Title:
======
CRUNCH TV SHOW - Live Stream & Security Videos

Date:
=====
2012-04-11


References:
===========
Download:       http://www.vulnerability-lab.com/resources/videos/508.mov
View:           http://www.youtube.com/watch?v=G9ECcxvB0dQ



VL-ID:
=====
508


Status:
========
Published


Exploitation-Technique:
=======================
TV Show


Severity:
=========
Critical


Details:
========
This is the new trailer for the new Crunch TV Security Show with startup in may 
2012.
The first moderator of the security tv show is the well known John Thomas 
Draper alias Captain Crunch.
Co-moderator & researcher of the show is the well known exploiter Benjamin Kunz 
Mejri from Germany.


Credits:
========
John Thomas Draper (born 1943), also known as Captain Crunch, Crunch or 
Crunchman (after Cap`n Crunch, 
the mascot of a breakfast cereal), is an American computer programmer and 
former phone phreak. He is a 
legendary figure within the computer programming world.

Draper is the son of a U.S. Air Force engineer; he described his father as 
distant in an interview 
published on the front page of the Jan 13–14, 2007 issue of The Wall Street 
Journal. Draper himself 
entered the Air Force in 1964, and while stationed in Alaska helped his fellow 
servicemen make free 
phone calls home by devising access to a local telephone switchboard. After 
Alaska, he was stationed 
at Charleston Air Force Station in Maine. In 1967, he created WKOS 
[W-\"chaos\"], a pirate station in 
nearby Dover-Foxcroft, but had to shut it down when a legitimate radio station, 
WDME, objected. He 
was honorably discharged from the Air Force in 1968 and did military-related 
work for several employers 
in the San Francisco Bay Area. He adopted the counterculture of the times and 
operated a pirate radio 
station out of a Volkswagen van.

One oft-repeated story featuring Captain Crunch goes as follows: Draper picked 
up a public phone, then 
proceeded to “phreak” his call around the world. At no charge, he routed a call 
through different phone 
switches in countries such as Japan, Russia and England. Once he had set the 
call to go through dozens of 
countries, he dialed the number of the public phone next to him. A few minutes 
later, the phone next to 
him rang. Draper spoke into the first phone, and, after quite a few seconds, he 
heard his own voice very 
faintly on the other phone. He sometimes repeated this stunt at parties. Draper 
also claimed that he and 
a friend once placed a direct call to the White House during the Nixon 
administration, and after giving 
the operator President Nixon\'s secret code name of \"Olympus\", and asking to 
speak to the president about 
a national emergency, they were connected with someone who sounded like Richard 
Nixon; Draper’s friend 
told the man about a toilet paper shortage in Los Angeles, at which point the 
person on the other end of 
the line angrily asked them how they\'d managed to get connected to him. Draper 
was also a member of the 
Homebrew Computer Club.

&&

Benjamin Kunz M.(28) is active as a penetration tester and security analyst for 
private and public security firms, 
hosting entities, banks, isp(telecom) and ips. His specialties are security 
checks(penetrationtests) on services, 
software, applications, malware analysis, underground economy, government 
protection or cyberwar analysis, reverse 
engineering, lectures or presentations and workshops about IT Security. During 
his work as a penetration tester 
and vulnerability researcher, many open- or closed source applications, 
software and services were formed more 
secure. In 1997, Benjamin K.M. founded a non-commercial and independent 
security research group called, 
Global Evolution - Security Research Group which is still active today.

From 2010 to 2011, Benjamin M. and Pim C. (Research Team) identified over 300 
zero day vulnerabilities in well known 
products from companies such as DELL, Barracuda, Mozilla, Kaspersky, McAfee, 
Google, Fortigate, Opera, Cyberoam, 
Safari, Endian, Skype, Asterisk, Astaro, PBX & SonicWall. In 2010 he founded 
the company Evolution Security. 
After the firm`s establishment arose the Vulnerability Lab as the legal 
european initiative for vulnerability 
researchers, analysts, penetration testers, and serious hacker groups. Ben is 
also the leader of the Contest + 
VLab Research Team. He have a lot of stable references by solved events, 
interviews or contests/wargames like 
ePost SecCup, SCS2, 27c3, EH2008, Har2009, Da-op3n & he provids exclusive 
zero-day exploitation sessions/releases.


Disclaimer:
===========
The information provided in this video is provided as it is without any 
warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and 
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, 
indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have 
been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential 
or incidental damages so the foregoing limitation 
may not apply. Any modified copy or reproduction, including partially usages, 
of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified 
form is granted. All other rights, including the use of 
other media, are reserved by Vulnerability-Lab or its suppliers.

                                                Copyright © 
2012|Vulnerability-Lab




-- 
VULNERABILITY RESEARCH LABORATORY TEAM
Website: www.vulnerability-lab.com
Mail: resea...@vulnerability-lab.com


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to