filmov
tv
DEF CON 29 - Chad Seaman - UPnProxyPot: Fake the Funk, Become a Blackhat Proxy, MITM their TLS...
Показать описание
UPnP sucks, everybody knows it, especially blackhat proxy operators. UPnProxyPot was developed to MITM these operators to see what they're doing with their IoT proxy networks and campaigns. We'll cover SSDP, UPnP, UPnProxy research/campaigns as well as cover a new Golang based honeypot, so we can all snoop on them together!
REFERENCES:
REFERENCES:
DEF CON 29 - Chad Seaman - UPnProxyPot: Fake the Funk, Become a Blackhat Proxy, MITM their TLS...
DEF CON 29 - Ian Coldwater, Chad Rikansrud - Real Life Story of the 1st Mainframe Container Breakout
DEF CON 29 - Agent X - A look inside security at the New York Times
Propagate the Signal [with JRWR] | DEF CON 29 #badgelife
DEF CON 29 - Rotem Bar - Abusing SAST tools When scanners do more than just scanning
DEF CON 29 - Eugene Lim, Glenice Tan, Tan Kee Hock - Hacking Humans with AI as a Service
Hardware Hacking Village [with Kralik] | DEF CON 29
DEF CON 29 Blockchain Village - Josh McIntyre - Subtle Ways to Lose Your Cryptocurrency
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys
DEF CON 29 - Roy Davis - No Key No PIN No Combo No Problem Pwning ATMs For Fun and Profit
DEF CON 29 - Hao Xing, Zekai Wu - How I use a JSON 0day to Steal Your Money on the Blockchain
DEF CON 29 - Tomer Bar, Eran Segal - 2021 Our Journey Back To The Future Of Windows Vulnerabilities
DEF CON 29 - Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMI
DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversary
DEF CON 29 CTF Quals: say-hellooo to Zardus!
DEF CON 29 - Jacob Baines - Bring Your Own Print Driver Vulnerability
DEF CON 29 - Matthew Bryant - Hacking G Suite: The Power of Dark Apps Script Magic
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race - Exploiting a Tractor Load of Vulns
DEF CON 29 - Sheila A Berta - The Unbelievable Insecurity of the Big Data Stack
DEF CON 29 - Dimitry 'Op Nomad' Snezhkov - Racketeer Toolkit: Prototyping Controlled Ranso...
DEF CON 29 - Ionut Cernica - Hack the hackers Leaking data over SSL TLS
DEF CON 29 - Ian Vitek - Central Bank Digital Currency, Threats and Vulnerabilities
DEF CON 29 Adversary Village - Marc Smeets - Exploiting Blue Team OPSEC Failures with RedELK
DEF CON 29 - Tom Van Goethem, Mathy Vanhoef - Timeless Timing Attacks
Комментарии