InfoconDB
Toggle navigation
Support
About
InfoconDB
DEF CON
DEF CON 28
DEF CON 28 (2020)
Virtual
DEF CON 28
took place Aug. 6, 2020 through Aug. 9, 2020 (3 years, 8 months ago) .
https://defcon.org/html/defcon-28/dc-28-index.html
https://www.youtube.com/playlist?list=PL9fPq3eQfaaBk9DFnyJRpxPi8Lz1n7cFv
https://infocon.org/cons/DEF CON/DEF CON 28/
https://infocon.org/cons/DEF CON/DEF CON 28/DEF CON Safe Mode program.pdf
Presentations
Thursday, Aug. 6, 2020
09:30 -
Discovering Hidden Properties to Attack Node.js ecosystem
10:30 -
Room for Escape: Scribbling Outside the Lines of Template Security
11:30 -
DNSSECTION: A practical attack on DNSSEC Zone Walking
12:30 -
Hacking the Hybrid Cloud
13:30 -
Hacking Traffic Lights
14:30 -
Hacking the Supply Chain - The Ripple20 Vulnerabilities Haunt Hundreds of Millions of Critical Devices
15:30 -
Demystifying Modern Windows Rootkits
16:30 -
Domain Fronting is Dead, Long Live Domain Fronting: Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
Friday, Aug. 7, 2020
10:30 -
Spectra-New Wireless Escalation Targets
11:30 -
Pwn2Own Qualcomm compute DSP for fun and profit
12:30 -
Detecting Fake 4G Base Stations in Real Time
13:30 -
When TLS Hacks You
14:30 -
Finding and Exploiting Bugs in Multiplayer Game Engines
15:30 -
Don't Be Silly - It's Only a Lightbulb
16:30 -
Exploiting Key Space Vulnerabilities in the Physical World
17:30 -
A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
18:30 -
Office Drama on macOS
20:00 -
D0 N0 H4RM: A Healthcare Security Conversation
21:00 -
Shrek, Juggs, and Toxic Trolls: a BADASS discussion about Online Sexuality and Hacktivism.
Saturday, Aug. 8, 2020
09:30 -
A Decade After Stuxnet's Printer Vulnerability: Printing is still the Stairway to Heaven
10:30 -
Whispers Among the Stars: Perpetrating (and Preventing) Satellite Eavesdropping Attacks
11:30 -
Don't Ruck Us Again - The Exploit Returns
12:30 -
Applied Ca$h Eviction through ATM Exploitation
13:30 -
How we recovered $XXX,000 in Bitcoin from an encrypted zip file
14:30 -
Abusing P2P to Hack 3 Million Cameras: Ain't Nobody Got Time for NAT
15:30 -
Bypassing Biometric Systems with 3D Printing and Enhanced Grease Attacks
16:30 -
Reverse Engineering the Tesla Battery Management System for Moar Powerrr!
17:30 -
Getting Shells on z/OS with Surrogat Chains
19:00 -
Ask the EFF/Meet the EFA
Sunday, Aug. 9, 2020
09:30 -
Evil Printer: How to Hack Windows Machines with Printing Protocol
10:30 -
Bytes In Disguise
11:30 -
Only takes a Spark - Popping a shell on a 1000 nodes
14:30 -
Beyond Root: Custom Firmware for Embedded Mobile Chipsets
15:30 -
Practical VoIP/UC Hacking Using Mr.SIP: SIP-Based Audit & Attack Tool
16:30 -
Lateral Movement and Privilege Escalation in GCP; Compromise any Organization Without Dropping an Implant
Presenters
Abi Hassen
Alexis Hancock
Allie Barnes
Allison Donovan
Alvaro Muñoz
Ariel Schön
Ash Luft
Ayoub Elaassal /
Ayoul3
Bill Demirkapi
Bill Graydon
Brenda So
Christian Dameff MD MS /
quaddi
Christopher Wade
Chuanda Ding
Cooper Quintin
Dylan Ayrey
Elie Bursztein
Elliot
Emilie St-Pierre
Erik Hunstad
Eva Galperin
Eyal Itkin
Feng Xiao
Francesco Gringoli
Gal Zror
Hadrien Barral
Hannah Zhao
Ismail Melih Tas
Jack Baker
Jake Labelle
James Pavur
Jeff Tully MD /
r3plicant
Jesse Michael /
@jessemichael
Jessica Wilkerson
Jiska Classen
Joshua Maddux
Katelyn Bowden /
Medus4
Kate Venable
Kubilay Ahmet Kucuk
Kurt Opsahl
Marleigh Farlow
Michael Stay
Mickey Shkatov
Moshe Kol
Nathan Sheard /
nash
Oleksandr Mirosh
Patrick Kiley
Patrick Wardle
Paul Marrapese
Peleg Hadar
Rachel Lamp
Rémi Géraud-Stewart
Rik van Duijn
Rory Mir
Sean Metcalf
Shlomi Oberman
Slava Makkaveev
Tim Doomsday
Tomer Bar
Tracy Rosenberg
Trey Keown
Veronica Schmitt
Vidya Murthy
Wesley Neelen
Yamila Levalle
Zhipeng Huo