Hackers of CypherCon

  • : 2018
  • : 52
  • : 2
  • Prime Video
  • Documentary

:

.

2
2x1
A Kinesthetic Approach To Learning Encryption with Antoinette Stevens
Episode overview
10, 2019
Kinesthetic style, or tactile learning, means that some learn best by physically doing to fully learn and memorize a topic. Capture the flag competitions can be a way to understand .. show full overview
2x2
More Than Tor: Shining a Light on Different Corners of the Dark Web with Benjamin Brown
Episode overview
14, 2019
When the terms Darknet or Dark Web are invoked, it is almost always in reference to the Tor network, but what about the other extant Darknet frameworks? In this talk Benjamin will expand .. show full overview
2x3
The Magic of Forensic Artifacts Hiding in Plain Sight with Cindy Murphy
Episode overview
05, 2019
Digital forensics expert Cindy Murphy, M.Sc. will use this session to unpack the myths of digital forensics she uncovered since her career pivot from law enforcement to private digital .. show full overview
2x4
Spitting The Hook: Examining Phishing Bait with Joe Cicero
Episode overview
19, 2019
In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the red flag concept, identifying phishing email basics, examining .. show full overview
2x5
Phreaking for fun and profit with Brad Swanson
Episode overview
02, 2019
Brad talk's about phone phreaking back in the late 1980's, until the mid 1990's. He will cover what phreaking was, why it worked, and why it was done. Devices used, the theory behind .. show full overview
2x6
Shifting Security Left with Chris Merkel
Episode overview
16, 2019
The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and secure systems. The solution is more security tools, more .. show full overview
2x7
Bug Bounty Law with Dr. Amit Elazari Bar On
Episode overview
30, 2019
Bug Bounties and Vulnerability Disclosure Program (VDP) are one of the fastest growing, most popular ways for companies to engage with the security research community and uncover unknown .. show full overview
2x8
Automating Hashtopolis with Dustin Heywood
Episode overview
13, 2019
This talk will cover the basics of using the user-api to automate functions in Hashtopolis. Connecting to an HTP instance, creating hashlists, creating attacks, recovering plaintext, user creation and more will be covered.
2x9
Welcome Our New A.I. Overlords with Ed Skoudis
Episode overview
27, 2019
Amazing new A.I. based services from Amazon, Google, and Microsoft let organizations rely on automated technology to crawl through their cloud-based data to identify sensitive info, .. show full overview
2x10
Tracking an Adversary's Learning Curve with Edd Black
Episode overview
11, 2019
There are 2 camps of attackers: low skilled opportunists (script kiddies) and APT - Advanced Persistent Threats (funded organized crime, nation states). In between lurks a skilled .. show full overview
2x11
Remote Wireless Pentesting with Eric Escobar & Matt Orme
Episode overview
25, 2019
Wireless pentesting typically requires physical proximity to a target which requires time, limited resources, and constant traveling. Eric & Matt have pioneered an inexpensive device to .. show full overview
2x12
Building a Cohesive Undergraduate Security Club with Ian Klatzco
Episode overview
08, 2019
The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved with a tighter meeting format, approachable 24-7 internal CTF, .. show full overview
2x13
Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich
Episode overview
22, 2019
Werewolves attack, we have silver bullets. Vampires attack, we have holy water. Criminal hackers attack, we have encryption. The villains come and the heroes fight back. But too often, .. show full overview
2x14
Always Look a Gift (Trojan) Horse In the Mouth with James Arndt
Episode overview
20, 2019
In this talk, learn various tools and techniques that can be used to thoroughly analyze a malicious email attachment and everything that comes after it. In order to get as many stones as .. show full overview
2x15
Unhinging Security On the Buffalo Terastation NAS with Ian Sindermann
Episode overview
03, 2020
It only takes a small oversight to cause a vulnerability, even when it comes to severe vulnerabilities. The Buffalo TeraStation NAS demonstrates this idea beautifully in that it has a .. show full overview
2x16
Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer
Episode overview
10, 2020
