Events for tag "Hacking"

The Ultimate Commodore 64 Talk
61 min

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

Blackbox JTAG Reverse Engineering
56 min

Blackbox JTAG Reverse Engineering

Discovering what the hardware architects try to hide from…

Twisting timing in your favour
43 min

Twisting timing in your favour

Finding and exploiting concurrency issues in software

XMPP/Jabber
34 min

XMPP/Jabber

Introducing the 'lingua franca' of Instant Messaging

I/O Capture Treiber Framework
83 min

I/O Capture Treiber Framework

Maßgeschneiderte Geräte-Filtertreiber auf Knopfdruck

CR217 - Professional Hackers
119 min

CR217 - Professional Hackers

Ein Einblick in die Security-Industrie

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Implementation of MITM Attack on HDCP-Secured Links
45 min

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP…

Software Reliability in Aerospace
57 min

Software Reliability in Aerospace

An overview on design and generation of safe and reliable…

Vertex Hacking
48 min

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

Antiforensik
32 min

Antiforensik

Einführung in das Thema Antiforensik am Beispiel eines…

Know your compiler
53 min

Know your compiler

...and what the optimizer does so you don't have to

SDR, GSM/OpenBTS
52 min

SDR, GSM/OpenBTS

New RF technology - exciting for good guys, bad guys,…

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

TCP Denial of Service Vulnerabilities
30 min

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

EFI Rootkits
51 min

EFI Rootkits

Abusing your Firmware to backdoor the kernel

Strong encryption of credit card information
51 min

Strong encryption of credit card information

Attacks on common failures when encrypting credit card…

Peer-to-peer under the hood
47 min

Peer-to-peer under the hood

An in-depth look at p2p algorithmics

Embedded device security nightmares
46 min

Embedded device security nightmares

An Introduction to the usual mistakes

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

How to implement bignum arithmetic
47 min

How to implement bignum arithmetic

A short look at my pet project implementation

Der Staatstrojaner
128 min

Der Staatstrojaner

Vom braunen Briefumschlag bis zur Publikation

DC+, The Protocol
41 min

DC+, The Protocol

Technical defense against data retention law

The Cell Processor
64 min

The Cell Processor

Computing of Tomorrow or Yesterday

Secure Network Server Programming on Unix
45 min

Secure Network Server Programming on Unix

Techniques and best practices to securely code your network…

Clickjacking und UI-Redressing
53 min

Clickjacking und UI-Redressing

Wie Hacker vorgehen und wie man sich schützen kann

Inside the Mac OS X Kernel
42 min

Inside the Mac OS X Kernel

Debunking Mac OS Myths

hpfriends: real-time social data-sharing
48 min

hpfriends: real-time social data-sharing

publish-subscribe feeds + trust relationship network

To be or I2P
50 min

To be or I2P

An introduction into anonymous communication with I2P

Playing with the GSM RF Interface
47 min

Playing with the GSM RF Interface

Doing tricks with a mobile phone

Subverting AJAX
53 min

Subverting AJAX

Next generation vulnerabilities in 2.0 Web Applications

The DRM Of Pacman
31 min

The DRM Of Pacman

Copy protection schemes of way back then and how they…

Einführung in Django
41 min

Einführung in Django

"The Web Framework for perfectionists with deadlines."

