Home / Series / Hackers of CypherCon / Aired Order /

All Seasons

Season 1

  • S01E01 Hacking, Phreaking & Juvenile Delinquency

    • June 22, 2018
    • Prime Video

    In a time when tinkering with technology was a guarantee for ridicule and torment, a small group of curious explorers were connecting to computer systems, traversing the telephone network, and occasionally causing mischief. Speaking at CypherCon 3.0, Joe Grand talks about previously unheard stories of his early days as a hacker, phone phreak, and troublemaker, following a rebellious path towards the eventual redirection of his passion to serve the greater good

  • S01E02 Hacking a Better Tomorrow with Ben Heck

    • July 6, 2018
    • Prime Video

    A self-taught hacker, modder and maker Benjamin Heckendorn - better known as Ben Heck is host of element14's The Ben Heck Show, a weekly web series in which Ben tackles fun and interesting projects across a wide range of topics. In this exclusive CypherCon 3.0 key note presentation, Ben discusses his beginnings, where he is today and how you can help hack a better tomorrow.

  • S01E03 Forensics When You're Broke with Phil Cochran

    • July 20, 2018
    • Prime Video

    Exploring the forensic methodology and tasks using free open source software. We won't be focusing on what tools are available, the focus of the presentation is explaining the methodology and where these tools fit in to the process to get the job done.

  • S01E04 Hack in the Day with Brad Swanson

    • August 3, 2018
    • Prime Video

    This talk will be about hacking/phreaking in the late 1980's, early 1990's, and what the scene was like back then compared to today. What was considered cutting edge back then has either changed or disappeared entirely. The general attitude around hacking, and hacking 'groups' has matured and evolved over the years. Some of the origins of how we got to where we are today is covered.

  • S01E05 Developer Friendly Cryptography with Brice Williams

    • August 17, 2018
    • Prime Video

    Brice Williams will look at some common cryptography usage errors and why popular libraries often fall short. He will also discuss nuances such as backwards compatibility, FIPS 140-2 validation, and weak standards such as JOSE/JWT that contribute to the overall confusion. Advice is also provided to ensure more secure cryptographic implementations are used.

  • S01E06 Hacking Academia with Anita Nikolich

    • August 31, 2018
    • Prime Video

    Anita will present some ideas about how three communities with different incentives, yet the same goals, can work together to shorten the time to discovery and overcome many of the obstacles that impeded progress in the sciences centuries earlier.

  • S01E07 Attacking Wireless Devices Using SDR with Caleb Madrigal

    • September 14, 2018
    • Prime Video

    In this talk, we'll be exploring how wireless communication works. We'll capture digital data live (with Software-Defined Radio [SDR]), and see how the actual bits are transmitted. From here, we'll see how to view, listen to, manipulate, and replay wireless signals. We'll also look at interrupting wireless communication, and finally, we'll even generate new radio waves from scratch.

  • S01E08 SOAR: Operating at Attacker Speed with Brian Genz & Ben Zimmerman

    • September 28, 2018
    • Prime Video

    Security Orchestration, Automation and Response (SOAR) enables defenders to operate at attacker speed by codifying detection and response expertise into automation playbooks. We will examine the core components of SOAR, skills required to design and implement it, common use cases in detection and response, and potential opportunities for security control testing in a defense-in-depth environment.

  • S01E09 When Developers Fail to Secure with David Bryan

    • October 12, 2018
    • Prime Video

    David has found some pretty stupid security mistakes. Blatantly overlooked controls, or flat out lazy system admins. David will show real-world examples of misuse & abuse, and improper data handling of passwords inside application code. We must remember a breech in one security system, can lead to a breach on another system because of the implicit trust relationships we build to get the job done.

  • S01E10 What the Fungi? How to Grow Your Own Nootropics with Eric Zimmermann

    • October 26, 2018
    • Prime Video

    Learn how mushrooms are medicinal and doing some amazing things like fighting cancer, boosting immunity, improving cognition, etc. In this presentation learn which compounds mushrooms produce that are medicinal and how you can easily grow them at home. We'll review the latest research from clinical trials and unveil the low cost, high yield techniques gleaned from anonymous mushroom cultivators.

