📜 ⬆️ ⬇️

Video recordings of all speeches from the hacker Shmoocon conference 2016

Shmoocon - hacker conference, which ranks with Defcon, CCC, HOPE, Black Hat. This year, videos of all speeches from the conference were published on the Internet Archive. There are direct links to MP4 and OGG files, as well as torrent.

Below is a list of some reports. A little more detail about them can be found in the conference schedule (maybe someone will agree to annotate videos) and from the pages with links below.

List of reports


Nobody knows online that you're dead . Most hackers have massive possessions online: various infrastructure, servers, social media, accounts, and more. What happens when one of us dies?

The user is also a person: how to create your tools . Computer security programs are developed without taking into account the UX-design and the needs of ordinary "average" users.
')
Opening remarks by Professor Neil Gershenfeld (Neil Gershenfeld).

Difficult hacking: lessons and conclusions drawn after the epic investigation , when the hacker used PowerShell, WMI, Kerberos attacks, modern presence methods, practically unlimited C2 infrastructure and half a dozen constantly evolving malware families.

LTE Security and Protocols

LostPass: pixel-accurate LastPass phishing

Where do phishers live? Collecting geographical data about phisers from automated hanipots

OSX vulnerability research and why we wrote our own debugger

Examination of memory corruption vulnerabilities in the FreeRTOS operating system

Hiding from the investigator: Understanding code signing in OS X and iOS to hide data

Static analysis of mail via SMTP and malware using GPGPU

Reverse engineering of wireless SCADA systems

Creating an encyclopedia of configs for malware

My hash is my passport: understanding web and mobile authentication

This message will be destroyed in 10 seconds: avoid bilateral enucleation

Links to videos of other reports, see the Shmoocon 2016 page.

Source: https://habr.com/ru/post/390159/


All Articles