christiaan@christiaan008.com
  • Facebook
  • X
  • Facebook
  • X
  • Central Hub
Christiaan's collection
  • Home
  • Conferences
    • Black Hat
    • BlueHat
    • BruCON
    • CERIAS
    • Chaos Communication Congress
    • DeepSec
    • DEF CON
    • DerbyCon
    • Hack In The Box (HITB)
    • Hacking at Random (HAR)
    • Notacon
    • Observe, Hack, Make (OHM)
    • Open Web Application Security Project (OWASP)
    • ShmooCon
  • Less technical videos
    • By category
    • Video wall
  • Technical videos
    • By category
    • Video wall
  • News overview
Select Page

Making a sandbox for 10,000 hackers

David M. N. Bryan and Luiz Eduardo will cover on how the DEF CON network team builds a network from scratch, in three days with very little budget. How this network evolved, what worked for them and what didn’t work over the last ten years.

In addition they will cover the new WPA2 enterprise deployment, what worked, what didn’t and how the DEF CON team has mad the Rio network rock!

Watch this video on YouTube

Views

Likes

DEF CON

Source: DEF CON

Christiaan008

Source: Christiaan008

Main category

Information security & security management

Subcategory

Network

Be surprised

Video wall

I know what I'm looking for

Videos by category

Related videos

  • All
  • Network
  • Other
Toying with barcodes

Toying with barcodes

Rootkits: What they are, and how to find them

Rootkits: What they are, and how to find them

Building the DEF CON Network

Building the DEF CON Network

28C3: Towards a single secure European cyberspace?

28C3: Towards a single secure European cyberspace?

RFID hacking

RFID hacking

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

NOTACON 3: Network printer hacking

NOTACON 3: Network printer hacking

DeepSec 2009: Building the next generation IDS engine

DeepSec 2009: Building the next generation IDS engine

22C3: Attacking the IPv6 protocol suite

22C3: Attacking the IPv6 protocol suite

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 19: Hacking and forensicating an Oracle database server

DEF CON 19: Hacking and forensicating an Oracle database server

SOURCE Boston 2009: Splunk

SOURCE Boston 2009: Splunk

Hacking WPA2 key: Evil Twin method

Hacking WPA2 key: Evil Twin method

OWASP AppSecUSA 2011: Simplifying threat modelling

OWASP AppSecUSA 2011: Simplifying threat modelling

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

ShmooCon 2014: ISP’s unauthenticated SOAP service

ShmooCon 2014: ISP’s unauthenticated SOAP service

DeepSec 2013: Uncovering your trails

DeepSec 2013: Uncovering your trails

Remote hack on Damn Vulnerable Linux

Remote hack on Damn Vulnerable Linux

This website is part of the Christiaan008 network | Credits