Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?
|
Jun 04, 2006 |
|
Marco M. Morana: Building Security into the Software Life Cycle, a Business Case
|
Jun 04, 2006 |
|
Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7
|
Jun 04, 2006 |
|
Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.
|
Jun 04, 2006 |
|
Joanna Rutkowska: Rootkits vs Stealth by design Malware
|
Jun 04, 2006 |
|
David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's
|
Jun 04, 2006 |
|
Billy Hoffman: Analysis od Web application worms and Viruses
|
Jun 04, 2006 |
|
Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway
|
Jun 04, 2006 |
|
Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics
|
Jun 04, 2006 |
|
Corey Benninger: Finding Gold in the Browser Cache
|
Jun 04, 2006 |
|
Panel: The Jericho Forum and Challenge
|
Jun 04, 2006 |
|
Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance
|
Jun 04, 2006 |
|
Renaud BIDOU: IPS Short comings
|
Jun 04, 2006 |
|
Alexander Tereshkin: Rootkits: Attacking Personal Firewalls
|
Jun 04, 2006 |
|
Brendan O'Connor: Vulnerabilities in Not-So Embedded Systems
|
Jun 04, 2006 |
|
Dan Moniz & HD Moore: Six Degrees of XSSploitation
|
Jun 04, 2006 |
|
Stefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity
|
Jun 04, 2006 |
|
William B Kimball: Code Integration-Based Vulnerability Auditing
|
Jun 04, 2006 |
|
Franck Veysset and Laurent Butti: Wi-Fi Advanced Stealth
|
Jun 04, 2006 |
|
Panel: Disclosure Discussion
|
Jun 04, 2006 |
|
Noel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono
|
Jun 04, 2006 |
|
Stephano Zanero: Host Based Anomaly Detection on System calls arguments
|
Jun 04, 2006 |
|
Greg Hoglund: Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design
|
Jun 04, 2006 |
|
Bruce Potter: Bluetooth Defense kit
|
Jun 04, 2006 |
|
Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0
|
Jun 04, 2006 |
|
Jonathan Squire: $30, 30 Minutes, 30 Networks
|
Jun 04, 2006 |
|
Jeff Waldron: VOIP Security Essentials
|
Jun 04, 2006 |
|
Himanshu Dwivedi: I’m Going To Shoot The Next Person Who Says VLANs
|
Jun 04, 2006 |
|
Johnny Long: Secrets of the Hollywood Hacker
|
Jun 04, 2006 |
|
Abolade Gbadegesin : The NetIO Stack - Reinventing TCP/IP in Windows Vista
|
Jun 04, 2006 |
|
Brian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion
|
Jun 04, 2006 |
|
Peter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0
|
Jun 04, 2006 |
|
Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device
|
Jun 04, 2006 |
|
Billy Hoffman: Ajax (in)security
|
Jun 04, 2006 |
|
Tod Beardsley: Investigating Evil Websites with Monkeyspaw: The Greasemonkey Security Professional's Automated Webthinger
|
Jun 04, 2006 |
|
Tom Gallagher: Finding and Preventing Cross-Site Request Forgery
|
Jun 04, 2006 |
|
Chris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications
|
Jun 04, 2006 |
|
John Lambert: Security Engineering in Windows Vista
|
Jun 04, 2006 |
|
Alexander Sotirov: Hotpatching and the Rise of Third-Party Patches
|
Jun 04, 2006 |
|
Dino Dai Zovi: Hardware Virtualization Based Rootkits
|
Jun 04, 2006 |
|
Lukas Grunwald: "New Attack to RFID-Systems and their Middle ware
and Backends"
|
Jun 04, 2006 |
|
Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous
|
Jun 04, 2006 |
|
Yuan Fan and Xiao Rong: MatriXay-When Web App & Database Security Pen-Test/Audit Is a Joy
|
