{"id":191,"date":"2007-09-04T08:49:00","date_gmt":"2007-09-04T08:49:00","guid":{"rendered":"http:\/\/www.roysac.com\/blog\/wp-admin\/2007\/09\/all-defcon-15-session-and-panel-videos-batch-1\/"},"modified":"2007-09-04T08:49:00","modified_gmt":"2007-09-04T08:49:00","slug":"all-defcon-15-session-and-panel-videos-batch-1","status":"publish","type":"post","link":"http:\/\/www.roysac.com\/blog\/2007\/09\/all-defcon-15-session-and-panel-videos-batch-1\/","title":{"rendered":"All DefCon 15 Session and Panel Videos &#8211; Batch 1"},"content":{"rendered":"<p><a href=\"http:\/\/www.roysac.com\/blog\/\" target=\"_blank\"><img decoding=\"async\" src=\"http:\/\/www.roysac.com\/blogimages\/roy.gif\" align=\"left\" border=\"0\" hspace=\"3\" vspace=\"3\"><\/a>I know that somebody will be pissed and mad at me right now, but who gives a fuck :).  Here is the first batch of <b>videos of 47 sessions and panels<\/b> (of a total of 122),  from the <b>world largest hacker conference<\/b>, <a href=\"http:\/\/www.defcon.org\/\" target=\"_blank\">DefCon 15<\/a>, which was held on August 3 &#8211; 5, 2007 at the Rivera Hotel and Casino in Las Vegas, Nevada.<\/p>\n<p>All videos together is a set of <b>10 DVD-ROMs!!! full of movie files<\/b>. Bear with me while I am working on getting the rest of the videos up on-line. It&#8217;s a pain in the ass and a lot of tedious work.<\/p>\n<div><a href=\"http:\/\/www.defcon.org\/\" target=\"_blank\"><img decoding=\"async\" src=\"http:\/\/www.roysac.com\/blogimages\/defcon15logo.gif\" border=\"0\" hspace=\"10\" vspace=\"10\"><\/a><br \/>The Session Videos &#8211; Batch I<\/div>\n<p>The videos are sold commercially for several hundred dollars, but who has that amount of money flying around, right? Okay, I paid the money. So you are welcome.  <\/p>\n<p>And anyway, isn&#8217;t DefCon not about making exploits and scams public? I make them public, alright? Not the way some might have planned, but that is not my problem. I did not get the &#8220;Black Hat&#8221; sessions and have now second thoughts about it. They cost much less if you ordered it on-site. Damn, I hope somebody else will put them up on the Internet.<\/p>\n<p>Okay, the first batch includes the following sessions, which are IMO the most interesting ones. <\/p>\n<ol>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-8078899470064976819&#038;hl=en\" target=\"_blank\">T536 &#8211; The Edge of Forever<\/a> &#8211; Making Computer History by Jason Scott from TextFiles.com who also did the documentary <a href=\"http:\/\/www.roysac.com\/videos.asp#bbsdoc\" target=\"_blank\">BBS &#8211; The Documentary<\/a>, which is also available on-line at Google Video.<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=4348833437164174416&#038;hl=en\" target=\"_blank\">T539 &#8211; Internet Wars 2007<\/a> (Panel Discussion)<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=4141261839760915489&#038;hl=en\" target=\"_blank\">T503 &#8211; Anti Spyware Coalition<\/a> (Panel Discussion)<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-1184416513077628990&#038;hl=en\" target=\"_blank\">T504 &#8211; Disclosure Panel<\/a> (Panel Discussion)<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-4408250627226363306&#038;hl=en\" target=\"_blank\">T505 &#8211; Dirty Secrets of the Security Industry<\/a> by Bruce Potter<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=3533339596291562602&#038;hl=en\" target=\"_blank\">T506 &#8211; Self Publishing in the Underground<\/a> by Myles Long, Rob &#8220;Flack&#8221; O&#8217;Hara and Christian &#8220;RaD Man&#8221; Wirth, founder and leader of the artscene group &#8220;ACiD&#8221; who did in 2004 a presentation called <a href=\"http:\/\/www.roysac.com\/blog\/2007\/02\/history-of-text-art-video-by-rad-man-acid\/\" target=\"_blank\">The Art of Textmode<\/a>, the history of ASCII art, which is also available at my <a href=\"http:\/\/www.roysac.com\/videos.asp\" target=\"_blank\">videos section<\/a>.<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=8220256903673801959&#038;hl=en\" target=\"_blank\">T107 &#8211; Tactical Exploitation<\/a> by H.D.Moore &#038; Valsmith<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=7635199859932717949&#038;hl=en\" target=\"_blank\">T166 &#8211; Biting the Hand that Feeds You<\/a> &#8211; Storing and Serving Malicious Content From Well Known Web Servers by Billy Rios &#038; Nathan McFeters<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-6199898512735487258&#038;hl=en\" target=\"_blank\">T109 &#8211; Fingerprinting and Cracking Java Obfuscated Code<\/a> by Subere<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-4280186191921349024&#038;hl=en\" target=\"_blank\">T111 &#8211; Meet the Feds<\/a> (Panel Discussion)<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-2160824376898701015&#038;hl=en\" target=\"_blank\">T112 &#8211; No-Tech Hacking<\/a> by Johnny