(31 Episodes)

YouTube, Amazon Prime & Vimeo​

CypherCon is an annual hacker conference held in Wisconsin that provides hackers with an outlet to openly demonstrate and experience creativity and ingenuity through hands-on enlightening activities, thought provoking presentations and technical projects. 

 

Speakers were filmed at CypherCon 4.0 in Milwaukee on April 11th and 12th, 2019 at the Wisconsin Convention Center. Learn more about this conference by clicking HERE.

(S2: E1) A Kinesthetic Approach To Learning Encryption with Antoinette Stevens

Kinesthetic style, or tactile learning, means that some learn best by physically doing to fully learn and memorize a topic. Capture the flag competitions can be a way to understand security concepts with reading, understanding, applying and watching it in action. Creating a full multi-sensory learning experience to retain those concepts in memory for later.

Release Date: Jun 7, 2019

Language: English | CC | Runtime: 19 minutes

(S2: E2) More Than Tor: Shining a Light on Different Corners of the Dark Web with Benjamin Brown

When the terms Darknet or Dark Web are invoked, it is almost always in reference to the Tor network, but what about the other extant Darknet frameworks? In this talk Benjamin will expand the field of view to include frameworks such as Freenet, I2P, and OpenBazaar. He’ll take a quick look at the origins and technical underpinnings of these Darknets as well as their actors and offerings.

Release Date: Jun 20, 2019

Language: English | CC | Runtime: 40 minutes

(S2: E3) The Magic of Forensic Artifacts Hiding in Plain Sight with Cindy Murphy

Digital forensics expert Cindy Murphy, M.Sc. will use this session to unpack the myths of digital forensics she uncovered since her career pivot from law enforcement to private digital forensics work. She will discuss how to navigate common myths and most importantly, how to keep moving forward in an ever-changing industry.

Release Date: July 5, 2019

Language: English | Runtime: 53 minutes

(S2: E4) Spitting The Hook: Examining Phishing Bait with Joe Cicero

In this very informative panel, Joe Cicero examines phishing bait for enterprise protection. Subjects covered are: the red flag concept, identifying phishing email basics, examining headers, examining attachments and links. Additional topics covered are: the differences between a legit email, spam, marketing and phishing.

Release Date: July 19, 2019

Language: English | Runtime: 47 minutes

(S2: E5) Phreaking for fun and profit with Brad Swanson

Brad talk's about phone phreaking back in the late 1980's, until the mid 1990's. He will cover what phreaking was, why it worked, and why it was done. Devices used, the theory behind them, and some entertaining stories about those devices are covered. He will cover the slew of ‘secret’ numbers that existed in the phone system and discuss the decline in phreaking with the newer versions of ESS.

Release Date: August 2, 2019

Language: English | Runtime: 55 minutes

(S2: E6) Shifting Security Left with Chris Merkel

The shift to the cloud is making it more difficult for security teams to control what happens in their organizations and secure systems. The solution is more security tools, more security people, and ever-inventive ways to reign in your environment. We’ll talk about how engineering automation to create a culture of empowerment, self-reliance and trust can result in better security outcomes.

Release Date: August 16, 2019

Language: English | Runtime: 51 minutes

(S2: E7) Bug Bounty Law with Dr. Amit Elazari Bar On

Bug Bounties and Vulnerability Disclosure Program (VDP) are one of the fastest growing, most popular ways for companies to engage with the security research community and uncover unknown security vulnerabilities. This talk will explore how the law interacts with bug bounties, VDP, anti-hacking laws, bounty legalese myths, and contract standardization efforts widely adopted across the industry.

Release Date: August 30, 2019

Language: English | Runtime: 47 minutes

(S2: E8) Automating Hashtopolis with Dustin Heywood

This talk will cover the basics of using the user-api to automate functions in Hashtopolis. Connecting to an HTP instance, creating hashlists, creating attacks, recovering plaintext, user creation and more will be covered.

Release Date: September 13, 2019

Language: English | Runtime: 23 minutes

(S2: E9) Welcome Our New A.I. Overlords with Ed Skoudis

Amazing new A.I. based services from Amazon, Google, and Microsoft let organizations rely on automated technology to crawl through their cloud-based data to identify sensitive info, security weaknesses, and hacking attempts. In this talk, Ed will analyze security implications, ethical, business, and privacy issues they raise as cloud-based A.I. intertwines itself in our lives deeper every day.

Release Date: September 27, 2019

Language: English | Runtime: 46 minutes

(S2: E10) Tracking an Adversary's Learning Curve with Edd Black

There are 2 camps of attackers: low skilled opportunists (script kiddies) and APT – Advanced Persistent Threats (funded organized crime, nation states). In between lurks a skilled persistent threat, capable of doing even more damage. These adversaries require human responders to identify, track, & oppose. Understand the constraints of the persistent threat, and you can learn to counter them.

Release Date: October 11, 2019

Language: English | Runtime: 20 minutes

(S2: E11) Remote Wireless Pentesting with Eric Escobar & Matt Orme

Wireless pentesting typically requires physical proximity to a target which requires time, limited resources, and constant traveling. Eric & Matt have pioneered an inexpensive device to covertly perform wireless pentests anywhere on earth. In this talk, they'll discuss why they built it, how it works, and why they think it will revolutionize wireless pentesting.

Release Date: October 25, 20019

Language: English | Runtime: 52 minutes

(S2: E12) Building a Cohesive Undergraduate Security Club with Ian Klatzco

The university security club had its ups and downs between boring meetings and inaccessibility to newcomers. It improved with a tighter meeting format, approachable 24-7 internal CTF, and internal documentation. There was better attendance, more people staying after meetings, and freshmen successfully completing projects with upperclassman mentorship. Interested? Learn more by watching this video.

Release Date: November 8, 2019
Language: English | Runtime: 38 minutes

(S2: E13) Encryption, Silver Bullets & Holy Water with J. Wolfgang Goerlich

 

Werewolves attack, we have silver bullets. Vampires attack, we have holy water. Criminal hackers attack, we have encryption. The villains come and the heroes fight back. But too often, encryption is like water without the holy or bullets without the silver. The configuration is wrong or the code is incomplete. This talk will cover how and where to architect for encryption to get real protection.

Release Date: November 22, 2019

Language: English | Runtime: 49 minutes

(S2: E14) Always Look a Gift (Trojan) Horse In the Mouth with James Arndt

In this talk, learn various tools and techniques that can be used to thoroughly analyze a malicious email attachment and everything that comes after it. In order to get as many stones as possible, we will want to leave no stone unturned. This information can then be used to look for indicators of compromise throughout your environment.

Release Date: December 20, 2019

Language: English | Runtime: 38 minutes

(S2: E15) Unhinging Security On the Buffalo Terastation NAS with Ian Sindermann

It only takes a small oversight to cause a vulnerability, even when it comes to severe vulnerabilities. The Buffalo TeraStation NAS demonstrates this idea beautifully in that it has a variety of features that do just a tad more than they should. Ian will provide an overview of the thought processes, mindset, and skills used to turn happy little oversights into happy little shells. 

Release Date: January 3, 2020

Language: English | Runtime: 24 minutes

Hackers of CypherCon | Season 2.0

(S2: E16) Decrypting the Mess that is SSL TLS Negotiation with Jim Nitterauer

This talk will provide a quick overview of the major SSL/TLS versions along with their major vulnerabilities. Jim will then discuss how he was able to use some F5 iRule magic on his load balancers combined with Graylog (a log aggregation platform) to track as well as block undesirable client and server connections to his proxy end points. This strategy can easily be adapted to any protocol scenario that uses TLS connection negotiation.

Release Date: January 10, 20200

Language: English | Runtime: 47 minutes

(S2: E17) What are We Thinking Here? Rethinking Security with Jeff Man

There's too much focus on vulnerabilities and not enough attention on other elements that derive the standard risk equation. Meltdown/Spectre introduced a perfect storm scenario where the vulnerability wasn’t easy to fix and the solution broke things. But, there's still persistent vulnerability. What else should we focus on in terms of security if/when the vulnerabilities still remain?

Release Date: January 17, 2020

Language: English | Runtime: 43 minutes

(S2: E18) Sorry About Your WAF with Johnny Xmas & Sam Crowther

This presentation will be a mini-tutorial on how the various forms of “bot detection” out there work, and how to modify/spoof the necessary client environments to bypass nearly all of them using anything from Python Requests to Selenium, Puppet and beyond.

Release Date: January 24, 2020

Language: English | Runtime: 46 minutes

(S2: E19) What the World Needs Now is Ham, Sweet Ham with Jonathan Tomek 

Let’s increase your appetite for becoming a HAM. Whether you have an SDR laying around or hand-held you have had since the last hackercon, you should get to know how to use it. For those HAMs out there, this should still get you excited to try something new. Since it wouldn’t be Cyphercon without the “cypher”, there will be some fun things here to spir the curiosity in your old hackerself.

Release Date: January 31, 2020

Language: English | Runtime: 45 minutes

(S2: E20) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E21) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E22) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E23) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E24) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E25) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E26) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E27) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E28) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E29) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E30) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

(S2: E31) COMING SOON | IN DEVELOPMENT

Episode in development. Check back soon.

Release Date: COMING SOON | IN DEVELOPMENT

Language: English | Runtime: TO BE DETERMINED

Stream or Buy this Title on the Available Platforms Below

Click an icon to watch or buy on your favorite platform

TERMS OF SERVICE: Clicking on the YouTube, Amazon and Vimeo icons will take you to their respective websites where you can choose to sign up for an account. To stream, rent or purchase a digital title, you can pay securely by credit card or through PayPal. We do not collect any private information. All payments and conditions the aforementioned websites propose are not associated or affiliated with Video Workbench Productions.

  • Visit Us on Amazon
  • Visit Us on Facebook
  • Visit Jason on IMDb
  • Visit Us on YouTube

Video Workbench Productions | Johnson Creek, WI | Email HERE | (414) 839-4572

Copyright © 1992-2020 by Jason C. Gares, Video Workbench & Video Workbench Productions. All Rights Reserved.