filmov
tv
DEF CON 22 - Mark Stanislav & Zach Lanier - The Internet of Fails - Where IoT Has Gone Wrong
Показать описание
This presentation will dive into research, outcomes, and recommendations regarding information security for the "Internet of Things". Mark and Zach will discuss IoT security failures both from their own research as well as the work of people they admire. Attendees are invited to laugh/cringe at concerning examples of improper access control, a complete lack of transport security, hardcoded-everything, and ways to bypass paying for stuff.
DEF CON 22 - Mark Stanislav & Zach Lanier - The Internet of Fails - Where IoT Has Gone Wrong
DEF CON 22 - Dr. Philip Polstra - Am I Being Spied On?
DEF CON 22 - Kyle Kelley and Greg Anderson - Is This Your Pipe? Hijacking the Build Pipeline.
DEF CON 22 - John Menerick - Open Source Fairy Dust
Robot Army : DefCon 22
DEF CON 25 - Mark Williams, Rob Stanley - If You Give a Mouse a Microchip
DEFCON 22 Vendor Area Tour
DEF CON 23 - Scott Erven and Mark Collao -Medical Devices: Pwnage and Honeypots
DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog
DEF CON 22 - Cesar Cerrudo - Hacking US (and UK, Australia, France, etc.) traffic control systems
DEF CON 22 - Jesus Molina - Learn how to control every room at a luxury hotel remotely
Defcon 22 Badge Fun
DEF CON 22 - Keren Elazari - Empowering Hackers to Create a Positive Impact
DEF CON 22 - Shahar Tal - I Hunt TR-069 Admins: Pwning ISPs Like a Boss
DEF CON 22 - Jesse Michael and Mickey Shkatov - USB for all!
Password Hash Cracking at DEFCON 22
DEF CON 22 - Lucas Morris and Michael McAtee - ShareEnum: We Wrapped Samba So You Don’t Have To
DEF CON 22 - Richard Thieme - The Only Way to Tell the Truth is in Fiction
DEFCON 22 Is Oracle Pentesting Their Products?
DEF CON 22 - Panel- Ephemeral Communications: Why and How?
Luke’s Def Con Stories
DEFCON 22 Preview: Pineapple Abduction
DEF CON 22 - Jake Kouns and Carsten Eiram - Screw Becoming A Pentester
DEF CON 21 - Panel - Hardware Hacking with Microcontrollers
Комментарии