/BSidesCHS 2013/
|
BSidesCHS 2013 - Session 03 - Waging War on an Entire City.mp4
|
1.7 GB
|
BSidesCHS 2013 - Session 01 - Passive Recon.mp4
|
87.0 MB
|
BSidesCHS 2013 - Session 02 - Java Shellcode Execution.mp4
|
134.8 MB
|
/.../BSides Augusta 2013/
|
BSidesAugusta 2013 Christopher Campbell and Matthew Graeber - Living Off the Land.mp4
|
115.7 MB
|
BSidesAugusta 2013 David Bianco - Enterprise Security Monitoring.mp4
|
192.5 MB
|
BSidesAugusta 2013 David Coursey - Sheep and Sheepdogs Employing EMET for Application Security.mp4
|
131.8 MB
|
BSidesAugusta 2013 Doug Burks - Security Onion Peeling Back the Layers of Your Network in Minutes.mp4
|
219.0 MB
|
BSidesAugusta 2013 Martin Holste - Not BigData, AnyData.mp4
|
153.5 MB
|
BSidesAugusta 2013 Mike Jones - Unconventional Methodologies to consider in Information Security.mp4
|
73.4 MB
|
BSidesAugusta 2013 Paul Coggin - Digital Energy BPT (Basic Persistent Threat).mp4
|
82.0 MB
|
BSidesAugusta 2013 Richard Bejtlich Keynote.mp4
|
198.3 MB
|
BSidesAugusta 2013 Ron Martin - Human Shields for your Network.mp4
|
86.9 MB
|
BSidesAugusta 2013 Tim Tomes - Look Ma, No Exploits! - The Recon-ng Framework.mp4
|
105.7 MB
|
BSidesAugusta 2013 Brad Shoop & Chris Rimondi - Eyeing the Onion.mp4
|
179.1 MB
|
/.../BSides Augusta 2014/
|
BSidesAugusta 2014 Chris Campbell - Using Microsofts Incident Response Language.mp4
|
156.0 MB
|
BSidesAugusta 2014 Chris Sanders - Defeating Cognitive Bias and Developing Analytic Technique.mp4
|
141.0 MB
|
BSidesAugusta 2014 Chris Sistrunk - ICS SCADA Defense.mp4
|
154.6 MB
|
BSidesAugusta 2014 Chris Truncer - Pentester++.mp4
|
138.5 MB
|
BSidesAugusta 2014 David Dewey - App Wrapping What does that even mean.mp4
|
55.3 MB
|
BSidesAugusta 2014 Jacob Williams - Spying on your employees using memory.mp4
|
134.3 MB
|
BSidesAugusta 2014 Jeff Murri - Is that hardware in your toolkit, or are you just.mp4
|
172.7 MB
|
BSidesAugusta 2014 Mark Baggett - Crazy Sexy Hacking Outro.mp4
|
134.3 MB
|
BSidesAugusta 2014 Mark Baggett Welcome to BSidesAugusta.mp4
|
31.5 MB
|
BSidesAugusta 2014 Mike Reeves - Scaling Security Onion to the Enterprise.mp4
|
146.9 MB
|
BSidesAugusta 2014 Tim Crothers - Techniques for Fast Windows Investigations.mp4
|
122.6 MB
|
BSidesAugusta 2014 Tim Fowler - When Zombies take to the Airwaves.mp4
|
148.6 MB
|
BSidesAugusta 2014 Tim Tomes - The Adobe Guide to Keyless Decryption.mp4
|
132.7 MB
|
BSidesAugusta 2014 Will Schroeder - Adventures in Asymmetric Warfare.mp4
|
78.5 MB
|
/.../BSides Augusta 2015/
|
00-Welcome-Major-General-Fogarty.mp4
|
76.8 MB
|
01-Keynote-Ed-Skoudis.mp4
|
70.1 MB
|
BT100-Fundamental-Understanding-of-Baseline-Analysis-and-Remediation-for-Industrial-Control-Systems-Juli-Joyner-and-Jeffrey-Medsger.mp4
|
82.2 MB
|
BT101-Taking-a-Distributed-Computing-Approach-to-Network-Detection-with-Bro-and-aThe-Clouda-Mike-Reeves.mp4
|
223.6 MB
|
BT102-A-A-Scouts-Perspective-on-Network-Defense-Justin-Edgar.mp4
|
185.5 MB
|
BT103-Doomsday-Preppers-APT-Edition-Tanner-Payne.mp4
|
34.1 MB
|
BT104-Building-a-Better-Security-Analyst-Using-Cognitive-Psychology-Chris-Sanders.mp4
|
40.6 MB
|
BT105-Viper-Framework-for-Malware-Analysis-Paul-Melson.mp4
|
33.3 MB
|
BT106-Infiltrating-C2-Infrastructure-Tim-Crothers.mp4
|
109.4 MB
|
BT107-Building-aMuscle-Memory-with-Rekall-Memory-Forensic-Framework-Alissa-Torres.mp4
|
77.7 MB
|
BT108-The-Blue-Team-Starter-Kit-Timothy-De-Block.mp4
|
57.1 MB
|
BT200-Go-Hack-Yourself-Jason-Frank.mp4
|
66.2 MB
|
BT201-2015-Its-not-over-yet-Joel-Esler.mp4
|
112.9 MB
|
BT202-How-to-Get-Into-ICS-Security-Chris-Sistrunk.mp4
|
75.6 MB
|
BT203-Destruction-as-a-Service-Security-Through-Reanimation-Jon-Medina.mp4
|
61.9 MB
|
BT204-The-Programmatic-Evolution-of-Technology-Defense-Roland-Cloutier.mp4
|
66.7 MB
|
BT205-Lessons-Learned-from-Analyzing-Terabytes-of-Malware-Wes-Widner.mp4
|
59.0 MB
|
RT100-Using-a-HackRF-One-to-Infiltrate-the-Digital-Thetford-Wall-Patrick-Perry.mp4
|
60.0 MB
|
RT101-Malvertizing-Like-a-Pro-Alex-Rymdeko-Harvey.mp4
|
66.4 MB
|
RT102-Weaponizing-our-youth-The-Case-for-Integrated-Cyber-Ethics-Josh-Rykowski.mp4
|
48.3 MB
|
RT103-Making-Everything-Old-New-Again-Andrew-Cole-and-Rich-Moulton.mp4
|
319.5 MB
|
RT104-DIY-Vulnerability-Discovery-with-DLL-Side-Loading-Jake-Williams.mp4
|
72.5 MB
|
RT105-Recon-ng-and-Beyond-Tim-Tomes.mp4
|
89.4 MB
|
RT106-Attacking-OWASP-Exploiting-the-Top-10-David-Coursey.mp4
|
65.5 MB
|
/.../Boston BSides 2013/
|
Alissa Torres Security BSides Boston 2013 - Sick Anti-Analysis Mechanisms From The Wild.mp4
|
134.5 MB
|
Allison Nixon Brandon Levene Security BSides Boston 2013 - The Noob Persistent Threat.mp4
|
176.6 MB
|
Andrew Clare Security BSides Boston 2013 - The Future Of Drones and the Impact On Infosec.mp4
|
181.6 MB
|
Ben April Security BSides Boston 2013 - NFC I Don t Think It Means What You Think It Means.mp4
|
176.3 MB
|
CJ Heres Security BSides Boston 2013 - Google TV The Next Generation.mp4
|
184.0 MB
|
Closing Remarks Security BSides Boston 2013 - Closing and Ending.mp4
|
30.8 MB
|
Dan Geer Security BSides Boston 2013 - Identity As Privacy.mp4
|
280.9 MB
|
Dan Stolts Security BSides Boston 2013 - Cloudy Weather How Secure Is The Cloud.mp4
|
157.3 MB
|
David Bressler Security BSides Boston 2013 - Maltego In The Enterprise.mp4
|
128.0 MB
|
David Dumas Security BSides Boston 2013 - Security 101 For New Security Professionals.mp4
|
188.3 MB
|
Deral Heiland Security BSides Boston 2013 - Plunder, Pillage and Print.mp4
|
195.9 MB
|
Jeff Northrop Security BSides Boston 2013 - The State Of Privacy & Proper Planning For The Future.mp4
|
177.1 MB
|
Joseph Cohen Security BSides Boston 2013 - Bluecat Netcat For Bluetooth.mp4
|
63.8 MB
|
Josh Corman Security BSides Boston 2013 - Good Enough Isn t Anymore The Value of Hitting Rock Bottom.mp4
|
235.1 MB
|
Keith Gilbert Security BSides Boston 2013 - Malformity.mp4
|
144.7 MB
|
Macy Cronkite Security BSides Boston 2013 - Splunk.mp4
|
64.0 MB
|
Oliver Day Security BSides Boston 2013 - Securing Change Call For Volunteers.mp4
|
95.2 MB
|
Paul Braren Security BSides Boston 2013 - Build Your Own VMWare ESXi & Microsoft Hyper V-Lab At Home.mp4
|
163.5 MB
|
Roy Wattanasin Security BSides Boston 2013 - Opening Remarks.mp4
|
7.3 MB
|
Schuyler Towne Security BSides Boston 2013 - Unlucky In Locks.mp4
|
169.9 MB
|
Walt Williams Security BSides Boston 2013 - Realistic Affordable & Quantitative Risk Management.mp4
|
161.3 MB
|
/.../Boston BSides 2014/
|
Abusing Mobile Games Ming Chow Security BSides Boston 2014.mp4
|
144.9 MB
|
Auditing all the things for smarter detection faster incident response Mark Thomas BSides Boston 14.mp4
|
92.5 MB
|
Doomed to repeat, InfoSec s failure to learn from the past Jack Daniel Security BSides Boston 2014.mp4
|
240.6 MB
|
Information Security Careers & Education Panel Security BSides Boston 2014.mp4
|
232.4 MB
|
Next Generation Red Teaming Robert Wood Security BSides Boston 2014.mp4
|
193.7 MB
|
Offensive Mobile Forensics Joey Peloquin Security BSides Boston 2014.mp4
|
167.6 MB
