21 min read

DEF CON 30-33 演講清單

DEF CON 30-33 演講清單

推薦指數說明: (與Claude AI討論過後)

  • ⭐⭐⭐⭐⭐ 強烈推薦 - 高度相關我的興趣
  • ⭐⭐⭐⭐ 推薦 - 很有價值
  • ⭐⭐⭐ 值得一看 - 有趣但不是核心領域

除了這邊與我興趣相關的300多個影片,其他還有將近50幾個影片,可以到官網直接查看喔!

media.defcon.org
All DEF CON video presentations, music, documentaries, pictures, villages, and Capture The Flag data that can be found.
年份 演講標題 推薦 領域
DEF CON 33 (2025) Claude - Climbing a CTF Scoreboard Near You ⭐⭐⭐⭐⭐ CTF/AI
DEF CON 33 (2025) Ghosts in the Machine Check - Hardware Failures for Privilege Escalation - Christopher Domas ⭐⭐⭐⭐⭐ 硬體安全/漏洞利用
DEF CON 33 (2025) Emulating Embedded Linux Devices at Scale with Light-Touch Firmware Rehosting ⭐⭐⭐⭐⭐ IoT/韌體分析
DEF CON 33 (2025) Hacking Hotspots - Pre-Auth RCE on 5G/4G Routers ⭐⭐⭐⭐⭐ IoT/路由器安全
DEF CON 33 (2025) DisguiseDelimit - Exploiting Synology NAS ⭐⭐⭐⭐⭐ IoT/NAS漏洞
DEF CON 33 (2025) De-Virtualizing the Dragon - Automated Unpacking and Deobfuscation ⭐⭐⭐⭐⭐ 逆向工程/自動化
DEF CON 33 (2025) 7 Vulns in 7 Days - Breaking Bloatware Faster ⭐⭐⭐⭐⭐ 漏洞研究方法論
DEF CON 33 (2025) Gateways to Chaos - Modems Are a Ticking Time Bomb ⭐⭐⭐⭐⭐ IoT/數據機安全
DEF CON 33 (2025) Exploiting Vulnerabilities in the EV Charging Communication ⭐⭐⭐⭐⭐ IoT/EV安全
DEF CON 33 (2025) From Spoofing to Tunneling - New Red Team Networking Techniques ⭐⭐⭐⭐⭐ 紅隊/網路攻擊
DEF CON 33 (2025) Jailbreaking the Hivemind - eBPF Kernel Vulnerabilities ⭐⭐⭐⭐⭐ Linux Kernel/漏洞利用
DEF CON 32 (2024) The XZ Backdoor Story - Undercover Operation ⭐⭐⭐⭐⭐ 供應鏈/後門
DEF CON 32 (2024) Unsaflok - Hacking millions of hotel locks ⭐⭐⭐⭐⭐ 實體安全/IoT
DEF CON 32 (2024) AMD Sinkclose - Universal Ring-2 Privilege Escalation ⭐⭐⭐⭐⭐ 硬體/CPU漏洞
DEF CON 32 (2024) Hacking Millions of Modems - Sam Curry ⭐⭐⭐⭐⭐ IoT/大規模漏洞
DEF CON 32 (2024) ACE up the Sleeve - iPhone 15 JTAG to USB-C Controller ⭐⭐⭐⭐⭐ 硬體/Apple
DEF CON 32 (2024) Iconv, set the charset to RCE - PHP engine exploit ⭐⭐⭐⭐⭐ Web/PHP漏洞
DEF CON 32 (2024) SQL Injection Isn't Dead - Protocol Level Smuggling ⭐⭐⭐⭐⭐ Web/SQL注入
DEF CON 32 (2024) 0.0.0.0 Day - Exploiting Localhost APIs From Browser ⭐⭐⭐⭐⭐ 瀏覽器/SSRF
DEF CON 32 (2024) Mobile Mesh RF Network Exploitation - goTenna ⭐⭐⭐⭐⭐ 無線/Mesh網路
DEF CON 32 (2024) Compromising Electronic Logging Device - Truck2Truck Worm ⭐⭐⭐⭐⭐ IoT/蠕蟲
DEF CON 32 (2024) Reverse Engineering MicroPython Frozen Modules ⭐⭐⭐⭐⭐ 逆向/Python
DEF CON 32 (2024) HookChain - New perspective for Bypassing EDR ⭐⭐⭐⭐⭐ 紅隊/EDR繞過
DEF CON 32 (2024) Sshamble - Unexpected Exposures in SSH ⭐⭐⭐⭐⭐ SSH/協議漏洞
DEF CON 31 (2023) Breaking BMC - The Forgotten Key to the Kingdom ⭐⭐⭐⭐⭐ 硬體/BMC
DEF CON 31 (2023) A Pain in the NAS - Exploiting Cloud Connectivity ⭐⭐⭐⭐⭐ NAS/雲端
DEF CON 31 (2023) Exploiting OPC-UA in Every Possible Way ⭐⭐⭐⭐⭐ 工控/OPC-UA
DEF CON 31 (2023) Getting a Migraine - SIP bypass on macOS ⭐⭐⭐⭐⭐ macOS/繞過
DEF CON 31 (2023) Smashing the state machine - web race conditions ⭐⭐⭐⭐⭐ Web/競爭條件
DEF CON 31 (2023) Contactless Overflow - Payment terminals over NFC ⭐⭐⭐⭐⭐ 支付/NFC
DEF CON 31 (2023) Cellular Carriers Hate This Trick - SIM tunneling ⭐⭐⭐⭐⭐ 電信/SIM
DEF CON 31 (2023) Advanced ROP Framework - Pushing ROP to Its Limits ⭐⭐⭐⭐⭐ 漏洞利用/ROP
DEF CON 31 (2023) Backdoor in the Core - Altering Intel x86 at Runtime ⭐⭐⭐⭐⭐ CPU/Intel
DEF CON 31 (2023) Over the Air, Under the Radar - Pixel Modem ⭐⭐⭐⭐⭐ 手機/Baseband
DEF CON 30 (2022) Black Box Security Evaluation of SpaceX Starlink ⭐⭐⭐⭐⭐ 衛星/太空
DEF CON 30 (2022) ElectroVolt - Pwning Desktop Apps on Electron ⭐⭐⭐⭐⭐ Electron/桌面應用
DEF CON 30 (2022) Browser-Powered Desync Attacks - HTTP Request Smuggling ⭐⭐⭐⭐⭐ Web/HTTP走私
DEF CON 30 (2022) The hitchhacker's guide to iPhone Lightning and JTAG ⭐⭐⭐⭐⭐ iPhone/硬體
DEF CON 30 (2022) Trailer Shouting - Talking PLC4TRUCKS with SDR ⭐⭐⭐⭐⭐ 車輛/SDR
