Hackers of CypherCon - Season 2

Hackers of CypherCon - Season 2

Season 2

CypherCon 4.0

Network
Datesmai 10, 2019 - avr. 24, 2020
Previous Season

Episodes

A Kinesthetic Approach to Learning Encryption with Antoinette Stevens
Season 2Episode 119 min

A Kinesthetic Approach to Learning Encryption with Antoinette Stevens

Kinesthetic style, or tactile learning, means that some learn best by physically doing to fully learn and memorize a topic. Capture the flag competitions can be a way to understand security concepts with reading, understanding, applying and watching it in action. Creating a full multi-sensory learning experience to retain those concepts in memory for later.

mai 10, 2019
More Than Tor: Shining a Light on Different Corners of the Dark Web with Benjamin Brown
Season 2Episode 240 min

More Than Tor: Shining a Light on Different Corners of the Dark Web with Benjamin Brown

When the terms Darknet or Dark Web are invoked, it is almost always in reference to the Tor network, but what about the other extant Darknet frameworks? In this talk Benjamin will expand the field of view to include frameworks such as Freenet, I2P, and OpenBazaar. He'll take a quick look at the origins and technical underpinnings of these Darknets as well as their actors and offerings.

juin 14, 2019
The Magic of Forensic Artifacts Hiding in Plain Sight with Cindy Murphy
Season 2Episode 353 min

The Magic of Forensic Artifacts Hiding in Plain Sight with Cindy Murphy

Digital forensics expert Cindy Murphy, M.Sc. will use this session to unpack the myths of digital forensics she uncovered since her career pivot from law enforcement to private digital forensics work. She will discuss how to navigate common myths and most importantly, how to keep moving forward in an ever-changing industry.

juil. 5, 2019
Spitting the Hook: Examining Phishing Bait with Joe Cicero
Season 2Episode 447 min

Spitting the Hook: Examining Phishing Bait with Joe Cicero

In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the red flag concept, identifying phishing email basics, examining headers, examining attachments and links. Additional topics covered are: the differences between a legit email, spam, marketing and phishing.

juil. 19, 2019
Phreaking for Fun and Profit with Brad Swanson
Season 2Episode 555 min

Phreaking for Fun and Profit with Brad Swanson

Brad talk's about phone phreaking back in the late 1980's, until the mid 1990's. He will cover what phreaking was, why it worked, and why it was done. Devices used, the theory behind them, and some entertaining stories about those devices are covered. He will cover the slew of 'secret' numbers that existed in the phone system and discuss the decline in phreaking with the newer versions of ESS.

août 2, 2019
Shifting Security Left with Chris Merkel
Season 2Episode 651 min

Shifting Security Left with Chris Merkel

The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and secure systems. The solution is more security tools, more security people, and ever-inventive ways to reign in your environment. We'll talk about how engineering automation to create a culture of empowerment, self-reliance and trust can result in better security outcomes.

août 16, 2019
Bug Bounty Law with Dr. Amit Elazari Bar On
Season 2Episode 748 min

Bug Bounty Law with Dr. Amit Elazari Bar On

Bug Bounties and Vulnerability Disclosure Program (VDP) are one of the fastest growing, most popular ways for companies to engage with the security research community and uncover unknown security vulnerabilities. This talk will explore how the law interacts with bug bounties, VDP, anti-hacking laws, bounty legalese myths, and contract standardization efforts widely adopted across the industry.

août 30, 2019
Automating Hashtopolis with Dustin Heywood
Season 2Episode 824 min

Automating Hashtopolis with Dustin Heywood

This talk will cover the basics of using the user-api to automate functions in Hashtopolis. Connecting to an HTP instance, creating hashlists, creating attacks, recovering plaintext, user creation and more will be covered.

sept. 13, 2019
Welcome Our New A.I. Overlords with Ed Skoudis
Season 2Episode 946 min

Welcome Our New A.I. Overlords with Ed Skoudis

Amazing new A.I. based services from Amazon, Google, and Microsoft let organizations rely on automated technology to crawl through their cloud-based data to identify sensitive info, security weaknesses, and hacking attempts. In this talk, Ed will analyze security implications, ethical, business, and privacy issues they raise as cloud-based A.I. intertwines itself in our lives deeper every day.

sept. 27, 2019
Tracking an Adversary's Learning Curve with Edd Black
Season 2Episode 1021 min

Tracking an Adversary's Learning Curve with Edd Black

There are 2 camps of attackers: low skilled opportunists (script kiddies) and APT - Advanced Persistent Threats (funded organized crime, nation states). In between lurks a skilled persistent threat, capable of doing even more damage. These adversaries require human responders to identify, track, & oppose. Understand the constraints of the persistent threat, and you can learn to counter them.

oct. 11, 2019
Remote Wireless Pentesting with Eric Escobar & Matt Orme
Season 2Episode 1153 min

Remote Wireless Pentesting with Eric Escobar & Matt Orme

Wireless pentesting typically requires physical proximity to a target which requires time, limited resources, and constant traveling. Eric & Matt have pioneered an inexpensive device to covertly perform wireless pentests anywhere on earth. In this talk, they'll discuss why they built it, how it works, and why they think it will revolutionize wireless pentesting.

oct. 25, 2019
Building a Cohesive Undergraduate Security Club with Ian Klatzco
Season 2Episode 1238 min

Building a Cohesive Undergraduate Security Club with Ian Klatzco

The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved with a tighter meeting format, approachable 24-7 internal CTF, and internal documentation. There was better attendance, more people staying after meetings, and freshmen successfully completing projects with upperclassman mentorship. Interested? Learn more by watching this video.

nov. 8, 2019
Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich
Season 2Episode 1350 min

Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich

Werewolves attack, we have silver bullets. Vampires attack, we have holy water. Criminal hackers attack, we have encryption. The villains come and the heroes fight back. But too often, encryption is like water without the holy or bullets without the silver. The configuration is wrong or the code is incomplete. This talk will cover how and where to architect for encryption to get real protection.

nov. 22, 2019
Always Look a Gift (Trojan) Horse In the Mouth with James Arndt
Season 2Episode 1445 min

Always Look a Gift (Trojan) Horse In the Mouth with James Arndt

déc. 20, 2019
Unhinging Security On the Buffalo Terastation NAS with Ian Sindermann
Season 2Episode 1545 min

Unhinging Security On the Buffalo Terastation NAS with Ian Sindermann

janv. 3, 2020
Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer
Season 2Episode 1645 min

Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer

janv. 10, 2020
What are We Thinking Here? Rethinking Security with Jeff Man
Season 2Episode 1745 min

What are We Thinking Here? Rethinking Security with Jeff Man

janv. 17, 2020
Sorry About Your WAF with Johnny Xmas & Sam Crowther
Season 2Episode 1845 min

Sorry About Your WAF with Johnny Xmas & Sam Crowther

janv. 24, 2020
What the World Needs Now is Ham, Sweet Ham with Jonathan Tomek
Season 2Episode 1945 min

What the World Needs Now is Ham, Sweet Ham with Jonathan Tomek

janv. 31, 2020
Spelunking the Bitcoin Blockchain with Josh Bressers
Season 2Episode 2045 min

Spelunking the Bitcoin Blockchain with Josh Bressers

févr. 7, 2020
Thrift Shopping with your Data with Josh Frantz
Season 2Episode 2145 min

Thrift Shopping with your Data with Josh Frantz

févr. 14, 2020
Capture the Fail - Avoiding Pitfalls when running your C.T.F. with Kris & Chris Silvers
Season 2Episode 2245 min

Capture the Fail - Avoiding Pitfalls when running your C.T.F. with Kris & Chris Silvers

févr. 21, 2020
Anatomy of a Hot Wallet: Bitcoin at Scale with Matthew Werner
Season 2Episode 2345 min

Anatomy of a Hot Wallet: Bitcoin at Scale with Matthew Werner

févr. 28, 2020
Don't Forget to Wipe with Michael Portera
Season 2Episode 2445 min

Don't Forget to Wipe with Michael Portera

mars 6, 2020
What Happens when a Genome Database is Breached with Michelle Meas
Season 2Episode 2545 min

What Happens when a Genome Database is Breached with Michelle Meas

mars 13, 2020
Urban Foraging: Back to our Beginnings with Nick Wersel
Season 2Episode 2645 min

Urban Foraging: Back to our Beginnings with Nick Wersel

mars 20, 2020
Journey to Command Injection with Rick Ramgattie
Season 2Episode 2745 min

Journey to Command Injection with Rick Ramgattie

mars 27, 2020
Micro and Nano Segmentation with Russ From
Season 2Episode 2845 min

Micro and Nano Segmentation with Russ From

avr. 3, 2020
A look at Historic Cons & their Transition to a Digital World with Stephanie Carruthers
Season 2Episode 2945 min

A look at Historic Cons & their Transition to a Digital World with Stephanie Carruthers

avr. 10, 2020
Bet You Never Played an NES Game Like This with Vi Grey
Season 2Episode 3045 min

Bet You Never Played an NES Game Like This with Vi Grey

avr. 17, 2020
The X-15 Rocket Plane, Flying the First Wings into Space with Michelle Evans
Season 2Episode 3145 min

The X-15 Rocket Plane, Flying the First Wings into Space with Michelle Evans

avr. 24, 2020

Recently Updated Shows

Recently updated shows that might be of your interest.
The Great North
Running

The Great North

The Great North follows the Alaskan adventures of the Tobin family, as a single dad, Beef, does his best to keep his weird bunch of kids close - especially his only daughter, Judy, whose artistic dreams lead her away from the family fishing boat and into the glamorous world of the local mall. Rounding out the family are Judy's older brother, Wolf; his fiancé, Honeybee; her middle brother, Ham; and ten-year-old-going-on-fifty little brother, Moon. While the children's mother is not in the picture, Judy seeks guidance from her new boss, Alyson, and her imaginary friend, Alanis Morissette, who appears to her in the Northern Lights.

The Legend of Vox Machina
Running

The Legend of Vox Machina

The Legend of Vox Machina is an animated fantasy-adventure series for adults that follows Vox Machina, a band of misfits with a fondness for boozing and brawling. In a desperate attempt to pay off their mounting bar tab, these unlikely heroes end up on a quest to save the realm of Exandria from dark magical forces. From a sinister necromancer to a powerful curse, the group confronts a variety of obstacles that not only test their skills, but also the strength of their bond.

On Patrol: Live
Running

On Patrol: Live

Hosting and executive producing On Patrol: Live is Dan Abrams, CEO and Founder of Abrams Media, host of Dan Abrams Live on NewsNation, Chief Legal Analyst for ABC News, and former host of Live PD. Joining Abrams is Sgt. Sean "Sticks" Larkin, retired Tulsa Police Department lieutenant with nearly 25 years of service, and Deputy Sheriff Curtis Wilson, Division Commander with the Richland County Sheriff's Department in Columbia, SC.

GenreCrime
The Diplomat
Running

The Diplomat

In the midst of an international crisis, a career diplomat lands in a high-profile job she's unsuited for, with tectonic implications for her marriage and her political future.

The Lincoln Lawyer
Running

The Lincoln Lawyer

Mickey Haller, an iconoclastic idealist, runs his law practice out of the back seat of his Lincoln Town Car, as he takes on cases big and small across the expansive city of Los Angeles.