Hackers of CypherCon
2020•NR•57:00
With the Soviet Union's launch of the first Sputnik satellite in 1957, the Cold War soared to new heights as Americans f...
2020•NR•34:00
We all know someone who has a Nintendo Entertainment System (NES) sitting around collecting dust. In this talk, Vi Grey ...
2020•NR•26:00
Owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo,...
2020•NR•21:00
Someone in the 1860s one day decided, "I'm going to order this houseplant from Asia on Amazon and plant it in my garden!...
2020•NR•45:00
DNA sequencing has become a lot cheaper since its invention, even becoming a consumer good. We will begin with an overvi...
2020•NR•22:00
In June 2018, Toys "R" Us shut its doors to the public after filing for bankruptcy. While liquidating its assets, everyt...
2020•NR•39:00
Coinbase has become one of the leading cryptocurrency exchanges in the world. This talk describes how the systems operat...
2020•NR•25:00
Kris and Chris Silvers, creators of the OSINT CTF, share some lessons they've learned on their journey. They've run into...
2020•NR•24:00
What happens with disk, flash, and floppy drives when you drop them off at thrift stores or e-recycling centers? How do ...
2020•NR•45:00
Let's increase your appetite for becoming a HAM. Whether you have an SDR laying around or a handheld you have had since ...
2020•NR•46:00
A mini-tutorial on how the various forms of "bot detection" out there work and how to modify or spoof the necessary clie...
2020•NR•43:00
Meltdown/Spectre introduced a "perfect storm" scenario where the vulnerability wasn't easy to fix and the solution broke...
2020•NR•47:00
Jim Nitterauer, Senior Security Engineer, discusses how he was able to use some F5 iRule magic on his load balancers com...
2020•NR•24:00
It only takes a small oversight to cause a vulnerability, even when it comes to severe vulnerabilities. The Buffalo Tera...
2020•NR•38:00
In this talk, you will learn various tools and techniques that can be used to thoroughly analyze a malicious email attac...
2020•NR•38:00
The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved...
2020•NR•52:00
Wireless pentesting typically requires physical proximity to a target, which requires time, limited resources, and const...
2020•NR•20:00
Low-skilled opportunists (script kiddies) and APT (advanced persistent threats) (funded organised crime, nation states) ...
2020•NR•46:00
Amazing new A.I.-based services from Amazon, Google, and Microsoft let organizations rely on automated technology to cra...
2020•NR•23:00
This talk will cover the basics of using the user-api to automate functions in Hashtopolis. Connecting to an HTP instanc...
2020•NR•47:00
Bug bounties and the Vulnerability Disclosure Program (VDP) are two of the fastest-growing ways for companies to engage ...
2020•NR•51:00
The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and...
2020•NR•47:00
In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the r...
2020•NR•53:00
Digital forensics expert Cindy Murphy, M.Sc., will use this session to unpack the myths of digital forensics she has unc...