«
Expand/Collapse
27 items tagged "hollywood"
Related tags:
stack buffer [+],
buffer overflow [+],
buffer [+],
chaos communication congress [+],
system [+],
storyboard quick [+],
ruxcon [+],
render [+],
ray [+],
peter eckersley [+],
muster [+],
media [+],
hacking [+],
farm management system [+],
farm [+],
drm [+],
draft 8 [+],
draft [+],
disc images [+],
directory traversal vulnerability [+],
composer [+],
blu ray discs [+],
avid media composer [+],
avid [+],
aacs [+],
Final [+],
storyboard [+],
slides [+],
quick [+],
proof of concept [+],
presentation slides [+],
presentation [+],
maltego [+],
hollywood studios [+],
hat [+],
endless possibilities [+],
digital [+],
black hat [+],
black [+],
what is net neutrality [+],
unveiling [+],
talk [+],
star wars r2 [+],
sir [+],
silicon valley [+],
security assessment [+],
robot star [+],
robot [+],
rig [+],
piracy [+],
pictures of insects [+],
photography [+],
open [+],
offshoot [+],
nikon d200 [+],
neutrality [+],
net neutrality legislation [+],
net [+],
macro [+],
locker service [+],
locker [+],
letter [+],
kim dotcom [+],
johnny [+],
internet [+],
hotfile [+],
hacks [+],
flikr [+],
exploits [+],
europe [+],
epic clash [+],
epic [+],
dotcom [+],
cons [+],
communication [+],
com [+],
clash [+],
cameras [+],
blindsides [+],
bamf [+],
b9 robot [+],
assessment [+],
anonymous [+],
aim [+],
Release [+]
-
-
13:33
»
SecDocs
Authors:
Peter Eckersley Tags:
cracking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: AACS is the DRM system used on HD-DVD and Blu-Ray discs. It is one of the most sophisticated DRM deployments to date. It includes around twelve different kinds of keys (in fact, even counting the different kinds of keys is non-trivial), three optional watermarking schemes, and four revocation mechanisms (for keys, hardware, players, and certain disc images). AACS has been repeatedly cracked. Its revocation mechanisms are intended to ensure that none of these cracks is permanent, but the evidence so far suggests that crackers will continue to win against it. The talk will explain the many types of AACS keys, how the system fits together, why it will keep breaking, and what Hollywood gains by using it anyway. We will also consider whether it is possible for DRM to be any more evil. Is BD+ (an optional, Blu-Ray only DRM system) going to be worse for users? Will future generations of DRM be worse? Or, if the free world can survive AACS, can it survive anything?
-
13:29
»
SecDocs
Authors:
Peter Eckersley Tags:
cracking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: AACS is the DRM system used on HD-DVD and Blu-Ray discs. It is one of the most sophisticated DRM deployments to date. It includes around twelve different kinds of keys (in fact, even counting the different kinds of keys is non-trivial), three optional watermarking schemes, and four revocation mechanisms (for keys, hardware, players, and certain disc images). AACS has been repeatedly cracked. Its revocation mechanisms are intended to ensure that none of these cracks is permanent, but the evidence so far suggests that crackers will continue to win against it. The talk will explain the many types of AACS keys, how the system fits together, why it will keep breaking, and what Hollywood gains by using it anyway. We will also consider whether it is possible for DRM to be any more evil. Is BD+ (an optional, Blu-Ray only DRM system) going to be worse for users? Will future generations of DRM be worse? Or, if the free world can survive AACS, can it survive anything?
-
13:29
»
SecDocs
Authors:
Peter Eckersley Tags:
cracking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: AACS is the DRM system used on HD-DVD and Blu-Ray discs. It is one of the most sophisticated DRM deployments to date. It includes around twelve different kinds of keys (in fact, even counting the different kinds of keys is non-trivial), three optional watermarking schemes, and four revocation mechanisms (for keys, hardware, players, and certain disc images). AACS has been repeatedly cracked. Its revocation mechanisms are intended to ensure that none of these cracks is permanent, but the evidence so far suggests that crackers will continue to win against it. The talk will explain the many types of AACS keys, how the system fits together, why it will keep breaking, and what Hollywood gains by using it anyway. We will also consider whether it is possible for DRM to be any more evil. Is BD+ (an optional, Blu-Ray only DRM system) going to be worse for users? Will future generations of DRM be worse? Or, if the free world can survive AACS, can it survive anything?
-
-
21:08
»
Packet Storm Security Exploits
The AvidPhoneticIndexer.exe network daemon that ships with Avid Media Composer version 5.5 suffers from a remote stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory and a Metasploit module.
-
21:08
»
Packet Storm Security Recent Files
The AvidPhoneticIndexer.exe network daemon that ships with Avid Media Composer version 5.5 suffers from a remote stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory and a Metasploit module.
-
21:08
»
Packet Storm Security Misc. Files
The AvidPhoneticIndexer.exe network daemon that ships with Avid Media Composer version 5.5 suffers from a remote stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory and a Metasploit module.
-
20:09
»
Packet Storm Security Exploits
StoryBoard Quick version 6 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.
-
20:09
»
Packet Storm Security Recent Files
StoryBoard Quick version 6 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.