DEF CON 30 (2022) Hacking the Farm - Agricultural Devices ⭐⭐⭐⭐⭐ 農業/IoT
DEF CON 30 (2022) Emoji Shellcoding ⭐⭐⭐⭐⭐ 漏洞利用/創意
DEF CON 30 (2022) Process Injection - Breaking MacOS Security Layers ⭐⭐⭐⭐⭐ macOS/注入
DEF CON 30 (2022) The PACMAN Attack - Breaking PAC on Apple M1 ⭐⭐⭐⭐⭐ Apple M1/硬體
DEF CON 30 (2022) One Bootloader to Load Them All ⭐⭐⭐⭐⭐ Bootloader/安全啟動
DEF CON 33 (2025) Ghost Calls - Abusing Web Conferencing for C2 ⭐⭐⭐⭐ 紅隊/C2技術
DEF CON 33 (2025) Ghosts of REvil - Inside Kaseya Ransomware Attack ⭐⭐⭐⭐ 勒索軟體/案例分析
DEF CON 33 (2025) HTTP/1.1 Must Die - The Desync Endgame ⭐⭐⭐⭐ Web安全/HTTP
DEF CON 33 (2025) Kill List - Hacking an Assassination Site on Dark Web ⭐⭐⭐⭐ 暗網/調查
DEF CON 33 (2025) macOS PRT Cookie Theft & Entra ID Persistence ⭐⭐⭐⭐ macOS/雲端安全
DEF CON 33 (2025) Loading Models, Launching Shells - Abusing AI File Formats ⭐⭐⭐⭐ AI安全/RCE
DEF CON 33 (2025) Metal-as-a-Disservice - Exploiting Legacy Flaws in Cutting-Edge Clouds ⭐⭐⭐⭐ 雲端安全
DEF CON 33 (2025) Advanced Active Directory to Entra ID lateral movement ⭐⭐⭐⭐ AD/橫向移動
DEF CON 33 (2025) BitUnlocker - Leveraging Windows Recovery to Extract BitLocker Secrets ⭐⭐⭐⭐ Windows安全/加密
DEF CON 33 (2025) Breakin 'Em All - Overcoming Pokemon Go's Anti-Cheat ⭐⭐⭐⭐ 遊戲安全/逆向
DEF CON 33 (2025) Breaking Wi-Fi Easy Connect - Security Analysis of DPP ⭐⭐⭐⭐ 無線安全/Wi-Fi
DEF CON 33 (2025) Can't Stop the ROP - Automating Universal ASLR Bypasses ⭐⭐⭐⭐ 漏洞利用/ROP
DEF CON 33 (2025) ChromeAlone - Transforming a Browser into a C2 Platform ⭐⭐⭐⭐ 紅隊/瀏覽器
DEF CON 33 (2025) Escaping the Privacy Sandbox with Client-Side Deanonymization ⭐⭐⭐⭐ 瀏覽器安全/隱私
DEF CON 33 (2025) Firewall flameout - China's 5+ year campaign ⭐⭐⭐⭐ 網路設備安全
DEF CON 33 (2025) Help Linux in my Webcam ⭐⭐⭐⭐ 硬體/嵌入式
DEF CON 33 (2025) Infecting the Boot to Own the Kernel - Bootkits ⭐⭐⭐⭐ Bootkit/Rootkit
DEF CON 33 (2025) Invitation Is All You Need - Invoking Gemini Agents ⭐⭐⭐⭐ AI安全/Google
DEF CON 33 (2025) Kill Chain Reloaded - Abusing legacy paths for persistence ⭐⭐⭐⭐ 紅隊/持久化
DEF CON 33 (2025) Man-in-the-Malware - Intercepting Adversarial Communications ⭐⭐⭐⭐ 惡意軟體分析
DEF CON 33 (2025) No VPN Needed - Cryptographic Attacks Against OPC UA Protocol ⭐⭐⭐⭐ 工控安全/密碼學
DEF CON 33 (2025) One Key, Two Key, I Just Stole Your goTenna Key ⭐⭐⭐⭐ 無線通訊/加密
DEF CON 33 (2025) Passkeys Pwned - Turning WebAuthn Against Itself ⭐⭐⭐⭐ Web認證/安全
DEF CON 33 (2025) Rebadged, Relabeled, and Rooted - Solar Supply Chain ⭐⭐⭐⭐ 供應鏈/太陽能
DEF CON 33 (2025) Recording PCAPs from Stingrays With a $20 Hotspot ⭐⭐⭐⭐ 無線/監控
DEF CON 33 (2025) ReVault Compromised by your Secure SoC ⭐⭐⭐⭐ 硬體安全
DEF CON 33 (2025) SCCM - The tree that always bears bad fruits ⭐⭐⭐⭐ Windows/企業安全
DEF CON 33 (2025) SSH-nanigans - Busting Open the Mainframes Iron Fortress ⭐⭐⭐⭐ SSH/大型主機
DEF CON 33 (2025) Turning Camera Surveillance on its Axis ⭐⭐⭐⭐ IoT/監控攝影機
DEF CON 33 (2025) Virtualization-Based (In)security - Weaponizing VBS Enclaves ⭐⭐⭐⭐ Windows/虛擬化
DEF CON 33 (2025) Win-DoS Epidemic - Abusing RPC for Win-DoS & Win-DDoS ⭐⭐⭐⭐ Windows/DoS
DEF CON 33 (2025) Zero Trust, Total Bust - Breaking cloud VPNs with one bug ⭐⭐⭐⭐ 雲端/VPN安全
DEF CON 32 (2024) Clash, Burn, and Exploit - kernelCTF ⭐⭐⭐⭐ Kernel/CTF
DEF CON 32 (2024) Dragon Slaying Guide - Bug Hunting In VMware ⭐⭐⭐⭐ 虛擬化/VMware
DEF CON 32 (2024) Exploiting Bluetooth - from car to bank account ⭐⭐⭐⭐ 藍牙/IoT
DEF CON 32 (2024) Grand Theft Actions - Abusing Self-Hosted GitHub Runners ⭐⭐⭐⭐ CI/CD/供應鏈
DEF CON 32 (2024) Behind Enemy Lines - Going undercover into LockBit ⭐⭐⭐⭐ 勒索軟體/臥底
DEF CON 32 (2024) Joe and Bruno's Guide to Hacking Time - RoboForm ⭐⭐⭐⭐ 密碼學/時間攻擊
DEF CON 32 (2024) Windows Downdate - Downgrade Attacks Using Windows Updates ⭐⭐⭐⭐ Windows/降級攻擊
DEF CON 32 (2024) Kicking in the Door to the Cloud - Cloud Provider Vulns ⭐⭐⭐⭐ 雲端安全
