Quantcast
Channel: DEFCON 15 [Video] Speeches from the hacker conventions
Browsing all 122 articles
Browse latest View live

Philip R. Zimmermann: ZFONE

The time for secure encrypted VoIP for the masses is upon us. The Zfone Project has come a long way in the two years since Phil Zimmermann demoed a prototype at Black Hat. It's now a family of...

View Article



Paul Sebastian Ziegler: Multiplatform malware within the .NET-Framework

Multiplatform Malware - many of us have heard that term. Discussions on this matter arose a few month ago and they didn't cease yet. But while many people have taken interest in this matter there...

View Article

Agent X: 44 Lines about 22 Things that keep me up at Night

What keeps a hacker up at night? What issues and projects keep Agent X from getting a good night's sleep? This turbo-rant will present 22 things that make the night seem long and morning far off....

View Article

Thomas Wilhelm: Turn-Key PenTest Labs

Currently, those interested in learning how to professionally conduct Information System Penetration Tests have very little options available to them - they can either illegally attack...

View Article

Jacob West: How I Learned to Stop Fuzzing and Find More Bugs

Fuzzing and other runtime testing techniques are great at finding certain kinds of bugs. The trick is, effective fuzzing requires a lot of customization. The fuzzer needs to understand the protocol...

View Article


Squidly1- Theresa Verity: Thinking Outside the Console (box)

Having seen the ads this last holiday season, you think you might know all there is to know about the new crop of console game systems. But are these, and other console game systems, just for fun and...

View Article

I)ruidm: Real-time Steganography with RTP

Real-time Transfer Protocol (RTP) is used almost ubiquitously by Voice over IP technologies to provide an audio channel for calls. As such, it provides ample opportunity for creation of a covert...

View Article

Schuyler Towne: Locksport: An emerging subculture

Locksport is nothing new, but it's recent attention in the media and sudden growth have made it a popular topic. This talk will settle some of the bigger debates about the Locksport community. Are we...

View Article


Steve "Arrakis" Topletz: Portable Privacy

Privacy is an increasingly scarce commodity. It is a state that must be preserved, and in many cases, enforced. In prior history, you could expect your person and affects to be relatively private,...

View Article


Richard Thieme: Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors

You're over the line," an intelligence professional told Richard Thieme recently. "You know enough to know what's not true but you can't know enough to know what is. You're well into the wilderness of...

View Article

Subere: Fingerprinting and Cracking Java Obfuscated Code

The process of obfuscating intermediate platform independent code, such as Java bytecode or Common Intermediate Language (CIL) code aims to make the source code generated by reverse engineering much...

View Article

Robert Stoudt: When Tapes Go Missing

We hear it in the news all too frequently, "26 IRS tapes containing taxpayer information potentially contain taxpayers' names, SSNs, bank account numbers, or employer information", "tapes containing...

View Article

Matthew "Pilgrim" Shuchman: How to be a WiFi Ninja

As one of the founders of WarDrivingWorld.com, where over the past few years we have sold thousands of WiFi devices and antennas for Pen testing and extended range WiFi, I will be presenting simple,...

View Article


Zed A. Shaw: Saving The Internet With Hate

Utu is the Maori word for a system of revenge used by Maori society to provide social controls and retribution. Utu is also a protocol that uses cryptographic models of social interaction to allow...

View Article

Dror Shalev: A Crazy Toaster: Can Home Devices turn against us?

A Crazy Toaster: Can Home Devices turn against us?" Home networking devices, wireless equivalents, hardware and technology raise new privacy and trust issues. Can Home Devices turn against us and spy...

View Article


Jason Scott: THE EDGE OF FOREVER - MAKING COMPUTER HISTORY

Too often, "Computer History" gets shoved into a forgotten bin of irrelevancy, devoid of use for lessons and understanding. Even more often, people often fail to realize they're making history...

View Article

Michael Schrenk: The Executable Image Exploit

domain images; like MySpace or eBay. By uploading the following line of HTML to a community website,[img src="http://www.mydomain.com/executable.jpg?] you can launch a dynamic program that masquerades...

View Article


Bruce Schneier: Q&A with Bruce Schneier

Security is both a feeling and a reality. You can feel secure without actually being secure, and you can be secure even though you don't feel secure. In the industry, we tend to discount the feeling in...

View Article

Michael Schearer : The Church of WiFi Presents: Hacking Iraq

What in the world is a U.S. Navy officer (a Naval Flight Officer, no less) doing in the middle of Iraq? Electronic warfare, of course! The Church of WiFi presents an unclassified presentation of...

View Article

Oskar Sandberg: Network Mathematics: Why is it a Small World?

Networks are central do almost everything that hackers do. Be they computer networks, peer-to-peer networks, information networks, or social networks, they are all around us and understanding them is...

View Article
Browsing all 122 articles
Browse latest View live




Latest Images