lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 12 Apr 2012 07:07:10 +0200
From: Research <research@...nerability-lab.com>
To: full-disclosure@...ts.grok.org.uk
Subject: CRUNCH TV SHOW - Live Stream & Security Videos

Title:
======
CRUNCH TV SHOW - Live Stream & Security Videos


Date:
=====
2012-04-11


References:
===========
Download:	http://www.vulnerability-lab.com/resources/videos/508.mov
View: 		http://www.youtube.com/watch?v=G9ECcxvB0dQ



VL-ID:
=====
508


Status:
========
Published


Exploitation-Technique:
=======================
TV Show


Severity:
=========
Critical


Details:
========
This is the new trailer for the new Crunch TV Security Show with startup in may 2012.
The first moderator of the security tv show is the well known John Thomas Draper alias Captain Crunch.
Co-moderator & researcher of the show is the well known exploiter Benjamin Kunz Mejri from Germany.


Credits:
========
John Thomas Draper (born 1943), also known as Captain Crunch, Crunch or Crunchman (after Cap`n Crunch, 
the mascot of a breakfast cereal), is an American computer programmer and former phone phreak. He is a 
legendary figure within the computer programming world.

Draper is the son of a U.S. Air Force engineer; he described his father as distant in an interview 
published on the front page of the Jan 13–14, 2007 issue of The Wall Street Journal. Draper himself 
entered the Air Force in 1964, and while stationed in Alaska helped his fellow servicemen make free 
phone calls home by devising access to a local telephone switchboard. After Alaska, he was stationed 
at Charleston Air Force Station in Maine. In 1967, he created WKOS [W-\"chaos\"], a pirate station in 
nearby Dover-Foxcroft, but had to shut it down when a legitimate radio station, WDME, objected. He 
was honorably discharged from the Air Force in 1968 and did military-related work for several employers 
in the San Francisco Bay Area. He adopted the counterculture of the times and operated a pirate radio 
station out of a Volkswagen van.

One oft-repeated story featuring Captain Crunch goes as follows: Draper picked up a public phone, then 
proceeded to “phreak” his call around the world. At no charge, he routed a call through different phone 
switches in countries such as Japan, Russia and England. Once he had set the call to go through dozens of 
countries, he dialed the number of the public phone next to him. A few minutes later, the phone next to 
him rang. Draper spoke into the first phone, and, after quite a few seconds, he heard his own voice very 
faintly on the other phone. He sometimes repeated this stunt at parties. Draper also claimed that he and 
a friend once placed a direct call to the White House during the Nixon administration, and after giving 
the operator President Nixon\'s secret code name of \"Olympus\", and asking to speak to the president about 
a national emergency, they were connected with someone who sounded like Richard Nixon; Draper’s friend 
told the man about a toilet paper shortage in Los Angeles, at which point the person on the other end of 
the line angrily asked them how they\'d managed to get connected to him. Draper was also a member of the 
Homebrew Computer Club.

&&

Benjamin Kunz M.(28) is active as a penetration tester and security analyst for private and public security firms, 
hosting entities, banks, isp(telecom) and ips. His specialties are security checks(penetrationtests) on services, 
software, applications, malware analysis, underground economy, government protection or cyberwar analysis, reverse 
engineering, lectures or presentations and workshops about IT Security. During his work as a penetration tester 
and vulnerability researcher, many open- or closed source applications, software and services were formed more 
secure. In 1997, Benjamin K.M. founded a non-commercial and independent security research group called, 
Global Evolution - Security Research Group which is still active today.

From 2010 to 2011, Benjamin M. and Pim C. (Research Team) identified over 300 zero day vulnerabilities in well known 
products from companies such as DELL, Barracuda, Mozilla, Kaspersky, McAfee, Google, Fortigate, Opera, Cyberoam, 
Safari, Endian, Skype, Asterisk, Astaro, PBX & SonicWall. In 2010 he founded the company Evolution Security. 
After the firm`s establishment arose the Vulnerability Lab as the legal european initiative for vulnerability 
researchers, analysts, penetration testers, and serious hacker groups. Ben is also the leader of the Contest + 
VLab Research Team. He have a lot of stable references by solved events, interviews or contests/wargames like 
ePost SecCup, SCS2, 27c3, EH2008, Har2009, Da-op3n & he provids exclusive zero-day exploitation sessions/releases.


Disclaimer:
===========
The information provided in this video is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

    						Copyright © 2012|Vulnerability-Lab




-- 
VULNERABILITY RESEARCH LABORATORY TEAM
Website: www.vulnerability-lab.com
Mail: research@...nerability-lab.com


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