InfoconDB
Toggle navigation
Support
About
InfoconDB
DEF CON
DEF CON 28
DEF CON 28 (2020)
Virtual
DEF CON 28
took place Aug. 6, 2020 through Aug. 9, 2020 (3 years, 11 months ago).
https://defcon.org/html/defcon-28/dc-28-index.html
https://www.youtube.com/playlist?list=PL9fPq3eQfaaBk9DFnyJRpxPi8Lz1n7cFv
https://infocon.org/cons/DEF CON/DEF CON 28/
https://infocon.org/cons/DEF CON/DEF CON 28/DEF CON Safe Mode program.pdf
Presentations
Thursday, Aug. 6, 2020
09:30 -
Discovering Hidden Properties to Attack Node.js ecosystem
10:30 -
Room for Escape: Scribbling Outside the Lines of Template Security
11:30 -
DNSSECTION: A practical attack on DNSSEC Zone Walking
12:30 -
Hacking the Hybrid Cloud
13:30 -
Hacking Traffic Lights
14:30 -
Hacking the Supply Chain - The Ripple20 Vulnerabilities Haunt Hundreds of Millions of Critical Devices
15:30 -
Demystifying Modern Windows Rootkits
16:30 -
Domain Fronting is Dead, Long Live Domain Fronting: Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
Friday, Aug. 7, 2020
10:30 -
Spectra-New Wireless Escalation Targets
11:30 -
Pwn2Own Qualcomm compute DSP for fun and profit
12:30 -
Detecting Fake 4G Base Stations in Real Time
13:30 -
When TLS Hacks You
14:30 -
Finding and Exploiting Bugs in Multiplayer Game Engines
15:30 -
Don't Be Silly - It's Only a Lightbulb
16:30 -
Exploiting Key Space Vulnerabilities in the Physical World
17:30 -
A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
18:30 -
Office Drama on macOS
20:00 -
D0 N0 H4RM: A Healthcare Security Conversation
21:00 -
Shrek, Juggs, and Toxic Trolls: a BADASS discussion about Online Sexuality and Hacktivism.
Saturday, Aug. 8, 2020
09:30 -
A Decade After Stuxnet's Printer Vulnerability: Printing is still the Stairway to Heaven
10:30 -
Whispers Among the Stars: Perpetrating (and Preventing) Satellite Eavesdropping Attacks
11:30 -
Don't Ruck Us Again - The Exploit Returns
12:30 -
Applied Ca$h Eviction through ATM Exploitation
13:30 -
How we recovered $XXX,000 in Bitcoin from an encrypted zip file
14:30 -
Abusing P2P to Hack 3 Million Cameras: Ain't Nobody Got Time for NAT
15:30 -
Bypassing Biometric Systems with 3D Printing and Enhanced Grease Attacks
16:30 -
Reverse Engineering the Tesla Battery Management System for Moar Powerrr!
17:30 -
Getting Shells on z/OS with Surrogat Chains
19:00 -
Ask the EFF/Meet the EFA
Sunday, Aug. 9, 2020
09:30 -
Evil Printer: How to Hack Windows Machines with Printing Protocol
10:30 -
Bytes In Disguise
11:30 -
Only takes a Spark - Popping a shell on a 1000 nodes
14:30 -
Beyond Root: Custom Firmware for Embedded Mobile Chipsets
15:30 -
Practical VoIP/UC Hacking Using Mr.SIP: SIP-Based Audit & Attack Tool
16:30 -
Lateral Movement and Privilege Escalation in GCP; Compromise any Organization Without Dropping an Implant
Presenters
Abi Hassen
Alexis Hancock
Allie Barnes
Allison Donovan
Alvaro Muñoz
Ariel Schön
Ash Luft
Ayoub Elaassal /
Ayoul3
Bill Demirkapi
Bill Graydon
Brenda So
Christian Dameff MD MS /
quaddi
Christopher Wade
Chuanda Ding
Cooper Quintin
Dylan Ayrey
Elie Bursztein
Elliot
Emilie St-Pierre
Erik Hunstad
Eva Galperin
Eyal Itkin
Feng Xiao
Francesco Gringoli
Gal Zror
Hadrien Barral
Hannah Zhao
Ismail Melih Tas
Jack Baker
Jake Labelle
James Pavur
Jeff Tully MD /
r3plicant
Jesse Michael /
@jessemichael
Jessica Wilkerson
Jiska Classen
Joshua Maddux
Katelyn Bowden /
Medus4
Kate Venable
Kubilay Ahmet Kucuk
Kurt Opsahl
Marleigh Farlow
Michael Stay
Mickey Shkatov
Moshe Kol
Nathan Sheard /
nash
Oleksandr Mirosh
Patrick Kiley
Patrick Wardle
Paul Marrapese
Peleg Hadar
Rachel Lamp
Rémi Géraud-Stewart
Rik van Duijn
Rory Mir
Sean Metcalf
Shlomi Oberman
Slava Makkaveev
Tim Doomsday
Tomer Bar
Tracy Rosenberg
Trey Keown
Veronica Schmitt
Vidya Murthy
Wesley Neelen
Yamila Levalle
Zhipeng Huo