Parent directory/ | - | - |
1000 Ways to Die in Mobile Oauth.mp4 | 46.5 MiB | 2021 Apr 02 06:11 |
A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land.mp4 | 57.8 MiB | 2021 Apr 02 06:11 |
A Lightbulb Worm.mp4 | 30.4 MiB | 2021 Apr 02 06:11 |
A Retrospective on the Use of Export Cryptography.mp4 | 64.8 MiB | 2021 Apr 02 06:11 |
AMSI - How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It.mp4 | 52.7 MiB | 2021 Apr 02 06:11 |
AVLeak - Fingerprinting Antivirus Emulators for Advanced Malware Evasion.mp4 | 34.9 MiB | 2021 Apr 02 06:11 |
Abusing Bleeding Edge Web Standards for Appsec Glory.mp4 | 40.6 MiB | 2021 Apr 02 06:11 |
Access Keys Will Kill You Before You Kill the Password.mp4 | 35.2 MiB | 2021 Apr 02 06:11 |
Account Jumping Post Infection Persistency & Lateral Movement in AWS.mp4 | 39.7 MiB | 2021 Apr 02 06:11 |
Adaptive Kernel Live Patching - An Open Collaborative Effort.mp4 | 50.6 MiB | 2021 Apr 02 06:11 |
Advanced CAN Injection Techniques for Vehicle Networks.mp4 | 72.2 MiB | 2021 Apr 02 06:11 |
AirBnBeware - Short Term Rentals Long Term Pwnage.mp4 | 46.9 MiB | 2021 Apr 02 06:11 |
An AI Approach to Malware Similarity Analysis - Mapping the Malware Genome With a Deep Neural Network.mp4 | 35.2 MiB | 2021 Apr 02 06:11 |
An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs.mp4 | 29.1 MiB | 2021 Apr 02 06:11 |
An Insider's Guide to Cyber-Insurance and Security Guarantees.mp4 | 54.1 MiB | 2021 Apr 02 06:11 |
Analysis of the Attack Surface of Windows 10 Virtualization-Based Security.mp4 | 49.4 MiB | 2021 Apr 02 06:11 |
Applied Machine Learning for Data Exfil and Other Fun Topics.mp4 | 48.7 MiB | 2021 Apr 02 06:11 |
Attacking SDN Infrastructure - Are We Ready for the Next-Gen Networking.mp4 | 25.3 MiB | 2021 Apr 02 06:11 |
Augmenting Static Analysis Using Pintool - Ablation.mp4 | 45.9 MiB | 2021 Apr 02 06:11 |
Bad for Enterprise - Attacking BYOD Enterprise Mobile Security Solutions.mp4 | 42.0 MiB | 2021 Apr 02 06:11 |
BadTunnel - How Do I Get Big Brother Power.mp4 | 25.5 MiB | 2021 Apr 02 06:11 |
BadWPAD.mp4 | 24.7 MiB | 2021 Apr 02 06:11 |
Behind the Scenes of iOS Security.mp4 | 62.8 MiB | 2021 Apr 02 06:11 |
Beyond the Mcse - Active Directory for the Security Professional.mp4 | 52.4 MiB | 2021 Apr 02 06:11 |
Blunting the Phisher's Spear - A Risk-Based Approach.mp4 | 34.3 MiB | 2021 Apr 02 06:11 |
Breaking FIDO - Are Exploits in There.mp4 | 37.5 MiB | 2021 Apr 02 06:11 |
Breaking Hardware-Enforced Security With Hypervisors.mp4 | 53.7 MiB | 2021 Apr 02 06:11 |
Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX.mp4 | 47.1 MiB | 2021 Apr 02 06:11 |
Breaking Payment Points of Interaction (POI).mp4 | 60.7 MiB | 2021 Apr 02 06:11 |
Brute-Forcing Lockdown Harddrive Pin Codes.mp4 | 31.2 MiB | 2021 Apr 02 06:11 |
Building Trust & Enabling Innovation for Voice Enabled IoT.mp4 | 40.9 MiB | 2021 Apr 02 06:11 |
