Tu dois être connecté pour marquer les épisodes vus. Connexion ou inscription.
Saison 11
Date de diffusion
Fév 21, 2012
Is wearable computing a practical reality? Darren speaks with Greg Priest-Dorman, a fellow geek who's been building and wearing the tech for 12 years. Plus open source gaming that involves Ponies!
Is wearable computing a practical reality? Darren speaks with Greg Priest-Dorman, a fellow geek who's been building and wearing the tech for 12 years. Plus open source gaming that involves Ponies!
11x2
Backtrack 5 Root Encryption and Ubuntu 12.04 - Precise Pangolin First Look!
Episode overview
Date de diffusion
Fév 28, 2012
Ubuntu 12.04 is around the corner and we have a first look at its new Heads-Up display. Then Eighty of Dual Core joins us to setup Backtrack 5 with root encryption. Plus Ubuntu on Android?
Ubuntu 12.04 is around the corner and we have a first look at its new Heads-Up display. Then Eighty of Dual Core joins us to setup Backtrack 5 with root encryption. Plus Ubuntu on Android?
11x3
The Internet in a Box, a Yubikey You Could Swallow, and Phone Phreaking from RSA 2012
Episode overview
Date de diffusion
Mar 06, 2012
This time on the show, the internet in a box! Darren talks to Kyle Flaherty from Breaking Point about a million dollar rack, Stina Ehrensvärd of Yubico demos an NFC enabled Yubikey
.. show full overview
This time on the show, the internet in a box! Darren talks to Kyle Flaherty from Breaking Point about a million dollar rack, Stina Ehrensvärd of Yubico demos an NFC enabled Yubikey prototype and a one-time password key so small you could accidentally swallow it, and more!
Date de diffusion
Mar 13, 2012
This time on the show, Darren explains maintaining persistence and privacy on IRC with your very own bouncer. Then, we set up simple 2-factor authentication in Windows and much more!
This time on the show, Darren explains maintaining persistence and privacy on IRC with your very own bouncer. Then, we set up simple 2-factor authentication in Windows and much more!
Date de diffusion
Mar 20, 2012
This time on the show, locking down your PC with proximity and a little bluetooth magic -- I'll be showing you how. Then, what's the IEEE on about these days? Darren reports from
.. show full overview
This time on the show, locking down your PC with proximity and a little bluetooth magic -- I'll be showing you how. Then, what's the IEEE on about these days? Darren reports from South-by-South-West. More fun bash tips and VPN security - who do you trust? All that and more, this time on Hak5!
Date de diffusion
Mar 27, 2012
This time on the show Darren reports from SXSW 2012 with Eighty of Dual Core and Chris Mooney of DoD.net. The boys discuss two-factor authentication on the Linux platform then brainstorm
.. show full overview
This time on the show Darren reports from SXSW 2012 with Eighty of Dual Core and Chris Mooney of DoD.net. The boys discuss two-factor authentication on the Linux platform then brainstorm and develop a tool, dubbed "Kill All The Humans", to protect your machine from unwanted invaders. Invaders must die.
11x7
Block Facebook Tracking, Interactive Process Automation, Plus NetCat and Ngrep Tricks
Episode overview
Date de diffusion
Avr 03, 2012
This time on the show, automating interactive tasks in Linux, preventing your browser sessions from being tracked, graphical command-line disk usage utilities, and pushing hex over TCP with Echo. All that and more, this time on Hak5!
This time on the show, automating interactive tasks in Linux, preventing your browser sessions from being tracked, graphical command-line disk usage utilities, and pushing hex over TCP with Echo. All that and more, this time on Hak5!
Date de diffusion
Avr 10, 2012
This time on Hak5, we begin a special series on proxies. Caching, filtering, security or anonymity -- whatever your reasons may be, Darren and I are exploring the ins and outs of this great technology from the ground up. All that and more!
This time on Hak5, we begin a special series on proxies. Caching, filtering, security or anonymity -- whatever your reasons may be, Darren and I are exploring the ins and outs of this great technology from the ground up. All that and more!
