Podcasts

Scott Moulton: Forensics is ONLY for Private Investigators

Published: March 4, 2009, 8:09 p.m.
Duration: 50 minutes 1 second

Listed in: Technology

Ben Feinstein: The Wide World of WAF's

Published: Feb. 10, 2009, 10:23 a.m.
Duration: 44 minutes 24 seconds

Listed in: Technology

Magnus Brading: Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol

Published: Feb. 1, 2009, 1:37 p.m.
Duration: 1 hour 30 minutes 53 seconds

Listed in: Technology

The Dark Tangent & Joe "Kingpin" Grand: Welcome & Making of the Badge Talk

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 40 seconds

Listed in: Technology

Alexander Lash: Taking Back your Cellphone

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 3 seconds

Listed in: Technology

Anton Kapela & Alex Pilosov: Stealing The Internet - A Routed, Wide-area, Man in the Middle Attack

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 46 minutes 24 seconds

Listed in: Technology

Anthony Martinez & Thomas Bowen : Toasterkit, a modular NetBSD rootkit.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 30 minutes 59 seconds

Listed in: Technology

Atlas: VulnCatcher: Fun with Vtrace and Programmatic Debugging

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 44 minutes 44 seconds

Listed in: Technology

Ben Feinstein: Snort Plug-in Development: Teaching an Old Pig New Tricks

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 27 seconds

Listed in: Technology

Blake Self, Durandal & Bitemytaco: Free Anonymous Internet Using Modified Cable Modems

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 32 seconds

Listed in: Technology

Brenno J.S.A.A.F. de Winter: Hacking Data Retention: Small Sister your digital privacy self defense.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 38 minutes 52 seconds

Listed in: Technology

Brenno J.S.A.A.F. de Winter:The Anatomy of a Subway Hack: Discussion

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 43 minutes 34 seconds

Listed in: Technology

Brian K. Edwards & Silvio J. Flaim: Measuring and Integrating the Shadow Economy: A Sector-Specific Approach

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 21 minutes 36 seconds

Listed in: Technology

Bruce Potter: Malware Detection through Network Flow Analysis

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 28 seconds

Listed in: Technology

Cameron Hotchkies: Under the iHood

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 23 seconds

Listed in: Technology

Chris Eagle & Tim Vidas: Next Generation Collaborative Reversing with Ida Pro and CollabREate

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 49 minutes 16 seconds

Listed in: Technology

Christopher Tarnovsky: Inducing Momentary Faults Within Secure Smartcards / Microcontrollers

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 46 minutes 24 seconds

Listed in: Technology

Clinton Wong: Web Privacy & Flash Local Shared Objects.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 16 minutes 1 second

Listed in: Technology

D.J. Capelis: Building a Real Session Layer

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 46 minutes 46 seconds

Listed in: Technology

Dan Kaminsky: Black Ops 2008

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 20 minutes 52 seconds

Listed in: Technology

David Byrne & Eric Duprey: Grendel-Scan: A new web application scanning tool

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 8 seconds

Listed in: Technology

David Maynor & Robert Graham: Bringing Sexy Back: Breaking in with Style

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 41 minutes 6 seconds

Listed in: Technology

David Scott Lewis: Fireside Chat

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 32 seconds

Listed in: Technology

David Weston & Tiller Beauchamp : RE:Trace: The Reverse Engineer's Unexpected Swiss Army Knife

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 37 seconds

Listed in: Technology

Don M. Blumenthal: What To Do When Your Data Winds Up Where It Shouldn't

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 23 seconds

Listed in: Technology

Don M. Blumenthal: Working with Law Enforcement

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 38 minutes 25 seconds

Listed in: Technology

Doug Farre: Identification Card Security

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 43 minutes 17 seconds

Listed in: Technology

Eric Smith & Dr. Shana Dardan: Medical Identity Theft

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 46 seconds

Listed in: Technology

Fabian "Fabs" Yamaguchi & FX: New ideas for old practices - Port-Scanning improved

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 39 minutes 1 second

Listed in: Technology

Ferdinand Schober: Gaming - the next overlooked security hole

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 44 minutes 3 seconds

Listed in: Technology

Fouad Kiamilev & Ryan Hoover: Demonstration of Hardware Trojans

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 17 minutes 47 seconds

Listed in: Technology

FX: Developments in Cisco IOS Forensics

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 49 minutes 46 seconds

Listed in: Technology

FX: Toying with Barcodes

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 44 minutes 25 seconds

Listed in: Technology

Fyodor: Nmap: Scanning the Internet

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 21 seconds

Listed in: Technology

G. Mark Hardy: A Hacker Looks at 50

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 55 minutes 34 seconds

Listed in: Technology

Greg Conti: Could Googling Take Down a President, a Prime Minister, or an Average Citizen?.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 42 minutes 43 seconds