Building a Product Security Incident Response Team - Learnings From the Hivemind.mp4 | 29.5 MiB | 2021 Apr 02 06:11 |
Call Me - Gathering Threat Intelligence on Telephony Scams to Detect Fraud.mp4 | 57.4 MiB | 2021 Apr 02 06:11 |
Can You Trust Me Now An Exploration Into the Mobile Threat Landscape.mp4 | 52.3 MiB | 2021 Apr 02 06:11 |
Canspy - A Platform for Auditing Can Devices.mp4 | 43.5 MiB | 2021 Apr 02 06:11 |
Captain Hook - Pirating AVS to Bypass Exploit Mitigations.mp4 | 40.8 MiB | 2021 Apr 02 06:11 |
Capturing 0Day Exploits With Perfectly Placed Hardware Traps.mp4 | 52.4 MiB | 2021 Apr 02 06:11 |
Certificate Bypass - Hiding and Executing Malware from a Digitally Signed Executable.mp4 | 27.5 MiB | 2021 Apr 02 06:11 |
Crippling HTTPs With Unholy PAC.mp4 | 48.1 MiB | 2021 Apr 02 06:11 |
Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic.mp4 | 53.9 MiB | 2021 Apr 02 06:11 |
Cunning With CNG - Soliciting Secrets From Schannel.mp4 | 52.0 MiB | 2021 Apr 02 06:11 |
Cyber War in Perspective - Analysis From the Crisis in Ukraine.mp4 | 28.9 MiB | 2021 Apr 02 06:11 |
DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes.mp4 | 59.7 MiB | 2021 Apr 02 06:11 |
Dangerous Hare - Hanging Attribute References Hazards Due to Vendor Customization.mp4 | 23.5 MiB | 2021 Apr 02 06:11 |
Dark Side of the DNS Force.mp4 | 22.5 MiB | 2021 Apr 02 06:11 |
Defense at Hyperscale - Technologies and Policies for a Defensible Cyberspace.mp4 | 66.7 MiB | 2021 Apr 02 06:11 |
Demystifying the Secure Enclave Processor.mp4 | 54.4 MiB | 2021 Apr 02 06:11 |
Design Approaches for Security Automation.mp4 | 36.2 MiB | 2021 Apr 02 06:11 |
Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf.mp4 | 48.7 MiB | 2021 Apr 02 06:11 |
Does Dropping USB Drives in Parking Lots and Other Places Really Work.mp4 | 39.7 MiB | 2021 Apr 02 06:11 |
Drone Attacks on Industrial Wireless - A New Front in Cyber Security.mp4 | 48.1 MiB | 2021 Apr 02 06:11 |
Dungeons Dragons and Security.mp4 | 31.6 MiB | 2021 Apr 02 06:11 |
Exploiting Curiosity and Context - How to Make People Click on a Dangerous Link.mp4 | 41.1 MiB | 2021 Apr 02 06:11 |
Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool.mp4 | 47.0 MiB | 2021 Apr 02 06:11 |
GreatFET - Making GoodFET Great Again.mp4 | 51.9 MiB | 2021 Apr 02 06:11 |
HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows.mp4 | 56.4 MiB | 2021 Apr 02 06:11 |
HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things.mp4 | 59.3 MiB | 2021 Apr 02 06:11 |
HTTP Cookie Hijacking in the Wild - Security and Privacy Implications.mp4 | 46.1 MiB | 2021 Apr 02 06:11 |
Hacking Next-Gen ATMs - From Capture to Cashout.mp4 | 31.8 MiB | 2021 Apr 02 06:11 |
Hackproofing Oracle Ebusiness Suite.mp4 | 53.9 MiB | 2021 Apr 02 06:11 |
Hardening AWS Environments and Automating Incident Response for AWS Compromises.mp4 | 52.5 MiB | 2021 Apr 02 06:11 |
