FileMood

Download Security BSides

Security BSides

Name

Security BSides

  DOWNLOAD Copy Link

Total Size

94.3 GB

Total Files

759

Hash

2EA57271A42A3AFC3AD18129A4582B6C0A41505A

/BSidesCHS 2013/

BSidesCHS 2013 - Session 03 - Waging War on an Entire City.mp4

1.7 GB

BSidesCHS 2013 - Session 01 - Passive Recon.mp4

87.0 MB

BSidesCHS 2013 - Session 02 - Java Shellcode Execution.mp4

134.8 MB

/.../BSides Augusta 2013/

BSidesAugusta 2013 Christopher Campbell and Matthew Graeber - Living Off the Land.mp4

115.7 MB

BSidesAugusta 2013 David Bianco - Enterprise Security Monitoring.mp4

192.5 MB

BSidesAugusta 2013 David Coursey - Sheep and Sheepdogs Employing EMET for Application Security.mp4

131.8 MB

BSidesAugusta 2013 Doug Burks - Security Onion Peeling Back the Layers of Your Network in Minutes.mp4

219.0 MB

BSidesAugusta 2013 Martin Holste - Not BigData, AnyData.mp4

153.5 MB

BSidesAugusta 2013 Mike Jones - Unconventional Methodologies to consider in Information Security.mp4

73.4 MB

BSidesAugusta 2013 Paul Coggin - Digital Energy BPT (Basic Persistent Threat).mp4

82.0 MB

BSidesAugusta 2013 Richard Bejtlich Keynote.mp4

198.3 MB

BSidesAugusta 2013 Ron Martin - Human Shields for your Network.mp4

86.9 MB

BSidesAugusta 2013 Tim Tomes - Look Ma, No Exploits! - The Recon-ng Framework.mp4

105.7 MB

BSidesAugusta 2013 Brad Shoop & Chris Rimondi - Eyeing the Onion.mp4

179.1 MB

/.../BSides Augusta 2014/

BSidesAugusta 2014 Chris Campbell - Using Microsofts Incident Response Language.mp4

156.0 MB

BSidesAugusta 2014 Chris Sanders - Defeating Cognitive Bias and Developing Analytic Technique.mp4

141.0 MB

BSidesAugusta 2014 Chris Sistrunk - ICS SCADA Defense.mp4

154.6 MB

BSidesAugusta 2014 Chris Truncer - Pentester++.mp4

138.5 MB

BSidesAugusta 2014 David Dewey - App Wrapping What does that even mean.mp4

55.3 MB

BSidesAugusta 2014 Jacob Williams - Spying on your employees using memory.mp4

134.3 MB

BSidesAugusta 2014 Jeff Murri - Is that hardware in your toolkit, or are you just.mp4

172.7 MB

BSidesAugusta 2014 Mark Baggett - Crazy Sexy Hacking Outro.mp4

134.3 MB

BSidesAugusta 2014 Mark Baggett Welcome to BSidesAugusta.mp4

31.5 MB

BSidesAugusta 2014 Mike Reeves - Scaling Security Onion to the Enterprise.mp4

146.9 MB

BSidesAugusta 2014 Tim Crothers - Techniques for Fast Windows Investigations.mp4

122.6 MB

BSidesAugusta 2014 Tim Fowler - When Zombies take to the Airwaves.mp4

148.6 MB

BSidesAugusta 2014 Tim Tomes - The Adobe Guide to Keyless Decryption.mp4

132.7 MB

BSidesAugusta 2014 Will Schroeder - Adventures in Asymmetric Warfare.mp4

78.5 MB

/.../BSides Augusta 2015/

00-Welcome-Major-General-Fogarty.mp4

76.8 MB

01-Keynote-Ed-Skoudis.mp4

70.1 MB

BT100-Fundamental-Understanding-of-Baseline-Analysis-and-Remediation-for-Industrial-Control-Systems-Juli-Joyner-and-Jeffrey-Medsger.mp4

82.2 MB

BT101-Taking-a-Distributed-Computing-Approach-to-Network-Detection-with-Bro-and-aThe-Clouda-Mike-Reeves.mp4

223.6 MB

BT102-A-A-Scouts-Perspective-on-Network-Defense-Justin-Edgar.mp4

185.5 MB

BT103-Doomsday-Preppers-APT-Edition-Tanner-Payne.mp4

34.1 MB

BT104-Building-a-Better-Security-Analyst-Using-Cognitive-Psychology-Chris-Sanders.mp4

40.6 MB

BT105-Viper-Framework-for-Malware-Analysis-Paul-Melson.mp4

33.3 MB

BT106-Infiltrating-C2-Infrastructure-Tim-Crothers.mp4

109.4 MB

BT107-Building-aMuscle-Memory-with-Rekall-Memory-Forensic-Framework-Alissa-Torres.mp4

77.7 MB

BT108-The-Blue-Team-Starter-Kit-Timothy-De-Block.mp4

57.1 MB

BT200-Go-Hack-Yourself-Jason-Frank.mp4

66.2 MB

BT201-2015-Its-not-over-yet-Joel-Esler.mp4

112.9 MB

BT202-How-to-Get-Into-ICS-Security-Chris-Sistrunk.mp4

75.6 MB

BT203-Destruction-as-a-Service-Security-Through-Reanimation-Jon-Medina.mp4

61.9 MB

BT204-The-Programmatic-Evolution-of-Technology-Defense-Roland-Cloutier.mp4

66.7 MB

BT205-Lessons-Learned-from-Analyzing-Terabytes-of-Malware-Wes-Widner.mp4

59.0 MB

RT100-Using-a-HackRF-One-to-Infiltrate-the-Digital-Thetford-Wall-Patrick-Perry.mp4

60.0 MB

RT101-Malvertizing-Like-a-Pro-Alex-Rymdeko-Harvey.mp4

66.4 MB

RT102-Weaponizing-our-youth-The-Case-for-Integrated-Cyber-Ethics-Josh-Rykowski.mp4

48.3 MB

RT103-Making-Everything-Old-New-Again-Andrew-Cole-and-Rich-Moulton.mp4

319.5 MB

RT104-DIY-Vulnerability-Discovery-with-DLL-Side-Loading-Jake-Williams.mp4

72.5 MB

RT105-Recon-ng-and-Beyond-Tim-Tomes.mp4

89.4 MB

RT106-Attacking-OWASP-Exploiting-the-Top-10-David-Coursey.mp4

65.5 MB

/.../Boston BSides 2013/

Alissa Torres Security BSides Boston 2013 - Sick Anti-Analysis Mechanisms From The Wild.mp4

134.5 MB

Allison Nixon Brandon Levene Security BSides Boston 2013 - The Noob Persistent Threat.mp4

176.6 MB

Andrew Clare Security BSides Boston 2013 - The Future Of Drones and the Impact On Infosec.mp4

181.6 MB

Ben April Security BSides Boston 2013 - NFC I Don t Think It Means What You Think It Means.mp4

176.3 MB

CJ Heres Security BSides Boston 2013 - Google TV The Next Generation.mp4

184.0 MB

Closing Remarks Security BSides Boston 2013 - Closing and Ending.mp4

30.8 MB

Dan Geer Security BSides Boston 2013 - Identity As Privacy.mp4

280.9 MB

Dan Stolts Security BSides Boston 2013 - Cloudy Weather How Secure Is The Cloud.mp4

157.3 MB

David Bressler Security BSides Boston 2013 - Maltego In The Enterprise.mp4

128.0 MB

David Dumas Security BSides Boston 2013 - Security 101 For New Security Professionals.mp4

188.3 MB

Deral Heiland Security BSides Boston 2013 - Plunder, Pillage and Print.mp4

195.9 MB

Jeff Northrop Security BSides Boston 2013 - The State Of Privacy & Proper Planning For The Future.mp4

177.1 MB

Joseph Cohen Security BSides Boston 2013 - Bluecat Netcat For Bluetooth.mp4

63.8 MB

Josh Corman Security BSides Boston 2013 - Good Enough Isn t Anymore The Value of Hitting Rock Bottom.mp4

235.1 MB

Keith Gilbert Security BSides Boston 2013 - Malformity.mp4

144.7 MB

Macy Cronkite Security BSides Boston 2013 - Splunk.mp4

64.0 MB

Oliver Day Security BSides Boston 2013 - Securing Change Call For Volunteers.mp4

95.2 MB

Paul Braren Security BSides Boston 2013 - Build Your Own VMWare ESXi & Microsoft Hyper V-Lab At Home.mp4

163.5 MB

Roy Wattanasin Security BSides Boston 2013 - Opening Remarks.mp4

7.3 MB

Schuyler Towne Security BSides Boston 2013 - Unlucky In Locks.mp4

169.9 MB

Walt Williams Security BSides Boston 2013 - Realistic Affordable & Quantitative Risk Management.mp4

161.3 MB

/.../Boston BSides 2014/

Abusing Mobile Games Ming Chow Security BSides Boston 2014.mp4

144.9 MB

Auditing all the things for smarter detection faster incident response Mark Thomas BSides Boston 14.mp4

92.5 MB

Doomed to repeat, InfoSec s failure to learn from the past Jack Daniel Security BSides Boston 2014.mp4

240.6 MB

Information Security Careers & Education Panel Security BSides Boston 2014.mp4

232.4 MB

Next Generation Red Teaming Robert Wood Security BSides Boston 2014.mp4

193.7 MB

Offensive Mobile Forensics Joey Peloquin Security BSides Boston 2014.mp4

167.6 MB

Pwninstaller 1.0 Will Shroeder Security BSides Boston 2014.mp4

94.7 MB

Target, Snowden, Heartbleed ... Oh my! Keynote by Rob Cheyne Security BSides Boston 2014.mp4

239.3 MB

The Challenge of Natural Security Systems Rockie Brockway Security BSides Boston 2014.mp4

164.5 MB

Using Hackers Own Methods & Tools to Defeat Persistent Adversaries Michael Davis BSides Boston 2014.mp4

186.6 MB

Why You Should Give Up Online Social Networks Jason Ding Security BSides Boston 2014.mp4

174.7 MB

/.../Boston BSides 2015/

100-Is-Threat-Modeling-for-Me-Robert-Hurlbut.mp4

73.2 MB

101-Hacker-or-criminal-Repairing-the-reputation-of-the-infosec-community-Melanie-Ensign.mp4

70.0 MB

102-Running-Away-from-Security-Web-App-Vulnerabilities-and-OSINT-Collide-Micah-Hoffman.mp4

68.4 MB

103-Robots-Ninjas-Pirates-and-Building-an-Effective-Vulnerability-Management-Program-Paul-Asadoorian.mp4