11x9
Proxies, Linux SSH Servers, Windows Clients and Public Key Authentication
Episode overview
Date de diffusion
Avr 17, 2012
Building on top of last week's episode on Proxies, SOCKS5 and SSH we're covering Authentication via Public Key Cryptography, setting up an SSH server in Linux and properly configuring a client in Windows.
Building on top of last week's episode on Proxies, SOCKS5 and SSH we're covering Authentication via Public Key Cryptography, setting up an SSH server in Linux and properly configuring a client in Windows.
11x10
SSH Public Key Fingerprints, Windows SSH Servers and Linux Key Pair Exchange
Episode overview
Date de diffusion
Avr 24, 2012
Continuing with Proxies, SOCKS5 and SSH, Darren and Shannon cover SSH Public Key Fingerprints, then build a free Windows SSH Server and configure Key Pairs for a Linux client.
Continuing with Proxies, SOCKS5 and SSH, Darren and Shannon cover SSH Public Key Fingerprints, then build a free Windows SSH Server and configure Key Pairs for a Linux client.
11x11
Roll Your Own Secure Cloud Storage with SSHFS - Secure Shell File System
Episode overview
Date de diffusion
Mai 01, 2012
Continuing with SOCKS5, SSH, Public Key Pairs and fingerprints, Darren and Shannon use SSH to create a secure remotely mounted network file system with implementations in both Windows and Linux.
Continuing with SOCKS5, SSH, Public Key Pairs and fingerprints, Darren and Shannon use SSH to create a secure remotely mounted network file system with implementations in both Windows and Linux.
11x12
Relay Two Firewalled Devices Through a Persistent SSH Proxy
Episode overview
Date de diffusion
Mai 08, 2012
Traversing NAT firewalls couldn't be easier with a well crafted SSH proxy. This week Darren and Shannon break down reverse shells and persistence using a WiFi Pineapple and some
.. show full overview
Traversing NAT firewalls couldn't be easier with a well crafted SSH proxy. This week Darren and Shannon break down reverse shells and persistence using a WiFi Pineapple and some autossh-fu. Plus, SSHFS GUIs for Linux, ClientAliveMaxCounts, Putty keys without Pageant and more!
11x13
Persistent SSH Tunnels for Windows and Linux, Local vs Remote Forwards and More
Episode overview
Date de diffusion
Mai 15, 2012
This time on the show, local and remote forwarding with SSH, persistent connections in Linux with AutoSSH, Windows tunnels that don't quit (with a GUI front-end for Plink), and a whole lot of technolust. All that and more, this time on Hak5!
This time on the show, local and remote forwarding with SSH, persistent connections in Linux with AutoSSH, Windows tunnels that don't quit (with a GUI front-end for Plink), and a whole lot of technolust. All that and more, this time on Hak5!
Date de diffusion
Mai 22, 2012
This time on the show, using One-Time-Passwords in Linux for SSH authentication. We cover the theory and set up our server with a Yubikey. Plus relaying without GatewayPorts, easily edit Known_Hosts, Free SSHFS in Windows and a ton more!
This time on the show, using One-Time-Passwords in Linux for SSH authentication. We cover the theory and set up our server with a Yubikey. Plus relaying without GatewayPorts, easily edit Known_Hosts, Free SSHFS in Windows and a ton more!
Date de diffusion
Mai 29, 2012
Encryption 101 begins with understanding the terminology and mechanisms. This week, we're breaking down encryption in the context of SSH, from symmetric and asymmetric to block and stream ciphers.
Encryption 101 begins with understanding the terminology and mechanisms. This week, we're breaking down encryption in the context of SSH, from symmetric and asymmetric to block and stream ciphers.
11x16
2-Factor SSH with Google Authenticator and Challenge Response Authentication
Episode overview
Date de diffusion
Jun 05, 2012
We challenge you... to respond... then we'll authenticate ya! That's right, we're getting into Challenge Response Authentication. Plus Two-Factor Authentication for SSH using the Google
.. show full overview
We challenge you... to respond... then we'll authenticate ya! That's right, we're getting into Challenge Response Authentication. Plus Two-Factor Authentication for SSH using the Google Authenticator, and how not to lock yourself out of your own workstation. All that and more, this time on Hak5!
