Look for any podcast host, guest or anyone
Showing episodes and shows of

FX Of Phenoelit

Shows

Segfault.fmSegfault.fm0x0d PrinterBeschreibung: Drucker sind sicher, oder? Wir unterhalten uns über Drucker und inwieweit diese eine Sicherheitsbedrohung darstellen. Viel Spaß beim Hören! Shownotes: Machine Identification Code – Wikipedia List of Printers Which Do or Do Not Display Tracking Dots - Electronic Frontier Foundation EURion Constellation media.ccc.de -Traue keinem Scan, den du nicht selbst gefälscht hast Müller et. al: SoK Exploiting Network Printers Shodan: printer CVE - CVE-2006-0788 Phenoelit HP Hacker briefly hijacks insecure printers - BBC News GitHub - RUB-NDS/PRET: Printer Exploitation Toolkit - The tool that made dumpster diving obsolete. Hacking Printers Imperial March o...2020-03-261h 19BrakeSec Education PodcastBrakeSec Education PodcastInterview with Paul Coggin (part 1)One of the talks my colleague got to see was Paul Coggin's talk about Internetworking routing and protocols.  In this interview, we dicsuss some tools of the trade, how MPLS isn't secure, and why you should be doing end-to-end encryption without allowing your VPN or circuit provider to do it for you... If you have any interest in network security, including the higher order network protocols like BGP, MPLS, ATM, etc...  You'll want to check out his DerbyCon talk, and our interview...   Paul's Derbycon 2014 talk - http://www.irongeek.com/i.php?page=vid...2014-11-0342 minDEF CON 18 [Video] Speeches from the Hacker Convention.DEF CON 18 [Video] Speeches from the Hacker Convention.Felix "FX" Lindner - Blitzableiter - the ReleaseThe talk presents a simple but effective approach for securing Rich Internet Application (RIA) content before using it. Focusing on Adobe Flash content, the security threats presented by Flash movies are discussed, as well as their inner workings that allow such attacks to happen. Some of those details will make you laugh, some will make you wince. Based on the properties discussed, the idea behind the defense approach will be presented, as well as the code implementing it and the results of using it in the real world.After a year of development, we hope to release a...2010-10-0852 minDiscussIT - The South African Podcast PortalDiscussIT - The South African Podcast PortalPubcast: From the 2010 ITWeb Security Summit - FX from Phenoelit160;From the Pubcast booth at the ITWeb security Summit: Matt and Ralfe tracked down FX of Phenoelit, known to his friends as Felix Lindner, about the hacking scene in Berlin160;Note that this podcast contains adult language....2010-05-2400 minDEFCON 17 [Video and Slides] Speeches from the Hacker Convention.DEFCON 17 [Video and Slides] Speeches from the Hacker Convention.FX - Router Exploitation - Video and SlidesRouter ExploitationFX of Phenoelit, Head, Recurity Labs GmbHExploitation of active networking equipment has its own history and challenges. This session will take you through the full spectrum of possible attacks, what they yield and how the art of exploitation in that particular field evolved over the recent past to its present state. We will cover attacks on Cisco equipment and compare them to other specimen in the field, talk about the challenges you face to get a simple shell on such devices and what to actually do with them once you made it....2009-10-0746 minSIGINT09 Audio RecordingsSIGINT09 Audio RecordingsSIGINT09_3248 Keynote Tag 2: Pranks, Bugs, and InsecuritiesSIGINT09 Audio Recordings SIGINT09_3248 Veröffentlicht am: 23.05.2009, 11:00 Uhr Präsentation vom: 23.05.2009, 11:00 Uhr http://chaosradio.ccc.de/sigint09_mp3_3248.html Keynote Tag 2: Pranks, Bugs, and Insecurities Abstract : Speakers : FX of Phenoelit Language : de Date : 2009-05-23 Time : 11:00 Room : KOMED Saal (MP7) More information... http://events.ccc.de/sigint/2009/Fahrplan/events/3248.en.html2009-05-2300 minISTS - i sh0t the sheriffISTS - i sh0t the sheriffEdição 3 - Feliz 2007 - 1.01.2007quase 59 minutos Comentários sobre a 23c3 (e vídeos alternativos no google video e youtube) Votação eletrônica e site holandês do movimento contra a mesma Bluetooth e afins Link do grupo Trifinite TOR Rootkits e Chkrootkit lista de senhas default do Phenoelit Viradas de ano (incluindo ano 2000) Alguns assuntos (OpenID e custo de proteção do Vista), devido a problemas operacionais (atualmente muito comum em aeroportos), ficaram para a próxima edição.2007-01-0118 minBlack Hat Briefings, Las Vegas 2002  [Audio] Presentations from the security conferenceBlack Hat Briefings, Las Vegas 2002 [Audio] Presentations from the security conferenceFX and kim0: Attacking Networked Embedded Systems"Every device on a network that has a processor, some memory and a network interface can become a target. Using printers as an example, the talk will show how a seemingly innocent device can be used by attackers, ranging from attacks on the device itself to the point where the embedded system becomes an attack platform itself. Then, protection mechanisms and ways to include these devices in a company's security concept will be discussed. FX of Phenoelit is the leader of the German Phenoelit group. His and the group's primary interests are in security implementations and implications of standards or...2006-11-011h 01DEFCON 16 [Video] Speeches from the Hacker Convention.DEFCON 16 [Video] Speeches from the Hacker Convention.Fabian "Fabs" Yamaguchi & FX: New ideas for old practices - Port-Scanning improvedHow fast a port-scan can be is largely dependent on the performance of the network in question. Nonetheless, it is clear that choosing the most efficient