«
Expand/Collapse
131 items tagged "tags"
Related tags:
hack in the box [+],
event [+],
asia [+],
security event [+],
chaos communication congress [+],
vulnerability [+],
chaos communication camp [+],
authors [+],
slides [+],
malaysia [+],
black hat [+],
security [+],
network [+],
malware [+],
honeynet [+],
forensics [+],
dubai [+],
domino event [+],
black [+],
windows security [+],
webkit [+],
wbr [+],
unusual things [+],
security authors [+],
random collection [+],
privacy event [+],
lockpicking [+],
krakow [+],
kernel [+],
ipv [+],
ids [+],
google [+],
forensic [+],
falling [+],
eip [+],
domino [+],
collection [+],
code execution [+],
cisco event [+],
brain [+],
wouter aukema [+],
week [+],
vulnerabilities [+],
video camp [+],
unexpected corners [+],
turn [+],
terrorism [+],
tea [+],
tables turn [+],
tables [+],
stephen dugan [+],
stefano zanero [+],
shellcoding [+],
security 2002 [+],
roger dingledine [+],
paper [+],
octf [+],
nlp [+],
new orleans [+],
neel mehta [+],
miles [+],
mark vincent yason [+],
mark vincent [+],
lot [+],
lance spitzner [+],
keynote [+],
kevin mcpeake [+],
johnny long [+],
jesse burns [+],
honeypots [+],
hacking [+],
hack [+],
frequent flyer miles [+],
dugan [+],
dingledine [+],
def [+],
dave aitel [+],
cyberterrorism [+],
con [+],
burns [+],
authentication [+],
aurora [+],
anonymos [+],
IPv6 [+],
5 years [+],
usa [+],
x event [+],
x 509 [+],
wireless lan security [+],
winny [+],
wimax [+],
wep [+],
vulnerability disclosure [+],
vulnerability assessment [+],
vpn [+],
unpacking [+],
translation [+],
tor event [+],
tor [+],
toolkit [+],
toolbox [+],
tool [+],
thomas c. waszak [+],
thomas c [+],
thomas akin [+],
theo de raadt [+],
test authors [+],
taranis [+],
talk [+],
tales [+],
takayuki sugiura [+],
sucks [+],
strom carlson [+],
strom [+],
sql injection [+],
spider [+],
social event [+],
social engineering [+],
smart phones [+],
smart card [+],
smart [+],
silver needle [+],
signatures [+],
shellcode [+],
security bank [+],
security 2001 [+],
sebek [+],
scott blake [+],
schoenefeld [+],
russia with love [+],
russia [+],
rogue [+],
roberto preatoni [+],
robert hensing [+],
remote buffer overflow vulnerability [+],
remote buffer overflow [+],
regs [+],
ralf spenneberg [+],
radio [+],
prototype [+],
protocols [+],
project [+],
pki [+],
pickpocketing [+],
physical security [+],
phreaknic [+],
philippe langlois [+],
philippe lagadec [+],
philippe biondi [+],
perspectives [+],
penetration [+],
paul vincent sabanal [+],
paul vincent [+],
paul theriault [+],
paul sebastian ziegler [+],
paul sebastian [+],
patrick miller [+],
patrick chambet [+],
papathanasiou [+],
p security [+],
oracle sql [+],
oracle [+],
optimizations [+],
opening ceremony [+],
opening [+],
openbsd [+],
ntlmv [+],
ninja [+],
nick breese [+],
nicholas j. percoco [+],
nematodes [+],
neel [+],
nashville tn [+],
nashville [+],
mwallets [+],
mr. t [+],
mr t [+],
mosdef [+],
mike schiffman [+],
mike eddington [+],
michael brooks [+],
metasploit [+],
mentor [+],
mehta [+],
media [+],
master of puppets [+],
massexploitation [+],
mark goudie [+],
mark dowd [+],
marisa fagan [+],
marc schoenefeld [+],
mandy andress [+],
mac os x [+],
mac os [+],
mac [+],
love [+],
lost in translation [+],
locking [+],
libtiff [+],
lessons [+],
laws [+],
langlois [+],
lan security [+],
kerberos [+],
jonathan wilkins [+],
joke [+],
john viega [+],
john mcdonald [+],
joel eriksson [+],
joe klein [+],
joe grand [+],
jennifer granick [+],
jay beale [+],
java event [+],
japan [+],
ivan arce [+],
ira winkler [+],
intrusion detection [+],
intro [+],
international [+],
ike test [+],
ike event [+],
ian goldberg [+],
honeynet project [+],
hat europe [+],
hat [+],
hardened [+],
hal [+],
hacking tool [+],
hacker [+],
gsm [+],
government level [+],
goldberg [+],
gerardo richarte [+],
gerardo [+],
gentoo [+],
