Events for tag "Hacking"
69 min
Encrypting (GSM) mobile phone calls over VPN with an…
65 min
Transhumanism, Self-Optimization and Neurofeedback for…
32 min
Einführung in das Thema Antiforensik am Beispiel eines…
55 min
Or: How I walked in and misbehaved
60 min
Programmierbare Logik für Deinen Hardware…
61 min
Language/VM R&D, whole program type inference, translation…
59 min
Tools to Maintain Anonymity Through Writing Style & Current…
83 min
Maßgeschneiderte Geräte-Filtertreiber auf Knopfdruck
62 min
Bugs in Antivirus Software
54 min
Take a lot of Perl, add some OpenSSL, sprinkle it with a…
90 min
Oder: worüber wir nächstes Jahr lachen werden
65 min
Applications of theorem proving for securing the windows…
60 min
New Explorations: Large Graphs, Larger Threats
60 min
Kann ich dir ein Bier ausgeben?
62 min
GPRS, EDGE, UMTS, HSPA demystified
72 min
Oder: worüber wir nächstes Jahr lachen werden
60 min
The history, the hardware and how to write programs
39 min
High performance/low power computing based on the analog…
45 min
On automated video analysis of human behaviour
44 min
A Web Hacker's Bag O' Tricks
44 min
Die abenteuerliche Analyse des Datenformats eines real…
61 min
Everything you need to know about Podcasting
65 min
writing, sniffing & emulating 13.56MHz RFID tags with…
79 min
Free RFID reader and emulator
52 min
Why just lying your way in won't get you anywhere
34 min
How In The End We Got It All!
42 min
Creation and detection of IP steganography for covert…
51 min
Abusing your Firmware to backdoor the kernel
56 min
digital radio technology beyond GSM
93 min
A roundup and live demonstrations of all currently known…
45 min
When physical security depends on IT security
59 min
Fast development of object-oriented functional programs
55 min
Open Source Dynamic Malware Analysis
34 min
What you always wanted to know about Flash memory - but…
61 min
Better Living Through Inventing
55 min
Building a sniffer for the GMR satphones
46 min
Look what I found under the carpet
46 min
Turning data into line noise and back
44 min
Presentation of the DyAnA Framework (Dynamic Android…
107 min
Breaking software in an automated fashion
59 min
How to find that special one out of millions
61 min
Essentielles Grundwissen für alle, die nichts zu verbergen…
87 min
Design of a blocking-resistant anonymity system
62 min
Automating exploitation of invalid memory writes
61 min
Ethereal^W Wireshark without remote exploits - a proof of…
62 min
Hell Yeah, it's rocket science
55 min
The "anyOS" paradigm and its implications through…
48 min
Reverse Engineering von 3D-Dateiformaten
56 min
a dump of simple tools for embedded analysis at many layers
64 min
Why we will have more secure computers - tomorrow
57 min
Why developing Secure Software is like playing Marble…
53 min
An analysis of targeted attacks from 2005 to 2007
48 min
publish-subscribe feeds + trust relationship network
47 min
Circumventing ASLR, DEP, and Other Guards
42 min
A couple of stories about kernel exploiting
76 min
SAP Security and the Enterprise
128 min
presenting the first German Team participating in the…
57 min
What you didn't know about Acrobat
45 min
Telecomix and Geeks without Bounds on Security and Crisis…
62 min
Hot or Not: Defeating anonymity by monitoring clock skew to…
50 min
PowerLineCommunications has now their open source tool
58 min
Some details about SIM cards
64 min
Untersuchung eines Austauschsystems für hochsensible…
60 min
Attacks, Defences and Public Policy Issues...
45 min
How to recognize trance coded communication patterns
56 min
RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete…
57 min
Part2 - PostScript: Um, you've been hacked
34 min
NOC Review about the Camp 2011 and the 28C3
28 min
Why auditing proprietary protocols matters
56 min
We are the 99% (CPU usage)
50 min
Xbox 360, Playstation 3, Wii
61 min
Introducing Project OsmocomBB
47 min
Backdooring Embedded Controllers
53 min
Erfahrungen aus der Praxis
39 min
implants, sensory extension and silicon - all for you!
73 min
expanding the attack surface and then some
117 min
No stone unturned or: logs, what logs?
58 min
Recovering keys and other secrets after power off
128 min
Vom braunen Briefumschlag bis zur Publikation
48 min
Post-Exploitation Fun in Windows Environments
52 min
A swiss army knife for automatic social investigation
46 min
"Mit Links" die Mauern Sozialer Netzwerke überwinden.
