DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks - Audio.m4b
59.7MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Adam Baldwin - Pillaging DVCS Repos For Fun And Profit - Audio.m4b
26.23MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies - Audio.m4b
85.79MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Alexander Kornbrust - Hacking and Securing DB2 LUW Databases - Audio.m4b
50.24MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Alva Skip Duckwall - A Bridge Too Far Defeating Wired 8021x with a Transparent Bridge Using Linux - Audio.m4b
137.23MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Andrew Wilson and Michael Brooks - Traps of Gold - Audio.m4b
66.45MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation - Audio.m4b
73.62MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Aseem Jakhar - Jugaad Linux Thread Injection Kit - Audio.m4b
35.91MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken - Audio.m4b
83.17MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Ben Feinstein and Jeff Jarmoc - Get Off of My Cloud Cloud Credential Compromise and Exposure - Audio.m4b
83.23MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Brad Woodberg - Network Application Firewalls Exploits and Defense - Audio.m4b
65.95MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Brian Kennish - Tracking the Trackers How Our Browsing History Is Leaking into the Cloud - Audio.m4b
27.11MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Bruce Sutherland - How To Get Your Message Out When Your Government Turns Off The Internet - Audio.m4b
63.83MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Carey Rude and Vandevanter - Metasploit vSploit Modules - Audio.m4b
70.3MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Charlie Miller - Battery Firmware Hacking - Audio.m4b
64.85MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too - Audio.m4b
63.92MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Dust Your Feed RSS Belongs To You! Avoid Censorship! - Audio.m4b
52.1MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Christopher Cleary - Operational Use of Offensive Cyber - Audio.m4b
71.89MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Dan Kaminsky - Black Ops of TCPIP 2011 - Audio.m4b
86.17MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011 - Audio.m4b
75.72MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Daniel Crowley - Speaking with Cryptographic Oracles - Audio.m4b
82.74MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Daniel Garcia - UPnP Mapping - Audio.m4b
45.77MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Dave Kennedy - Hacking Your Victims Over Power Lines - Audio.m4b
48.89MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - David Bryan and Luiz Eduardo - Building The DEF CON Network Making A Sandbox For 10000 Hackers - Audio.m4b
82.18MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - David Litchfield - Hacking and Forensicating an Oracle Database Server - Audio.m4b
64.97MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Deral Heiland - From Printer To Pwnd Leveraging Multifunction Printers During Penetration Testing - Audio.m4b
65.37MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Deviant Ollam - Safe to Armed in Seconds A Study of Epic Fails of Popular Gun Safes - Audio.m4b
64.63MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Emmanuel Bouillon - Federation and Empire - Audio.m4b
83.82MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic - Audio.m4b
67.88MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Eston Abraham and Johnson - Dont Drop the SOAP Real World Web Service Testing for Web Hackers - Audio.m4b
86.43MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing - Audio.m4b
36.46MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us - Audio.m4b
68.02MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - George Chamales - Lives On The Line Securing Crisis Maps In Libya Sudan And Pakistan - Audio.m4b
81.54MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Grayson Lenik - Im Your MACbDaddy - Audio.m4b
62.28MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Greg Conti - The Art and Science of Security Research - Audio.m4b
62.06MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Gregory Pickett - Port Scanning Without Sending Packets - Audio.m4b
74.04MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Gus Fritschie and Mike Wright - Getting F On the River - Audio.m4b
84.8MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Hackajar - Economics of Password Cracking in the GPU Era - Audio.m4b
75.49MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet - Audio.m4b
72.56MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - James Myrcurial Arlen - Security When Nano Seconds Count - Audio.m4b
73.96MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Jamie Butler - Physical Memory Forensics for Cache - Audio.m4b
83.53MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP - Audio.m4b
78.97MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Jason Scott - Archive Team A Distributed Preservation of Service Attack - Audio.m4b
57.5MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin - Audio.m4b
69.4MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Jeff Bryner - Kinectasploit Metasploit Meets Kinect - Audio.m4b
18.81MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware - Audio.m4b
72.51MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security - Audio.m4b
70.73MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Joey Zhu - Phishing and Online Scam in China - Audio.m4b
28.91MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - John McNabb - Vulnerabilities of Wireless Water Meter Networks - Audio.m4b
72.27MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Jon McCoy - Hacking Net Applications The Black Arts - Audio.m4b
77.44MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Jos Weyers - Key Impressioning - Audio.m4b
55.29MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit - Audio.m4b
85.17MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Justin Searle - Attacking and Defending the Smart Grid - Audio.m4b
80.75MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Katy Levinson - Dont Fix It In Software - Audio.m4b
67.41MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Kees Cook - Kernel Exploitation Via Uninitialized Stack - Audio.m4b
23.6MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Kyle Osborn and Matt Johanson - Hacking Google Chrome OS - Audio.m4b
71.79MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia - Audio.m4b
120.83MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Lawson Potter and Deviant Ollam - And Thats How I Lost My Eye Exploring Emergency Data Destruction - Audio.m4b
84.34MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Mahmud Ab Rahman - Sneaky PDF - Audio.m4b
65.76MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Marketa Trimble - The Future of Cybertravel Legal Implications of the Evasion of Geolocation - Audio.m4b
65.22MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Martin Holst Swende and Patrik Karlsson - Web Application Analysis With Owasp Hatkit - Audio.m4b
69.65MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Matt Joyce - The Art of Trolling - Audio.m4b
55.49MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Matt Krick - DCFluX in License to Transmit - Audio.m4b
72.49MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Michael Robinson - What Time Are You Anyway - Audio.m4b
29.81MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Michael Scarito - Build your own Synthetic Aperture Radar - Audio.m4b
76.02MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Michael theprez98 Schearer - WTF Happened to the Constitution The Right to Privacy in the Digital Age - Audio.m4b
70.04MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Mike Arpaia and Ted Reed - Beat to 1337 Creating A Successful University Cyber Defense Organization - Audio.m4b
36.5MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform - Audio.m4b
75.78MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Mikko Hypponen - The History and the Evolution of Computer Viruses - Audio.m4b
74.68MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Ming Chow - Abusing HTML5 - Audio.m4b
53.99MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Mouse and Renderman - Familiarity Breeds Contempt - Audio.m4b
64.83MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Moxie Marlinspike - SSL And The Future Of Authenticity - Audio.m4b
65.41MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Nelson Elhage - Virtualization Under Attack Breaking out of KVM - Audio.m4b
85.51MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Jibran Ilyas - Malware Freak Show 3 Theyre pwning erbody out there - Audio.m4b
68.81MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Paul Kehrer - Getting SSLizzard - Audio.m4b
61.89MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Sean Schulte - This is REALLY not the droid youre looking for - Audio.m4b
54.74MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Nicole Ozer - Big Brother on the Big Screen - Audio.m4b
93.07MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database - Audio.m4b
30.44MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - PacketFence The Open Source Nac What Weve Done In The Last Two Years - Audio.m4b
78.9MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Ask EFF The Year in Digital Civil Liberties - Audio.m4b
80.46MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale - Audio.m4b
156.47MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Former Keynotes The Future - Audio.m4b
73.72MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Is it 0-day or 0-care - Audio.m4b
91.53MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Meet The Federal Agent 2.0 - Audio.m4b
72.83MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Net Neutrality Panel - Audio.m4b
69.01MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Network Security Podcast - Audio.m4b
84.95MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - PCI 2 Still Compromising Controls and Compromising Security - Audio.m4b
174.87MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Represent Defcon Groups Hackerspaces and You - Audio.m4b
62.89MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - SCADA and PLCs in Correctional Facilities The Nightmare Before Christmas - Audio.m4b
86.47MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Smartfuzzing the Web Carpe Vestra Foramina - Audio.m4b
82.63MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves - Audio.m4b
82.18MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Patrick Engebretson and Josh Pauli - Mamma Dont Let Your Babies Grow Up to be Pen Testers - Audio.m4b
57.46MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Paul Craig - Internet Kiosk Terminals The Redux - Audio.m4b
77.54MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security - Audio.m4b
57.5MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Reeves Smith - How Haunters Void Warranties - Audio.m4b
23.88MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST - Audio.m4b
83.35MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Rick Howard - An Insiders Look at International Cyber Security Threats and Trends - Audio.m4b
50.08MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Ryan Linn - PIG Finding Truffles Without Leaving A Trace - Audio.m4b
74.43MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Sam Bowne - Three Generations of DoS Attacks - Audio.m4b
79.49MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Schuyler Towne - DIY Non-Destructive Entry - Audio.m4b
68.54MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Shawn Webb - Runtime Process Insemination - Audio.m4b
66.77MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Shrdlu - Are You In Yet The CISOs View of Pentesting - Audio.m4b
34.37MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Skunkworks - Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin - Audio.m4b
35.9MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE - Audio.m4b
66.36MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Steve Ocepek - Blinkie Lights Network Monitoring with Arduino - Audio.m4b
82.74MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Steven Levy - We Owe it All to the Hackers - Audio.m4b
73.4MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and LosTboY - Welcome - Making of the badge - Audio.m4b
72.32MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and Russ Rogers - DEF CON Awards - Audio.m4b
55.54MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Thomas Wilhelm - Staying Connected during a Revolution or Disaster - Audio.m4b
77.11MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network - Audio.m4b
47.68MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Tyler Cohen - Look At What My Car Can Do - Audio.m4b
82.41MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang - Audio.m4b
46.95MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit - Audio.m4b
73.51MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Whitfield Diffie and Moxie Marlinspike - Audio.m4b
90.79MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - William Manning - Pervasive Cloaking - Audio.m4b
47.04MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Yekaterina Tsipenyuk ONeil and Erika Chin - Seven Ways to Hang Yourself with Google Android - Audio.m4b
79.72MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - Zoz and Andrea Bianchi - Vanquishing Voyeurs Secure Ways To Authenticate Insecurely - Audio.m4b
82.27MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - datagram - Introduction to Tamper Evident Devices - Audio.m4b
92.42MB