11x17
The Raspberry Pi and How 6.4 Million LinkedIn Passwords Could Have Been Saved with Salt
Episode overview
Date de diffusion
Jun 12, 2012
Security breach! LinkedIn loses 6.4 million password hashes -- what does that mean to you? We're talking one-way-hashes, salting, and the end of MD5.
Security breach! LinkedIn loses 6.4 million password hashes -- what does that mean to you? We're talking one-way-hashes, salting, and the end of MD5.
Date de diffusion
Jun 20, 2012
This time on a special Hak5, Darren and Paul travel to San Antonio for the 2012 National Collegiate Cyber Defense Competition and find out what it takes to compete in the nations largest collegiate cyber defense show.
This time on a special Hak5, Darren and Paul travel to San Antonio for the 2012 National Collegiate Cyber Defense Competition and find out what it takes to compete in the nations largest collegiate cyber defense show.
Date de diffusion
Jun 27, 2012
We're tunneling our traffic through multiple servers with ProxyChains. Plus safe password keeping and Active Directory authentication for Linux. All that and more this time on Hak5.
We're tunneling our traffic through multiple servers with ProxyChains. Plus safe password keeping and Active Directory authentication for Linux. All that and more this time on Hak5.
Date de diffusion
Juil 03, 2012
This time on the show, hacking RF! Mike Ossmann, founder of Great Scott Gadgets and inventor of the Ubertooth One, joins us to talk about his latest radio hacking project.
This time on the show, hacking RF! Mike Ossmann, founder of Great Scott Gadgets and inventor of the Ubertooth One, joins us to talk about his latest radio hacking project.
11x21
Mountain Top WiFi Shootout, Plus Cisco, DHS, Facebook and the ACLU
Episode overview
Date de diffusion
Juil 11, 2012
Mountain Top WiFi Shootout! Plus, Facebook vs. Your Address Book, The Department of Homeland Security reports on US cyber incidents, and Cisco Linksys snoops on your Internet traffic.
Mountain Top WiFi Shootout! Plus, Facebook vs. Your Address Book, The Department of Homeland Security reports on US cyber incidents, and Cisco Linksys snoops on your Internet traffic.
Date de diffusion
Juil 19, 2012
This time on the show is part 1 of our WiFi from-the-ground-up series. Darren presents a wireless workshop at the Noisebridge hackerspace in San Francisco, California.
This time on the show is part 1 of our WiFi from-the-ground-up series. Darren presents a wireless workshop at the Noisebridge hackerspace in San Francisco, California.
Date de diffusion
Juil 24, 2012
This time on the show, part 2 of our WiFi from-the-ground-up series. Darren presents a wireless workshop at the Noisebridge hackerspace in San Francisco.
This time on the show, part 2 of our WiFi from-the-ground-up series. Darren presents a wireless workshop at the Noisebridge hackerspace in San Francisco.
Date de diffusion
Juil 31, 2012
This time on the show, the conclusion of our WiFi from-the-ground-up series. Darren presents a wireless workshop at the Noisebridge hackerspace in San Francisco.
This time on the show, the conclusion of our WiFi from-the-ground-up series. Darren presents a wireless workshop at the Noisebridge hackerspace in San Francisco.
Date de diffusion
Août 08, 2012
This time on the show: Black Hat 2012, popping hotel key card locks and soho wifi routers with elegance. All that and more on this special episode of Hak5.
This time on the show: Black Hat 2012, popping hotel key card locks and soho wifi routers with elegance. All that and more on this special episode of Hak5.
Date de diffusion
Août 14, 2012
Reporting from DEFCON 2012, Darren catches up with Georgia Weidman to talk mobile application security. Plus Piotr and the gang from Quad Shot recap last year's experience building their open source RC aircraft. All that and more this time on Hak5!
Reporting from DEFCON 2012, Darren catches up with Georgia Weidman to talk mobile application security. Plus Piotr and the gang from Quad Shot recap last year's experience building their open source RC aircraft. All that and more this time on Hak5!
S'il manque des épisodes ou des bannières (et qu'ils existent sur TheTVDB), vous pouvez demander une mise à jour automatique complète de l'émission :
Demander une mise à jour de la série
Mise à jour demadée