DEFCON 14: [Video] Speeches from the hacker conventions

DEFCON 14: [Video] Speeches from the hacker conventions

84 episodes

The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our website at: https://www.defcon.org/html/links/dc-archives.html This RSS includes video from the speeches at DEF CON 14. Additional versions including: Audio, and music videos from the DEF CON DJ's will be uploaded separately. We hope you enjoy.

Podcasts

Jon Callas and Panel: Traffic Analysis

Published: Oct. 27, 2006, 11:44 p.m.
Duration: 53 minutes 56 seconds

Listed in: Education

Broward Horne: MEME Hacking

Published: Oct. 27, 2006, 11:44 p.m.
Duration: 48 minutes 38 seconds

Listed in: Education

Robert Clark: Legal Aspects of Internet & Computer Network Defense

Published: Oct. 27, 2006, 11:36 p.m.
Duration: 1 hour 15 minutes 51 seconds

Listed in: Education

Dark Tangent: Award Ceremonies

Published: Oct. 26, 2006, 10:57 p.m.
Duration: 1 hour 50 minutes 24 seconds

Listed in: Education

Phil Zimmerman:Turbo-Talk- Special Project VOIP Encryption Update

Published: Oct. 24, 2006, 9:47 p.m.
Duration: 39 minutes 29 seconds

Listed in: Education

Joe Grand: Hardware Hacking

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 39 minutes 29 seconds

Listed in: Education

Thomas X. Grasso: Fighting Organized Cyber Crime: War Stories and Trends

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 29 seconds

Listed in: Education

Atlas: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 43 seconds

Listed in: Education

Greg Conti: Googling: I'm Feeling (un)Lucky

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 42 minutes 1 second

Listed in: Education

Paul Simmonds: The Jericho Forum and Challenge

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 40 minutes 55 seconds

Listed in: Education

Matt Hargett: Remote Pair Programming and Test-driven Development Using Open Source

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 50 seconds

Listed in: Education

Renderman: New Wireless Fun From the Church Of WiFi

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 42 minutes 58 seconds

Listed in: Education

Richard Thieme: Beyond Social Engineering: Tools for Reinventing Yourself

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 53 minutes 24 seconds

Listed in: Education

Panel: Panel: Internet Wars 2006

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 42 minutes 2 seconds

Listed in: Education

Rick Hill: WarRocketing :Network Stumbling 50 sq. miles in <60 sec.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 37 minutes 19 seconds

Listed in: Education

Bruce Potter: Trusted Computing: Could it be... SATAN?

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 15 seconds

Listed in: Education

Valsmith: Hacking Malware: Offense Is the New Defense

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 44 minutes 7 seconds

Listed in: Education

Collin Mulliner: Advanced Attacks Against PocketPC Phones

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 43 minutes 43 seconds

Listed in: Education

Greg White: The National Collegiate Cyber Defense Competition

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 53 minutes 22 seconds

Listed in: Education

Scott Moulton: Rebuilding HARD DRIVES for Data Recovery; Anatomy of a Hard Drive

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 41 minutes 54 seconds

Listed in: Education

Major Malfunction: Old Skewl Hacking: Magstripe Madness

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 59 seconds

Listed in: Education

Thomas Holt: Exploring the Changing Nature of DEFCON over the Past 14 Years

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 24 seconds

Listed in: Education

Johnny Long: Death By 1000 cuts

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 53 minutes 29 seconds

Listed in: Education

Strom Carlson: Hacking FedEx Kinko's: How Not To Implement Stored-Value Card Systems

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 15 seconds

Listed in: Education

Amber Schroader: Cyber-crime Foiled Once Again? Help prove the innocence or guilt of Jack Grove

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 26 seconds

Listed in: Education

EFF: Panel: Ask EFF: The Year in Digital Civil Liberties

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 52 minutes 40 seconds

Listed in: Education

Chris Paget: US-VISIT: Raping Personal Privacy Since 2004

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 40 seconds

Listed in: Education

Scott Miller: A New Bioinformatics-Inspired and Binary Analysis: Coding Style/Motif Identification

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 41 minutes 13 seconds

Listed in: Education

Timothy M O'Neill: 'What has the NSA done for me lately?'

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 23 minutes 31 seconds

Listed in: Education

Charles Edge: 10 Ways To Not Get Caught Hacking On Your Mac

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 20 minutes 57 seconds

Listed in: Education

Melanie Rieback: A Hacker's Guide to RFID Spoofing and Jamming

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 7 seconds

Listed in: Education

James Christy: PANEL: Meet the Feds: 'OODA Loop and the Science of Security

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 55 seconds

Listed in: Education

Jay Beale: Discovering Mac OS X Weaknesses and Fixing Them with the New Bastille OS X Port

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 57 minutes 23 seconds

Listed in: Education

Lukas Grunwald: First We Break Your Tag, Then We Break Your Systems Attacks to Rfid Systems

