DOCUMENTARIES
RESOURCE
TITLE / DESCRIPTION ( Click The Title For Full Description )
DOWNLOADS
STREAM ONLINE
MORE INFO
VIDEO
DOCUMENTARY
The Secret History of Hacking
Explains the beginnings of hacking. Starting with phone hackers or 'phreaks' who could make free phone calls soon taking complete control of the telephone systems. Covers the lives of Captain Crunch, Kevin Mitnick, Steve Wozniak, and several other key hackers. Hackers were once embraced, due to bad press they are now feared.
[ Download AVI ]
[ Download MP4 ]
[ YOUTUBE ]
IMDB
VIDEO
DOCUMENTARY
Web Warriors
This documentary explains the differences between white hat and black hat hackers. Examples of hacks that have been in the wild including virii, power grid hacks, etc. Hear from professional hackers about how the community works, the motivation for their hobby, and utilizing hacked computers to work as a team against another target.
[ Download AVI ]
[ Torrent AVI ]
[ YOUTUBE ]
IMDB
VIDEO
DOCUMENTARY
RevolutionOS
This documentary tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement. While Microsoft may be the biggest software company in the world, not every computer user is a fan of their products, or their way of doing business. While Microsoft's Windows became the most widely used operating system for personal computers in the world, many experts took issue with Microsoft's strict policies regarding licensing, ownership, distribution, and alteration of their software. The objections of many high-profile technology experts, most notably Richard Stallman, led to what has become known as "the Open Source Movement," which is centered on the belief that computer software should be free both in the economic and intellectual senses of the word. Eventually, one of Stallman's admirers, Linus Torvalds, created a new operating system called Linux, a freely distributed software which many programmers consider to be markedly superior to Windows. Revolution OS is a documentary that examines the genesis of the Open Source Movement, and explores and explains the technical and intellectual issues involved in a manner understandable to computer aficionados and non-techheads alike.
[ Download AVI ]
[ Torrent AVI ]
[ Torrent AVI ]
[ YOUTUBE ]
REVOLUTION-OS
VIDEO
DOCUMENTARY
In The Realm of the Hackers
Australian documentary directed by Kevin Anderson about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers who hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
[ Download AVI ]
[ YOUTUBE ]
IMDB
VIDEO
DOCUMENTARY
Inside the Dark Web
Twenty-five years after the World Wide Web was created, the issue of surveillance has become the greatest controversy of its existence. With many concerned that governments and corporations can monitor people's every move, this programme meets hackers and scientists who are using technology to fight back, as well as the law enforcement officers who believe it's leading to opportunities for risk-free crimes. With contributors including World Wide Web inventor Tim Berners-Lee and WikiLeaks co-founder Julian Assange. Includes information regarding TOR and Bitcoin and online anonymity.
[ Download MP4 ]
[ YOUTUBE ]
IMDB
VIDEO
DOCUMENTARY
The KGB, the Computer, and Me
How does computer crime really work? What does the Internet look like? Find out when a one-time Berkeley hippie/astrophysicist turns detective and gets mixed up with the CIA and KGB. NOVA follows computer sleuth Clifford Stoll as he tracks down a data thief through a maze of military and research computers.
[ Download MP4 ]
[ YOUTUBE ]
IMDB
VIDEO
DOCUMENTARY
Defeating The Hackers
Horizon meets the two men who uncovered Stuxnet, the pioneers of ultra-paranoid computing, a white-hat hacker who showed out how to hack into stand alone cash machines, and explains how companies test resilience.
[ Download Torrent ]
[ DAILY MOTION ]
IMDB
VIDEO
DOCUMENTARY
The Hacker Wars
This documentary covers Anonymous, Antisec and Lulzsec as well as various high profile hacks. The fight for freedom of speech and battles on the internet. Also covers Tripwire and hackers who have been indicted including Jeremy Hammond and Barrett Brown.
