Skip to main content

Hacker Conferences

Brilliant and profane, insightful and hilarious, nightmarish and uplifting - for years, hacker conferences have brought together the best and worst in human nature, encouraging speakers to share their thoughts on life both online and offline. Informal where other conferences are uptight, these conferences have covered an enormous amount of subjects. The lectures themselves are historic records and performances, playing up to the crowds and laying out the facts.

Please note: This collection is under construction. There is an enormous amount of structure and backfill to be added to this collection, as well as separating out audio and video materials into appropriate sub-collections. There are literally thousands of talks to be placed into this archive, and assistance will be needed in describing and acquiring talks to hacker conventions going forward.

Multi-Year Hacker Conventions
DEFCON
Las Vegas, Nevada. Started in 1993.

All Current Talks (Will be Split Up)

CHAOS COMMUNICATIONS CONGRESS
Germany. Started in 1984.

2004, 2009, 2010

Multi-Year Hacker Conventions
DEFCON
Las Vegas, Nevada. Started in 1993.

All Current Talks (Will be Split Up)

CHAOS COMMUNICATIONS CONGRESS
Germany. Started in 1984.

2004, 2009, 2010

Miscellaneous Hacker Convention Materials
68 Micro Journal ACE Magazine Aktueller Software Markt (German)
Baron's MicroComputing Reports Big K Magazine Blacklisted! 411

More right-solid
More right-solid
More right-solid
More right-solid
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon
collection
473
ITEMS
172,238
VIEWS
by Shmoo Group
collection
eye 172,238
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Belay It, and Bring It On.
Shmoocon 2016
collection
39
ITEMS
86,149
VIEWS
collection
eye 86,149
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Belay It, and Bring It On.
Hacker Conferences
movies
eye 30,900
favorite 3
comment 0
Videos from Shmoocon 2015, held in Washington DC, January 16-18, 2015. These are the full videos recorded and available from the event, put into one item to allow playlisting. Individual talk items are currently available as well.
Shmoocon 2014
collection
42
ITEMS
26,731
VIEWS
by Shmoocon
collection
eye 26,731
Shmoocon 2014: Held in Washington D.C. from January 17-19, 2014, at the Washington Hilton. This collection contains all recorded main area talks at the event. DIFFERENT - ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next...
Topics: Shmoocon, Hacker Con, Security, Presentations
Shmoocon 2016
by Andrew Kalat
movies
eye 23,271
favorite 5
comment 0
Most hackers have a massive digital footprint: social media, servers at co-location sites, servers at home, overly-complicated IT infrastructure, and various other IT gear connected in crazy ways. What happens when one of us suddenly dies? How do our loved ones pick up the pieces, figure out all of our random IT crap that we’ve setup, and move forward? This talk explores the challenges, opportunities, and lessons learned as I aided in figure out the IT gear after the passing of a dear friend...
Shmoocon 2015
collection
48
ITEMS
22,551
VIEWS
by Shmoocon
collection
eye 22,551
DIFFERENT - ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Belay It and Bring It On. AFFORDABLE - ShmooCon is about high quality without the high price. Keep in mind that space is...
Shmoocon 2016
by Gillian Andrews and Sara Sinclair Brody
movies
eye 17,084
favorite 0
comment 0
As a technologist you craft systems that are reliable, scalable, and maintainable. As a security specialist you think adversarially and poke holes in every apparatus you encounter, be it technical, social, or socio-technical. These skills are orthogonal to the ones that good user-experience (UX) designers employ in making software that is usable by “average” people, which is probably why so many security tools suck. In this talk you’ll see why your approach to designing software...
OHM 2013 Presentations
collection
83
ITEMS
16,833
VIEWS
collection
eye 16,833
OHM2013. Observe, Hack, Make. A five day outdoor international camping festival for hackers and makers, and those with an inquisitive mind. On 31st July 2013, 3000 of those minds descended upon on an unassuming patch of land, at the Geestmerambacht festival grounds, 30km north of Amsterdam. It is a four year tradition in The Netherlands to hold such an event. In the spirit of WTH, HIP and HAR the latest edition, OHM2013, is a non-commercial community run event. The event happens thanks to the...
Shmoocon 2016
by Professor Neil Gershenfeld
movies
eye 14,743
favorite 0
comment 0
Prof. Neil Gershenfeld is the Director of MIT’s Center for Bits and Atoms. His unique laboratory is breaking down boundaries between the digital and physical worlds, from creating molecular quantum computers to virtuosic musical instruments. Technology from his lab has been seen and used in settings including New York’s Museum of Modern Art and rural Indian villages, the White House and the World Economic Forum, inner-city community centers and automobile safety systems, Las Vegas shows,...
Chaos Communications Congress 2004
collection
165
ITEMS
13,532
VIEWS
by CCC
collection
eye 13,532
The Chaos Communication Congress is an annual meeting of the international hacker scene, organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues. The event takes place regularly at the end of the year since 1984, with the current date and duration (December 27?30) established in 2005. The congress started out in 1984 in Hamburg, moved to Berlin in 1998, and back to Hamburg in 2012, having exceeded the capacity of the...
Topic: 2004
Electromagnetic Field
collection
3,932
ITEMS
12,407
VIEWS
collection
eye 12,407
Electromagnetic Field is a non-profit UK camping festival for those with an inquisitive mind or an interest in making things. This collection contains photos, videos, and texts from past EMF events and is managed by the EMF archive team. If you have content from an EMF event which you'd like to submit for archiving, please fill in this form . For removal requests and other questions, please email contact@emfcamp.org . Significant items in this collection include: Several thousand Creative...