Inside VMware
68 min

Inside VMware

How VMware, VirtualPC and Parallels actually work

Hacking Data Retention
49 min

Hacking Data Retention

How bureaucrats fail to fight terror

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

Finding the key in the haystack
50 min

Finding the key in the haystack

A practical guide to Differential Power Analysis

Mobile phone call encryption
69 min

Mobile phone call encryption

Encrypting (GSM) mobile phone calls over VPN with an…

FrozenCache
55 min

FrozenCache

Mitigating cold-boot attacks for Full-Disk-Encryption…

Ooops I hacked my PBX
28 min

Ooops I hacked my PBX

Why auditing proprietary protocols matters

"Xbox" and "Xbox 360" Hacking
113 min

"Xbox" and "Xbox 360" Hacking

17 Mistakes Microsoft Made in the Xbox Security System &…

A not so smart card
47 min

A not so smart card

How bad security decisions can ruin a debit card design

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

Black Ops Of TCP/IP 2005.5
60 min

Black Ops Of TCP/IP 2005.5

New Explorations: Large Graphs, Larger Threats

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Hacking the iPhone
58 min

Hacking the iPhone

Pwning Apple's Mobile Internet Device

Faster PwninG Assured
60 min

Faster PwninG Assured

Hardware Hacks and Cracks with FPGAs

Physical Security
58 min

Physical Security

The Good, the Bad and the Ugly

Console Hacking 2006
50 min

Console Hacking 2006

Xbox 360, Playstation 3, Wii

Honeymonkeys
46 min

Honeymonkeys

Chasing hackers with a bunch of monkeys

"Die gesamte Technik ist sicher"
60 min

"Die gesamte Technik ist sicher"

Besitz und Wissen: Relay-Angriffe auf den neuen…

C64-DTV Hacking
57 min

C64-DTV Hacking

Revisiting the legendary computer in a joystick

Anonymous Data Broadcasting by Misuse of Satellite ISPs
43 min

Anonymous Data Broadcasting by Misuse of Satellite ISPs

An open-source project to develop a tool for broadband…

Introduction to matrix programming: trance codes
45 min

Introduction to matrix programming: trance codes

How to recognize trance coded communication patterns

CSRF, the Intranet and You
61 min

CSRF, the Intranet and You

Causes, Attacks and Countermeasures

An Introduction to Traffic Analysis
60 min

An Introduction to Traffic Analysis

Attacks, Defences and Public Policy Issues...

Can trains be hacked?
64 min

Can trains be hacked?

Die Technik der Eisenbahnsicherungsanlagen

10GE monitoring live!
59 min

10GE monitoring live!

How to find that special one out of millions

Deceiving Authorship Detection
59 min

Deceiving Authorship Detection

Tools to Maintain Anonymity Through Writing Style & Current…

Distributed FPGA Number Crunching For The Masses
56 min

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a…

Print Me If You Dare
63 min

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer…

Project Sputnik
135 min

Project Sputnik

Realtime in-building location tracking at the 23C3

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

Passive covert channels in the Linux kernel
115 min

Passive covert channels in the Linux kernel

Implementation and detection of kernel based backdoors and…

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…

Macro dragnets: Why trawl the river when you can do the whole ocean
60 min

Macro dragnets: Why trawl the river when you can do the whole ocean

What happens when data collection goes awry in the 21st…

Hacking into TomTom Go
52 min

Hacking into TomTom Go

Reverse-Engineering des Embedded-Linux-Navigationssystems

The engineering part of social engineering
52 min

The engineering part of social engineering

Why just lying your way in won't get you anywhere

Old Skewl Hacking - InfraRed updated
49 min

Old Skewl Hacking - InfraRed updated

MMIrDA - Major Malfunction's InfraRed Discovery Application

Benutze Krake mit Gerät
60 min

Benutze Krake mit Gerät

Programmierbare Logik für Deinen Hardware…

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

Time is on my Side
61 min

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

OnionCat – A Tor-based Anonymous VPN
44 min

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

Java wird Groovy
50 min

Java wird Groovy

Eine Einführung in die neue, dynamische Sprache für das…

802.11 Packets in Packets
57 min

802.11 Packets in Packets

A Standard-Compliant Exploit of Layer 1

DECT (part II)
61 min

DECT (part II)

What has changed in DECT security after one year

I See Airplanes!
51 min

I See Airplanes!

How to build your own radar system

The Realtime thing
44 min

The Realtime thing

What the heck is realtime - and what to do with it

Power gadgets with your own electricity
63 min

Power gadgets with your own electricity

escape the basement and make the sun work for you

The Baseband Apocalypse
66 min

The Baseband Apocalypse

all your baseband are belong to us

Programming FPGAs with PSHDL
48 min

Programming FPGAs with PSHDL

Lets create the Arduino for FPGAs

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

secuBT
57 min

secuBT

Hacking the Hackers with User-Space Virtualization

A 10GE monitoring system
52 min

A 10GE monitoring system

Hacking a 10 Gigabit Intrusion detection and prevention…

OMG WTF PDF
57 min

OMG WTF PDF

What you didn't know about Acrobat

Practical RFID Attacks
65 min

Practical RFID Attacks

writing, sniffing & emulating 13.56MHz RFID tags with…

Fudging with Firmware
43 min

Fudging with Firmware

Firmware reverse-engineering tactics

Ethernet mit Mikrocontrollern
49 min

Ethernet mit Mikrocontrollern

Wie funktioniert TCP mit 2kb RAM?

String Oriented Programming
47 min

String Oriented Programming

Circumventing ASLR, DEP, and Other Guards

Community mesh networking
54 min

Community mesh networking

Ubiquitous wireless mesh clouds with olsrd from olsr.org

Writing better code (in Dylan)
59 min

Writing better code (in Dylan)

Fast development of object-oriented functional programs

Virtuelle Sicherheit
63 min

Virtuelle Sicherheit

Mandatory Access Control und TPM in Xen

How to (really) forget your secret crypto key
34 min

How to (really) forget your secret crypto key

What you always wanted to know about Flash memory - but…

Black Ops 2006 Viz Edition
55 min

Black Ops 2006 Viz Edition

Pixel Fuzzing and the Bioinformatic Bindiff

Automated Botnet Detection and Mitigation
53 min

Automated Botnet Detection and Mitigation

How to find, invade and kill botnets automated and…

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

Router and Infrastructure Hacking
45 min

Router and Infrastructure Hacking

"First we take Manhattan, then we take Berlin..."

Security in the cardholder data processing?!
71 min

Security in the cardholder data processing?!

Experiences and lessons learned with the Payment Card…

The blackbox in your phone
58 min

The blackbox in your phone

Some details about SIM cards

muXTCP
50 min

muXTCP

Writing your own flexible Userland TCP/IP Stack - Ninja…

Hacking SCADA
57 min

Hacking SCADA

how to own critical infrastructures

I know who you clicked last summer
52 min

I know who you clicked last summer

A swiss army knife for automatic social investigation

Men who stare at bits
44 min

Men who stare at bits

Die abenteuerliche Analyse des Datenformats eines real…

ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

COMPLETE Hard Disk Encryption with FreeBSD
66 min

COMPLETE Hard Disk Encryption with FreeBSD

Learn how to effectively protect not only your data but…

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

Bluetooth Hacking - The State of The Art
93 min

Bluetooth Hacking - The State of The Art

A roundup and live demonstrations of all currently known…

Vier Fäuste für ein Halleluja
54 min

Vier Fäuste für ein Halleluja

Geschichten aus dem API-und Protokollkrieg von zwei…

Your Disaster/Crisis/Revolution just got Pwned
45 min

Your Disaster/Crisis/Revolution just got Pwned

Telecomix and Geeks without Bounds on Security and Crisis…

iOS application security
51 min

iOS application security

A look at the security of 3rd party iOS applications

TV-B-Gone
61 min

TV-B-Gone

Better Living Through Inventing

media.ccc.de
39 min

media.ccc.de

Das YouTube des CCC

Introduction to SecureShare
20 min

Introduction to SecureShare

A peer-to-peer, end-to-end encrypted social networking…

Fuzzing
107 min

Fuzzing

Breaking software in an automated fashion

Practical Mac OS X Insecurity
52 min

Practical Mac OS X Insecurity

Security Concepts, Problems, and Exploits on Your Mac

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
64 min

Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand

Untersuchung eines Austauschsystems für hochsensible…

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

Tracker fahrn
75 min

Tracker fahrn

We Track Harder - We Track More! Take the pain out of…

Inside Sputnik & OpenBeacon - Smart Dust for the Masses
46 min

Inside Sputnik & OpenBeacon - Smart Dust for the Masses

a hackers guide into homebrewn 2.4GHz hardware & peripherals

How to find *anything* on the Web
85 min

How to find *anything* on the Web

Advanced internet searching strategies & "wizard seeking"…

Autodafé: An Act of Software Torture
38 min

Autodafé: An Act of Software Torture

