HackersOnBoard
Hi there,
This collection deserves the research and training needs of the world global information security community.
If you hold copyright on anything here and want it removed, please contact us by message on YouTube and we'll do it quickly as we can.
We hope that you'll enjoy those amazing talk and learn a lot of useful information.
Regards...                
 
        DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces
 
        DEF CON 27 - The Dark Tangent - Closing Ceremonies
 
        DEF CON 27 - More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes
 
        DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend
 
        DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks
 
        DEF CON 27 - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers
 
        DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air
 
        DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction
 
        DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space
 
        DEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors
 
        DEF CON 27 - Wenxiang Qian - Breaking Google Home: Exploit It with SQLite(Magellan)
 
        DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter
 
        DEF CON 27 - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware
 
        DEF CON 27 - WillC - Phreaking Elevators
 
        DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot
 
        DEF CON 27 - Intro to Embedded Hacking-How you can find a decade old bug in widely deployed devices
 
        DEF CON 27 - All the things you wanted to know about the DEF CON NOC and we won't tell you about
 
        DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked
 
        DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing
 
        DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits
 
        DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government
 
        DEF CON 27 - Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster
 
        DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance
 
        DEF CON 27 - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud
 
        DEF CON 27 - No Mas How One Side-Channel Flaw Opens Atm Pharmacies & Government Secrets Up to Attack
 
        DEF CON 27 - Infiltrating Corporate Intranet Like NSA _Pre-auth RCE on Leading SSL VPNs
 
        DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite
 
        DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now
 
        DEF CON 27 - Bruce Schneier - Information Security in the Public Interest
 
        DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door