Long<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=3871224356389963114&#038;hl=en\" target=\"_blank\">T131 &#8211; The SOA\/XML Threat Model<\/a> and New XML\/SOA\/Web 2.0 Attacks &#038; Threats by Steve Orrin<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-811085428367239146&#038;hl=en\" target=\"_blank\">T137 &#8211; Creating Unreliable Systems<\/a> &#8211; Attacking the Systems that Attack You by Sysmin &#038; Marklar<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-4931602590970144801&#038;hl=en\" target=\"_blank\">T140 &#8211; The Emperor Has No Cloak<\/a> &#8211; Web Cloaking Exposed by Vivek Ramachandran<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=4663219726207146879&#038;hl=en\" target=\"_blank\">T161 &#8211; HoneyJax<\/a> (aka Web Security Monitoring and Intelligence 2.0) by Dan Hubbard<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-8906726223157912745&#038;hl=en\" target=\"_blank\">T162 &#8211; Hacking Social Lives: MySpace.com<\/a> by Rick Deacon<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-542607127966826627&#038;hl=en\" target=\"_blank\">T163 &#8211; The Inherent Insecurity of Widgets and Gadgets<\/a> by Aviv Raff &#038; Iftach Ian Amit<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=5551844186715569296&#038;hl=en\" target=\"_blank\">T164 &#8211; Greater Than 1<\/a> &#8211; Defeating &#8220;Strong&#8221; Authentication in Web Applications (for Online Banking) by Brendan O&#8217;Connor. I blogged about that session and put the <a href=\"http:\/\/www.roysac.com\/blog\/2007\/08\/new-online-banking-security-process-opens-more-security-holes-than-it-closes\/\" target=\"_blank\">slides from the presentation<\/a> up on-line.<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-6149767674745536409&#038;hl=en\" target=\"_blank\">T207 &#8211; It&#8217;s All About the Timing<\/a> by Haroon Meer &#038; Marco Slaviero<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-963703394956680515&#038;hl=en\" target=\"_blank\">T201 &#8211; Church Of WiFi&#8217;s Wireless Extravaganza<\/a> by Church of WiFi&#8217;s<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=3470216843068111954&#038;hl=en\" target=\"_blank\">T202 &#8211; SQL Injection and Out-of-Band Channeling<\/a> by Patrik Karlsson<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-243449809912903881&#038;hl=en\" target=\"_blank\">T206 &#8211; Virtual World, Real Hacking<\/a> by Greg Hoglund<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-7854658764307654104&#038;hl=en\" target=\"_blank\">T212 &#8211; Trojans<\/a> &#8211; A Reality Check by Toralv Dirro &#038; Dirk Kollberg<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-4771262945479844976&#038;hl=en\" target=\"_blank\">T232 &#8211; Malware Secrets<\/a> by Valsmith &#038; Delchi<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-768255321106963809&#038;hl=en\" target=\"_blank\">T234 &#8211; Click Fraud Detection<\/a> with Practical Memetrics by Broward Horne<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-5856330670787297158&#038;hl=en\" target=\"_blank\">T235 &#8211; Fighting Malware on your Own<\/a> by Vitaliy Kamlyuk<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-5191264389529392416&#038;hl=en\" target=\"_blank\">T238 &#8211; Webserver Botnets<\/a> by Gadi Evron<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=2566542832546263615&#038;hl=en\" target=\"_blank\">T239 &#8211; The Commercial Malware Industry<\/a> by Peter Gutmann<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=7705277771410708643&#038;hl=en\" target=\"_blank\">T240 &#8211; CaffeineMonkey<\/a> &#8211;  Automated Collection, Detection and Analysis of Malicious JavaScript by Daniel Peck &#038; Ben Feinstein<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-5312112597477038732&#038;hl=en\" target=\"_blank\">T301 &#8211; Analysing Intrusions &#038; Intruders<\/a> by Sean Bodmer<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=8612013987586008328&#038;hl=en\" target=\"_blank\">T304 &#8211; Re-Animating Drives<\/a> and Advanced Data Recovery by Scott Moulton<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=2625311720077762980&#038;hl=en\" target=\"_blank\">T307 &#8211; When Tapes Go Missing<\/a> by Robert Stoudt<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-5863745298383279447&#038;hl=en\" target=\"_blank\">T309 &#8211; Hacking UFOlogy<\/a> &#8211; Thirty Years in the Wilderness of Mirrors by Richard Thieme<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=4221457095668033104&#038;hl=en\" target=\"_blank\">T312 &#8211; The Executable Image Exploit<\/a> by Michael Schrenk<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=5967477943443449443&#038;hl=en\" target=\"_blank\">T337 &#8211; Hacking your Access Control Reader<\/a> by Zac Franken<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=8492844265865515978&#038;hl=en\" target=\"_blank\">T338 &#8211; Security by