Topics: Electromagnetic Field, hackercon
Community Video
movies
eye 12,203
favorite 1
comment 0
Derbycon 2012 Day 1
Topics: derbycon, hacking, security, louisville
Shmoocon 2014
movies
eye 10,666
favorite 2
comment 0
Controlling USB Flash Drive Controllers: Expose of Hidden Features Richard Harman With stories of "BadBIOS" infecting PCs simply by connecting a malicious USB flash drive to a PC, it's time we learned about flash drives and their controllers. Consumer USB flash drives are cheap, growing in capacity and shrinking in physical size. There are only around 15 prominent controller chip manufacturers whom you have never heard of, but OEM for all the popular and respected "name...
Chaos Communications Congress 2009
collection
177
ITEMS
10,506
VIEWS
collection
eye 10,506
The Chaos Communication Congress is an annual meeting of the international hacker scene, organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues. The event takes place regularly at the end of the year since 1984, with the current date and duration (December 27?30) established in 2005. The congress started out in 1984 in Hamburg, moved to Berlin in 1998, and back to Hamburg in 2012, having exceeded the capacity of the...
Hacker Conferences
movies
eye 10,195
favorite 0
comment 0
dojocon, hacking, security http://Dojocon.org http://hackerspaces.org/wiki/Reverse_Space Tiffany Strauchs Rad, @tiffanyrad International Cyber Jurisdiction: âKill Switchingâ Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping John Strauchs, @strauchs Security and IT Convergence Richard Goldberg, @GoldbergLawDC Rules of Engagment: Mitigating Risk in Information Security Work Jon McCoy Ninja Patching .NET Marco Figueroa, @marcofigueroa & Kevin Figueroa Detecting &...
Topics: dojocon, hacking, security
Shmoocon 2015
movies
eye 9,159
favorite 0
comment 0
NSA USB Playset [SC2015]
Shmoocon 2015
movies
eye 7,155
favorite 0
comment 0
Knock Knock [SC2015]
Shmoocon 2016
movies
eye 5,229
favorite 2
comment 0
Every IR presents unique challenges. But–when an attacker uses PowerShell, WMI, Kerberos attacks, novel persistence mechanisms, seemingly unlimited C2 infrastructure and half-a-dozen rapidly-evolving malware families across a 100k node network to compromise the environment at a rate of 10 systems per day–the cumulative challenges can become overwhelming. This talk will showcase the obstacles overcome during one of the largest and most advanced breaches Mandiant has ever responded to, the...
Chaos Communications Congress 2009
movies
eye 4,730
favorite 0
comment 0
26c3-3647-de-ckan apt-get for the debian of data
linux.conf.au 2018
collection
183
ITEMS
4,555
VIEWS
collection
eye 4,555
linux.conf.au is a conference about the Linux operating system, and all aspects of the thriving ecosystem of Free and Open Source Software that has grown up around it. Run since 1999, in a different Australian or New Zealand city each year, by a team of local volunteers, LCA invites more than 500 people to learn from the people who shape the future of Open Source. For more information on the conference see https://linux.conf.au/
Topic: linux
OHM 2013 Presentations
movies
eye 4,300
favorite 3
comment 0
Screening of cult film " Breaking the Taboo " - a documentary uncovering the failure of the UN sanctioned war on drugs followed by Q&A with Countess Amanda Fielding of the Beckley Foundation , Annie Machon of Law Enforcement Against Prohibition (LEAP), and John Gilmore The War on Drugs has failed. After 50 years of prohibition, illicit drugs are now the third most valuable industry in the world after food and oil, all in the control of criminals. Drugs are cheaper and more...
Topics: OHM2013, talk, Amanda Fielding, Annie Machon, John Gilmore, screening, beckley foundation, LEAP,...
What the Hack 2005
collection
165
ITEMS
4,272
VIEWS
collection
eye 4,272
What The Hack was an outdoor hacker conference held in Liempde, Netherlands between the 28th and 31st of July, 2005. What the Hack was an event in a sequence that began with the Galactic Hacker Party in 1989, followed by Hacking at the End of the Universe in 1993, Hacking In Progress in 1997, Hackers At Large in 2001 and Hacking at Random in 2009. The most recent edition was Observe. Hack. Make. in 2013. Over 2000 hackers visited the event to participate in an exchange on several...
Topic: 2005
Chaos Communications Congress 2010
collection
89
ITEMS
4,091
VIEWS
by CCC
collection
eye 4,091
The Chaos Communication Congress is an annual meeting of the international hacker scene, organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues. The event takes place regularly at the end of the year since 1984, with the current date and duration (December 27?30) established in 2005. The congress started out in 1984 in Hamburg, moved to Berlin in 1998, and back to Hamburg in 2012, having exceeded the capacity of the...
Topic: 2010
Community Video
movies
eye 4,008
favorite 1
comment 0
Derbycon 2012 Day 3
Topics: derbycon, hacking, security, louisville
OHM 2013 Presentations
by joepie91 (Sven Slootweg)
audio
eye 3,617
favorite 0
comment 0
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Topics: ohm2013, noisysquare, raid
Hacker Conferences
by ShmooCon
texts
eye 3,611
favorite 1
comment 0
Becoming Jack Flack: Real Life Cloak & Dagger Taylor Banks and Adam Bregenzer Are you on too many social networking sites? Have all of your exes found you on facebook? If the fuzz came looking, how easy it would be for them to find you? kaos.theory, the creators of Anonym.OS, bring you this abridged guide to becoming (and staying) anonymous. Privacy is your right, anonymity is your path, and kaos.theory will be your guide. We address anonymity at three progressively comprehensive levels -...
Topics: shmoocon, hacker, conference, anarchivism
Blackhat Vegas 2007
collection
89
ITEMS
3,473
VIEWS
by Blackhat
collection
eye 3,473
Blackhat is a security conference held yearly in Las Vegas (with other associated events around the world). This is a collection of presentations given at Blackhat 2007.
Topic: 2007
Shmoocon 2011
collection
41
ITEMS
3,353
VIEWS
collection
eye 3,353
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Belay It, and Bring It On.
DEFCON 25
movies
eye 3,250
favorite 0
comment 0
In theme with this year's DEF CON this presentation goes through a 20 year history of exploiting massively multiplayer online role-playing games (MMORPGs). The presentation technically analyzes some of the virtual economy-devastating, low-hanging-fruit exploits that are common in nearly every MMORPG released to date. The presenter, Manfred (@_EBFE), goes over his adventures in hacking online games starting with 1997's Ultima Online and subsequent games such as Dark Age of Camelot, Anarchy...
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...
2007 Chaos Communications Club Camp
collection
53
ITEMS
3,168
VIEWS
collection
eye 3,168
The Chaos Communication Camp is an international meeting of hackers that takes place every four years, organized by the Chaos Computer Club (CCC). The camp is an event for providing information about technical and societal issues, such as privacy, freedom of information and data security. Hosted speeches are held in big tents and conducted in English as well as German. Each participant may pitch a tent and connect to a fast internet connection and power. The 2007 event took place at Finowfurt...
Hacker Conferences
by Tedd St. Rain
movies
eye 3,123
favorite 1
comment 1
Presented at Notacon 6 in Cleveland, OH on April 17, 2009. Jason Scott walks through the context and playing of Super Mario 64, the Mario Brothers launch title accompanying the Nintendo 64. Talks about the growing field of "Platform Studies", the lessons learned from the unique situation of Super Mario 64, and describes ways that modern programmers and coders can learn from the approach taken to the relatively new general experience of the 3D Platformer in 1996. Recorded by Tedd St....
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: nintendo, mario, jason scott, notacon, blockparty, cleveland
Notacon 2005 Video
collection
39
ITEMS
2,898
VIEWS
collection
eye 2,898
Notacon (pronounced "not-a-con") is an art and technology conference which takes place annually in Cleveland, Ohio. The name Notacon became a bacronym for Northern Ohio Technological Advancement Conference, however use of this was mostly dropped after the first year. Notacon preceded the Ingenuity Festival by over a year in its vision for a cohesive blend of art and technology. These are audio and video from Notacon 2005.
Vintage Computer Federation
collection
60
ITEMS
2,886
VIEWS
collection
eye 2,886
Vintage Computer Federation is a 501(c)3 non-profit educational organization existing for and led by computer history hobbyists.
Community Video
movies
eye 2,626
favorite 2
comment 0
Derbycon 2012 Day 3
Topics: derbycon, hacking, security, louisville
Shmoocon 2012
collection
41
ITEMS
2,589
VIEWS
by Shmoo Group
collection
eye 2,589
ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Belay It, and Bring It On.
DEFCON 15 Video
collection
112
ITEMS
2,560
VIEWS
collection
eye 2,560
DEF CON (also written as DEFCON or Defcon) is one of the world's largest annual hacker conventions, held every year in Las Vegas, Nevada. This is a collection of audio and video from DEFCON 15.