g. mark hardy [+],
frank breedijk [+],
forklift [+],
felix von leitner [+],
fagan [+],
fabrice desclaux [+],
fabio ghioni [+],
exploits [+],
exefilter [+],
exe [+],
europe [+],
emmanuel gadaix [+],
emmanuel [+],
ed skoudis [+],
droid [+],
dotrange [+],
dominos [+],
domino servers [+],
dmca [+],
disclosure law [+],
directory [+],
digital playground [+],
dead [+],
ddos attacks [+],
day [+],
david mortman [+],
david litchfield [+],
darknets [+],
dan kaminsky [+],
culture event [+],
cult of the dead cow [+],
cult [+],
crypto [+],
cross domain [+],
crackstation [+],
court [+],
corydon [+],
corp [+],
control mechanisms [+],
compiler [+],
cisco security [+],
cisco router [+],
cisco devices [+],
christoph weber [+],
christian papathanasiou [+],
christian grothoff [+],
chris evans [+],
china [+],
charity event [+],
charity [+],
ceremony [+],
cecchetti [+],
camp opening [+],
camp closing [+],
c applications [+],
buffer overflow vulnerability [+],
bruce potter [+],
bored [+],
bo [+],
bluetooth [+],
biondi [+],
billy rios [+],
baseband [+],
base [+],
bad guys [+],
auditing [+],
attacking [+],
attack [+],
art [+],
antivirus [+],
amateur radio [+],
alex wheeler [+],
aldora louw [+],
adam cecchetti [+],
active directory services [+],
Wireless [+],
Skype [+],
Pentesting [+],
21c3 [+],
11b [+],
video [+],
audio [+]
-
-
13:50
»
SecDocs
Tags:
social Event:
DEFCON 4
-
-
5:21
»
SecDocs
-
-
14:02
»
SecDocs
-
-
14:51
»
SecDocs
-
-
21:28
»
SecDocs
Tags:
social Event:
DEFCON 3
-
-
21:27
»
SecDocs
-
-
21:41
»
SecDocs
-
-
21:26
»
SecDocs
-
-
21:48
»
SecDocs
-
-
21:27
»
SecDocs
-
21:27
»
SecDocs
-
-
21:31
»
SecDocs
-
-
3:30
»
SecDocs
Tags:
hardening Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: An introduction to the hardened toolchain used at the Hardened Gentoo project, which, combined with the PaX kernel, strong DAC/MAC control mechanisms and a thorough low-entry oriented user documentation provides "full scale" protection for a wide range from home users to enterprise businesses.
-
-
21:41
»
SecDocs
Authors:
Fabio Ghioni Roberto Preatoni Tags:
intelligence Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: An impressionistic overview of what makes the difference today and in the future (in the digital playground) in the balance of power between economic and military powers. The presentation will also cover a description of the business behind espionage worldwide as well as the asymmetric organizations that are the real master of puppets.
-
-
21:46
»
SecDocs
-
10:19
»
SecDocs
-
10:19
»
SecDocs
-
10:19
»
SecDocs
-
-
2:51
»
SecDocs
Authors:
Felix von Leitner Tags:
secure development Event:
Chaos Communication Camp 2007 Abstract: Programmers often attempt to make their code faster but end up only making it less readable. This talk attempts to show what kind of optimizations you can (and should) leave to your compiler.
-
-
21:39
»
SecDocs
Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: A welcome to the Camp. Explanation of facilities, organizational hints and and an introduction to the upcoming conference schedule.
-
-
15:02
»
SecDocs
Authors:
Roger Dingledine Tags:
Tor Event:
Chaos Communication Congress 23th (23C3) 2006 Abstract: Websites like Wikipedia and Blogspot are increasingly being blocked by government-level firewalls around the world. Although many people use the Tor anonymity network to get around this censorship, the current Tor network is not designed to withstand a government-level censor. In this talk we describe a design for providing access to the Tor network that is harder to block.
-
-
21:45
»
SecDocs
Tags:
vulnerability Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: This talk will be similar to my unusual bugs talk last year. I'll present a couple of completely unrelated somewhat interesting and unusual things. Hence, a random collection of them.
-
21:45
»
SecDocs
Tags:
vulnerability Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: This talk will be similar to my unusual bugs talk last year. I'll present a couple of completely unrelated somewhat interesting and unusual things. Hence, a random collection of them.
-
21:45
»
SecDocs
Tags:
vulnerability Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: This talk will be similar to my unusual bugs talk last year. I'll present a couple of completely unrelated somewhat interesting and unusual things. Hence, a random collection of them.
-
-
22:38
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: In 2004 I started a weekly podcast on international under-reported news based on a feeling that this was something I enjoy doing and I could be good at. More than 7 years and 400 episodes later, with the help of listeners and friends, I have travelled almost nonstop to some of the most interesting and unexpected corners of the world. These travels have led me to some unconventional guests, topics, and life choices. Through it all, week after week, I have kept the program going. The lessons I've learned and continue to learn going forward, tell a story that answers alot of today's most popular questions about the future of the internet and independent journalism. From crowd source funding to the streets of New Orleans, from itunes politics to the mountains of Afghanistan, I will share these stories and whatever wisdom they have brought me.
-
22:38
»
SecDocs
Tags:
social Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: In 2004 I started a weekly podcast on international under-reported news based on a feeling that this was something I enjoy doing and I could be good at. More than 7 years and 400 episodes later, with the help of listeners and friends, I have travelled almost nonstop to some of the most interesting and unexpected corners of the world. These travels have led me to some unconventional guests, topics, and life choices. Through it all, week after week, I have kept the program going. The lessons I've learned and continue to learn going forward, tell a story that answers alot of today's most popular questions about the future of the internet and independent journalism. From crowd source funding to the streets of New Orleans, from itunes politics to the mountains of Afghanistan, I will share these stories and whatever wisdom they have brought me.
-
-
21:46
»
SecDocs
-
-
21:49
»
SecDocs
-
-
21:49
»
SecDocs
-
21:49
»
SecDocs
-
-
12:20
»
SecDocs
-
12:20
»
SecDocs
-
-
13:45
»
SecDocs
-
-
21:31
»
SecDocs
-
-
21:34
»
SecDocs
-
-
21:46
»
SecDocs
-
-
21:41
»
SecDocs
-
-
5:31
»
SecDocs
-
-
21:30
»
SecDocs
-
-
21:43
»
SecDocs
-
-
21:49
»
SecDocs
-
-
21:28
»
SecDocs
-
21:28
»
SecDocs
-
21:28
»
SecDocs
-
-
12:06
»
SecDocs
-
-
21:51
»
SecDocs
-
-
21:44
»
SecDocs
-
-
21:38
»
SecDocs
-
-
21:48
»
SecDocs
-
-
21:30
»
SecDocs
-
-
21:44
»
SecDocs
-
-
21:42
»
SecDocs
-
-
21:25
»
SecDocs
-
-
21:43
»
SecDocs
-
-
21:51
»
SecDocs
-
-
21:29
»
SecDocs
-
-
22:44
»
SecDocs
-
-
22:43
»
SecDocs
-
-
3:25
»
SecDocs
-
-
3:30
»
SecDocs
-
-
2:37
»
SecDocs
-
2:37
»
SecDocs
-
-
5:56
»
SecDocs
-
-
1:04
»
SecDocs
-
1:04
»
SecDocs
-
-
2:23
»
SecDocs
-
2:23
»
SecDocs
-
-
23:12
»
SecDocs
-
1:48
»
SecDocs
-
-
5:14
»
SecDocs
-
-
1:52
»
SecDocs
-
-
4:49
»
SecDocs
-
4:41
»
SecDocs
-
-
11:23
»
SecDocs
-
-
7:36
»
Packet Storm Security Misc. Files
Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.
-
-
0:18
»
SecDocs
Authors:
Christoph Weber Tags:
router exploiting Cisco Event:
Hashdays 2010 Abstract: The talk demonstrates, based on Cisco devices, that DDoS attacks, spam and viruses are not only coming from the "normal suspects" (PC, server and mobile devices). There are other devices, like routers or switches, which can do the same. All these devices are becoming more and more "intelligent" and have "features", which will make it possible to realize all kinds of attacks. Because of broad distribution of all these feature packed devices to the customer, these devices have a greater potential for misuse and will in the future become more in focus of hackers.
-
-
16:14
»
SecDocs
-
-
4:06
»
SecDocs
-
-
11:34
»
SecDocs
-
-
12:16
»
SecDocs
-
-
12:23
»
SecDocs
-
12:11
»
SecDocs
-
-
11:35
»
SecDocs