DEF CON 32 (2024) Automobiles, alcohol, blood, sweat - Car Modding tool reversing ⭐⭐⭐⭐ 汽車/逆向
DEF CON 32 (2024) Breaking the Beam - Exploiting VSAT Satellite Modems ⭐⭐⭐⭐ 衛星/無線
DEF CON 32 (2024) Defeating EDR - Memory Forensics ⭐⭐⭐⭐ 取證/EDR
DEF CON 32 (2024) Optical Espionage - Lasers to Hear Keystrokes ⭐⭐⭐⭐ 實體攻擊/監聽
DEF CON 32 (2024) QuickShell - RCE on Quick Share ⭐⭐⭐⭐ Android/檔案傳輸
DEF CON 32 (2024) Secrets and Shadows - Big Data for Vulnerability Discovery ⭐⭐⭐⭐ 漏洞研究/大數據
DEF CON 32 (2024) The Way To Android Root - Exploiting GPU on Smartphone ⭐⭐⭐⭐ Android/GPU漏洞
DEF CON 32 (2024) Xiaomi The Money - Pwn2Own Exploit Story ⭐⭐⭐⭐ 手機/Pwn2Own
DEF CON 32 (2024) AWS CloudQuarry - Secrets in public AMIs ⭐⭐⭐⭐ 雲端/AWS
DEF CON 32 (2024) Behind Enemy Lines - Engaging Ransomware Web Panels ⭐⭐⭐⭐ 勒索軟體/Web
DEF CON 32 (2024) BOLABuster - LLMs for Automating BOLA Detection ⭐⭐⭐⭐ API安全/AI
DEF CON 32 (2024) Breaching AWS Through Shadow Resources ⭐⭐⭐⭐ AWS/雲端
DEF CON 32 (2024) Creating Process Injection with ROP ⭐⭐⭐⭐ 漏洞利用/ROP
DEF CON 32 (2024) Defeating magic by magic - ALPC to compromise RPC ⭐⭐⭐⭐ Windows/RPC
DEF CON 32 (2024) Discovering exploits against 1Password MacOS ⭐⭐⭐⭐ macOS/密碼管理
DEF CON 32 (2024) DriverJack - NTFS as Infection Vector ⭐⭐⭐⭐ Windows/持久化
DEF CON 32 (2024) Exploiting the Unexploitable - Kibana Bug Bounty ⭐⭐⭐⭐ Web/Elasticsearch
DEF CON 32 (2024) Gotta Cache 'em all - web cache exploitation ⭐⭐⭐⭐ Web/快取投毒
DEF CON 32 (2024) Gridlock - EV and Solar APIs in Grid Security ⭐⭐⭐⭐ IoT/能源
DEF CON 32 (2024) Hacking Corporate Banking for Fun and Profit ⭐⭐⭐⭐ 金融/Web
DEF CON 32 (2024) High Intensity Deconstruction - Cryptographic Heist ⭐⭐⭐⭐ 密碼學/攻擊
DEF CON 32 (2024) Incubated ML Exploits - Backdooring ML Pipelines ⭐⭐⭐⭐ AI/ML安全
DEF CON 32 (2024) Inside FBI's Secret Phone Company 'Anom' ⭐⭐⭐⭐ 執法/加密
DEF CON 32 (2024) Mutual authentication is optional ⭐⭐⭐⭐ TLS/認證
DEF CON 32 (2024) Nano-Enigma - Secrets Within eFuse Memories ⭐⭐⭐⭐ 硬體/記憶體
DEF CON 32 (2024) No Symbols When Reversing - Bring Your Own ⭐⭐⭐⭐ 逆向工程
DEF CON 32 (2024) NTLM - The Last Ride ⭐⭐⭐⭐ Windows/認證
DEF CON 32 (2024) Obfuscation and De-Obfuscation ⭐⭐⭐⭐ 惡意軟體分析
DEF CON 32 (2024) OH-MY-DC - Abusing OIDC to your cloud ⭐⭐⭐⭐ 雲端/OIDC
DEF CON 32 (2024) One for All - WHAD wireless shenanigans ⭐⭐⭐⭐ 無線/SDR
DEF CON 32 (2024) Open Sesame - vulnerable electronic lockers ⭐⭐⭐⭐ IoT/實體安全
DEF CON 32 (2024) Outlook Unleashing RCE Chaos - CVE-2024-30103 ⭐⭐⭐⭐ Windows/Email
DEF CON 32 (2024) Redefining V2G - vehicle as a game controller ⭐⭐⭐⭐ 汽車/V2G
DEF CON 32 (2024) Relative Path File Injection - Next Evolution in RPO ⭐⭐⭐⭐ Web/路徑注入
DEF CON 32 (2024) SDLC Nightmares - GPT Hallucinations in Code Review ⭐⭐⭐⭐ AI/SDLC
DEF CON 32 (2024) Securing Frontends at Scale - Post-XSS World ⭐⭐⭐⭐ Web/前端安全
DEF CON 32 (2024) SHIM me what you got - Shim and Office Code Injection ⭐⭐⭐⭐ Windows/注入
DEF CON 32 (2024) Smishing Smackdown - USPS Smishing ⭐⭐⭐⭐ 釣魚/SMS
DEF CON 32 (2024) Speed Bumps and Speed Hacks - Car Manufacturers Security ⭐⭐⭐⭐ 汽車安全
DEF CON 32 (2024) Splitting the email atom - exploiting parsers ⭐⭐⭐⭐ Email/解析器
DEF CON 32 (2024) Sudos and Sudon'ts - Sudo for Windows ⭐⭐⭐⭐ Windows/權限
DEF CON 32 (2024) Taming the Beast - Llama 3 Red Team ⭐⭐⭐⭐ AI/紅隊
DEF CON 32 (2024) The hack, the crash and two smoking barrels ⭐⭐⭐⭐ 駭客故事
DEF CON 32 (2024) The not-so-silent type - Chinese keyboard apps crypto ⭐⭐⭐⭐ 密碼學/隱私
DEF CON 32 (2024) The Secret Life of a Rogue Device ⭐⭐⭐⭐ 供應鏈/二手設備
DEF CON 32 (2024) Ticking SQLi ⭐⭐⭐⭐ Web/SQL注入
DEF CON 32 (2024) Troll Trapping Through TAS Tools - Speedrunning Cheaters ⭐⭐⭐⭐ 遊戲/反作弊
DEF CON 32 (2024) Unlocking the Gates - Industrial Remote Access ⭐⭐⭐⭐ 工控/遠端存取
DEF CON 32 (2024) Unlocking the Gates - Authentication Bypass Vulns ⭐⭐⭐⭐ Web/認證繞過