[ Download AVI ]
[ YOUTUBE ]
IMDB
VIDEO
DOCUMENTARY
Sonic Outlaws
Within days after the release of Negativlandís clever parody of U2 and Casey Kasem, recording industry giant Island Records descended upon the band with a battery of lawyers intent on erasing the piece from the history of rock music. Craig "Tribulation 99" Baldwin follows this and other intellectual property controversies across the contemporary arts scene. This is an excellent documentary covering the topic of Fair Use.
[ Download AVI ]
[ YOUTUBE ]
IMDB
VIDEO
DOCUMENTARY
Warriors of the Net - How Internet Traffic Works
A great visual representation of how the internet works. Includes information regarding TCP,UDP, and ICMP packets. See how the data travels from when you click a link on the website, leaves your computer, enters the private lan, gets routed to other servers, switches, firewalls, and how this is all done to bring you the internet.
[ Download AVI ]
[ Download MP4 ]
[ YOUTUBE ]
Warriors of the Net
VIDEO
DOCUMENTARY
Triumph of the Nerds - Rise of Accidental Empires
The history of how computers and programming began. The first languages used to help users to easier program computers, how the silicon microchips are created, who invented them, and how they were introduced to the public. See how the first computer clubs were formed, manual programming concepts, how the first software was created, these were the first computer hackers. Includes interviews with Bill Gates, Steve Jobs and other key players.
[ Download AVI ]
[ Download MP4 ]
[ YOUTUBE ]
PBS
VIDEO
DOCUMENTARY
How It's Made - Microprocessors, Circuit Boards, and more.
This is a collection of episodes from the show "How It's Made". These episode clips are all relating to computer technology and is very useful to understand how all this stuff is made. Ever wonder how those CD's are made? Your fiber optics? handheld devices? this goes through the complete manufacturing process. Geek out on the machines!
[ Download AVI ]
[ Torrent MP4 ]
[ YOUTUBE ]
HOW ITS MADE
VIDEO
DOCUMENTARY
Thinking Machines - Creation of the Computer
Covers the history of the computer, and how the basics of computing works. This is a great introduction into the details of a computers past and present. Briefly covers how RAM and CPU's work, various machines built before the personal computer, government funding, punch cards, and how these physical machines became the PC's we use now.
[ Download AVI ]
[ YOUTUBE ]
IMDB



TUTORIALS
RESOURCE
TITLE / DESCRIPTION ( Click The Title For Full Description )
DOWNLOADS
STREAM ONLINE
MORE INFO
VIDEO
TUTORIAL
Mobile Hacker Spaces
A mobile hacking space put simply is a Van, mobile home, or bus, turned into a meeting space and set up to be ready for classes, talks, wardriving, or just to check email while on a trip/outing. This presentation includes everything you need to get a mobile hacker space up and running, the advantages and disadvantages are discussed.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Urban Exploration - A Hackers View
The art of finding entry points into secured or abandoned buildings. Going to floors or areas of buildings nobody else does. Preparing for the exploration of new areas which are possibly rotted, damaged, or otherwsie unsafe. Also some great stories and pictures of places these speakers have gone to in their ventures.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
No Tech Hacking - Hacking without the use of a PC
You'll hear old familiar terms like "dumpster diving", "social engineering", and "shoulder surfing". Gain info about a person by looking at details such as the type of shoe and wear, taking photos of a PC screen or ID badge etc.