scanning-speed is only possible based on sufficient information on the network's performance. We have thus designed and implemented a port-scanning method which provokes extra network-activity to increase the amount of information at our disposal in an attempt to gain speed on the long run.Following this approach, we've managed to mimic TCPs properties to an extend which allows us to implement many congestion control schemes initially designed for TCP. Further tweaking the...2006-10-2439 minDEFCON 16 [Video] Speeches from the Hacker Convention.DEFCON 16 [Video] Speeches from the Hacker Convention.FX: Developments in Cisco IOS ForensicsAttacks on network infrastructure are not a new field. However, the increasing default protections in common operating systems, platforms and development environments increase interest in the less protected infrastructure sector. Today, performing in-depth crash analysis or digital forensics is almost impossible on the most widely used routing platform.This talk will show new developments in this sector and how a slightly adjusted network infrastructure configuration together with new tools finally allows to separate crashed, attacked and backdoored routers from each other. We walk through the known types of backdoors and shellcodes for IOS as well as their detection...2006-10-2449 minDEFCON 16 [Video] Speeches from the Hacker Convention.DEFCON 16 [Video] Speeches from the Hacker Convention.FX: Toying with BarcodesThe talk focuses on 1D and 2D barcode applications with interference possibilities for the ordinary citizen. Ever wondered what is in these blocks of squares on postal packages, letters and tickets? Playing with them might have interesting effects, reaching from good old fun to theft and severe impact.Barcodes have been around for ages, but most of the time were used as simple tags with a number. The rise of 2D barcodes started to put them into customer hands as authentication, authorization, payment method and other arbitrary data transport. The implicit trust in them is enormous. The talk...2006-10-2444 minDEFCON 14: [Video] Speeches from the hacker conventionsDEFCON 14: [Video] Speeches from the hacker conventionsFX: Analysing Complex Systems: The BlackBerry CasAbstract: When trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot see or touch, proprietary hardware and software as well as large scale server software, the task doesn't get any easier. The talk will tell the story about how Phenoelit went about looking at RIM's BlackBerry messaging solution while focusing on the approaches tryed their expected and real effectiveness. Bio: FX is the leader of the Phenoelit group and loves to hack pretty much everything with a CPU and...2006-10-2448 minBlack Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conferenceBlack Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conferenceFX: Analysing Complex Systems: The BlackBerry CaseWhen trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot see or touch, proprietary hardware and software as well as large scale server software, the task doesn't get any easier. The talk will tell the story about how Phenoelit went about looking at RIM's BlackBerry messaging solution while focusing on the approaches tryed their expected and real effectiveness. FX is the leader of the Phenoelit group and loves to hack pretty much everything with a CPU and some communication...2006-06-0500 minBlack Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conferenceBlack Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conferenceFX: Analysing Complex Systems: The BlackBerry Case"When trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot see or touch, proprietary hardware and software as well as large scale server software, the task doesn't get any easier. The talk will tell the story about how Phenoelit went about looking at RIM's BlackBerry messaging solution while focusing on the approaches tryed their expected and real effectiveness. FX is the leader of the Phenoelit group and loves to hack pretty much everything with a CPU and some communication...2006-06-0500 minCRE: Technik, Kultur, GesellschaftCRE: Technik, Kultur, GesellschaftCRE022 Windows Security Die Bemühungen von Microsoft um Sicherheit Microsoft Windows hat in der Öffentlichkeit was Sicherheit betrifft einen schlechten Stand. Windows gilt als System mit offenen Scheunentoren und wird von der Elite gemieden. Doch in den letzten Jahren hat sich eine Menge getan und die letzten Releases von Windows XP wie auch das bevorstehende Windows Vista kommen mit signifikanten und grundlegenden Änderungen daher, die das Bild bald ändern könnten. Im Gespräch bietet FX Einblicke in die Vorgehensweise von Microsoft in den letzten Jahren und erklärt, welche konkreten Ergebnisse Microsoft in seinen aktuellen und kommend...2006-03-2355 minCRE: Technik, Kultur, GesellschaftCRE: Technik, Kultur, GesellschaftCRE014 22C3 Rückblick, Veranstaltungen in 2006 Ein Rückblick auf den vergangenen Congress und eine Vorstellung kommender chaosnaher Veranstaltungen Chaosradio Express Nr. 14 blickt zurück auf den vergangenen 22. Chaos Communication Congress. Im Gespräch lassen Tim Pritlove und Jens Ohlig ausgewählte Vorträge und Präsentationen des Congress Revue passieren. Im Anschluß werden zahlreiche interessante Konferenzen und Workshop-Treffen im kommenden Jahr vorgestellt. Vergessen wurden leider die Datenspuren im Mai 2006. Wir bitten das zu entschuldigen. Tim Pritlove Twitter @timpritlove@mastodon.social Website Spenden via PayPal Jens Ohlig GitHub Website Twitter Shownotes Links: Net-Lag Netlabel Party FEM TU...2006-01-2256 min