25C3: nothing to hide

Hacking

Full playlist: Video / Audio
Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

The Ultimate Commodore 64 Talk
61 min

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

Der Hackerparagraph 202c StGB
61 min

Der Hackerparagraph 202c StGB

Bestandsaufnahme und Auswirkungen

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Hacking the iPhone
58 min

Hacking the iPhone

Pwning Apple's Mobile Internet Device

Full-Disk-Encryption Crash-Course
48 min

Full-Disk-Encryption Crash-Course

Everything to hide

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

OnionCat – A Tor-based Anonymous VPN
44 min

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

Cisco IOS attack and defense
66 min

Cisco IOS attack and defense

The State of the Art

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

TCP Denial of Service Vulnerabilities
30 min

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

An introduction to new stream cipher designs
46 min

An introduction to new stream cipher designs

Turning data into line noise and back

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

Attacking Rich Internet Applications
61 min

Attacking Rich Internet Applications

Not your mother's XSS bugs

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

Vertex Hacking
48 min

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Short Attention Span Security
53 min

Short Attention Span Security

A little of everything

Security Nightmares 2009 (English interpretation)
92 min

Security Nightmares 2009 (English interpretation)

Or: about what we will laugh next year

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot