HackersOnBoard
Hi there,
This collection deserves the research and training needs of the world global information security community.
If you hold copyright on anything here and want it removed, please contact us by message on YouTube and we'll do it quickly as we can.
We hope that you'll enjoy those amazing talk and learn a lot of useful information.
Regards...

DEF CON 27 - Stephan Huber - Im on Your Phone Listening Attacking VoIP Configuration Interfaces

DEF CON 27 - The Dark Tangent - Closing Ceremonies

DEF CON 27 - More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes

DEF CON 27 - Panel - Hacking Congress The Enemy Of My Enemy Is My Friend

DEF CON 27 - Pedro Cabrera Camara - SDR Against Smart TVs URL and Channel Injection Attacks

DEF CON 27 - Backdooring Hardware Devices By Injecting Malicious Payloads On Microcontrollers

DEF CON 27 - Xiling Gong - Exploiting Qualcomm WLAN and Modem Over The Air

DEF CON 27 - Patrick Wardle - Harnessing Weapons of Mac Destruction

DEF CON 27 - Xiaolong Bai - HackPac Hacking Pointer Authentication in iOS User Space

DEF CON 27 - Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors

DEF CON 27 - Wenxiang Qian - Breaking Google Home: Exploit It with SQLite(Magellan)

DEF CON 27 - Roger Dingledine - The Tor Censorship Arms Race The Next Chapter

DEF CON 27 - Behind the Scenes The Industry of Social Media Manipulation Driven by Malware

DEF CON 27 - WillC - Phreaking Elevators

DEF CON 27 - Truman Kain - Surveillance Detection Scout Your Lookout on Autopilot

DEF CON 27 - Intro to Embedded Hacking-How you can find a decade old bug in widely deployed devices

DEF CON 27 - All the things you wanted to know about the DEF CON NOC and we won't tell you about

DEF CON 27 - XiaoHuiHui - All the 4G Modules Could Be Hacked

DEF CON 27 - smea - Adventures In Smart Buttplug Penetration testing

DEF CON 27 - Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits

DEF CON 27 - Panel - DEFCON Wants to Help Hackers Anonymously Submit Bugs to the Government

DEF CON 27 - Can You Track Me Now? Why The Phone Companies Are Such A Privacy Disaster

DEF CON 27 - Nikhil Mittal - RACE - Minimal Rights and ACE for Active Directory Dominance

DEF CON 27 - Confessions of an Nespresso Money Mule Free Stuff and Triangulation Fraud

DEF CON 27 - No Mas How One Side-Channel Flaw Opens Atm Pharmacies & Government Secrets Up to Attack

DEF CON 27 - Infiltrating Corporate Intranet Like NSA _Pre-auth RCE on Leading SSL VPNs

DEF CON 27 - Omer Gull - SELECT code execution FROM USING SQLite

DEF CON 27 - Campbell Murray - GSM We Can Hear Everyone Now

DEF CON 27 - Bruce Schneier - Information Security in the Public Interest

DEF CON 27 - albinowax - HTTP Desync Attacks Smashing into the Cell Next Door