Politics<\/a> &#8211; Why it Will Never Work by Lukas Grunwald<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=2012783803720120560&#038;hl=en\" target=\"_blank\">T361 &#8211; Hacking the EULA<\/a> &#8211; Reverse Benchmarking Web Application Security Scanners by Tom Stracener &#038; Marce Luck<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-6879117328925112868&#038;hl=en\" target=\"_blank\">T362 &#8211; Network Mathematics<\/a> &#8211; Why is it a Small World? by Oskar Sandberg<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=8137962938650862698&#038;hl=en\" target=\"_blank\">T363 &#8211; Beyond Vulnerability Scanning<\/a> &#8211; Extrusion and Exploitability Scanning by Matt Richard<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=5478487124598336308&#038;hl=en\" target=\"_blank\">T401 &#8211; Disclosure and Intellectual Property Law<\/a> &#8211; Case Studies by Jennifer Granick<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-7193032412048967982&#038;hl=en\" target=\"_blank\">T402 &#8211; Computer and Internet Security Law<\/a> &#8211; A Year in Review 2006-2007 by Robert Clark<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=662396188910677140&#038;hl=en\" target=\"_blank\">T404 &#8211; Everything you ever wanted to know about Police Procedure<\/a> in 50 minutes by Steve Dunker<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=710124790709298362&#038;hl=en\" target=\"_blank\">T431 &#8211; The Market for Malware<\/a> by Thomas Holt<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-6553230676330212124&#038;hl=en\" target=\"_blank\">T433 &#8211; Routing in the Dark<\/a> &#8211; Pitch Black by Nathan Evans &#038; Christian Grothoff<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-3128792970213549587&#038;hl=en\" target=\"_blank\">T435 &#8211; Social Attacks on Anonymity Networks<\/a> by Nick Mathewson<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-3029543987096343108&#038;hl=en\" target=\"_blank\">T438 &#8211; Saving the Internet With Hate<\/a> by Zed Shaw<\/li>\n<li><a href=\"http:\/\/video.google.com\/videoplay?docid=-5021435977346308867&#038;hl=en\" target=\"_blank\">T441- Portable Privacy<\/a> by Steve Topletz<\/li>\n<\/ol>\n<p>I was writing about one particular session already twice here at my blog, <a href=\"http:\/\/www.roysac.com\/blog\/2007\/08\/why-worry-today-if-your-bank-account-gets-hacked-tomorrow\/\">here<\/a> and the <a href=\"http:\/\/www.roysac.com\/blog\/2007\/08\/new-online-banking-security-process-opens-more-security-holes-than-it-closes\/\">second time here<\/a>.<\/p>\n<p>It&#8217;s the session with Brendan O&#8217;Connor titled <b>&#8220;Greater than 1: Defeating &#8220;Strong&#8221; Authentication in Web Applications&#8221;<\/b>. If you did not believe me, watch it with your own eyes and hear it with your own ears.<\/p>\n<p><b>Here is the video of that session.<\/b> There is unfortunately no video recording of the discussion that happened afterwards in a different room, but I think that the session will be enough to open some people&#8217;s eyes.<\/p>\n<p><center><\/center><\/p>\n<p>Got it? Gee&#8230;.<\/p>\n<p><b>Update:<\/b> Get the <a href=\"http:\/\/www.roysac.com\/blog\/2007\/09\/defcon-session-videos-batch-ii\/\" target=\"_blank\">DefCon 15 Session Videos Batch II<\/a> remaining sessions from track one.<\/p>\n<p><b>Update II:<\/b> Get the <a href=\"http:\/\/www.roysac.com\/blog\/2007\/09\/defcon-15-session-videos-batch-iii-uno-mas\/\" target=\"_blank\">DefCon 15 Session Videos Batch III<\/a> remaining sessions from track two and three and &#8230;<br \/><a href=\"http:\/\/www.roysac.com\/blog\/2007\/09\/defcon-15-session-and-panel-videos-batch-iv-final-batch\/\" target=\"_blank\">DefCon 15 Session Videos Batch IV (final batch)<\/a> remaining sessions from track four and five.<\/p>\n<p>Enjoy the videos! Cheers!<br \/>Carsten aka Roy\/SAC<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I know that somebody will be pissed and mad at me right now, but who gives a fuck :). Here is the first batch of videos of 47 sessions and panels (of a total of 122), from the world largest hacker conference, DefCon 15, which was held on August 3 &#8211; 5, 2007 at the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,11],"tags":[],"class_list":["post-191","post","type-post","status-publish","format-standard","hentry","category-defcon","category-scene-videos"],"_links":{"self":[{"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/posts\/191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/comments?post=191"}],"version-history":[{"count":0,"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/posts\/191\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/media?parent=191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/categories?post=191"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/tags?post=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}