Communication

Communication

Mobile device

Mobile device

Wireless

Wireless

Hacking WPA2 key: Evil Twin method

Hacking WPA2 key: Evil Twin method

We deauthenticate the victim from his own wireless network and wait until he connects to our access point. When the victim connects, he is redirected to a service page asking for the WPA-2 key.

DeepSec 2013: Cracking and analysing Apple iCloud protocols

DeepSec 2013: Cracking and analysing Apple iCloud protocols

Vladimir Katalov Vladimir Katalov presents the results of analysing the Apple iCloud protocol and its impact on iCloud services.

DeepSec 2010: Debugging GSM

DeepSec 2010: Debugging GSM

The talk discusses a GSM debugging tool that consists entirely of open source software and open radio hardware. We will demonstrate how to record and decode GSM calls, even encrypted ones.

DeepSec 2013: Uncovering your trails

DeepSec 2013: Uncovering your trails

The presenters showed that Bluetooth is alive and kicking, exploit-wise. A new tool called Bluedriving is presented to capture and store the position and information of bluetooth devices.

ShmooCon 2014: ISP’s unauthenticated SOAP service

ShmooCon 2014: ISP’s unauthenticated SOAP service

This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope.

OHM2013: SIM card exploitation

OHM2013: SIM card exploitation

This talk ends the myth of unbreakable SIM cards and illustrates that the SIM cards are plagued by implementation and configuration bugs.

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

I will discuss specific design flaws in the security of “secure” Applications that promise to keep your data / password safe and sound should the device fall into the wrong hands.

Attacking SMS. It’s no longer your BFF

Attacking SMS. It’s no longer your BFF

This talk will conclude with a proof-of-concept web application demo that demonstrates the techniques and issues mentioned as well as thoughts for solving the next generation of spam.

24C3: Mifare (Little security, despite obscurity)

24C3: Mifare (Little security, despite obscurity)

We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.

25C3: Hacking the iPhone

25C3: Hacking the iPhone

This talk will summarize what we have learned about the internal architecture of the iPhone platform, its security, and the ways we have found to defeat these security measures.

RFID hacking

RFID hacking

Learn about the security and social aspects of RFID technology

29C3 GSM: Cell phone network review

29C3 GSM: Cell phone network review

We will describe the process of setting up the test network we operate at 29C3, what legal and technical challenges we have faced, and we will describe the actual installation at the CCH.

DeepSec 2010: Android reverse engineering and forensics

DeepSec 2010: Android reverse engineering and forensics

The details of reversing software running on Android is a scarce. This talk will explore the filesystem, memory, and reverse engineering techniques in-depth.

Disclosure & vulnerability

Disclosure & vulnerability

Disclosure

Disclosure

Vulnerability

Vulnerability

Secure code reviews magic or art? A simplified approach to secure code reviews

Secure code reviews magic or art? A simplified approach to secure code reviews

This presentation will delve into the science and process behind secure code review and will continue to discuss a simplified approach to secure code review

DeepSec 2007: Browser hijacking

DeepSec 2007: Browser hijacking

This talk introduces Trabbler, the first highly versatile “cross site scripting Trojan”. In the talk, we will discuss Trabbler ́s architecture and code and give practical examples of its application.

22C3: Attacking the IPv6 protocol suite

22C3: Attacking the IPv6 protocol suite

After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit.

DeepSec 2011: The security of non-executable files

DeepSec 2011: The security of non-executable files

This talk presents an overview of the security risks in non-executable files such as PDF, rich media and office documents. The talk aims to range from global considerations to individual cases.

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

This presentation describes the technologies behind advanced static and dynamic vulnerability analysis tools. We conclude with a discussion of new ways to ensure that bugs get fixed before it’s too late.

OWASP AppSecUSA 2012: Bug bounty programs

OWASP AppSecUSA 2012: Bug bounty programs

A panel discussion with Michael Coates (Mozilla), Chris Evans (Google), Jeremiah Grossman (WhiteHat Security), Adam Mein (Google), Alex Rice (Facebook)

OWASP AppSecUSA 2011: Ghosts of XSS past, present and future

OWASP AppSecUSA 2011: Ghosts of XSS past, present and future

This talk will discuss the past methods used for XSS defence that were only partially effective. Learning from these lessons, will also discuss present day defensive methodologies that are effective, but place an undue burden on the developer.

ShmooCon 2014: ISP’s unauthenticated SOAP service

ShmooCon 2014: ISP’s unauthenticated SOAP service

This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope.

Government & legislation

Government & legislation

Government

Government

Legislation

Legislation

28C3: Towards a single secure European cyberspace?

28C3: Towards a single secure European cyberspace?

The “European Great Firewall” was the way that European civil rights organizations has addressed the proposal to create a “single European cyberspace”. This lecture will describe a vulnerability that the proposal reveals in the power structures of the European and world governance.

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 14: US-VISIT: Raping personal privacy since 2004

In this talk, the technology and capabilities of US-VISIT will be explained in detail; weaknesses in the system will be explored, and the consequences of such a system will be considered.

OHM2013: Should law enforcement have hacking powers?

OHM2013: Should law enforcement have hacking powers?

In several European countries proposals for vast expansion of the powers of law enforcement in the digital realm are floating about. The panel focuses on the pros and cons of such powers.

29C3: We are all lawmakers!

29C3: We are all lawmakers!

In the Free City of Hamburg a coalition of hackers, activists and other players of civil society have drafted the most revolutionary Freedom of information law in the world.

29C3: Russia’s surveillance state

29C3: Russia’s surveillance state

Privacy International, Agentura.Ru and Citizen Lab have joined forces to launch a new project ‘Russia’s Surveillance State’. The project aims to undertake research and investigation into surveillance practices in Russia.

DEF CON 16: Forensics is ONLY for Private Investigators

DEF CON 16: Forensics is ONLY for Private Investigators

This is a talk about the struggles of becoming a Private Investigator and what the laws are for computer forensics going forward.

DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3

DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3

Although many companies claim to care about end-user privacy, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. This talk will pierce the veil of secrecy surrounding these practices.

Asymmetric Digital Warfare

Asymmetric Digital Warfare

This talk will is intended to understand where and how the digital conflicts are conducted today but we will dig deeply into the future.

Hardware

Hardware

Console

Console

Embedded system

Embedded system

General

General

Printer

Printer

Black Hat USA 2010: Jackpotting automated teller machines redux 1/5

Black Hat USA 2010: Jackpotting automated teller machines redux 1/5

I will demonstrate both local and remote attacks on ATMs, and I will reveal a multi-platform ATM rootkit. Finally, I will discuss protection mechanisms that ATM manufacturers can implement to safeguard against these attacks.

25C3: Hacking the iPhone

25C3: Hacking the iPhone

This talk will summarize what we have learned about the internal architecture of the iPhone platform, its security, and the ways we have found to defeat these security measures.

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

We describe the design of the Xbox 360 security system from a very high-legel point of view. In the second part we will discuss the details of the Xbox 360 system and security architecture.

RFID hacking

RFID hacking

Learn about the security and social aspects of RFID technology

NOTACON 3: Network printer hacking

NOTACON 3: Network printer hacking

This presentation will cover techniques that can be used to control and extract data from network printers.

Battery firmware hacking

Battery firmware hacking

Charlie Miller will take an in depth look at a common embedded controller used in a battery and reverse engineer the firmware.

Printers gone wild!

Printers gone wild!

Ben Smith presents new malicious abuses of printers as well as some fun new uses for old attacks.

24C3: Mifare (Little security, despite obscurity)

24C3: Mifare (Little security, despite obscurity)

We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.

BruCON 2010: Embedded system hacking and my plot to take over the world 1/4

BruCON 2010: Embedded system hacking and my plot to take over the world 1/4

This presentation analyzes common vulnerabilities in popular embedded systems that carry sensitive data every day.

Hacking

Hacking

Botnet

Botnet

Exploit

Exploit

General

General

Malware

Malware

Penetration testing

Penetration testing

Phishing

Phishing

DEF CON 19: Defeating wired 802.1x with a transparent bridge using Linux

DEF CON 19: Defeating wired 802.1x with a transparent bridge using Linux

Using Linux and a device with 2 network cards, I will demonstrate how to configure an undetectable transparent bridge to inject a rogue device onto a wired network that is secured via 802.1x using an existing authorized connection.

DEF CON 17: Abusing Firefox Addons

DEF CON 17: Abusing Firefox Addons

This talk details how we have abused some of the most popular and recommended Firefox addons, with previously unreleased vulnerabilities. Demos will cover remote code execution, local file disclosure and other tailored Firefox Addon exploits.

22C3: Attacking the IPv6 protocol suite

22C3: Attacking the IPv6 protocol suite

After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit.

Pyrit demonstration (GPU cracking)

Pyrit demonstration (GPU cracking)

Short demo using the passthrough option of Pyrit which eliminates the need for giant tables taking up all your hard drive space.

DEF CON 17: Hijacking web 2.0 sites with SSLstrip

DEF CON 17: Hijacking web 2.0 sites with SSLstrip

Many websites mix secure and insecure content on the same page this makes it possible to steal all the data entered on such a page easily, using Moxie Marlinspike’s new SSLstrip tool. I will give a brief explanation and demonstration of the technique.

Remote hack on Damn Vulnerable Linux

Remote hack on Damn Vulnerable Linux

This video is made by EXALT and shows a reenactment of a remote hack he did on a Damn Vulnerable Linux (DVL) box.

DEF CON 17: MetaPhish

DEF CON 17: MetaPhish

This talk will focus on building a phishing framework on top of Metasploit that pentesters can use to automate phishing and increase their overall capabilities.

Toying with barcodes

Toying with barcodes

Ever wondered what is in these blocks of squares on postal packages, letters and tickets?

Testing SQL injection with sqlmap

Testing SQL injection with sqlmap

Sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications.

DEF CON 13: Google hacking for penetration testers

DEF CON 13: Google hacking for penetration testers

Johnny Long reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques.

DEF CON 19: Hacking and forensicating an Oracle database server

DEF CON 19: Hacking and forensicating an Oracle database server

David Litchfield is recognized as one of the world’s leading authorities on database security.

Rootkits: What they are, and how to find them

Rootkits: What they are, and how to find them

This class will focus on understanding how rootkits work, and what tools can be used to help find them.

Owning bad guys (and mafia) with JavaScript botnets

Owning bad guys (and mafia) with JavaScript botnets

In this talk MITM schemas in anonymous services are discussed. Attendees will see how easily a botnet using JavaScript can be created to analyse that kind of connections and some of the actions people behind those services are doing.

Embed trojan into a JPG Format

Embed trojan into a JPG Format

DEF CON 17: Making fun of your malware

DEF CON 17: Making fun of your malware

This talk evenly distributes technical knowledge and humor to present the funniest discoveries related to malware authors and the fight against their code.

Battery firmware hacking

Battery firmware hacking

Charlie Miller will take an in depth look at a common embedded controller used in a battery and reverse engineer the firmware.

The Honey project and CIC News Engine

The Honey project and CIC News Engine

An update about the Honey project and the development of the CIC News engine.

24C3: Cybercrime 2.0

24C3: Cybercrime 2.0

The first part of the talk provides a brief history of Storm Worm focusing on the actual propagation phase. Afterwards we describe the network communication of the bot in detail and show how we can learn more about the botnet.

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

In this presentation we propose an approach and hybrid shellcode detection method, aimed at early detection and filtering of unknown 0-day exploits at the network level.

Black Hat USA 2010: Jackpotting automated teller machines redux 1/5

Black Hat USA 2010: Jackpotting automated teller machines redux 1/5

I will demonstrate both local and remote attacks on ATMs, and I will reveal a multi-platform ATM rootkit. Finally, I will discuss protection mechanisms that ATM manufacturers can implement to safeguard against these attacks.

Hacking WPA2 key: Evil Twin method

Hacking WPA2 key: Evil Twin method

We deauthenticate the victim from his own wireless network and wait until he connects to our access point. When the victim connects, he is redirected to a service page asking for the WPA-2 key.