72.1 MB

104-Protect-Your-nKeys-to-the-Kingdomi-Securing-Against-the-Next-Inevitable-Cyberattack-Paul-Kozlov.mp4

336.9 MB

105-In-pursuit-of-a-better-crypto-puzzle-Samuel-Erb.mp4

188.9 MB

200-When-penguins-attack-Linuxs-role-in-the-malware-ecosystem-Chester-Wisniewski.mp4

73.5 MB

201-The-Benefits-in-Externalizing-DMZ-as-a-Service-in-the-Cloud-Israel-Barak.mp4

81.7 MB

202-Common-misconfigurations-that-lead-to-a-breach-Justin-Tharpe.mp4

57.8 MB

203-Applying-Big-Data-technology-to-security-use-case-Max-Pevzner.mp4

80.9 MB

204-Marketing-Theyre-not-all-Schmucks-Jen-Ellis-Josh-Feinblum.mp4

56.9 MB

205-Next-Gen-Incident-Management-Building-out-a-Modern-Incident-Management-Capability-John-McDonald.mp4

83.7 MB

BSides-Boston-2015-Closing.mp4

85.7 MB

K00-The-Securitized-State-Where-it-came-from-where-its-going-what-can-be-done-about-it-Molly-Sauter.mp4

74.2 MB

/BSidesCHS 2014/

BSidesCHS 2014 Allow myself to encrypt...myself! - Evan Davison.mp4

143.8 MB

BSidesCHS 2014 Ballin on a Budget - Andrew Morris.mp4

88.8 MB

BSidesCHS 2014 Building an Open Source Threat Intelligence Program - Edward McCabe.mp4

165.4 MB

BSidesCHS 2014 Just Apply the Patch - Robert Wessen.mp4

76.0 MB

BSidesCHS 2014 Keynote Speaker - Jason Street.mp4

472.6 MB

BSidesCHS 2014 Keynote Speaker - Kizz Myanthia.mp4

143.4 MB

BSidesCHS 2014 When a Security Architect Writes an Application - David Zendzian.mp4

359.1 MB

BSidesCHS 2014 WUDS You Say SmartAssPhone - Frank Catucci.mp4

143.6 MB

/.../BSides Chicago 2014/

Aligning Threats and Allies through Stories J Wolfgang Goerlich and Steven Fox.mp4

130.9 MB

Bioinformatics Erasing the line between biology and hacking Krystal Thomas White and Patrick Thomas.mp4

119.4 MB

Building an AppSec Program from Scratch Chris Pfoutz.mp4

47.0 MB

Bypassing EMET 41 Jared DeMott.mp4

49.5 MB

Call of Community Modern Warfare Matt Johnson & Ben Ten.mp4

75.7 MB

Checklist Pentesting; Not checklist hacking Trenton Ivey.mp4

197.5 MB

Checklist Pentesting_ Not checklist hacking Trenton Ivey.mp4

71.2 MB

closing.mp4

89.8 MB

Comparing Risks to Risks Why Asset Management Is Broken and How to Fix It Michael Roytman.mp4

150.8 MB

Everything I Ever Needed to Know About Infosec I Learned from Hollywood Tom Ervin.mp4

56.4 MB

Hacking Diversity in InfoSec Greg Thomas.mp4

90.2 MB

How To Win Friends and Influence Hackers Jimmy Vo.mp4

41.4 MB

InfoSec Big Joke 3rd Party Assessments moey.mp4

64.7 MB

intro.mp4

34.3 MB

jail.mp4

715.4 KB

Looking for the Weird Charles Herring.mp4

77.2 MB

Minecraft Security Riese Goerlich.mp4

45.0 MB

Seeing Purple Hybrid Security Teams for the Enterprise Belt.mp4

45.2 MB

Sit stay proxy Good beagle Why I love the beaglebone black and why you should too Colin Vallance.mp4

58.0 MB

The SMB Security Gap Mike Kavka.mp4

61.9 MB

The Ultimate INFOSEC Interview Why must I be surrounded by frickin idiots Dr Evil 1997 Stephen Heath.mp4

180.4 MB

/.../Bsides Cincinnati 2015/

BsidesCincy-2015-00-Welcome-and-Introduction-Josh-Ohmer-President-BSidesCincy.mp4

13.0 MB

BsidesCincy-2015-01-Lateral-Movement-Harlan-Carvey.mp4

360.0 MB

BsidesCincy-2015-02-Automated-Detection-Strategies-John-Davison.mp4

68.0 MB

BsidesCincy-2015-03-Powershell-for-Incident-Responders-Jesse-Lands.mp4

66.5 MB

BsidesCincy-2015-04-Cyber-Intelligence-Concrete-Analysis-in-a-Fluid-World-Coleman-Kane.mp4

81.5 MB

BsidesCincy-2015-05-The-Response-Ready-Infrastructure-Justin-Hall.mp4

73.3 MB

BsidesCincy-2015-06-A-Distributed-Computing-Approach-for-Network-Detection-Mike-Reeves.mp4

67.6 MB

BsidesCincy-2015-07-The-Value-of-a-Simple-DLP-Program-Chris-Tyo.mp4

60.5 MB

/.../BSides Cleveland 2014/

Am I an Imposter Warren Kopp.mp4

67.0 MB

APT2 Building a Resiliency Program to Protect Business Edward McCabe.mp4

91.2 MB

Attacking and Defending Full Disk Encryption Tom Kopchak.mp4

155.2 MB

Cleveland Locksport Jeff Moss Doug Hiwiller and Damon Ramsey.mp4

70.0 MB

Dave Kennedy and Mentos.mp4

7.2 MB

Fun with Dr Brown Spencer McIntyre.mp4

71.0 MB

Hacking Diversity Gregorie Thomas.mp4

69.0 MB

Keynote Dave Kennedy.mp4

107.4 MB

Lockade Locksport Electronic Games Adrian Crenshaw.mp4

171.6 MB

Malware Evolution Epidemiology Adam Hogan.mp4

125.8 MB

Password Defense Controls your users wont hate Nathaniel Maier.mp4

71.2 MB

Pentesting Layers 2 and 3 Kevin Gennuso and Eric Mikulas.mp4

170.0 MB

Phishing Like a Monarch With King Phisher Brandon Geise and Spencer McIntyre.mp4

59.8 MB

Plunder Pillage and Print The art of leverage multifunction printers during penetration testing Dera.mp4

115.1 MB

PowerShell cool $h!t Zach Wojton.mp4

103.7 MB

The importance of threat intel in your information security program Jamie Murdock.mp4

66.9 MB

Thinking Outside the Bunker Security as a practice not a target Steven Legg.mp4

48.1 MB

Threat Models that Exercise your SIEM and Incident Response J Wolfgang Goerlich and Nick Jacob.mp4

98.3 MB

/.../BSides Cleveland 2015/

BL00-Why-the-foundation-of-security-is-broken-Alex-Kot.mp4

36.8 MB

BL01-Desired-State-Configuration-DSC-Dream-Tool-or-Nightmare-for-Security-Baseline-and-Configuration-Management-Zack-Wojton-Wayne-Pruitt-zbirdflipper.mp4

37.6 MB

BL02-Common-Sense-Security-Framework-Jerod-Brennen-slandail.mp4

46.1 MB

BL03-Secure-Test-Driven-Development-Brakeman-Gauntlet-OWASP-and-the-Work-Still-to-Be-Done-Ricky-Rickard-rrickardjr.mp4

69.3 MB

BL05-Building-a-Threat-Intelligence-Program-Edward-McCabe-edwardmccabe.mp4

386.9 MB

BL06-Phishing-Witout-Ruby-Brandan-Geise-Spencer-McIntyre-coldfusion39.mp4

38.3 MB

BL07-Security-Not-Guaranteed-Or-how-to-hold-off-the-bad-guys-for-another-day-James-Gifford-Elijah-Snow-Rackley-jrgifford.mp4

35.0 MB

BL08-Cleveland-Locksport-Jeff-Moss-Doug-Hiwiller-Damon-Ramsey-jeffthemossman.mp4

43.7 MB

BL09-Augmenting-Mobile-Security-and-Privacy-Controls-Brian-Krupp-briankrupp.mp4

133.4 MB

BP00-DIY-Hacker-Training-a-Walkthrough-Warren-Kopp-warrenkopp.mp4

30.6 MB

BP01-Quick-start-your-Burp-Suite-extensions-Jython-and-automation-Marius-Nepomuceno.mp4

30.0 MB

BP02-Flourishing-in-a-Hostile-Work-Environment-Dennis-Goodlett.mp4

43.2 MB

BP03-Defense-in-Depth-Your-Security-Castle-Tom-Kopchak-tomkopchak.mp4

66.4 MB

BP04-EMET-Overview-and-Demo-Kevin-Gennuso-kevvyg.mp4

45.1 MB

BP05-10-Reasons-Your-Security-Education-Program-Sucks-Kris-French-Jr-Turtl3Up.mp4

71.3 MB

BP06-Call-of-Duty-Crypto-Ransomware-Brett-Hawkins-hawkbluedevil.mp4

74.3 MB

closing.mp4

3.3 MB

GS00-Morning-Keynote-Jack-Daniel.mp4

101.4 MB

GS01-Metasploit-Windows-Kernel-Exploitation-Spencer-McIntyre-zeroSteiner.mp4

76.4 MB

GS02-PwnDrone-The-Modern-Airborne-Cyber-Threat-Devin-Gergen-DevinGergen.mp4

71.9 MB

GS03-Afternoon-Keynote-Chris-Nickerson.mp4

73.9 MB

GS04-Why-the-Web-is-Broken-Bill-Sempf-sempf.mp4

384.8 MB

GS05-Outside-the-Box-David-Kennedy-Larry-Spohn-HackingDave-Spoonman1091.mp4

85.0 MB

GS06-The-Entropy-of-Obfuscated-Code-Adam-Hogan-adamwhogan.mp4

53.7 MB

/.../BSides Columbus 2015/

Defense00 Got software Need a security test plan Got you covered Bill Sempf.mp4

98.6 MB

Defense01 Corporate Wide SSL Interception and Inspection Frank Shaw.mp4

63.1 MB

Defense02 How to Rapidly Prototype Machine Learning Solutions to Solve Security Problems Jason Montg.mp4

192.3 MB

Defense03 A Basic Guide to Advanced Incident Response Scott Roberts.mp4

104.1 MB

Defense04 Supply and Demand Solving the InfoSec Talent Shortage Brandon Allen.mp4

85.4 MB

Jason Street Keynote.mp4

141.1 MB

Keynote00 Cloud and Virtualization Theory Grauben Guevara.mp4

90.1 MB

Offense00 User Behavior Analysis Matt Bianco.mp4

96.1 MB

Offense01 Plunder Pillage and Print The art of leverage multifunction printers during penetration te.mp4

167.9 MB

Offense02 Common Sense Security Framework Jerod Brennen.mp4

151.3 MB

Offense04 OWASP Mobile Top Ten Why They Matter and What We Can Do Ricky Rickard.mp4

115.1 MB

Special Teams00 Do We Still Need Pen Testing Jeff Mann.mp4

127.2 MB

Special Teams01 Trolling Attackers for Fun Profit Stephen Hosom.mp4

51.1 MB

Special Teams02 Inurlrobotstxt What are YOU hiding David Young.mp4

45.6 MB

Special Teams03 Malware Development as the Evolution of Parasites Adam Hogan.mp4

77.6 MB

Special Teams04 Snort Beyond IDS Open Source Application and File Control Adam Hogan.mp4

160.9 MB

/BSides DC/

BSides DC 2014 - A Better Way to Get Intelligent About Threats.mp4

216.9 MB

BSides DC 2014 - Adventures in Asymmetric Warfare Fighting the AV Vendors.mp4

448.4 MB

BSides DC 2014 - All About The Bass - Sing Off.mp4

26.4 MB

BSides DC 2014 - Bug Bounty Hunters Lessons From Darth Vader.mp4

589.6 MB

BSides DC 2014 - Building and Using A GPU Password Cracker.mp4

420.2 MB

BSides DC 2014 - Closing Remarks.mp4

41.6 MB

BSides DC 2014 - Cynomix Fireside Chat Demo.mp4

175.6 MB

BSides DC 2014 - Diamond Model for Intrusion Analysis What You Need to Know.mp4

308.4 MB

BSides DC 2014 - Diversity in IT #epicfail or #makingprogress.mp4

499.1 MB

BSides DC 2014 - Doctor Docker Building Your Infrastructure s Immune System.mp4

164.4 MB

BSides DC 2014 - Fighting Back Against SSL Interception (or How SSL Should Work).mp4

282.6 MB

BSides DC 2014 - Hacking Rants (from an almost old guy).mp4

352.2 MB

BSides DC 2014 - How Headlines Make Heads Roll The Media s Impact On Security.mp4

594.9 MB

BSides DC 2014 - in ur scm, bein a ninja.mp4

467.0 MB

BSides DC 2014 - Keynote.mp4

260.9 MB

BSides DC 2014 - MalwareViz a free Malware Visualizer.mp4

492.9 MB

BSides DC 2014 - Meatspace Indicators and Incident Response.mp4

441.2 MB

BSides DC 2014 - Network Attached Shell N.A.S.ty systems that store network accessible shells..mp4

272.0 MB

BSides DC 2014 - Once upon a time... InfoSec History 101.mp4

337.2 MB

BSides DC 2014 - Opening Acts How Attackers Get Their Big Breaks.mp4

426.9 MB

BSides DC 2014 - SWF Seeking Lazy Admin for Cross-Domain Action.mp4

388.7 MB

BSides DC 2014 - Training with Raspberry Pi.mp4

208.6 MB

BSides DC 2014 - What Does It Actually Take to Start a Security Product Company.mp4

615.5 MB

/.../BSides Delaware 2012/

Angry Cars Hacking the Car as a Platform.mp4

26.4 MB

Cyber Security for the Industrial Environment An Intro to ISA IEC 62443.mp4

247.3 MB

Firewalling dynamic infrastructures (the cloud) with Chef and Netfilter.mp4

176.7 MB

Hacking the Male and Female OS (Men are from Windows, Women are from Linux).mp4

193.0 MB

Introduction to the use after free vulnerability and why it matters.mp4

76.5 MB

Social Engineering CTF Intro @SquirrelsNaBrrl.mp4

73.9 MB

The Security Vulnerability Assessment Process, Best Practices & Challenges.mp4

93.2 MB

/.../BSides Delaware 2013/

Bsides 2013 how to become an unwitting accomplice in a phishing attack mark hufe hufemj.mp4

108.4 MB

Bsides Delaware 2013 Wireless Penetration Testing For Realz Mellendick.mp4

302.8 MB

BSidesDE 2013 1 1 110 years of vulnerabilities brian martin aka jericho.mp4

244.8 MB

BSidesDE 2013 1 11 software security game day evan oslick eoslick.mp4

126.8 MB

BSidesDE 2013 1 2 html 5 security justin klein keane @madirish2600.mp4

188.7 MB

BSidesDE 2013 1 4 cloud business and academia bringing it all together cloud security alliance delaw.mp4

212.3 MB

BSidesDE 2013 1 5 uncloaking ip addresses on irc derek callaway decalresponds.mp4

164.1 MB

BSidesDE 2013 1 6 baking even more clam av s for fun profit nathan gibbs christ media 2nd try.mp4

50.8 MB

BSidesDE 2013 1 6 baking even more clam av s for fun profit nathan gibbs christ media.mp4

44.4 MB

BSidesDE 2013 1 8 introducing intelligence into your malware analysis brian baskin.mp4

260.0 MB

BSidesDE 2013 1 9 another log to analyze utilizing dns to detect malware in your network nathan magn.mp4

262.5 MB

BSidesDE 2013 2 1 winning isnt everything how trolling can be as much fun joey l0stkn0wledge.mp4

99.8 MB

BSidesDE 2013 2 2 antipwny a windows based ids ips for metasploit rohan vazarkar david bitner.mp4

87.4 MB

BSidesDE 2013 2 3 playing the forensics game forensic analysis of gaming applications for fun and pr.mp4

49.6 MB

BSidesDE 2013 2 4 project phree phucking the nsa bts square r00t.mp4

155.2 MB

BSidesDE 2013 2 6 hacking benjamins bob weiss pwcrack.mp4

390.8 MB

bsidesde 2013 growing up in the information security community forgottensec.mp4

82.5 MB

BsidesDE 2013 LinkedAllUpIn Your Email utkonos.mp4

95.7 MB

BsidesDE 2013 Pentoo Zero Chaos.mp4

43.0 MB

/.../BSides Detroit 2015/

keynote00-Information-Security-Reconciliation-The-Scene-and-The-Profession-Mark-Stanislav.mp4

100.2 MB

Track100-Level-One-How-To-Break-Into-The-Security-Field-Aaron-Moffett.mp4

36.3 MB

Track101-Hacker-High-Why-We-Need-To-Teach-Computer-Hacking-In-Schools-Ron-Woerner.mp4

74.9 MB

Track102-Getting-Started-Help-Me-Help-You-David-Trollman.mp4

77.6 MB

Track103-From-Blue-To-Red-What-Matters-and-What-Really-Doesnt-Jason-Lang.mp4

78.7 MB

Track104-Clear-as-FUD-How-fear-uncertainty-and-doubt-are-affecting-users-our-laws-and-technologies-Christopher-Maddalena.mp4

63.5 MB

Track105-Data-Breaches-Simply-The-Cost-Of-Doing-Business-Joel-Cardella.mp4

65.0 MB

Track106-Eating-the-SMB-Security-Elephant-An-ITSEC-framework-for-small-IT-shops-Austen-Bommarito.mp4

28.3 MB

Track200-Enterprise-Class-Vulnerability-Management-Like-A-Boss-Rockie-Brockway.mp4

69.7 MB

Track201-Funny-Money-What-Payment-Systems-Teach-us-about-Security-Drew-Sutter.mp4

242.3 MB

Track202-Building-a-sturdy-foundation-a-program-based-approach-to-IT-Operations-Application-Development-and-Information-Security-in-business-Steven-Legg.mp4

389.3 MB

Track203-Moving-past-Metasploit-Writing-your-first-exploit-Calvin-Hedler.mp4

68.6 MB

Track205-Wielding-BurpSuite-quick-start-your-extensions-and-automation-rules-Marius-Nepomuceno.mp4

72.6 MB

Track207-Browser-and-Windows-Environment-Hardening-Kurtis-Armour.mp4

36.9 MB

/.../BSides Knoxville 2015/

Track-100-Keynote-Travis-Goodspeed.mp4

53.4 MB

Track-101-How-Ive-hacked-and-un-hacked-a-logic-game-20-years-to-Lights-Out-Gyora-Benedek.mp4

65.1 MB

Track-103-Finding-Bad-Guys-with-35-million-Flows-2-Analysts-5-Minutes-and-0-Dollars-Russell-Butturini.mp4

57.4 MB

Track-104-Multipath-TCP-Breaking-Todays-Networks-with-Tomorrows-Protocols-Catherine-Pearce.mp4

317.0 MB

Track-105-Phishing-Going-from-Recon-to-Credentials-Adam-Compton-Eric-Gershman.mp4

70.3 MB

Track-106-High-Performance-Fuzzing-Richard-Johnson.mp4

79.8 MB

Track-107-Cyber-Cyber-Cyber-Student-Security-Competitions-Eric-Gershman-Raymond-Borges.mp4

65.4 MB

Track-200-The-Impossibility-of-Protecting-the-Enterprise-at-725-an-hour-Kevin-Thomas.mp4

73.0 MB

Track-201-Ive-met-the-enemy-information-security-and-it-is-us-Slade-Griffin.mp4

76.0 MB

Track-202-The-Poetry-of-Secrets-An-Introduction-to-Cryptography-Eric-Kolb.mp4

72.9 MB

Track-203-From-X-to-Totally-Pwned-Russel-Van-Tuyl-Matt-Smith.mp4

77.2 MB

Track-204-Introducing-User-Centered-Design-to-Augment-Human-Performance-in-Cyber-Warfare-Frank-Cohee-Joe-Davis.mp4

80.1 MB

Track-205-Back-to-the-Future-Neil-Desai.mp4

81.1 MB

Track-206-Virtualized-Routers-Soup-to-Nuts-Jeff-Nichols-Benjamin-Taylor-Tommy-Hardin.mp4

83.1 MB

/.../Bsides Las Vegas 2012/

1 2 5 dc949 Stiltwalker Round 2.mp4

147.0 MB

1.1.0 KEYNOTE, Jack Daniel The State of Security BSides.mp4

95.5 MB

1.1.1 Matt Weeks Ambush - Catching Intruders At Any Point.mp4

108.9 MB

1.1.2 Robert Rowley Max Level Web App Security.mp4

87.4 MB

1.1.3 Davi Ottenheimer Big Data s Fourth V Or Why We ll Never Find the Loch Ness Monster.mp4

92.0 MB

1.1.4 HD Moore Empirical Exploitation.mp4

92.1 MB

1.1.5 Christopher Lytle Puzzle Competitions and You.mp4

79.1 MB

1.1.6 Parth Patel Introducing Android Security Evaluation Framework - ASEF.mp4

82.3 MB

1.1.7 Terry Gold RFID LOL.mp4

86.2 MB

1.2.0 Raphael Mudge Force Multipliers for Red Team Operations.mp4

97.5 MB

1.2.1 Andrew Hay & Matt Johansen Applications and Cloud and Hackers, Oh My!.mp4

102.3 MB

1.2.2 Brendan O Connor Reticle Dropping an Intelligent F-BOMB.mp4

246.1 MB

1.2.3 Josh Sokol Dan Cornell The Magic of Symbiotic Security Creating an Ecosystem of Security.mp4

80.2 MB

1.2.4 James Lester & Joseph Tartaro Burp Suite Informing the 99% of what the 1%ers.mp4

104.4 MB

1.2.6 Gillis Jones The Badmin project (Na-na- nanana Na-na-nanana BADMIN).mp4

53.5 MB

1.2.7 IPv6 Panel Drinking Game.mp4

78.3 MB

2.1.0 Michael Fornal How I managed to break into the InfoSec World.mp4

75.8 MB

2.1.1 David Keene Breaking Microsoft Dynamics Great Plains - an insiders guide.mp4

84.0 MB

2.1.2 William Ghote Lotus Notes Password Hash Redux.mp4

62.1 MB

2.1.3 Spencer McIntyre How I Learned To Stop Worrying and Love the Smart Meter.mp4

89.7 MB

2.1.4 Christopher Campbell Shot With Your Own Gun How Appliances are Used Against You.mp4

95.0 MB

2.1.5 Shawn Asmus, Kristov Widak Mirror Mirror -- Reflected PDF Attacks using SQL Injection.mp4

100.2 MB

2.1.6 Georgia Weidman Introducing the Smartphone Penetration Testing Framework.mp4

77.1 MB

2.2.0 Phil Young Mainframed - The Forgotten Fortress.mp4

96.5 MB

2.2.1 Walt Williams Metrics that Suck Even Less.mp4

112.5 MB

2.2.2 Conrad Constantine The Leverage of Language or How I Realized Information Theory.mp4

95.6 MB

2.2.3 Jason Ding The Blooming Social Media Economics Built on Fake Identities.mp4

94.5 MB

2.2.4 Lightning Talks.mp4

217.1 MB

/.../BSides Las Vegas 2013/

2 2 1 Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn t Suck Josh.mp4

180.9 MB

BSidesLV 2013 1 1 1 The Security Industry How to Survive Becoming Management Christien Rioux.mp4

247.8 MB

BSidesLV 2013 1 1 2 Discovering Dark Matter Towards better Android Malware Heuristics Jim.mp4

219.0 MB

BSidesLV 2013 1 1 3 Mom! I Broke My Insulin Pump Again! Jay Rad Radcliffe.mp4

175.7 MB

BSidesLV 2013 1 1 4 Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth Evan.mp4

165.9 MB

BSidesLV 2013 1 1 5 HiveMind Distributed File Storage Using JavaScript Botnets Sean Malone.mp4

197.4 MB

BSidesLV 2013 1 1 6 gitDigger Creating useful wordlists from public GitHub repositories WiK and.mp4

101.7 MB

BSidesLV 2013 1 1 7 Collaborative Penetration Testing With Lair Tom Steele and Dan Kottmann.mp4

153.9 MB

BSidesLV 2013 1 1 8 Social Aftermath Responding to Social Pwnage Steven F Fox.mp4

101.1 MB

BSidesLV 2013 1 2 1 Silence Equals Death Violet Blue.mp4

276.0 MB

BSidesLV 2013 1 2 2 The Cavalry Isn t Coming Starting the Revolution to Fsck it All!.mp4

191.3 MB

BSidesLV 2013 1 2 3 A Fire In The Eye Olli Pekka Niemi and Antti Levomaki.mp4

132.8 MB

BSidesLV 2013 1 2 4 Defense Evasion Modeling Frank Artes.mp4

215.4 MB

BSidesLV 2013 1 2 5 Malware Management Framework We detected WinNTI with it! Michael Gough.mp4

160.0 MB

BSidesLV 2013 1 2 6 Crunching the Top 10,000 Websites Password Policies and Controls Steve Werb.mp4

211.0 MB

BSidesLV 2013 1 2 7 Governments and UFOs A Historical Analysis of Disinformation and Deception R.mp4

216.0 MB

BSidesLV 2013 1 2 8 Strange interactions in personal data Brokers and the CFAA Christine Dudley.mp4

100.4 MB

BSidesLV 2013 1530 Brendan OConnor HARK The Hacker Archive.mp4

42.7 MB

BSidesLV 2013 1550 Jack Whitsitt Critical Infrastructure Protection As Code.mp4

73.2 MB

BSidesLV 2013 2 1 1 Diamonds, Fitness and Cults Manipulation for Fun and Profit Katie Rodzon.mp4

166.5 MB

BSidesLV 2013 2 1 2 Vulnerability & Exploit Trends A Deep Look Inside The Data Ed Bellis, Michae.mp4

167.7 MB

BSidesLV 2013 2 1 3 EC2 or Bust - How to Build Your Own Pen Testing Lab in Amazon EC2 Grecs.mp4

146.6 MB

BSidesLV 2013 2 1 4 Techniques for Escaping the AppSec Labyrinth Andrew Hay.mp4

161.1 MB

BSidesLV 2013 2 1 5 The Erudite Inebriate s Guide to Life, Liberty, and the Purfuit of Happinefs.mp4

166.3 MB

BSidesLV 2013 2 1 6 Hack the Hustle! Career Strategies for Information Security Professionals Ev.mp4

189.5 MB

BSidesLV 2013 2 1 7 Information Sharing, or I ve got 99 problems and they re probably.mp4

95.8 MB

BSidesLV 2013 2 2 2 How embracing social media helped me stop the hackers, save the world and get.mp4

136.5 MB

BSidesLV 2013 2 2 3 Malware Automation Christopher Elisan.mp4

229.8 MB

BSidesLV 2013 2 2 4 Popping the Penguin An Introduction to the Principles of Linux Persistence M.mp4

145.6 MB

BSidesLV 2013 2 2 5 Network Survival WCS James Costello.mp4

180.3 MB

BSidesLV 2013 2 2 6 The Slings and Arrows of Open Source Security Tod Beardsley and Mister X.mp4

202.7 MB

BSidesLV 2013 2 2 7 What if Petraeus was a hacker Email privacy for the rest of us Fak3r.mp4

118.2 MB

BSidesLV 2013 3 1 1 Never Mind Your Diet, Cut the Crap From Your Vocabulary Keli Hay Brian Marti.mp4

183.4 MB

BSidesLV 2013 3 1 2 The 7 habits of highly effective CISOs Franklin Tallah Wendy Nather).mp4

196.4 MB

BSidesLV 2013 3 1 3 The Little Dutch Boy D0n Quix0te Bill E Ghote).mp4

190.0 MB

BSidesLV 2013 3 1 5 Stop Shooting Blanks No magic bullets in your arsenal Renegade6 Nicolle Neul.mp4

213.3 MB

BSidesLV 2013 3 1 6 Flameout Burnout Supernova Dan Ward Ally Miller).mp4

186.0 MB

BSidesLV 2013 3 1 7 The Sensual Side of 3D Printing Kat Sweet Javvad Malik).mp4

131.7 MB

BSidesLV 2013 3 2 1 Fun with WebSockets using Socket Puppet Mister Glass Weasel).mp4

104.4 MB

BSidesLV 2013 3 2 2 Using Machine Learning to Support Information Security Alex Pinto Joel Wilba.mp4

228.9 MB

BSidesLV 2013 3 2 3 The Truth, You Thought We Wouldn t Know Wolf Flight Terry Gold).mp4

199.0 MB

BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl.mp4

156.4 MB

BSidesLV 2013 3 2 5 The Goodness is Baked In Baking Assurance into Software Ebony Davi Ottenheim.mp4

125.0 MB

BSidesLV 2013 3 2 6 Matriux Leandros An Open Source Penetration Testing and Forensic Distribution.mp4

146.6 MB

BSidesLV 2013 3 2 7 Sixteen Colors Archiving the Evolution of ANSI and ASCII Art Doug Moore Bren.mp4

219.3 MB

BSidesLV 2013 4 1 1 You Are Being Watched! Bharat Jogi.mp4

159.2 MB

BSidesLV 2013 4 1 2 Calling All Researchers A Discussion on Building a Security Research F.mp4

164.9 MB

BSidesLV 2013 4 1 3 Evil Empire SIEM FTW EggDropX and Tha CheezMan.mp4

149.1 MB

BSidesLV 2013 4 2 1 Attribution Shmatribution! FIX YOUR SHIT! Krypt3ia.mp4

155.3 MB

BSidesLV 2013 4 2 2 Breach Panel Davi Ottenheimer, Raymond Umerley, Jack Daniel, Steve Werby, Da.mp4

210.6 MB

BSidesLV 2013 5 1 1 Attacking and Defending Full.mp4

200.2 MB

BSidesLV 2013 5 1 2 Say It to My Face Shannon Sistrunk.mp4

211.0 MB

BSidesLV 2013 5 1 3 Alex Dreams of Risk How the Concept of Being a Craftsma.mp4

207.4 MB

BSidesLV 2013 5 1 4 GTFO FTW Hacking Your Lifestyle for Fun and Profit Beau Woods and Taylor Ban.mp4

216.2 MB

BSidesLV 2013 5 1 5 You can t make people act more securely, you can help them want to.mp4

186.9 MB

BSidesLV 2013 5 1 6 Your Droid Has No Clothes Mike Murray and Allan Zhang.mp4

191.8 MB

BSidesLV 2013 5 2 3 OMFG China! T Prophet.mp4

222.2 MB

BSidesLV 2013 Cookie Reuse Sam Bowne.mp4

67.2 MB

BSidesLV 2013 LT 01 Least Authority File System @zooko.mp4

84.0 MB

BSidesLV 2013 LT 02 Hack cellular metabolism by targeting mitochondria @ambimorph).mp4

62.2 MB

BSidesLV 2013 LT 04 Cross Platform Metasploit Payloads @bperry).mp4

40.5 MB

BSidesLV 2013 LT 05 GPS Hacking @recompiler).mp4

52.9 MB

BSidesLV 2013 LT 07 SSD data evaporation @sambrowne).mp4

46.3 MB

/.../BSides Las Vegas 2014/

bg00 opening keynote beyond good and evil towards effective security adam shostack.mp4

117.9 MB

bg01 usb write blocking with usbproxy dominic spill.mp4

86.4 MB

bg02 allow myself to encrypt myself evan davison.mp4

114.0 MB

bg03 what reaction to packet loss reveals about a vpn anna shubina sergey bratus.mp4

79.6 MB

bg04 untwisting the mersenne twister how i killed the prng moloch.mp4

90.7 MB

bg05 anatomy of memory scraping credit card stealing pos malware amol sarwate.mp4

138.3 MB

bg06 cluck cluck on intels broken promises jacob torrey.mp4

94.5 MB

bg07 a better way to get intelligent about threats adam vincent.mp4

143.6 MB

bg08 bring your own risky apps michael raggo kevin watkins.mp4

135.7 MB

bg09 invasive roots of anti cheat software alissa torres.mp4

135.9 MB

bg10 vaccinating android milan gabor danijel grah.mp4

107.9 MB

bg11 security testing for smart metering infrastructure steve vandenberg robert hawk.mp4

134.9 MB

bg12 the savage curtain tony trummer tushar dalvi.mp4

128.3 MB

bg13 we hacked the gibson now what philip young.mp4

117.3 MB

cg00 sha 1 backdooring and exploitation jean philippe aumasson.mp4

63.8 MB

cg01 evading code emulation writing ridiculously obvious malware that bypasses av kyle adams.mp4

171.6 MB

cg02 security management without the suck tony turner tim krabec.mp4

130.8 MB

cg04 malware analysis 101 n00b to ninja in 60 minutes grecs.mp4

127.3 MB

cg05 travel hacking with the telecom informer tprophet.mp4

117.5 MB

cg06 the untold story about atm malware daniel regalado.mp4

98.7 MB

cg07 using superpowers for hardware reverse engineering joe grand.mp4

156.3 MB

cg08 why am i surrounded by friggin idiots because you hired them stephen heath.mp4

151.2 MB

cg09 demystiphying and fingerprinting the 802 15 4 zigbee phy ira ray jenkins sergey bratus.mp4

122.8 MB

cg10 insider threat kill chain human indicators of compromise ken westin.mp4

47.1 MB

cg11 a place to hang our hats security community and culture domenic rizzolo.mp4

45.5 MB

cg12 booze devils advocate and hugs the best debates panel youll see at bsideslv 2014 david mortman.mp4

166.2 MB

gt00 the power law of information michael roytman.mp4

161.4 MB

gt01 measuring the iq of your threat intelligence feeds alex pinto kyle maxwell.mp4

197.2 MB

gt02 strategies without frontiers meredith l patterson.mp4

177.4 MB

gt03 clusterf ck actionable intelligence from machine learning mike sconzo.mp4

117.0 MB

gt04 know thy operator misty blowers.mp4

132.9 MB

gt05 improving security by avoiding traffic and still get what you want in data transfers art conkli.mp4

115.6 MB

pg00 edsec hacking for education jessy irwin.mp4

63.3 MB

pg02 securing sensitive data a strange game jeff elliot.mp4

44.8 MB

pg03 brick in the wall vs hole in the wall caroline d hardin.mp4

59.9 MB

pg04 cut the shit how to reign in your ids tony robinson da 667.mp4

60.5 MB

pg05 geek welfare confessions of a convention swag hoarder rachel keslensky.mp4

95.1 MB

pg06 no infosec staff no problem anthony czarnik.mp4

83.8 MB

pg07 can i code against an api to learn a product adrienne merrick tagore.mp4

37.0 MB

pg08 bridging the air gap cross domain solutions patrick orzechowski.mp4

96.8 MB

pg09 back dooring the digital home david lister.mp4

87.9 MB

pg11 ios url schemes omg guillaume k ross.mp4

64.3 MB

pg12 oops that wasnt suppossed to happen bypassing internet explorers cross site scripting filter ca.mp4

71.3 MB

pg13 what ive learned as a con man masterchen.mp4

66.3 MB

pg14 training with raspberry pi nathaniel davis.mp4

48.1 MB

pg15 black magic and secrets how certificates influence you robert lucero.mp4

67.4 MB

pg16 attacking drupal greg foss.mp4

90.6 MB

pg17 hackers vs auditors dan anderson.mp4

66.0 MB

pg18 third party service provider diligence why are we doing it all wrong patrice coles.mp4

80.3 MB

pg19 pwning the hapless or how to make your security program not suck casey dunham emily pience.mp4

55.0 MB

pg20 teach a man to phish vinny lariza.mp4

63.2 MB

pg21 the lore shows the way eric rand.mp4

61.9 MB

/.../BSides Las Vegas 2015/

ATGP00-Underground-Wi-Fi-Hacking-for-Web-Pentesters-Greg-Foss.mp4

201.1 MB

ATGP01-radBIOS-Wireless-networking-with-audio-Richo-Healey.mp4

116.9 MB

ATGP02-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4

94.7 MB

ATGP03-Intro-for-New-WCTFers-Russell-Handorf-Rick-Farina.mp4

193.4 MB

ATGP05-Better-Spectrum-Monitoring-with-Software-Defined-Radio-Michael-Ossmann.mp4

103.3 MB

ATGP06-Wi-Door-BindRev-Shells-for-your-Wi-Fi-Vivek-Ramachandran.mp4

111.9 MB

ATGP07-Software-Defined-Radio-Signal-Processing-with-a-5-Microcontroller-Jared-Boone.mp4

94.1 MB

ATGP08-All-Your-RFz-Are-Belong-to-Me-Software-Defined-Radio-Exploits-Balint-Seeber.mp4

86.2 MB

BG00-Injection-on-Steroids-Code-less-Code-Injections-and-0-Day-Techniques-Paul-Schofield-Udi-Yavo.mp4

81.2 MB

BG01-Getting-the-data-out-using-social-media-Dakota-Nelson-Gabriel-Butterick-Byron-Wasti.mp4

32.0 MB

BG03-NSA-Playset-Bridging-the-Airgap-without-Radios-Michael-Leibowitz.mp4

61.0 MB

BG05-Your-Electronic-Device-Please-Understanding-the-Border-Search-Exception-Electronic-Devices-Whitney-Merrill.mp4

105.0 MB

BG06-WhyMI-so-Sexy-WMI-Attacks-Real-Time-Defense-and-Advanced-Forensic-Analysis-William-Ballenthin-Claudiu-Teodorescu-Matthew-Graeber.mp4

69.6 MB

BG07-TAPIOCA-TAPIOCA-Automated-Processing-for-IOC-Analysis-Ryan-J-Chapman-Moses-Schwartz.mp4

71.4 MB

BG08-Building-an-Empire-with-PowerShell-Will-Schroeder-Justin-Warner.mp4

74.1 MB

BG09-Remote-Access-the-APT-Ian-Latter.mp4

56.8 MB

BG10-Crash-The-IoT-Train-Yourself-Intentionally-Vulnerable-WRT-IV-WRT-Paul-Asadoorian-Nick-Curran.mp4

79.0 MB

CG00-Barely-Legal-the-Hackeras-Guide-to-Cybersecurity-Legislation-Jen-Ellis.mp4

105.9 MB

CG01-Pentesting-with-Docker-Tom-Steele.mp4

63.5 MB

CG02-Dont-hate-the-Disclosure-Hate-the-Vulnerability-How-the-government-is-bringing-researchers-and-vendors-together-to-talk-vulnerability-disclosure-Allan-Friedman.mp4

82.3 MB

CG03-How-Portal-Can-Change-Your-Security-Forever-Katrina-Rodzon.mp4

76.4 MB

CG04-Angler-Lurking-in-the-Domain-Shadows-Nick-Biasini.mp4

64.5 MB

CG05-A-hackers-guide-to-using-the-YubiKey-how-to-add-inexpensive-2-factor-authentication-to-your-next-project-Russ-Gritzo.mp4

84.6 MB

CG06-Haking-the-Next-Generation-David-Schwartzberg.mp4

77.2 MB

CG07-Backdooring-MS-Office-documents-with-secret-master-keys-Yoshinori-Takesako-Shigeo-Mitsunari.mp4

46.0 MB

CG08-Yes-you-too-can-perform-daring-acts-of-Live-Acquisition-D0n-Quix0te.mp4

70.6 MB

CG10-Rethink-Repurpose-Reuse-Rain-Hell-Michael-Zupo.mp4

44.7 MB

GT01-Adversary-Intelligence-from-Conflict-to-Consensus-Alex-Valdevia-Rich-Barger.mp4

64.6 MB

GT03-Crema-A-LangSec-inspired-Language-Sergey-Bratus-Jacob-Torrey.mp4

76.6 MB

GT04-Making-Breaking-Machine-Learning-Anomaly-Detectors-in-Real-Life-Clarence-Chio.mp4

336.0 MB

GT06-Who-Watches-the-Watchers-Metrics-for-Security-Strategy-Michael-Roytman.mp4

80.8 MB

GT07-Advancing-Internet-Security-Research-with-Big-Data-and-Graph-Databases-Andrew-Hess.mp4

19.6 MB

GT08-Intro-to-Data-Science-for-Security-Rob-Bird-Alex-Shagla-McKotch.mp4

168.0 MB

GT09-No-More-Fudge-Factors-and-Made-up-Shit-Performance-Numbers-That-Mean-Something-Russell-Thomas.mp4

121.9 MB

GT09-When-steganography-stops-being-cool-David-Sancho.mp4

51.9 MB

IATC00-IATC-Track-Introduction-and-Overview-Josh-Corman-joshcorman-Nicholas-J-Percoco.mp4

39.3 MB

IATC00-Intro-and-Hack-the-Future-Keren-Elazari1.mp4

81.8 MB

IATC01-Hack-the-Future-Keren-Elazari.mp4

42.7 MB

IATC03-State-of-Medical-Device-Cyber-Safety-Beau-Woods-Scott-Erven.mp4

55.1 MB

IATC04-Leading-in-a-Do-ocracy-Chris-Nickerson-Beau-Woods-Tod-Beardsley-Tim-Remes.mp4

167.1 MB

IATC05-State-of-Automotive-Cyber-Safety-Josh-Corman-joshcorman-Craig-Smith.mp4

102.8 MB

PG00-Speaking-Metrics-to-Executives-Michael-St-Vincent.mp4

37.0 MB

PG01-Dropping-hell0days-Business-Interaction-for-Security-Professionals-Or-Anyone-Else-Elliot-Johnson.mp4

31.9 MB

PG02-Practice-Safe-Cyber-The-Miseducation-of-American-Students-on-Internet-Safety-Vivienne-Pustell.mp4

