[EN] Def Con 21–a little UnOfficially…

The biggest, most important, incredible (especially in the context of discussion between Director of NSA and Attendees on another conference <Black Hat>) conference focused for security, cyber security, ethical hacking and more. It was held in Las Vegas between 1st and 4th August. Def Con 21. Some of us cannot be there, maybe in next year, but we can get (and share) two parts of materials form DefCon.

PRIMARY – unofficial sessions (I found it on blog post here). And here is the list of available for download (394 MB) sessions:

  • Kang-Cruz-RESTing-On-Your-Laurels-Will-Get-You-Pwned.pdf
  • Caceres-Massive-Attacks-With-Distributed-Computing.pdf
  • Pinto-Defending-Networks-Machine-Learning-WP.pdf
  • Pinto-Defending-Networks-Machine-Learning.pdf
  • Baldet-Suicide-Intervention-Risk-Assessment-Tactics.pdf
  • Davis-Revealing-Embedded-Fingerprints.pdf
  • Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf
  • Bogdan-Alecu-Attacking-SIM-Toolkit-with-SMS-WP.pdf
  • Bogdan-Alecu-Business-Logic-Flaws-in-MO.pdf
  • OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf
  • Gorenc-Spelman-Java-Every-days-WP.pdf
  • Gorenc-Spelman-Java-Every-days.pdf
  • Riley-Defense-by-Numbers.pdf
  • Sumner-Wald-Prediciting-Susceptibility-To-Social-Bots-On-Twitter.pdf
  • Dudley-Privacy-In-DSRC-Connected-Vehicles.pdf
  • Young-Google-Skeleton-Key.pdf
  • Crowley-Savage-Bryan-Home-Invasion-2.0-WP.pdf
  • Crowley-Savage-Bryan-Home-Invasion-2.0.pdf
  • Dan-Griffin-Protecting-Data.pdf
  • Chechik-Utilizing-Popular-Websites-for-Malicious-Purposes-Using-RDI.pdf
  • Selifonov-A-Password-is-Not-Enough-Why-Disk-Encryption-is-Broken.pdf
  • Fulton-Zolnikov-The-Politics-of-Privacy-and-Technology.pdf
  • Milam-Getting-The-Goods-With-smbexec.pdf
  • Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf
  • Ozavci-VoIP-Wars-Return-of-the-SIP.pdf
  • Flipper-10000-Yen.pdf
  • Payer-Exploiting-Music-Streaming-with-JavaScript.pdf
  • Pickett-Lets-Screw-With-NMAP.pdf
  • Scott-Security-in-Cognitive-Radio-Networks.pdf
  • Thompson-CREAM-Cache-Rules-Evidently-Ambiguous-Misunderstood.pdf
  • Schultz-Examining-the-Bitsquatting-Attack-Surface-WP.pdf
  • Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
  • Staggs-How-to-Hack-Your-Mini-Cooper.pdf
  • Denaro-How-to-Disclose-or-Sell-an-Exploit.pdf
  • Bialek-PowerPwning-Post-Exploiting-by-Overpowering-Powershell.pdf
  • Grand-JTAGulator.pdf
  • Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf
  • Engler-Vines-Electromechanical-PIN-Cracking-WP.pdf
  • Engler-Vines-Electromechanical-PIN-Cracking.pdf
  • Justin-Hendricks-So-You-Think-Your-Domain-Controller-Is-Secure.pdf
  • Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf
  • Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf
  • Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf
  • Marschalek-Thorny-Malware.pdf
  • Perklin-ACL-Steganography.pdf.pdf
  • Schrenk-How-my-Botnet-Defeated-Russian-Hackers.pdf
  • Chow-Abusing-NoSQL-Databases.pdf
  • Sikka-EMET-4.0-PKI-Mitigation.pdf
  • Oberli-Please-Insert-Inject-More-Coins.pdf
  • Mittal-Powerpreter-Post-Exploitation-Like-a-Boss.pdf
  • Fora-Defeating-SEAndroid.pdf
  • Polstra-We-are-Legion-Pentesting.pdf
  • Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf
  • Duszynski-Cyber-Offenders.pdf
  • Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf
  • Baumgarten-Mach-O-Viz-WP.pdf
  • Baumgarten-Mach-O-Viz.pdf
  • Richard-Thieme-UFOs-and-Govt.pdf
  • Ricky-Hill-Phantom-Drone.pdf
  • Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense.pdf
  • Stucke-DNS-Hazards.pdf
  • Sandvik-Safety-of-the-Tor-Network.pdf
  • Holeman-The-Bluetooth-Device-Database.pdf
  • Bowne-SSD-Data-Evap.pdf
  • Bowne-Prince-Evil-DoS-Attacks-and-Strong-Defenses.pdf
  • Behrens-Bandelgar-MITM-All-The-IPv6-Things.pdf
  • Rogers-Caceres-The-Dawn-of-Web-30.pdf
  • Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf
  • Steele-Kottman-Collaborative-Penetration-Testing-With-Lair.pdf
  • Miu-Lee-Kill-em-All-DDoS-Protection-Total-Annihilation.pdf
  • Toukharian-Gevorgyan-HTTP-Time-Bandit.pdf
  • McGrew-Pwn-The-Pwn-Plug .pdf
  • McGrew-Pwn-The-Pwn-Plug-WP.pdf
  • WiK-Mubix-gitDigger.pdf
  • Blacher-Transcending-Cloud-Limitations.pdf
  • source-Code-dpk-master.zip
  • Zoz-Hacking-Driverless-Vehicles.pdf
  • bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT-WP.pdf
  • bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT.pdf
  • m0nk-BoutiqueKit.pdf
  • soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf

SECONDARY – very important too – The Def Con 21 Soundtrack:

  • BT – The Gathering Darkness  13:12  
  • Dual Core – Fear and Chaos (Dale Chase Remix)  04:35  
  • ytcracker – Bitcoin Baron  03:29  
  • BLEO – The Carter
    fone Decision  01:47  
  • Swinging Rabbits – Monster (Gunslinger vs Blare Remix)  04:14  
  • Psymbionic & Great Scott – Computronium  04:39  
  • Gramatik – Talkbox Intended  06:10  
  • PANTyRAiD – Jokes from the Backseat  04:38  
  • DJ RoboRob – The Great Divide ft. Dual Core  04:11  
  • BREDE – Crush On  04:04  
  • Karton – Chase It High (Left/Right Remix)  06:00  
  • Royal Sapien presents No Context – For the Breakers (DEF CON Edit)  04:23  
  • Son of the Electric Ghost – Beat It Kids  05:23  
  • Nick Stoynoff presents NOFF – Aryt  03:20  
  • A.E. Burdick – Room 101  06:35  
  • Faderhead – Free  03:42  
  • MDMM – Octopus (Redux)  07:25  
  • Vigilante – It’s Our Time (Electro Version)  03:00  
  • BlakOPz – BlakOUt  05:59  
  • Bud Melvin – Trolling is a Art  02:48

Soundtrack is available for download for free or if You want to pay, You can choose appropriate quality. Formats for standard users: MP3 V0 and MP3 320 and of course for Audiophiles and NERDS (!): FLAC, AAC, ALAC, OGG – from 143 to 712 MB.

DEF CON 21: The Official Soundtrack

____

ENJOY!