Lengyel - Fuzzing Linux with Xen
https://www.youtube.com/watch?v=_dXC_I2ybr4
43-Slava Makkaveev - I know how to take over your Kindle with an e-book
https://www.youtube.com/watch?v=1jM_r-pe8Ss
44-Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMI
https://www.youtube.com/watch?v=sDCIjcUEFj0
45-Salvador Mendoza - PINATA PIN Automatic Try Attack
https://www.youtube.com/watch?v=VOIvEqjJNOY
46-Mickey Shkatov, Jesse Michael - High Stakes Updates: BIOS RCE OMG WTF BBQ
https://www.youtube.com/watch?v=qxWfkSonK7M
47-Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge-@onhex_ir
https://www.youtube.com/watch?v=H3kdq40PY3s
48-Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 Connections
https://www.youtube.com/watch?v=suxDcYViwao
49-Jiska, Alexander Heinrich - Wibbly Wobbly, Timey Wimey Whats Inside Apples U1 chip
https://www.youtube.com/watch?v=k1H7fiVlTPA
50-Ionut Cernica - Hack the hackers Leaking data over SSL TLS
https://www.youtube.com/watch?v=WNXEuFaRUkU
51-Dan Petro - You're Doing IoT RNG
https://www.youtube.com/watch?v=Zuqw0-jZh9Y
52-Agent X - A look inside security at the New York Times
https://www.youtube.com/watch?v=U2-8MNx8nsg
53-Zabrocki, Matrosov - Glitching RISC-V chips: MTVEC corruption for hardening ISA
https://www.youtube.com/watch?v=iz_Y1lOtX08
54-Claire Vacherot - Sneak into buildings with KNXnetIP
https://www.youtube.com/watch?v=QofeTV39kQE
55-Ian Vitek - Central Bank Digital Currency, Threats and Vulnerabilities
https://www.youtube.com/watch?v=-MK0bn3Ys_M
56-Dennis Giese - Robots with lasers and cameras but no security Liberating your vacuum
https://www.youtube.com/watch?v=EWqFxQpRbv8
57-Yuhao Weng, Steven Seeley, Zhiniang Peng - An Attack Surface Tour of SharePoint Server
https://www.youtube.com/watch?v=mVXrl4W1jOU
58-Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau - eBPF, I thought we were friends!
https://www.youtube.com/watch?v=5zixNDolLrg
59-Eugene Lim, Glenice Tan, Tan Kee Hock - Hacking Humans with AI as a Service
https://www.youtube.com/watch?v=tWWhRbzhkrg
60-Dimitry 'Op Nomad' Snezhkov - Use of Offensive Enclaves In Adversarial Operations
https://www.youtube.com/watch?v=WWGkaGBtn2Q
61-Dimitry 'Op Nomad' Snezhkov - Racketeer Toolkit: Prototyping Controlled Ransomware Ops
https://www.youtube.com/watch?v=VJ8aqReB118
62-Vivek Nair - Time Turner Hacking RF Attendance Systems To Be in Two Places at Once
https://www.youtube.com/watch?v=NdAIeXy2zoY
https://www.youtube.com/watch?v=PpSftQuCEDw
35-Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys
https://www.youtube.com/watch?v=BRsXsUEIU70
36-Rion Carter - Why does my security camera scream like a Banshee?
