DEF CON 32 - Where’s the Money-Defeating ATM Disk Encryption - Matt Burch

43:05
DEF CON 32 - Winning the Game of Active Directory - Brandon Colley

53:22
DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman

24:58
DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry

41:33
DEF CON 32 - Unsaflok: Hacking millions of hotel locks - Lennert Wouters, Ian Carroll

34:39
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas

16:59
Inside Europe's $1BN Abandoned Mega-Build

11:56
Breaking Into 4 Abandoned ATM Machines and This Is How Much Money Was Found Inside...

49:59