Presentation of an innovative buffer overflow uncovering…

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…

coreboot: Adding support for a system near you
70 min

coreboot: Adding support for a system near you

Working with the open source BIOS replacement and getting a…

Hacking CCTV
56 min

Hacking CCTV

Watching the watchers, having fun with cctv cameras, making…

Building an Open Source PKI using OpenXPKI
54 min

Building an Open Source PKI using OpenXPKI

Take a lot of Perl, add some OpenSSL, sprinkle it with a…

Desperate House-Hackers
56 min

Desperate House-Hackers

How to Hack the Pfandsystem

Advanced microcontroller programming
51 min

Advanced microcontroller programming

Getting deeper into AVR programming

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
56 min

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

a dump of simple tools for embedded analysis at many layers

Mehr Sicherheit für HostAP-WLANs
29 min

Mehr Sicherheit für HostAP-WLANs

WLANs mit Wi-Fi Protected Access (WPA) betreiben

Secure Code
57 min

Secure Code

Why developing Secure Software is like playing Marble…

Machine-to-machine (M2M) security
45 min

Machine-to-machine (M2M) security

When physical security depends on IT security

Private investigations in searching
53 min

Private investigations in searching

How to find any book (and many other roadkills) on the…

Cuckoo Sandbox - malware beware
55 min

Cuckoo Sandbox - malware beware

Open Source Dynamic Malware Analysis

Cryptographic key recovery from Linux memory dumps
65 min

Cryptographic key recovery from Linux memory dumps

Does dm-crypt and cryptoloop provide expected security when…

Playstation Portable Cracking
34 min

Playstation Portable Cracking

How In The End We Got It All!

Building a Debugger
55 min

Building a Debugger

Open JTAG with Voltage Glitching

Android Security
57 min

Android Security

bringing x86 fuckups to dalvik

Drohnen züchten
36 min

Drohnen züchten

UAVs und andere spannende Dinge

Unusual Web Bugs
44 min

Unusual Web Bugs

A Web Hacker's Bag O' Tricks

Void the warranty!
52 min

Void the warranty!

How to start analyzing blackboxes

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

Cybernetics for the Masses
39 min

Cybernetics for the Masses

implants, sensory extension and silicon - all for you!

Signal Intelligence und Electronic Warfare
46 min

Signal Intelligence und Electronic Warfare

Wie man nach Hause telefoniert, ohne von einer Rakete…

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

Military intelligence for terrorists(tm)
52 min

Military intelligence for terrorists(tm)

A lamer's introduction to retrieving "sensitive"…

How To Design A Decent User Interface
57 min

How To Design A Decent User Interface

Take a look at software from a user's point of view and…

A Case Against C++
53 min

A Case Against C++

Why C++ is bad for the environment, causes global warming…

Datenvieh oder Daten-Fee
67 min

Datenvieh oder Daten-Fee

Welchen Wert haben Trackingdaten?

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Sovereign Keys
64 min

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

The Hidden Nemesis
47 min

The Hidden Nemesis

Backdooring Embedded Controllers

WarTracking
53 min

WarTracking

Satellite Tracking, harvesting and security

Making music with a C compiler
53 min

Making music with a C compiler

(also introducing libglitch)

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

SPAM Workshop
110 min

SPAM Workshop

SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…

Wireless Kernel Tweaking
63 min

Wireless Kernel Tweaking

or how B.A.T.M.A.N. learned to fly

"Haste ma'n netblock?"
32 min

"Haste ma'n netblock?"

