DEF CON 31 - Exploiting OPC UA - Practical Attacks Against OPC UA Architectures - Moshe, Brizinov

DEF CON 31 - Exploiting OPC UA - Practical Attacks Against OPC UA Architectures - Moshe, Brizinov

DEF CON 31 - Exploring Linux Memory Manipulation for Stealth and Evasion - Polop, GutierrezПодробнее

DEF CON 31 - Exploring Linux Memory Manipulation for Stealth and Evasion - Polop, Gutierrez

DEF CON 31 - Physical Attacks Against Smartphones - Christopher WadeПодробнее

DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade

DEF CON 31 - A Pain in the NAS Exploiting Cloud Connectivity to PWN your NAS - Moshe, BrizinovПодробнее

DEF CON 31 - A Pain in the NAS Exploiting Cloud Connectivity to PWN your NAS - Moshe, Brizinov

DEF CON 31 Trailer!Подробнее

DEF CON 31 Trailer!

DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep RodriguezПодробнее

DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez

DEF CON 31 - Defeating VPN Always On - Maxime ClementzПодробнее

DEF CON 31 - Defeating VPN Always On - Maxime Clementz

DEF CON 31 - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖKПодробнее

DEF CON 31 - Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare - STÖK

DEF CON 31 - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks - Ceri CoburnПодробнее

DEF CON 31 - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks - Ceri Coburn

DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCsПодробнее

DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs