23C3: Who can you trust?

Hacking

Full playlist: Video / Audio
A 10GE monitoring system
52 min

A 10GE monitoring system

Hacking a 10 Gigabit Intrusion detection and prevention…

Analysis of a strong Random Number Generator
95 min

Analysis of a strong Random Number Generator

by anatomizing Linux' CPRNG

An Introduction to Traffic Analysis
60 min

An Introduction to Traffic Analysis

Attacks, Defences and Public Policy Issues...

A not so smart card
47 min

A not so smart card

How bad security decisions can ruin a debit card design

Automated Botnet Detection and Mitigation
53 min

Automated Botnet Detection and Mitigation

How to find, invade and kill botnets automated and…

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

Black Ops 2006 Viz Edition
55 min

Black Ops 2006 Viz Edition

Pixel Fuzzing and the Bioinformatic Bindiff

Building an Open Source PKI using OpenXPKI
54 min

Building an Open Source PKI using OpenXPKI

Take a lot of Perl, add some OpenSSL, sprinkle it with a…

Console Hacking 2006
50 min

Console Hacking 2006

Xbox 360, Playstation 3, Wii

CSRF, the Intranet and You
61 min

CSRF, the Intranet and You

Causes, Attacks and Countermeasures

Design and Implementation of an object-oriented, secure TCP/IP Stack
61 min

Design and Implementation of an object-oriented, secure TCP/IP Stack

Ethereal^W Wireshark without remote exploits - a proof of…

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

Ethernet mit Mikrocontrollern
49 min

Ethernet mit Mikrocontrollern

Wie funktioniert TCP mit 2kb RAM?

Faster PwninG Assured
60 min

Faster PwninG Assured

Hardware Hacks and Cracks with FPGAs

Fudging with Firmware
43 min

Fudging with Firmware

Firmware reverse-engineering tactics

Hacking fingerprint recognition systems
60 min

Hacking fingerprint recognition systems

Kann ich dir ein Bier ausgeben?

How To Design A Decent User Interface
57 min

How To Design A Decent User Interface

Take a look at software from a user's point of view and…

How to implement bignum arithmetic
47 min

How to implement bignum arithmetic

A short look at my pet project implementation

Inside VMware
68 min

Inside VMware

How VMware, VirtualPC and Parallels actually work

Introduction to matrix programming: trance codes
45 min

Introduction to matrix programming: trance codes

How to recognize trance coded communication patterns

Jabber-Showcase
34 min

Jabber-Showcase

XMPP ist viel mehr als nur Instant Messaging

Java wird Groovy
50 min

Java wird Groovy

Eine Einführung in die neue, dynamische Sprache für das…

Mobile phone call encryption
69 min

Mobile phone call encryption

Encrypting (GSM) mobile phone calls over VPN with an…

Nintendo DS
43 min

Nintendo DS

Introduction and hacking

OpenPCD / OpenPICC
79 min

OpenPCD / OpenPICC

Free RFID reader and emulator

Project Sputnik
135 min

Project Sputnik

Realtime in-building location tracking at the 23C3

Rootkits as Reversing Tools
63 min

Rootkits as Reversing Tools

An Anonymous Talk

Router and Infrastructure Hacking
45 min

Router and Infrastructure Hacking

"First we take Manhattan, then we take Berlin..."

Secure Network Server Programming on Unix
45 min

Secure Network Server Programming on Unix

Techniques and best practices to securely code your network…

Security in the cardholder data processing?!
71 min

Security in the cardholder data processing?!

Experiences and lessons learned with the Payment Card…

Security Nightmares 2007
72 min

Security Nightmares 2007

Oder: worüber wir nächstes Jahr lachen werden

Software Protection and the TPM
68 min

Software Protection and the TPM

The Mac OS X Story

Software Reliability in Aerospace
57 min

Software Reliability in Aerospace

An overview on design and generation of safe and reliable…

Stealth malware - can good guys win?
78 min

Stealth malware - can good guys win?

Challenges in detecting system compromises and why we’re so…

Subverting AJAX
53 min

Subverting AJAX

Next generation vulnerabilities in 2.0 Web Applications

Tor and China
87 min

Tor and China

Design of a blocking-resistant anonymity system

TV-B-Gone
61 min

TV-B-Gone

Better Living Through Inventing

Unlocking FileVault
54 min

Unlocking FileVault

An analysis of Apple's encrypted disk storage system

Unusual bugs
66 min

Unusual bugs

Virtuelle Sicherheit
63 min

Virtuelle Sicherheit

Mandatory Access Control und TPM in Xen

Void the warranty!
52 min

Void the warranty!

How to start analyzing blackboxes