28C3 - Version 2.3.5

28th Chaos Communication Congress
Behind Enemy Lines

Event Speakers

802.11 Packets in Packets

A Standard-Compliant Exploit of Layer 1

Event type : Lecture
Track : Hacking
Language used for presentation : English

Antiforensik

Einführung in das Thema Antiforensik am Beispiel eines neuen Angriffsvektors

Event type : Lecture
Track : Hacking
Language used for presentation : German

Apple vs. Google Client Platforms

How you end up being the Victim.

Event type : Lecture
Track : Hacking
Language used for presentation : English

Automatic Algorithm Invention with a GPU

Hell Yeah, it's rocket science

Event type : Lecture
Track : Hacking
Language used for presentation : English

Behind the scenes of a C64 demo

Event type : Lecture
Track : Hacking
Language used for presentation : English

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Event type : Lecture
Track : Hacking
Language used for presentation : English

Bitcoin - An Analysis

Event type : Lecture
Track : Hacking
Language used for presentation : English

Black Ops of TCP/IP 2011

Event type : Lecture
Track : Hacking
Language used for presentation : English

Building a Distributed Satellite Ground Station Network - A Call To Arms

Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them!

Event type : Lecture
Track : Hacking
Language used for presentation : English

bup: Git for backups

Event type : Lecture
Track : Hacking
Language used for presentation : English

Can trains be hacked?

Die Technik der Eisenbahnsicherungsanlagen

Event type : Lecture
Track : Hacking
Language used for presentation : German

Cellular protocol stacks for Internet

GPRS, EDGE, UMTS, HSPA demystified

Event type : Lecture
Track : Hacking
Language used for presentation : English

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in near-realtime

Event type : Lecture
Track : Hacking
Language used for presentation : English

Datamining for Hackers

Encrypted Traffic Mining

Event type : Lecture
Track : Hacking
Language used for presentation : English

Data Mining the Israeli Census

Insights into a publicly available registry

Event type : Lecture
Track : Hacking
Language used for presentation : English

Datenvieh oder Daten-Fee

Welchen Wert haben Trackingdaten?

Event type : Lecture
Track : Hacking
Language used for presentation : German

DC+, The Protocol

Technical defense against data retention law

Event type : Lecture
Track : Hacking
Language used for presentation : English

Deceiving Authorship Detection

Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry

Event type : Lecture
Track : Hacking
Language used for presentation : English

Defending mobile phones

Event type : Lecture
Track : Hacking
Language used for presentation : English

Der Staatstrojaner

Vom braunen Briefumschlag bis zur Publikation

Event type : Lecture
Track : Hacking
Language used for presentation : German

Don't scan, just ask

A new approach of identifying vulnerable web applications

Event type : Lecture
Track : Hacking
Language used for presentation : English

Effective Denial of Service attacks against web application platforms

We are the 99% (CPU usage)

Event type : Lecture
Track : Hacking
Language used for presentation : English

Ein Mittelsmannangriff auf ein digitales Signiergerät

Bachelorarbeit Informatik Uni Kiel SS 2011

Event type : Lecture
Track : Hacking
Language used for presentation : German

Evolving custom communication protocols

Hell Yeah, it's rocket science

Event type : Lecture
Track : Hacking
Language used for presentation : English

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

Event type : Lecture
Track : Hacking
Language used for presentation : English

How governments have tried to block Tor

Event type : Lecture
Track : Hacking
Language used for presentation : English

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP master key

Event type : Lecture
Track : Hacking
Language used for presentation : English

Introducing Osmo-GMR

Building a sniffer for the GMR satphones

Event type : Lecture
Track : Hacking
Language used for presentation : English

Macro dragnets: Why trawl the river when you can do the whole ocean

What happens when data collection goes awry in the 21st century

Event type : Lecture
Track : Hacking
Language used for presentation : English

New Ways I'm Going to Hack Your Web App

Event type : Lecture
Track : Hacking
Language used for presentation : English

NOC Review

NOC Review about the Camp 2011 and 28C3

Event type : Lecture
Track : Hacking
Language used for presentation : English

Ooops I hacked my PBX

Why auditing proprietary protocols matters

Event type : Lecture
Track : Hacking
Language used for presentation : English

Open source music: Tracking 2.0

Event type : Lecture
Track : Hacking
Language used for presentation : English

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Event type : Lecture
Track : Hacking
Language used for presentation : English

Power gadgets with your own electricity

escape the basement and make the sun work for you

Event type : Lecture
Track : Hacking
Language used for presentation : English

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer Malware

Event type : Lecture
Track : Hacking
Language used for presentation : English

Quantified-Self and OpenBCI Neurofeedback Mind-Hacking

Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers

Event type : Lecture
Track : Hacking
Language used for presentation : English

r0ket++

The CCC-Badge

Event type : Lecture
Track : Hacking
Language used for presentation : English

Reverse-engineering a Qualcomm baseband

Event type : Lecture
Track : Hacking
Language used for presentation : English

Reverse Engineering USB Devices

Event type : Lecture
Track : Hacking
Language used for presentation : English

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks.

Event type : Lecture
Track : Hacking
Language used for presentation : English

SCADA and PLC Vulnerabilities in Correctional Facilities

Tiffany Rad, Teague Newman, John Strauchs

Event type : Lecture
Track : Hacking
Language used for presentation : English

Security Log Visualization with a Correlation Engine

What's inside your network?

Event type : Lecture
Track : Hacking
Language used for presentation : English

Security Nightmares

Event type : Lecture
Track : Hacking
Language used for presentation : German

Smart Hacking For Privacy

Event type : Lecture
Track : Hacking
Language used for presentation : English

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

Event type : Lecture
Track : Hacking
Language used for presentation : English

String Oriented Programming

Circumventing ASLR, DEP, and Other Guards

Event type : Lecture
Track : Hacking
Language used for presentation : English

Taking control over the Tor network

Event type : Lecture
Track : Hacking
Language used for presentation : English

The Atari 2600 Video Computer System: The Ultimate Talk

The history, the hardware and how to write programs

Event type : Lecture
Track : Hacking
Language used for presentation : English

The engineering part of social engineering

Why just lying your way in won't get you anywhere

Event type : Lecture
Track : Hacking
Language used for presentation : English

The future of cryptology: which 3 letters algorithm(s) could be our Titanic?

RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems

Event type : Lecture
Track : Hacking
Language used for presentation : English

The Science of Insecurity

Event type : Lecture
Track : Hacking
Language used for presentation : English

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

Event type : Lecture
Track : Hacking
Language used for presentation : English

TRESOR: Festplatten sicher verschlüsseln

Event type : Lecture
Track : Hacking
Language used for presentation : German

Your Disaster/Crisis/Revolution just got Pwned

Telecomix and Geeks without Bounds on Security and Crisis Response

Event type : Lecture
Track : Hacking
Language used for presentation : English

Archived page - Impressum/Datenschutz