Hell on Earth - From Browser to System Compromise.mp4 | 47.2 MiB | 2021 Apr 02 06:11 |
Horse Pill - A New Type of Linux Rootkit.mp4 | 50.1 MiB | 2021 Apr 02 06:11 |
I Came to Drop Bombs - Auditing the Compression Algorithm Weapon Cache.mp4 | 35.4 MiB | 2021 Apr 02 06:11 |
Into the Core - In-Depth Exploration of Windows 10 IoT Core.mp4 | 51.9 MiB | 2021 Apr 02 06:11 |
Intra-Process Memory Protection for Applications on ARM and X86 - Leveraging the ELF ABI.mp4 | 58.3 MiB | 2021 Apr 02 06:11 |
Investigating DDOS - Architecture Actors and Attribution.mp4 | 62.9 MiB | 2021 Apr 02 06:11 |
Iran's Soft-War for Internet Dominance.mp4 | 54.5 MiB | 2021 Apr 02 06:11 |
Keynote - The Hidden Architecture of our Time - Why This Internet Worked, How We Could Lose It....mp4 | 99.1 MiB | 2021 Apr 02 06:11 |
Keystone Engine - Next Generation Assembler Framework.mp4 | 24.8 MiB | 2021 Apr 02 06:11 |
Language Properties of Phone Scammers - Cyberdefense At the Level of the Human.mp4 | 57.1 MiB | 2021 Apr 02 06:11 |
Measuring Adversary Costs to Exploit Commercial Software....mp4 | 58.3 MiB | 2021 Apr 02 06:11 |
Memory Forensics Using Virtual Machine Introspection for Cloud Computing.mp4 | 35.8 MiB | 2021 Apr 02 06:11 |
Next-Generation of Exploit Kit Detection By Building Simulated Obfuscators.mp4 | 19.8 MiB | 2021 Apr 02 06:11 |
Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS.mp4 | 58.7 MiB | 2021 Apr 02 06:11 |
O-Checker - Detection of Malicious Documents Through Deviation From File Format Specifications.mp4 | 22.8 MiB | 2021 Apr 02 06:11 |
OSS Security Maturity - Time to Put on Your Big Boy Pants.mp4 | 61.8 MiB | 2021 Apr 02 06:11 |
Ouroboros - Tearing Xen Hypervisor With the Snake.mp4 | 22.6 MiB | 2021 Apr 02 06:11 |
Over the Edge - Silently Owning Windows 10's Secure Browser.mp4 | 37.5 MiB | 2021 Apr 02 06:11 |
PLC-Blaster - A Worm Living Solely in the PLC.mp4 | 41.8 MiB | 2021 Apr 02 06:11 |
Panel - Removing Roadblocks to Diversity.mp4 | 140.2 MiB | 2021 Apr 02 06:11 |
Pangu 9 Internals.mp4 | 50.6 MiB | 2021 Apr 02 06:11 |
Pay No Attention to That Hacker Behind the Curtain - A Look Inside the Black Hat Network.mp4 | 61.2 MiB | 2021 Apr 02 06:11 |
Pindemonium - A DBI-Based Generic Unpacker for Windows Executable.mp4 | 31.3 MiB | 2021 Apr 02 06:11 |
Pwnie Awards 2016.mp4 | 53.0 MiB | 2021 Apr 02 06:11 |
Pwning Your Java Messaging With Deserialization Vulnerabilities.mp4 | 49.8 MiB | 2021 Apr 02 06:11 |
Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy.mp4 | 52.1 MiB | 2021 Apr 02 06:11 |
SGX Secure Enclaves in Practice - Security and Crypto Review.mp4 | 54.6 MiB | 2021 Apr 02 06:11 |
Samsung Pay - Tokenized Numbers Flaws and Issues.mp4 | 21.7 MiB | 2021 Apr 02 06:11 |
Secure Penetration Testing Operations - Demonstrated Weaknesses in Learning Material and Tools.mp4 | 48.9 MiB | 2021 Apr 02 06:11 |
