-
Cycling in Beijing Economic and Technological Development Area (Yizhuang New Town)【4K】骑行在北京
Friday, July 30, 2021, afternoon Luying Street South 4th Ring Road, Shibalidian South Bridge Boda Road The continuous rainy days for more than a week ended with the disappearance of the typhoon “fireworks” The last light rain in the morning, and occasional water can be seen on the side of the road The road now cycling is called Bo Da Road, which connects South Fourth Ring Road and South Fifth Ring Road.
-
DEF CON 29 - Jeff Dileo - Instrument and Find Out: Parasitic Tracers for High Level Languages
- Hi and welcome to Instrument and Find Out Writing Parasitic tracers for High Level Languages.
00:06 - I’m Jeff and I’m at NCC group I like to do, hack on stuff and do various things for the purpose of this talk.
00:12 - That means programs, languages, runtimes, memory, and bytes.
00:16 - But first up, a notice. By viewing this presentation, you agree to indemnify and hold harmless the presenter in the event you decide to take any of his advice and find yourself unable to sleep at four in the morning due to “language demons”.
-
DEF CON 29 - Orange Tsai - ProxyLogon Just Tip of the Iceberg, New Attack Surface on Exchange Server
- Hi, it’s good to be back. Thank you all for being here.
00:12 - Without doubt, Microsoft Exchange Server is the most widely deployed mail solution within governments and enterprises.
00:21 - It is an integration of their daily operations and security.
00:27 - This January, we found a series of vulnerabilities on Exchange Server to Microsoft, and that gave us ProxyLogon.
00:38 - If you are paying attention to the industry news, you must have heard this then.
-
DEF CON 29 - Rion Carter - Why does my security camera scream like a Banshee?
- Hi, my name’s Rion Carter, and today I’ll be presenting on why my security camera screams like a banshee.
00:10 - The talking on signal analysis and reverse engineering of an audio and coding protocol.
00:16 - A little bit about myself, I’m a software developer, a security engineer.
00:19 - I love to code, love to automate, love to solve problems.
00:24 - I like to employ the hacker mindset.
-
DEF CON 29 - Austin Allshouse - The Mechanics of Compromising Low Entropy RSA Keys
- Hello Defcon, thank you for tuning into my talk, being broadcast in Raleigh, North Carolina.
00:06 - My name is Austin Allshouse. I’m a research scientist at BitSight.
00:11 - And as part of my job, I do a lot of surveys and studies of security best practices across the internet.
00:17 - And today I’m going to walk you through some of the low level details of how to do one study that I did recently involving compromising RSA keys through factorization.
-
DEF CON 29 - Barak Sternberg - Extension Land: Exploits and Rootkits in Your Browser Extensions
- Nice to meet you, my name is Barak, and I’m going to speak about: Extension-Land in my DEFCON talk which is: Exploits and Rootkits for your Browser Extensions.
00:09 - So let’s get into it. First, a little bit about me; so my name is Barak Sternberg.
00:15 - I’m a Senior Security Researcher, and I’m previously an Author at SentinelOne Labs.
00:22 - I also did published research regarding smart devices and hacking smart-devices in the (indistinct) DEFCON.
-
DEF CON 29 - Ben Kurtz - Offensive Golang Bonanza: Writing Golang Malware
- Hello and welcome to Offensive Golang Bonanza.
00:07 - I’m Ben, hi, Defcon 29. We’re gonna talk about Golang malware.
00:14 - Little a bit about myself, my first Defcon talk was at Defcon 13.
00:19 - I’m the host of a hacker-themed podcast where we interview a lot of people around this community.
00:24 - Very in-depth, very technical. Please check that out and I have a bunch of random projects on GitHub.
-
DEF CON 29 - Bill Graydon - Defeating Physical Intrusion Detection Alarm Wires
- Hello, I hope you’re a psyched as I am for me to talk at you for 45 minutes all about wires.
00:06 - The hacker community has picked to bits many other aspects of physical access control, but the communication lines themselves remain largely at black box, and that’s despite them being manifestly exploitable, which we’ll look at today.
00:20 - So I’m sure you’ve seen this particular trope, the laser hallway, where the protagonist does all sorts of incredible gymnastics to get by these lasers without tripping them and get to whatever goal exists.
-
DEF CON 29 - Brian Hong - Sleight of ARM: Demystifying Intel Houdini
- Hello everyone and welcome to Sleight of ARM: Demystifying Intel Houdini.
00:05 - My name is Brian and I’ll be discussing Intel’s Houdini binary translator.
00:09 - So what it is, where it’s used, how it works, security concerns and recommendations.
00:14 - But before that, a little bit about myself real quick.
00:18 - That’s me, I’m Brian Hong. I studied electrical engineering at Cooper Union, and I’m currently working as a security consultant with the NCC group.
-
DEF CON 29 - Cedric Owens - Gone Apple Pickin: Red Teaming MacOS Environments in 2021
- Hey, what’s up DEF CON? This is Cedric Owens, I’m super humbled and excited to be here, and I’ll be talking about, basically giving a perspective of what red teaming looks like in macOS environments here in the year 2021.
00:15 - Some background information on myself, I’m a full-time offensive security engineer on the red team side, and I’ve been dedicated red teamer now for the past four, almost five years.