DEF CON 32 (2024) Watchers being watched - Surveillance System supply chain ⭐⭐⭐⭐ IoT/監控
DEF CON 32 (2024) When Chatbots Go Rogue - LLM Applications ⭐⭐⭐⭐ AI/LLM安全
DEF CON 32 (2024) Your AI Assistant has a Big Mouth - Side-Channel ⭐⭐⭐⭐ AI/側信道
DEF CON 32 (2024) Your CI-CD Pipeline Is Vulnerable ⭐⭐⭐⭐ DevOps/CI/CD
DEF CON 31 (2023) Retro Exploitation - Vintage Computing as Research Playground ⭐⭐⭐⭐ 復古/研究方法
DEF CON 31 (2023) Vacuum Robot Security - Prevent robot from sucking data ⭐⭐⭐⭐ IoT/掃地機器人
DEF CON 31 (2023) Video-based Cryptanalysis - Extracting Keys from Power LEDs ⭐⭐⭐⭐ 側信道/視覺
DEF CON 31 (2023) Unlocking hidden powers in Xtensa Qualcomm Wifi chips ⭐⭐⭐⭐ Wi-Fi/晶片
DEF CON 31 (2023) Nothing but Net - Detecting macOS Malware ⭐⭐⭐⭐ macOS/偵測
DEF CON 31 (2023) NoFilter - Abusing Windows Filtering Platform ⭐⭐⭐⭐ Windows/權限提升
DEF CON 31 (2023) A Comprehensive Review - 9 Years of MikroTik Pre-Auth RCE ⭐⭐⭐⭐ 路由器/MikroTik
DEF CON 31 (2023) A SSLippery Slope - Certificate Misuse ⭐⭐⭐⭐ TLS/憑證
DEF CON 31 (2023) Apple's Predicament - NSPredicate on macOS and iOS ⭐⭐⭐⭐ Apple/漏洞利用
DEF CON 31 (2023) Azure B2C 0-Day - Public Keys to Microsoft Bug Bounty ⭐⭐⭐⭐ Azure/雲端
DEF CON 31 (2023) Badge of Shame - Breaking into Facilities with OSDP ⭐⭐⭐⭐ 實體安全/門禁
DEF CON 31 (2023) Calling it a 0-Day - Hacking PBX-UC Systems ⭐⭐⭐⭐ VoIP/PBX
DEF CON 31 (2023) certmitm - Automatic TLS certificate validation exploits ⭐⭐⭐⭐ TLS/中間人
DEF CON 31 (2023) CON Trolling the Weather ⭐⭐⭐⭐ IoT/氣象
DEF CON 31 (2023) Contain Yourself - Windows Container Isolation ⭐⭐⭐⭐ Windows/容器
DEF CON 31 (2023) Defender-Pretender - Windows Defender Updates Security Risk ⭐⭐⭐⭐ Windows/Defender
DEF CON 31 (2023) Defeating VPN Always-On ⭐⭐⭐⭐ VPN/繞過
DEF CON 31 (2023) Demystifying macOS's Background Task Management ⭐⭐⭐⭐ macOS/持久化
DEF CON 31 (2023) ELECTRONizing macOS privacy ⭐⭐⭐⭐ macOS/Electron
DEF CON 31 (2023) Exploring Linux Memory Manipulation ⭐⭐⭐⭐ Linux/記憶體
DEF CON 31 (2023) From Feature to Weapon - MS Teams and SharePoint ⭐⭐⭐⭐ Microsoft/雲端
DEF CON 31 (2023) Game-Changing Advances in Windows Shellcode Analysis ⭐⭐⭐⭐ Windows/Shellcode
DEF CON 31 (2023) GhostToken - Exploiting Google Cloud Platform ⭐⭐⭐⭐ GCP/雲端
DEF CON 31 (2023) I Watched You Roll the Die - RDP Monitoring ⭐⭐⭐⭐ Windows/RDP
DEF CON 31 (2023) Malware design - Abusing legacy Microsoft transports ⭐⭐⭐⭐ Windows/惡意軟體
DEF CON 31 (2023) mTLS - When Certificate Authentication Is Done Wrong ⭐⭐⭐⭐ TLS/mTLS
DEF CON 31 (2023) ndays are also 0days ⭐⭐⭐⭐ 漏洞利用/N-day
DEF CON 31 (2023) Physical Attacks Against Smartphones ⭐⭐⭐⭐ 手機/實體攻擊
DEF CON 31 (2023) Polynonce - An ECDSA Attack ⭐⭐⭐⭐ 密碼學/ECDSA
DEF CON 31 (2023) Private Keys in Public Places ⭐⭐⭐⭐ 密鑰管理
DEF CON 31 (2023) Revolutionizing ELF binary patching with Shiva ⭐⭐⭐⭐ Linux/二進位
DEF CON 31 (2023) Route to Bugs - BGP message parsing security ⭐⭐⭐⭐ 網路/BGP
DEF CON 31 (2023) Runtime Riddles - Manipulation Points in Android ⭐⭐⭐⭐ Android/運行時
DEF CON 31 (2023) Second Breakfast - Serialization Vulnerabilities in .NET ⭐⭐⭐⭐ .NET/反序列化
DEF CON 31 (2023) Silent Spring - Prototype Pollution in Node.js ⭐⭐⭐⭐ Node.js/Web
DEF CON 31 (2023) Small Leaks, Billions Of Dollars ⭐⭐⭐⭐ 密碼學/側信道
DEF CON 31 (2023) SpamChannel - Spoofing Emails From 2M Domains ⭐⭐⭐⭐ Email/欺騙
DEF CON 31 (2023) Spooky authentication at a distance ⭐⭐⭐⭐ 認證/中繼
DEF CON 31 (2023) StackMoonwalk ⭐⭐⭐⭐ 漏洞利用/Stack
DEF CON 31 (2023) Still Vulnerable Out of the Box ⭐⭐⭐⭐ 系統/預設配置
DEF CON 31 (2023) Terminally Owned - 60 years of escaping ⭐⭐⭐⭐ 終端機/逃逸
DEF CON 31 (2023) Tetra Tour de Force ⭐⭐⭐⭐ 無線/TETRA
DEF CON 31 (2023) The Art of Compromising C2 Servers ⭐⭐⭐⭐ 紅隊/C2
DEF CON 31 (2023) The GitHub Actions Worm ⭐⭐⭐⭐ CI/CD/供應鏈
DEF CON 31 (2023) The Price of Convenience - Transportation Payment Systems ⭐⭐⭐⭐ 支付/交通
DEF CON 31 (2023) The RingHopper Journey - Almost Zero-Day'd the World ⭐⭐⭐⭐ 漏洞研究
DEF CON 31 (2023) Track the Planet - Mapping Azure Ecosystem ⭐⭐⭐⭐ Azure/OSINT
DEF CON 31 (2023) Turning my virtual wallet into a skimming device ⭐⭐⭐⭐ 支付/mPOS
DEF CON 31 (2023) Unlocking Doors from Half a Continent Away ⭐⭐⭐⭐ IoT/門鎖
DEF CON 31 (2023) Visual Studio Code Workspace Trust issues ⭐⭐⭐⭐ VSCode/供應鏈
DEF CON 31 (2023) Warshopping - Smart Shopping Cart Wheels ⭐⭐⭐⭐ IoT/RF
DEF CON 31 (2023) Weaponizing Plain Text - ANSI Escape Sequences ⭐⭐⭐⭐ 終端機/取證
DEF CON 31 (2023) You Can't Cheat Time - latency trilateration ⭐⭐⭐⭐ 網路/地理定位
DEF CON 31 (2023) Your Clocks Have Ears - Timing-Based Port Scanner ⭐⭐⭐⭐ 瀏覽器/側信道
DEF CON 30 (2022) All Roads Lead to GKE's Host - 4 Ways to Escape ⭐⭐⭐⭐ Kubernetes/容器逃逸
DEF CON 30 (2022) Avoiding Memory Scanners - Customizing Malware ⭐⭐⭐⭐ 惡意軟體/EDR繞過
DEF CON 30 (2022) Defeating Moving Elements in High Security Keys ⭐⭐⭐⭐ 實體安全/鎖
DEF CON 30 (2022) Emulation-driven Reverse Engineering for Vulns ⭐⭐⭐⭐ 逆向/模擬
DEF CON 30 (2022) Exploring Ancient Ruins - 0-Day in MS-RPC ⭐⭐⭐⭐ Windows/RPC
DEF CON 30 (2022) LSASS Shtinkering - Windows Error Reporting to Dump LSASS ⭐⭐⭐⭐ Windows/憑證竊取
DEF CON 30 (2022) The Journey From Container to Cluster Admin in Service Fabric ⭐⭐⭐⭐ Azure/容器
DEF CON 30 (2022) Old Malware, New Tools - Ghidra and Commodore 64 ⭐⭐⭐⭐ 復古/Ghidra
DEF CON 30 (2022) Pulling Passwords from Configuration Manager ⭐⭐⭐⭐ Microsoft SCCM
DEF CON 30 (2022) Backdooring Pickles - A decade only made things worse ⭐⭐⭐⭐ Python/反序列化
DEF CON 30 (2022) The Call is Coming From Inside The Cluster ⭐⭐⭐⭐ Kubernetes/安全
DEF CON 30 (2022) Black-Box Assessment of Smart Cards ⭐⭐⭐⭐ 智慧卡
DEF CON 30 (2022) Hunting Bugs in The Tropics ⭐⭐⭐⭐ Bug Hunting
DEF CON 30 (2022) The CSRF Resurrections - Service Worker, SameSite, Fetch ⭐⭐⭐⭐ Web/CSRF
DEF CON 30 (2022) Space Jam - RF Attacks in Outer Space ⭐⭐⭐⭐ 太空/衛星
DEF CON 30 (2022) The COW - Container On Windows Escaped the Silo ⭐⭐⭐⭐ Windows/容器
DEF CON 30 (2022) You Have 1 New Appwntment - Hacking iCalendar ⭐⭐⭐⭐ Email/行事曆
DEF CON 30 (2022) Hacking ISPs with PPPoE ⭐⭐⭐⭐ ISP/網路
DEF CON 30 (2022) Deanonymization of Tor HTTP Hidden Services ⭐⭐⭐⭐ Tor/去匿名化
DEF CON 30 (2022) Do Not Trust the ASA, Trojans ⭐⭐⭐⭐ Cisco/網路設備
DEF CON 30 (2022) Doing the Impossible - Mainframe Buffer Overflows ⭐⭐⭐⭐ 大型主機
DEF CON 30 (2022) Tear Down this Zywall - Zyxel Encrypted Firmware ⭐⭐⭐⭐ 韌體/加密
DEF CON 30 (2022) PreAuth RCE Chains on MDM - KACE SMA ⭐⭐⭐⭐ MDM/企業
DEF CON 30 (2022) Chromebook Breakout - Escaping Jail Using Pico Ducky ⭐⭐⭐⭐ Chromebook/USB
DEF CON 30 (2022) Analyzing PIPEDREAM - ICS Attack Toolkit ⭐⭐⭐⭐ 工控/惡意軟體
DEF CON 30 (2022) Automotive Ethernet Fuzzing ⭐⭐⭐⭐ 汽車/Fuzzing
DEF CON 30 (2022) Wireless Keystroke Injection via BLE ⭐⭐⭐⭐ 藍牙/HID
DEF CON 30 (2022) Hack the Hemisphere ⭐⭐⭐⭐ 監控/隱私
DEF CON 30 (2022) Internet Server Error - IPC Desynch Primitives ⭐⭐⭐⭐ Web/解析器
DEF CON 30 (2022) Taking a Dump In The Cloud ⭐⭐⭐⭐ 雲端/資料竊取
DEF CON 30 (2022) Digital Skeleton Keys ⭐⭐⭐⭐ RFID/NFC
DEF CON 30 (2022) Low Code High Risk - Enterprise Donation via Low Code ⭐⭐⭐⭐ 低程式碼/Power Platform
DEF CON 30 (2022) No-Code Malware - Windows 11 At Your Service ⭐⭐⭐⭐ Windows/無程式碼
DEF CON 30 (2022) The Big Rick - Rickrolled My High School District ⭐⭐⭐⭐ 社會工程
DEF CON 30 (2022) Phreaking 2.0 - Abusing Microsoft Teams Direct Routing ⭐⭐⭐⭐ VoIP/Teams
DEF CON 30 (2022) Less SmartScreen More Caffeine - ClickOnce ⭐⭐⭐⭐ Windows/繞過
DEF CON 30 (2022) Defaults - The Faults - Bypassing Android Permissions ⭐⭐⭐⭐ Android/權限
DEF CON 30 (2022) Hidden Attack Surfaces of OEM IoT Devices ⭐⭐⭐⭐ IoT/供應鏈