Listed in: Technology

Guy Martin: Sniffing Cable Modems

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 38 minutes 23 seconds

Listed in: Technology

Ian Angell: Digital Security, A Risky Business

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 43 seconds

Listed in: Technology

Ian Clarke: Hacking Desire

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 49 minutes 41 seconds

Listed in: Technology

Igor Muttik: Good Viruses. Evaluating the Risks.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 43 minutes 59 seconds

Listed in: Technology

James Shewmaker: StegoFS

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 37 minutes 6 seconds

Listed in: Technology

Jan Newger: Anti-RE Techniques in DRM Code

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 40 minutes 24 seconds

Listed in: Technology

Jason Scott: Making a Text Adventure Documentary

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 12 minutes 20 seconds

Listed in: Technology

Jay Beale: They're Hacking Our Clients! Introducing Free Client-side Intrusion Prevention.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 34 seconds

Listed in: Technology

Jay Beale: Owning the Users with Agent in the Middle

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 23 seconds

Listed in: Technology

Jim O'Leary: Every Breath You Take

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 43 seconds

Listed in: Technology

Joe Cicero &Michael Vieau: Hacking E.S.P.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 18 minutes 59 seconds

Listed in: Technology

Joe "Kingpin" Grand & Zoz: BSODomizer

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 30 minutes 40 seconds

Listed in: Technology

John "Jur1st" Benson: When Lawyers Attack! Dealing with the New Rules of Electronic Discovery

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 48 minutes 13 seconds

Listed in: Technology

John Fitzpatrick: Virtually Hacking

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 34 seconds

Listed in: Technology

JonM: Ham For Hackers- Take Back the Airwaves

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 18 minutes 59 seconds

Listed in: Technology

Kevin Figueroa, Marco Figueroa & Anthony Williams: VLANs Layer 2 Attacks: Their Relevance and their Kryptonite

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 36 minutes 22 seconds

Listed in: Technology

Kolisar: WhiteSpace: A Different Approach to JavaScript Obfuscation

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 20 minutes 10 seconds

Listed in: Technology

Kurt Grutzmacher: Nail the Coffin Shut, NTLM is Dead.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 42 minutes 44 seconds

Listed in: Technology

Lee Kushner & Mike Murray: Career Mythbusters-Separating Fact from Fiction in your Information Security Career

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 49 minutes 8 seconds

Listed in: Technology

Lyn:Tuning Your Brain.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 33 minutes 38 seconds

Listed in: Technology

Major Malfunction: Feed my Sat Monkey

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 32 seconds

Listed in: Technology

Marc Weber Tobias & Matt Fiddler: Open in 30 Seconds: Cracking One of the Most Secure Locks in America

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 47 minutes 44 seconds

Listed in: Technology

Mark Bristow: ModScan: A SCADA MODBUS Network Scanner

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 39 minutes 59 seconds

Listed in: Technology

Mati Aharoni: BackTrack Foo - From bug to 0day

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 37 minutes 48 seconds

Listed in: Technology

Matt "DCFLuX" Krick: Flux on: EAS (Emergency Alert System)

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 8 seconds

Listed in: Technology

Matt Weir & Sudhir Aggarwal: Password Cracking on a Budget

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 43 minutes 9 seconds

Listed in: Technology

Matt Yoder: The Death Envelope: A Medieval Solution to a 21st Century Problem

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 38 minutes 5 seconds

Listed in: Technology

Michael Brooks: CSRF Bouncing

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 37 minutes 40 seconds

Listed in: Technology

Michael Brooks: Deciphering Captcha

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 20 minutes 49 seconds

Listed in: Technology

Michael Ligh & Greg Sinclair: Malware RCE: Debuggers and Decryptor Development

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 32 seconds

Listed in: Technology

Mike Perry: 365-Day: Active https cookie hijacking

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 20 minutes 25 seconds

Listed in: Technology

Mike Renlund: The Big Picture: Digital Cinema Technology and Security

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 38 seconds

Listed in: Technology

Mike Spindel & Scott Torborg: CAPTCHAs: Are they really hopeless? (Yes)

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 38 minutes 57 seconds

Listed in: Technology

Morgan Marquise-Boire: Fear, Uncertainty and the Digital Armageddon

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 20 minutes 15 seconds

Listed in: Technology

N.N.P: VoIPER: Smashing the VoIP stack while you sleep

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 28 minutes 17 seconds

Listed in: Technology

Nathan Evans & Christian Grothoff: de-Tor-iorate Anonymity

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 23 minutes 35 seconds

Listed in: Technology

Nathan Hamiel & Shawn Moyer: Satan is on my Friends list: Attacking Social Networks

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 49 minutes 43 seconds

Listed in: Technology

Ne0nRa1n & Kingpin: Brain Games: Make your own Biofeedback Video Game

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 12 seconds

Listed in: Technology

Nelson Murilo & Luiz Eduardo: Beholder: New wifi monitor tool

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 37 minutes 53 seconds

Listed in: Technology

Nick Harbour: Advanced Software Armoring and Polymorphic Kung Fu

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 38 minutes 17 seconds

Listed in: Technology

NYCMIKE:The World of Pager Sniffing/Interception: More Activity than one may suspect.