Jun 04, 2006 |
|
Charles Edge: Attacking Apple’s Xsan
|
Jun 04, 2006 |
|
Panel: Meet the Feds: OODA Loop and the Science of Security
|
Jun 04, 2006 |
|
Andrew Cushman: Microsoft Security Fundamentals - Engineering, Response and Outreach
|
Jun 04, 2006 |
|
Emmanuele Zambon: "NIDS, false positive reduction through anomaly
detection"
|
Jun 04, 2006 |
|
Jamie Butler: R^2: The Exponential Growth in Rootkit Techniques
|
Jun 04, 2006 |
|
Melanie Rieback: RFID Malware Demystified
|
Jun 04, 2006 |
|
Robert Auger and Caleb Sima: Zero Day Subscriptions: Using RSS and Atom feeds As Attack Delivery Systems
|
Jun 04, 2006 |
|
Hacker Court Part 2: Hacker Court 2006: Sex, Lies and Sniffers
|
Jun 04, 2006 |
|
Hacker Court Panel: Hacker Court 2006: Sex, Lies and Sniffers
|
Jun 04, 2006 |
|
HD Moore: Metasploit Reloaded
|
Jun 04, 2006 |
|
Zvi Gutterman: Open to Attack; Vulnerabilities of the Linux Random Number Generator
|
Jun 04, 2006 |
|
Michael Sutton & Greg MacManus: Punk Ode - Hiding shellcode in plain sight
|
Jun 04, 2006 |
|
Johnny Long: Death By 1000 cuts
|
Jun 04, 2006 |
|
Nicolas Fischbach: Carrier VoIP Security
|
Jun 04, 2006 |
|
Kimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees
|
Jun 04, 2006 |
|
Jeremy Rauch: PDB: The Protocol DeBugger
|
Jun 04, 2006 |
|
FX: Analysing Complex Systems: The BlackBerry Case
|
Jun 04, 2006 |
|
Scott Stender: Attacking Internationialized software
|
Jun 04, 2006 |
|
Chuck Willis : Web application Incident Response and forensics- A Whole new ball game.
|
Jun 04, 2006 |
|
Doug Mohney: Defending Against Social Engineering with Voice Analytics
|
Jun 04, 2006 |
|
Alexander Kornbrust: Oracle Rootkits 2.0
|
Jun 04, 2006 |
|
Panel: Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats
|
Jun 04, 2006 |
|
Paul Böhm: Taming Bugs: The Art and Science of Writing Secure Code
|
Jun 04, 2006 |
|
Johnny cache and David Maynor: Device Drivers
|
Jun 04, 2006 |
|
Shawn Embleton, Sherri Sparks & Ryan Cunningham: "Sidewinder": An Evolutionary Guidance System for Malicious Input Crafting
|
Jun 04, 2006 |
|
Kevin Mandia: The State of Incidence Response
|
Jun 04, 2006 |
|
Jay Schulman: Phishing with Asterisk PBX
|
Jun 04, 2006 |
|
Bala Neerumalla: SQL Injections by truncation
|
Jun 04, 2006 |
|
Saumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit
|
Jun 04, 2006 |
|
Tom Ptacek and Dave Goldsmith: Do Enterprise Management Applications Dream of Electric Sheep?
|
Jun 04, 2006 |
|
SensePost: A Tale of Two Proxies
|
Jun 04, 2006 |
|
Jesse Burns: Fuzzing Selected Win32 Interprocess Communication Mechanisms
|
Jun 04, 2006 |
|
Mariusz Burdach: Physical Memory Forensics
|
Jun 04, 2006 |
|
Hendrik Scholz: SIP Stack Fingerprinting and stack difference attacks
|
Jun 04, 2006 |
|
Pete Finnigan: How to Unwrap Oracle PL/SQL
|
Jun 04, 2006 |
|
Halvar Flake: RE 2006: New Challenges Need Changing Tools
|
Jun 04, 2006 |
|
Dan Kaminsky: Black Ops 2006
|
Jun 04, 2006 |
|
Bruce Potter: The Trusted Computing Revolution
|
Jun 04, 2006 |
|
Ofir Arkin: Bypassing Network Access Control (NAC) Systems
|
Jun 04, 2006 |
|
Neal Krawetz (Dr): You are what you type: No classical computer forensics
|
Jun 04, 2006 |
|
David Endler: Hacking VOIP Exposed
|
Jun 04, 2006 |
|
David Litchfield : All New Zero Day
|
Jun 04, 2006 |
|
Dan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends
|
Jun 04, 2006 |