DEF CON 30 (2022) Running Rootkits Like A Nation-State Hacker ⭐⭐⭐⭐ Rootkit/Windows
DEF CON 30 (2022) Let's Dance in the Cache - MS IIS Hash Table ⭐⭐⭐⭐ Web/IIS
DEF CON 30 (2022) You Are Muted - Rooted ⭐⭐⭐⭐ macOS/攝影機
DEF CON 30 (2022) Deja Vu - Stolen Algorithms in Commercial Products ⭐⭐⭐⭐ 智財權/逆向
DEF CON 30 (2022) Weaponizing Windows Syscalls as 32-bit Shellcode ⭐⭐⭐⭐ Windows/Shellcode
DEF CON 30 (2022) Trace me if you can - Bypassing Linux Syscall Tracing ⭐⭐⭐⭐ Linux/反偵測
DEF CON 30 (2022) How Russia is trying to Block Tor ⭐⭐⭐⭐ Tor/審查
DEF CON 30 (2022) Darknet Opsec By a Veteran Darknet Vendor ⭐⭐⭐⭐ 暗網/OPSEC
DEF CON 30 (2022) Perimeter Breached - Hacking Access Control System ⭐⭐⭐⭐ 實體安全/門禁
DEF CON 30 (2022) Crossing the KASM - a Webapp Pentest Story ⭐⭐⭐⭐ Web/滲透測試
DEF CON 30 (2022) Evil PLC Attacks - Weaponizing PLCs ⭐⭐⭐⭐ 工控/PLC
DEF CON 30 (2022) Digging into Xiaomi's TEE to Get to Chinese Money ⭐⭐⭐⭐ 手機/TEE
DEF CON 30 (2022) STrace - A DTrace on windows reimplementation ⭐⭐⭐⭐ Windows/追蹤
DEF CON 30 (2022) Solana JIT - fuzzing smart-contract compiler ⭐⭐⭐⭐ 區塊鏈/Fuzzing
DEF CON 30 (2022) OopsSec - APTs operations security ⭐⭐⭐⭐ 威脅情報/OPSEC
DEF CON 30 (2022) Reversing the Original Xbox Live Protocols ⭐⭐⭐⭐ 遊戲/逆向
DEF CON 30 (2022) Save The Environment Variable - Hijacking Apps ⭐⭐⭐⭐ Windows/持久化
DEF CON 30 (2022) A Dead Man's Full-Yet-Responsible-Disclosure System ⭐⭐⭐⭐ 漏洞揭露/倫理
DEF CON 30 (2022) How To Get MUMPS Thirty Years Later ⭐⭐⭐⭐ 程式語言/醫療
DEF CON 33 (2025) 40 Years Of Phrack - Hacking, Zines & Digital Dissent ⭐⭐⭐ 駭客文化/歷史
DEF CON 33 (2025) AppleStorm - Unmasking Privacy Risks of Apple Intelligence ⭐⭐⭐ Apple/AI隱私
DEF CON 33 (2025) Binary Facades - Reversing macOS malware ⭐⭐⭐ macOS/惡意軟體
DEF CON 33 (2025) Browser Extension Clickjacking ⭐⭐⭐ 瀏覽器/擴充套件
DEF CON 33 (2025) Building a Malware Museum ⭐⭐⭐ 惡意軟體/歷史
DEF CON 33 (2025) Carding, Sabotage & Survival - Darknet Market Story ⭐⭐⭐ 暗網/社會工程
DEF CON 33 (2025) Cash, Drugs, and Guns - Why Your Safes Aren't Safe ⭐⭐⭐ 實體安全
DEF CON 33 (2025) CTRAPS - CTAP Impersonation on FIDO2 ⭐⭐⭐ 認證/FIDO2
DEF CON 33 (2025) Cyber Volunteering and Community Defense ⭐⭐⭐ 社群/防禦
DEF CON 33 (2025) Dead Made Alive Again - LaunchAnyWhere Privilege Escalation ⭐⭐⭐ Android/權限提升
DEF CON 33 (2025) Diamonds Are For Hackers - Open source Quantum Sensor ⭐⭐⭐ 量子/硬體
DEF CON 33 (2025) Direct Memory, Access Everywhere ⭐⭐⭐ 硬體/DMA
DEF CON 33 (2025) Edge of Tomorrow - Foiling Supply Chain Attacks ⭐⭐⭐ 供應鏈安全
DEF CON 33 (2025) Exploiting Security Side-Channels in E2E Encrypted Messengers ⭐⭐⭐ 密碼學/通訊
DEF CON 33 (2025) From Shanghai to the Shore - Silent Threat in Global Shipping ⭐⭐⭐ 海運/供應鏈
DEF CON 33 (2025) How to Fake a Badge like a Pro ⭐⭐⭐ 實體安全
DEF CON 33 (2025) How to secure unique ecosystem shipping 1 billion cores ⭐⭐⭐ ARM/安全
DEF CON 33 (2025) Inside Look at a Chinese Operational Relay Network ⭐⭐⭐ 網路情報
DEF CON 33 (2025) Journey to the center of the PSTN - Becoming a phone company ⭐⭐⭐ 電信/Phreaking
DEF CON 33 (2025) Killing Killnet ⭐⭐⭐ 威脅情報
DEF CON 33 (2025) LLM Identifies Information Stealer Vector & Extracts IoCs ⭐⭐⭐ AI/惡意軟體分析
DEF CON 33 (2025) Making the DEF CON 33 Badge ⭐⭐⭐ 硬體/Badge
DEF CON 33 (2025) Mastering Apple's Endpoint Security for macOS Malware Detection ⭐⭐⭐ macOS/偵測
DEF CON 33 (2025) Mind the Data Voids - Hijacking Copilot Trust ⭐⭐⭐ AI/供應鏈
DEF CON 33 (2025) Not Just a Pipeline Leak - tj-actions Attack ⭐⭐⭐ CI/CD安全
DEF CON 33 (2025) Orion - fuzzing workflow automation ⭐⭐⭐ Fuzzing/自動化
DEF CON 33 (2025) OverLAPS - Overriding LAPS Logic ⭐⭐⭐ Windows/AD
DEF CON 33 (2025) Paywall Optional - Recursive Request Exploits ⭐⭐⭐ Web安全
DEF CON 33 (2025) Planting C4 - Cross-Compatible External C2 ⭐⭐⭐ 紅隊/C2
DEF CON 33 (2025) Playing Dirty Without Cheating - Getting Banned ⭐⭐⭐ 遊戲安全
