Offensive Wireless Tactics used in DEFCON 23s Wireless CTF Eric Escobar CypherCon 2016

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=H3rAXLojXak



Duration: 23:36
3 views
0


CypherCon - 2016 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CypherCon
CypherCon is Wisconsin’s largest annual hacker conference based in Milwaukee, Wisconsin. Topics include Hacking, Information Security, Privacy, Cryptography, Forensics, and other Security oriented topics.
The event aims to lead, convene, and connect local and neighboring hacker and information security friends for an open discussion on strong cryptography, become advocacy outlet for privacy, and strive for the betterment of education of the general public in a diligent, loyal, honest manner, and not knowingly be part of any illegal or improper activities. We will accomplish this by being the interchange of knowledge and ideas, advancing the industry forward, while never forgetting our cultural hacker past.

Years 1-5 has been about immediacy & living in the moment.

Years 6-10 is about chooses one can make in life.
The conference format allows for specialized areas called villages, interesting talks, informal discussions, socializing, challenges, contests, and competitions. Technology and hacking is the primary purpose of the con but recommend divination into other related topics. Some like hacking the badge, some like capture the flag, some like the presentation topics.




Other Videos By All Hacking Cons


2022-04-09Badge Panel CypherCon 2017
2022-04-09A Look Behind the Scenes of DEFCON DarkNet Part II Part II Ed Abrams zeroaltitude De CypherCon 2
2022-04-09No encrypted data on this drive just pictures of my cat Parker Schmitt CypherCon 2016
2022-04-09Medical Devices Pwnage Honeypots Scott Erven CypherCon 2016
2022-04-09Hypervault Demo and HTTP and SSH Tunneling Caleb Madrigal CypherCon 2016
2022-04-09ESPIONAGE A WEAPON DURING THE COLD WAR Werner Juretzko CypherCon 2016
2022-04-09Curry and TARTS JP SMITH CypherCon 2016
2022-04-09A Look Behind the Scenes of DEFCON DarkNet Ed Abrams zeroaltitude Demetrius Comes cm CypherCon 2
2022-04-09Hijinks CypherCon 2017
2022-04-09From zero to Bender in 12 months how a software guy turned hardware Zapp CypherCon 2017
2022-04-09Offensive Wireless Tactics used in DEFCON 23s Wireless CTF Eric Escobar CypherCon 2016
2022-04-09Chinas Hackers and Cyber Sovereignty Lieutenant Colonel Bill Hagestad II CypherCon 2016
2022-04-09Bypassing Encryption by Attacking the Cryptosystem Perimeter Trenton Ivey CypherCon 2016
2022-04-09All your Wheaties belong to us Removing the basics that humans need for survival Chris Roberts Cyp
2022-04-092016 Badge Walkthrough CypherCon 2016
2022-04-09You're Right This Sucks J0hnnyxm4s Lesley Carhart CypherCon 2016
2022-04-09Security Control Wins Fails Jason Lang CypherCon 2016
2022-04-09Quantum Computation and Information Security David Webber CypherCon 2016
2022-04-09PISSED Privacy In a Surveillance State Evading Detection Joe Cicero CypherCon 2016
2022-04-09Opening Ceremony Begins Korgo CypherCon 2016
2022-04-08Marisol Aldonza CyberCamp Cybersecurity Summer BootCamp 2020



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering