All Episodes
DEFCON 15 [Audio] Speeches from the hacker conventions — 122 episodes
Panel: Disclosure Panel
Panel: Meet the VCs
Panel: Meet the Fed
Luke Jennings:One Token to Rule Them All: Post-Exploitation Fun in Windows Environments
Lukas Grunwald: Security by Politics - Why it will never work
Fred Doyle & Matt Richard: "Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning
Iftach Ian Amit: The Inherent Insecurity of Widgets and Gadgets
Ofir Arkin: kNAC!
Ask EFF: The Year in Digital Civil Liberties
Atlas: Remedial Heap Overflows: dlmalloc style
Andrea Barisani & Daniele Bianco: Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation.
Geoffrey Bennett: The Completion Backward Principle
John "jur1st" Benson: Bridging the Gap Between Technology and the Law
Peter Berghammer: A Journalist's Perspective on Security Research
Sean M. Bodmer: Analyzing Intrusions & Intruders
Sam Bowne: Teaching Hacking at College
Sergey Bratus: Entropy-based data organization tricks for log and packet capture browsing.
Taylor Brinton & Brett Neilson: Being in the know... Listening to and understanding modern radio systems
David Byrne: Intranet Invasion With Anti-DNS Pinning
D.J. Capelis: Virtualization: Enough holes to work Vegas
Anton Chuvakin & Mike Murray: The Science Of Social engineering: NLP
Robert Clark: Computer and Internet Security Law?A Year in Review 2006?2007
Greg Conti: Satellite Imagery Analysis
Crispin Cowan: Securing Linux Applications With AppArmor
Lee Kushner & Mike Murray: Creating and Managing your Security Career
Jesse 'x30n' D'Aguanno: LAN Protocol Attacks Part 1 - Arp Reloaded
Rick Deacon: Hacking Social Lives: MySpace.com
Dead Addict: Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures
Delchi & Valsmith: Malware Secrets
Jared DeMott & Panel: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing
Ganesh Devarajan: Unraveling SCADA Protocols: Using Sulley Fuzzer
Roger Dingledine: Tor and blocking-resistance
Toralv Dirro & Dirk Kollberg: Trojans, A Reality Check
Steve Dunker: Every thing you ever wanted to know about Police Procedure in 50 minutes.
Luiz Eduardo: The Hacker Society around the (corporate) world.
Joel Eriksson & Panel: Kernel Wars
Nathan S. Evans & Christian Grothoff: Routing in The Dark: Pitch Black
Gadi Evron: Estonia and Information Warefare
Gadi Evron: Webserver Botnets and Hosting Farms as Attack Platforms
Matt Fiddler & Marc Weber Tobias: High Insecurity: Locks, Lies, and Liability
Zac Franken: Biometric and token based access control systems: Are you protected by two screws and a plastic cover?
Terrence "king tuna" Gareau: Hacking EvDO
Kenneth Geers: Greetz from Room 101
Damian Gomez: Intelligent debugging for vuln-dev
K N Gopinath: Multipot: A More Potent Variant of Evil Twin
Joe Grand: Making of the DEFCON 15 Badge
Jennifer Granick: Disclosure and Intellectual Property Law: Case Studies
David Gustin "nonsequitor" & Abraham "AbEnd" Shultz: Hardware Hacking for Software Geeks
Peter Gutmann: The Commercial Malware Industry
Nathan "Sysmin" Hamiel & Marklar: Creating Unreliable Systems "Attacking the Systems That Attack You"
Ian G. Harris: INTERSTATE: A Stateful Protocol Fuzzer for SIP
John Heasman: Hacking the Extensible Firmware Interface
Aaron Higbee: Hack Your Car for Boost and Power!
Ricky Hill: GeoLocation of Wireless Access Points and "Wireless GeoCaching"
Greg Hoglund: VIRTUAL WORLD, REAL HACKING
Dr. Thomas J. Holt: The Market for Malware
Broward Horne: Click Fraud Detection with Practical Memetics
Dan Hubbard: HoneyJax (AKA Web Security Monitoring and Intelligence 2.0)
David Hulton: Faster PwninG Assured: New adventures with FPGAs
Dave Josephsen: Homeless Vikings, (short-lived bgp prefix hijacking and the spamwars)
Dan Kaminsky: Black Ops 2007: Design Reviewing The Web
Vitaliy Kamlyuk: Fighting Malware on your own.