56 min
Achieving a permanent stealthy compromise of user accounts…
51 min
Wardriving phone networks
56 min
Reverse Engineering the Motorola EZX (A768,A780,E680)…
57 min
Vulnerabilities in the EMV Protocol
57 min
how to own critical infrastructures
31 min
Copy protection schemes of way back then and how they…
58 min
The Good, the Bad and the Ugly
64 min
Oder: worüber wir nächstes Jahr lachen werden
47 min
Doing tricks with a mobile phone
45 min
A non-copyright circumventing application of the HDCP…
58 min
Pwning Apple's Mobile Internet Device
115 min
Implementation and detection of kernel based backdoors and…
47 min
ISO14443, ISO15693, their GPL librfid implementation and…
71 min
Preventing Flash Exploits
26 min
Aggregating and Visualizing (lack of) Transparancy Data in…
46 min
Wie man nach Hause telefoniert, ohne von einer Rakete…
32 min
Layer 8 based IP Address hijacking in the end of the days…
56 min
Watching the watchers, having fun with cctv cameras, making…
57 min
Back to the good old Blue Box?
44 min
New ideas for old practices
53 min
How to find, invade and kill botnets automated and…
44 min
Current Capabilities and Future Directions
57 min
Take a look at software from a user's point of view and…
57 min
Hell Yeah, it's rocket science
62 min
Past, present, and future
45 min
Techniques and best practices to securely code your network…
64 min
A proposal for fixing attacks on CAs and DNSSEC
61 min
Bestandsaufnahme und Auswirkungen
30 min
Accepting the Partial Disclosure Challenge
49 min
How bureaucrats fail to fight terror
53 min
Teach yourself upper management in 22 days
44 min
Building an anonymous Internet within the Internet
53 min
Wie Hacker vorgehen und wie man sich schützen kann
85 min
Advanced internet searching strategies & "wizard seeking"…
51 min
Elevated to the Next Level
78 min
Challenges in detecting system compromises and why we’re so…
110 min
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
38 min
Presentation of an innovative buffer overflow uncovering…
54 min
Consequences of Spam and Virus Filtering for the E-Mail…
36 min
UAVs und andere spannende Dinge
61 min
Not your mother's XSS bugs
50 min
A practical guide to Differential Power Analysis
38 min
How to get useable information out of your honeypot
56 min
Profiling Modern Espionage
50 min
Eine Einführung in die neue, dynamische Sprache für das…
92 min
Or: about what we will laugh next year
45 min
An overview of static and dynamic approaches
64 min
Computing of Tomorrow or Yesterday
49 min
Introduction to syscall proxying and applications for in…
35 min
A clever or ingenious device or expedient; adroit…
53 min
Hackers need satellites. Hackers need internet over…
51 min
Attacks on common failures when encrypting credit card…
51 min
Getting deeper into AVR programming
49 min
MMIrDA - Major Malfunction's InfraRed Discovery Application
57 min
Revisiting the legendary computer in a joystick
49 min
Wie funktioniert TCP mit 2kb RAM?
55 min
Open JTAG with Voltage Glitching
58 min
Corporations enabling citizens to print digital money
59 min
The fascinating interplay of CPU, stack, C-compiler and…
54 min
Geschichten aus dem API-und Protokollkrieg von zwei…
56 min
Is implementation the enemy of design?
45 min
Reconfigurable computing for the kernel
50 min
Writing your own flexible Userland TCP/IP Stack - Ninja…
65 min
Does dm-crypt and cryptoloop provide expected security when…
53 min
Satellite Tracking, harvesting and security
53 min
...and what the optimizer does so you don't have to
47 min
Impacts of undefined behaviour and other C oddities
58 min
Tampering the Tamper-Proof
45 min
Reverse-engineering currency detection systems
98 min
Essential Tips and Tricks
68 min
How VMware, VirtualPC and Parallels actually work
32 min
A better architecture for the web, beneficial to both…
43 min
Firmware reverse-engineering tactics
60 min
What happens when data collection goes awry in the 21st…
82 min
First look at the security of NFC mobile phones
25 min
Source routing attacks applied to SIP
54 min
Ubiquitous wireless mesh clouds with olsrd from olsr.org
65 min
Behind the scenes of the new light installation
46 min
Chasing hackers with a bunch of monkeys
52 min
A lamer's introduction to retrieving "sensitive"…
66 min
all your baseband are belong to us
43 min
Finding and exploiting concurrency issues in software
42 min
Practical VM exploiting based on CACAO
47 min
A short look at my pet project implementation
51 min
How to build your own radar system
49 min
Old Laws and New Technology the German Way
64 min
A major new version of freenet
25 min
What's inside your network?
50 min
Open source BIOS replacement with a radical approach to…
70 min
Working with the open source BIOS replacement and getting a…
51 min
How you end up being the Victim.
61 min
Practical attacks on GSM using GNU Radio and FPGAs
54 min
On Using Anonymizers and Still Get Fucked
57 min
A Standard-Compliant Exploit of Layer 1
60 min
Besitz und Wissen: Relay-Angriffe auf den neuen…
76 min
Breaking Remote Keyless Entry Systems with Power Analysis
41 min
"The Web Framework for perfectionists with deadlines."
