#defcon23
Explore tagged Tumblr posts
Photo

My great tools of life @wearedefcon #laptopifestyle #laptopofdefcon #defcon #defcon20 #defcon21 #defcon22 #defcon23 #defcon24
0 notes
Text
DEF CON 23 - McNeil and Owen - Sorry Wrong Number: Mysteries Of The Phone System
DEF CON 23 – McNeil and Owen – Sorry Wrong Number: Mysteries Of The Phone System
Sorry Wrong Number: Mysteries Of The Phone System
Exploring the phone system was once the new and exciting realm of “phone phreaks,” an ancestor of today’s computer “hackers.” The first phreaks “owned” and explored the vague mysteries of the telephone network for a time until their activities drew too much attention from the phone companies and law enforcement. The phone system evolved, somewhat,…
View On WordPress
#computer security#DC 23#DC23#DEF CON#DEF CON 23#DEFCON#hack#hacker#hacking#phone system#security conference#security research#speeches#telco#VOIP Attack Vectors
0 notes
Photo

#dotexesolutions is a Premium IT Managed Service Provider in the heart of americas finest city #sandiego #dotexesolutions #dotexe #managedservices #managedserviceprovider #sdsu #technology #ces2017 #ceslasvegas2017 #ces #ces2017🎆 #it #software #hardware #technology #antivirus #security #cybersecurity #services #computer #network #networksecurity #networkengineer #defcon #defcon23 #defcon24 #defcon25 #fieldtech #fieldnation #workmarket #itprovider #cisco #apple #microsoft #samsung #investors #investinme #siliconvalley #paloalto #sanfrancisco #sanjose (at San Diego, California)
#managedservices#apple#itprovider#cybersecurity#defcon25#it#networkengineer#hardware#managedserviceprovider#computer#investors#defcon24#workmarket#dotexesolutions#technology#network#investinme#sdsu#fieldnation#networksecurity#dotexe#paloalto#antivirus#ces#services#ces2017🎆#ces2017#siliconvalley#defcon23#sanjose
0 notes
Photo

In Vegas, a casino employee is allowed to kidnap you
18 notes
·
View notes
Photo

Girl stuff! Switched out the side plates. #thekeyport #defcon #defcon23 #pink
2 notes
·
View notes
Video
instagram
Super cool sign at #defcon2015 #lasvegas #Defcon23 #defcon (at Bally's Las Vegas)
1 note
·
View note
Text
DEF CON 23 - Ian Kline - LTE Recon and Tracking with RTLSDR
DEF CON 23 – Ian Kline – LTE Recon and Tracking with RTLSDR
LTE Recon and Tracking with RTLSDR
Since RTLSDR became a consumer grade RX device, numerous talks and open source tools enabled the community to monitor airplanes, ships, and cars… but come on, what we really want to track are cell phones. If you know how to run cmake and have $50 to pick up an RTLSDR-E4000, I’ll make sure you walk out of here with the power to monitor LTE devices around you on a…
View On WordPress
#Computer Security (Software Genre)#DC 23#DC23#DEF CON (Conference Series)#DEF CON 23#DEFCON#hack#hacker#hacking#LTE#lte network#Recon#RTLSDR#RX#Security (Literature Subject)#security conference#security research#speeches#Tracking
0 notes
Photo

R00tz Kids honor code, Bally's, Defcon 23, Las Vegas, Nevada, USA by Cory Doctorow
13 notes
·
View notes
Text
DEF CON 23 - Grant Bugher - Obtaining and Detecting Domain Persistence
DEF CON 23 – Grant Bugher – Obtaining and Detecting Domain Persistence
Obtaining and Detecting Domain Persistence
When a Windows domain is compromised, an attacker has several options to create backdoors, obscure his tracks, and make his access difficult to detect and remove. In this talk, I discuss ways that an attacker who has obtained domain administrator privileges can extend, persist, and maintain control, as well as how a forensic examiner or incident…
View On WordPress
#computer security#DC 23#DC23#DEF CON#DEF CON 23#DEFCON#Domain Persistence#grant bugher#hack#hacker#hacking#security conference#security research#speeches
0 notes
Text
DEF CON 23 - Matt Cagle and Eric Cheng - Who Will Rule the Sky: The Coming Drone Policy
DEF CON 23 – Matt Cagle and Eric Cheng – Who Will Rule the Sky: The Coming Drone Policy
Who Will Rule the Sky: The Coming Drone Policy
Your private drone opens up limitless possibilities – how can manufacturers and policymakers ensure you are able to realize them? As private drone ownership becomes the norm, drone makers and lawmakers will need to make important policy decisions that account for the privacy and free speech issues raised by this new technology. What legal and…
View On WordPress
#computer security#DC 23#DC23#DEF CON#DEF CON 23#DEFCON#drones#eric cheng#hack#hacker#hacking#matt cagle#policy#security conference#security research#speeches
0 notes
Text
DEF CON 23 - Marquis-Boire, Marschalek, Guarnieril - F the attribution, show us your .idb
DEF CON 23 – Marquis-Boire, Marschalek, Guarnieril – F the attribution, show us your .idb
DEF CON 23 – Marquis-Boire, Marschalek, Guarnieril – F the attribution, show us your .idb
Over the past few years state-sponsored hacking has received attention that would make a rockstar jealous. Discussion of malware has shifted in focus from ‘cyber crime’ to ‘cyber weapons’, there have been intense public debates on attribution of various high profile attacks, and heated policy discussion…
View On WordPress
#.idb#attribution#computer security#DC 23#DC23#DEF CON#DEF CON 23#DEFCON#hack#hacker#hacking#malware#nation-state hacking#nation-state malware#Regin#security conference#security research
0 notes
Text
Looping Surveillance Cameras through Live Editing
Looping Surveillance Cameras through Live Editing
This project consists of the hardware and software necessary to hijack wired network communications. The hardware allows an attacker to splice into live network cabling without ever breaking the physical connection. This allows the traffic on the line to be passively tapped and examined. Once the attacker has gained enough knowledge about the data being sent, the device switches to an active tap…
View On WordPress
0 notes