Hackers of CypherCon

Watch Hackers of CypherCon

  • 2018
  • 2 Seasons
  • 8.6  (12)

Hackers of CypherCon is a thrilling show produced by Video Workbench Productions that features some of the greatest minds in the world of hacking. The show follows Joe Grand, a renowned hacker and Ben Heck, an expert in reverse engineering as they showcase their skills in different hacking challenges.

CypherCon is a significant event in the hacker community where professionals and amateurs come together to learn and advance their skills. The show captures the essence of the conference by featuring different hacking competitions and workshops, attendees and judges highlighting the best of the event.

Joe and Ben, along with their team, are tasked with executing various cybercrime scenarios in which they showcase their hacking knowledge and prowess. They have to break into protected databases, steal valuable information, and bypass several layers of security.

The competition is intense, and the hackers have to think on their feet, assess vulnerabilities and counter-attack to gain access to the systems. Along the way, the audience gets to learn about the different techniques and tactics involved in hacking, giving them insights into the world of cybersecurity.

Joe and Ben are charismatic presenters, and their approach to hacking is refreshingly different. They demonstrate their expertise with impressive ease, making even the most complex processes look easy to understand.

The series showcases various challenges and tasks, from cracking passwords and bypassing firewalls to cyberscavenger hunts and social engineering techniques. The scenarios presented in the show are realistic and reflect common cyber attacks that one would expect to come across in the real world.

Throughout the show, the hackers emphasize the importance of cybersecurity and how easily hackers can gain access to vulnerable systems. They offer advice on how individuals, companies, and governments can protect themselves from these attacks, making this an informative and educational show for anyone interested in cybersecurity.

The editing and production of the show are incredible. The visuals and graphics used to explain complex hacking techniques are clear and easy to understand, even for a novice viewer. The pacing of the show is well done, keeping the viewer engaged and interested in following the challenges.

One unique aspect of the show is that it features a diverse cast of participants. The competitors come from different backgrounds and have different levels of experience, which provides a unique perspective on the different approaches hackers take to gain access to protected systems.

In conclusion, Hackers of CypherCon is a must-watch for anyone who wants to learn about hacking and cybersecurity. It is an engaging show that provides insight into the world of hacking while highlighting the risks involved in today's digital landscape. Joe, Ben, and their team are excellent presenters who make the challenging and often murky world of hacking accessible to everyone. This show is highly recommended for anyone interested in technology and IT security.

