DEF CON 27: Insecurity of Things

DEF CON 27: Insecurity of Things

Jillian Ratliff - Vulnerabilities that Hide from Your Tools - DEF CON 27 Appsec VillageПодробнее

Jillian Ratliff - Vulnerabilities that Hide from Your Tools - DEF CON 27 Appsec Village

dumby - Anatomy Of A Megabreach Equifax Report - DEF CON 27 Blue Team VillageПодробнее

dumby - Anatomy Of A Megabreach Equifax Report - DEF CON 27 Blue Team Village

Ken Munro - Lojackd pwning car alarms vehicle trackers - DEF CON 27 Car Hacking VillageПодробнее

Ken Munro - Lojackd pwning car alarms vehicle trackers - DEF CON 27 Car Hacking Village

Hadrian Barral - The ABC of Next Gen Shellcoding - DEF CON 27 ConferenceПодробнее

Hadrian Barral - The ABC of Next Gen Shellcoding - DEF CON 27 Conference

Bertin Bervis - Mixing industrial protocols with web application security - DEF CON 27 IoT VillageПодробнее

Bertin Bervis - Mixing industrial protocols with web application security - DEF CON 27 IoT Village

Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 ConferenceПодробнее

Patrick Wardle - Harnessing Weapons of Mac Destruction - DEF CON 27 Conference

Butt Plug Hacking! Real Penetration Testing – DEF CON 27Подробнее

Butt Plug Hacking! Real Penetration Testing – DEF CON 27

Jack Baker - Hacking WebAssembly Games with Binary Instrumentation - DEF CON 27 ConferenceПодробнее

Jack Baker - Hacking WebAssembly Games with Binary Instrumentation - DEF CON 27 Conference

Cult of the Dead Cow - Change the World, cDc Style - DEF CON 27 ConferenceПодробнее

Cult of the Dead Cow - Change the World, cDc Style - DEF CON 27 Conference