  • S01E11 Text Mining: Reading Between the Lines with John Platais

    • November 9, 2018
    • Prime Video

    "Read between the lines" usually refers to one's ability to infer hidden meaning from text. This talk will look at the tools and efforts needed for "Text Mining". Using data mining techniques to infer meaning, misconceptions, or hidden agendas from common documents. Learn a general understanding of the process along with a list of tools & services to start text mining right away.

  • S01E12 SAEDY - Subversion & Espionage Directed Against You with Judy Towers

    • November 23, 2018
    • Prime Video

    Espionage is the practice of secretly gathering information about a foreign government or a competing industry, with the objective of placing one's own government or corporation at a strategic or financial advantage. Presenting case examples of military and industrial espionage, Judy illustrates how tricks of the spy trade are parleyed against ordinary individuals every day.

  • S01E13 The Arms Race with Ken Grigas

    • December 7, 2018
    • Prime Video

    United States military veteran Ken Grigas talks about his time in service during the "Cold War" between the Unites States and U.S.S.R.

  • S01E14 Alice in ICSLand with Lesley Carhart & Mark Stacey

    • December 21, 2018
    • Prime Video

    The past decade has made it clear that threats of cyber attacks on Industrial Control Systems (ICS) is real, and poses a fundamental risk to our way of life. The demand of ICS security professionals far exceeds the supply. Mark and Lesley of Dragos Inc. will provide an overview of some great ways to learn about the operational and technical aspects of ICS networks without breaking the bank.

  • S01E15 How to "Theoretically" Kill a Continent with Michelle Meas

    • January 1, 2019
    • Prime Video

    The human body is terrifyingly vulnerable. With the rise of novel gene-editing techniques and our increasing knowledge of genomics, we are forced to confront the idea of a microscopic enemy. This talk will explore the not-so-theoretical aftermath of an unchecked pandemic of unknown origin, the monsters we created in our own medical hubris, and the ever-present threat of bio-terrorism.

  • S01E16 Embedding Security with Mike Kavka

    • January 18, 2019
    • Prime Video

    Sequestered, cordoned off, separated, even out of touch. These words have been used by plenty of non-infosec folks. From Dev teams to Admins, Sales people and more, we get looked at as these mystical people who say nO! The people who are stopping others from doing their job. Maybe it is time for our team to take a different approach...

  • S01E17 Handshakes & Hashes, Plucking Passwords from Thin Air with Robert Reif and Shannon Fritz

    • February 1, 2019
    • Prime Video

    New developments in Hashcat have brought some new WiFi attack techniques to light. We've taken concepts from classic WiFi attacks, added a little special sauce, and created a whole new attack vector for WiFi devices everywhere. All it takes is a friendly introduction and a little cracking time to gain access to protected networks. Come get some code and that uneasy feeling of being vulnerable.

  • S01E18 Hidden in Plain Sight, Steganography & Digital Watermarking with Ryan Fox

    • February 15, 2019
    • Prime Video

    Steganography is the practice of hiding a message "in plain sight" inside an image, video, sound, text, or file. The practice goes back centuries, and in recent years has seen a rise in use for digital watermarking. It can be used for communication, leak prevention, or copyright protection. We'll look at techniques, analysis, and detection through the lens of digital watermarking.

  • S01E19 An Interdisciplinary View of Risk, Applications for Security with Susan Lincke

    • March 1, 2019
    • Prime Video

    In 2016, 791,820,040 data records were breached in the United States, which averages two breaches per American. France, Canada and Taiwan also encountered breaches above or near their population levels - or double it. This begs the question: are we doing and spending enough for security? This study of ethical risk considers how to calculate risk and engineer solutions for this new environment.

  • S01E20 Hack Dumberly Not Smarterer with Tim Medin

    • March 13, 2019
    • Prime Video

    Tim Medin discuss the dumbest red team tricks and hacks encountered over the years. We are going to take the A out of APT, because so few attackers really need to use advanced techniques. We'll also discuss the simple defenses that make an attacker's life much more difficult.

  • S01E21 Crypt-Oh No with Zach Grace

    • March 13, 2019
    • Prime Video

    Even when the right crypto primitives are chosen, subtle programming mistakes can lead to issues with the efficacy of the encryption. This presentation is aimed at helping developers avoid common cryptography pitfalls when encrypting sensitive data by giving guidance on what algorithms to choose and identifying common implementation issues observed in real-world applications.