Patrik Karlsson: SQL injection and out-of-band channeling
Benjamin Kurtz: Functional Fuzzing with Funk
Mickey Lasky & David C. Smith: Cool stuff learned from competing in the DC3 digital forensic challenge.
Edward Lee: Comparing Application Security Tools
Janne Lindquist: IPV6 Is bad for your privacy.
Johhny Long: No-tech Hacking
Marce Luck & Tom Stracener: Hacking the EULA: Reverse Benchmarking Web Application Security Scanners
Nick Mathewson: SOCIAL ATTACKS ON ANONYMITY NETWORKS
Nick Mathewson: TECHNICAL CHANGES SINCE YOU LAST HEARD ABOUT TOR
Nate McFeters & Billy Rios: Biting the Hand that Feeds You - Storing and Serving Malicious Content From Well Known Web Servers
Haroon Meer & Marco Slaviero: It's All About the Timing
Charlie Miller: How smart is Intelligent Fuzzing - or - how stupid is Dumb Fuzzing?"
Doug Mohney: The Next Wireless Frontier - TV White Spaces
HD Moore & Valsmith: Tactical Exploitation
Dark Tangent Moss: CiscoGate
Scott Moulton: Re-Animating Drives - Advanced Data Recovery
Shawn Moyer: (un)Smashing the Stack: Overflows, Countermeasures, and the Real World
Alexander Muentz: Protecting your IT infrastructure from legal attacks- Subpoenas, Warrants and Transitive Trust. "
Rich Murphey, PhD: Windows Vista Log Forensics
Ne0nRa1n & Julian Spillane: Hack your brain with video games
Danny O'Brien: Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy
Brendan O'connor: Greater than 1: Defeating "strong" Authentication in Web Applications
STEVE ORRIN: The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats
Alfredo Ortega: OpenBSD remote Exploit and another IPv6 vulnerabilities
Chris Palmer & Alex Stamos: Breaking Forensics Software: Weaknesses in Critical Evidence Collection
Gadi Evron & Panel: Internet Wars 2007
RenderMan & Panel: The Church of WiFi's Wireless Extravaganza
Myles Long & Panel: Self-Publishing and the Computer Underground
Deviant Ollam & Panel: Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level
Daniel Peck & Ben Feinstein: CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript
Mike Perry: Securing the Tor Network
Aaron Peterson: Pen-testing Wi-Fi
Plet: Stealing Identity Management Systems
Bruce Potter: Dirty Secrets of the Security Industry
Danny Quist & Valsmith: Covert Debugging: Circumventing Software Armoring Techniques
Aviv Raff: The Inherent Insecurity of Widgets and Gadgets
Vivek Ramachandran: The Emperor Has No Cloak ? WEP Cloaking Exposed
Matt Richard: Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning
Billy Rios: Biting the Hand that Feeds You - Storing and Serving Malicous Content From Well Known Web Servers
Martyn Ruks: MQ Jumping
Oskar Sandberg: Network Mathematics: Why is it a Small World?
Michael Schearer : The Church of WiFi Presents: Hacking Iraq
Bruce Schneier: Q&A with Bruce Schneier
Michael Schrenk: The Executable Image Exploit
Jason Scott: THE EDGE OF FOREVER - MAKING COMPUTER HISTORY
Dror Shalev: A Crazy Toaster: Can Home Devices turn against us?
Zed A. Shaw: Saving The Internet With Hate
Matthew "Pilgrim" Shuchman: How to be a WiFi Ninja
Robert Stoudt: When Tapes Go Missing
Subere: Fingerprinting and Cracking Java Obfuscated Code
Richard Thieme: Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors
Steve "Arrakis" Topletz: Portable Privacy
Schuyler Towne: Locksport: An emerging subculture
I)ruidm: Real-time Steganography with RTP
Squidly1- Theresa Verity: Thinking Outside the Console (box)
Jacob West: How I Learned to Stop Fuzzing and Find More Bugs
Thomas Wilhelm: Turn-Key PenTest Labs
Agent X: 44 Lines about 22 Things that keep me up at Night
Paul Sebastian Ziegler: Multiplatform malware within the .NET-Framework
Philip R. Zimmermann: ZFONE