32C3: gated communities

Security

Full playlist: Video / Audio
Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

Console Hacking
72 min

Console Hacking

Breaking the 3DS

Hardware-Trojaner in Security-Chips
60 min

Hardware-Trojaner in Security-Chips

Eine Reise auf die dunkle Seite

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

The Perl Jam 2
60 min

The Perl Jam 2

The Camel Strikes Back

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

APT Reports and OPSEC Evolution, or: These are not  the APT reports you are looking for
60 min

APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for

How advanced threat actors learn and change with innovation…

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography

Running your own 3G/3.5G network
56 min

Running your own 3G/3.5G network

OpenBSC reloaded

Windows drivers attack surface
60 min

Windows drivers attack surface

some 'new' insights

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Sanitizing PCAPs
43 min

Sanitizing PCAPs

Fun and games until someone uses IPv6 or TCP