ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

46,562 results

DEFCONConference
DEF CON 32 - Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ - Joseph Cox

In 2018, a secure communications app called Anom started to gain popularity among organized criminals. Soon, top tier drug ...

39:24
DEF CON 32 - Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ - Joseph Cox

1,706,779 views

1 year ago

DEFCONConference
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...

54:12
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

292,965 views

1 year ago

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

151,167 views

4 months ago

DEFCONConference
DEF CON 32 - Social Engineering Like you’re Picard - Jayson E  Street

AI is transforming social engineering. Using tools like ChatGPT, Gemini, and Copilot, attackers can make phishing and vishing ...

46:50
DEF CON 32 - Social Engineering Like you’re Picard - Jayson E Street

63,536 views

1 year ago

DEFCONConference
DEF CON 30 - Roger Dingledine - How Russia is trying to block Tor

In December 2021, some ISPs in Russia started blocking Tor's website, along with protocol-level (DPI) and network-level (IP ...

47:27
DEF CON 30 - Roger Dingledine - How Russia is trying to block Tor

78,344 views

3 years ago

DEFCONConference
DEF CON 32 - SQL Injection Isn't Dead  Smuggling Queries at the Protocol Level - Paul Gerste

SQL injections seem to be a solved problem; databases even have built-in support for prepared statements, leaving no room for ...

38:14
DEF CON 32 - SQL Injection Isn't Dead Smuggling Queries at the Protocol Level - Paul Gerste

18,671 views

1 year ago

DEFCONConference
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...

20:31
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

191,086 views

2 years ago

DEFCONConference
DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin  Yu

Imagine your home modem as a loaded gun aimed at global security. Our research exposes critical vulnerabilities in ISP-supplied ...

39:43
DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin Yu

21,279 views

4 months ago

DEFCONConference
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ...

48:23
DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

153,594 views

4 months ago

DEFCONConference
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

16,243 views

2 years ago

DEFCONConference
DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ...

42:47
DEF CON 31 - Badge of Shame Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

108,721 views

2 years ago

DEFCONConference
DEF CON 33 - Turning Camera Surveillance on its Axis - Noam Moshe

What are the consequences if an adversary compromises the surveillance cameras of thousands of leading Western ...

21:54
DEF CON 33 - Turning Camera Surveillance on its Axis - Noam Moshe

20,941 views

5 months ago

DEFCONConference
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data -  Dennis Giese

Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...

44:25
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese

131,969 views

2 years ago

DEFCONConference
DEF CON 33 - RF Village - Tactical Flipper Zero You Have 1 Hour and No Other Equipment - Grey Fox

You just arrived in some city where the enemy is active. You have a mission to locate and identify a hostile team. They operate in ...

34:41
DEF CON 33 - RF Village - Tactical Flipper Zero You Have 1 Hour and No Other Equipment - Grey Fox

18,867 views

4 months ago

DEFCONConference
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro

Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept ...

32:55
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro

726,573 views

4 months ago

DEFCONConference
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix

Bug bounty is an intricate game between the bug hunter, the clients, and the intermediary. Like any game, it can be hacked.

32:30
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix

83,358 views

1 year ago

DEFCONConference
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly ...

48:29
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

504,080 views

3 years ago

DEFCONConference
DEF CON 32 - Spies and Bytes: Victory in the Digital Age  - General Paul M  Nakasone

Join General Paul M. Nakasone, U.S. Army (Retired), for a deep dive into the realities of modern cyber warfare at DefCon.

44:11
DEF CON 32 - Spies and Bytes: Victory in the Digital Age - General Paul M Nakasone

10,709 views

1 year ago

DEFCONConference
DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

With the iPhone 15 & iPhone 15 Pro Apple switched their iPhone to USB-C - and introduced a new proprietary USB-C controller: ...

36:55
DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

547,041 views

1 year ago

DEFCONConference
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris

Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ...

45:05
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris

421,485 views

2 years ago