DEFCON 15 [Audio] Speeches from the hacker conventions

DEFCON 15 [Audio] Speeches from the hacker conventions

122 episodes

Past speeches and talks from DEF CON hacking conferences in an iTunes friendly Mp4 format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you didn't make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want. Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available!

Podcasts

Panel: Disclosure Panel

Published: Jan. 31, 2008, 10:54 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Panel: Meet the VCs

Published: Jan. 31, 2008, 10:52 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Panel: Meet the Fed

Published: Jan. 31, 2008, 10:48 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Luke Jennings:One Token to Rule Them All: Post-Exploitation Fun in Windows Environments

Published: Jan. 31, 2008, 10:43 p.m.
Duration: 46 minutes 39 seconds

Listed in: Technology

Lukas Grunwald: Security by Politics - Why it will never work

Published: Jan. 31, 2008, 10:38 p.m.
Duration: 50 minutes 4 seconds

Listed in: Technology

Fred Doyle & Matt Richard: "Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning

Published: Jan. 3, 2008, 9:17 p.m.
Duration: 45 minutes 15 seconds

Listed in: Technology

Iftach Ian Amit: The Inherent Insecurity of Widgets and Gadgets

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Ofir Arkin: kNAC!

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 7 minutes

Listed in: Technology

Ask EFF: The Year in Digital Civil Liberties

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 45 minutes 5 seconds

Listed in: Technology

Atlas: Remedial Heap Overflows: dlmalloc style

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 57 minutes 13 seconds

Listed in: Technology

Geoffrey Bennett: The Completion Backward Principle

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 54 minutes 15 seconds

Listed in: Technology

John "jur1st" Benson: Bridging the Gap Between Technology and the Law

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 22 seconds

Listed in: Technology

Peter Berghammer: A Journalist's Perspective on Security Research

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 54 minutes 54 seconds

Listed in: Technology

Sean M. Bodmer: Analyzing Intrusions & Intruders

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 44 seconds

Listed in: Technology

Sam Bowne: Teaching Hacking at College

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 28 minutes 16 seconds

Listed in: Technology

Sergey Bratus: Entropy-based data organization tricks for log and packet capture browsing.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 5 seconds

Listed in: Technology

Taylor Brinton & Brett Neilson: Being in the know... Listening to and understanding modern radio systems

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 5 seconds

Listed in: Technology

David Byrne: Intranet Invasion With Anti-DNS Pinning

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 14 seconds

Listed in: Technology

D.J. Capelis: Virtualization: Enough holes to work Vegas

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 8 seconds

Listed in: Technology

Anton Chuvakin & Mike Murray: The Science Of Social engineering: NLP

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 15 seconds

Listed in: Technology

Robert Clark: Computer and Internet Security Law?A Year in Review 2006?2007

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 53 minutes 21 seconds

Listed in: Technology

Greg Conti: Satellite Imagery Analysis

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 42 minutes 17 seconds

Listed in: Technology

Crispin Cowan: Securing Linux Applications With AppArmor

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 45 minutes 8 seconds

Listed in: Technology

Lee Kushner & Mike Murray: Creating and Managing your Security Career

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes

Listed in: Technology

Jesse 'x30n' D'Aguanno: LAN Protocol Attacks Part 1 - Arp Reloaded

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 20 seconds

Listed in: Technology

Rick Deacon: Hacking Social Lives: MySpace.com

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 33 minutes 33 seconds

Listed in: Technology

Dead Addict: Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 59 seconds

Listed in: Technology

Delchi & Valsmith: Malware Secrets

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 24 minutes 1 second

Listed in: Technology

Jared DeMott & Panel: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 15 seconds

Listed in: Technology

Ganesh Devarajan: Unraveling SCADA Protocols: Using Sulley Fuzzer

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 58 seconds

Listed in: Technology

Roger Dingledine: Tor and blocking-resistance

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 46 minutes 54 seconds

Listed in: Technology

Toralv Dirro & Dirk Kollberg: Trojans, A Reality Check

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 52 minutes 12 seconds

Listed in: Technology

Steve Dunker: Every thing you ever wanted to know about Police Procedure in 50 minutes.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 5 seconds

Listed in: Technology

Luiz Eduardo: The Hacker Society around the (corporate) world.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 38 minutes 56 seconds