This talk will provide a an overview of the major SSL/TLS versions along with their major vulnerabilities. Jim will discuss how he was able to use some F5 iRule magic on his load .. show full overview
2x17
What are We Thinking Here? Rethinking Security with Jeff Man
Episode overview
17, 2020
There's too much focus on vulnerabilities and not enough attention on other elements that derive the standard risk equation. Meltdown/Spectre introduced a perfect storm scenario where .. show full overview
2x18
Sorry About Your WAF with Johnny Xmas & Sam Crowther
Episode overview
24, 2020
This presentation will be a mini-tutorial on how the various forms of "bot detection" out there work, and how to modify/spoof the necessary client environments to bypass nearly all of .. show full overview
2x19
What the World Needs Now is Ham, Sweet Ham with Jonathan Tomek
Episode overview
31, 2020
Let's increase your appetite for becoming a HAM. Whether you have an SDR laying around or hand-held you have had since the last hackercon, you should get to know how to use it. For those .. show full overview
2x20
Spelunking the Bitcoin Blockchain with Josh Bressers
Episode overview
07, 2020
There are few topics that capture headlines like Bitcoin. Bitcoin's blockchain is like art; sometimes you have to see it with your own eyes. How does Bitcoin work? What secrets does .. show full overview
2x21
Thrift Shopping with your Data with Josh Frantz
Episode overview
14, 2020
What happens with disk, flash, and floppy drives when you drop them off at thrift stores or e-recycling centers? How do you properly dispose of those devices safely and securely? We look .. show full overview
2x22
Capture the Fail - Avoiding Pitfalls when running your C.T.F. with Kris & Chris Silvers
Episode overview
21, 2020
Kris and Chris Silvers, creators of the OSINT C.T.F., share some lessons they've learned on their journey. They've run into some interesting problems. Like their scoring engine's .. show full overview
2x23
Anatomy of a Hot Wallet: Bitcoin at Scale with Matthew Werner
Episode overview
28, 2020
Coinbase has become one of the leading cryptocurrency exchanges in the world. This talk describes how the systems operate, challenges we've faced, and how we've overcome these .. show full overview
2x24
Don't Forget to Wipe with Michael Portera
Episode overview
06, 2020
On June 29, 2018, Toys "R" Us shut its doors to the public after filing Chapter 11 bankruptcy. The months leading up to that day consisted of liquidating its assets, including computer .. show full overview
2x25
What Happens when a Genome Database is Breached with Michelle Meas
Episode overview
13, 2020
DNA sequencing has become a lot cheaper since its invention, even becoming a consumer good. However, the companies that perform this sequencing are unregulated, and what they do with the .. show full overview
2x26
Urban Foraging: Back to our Beginnings with Nick Wersel
Episode overview
20, 2020
Someone in the 1860's one day decided 'Imma order this houseplant from Asia on the Internet and plant it in my garden!' They clicked that Buy Now button and six months later the package .. show full overview
2x27
Journey to Command Injection with Rick Ramgattie
Episode overview
27, 2020
Sometimes, owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo, we show how we were able to chain multiple .. show full overview
2x28
Micro and Nano Segmentation with Russ From
Episode overview
03, 2020
This presentation introduces Micro-Segmentation and includes industry adoption statistics, strategies, and implementation examples. Covered, is why we need segmentation, what the .. show full overview
2x29
A look at Historic Cons & their Transition to a Digital World with Stephanie Carruthers
Episode overview
10, 2020
What does a pig in a poke, pigeon drops, and salting have in common? They are just a few of old school confidence tricks (cons) used from the late middle ages to more recently which .. show full overview
2x30
Bet You Never Played an NES Game Like This with Vi Grey
Episode overview
17, 2020
In this talk, Vi Grey will demonstrate how it is possible to innovate under the limitations the NES restricts us with to create new ways a person can interact with a game. You will see .. show full overview
2x31
The X-15 Rocket Plane, Flying the First Wings into Space with Michelle Evans
Episode overview
24, 2020
With the Soviet Union's launch of the first Sputnik satellite in 1957, the Cold War soared to new heights as Americans feared losing the race into space. This presentation tells the .. show full overview