DC&HW.Zone

Here, hardware experts and guys from DEF CON will share their experiences, and you will become better versed on a variety of topics!

DEF CON is an association of enthusiasts who are interested in technology and its security. DC groups aim to bring the research community together for like‑minded people to meet and exchange their skills.

  • August 25
  • August 26
Filter
×
Clear filter
Start 
End 

August 25

August 25
11:00–11:45
Dahua IP camera. Where to look, what to poke?
DC&HW.Zone
Russian
Yuri will talk about the practical research of the security of an IP‑camera from a well‑known vendor. In the report, the speaker will look at the encryption algorithms used by the manufacturer to protect the device firmware, followed by reverse‑engineering of these algorithms ...
August 25
11:50–12:30
Turning an ordinary SSD drive into two with reverse engineering
DC&HW.Zone
Russian
Nikita is going to look at the process of reversing the firmware of the NVME‑to‑USB adapter and demonstrate the process of organizing dual‑booting the laptop with the modified adapter ...
August 25
12:30–13:15
AMD PSP UEFI Firmware Structure
DC&HW.Zone
Russian
During the Summ3r of h4ck internship at DSec, the speaker chose the topic of AMD PSP research and writing a dumper of PEI phase files. Given the ridiculous shortage of material on this topic on the Internet in any language, the speaker decided to talk about how the UEFI firmware works for devices containing ...
August 25
13:30–14:45
Сryptocurrencies and Privacy Аspects
DC&HW.Zone
Russian
Walls have ears and houses have eyes. The report is dedicated to the privacy and anonymity of cryptocurrencies. It will be useful for newcomers to learn about the principles of blockchain, and advanced users will learn more about ensuring their own privacy ...
August 25
14:45–15:45
August 25
16:00–17:00
Anti-Panopticum & Privacy Problems
DC&HW.Zone
Russian
The word panopticum literally translates from the Greek as “the place where you can see everything.” In the report the audience will learn about the technologies to ensure their own privacy. Cryptographic methods of protection will be discussed for the most part ...
August 25
17:00–19:00
A full review of YubiKey, passwordLess with examples of practical use, and TPM
DC&HW.Zone
Russian
The speakers will give a detailed overview of Yubikey security keys, using such tools as GPG, U2F (FIDO/FIDO2), OTP, Git. They will show how to use passwordless, how to use TPM in Linux, and how to store SSH keys in it ...