1. #defcon
  2. #hackers
  3. #hacking
  4. #rebellion
  5. #security
  6. Artikelen

<< error >> (our Markdown requires valid webpage links, not image links, see manual)

Defcon 15 Hacking Conventie (beeldmateriaal)

Filmpje van de DefCon hacking conferentie afgelopen zomer, waarbij een undercover journalist de bijeenkomst moest ontvluchten nadat hij zij ontmaskerd werd.

Hieronder een archief van het videomateriaal van de conferentie :

T101 Making of the DEFCON 15 Badges
T102 Q&A with Bruce Schneier
T103 Turn-Key Pen Test Labs
T104 How I Learned to Stop Fuzzing and Find More Bugs
T105 Convert Debugging
T106 Functional Fuzzing with Funk
T107 Tactical Exploitation
T108 Intelligent Debugging for vuln-dev
T109 Fingerprinting and Cracking Java Obfuscated Code
T110 Comparing Application Security Tools
T111 Meet the Feds
T112 No-Tech Hacking
T131 The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks
T133 Pen-testing Wi-Fi
T134 Hacking EVDO
T135 Multipot A More Potent Variant of Evil Twin
T136 The Next Wireless Frontier TV White Spaces
T137 Creating Unreliable Systems, Attacking the Systems that Attack You
T138 GeoLocation of Wireless Access Points
T139 Being in the Know...Modern Radio Systems
T140 The Emperor Has No Cloak, Web Cloaking Exposed
T141 Hardware Hacking for Software Geeks
T142 Hacking Iraq
T161 HoneyJax
T162 Hacking Social Lives: MySpace.com
T163 The Inherent Insecurity of Widgets and Gadgets
T164 Greater Than 1
T165 Intranet Invasion With Anti-DNS Pinning
T166 Biting the Hand that Feeds You

T201 Church Of WiFi's Wireless Extravaganza
T202 SQL Injection and Out-of-Band Channeling
T203 Z-Phone
T204 Remote Exploit and Another IPv6 Vulnerabilities
T205 MQ Jumping
T206 Virtual World, Real Hacking
T207 It's All About the Timing
T208 Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing
T210 INTERSTATE: A Stateful Protocol Fuzzer for SIP
T211 One Token to Rule Them All
T212 Trojans: A Reality Check
T231 Multiplatform Malware Within the .NET-Framework
T232 Malware Secrets
T233 44 Lines About 22 Things That Keep Me Up at Night
T234 Click Fraud Detection with Practical Memetrics
T235 Fighting Malware on your Own
T236 Virtualization: Enough Holes to Work Vegas
T237 Short-Lived bgp Prefix Hijacking and the Spamwars
T238 Webserver Botnets
T239 The Commercial Malware Industry
T240 CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript
T241 Greetz from Room 101
T242 Estonia and Information Warfare
T261 The Completion Backward Principle
T262 Boomstick Fu ...Physical Security Basic Level
T263 Locksport: An Emerging Subculture
T264 Satellite Imagery Analysis
T265 High Insecurity: Locks, Lies, and Liability

T301 Analysing Intrusions & Intruders
T302 Aliens Cloned My Sheep
T303 Breaking Forensics Software
T304 Re-Animating Drives & Advanced Data Recovery
T305 Cool Stuff Learned from Competing in the DC3 Digital Forensic Challenge
T306 Windows Vista Log Forensics
T307 When Tapes Go Missing
T308 CiscoGate
T309 Hacking UFOlogy
T311 Hack Your Car for Boost and Power!
T312 The Executable Image Exploit
T331 A Crazy Toaster: Can Home Devices Turn Against Us?
T332 IPv6 is Bad for Your Privacy
T333 Injecting RDS-TMC Traffic Information Signals
T335 Unraveling SCADA Protocols: Using Sulley Fuzzer
T336 Hacking the Extensible Firmware Interface
T337 Hacking your Access Control Reader
T338 Security by Politics Why it Will Never Work
T339 Kernel Wars
T340 (un)Smashing the Stack: Overflows, Counter-Measures, and the Real World
T341 Remedial Heap Overflows: dlmalloc styl
T342 Thinking Outside the Console (box)
T361 Hacking the EULA
T362 Network Mathematics: Why is it a Small World?
T363 Beyond Vulnerability Scanning
T364 LAN Protocol Attacks Part 1 Arp Reloaded
T365 Entropy-Based Data Organization Tricks for Log and Packet
T366 Securing Linux Applications With AppArmor

T401 Disclosure and Intellectual Property Law
T402 Computer and Internet Security Law
T403 Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures
T404 Everything...to know about Police Procedure in 50 min
T405 Bridging the Gap Between Technology and the Law
T406 Protecting Your IT Infrastructure From Legal Attacks
T407 Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy
T408 A Journalist’s Perspective on Security Research
T409 Teaching Hacking at College
T410 Faster PwninG Assured: New adventures with FPGAs
T411 Ask the EFF Panel
T431 The Market for Malware
T433 Routing in the Dark: Pitch Black
T434 Technical Changes Since You Last Heard About Tor
T435 Social Attacks on Anonymity Networks
T436 Tor and Blocking- Resistance
T438 Saving the Internet With Hate
T439 Securing the Tor Network
T441 Portable Privacy
T442 Real-time Steganography with RTP

T501 Vulnerabilities and The Information Assurance Directorate
T502 Meet The VCs Panel
T503 Anti Spyware Coalition
T504 Disclosure Panel
T505 Dirty Secrets of the Security Industry
T506 Self Publishing in the Underground
T507 The Hacker Society Around the (Corporate) World
T508 Creating and Managing Your Security Career
T509 kNAC!
T531 Hack Your Brain with Video Games
T532 How to be a WiFi Ninja
T534 The Science of Social Engineering: NLP, Hypnosis and the Science of Persuasion
T535 Black Ops 2007: Design Reviewing The Web
T536 The Edge of Forever Making Computer History
T538 Stealing Identity Management Systems
T539 Internet Wars 2007

www.defcon.org

No Rights Apply
2
  1. rough-grass-3654@rough-grass-3654
    #9341
    Eerder Nerdcon 15, de enigste vrouw in die hele zaal jagen ze met plezier weg haha...
  2. Filmpje van de DefCon hacking conferentie afgelopen zomer, waarbij een undercover journalist de bijeenkomst moest ontvluchten nadat hij ontmaskerd werd.
    Ik zie een best wel lekker ding achtervolgd worden met camera's in dat filmpje erboven?
    Ben ik nou kazaloko of klopt de benaming "hij" niet?