Season 2

  • S02E01 A Kinesthetic Approach To Learning Encryption with Antoinette Stevens

    • May 10, 2019
    • Prime Video

    Kinesthetic style, or tactile learning, means that some learn best by physically doing to fully learn and memorize a topic. Capture the flag competitions can be a way to understand security concepts with reading, understanding, applying and watching it in action. Creating a full multi-sensory learning experience to retain those concepts in memory for later.

  • S02E02 More Than Tor: Shining a Light on Different Corners of the Dark Web with Benjamin Brown

    • June 14, 2019
    • Prime Video

    When the terms Darknet or Dark Web are invoked, it is almost always in reference to the Tor network, but what about the other extant Darknet frameworks? In this talk Benjamin will expand the field of view to include frameworks such as Freenet, I2P, and OpenBazaar. He'll take a quick look at the origins and technical underpinnings of these Darknets as well as their actors and offerings.

  • S02E03 The Magic of Forensic Artifacts Hiding in Plain Sight with Cindy Murphy

    • July 5, 2019
    • Prime Video

    Digital forensics expert Cindy Murphy, M.Sc. will use this session to unpack the myths of digital forensics she uncovered since her career pivot from law enforcement to private digital forensics work. She will discuss how to navigate common myths and most importantly, how to keep moving forward in an ever-changing industry.

  • S02E04 Spitting The Hook: Examining Phishing Bait with Joe Cicero

    • July 19, 2019
    • Prime Video

    In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the red flag concept, identifying phishing email basics, examining headers, examining attachments and links. Additional topics covered are: the differences between a legit email, spam, marketing and phishing.

  • S02E05 Phreaking for fun and profit with Brad Swanson

    • August 2, 2019
    • Prime Video

    Brad talk's about phone phreaking back in the late 1980's, until the mid 1990's. He will cover what phreaking was, why it worked, and why it was done. Devices used, the theory behind them, and some entertaining stories about those devices are covered. He will cover the slew of 'secret' numbers that existed in the phone system and discuss the decline in phreaking with the newer versions of ESS.

  • S02E06 Shifting Security Left with Chris Merkel

    • August 16, 2019
    • Prime Video

    The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and secure systems. The solution is more security tools, more security people, and ever-inventive ways to reign in your environment. We'll talk about how engineering automation to create a culture of empowerment, self-reliance and trust can result in better security outcomes.

  • S02E07 Bug Bounty Law with Dr. Amit Elazari Bar On

    • August 30, 2019
    • Prime Video

    Bug Bounties and Vulnerability Disclosure Program (VDP) are one of the fastest growing, most popular ways for companies to engage with the security research community and uncover unknown security vulnerabilities. This talk will explore how the law interacts with bug bounties, VDP, anti-hacking laws, bounty legalese myths, and contract standardization efforts widely adopted across the industry.

  • S02E08 Automating Hashtopolis with Dustin Heywood

    • September 13, 2019
    • Prime Video

    This talk will cover the basics of using the user-api to automate functions in Hashtopolis. Connecting to an HTP instance, creating hashlists, creating attacks, recovering plaintext, user creation and more will be covered.

  • S02E09 Welcome Our New A.I. Overlords with Ed Skoudis

    • September 27, 2019
    • Prime Video

    Amazing new A.I. based services from Amazon, Google, and Microsoft let organizations rely on automated technology to crawl through their cloud-based data to identify sensitive info, security weaknesses, and hacking attempts. In this talk, Ed will analyze security implications, ethical, business, and privacy issues they raise as cloud-based A.I. intertwines itself in our lives deeper every day.

  • S02E10 Tracking an Adversary's Learning Curve with Edd Black

    • October 11, 2019
    • Prime Video

    There are 2 camps of attackers: low skilled opportunists (script kiddies) and APT - Advanced Persistent Threats (funded organized crime, nation states). In between lurks a skilled persistent threat, capable of doing even more damage. These adversaries require human responders to identify, track, & oppose. Understand the constraints of the persistent threat, and you can learn to counter them.

  • S02E11 Remote Wireless Pentesting with Eric Escobar & Matt Orme

    • October 25, 2019
    • Prime Video

    Wireless pentesting typically requires physical proximity to a target which requires time, limited resources, and constant traveling. Eric & Matt have pioneered an inexpensive device to covertly perform wireless pentests anywhere on earth. In this talk, they'll discuss why they built it, how it works, and why they think it will revolutionize wireless pentesting.

