Hackers of CypherCon

Hackers of CypherCon

S02E31 The X-15 Rocket Plane Flying the FirWingInto With Michelle Evans
2020NR57:00
With the Soviet Union's launch of the first Sputnik satellite in 1957, the Cold War soared to new heights as Americans f...
S02E30 Bet You Never Played an NEGame Like ThiWith Vi Grey
2020NR34:00
We all know someone who has a Nintendo Entertainment System (NES) sitting around collecting dust. In this talk, Vi Grey ...
S02E27 Journey to Command Injection: With Rick Ramgattie
2020NR26:00
Owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo,...
S02E26 Urban Foraging Back to Our BeginningWith Nick Wersel
2020NR21:00
Someone in the 1860s one day decided, "I'm going to order this houseplant from Asia on Amazon and plant it in my garden!...
S02E25 What HappenWhen a Genome DatabaiBreached: With Michelle Meas
2020NR45:00
DNA sequencing has become a lot cheaper since its invention, even becoming a consumer good. We will begin with an overvi...
S02E24 Dont Forget to Wipe: With Michael Portera
2020NR22:00
In June 2018, Toys "R" Us shut its doors to the public after filing for bankruptcy. While liquidating its assets, everyt...
S02E23 Anatomy of a Hot Wallet Bitcoin at With Matthew Werner
2020NR39:00
Coinbase has become one of the leading cryptocurrency exchanges in the world. This talk describes how the systems operat...
S02E22 Capture the Fail Avoiding PitfallWhen Running Your CTF: With The Silvers
2020NR25:00
Kris and Chris Silvers, creators of the OSINT CTF, share some lessons they've learned on their journey. They've run into...
S02E21 Thrift With Your Data: With JoFrantz
2020NR24:00
What happens with disk, flash, and floppy drives when you drop them off at thrift stores or e-recycling centers? How do ...
S02E20 the Bitcoin Blockchain: With JoBressers
2020NR47:00
Bitcoin's blockchain is like art.
S02E19 What the World NeedNow IHam Ham: With Jonathan Tomek
2020NR45:00
Let's increase your appetite for becoming a HAM. Whether you have an SDR laying around or a handheld you have had since ...
S02E18 About Your WAF: With Johnny XmaAnd Crowther
2020NR46:00
A mini-tutorial on how the various forms of "bot detection" out there work and how to modify or spoof the necessary clie...
S02E17 What are we Thinking Here? Rethinking With Jeff Man
2020NR43:00
Meltdown/Spectre introduced a "perfect storm" scenario where the vulnerability wasn't easy to fix and the solution broke...
S02E16 Decrypting the MeThat iTlNegotiation: With Jim Nitterauer
2020NR47:00
Jim Nitterauer, Senior Security Engineer, discusses how he was able to use some F5 iRule magic on his load balancers com...
S02E15 Unhinging on the Buffalo TeraNAWith Ian Sindermann
2020NR24:00
It only takes a small oversight to cause a vulnerability, even when it comes to severe vulnerabilities. The Buffalo Tera...
S02E14 AlwayLook a Gift
2020NR38:00
In this talk, you will learn various tools and techniques that can be used to thoroughly analyze a malicious email attac...
S02E12 Building a CoheUndergraduate Club: With Ian Klatzco
2020NR38:00
The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved...
S02E11 Remote WirelePenteWith Eric EAnd Matt Orme
2020NR52:00
Wireless pentesting typically requires physical proximity to a target, which requires time, limited resources, and const...
S02E10 Tracking an AdverLearning Curve: With Edd Black
2020NR20:00
Low-skilled opportunists (script kiddies) and APT (advanced persistent threats) (funded organised crime, nation states) ...
S02E09 Welcome Our New A.I. OverlordWith Ed Skoudis
2020NR46:00
Amazing new A.I.-based services from Amazon, Google, and Microsoft let organizations rely on automated technology to cra...
S02E08 Automating HaWith DuHeywood
2020NR23:00
This talk will cover the basics of using the user-api to automate functions in Hashtopolis. Connecting to an HTP instanc...
S02E07 Bug Bounty Law: With Dr Amit Elazari Bar On
2020NR47:00
Bug bounties and the Vulnerability Disclosure Program (VDP) are two of the fastest-growing ways for companies to engage ...
S02E06 Left: With ChriMerkel
2020NR51:00
The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and...
S02E04 the Hook Examining PhiBait: With Joe Cicero
2020NR47:00
In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the r...
S02E03 The Magic of ForenArtifactHiding in Plain With Cindy Murphy
2020NR53:00
Digital forensics expert Cindy Murphy, M.Sc., will use this session to unpack the myths of digital forensics she has unc...