Podcasts

Luke Jennings:One Token to Rule Them All: Post-Exploitation Fun in Windows Environments

Published: Nov. 30, 2009, 9:57 p.m.
Duration: 46 minutes 39 seconds

Listed in: Technology

Panel: Disclosure Panel

Published: Jan. 31, 2008, 10:54 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Panel: Meet the VCs

Published: Jan. 31, 2008, 10:52 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Panel: Meet the Fed

Published: Jan. 31, 2008, 10:48 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Lukas Grunwald: Security by Politics - Why it will never work

Published: Jan. 31, 2008, 10:38 p.m.
Duration: 50 minutes 4 seconds

Listed in: Technology

Fred Doyle & Matt Richard: "Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning

Published: Jan. 3, 2008, 9:17 p.m.
Duration: 45 minutes 15 seconds

Listed in: Technology

Daniel Peck & Ben Feinstein: CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 45 minutes 56 seconds

Listed in: Technology

Mike Perry: Securing the Tor Network

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 15 minutes 36 seconds

Listed in: Technology

Aaron Peterson: Pen-testing Wi-Fi

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 20 minutes 7 seconds

Listed in: Technology

Plet: Stealing Identity Management Systems

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 51 seconds

Listed in: Technology

Bruce Potter: Dirty Secrets of the Security Industry

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 7 seconds

Listed in: Technology

Danny Quist & Valsmith: Covert Debugging: Circumventing Software Armoring Techniques

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 37 seconds

Listed in: Technology

Aviv Raff: The Inherent Insecurity of Widgets and Gadgets

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Vivek Ramachandran: The Emperor Has No Cloak ? WEP Cloaking Exposed

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 56 seconds

Listed in: Technology

Matt Richard: Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 45 minutes 15 seconds

Listed in: Technology

Billy Rios: Biting the Hand that Feeds You - Storing and Serving Malicous Content From Well Known Web Servers

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 27 seconds

Listed in: Technology

Martyn Ruks: MQ Jumping

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 22 seconds

Listed in: Technology

Oskar Sandberg: Network Mathematics: Why is it a Small World?

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 11 seconds

Listed in: Technology

Michael Schearer : The Church of WiFi Presents: Hacking Iraq

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 48 seconds

Listed in: Technology

Bruce Schneier: Q&A with Bruce Schneier

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 21 seconds

Listed in: Technology

Michael Schrenk: The Executable Image Exploit

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 39 minutes 23 seconds

Listed in: Technology

Jason Scott: THE EDGE OF FOREVER - MAKING COMPUTER HISTORY

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 44 minutes 57 seconds

Listed in: Technology

Dror Shalev: A Crazy Toaster: Can Home Devices turn against us?

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 38 minutes 53 seconds

Listed in: Technology

Zed A. Shaw: Saving The Internet With Hate

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 52 seconds

Listed in: Technology

Matthew "Pilgrim" Shuchman: How to be a WiFi Ninja

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 45 minutes 14 seconds

Listed in: Technology

Robert Stoudt: When Tapes Go Missing

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 33 minutes 37 seconds

Listed in: Technology

Subere: Fingerprinting and Cracking Java Obfuscated Code

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 29 minutes 47 seconds

Listed in: Technology

Richard Thieme: Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 52 minutes 18 seconds

Listed in: Technology

Steve "Arrakis" Topletz: Portable Privacy

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 52 minutes 12 seconds

Listed in: Technology

Schuyler Towne: Locksport: An emerging subculture

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 45 seconds

Listed in: Technology

I)ruidm: Real-time Steganography with RTP

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 35 seconds

Listed in: Technology

Squidly1- Theresa Verity: Thinking Outside the Console (box)

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 56 minutes 15 seconds

Listed in: Technology

Jacob West: How I Learned to Stop Fuzzing and Find More Bugs

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 43 minutes 52 seconds

Listed in: Technology

Thomas Wilhelm: Turn-Key PenTest Labs

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 29 minutes 41 seconds

Listed in: Technology

Agent X: 44 Lines about 22 Things that keep me up at Night

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 21 minutes 26 seconds

Listed in: Technology

Paul Sebastian Ziegler: Multiplatform malware within the .NET-Framework

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 42 minutes 52 seconds

Listed in: Technology

Philip R. Zimmermann: ZFONE

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 46 seconds

Listed in: Technology

Iftach Ian Amit: The Inherent Insecurity of Widgets and Gadgets

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 4 seconds

Listed in: Technology

Ofir Arkin: kNAC!