  • S02E12 Building a Cohesive Undergraduate Security Club with Ian Klatzco

    • November 8, 2019
    • Prime Video

    The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved with a tighter meeting format, approachable 24-7 internal CTF, and internal documentation. There was better attendance, more people staying after meetings, and freshmen successfully completing projects with upperclassman mentorship. Interested? Learn more by watching this video.

  • S02E13 Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich

    • November 22, 2019
    • Prime Video

    Werewolves attack, we have silver bullets. Vampires attack, we have holy water. Criminal hackers attack, we have encryption. The villains come and the heroes fight back. But too often, encryption is like water without the holy or bullets without the silver. The configuration is wrong or the code is incomplete. This talk will cover how and where to architect for encryption to get real protection.

  • S02E14 Always Look a Gift (Trojan) Horse In the Mouth with James Arndt

    • December 20, 2019
    • Prime Video

    In this talk, learn various tools and techniques that can be used to thoroughly analyze a malicious email attachment and everything that comes after it. In order to get as many stones as possible, we will want to leave no stone unturned. This information can then be used to look for indicators of compromise throughout your environment.

  • S02E15 Unhinging Security On the Buffalo Terastation NAS with Ian Sindermann

    • January 3, 2020
    • Prime Video

    It only takes a small oversight to cause a vulnerability, even when it comes to severe vulnerabilities. The Buffalo TeraStation NAS demonstrates this idea beautifully in that it has a variety of features that do just a tad more than they should. Ian will provide an overview of the thought processes, mindset, and skills used to turn happy little oversights into happy little shells.

  • S02E16 Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer

    • January 10, 2020
    • Prime Video

    This talk will provide a an overview of the major SSL/TLS versions along with their major vulnerabilities. Jim will discuss how he was able to use some F5 iRule magic on his load balancers combined with Graylog to track and block undesirable client and server connections to his proxy end points. This strategy can easily be adapted to any protocol scenario that uses TLS connection negotiation.

  • S02E17 What are We Thinking Here? Rethinking Security with Jeff Man

    • January 17, 2020
    • Prime Video

    There's too much focus on vulnerabilities and not enough attention on other elements that derive the standard risk equation. Meltdown/Spectre introduced a perfect storm scenario where the vulnerability wasn't easy to fix and the solution broke things. But, there's still persistent vulnerability. What else should we focus on in terms of security if/when the vulnerabilities still remain?

  • S02E18 Sorry About Your WAF with Johnny Xmas & Sam Crowther

    • January 24, 2020
    • Prime Video

    This presentation will be a mini-tutorial on how the various forms of "bot detection" out there work, and how to modify/spoof the necessary client environments to bypass nearly all of them using anything from Python Requests to Selenium, Puppet and beyond.

  • S02E19 What the World Needs Now is Ham, Sweet Ham with Jonathan Tomek

    • January 31, 2020
    • Prime Video

    Let's increase your appetite for becoming a HAM. Whether you have an SDR laying around or hand-held you have had since the last hackercon, you should get to know how to use it. For those HAMs out there, this should still get you excited to try something new. Since it wouldn't be Cyphercon without the "cypher", there will be some fun things here to spir the curiosity in your old hackerself.

  • S02E20 Spelunking the Bitcoin Blockchain with Josh Bressers

    • February 7, 2020
    • Prime Video

    There are few topics that capture headlines like Bitcoin. Bitcoin's blockchain is like art; sometimes you have to see it with your own eyes. How does Bitcoin work? What secrets does blockchain hold for us to find? Everything we look at is open data and all the tools we use are open source. You can continue the investigation on your own using what you learn here as your inspiration and guide.

  • S02E21 Thrift Shopping with your Data with Josh Frantz

    • February 14, 2020
    • Prime Video

    What happens with disk, flash, and floppy drives when you drop them off at thrift stores or e-recycling centers? How do you properly dispose of those devices safely and securely? We look into thrift shopping, in particular, buying your data back from those who agreed to destroy it. You signed an agreement stating your disks be wiped and data destroyed, that couldn't be further from the truth.