DEF CON 33 (2025) RATs & Socks abusing Google Services ⭐⭐⭐ 惡意軟體/Google
DEF CON 33 (2025) Remote code execution via MIDI messages ⭐⭐⭐ 音訊/RCE
DEF CON 33 (2025) Rusty pearls - Postgres RCE on cloud databases ⭐⭐⭐ 資料庫/雲端
DEF CON 33 (2025) Safe Harbor or Hostile Waters - PyTorch TorchScript ⭐⭐⭐ AI/Python
DEF CON 33 (2025) Shaking Out Shells with SSHamble ⭐⭐⭐ SSH/漏洞
DEF CON 33 (2025) Silent Leaks - Harvesting Secrets from Shared Linux ⭐⭐⭐ Linux/資訊洩漏
DEF CON 33 (2025) Siri-ously Leaky - Apple Ecosystem Attack Surfaces ⭐⭐⭐ Apple/隱私
DEF CON 33 (2025) So Long, and Thanks for All the Phish ⭐⭐⭐ 釣魚/社交工程
DEF CON 33 (2025) Stories from a Tor dev ⭐⭐⭐ Tor/隱私
DEF CON 33 (2025) The (Un)Rightful Heir - dMSA Is Your New Domain Admin ⭐⭐⭐ AD安全
DEF CON 33 (2025) The DOMino Effect - DOM Clobbering at Scale ⭐⭐⭐ Web安全
DEF CON 33 (2025) The One Bitcoin Heist - Hashcat puzzle solving ⭐⭐⭐ 密碼學/Bitcoin
DEF CON 33 (2025) The Ultimate Hack - Maritime Cybersecurity from TITAN ⭐⭐⭐ 海運/OT安全
DEF CON 33 (2025) Thinking Like a Hacker in the Age of AI ⭐⭐⭐ AI/哲學
DEF CON 33 (2025) TSPU - Russia's Firewall ⭐⭐⭐ 審查/網路
DEF CON 33 (2025) Turning Microsoft's Login Page into Phishing Infrastructure ⭐⭐⭐ 釣魚/Microsoft
DEF CON 33 (2025) Turning your Active Directory into attacker's C2 ⭐⭐⭐ AD/紅隊
DEF CON 33 (2025) Unmasking the Snitch Puck - IoT surveillance in school bathroom ⭐⭐⭐ IoT/隱私
DEF CON 33 (2025) Voice Cloning Air Traffic Control ⭐⭐⭐ AI/航空安全
DEF CON 33 (2025) Weaponizing Trust - Threat Actor Targeting Researchers ⭐⭐⭐ 威脅情報
DEF CON 33 (2025) What is Dead May Never Die - Ghost of IE in Windows ⭐⭐⭐ Windows/瀏覽器
DEF CON 33 (2025) Winners of DARPA's AI Cyber Challenge ⭐⭐⭐ AI/競賽
DEF CON 33 (2025) You snooze you lose - RPC-Racer winning RPC endpoints ⭐⭐⭐ Windows/Race Condition
DEF CON 32 (2024) A Shadow Librarian - Fighting capitalism ⭐⭐⭐ 社會/圖書館
DEF CON 32 (2024) A Treasure Trove of Failures - Defense In Depth ⭐⭐⭐ 防禦策略
DEF CON 32 (2024) Abusing legacy railroad signaling systems ⭐⭐⭐ 鐵路/OT
DEF CON 32 (2024) Access Control Done Right ⭐⭐⭐ 存取控制
DEF CON 32 (2024) Atomic Honeypot - MySQL Honeypot ⭐⭐⭐ 資料庫/蜜罐
DEF CON 32 (2024) Counter Deception - World Full of Lies ⭐⭐⭐ 反欺騙
DEF CON 32 (2024) Digital Emblems - markings under international law ⭐⭐⭐ 國際法/網路
DEF CON 32 (2024) Disenshittify or die - Cory Doctorow ⭐⭐⭐ 政策/科技
DEF CON 32 (2024) DIY Pharmaceuticals ⭐⭐⭐ 醫療/DIY
DEF CON 32 (2024) Encrypted newspaper ads in 19th century ⭐⭐⭐ 密碼學/歷史
DEF CON 32 (2024) Engineers & Exploits - Quest for Security ⭐⭐⭐ 工程/安全
DEF CON 32 (2024) Evolution of RF Signal Visualization ⭐⭐⭐ 無線/視覺化
DEF CON 32 (2024) Fine Grained Authorisation with RBAC ⭐⭐⭐ 授權/存取控制
DEF CON 32 (2024) How To Keep IoT From Becoming Internet of Trash ⭐⭐⭐ IoT/政策
DEF CON 32 (2024) I've got 99 problems but prompt injection ain't one ⭐⭐⭐ AI/Prompt注入
DEF CON 32 (2024) Laundering Money ⭐⭐⭐ 金融犯罪
DEF CON 32 (2024) Leveraging private APNs for traffic analysis ⭐⭐⭐ 行動網路/監控
DEF CON 32 (2024) Making The DEF CON 32 Badge ⭐⭐⭐ 硬體/Badge
DEF CON 32 (2024) Maturing Your Application Security Program ⭐⭐⭐ AppSec/流程
DEF CON 32 (2024) Measuring the Tor Network ⭐⭐⭐ Tor/隱私
DEF CON 32 (2024) Navigating Cyber Security Labyrinth ⭐⭐⭐ 職涯/教育
DEF CON 32 (2024) On Your Ocean's 11 Team, I'm the AI Guy ⭐⭐⭐ AI/創意
DEF CON 32 (2024) Prime Cuts from Hacker History - 40 Years of Cult of Dead Cow ⭐⭐⭐ 駭客文化
DEF CON 32 (2024) Protecting Everything as Code & Emerging Tech ⭐⭐⭐ DevOps/安全
DEF CON 32 (2024) Securing CCTV Cameras Against Blind Spots ⭐⭐⭐ 監控/IoT
DEF CON 32 (2024) Social Engineering Like You're Picard ⭐⭐⭐ 社交工程
DEF CON 32 (2024) Solving Murder with strings, grep, and Perl ⭐⭐⭐ 取證/案例
DEF CON 32 (2024) The Darkest Side of Bug Bounty ⭐⭐⭐ Bug Bounty