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 42 minutes 9 seconds

Listed in: Education

Irby Thompson: Advanced File System Hiding and Detection

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 13 seconds

Listed in: Education

Charles Edge: Mac OS X Security Tools

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 23 minutes 53 seconds

Listed in: Education

Raffael Marty: Visual Log Analysis - The Beauty of Graphs

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 52 minutes 31 seconds

Listed in: Education

Kenneth Geers: Ipv6 World Update: High Diplomacy & Monster Trucks

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 52 minutes 36 seconds

Listed in: Education

tommEE pickles: 802.1x Networking

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 41 minutes 1 second

Listed in: Education

Alexander Kornbrust: Oracle Rootkits 2.0

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 31 minutes 50 seconds

Listed in: Education

Yuan Fan: MatriXay-When Web App & Database Security Pen-Test/Audit Is a Joy

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 29 minutes 12 seconds

Listed in: Education

Damon McCoy: Zulu a Command Line Wireless Frame Generator

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 11 minutes 3 seconds

Listed in: Education

Dan kaminsky: Black Ops 2006

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 41 minutes 48 seconds

Listed in: Education

Jared DeMott: The Evolving Art of Fuzzing

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 56 seconds

Listed in: Education

Isaac Levy (.ike): Hacking UNIX with FreeBSD Jail(8), Secure Virtual Servers

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 41 seconds

Listed in: Education

Luis Miras: Bridging the Gap Between Static and Dynamic Reversing

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 33 minutes 57 seconds

Listed in: Education

Martyn Ruks: IBM Networking Attacks-Or The Easiest Way To Own A Mainframe Without Getting The Removals Men In

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 17 seconds

Listed in: Education

Michael Rash: Service Cloaking and Anonymous Access; Combining Tor'with Single Packet Authorization (SPA)

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 36 minutes 56 seconds

Listed in: Education

Mark Stamp: Hunting for Metamorphic Engines

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 45 seconds

Listed in: Education

Riley "Caezar" Eller: Securing MANET

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 50 seconds

Listed in: Education

Johnny Cache: Fun with 802.11 Device Drivers

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 44 minutes 24 seconds

Listed in: Education

Halvar Flake: RE 2006: New Challenges Need Changing Tools

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 52 minutes 49 seconds

Listed in: Education

weasel: The Plausible Deniability Toolkit

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 59 minutes 15 seconds

Listed in: Education

Linton Wells: UNCLASSIFIED Information Sharing with Non-Traditional Partners

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 49 minutes 36 seconds

Listed in: Education

Joe Stewart: OllyBone: Semi-Automatic Unpacking on IA-32

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 38 minutes 44 seconds

Listed in: Education

Peleus Uhley: Kiosk Security

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 1 second

Listed in: Education

R.P. Murphy: Covert Channels using IPv6/ICMPv6

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 42 minutes 14 seconds

Listed in: Education

Randal Vaughn: DNS Amplification Attacks

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 10 seconds

Listed in: Education

FX: Analysing Complex Systems: The BlackBerry Cas

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 50 seconds

Listed in: Education

Eric Schmiedl: Safecracking Without a Trace

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 33 minutes 6 seconds

Listed in: Education

Gadi Evron: DNS Abuse Infrastructure and Games

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 31 minutes 55 seconds

Listed in: Education

Arias Hung: Owning the linksys wrtp54g VOIP Router

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 13 minutes 1 second

Listed in: Education

Johnny Long: Secrets of the Hollywood Hacker!

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 57 minutes 57 seconds

Listed in: Education

x30n: Blackjacking - 0wning the Enterprise via the Blackberry

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 8 seconds

Listed in: Education

Matt Hargett: Automatic Exploit Detection in Binaries

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 7 minutes 53 seconds

Listed in: Education

Robert J. Hansen: Trust, But Verify: Auditing Proprietary DRE Systems

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 7 minutes 53 seconds

Listed in: Education

Rick Wesson: Abuse and the Global Infection Rate

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 47 seconds

Listed in: Education

Andrew Whitaker: Corporate Network Spying

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 5 minutes 36 seconds

Listed in: Education

Foofus: Graphical Representations of Security Relationships: Awesome or Bullshit?

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 40 minutes 44 seconds

Listed in: Education

EFF: PANEL: EFF v. AT&T: Your World, Delivered (to the NSA)

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 35 seconds

Listed in: Education

SensePost: A Tale of Two Proxies

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 52 minutes 53 seconds

Listed in: Education

Peter Gutmann: Phishing Tips and Techniques: Tackle, Rigging, and How & When to Phish

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 49 minutes 25 seconds

Listed in: Education

Johan Hybinette: How to Create an Anonymous Identity

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 35 minutes 46 seconds

Listed in: Education

Lin0xx: Advanced Windows Based Firewall Subversion

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 44 seconds

Listed in: Education

Chris Eagle: Ripples in the Gene Pool - Creating Genetic: Mutations to Survive the Vulerability Window

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 3 seconds

Listed in: Education

Steve Dunker: FEAR!(?) The Census Bureau

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 2 minutes 57 seconds

Listed in: Education

Seth Hardy: Your Name, Your Shoe Size, Your Identity? What do we Trust in this Web?

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 46 minutes 32 seconds

Listed in: Education

Paul Vixie: Malware Repository Requirement

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 39 seconds

Listed in: Education

Brad Smith: How the FBI uses NLP on YOU!

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 37 seconds

Listed in: Education

Wes Brown: Exploit Writing Using Injectable Virtual Machines

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 56 minutes 7 seconds

Listed in: Education