×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
DEFCON-27-albinowax-HTTP-Desync-Attacks-whitepaper.pdf
Home
/
Discover
/
media.defcon.org
/
DEF CON 27
/
DEF CON 27 presentations
/
Parent Folder
DEFCON-27-albinowax-HTTP-Desync-Attacks-whitepaper.pdf
PDF
5 years ago
395.88 kB
Copy Link
DEFCON-27-Zhang-Xiangqian-Liu-Huiming-Your-secret-files-are-mine.pdf
PDF
5 years ago
192.43 MB
Copy Link
DEFCON-27-albinowax-HTTP-Desync-Attacks.pdf
PDF
5 years ago
7.55 MB
Copy Link
DEFCON-27-Yaron-Zinar-and-Marina-Simakov-Relaying-Credentials-Has-Never-Been-Easier-How-to-Easily-Bypass-the-Latest-NTLM-Relay-Mitigations.pdf
PDF
5 years ago
57.50 MB
Copy Link
DEFCON-27-d4krm4tter-Mike-Spicer-I-Know-What-You-Did-Last-Summer.pdf
PDF
5 years ago
3.06 MB
Copy Link
DEFCON-27-droogie-go-null-yourself.pdf
PDF
5 years ago
48.24 MB
Copy Link
DEFCON-27-Xiling-Gong-Peter-Pi-Exploiting-Qualcomm-WLAN-and-Modem-Over-The-Air.pdf
PDF
5 years ago
2.35 MB
Copy Link
DEFCON-27-finalphoenix-Rise-of-the-Hypebots.pdf
PDF
5 years ago
53.92 MB
Copy Link
DEFCON-27-Xiaohuihui-All-The-4G-Modules-Could-Be-Hacked.pdf
PDF
5 years ago
13.93 MB
Copy Link
DEFCON-27-Workshop-Anthony-Rose-Introduction-to-AMSI-Bypasses-and-Sandbox-Evasion.pdf
PDF
5 years ago
8.87 MB
Copy Link
DEFCON-27-grichter-Reverse-Engineering-4G-Hotspots-For-Fun-Bugs-Net-Financial-Loss.pdf
PDF
5 years ago
8.98 MB
Copy Link
DEFCON-27-WillC-Phreaking-Elevators.pdf
PDF
5 years ago
5.50 MB
Copy Link
DEFCON-27-jiska-fabian-vacuum-cleaning-security.pdf
PDF
5 years ago
1.62 MB
Copy Link
DEFCON-27-Wenxiang-Qian-Yuxiang-Li-Huiyu-Wu-Breaking-Google-Home-Exploit-It-with-SQLite-Magellan.pdf
PDF
5 years ago
3.26 MB
Copy Link
DEFCON-27-smea-Adventures-in-smart-buttplug-penetration-testing.pdf
PDF
5 years ago
3.00 MB
Copy Link
DEFCON-27-Truman-Kain-Surveillance-Detection-Scout.pdf
PDF
5 years ago
61.49 MB
Copy Link
DEFCON-27-Travis-Palmer-First-try-DNS-Cache-Poisoning-with-IPv4-and-IPv6-Fragmentation.pdf
PDF
5 years ago
3.66 MB
Copy Link
DEFCON-27-Sheila-A-Berta-Backdooring-hardware-devices-by-injecting-malicious-payloads-on-Microcontrollers.pdf
PDF
5 years ago
30.32 MB
Copy Link
DEFCON-27-Roger-Dingledine-TOR-Censorship-Arms-Race.pdf
PDF
5 years ago
4.33 MB
Copy Link
DEFCON-27-Philippe-Laulheret-Introduction-to-Hardware-Hacking-Extended-Version.pdf
PDF
5 years ago
33.45 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.