1
|
|
|
|
Hardware setup
|
|
|
152 位听众
|
2
|
|
|
|
Intro
|
|
|
124 位听众
|
3
|
|
|
|
AirTags hardware
|
|
|
116 位听众
|
4
|
|
|
|
Let's mine Bitcoin!
|
|
|
87 位听众
|
5
|
|
|
|
Bitcoin mining explained
|
|
|
84 位听众
|
不想看到广告?马上升级
|
6
|
|
|
|
Glitching the AirTags
|
|
|
80 位听众
|
7
|
|
|
|
Debugging interface
|
|
|
67 位听众
|
8
|
|
|
|
Game Boy firmware
|
|
|
67 位听众
|
9
|
|
|
|
Link Cable Protocol
|
|
|
62 位听众
|
10
|
|
|
|
Why 111-1111111 is a valid Windows 95 key
|
|
|
59 位听众
|
11
|
|
|
|
Testchain
|
|
|
53 位听众
|
12
|
|
|
|
Host computer
|
|
|
49 位听众
|
13
|
|
|
|
Lets Glitch
|
|
|
44 位听众
|
14
|
|
|
|
Firmware modification
|
|
|
41 位听众
|
15
|
|
|
|
Hacking the Game Boy cartridge protection
|
|
|
31 位听众
|
16
|
|
|
|
Hacking the ████████® ████ & █████™
|
|
|
31 位听众
|
17
|
|
|
|
Mining Bitcoin on the Game Boy
|
|
|
24 位听众
|
18
|
|
|
|
Getting JTAG on the iPhone 15
|
|
|
24 位听众
|
19
|
|
|
|
How the Apple AirTags were hacked
|
|
|
21 位听众
|
20
|
|
|
|
Hacking the Nintendo Game and Watch Super Mario Bros.
|
|
|
19 位听众
|
21
|
|
|
|
Breaking Bitlocker - Bypassing the Windows Disk Encryption
|
|
|
17 位听众
|
22
|
|
|
|
DOOM on the Nintendo Game and Watch
|
|
|
14 位听众
|
23
|
|
|
|
The secrets of Apple Lightning - Part 1
|
|
|
13 位听众
|
24
|
|
|
|
How to reverse engineer & patch a Game Boy ROM
|
|
|
12 位听众
|
25
|
|
|
|
DOOM on the Game and Watch
|
|
|
11 位听众
|
不想看到广告?马上升级
|
26
|
|
|
|
Exploring the Mew Glitch
|
|
|
11 位听众
|
27
|
|
|
|
Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra
|
|
|
9 位听众
|
28
|
|
|
|
The Link Cable Protocol
|
|
|
9 位听众
|
29
|
|
|
|
How I hacked the Apple AirTags
|
|
|
9 位听众
|
30
|
|
|
|
In-depth: ELF - The Extensible & Linkable Format
|
|
|
8 位听众
|
31
|
|
|
|
Architecture
|
|
|
8 位听众
|
32
|
|
|
|
Hacking the Nintendo Game and Watch
|
|
|
7 位听众
|
33
|
|
|
|
The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking (DEF CON 30 Presentation)
|
|
|
6 位听众
|
34
|
|
|
|
Hacking the Game Boy with a Silver Play Button
|
|
|
6 位听众
|
35
|
|
|
|
WebUSB!
|
|
|
6 位听众
|
36
|
|
|
|
A wild LiveOverflow appears!
|
|
|
6 位听众
|
37
|
|
|
|
Online Multiplayer on the Game Boy
|
|
|
6 位听众
|
38
|
|
|
|
Bringing homebrew to the Nintendo Game & Watch
|
|
|
5 位听众
|
39
|
|
|
|
3 Players!
|
|
|
5 位听众
|
40
|
|
|
|
The Frontend
|
|
|
5 位听众
|
41
|
|
|
|
Game & Watch: How we dumped the firmware & community-updates
|
|
|
4 位听众
|
42
|
|
|
|
Bringing homebrew to the Game & Watch
|
|
|
4 位听众
|
43
|
|
|
|
Results!
|
|
|
4 位听众
|
44
|
|
|
|
IoT Security: Backdooring a smart camera by creating a malicious firmware upgrade
|
|
|
4 位听众
|
45
|
|
|
|
The Server
|
|
|
4 位听众
|
|
46
|
|
|
|
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra
|
|
|
3 位听众
|
47
|
|
|
|
The setup
|
|
|
3 位听众
|
48
|
|
|
|
TensorKart
|
|
|
3 位听众
|
49
|
|
|
|
Reversing WannaCry Part 3 - The encryption component
|
|
|
3 位听众
|
50
|
|
|
|
Can an AI learn to drive Mario Kart 64?
|
|
|
3 位听众
|