podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
FX Of Phenoelit
Shows
Segfault.fm
0x0d Printer
Beschreibung: Drucker sind sicher, oder? Wir unterhalten uns über Drucker und inwieweit diese eine Sicherheitsbedrohung darstellen. Viel Spaß beim Hören! Shownotes: Machine Identification Code – Wikipedia List of Printers Which Do or Do Not Display Tracking Dots - Electronic Frontier Foundation EURion Constellation media.ccc.de -Traue keinem Scan, den du nicht selbst gefälscht hast Müller et. al: SoK Exploiting Network Printers Shodan: printer CVE - CVE-2006-0788 Phenoelit HP Hacker briefly hijacks insecure printers - BBC News GitHub - RUB-NDS/PRET: Printer Exploitation Toolkit - The tool that made dumpster diving obsolete. Hacking Printers Imperial March o...
2020-03-26
1h 19
BrakeSec Education Podcast
Interview with Paul Coggin (part 1)
One of the talks my colleague got to see was Paul Coggin's talk about Internetworking routing and protocols. In this interview, we dicsuss some tools of the trade, how MPLS isn't secure, and why you should be doing end-to-end encryption without allowing your VPN or circuit provider to do it for you... If you have any interest in network security, including the higher order network protocols like BGP, MPLS, ATM, etc... You'll want to check out his DerbyCon talk, and our interview... Paul's Derbycon 2014 talk - http://www.irongeek.com/i.php?page=vid...
2014-11-03
42 min
DEF CON 18 [Video] Speeches from the Hacker Convention.
Felix "FX" Lindner - Blitzableiter - the Release
The talk presents a simple but effective approach for securing Rich Internet Application (RIA) content before using it. Focusing on Adobe Flash content, the security threats presented by Flash movies are discussed, as well as their inner workings that allow such attacks to happen. Some of those details will make you laugh, some will make you wince. Based on the properties discussed, the idea behind the defense approach will be presented, as well as the code implementing it and the results of using it in the real world.After a year of development, we hope to release a...
2010-10-08
52 min
DiscussIT - The South African Podcast Portal
Pubcast: From the 2010 ITWeb Security Summit - FX from Phenoelit
160;From the Pubcast booth at the ITWeb security Summit: Matt and Ralfe tracked down FX of Phenoelit, known to his friends as Felix Lindner, about the hacking scene in Berlin160;Note that this podcast contains adult language....
2010-05-24
00 min
DEFCON 17 [Video and Slides] Speeches from the Hacker Convention.
FX - Router Exploitation - Video and Slides
Router ExploitationFX of Phenoelit, Head, Recurity Labs GmbHExploitation of active networking equipment has its own history and challenges. This session will take you through the full spectrum of possible attacks, what they yield and how the art of exploitation in that particular field evolved over the recent past to its present state. We will cover attacks on Cisco equipment and compare them to other specimen in the field, talk about the challenges you face to get a simple shell on such devices and what to actually do with them once you made it....
2009-10-07
46 min
SIGINT09 Audio Recordings
SIGINT09_3248 Keynote Tag 2: Pranks, Bugs, and Insecurities
SIGINT09 Audio Recordings SIGINT09_3248 Veröffentlicht am: 23.05.2009, 11:00 Uhr Präsentation vom: 23.05.2009, 11:00 Uhr http://chaosradio.ccc.de/sigint09_mp3_3248.html Keynote Tag 2: Pranks, Bugs, and Insecurities Abstract : Speakers : FX of Phenoelit Language : de Date : 2009-05-23 Time : 11:00 Room : KOMED Saal (MP7) More information... http://events.ccc.de/sigint/2009/Fahrplan/events/3248.en.html
2009-05-23
00 min
ISTS - i sh0t the sheriff
Edição 3 - Feliz 2007 - 1.01.2007
quase 59 minutos Comentários sobre a 23c3 (e vídeos alternativos no google video e youtube) Votação eletrônica e site holandês do movimento contra a mesma Bluetooth e afins Link do grupo Trifinite TOR Rootkits e Chkrootkit lista de senhas default do Phenoelit Viradas de ano (incluindo ano 2000) Alguns assuntos (OpenID e custo de proteção do Vista), devido a problemas operacionais (atualmente muito comum em aeroportos), ficaram para a próxima edição.
2007-01-01
18 min
Black Hat Briefings, Las Vegas 2002 [Audio] Presentations from the security conference
FX and kim0: Attacking Networked Embedded Systems
"Every device on a network that has a processor, some memory and a network interface can become a target. Using printers as an example, the talk will show how a seemingly innocent device can be used by attackers, ranging from attacks on the device itself to the point where the embedded system becomes an attack platform itself. Then, protection mechanisms and ways to include these devices in a company's security concept will be discussed. FX of Phenoelit is the leader of the German Phenoelit group. His and the group's primary interests are in security implementations and implications of standards or...
2006-11-01
1h 01
DEFCON 16 [Video] Speeches from the Hacker Convention.