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 21 minutes 49 seconds

Listed in: Technology

Panel: All Your Sploits (and Servers) Are Belong To Us: Vulnerabilities Don't Matter (And Neither Does Your Security)

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 32 minutes 6 seconds

Listed in: Technology

Panel: Ask EFF: The Year in Digital Civil Liberties

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 45 minutes 53 seconds

Listed in: Technology

Panel: Autoimmunity Disorder in Wireless LAN's

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 17 minutes 14 seconds

Listed in: Technology

Panel: Black Vs. White: The Complete Life Cycle of a Real World Breach

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 3 minutes

Listed in: Technology

Panel: Commission on Cyber Security for the 44th Presidency

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 47 seconds

Listed in: Technology

Panel: Exploiting A Hundred-Million Hosts Before Brunch

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 16 minutes 53 seconds

Listed in: Technology

Panel: Hacking OpenVMS

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 45 minutes 11 seconds

Listed in: Technology

Panel: Hacking in the Name of Science

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 49 minutes 4 seconds

Listed in: Technology

Panel: Internet Wars

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 31 seconds

Listed in: Technology

Panel: Living in the RIA World

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 44 seconds

Listed in: Technology

Panel: Meet the FEDs

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 2 hours 7 seconds

Listed in: Technology

Paul Craig: Compromising Windows Based Internet Kiosks

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 52 minutes 58 seconds

Listed in: Technology

Peter Berghammer: The emergence (and use) of Open Source Warfare

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 26 minutes 1 second

Listed in: Technology

Phil Zimmerman: Z-Phone

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 42 minutes 51 seconds

Listed in: Technology

Phreakmonkey & mutantMandias :Urban Exploration - A Hacker's View

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 52 minutes 2 seconds

Listed in: Technology

Renderman:How can I pwn thee? Let me count the ways

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 46 minutes

Listed in: Technology

Rick Hill: War Ballooning-Kismet Wireless "Eye in the Sky"

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 46 minutes 19 seconds

Listed in: Technology

Robert Ricks: New Tool for SQL Injection with DNS Exfiltration

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 24 minutes 14 seconds

Listed in: Technology

Roger Dingledine: Security Anonymity Vulnerablities in Tor

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 54 minutes 50 seconds

Listed in: Technology

Ryan Trost: Evade IDS/IPS Systems using Geospatial Threat Detection

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 19 minutes 7 seconds

Listed in: Technology

Sandy "Mouse" Clark: Climbing Everest: An Insider's Look at one state's Voting Systems

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 47 minutes 39 seconds

Listed in: Technology

Schuyler Towne & Jon King: How to make Friends & Influence Lock Manufacturers

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 33 minutes 2 seconds

Listed in: Technology

Scott Moulton: Solid Stated Drives Destroy Forensic & Data Recovery Jobs: Animated!

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 44 minutes 34 seconds

Listed in: Technology

SensePost: Pushing the Camel through the eye of a needle

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 49 seconds

Listed in: Technology

Simon Howard: Race-2-Zero Unpacked

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 18 minutes 18 seconds

Listed in: Technology

Taylor Banks & Carric: Pen-Testing is Dead, Long Live the Pen Test

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 51 minutes 57 seconds

Listed in: Technology

Thomas Wilhelm: Mobile Hacker Space

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 43 minutes 8 seconds

Listed in: Technology

Tom Stracener & Robert Hansen: Xploiting Google Gadgets: Gmalware and Beyond

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 50 minutes 2 seconds

Listed in: Technology

Tony Howlett: The Death of Cash: The loss of anonymity and other dangers of the cash free society

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 20 minutes 34 seconds

Listed in: Technology

Tottenkoph,Rev & Philosopher: Hijacking the Outdoor Digital Billboard Network

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 18 minutes 7 seconds

Listed in: Technology

Travis Goodspeed:Journey to the center of the HP28

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 39 minutes 43 seconds

Listed in: Technology

Valsmith &Colin Ames: MetaPost-Exploitation

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 48 minutes 3 seconds

Listed in: Technology

Vic Vandal: Keeping Secret Secrets Secret and Sharing Secret Secrets Secretly

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 34 minutes 27 seconds

Listed in: Technology

Weasel: Compliance: The Enterprise Vulnerability Roadmap

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 40 minutes 34 seconds

Listed in: Technology

Wendel Guglielmetti Henrique: Playing with Web Application Firewalls

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 34 minutes 57 seconds

Listed in: Technology

Workshop: Davix Workshop

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 1 hour 53 minutes 57 seconds

Listed in: Technology

Zac Franken: Is that a unique credential in your pocket or are you just happy to see me?

Published: Oct. 24, 2006, 9:28 p.m.
Duration: 40 minutes 8 seconds

Listed in: Technology