Latest Hardware hacking Podcast Episodes

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Rob Bathurst (evilrob) & Jeff Thomas (xaphan) - Canary: Keeping Your Dick Pics Safe(r)

DEF CON 23 [Audio] Speeches from the Hacker Convention - November 03, 2015 03:48 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Evilrob-Xaphan-TLS-Canary-Keeping-Your-Dick-Pics-Safer.pdf Canary: Keeping Your Dick Pics Safe(r) Rob Bathurst (evilrob) Security Engineer and Penetration Tester Jeff Thomas (xaphan) Sen...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Zoz - And That's How I Lost My Other Eye: Further Explorations In Data Destruction

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:58 ★★★ - 4 ratings
And That's How I Lost My Other Eye: Further Explorations In Data Destruction Zoz Robotics Engineer and Security Researcher How much more paranoid are you now than you were four years ago? Warrantless surveillance and large-scale data confiscation have brought fear of the feds filching your fil...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Zack Fasel - Seeing through the Fog

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:58 ★★★ - 4 ratings
Seeing through the Fog Zack Fasel Urbane Security Yes. "The Cloud" (drink). Even though many of us would much like to see use of public clouds decline, they're not going away any time soon. And with such, a plethora of companies now have revolutionary new solutions to solve your "cloud problem...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Terrell McSweeny & Ashkan Soltani - How to Hack Government: Technologists as Policy Makers

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:58 ★★★ - 4 ratings
How to Hack Government: Technologists as Policy Makers Terrell McSweeny Commissioner, Federal Trade Commission Ashkan Soltani Chief Technologist, Federal Trade Commission As the leading federal agency responsible for protecting your privacy rights online, technology is at the core of the Fede...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Sean Pierce - Abusing native Shims for Post Exploitation

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:57 ★★★ - 4 ratings
Abusing native Shims for Post Exploitation Sean Pierce Technical Intelligence Analyst for iSIGHT Partners Shims offer a powerful rootkit-like framework that is natively implemented in most all modern Windows Operating Systems. This talk will focus on the wide array of post-exploitation options...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Scott Erven and Mark Collao - Medical Devices - Pwnage and Honeypots

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:57 ★★★ - 4 ratings
Medical Devices: Pwnage and Honeypots Scott Erven Associate Director, Protiviti Mark Collao Security Consultant, Protiviti We know medical devices are exposed to the Internet both directly and indirectly, so just how hard is it to take it to the next step in an attack and gain remote administ...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Runa A. Sandvik & Michael Auger - When IoT attacks - Hacking a Linux-powered Rifle

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:57 ★★★ - 4 ratings
When IoT attacks: hacking a Linux-powered rifle Runa A. Sandvik Michael Auger TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated system coupling a rifle, an ARM-powered scope running a modified version of Linux, and a l...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Robert Graham and David Maynor - HamSammich – long distance proxying over radio

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:57 ★★★ - 4 ratings
HamSammich – long distance proxying over radio Robert Graham Erratasec.com David Maynor Erratasec.com The ProxyHam talk was mysteriously canceled. However, it’s easy to replicate the talk from the press coverage. In this talk, we propose “HamSammich”, creating a point-to-point link in order t...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Richard Thieme - Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:57 ★★★ - 4 ratings
Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0 Richard Thieme Author and Professional Speaker, ThiemeWorks This presentation is beyond fiction. Current research in neuroscience and the extension and augmentation of senses is proceeding in directions th...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Peter Shipley - Insteon - False Security and Deceptive Documentation

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:56 ★★★ - 4 ratings
Insteon' False Security And Deceptive Documentation Peter Shipley Security Researcher Ryan Gooler Insteon is a leading home automation solution for controlling lights, locks, alarms, and much more. More than forty percent of homes with automation installed use Insteon. For the last fifteen y...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Panel - ThunderStrike 2- Sith Strike

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:56 ★★★ - 4 ratings
ThunderStrike 2: Sith Strike Trammel Hudson Vice President, Two Sigma Investments Xeno Kovah Co-founder, LegbaCore, LLC Corey Kallenberg Co-Founder, LegbaCore, LLC The number of vulnerabilities in firmware disclosed as affecting Wintel PC vendors has been rising over the past few years. Alth...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Panel - Licensed to Pwn - Weaponization and Regulation of Security Research

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:56 ★★★ - 4 ratings
Licensed to Pwn: The Weaponization and Regulation of Security Research Jim Denaro Dave Aitel Matt Blaze Nate Cardozo Mara Tam Catherine “Randy” Wheeler Security research is under attack. Updates to the Wassenaar Arrangement in 2013 established among its 41 member nations an agreement to p...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Panel - Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:56 ★★★ - 4 ratings
Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web Peter Eckersley Electronic Frontier Foundation James Kasten Electronic Frontier Foundation Yan Zhu Electronic Frontier Foundation Let's Encrypt is a new certificate authority that is being launched by EFF in collaboration wi...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Panel - Contests Closing Ceremonies

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:55 ★★★ - 4 ratings
: Presenting the results and awards for the DEF CON 23 Contests and Events.