Community Video
movies
eye 2,559
favorite 0
comment 0
Videos from Bsides Las Vegas 2012. Index at: http://www.irongeek.com/i.php?page=videos/bsideslasvegas2012/mainlist
Topics: hacking, security, bsides, las vegasf
Hacker Conferences
by Jason Scott
movies
eye 2,478
favorite 1
comment 1
During the preview evening of Notacon 6 in Cleveland, Ohio, Jason Scott, a frequent presenter at Notacon and other events, offered to give a presentation on the art of presenting. Subjects covered include motivation, performance, content, common pitfalls, frequent harbingers of narrative/presentation doom, and memories of presentations gone right and wrong. The speech was recorded with a static hi-def recorder, so Jason does walk offscreen or get cut off at various junctions, but his voice...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: presentation, jason scott, notacon
Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin @webpwnized http://www.irongeek.com/i.php?page=videos/intro-to-scanning-nmap-hping-amap-tcpdump-metasploit-jeremy-druin
Topics: hacking, security
Shmoocon 2016
movies
eye 2,096
favorite 0
comment 0
This presentation will explore how you can survey the wireless world of the radio spectrum to get an idea of the signals around you, and decode transmissions that can be received by pointing an antenna towards satellites in space. Both are accomplished using Software Defined Radio and open source software, and emphasis is placed on the security (or lack thereof) in these communications systems. Using a drone, you can create your very own airborne RF surveying platform, so that you can fly your...
Shmoocon 2009
collection
40
ITEMS
2,088
VIEWS
by Various
collection
eye 2,088
DIFFERENT – ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues.  The first day is a single track of speed talks called One Track Mind.  The next two days bring three tracks:  Build It, Belay It, and Bring It On. AFFORDABLE – ShmooCon is about high quality without the high...
Community Video
movies
eye 2,042
favorite 1
comment 0
Host Vulnerability Assessment with Nessus, NeXpose and Metasploitable 2 from Jeremy Druin
Topics: hacking, security. owasp, pen-testing
Shmoocon 2016
by Roger Piqueras Jover
movies
eye 1,955
favorite 0
comment 0
The Long Term Evolution (LTE) is the newest standard being deployed globally for mobile communications. Despite the well understood security flaws of legacy 2G networks, which lack of mutual authentication and implement an outdated encryption algorithm, LTE is generally considered secure given its mutual authentication and strong encryption scheme. To the day, the main cellular vulnerabilities being exploited in most IMSI catchers and stingrays are based on 2G base stations. Nevertheless, rogue...
Notacon 2007 (Notacon 4)
collection
31
ITEMS
1,861
VIEWS
collection
eye 1,861
NOTACON, an annual conference held in Cleveland, Ohio, explores and showcases technologies, philosophy and creativity often overlooked at other "hacker cons". Our desire is not to supplant other events, but complement them and strike a balance that has gone unnoticed in our community for far too long. With each new year we build upon the successes and knowledge of the previous years. Our goal is to enlighten, educate, and entertain attendees, presenters, and staff alike. We try to do...
Webstock Conference Videos
collection
70
ITEMS
1,858
VIEWS
by Webstock
collection
eye 1,858
Webstock is a web technology conference held in Wellington, New Zealand featuring a range of high profile speakers covering a variety of web-related topics such as accessibility, usability, ethnographic design and development practices. Webstock began in 2005 and was created by a small non-profit group (consisting of Mike Brown, Natasha Hall, Debbie Sidelinger and Ben Lampard).
Chaos Communications Congress SigInt 2010
collection
61
ITEMS
1,828
VIEWS
collection
eye 1,828
SIGINT was an annual three-day conference on technical and social aspects of our digital society. It offered lectures and workshops on a multitude of topics.
Shmoocon 2006
collection
35
ITEMS
1,667
VIEWS
collection
eye 1,667
DIFFERENT – ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues.  The first day is a single track of speed talks called One Track Mind.  The next two days bring three tracks:  Build It, Belay It, and Bring It On. AFFORDABLE – ShmooCon is about high quality without the high...
Notacon 2005 Video
movies
eye 1,655
favorite 0
comment 0
notacon-2005-stephthegeek-boobs
Hacker Conferences
movies
eye 1,644
favorite 1
comment 1
