defcon - Dave's Blog

Search
My timeline on Mastodon

The Secret Life of SIM Cards - DEFCON 21 - simhacks

2014 Aug 16, 1:07

A DEFCON talk “The Secret Life of SIM Cards” that covers running apps on your SIM card. Surprisingly they run a subset of Java and execute semi-independent of the Phone’s OS.

PermalinkCommentstechnical phone sim-card security java

Dynamic CSRF White Paper Posted — Portal

2009 Aug 21, 3:13"At Black Hat USA 2009 and Defcon 17 Nathan Hamiel and Shawn Moyer introduced an attack called Dynamic Cross-Site Request Forgery (CSRF). This white paper discusses the attack and discusses several Dynamic CSRF attack vectors." Seems to require sites trying to secure CSRF scenarios using session IDs in their URLs.PermalinkCommentssecurity csrf research browser web technical

Hijacking the Outdoor Digital Billboard Network, DefCon (Tottenkoph, Rev and Philosopher)

2008 Sep 22, 1:47Tottenkoph, Rev and Philosopher, "Hijacking the Outdoor Digital Billboard Network". DefCon talk presentation notes on hacking digital billboards.PermalinkCommentshack defcon security billboard

War Ballooning-Kismet Wireless "Eye in the Sky" (Rick Hill)

2008 Sep 22, 1:21Rick Hill, War Ballooning-Kismet Wireless "Eye in the Sky". Presentation notes from Rick Hill's DefCon talk on WarBallooning.PermalinkCommentshack balloon wireless warballoon defcon security

de-Tor-iorate Anonymity, DefCon, (Nathan Evans and Christian Grothoff)

2008 Sep 22, 1:21Nathan Evans and Christian Grothoff, de-Tor-iorate Anonymity. The presentation notes for a DefCon talk about an attack on Tor in which the attacker may discover Tor nodes used in a session.PermalinkCommentstor anonymity privacy security network defcon

Revealed: The Internet's Biggest Security Hole | Threat Level from Wired.com

2008 Aug 29, 8:37"Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency." Described fixes all require significant changes to the software and probably hardware doing the routing. UghPermalinkCommentswired article security internet bgp hack networking defcon

Welcome to DEF CON, the Largest Underground Hacking Convention in the World

2008 May 4, 10:35Video archives of DEFCON presentations.PermalinkCommentsvia:swannman security video feed defcon conference hack monthly
Older Entries Creative Commons License Some rights reserved.