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 7 minutes

Listed in: Technology

Ask EFF: The Year in Digital Civil Liberties

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 45 minutes 5 seconds

Listed in: Technology

Atlas: Remedial Heap Overflows: dlmalloc style

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 57 minutes 13 seconds

Listed in: Technology

Geoffrey Bennett: The Completion Backward Principle

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 54 minutes 15 seconds

Listed in: Technology

John "jur1st" Benson: Bridging the Gap Between Technology and the Law

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 22 seconds

Listed in: Technology

Peter Berghammer: A Journalist's Perspective on Security Research

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 54 minutes 54 seconds

Listed in: Technology

Sean M. Bodmer: Analyzing Intrusions & Intruders

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 44 seconds

Listed in: Technology

Sam Bowne: Teaching Hacking at College

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 28 minutes 16 seconds

Listed in: Technology

Sergey Bratus: Entropy-based data organization tricks for log and packet capture browsing.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 5 seconds

Listed in: Technology

Taylor Brinton & Brett Neilson: Being in the know... Listening to and understanding modern radio systems

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 5 seconds

Listed in: Technology

David Byrne: Intranet Invasion With Anti-DNS Pinning

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 14 seconds

Listed in: Technology

D.J. Capelis: Virtualization: Enough holes to work Vegas

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 8 seconds

Listed in: Technology

Anton Chuvakin & Mike Murray: The Science Of Social engineering: NLP

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 15 seconds

Listed in: Technology

Robert Clark: Computer and Internet Security Law?A Year in Review 2006?2007

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 53 minutes 21 seconds

Listed in: Technology

Greg Conti: Satellite Imagery Analysis

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 42 minutes 17 seconds

Listed in: Technology

Crispin Cowan: Securing Linux Applications With AppArmor

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 45 minutes 8 seconds

Listed in: Technology

Lee Kushner & Mike Murray: Creating and Managing your Security Career

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes

Listed in: Technology

Jesse 'x30n' D'Aguanno: LAN Protocol Attacks Part 1 - Arp Reloaded

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 20 seconds

Listed in: Technology

Rick Deacon: Hacking Social Lives: MySpace.com

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 33 minutes 33 seconds

Listed in: Technology

Dead Addict: Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 59 seconds

Listed in: Technology

Delchi & Valsmith: Malware Secrets

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 24 minutes 1 second

Listed in: Technology

Jared DeMott & Panel: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 15 seconds

Listed in: Technology

Ganesh Devarajan: Unraveling SCADA Protocols: Using Sulley Fuzzer

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 58 seconds

Listed in: Technology

Roger Dingledine: Tor and blocking-resistance

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 46 minutes 54 seconds

Listed in: Technology

Toralv Dirro & Dirk Kollberg: Trojans, A Reality Check

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 52 minutes 12 seconds

Listed in: Technology

Steve Dunker: Every thing you ever wanted to know about Police Procedure in 50 minutes.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 5 seconds

Listed in: Technology

Luiz Eduardo: The Hacker Society around the (corporate) world.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 38 minutes 56 seconds

Listed in: Technology

Joel Eriksson & Panel: Kernel Wars

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 50 seconds

Listed in: Technology

Nathan S. Evans & Christian Grothoff: Routing in The Dark: Pitch Black

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 19 minutes 28 seconds

Listed in: Technology

Gadi Evron: Estonia and Information Warefare

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 56 minutes 36 seconds

Listed in: Technology

Gadi Evron: Webserver Botnets and Hosting Farms as Attack Platforms

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 40 minutes 52 seconds

Listed in: Technology

Matt Fiddler & Marc Weber Tobias: High Insecurity: Locks, Lies, and Liability

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 47 minutes 16 seconds

Listed in: Technology

Terrence "king tuna" Gareau: Hacking EvDO

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 28 minutes 55 seconds

Listed in: Technology

Kenneth Geers: Greetz from Room 101

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 58 seconds

Listed in: Technology

Damian Gomez: Intelligent debugging for vuln-dev

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 29 minutes 12 seconds

Listed in: Technology

K N Gopinath: Multipot: A More Potent Variant of Evil Twin

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 31 minutes 37 seconds

Listed in: Technology

Joe Grand: Making of the DEFCON 15 Badge

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 36 minutes 32 seconds

Listed in: Technology

Jennifer Granick: Disclosure and Intellectual Property Law: Case Studies

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 4 seconds

Listed in: Technology

David Gustin "nonsequitor" & Abraham "AbEnd" Shultz: Hardware Hacking for Software Geeks

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 24 seconds

Listed in: Technology

Peter Gutmann: The Commercial Malware Industry

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 53 minutes 3 seconds

Listed in: Technology

Nathan "Sysmin" Hamiel & Marklar: Creating Unreliable Systems "Attacking the Systems That Attack You"

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 43 minutes 2 seconds

Listed in: Technology

Ian G. Harris: INTERSTATE: A Stateful Protocol Fuzzer for SIP

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 20 minutes 13 seconds

Listed in: Technology

John Heasman: Hacking the Extensible Firmware Interface

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 46 seconds

Listed in: Technology

Aaron Higbee: Hack Your Car for Boost and Power!

