28C3: behind enemy lines

Hacking

Full playlist: Video / Audio
Your Disaster/Crisis/Revolution just got Pwned
45 min

Your Disaster/Crisis/Revolution just got Pwned

Telecomix and Geeks without Bounds on Security and Crisis…

Evolving custom communication protocols
57 min

Evolving custom communication protocols

Hell Yeah, it's rocket science

The engineering part of social engineering
52 min

The engineering part of social engineering

Why just lying your way in won't get you anywhere

ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

NOC Review
34 min

NOC Review

NOC Review about the Camp 2011 and the 28C3

Antiforensik
32 min

Antiforensik

Einführung in das Thema Antiforensik am Beispiel eines…

DC+, The Protocol
41 min

DC+, The Protocol

Technical defense against data retention law

Introducing Osmo-GMR
55 min

Introducing Osmo-GMR

Building a sniffer for the GMR satphones

Deceiving Authorship Detection
59 min

Deceiving Authorship Detection

Tools to Maintain Anonymity Through Writing Style & Current…

Print Me If You Dare
63 min

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer…

Security Log Visualization with a Correlation Engine
25 min

Security Log Visualization with a Correlation Engine

What's inside your network?

Datenvieh oder Daten-Fee
67 min

Datenvieh oder Daten-Fee

Welchen Wert haben Trackingdaten?

Ooops I hacked my PBX
28 min

Ooops I hacked my PBX

Why auditing proprietary protocols matters

Cellular protocol stacks for Internet
62 min

Cellular protocol stacks for Internet

GPRS, EDGE, UMTS, HSPA demystified

Sovereign Keys
64 min

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

Implementation of MITM Attack on HDCP-Secured Links
45 min

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP…

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Hacking MFPs
57 min

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

Apple vs. Google Client Platforms
51 min

Apple vs. Google Client Platforms

How you end up being the Victim.

Ein Mittelsmannangriff auf ein digitales Signiergerät
55 min

Ein Mittelsmannangriff auf ein digitales Signiergerät

Bachelorarbeit Informatik Uni Kiel SS 2011

Power gadgets with your own electricity
63 min

Power gadgets with your own electricity

escape the basement and make the sun work for you

Quantified-Self and OpenBCI Neurofeedback Mind-Hacking
65 min

Quantified-Self and OpenBCI Neurofeedback Mind-Hacking

Transhumanism, Self-Optimization and Neurofeedback for…

Data Mining the Israeli Census
26 min

Data Mining the Israeli Census

Insights into a publicly available registry

Time is on my Side
61 min

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

Building a Distributed Satellite Ground Station Network - A Call To Arms
53 min

Building a Distributed Satellite Ground Station Network - A Call To Arms

Hackers need satellites. Hackers need internet over…

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Der Staatstrojaner
128 min

Der Staatstrojaner

Vom braunen Briefumschlag bis zur Publikation

String Oriented Programming
47 min

String Oriented Programming

Circumventing ASLR, DEP, and Other Guards

Datamining for Hackers
54 min

Datamining for Hackers

Encrypted Traffic Mining

Automatic Algorithm Invention with a GPU
62 min

Automatic Algorithm Invention with a GPU

Hell Yeah, it's rocket science

Can trains be hacked?
64 min

Can trains be hacked?

Die Technik der Eisenbahnsicherungsanlagen

SCADA and PLC Vulnerabilities in Correctional Facilities
51 min

SCADA and PLC Vulnerabilities in Correctional Facilities

Tiffany Rad, Teague Newman, John Strauchs

r0ket++
49 min

r0ket++

The CCC-Badge

802.11 Packets in Packets
57 min

802.11 Packets in Packets

A Standard-Compliant Exploit of Layer 1

The Atari 2600 Video Computer System: The Ultimate Talk
60 min

The Atari 2600 Video Computer System: The Ultimate Talk

The history, the hardware and how to write programs

Macro dragnets: Why trawl the river when you can do the whole ocean
60 min

Macro dragnets: Why trawl the river when you can do the whole ocean

What happens when data collection goes awry in the 21st…