ShmooCon 2008 Videos Hit the Shelves
The videos from ShmooCon 2008 have hit the shelves. Go download them at:
http://www.shmoocon.org/2008/videos/
EDIT: As of the time of this post, some of the videos are incorrectly named. Here is the 1-> 1:
Correctly Named:
-
21st Century Shellcode for Solaris
-
Advanced Protocol Fuzzing - What We Learned when Bringing Layer2 Logic to SPIKE land
-
Backtrack Demo - “Hacking and Stuff”
-
Bake Not (Fried, spelling error on filename) Fired - Performing Unauthorized Phishing
-
Closing Remarks
-
Forensic Image Analysis for Password Recovery (same video is also under another name below)
-
Got Citrix Hack it!
-
Hacking the Samurai Spirit
-
Keynote Address - Alex Halberman
-
Legal Issues for Bot-Net Researchers and Mitigators
-
Malware Software Armoring Circumvention (same video is also under another name below)
-
On the Social Responsbility of Hackers - Hacker Panel
-
Opening Remarks
-
Path X - Explosive Security Testing Using Xpath
-
PEAP Pwned Extensible Authntication Protocol
-
Practical Hacker Crypto
-
SIPing Your Network
-
The Geek and the Gumshoe
-
They’re Hacking Our Clients - What are we focusing on Servers? (same video is also under another name below)
-
TL1 Device Security (same video is also under another name below)
-
Using Aspect Oriented Programming to Prevent App Attacks
-
Virtual Worlds - Real Exploits
-
VOIP Penetration Testing Lessons Learned
-
Web Portals - Gateway to Information or Hole in Our Perimeter Defenses
-
Why are Databases so Hard to Secure
-
Named: Flash Drives and Solid State Drives Data Recovery Comparison to Hard Drives
- **Actually: **Hacking Windows Vista Security
-
Named: Active 802.11 Fingerprinting
- **Actually: **Using Aspect Oriented Programming to Prevent App Attacks
-
Named: Own the Con
- **Actually: **TL1 Device Security
-
Named: A Hacker Looks Past 50
- **Actually: **RenderMan’s: How do I Pwn Thee
-
Named: I will be your Eyes and Hands
- Actually: Malware Software Armoring Circumvention
-
Named: Intercepting Mobile Phone GSM Traffic
- Actually: Forensic Image Analysis for Password Recovery
-
Named: Passive Host Characterization
- Actually: They’re Hacking Our Clients - Why are we focusing on Servers
-
Named: Smarter Password Cracking
- Actually: Practical Hacker Crypto
-
Named: Vulncatcher - Fun with Vtrace and Programmatic Debugging
- Actually: Path X - Explosive Security Testing Using XPath
-
Named: When Lawyers Attack! Dealing with the New Rules of Electronic Discovery
- Actually: Legal Issues for Bot-Net Researchers and Mitigators
-
Named: You Must Be This Tall to Ride the Security Ride
- Actually: Closing Remarks