53 min
Why C++ is bad for the environment, causes global warming…
52 min
Reverse-Engineering des Embedded-Linux-Navigationssystems
54 min
An analysis of Apple's encrypted disk storage system
66 min
The Digital Enhanced Cordless Telecommunications standard
59 min
Little Security, Despite Obscurity
119 min
Ein Einblick in die Security-Industrie
26 min
A new approach of identifying vulnerable web applications
26 min
Insights into a publicly available registry
46 min
An Introduction to the usual mistakes
56 min
Discovering what the hardware architects try to hide from…
48 min
How they track you when your mobile is switched off
57 min
Improved approaches for auditive steganography
61 min
What has changed in DECT security after one year
71 min
Experiences and lessons learned with the Payment Card…
53 min
Next generation vulnerabilities in 2.0 Web Applications
48 min
Hide and Seek in A. Flash
63 min
or how B.A.T.M.A.N. learned to fly
52 min
Security Concepts, Problems, and Exploits on Your Mac
56 min
How to Hack the Pfandsystem
46 min
a hackers guide into homebrewn 2.4GHz hardware & peripherals
67 min
Welchen Wert haben Trackingdaten?
52 min
New RF technology - exciting for good guys, bad guys,…
61 min
Exploiting Timing Side Channel Vulnerabilities on the Web
63 min
Firmware Modification Attacks and the Rise of Printer…
55 min
Pixel Fuzzing and the Bioinformatic Bindiff
44 min
What the heck is realtime - and what to do with it
50 min
An introduction into anonymous communication with I2P
64 min
Die Technik der Eisenbahnsicherungsanlagen
52 min
Wireless connections of 20km and more
46 min
Was ist denn nun eigentlich so ein 'Interrupt'?
47 min
How bad security decisions can ruin a debit card design
43 min
An open-source project to develop a tool for broadband…
51 min
A look at the security of 3rd party iOS applications
95 min
by anatomizing Linux' CPRNG
55 min
Mitigating cold-boot attacks for Full-Disk-Encryption…
62 min
Attack Vectors Through the Eyes of Software-based Fault…
45 min
"First we take Manhattan, then we take Berlin..."
55 min
Bachelorarbeit Informatik Uni Kiel SS 2011
34 min
Nasty effects with tracker-less BitTorrent
75 min
We Track Harder - We Track More! Take the pain out of…
63 min
escape the basement and make the sun work for you
20 min
A peer-to-peer, end-to-end encrypted social networking…
47 min
An in-depth look at p2p algorithmics
52 min
Scanning your GPRS/UMTS IP network for fun and profit
51 min
3510 transistors in 60 minutes
113 min
17 Mistakes Microsoft Made in the Xbox Security System &…
66 min
Learn how to effectively protect not only your data but…
56 min
Dissecting contemporary cellphone hardware
61 min
Creating a rogue CA Certificate
46 min
Finding exploitable vulnerabilities in binaries
57 min
bringing x86 fuckups to dalvik
40 min
A roundup of one the most advanced open hardware projects
46 min
Suppression of secure communications by governments
63 min
Mandatory Access Control und TPM in Xen
57 min
An overview on design and generation of safe and reliable…
29 min
WLANs mit Wi-Fi Protected Access (WPA) betreiben
56 min
How we obtained the equivalent power of a Deep Crack for a…
61 min
Everything about the C64 in 64 Minutes
59 min
One year of Rocket Science!
34 min
Introducing the 'lingua franca' of Instant Messaging
62 min
Keeping your enemies close
94 min
Oder: worüber wir nächstes Jahr lachen werden
41 min
Technical defense against data retention law
50 min
Solutions for monitoring and lawful interception within a…
52 min
Hacking a 10 Gigabit Intrusion detection and prevention…
49 min
Introduction to SIP Hacking
59 min
Typische Sicherheitslücken
63 min
Symbian Exploit and Shellcode Development
52 min
hardware demo during the lecture
135 min
Realtime in-building location tracking at the 23C3
34 min
XMPP ist viel mehr als nur Instant Messaging
51 min
Tiffany Rad, Teague Newman, John Strauchs
61 min
Causes, Attacks and Countermeasures
53 min
(also introducing libglitch)
53 min
How to find any book (and many other roadkills) on the…
48 min
Lets create the Arduino for FPGAs
62 min
Introduction into State-of-the-Art Hearing Aid Technology
57 min
Hacking the Hackers with User-Space Virtualization
63 min
Overview of Current Keylogger Threats
61 min
From analyzing to attacking mobile phones on a large scale.
60 min
Hardware Hacks and Cracks with FPGAs
52 min
How to start analyzing blackboxes