Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Gadi Evron: Estonia: Information Warfare and Strategic Lessons
|
Dec 11, 2007 |
HD Moore & Valsmith: Tactical Exploitation-Part 2
|
Dec 11, 2007 |
Joe Stewart: Just Another Windows Kernel Perl Hacker
|
Jan 09, 2006 |
Jerry Schneider: Reflection DNS Poisoning
|
Jan 09, 2006 |
Stephan Patton: Social Network Site Data Mining
|
Jan 09, 2006 |
Jeff Morin: Type Conversion Errors: How a Little Data Type Can Do a Whole Lot of Damage
|
Jan 09, 2006 |
Charlie Miller: Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X
|
Jan 09, 2006 |
Iain Mcdonald: Longhorn Server Foundation & Server Roles
|
Jan 09, 2006 |
David Leblanc: Practical Sandboxing: Techniques for Isolating Processes
|
Jan 09, 2006 |
Zane Lackey: Point, Click, RTPInject
|
Jan 09, 2006 |
Greg Wroblewski: Reversing MSRC Updates: Case Studies of MSRC Bulletins 2004-2007
|
Jan 09, 2006 |
Dave G & Jeremy Rauch: Hacking Capitalism
|
Jan 09, 2006 |
Ero Carerra: Reverse Engineering Automation with Python
|
Jan 09, 2006 |
Mark Ryan Del Moral Talabis: The Security Analytics Project: Alternatives in Analysis
|
Jan 09, 2006 |
Phil Zimmermann: Z-Phone
|
Jan 09, 2006 |
Mark Vincent Yason: The Art of Unpacking
|
Jan 09, 2006 |
Chris Wysopal & Chris Eng: Static Detection of Application Backdoors
|
Jan 09, 2006 |
Ariel Waissbein: Timing attacks for recovering private entries from database engines
|
Jan 09, 2006 |
Eugene Tsyrklevich: OpenID: Single Sign-On for the Internet
|
Jan 09, 2006 |
Peter Thermos: Transparent Weaknesses in VoIP
|
Jan 09, 2006 |
Bryan Sullivan: Premature Ajax-ulation
|
Jan 09, 2006 |
Scott Stender: Blind Security Testing - An Evolutionary Approach
|
Jan 09, 2006 |
Alexander Sotirov: Heap Feng Shui in JavaScript
|
Jan 09, 2006 |
Window Snyder & Mike Shaver : Building and Breaking the Browser
|
Jan 09, 2006 |
Eric Schmeidl & Mike Spindel: Strengths and Weaknesses of Access Control Systems
|
Jan 09, 2006 |
Len Sassaman: Anonymity and its Discontents
|
Jan 09, 2006 |
Paul Vincent Sabanal: Reversing C++
|
Jan 09, 2006 |
Joanna Rutkowska & Alexander Tereshkin: IsGameOver(), anyone?
|
Jan 09, 2006 |
Dror-John Roecher: NACATTACK
|
Jan 09, 2006 |
Danny Quist & Valsmith: Covert Debugging: Circumventing Software Armoring Techniques
|
Jan 09, 2006 |
Thomas H. Ptacek, Peter Ferrie & Nate Lawson: Don't Tell Joanna, The Virtualized Rootkit Is Dead
|
Jan 09, 2006 |
Cody Pierce: PyEmu: A multi-purpose scriptable x86 emulator
|
Jan 09, 2006 |
Mike Perry: Securing the tor network
|
Jan 09, 2006 |
Chris Palmer: Breaking Forensics Software: Weaknesses in Critical Evidence Collectio
|
Jan 09, 2006 |
Chris Paget: RFID for Beginners++
|
Jan 09, 2006 |
Alfredo Ortega: OpenBSD Remote Exploit
|
Jan 09, 2006 |
Shawn Moyer: (un)Smashing the Stack: Overflows, Countermeasures, and the Real World
|
Jan 09, 2006 |
HD Moore & Valsmith: Tactical Exploitation-Part 1
|
Jan 09, 2006 |
Eric Monti & Dan Moniz: Defeating Extrusion Detection
|
Jan 09, 2006 |
Luis Miras: Other Wireless: New ways of being Pwned
|
Jan 09, 2006 |
Haroon Meer & Marco Slaviero: It's all about the timing
|
Jan 09, 2006 |
David Maynor & Robert Graham: Simple Solutions to Complex Problems from the Lazy Hacker?s Handbook: What Your Security Vendor Doesn?t Want You to Know .
|
Jan 09, 2006 |
David Litchfield: Database Forensics
|
Jan 09, 2006 |
Jonathan Lindsay: Attacking the Windows Kernel
|
Jan 09, 2006 |
Dr. Andrew Lindell: Anonymous Authentication-Preserving Your Privacy Online
|
Jan 09, 2006 |
Adam Laurie: RFIDIOts!!!- Practical RFID Hacking (Without Soldering Irons or Patent Attorneys)
|
Jan 09, 2006 |
Dr. Neal Krawetz: A Picture's Worth...