SOURCE Barcelona 2010: Carders.cc, the rise and fall of an underground forum

SOURCE Barcelona 2010: Carders.cc, the rise and fall of an underground forum

Information security & security management

Information security & security management

Database

Database

Encryption

Encryption

Information security

Information security

Logging

Logging

Network

Network

Programming

Programming

Security management

Security management

Training

Training

Building the DEF CON Network

Building the DEF CON Network

We will cover on how the DEF CON network team builds a network from scratch, in three days with very little budget.

22C3: Attacking the IPv6 protocol suite

22C3: Attacking the IPv6 protocol suite

After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit.

ICS Cybersecurity Advanced Training Day 4

ICS Cybersecurity Advanced Training Day 4

The vlog about the fourth day of the 2011 International ICS Cybersecurity Advanced Training. This day is what it’s all about, the Blue Team / Red Team exercise.

DeepSec 2011: The security of non-executable files

DeepSec 2011: The security of non-executable files

This talk presents an overview of the security risks in non-executable files such as PDF, rich media and office documents. The talk aims to range from global considerations to individual cases.

Secure code reviews magic or art? A simplified approach to secure code reviews

Secure code reviews magic or art? A simplified approach to secure code reviews

This presentation will delve into the science and process behind secure code review and will continue to discuss a simplified approach to secure code review

Toying with barcodes

Toying with barcodes

Ever wondered what is in these blocks of squares on postal packages, letters and tickets?

OWASP AppSecUSA 2011: Ghosts of XSS past, present and future

OWASP AppSecUSA 2011: Ghosts of XSS past, present and future

This talk will discuss the past methods used for XSS defence that were only partially effective. Learning from these lessons, will also discuss present day defensive methodologies that are effective, but place an undue burden on the developer.

24C3: Mifare (Little security, despite obscurity)

24C3: Mifare (Little security, despite obscurity)

We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.

DeepSec 2009: Building the next generation IDS engine

DeepSec 2009: Building the next generation IDS engine

This talk is about the project to build the next generation IDS engine. The engine has been released under the name Suricata and can be downloaded from the Open Information Security Foundation (OISF) web site.

DEF CON 17: Hijacking web 2.0 sites with SSLstrip

DEF CON 17: Hijacking web 2.0 sites with SSLstrip

Many websites mix secure and insecure content on the same page this makes it possible to steal all the data entered on such a page easily, using Moxie Marlinspike’s new SSLstrip tool. I will give a brief explanation and demonstration of the technique.

NOTACON 3: Network printer hacking

NOTACON 3: Network printer hacking

This presentation will cover techniques that can be used to control and extract data from network printers.

OWASP AppSecUSA 2011: Simplifying threat modelling

OWASP AppSecUSA 2011: Simplifying threat modelling

Architects and developers often perceive threat modeling as being too difficult. During this talk, we’ll attempt to bust these myths and show how organizations can incrementally obtain better results.

DEF CON 19: Hacking and forensicating an Oracle database server

DEF CON 19: Hacking and forensicating an Oracle database server

David Litchfield is recognized as one of the world’s leading authorities on database security.

How NOT to Store Passwords!

How NOT to Store Passwords!

Tom Scott explains the insecure ways in which some websites deal with passwords.

OWASP AppSecUSA 2011:How NOT to implement cryptography for the OWASP Top 10 (Reloaded)

OWASP AppSecUSA 2011:How NOT to implement cryptography for the OWASP Top 10 (Reloaded)

The talk uses fresh examples of application cryptography successes and failures, and also incorporates the new OWASP ESAPI.

Testing SQL injection with sqlmap

Testing SQL injection with sqlmap

Sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications.

SOURCE Boston 2009: Splunk

SOURCE Boston 2009: Splunk

Learn how Fortune 500 and government organizations are using Splunk to protect themselves against fraud and misuse, and as a valuable tool in their network security and compliance reporting toolboxes.

Introduction to Trusted Computing

Introduction to Trusted Computing

This course is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context.

Rootkits: What they are, and how to find them

Rootkits: What they are, and how to find them

This class will focus on understanding how rootkits work, and what tools can be used to help find them.

Video wall

Be surprised