DEF CON 19 audio/DEF CON 19 Hacking Conference Presentation By - eskimo - Steganography and Cryptography 101 - Audio.m4b
30.33MB
DEF CON 19 ctf/DEF CON 19 Hacking Conference CTF - BinJitsu - Capture the Flag complete packet capture.rar
2.22GB
DEF CON 19 hacker jeopardy and hacker pyramid/DEF CON 19 Hacking Conference Presentation - Hacker Pyramid and Hacker Jeopardy - Friday.mp4
508.88MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 hacker jeopardy and hacker pyramid/DEF CON 19 Hacking Conference Presentation - Hacker Pyramid and Hacker Jeopardy - Saturday.mp4
582.38MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 images/DEF CON 19 - Rio.jpg
59.64KB
DEF CON 19 images/DEF CON 19 - archive-header.jpg
99.65KB
DEF CON 19 images/DEF CON 19 - floorplan.png
71.18KB
DEF CON 19 images/DEF CON 19 - footer-bg.psd
2.74MB
DEF CON 19 images/DEF CON 19 - logo.png
17.42KB
DEF CON 19 images/DEF CON 19 - program.pdf
19.01MB
DEF CON 19 images/DEF CON 19 - receipt.pdf
88.38KB
DEF CON 19 images/DEF CON 19 - rio-pool-satellite.jpg
127.54KB
DEF CON 19 images/DEF CON 19 - workshops-receipt.pdf
57.58KB
DEF CON 19 other/DEF CON 19 - Full Video Audio.flac
10.45MB
DEF CON 19 other/DEF CON 19 - Full Video.mp4
328.32MB
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
DEF CON 19 other/DEF CON 19 - Short Version.mp4
144.57MB
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
DEF CON 19 other/DEF CON 19 - grok-the-vote.m4v
4.22MB
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
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032709945.jpg
2.77MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032713705.jpg
3.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032717579.jpg
2.81MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032718659.jpg
2.99MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032719717.jpg
3.03MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032722811.jpg
3.57MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032723999.jpg
2.41MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032728979.jpg
3.89MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032730153.jpg
2.68MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032731183.jpg
2.14MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032732221.jpg
3MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032734901.jpg
2.4MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032736149.jpg
2.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032737471.jpg
3.77MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032739549.jpg
2.85MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032740891.jpg
3.42MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032743463.jpg
1.88MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032747101.jpg
2.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032750635.jpg
2.7MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032752347.jpg
2.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032755101.jpg
2.34MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032757287.jpg
2.62MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032763015.jpg
2.67MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032763943.jpg
2.73MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032767425.jpg
2.87MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032771011.jpg
2.82MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032772251.jpg
3.32MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032773193.jpg
2.58MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032774135.jpg
2.49MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032775247.jpg
3.34MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032776601.jpg
3.31MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032781083.jpg
2.79MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032784435.jpg
2.9MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032786517.jpg
2.76MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032787395.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032789283.jpg
2.36MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032791417.jpg
2.36MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032792609.jpg
3.14MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032795817.jpg
2.04MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032802775.jpg
2.43MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032803773.jpg
2.9MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032804769.jpg
3.56MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032805649.jpg
3.11MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032806579.jpg
3.32MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032810759.jpg
3.32MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032813375.jpg
3.32MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032816463.jpg
2.97MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032817497.jpg
2.74MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032818665.jpg
3.15MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032819583.jpg
2.74MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032820863.jpg
2.87MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032821943.jpg
2.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032824901.jpg
3.41MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032826989.jpg
3.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032828975.jpg
3.16MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032833421.jpg
2.8MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032834425.jpg
3.1MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032835561.jpg
2.6MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032837673.jpg
2.88MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032838807.jpg
3.24MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032847475.jpg
2.78MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032850455.jpg
1.76MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032854781.jpg
2.93MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032857159.jpg
2.55MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032864435.jpg
853KB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032865167.jpg
1.75MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032866083.jpg
1.46MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032867239.jpg
2.9MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032870061.jpg
2.55MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032871091.jpg
2.71MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032872003.jpg
1.95MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032872539.jpg
1.06MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032873477.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032875837.jpg
3.37MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032880131.jpg
2.85MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032880963.jpg
2.34MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032882931.jpg
2.75MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032883881.jpg
2.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032884777.jpg
2.43MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032886793.jpg
2.28MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032887631.jpg
2.23MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032891081.jpg
3.05MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032892405.jpg
3.65MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032893659.jpg
3.48MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032897691.jpg
2.87MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032907123.jpg
2.95MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032909311.jpg
2.74MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032913501.jpg
2.75MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032916647.jpg
2.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032917683.jpg
2.63MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032918599.jpg
2.43MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032919707.jpg
2.71MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032921823.jpg
2.67MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032923491.jpg
4.69MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032930429.jpg
2.61MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032932179.jpg
2.39MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032937419.jpg
2.49MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032940363.jpg
2.85MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032941535.jpg
2.93MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032942651.jpg
3.05MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032944747.jpg
2.91MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032949249.jpg
3.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032950731.jpg
3.58MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032953433.jpg
2.87MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032955681.jpg
2.79MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032957087.jpg
3.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032958435.jpg
2.97MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032960869.jpg
3.47MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032965731.jpg
2.87MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032971073.jpg
3.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032978341.jpg
3.74MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032979399.jpg
2.15MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032980479.jpg
2.79MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032984225.jpg
2.15MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032985269.jpg
2.92MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032991775.jpg
3.41MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032995001.jpg
3.16MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032995937.jpg
2.43MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032997875.jpg
2.57MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6032999033.jpg
3.2MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033000847.jpg
2.7MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033001917.jpg
2.63MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033003221.jpg
3.56MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033004437.jpg
3.31MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033008503.jpg
2.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033010459.jpg
2.55MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033014897.jpg
2.81MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033020857.jpg
3.55MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033023359.jpg
3.42MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033025059.jpg
1.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033026241.jpg
946.8KB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033028565.jpg
2.22MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033029543.jpg
2.34MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033031133.jpg
967.05KB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033033865.jpg
3.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033037303.jpg
3.06MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033038363.jpg
2.84MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033039145.jpg
2.16MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033040091.jpg
2.02MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033052027.jpg
2.88MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033053083.jpg
2.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033056131.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033056901.jpg
1.75MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033058959.jpg
2.13MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033060989.jpg
2.54MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033068287.jpg
1.99MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033070119.jpg
2.83MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033071143.jpg
2.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033073339.jpg
2MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033076623.jpg
3.22MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033082405.jpg
2.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033085659.jpg
2.46MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033089335.jpg
2.91MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033094443.jpg
3.28MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033096445.jpg
2.87MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033097531.jpg
2.98MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033104505.jpg
2.89MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033109479.jpg
4.28MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033111531.jpg
7.41MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033113337.jpg
5.68MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033115745.jpg
3.39MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033117753.jpg
2.92MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033119817.jpg
2.85MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033120469.jpg
1.11MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033121657.jpg
3.24MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033125071.jpg
2.61MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033126085.jpg
2.76MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033127101.jpg
2.97MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033131059.jpg
3.08MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033135379.jpg
3.41MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033136715.jpg
3.54MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033138107.jpg
2.97MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033139025.jpg
