11/12/2022 0 Comments Defcon 26 schedule![]() Putting this here for my IBM mainframe friend: “ Mainframe Reverse Engineering and Exploit Development” by Chad Rikansrud.Personally, I don’t need a stinking badge. Good post with links over at Borepatch’s site about the widely covered “voting machine vulnerabilities”.Īlso: badge related coverage if you care. More from Defiant, a company that was at DEFCON. In retrospect, that was better, because this story broke late in the afternoon: Caesars Palace security was (in the opinion of at least some DEFCON attendees) a little too aggressive about searching rooms. Then I got stuck in a gumption trap late in the day at work, and basically came home and collapsed. I intended to post this yesterday, but I wasn’t able to find many updates on my lunch hour. I apologize that I wasn’t able to post more coverage over the weekend: as I expected, it turned out to be fun, but packed. Posted in Bluetooth, Bookmarks, DEFCON, DEFCON 26, Radio | Comments Closed Content for “All your math are belong to us” with sghctoma is here: slides, white paper, and exploit code.Quote of the day: “Security solutions requiring significant behavioral changes are unlikely to be successful.” In which the authors analyze a bunch of skimmers confiscated by NYPD…and then build a device that can detect skimmers, based on nothing more than the physical properties of how card readers work. Also not a DEFCON presentation, but picked up by way of an Ars Technica story: “ Fear the Reaper: Characterization and Fast Detection of Card Skimmers” by Nolen Scaife, Christian Peeters, and Patrick Traynor.Slides for “Ring 0/-2 Rookits: Compromising Defenses” with Alexandre Borges are here. DEFCON 26 SCHEDULE BLUETOOTHThis isn’t an actual DEFCON 26 presentation, but it’s referenced in Vincent Tan’s “ Hacking BLE Bicycle Locks for Fun and a Small Profit”, and I want to bookmark it for later: “ Blue Picking: Hacking Bluetooth Smart Locks” by Slawomir Jasek.(The link on the Black Hat site is still borked.) Slides for “A Dive in to Hyper-V Architecture & Vulnerabilities” with Joe Bialek and Nicolas Joly can be found here. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |