Events for tag "Hacking"
50 min
Solutions for monitoring and lawful interception within a…
92 min
Or: about what we will laugh next year
44 min
New ideas for old practices
56 min
Profiling Modern Espionage
56 min
How to Hack the Pfandsystem
51 min
How you end up being the Victim.
56 min
Discovering what the hardware architects try to hide from…
61 min
Ethereal^W Wireshark without remote exploits - a proof of…
72 min
Oder: worüber wir nächstes Jahr lachen werden
63 min
Mandatory Access Control und TPM in Xen
52 min
Why just lying your way in won't get you anywhere
35 min
A clever or ingenious device or expedient; adroit…
115 min
Implementation and detection of kernel based backdoors and…
113 min
17 Mistakes Microsoft Made in the Xbox Security System &…
54 min
On Using Anonymizers and Still Get Fucked
51 min
Elevated to the Next Level
46 min
"Mit Links" die Mauern Sozialer Netzwerke überwinden.
56 min
We are the 99% (CPU usage)
58 min
Some details about SIM cards
71 min
Preventing Flash Exploits
52 min
Security Concepts, Problems, and Exploits on Your Mac
65 min
Behind the scenes of the new light installation
63 min
Symbian Exploit and Shellcode Development
64 min
Die Technik der Eisenbahnsicherungsanlagen
36 min
UAVs und andere spannende Dinge
56 min
Dissecting contemporary cellphone hardware
48 min
How they track you when your mobile is switched off
65 min
Applications of theorem proving for securing the windows…
55 min
Pixel Fuzzing and the Bioinformatic Bindiff
45 min
An overview of static and dynamic approaches
38 min
How to get useable information out of your honeypot
61 min
Creating a rogue CA Certificate
53 min
Next generation vulnerabilities in 2.0 Web Applications
59 min
Fast development of object-oriented functional programs
76 min
SAP Security and the Enterprise
29 min
WLANs mit Wi-Fi Protected Access (WPA) betreiben
44 min
What the heck is realtime - and what to do with it
54 min
Ubiquitous wireless mesh clouds with olsrd from olsr.org
59 min
Typische Sicherheitslücken
128 min
Vom braunen Briefumschlag bis zur Publikation
53 min
Erfahrungen aus der Praxis
90 min
Oder: worüber wir nächstes Jahr lachen werden
68 min
How VMware, VirtualPC and Parallels actually work
28 min
Why auditing proprietary protocols matters
59 min
One year of Rocket Science!
61 min
Language/VM R&D, whole program type inference, translation…
47 min
A short look at my pet project implementation
34 min
XMPP ist viel mehr als nur Instant Messaging
52 min
hardware demo during the lecture
46 min
Was ist denn nun eigentlich so ein 'Interrupt'?
54 min
Consequences of Spam and Virus Filtering for the E-Mail…
47 min
Impacts of undefined behaviour and other C oddities
20 min
A peer-to-peer, end-to-end encrypted social networking…
52 min
Scanning your GPRS/UMTS IP network for fun and profit
38 min
Presentation of an innovative buffer overflow uncovering…
45 min
Telecomix and Geeks without Bounds on Security and Crisis…
71 min
Experiences and lessons learned with the Payment Card…
34 min
NOC Review about the Camp 2011 and the 28C3
53 min
(also introducing libglitch)
59 min
Little Security, Despite Obscurity
44 min
A Web Hacker's Bag O' Tricks
47 min
ISO14443, ISO15693, their GPL librfid implementation and…
45 min
Reconfigurable computing for the kernel
56 min
RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete…
32 min
A better architecture for the web, beneficial to both…
60 min
Kann ich dir ein Bier ausgeben?
34 min
What you always wanted to know about Flash memory - but…
64 min
A proposal for fixing attacks on CAs and DNSSEC
45 min
"First we take Manhattan, then we take Berlin..."
49 min
MMIrDA - Major Malfunction's InfraRed Discovery Application
50 min
An introduction into anonymous communication with I2P
62 min
Attack Vectors Through the Eyes of Software-based Fault…
58 min
Recovering keys and other secrets after power off
55 min
Open JTAG with Voltage Glitching
53 min
Hackers need satellites. Hackers need internet over…
65 min
writing, sniffing & emulating 13.56MHz RFID tags with…
55 min
Open Source Dynamic Malware Analysis
52 min
New RF technology - exciting for good guys, bad guys,…
51 min
3510 transistors in 60 minutes
48 min
Lets create the Arduino for FPGAs
53 min
Satellite Tracking, harvesting and security
52 min
Wireless connections of 20km and more
51 min
Getting deeper into AVR programming
56 min
Is implementation the enemy of design?
