Home / Series / DEF CON / Aired Order /
  • TheTVDB.com Season ID 2143072
  • Created August 25, 2024
  • Modified January 4, 2025
When available, episode names will be translated into your preferred language. Otherwise they will be shown using the series' origin language.
Name First Aired Runtime Image
S32E01 Welcome to DEF CON
August 9, 2024
20
S32E02 Where’s the Money: Defeating ATM Disk Encryption
August 9, 2024
45
S32E03 Securing CCTV Cameras Against Blind Spots
August 9, 2024
45
S32E04 Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna
August 9, 2024
45
S32E05 Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation
August 9, 2024
45
S32E06 Spies and Bytes: Victory in the Digital Age
August 9, 2024
45
S32E07 Defeating magic by magic:Using ALPC security features to compromise RPC services
August 9, 2024
45
S32E08 The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire
August 9, 2024
45
S32E09 No Symbols When Reversing? No Problem: Bring Your Own
August 9, 2024
45
S32E10 Atomic Honeypot: A MySQL Honeypot That Drops Shells
August 9, 2024
45
S32E11 Listen to the whispers: web timing attacks that actually work
August 9, 2024
45
S32E12 High Intensity Deconstruction: Chronicles of a Cryptographic Heist
August 9, 2024
45
S32E13 Veilid Dev and Community Meetup
August 9, 2024
45
S32E14 On Your Ocean's 11 Team, I'm the AI Guy (technically Girl)
August 9, 2024
45
S32E15 Fireside Chat with DNSA Anne Neuberger
August 9, 2024
45
S32E16 Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access
August 9, 2024
45
S32E17 Sshamble: Unexpected Exposures in the Secure Shell
August 9, 2024
45
S32E18 If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next?
August 9, 2024
45
S32E19 Defeating EDR Evading Malware with Memory Forensics
August 9, 2024
45
S32E20 Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story
August 9, 2024
45
S32E21 Digital Emblems: When markings are required under international law, but you don’t have a rattle-can
August 9, 2024
45
S32E23 Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows
August 9, 2024
45
S32E24 Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator
August 9, 2024
45
S32E25 Breaching AWS Accounts Through Shadow Resources
August 9, 2024
45
S32E26 DC101 Panel
August 9, 2024
45
S32E27 Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone?
August 9, 2024
45
S32E28 Abusing Windows Hello Without a Severed Hand
August 9, 2024
45
S32E29 Taming the Beast: Inside the Llama 3 Red Team Process
August 9, 2024
45
S32E30 Social Engineering Like you’re Picard
August 9, 2024
45
S32E31 Eradicating Hepatitis C With BioTerrorism
August 9, 2024
45
S32E32 Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021
August 9, 2024
45
S32E33 The Way To Android Root: Exploiting Your GPU On Smartphone
August 9, 2024
45
S32E34 Making the DEF CON 32 Badge
August 9, 2024
45
S32E35 Why are you still, using my server for your internet access.
August 9, 2024
45
S32E36 Leveraging private APNs for mobile network traffic analysis
August 9, 2024
45
S32E37 One for all and all for WHAD: wireless shenanigans made easy !
August 9, 2024
45
S32E38 Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash
August 9, 2024
45
S32E39 Breaking Secure Web Gateways (SWG) for Fun and Profit
August 9, 2024
45
S32E40 Stranger in a Changed Land
August 9, 2024
45
S32E41 Exploiting Bluetooth - from your car to the bank account$$
August 9, 2024
45
S32E42 DEF CON Franklin Project
August 9, 2024
45
S32E43 The Pwnie Awards
August 10, 2024
45
S32E44 Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecod
August 10, 2024
45
S32E45 Mutual authentication is optional
August 10, 2024
45
S32E46 Laundering Money
August 10, 2024
20
S32E47 CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337
August 10, 2024
105
S32E48 Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back
August 10, 2024
45
S32E49 Gotta Cache ‘em all: bending the rules of web cache exploitation
August 10, 2024
45
S32E50 The Rise and Fall of Binary Exploitation
August 10, 2024
45
S32E51 SHIM me what you got - Manipulating Shim and Office for Code Injection
August 10, 2024
45
S32E52 Sudos and Sudon’ts - Peering inside Sudo for Windows
August 10, 2024
45
S32E53 QuickShell: Sharing is caring about an RCE attack chain on Quick Share
August 10, 2024
45
S32E54 automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool
August 10, 2024
45
S32E55 Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale
August 10, 2024
45
S32E56 Disenshittify or die! How hackers can seize the means of computation and build a new, good internet
August 10, 2024
45
S32E57 The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace
August 10, 2024
45
S32E58 AMD Sinkclose: Universal Ring -2 Privilege Escalation
August 10, 2024
45
S32E59 OH-MY-DC: Abusing OIDC all the way to your cloud
August 10, 2024
45
S32E60 Inside the FBI’s Secret Encrypted Phone Company ‘Anom’
August 10, 2024
45
S32E61 Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr.
August 10, 2024
45
S32E62 NTLM - The Last Ride
August 10, 2024
45
S32E63 Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels
August 10, 2024
45
S32E64 Hacking Millions of Modems (and Investigating Who Hacked My Modem)
August 10, 2024
45
S32E65 Discovering and exploiting local attacks against the 1Password MacOS desktop application
August 10, 2024
45
S32E66 SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level
August 10, 2024
45
S32E67 Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters
August 10, 2024
45
S32E68 ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller
August 10, 2024
45
S32E69 Measuring the Tor Network
August 10, 2024
45
S32E70 Exploiting the Unexploitable: Insights from the Kibana Bug Bounty
August 10, 2024
45
S32E71 A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism
August 10, 2024
45
S32E72 Unsaflok: Hacking millions of hotel locks
August 10, 2024
45
S32E73 HookChain: A new perspective for Bypassing EDR Solutions
August 10, 2024
45
S32E74 Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale
August 10, 2024
45
S32E75 Encrypted newspaper ads in the 19th century
August 10, 2024
45
S32E76 Compromising an Electronic Logging Device and Creating a Truck2Truck Worm
August 10, 2024
20
S32E77 Watchers being watched: Exploiting the Surveillance System and its supply chain
August 10, 2024
45
S32E78 DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community
August 10, 2024
45
S32E79 Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface
August 10, 2024
45
S32E80 Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming
August 10, 2024
20
S32E81 A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth
August 10, 2024
45
S32E82 Nano-Enigma: Uncovering the Secrets Within eFuse Memories
August 10, 2024
45
S32E83 Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine
August 10, 2024
45
S32E84 Windows Downdate: Downgrade Attacks Using Windows Updates
August 11, 2024
45
S32E85 Unlocking the Gates: Hacking a secure Industrial Remote Access Solution
August 11, 2024
20
S32E86 The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app
August 11, 2024
45
S32E87 Splitting the email atom: exploiting parsers to bypass access controls
August 11, 2024
45
S32E88 AWS CloudQuarry: Digging for secrets in public AMIs
August 11, 2024
45
S32E89 Changing Global Threat Landscape with Rob Joyce and Dark Tangent
August 11, 2024
45
S32E90 The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.)
August 11, 2024
45
S32E91 Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization
August 11, 2024
45
S32E92 (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion))
August 11, 2024
45
S32E93 Deception & Counter Deception – Defending Yourself in a World Full of Lies
August 11, 2024
45
S32E94 Open sesame - or how vulnerable is your stuff in electronic lockers
August 11, 2024
45
S32E95 Solving the "Lover, Stalker, Killer" Murder with strings, grep, and Perl
August 11, 2024
20
S32E96 DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector
August 11, 2024
45
S32E97 Redefining V2G - How to use your vehicle as a game controller
August 11, 2024
45
S32E98 Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF
August 11, 2024
45
S32E99 AIxCC Closing Ceremonies
August 11, 2024
45
S32E100 DARPA and ARPA-H joined forces for the AI Cyber Challenge (AIxCC), a two-year competition aimed at r
August 11, 2024
45
S32E101 Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs
August 11, 2024
45
S32E102 Contest Closing Ceremonies and Awards
August 11, 2024
115
S32E103 Abusing legacy railroad signaling systems
August 11, 2024
45
S32E104 DEF CON Closing Ceremonies & Awards
August 11, 2024
165
S32E105 A dive into world of Aircraft PKI
August 10, 2024
30
S32E106 Adversarial Approach to Airline Revenue Management
August 9, 2024
30
S32E107 Analyzing the Security of Satellite-Based Air Traffic Control
August 9, 2024
30
S32E108 Behind the Badge: How we used and abused hardware to create the AV badge for DC32
August 11, 2024
30
S32E109 From Theory to Reality: Demonstrating the Simplicity of SPARTA Techniques