50.1 MB

PG03-Check-That-Certificate-Jacob-Jernigan-Andrew-Sorensen.mp4

41.2 MB

PG04-The-Journey-To-ICS-Larry-Vandenaweele.mp4

26.3 MB

PG05-Catching-Linux-Post-Exploitation-with-Auditd-Eric-Gershman.mp4

34.2 MB

PG06-Adding-10-Security-to-Your-Scrum-Agile-Environment-Josh-Louden.mp4

155.2 MB

PG07-Fight-back-raising-awareness-infosec-Petri-Koivisto.mp4

34.6 MB

PG08-What-the-heck-is-this-radio-stuff-anyway-Nick-Kartsioukas.mp4

34.5 MB

PG09-SIEMple-technology-Bill-Davison.mp4

32.1 MB

PG10-How-I-learnt-hacking-in-highschool-Lokesh-Pidawekar.mp4

38.2 MB

PG11-ZOMG-Its-OSINT-Heaven-Tazz-Tazz.mp4

58.6 MB

PG12-Classic-Misdirection-Social-Engineering-to-Counter-Surveillance-Peter-Clemenko-III.mp4

36.7 MB

PG13-Phishing-Going-from-Recon-to-Credentials-Adam-Compton-Eric-Gershman.mp4

41.2 MB

PG14-Social-Media-in-Incident-Response-Program-JoEtta-LeSueur.mp4

25.7 MB

PG15-Cats-and-Mice-Ever-evolving-attackers-and-other-game-changerse-Eric-Kmetz.mp4

34.4 MB

PG16-FAA-FTC-FCC-FU-How-Three-F-ing-Agencies-are-Shaping-Info-Sec-Elizabeth-Wharton.mp4

46.2 MB

PG17-10-Knowledge-Sharing-What-You-Learn-For-the-Benefit-of-the-Everyman-Ashley-Miller.mp4

57.2 MB

PG18-Maximizing-Bro-Detection-John-B-Althouse.mp4

38.2 MB

PG19-Embedding-Web-Apps-in-MITMProxy-Scripts-Chris-Czub.mp4

27.4 MB

PG20-What-Lurks-in-the-Shadow-Cheryl-Biswas.mp4

29.6 MB

PG21-Out-of-Denial-A-12-Step-Program-for-Recovering-Admins-Paul-Lee.mp4

23.9 MB

PG22-Why-We-Cant-Have-Nice-Things-Original-Research-on-Conflict-Resolution-Styles-in-Information-Security-Risk-Management-Rachael-Lininger.mp4

38.3 MB

PG23-Serial-Box-Primer-for-dealing-with-Serial-and-JTAG-for-basic-hardware-hacking-Matthew-Jakubowski.mp4

46.1 MB

PW00-passwords-privacy-keystroke-dynamics-Per-Thorsheim.mp4

38.6 MB

PW01-Unspeakable-passwords-pronounceable-or-Diceware-Jeffery-Goldberg.mp4

70.3 MB

PW02-Pushing-on-String-Adventures-in-the-Dont-Care-Regions-of-Password-Strength-Cormac-Herley.mp4

86.6 MB

PW03-What-would-fix-passwords-Some-weekly-password-audits-Pretty-graphs-to-prove-it-A-Haiku-Rick-Redman-Dale-Corpron.mp4

41.4 MB

PW04-Breachego-Christian-Heinrich.mp4

42.4 MB

PW05-Tell-Me-Who-You-Are-and-I-Will-Tell-You-Your-Lock-Pattern-Marte-LAge.mp4

196.8 MB

PW06-Scrutinizing-WPA2-Password-Generating-Algorithms-in-Wireless-Routers-Eduardo-Novella.mp4

36.2 MB

PW07-Poppin-Digital-Locks-Devin-Egan.mp4

35.0 MB

PW08-Privileges-in-the-Real-World-Securing-Password-Management-Andrey-Dulkin.mp4

35.1 MB

PW09-Security-Questions-Considered-Harmful-Jim-Fenton.mp4

31.3 MB

PW10-I-Forgot-My-Password-Michal-A-paAek.mp4

59.5 MB

PW11-Harvesting-Passwords-from-Source-Code-Scripts-and-Code-Repositories-Philippe-Paquet.mp4

48.5 MB

PW12-Towards-Standardizing-Comparisons-of-Password-Guessability-Sean-Segreti-Blase-Ur.mp4

43.9 MB

PW20-Password-Based-Encryption-Using-IO-Hardness-Greg-Zaverucha.mp4

33.0 MB

PW21-Auth-for-Encrypted-Services-with-Server-Side-APT.mp4

46.4 MB

PW22-Blind-Hashing.mp4

39.4 MB

PW23-PBKDF2-Performance-Matters.mp4

30.9 MB

PW24-Password-Alert-by-Google.mp4

40.1 MB

PW25-No-More-Graphical-Passwords-Mark-Brunett.mp4

35.3 MB

PW26-How-Secure-Are-Multi-Word-Random-Passphrases.mp4

39.2 MB

PW27-Are-You-Sure-That-You-Still-Need-Passwords.mp4

24.0 MB

/BSides London/

Alec Muffett - sex, lies and instant messenger.mp4

31.6 MB

Aman Hardikar - Introducing Opabinia (SSLAuditor4) (Rookie Track).mp4

24.1 MB

Arron Finnon Finuxs Historical Tour of IDS Evasion, Insertions and Other Oddities.mp4

256.5 MB

Arron Finnon - DNS Tunnelling It s all in the name!.mp4

99.7 MB

B-Sides London 2013 Memories.mp4

18.7 MB

Beverley A MacKenzie - Why Information Security Should Be Important To All Of Us (Rookie Track).mp4

26.1 MB

Brian Honan - Layer 8 Security.mp4

133.7 MB

BSides London 2014 Promo.mp4

6.8 MB

BSidesLondon 2014 Closing Ceremony.mp4

441.6 MB

Cam Buchanan - Probe to Pwn (Rookie Track).mp4

27.9 MB

Craig Young Easy Ways to Bypass Anti Virus Systems.mp4

198.2 MB

d3sre - RFID Hacking - An Introduction (Rookie Track).mp4

33.8 MB

Dalian Terry & Sam Sanoop - Teaching Kids Programming and Cyber Security (Rookie Track).mp4

27.1 MB

David Rook - Jedi Mind Tricks.mp4

149.4 MB

Dr Gareth Owen TOR - Attacks and Countermeasures.mp4

194.9 MB

Dr Paul Judge - Social Media & Security.mp4

275.0 MB

Frederic Mohr - CSP Analysis - Attacking XSS Mitigation (Rookie Track).mp4

40.4 MB

Gavin Holt Honeywords - Detectable Password Theft.mp4

68.2 MB

Georgi Boiko - Is Privacy Still A Thing (Rookie Track).mp4

31.8 MB

Graham Sutherland Breaking Binary Protocols and Bad Crypto.mp4

258.7 MB

Grant Willcox - Crawling Metadata with Recon-ng (Rookie Track).mp4

27.2 MB

Herbie Zimmerman - When a noob becomes aware (Rookie Track).mp4

28.6 MB

Jack Daniel Impromptu Talk on B-Sides.mp4

254.5 MB

Jim Shields - The Funny Thing About Information Security.mp4

89.5 MB

Jimmy Blake - Cloud Computing.mp4

143.8 MB

Joseph Gwynne-Jones - The Joy of Passwords (Rookie Track).mp4

25.5 MB

Justin Clarke - Practical Crypto Attacks Against Web Applications.mp4

155.6 MB

Kaitlyn Garratley - A Look at Modern Warfare (Rookie Track).mp4

25.7 MB

Kevin Breen RATs and IOC s - The Easy Way.mp4

128.7 MB

Ollie Whitehouse Defensive Security Research is Sexy too (& Real Sign of Skill).mp4

172.8 MB

Paul Amar CSRFT, A Toolkit for CSRF Vunerabilities.mp4

193.2 MB

Rafal Wojtczuk LoL (Layers on Layers) - Bypassing Security for Fun and Profit V2.mp4

192.0 MB

Rory McCune - Penetration Testing Must Die.mp4

92.6 MB

Sasha Zivojinovic - Run-time Tools to aid Application Security Assessments (Rookie Track).mp4

32.1 MB

Scott MacKenzie - InfoSec is a Board Responsibility (Rookie Track).mp4

30.6 MB

Shaun Jones - Social Engineering Phishing Stories (Rookie Track).mp4

31.2 MB

Stephen de Vries Contininuous Security Testing in a DevOps World (Rerelease).mp4

289.8 MB

Trey Ford - Keynote Virus! Malware! and Threats! Oh My!.mp4

305.7 MB

Wicked Clown - Breaking out of Restricted RDP.mp4

71.2 MB

Xavier Mertens - All Your Logs Are Belong To You!.mp4

199.2 MB

/.../BSides Nashville 2014/

000 welcome to bsides nashville.mp4

33.8 MB

001 bsides harmonicas and communication skills jack daniel.mp4

149.0 MB

002 closing ceremonies.mp4

16.7 MB

100 attack paths breaking into infosec from it or other totally different fields eve adams.mp4

132.7 MB

101 learn from your mistakes adam len compton.mp4

101.6 MB

102 beating the infosec learning curve without burning out scott thomas.mp4

82.9 MB

103 sun tzu was a punk confucius was an infosec rockstar branden miller.mp4

94.7 MB

200 making mongo cry automated nosql exploitation with nosqlmap russell butturini.mp4

90.1 MB

201 the bsidesnash talk that keeps YouTube up all night (2).mp4

98.4 MB

201 the bsidesnash talk that keeps YouTube up all night.mp4

102.2 MB

202 how do i hack thee let me count the ways stewart fey.mp4

211.1 MB

203 healthcare security which protocal adam john.mp4

159.7 MB

204 why you can t prove you re pwnd but you are ben miller.mp4

172.6 MB

300 bending and twisting networks paul coggin.mp4

198.2 MB

301 succeeding with enterprise software security key performance indicators rafal los.mp4

200.9 MB

302 scaling security in the enterprise making people a stronger link kevin riggs.mp4

161.8 MB

305 seeing purple hybrid security teams for the enterprise mark kikta.mp4

81.7 MB

Applying analog thinking to digial networks Winn Schwartau.mp4

226.6 MB

Barry White version 100 attack paths breaking into infosec Eve Adams.mp4

165.9 MB

/.../BSides Nashville 2015/

B00 Applied Detection and Analysis Using Flow Data Jason A Smith.mp4

125.3 MB

B01 Using devops monitoring tools to increase security visibility Chris Rimondi.mp4

60.7 MB

B02 The Great Trojan Demo Ben Miller.mp4

99.6 MB

B03 Nobody Understands Me Better Executive Metrics Michael St Vincent.mp4

119.0 MB

B04 Agile and Security Oil and Water Ron Parker.mp4

83.6 MB

BSides Nashville Intro and Pondering the False Economy of Secrets Trey Ford @TreyFord.mp4

105.6 MB

G01 We Built This So Can You Tim Fowler.mp4

114.3 MB

G02 Thats NOT my RJ45 Jack IRL Networking for Humans Johnny Xmas.mp4

81.8 MB

G03 Finding Low Hanging Fruit with Kali Stephen Haywood.mp4

109.0 MB

G04 What do infosec practitioners actually do Slade Griffin.mp4

122.6 MB

R00 From Parking Lot to Server Room Tim Roberts and Brent White.mp4

172.3 MB

R01 N4P Wireless Pentesting So easy even a caveman can do it Chris Scott.mp4

140.7 MB

R02 hashcat NSAKEY.mp4

133.6 MB

R04 Skiddiemonkeys Fling stuff at your Defenses and See What Sticks Russell Butturini Joshua Tower.mp4

94.6 MB

/.../B-Sides Orlando 2013/

Bsides Orlando - Joey Belans - Hacking Like It s 1999.mp4

66.5 MB

Bsides Orlando - Jordan Wiens - Capture The Flag Introduction.mp4

113.5 MB

Bsides Orlando - Luis Santana - Hacking Non-Traditional Systems.mp4

211.4 MB

Bsides Orlando - Owen Redwood - Lessons From Training Ninjas.mp4

78.4 MB

Bsides Orlando - Tim Armstrong - Android Malware Grows Up.mp4

67.0 MB

/.../B-Sides Orlando 2014/

Alex Hutton - Alex Dreams of Risk.mp4

162.8 MB

Jack Daniel - Survival Skills for Infosec Pros.mp4

89.3 MB

Jeff Toth - Tacticool Mindset.mp4

48.3 MB

Jess Hires - Physical Security From Locks to Dox.mp4

70.8 MB

Jorge Orchilles -- Windows Phone 8 Security and Testing WP8 Apps.mp4

136.3 MB

Keith Perry - Roll Your Own Internet of Things Search Engine.mp4

107.4 MB

Lee V Mangold - Decoding the Air An introduction to low cost SDR decoding.mp4

136.5 MB

Luis Connection Santana (hacktalk) - Phishing Like The Pros.mp4

65.0 MB

Rod Soto - Civilianization of War Paramilitarization of Cyberspace.mp4

128.8 MB

Vikram Dhillon - Wrecking the ultimate defense Human Body.mp4

132.3 MB

voodooKobra - When Frameworks... Don t.mp4

27.5 MB

/.../BSides Portland 2011/

B-Sides Portland 2011 Connecting IT Security s community through B-Sides.mp4

4.0 MB

B-Sides Portland 2011 Covert Calling - Secrets of Social Engineering Revealed.mp4

5.7 MB

B-Sides Portland 2011 Driving Secure Development Using a Threat Model.mp4

4.2 MB

B-Sides Portland 2011 Highlights about BSidesPDX from Organizers.mp4

19.5 MB

B-Sides Portland 2011 Preview of SCADA Security - Why is it So Hard.mp4

9.2 MB

B-Sides Portland 2011 Preview to Level Up - How Security is not like a Video Game.mp4

7.9 MB

B-Sides Portland 2011 Preview to Using a Blender Game for Security Visualization.mp4

7.3 MB

B-Sides Portland 2011 Recap on OS Security for Specific Purpose Devices.mp4

8.8 MB

B-Sides Portland 2011 Recap on The Need for Hackers, Hackerspaces and Hacktivism.mp4

11.5 MB

B-Sides Portland 2011 When IT Fails by Tripwire s Founder, Gene Kim.mp4

8.4 MB

Security B-Sides co-founder speaks about the evolution of B-Sides.mp4

9.0 MB

/.../BSides Raleigh 2014/

Dan Kaminsky - BSides Raleigh.mp4

388.2 MB

grep visualization var logs unused - Dr Carrie Gates - BSides Raleigh.mp4

243.7 MB

Security on the Blockchain Past Present & The Future - Shannon Code.mp4

165.5 MB

Slaying the Hydra Evolution and Mitigation of Denial-of-Service Attacks - BSides Raleigh.mp4

169.8 MB

/BSides Rhode Island/

BsidesRI 2013 0 Large scale application security Charlie Eriksen.mp4

155.3 MB

BsidesRI 2013 1 0 Hacking Your Neighbors for Fun! Josh Wright.mp4

163.9 MB

BsidesRI 2013 1 1 Public cloud PCI compliance or a sharp stick in the eye, which to choose Chris.mp4

213.6 MB

BsidesRI 2013 1 2 Bite the Wax Tadpole The importance of culture in user security Kati Rodzon.mp4

219.5 MB

BsidesRI 2013 1 3 Exploiting the Top Ten Database Vulnerabilities and Misconfigurations Josh Sha.mp4

184.2 MB

BsidesRI 2013 1 4 Exploit Development for Mere Mortals Joe McCray.mp4

197.1 MB

BsidesRI 2013 1 5 Future Trends in IT security Ron Gula.mp4

179.5 MB

BsidesRI 2013 1 6 The Freaky Economics Of Cybersecurity Robert David Graham.mp4

170.7 MB

BsidesRI 2013 1 SMB SRMF for identifying top 10 risks Jim Peeler.mp4

205.8 MB

BsidesRI 2013 2 0 Booting the Booters, Stressing the Stressors Allison Nixon and Brandon Levene.mp4

174.9 MB

BsidesRI 2013 2 1 Talk More Better Jack Daniel.mp4

196.0 MB

BsidesRI 2013 2 3 So, you want to compute post apocalypse Larry Pesce & Darren Wigley.mp4

198.2 MB

BsidesRI 2013 2 4 Feeling Sick Healthcare Information Security Roy Wattanasin.mp4

155.8 MB

BsidesRI 2013 2 5 Blitzing with Your Defense Ben Jackson.mp4

184.3 MB

BsidesRI 2013 2 6 Lessons Learned Why I became a PaulDotCom Intern and why you should become an In.mp4

90.8 MB

BsidesRI 2013 2 7 Learning Security on the Cheap Patrick Laverty.mp4

64.3 MB

BsidesRI 2013 2 How I Do a Weekly Podcast or Three) Paul Asadoorian.mp4

217.8 MB

BsidesRI 2013 3 Show and Tell Super Minipwner James Edge.mp4

171.8 MB

BsidesRI 2013 4 Opening the Treasure Chest Attacking Network Attached Storage on a Pen Test Russ.mp4

173.2 MB

BsidesRI 2013 Closing Paul Asadoorian, Patrick Laverty & Mike Perez.mp4

42.3 MB

BsidesRI 2013 Intro with Paul Asadoorian, Patrick Laverty & Mike Perez.mp4

29.3 MB

/BSides Salt Lake City/

BSdiesSLC 2015 -- What To Do When Something Bad Has Happened -- Jason Wood.mp4

101.8 MB

BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.mp4

167.4 MB

BSidesSLC 2015 - Asymmetric Warfare and Corollaries in Network Defense - Jason Tracy.mp4

87.0 MB

BSidesSLC 2015 - Building AppSec In - Seth Law.mp4

113.1 MB

BSidesSLC 2015 - Cloud Security - Scott Arveseth.mp4

262.8 MB

BSidesSLC 2015 - Fighting Hardware Attacks with Software - Doktor Unicorn.mp4

147.8 MB

BSidesSLC 2015 - From Vim Muggle to Wizard in 10 Easy Steps - Erik Falor.mp4

262.0 MB

BSidesSLC 2015 - Hey Guys, I m a Pentester! - Metacortex.mp4

50.7 MB

BSidesSLC 2015 - Malware Fun - Kenny Long.mp4

87.0 MB

BSidesSLC 2015 - PlagueScanner An Open Source Multiple AV Scanner Framework - Robert Simmons.mp4

151.7 MB

BSidesSLC 2015 - RBAC is Dead. So now what - Adam Fisher.mp4

135.5 MB

BSidesSLC 2015 -- Authenticode in-depth -- Scott Piper.mp4

153.3 MB

BSidesSLC 2015 -- Bad USB Weaponized -- Dan Anderson and Steve Fink.mp4

70.2 MB

BSidesSLC 2015 -- BREAKING in BAD (I m the one who doesn t knock) -- Jayson E. Street.mp4

337.7 MB

BSidesSLC 2015 -- Feeding the Shark -- Jeremy Pierson.mp4

173.1 MB

BSidesSLC 2015 -- How to prevent eavesdropping on office VoIP calls -- Dmitry Dessiatnikov.mp4

178.2 MB

BSidesSLC 2015 -- InfoSec, Just Doing It -- Rob Jorgensen.mp4

184.5 MB

BSidesSLC 2015 -- Leading Change -- John Overbaugh.mp4

173.4 MB

BSidesSLC 2015 -- Pragmatic Cloud Security -- Joshua Danielson.mp4

130.2 MB

BSidesSLC 2015 -- Psst, Come Check Out My Lair!! #notacreeper -- Justin Larson.mp4

118.6 MB

BSidesSLC 2015 -- Security Onions and Honey Potz -- Ethan Dodge.mp4

204.1 MB

BSidesSLC 2015 -- Security Researcher, Security Besmircher -- Kevin Johnson.mp4

101.4 MB

BSidesSLC 2015 -- Social Engineering The Good, the Bad, and the Ugly -- Stephanie Carruthers.mp4

76.6 MB

BSidesSLC 2015 -- Take Charge of Your Infosec Career! -- Glen Roberts.mp4

114.2 MB

BSidesSLC 2015 -- The Inception Framework Cloud Based Attack -- Waylon Grange.mp4

111.4 MB

BSidesSLC 2015 -- The Secret Lives of Debuggers -- Lance Buttars.mp4

167.7 MB

BSidesSLC 2015 -- Trends In Exploit Kits -- Jeffrey Doty.mp4

224.7 MB

BSidesSLC 2015 -- Why You Need To Be Red Team ed -- Nate McConnell.mp4

98.9 MB

BSidesSLC 2015 -- You Must Search Before You Destroy -- Adam Steed.mp4

150.2 MB

/.../BSides San Francisco 2012/

Security s Best Asset are Argumentative Geeks.mp4

22.8 MB

/.../BSides San Francisco 2015/

00 BSidesSF 2015 Intro.mp4

14.2 MB

100 Stick a Pin in Certificate Pinning How to Inspect Mobile Traffic and Stop Data Exfiltration Gopa.mp4

122.5 MB

101 OSXCollector Forensic Collection and Automated Analysis for OS X Ivan Leichtling.mp4

93.0 MB

102 DNS Spikes Strikes and The Like thomas mathew.mp4

49.8 MB

103 Ask the EFF Kurt Opsahl.mp4

179.8 MB

104 Your Users Passwords Are Already Stolen Lucas Zaichkowsky.mp4

48.6 MB

106 Medical Device Security From Detection To Compromise Scott Erven.mp4

139.0 MB

107 How SecOps Can Convince DevOps To Believe In The Bogeyman Leif Dreizler.mp4

103.5 MB

108 Human Hunting Sean Gillespie.mp4

139.3 MB

109 Phighting Phishers Phake Phronts Kevin Bottomley.mp4

85.4 MB

110 Corporate Governance For Fun and NonProfit Christie Dudley.mp4

103.5 MB

111 HIPAA 2015 Wrath of the Audits W Hudson Harris.mp4

137.4 MB

112 Lessons Learned from Building and Running MHN the Worlds Largest Crowdsourced Honeynet Jason Tro.mp4

76.9 MB

113 Getting started Let me help you David Trollman.mp4

130.0 MB

200 Critical Infrastructure The Cloud loves me The Cloud loves me not Bryan Owen.mp4

130.3 MB

201 Fck These Guys Practical Countersurveillance Lisa Lorenzin.mp4

128.1 MB

202 Collective Action Problems in Cybersecurity Allan Friedman.mp4

86.1 MB

203 Intrusion Detection in the clouds Josh Pyorre.mp4

52.2 MB

204 Hacker or criminal Repairing the reputation of the infosec community Melanie Ensign.mp4

144.5 MB

205 Student Surveillance How Hackers Can Help Protect Student Privacy Jessy Irwin.mp4

144.6 MB

206 When Doing the Right Thing Goes Wrong Impact of Certificates on Service Based Infrastructure Rob.mp4

88.2 MB

207 How to Lie with Statistics Information Security Edition Tony Martin Vegue.mp4

117.5 MB

208 Ground Zero Financial Services The Latest Targeted Attacks from the Darknet Brian Contos.mp4

80.4 MB

209 Securing the Hastily Formed Network Infosec for Disaster Relief and Emergency Response Rakesh Bh.mp4

164.8 MB

210 GitReview Reflective Control In Action Jon Debonis.mp4

57.1 MB

212 Blink The Network Perimeter is Gone Rick Farina ZeroChaos.mp4

143.0 MB

213 Federating AWS CLI Paul Moreno.mp4

67.0 MB

/BSides Sao Paulo/

Bsides 2013 - Escalonador seguro para sistemas embarcados (Rodrigo Maximiano).mp4

185.0 MB

Bsides 2013 - Mobile Maware (Fernando Cardoso).mp4

153.6 MB

Bsides 2013 - Mobile or not mobile bank for financial transactions (Thiago Bordini).mp4

139.6 MB

Bsides 2013 - Seguranca Acessivel (Fabiola e Fernando).mp4

186.1 MB

Bsides 2013 - The Bozo Security goes to (Rodrigo(Sp0oKeR) Montoro).mp4

172.6 MB

Bsides 2013 - Utilizando um smartphone como pivo para um ataque interno (Rener Alberto).mp4

229.4 MB

/BSides St. Johns/

B-Sides St. John s 2013 - Session 01 - Travis Barlow.mp4

119.3 MB

B-Sides St. John s 2013 - Session 02 - Mark Nunnikhoven.mp4

182.2 MB

B-Sides St. John s 2013 - Session 03 - Chris Vernon.mp4

83.8 MB

B-Sides St. John s 2013 - Session 04 - Peter Rawsthorne.mp4

52.1 MB

B-Sides St. John s 2013 - Session 05 - Zack Mullaly.mp4

45.5 MB

B-Sides St. John s 2013 - Session 06 - Charles Robertson.mp4

209.7 MB

B-Sides St. John s 2013 - Session 07 - Darryl MacLeod.mp4

63.4 MB

B-Sides St. John s 2013 - Session 08 - Joe Dawson.mp4

110.2 MB

B-Sides St. John s 2013 - Session 09 - Garry Coldwells.mp4

97.6 MB

/.../BSides Tampa 2015/

100 Bug Bounties and Security Research Kevin Johnson.mp4

99.8 MB

101 Securing The Cloud Alan Zukowski.mp4

132.2 MB

102 Hacking Chris Berberich.mp4

108.7 MB

103 Vendor Induced Security Issues Dave Chronister.mp4

114.6 MB

104 Pentest Apocalypse Beau Bullock.mp4

95.5 MB

105 Kippo and Bits and Bits Chris Teodorski.mp4

97.1 MB

106 The Art of Post infection Response Mitigation Caleb Crable.mp4

110.5 MB

107 The Need for Pro active Defense and Threat Hunting Within Organizations Andrew Case.mp4

148.7 MB

200 Finding Common Ground Within the Industry and Beyond David Shearer.mp4

92.4 MB

201 Ways to Identify Malware on a System Ryan Irving.mp4

136.0 MB

202 Android Malware and Analysis Shane Hartman.mp4

135.3 MB

203 Teaching Kids and Even Some Adults Security Through Gaming Le Grecs.mp4

116.3 MB

204 Evaluating Commercial Cyber Threat Intelligence John Berger.mp4

123.7 MB

300 Cyber Geography and the Manifest Destiny of the 21st Century Joe Blankenship.mp4

67.3 MB

301 Mitigating Brand Damage From A Cyber Attack Guy Hagen.mp4

114.6 MB

302 What is a security analyst and what job role will they perform James Risler.mp4

111.6 MB

303 Live Forensic Acquisition Techniques Joe Partlow.mp4

114.1 MB

304 Cyber Security Awareness for Healthcare Professionals Marco Polizzi.mp4

144.5 MB

/BSides Toronto/BSidesTO 2014/

BSidesTO 2014 - A Practical Approach to Hacking an Enterprise with YASUO - Saurabh & Stephen.mp4

56.2 MB

BSidesTO 2014 - Batch Firmware Analysis - Jeremy Richards.mp4

48.7 MB

BSidesTO 2014 - Blackhat Python - Dan Frisch.mp4

113.3 MB

BSidesTO 2014 - Communities @ Risk - Katie Kleemola.mp4

34.4 MB

BSidesTO 2014 - Corporations in the middle - Lee Brotherson.mp4

59.5 MB

BSidesTO 2014 - Cryptocurrencies and Security - Michael Perklin.mp4

53.2 MB

BSidesTO 2014 - ELK Not P.O.S. - Jason Kendall.mp4

42.5 MB

BSidesTO 2014 - Honeydocs and Offensive Countermeasures - Roy Firestein.mp4

57.4 MB

BSidesTO 2014 - Hopping on the CAN Bus - Eric Evenchick.mp4

64.1 MB

BSidesTO 2014 - Logs and Tactical Defence - Allan Stojanovic.mp4

37.2 MB

BSidesTO 2014 - Pwning all the Internet of things for fun and profit - Ben Hughes.mp4

34.9 MB

BSidesTO 2014 - Recog Open Source Asset and Service Identification - Greg Wiseman.mp4

47.6 MB

BSidesTO 2014 - Security and Behavioural Economics - Augusto Barros.mp4

83.5 MB

BSidesTO 2014 - Shut the Front Door - Mark Bassegio.mp4

106.0 MB

BSidesTO 2014 - The Hitchhiker s Guide to Information Security - Kellman Meghu.mp4

118.5 MB

BSidesTO 2014 - Voltron - Richo Healey.mp4

113.6 MB

/BSides Vancouver/

BSides Vancouver 2015 - Alex Loffler - Advanced Security Analytics.mp4

240.4 MB

BSides Vancouver 2015 - Andree Toonk - BGP Hijack - Who s Stealing Your Prefixes.mp4

138.0 MB

BSides Vancouver 2015 - Bob Fruth - Threat Modeling in the Age of Connectivity to Everything.mp4

74.5 MB

BSides Vancouver 2015 - Irfahn Khimji & Ken Westin - I am The Insider Threat.mp4

194.1 MB

BSides Vancouver 2015 - Keynote Mark Weinstein - Reality Check Does Privacy Truly Matter Today.mp4

151.4 MB

BSides Vancouver 2015 - Keynote Steven Rambam - You ve Lost Privacy, Now They re Taking Anonymity.mp4

312.5 MB

BSides Vancouver 2015 - Robert Wood - Threat Modeling in the Gaming Industry.mp4

379.0 MB

BSides Vancouver 2015 - VEC Panel - Entrepreneurial lessons learned and best practices.mp4

176.6 MB

BSides Vancouver 2015 - Wesley Wineberg - Analyzing the EMU-2 Zigbee Home Energy Monitor.mp4

388.0 MB

/.../BSides Warsaw 2014/

Jakub Unknow Mrugalski - This is (s)hell!.mp4

185.6 MB

Maciej mak Kotowicz vel matematyk - Wakacyjne rachunki.mp4

134.7 MB

Mariusz oshogbo vx Zaborski - Budowanie appliance sieciowego w oparciu o otwarte oprogramowanie.mp4

120.8 MB

matt3.mp4

88.6 MB

/.../BSides Winnipeg 2013/

Adrien de Beaupre - Making Pen-Testing Analysis Sexy.mp4

171.1 MB

Brandon Enright - Detecting Malicious Activity and Malware on a Large Network.mp4

179.6 MB

Closing Ceremonies BSides Winnipeg 2013.mp4

61.7 MB

Ian Trump - Cyber Threat Intelligence Is it Real, or is it Hokum.mp4

234.1 MB

Jared Bater & Chris Kluka - Canadian Cyber Defence Challenge Building a War Zone.mp4

177.3 MB

Josh More - Security Metaphors Discussing problems with others while avoiding arguments.mp4

186.6 MB

Kyle Geske - Internet Bots for Fun & No Profit.mp4

106.9 MB

Leslie Bester - VoIP and VoIP Related Fraud.mp4

115.9 MB

Mark Jenkins - Auditable Offline Bitcoin Wallet Implementation.mp4

135.5 MB

Michael Legary - NFC & RFID Harvesting for REDACTED.mp4

206.7 MB

Michael Zapp - SSD Security Risks.mp4

236.8 MB

Richard Rodd & Chris Otto - USB A Look Inside.mp4

139.1 MB

Sergii Polishcuk - ARP attack on IXP infrastructure.mp4

82.9 MB

Theo Baschak - InfoSec from an ISP Perspective.mp4

120.8 MB

Yvan Boily - Security in the Open.mp4

208.2 MB

/

Security BSides thank you.txt

3.0 KB

 

Total files 759


Copyright © 2025 FileMood.com