66 min
The Digital Enhanced Cordless Telecommunications standard
49 min
How bureaucrats fail to fight terror
107 min
Breaking software in an automated fashion
56 min
digital radio technology beyond GSM
43 min
An open-source project to develop a tool for broadband…
50 min
Eine Einführung in die neue, dynamische Sprache für das…
83 min
Maßgeschneiderte Geräte-Filtertreiber auf Knopfdruck
53 min
Teach yourself upper management in 22 days
53 min
How to find any book (and many other roadkills) on the…
66 min
all your baseband are belong to us
44 min
Presentation of the DyAnA Framework (Dynamic Android…
42 min
Creation and detection of IP steganography for covert…
55 min
Or: How I walked in and misbehaved
51 min
Attacks on common failures when encrypting credit card…
31 min
Copy protection schemes of way back then and how they…
42 min
A couple of stories about kernel exploiting
53 min
Why C++ is bad for the environment, causes global warming…
52 min
A lamer's introduction to retrieving "sensitive"…
57 min
how to own critical infrastructures
49 min
Old Laws and New Technology the German Way
44 min
Current Capabilities and Future Directions
53 min
How to find, invade and kill botnets automated and…
45 min
Techniques and best practices to securely code your network…
46 min
Look what I found under the carpet
57 min
Improved approaches for auditive steganography
60 min
The history, the hardware and how to write programs
46 min
Turning data into line noise and back
57 min
A Standard-Compliant Exploit of Layer 1
43 min
Finding and exploiting concurrency issues in software
56 min
Watching the watchers, having fun with cctv cameras, making…
110 min
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
49 min
Introduction to syscall proxying and applications for in…
67 min
Welchen Wert haben Trackingdaten?
48 min
Hide and Seek in A. Flash
78 min
Challenges in detecting system compromises and why we’re so…
34 min
Introducing the 'lingua franca' of Instant Messaging
64 min
Why we will have more secure computers - tomorrow
63 min
Overview of Current Keylogger Threats
63 min
Firmware Modification Attacks and the Rise of Printer…
26 min
Aggregating and Visualizing (lack of) Transparancy Data in…
61 min
Bestandsaufnahme und Auswirkungen
58 min
Pwning Apple's Mobile Internet Device
58 min
The Good, the Bad and the Ugly
63 min
escape the basement and make the sun work for you
59 min
Tools to Maintain Anonymity Through Writing Style & Current…
87 min
Design of a blocking-resistant anonymity system
48 min
Post-Exploitation Fun in Windows Environments
59 min
How to find that special one out of millions
50 min
Xbox 360, Playstation 3, Wii
57 min
Hell Yeah, it's rocket science
53 min
...and what the optimizer does so you don't have to
95 min
by anatomizing Linux' CPRNG
46 min
Suppression of secure communications by governments
61 min
Everything about the C64 in 64 Minutes
55 min
Mitigating cold-boot attacks for Full-Disk-Encryption…
61 min
Causes, Attacks and Countermeasures
61 min
Introducing Project OsmocomBB
52 min
How to start analyzing blackboxes
61 min
What has changed in DECT security after one year
128 min
presenting the first German Team participating in the…
85 min
Advanced internet searching strategies & "wizard seeking"…
57 min
Why developing Secure Software is like playing Marble…
43 min
Firmware reverse-engineering tactics
39 min
High performance/low power computing based on the analog…
47 min
Backdooring Embedded Controllers
64 min
Oder: worüber wir nächstes Jahr lachen werden
55 min
Building a sniffer for the GMR satphones
75 min
We Track Harder - We Track More! Take the pain out of…
98 min
Essential Tips and Tricks
94 min
Oder: worüber wir nächstes Jahr lachen werden
26 min
A new approach of identifying vulnerable web applications
61 min
Exploiting Timing Side Channel Vulnerabilities on the Web
51 min
Wardriving phone networks
62 min
Keeping your enemies close
61 min
Essentielles Grundwissen für alle, die nichts zu verbergen…
58 min
Tampering the Tamper-Proof
82 min
First look at the security of NFC mobile phones
47 min
How bad security decisions can ruin a debit card design
46 min
An Introduction to the usual mistakes
53 min
An analysis of targeted attacks from 2005 to 2007
62 min
GPRS, EDGE, UMTS, HSPA demystified
65 min
Transhumanism, Self-Optimization and Neurofeedback for…
62 min
Hell Yeah, it's rocket science
46 min
Wie man nach Hause telefoniert, ohne von einer Rakete…
32 min
Einführung in das Thema Antiforensik am Beispiel eines…
57 min
Part2 - PostScript: Um, you've been hacked
54 min
Take a lot of Perl, add some OpenSSL, sprinkle it with a…
57 min
Back to the good old Blue Box?
