The videos from ShmooCon 2008 have hit the shelves. Go download them at:
http://www.shmoocon.org/2008/videos/
EDIT: As of the time of this post, some of the videos are incorrectly named. Here is the 1-> 1:
Correctly Named:
21st Century Shellcode for Solaris
Advanced Protocol Fuzzing – What We Learned when Bringing Layer2 Logic to SPIKE land
Backtrack Demo – “Hacking and Stuff”
Bake Not (Fried, spelling error on filename) Fired – Performing Unauthorized Phishing
Closing Remarks
Forensic Image Analysis for Password Recovery (same video is also under another name below)
Got Citrix Hack it!
Hacking the Samurai Spirit
Keynote Address – Alex Halberman
. Legal Issues for Bot-Net Researchers and Mitigators
. Malware Software Armoring Circumvention (same video is also under another name below)
. On the Social Responsbility of Hackers – Hacker Panel
. Opening Remarks
. Path X – Explosive Security Testing Using Xpath
. PEAP Pwned Extensible Authntication Protocol
. Practical Hacker Crypto
. SIPing Your Network
. The Geek and the Gumshoe
. They’re Hacking Our Clients – What are we focusing on Servers? (same video is also under another name below)
. TL1 Device Security (same video is also under another name below)
. Using Aspect Oriented Programming to Prevent App Attacks
. Virtual Worlds – Real Exploits
. VOIP Penetration Testing Lessons Learned
. Web Portals – Gateway to Information or Hole in Our Perimeter Defenses
. Why are Databases so Hard to Secure
Named: Flash Drives and Solid State Drives Data Recovery Comparison to Hard Drives
- Actually: Hacking Windows Vista Security
Named: Active 802.11 Fingerprinting
- Actually: Using Aspect Oriented Programming to Prevent App Attacks
Named: Own the Con
- Actually: TL1 Device Security
Named: A Hacker Looks Past 50
- Actually: RenderMan’s: How do I Pwn Thee
Named: I will be your Eyes and Hands
- Actually: Malware Software Armoring Circumvention
Named: Intercepting Mobile Phone GSM Traffic
- Actually: Forensic Image Analysis for Password Recovery
Named: Passive Host Characterization
- Actually: They’re Hacking Our Clients – Why are we focusing on Servers
Named: Smarter Password Cracking
- Actually: Practical Hacker Crypto
Named: Vulncatcher – Fun with Vtrace and Programmatic Debugging
- Actually: Path X – Explosive Security Testing Using XPath
Named: When Lawyers Attack! Dealing with the New Rules of Electronic Discovery
- Actually: Legal Issues for Bot-Net Researchers and Mitigators
Named: You Must Be This Tall to Ride the Security Ride
- Actually: Closing Remarks