[ Download M4V ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Physical Attacks: Beyond Social Engineering and Dumpster Diving
Techniques of industrial espionage and physical security, hacking without a computer, and collecting or recording data both video and audio. Examples and methods covered include physically making your way through electronic locks, numbered keypads, biometric locks, listening to keyboard strokes, listening with lasers, etc. Also relationship based trust, including sex, fake resume's, and display of credentials.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
The Science of Social Engineering
Hypnosis, NLP, and the science of persuasion. This talk has many examples of how the brain works and which choices they make when put into the situation. The power of influence from others, the power of trust etc. Great talk for aspiring social engineers, how the buffer overflow and other hacker tactics work on the brain.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Thinking Outside of the Console
How to use game console to gain access to a network. How these consoles can be hidden and attract little suspicion. The art of covert pentesting, performing security analysis on a network undetected using modified video game systems. Covers the various game consoles such as xbox, playstation, nintendo wii, and the internal hardware.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Hacking with the iPod Touch/Iphone/Ipad
Complete guide to using a mobile 'i' device as a hacking platform. Learn how to hack your iphone first, then which software to install, and finally examples if scanning targets and running exploits on a victim machine.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Is Your Phone PWNED? Auditing, Attacking, and Defending Mobile Devices.
This talk explains various methods of hacking mobile phones. Some real world examples and demonstrations are done to show it in action. Covers technologies like wifi and bluetooth which are standard in most new phones.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Hijacking the Outdoor Digital Billboard Network
Explains various types of digital billboards in use, the companies who create them. How these billboards work, their security flaws, and tools used to hack into them. Covers both survellience, electronic, physical security, and what not to do when hacking into these billboards.
[ Download M4V ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
How To Be A WIFI Ninja
This presentation covers everything you need to know to become a WIFI ninja. How to go through obstacles, examples of devices using this technology, the frequencies used and technical details of the technology. This talk is mostly about setting up WIFI networks with great distance, and understanding the underlying technology.
[ Download M4V ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Penetration Testing WIFI Networks
Aaron Peterson speak about WIFI networks and its inherent flaws. A full rundown on penetration testing and searching for security flaws, how wifi scanning works, the difficulties and common tools for breaking security.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Shifting the Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key
This lecture covers some more complex attacks on WIFI networks. While many people are still using WEP, this insecure protocol is slowly being replaced. This video explains some of the technologies and how they too can be attacked and the traffic 'sniffed'. Software tools are discussed and examples given to better understand.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
WiFish Finder - Who Will Bite The Bait
This is a very short presentation explaining the security problems in over 50% of all computers wifi. Live demonstrations are given showing hwo much info is obtained by members of the audience. Full encryption types, ESSID's, locations, and other information is immediately found as your computer sends this data to anyone looking.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Attacks Against 2Wire Residential Gateway Routers
These are the most common routers on the market today for DSL users. This talk explains some of the ways that these systems can be hacked. Goes over the default passwords, default admin pages and settings, and other useful info.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Lockpicking Forensics - How Lockpicking and Locks Work
Learn the basics of how locks work on the inside. Detailed diagrams explaining how internal mechanisms are designed and how they are defeated. Includes the various tools and methos used to open locks.
[ Download M4V ]
[ Download PDF ]
[ Download PDF #2 ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
High Insecurity - Locks, Lies, and Liability
Special talk relating to high security locks and how they work. Demonstrations of engineering problems and methods to bypass the locking mechanisms. Various security methods are analyzed such as drill proof locks, sawing, and pulling. Lots of info on this one as its nearly 2 hours long, some great footage breaking high security locks live.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Picking Electronic Locks
A brief explanation of how electronic lock systems work and how they can be defeated. Covers various components and attack points in the system. How TCP sequence prediction and other 'old hacks' can be used in these new systems.