76 min
Breaking Remote Keyless Entry Systems with Power Analysis
93 min
A roundup and live demonstrations of all currently known…
57 min
What you didn't know about Acrobat
45 min
Reverse-engineering currency detection systems
50 min
A practical guide to Differential Power Analysis
55 min
Bachelorarbeit Informatik Uni Kiel SS 2011
62 min
Hot or Not: Defeating anonymity by monitoring clock skew to…
45 min
How to recognize trance coded communication patterns
47 min
An in-depth look at p2p algorithmics
61 min
Not your mother's XSS bugs
62 min
Automating exploitation of invalid memory writes
51 min
How to build your own radar system
56 min
Achieving a permanent stealthy compromise of user accounts…
58 min
Corporations enabling citizens to print digital money
46 min
Chasing hackers with a bunch of monkeys
34 min
How In The End We Got It All!
57 min
Take a look at software from a user's point of view and…
57 min
An overview on design and generation of safe and reliable…
46 min
a hackers guide into homebrewn 2.4GHz hardware & peripherals
62 min
Bugs in Antivirus Software
59 min
The fascinating interplay of CPU, stack, C-compiler and…
46 min
Finding exploitable vulnerabilities in binaries
69 min
Encrypting (GSM) mobile phone calls over VPN with an…
60 min
Programmierbare Logik für Deinen Hardware…
39 min
implants, sensory extension and silicon - all for you!
56 min
How we obtained the equivalent power of a Deep Crack for a…
50 min
PowerLineCommunications has now their open source tool
60 min
New Explorations: Large Graphs, Larger Threats
49 min
Wie funktioniert TCP mit 2kb RAM?
52 min
A swiss army knife for automatic social investigation
51 min
A look at the security of 3rd party iOS applications
61 min
From analyzing to attacking mobile phones on a large scale.
135 min
Realtime in-building location tracking at the 23C3
47 min
Doing tricks with a mobile phone
41 min
"The Web Framework for perfectionists with deadlines."
57 min
Vulnerabilities in the EMV Protocol
79 min
Free RFID reader and emulator
64 min
Untersuchung eines Austauschsystems für hochsensible…
44 min
Building an anonymous Internet within the Internet
64 min
Computing of Tomorrow or Yesterday
44 min
Die abenteuerliche Analyse des Datenformats eines real…
54 min
An analysis of Apple's encrypted disk storage system
34 min
Nasty effects with tracker-less BitTorrent
64 min
A major new version of freenet
60 min
Attacks, Defences and Public Policy Issues...
48 min
publish-subscribe feeds + trust relationship network
50 min
Open source BIOS replacement with a radical approach to…
61 min
Everything you need to know about Podcasting
32 min
Layer 8 based IP Address hijacking in the end of the days…
56 min
Reverse Engineering the Motorola EZX (A768,A780,E680)…
61 min
Practical attacks on GSM using GNU Radio and FPGAs
62 min
Past, present, and future
25 min
What's inside your network?
30 min
Accepting the Partial Disclosure Challenge
51 min
Abusing your Firmware to backdoor the kernel
26 min
Insights into a publicly available registry
51 min
Tiffany Rad, Teague Newman, John Strauchs
119 min
Ein Einblick in die Security-Industrie
65 min
Does dm-crypt and cryptoloop provide expected security when…
73 min
expanding the attack surface and then some
25 min
Source routing attacks applied to SIP
66 min
Learn how to effectively protect not only your data but…
57 min
bringing x86 fuckups to dalvik
62 min
Introduction into State-of-the-Art Hearing Aid Technology
117 min
No stone unturned or: logs, what logs?
45 min
On automated video analysis of human behaviour
60 min
Besitz und Wissen: Relay-Angriffe auf den neuen…
40 min
A roundup of one the most advanced open hardware projects
45 min
When physical security depends on IT security
60 min
What happens when data collection goes awry in the 21st…
50 min
Writing your own flexible Userland TCP/IP Stack - Ninja…
60 min
Hardware Hacks and Cracks with FPGAs
63 min
or how B.A.T.M.A.N. learned to fly
55 min
The "anyOS" paradigm and its implications through…
49 min
Introduction to SIP Hacking
57 min
Revisiting the legendary computer in a joystick
54 min
Geschichten aus dem API-und Protokollkrieg von zwei…
53 min
Wie Hacker vorgehen und wie man sich schützen kann
48 min
Reverse Engineering von 3D-Dateiformaten
45 min
A non-copyright circumventing application of the HDCP…
52 min
Hacking a 10 Gigabit Intrusion detection and prevention…
57 min
Hacking the Hackers with User-Space Virtualization
61 min
Better Living Through Inventing
56 min
a dump of simple tools for embedded analysis at many layers
70 min
Working with the open source BIOS replacement and getting a…
41 min
Technical defense against data retention law
47 min
Circumventing ASLR, DEP, and Other Guards
42 min
Practical VM exploiting based on CACAO
52 min
Reverse-Engineering des Embedded-Linux-Navigationssystems