2.54MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033141185.jpg
3.11MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033142039.jpg
2.66MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033146697.jpg
2.79MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033147789.jpg
2.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033150041.jpg
2.69MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033151077.jpg
2.98MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033155649.jpg
2.81MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033162405.jpg
2.78MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033168115.jpg
2.68MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033169757.jpg
2.22MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033176465.jpg
2.93MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033182623.jpg
2.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033184589.jpg
2.2MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033186413.jpg
1.89MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033187829.jpg
1.93MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033189189.jpg
2.42MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033190591.jpg
2.29MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033194855.jpg
2.27MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033196289.jpg
2.24MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033202239.jpg
2.02MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033205485.jpg
2.76MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033206445.jpg
2.83MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033207235.jpg
1.97MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033209095.jpg
2.36MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033209817.jpg
1.52MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033211029.jpg
3.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033221649.jpg
1.74MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033223565.jpg
2.75MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033224659.jpg
2.79MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033226935.jpg
3.46MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033231325.jpg
3.06MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033233877.jpg
3.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033236757.jpg
2.26MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033237599.jpg
2.58MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033241679.jpg
1.93MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033244493.jpg
1.1MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033245435.jpg
2.33MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033247649.jpg
1.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033249059.jpg
1.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033250767.jpg
2.77MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033269858.jpg
3.22MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033271078.jpg
2.53MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033274216.jpg
3.23MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033275214.jpg
2.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033279092.jpg
3MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033279954.jpg
2.74MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033283828.jpg
2.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033285730.jpg
2.79MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033291494.jpg
3.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033296704.jpg
3.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033300044.jpg
2.46MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033301002.jpg
2.2MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033302770.jpg
2.2MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033303556.jpg
2.21MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033304404.jpg
2.92MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033305726.jpg
816.83KB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033306648.jpg
2.5MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033307692.jpg
2.52MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033309842.jpg
2.33MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033311512.jpg
2.62MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033312454.jpg
2.54MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033314362.jpg
2.32MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033316114.jpg
2.31MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033318830.jpg
3.22MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033320002.jpg
2.59MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033323154.jpg
2.59MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033324218.jpg
2.43MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033326642.jpg
3.15MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033327838.jpg
2.68MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033335526.jpg
2.89MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033336568.jpg
2.86MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033337676.jpg
2.64MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033339866.jpg
3.13MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033340986.jpg
2.46MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033343176.jpg
2.78MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033346128.jpg
2.7MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033348042.jpg
2.66MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033351208.jpg
2.24MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033352534.jpg
2.61MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033364768.jpg
3.01MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033365886.jpg
3.25MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033366746.jpg
3.38MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033372318.jpg
2.99MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033382742.jpg
3.53MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033384798.jpg
3.24MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033387056.jpg
2.81MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033388164.jpg
2.64MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033389438.jpg
3.41MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033393606.jpg
2.73MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033396826.jpg
2.1MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033397966.jpg
3.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033399066.jpg
2.84MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033400072.jpg
2.62MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033401400.jpg
2.38MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033402656.jpg
2.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033405562.jpg
1.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033406436.jpg
2.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033408442.jpg
2.53MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033410258.jpg
2.93MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033412656.jpg
2.43MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033415008.jpg
2.39MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033416030.jpg
2.26MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033417426.jpg
2.32MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033418444.jpg
2.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033419676.jpg
2.72MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033420570.jpg
2.33MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033425016.jpg
2.7MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033425964.jpg
2.46MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033431466.jpg
2.86MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033433674.jpg
3.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033434872.jpg
3.27MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033435920.jpg
3.23MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033438736.jpg
2.59MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033442722.jpg
2.78MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033445578.jpg
3.25MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033446736.jpg
2.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033451214.jpg
2.57MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033452168.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033453050.jpg
2.59MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033455168.jpg
2.9MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033456386.jpg
3.09MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033457604.jpg
2.95MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033458800.jpg
3.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033459946.jpg
2.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033461390.jpg
2.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033462614.jpg
3.23MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033464950.jpg
2.87MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033467036.jpg
3.22MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033468418.jpg
2.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033470942.jpg
2.58MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033471966.jpg
3.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033477344.jpg
2.84MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033481240.jpg
2.48MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033482040.jpg
2.35MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033482840.jpg
2.58MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033483838.jpg
3.05MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033484620.jpg
2.32MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033485390.jpg
2.17MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033486268.jpg
2.54MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033488118.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033489490.jpg
762.1KB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033490016.jpg
627.74KB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033491132.jpg
2.06MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033492154.jpg
3.14MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033493284.jpg
3.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033495048.jpg
2MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033496372.jpg
3.14MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033500642.jpg
2.92MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033502588.jpg
3.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033503776.jpg
3.48MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033505064.jpg
3.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033509354.jpg
3.3MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033512038.jpg
2.99MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033516772.jpg
3.34MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033518962.jpg
2.85MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033520246.jpg
3.23MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033521584.jpg
3.43MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033524006.jpg
3.86MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033525116.jpg
2.91MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033526392.jpg
3.41MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033528992.jpg
2.72MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033530296.jpg
3.35MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033531392.jpg
3.21MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033532516.jpg
3.31MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033533780.jpg
3.18MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033539000.jpg
3.13MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033540280.jpg
2.76MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033543764.jpg
3.73MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033544932.jpg
3.37MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033546358.jpg
3.35MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033547512.jpg
3.3MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033549880.jpg
2.67MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033550998.jpg
2.74MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033553856.jpg
2.43MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033556842.jpg
1.99MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033562532.jpg
2.92MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033563420.jpg
2.85MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033564560.jpg
3.42MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033566496.jpg
2.48MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033568598.jpg
3.54MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033569776.jpg
2.91MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033570760.jpg
2.58MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033573164.jpg
2.99MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033574310.jpg
2.85MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033575696.jpg
3.7MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033576796.jpg
3.12MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033579216.jpg
3.12MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033581692.jpg
2.95MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033582918.jpg
1MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033583966.jpg
950.48KB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033584876.jpg
2.45MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033587190.jpg
1.05MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033587706.jpg