Videos from Bsides Cleveland 2012 All videos and download links are at: http://www.irongeek.com/i.php?page=videos/bsidescleveland2012/mainlist
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: security, hacking
FOSDEM 2019
collection
679
ITEMS
1,621
VIEWS
collection
eye 1,621
Free and Open source Software Developers' European Meeting ( FOSDEM ) is a non-commercial, volunteer-organized European event centered on free and open-source software development . It is aimed at developers and anyone interested in the free and open-source software movement. It aims to enable developers to meet and to promote the awareness and use of free and open-source software.
Hacker Conferences
data
eye 1,620
favorite 1
comment 0
A collection of CD-ROMs from various hacker conferences.
Shmoocon 2007
collection
36
ITEMS
1,605
VIEWS
collection
eye 1,605
ShmooCon is an American hacker convention organized by The Shmoo Group. There are typically 40 different talks and presentations on a variety of subjects related to computer security and cyberculture. Multiple events are held at the convention related to cryptography and computer security such as Shmooganography, Hack Fortress, a locksport village hosted by TOOOL DC, and Ghost in the Shellcode.
Community Video
movies
eye 1,547
favorite 0
comment 0
Demo video on Crypto & Block Cipher Modes (OpenSSL, AES 128, ECB, CBC)
Topics: OpenSSL, AES 128, ECB, CBC
Community Video
movies
eye 1,537
favorite 1
comment 0
ShmooCon 2012 Firetalks
Topics: hacking, security, shmoocon
Shmoocon 2016
by Carl Vincent
movies
eye 1,536
favorite 0
comment 0
This talk focuses on showcasing examples of the GO programming language being utilized to rapidly prototype, and ultimately maintain software designed to perform common or useful post-exploitation tasks. Source code for each feature will be provided, and is intended to exaggerate the limited amount of code and code familiarity required to construct relatively complex payloads capable of performing offensive security tasks fully either in an automated, or fully antonymous context. Carl is a...
Shmoocon 2013
collection
38
ITEMS
1,490
VIEWS
collection
eye 1,490
DIFFERENT – ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues.  The first day is a single track of speed talks called One Track Mind.  The next two days bring three tracks:  Build It, Belay It, and Bring It On. AFFORDABLE – ShmooCon is about high quality without the high...
Hacker Conferences
by Jason Scott Sadofsky
movies
eye 1,482
favorite 1
comment 0
Presented at The Last Hope, Hotel Pennsylvania, New York City, NY. Historian Jason Scott covers a broad range of hacker history subjects, focusing on providing the tools for understanding the context of hacking and computer history. Subjects covered include 1800-era hacker cons, myths in the Hacker "story", names and events likely forgotten, and some of the touchstones of what hackers consider their lore.
Topics: Hacking, phreaking, jason scott
Troopers 2008 Collection
collection
44
ITEMS
1,460
VIEWS
collection
eye 1,460
Troopers 2008 Collection.
Community Video
movies
eye 1,439
favorite 0
comment 0
SQL Server Hacking By Jeremy Druin as recorded as the Kentuckiana ISSA/
Topics: sql, hacking, louisville
Shmoocon 2014
by Christopher Truncer, Will Schroeder, and Michael Wright
movies
eye 1,437
favorite 0
comment 0
AV Evasion With the Veil Framework Christopher Truncer, Will Schroeder, and Michael Wright As antivirus (finally) has started to slowly increase in effectiveness, more and more of the payloads used during penetration tests are being caught. While the industry as a whole has demonstrated its capabilities of bypassing AV solutions in nearly all situations, valuable assessment time is often lost. The Veil-Evasion Framework (Veil) was developed to solve this problem by offering a modular,...
Chaos Communications Camp 2011
collection
65
ITEMS
1,427
VIEWS
collection
eye 1,427
The Chaos Communication Camp is an international meeting of hackers that takes place every four years, organized by the Chaos Computer Club (CCC). The camp is an event for providing information about technical and societal issues, such as privacy, freedom of information and data security. Hosted speeches are held in big tents and conducted in English as well as German. Each participant may pitch a tent and connect to a fast internet connection and power. The 2011 camp took place from August 10...
Hacker Conferences
movies
eye 1,423
favorite 0
comment 0
Videos from AIDE 2012 Videos embedded at http://www.irongeek.com/i.php?page=videos/aid2012/mainlist
Topics: hacking, security, forensics
2007 Chaos Communications Club Camp
movies
eye 1,399
favorite 0
comment 0
cccamp07-en-2041-Tits Bits
Shmoocon 2016
movies