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 14 seconds

Listed in: Technology

Ricky Hill: GeoLocation of Wireless Access Points and "Wireless GeoCaching"

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 47 minutes 58 seconds

Listed in: Technology

Greg Hoglund: VIRTUAL WORLD, REAL HACKING

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 52 minutes 49 seconds

Listed in: Technology

Dr. Thomas J. Holt: The Market for Malware

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 33 seconds

Listed in: Technology

Broward Horne: Click Fraud Detection with Practical Memetics

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 40 minutes 52 seconds

Listed in: Technology

Dan Hubbard: HoneyJax (AKA Web Security Monitoring and Intelligence 2.0)

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 1 second

Listed in: Technology

David Hulton: Faster PwninG Assured: New adventures with FPGAs

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 23 minutes 21 seconds

Listed in: Technology

Dave Josephsen: Homeless Vikings, (short-lived bgp prefix hijacking and the spamwars)

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 39 seconds

Listed in: Technology

Dan Kaminsky: Black Ops 2007: Design Reviewing The Web

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 55 minutes 18 seconds

Listed in: Technology

Vitaliy Kamlyuk: Fighting Malware on your own.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 2 minutes 2 seconds

Listed in: Technology

Patrik Karlsson: SQL injection and out-of-band channeling

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 39 minutes 22 seconds

Listed in: Technology

Benjamin Kurtz: Functional Fuzzing with Funk

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 51 minutes 31 seconds

Listed in: Technology

Mickey Lasky & David C. Smith: Cool stuff learned from competing in the DC3 digital forensic challenge.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 8 seconds

Listed in: Technology

Edward Lee: Comparing Application Security Tools

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 17 minutes 48 seconds

Listed in: Technology

Janne Lindquist: IPV6 Is bad for your privacy.

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 20 minutes 11 seconds

Listed in: Technology

Johhny Long: No-tech Hacking

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 58 minutes 54 seconds

Listed in: Technology

Marce Luck & Tom Stracener: Hacking the EULA: Reverse Benchmarking Web Application Security Scanners

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 47 seconds

Listed in: Technology

Nick Mathewson: SOCIAL ATTACKS ON ANONYMITY NETWORKS

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 26 seconds

Listed in: Technology

Nick Mathewson: TECHNICAL CHANGES SINCE YOU LAST HEARD ABOUT TOR

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 50 minutes 3 seconds

Listed in: Technology

Haroon Meer & Marco Slaviero: It's All About the Timing

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 29 seconds

Listed in: Technology

Charlie Miller: How smart is Intelligent Fuzzing - or - how stupid is Dumb Fuzzing?"

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 18 minutes 29 seconds

Listed in: Technology

Doug Mohney: The Next Wireless Frontier - TV White Spaces

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 41 minutes 47 seconds

Listed in: Technology

HD Moore & Valsmith: Tactical Exploitation

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 46 seconds

Listed in: Technology

Dark Tangent : CiscoGate

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 51 minutes 44 seconds

Listed in: Technology

Scott Moulton: Re-Animating Drives - Advanced Data Recovery

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 43 minutes 30 seconds

Listed in: Technology

Shawn Moyer: (un)Smashing the Stack: Overflows, Countermeasures, and the Real World

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 57 minutes 2 seconds

Listed in: Technology

Rich Murphey, PhD: Windows Vista Log Forensics

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 26 seconds

Listed in: Technology

Ne0nRa1n & Julian Spillane: Hack your brain with video games

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 46 minutes 48 seconds

Listed in: Technology

Danny O'Brien: Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 44 minutes 31 seconds

Listed in: Technology

Brendan O'connor: Greater than 1: Defeating "strong" Authentication in Web Applications

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 54 minutes 37 seconds

Listed in: Technology

STEVE ORRIN: The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 32 seconds

Listed in: Technology

Alfredo Ortega: OpenBSD remote Exploit and another IPv6 vulnerabilities

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 2 seconds

Listed in: Technology

Chris Palmer & Alex Stamos: Breaking Forensics Software: Weaknesses in Critical Evidence Collection

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 51 minutes 50 seconds

Listed in: Technology

Gadi Evron & Panel: Internet Wars 2007

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 1 hour 13 minutes 26 seconds

Listed in: Technology

RenderMan & Panel: The Church of WiFi's Wireless Extravaganza

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 51 minutes 2 seconds

Listed in: Technology

Myles Long & Panel: Self-Publishing and the Computer Underground

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 49 minutes 27 seconds

Listed in: Technology

Deviant Ollam & Panel: Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level

Published: Jan. 9, 2006, 11:10 p.m.
Duration: 48 minutes 36 seconds

Listed in: Technology