Announcement

Collapse
No announcement yet.
Forums Topics Posts Last Post
DEF CON Groups DEF CON Groups
DEF CON Groups are local meetings of people between interested in technology and hacking
Topics: 57 Posts: 97
57 97

What's Going On

Collapse

There are currently 314 users online. 35 members and 279 guests.

Most users ever online was 8,111 at 12:23 on June 2, 2020.

Upcoming Events

Collapse

  • Aug 8
    23:45 | Title: Weaponized XSS - Moving Beyond Alert(1)

    Speaker(s): Ray Doyle

    Location: Red Team Vlg

    Discord: https://discord.com/channels/7082082...77357820411944

    Event starts: 2020-08-08 22:45 (10:45 PM) PDT (UTC -07:00)

    Event ends:...
  • Aug 9
    00:00 | Subxian

    LA/Seattle Underground Music 1997-present. DEF CON SoundGuy. Moontribe collective. So,many parties and so much good music made me picky but I love halftime beats! Twice as much opportunity for intricate layers!
  • Aug 9
    00:00 | Title: What the Shuck? Layered Hash Shucking (Rebroadcast)

    Speaker(s): Sam Croley (Chick3nman)

    Location: Password Vlg

    Discord: https://discord.com/channels/7082082...33760742621214

    Event starts: 2020-08-08 23:00 (11:00 PM) PDT (UTC -07:00)...
  • Aug 9
    02:00 | A company, regardless of its size and market power, may go out of business or lose a lot of value because of a security incident on its information system. The number of vulnerabilities and the interest of cyber-attackers is only increasing. With the advent of the monetization of botnet cyber attacks...
  • Aug 9
    02:00 | Title: Practical PCFG Password Cracking (Rebroadcast)

    Speaker(s): Matt Weir

    Location: Password Vlg

    Discord: https://discord.com/channels/7082082...33760742621214

    Event starts: 2020-08-09 01:00 (01:00 AM) PDT (UTC -07:00)

    Event...
  • Aug 9
    03:15 | Title: Reviewing MS08-067, Illustration Of An Old Chapter

    Speaker(s): Etizaz Mohsin

    Location: Red Team Vlg

    Discord: https://discord.com/channels/7082082...77357820411944

    Event starts: 2020-08-09 02:15 (02:15 AM) PDT (UTC -07:00)
    ...
  • Aug 9
    04:30 | Red team operations involve many skills, the operation requires a lot of monitoring, consolidating and caution. In order to perform red team operations faster, and stealthier without thinking about the infrastructure every team has its’ own habits and standarts. However, there is a problem with those...
  • Aug 9
    05:45 | This session will discuss about journey from discovering vulnerabilities in an android application having premium features leading towards approaching relevant authorities, disclosing all of the required details and solutions. It is to be noted that the application has been downloaded by more than 1.5...
  • Aug 9
    07:00 | Fathom5’s Maritime-Industrial CTF event allows competitors to gain hands-on experience hacking real maritime hardware in a controlled environment using Fathom5’s Grace maritime cybersecurity testbed. Grace is an accessible, realistic configuration of maritime systems where competitors complete challenges...
  • Aug 9
    07:00 | Zoom is a popular digital video conferencing company. Zoom has become one of the most valuable companies in the world during the pandemic, with millions of users and hundreds of millions of monthly participants globally.
    I have done a security research experiment in spare time to test Zoom and...
  • Aug 9
    08:15 | Want to learn the basics of how to hack cool industrial IOT, industrial control systems and technology that moves the world? How to find them, leverage weaknesses in protocols & systems. Turn engineer technical tools into dual use reconnaissance and attack tools. Components of energy grids, digital...
  • Aug 9
    09:30 | Title: Hacking Airplane Air To Ground (A2G) Systems

    Description:
    One of the most important parts of avionic systems is the communication. Airplanes use mobile communication to connect to stations on the ground. In many cases the connection is based on LTE-Advanced technology and in...
  • Aug 9
    09:30 | Penetration Testing (Pentesting) involves skilled cybersecurity professionals generating a plan of attack for finding and exploiting vulnerabilities in the networks, and applications. The current procedure used in pen-testing is semi-automated at best and requires significant human effort. Moreover,...
  • Aug 9
    10:00 | CTFs test your skills, challenge your ingenuity and push mental boundaries. But what is even MORE AWESOME than a regular CTF?

    A (CTF)2!! A competition that stretches your creative mind as a task author and makes you step up your game as a task player. This year, AppSec Village @ DEF CON...
  • Aug 9
    10:00 | Adversaries have gained a foothold in your local hospital and are increasing their control over clinical systems and medical devices. Soon they make it clear they’re not after patient records or financial information, but are out to disrupt care delivery and put patients lives at risk. Your team received...
  • Loading...
  • No more items.

Trending

Collapse

There are no results that meet this criteria.

Friends

Collapse

There are no results that meet this criteria.

Working...
X