Index of /Conferences/DEF_CON_25_(2017)/Talks/101_Track

      Name                                                                                                Last modified      Size  Description
Parent Directory - Using_GPS_Spoofing_to_control_time/ 2019-09-15 15:27 - Unboxing_Android_Everything_you_wanted_to_know_about_Android_packers/ 2019-09-15 15:12 - Total_Recall_Implanting_Passwords_in_Cognitive_Memory/ 2019-09-15 15:09 - The_Black_Art_of_Wireless_Post_Exploitation/ 2019-09-15 15:01 - There's_no_place_like_127_0_0_1_-_Achieving_reliable_DNS_rebinding_in_modern_browsers/ 2019-09-15 14:56 - Rage_Against_the_Weaponized_AI_Propaganda_Machine/ 2019-09-15 14:48 - Radio_Exploitation_101_Characterizing_Contextualizing_and_Applying_Wireless_Attack_Methods/ 2019-09-15 14:42 - Porosity_A_Decompiler_For_Blockchain-Based_Smart_Contracts_Bytecode/ 2019-09-15 14:38 - Persisting_with_Microsoft_Office_Abusing_Extensibility_Options/ 2019-09-15 14:24 - Offensive_Malware_Analysis_Dissecting_OSX_FruitFly_via_a_Custom_C_and_C_Server/ 2019-09-15 14:22 - MS_Just_Gave_the_Blue_Team_Tactical_Nukes_(And_How_Red_Teams_Need_To_Adapt)/ 2019-09-15 14:18 - Microservices_and_FaaS_for_Offensive_Security/ 2019-09-15 14:11 - macOS_iOS_Kernel_Debugging_and_Heap_Feng_Shui/ 2019-09-15 14:06 - Inside_the_Meet_Desai_Attack_Defending_Distributed_Targets_from_Distributed_Attacks/ 2019-09-15 14:01 - Here_to_stay_Gaining_persistency_by_abusing_advanced_authentication_mechanisms/ 2019-09-15 13:45 - Hacking_the_Cloud/ 2019-09-15 13:40 - Game_of_Chromes_Owning_the_Web_with_Zombie_Chrome_Extensions/ 2019-09-15 13:35 - From_Box_to_Backdoor_Using_Old_School_Tools_and_Techniques_to_Discover_Backdoors_in_Modern_Devices/ 2019-09-15 13:32 - Driving_down_the_rabbit_hole/ 2019-09-15 13:28 - Demystifying_Windows_Kernel_Exploitation_by_Abusing_GDI_Objects/ 2019-09-15 13:21 - DEF_CON_101_Panel/ 2019-09-15 13:13 - Dealing_the_perfect_hand_-_Shuffling_memory_blocks_on_z_OS/ 2019-09-15 12:44 - DC_to_DEF_CON_Q_and_A_with_Congressmen/ 2019-09-15 12:38 - Controlling_IoT_devices_with_crafted_radio_signals/ 2019-09-15 12:34 - CITL_and_the_Digital_Standard_-_A_Year_Later/ 2019-09-15 12:28 - Cisco_Catalyst_Exploitation/ 2019-09-15 12:23 - Call_the_plumber_-_you_have_a_leak_in_your_(named)_pipe/ 2019-09-15 12:17 - Breaking_Wind_Adventures_in_Hacking_Wind_Farm_Control_Networks/ 2019-09-15 12:13 - Attacking_Autonomic_Networks/ 2019-09-15 12:10 - Assembly_Language_is_Too_High_Level/ 2019-09-15 12:05 - Amateur_Digital_Archeology/ 2019-09-15 11:57 - Abusing_Webhooks_for_Command_and_Control/ 2019-09-15 11:52 -