Filter by Source
No sources available
Seasons
The X-15 Rocket Plane, Flying the First Wings into Space with Michelle Evans
31. The X-15 Rocket Plane, Flying the First Wings into Space with Michelle Evans
April 24, 2020
With the Soviet Union's launch of the first Sputnik satellite in 1957, the Cold War soared to new heights as Americans feared losing the race into space. This presentation tells the little-known story of the hypersonic X-15 which opened the way into human controlled spaceflight. Also discussed are the 12 men who guided it into space, and all the people who kept it flying for nearly a decade.
Bet You Never Played an NES Game Like This with Vi Grey
30. Bet You Never Played an NES Game Like This with Vi Grey
April 17, 2020
In this talk, Vi Grey will demonstrate how it is possible to innovate under the limitations the NES restricts us with to create new ways a person can interact with a game. You will see NES games that are also fully functioning web pages and ZIP files, console memory dumps that can be opened as JPEG images, game cartridges that secretly contain other entire NES games, and much more.
A look at Historic Cons & their Transition to a Digital World with Stephanie Carruthers
29. A look at Historic Cons & their Transition to a Digital World with Stephanie Carruthers
April 10, 2020
What does a pig in a poke, pigeon drops, and salting have in common? They are just a few of old school confidence tricks (cons) used from the late middle ages to more recently which swindled marks out of money. In this presentation Stephanie will cover how some famous historic cons were used in their day, and how they are now being transitioned into today's digital world.
Micro and Nano Segmentation with Russ From
28. Micro and Nano Segmentation with Russ From
April 3, 2020
This presentation introduces Micro-Segmentation and includes industry adoption statistics, strategies, and implementation examples. Covered, is why we need segmentation, what the benefits are, how it evolved, and what it enables before explaining a flaw of Micro- Segmentation and how it is addressed using the recently defined term Nano-Segmentation.
Journey to Command Injection with Rick Ramgattie
27. Journey to Command Injection with Rick Ramgattie
March 27, 2020
Sometimes, owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo, we show how we were able to chain multiple vulnerabilities in the Lenovo ix4-300d network attached storage device into a remote exploit that can be executed with little user interaction.
Urban Foraging: Back to our Beginnings with Nick Wersel
26. Urban Foraging: Back to our Beginnings with Nick Wersel
March 20, 2020
Someone in the 1860's one day decided 'Imma order this houseplant from Asia on the Internet and plant it in my garden!' They clicked that Buy Now button and six months later the package arrived. Because we all know the Internet was still working on their package drone prototypes back then. Anyway now that little plant grows in all your backyards.
What Happens when a Genome Database is Breached with Michelle Meas
25. What Happens when a Genome Database is Breached with Michelle Meas
March 13, 2020
DNA sequencing has become a lot cheaper since its invention, even becoming a consumer good. However, the companies that perform this sequencing are unregulated, and what they do with the data is hardly transparent. We will begin with an overview of gene sequencing technology, discuss the data collected by companies and discuss how this data could be weaponized by bad actors after a data breach.
Don't Forget to Wipe with Michael Portera
24. Don't Forget to Wipe with Michael Portera
March 6, 2020
On June 29, 2018, Toys "R" Us shut its doors to the public after filing Chapter 11 bankruptcy. The months leading up to that day consisted of liquidating its assets, including computer hardware. While everything should have been sanitized before being sold, it wasn't. We'll review my forensics investigation: what I was able to recover, how I did it, and the importance of sanitizing devices.
Anatomy of a Hot Wallet: Bitcoin at Scale with Matthew Werner
23. Anatomy of a Hot Wallet: Bitcoin at Scale with Matthew Werner
February 28, 2020
Coinbase has become one of the leading cryptocurrency exchanges in the world. This talk describes how the systems operate, challenges we've faced, and how we've overcome these constraints to provide our customers with a world-class cryptocurrency product. The talk will include topics such as fee estimation, coin selection, change splitting, UTXO consolidation, and child pays for parent.
Capture the Fail - Avoiding Pitfalls when running your C.T.F. with Kris & Chris Silvers
22. Capture the Fail - Avoiding Pitfalls when running your C.T.F. with Kris & Chris Silvers
February 21, 2020
Kris and Chris Silvers, creators of the OSINT C.T.F., share some lessons they've learned on their journey. They've run into some interesting problems. Like their scoring engine's exploitable vulnerabilities to targets changing their attack surface mid-competition and met them all head-on. Laugh along and learn something as they walk through their toughest challenges and how they handled them.
Thrift Shopping with your Data with Josh Frantz
21. Thrift Shopping with your Data with Josh Frantz
February 14, 2020