[ Download M4V ]
[ Download PDF ]
[ Download PDF #2 ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Keeping Secret Secrets Secret and Sharing Secret Secrets Secretly
What is a secret? Why protect a secret? Why sharing secrets may increase secrecy, using encryption, where to store the encryption key, how to eliminate the encryption key, distributing secrets among groups. Hiding data inside images or audio (steganography), detecting hidden data, tools, physically hiding stuff at home and elsewhere.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Everything about Police Procedure in 50 Minutes
When can the police pull you over? When can they frisk you? How do they determine reasonable suspicion? This talk explains how a cop decides to take interest in your activities. What miranda rights mean to you. when can the police offer frisk you? when can they search your car? knock down your door? Speed traps etc.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Search and Seizure Explained - They Took My Laptop
A brief outline of the Constitutional laws, privacy, the ammendments and how they are applied to search and siezure. Special focus on the 4th and 5th ammendments this talk describes various methods of search and seizure. Simply being pulled over, scanners and xrays that are found in airports, or confiscation of equipment at the border. Should you use a lock and key or a combination lock? How do emails, snail mail, and phone calls apply? Many examples.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Your Mind: Legal Status, Rights, and Securing Yourself
Some examples of how the laws are applied to you and your data. Data in various locations may be covered under different laws. Use of encryption, and your level of education may put you in different categories. What if you hide your data in laptops? usb sticks in your pocket? cell phones? websites? computer clouds? What can be obtained by investigators if they look in your car computers? Prosthetic devices? Does your computer really belong to YOU? What is the best protection? Social Networking, GPS, and more...
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Tactical Exploitation
A new method of gaining entry into computer systems. Tactics used to size up the system, the users, the processes, applications, and existing trust relationships. Target the people, expand the scope of your tests, and you WILL get in. Some examples of great utilities and tools used to break into networks or collect data about the systems and people.
[ Download M4V ]
[ Download PDF ]
[ Download PDF #2 ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Dangerous Minds - The Art of Guerrilla Data Mining
This presentation explains how huge amounts of information collected in the wild such as GPS, emails, chat logs, search results, bank statements etc. can be looked at by a computer to gain intelligence. How does the government find increase chatter over a specific topic? How do they eliminate false positives like popular news stories, or current events which cause natural increases in chatter. Find out how they find criminal networks.
[ Download M4V ]
[ Download PDF ]
[ Download PDF #2 ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Sniffing Keystrokes with Lasers and Voltmeters
What is tempest? Explanation of emissions and electro magnetic pulses utilized in keyboard, and display devices and how to read or use this information without detection. See what someone is typing in the room next to you by simply plugging into the electrical outlet and measuring the leakage into the power grid.
[ Download M4V ]
[ Download PDF ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Hacking the Smart Grid Power System
Full white paper and video explaining how the new SMART power grid system works and its weaknesses. This includes everything from privacy concerns, to leeching free power. This new system is flawed by design and now being implemented.
[ Download M4V ]
[ Download PDF ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Hacking the Smart Parking Meter
This talk explains the various hardware of 'smart' parking meters, ports for access, and the software. Various meters are covered mostly in use in the Bay Area of California. Understand how the security of these devices work, how money is collected, smart cards, and how to get your own meter to play with. This is a great example of how a hack is done from the ground up. Great blueprint/methodology for your own hardware hacking projects.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Satellite Imagery Analysis
What are the good and bad uses of satellite images? What things have been caught with imaging from google maps? How were the first aerial shots taken? Did you know UV and Heat can be viewed through satellite imaging? Also covers various ways to sample the images, design considerations for sensors, collecting data and putting it to use.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
RFID Mythbusting
The purpose of this lecture is to demonstrate the insecurity of RFID devices and cards. Chris shows his custom reading device built out of off the shelf components, explains how to build and obtain reader devices, the incredible distance at which these tags can be read, and other security problems with the encryption and protocols.
[ Download M4V ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Identification Card Security: Past, Present, Future
This great presentation covers the REAL ID Act, History of identification cards, Amateur ID Manufacturing, and other High Tech ID concepts. Our reliance on ID, fake ID's, privacy issues, magnetic strips, rfid, etc. Complete demonstration creating an ID with laminate, magstripe, hologram, UV, and where to purchase supplies.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Biometric and Token Based Access Control
Examples of various biometric systems and attacks. A demo showing how to attack the system. Complete diagrams of how these systems work and the various components. Cover mag stripe cards, proximity cards, concealed barcodes, smart cards, and other systems. Also covers eye scans, hand scans, fingerprint scans, and how they are defeated.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Are You Socially Owned in the Cloud?