https://www.youtube.com/watch?v=JpL3lySZNeM
37-Kelly Kaoudis, Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing
https://www.youtube.com/watch?v=_o1RPJAe4kU
38-Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in Apple-@onhex_ir
https://www.youtube.com/watch?v=oAMZxKsZQp0
39-Tom Van Goethem, Mathy Vanhoef - Timeless Timing Attacks
https://www.youtube.com/watch?v=s5w4RG7-Y6g
40-Tianze Ding - Vulnerability Exchange: One Domain Account For More Than Exchange Server
https://www.youtube.com/watch?v=7h38rI8KT30
41-Thomas Roth - Hacking the Apple AirTags
https://www.youtube.com/watch?v=paxErRRsrTU
42-Tamas K Lengyel - Fuzzing Linux with Xen
https://www.youtube.com/watch?v=_dXC_I2ybr4
43-Slava Makkaveev - I know how to take over your Kindle with an e-book
https://www.youtube.com/watch?v=1jM_r-pe8Ss
44-Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMI
https://www.youtube.com/watch?v=sDCIjcUEFj0
45-Salvador Mendoza - PINATA PIN Automatic Try Attack
https://www.youtube.com/watch?v=VOIvEqjJNOY
46-Mickey Shkatov, Jesse Michael - High Stakes Updates: BIOS RCE OMG WTF BBQ
https://www.youtube.com/watch?v=qxWfkSonK7M
47-Michael Whiteley Katie Whiteley - Making the DEF CON 29 Badge-@onhex_ir
https://www.youtube.com/watch?v=H3kdq40PY3s
48-Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 Connections
https://www.youtube.com/watch?v=suxDcYViwao
49-Jiska, Alexander Heinrich - Wibbly Wobbly, Timey Wimey Whats Inside Apples U1 chip
https://www.youtube.com/watch?v=k1H7fiVlTPA
50-Ionut Cernica - Hack the hackers Leaking data over SSL TLS
https://www.youtube.com/watch?v=WNXEuFaRUkU
51-Dan Petro - You're Doing IoT RNG
https://www.youtube.com/watch?v=Zuqw0-jZh9Y
52-Agent X - A look inside security at the New York Times
https://www.youtube.com/watch?v=U2-8MNx8nsg
53-Zabrocki, Matrosov - Glitching RISC-V chips: MTVEC corruption for hardening ISA
https://www.youtube.com/watch?v=iz_Y1lOtX08
54-Claire Vacherot - Sneak into buildings with KNXnetIP
https://www.youtube.com/watch?v=QofeTV39kQE
55-Ian Vitek - Central Bank Digital Currency, Threats and Vulnerabilities
https://www.youtube.com/watch?v=-MK0bn3Ys_M
56-Dennis Giese - Robots with lasers and cameras but no security Liberating your vacuum
https://www.youtube.com/watch?v=EWqFxQpRbv8
57-Yuhao Weng, Steven Seeley, Zhiniang Peng - An Attack Surface Tour of SharePoint Server
https://www.youtube.com/watch?v=mVXrl4W1jOU
58-Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau - eBPF, I thought we were friends!
https://www.youtube.com/watch?v=5zixNDolLrg
59-Eugene Lim, Glenice Tan, Tan Kee Hock - Hacking Humans with AI as a Service
https://www.youtube.com/watch?v=tWWhRbzhkrg
60-Dimitry 'Op Nomad' Snezhkov - Use of Offensive Enclaves In Adversarial Operations
https://www.youtube.com/watch?v=WWGkaGBtn2Q
61-Dimitry 'Op Nomad' Snezhkov - Racketeer Toolkit: Prototyping Controlled Ransomware Ops
https://www.youtube.com/watch?v=VJ8aqReB118
62-Vivek Nair - Time Turner Hacking RF Attendance Systems To Be in Two Places at Once
https://www.youtube.com/watch?v=NdAIeXy2zoY
YouTube
DEF CON 29 - Barak Sternberg - Extension Land: Exploits and Rootkits in Your Browser Extensions
Browser extensions are installed anywhere, they serve as an integral part of our day-to-day web routine, from AdBlockers to Auto-Translators. But - do we know what is running inside of them? Do we know what goes deep-down inside their communication routines?…
【纪实】《古老的罪恶:全国妇女大拐卖纪实》本书是一部长篇纪实文学,反映了八十年代中国内地各省市发生的买卖妇女的问题,读完之后很难一下子回到人们以为的当代文明。在现实的男人世界里,女人却完全是另外一回事。 她们是传宗接代的工具; 是男人的享乐品; 是做饭洗衣服的保姆, 是可以任意支配、奴役,用来衬托大男人威风的奴隶; 是可以用钱买卖,更换的物品。比盲山更可怕的恐怖故事集,可以从语言中看出作者的愤懑,作为读者也会看得毛骨悚然。
【纪实】《中统特务实录》作者行文稍显稚嫩。中统在解放前一度成为暗杀、破坏和臭名昭著的代名词,它作为国民党的特务机构,神秘莫测又令人恐惧。中统的前身是1928年陈立夫组建的党务调查科。在中统历史上最重要也是掌权时间最长的特务头子,就是徐恩曾,他执掌中统十多年,是整个中统帝国名正言顺的缔造者。本书从成员、事件、组成,架构多个方面深度解读中统内幕,多角度、多切入点地解释了总舵鲜为之人的历史真相。本书还配入大量手绘插画,形象真实地再现了那段历史下中统的众生相。