25C3 - 1.4.2.3

25th Chaos Communication Congress
Nothing to hide

Event Speakers

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Event type : lecture
Track : Hacking
Language used for presentation : en

Analyzing RFID Security

Event type : lecture
Track : Hacking
Language used for presentation : en

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Event type : lecture
Track : Hacking
Language used for presentation : en

An introduction to new stream cipher designs

Turning data into line noise and back

Event type : lecture
Track : Hacking
Language used for presentation : en

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Event type : lecture
Track : Hacking
Language used for presentation : en

Attacking Rich Internet Applications

Not your mother's XSS bugs

Event type : lecture
Track : Hacking
Language used for presentation : en

Banking Malware 101

Overview of Current Keylogger Threats

Event type : lecture
Track : Hacking
Language used for presentation : en

Blinkenlights Stereoscope

Behind the scenes of the new light installation

Event type : lecture
Track : Hacking
Language used for presentation : en

Chip Reverse Engineering

Event type : lecture
Track : Hacking
Language used for presentation : en

Cisco IOS attack and defense

The State of the Art

Event type : lecture
Track : Hacking
Language used for presentation : en

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

Event type : lecture
Track : Hacking
Language used for presentation : en

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to boot.

Event type : lecture
Track : Hacking
Language used for presentation : en

Cracking the MSP430 BSL

Part Two

Event type : lecture
Track : Hacking
Language used for presentation : en

DECT

The Digital Enhanced Cordless Telecommunications standard

Event type : lecture
Track : Hacking
Language used for presentation : en

Der Hackerparagraph 202c StGB

Bestandsaufnahme und Auswirkungen

Event type : lecture
Track : Hacking
Language used for presentation : de

Exploiting Symbian

Symbian Exploit and Shellcode Development

Event type : lecture
Track : Hacking
Language used for presentation : en

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

Event type : lecture
Track : Hacking
Language used for presentation : en

Full-Disk-Encryption Crash-Course

Everything to hide

Event type : lecture
Track : Hacking
Language used for presentation : en

Hacking the iPhone

Pwning Apple's Mobile Internet Device

Event type : lecture
Track : Hacking
Language used for presentation : en

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen hatten

Event type : lecture
Track : Hacking
Language used for presentation : de

Locating Mobile Phones using SS7

Event type : lecture
Track : Hacking
Language used for presentation : en

MD5 considered harmful today

Creating a rogue CA Certificate

Event type : lecture
Track : Hacking
Language used for presentation : en

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

Event type : lecture
Track : Hacking
Language used for presentation : en

Methods for Understanding Targeted Attacks with Office Documents

Event type : lecture
Track : Hacking
Language used for presentation : en

Mining social contacts with active RFID

Event type : lecture
Track : Hacking
Language used for presentation : en

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

Event type : lecture
Track : Hacking
Language used for presentation : en

Predictable RNG in the vulnerable Debian OpenSSL package

the What and the How

Event type : lecture
Track : Hacking
Language used for presentation : en

RF fingerprinting of RFID

Event type : lecture
Track : Hacking
Language used for presentation : en

Running your own GSM network

Event type : lecture
Track : Hacking
Language used for presentation : en

Security and anonymity vulnerabilities in Tor

Past, present, and future

Event type : lecture
Track : Hacking
Language used for presentation : en

Security Failures in Smart Card Payment Systems

Tampering the Tamper-Proof

Event type : lecture
Track : Hacking
Language used for presentation : en

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

Event type : lecture
Track : Hacking
Language used for presentation : de

Security Nightmares 2009 (English interpretation)

Or: about what we will laugh next year

Event type : lecture
Track : Hacking
Language used for presentation : en

Security of MICA*-based wireless sensor networks

Event type : lecture
Track : Hacking
Language used for presentation : en

Short Attention Span Security

A little of everything

Event type : lecture
Track : Hacking
Language used for presentation : en

Squeezing Attack Traces

How to get useable information out of your honeypot

Event type : lecture
Track : Hacking
Language used for presentation : en

Stormfucker: Owning the Storm Botnet

Event type : lecture
Track : Hacking
Language used for presentation : en

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Event type : lecture
Track : Hacking
Language used for presentation : en

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

Event type : lecture
Track : Hacking
Language used for presentation : en

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

Event type : lecture
Track : Hacking
Language used for presentation : en

Tricks: makes you smile

A clever or ingenious device or expedient; adroit technique: the tricks of the trade.

Event type : lecture
Track : Hacking
Language used for presentation : en

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

Event type : lecture
Track : Hacking
Language used for presentation : de

Vulnerability discovery in encrypted closed source PHP applications

Event type : lecture
Track : Hacking
Language used for presentation : en

Why were we so vulnerable to the DNS vulnerability?

Event type : lecture
Track : Hacking
Language used for presentation : en

Archived page - Impressum/Datenschutz