Covers social networking and other sites which store your personal data. Including facebook, myspace, youtube, Amazon, itunes, etc. Where does your info go? Who owns it? Can you delete it? What happens when the owner dies?
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Social Zombies - Your Friends Want To Eat Your Brains
Social networks and blogs are the 4th most popular activity on the internet. How do these places make money off of your personal info? Fake profiles and spotting bots. Using facebook to steal personal information or even learn passwords. This talk covers various attacks, disinformation, spam, bots, and other exploits in these websites.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
How Can I Pwn Thee? Let Me Count The Ways
This talk covers several techniques to hack into a system. From wifi hot spots to social engineering random passengers on a flight. Also covers methods to keep yourself safe while travelling, and the most common security risks observed in travellers, and hacking cell phones and bluetooth devices.
[ Download M4V ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Hacking and Playing with Barcodes
How barcodes work. Learn about how they are used for routing in mail systems, transit systems, tagging of items etc. This video also explains how to make or modify your own barcodes, methods to read them, and how to use your own specially formatted barcodes to hack into systems that are not secure.
[ Download M4V ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Hacking Iraq
This presentation covers the security and infrastructure in IRAQ. Cellphone's, Internet, Land Lines, and other communications are covered. Also covers the IED devices, triggering systems, and how they are created or categorized.
[ Download M4V ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Death Envelope - Midieval Solution to a 21st Century Problem
Covers the topic of a "death envelope". What is a death envelope? Who should create one? What should it contain? This covers how to create the envelope, how to update the envelope, combining computers with physical access etc. This information can be as simple as personal account info and passwords, or financial secrets.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
HAM for Hackers - Take Back the Airwaves
Who is experimenting with HAM radio? What frequencies can you use? What can be broadcast? This covers the use of encryption, profanity, licensing, wattage limits, amateur radio, and bandwidth. A great detailed intro into the technology in less than 20 minutes, how to get started, how to utilize the frequencies for experimentation, and HAM radio users dying off.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Climbing Everest - An Insiders Look at One States Voting System
An insider hired to check the security of Ohios voting system explains how the entire system works, its flaws, and how the technical systems work. Also details of who owns the voting machines, who designed them, and the fact that 80% of all votes are currently being counted on systems made by 2 brothers who own 2 companies?
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Boomstick Fu - The Fundamentals of Physical Security
This covers defensive weapon ownership. How to stay within the law and keeping your hardware legal. Rules for keeping your guns safe, how to hold your gun, why you should own a gun, and preparing for the worst case. What kind of gun should you buy? Autoloading vs Pump? Shotgun vs Handgun? Ammo? Stun Guns? Tasers? Pepper Spray?
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Hackers Vs Disasters - Hacker Skills for the Wilderness and Disaster Survival
Explains the types of disasters you may need to prepare for, the importance of preparing BEFORE they occur. Everything from leaving your house in 5 minutes, to being stuck without electricity for more than 5 hours. This video includes Fire, Shelter, Signaling, Water and more from a hackers perspective.
[ Download M4V ]
[ Download PDF ]
[ Download PDF #2 ]
[ YOUTUBE ]
DEFCON
VIDEO
TUTORIAL
Personal Disaster Preparedness: Surviving mass EMP events.
Did you know a single warhead over the USA can take out ALL modern electronics? How do you get out of the building? A giant EMP destroying all electronics and creating fires in some could be triggered by solar flares, nuclear devices, EMP specific weapons etc. Avoid trampling, visibility, finding water, guns, medicines, doctors, avoiding the panic and madness of others.
[ Download M4V ]
[ Download PDF ]
[ YOUTUBE ]
DEFCON










Please Report Any Broken Links, Suggestions, Complaints, or Problems With Content to: clowndotpy@clowndotpy.com
Please share information and content found here with others and include a link to www.clownsec.com to let them know where you found it!
If you find materials on this page useful please donate or purchase the content from the authors directly.

Copywrong 2015 Clownsec at www.clownsec.com