767.68KB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033589062.jpg
1.73MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033589994.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033592118.jpg
3MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033593146.jpg
3.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033598120.jpg
1.88MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033601632.jpg
2.36MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033603626.jpg
2.89MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033604898.jpg
3.01MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033606070.jpg
3.35MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033607246.jpg
3MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033608536.jpg
3.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033611442.jpg
2.35MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033612352.jpg
2.42MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033615080.jpg
2.09MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033617148.jpg
2.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033619122.jpg
2.03MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033620492.jpg
2.89MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033621542.jpg
2.66MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033622640.jpg
2.64MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033623722.jpg
2.88MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033624690.jpg
1.92MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033626614.jpg
2.16MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033629686.jpg
2.32MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033631790.jpg
2.93MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033632902.jpg
2.79MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033635034.jpg
2.83MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033636290.jpg
3.14MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033637470.jpg
2.87MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033638582.jpg
2.81MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033640858.jpg
2.91MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033641918.jpg
2.57MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033643994.jpg
3.04MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033645508.jpg
3.21MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033652872.jpg
2.98MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033655846.jpg
3MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033657256.jpg
2.9MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033658366.jpg
3.01MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033659696.jpg
3.31MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033660872.jpg
3.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033662920.jpg
3.02MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033664080.jpg
3.23MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033665366.jpg
3.24MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033671780.jpg
3MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033674194.jpg
3.15MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033676276.jpg
3.46MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033680372.jpg
3.23MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033681508.jpg
3.59MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033685698.jpg
2.97MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033686708.jpg
3.07MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033687624.jpg
2.73MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033690536.jpg
3.13MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033691596.jpg
3.21MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033697394.jpg
3.22MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033700508.jpg
3.6MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033701418.jpg
2.67MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033702398.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033706702.jpg
3.13MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033709832.jpg
3.61MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033711018.jpg
3.61MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033712002.jpg
2.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033714352.jpg
3.01MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033715322.jpg
2.39MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033716386.jpg
2.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033717304.jpg
2.69MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033718506.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033720788.jpg
2.74MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033722326.jpg
3.27MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033723850.jpg
2.57MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033729884.jpg
2.29MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033732320.jpg
2.51MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033750084.jpg
2.29MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033755018.jpg
2.48MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033757158.jpg
2.6MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033760618.jpg
2.52MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033761460.jpg
2.46MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033765256.jpg
2.38MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033769080.jpg
2.13MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033770150.jpg
2.6MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033771066.jpg
2.7MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033772006.jpg
2.75MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033773002.jpg
2.44MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033773898.jpg
2.21MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033774684.jpg
1.96MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033775674.jpg
2.15MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033776856.jpg
1.9MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033778010.jpg
2.42MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033779760.jpg
2.52MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033782664.jpg
3.21MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033784946.jpg
3.71MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033786136.jpg
3.54MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033787326.jpg
3.66MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033789400.jpg
3.86MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033795394.jpg
3.31MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033796830.jpg
3.24MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033800160.jpg
1.37MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033803120.jpg
1.73MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033803798.jpg
1.53MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033805356.jpg
1.94MB
DEF CON 19 pictures/Dan Tentler DEF CON 19/DEF CON 19 Dan Tentler 6033806690.jpg
1.65MB
DEF CON 19 presentations/Chow/acme_xdr.php
170B
DEF CON 19 presentations/Chow/cdm_receiver.html
577B
DEF CON 19 presentations/Chow/cdm_sender.html
826B
DEF CON 19 presentations/Chow/localstorage_example.html
945B
DEF CON 19 presentations/Chow/websql_example1.html
1.9KB
DEF CON 19 presentations/Chow/websql_example2.html
1.92KB
DEF CON 19 presentations/Chow/websql_example3.html
2.2KB
DEF CON 19 presentations/Cook/DEF CON 19 - Cook.c
7.42KB
DEF CON 19 presentations/DEF CON 19 - Abstrct-The-Schemaverse-Guide.pdf
592.27KB
DEF CON 19 presentations/DEF CON 19 - Abstrct-The-Schemaverse.pdf
993.54KB
DEF CON 19 presentations/DEF CON 19 - Almeida-Workshop-ESD.pdf
1.85MB
DEF CON 19 presentations/DEF CON 19 - Alonso-Garrido-DUST.pdf
1.78MB
DEF CON 19 presentations/DEF CON 19 - Alonso-Garrido-Excel.pdf
458.22KB
DEF CON 19 presentations/DEF CON 19 - Arlen-Nano-Seconds-WP.pdf
177.42KB
DEF CON 19 presentations/DEF CON 19 - Arlen-Nano-Seconds.pdf
5.4MB
DEF CON 19 presentations/DEF CON 19 - Arpaia-Reed-Beat-to-1337.pdf
99.74KB
DEF CON 19 presentations/DEF CON 19 - Baldwin-DVCS-WP.pdf
102.23KB
DEF CON 19 presentations/DEF CON 19 - Baldwin-DVCS.pdf
2.69MB
DEF CON 19 presentations/DEF CON 19 - Barisani-Bianco-Laurie-Franken.pdf
2.01MB
DEF CON 19 presentations/DEF CON 19 - Barnett-Deceptive-Hacking-WP.pdf
822.13KB
DEF CON 19 presentations/DEF CON 19 - Barnett-Deceptive-Hacking.pdf
717.56KB
DEF CON 19 presentations/DEF CON 19 - Bilodeau-FingerBank.pdf
214.22KB
DEF CON 19 presentations/DEF CON 19 - Bilodeau-PacketFence.pdf
1005.3KB
DEF CON 19 presentations/DEF CON 19 - Bouillon-Federation-and-Empire.pdf
21.44MB
DEF CON 19 presentations/DEF CON 19 - Bowne-Three-Generations-of-DoS-Attacks.pdf
2.38MB
DEF CON 19 presentations/DEF CON 19 - Brooks-Wilson-Traps-of-Gold.pdf
4.89MB
DEF CON 19 presentations/DEF CON 19 - Bryner-Kinectasploit.pdf
1.07MB
DEF CON 19 presentations/DEF CON 19 - Carey-Metasploit-vSploit-Modules.pdf
1.08MB
DEF CON 19 presentations/DEF CON 19 - Chamales-Securing-Crisis-Maps.pdf
24.78MB
DEF CON 19 presentations/DEF CON 19 - Chow-Abusing-HTML5.pdf
124.22KB
DEF CON 19 presentations/DEF CON 19 - Cleary-Art-of-the-Possible.pdf
23.56MB
DEF CON 19 presentations/DEF CON 19 - Conti-Security-Research.pdf
8.53MB
DEF CON 19 presentations/DEF CON 19 - Cook-Kernel-Exploitation.pdf
564.81KB
DEF CON 19 presentations/DEF CON 19 - Craig-Internet-Kiosk-Terminals.pdf
1.56MB
DEF CON 19 presentations/DEF CON 19 - Crenshaw-Cipherspaces-Darknets.pdf
5.12MB
DEF CON 19 presentations/DEF CON 19 - Crowley-Cryptographic-Oracles.pdf
5.49MB
DEF CON 19 presentations/DEF CON 19 - Cryer-Taking-Your-Ball-and-Going-Home.pdf
5.58MB
DEF CON 19 presentations/DEF CON 19 - DC-Groups-Panel.pdf
19.67MB
DEF CON 19 presentations/DEF CON 19 - Devarajan-LeBert-VDLDS.pptx.pdf
298.56KB
DEF CON 19 presentations/DEF CON 19 - Dinaburg-Bit-Squatting.pdf
11.86MB
DEF CON 19 presentations/DEF CON 19 - Duckwall-Bridge-Too-Far.pdf
1.28MB
DEF CON 19 presentations/DEF CON 19 - Elhage-Virtualization-Under-Attack.pdf
422.68KB
DEF CON 19 presentations/DEF CON 19 - Elrod-Morris-Not-a-Doctor.pdf
297.53KB
DEF CON 19 presentations/DEF CON 19 - Engebretson-Pauli-Pen-Testing.pdf
759.48KB
DEF CON 19 presentations/DEF CON 19 - Fail-Panel.pdf
347.34KB
DEF CON 19 presentations/DEF CON 19 - Feinstein-Jarmoc-Get-Off-of-My-Cloud.pdf
1.41MB
DEF CON 19 presentations/DEF CON 19 - Foofus-Forceful-Browsing-WP.pdf
417.46KB
DEF CON 19 presentations/DEF CON 19 - Fritschie-Witmer-F-On-the-River.pdf
2.76MB
DEF CON 19 presentations/DEF CON 19 - Garcia-UPnP-Mapping-WP.pdf
252.99KB
DEF CON 19 presentations/DEF CON 19 - Garcia-UPnP-Mapping.pdf
204.41KB
DEF CON 19 presentations/DEF CON 19 - Gavin-OpenDLP.pdf
61.34KB
DEF CON 19 presentations/DEF CON 19 - Geers-Strategic-Cyber-Security-WP.pdf
6.35MB
DEF CON 19 presentations/DEF CON 19 - Geers-Strategic-Cyber-Security.pdf
8.21MB
DEF CON 19 presentations/DEF CON 19 - Gomez-Bulletproofing-The-Cloud.pdf
17.52MB
DEF CON 19 presentations/DEF CON 19 - Hamiel-Smartfuzzing_the_Web_DC.pdf
744.91KB
DEF CON 19 presentations/DEF CON 19 - Havelt-Henrique.pdf
3.22MB
DEF CON 19 presentations/DEF CON 19 - Heiland-Printer-To-Pwnd.pdf
2.09MB
DEF CON 19 presentations/DEF CON 19 - Holt-Kilger-Assessing-Civilian-Willingness.pdf
248.35KB
DEF CON 19 presentations/DEF CON 19 - Howard-Cyber-Security-Trends-WP.pdf
456.41KB
DEF CON 19 presentations/DEF CON 19 - Howard-Cyber-Security-Trends.pdf
2.69MB
DEF CON 19 presentations/DEF CON 19 - Imhoff-Password-Cracking.pdf
574.54KB
DEF CON 19 presentations/DEF CON 19 - JackDaniel-PCI-2-PANEL.pdf
875.54KB
DEF CON 19 presentations/DEF CON 19 - Jakhar-Jugaad-Linux-Thread-Injection.pdf
168.53KB
DEF CON 19 presentations/DEF CON 19 - Joyce-trollspotting.png
21.06KB
DEF CON 19 presentations/DEF CON 19 - Kennedy-Pentesting-Over-Powerlines-2.pdf
1.17MB
DEF CON 19 presentations/DEF CON 19 - Kennish-Tracking-the-Trackers.pdf
3.83MB
DEF CON 19 presentations/DEF CON 19 - Kornbrust-Hacking-and-Securing-DB2.pdf
664.58KB
DEF CON 19 presentations/DEF CON 19 - Kotler-Amit-Sounds-Like-Botnet.pdf
586.4KB
DEF CON 19 presentations/DEF CON 19 - Krick-License-to-Transmit.pdf
11.74MB
DEF CON 19 presentations/DEF CON 19 - Lai-Wu-Chiu-PK-APT-Secrets-2.pdf
12.48MB
DEF CON 19 presentations/DEF CON 19 - Lenik-MAC(b)Daddy.pdf
753.41KB
DEF CON 19 presentations/DEF CON 19 - Linn-PIG-Finding-Truffles.pdf
3.36MB
DEF CON 19 presentations/DEF CON 19 - Maresca-FIPS-140.pdf
294.2KB
DEF CON 19 presentations/DEF CON 19 - Marpet-Gostom-Smile-for-the-Grenade.pdf
7.68MB
DEF CON 19 presentations/DEF CON 19 - McCoy-Hacking-Net.pdf
3.98MB
DEF CON 19 presentations/DEF CON 19 - McGrew-Covert-WP.pdf
542.33KB
DEF CON 19 presentations/DEF CON 19 - McGrew-Covert.pdf
2.44MB
DEF CON 19 presentations/DEF CON 19 - McNabb-Vulns-Wireless-Water-Meter-Networks.pdf
2.62MB
DEF CON 19 presentations/DEF CON 19 - Miller-Battery-Firmware-Hacking.pdf
43.52MB
DEF CON 19 presentations/DEF CON 19 - O'Neil-Chin-Google-Android.pdf
4.85MB
DEF CON 19 presentations/DEF CON 19 - Ocepek-Blinkie-Lights-Arduino.pdf
11.74MB
DEF CON 19 presentations/DEF CON 19 - Ollam-Gun-Safes.pdf
27.28MB
DEF CON 19 presentations/DEF CON 19 - Osborn-Johansen-Hacking-Google-Chrome-OS.pdf
9.45KB
DEF CON 19 presentations/DEF CON 19 - Percoco-Spiderlabs-Droid.pdf
5.62MB
DEF CON 19 presentations/DEF CON 19 - Percoco-Spiderlabs-Malware-Freakshow-3.pdf
3.81MB
DEF CON 19 presentations/DEF CON 19 - Percoco-Spiderlabs-SSLizzard.pdf
4.45MB
DEF CON 19 presentations/DEF CON 19 - Phillips-Hacking-MMORPGs.pdf
870.61KB
DEF CON 19 presentations/DEF CON 19 - Pickett-Port-Scanning-Without-Packets.pdf
8.22MB
DEF CON 19 presentations/DEF CON 19 - Pickett-Resources.pdf
24.66KB
DEF CON 19 presentations/DEF CON 19 - Pittman-Password-Fail.pdf
2.52MB
