DEF CON 26 workshops/DEFCON-26-Workshop-Adam-Steed-and-James-Albany-Attacking-Active-Directory-and-Advanced-Methods-of-Defense-2018.pdf |
6.8 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Alexandrine-Torrents-and-Arnaud-Soullie-Pentesting-ICS-101.pdf |
5.5 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Anto-Joseph-and-Clarance-Chio-Hacking-Thingz-Powered-By-Machine-Learning.pdf |
3.6 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Arun-Magesh-Buzzing-Smart-Devices.pdf |
1 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Bryce-Kunz-and-Kevin-Lustic-Fuzzing-FTW.pdf |
2.6 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Dave-Porcello-and-Sean-Gallagher-Packet-Mining-for-Privacy-Leakage.pdf |
1.8 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-David-Pearson-The-Truth-is-in-the-Network_-Reverse-Engineering-Application-Layer-Protocols-Via-PCAP.pdf |
300.4 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-David-Turco-and-Jon-Overgaard-Christiansen-Wheres-My-Browser-Learn-Hacking-iOS-and-Android-WebViews.pdf |
5.6 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Eijah-Decentralized-Hacker-Net.pdf |
1.8 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Jakub-Botwicz-and-Wojciech-Rauner-Fuzzing-with-AFL-(American-Fuzzy-Lop).pdf |
5 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Joe-Grand-Build-Your-Own-Opticspy.pdf |
14.1 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Joe-Grand-Hardware-Hacking-Basics.pdf |
4.2 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Joshua-Pereyda-and-Timothy-Clemans-Advanced-Custom-Network-Protocol-Fuzzing.pdf |
341 KB |
DEF CON 26 workshops/DEFCON-26-Workshop-Louis-Nyfenegger-and-Luke-Jahnke-Finding-Needles-in-Haystacks.pdf |
5.1 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Louis-Nyfenegger-and-Luke-Jahnke-JWAT-Attacking-JSON-WEB-TOKENS.pdf |
6.3 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Matt-Cheung-Introduction-to-Cryptographic-Attacks.pdf |
1.6 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Mike-Guirao-Securing-Big-Data-in-Hadoop.pdf |
13.4 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Nick-Tait-Reverse-Engineering-with-OpenSCAD-and-3D-Printing.pdf |
51.2 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Sneha-Rajguru-ARM-eXploitation-101.pdf |
1.6 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID-Theory.pdf |
1.5 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID/DEFCON-26-Workshop-Vinnie-Vanhoecke-and-Lorenzo-Bernardi-Playing-With-RFID.pdf |
3.1 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Walter-Cuestas-and-Mauricio-Velazco-Lateral-Movement-101-2018-Update.pdf |
4.4 MB |
DEF CON 26 workshops/DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments/DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Student-Preparation.pdf |
530 KB |
DEF CON 26 workshops/DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments/DEFCON-26-Workshop-Wesley-McGrew-Penetration-Testing-in-Hostile-Environments-Whitepaper.pdf |
241 KB |