  • S02E22 Capture the Fail - Avoiding Pitfalls when running your C.T.F. with Kris & Chris Silvers

    • February 21, 2020
    • Prime Video

    Kris and Chris Silvers, creators of the OSINT C.T.F., share some lessons they've learned on their journey. They've run into some interesting problems. Like their scoring engine's exploitable vulnerabilities to targets changing their attack surface mid-competition and met them all head-on. Laugh along and learn something as they walk through their toughest challenges and how they handled them.

  • S02E23 Anatomy of a Hot Wallet: Bitcoin at Scale with Matthew Werner

    • February 28, 2020
    • Prime Video

    Coinbase has become one of the leading cryptocurrency exchanges in the world. This talk describes how the systems operate, challenges we've faced, and how we've overcome these constraints to provide our customers with a world-class cryptocurrency product. The talk will include topics such as fee estimation, coin selection, change splitting, UTXO consolidation, and child pays for parent.

  • S02E24 Don't Forget to Wipe with Michael Portera

    • March 6, 2020
    • Prime Video

    On June 29, 2018, Toys "R" Us shut its doors to the public after filing Chapter 11 bankruptcy. The months leading up to that day consisted of liquidating its assets, including computer hardware. While everything should have been sanitized before being sold, it wasn't. We'll review my forensics investigation: what I was able to recover, how I did it, and the importance of sanitizing devices.

  • S02E25 What Happens when a Genome Database is Breached with Michelle Meas

    • March 13, 2020
    • Prime Video

    DNA sequencing has become a lot cheaper since its invention, even becoming a consumer good. However, the companies that perform this sequencing are unregulated, and what they do with the data is hardly transparent. We will begin with an overview of gene sequencing technology, discuss the data collected by companies and discuss how this data could be weaponized by bad actors after a data breach.

  • S02E26 Urban Foraging: Back to our Beginnings with Nick Wersel

    • March 20, 2020
    • Prime Video

    Someone in the 1860's one day decided 'Imma order this houseplant from Asia on the Internet and plant it in my garden!' They clicked that Buy Now button and six months later the package arrived. Because we all know the Internet was still working on their package drone prototypes back then. Anyway now that little plant grows in all your backyards.

  • S02E27 Journey to Command Injection with Rick Ramgattie

    • March 27, 2020
    • Prime Video

    Sometimes, owning an embedded device takes multiple different vulnerabilities, creativity, and a little finesse. In this live demo, we show how we were able to chain multiple vulnerabilities in the Lenovo ix4-300d network attached storage device into a remote exploit that can be executed with little user interaction.

  • S02E28 Micro and Nano Segmentation with Russ From

    • April 3, 2020
    • Prime Video

    This presentation introduces Micro-Segmentation and includes industry adoption statistics, strategies, and implementation examples. Covered, is why we need segmentation, what the benefits are, how it evolved, and what it enables before explaining a flaw of Micro- Segmentation and how it is addressed using the recently defined term Nano-Segmentation.

  • S02E29 A look at Historic Cons & their Transition to a Digital World with Stephanie Carruthers

    • April 10, 2020
    • Prime Video

    What does a pig in a poke, pigeon drops, and salting have in common? They are just a few of old school confidence tricks (cons) used from the late middle ages to more recently which swindled marks out of money. In this presentation Stephanie will cover how some famous historic cons were used in their day, and how they are now being transitioned into today's digital world.

  • S02E30 Bet You Never Played an NES Game Like This with Vi Grey

    • April 17, 2020
    • Prime Video

    In this talk, Vi Grey will demonstrate how it is possible to innovate under the limitations the NES restricts us with to create new ways a person can interact with a game. You will see NES games that are also fully functioning web pages and ZIP files, console memory dumps that can be opened as JPEG images, game cartridges that secretly contain other entire NES games, and much more.

  • S02E31 The X-15 Rocket Plane, Flying the First Wings into Space with Michelle Evans

    • April 24, 2020
    • Prime Video

    With the Soviet Union's launch of the first Sputnik satellite in 1957, the Cold War soared to new heights as Americans feared losing the race into space. This presentation tells the little-known story of the hypersonic X-15 which opened the way into human controlled spaceflight. Also discussed are the 12 men who guided it into space, and all the people who kept it flying for nearly a decade.