What happens with disk, flash, and floppy drives when you drop them off at thrift stores or e-recycling centers? How do you properly dispose of those devices safely and securely? We look into thrift shopping, in particular, buying your data back from those who agreed to destroy it. You signed an agreement stating your disks be wiped and data destroyed, that couldn't be further from the truth.
Spelunking the Bitcoin Blockchain with Josh Bressers
20. Spelunking the Bitcoin Blockchain with Josh Bressers
February 7, 2020
There are few topics that capture headlines like Bitcoin. Bitcoin's blockchain is like art; sometimes you have to see it with your own eyes. How does Bitcoin work? What secrets does blockchain hold for us to find? Everything we look at is open data and all the tools we use are open source. You can continue the investigation on your own using what you learn here as your inspiration and guide.
What the World Needs Now is Ham, Sweet Ham with Jonathan Tomek
19. What the World Needs Now is Ham, Sweet Ham with Jonathan Tomek
January 31, 2020
Let's increase your appetite for becoming a HAM. Whether you have an SDR laying around or hand-held you have had since the last hackercon, you should get to know how to use it. For those HAMs out there, this should still get you excited to try something new. Since it wouldn't be Cyphercon without the "cypher", there will be some fun things here to spir the curiosity in your old hackerself.
Sorry About Your WAF with Johnny Xmas & Sam Crowther
18. Sorry About Your WAF with Johnny Xmas & Sam Crowther
January 24, 2020
This presentation will be a mini-tutorial on how the various forms of "bot detection" out there work, and how to modify/spoof the necessary client environments to bypass nearly all of them using anything from Python Requests to Selenium, Puppet and beyond.
What are We Thinking Here? Rethinking Security with Jeff Man
17. What are We Thinking Here? Rethinking Security with Jeff Man
January 17, 2020
There's too much focus on vulnerabilities and not enough attention on other elements that derive the standard risk equation. Meltdown/Spectre introduced a perfect storm scenario where the vulnerability wasn't easy to fix and the solution broke things. But, there's still persistent vulnerability. What else should we focus on in terms of security if/when the vulnerabilities still remain?
Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer | Hackers of CypherCon
16. Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer | Hackers of CypherCon
January 10, 2020
This talk will provide a an overview of the major SSL/TLS versions along with their major vulnerabilities. Jim will discuss how he was able to use some F5 iRule magic on his load balancers combined with Graylog to track and block undesirable client and server connections to his proxy end points. This strategy can easily be adapted to any protocol scenario that uses TLS connection negotiation.
Unhinging Security On the Buffalo Terastation NAS with Ian Sindermann
15. Unhinging Security On the Buffalo Terastation NAS with Ian Sindermann
January 3, 2020
It only takes a small oversight to cause a vulnerability, even when it comes to severe vulnerabilities. The Buffalo TeraStation NAS demonstrates this idea beautifully in that it has a variety of features that do just a tad more than they should. Ian will provide an overview of the thought processes, mindset, and skills used to turn happy little oversights into happy little shells.
Always Look a Gift (Trojan) Horse In the Mouth with James Arndt
14. Always Look a Gift (Trojan) Horse In the Mouth with James Arndt
December 20, 2019
In this talk, learn various tools and techniques that can be used to thoroughly analyze a malicious email attachment and everything that comes after it. In order to get as many stones as possible, we will want to leave no stone unturned. This information can then be used to look for indicators of compromise throughout your environment.
Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich
13. Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich
November 22, 2019
Werewolves attack, we have silver bullets. Vampires attack, we have holy water. Criminal hackers attack, we have encryption. The villains come and the heroes fight back. But too often, encryption is like water without the holy or bullets without the silver. The configuration is wrong or the code is incomplete. This talk will cover how and where to architect for encryption to get real protection.
Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich
13. Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich
November 22, 2019
Werewolves attack, we have silver bullets. Vampires attack, we have holy water. Criminal hackers attack, we have encryption. The villains come and the heroes fight back. But too often, encryption is like water without the holy or bullets without the silver. The configuration is wrong or the code is incomplete. This talk will cover how and where to architect for encryption to get real protection.
Building a Cohesive Undergraduate Security Club with Ian Klatzco
12. Building a Cohesive Undergraduate Security Club with Ian Klatzco
November 8, 2019
The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved with a tighter meeting format, approachable 24-7 internal CTF, and internal documentation. There was better attendance, more people staying after meetings, and freshmen successfully completing projects with upperclassman mentorship. Interested? Learn more by watching this video.
