-
DEF CON 29 - Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMI
- Hello, and welcome to my talk on hacking the DEFCON 27 Badge.
00:06 - My name is Seth Kintigh. My background is hardware and computer security.
00:10 - So this project was a lot of fun for me. I just wanted to give a little background on some of the terminology we’ll be using in this presentation.
00:19 - NFMI, near field magnetic inductions. It’s basically using magnetic waves and fields to communicate instead of radio.
-
DEF CON 29 - Sheila A Berta - The Unbelievable Insecurity of the Big Data Stack
- Hi everyone, welcome to my talk on big data insecurity.
00:09 - I will talk about how we can analyze these big data infrastructures from an offensive point of view.
00:16 - Before starting, let me introduce myself briefly.
00:19 - My name is Sheila, I work as Head of Research at Dreamlab Technologies, a Swiss Infosec Company.
00:25 - I’m an Offensive Security Specialist with several years of experience.
-
DEF CON 29 - Shir Tamari, Ami Luttwak - New class of DNS Vulns Affecting DNS-as-Service Platforms
- Hello, DEF CON. Today, we present to you our research on the DNS vulnerability class in DNS-as-a-service providers.
00:08 - My name is Shir, and I lead the research team at Wiz, the cloud security company.
00:13 - With me in the room is Ami Luttwak- - Hi. - The CTO of Wiz.
00:20 - - Thank you, Shir, and it’s really great to be here.
-
DEF CON 29 - Sick Codes - The Agricultural Data Arms Race Exploiting a Tractor Load of Vulns
- Good afternoon, everyone. Welcome to The Agricultural Data Arms Race.
00:05 - I’m your host, Sick. Codes, And today we’ll be exploiting a tractor load of vulnerabilities in the global food supply chain in good faith.
00:14 - So I just want to start off with a quick photo.
00:16 - It’s from about the 1960s, and it’s of a farmer using a hand tractor.
00:21 - This is a hand operated tractor, as you can see.
-
DEF CON 29 - Thomas Roth - Hacking the Apple AirTags
- Hey, welcome to my talk, Hacking the Apple AirTags.
00:04 - My name is Thomas Roth. I’m a security researcher from Germany, and I also run a YouTube channel called stacksmashing where I talk about reverse engineering, hardware hacking and all that kind of stuff.
00:16 - If you wanna contact me, you can find me on Twitter at ghidraninja and hope you enjoy this presentation.
-
DEF CON 29 - Tianze Ding - Vulnerability Exchange: One Domain Account For More Than Exchange Server
- [Tianze] Hello everyone, welcome to my talk.
00:04 - Today, I’m going to share my research about how to attack Microsoft Exchange Servers in Active Directory with only a normal domain account.
00:15 - I’m Tianze Ding. I’m from Tencent Security Xuanwu Lab.
00:19 - I’m focusing on Active Directory Security, red team operations, and web application security.
00:26 - I have reported some vulnerabilities to several well-known companies, such as Microsoft, Apple, and Google.
-
DEF CON 29 - Zabrocki, Matrosov - Glitching RISC-V chips: MTVEC corruption for hardening ISA
- Hello everyone, my name is Adam Zabrocki, and together with Alex Matrosov, we would like to give you a talk about Glitching RISC-V Chips: MTVEC Corruption For Hardening ISA.
00:09 - However, this is the end goal, what we end up doing.
00:12 - And before we ended up doing that, we also needed to go through various different researches we would like to cover in this topic today.
-
DEF CON 29 - Zhipeng Huo, Yuebin Sun, Chuanda Ding - Reveal and Exploit IPC Logic Bugs in Apple
- [Presenter] Hello everyone. Another year to see you in this special mode.
00:10 - Welcome to our talk, “Caught You: Reveal and Exploit IPC Logic Bugs Inside Apple. “ First, a self-introduction.
00:20 - Zhipeng Huo is a senior security researcher.
00:23 - He’s a member of EcoSec Team at Tencent Security Xuanwu Lab.
00:27 - His research focuses on macOS, iOS, and Windows platform security.
-
DEF CON 29 -Jiska, Alexander Heinrich - Wibbly Wobbly, Timey Wimey Whats Inside Apples U1 chip
- In this talk Alexander and me will show you internals about Apple’s new ultra wide band technology.
00:08 - Apple built a new chip officially called U1 and internally called Rose.
00:12 - The chip has been introduced for the iPhone 11 for spatial awareness.
00:16 - And since IS 14, some functionality of the U1 chip is exposed through the the nearby interaction framework.
00:23 - Even though it’s been there for a while, nobody really knows what ultra wide band is or does.
-
DEF CON 29- Dennis Giese - Robots with lasers and cameras but no security Liberating your vacuum
- Hi, I am Dennis Giese, and welcome to my talk about robots with lasers and cameras, but no security, where we will talk about ways how you can liberate your vacuum from the cloud.
00:11 - Before we start, here is some background information about me.
00:14 - I’m a PhD student at Northeastern University, and I’m working with Professor Guevera Noubir.
00:19 - Our research field is wireless and embedded security.