DEF CON 19 presentations/DEF CON 19 - Rezchikov-Wang-Engelman-Airport-Security-WP.pdf
344.67KB
DEF CON 19 presentations/DEF CON 19 - Robinson-Time.pdf
1.36MB
DEF CON 19 presentations/DEF CON 19 - Schearer-WTF-Privacy.pdf
4.42MB
DEF CON 19 presentations/DEF CON 19 - Shah-Mobile-Moolah.pdf
1.49MB
DEF CON 19 presentations/DEF CON 19 - Skunkworks-Bitcoin.pdf
131.5KB
DEF CON 19 presentations/DEF CON 19 - Strauchs_Rad_Newman-SCADA-in-Prisons.pptx.pdf
38.1MB
DEF CON 19 presentations/DEF CON 19 - Street-Steal-Everything.pdf
78.45MB
DEF CON 19 presentations/DEF CON 19 - Sumner-Byers-Alien-Weaponizing-Cyberpsychology.pdf
14.04MB
DEF CON 19 presentations/DEF CON 19 - Sutherland-How-to-Get-Your-Message-Out.pdf
1.03MB
DEF CON 19 presentations/DEF CON 19 - Swende-Karlsson-Owasp-Hatkit.pdf
1.45MB
DEF CON 19 presentations/DEF CON 19 - Tassey-Perkins-Wireless-Aerial-Surveillance-Platform.pdf
5MB
DEF CON 19 presentations/DEF CON 19 - Thieme-Staring-into-the-Abyss-WP.pdf
233.95KB
DEF CON 19 presentations/DEF CON 19 - Trimble-Cybertravel.ppt.pdf
1.39MB
DEF CON 19 presentations/DEF CON 19 - Webb-Runtime-Process-Insemination.pdf
799.93KB
DEF CON 19 presentations/DEF CON 19 - Weeks-Network-Nightmare.pdf
7.04MB
DEF CON 19 presentations/DEF CON 19 - Weyers-Key-Impressioning.pdf
125.36MB
DEF CON 19 presentations/DEF CON 19 - Wilhelm-Staying-Connected .pdf
517.09KB
DEF CON 19 presentations/DEF CON 19 - Wilson-Traps-of-Gold.pdf
4.89MB
DEF CON 19 presentations/DEF CON 19 - Woodberg-Network-Application-Firewalls.pdf
1.46MB
DEF CON 19 presentations/DEF CON 19 - Zhu-Phishing-Online-Scams-in-China.pdf
6.88MB
DEF CON 19 presentations/DEF CON 19 - Zoz-Bianchi-Vanquishing-Voyeurs.pdf
4.75MB
DEF CON 19 presentations/Garcia/umap-v0.6.tar.gz
9.21KB
DEF CON 19 presentations/Hamiel/raft-2011-DEF CON 19 - alpha-release.zip
1.02MB
DEF CON 19 presentations/Heiland/Deral_Heiland_praeda.tar
156KB
DEF CON 19 presentations/Krick/Matt Krick - FluX Research Technical Service Bulletin - FXR-08 VHF MASTR-III.pdf
1.6MB
DEF CON 19 presentations/Krick/Matt Krick - FluX Research Technical Service Bulletin - FXR-10 UHF MASTR-III.pdf
1.86MB
DEF CON 19 presentations/Krick/Matt Krick - FluX Research Technical Service Bulletin - FXR-13 Maxtrac 220.pdf
603.34KB
DEF CON 19 presentations/Krick/Matt Krick - FluX Research Technical Service Bulletin - FXR-14 MVS 220.pdf
1.7MB
DEF CON 19 presentations/Krick/Matt Krick - FluX Research Technical Service Bulletin - FXR-16 PCS 220.pdf
1.19MB
DEF CON 19 presentations/Krick/Matt Krick - Tri-Band Ground Plane.pdf
210.35KB
DEF CON 19 presentations/McCoy/GrayDragon/Attack64bitMannagedApp.exe
11KB
DEF CON 19 presentations/McCoy/GrayDragon/GrayDragon.exe
6.92MB
DEF CON 19 presentations/McCoy/GrayDragon/Shim.dll
5.5KB
DEF CON 19 presentations/McCoy/GrayDragon/Spike/DotNetSpike.exe
713KB
DEF CON 19 presentations/McCoy/GrayDragon/Spike/Spikes/Beta/MagicWord.exe
278.5KB
DEF CON 19 presentations/McCoy/GrayDragon/Spike/Spikes/CodeAccess.exe
2.83MB
DEF CON 19 presentations/McCoy/GrayDragon/Spike/Spikes/DataPiggyback.exe
2.81MB
DEF CON 19 presentations/McCoy/GrayDragon/Spike/Spikes/HackButtons-o.exe
3.01MB
DEF CON 19 presentations/McCoy/GrayDragon/Spike/Spikes/LeetConverter.exe
387.5KB
DEF CON 19 presentations/McCoy/GrayDragon/hacks/RedGateOverride/RedGateOverride.exe
330KB
DEF CON 19 presentations/McCoy/GrayDragon/hacks/SQL/SQL_ATTACK.exe
304.5KB
DEF CON 19 presentations/McCoy/GrayDragon/hacks/SQL/SQL_DEFEND.exe
410.5KB
DEF CON 19 presentations/McCoy/GrayDragon/hacks/SQL/SQL_DEFEND.exe.config
2.52KB
DEF CON 19 presentations/McCoy/GrayDragon/slate.exe
557KB
DEF CON 19 presentations/McCoy/GrayDragon/slater32.dll
45KB
DEF CON 19 presentations/McCoy/GrayDragon/slater64.dll
46.5KB
DEF CON 19 presentations/McCoy/GrayWolf/GrayWolf (3.5 framework).exe
774KB
DEF CON 19 presentations/McCoy/GrayWolf/GrayWolf (4.0 framework).exe
2.4MB
DEF CON 19 presentations/McCoy/GrayWolf/GrayWolf - key.txt
1.14KB
DEF CON 19 presentations/McCoy/GrayWolf/GrayWolf PRO.exe
3.15MB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/BlackHat2011.exe
60KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/BruteForcer.exe
545KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/AdvancedScroller.dll
24KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/Dirtw.dll
20KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/Enc.dll
120KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/License_en.rtf
13.92KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/License_it.rtf
10.08KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/Uninstall.exe
162.33KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/XML.dll
16KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/afp-Edit.exe
0B
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/afp.exe
1.44MB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/credits.asr
1.61KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/credits_en.asr
1.58KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/doc/help_eng.chm
128.52KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/doc/help_ita.chm
123.52KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/gzipLib.dll
172KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/lang_sys.dll
20KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/lbIcon.dll
16KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/loc/english.xml
15.31KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/loc/italiano.xml
17.45KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/lvGroup.dll
40KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/news.txt
7.18KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/news_en.txt
6.44KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/protect.ico
14.73KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/tools/ShExt.dll
48KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/tools/ShExtUnreg.exe
20KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/tools/ckr.exe
177.5KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/tools/del.exe
24KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - FileProtector/tools/extr.exe
572KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - ProtectME2010/Microsoft.WindowsAPICodePack.Shell.dll
515KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - ProtectME2010/Microsoft.WindowsAPICodePack.dll
88KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - ProtectME2010/Protect Me! 2010 - Readme.txt
4.64KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - ProtectME2010/Protect Me! 2010 v1.0.1.1.zip
274.95KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Installed - ProtectME2010/Protect Me! 2010.exe
172.5KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/ReadME.txt
462B
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/BruteForcer.csproj
2.68KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/BruteForcer.sln
911B
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/CrackInterFace.cs
344B
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/Crack_FileProtector.cs
5.22KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/Crack_ProtectME2010.cs
9.42KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/Icon.ico
263.72KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/PassCracker.cs
9.31KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/PassCracker.designer.cs
6.52KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/PassCracker.resx
401.55KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/Source/BruteForcer/Program.cs
498B
DEF CON 19 presentations/McCoy/Hacks/BruteForce/afp_sdx-123.exe
786.71KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/afp_sdx-1234.exe
786.72KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/afp_sdx-123456.exe
782.69KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/afp_sdx-DES64-1234567.exe
777.02KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/FileProtector-Hack.exe
13KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/ProtectME-Cracker.exe
12KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source - FileProtector/FileProtector-Hack.sln
944B
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source - FileProtector/FileProtector_Hack/FileProtector-Hack.csproj
2.43KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source - FileProtector/FileProtector_Hack/PassCracker.cs
12.2KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source - FileProtector/FileProtector_Hack/PassCracker.designer.cs
6.3KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source - FileProtector/FileProtector_Hack/PassCracker.resx
5.68KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source - FileProtector/FileProtector_Hack/Program.cs
498B
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source-ProtectME2010/ProtectME-Cracker/Crack_ProtectME2010.cs
6.88KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source-ProtectME2010/ProtectME-Cracker/PassCracker.Designer.cs
6.3KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source-ProtectME2010/ProtectME-Cracker/PassCracker.cs
8.28KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source-ProtectME2010/ProtectME-Cracker/PassCracker.resx
5.68KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source-ProtectME2010/ProtectME-Cracker/Program.cs
487B
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source-ProtectME2010/ProtectME-Cracker/ProtectME-Cracker.csproj
2.55KB
DEF CON 19 presentations/McCoy/Hacks/BruteForce/old VER/Source-ProtectME2010/ProtectME-Cracker/ProtectME-Cracker.sln
923B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/HACK.txt
315B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/MMCEx-Run isAdmin.dll
402.5KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/MMCEx-o.dll
412KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/RND/MMCEx-hackNote.dll
402.5KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/RND/MMCEx-hacked.dll
402.5KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/RND/System.Windows.Forms-Edit.dll
4.8MB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/RND/System.Windows.Forms-o.dll
4.79MB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/RND/isAdmin-o unsigned.dll
6KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/RND/isAdmin-temp.dll
6.5KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/ReadME.txt
71B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin.dll
7KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Form1.Designer.cs
1.98KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Form1.cs
494B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Form1.resx
5.68KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Program.cs
496B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Properties/AssemblyInfo.cs
1.4KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Properties/Resources.Designer.cs
2.77KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Properties/Resources.resx
5.48KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Properties/Settings.Designer.cs
1.06KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Properties/Settings.settings
249B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/Test/Test.csproj
3.84KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin.sln
1.34KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin/Program.cs
3.53KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin/app.config
120B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin/checkForAdmin.Designer.cs
3.56KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin/checkForAdmin.cs
575B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin/checkForAdmin.resx
5.68KB
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin/hacked.snk
596B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin/isAdmin.cs
751B
DEF CON 19 presentations/McCoy/Hacks/MMCEx - R&D/isAdmin/isAdmin/isAdmin.csproj
3KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Hacked Dll's/MediaCenter - HACK.txt
1.64KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Hacked Dll's/ehshell-original.dll
6.02MB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Hacked Dll's/ehshell-passhack-Showpass.dll
6.03MB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Hacked Dll's/ehshell-showPassword.dll
6.03MB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/MediaCenter-installer.exe
18.09MB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/ReadME.txt
225B
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword.sln
956B
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/Program.cs
524B
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/Properties/AssemblyInfo.cs
1.44KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/Properties/Resources.Designer.cs
2.81KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/Properties/Resources.resx
5.48KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/Properties/Settings.Designer.cs
1.08KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/Properties/Settings.settings
249B
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/Sword-Shield-KI.ico
3.55KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/ehshell-changePassword.csproj
4.13KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/ehshell.dll
6.02MB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/frm_ehshell-changePassword.Designer.cs
5.8KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/frm_ehshell-changePassword.cs
2.06KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-changePassword/ehshell-changePassword/frm_ehshell-changePassword.resx
11.3KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer.sln
941B
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/Program.cs
505B
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/UnPackFolder/ehshell-hack-showpass.dll
6.03MB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/UnPackFolder/ehshell-original.dll
