Persisting with Microsoft Office: Abusing Extensibility Options
$BIGNUM steps forward, $TRUMPNUM steps back: how can we tell if we're winning?
Get-$pwnd: Attacking Battle-Hardened Windows Server
The spear to break the security wall of S7CommPlus
Welcome - Saturday
Breaking Wind: Adventures in Hacking Wind Farm Control Networks
WSUSpendu: How to hang WSUS clients
(Un)Fucking Forensics: Active/Passive (i.e. Offensive/Defensive) memory hacking/debugging.
The Surveillance Capitalism Will Continue Until Morale Improves
Microservices and FaaS for Offensive Security
Secure Tokin' and Doobiekeys: How to roll your own counterfeit hardware security devices
If You Give a Mouse a Microchip... It will execute a payload and cheat at your high-stakes video game tournament
Evading next-gen AV using artificial intelligence
WS: Implementing An Elliptic Curve in Go
Abusing Webhooks for Command and Control
All Your Things Are Belong To Us
Privacy is Not An Add-On: Designing for Privacy from the Ground Up
Driving down the rabbit hole
When Privacy Goes Poof! Why It's Gone and Never Coming Back
DNS - Devious Name Services - Destroying Privacy & Anonymity Without Your Consent
Operational Security Lessons from the Dark Web
WS: Secrets Management in the Cloud
Demystifying Windows Kernel Exploitation by Abusing GDI Objects.
Koadic C3 - Windows COM Command & Control Framework
Twenty Years of MMORPG Hacking: Better Graphics, Same Exploits
A Picture is Worth a Thousand Words, Literally: Deep Neural Networks for Social Stego
The Symantec/Chrome SSL debacle - how to do this better...
Attacking Autonomic Networks
Trojan-tolerant Hardware & Supply Chain Security in Practice
Linux-Stack Based V2X Framework: All You Need to Hack Connected Vehicles
XenoScan: Scanning Memory Like a Boss
Have you seen my naked selfies? Neither has my snoopy boyfriend. Pr
WS: SECURE COMMUNICATIONS IN ANDROID WITH TLS/SSL
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt)
Tracking Spies in the Skies
DOOMed Point of Sale Systems
Digital Vengeance: Exploiting the Most Notorious C&C Toolkits
DC to DEF CON: Q&A with Congressmen James Langevin and Will Hurd
Yet another password hashing talk
Core Illumination: Traffic Analysis in Cyberspace
Dealing the perfect hand - Shuffling memory blocks on z/OS
From "One Country - One Floppy" to "Startup Nation" - the story of the early days of the Israeli hacking community, and the journey towards today's vibrant startup scene
CableTap: Wirelessly Tapping Your Home Network
Game of Drones: Putting the Emerging "Drone Defense" Market to the Test
rustls: modern\, fast\, safer TLS
Here to stay: Gaining persistency by abusing advanced authentication mechanisms
Taking Windows 10 Kernel Exploitation to the next level - Leveraging write-what-where vulnerabilities in Creators Update
Introducing HUNT: Data Driven Web Hacking & Manual Testing
Popping a Smart Gun
Blue Team TLS Hugs
Automated Testing using Crypto Differential Fuzzing (DO NOT RECORD)
Panel - Meet the Feds (who care about security research)
D0 No H4RM: A Healthcare Security Conversation