eye 1,365
favorite 0
comment 0
We’ve taken a novel approach to automating the determination of a phisher’s geographic location. With the help of Markov chains, we craft honeypot responses to phishers’ emails in an attempt to beat them at their own game. We’ll examine the underlying concepts, implementation of the system, and reveal some of the results from our ongoing experiment. Robbie Gallagher is a security engineer with Atlassian in Austin, Texas. He received his bachelor’s degree in applied computing...
Chaos Communications Congress 2004
movies
eye 1,344
favorite 1
comment 0
066 Bluetooth Hacking
Hacker Conferences
by Ingrid Burrington
movies
eye 1,340
favorite 0
comment 0
Early digital computers were the size of rooms. While the devices have gotten smaller, because of the increasingly networked nature of technology the room has gotten bigger--it's ceased having walls and started to cover the ocean floor and ascend into low earth orbit. While Neal Stephenson may have cornered this living-inside-a-computer narrative in 1996 with "Mother Earth, Mother Board", in the past twenty years the seams of the network have become even more opaque, subsumed into The...
Source: https://media.ccc.de/v/33c3-8412-from_server_farm_to_data_table
Shmoocon 2016
by Sean Cassidy
movies
eye 1,289
favorite 0
comment 0
LastPass holds all of your secrets. Its login prompts and alerts occur within the browser window, which attackers can control. When the victim visits the target site–which can look completely inconspicuous, such as a news website–after a delay a LastPass notification will appear if the user has LastPass installed prompting the user to log in because their session has expired. The log in screen, which always appears within the browser window, is customized for each browser and operating...
Chaos Communications Congress SigInt 2012
collection
68
ITEMS
1,280
VIEWS
collection
eye 1,280
SIGINT was an annual three-day conference on technical and social aspects of our digital society. It offered lectures and workshops on a multitude of topics.
Community Video
movies
eye 1,260
favorite 0
comment 0
Intro to Metasploit Jeremy Druin @webpwnized
Topics: Metasploit, Jeremy Druin, @webpwnized
Shmoocon 2014
movies
eye 1,251
favorite 0
comment 0
An Open and Affordable USB Man in the Middle Device Dominic Spill With the introduction of FaceDancer, there has been a surge of interest in USB security. USBProxy is an open framework for the BeagleBone Black to make it simpler for anyone to monitor, inject or modify data carried over a USB connection. While the FaceDancer will allow devices to be written on a host system, we are able to go further and man-in-the-middle connections to existing devices as well. The BeagleBone Black also enables...
2013 FrOScon
collection
59
ITEMS
1,250
VIEWS
collection
eye 1,250
Free Software and Open Source - these are the topics of FrOSCon (Free and Open Source Software Conference). FrOSCon 2013 was held in St. Augustin, Germany.
Shmoocon 2010
collection
36
ITEMS
1,243
VIEWS
collection
eye 1,243
ShmooCon is an American hacker convention organized by The Shmoo Group. There are typically 40 different talks and presentations on a variety of subjects related to computer security and cyberculture. Multiple events are held at the convention related to cryptography and computer security such as Shmooganography, Hack Fortress, a locksport village hosted by TOOOL DC, and Ghost in the Shellcode.
Shmoocon 2016
movies
eye 1,238
favorite 0
comment 0
The platforms powering the growth of the Internet-of-Things include tried-and-true embedded Real-Time Operating Systems (RTOSes). These lean OSes are designed for performance and reliability, but they force application developers to use C and often lack the exploit mitigations implemented in consumer OSes. This unforgiving environment places the burden of security entirely on the programmer and makes the risk of memory corruption vulnerabilities on these increasingly ubiquitous systems very...
Community Video
movies
eye 1,199
favorite 0
comment 0
Videos of the talks from Hack3rcon 3 (2012)
Topics: hacking, security, hack3rcon
Shmoocon 2016
movies
eye 1,166
favorite 0
comment 0
In the system hardening space, we’ve been using chroot jails to contain compromised programs. These jails were better than nothing, but were easily escaped by many attackers. As Linux containers become more mature, we can use them to replace these jails. This talk will teach you how to use Linux Containers, through both Docker and Ubuntu’s new LXD, to create far better jails for programs, containing their compromise. You will leave this demo-heavy talk immediately able to use both...