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Matt Cagle & Eric Cheng - Who Will Rule the Sky - The Coming Drone Policy War

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:55 ★★★ - 4 ratings
Who Will Rule the Sky? The Coming Drone Policy Wars Matt Cagle Technology and Civil Liberties Policy Attorney, ACLU of Northern California Eric Cheng General Manager, DJI SF and Director of Aerial Imaging, DJI Your private drone opens up limitless possibilities – how can manufacturers and pol...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Marc Rogers & Kevin Mahaffey - How to Hack a Tesla Model S

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:55 ★★★ - 4 ratings
How to Hack a Tesla Model S Marc Rogers Principle Security Researcher for CloudFlare Kevin Mahaffey CTO of Lookout Inc The Tesla Model S is the most connected car in the world. It might surprise you to hear that it is also one of the most secure. In this talk we will walk you through the arch...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Luke Young - Investigating the Practicality and Cost of Abusing Memory Errors with DNS

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:54 ★★★ - 4 ratings
Investigating the Practicality and Cost of Abusing Memory Errors with DNS Luke Young Information Security Engineer, Hydrant Labs LLC In a world full of targeted attacks and complex exploits this talk explores an attack that can simplified so even the most non-technical person can understand, y...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Geoff Walton & Dave Kennedy - Pivoting Without Rights – Introducing Pivoter

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:54 ★★★ - 4 ratings
Pivoting Without Rights – Introducing Pivoter Geoff Walton Senior Security Consultant for Cleveland-based TrustedSec Dave Kennedy (ReL1K/HackingDave), founder of TrustedSec and Binary Defense Systems One of the most challenging steps of a penetration test is popping something and not having f...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Francis Brown and Shubham Shah - RFIDiggity - Guide to Hacking HF NFC and UHF RFID

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 22:54 ★★★ - 4 ratings
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID Francis Brown Partner - Bishop Fox Shubham Shah Security Analyst at Bishop Fox Have you ever attended an RFID hacking presentation and walked away with more questions than answers? This talk will finally provide practical guidance for...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Damon Small - Beyond the Scan: The Value Proposition of Vulnerability Assessment - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 08:10 ★★★ - 4 ratings
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Damon-Small-Beyond-the-Scan.pdf Beyond the Scan: The Value Proposition of Vulnerability Assessment Damon Small Security Researcher Vulnerability Assessment is, by some, regarded as one o...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

DaKahuna & satanklawz - Introduction to SDR and the Wireless Village - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 08:07 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-DaKahuna-Satanlawz-Introduction-to-SDR-and-Wifi-Village.pdf Introduction to SDR and the Wireless Village DaKahuna satanklawz In many circumstances, we all have to wear different hats wh...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Tottenkoph & IrishMASMS - Hackers Hiring Hackers - How to Do Things Better - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 08:07 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tottenkoph-IrishMASMS-Hackers-Hiring-Hacker.pdf Hackers Hiring Hackers - How to Do Things Better Tottenkoph Security Consultant, Rapid7 IrishMASMS Hacker There are a lot of talks about ...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

1057 - Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey - RICKASTLEY

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 30, 2015 08:05 ★★★ - 4 ratings
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey LosT We're no strangers to love You know the rules and so do I A full commitment's what I'm thinking of You wouldn't get this from any other guy I just wanna tell you how I'm feeling Gotta make yo...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Dr. Phil Polstra - Hacker in the Wires - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 23, 2015 10:04 ★★★ - 4 ratings
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Hacker-in-the-Wires.pdf Extras here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Phil-Polstra-Extras.rar Hacker in the Wires Dr. Phil ...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Marina Krotofil & Jason Larsen - Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 23, 2015 08:56 ★★★ - 4 ratings
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Marina-Krotofil-Jason-Larsen-Rocking-the-Pocketbook-Hacking-Chemical-Plants-UPDATED.pdf Whitepaper here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ma...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

John Seymour - "Quantum" Classification of Malware

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 23, 2015 08:34 ★★★ - 4 ratings
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-John-Seymour-Quantum-Classification-of-Malware-UPDATED.pdf Whitepaper here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-John-Seymour-Quantum-Classifica...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Topher Timzen & Ryan Allen - Hijacking Arbitrary .NET Application Control Flow - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 23, 2015 07:50 ★★★ - 4 ratings
Materials Available Here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Topher-Timzen-Ryan-Allen-Hijacking-Arbitrary-NET-Application-Control-Flow-UPDATED.pdf Whitepaper here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tophe...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Charlie Miller - Remote exploitation of an unaltered passenger vehicle

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 22, 2015 05:43 ★★★ - 4 ratings
Remote Exploitation of an Unaltered Passenger Vehicle Charlie Miller Security engineer at Twitter Chris Valasek Director of Vehicle Security Research at IOActive Although the hacking of automobiles is a topic often discussed, details regarding successful attacks, if ever made public, are non-...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

AmmonRa - How to hack your way out of home detention

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 22, 2015 05:30 ★★★ - 4 ratings
Materials Available Here; https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-ammonRA-How-to-hack-your-way-out-of-home-detention-UPDATED.pdf How to hack your way out of home detention AmmonRa Security Researcher Home detention and criminal tracking systems are use...

DEF CON 23 [Audio] Speeches from the Hacker Convention artwork

Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention - October 22, 2015 04:09 ★★★ - 4 ratings
Materials Available Here: https://media.defcon.org/DEF CON 23/DEF CON 23 presentations/DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy-UPDATED.pdf Linux Containers: Future or Fantasy? Aaron Grattafiori Principal Security Consultant, iSEC Partners/NCC Group Containers, a pinna...