6.02MB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/UnPackFolder/ehshell-showPass.dll
6.03MB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/app.config
120B
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/app.manifest
1.14KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/ehshell-installer.csproj
3.14KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/ehshell_installer.cs
11.93KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/frm_ehshell_installer.Designer.cs
6.84KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/frm_ehshell_installer.cs
4.61KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/Source/ehshell-install - Encrypted/ehshell-installer/frm_ehshell_installer.resx
5.68KB
DEF CON 19 presentations/McCoy/Hacks/MediaCenter - crack/ehshell-changePassword.exe
18KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/ByteConverter.exe
310.5KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/Packer.exe
79.5KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/Packer.txt
108.61KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/ReadME.txt
225B
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/RunFooBAR.txt
12.44KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/RunFooBar.exe
8.5KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/SuckItHak5.exe
5KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/SuckItHak5.txt
7.79KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/fooBAR/ReadME.txt
47B
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/fooBAR/RunFooBar/Program.cs
624B
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/fooBAR/RunFooBar/RunFooBar.csproj
2.18KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/fooBAR/RunFooBar/fooBAR.exe
4.5KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/fooBAR/fooBAR.sln
1.36KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/fooBAR/fooBAR/FooBAR.cs
1.29KB
DEF CON 19 presentations/McCoy/Hacks/Power Shell - txt Code/fooBAR/fooBAR/fooBAR.csproj
3.99KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Dll's/Matrix-Extreme.dll
8.51KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Dll's/Matrix-Hard.dll
8.5KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Dll's/Matrix-Slow.dll
8.5KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Dll's/Microsoft.PowerShell.ConsoleHost-Matrix.dll
189KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/HACK.txt
772B
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix - Source/Matrix.cs
7.98KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix - Source/Matrix.csproj
4.09KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix - Source/Matrix.sln
901B
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix - Source/key.snk
596B
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix - Source/shim.cs
4.73KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer.sln
938B
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/Matrix-installer.csproj
3.33KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/Program.cs
503B
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/UnPackFolder/Matrix-Extreme.dll
8.51KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/UnPackFolder/Matrix-Fast.dll
8.51KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/UnPackFolder/Matrix-Slow.dll
8.51KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/UnPackFolder/Microsoft.PowerShell.ConsoleHost-Matrix.dll
189.01KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/UnPackFolder/Microsoft.PowerShell.ConsoleHost-o.dll
196.01KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/app.manifest
1.14KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/frm_matrix_installer.Designer.cs
9.43KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/frm_matrix_installer.cs
7.05KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/frm_matrix_installer.resx
5.68KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-install - Source/Matrix-installer/matrix_installer.cs
9.6KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/Matrix-installer.exe
428.5KB
DEF CON 19 presentations/McCoy/Hacks/PowerShell - Matrix Attack/ReadME.txt
103B
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/BestAppEver.exe
68.5KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/BestKeyGenEver.exe
53.5KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/ReadME.txt
114B
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver.sln
1.39KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/BestAppEver.csproj
2.96KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/Icon.ico
20.11KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/Program.cs
498B
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/Properties/Resources.Designer.cs
3.04KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/Properties/Resources.resx
6.06KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/TeskKey.cs
8.11KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/frm_RegBestAppEver.Designer.cs
6.65KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/frm_RegBestAppEver.cs
927B
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/frm_RegBestAppEver.resx
36.31KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestAppEver/lock-fake-alt.png
11KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestKeyGenEver/BestKeyGenEver.csproj
2.61KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestKeyGenEver/Icon.ico
20.11KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestKeyGenEver/Program.cs
491B
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestKeyGenEver/TeskKey.cs
8.11KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestKeyGenEver/TheCrack.cs
9.27KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestKeyGenEver/frm_KeyGen.Designer.cs
5.21KB
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestKeyGenEver/frm_KeyGen.cs
782B
DEF CON 19 presentations/McCoy/Hacks/The B.e.s.t. KeyGen - DEMO/Source/BestKeyGenEver/frm_KeyGen.resx
36.31KB
DEF CON 19 presentations/McCoy/License.txt
1.16KB
DEF CON 19 presentations/McCoy/Papers/ASM in .NET-The old is new again.pdf
129.89KB
DEF CON 19 presentations/McCoy/Papers/Attacking .Net at Runtime.pdf
132.7KB
DEF CON 19 presentations/McCoy/Papers/Reflections Hidden Power.pdf
282.11KB
DEF CON 19 presentations/McCoy/Tools/ByteConverter.exe
310.5KB
DEF CON 19 presentations/McCoy/Tools/GAC_ME.exe
729KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - DLL Hacked/SNSample.exe
28KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - DLL Hacked/SNSample.exe.config
881B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - DLL Hacked/SNSample.exe.manifest
5.44KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - DLL Hacked/SaveData.dll
4KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - EXE Hacked/SNSample.exe
19KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - EXE Hacked/SNSample.exe.config
881B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - EXE Hacked/SNSample.exe.manifest
5.44KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - EXE Hacked/SaveData.dll
4KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - EXE&DLL Hacked/SNSample.exe
19KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - EXE&DLL Hacked/SNSample.exe.config
881B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - EXE&DLL Hacked/SNSample.exe.manifest
5.44KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample - EXE&DLL Hacked/SaveData.dll
4KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample.exe
28KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample.exe.config
641B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SNSample.exe.manifest
5.44KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check OFF/SaveData.dll
3.5KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - DLL Hacked/SNSample.exe
28KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - DLL Hacked/SNSample.exe.config
882B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - DLL Hacked/SNSample.exe.manifest
5.44KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - DLL Hacked/SaveData.dll
4KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - EXE&Config Hacked/SNSample.exe
19KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - EXE&Config Hacked/SNSample.exe.config
882B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - EXE&Config Hacked/SNSample.exe.manifest
5.44KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - EXE&Config Hacked/SaveData.dll
4KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - EXE&DLL&Config Hacked/SNSample.exe
19KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - EXE&DLL&Config Hacked/SNSample.exe.config
882B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - EXE&DLL&Config Hacked/SNSample.exe.manifest
5.44KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample - EXE&DLL&Config Hacked/SaveData.dll
4KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SNSample.exe
28KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Config Check ON/SaveData.dll
3.5KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/ReadME.txt
275B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Reg Keys/REG BypassCheckKeys/HLM-S-M-.NET.reg
276B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Reg Keys/REG BypassCheckKeys/Wow643Node.reg
296B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Reg Keys/REG CheckKeys/HLM-S-M-.NET.reg
276B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Reg Keys/REG CheckKeys/Wow643Node.reg
296B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/App.ico
1.05KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/AssemblyInfo.cs
2.35KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/Check4Hack.cs
9.73KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/Check4Hack.resx
7.55KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/NativeMethods.cs
1.62KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/Properties/app.manifest
1.77KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/SNSample.csproj
7.7KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/SNSample.sln
2.35KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/SNSample_TemporaryKey.pfx
1.64KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/SaveData/Core.cs
322B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/SaveData/SaveData.csproj
3.08KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/SaveData/SaveData.sln
1.58KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/SaveData/SaveDataKey.snk
596B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/SecurityTest.cs
11.6KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/app.config
641B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check OFF/key(123456).pfx
1.72KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/App.ico
1.05KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/AssemblyInfo.cs
2.35KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/Check4Hack.cs
9.73KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/Check4Hack.resx
7.55KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/NativeMethods.cs
1.62KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/Properties/app.manifest
1.77KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/SNSample.csproj
7.7KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/SNSample.sln
2.35KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/SNSample_TemporaryKey.pfx
1.64KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/SaveData/Core.cs
322B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/SaveData/SaveData.csproj
3.08KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/SaveData/SaveData.sln
1.58KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/SaveData/SaveDataKey.snk
596B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/SecurityTest.cs
11.6KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/app.config
642B
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/Source/SNSample - Force Check ON/key(123456).pfx
1.72KB
DEF CON 19 presentations/McCoy/Tools/Test Sign Application/disable the strong-name bypass.txt
2.98KB
DEF CON 19 presentations/McCoy/Tools/folderAssemblyAccess.exe
538.5KB
DEF CON 19 presentations/McCoy/Tools/web tools/PEiD.exe
214KB
DEF CON 19 presentations/McCoy/Tools/web tools/ReadME.txt
124B
DEF CON 19 presentations/McCoy/Tools/web tools/Win7ElevateV2_Source.zip
122.38KB
DEF CON 19 presentations/McGrew/enum_drives.rb
2.67KB
DEF CON 19 presentations/McGrew/imager.rb
4.07KB
DEF CON 19 presentations/McGrew/nbd_server.rb
3.21KB
DEF CON 19 presentations/Ocepek/LICENSE.txt
34.32KB
DEF CON 19 presentations/Ocepek/README.txt
2.89KB
DEF CON 19 presentations/Ocepek/cb.pl
8.35KB
DEF CON 19 presentations/Ocepek/cerealbox.pde
11.32KB
DEF CON 19 presentations/Ocepek/meter.pde
5.71KB
DEF CON 19 presentations/Percoco-Spiderlabs/DEF CON 19 - Percoco-Creepy-Charles.m4v
4.19MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 presentations/Percoco-Spiderlabs/DEF CON 19 - Percoco-Droid-BanthaPudu-1.0.apk
284.15KB
DEF CON 19 presentations/Percoco-Spiderlabs/SSLizzard/ettercap.patch
4.25KB
DEF CON 19 presentations/Percoco-Spiderlabs/SSLizzard/sslizzard.rb
2.94KB
DEF CON 19 presentations/Phillips/2008_07_14_SummaryJudgment.pdf
94.41KB
DEF CON 19 presentations/Phillips/2008_11_03_MotionToInterveneWTF.pdf
63.82KB
DEF CON 19 presentations/Phillips/2009_01_28_PostTrialDMCAFindings.pdf
80.64KB
DEF CON 19 presentations/Phillips/2009_03_10_PermanentInjunction.pdf
46.55KB
DEF CON 19 presentations/Phillips/2010_12_14_AppealsCourtRuling.pdf
908.58KB
DEF CON 19 presentations/Phillips/Icy Tower 2012.mp4
20.71MB
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
DEF CON 19 presentations/Phillips/KyndroxTele.avi
4.48MB
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
DEF CON 19 presentations/Phillips/WoWInstaBot.avi
15.22MB
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
DEF CON 19 presentations/Phillips/WoWSpeedHack.avi