-
20:09
»
Packet Storm Security Misc. Files
StoryBoard Quick version 6 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.
-
20:09
»
Packet Storm Security Exploits
Muster Render Farm Management System version 6.1.6 suffer from an arbitrary file download issue due to a directory traversal vulnerability. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. The advisory in this archive includes exploitation details.
-
20:09
»
Packet Storm Security Recent Files
Muster Render Farm Management System version 6.1.6 suffer from an arbitrary file download issue due to a directory traversal vulnerability. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. The advisory in this archive includes exploitation details.
-
20:09
»
Packet Storm Security Misc. Files
Muster Render Farm Management System version 6.1.6 suffer from an arbitrary file download issue due to a directory traversal vulnerability. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. The advisory in this archive includes exploitation details.
-
17:49
»
Packet Storm Security Exploits
Final Draft version 8 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.
-
17:49
»
Packet Storm Security Recent Files
Final Draft version 8 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.
-
17:49
»
Packet Storm Security Misc. Files
Final Draft version 8 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.
-
17:46
»
Packet Storm Security Recent Files
These are the slides from the Hacking Hollywood presentation given at Ruxcon 2011. It documents vulnerabilities that the researcher discovered in various pieces of software in use by large Hollywood studios. Be sure to check out the related files for this presentation as there are multiple proof of concept exploits and advisories.
-
17:46
»
Packet Storm Security Misc. Files
These are the slides from the Hacking Hollywood presentation given at Ruxcon 2011. It documents vulnerabilities that the researcher discovered in various pieces of software in use by large Hollywood studios. Be sure to check out the related files for this presentation as there are multiple proof of concept exploits and advisories.
-
-
9:01
»
Hack a Day
[fotoopa] just put up a Flikr build log of his 3D macro photography rig he uses to take pictures of insects in flight. Outside Hollywood or National Geographic, we’ve never seen a crazier photography rig. [fotoopa]‘s build is based around two cameras – a Nikon D200 and D300. These cameras are pointed towards the subject [...]
-
-
21:03
»
SecDocs
Authors:
Roelof Temmingh Tags:
intelligence social Event:
Black Hat EU 2010 Abstract: For a year the Paterva team has been quietly working on Maltego 3 with no new releases since March 2009. For the first time since Black Hat 2009 Paterva will be showing you what they have been up to - revealing an all new Maltego version - built from the ground up. Expect Hollywood quality graphing and animation, endless possibilities of extensions, new analytic views that will make you weep, and brand new transforms to will blow your mind.
-
21:03
»
SecDocs
Authors:
Roelof Temmingh Tags:
intelligence social Event:
Black Hat EU 2010 Abstract: For a year the Paterva team has been quietly working on Maltego 3 with no new releases since March 2009. For the first time since Black Hat 2009 Paterva will be showing you what they have been up to - revealing an all new Maltego version - built from the ground up. Expect Hollywood quality graphing and animation, endless possibilities of extensions, new analytic views that will make you weep, and brand new transforms to will blow your mind.
-
-
10:00
»
Hack a Day
Ask any engineer what originally sparked their interest in technology, and almost universally the response will be a Hollywood film or TV robot — Star Wars’ R2-D2, the B9 robot from Lost in Space, or Short Circuit’s Johnny 5, to name a few. Engineers need a creative outlet too, and some pay homage to their inspirations by building elaborate reproductions. At [...]
-
-
3:22
»
SecDocs
Authors:
Jérémie Zimmermann Tags:
net neutrality Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Net neutrality is an essential safeguard for competition, innovation, and fundamental freedoms. The debate is high in the US with the announce of FCC non discrimination principles (even if they sound irremediably bound to the interests of Hollywood industry). In the EU, the "Telecoms Package" has been the ground of intense debates on the issue. Dangerous provisions were voted, yet a very high level of awareness was raised, giving hope into further positive outcome of the debate. Why one shall care? What one can do about it? What is Net neutrality? Why is it crucial for the future of our online societies? What is the current state of Net neutrality legislation in the EU? What campaigns from civil societies, with what results? What will be the next steps? Net neutrality has been an indispensable catalyst of competition, innovation, and fundamental freedoms in the digital environment. A neutral Internet ensures that users face no conditions limiting access to applications and services. Likewise, it rules out any discrimination against the source, destination or actual content of the information transmitted over the network. Thanks to this principle, our society collectively built the Internet as we know it today. Except in some authoritarian regimes, everyone around the globe has access to the same Internet, and even the smallest entrepreneurs are on equal footing with the leading global enterprises. Moreover, Net neutrality stimulates the virtuous circle of a development model based on the growth of a common communication network that enables new uses and tools, as opposed to one relying on investments in filtering and controlling. Only under such conditions is Internet continuously improving our societies, enhancing freedom — including the freedom of expression and communication — and allowing for more efficient and creative markets. However, Net neutrality is now under the threat of telecom operators and content industries that see business opportunities in discriminating, filtering or prioritizing information flowing through the network. All around Europe, these kind of discriminatory practices, detrimental to both consumers and innovation, are emerging. No court or regulator seems to have adequate tools to counter these behaviors and preserve the general interest. Some provisions introduced in the EU "Telecoms Package" could even encourage such practices. We who build, use and love the Internet must be aware and active to protect it.