Security Through Design - Making Security Better By Designing for People.mp4 | 34.3 MiB | 2021 Apr 02 06:11 |
Side-Channel Attacks on Everyday Applications.mp4 | 26.4 MiB | 2021 Apr 02 06:11 |
Subverting Apple Graphics - Practical Approaches to Remotely Gaining Root.mp4 | 54.0 MiB | 2021 Apr 02 06:11 |
TCP Injection Attacks in the Wild - a Large Scale Study.mp4 | 41.3 MiB | 2021 Apr 02 06:11 |
The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android.mp4 | 58.7 MiB | 2021 Apr 02 06:11 |
The Art of Reverse Engineering Flash Exploits.mp4 | 55.9 MiB | 2021 Apr 02 06:11 |
The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM.mp4 | 51.4 MiB | 2021 Apr 02 06:11 |
The Linux Kernel Hidden Inside Windows 10.mp4 | 63.0 MiB | 2021 Apr 02 06:11 |
The Remote Malicious Butler Did It.mp4 | 56.4 MiB | 2021 Apr 02 06:11 |
The Risk From Power Lines - How to Sniff the G3 and Prime Data and Detect the Interfere Attack.mp4 | 19.0 MiB | 2021 Apr 02 06:11 |
The Tao of Hardware the Te of Implants.mp4 | 56.0 MiB | 2021 Apr 02 06:11 |
The Year in Flash.mp4 | 35.7 MiB | 2021 Apr 02 06:11 |
Timing Attacks Have Never Been So Practical - Advanced Cross-Site Search Attacks.mp4 | 51.7 MiB | 2021 Apr 02 06:11 |
Towards a Holistic Approach in Building Intelligence to Fight Crimeware.mp4 | 50.5 MiB | 2021 Apr 02 06:11 |
Understanding HL7 2.X Standards, Pen Testing, and Defending HL7 2.X Messages.mp4 | 57.2 MiB | 2021 Apr 02 06:11 |
Unleash the Infection Monkey - A Modern Alternative to Pen-Tests.mp4 | 37.5 MiB | 2021 Apr 02 06:11 |
Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency.mp4 | 56.4 MiB | 2021 Apr 02 06:11 |
Using EMET to Disable EMET.mp4 | 56.5 MiB | 2021 Apr 02 06:11 |
Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process.mp4 | 39.7 MiB | 2021 Apr 02 06:11 |
Viral Video - Exploiting SSRF in Video Converters.mp4 | 35.5 MiB | 2021 Apr 02 06:11 |
VoIP Wars - the Phreakers Awaken.mp4 | 63.7 MiB | 2021 Apr 02 06:11 |
Watching Commodity Malware Get Sold to a Targeted Actor.mp4 | 31.2 MiB | 2021 Apr 02 06:11 |
Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter.mp4 | 41.3 MiB | 2021 Apr 02 06:11 |
Web Application Firewalls - Analysis of Detection Logic.mp4 | 44.9 MiB | 2021 Apr 02 06:11 |
What's the DFIRence for ICS.mp4 | 27.3 MiB | 2021 Apr 02 06:11 |
When Governments Attack - State Sponsored Malware Attacks Against Activists Lawyers and Journalists.mp4 | 52.0 MiB | 2021 Apr 02 06:11 |
When the Cops Come A-Knocking - Handling Technical Assistance Demands from Law Enforcement.mp4 | 50.0 MiB | 2021 Apr 02 06:11 |
Windows 10 Mitigation Improvements.mp4 | 57.5 MiB | 2021 Apr 02 06:11 |
Windows 10 Segment Heap Internals.mp4 | 44.0 MiB | 2021 Apr 02 06:11 |
Xenpwn - Breaking Paravirtualized Devices.mp4 | 60.2 MiB | 2021 Apr 02 06:11 |