ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

46,500 results

DEFCONConference
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it?  - K Karagiannis

Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...

39:29
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis

151,202 views

4 months ago

DEFCONConference
DEF CON 30 - Roger Dingledine - How Russia is trying to block Tor

In December 2021, some ISPs in Russia started blocking Tor's website, along with protocol-level (DPI) and network-level (IP ...

47:27
DEF CON 30 - Roger Dingledine - How Russia is trying to block Tor

78,348 views

3 years ago

DEFCONConference
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...

54:12
DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

293,035 views

1 year ago

DEFCONConference
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

16,245 views

2 years ago

DEFCONConference
DEF CON 32 - SQL Injection Isn't Dead  Smuggling Queries at the Protocol Level - Paul Gerste

SQL injections seem to be a solved problem; databases even have built-in support for prepared statements, leaving no room for ...

38:14
DEF CON 32 - SQL Injection Isn't Dead Smuggling Queries at the Protocol Level - Paul Gerste

18,674 views

1 year ago

DEFCONConference
DEF CON 32 - Social Engineering Like you’re Picard - Jayson E  Street

AI is transforming social engineering. Using tools like ChatGPT, Gemini, and Copilot, attackers can make phishing and vishing ...

46:50
DEF CON 32 - Social Engineering Like you’re Picard - Jayson E Street

63,552 views

1 year ago

DEFCONConference
DEF CON 33 - Turning Camera Surveillance on its Axis - Noam Moshe

What are the consequences if an adversary compromises the surveillance cameras of thousands of leading Western ...

21:54
DEF CON 33 - Turning Camera Surveillance on its Axis - Noam Moshe

20,947 views

5 months ago

DEFCONConference
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...

20:31
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin

191,100 views

2 years ago

DEFCONConference
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data -  Dennis Giese

Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...

44:25
DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese

131,972 views

2 years ago

DEFCONConference
DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ...

42:47
DEF CON 31 - Badge of Shame Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

108,722 views

2 years ago

DEFCONConference
DEF CON 32 - Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ - Joseph Cox

In 2018, a secure communications app called Anom started to gain popularity among organized criminals. Soon, top tier drug ...

39:24
DEF CON 32 - Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ - Joseph Cox

1,706,814 views

1 year ago

DEFCONConference
DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin  Yu

Imagine your home modem as a loaded gun aimed at global security. Our research exposes critical vulnerabilities in ISP-supplied ...

39:43
DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin Yu

21,286 views

4 months ago

DEFCONConference
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly ...

48:29
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

504,102 views

3 years ago

DEFCONConference
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro

Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept ...

32:55
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro

726,708 views

4 months ago

DEFCONConference
DEF CON 23 - Zoz - And That's How I Lost My Other Eye...Explorations in Data Destruction (Fixed)

How much more paranoid are you now than you were four years ago? Warrantless surveillance and large-scale data confiscation ...

53:09
DEF CON 23 - Zoz - And That's How I Lost My Other Eye...Explorations in Data Destruction (Fixed)

528,162 views

10 years ago

DEFCONConference
DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

On December 25th, 2021, I discovered that my modem had been hacked after a strange IP address replayed my traffic. I began ...

24:58
DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

98,963 views

1 year ago

DEFCONConference
DEF CON 33 - Recording PCAPs from Stingrays With a $20 Hotspot - Cooper Quintin, oopsbagel

What if you could use Wireshark on the connection between your cellphone and the tower it's connected to? In this talk we present ...

39:51
DEF CON 33 - Recording PCAPs from Stingrays With a $20 Hotspot - Cooper Quintin, oopsbagel

40,072 views

4 months ago

DEFCONConference
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris

Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ...

45:05
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris

421,510 views

2 years ago

DEFCONConference
DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman

Have you ever wondered how those little boxes that you tap your card to open doors work? What are they reading on the card?

53:22
DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman

53,220 views

1 year ago

DEFCONConference
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix

Bug bounty is an intricate game between the bug hunter, the clients, and the intermediary. Like any game, it can be hacked.

32:30
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix

83,373 views

1 year ago