Layer 8 based IP Address hijacking in the end of the days…

Defending the Poor
71 min

Defending the Poor

Preventing Flash Exploits

Android Analysis Framework
55 min

Android Analysis Framework

dex reversing in deep

Security Nightmares 2007
72 min

Security Nightmares 2007

Oder: worüber wir nächstes Jahr lachen werden

Secure Instant Messaging
46 min

Secure Instant Messaging

Suppression of secure communications by governments

Introducing Osmo-GMR
55 min

Introducing Osmo-GMR

Building a sniffer for the GMR satphones

Security Nightmares 2006
64 min

Security Nightmares 2006

Oder: worüber wir nächstes Jahr lachen werden

Jabber-Showcase
34 min

Jabber-Showcase

XMPP ist viel mehr als nur Instant Messaging

The Future of Virtualization
55 min

The Future of Virtualization

The "anyOS" paradigm and its implications through…

Collateral Damage
54 min

Collateral Damage

Consequences of Spam and Virus Filtering for the E-Mail…

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

The A5 Cracking Project
61 min

The A5 Cracking Project

Practical attacks on GSM using GNU Radio and FPGAs

VoIPhreaking
49 min

VoIPhreaking

Introduction to SIP Hacking

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Tor and China
87 min

Tor and China

Design of a blocking-resistant anonymity system

SIP home gateways under fire
25 min

SIP home gateways under fire

Source routing attacks applied to SIP

Atmel AVR für Dummies
46 min

Atmel AVR für Dummies

Was ist denn nun eigentlich so ein 'Interrupt'?

The Kernel Accelerator Device
45 min

The Kernel Accelerator Device

Reconfigurable computing for the kernel

Hopalong Casualty
45 min

Hopalong Casualty

On automated video analysis of human behaviour

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

Finding and Preventing Buffer Overflows
45 min

Finding and Preventing Buffer Overflows

An overview of static and dynamic approaches

Crouching Powerpoint, Hidden Trojan
53 min

Crouching Powerpoint, Hidden Trojan

An analysis of targeted attacks from 2005 to 2007

Lawful Interception in VoIP networks
49 min

Lawful Interception in VoIP networks

Old Laws and New Technology the German Way

The Realtime Podcast
61 min

The Realtime Podcast

Everything you need to know about Podcasting

OpenPCD / OpenPICC
79 min

OpenPCD / OpenPICC

Free RFID reader and emulator

Analog Computing
39 min

Analog Computing

High performance/low power computing based on the analog…

Mifare
59 min

Mifare

Little Security, Despite Obscurity

Freedom from the web's monopolies
32 min

Freedom from the web's monopolies

A better architecture for the web, beneficial to both…

Security Nightmares 2008
90 min

Security Nightmares 2008

Oder: worüber wir nächstes Jahr lachen werden

Blackberry: call to arms, some provided
53 min

Blackberry: call to arms, some provided

Teach yourself upper management in 22 days

NOC Review
34 min

NOC Review

NOC Review about the Camp 2011 and the 28C3

What you thought you knew about C
47 min

What you thought you knew about C

Impacts of undefined behaviour and other C oddities

Honeypot Forensics
117 min

Honeypot Forensics

No stone unturned or: logs, what logs?

GPS-Trackers
48 min

GPS-Trackers

How they track you when your mobile is switched off

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

Hacking MFPs
57 min

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

Transcending Places
48 min

Transcending Places

Programming With Values

Unlocking FileVault
54 min

Unlocking FileVault

An analysis of Apple's encrypted disk storage system

Stealth malware - can good guys win?
78 min

Stealth malware - can good guys win?

Challenges in detecting system compromises and why we’re so…

Let's tear down these walls
46 min

Let's tear down these walls

"Mit Links" die Mauern Sozialer Netzwerke überwinden.

3G Investigations
52 min

3G Investigations

Scanning your GPRS/UMTS IP network for fun and profit

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

Towards the first Free Software GSM Phone
56 min

Towards the first Free Software GSM Phone

Reverse Engineering the Motorola EZX (A768,A780,E680)…

Data Mining the Israeli Census
26 min

Data Mining the Israeli Census

Insights into a publicly available registry

Defense is not dead
64 min

Defense is not dead

Why we will have more secure computers - tomorrow

Syscall proxying fun and applications
49 min

Syscall proxying fun and applications

Introduction to syscall proxying and applications for in…

WiFi Long Shots
52 min

WiFi Long Shots

Wireless connections of 20km and more

From Ring Zero to UID Zero
42 min

From Ring Zero to UID Zero

A couple of stories about kernel exploiting

PyPy - the new Python implementation on the block
61 min

PyPy - the new Python implementation on the block

Language/VM R&D, whole program type inference, translation…

Dynamic Malware Analysis on Android Phones
44 min

Dynamic Malware Analysis on Android Phones

Presentation of the DyAnA Framework (Dynamic Android…

A collection of random things
46 min

A collection of random things

Look what I found under the carpet

One Token to Rule Them All
48 min

One Token to Rule Them All

Post-Exploitation Fun in Windows Environments