Listed in: Technology

Joel Eriksson & Panel: Kernel Wars

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 50 seconds

Listed in: Technology

Nathan S. Evans & Christian Grothoff: Routing in The Dark: Pitch Black

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 19 minutes 28 seconds

Listed in: Technology

Gadi Evron: Estonia and Information Warefare

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 56 minutes 36 seconds

Listed in: Technology

Gadi Evron: Webserver Botnets and Hosting Farms as Attack Platforms

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 40 minutes 52 seconds

Listed in: Technology

Matt Fiddler & Marc Weber Tobias: High Insecurity: Locks, Lies, and Liability

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 47 minutes 16 seconds

Listed in: Technology

Terrence "king tuna" Gareau: Hacking EvDO

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 28 minutes 55 seconds

Listed in: Technology

Kenneth Geers: Greetz from Room 101

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 58 seconds

Listed in: Technology

Damian Gomez: Intelligent debugging for vuln-dev

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 29 minutes 12 seconds

Listed in: Technology

K N Gopinath: Multipot: A More Potent Variant of Evil Twin

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 31 minutes 37 seconds

Listed in: Technology

Joe Grand: Making of the DEFCON 15 Badge

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 36 minutes 32 seconds

Listed in: Technology

Jennifer Granick: Disclosure and Intellectual Property Law: Case Studies

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 4 seconds

Listed in: Technology

David Gustin "nonsequitor" & Abraham "AbEnd" Shultz: Hardware Hacking for Software Geeks

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 24 seconds

Listed in: Technology

Peter Gutmann: The Commercial Malware Industry

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 53 minutes 3 seconds

Listed in: Technology

Nathan "Sysmin" Hamiel & Marklar: Creating Unreliable Systems "Attacking the Systems That Attack You"

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 43 minutes 2 seconds

Listed in: Technology

Ian G. Harris: INTERSTATE: A Stateful Protocol Fuzzer for SIP

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 20 minutes 13 seconds

Listed in: Technology

John Heasman: Hacking the Extensible Firmware Interface

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 46 seconds

Listed in: Technology

Aaron Higbee: Hack Your Car for Boost and Power!

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 14 seconds

Listed in: Technology

Ricky Hill: GeoLocation of Wireless Access Points and "Wireless GeoCaching"

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 58 seconds

Listed in: Technology

Greg Hoglund: VIRTUAL WORLD, REAL HACKING

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 52 minutes 49 seconds

Listed in: Technology

Dr. Thomas J. Holt: The Market for Malware

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 33 seconds

Listed in: Technology

Broward Horne: Click Fraud Detection with Practical Memetics

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 40 minutes 52 seconds

Listed in: Technology

Dan Hubbard: HoneyJax (AKA Web Security Monitoring and Intelligence 2.0)

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 1 second

Listed in: Technology

David Hulton: Faster PwninG Assured: New adventures with FPGAs

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 23 minutes 21 seconds

Listed in: Technology

Dave Josephsen: Homeless Vikings, (short-lived bgp prefix hijacking and the spamwars)

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 39 seconds

Listed in: Technology

Dan Kaminsky: Black Ops 2007: Design Reviewing The Web

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 55 minutes 18 seconds

Listed in: Technology

Vitaliy Kamlyuk: Fighting Malware on your own.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 2 minutes 2 seconds

Listed in: Technology

Patrik Karlsson: SQL injection and out-of-band channeling

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 39 minutes 22 seconds

Listed in: Technology

Benjamin Kurtz: Functional Fuzzing with Funk

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 51 minutes 31 seconds

Listed in: Technology

Mickey Lasky & David C. Smith: Cool stuff learned from competing in the DC3 digital forensic challenge.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 8 seconds

Listed in: Technology

Edward Lee: Comparing Application Security Tools

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 17 minutes 48 seconds

Listed in: Technology

Janne Lindquist: IPV6 Is bad for your privacy.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 20 minutes 11 seconds

Listed in: Technology

Johhny Long: No-tech Hacking

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 58 minutes 54 seconds

Listed in: Technology

Marce Luck & Tom Stracener: Hacking the EULA: Reverse Benchmarking Web Application Security Scanners

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 47 seconds

Listed in: Technology

Nick Mathewson: SOCIAL ATTACKS ON ANONYMITY NETWORKS

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 26 seconds

Listed in: Technology

Nick Mathewson: TECHNICAL CHANGES SINCE YOU LAST HEARD ABOUT TOR

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 3 seconds

Listed in: Technology

Haroon Meer & Marco Slaviero: It's All About the Timing

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 29 seconds

Listed in: Technology

Charlie Miller: How smart is Intelligent Fuzzing - or - how stupid is Dumb Fuzzing?"

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 18 minutes 29 seconds

Listed in: Technology

Doug Mohney: The Next Wireless Frontier - TV White Spaces

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 41 minutes 47 seconds

Listed in: Technology

HD Moore & Valsmith: Tactical Exploitation

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 46 seconds

Listed in: Technology

Dark Tangent Moss: CiscoGate

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 51 minutes 44 seconds

Listed in: Technology

Scott Moulton: Re-Animating Drives - Advanced Data Recovery

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 43 minutes 30 seconds

Listed in: Technology

Shawn Moyer: (un)Smashing the Stack: Overflows, Countermeasures, and the Real World

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 57 minutes 2 seconds

Listed in: Technology

Rich Murphey, PhD: Windows Vista Log Forensics

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 26 seconds

Listed in: Technology

Ne0nRa1n & Julian Spillane: Hack your brain with video games

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 48 seconds

Listed in: Technology

Danny O'Brien: Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 31 seconds

Listed in: Technology

Brendan O'connor: Greater than 1: Defeating "strong" Authentication in Web Applications

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 54 minutes 37 seconds

Listed in: Technology

STEVE ORRIN: The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 32 seconds

Listed in: Technology

Alfredo Ortega: OpenBSD remote Exploit and another IPv6 vulnerabilities

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 2 seconds

Listed in: Technology

Chris Palmer & Alex Stamos: Breaking Forensics Software: Weaknesses in Critical Evidence Collection

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 51 minutes 50 seconds

Listed in: Technology

Gadi Evron & Panel: Internet Wars 2007

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 13 minutes 26 seconds

Listed in: Technology

RenderMan & Panel: The Church of WiFi's Wireless Extravaganza

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 51 minutes 2 seconds

Listed in: Technology

Myles Long & Panel: Self-Publishing and the Computer Underground

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 27 seconds

Listed in: Technology

Deviant Ollam & Panel: Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 36 seconds

Listed in: Technology

Daniel Peck & Ben Feinstein: CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 45 minutes 56 seconds

Listed in: Technology

Mike Perry: Securing the Tor Network

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 15 minutes 36 seconds

Listed in: Technology

Aaron Peterson: Pen-testing Wi-Fi

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

Plet: Stealing Identity Management Systems

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 51 seconds

Listed in: Technology

Bruce Potter: Dirty Secrets of the Security Industry

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 7 seconds

Listed in: Technology

Danny Quist & Valsmith: Covert Debugging: Circumventing Software Armoring Techniques

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 37 seconds

Listed in: Technology

Aviv Raff: The Inherent Insecurity of Widgets and Gadgets

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Vivek Ramachandran: The Emperor Has No Cloak ? WEP Cloaking Exposed

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 56 seconds

Listed in: Technology

Matt Richard: Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 45 minutes 15 seconds

Listed in: Technology

Billy Rios: Biting the Hand that Feeds You - Storing and Serving Malicous Content From Well Known Web Servers

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 27 seconds

Listed in: Technology

Martyn Ruks: MQ Jumping

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 22 seconds

Listed in: Technology

Oskar Sandberg: Network Mathematics: Why is it a Small World?

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 11 seconds

Listed in: Technology

Michael Schearer : The Church of WiFi Presents: Hacking Iraq

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 48 seconds

Listed in: Technology

Bruce Schneier: Q&A with Bruce Schneier

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 21 seconds

Listed in: Technology

Michael Schrenk: The Executable Image Exploit

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 39 minutes 23 seconds

Listed in: Technology

Jason Scott: THE EDGE OF FOREVER - MAKING COMPUTER HISTORY

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 44 minutes 57 seconds

Listed in: Technology

Dror Shalev: A Crazy Toaster: Can Home Devices turn against us?

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 38 minutes 53 seconds

Listed in: Technology

Zed A. Shaw: Saving The Internet With Hate

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 52 seconds

Listed in: Technology

Matthew "Pilgrim" Shuchman: How to be a WiFi Ninja

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 45 minutes 14 seconds

Listed in: Technology

Robert Stoudt: When Tapes Go Missing

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 33 minutes 37 seconds

Listed in: Technology

Subere: Fingerprinting and Cracking Java Obfuscated Code

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 29 minutes 47 seconds

Listed in: Technology

Richard Thieme: Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 52 minutes 18 seconds

Listed in: Technology

Steve "Arrakis" Topletz: Portable Privacy

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 52 minutes 12 seconds

Listed in: Technology

Schuyler Towne: Locksport: An emerging subculture

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 45 seconds

Listed in: Technology

I)ruidm: Real-time Steganography with RTP

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 35 seconds

Listed in: Technology

Squidly1- Theresa Verity: Thinking Outside the Console (box)

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 56 minutes 15 seconds

Listed in: Technology

Jacob West: How I Learned to Stop Fuzzing and Find More Bugs

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 43 minutes 52 seconds

Listed in: Technology

Thomas Wilhelm: Turn-Key PenTest Labs

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 29 minutes 41 seconds

Listed in: Technology

Agent X: 44 Lines about 22 Things that keep me up at Night

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 21 minutes 26 seconds

Listed in: Technology

Paul Sebastian Ziegler: Multiplatform malware within the .NET-Framework

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 42 minutes 52 seconds

Listed in: Technology

Philip R. Zimmermann: ZFONE

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 46 seconds

Listed in: Technology