christiaan@christiaan008.com
  • Facebook
  • X
  • Facebook
  • X
  • Central Hub
Christiaan's collection
  • Home
  • Conferences
    • Black Hat
    • BlueHat
    • BruCON
    • CERIAS
    • Chaos Communication Congress
    • DeepSec
    • DEF CON
    • DerbyCon
    • Hack In The Box (HITB)
    • Hacking at Random (HAR)
    • Notacon
    • Observe, Hack, Make (OHM)
    • Open Web Application Security Project (OWASP)
    • ShmooCon
  • Less technical videos
    • By category
    • Video wall
  • Technical videos
    • By category
    • Video wall
  • News overview
Select Page

SOURCE Barcelona 2010: Carders.cc, the rise and fall of an underground forum

Speakers: Vicente Diaz and David Barroso

Watch this video on YouTube

Views

Likes

SOURCE

Source: SOURCE

Christiaan008

Source: Christiaan008

Main category

Hacking

Subcategory

Hacking

Be surprised

Video wall

I know what I'm looking for

Videos by category

Related videos

  • All
  • Other
Toying with barcodes

Toying with barcodes

Rootkits: What they are, and how to find them

Rootkits: What they are, and how to find them

Building the DEF CON Network

Building the DEF CON Network

28C3: Towards a single secure European cyberspace?

28C3: Towards a single secure European cyberspace?

RFID hacking

RFID hacking

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

NOTACON 3: Network printer hacking

NOTACON 3: Network printer hacking

DeepSec 2009: Building the next generation IDS engine

DeepSec 2009: Building the next generation IDS engine

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 19: Hacking and forensicating an Oracle database server

DEF CON 19: Hacking and forensicating an Oracle database server

SOURCE Boston 2009: Splunk

SOURCE Boston 2009: Splunk

Hacking WPA2 key: Evil Twin method

Hacking WPA2 key: Evil Twin method

OWASP AppSecUSA 2011: Simplifying threat modelling

OWASP AppSecUSA 2011: Simplifying threat modelling

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

ShmooCon 2014: ISP’s unauthenticated SOAP service

ShmooCon 2014: ISP’s unauthenticated SOAP service

DeepSec 2013: Uncovering your trails

DeepSec 2013: Uncovering your trails

Remote hack on Damn Vulnerable Linux

Remote hack on Damn Vulnerable Linux

This website is part of the Christiaan008 network | Credits