5.04MB
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
DEF CON 19 presentations/Phillips/WoW_TeleSquare.avi
6.4MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 presentations/Phillips/jumping_hack.mp4
7.87MB
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
DEF CON 19 presentations/Phillips/racebet_hack.mp4
3.17MB
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
DEF CON 19 presentations/Phillips/typing_hack.mp4
6.53MB
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
DEF CON 19 program.pdf
18.94MB
DEF CON 19 receipt.gif
9.13KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Entry - ALL Short Story Contest entries 2011.txt
156.35KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Entry - And He Fulfilled the Role for which He was Designed.txt
5.75KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Entry - Articulated.txt
32.67KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Entry - Coin Flip.txt
21.96KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Entry - Hot American Justice.txt
4.99KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Entry - Insecure Box.txt
11.82KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Entry - Joel.txt
19.31KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Entry - Pink Dragon II.txt
3.48KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Winners - ALL CAPS.txt
7.66KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Winners - Egalitarian Deceit.txt
24.82KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Winners - The How to Steal the World Affair.txt
22.55KB
DEF CON 19 short story contest/DEF CON 19 Hacking Conference - Short Story Winners - Very Clever Mister Blond.txt
3.09KB
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks - Slides.mp4
25.51MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Adam Baldwin - Pillaging DVCS Repos For Fun And Profit - Slides.mp4
12.18MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies - Slides.mp4
37.93MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Alexander Kornbrust - Hacking and Securing DB2 LUW Databases - Slides.mp4
24.26MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Alva Skip Duckwall - A Bridge Too Far Defeating Wired 8021x with a Transparent Bridge Using Linux - Slides.mp4
61.66MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Andrew Wilson and Michael Brooks - Traps of Gold - Slides.mp4
26.07MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation - Slides.mp4
29.58MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Aseem Jakhar - Jugaad Linux Thread Injection Kit - Slides.mp4
20.77MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken - Slides.mp4
52.12MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Ben Feinstein and Jeff Jarmoc - Get Off of My Cloud Cloud Credential Compromise and Exposure - Slides.mp4
36.95MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Brad Woodberg - Network Application Firewalls Exploits and Defense - Slides.mp4
27.74MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Brian Kennish - Tracking the Trackers How Our Browsing History Is Leaking into the Cloud - Slides.mp4
10.21MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Bruce Sutherland - How To Get Your Message Out When Your Government Turns Off The Internet - Slides.mp4
30.3MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Carey Rude and Vandevanter - Metasploit vSploit Modules - Slides.mp4
30.66MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Charlie Miller - Battery Firmware Hacking - Slides.mp4
44.84MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too - Slides.mp4
31.63MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Dust Your Feed RSS Belongs To You! Avoid Censorship! - Slides.mp4
24.71MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Christopher Cleary - Operational Use of Offensive Cyber - Slides.mp4
30.34MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Dan Kaminsky - Black Ops of TCPIP 2011 - Slides.mp4
36.5MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011 - Slides.mp4
32.03MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Daniel Crowley - Speaking with Cryptographic Oracles - Slides.mp4
32.35MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Daniel Garcia - UPnP Mapping - Slides.mp4
18.36MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Dave Kennedy - Hacking Your Victims Over Power Lines - Slides.mp4
22.41MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - David Bryan and Luiz Eduardo - Building The DEF CON Network Making A Sandbox For 10000 Hackers - Slides.mp4
30.98MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - David Litchfield - Hacking and Forensicating an Oracle Database Server - Slides.mp4
36.74MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Deral Heiland - From Printer To Pwnd Leveraging Multifunction Printers During Penetration Testing - Slides.mp4
28.5MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Deviant Ollam - Safe to Armed in Seconds A Study of Epic Fails of Popular Gun Safes - Slides.mp4
37.54MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Emmanuel Bouillon - Federation and Empire - Slides.mp4
29.02MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic - Slides.mp4
30.08MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Eston Abraham and Johnson - Dont Drop the SOAP Real World Web Service Testing for Web Hackers - Slides.mp4
33.41MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing - Slides.mp4
14.64MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us - Slides.mp4
25.86MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - George Chamales - Lives On The Line Securing Crisis Maps In Libya Sudan And Pakistan - Slides.mp4
31.62MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Grayson Lenik - Im Your MACbDaddy - Slides.mp4
36.44MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Greg Conti - The Art and Science of Security Research - Slides.mp4
30.45MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Gregory Pickett - Port Scanning Without Sending Packets - Slides.mp4
27.88MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Gus Fritschie and Mike Wright - Getting F On the River - Slides.mp4
31.86MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Hackajar - Economics of Password Cracking in the GPU Era - Slides.mp4
32.52MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Hubris and a5h3r4h - Anonymous Cyber War - Slides.mp4
39.32MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet - Slides.mp4
31.21MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - James Myrcurial Arlen - Security When Nano Seconds Count - Slides.mp4
31.38MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Jamie Butler - Physical Memory Forensics for Cache - Slides.mp4
29.99MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP - Slides.mp4
33.81MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Jason Scott - Archive Team A Distributed Preservation of Service Attack - Slides.mp4
29.01MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin - Slides.mp4
28.11MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Jeff Bryner - Kinectasploit Metasploit Meets Kinect - Slides.mp4
11.18MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware - Slides.mp4
27.15MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security - Slides.mp4
32.62MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Joey Zhu - Phishing and Online Scam in China - Slides.mp4
12.6MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - John McNabb - Vulnerabilities of Wireless Water Meter Networks - Slides.mp4
37.23MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Jon McCoy - Hacking Net Applications The Black Arts - Slides.mp4
37.25MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Jos Weyers - Key Impressioning - Slides.mp4
28.23MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit - Slides.mp4
33.2MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Justin Searle - Attacking and Defending the Smart Grid - Slides.mp4
36.15MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Katy Levinson - Dont Fix It In Software - Slides.mp4
26.15MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Kees Cook - Kernel Exploitation Via Uninitialized Stack - Slides.mp4
10.02MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Kyle Osborn and Matt Johanson - Hacking Google Chrome OS - Slides.mp4
31.45MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia - Slides.mp4
71.93MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Lawson Potter and Deviant Ollam - And Thats How I Lost My Eye Exploring Emergency Data Destruction - Slides.mp4
35.39MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Mahmud Ab Rahman - Sneaky PDF - Slides.mp4
30.76MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Marketa Trimble - The Future of Cybertravel Legal Implications of the Evasion of Geolocation - Slides.mp4
28.64MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Martin Holst Swende and Patrik Karlsson - Web Application Analysis With Owasp Hatkit - Slides.mp4
30.14MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Matt Joyce - The Art of Trolling - Slides.mp4
34.07MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Matt Krick - DCFluX in License to Transmit - Slides.mp4
34.4MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Michael Robinson - What Time Are You Anyway - Slides.mp4
11.57MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Michael Scarito - Build your own Synthetic Aperture Radar - Slides.mp4
34.37MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Michael theprez98 Schearer - WTF Happened to the Constitution The Right to Privacy in the Digital Age - Slides.mp4
33.26MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Mike Arpaia and Ted Reed - Beat to 1337 Creating A Successful University Cyber Defense Organization - Slides.mp4
14.55MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform - Slides.mp4
32.32MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Mikko Hypponen - The History and the Evolution of Computer Viruses - Slides.mp4
33.38MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Ming Chow - Abusing HTML5 - Slides.mp4
30.61MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Mouse and Renderman - Familiarity Breeds Contempt - Slides.mp4
28.85MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Moxie Marlinspike - SSL And The Future Of Authenticity - Slides.mp4
27.22MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Nelson Elhage - Virtualization Under Attack Breaking out of KVM - Slides.mp4
30.58MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Jibran Ilyas - Malware Freak Show 3 Theyre pwning erbody out there - Slides.mp4
31.93MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Paul Kehrer - Getting SSLizzard - Slides.mp4
24.95MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Sean Schulte - This is REALLY not the droid youre looking for - Slides.mp4
22.15MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Nicole Ozer - Big Brother on the Big Screen - Slides.mp4
50.57MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database - Slides.mp4
11.41MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - PacketFence The Open Source Nac What Weve Done In The Last Two Years - Slides.mp4
33.53MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Ask EFF The Year in Digital Civil Liberties - Slides.mp4
123.27MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale - Slides.mp4
249.36MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Former Keynotes The Future - Slides.mp4
111.95MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Is it 0-day or 0-care - Slides.mp4
133.64MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Meet The Federal Agent 2.0 - Slides.mp4
112.88MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Net Neutrality Panel - Slides.mp4
89.29MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Network Security Podcast - Slides.mp4
90.97MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - PCI 2 Still Compromising Controls and Compromising Security - Slides.mp4
204.28MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Represent Defcon Groups Hackerspaces and You - Slides.mp4
112.59MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - SCADA and PLCs in Correctional Facilities The Nightmare Before Christmas - Slides.mp4
39.34MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Smartfuzzing the Web Carpe Vestra Foramina - Slides.mp4
30.65MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves - Slides.mp4
108.38MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Patrick Engebretson and Josh Pauli - Mamma Dont Let Your Babies Grow Up to be Pen Testers - Slides.mp4
21.87MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Paul Craig - Internet Kiosk Terminals The Redux - Slides.mp4
37.46MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security - Slides.mp4
21.89MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Reeves Smith - How Haunters Void Warranties - Slides.mp4
10.68MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST - Slides.mp4
34.19MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Rick Howard - An Insiders Look at International Cyber Security Threats and Trends - Slides.mp4
23.68MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Ryan Linn - PIG Finding Truffles Without Leaving A Trace - Slides.mp4
33.4MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Sam Bowne - Three Generations of DoS Attacks - Slides.mp4
34.76MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Schuyler Towne - DIY Non-Destructive Entry - Slides.mp4
27.64MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Shawn Webb - Runtime Process Insemination - Slides.mp4