DEF CON 32 (2024) The Immortal Retrofuturism of Mainframe Computers ⭐⭐⭐ 大型主機
DEF CON 32 (2024) The Missing Link - How we leverage SBOMs ⭐⭐⭐ 供應鏈/SBOM
DEF CON 32 (2024) The Rise and Fall of Binary Exploitation ⭐⭐⭐ 漏洞利用/歷史
DEF CON 32 (2024) Uncharted Territory - Hacking Transportation ⭐⭐⭐ 交通/安全
DEF CON 32 (2024) Using EPSS for Vulnerability Management ⭐⭐⭐ 漏洞管理
DEF CON 32 (2024) War Games - Red Team for OT ⭐⭐⭐ OT/紅隊
DEF CON 32 (2024) Web2 Meets Web3 - Hacking DApps ⭐⭐⭐ 區塊鏈/Web3
DEF CON 32 (2024) Why are you still using my server for internet access ⭐⭐⭐ 網路/濫用
DEF CON 32 (2024) Winning big - AppSec from Casino Industry ⭐⭐⭐ AppSec/產業
DEF CON 31 (2023) A Broken Marriage - Abusing Mixed Vendor Kerberos ⭐⭐⭐ AD/Kerberos
DEF CON 31 (2023) A Different Uber Post Mortem ⭐⭐⭐ 事件回應
DEF CON 31 (2023) A Series of Unfortunate Events ⭐⭐⭐ Bug Bounty
DEF CON 31 (2023) An Audacious Plan to Halt Internet's Enshittification ⭐⭐⭐ 政策/Cory Doctorow
DEF CON 31 (2023) Assessing Security of Certificates at Scale ⭐⭐⭐ TLS/大規模
DEF CON 31 (2023) Boston Infinite Money Glitch ⭐⭐⭐ 支付/漏洞
DEF CON 31 (2023) Burrowing Through Network - Vulkan Leaks ⭐⭐⭐ 威脅情報
DEF CON 31 (2023) Civil Cyber Defense ⭐⭐⭐ 政策/防禦
DEF CON 31 (2023) Cracking Cicada 3301 ⭐⭐⭐ 謎題/協作
DEF CON 31 (2023) Damned if you do - risks of pointing out ⭐⭐⭐ 倫理/揭露
DEF CON 31 (2023) Defending KA-SAT ⭐⭐⭐ 衛星/防禦
DEF CON 31 (2023) Designing RFID Implants ⭐⭐⭐ RFID/生物駭客
DEF CON 31 (2023) Fantastic Ethertypes and Where to Find Them ⭐⭐⭐ 網路/協議
DEF CON 31 (2023) Hack the Future - AI Red Teaming ⭐⭐⭐ AI/政策
DEF CON 31 (2023) HL7Magic - Medical Data Hacking ⭐⭐⭐ 醫療/HL7
DEF CON 31 (2023) J4 Gate - Poker Cheating Investigation ⭐⭐⭐ 調查/撲克
DEF CON 31 (2023) Legend of Zelda - Use After Free (TASBot) ⭐⭐⭐ 遊戲/TAS
DEF CON 31 (2023) Living Next Door to Russia ⭐⭐⭐ 地緣政治
DEF CON 31 (2023) LLMs at the Forefront - Fuzz Testing ⭐⭐⭐ AI/Fuzzing
DEF CON 31 (2023) Look Me I'm the CEO - Real-Time Deep-Fake ⭐⭐⭐ AI/Deepfake
DEF CON 31 (2023) Making The DEF CON 31 Badge ⭐⭐⭐ 硬體/Badge
DEF CON 31 (2023) Meduza - exiled media vs Kremlin propaganda ⭐⭐⭐ 媒體/審查
DEF CON 31 (2023) Nuthin But A G Thang - Evolution of Cellular Networks ⭐⭐⭐ 電信/歷史
DEF CON 31 (2023) Power Corrupts - Hacking Power Management in Data Centers ⭐⭐⭐ 資料中心/實體
DEF CON 31 (2023) Private Until Presumed Guilty ⭐⭐⭐ 隱私/法律
DEF CON 31 (2023) Reproductive Justice in Digital Surveillance ⭐⭐⭐ 隱私/女性
DEF CON 31 (2023) Snoop on to them, as they snoop on to us ⭐⭐⭐ 監控/反監控
DEF CON 31 (2023) Spread spectrum in drones for anti-drone evasion ⭐⭐⭐ 無人機/RF
DEF CON 31 (2023) The Hackers, The Lawyers, And The Defense Fund ⭐⭐⭐ 法律/辯護
DEF CON 31 (2023) The Internals of Veilid ⭐⭐⭐ P2P/隱私
DEF CON 31 (2023) There Are No Mushroom Clouds in Cyberwar ⭐⭐⭐ 政策/網路戰
DEF CON 31 (2023) Tracking the Worlds Dumbest Cyber-Mercenaries ⭐⭐⭐ 威脅情報
DEF CON 31 (2023) UNConventional Cybercrime - Bad Anti-Hacking Treaty ⭐⭐⭐ 法律/國際
DEF CON 30 (2022) Tracking Military Ghost Helicopters over DC ⭐⭐⭐ OSINT/航空
DEF CON 30 (2022) Top-performing account crackers modules ⭐⭐⭐ 密碼破解
DEF CON 30 (2022) Exploitation in era of Formal Verification ⭐⭐⭐ 形式驗證
DEF CON 30 (2022) Literal Self-Pwning - Patients Should Hack Med Tech ⭐⭐⭐ 醫療/倫理
DEF CON 30 (2022) Leak the Planet ⭐⭐⭐ 資訊洩漏/調查
DEF CON 30 (2022) Hacking Law is for Hackers ⭐⭐⭐ 法律
DEF CON 30 (2022) Killer Hertz ⭐⭐⭐ 音訊/攻擊
DEF CON 30 (2022) OpenCola The AntiSocial Network ⭐⭐⭐ P2P/社群
DEF CON 30 (2022) Scaling Security Researcher to Eliminate OSS Vulns ⭐⭐⭐ 開源/自動化
DEF CON 30 (2022) Computer Hacks in Russia-Ukraine War ⭐⭐⭐ 網路戰
DEF CON 30 (2022) UFOs, Alien Life, and Least Untruthful Things ⭐⭐⭐ UFO/哲學
DEF CON 30 (2022) Brazil Redux - Right to Repair ⭐⭐⭐ 維修權/政策
DEF CON 30 (2022) My First Hack Was in 1958 ⭐⭐⭐ 歷史/音樂