Fabian "Fabs" Yamaguchi & FX: New ideas for old practices - Port-Scanning improved
How fast a port-scan can be is largely dependent on the performance of the network in question. Nonetheless, it is clear that choosing the most efficient scanning-speed is only possible based on sufficient information on the network's performance. We have thus designed and implemented a port-scanning method which provokes extra network-activity to increase the amount of information at our disposal in an attempt to gain speed on the long run.Following this approach, we've managed to mimic TCPs properties to an extend which allows us to implement many congestion control schemes initially designed for TCP. Further tweaking the...
2006-10-24
39 min
DEFCON 16 [Video] Speeches from the Hacker Convention.
FX: Developments in Cisco IOS Forensics
Attacks on network infrastructure are not a new field. However, the increasing default protections in common operating systems, platforms and development environments increase interest in the less protected infrastructure sector. Today, performing in-depth crash analysis or digital forensics is almost impossible on the most widely used routing platform.This talk will show new developments in this sector and how a slightly adjusted network infrastructure configuration together with new tools finally allows to separate crashed, attacked and backdoored routers from each other. We walk through the known types of backdoors and shellcodes for IOS as well as their detection...
2006-10-24
49 min
DEFCON 16 [Video] Speeches from the Hacker Convention.
FX: Toying with Barcodes
The talk focuses on 1D and 2D barcode applications with interference possibilities for the ordinary citizen. Ever wondered what is in these blocks of squares on postal packages, letters and tickets? Playing with them might have interesting effects, reaching from good old fun to theft and severe impact.Barcodes have been around for ages, but most of the time were used as simple tags with a number. The rise of 2D barcodes started to put them into customer hands as authentication, authorization, payment method and other arbitrary data transport. The implicit trust in them is enormous. The talk...
2006-10-24
44 min
DEFCON 14: [Video] Speeches from the hacker conventions
FX: Analysing Complex Systems: The BlackBerry Cas
Abstract: When trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot see or touch, proprietary hardware and software as well as large scale server software, the task doesn't get any easier. The talk will tell the story about how Phenoelit went about looking at RIM's BlackBerry messaging solution while focusing on the approaches tryed their expected and real effectiveness. Bio: FX is the leader of the Phenoelit group and loves to hack pretty much everything with a CPU and...
2006-10-24
48 min
Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
FX: Analysing Complex Systems: The BlackBerry Case
When trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot see or touch, proprietary hardware and software as well as large scale server software, the task doesn't get any easier. The talk will tell the story about how Phenoelit went about looking at RIM's BlackBerry messaging solution while focusing on the approaches tryed their expected and real effectiveness. FX is the leader of the Phenoelit group and loves to hack pretty much everything with a CPU and some communication...
2006-06-05
00 min
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
FX: Analysing Complex Systems: The BlackBerry Case
"When trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot see or touch, proprietary hardware and software as well as large scale server software, the task doesn't get any easier. The talk will tell the story about how Phenoelit went about looking at RIM's BlackBerry messaging solution while focusing on the approaches tryed their expected and real effectiveness. FX is the leader of the Phenoelit group and loves to hack pretty much everything with a CPU and some communication...
2006-06-05
00 min
CRE: Technik, Kultur, Gesellschaft
CRE022 Windows Security
Die Bemühungen von Microsoft um Sicherheit Microsoft Windows hat in der Öffentlichkeit was Sicherheit betrifft einen schlechten Stand. Windows gilt als System mit offenen Scheunentoren und wird von der Elite gemieden. Doch in den letzten Jahren hat sich eine Menge getan und die letzten Releases von Windows XP wie auch das bevorstehende Windows Vista kommen mit signifikanten und grundlegenden Änderungen daher, die das Bild bald ändern könnten. Im Gespräch bietet FX Einblicke in die Vorgehensweise von Microsoft in den letzten Jahren und erklärt, welche konkreten Ergebnisse Microsoft in seinen aktuellen und kommend...
2006-03-23
55 min
CRE: Technik, Kultur, Gesellschaft
CRE014 22C3 Rückblick, Veranstaltungen in 2006
Ein Rückblick auf den vergangenen Congress und eine Vorstellung kommender chaosnaher Veranstaltungen Chaosradio Express Nr. 14 blickt zurück auf den vergangenen 22. Chaos Communication Congress. Im Gespräch lassen Tim Pritlove und Jens Ohlig ausgewählte Vorträge und Präsentationen des Congress Revue passieren. Im Anschluß werden zahlreiche interessante Konferenzen und Workshop-Treffen im kommenden Jahr vorgestellt. Vergessen wurden leider die Datenspuren im Mai 2006. Wir bitten das zu entschuldigen. Tim Pritlove Twitter @timpritlove@mastodon.social Website Spenden via PayPal Jens Ohlig GitHub Website Twitter Shownotes Links: Net-Lag Netlabel Party FEM TU...
2006-01-22
56 min