27.69MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Shrdlu - Are You In Yet The CISOs View of Pentesting - Slides.mp4
45.77MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Skunkworks - Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin - Slides.mp4
14.69MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE - Slides.mp4
30.41MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Steve Ocepek - Blinkie Lights Network Monitoring with Arduino - Slides.mp4
37.93MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Steven Levy - We Owe it All to the Hackers - Slides.mp4
120.78MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and LosTboY - Welcome - Making of the badge - Slides.mp4
29.85MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and Russ Rogers - DEF CON Awards - Slides.mp4
26.19MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Thomas Wilhelm - Staying Connected during a Revolution or Disaster - Slides.mp4
32.5MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network - Slides.mp4
23.96MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Tyler Cohen - Look At What My Car Can Do - Slides.mp4
36.9MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang - Slides.mp4
24.1MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit - Slides.mp4
30.28MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Whitfield Diffie and Moxie Marlinspike - Slides.mp4
138.49MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - William Manning - Pervasive Cloaking - Slides.mp4
18.94MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Yekaterina Tsipenyuk ONeil and Erika Chin - Seven Ways to Hang Yourself with Google Android - Slides.mp4
30.19MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - Zoz and Andrea Bianchi - Vanquishing Voyeurs Secure Ways To Authenticate Insecurely - Slides.mp4
36.9MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - datagram - Introduction to Tamper Evident Devices - Slides.mp4
34.76MB
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
DEF CON 19 slides/DEF CON 19 Hacking Conference Presentation By - eskimo - Steganography and Cryptography 101 - Slides.mp4
13.15MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation - Closing Ceremonies.mp4
222.08MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks - Video and Slides.mp4
66.49MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Adam Baldwin - Pillaging DVCS Repos For Fun And Profit - Video and Slides.mp4
29.27MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies - Video and Slides.mp4
73.9MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Alexander Kornbrust - Hacking and Securing DB2 LUW Databases - Video and Slides.mp4
41.86MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Andrew Wilson and Michael Brooks - Traps of Gold - Video and Slides.mp4
46.14MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation - Video and Slides.mp4
68.69MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Aseem Jakhar - Jugaad Linux Thread Injection Kit - Video and Slides.mp4
34.45MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken - Video and Slides.mp4
109.84MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Brad Woodberg - Network Application Firewalls Exploits and Defense - Video and Slides.mp4
70.49MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Carey Rude and Vandevanter - Metasploit vSploit Modules - Video and Slides.mp4
56.6MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Charlie Miller - Battery Firmware Hacking - Video and Slides.mp4
79.9MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too - Video and Slides.mp4
83.46MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Christopher Cleary - Operational Use of Offensive Cyber - Video and Slides.mp4
63.89MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Dan Kaminsky - Black Ops of TCPIP 2011 - Video and Slides.mp4
89.18MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011 - Video and Slides.mp4
50.41MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Daniel Crowley - Speaking with Cryptographic Oracles - Video and Slides.mp4
60.99MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Daniel Garcia - UPnP Mapping - Video and Slides.mp4
34.75MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Dave Kennedy - Hacking Your Victims Over Power Lines - Video and Slides.mp4
42.26MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - David Litchfield - Hacking and Forensicating an Oracle Database Server - Video and Slides.mp4
69.02MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Emmanuel Bouillon - Federation and Empire - Video and Slides.mp4
60.82MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic - Video and Slides.mp4
52.16MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing - Video and Slides.mp4
32.35MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us - Video and Slides.mp4
58.6MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Grayson Lenik - Im Your MACbDaddy - Video and Slides.mp4
80.85MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Greg Conti - The Art and Science of Security Research - Video and Slides.mp4
52.91MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Gregory Pickett - Port Scanning Without Sending Packets - Video and Slides.mp4
54.83MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Gus Fritschie and Mike Wright - Getting F On the River - Video and Slides.mp4
75.63MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Hackajar - Economics of Password Cracking in the GPU Era - Video and Slides.mp4
79.08MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet - Video and Slides.mp4
62.02MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - James Myrcurial Arlen - Security When Nano Seconds Count - Video and Slides.mp4
75.03MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Jamie Butler - Physical Memory Forensics for Cache - Video and Slides.mp4
58.55MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP - Video and Slides.mp4
69.85MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Jason Scott - Archive Team A Distributed Preservation of Service Attack - Video and Slides.mp4
64.22MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin - Video and Slides.mp4
53.94MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Jeff Bryner - Kinectasploit Metasploit Meets Kinect - Video and Slides.mp4
19.08MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware - Video and Slides.mp4
52.71MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security - Video and Slides.mp4
55.92MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Joey Zhu - Phishing and Online Scam in China - Video and Slides.mp4
22.83MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - John McNabb - Vulnerabilities of Wireless Water Meter Networks - Video and Slides.mp4
63.18MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Jon McCoy - Hacking Net Applications The Black Arts - Video and Slides.mp4
66.82MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Jos Weyers - Key Impressioning - Video and Slides.mp4
58.38MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit - Video and Slides.mp4
55.17MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Justin Searle - Attacking and Defending the Smart Grid - Video and Slides.mp4
84.59MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Katy Levinson - Dont Fix It In Software - Video and Slides.mp4
29.23MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Kees Cook - Kernel Exploitation Via Uninitialized Stack - Video and Slides.mp4
17.38MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Kyle Osborn and Matt Johanson - Hacking Google Chrome OS - Video and Slides.mp4
58.69MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia - Video and Slides.mp4
118.36MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Mahmud Ab Rahman - Sneaky PDF - Video and Slides.mp4
47.56MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Matt Joyce - The Art of Trolling - Video and Slides.mp4
61.98MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Matt Krick - DCFluX in License to Transmit - Video and Slides.mp4
63.31MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Michael Robinson - What Time Are You Anyway - Video and Slides.mp4
27.58MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Michael Scarito - Build your own Synthetic Aperture Radar - Video and Slides.mp4
83.92MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform - Video and Slides.mp4
56.26MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Mikko Hypponen - The History and the Evolution of Computer Viruses - Video and Slides.mp4
72.01MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Ming Chow - Abusing HTML5 - Video and Slides.mp4
59.58MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Mouse and Renderman - Familiarity Breeds Contempt - Video and Slides.mp4
56.15MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Moxie Marlinspike - SSL And The Future Of Authenticity - Video and Slides.mp4
88.09MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Nelson Elhage - Virtualization Under Attack Breaking out of KVM - Video and Slides.mp4
65.86MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Paul Kehrer - Getting SSLizzard - Video and Slides.mp4
39.56MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Nicole Ozer - Big Brother on the Big Screen - Video and Slides.mp4
66.02MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database - Video and Slides.mp4
23.47MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Ask EFF The Year in Digital Civil Liberties - Video and Slides.mp4
124.16MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale - Video and Slides.mp4
298.97MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Former Keynotes The Future - Video and Slides.mp4
113.45MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Is it 0-day or 0-care - Video and Slides.mp4
142MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Meet The Federal Agent 2.0 - Video and Slides.mp4
114.26MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Net Neutrality Panel - Video and Slides.mp4
95.89MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Network Security Podcast - Video and Slides.mp4
90.97MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - PCI 2 Still Compromising Controls and Compromising Security - Video and Slides.mp4
256.49MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Represent Defcon Groups Hackerspaces and You - Video and Slides.mp4
119.17MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - SCADA and PLCs in Correctional Facilities The Nightmare Before Christmas - Video and Slides.mp4
80.1MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Smartfuzzing the Web Carpe Vestra Foramina - Video and Slides.mp4
63.02MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves - Video and Slides.mp4
133.61MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Paul Craig - Internet Kiosk Terminals The Redux - Video and Slides.mp4
69.57MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security - Video and Slides.mp4
64.66MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Reeves Smith - How Haunters Void Warranties - Video and Slides.mp4
20.19MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST - Video and Slides.mp4
63.06MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Rick Howard - An Insiders Look at International Cyber Security Threats and Trends - Video and Slides.mp4
43.92MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Ryan Linn - PIG Finding Truffles Without Leaving A Trace - Video and Slides.mp4
64.2MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Sam Bowne - Three Generations of DoS Attacks - Video and Slides.mp4
62.95MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Schuyler Towne - DIY Non-Destructive Entry - Video and Slides.mp4
69.2MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Shawn Webb - Runtime Process Insemination - Video and Slides.mp4
71.34MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Shrdlu - Are You In Yet The CISOs View of Pentesting - Video and Slides.mp4
42.7MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE - Video and Slides.mp4
54.97MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Steve Ocepek - Blinkie Lights Network Monitoring with Arduino - Video and Slides.mp4
77.44MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Steven Levy - We Owe it All to the Hackers - Video and Slides.mp4
120.78MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and LosTboY - Welcome - Making of the badge - Video and Slides.mp4
64.38MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and Russ Rogers - DEF CON Awards - Video and Slides.mp4
47.63MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Thomas Wilhelm - Staying Connected during a Revolution or Disaster - Video and Slides.mp4
55.82MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network - Video and Slides.mp4
49.54MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Tyler Cohen - Look At What My Car Can Do - Video and Slides.mp4
73.33MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang - Video and Slides.mp4
44.23MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit - Video and Slides.mp4
65.68MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - Whitfield Diffie and Moxie Marlinspike - Video and Slides.mp4
125.75MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - William Manning - Pervasive Cloaking - Video and Slides.mp4
37.99MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - datagram - Introduction to Tamper Evident Devices - Video and Slides.mp4
69.54MB
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
DEF CON 19 video and slides/DEF CON 19 Hacking Conference Presentation By - eskimo - Steganography and Cryptography 101 - Video and Slides.mp4
26.61MB
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