|
Jan 09, 2006 |
Dan Kaminsky: Black Ops 2007: Design Reviewing The Web
|
Jan 09, 2006 |
Jon Callas: Traffic Analysis -- The Most Powerful and Least Understood Attack Methods
|
Jan 09, 2006 |
Krishna Kurapati: Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones
|
Jan 09, 2006 |
Mikko Hypponen: Status of Cell Phone Malware in 2007
|
Jan 09, 2006 |
Greg Hoglund: Active Reversing: The Next Generation of Reverse Engineering
|
Jan 09, 2006 |
Billy Hoffman & John Terrill: The little Hybrid web worm that could
|
Jan 09, 2006 |
Jim Hoagland: Vista Network Attack Surface Analysis and Teredo Security Implications
|
Jan 09, 2006 |
Brad Hill: Attacking Web Service Securty: Message....
|
Jan 09, 2006 |
John Heasman: Hacking the extensible Firmware Interface
|
Jan 09, 2006 |
Nick Harbour: Stealth Secrets of the Malware Ninjas
|
Jan 09, 2006 |
Ezequiel D. Gutesman & Ariel Waissbein: A dynamic technique for enhancing the security and privacy of web applications
|
Jan 09, 2006 |
Jeremiah Grossman & Robert Hansen: Hacking Intranet Websites from the Outside (Take 2) - "Fun with and without JavaScript malware
|
Jan 09, 2006 |
Jennifer Granick: Disclosure and Intellectual Property Law: Case Studies
|
Jan 09, 2006 |
Kenneth Geers: Greetz from Room 101
|
Jan 09, 2006 |
Kevvie Fowler: SQL Server Database Forensics
|
Jan 09, 2006 |
Justin N. Ferguson: Understanding the Heap by Breaking It: A Case Study of the Heap as a Persistent Data Structure Through Non-traditional Exploitation Techniques
|
Jan 09, 2006 |
Ben Feinstein & Daniel Peck: CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript
|
Jan 09, 2006 |
Joel Eriksson & Panel: Kernel Wars
|
Jan 09, 2006 |
Mark Dowd, John Mcdonald & Neel Mehta: Breaking C++ Applications
|
Jan 09, 2006 |
Roger Dingledine: TOR
|
Jan 09, 2006 |
Rohit Dhamankar & Rob King: PISA: Protocol Identification via Statistical Analysis
|
Jan 09, 2006 |
Barrie Dempster: VOIP Security
|
Jan 09, 2006 |
Jared DeMott, Dr. Richard Enbody & Dr. Bill Punch: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing
|
Jan 09, 2006 |
Job De Haas: Side Channel Attacks (DPA) and Countermeasures for Embedded Systems
|
Jan 09, 2006 |
David Coffey & John Viega: Building an Effective Application Security Practice on a Shoestring Budget
|
Jan 09, 2006 |
Robert W Clark: Computer and Internet Security Law - A Year in Review 2006 - 2007
|
Jan 09, 2006 |
Maria Cirino: Meet the VC's
|
Jan 09, 2006 |
Jim Christy: Meet the Feds
|
Jan 09, 2006 |
Brian Chess, Jacob West, Sean Fay & Toshinari Kureha: Iron Chef Blackhat
|
Jan 09, 2006 |
Stephan Chenette & Moti Joseph: Defeating Web Browser Heap Spray Attacks
|
Jan 09, 2006 |
David Byrne: Intranet Invasion With Anti-DNS Pinning
|
Jan 09, 2006 |
Jamie Butler & Kris Kendall: Blackout: What Really Happened...
|
Jan 09, 2006 |
Damiano Bolzoni & Emmanuel Zambon: Sphinx: an anomaly-based Web Intrusion Detection System
|
Jan 09, 2006 |
Yoriy Bolygin: Remote and Local Exploitation of Network Drivers
|
Jan 09, 2006 |
Rohyt Belani & Keith Jones: Smoke 'em Out!
|
Jan 09, 2006 |
Andrea Barisani & Daniele Bianco: Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation.
|
Jan 09, 2006 |
Brandon Baker: Kick Ass Hypervisoring: Windows Server Virtualization
|
Jan 09, 2006 |
Pedram Amini & Aaron Portnoy: Fuzzing Sucks! (or Fuzz it Like you Mean it!)
|
Jan 09, 2006 |
Jonathan Afek: Dangling Pointer
|
Jan 09, 2006 |
Bruce Schneier: KEYNOTE: The Psychology of Security
|
Jan 09, 2006 |
Tony Sager: KEYNOTE: The NSA Information Assurance Directorate and the National Security Community
|
Jan 09, 2006 |
Richard A. Clarke: KEYNOTE: A Story About Digital Security in 2017
|
Jan 09, 2006 |