Remote Wireless Pentesting with Eric Escobar & Matt Orme
11. Remote Wireless Pentesting with Eric Escobar & Matt Orme
October 25, 2019
Wireless pentesting typically requires physical proximity to a target which requires time, limited resources, and constant traveling. Eric & Matt have pioneered an inexpensive device to covertly perform wireless pentests anywhere on earth. In this talk, they'll discuss why they built it, how it works, and why they think it will revolutionize wireless pentesting.
Tracking an Adversary's Learning Curve with Edd Black
10. Tracking an Adversary's Learning Curve with Edd Black
October 11, 2019
There are 2 camps of attackers: low skilled opportunists (script kiddies) and APT - Advanced Persistent Threats (funded organized crime, nation states). In between lurks a skilled persistent threat, capable of doing even more damage. These adversaries require human responders to identify, track, & oppose. Understand the constraints of the persistent threat, and you can learn to counter them.
Welcome Our New A.I. Overlords with Ed Skoudis
9. Welcome Our New A.I. Overlords with Ed Skoudis
September 27, 2019
Amazing new A.I. based services from Amazon, Google, and Microsoft let organizations rely on automated technology to crawl through their cloud-based data to identify sensitive info, security weaknesses, and hacking attempts. In this talk, Ed will analyze security implications, ethical, business, and privacy issues they raise as cloud-based A.I. intertwines itself in our lives deeper every day.
Automating Hashtopolis with Dustin Heywood
8. Automating Hashtopolis with Dustin Heywood
September 13, 2019
This talk will cover the basics of using the user-api to automate functions in Hashtopolis. Connecting to an HTP instance, creating hashlists, creating attacks, recovering plaintext, user creation and more will be covered.
Bug Bounty Law with Dr. Amit Elazari Bar On
7. Bug Bounty Law with Dr. Amit Elazari Bar On
August 30, 2019
Bug Bounties and Vulnerability Disclosure Program (VDP) are one of the fastest growing, most popular ways for companies to engage with the security research community and uncover unknown security vulnerabilities. This talk will explore how the law interacts with bug bounties, VDP, anti-hacking laws, bounty legalese myths, and contract standardization efforts widely adopted across the industry.
Shifting Security Left with Chris Merkel
6. Shifting Security Left with Chris Merkel
August 16, 2019
The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and secure systems. The solution is more security tools, more security people, and ever-inventive ways to reign in your environment. We'll talk about how engineering automation to create a culture of empowerment, self-reliance and trust can result in better security outcomes.
Phreaking for fun and profit with Brad Swanson
5. Phreaking for fun and profit with Brad Swanson
August 2, 2019
Brad talk's about phone phreaking back in the late 1980's, until the mid 1990's. He will cover what phreaking was, why it worked, and why it was done. Devices used, the theory behind them, and some entertaining stories about those devices are covered. He will cover the slew of 'secret' numbers that existed in the phone system and discuss the decline in phreaking with the newer versions of ESS.
Spitting The Hook: Examining Phishing Bait with Joe Cicero
4. Spitting The Hook: Examining Phishing Bait with Joe Cicero
July 19, 2019
In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the red flag concept, identifying phishing email basics, examining headers, examining attachments and links. Additional topics covered are: the differences between a legit email, spam, marketing and phishing.
The Magic of Forensic Artifacts Hiding in Plain Sight with Cindy Murphy
3. The Magic of Forensic Artifacts Hiding in Plain Sight with Cindy Murphy
July 5, 2019
Digital forensics expert Cindy Murphy, M.Sc. will use this session to unpack the myths of digital forensics she uncovered since her career pivot from law enforcement to private digital forensics work. She will discuss how to navigate common myths and most importantly, how to keep moving forward in an ever-changing industry.
More Than Tor: Shining a Light on Different Corners of the Dark Web with Benjamin Brown
2. More Than Tor: Shining a Light on Different Corners of the Dark Web with Benjamin Brown
June 14, 2019
When the terms Darknet or Dark Web are invoked, it is almost always in reference to the Tor network, but what about the other extant Darknet frameworks? In this talk Benjamin will expand the field of view to include frameworks such as Freenet, I2P, and OpenBazaar. He'll take a quick look at the origins and technical underpinnings of these Darknets as well as their actors and offerings.
A Kinesthetic Approach To Learning Encryption with Antoinette Stevens
1. A Kinesthetic Approach To Learning Encryption with Antoinette Stevens
May 10, 2019
Kinesthetic style, or tactile learning, means that some learn best by physically doing to fully learn and memorize a topic. Capture the flag competitions can be a way to understand security concepts with reading, understanding, applying and watching it in action. Creating a full multi-sensory learning experience to retain those concepts in memory for later.
Description
  • Premiere Date
    June 22, 2018
  • IMDB Rating
    8.6  (12)