August 10, 2024
30
S32E110 GPS spoofing: it's about time, not just position
August 10, 2024
30
S32E111 Ground Control to Major Threat Hacking the Space Link Extension Protocol
August 9, 2024
30
S32E112 Fly Catcher - How I Developed a Low-Cost Raspberry Pi Based Device for ADS-B Spoof
August 10, 2024
30
S32E113 Offensive Security Testing: Safeguarding the Final Frontier
August 10, 2024
30
S32E114 RF Attacks on Aviation's Last Line of Defense Against Mid-Air Collisions (TCAS II)
August 10, 2024
45
S32E115 Small Satellite Modeling and Defender Software
August 10, 2024
30
S32E116 The Interplay between Safety and Security in Aviation Systems
August 11, 2024
30
S32E117 Warflying in a Cessna
August 11, 2024
30
S32E118 0.0.0.0 Day: Exploiting Localhost APIs From The Browser
August 10, 2024
30
S32E119 BOLABuster: Harnessing LLMs for Automating BOLA Detection
August 10, 2024
30
S32E120 Engineers & Exploits: The Quest for Security
August 10, 2024
30
S32E121 Fine Grained Authorisation with Relationship-Based Access Control
August 9, 2024
30
S32E122 Gridlock: The Dual-Edged Sword of EV and Solar APIs in Grid Security
August 11, 2024
30
S32E123 Hacking Corporate Banking for Fun and Profit
August 9, 2024
30
S32E124 I've got 99 problems but a prompt injection ain't watermelon
August 9, 2024
30
S32E125 Maturing Your Application Security Program
August 10, 2024
30
S32E126 Navigating the Cyber Security Labyrinth: Choose Your Own Security Adventure?
August 10, 2024
30
S32E127 Relative Path File Injection: The Next Evolution in RPO
August 9, 2024
30
S32E128 SDLC Nightmares Defeating Secure Code Review GPT Hallucinations
August 9, 2024
30
S32E129 Securing Frontends at Scale: Paving our Way to the Post-XSS World
August 9, 2024
30
S32E130 Speed Bumps and Speed Hacks: Adventures in Car Manufacturers Security
August 10, 2024
30
S32E131 The Darkest Side of Bug Bounty
August 10, 2024
30
S32E132 The Immortal Retrofuturism of Mainframe Computers and How to Keep Them Safe
August 11, 2024
30
S32E133 The Missing Link How we collect and leverage SBOMs
August 10, 2024
30
S32E134 Threat Modeling in the Age of AI
August 9, 2024
30
S32E135 Ticking SQLi
August 9, 2024
30
S32E136 Transforming AppSec: Protecting 'Everything as Code' & Emerging Tech
August 10, 2024
45
S32E137 Unlocking the Gates Understanding Authentication Bypass Vulnerabilities
August 10, 2024
30
S32E138 Using EPSS for Better Management Vulnerability Management
August 10, 2024
30
S32E139 Web2 Meets Web3: Hacking Decentralized Applications
August 10, 2024
30
S32E140 When Chatbots Go Rogue – Lessons Learned from Building and Defending LLM Applications
August 9, 2024
30
S32E141 Winning big: AppSec Considerations From the Casino Industry
August 9, 2024
30
S32E142 Your CI/CD Pipeline Is Vulnerable, But It's Not Your Fault
August 11, 2024
30
S32E143 Evading Modern Defenses When Phishing with Pixels
August 10, 2024
S32E144 Exploiting Voice Cloning in Adversarial Simulation
S32E145 Formidable Adversaries: Responding to Breaches, Ransomware, and State-Sponsored Threat Actors
August 9, 2024
60
S32E146 Kubernetes Attack Simulation: The Definitive Guide
August 11, 2024
30
S32E147 MFT: Malicious Fungible Tokens
August 9, 2024
30
S32E148 Master Splinter's initial physical access dojo: Storytelling of a complex adversarial
August 9, 2024
30
S32E149 Sneaky Extensions: The MV3 Escape Artists
August 10, 2024
30
S32E150 Tough Adversary? Don't Blame Sun Tzu
S32E151 Unknown
S32E152 3DU: Homo (e)x Machina
August 11, 2024
30
S32E153 Breaking Boundaries: Popping Shells in the Airgap with $10 and a Dash of Arduino Magic
August 9, 2024
30
S32E154 Bridging Space and Medicine
August 10, 2024
60
S32E155 D0N0H4RM: Cyber STEM Storytime (Panel)
August 10, 2024
60
S32E156 DIY Pharmaceuticals
S32E157 Dysfunctional Unity: The Road to Nowhere
August 9, 2024
30
S32E158 The Past, Present, and Future of Bioweapons
August 10, 2024
45
S32E159 You got a lighter? I need to do some Electroporation.
August 10, 2024
30

No artwork of this type.

No artwork of this type.

No artwork of this type.

No artwork of this type.