Sam's Videos & Podcasts

My YouTube Channel

Hope Eleven - ""When Vulnerability Disclosure Turns Ugly", with Alex Muentz (July 22, 2016)

DEF CON 23 - Packet Capture Village - Sam Bowne - Is Your Android App Secure? (Aug. 8, 2015)

How to Trojan Android Financial Apps (Layer One, May 23, 2015)

[HOPE X] Stupid Whitehat Tricks (2014)

Defcon 21 - Evil DoS Attacks and Strong Defenses (with Matthew Prince)

DEF CON 21 - Sam Bowne - Data Evaporation from SSDs

DEF CON 19 (2011) -- Three Generations of DoS Attacks (with Audience Participation, as Victims)

Windows Server 2012 R2 Surviving an IPv6 RA Flood

Windows Server 2012 Dying Under IPv6 RA Flood

B-Sides Las Vegas Lightning Talks

 

Data Evaporation on SSDs and DoS Attacks (from LayerOne, May 26, 2013)

Parts 1 & 2 of 4

 

Parts 3 & 4 of 4

 

Security+ Lecture Videos on YouTube

Security+ Lecture Audio Files

New IPv6 DoS Attack Kills Mac OS X and Server 2012 (video and explanation) (Nov. 10, 2012)

IPv6 LAN with Vyatta (Nov. 7, 2012)

"Layer 7 Attacks and Defenses" at LayerOne, May 28, 2011
Part 1 of 4     Part 2 of 4     Part 3 of 4     Part 4 of 4

Securabit podcast with Sam Bowne on IPv6 (5-4-2011)

YouTube - Wikileaks Update with Sam Bowne

YouTube - Defcon 2010 - Who cares about IPv6 - Sam Bowne

Podcasts with Gordon, Mike, and Sam

Serious Unpatched Windows IPv6 RA Vuln

Videos of Sam's IPv6 Class

Video of the 5-1-2010 San Francisco wardrive

Videos of CNIT 10 Lectures

Kyle Rankin on His Career in Linux Networking

Videos of CNIT 123 Lectures

Ch 1: Ethical Hacking Overview

Ch 2: TCP/IP Concepts Review     Part 1     Part 2

Ch 3: Network and Computer Attacks

Ch 8: Microsoft Operating System Vulnerabilities     Part 1     Part 2

Ch 9: Linux Operating System Vulnerabilities     Part 1     Part 2

Ch 11: Hacking Wireless Networks     Part 1     Part 2

Ch 12: Cryptography     Part 1     Part 2

Videos of CNIT 124 Lectures

Ch 3: Enumeration

Ch 12: Hacking the Internet User     Part 1     Part 2

Videos of CNIT 202E Lectures

Ch 4a: Distance Vector Routing Protocols Part 1

Ch 4b: Distance Vector Routing Protocols Part 2

Supernetting

Ch 7a: RIPv2 Part 1

Ch 7b: RIPv2 Part 2

Videos of CNIT 345 Lectures

Ch 20: Windows 7: Tuning Up and Monitoring Performance



Videos of Hacking at Random 2009

Welcoming Ceremonies
Quantum Cryptography--An Introduction
Wikileaks
Anonymous vs. Scientology
Electrical enginering with freelibre open source software
Teh Internetz are Pwned
Rootkits are Awesome
The Complex Ethics of Piracy
Flipping the Phishing Con Game (starts at 4:35)
Design and Build a 2 MeV Cyclotron, Part 1    Part 2    Part 3
Securing networks from an ISP perspective (starts at 4:53)
Protheses for 50 instead of 250000
Programming the Cloud
How We Break Into Domains
Airprobe, Monitoring GSM traffic with USRP
Cracking A5 GSM encryption



Last modified: 7-24-16