Shmoocon 2008 videos are now online
June 1, 2008 – 8:34 AMThe videos from ShmooCon 2008 have hit the shelves. Go download them at:
http://www.shmoocon.org/2008/videos/
EDIT: As of the time of this post, some of the videos are incorrectly named. Here is the 1-> 1:
Correctly Named:
- 21st Century Shellcode for Solaris
- Advanced Protocol Fuzzing – What We Learned when Bringing Layer2 Logic to SPIKE land
- Backtrack Demo – “Hacking and Stuff”
- Bake Not (Fried, spelling error on filename) Fired – Performing Unauthorized Phishing
- Closing Remarks
- Forensic Image Analysis for Password Recovery (same video is also under another name below)
- Got Citrix Hack it!
- Hacking the Samurai Spirit
- Keynote Address – Alex Halberman
- Legal Issues for Bot-Net Researchers and Mitigators
- Malware Software Armoring Circumvention (same video is also under another name below)
- On the Social Responsbility of Hackers – Hacker Panel
- Opening Remarks
- Path X – Explosive Security Testing Using Xpath
- PEAP Pwned Extensible Authntication Protocol
- Practical Hacker Crypto
- SIPing Your Network
- The Geek and the Gumshoe
- They’re Hacking Our Clients – What are we focusing on Servers? (same video is also under another name below)
- TL1 Device Security (same video is also under another name below)
- Using Aspect Oriented Programming to Prevent App Attacks
- Virtual Worlds – Real Exploits
- VOIP Penetration Testing Lessons Learned
- Web Portals – Gateway to Information or Hole in Our Perimeter Defenses
- Why are Databases so Hard to Secure
- Named: Flash Drives and Solid State Drives Data Recovery Comparison to Hard Drives
- Actually: Hacking Windows Vista Security
- Named: Active 802.11 Fingerprinting
- Actually: Using Aspect Oriented Programming to Prevent App Attacks
- Named: Own the Con
- Actually: TL1 Device Security
- Named: A Hacker Looks Past 50
- Actually: RenderMan’s: How do I Pwn Thee
- Named: I will be your Eyes and Hands
- Actually: Malware Software Armoring Circumvention
- Named: Intercepting Mobile Phone GSM Traffic
- Actually: Forensic Image Analysis for Password Recovery
- Named: Passive Host Characterization
- Actually: They’re Hacking Our Clients – Why are we focusing on Servers
- Named: Smarter Password Cracking
- Actually: Practical Hacker Crypto
- Named: Vulncatcher – Fun with Vtrace and Programmatic Debugging
- Actually: Path X – Explosive Security Testing Using XPath
- Named: When Lawyers Attack! Dealing with the New Rules of Electronic Discovery
- Actually: Legal Issues for Bot-Net Researchers and Mitigators
- Named: You Must Be This Tall to Ride the Security Ride
- Actually: Closing Remarks
Source: Room362
You must be logged in to post a comment.