|
Pwninstaller 1.0 Will Shroeder Security BSides Boston 2014.mp4
|
94.7 MB
|
Target, Snowden, Heartbleed ... Oh my! Keynote by Rob Cheyne Security BSides Boston 2014.mp4
|
239.3 MB
|
The Challenge of Natural Security Systems Rockie Brockway Security BSides Boston 2014.mp4
|
164.5 MB
|
Using Hackers Own Methods & Tools to Defeat Persistent Adversaries Michael Davis BSides Boston 2014.mp4
|
186.6 MB
|
Why You Should Give Up Online Social Networks Jason Ding Security BSides Boston 2014.mp4
|
174.7 MB
|
/.../Boston BSides 2015/
|
100-Is-Threat-Modeling-for-Me-Robert-Hurlbut.mp4
|
73.2 MB
|
101-Hacker-or-criminal-Repairing-the-reputation-of-the-infosec-community-Melanie-Ensign.mp4
|
70.0 MB
|
102-Running-Away-from-Security-Web-App-Vulnerabilities-and-OSINT-Collide-Micah-Hoffman.mp4
|
68.4 MB
|
103-Robots-Ninjas-Pirates-and-Building-an-Effective-Vulnerability-Management-Program-Paul-Asadoorian.mp4
|
72.1 MB
|
104-Protect-Your-nKeys-to-the-Kingdomi-Securing-Against-the-Next-Inevitable-Cyberattack-Paul-Kozlov.mp4
|
336.9 MB
|
105-In-pursuit-of-a-better-crypto-puzzle-Samuel-Erb.mp4
|
188.9 MB
|
200-When-penguins-attack-Linuxs-role-in-the-malware-ecosystem-Chester-Wisniewski.mp4
|
73.5 MB
|
201-The-Benefits-in-Externalizing-DMZ-as-a-Service-in-the-Cloud-Israel-Barak.mp4
|
81.7 MB
|
202-Common-misconfigurations-that-lead-to-a-breach-Justin-Tharpe.mp4
|
57.8 MB
|
203-Applying-Big-Data-technology-to-security-use-case-Max-Pevzner.mp4
|
80.9 MB
|
204-Marketing-Theyre-not-all-Schmucks-Jen-Ellis-Josh-Feinblum.mp4
|
56.9 MB
|
205-Next-Gen-Incident-Management-Building-out-a-Modern-Incident-Management-Capability-John-McDonald.mp4
|
83.7 MB
|
BSides-Boston-2015-Closing.mp4
|
85.7 MB
|
K00-The-Securitized-State-Where-it-came-from-where-its-going-what-can-be-done-about-it-Molly-Sauter.mp4
|
74.2 MB
|
/BSidesCHS 2014/
|
BSidesCHS 2014 Allow myself to encrypt...myself! - Evan Davison.mp4
|
143.8 MB
|
BSidesCHS 2014 Ballin on a Budget - Andrew Morris.mp4
|
88.8 MB
|
BSidesCHS 2014 Building an Open Source Threat Intelligence Program - Edward McCabe.mp4
|
165.4 MB
|
BSidesCHS 2014 Just Apply the Patch - Robert Wessen.mp4
|
76.0 MB
|
BSidesCHS 2014 Keynote Speaker - Jason Street.mp4
|
472.6 MB
|
BSidesCHS 2014 Keynote Speaker - Kizz Myanthia.mp4
|
143.4 MB
|
BSidesCHS 2014 When a Security Architect Writes an Application - David Zendzian.mp4
|
359.1 MB
|
BSidesCHS 2014 WUDS You Say SmartAssPhone - Frank Catucci.mp4
|
143.6 MB
|
/.../BSides Chicago 2014/
|
Aligning Threats and Allies through Stories J Wolfgang Goerlich and Steven Fox.mp4
|
130.9 MB
|
Bioinformatics Erasing the line between biology and hacking Krystal Thomas White and Patrick Thomas.mp4
|
119.4 MB
|
Building an AppSec Program from Scratch Chris Pfoutz.mp4
|
47.0 MB
|
Bypassing EMET 41 Jared DeMott.mp4
|
49.5 MB
|
Call of Community Modern Warfare Matt Johnson & Ben Ten.mp4
|
75.7 MB
|
Checklist Pentesting; Not checklist hacking Trenton Ivey.mp4
|
197.5 MB
|
Checklist Pentesting_ Not checklist hacking Trenton Ivey.mp4
|
71.2 MB
|
closing.mp4
|
89.8 MB
|
Comparing Risks to Risks Why Asset Management Is Broken and How to Fix It Michael Roytman.mp4
|
150.8 MB
|
Everything I Ever Needed to Know About Infosec I Learned from Hollywood Tom Ervin.mp4
|
56.4 MB
|
Hacking Diversity in InfoSec Greg Thomas.mp4
|
90.2 MB
|
How To Win Friends and Influence Hackers Jimmy Vo.mp4
|
41.4 MB
|
InfoSec Big Joke 3rd Party Assessments moey.mp4
|
64.7 MB
|
intro.mp4
|
34.3 MB
|
jail.mp4
|
715.4 KB
|
Looking for the Weird Charles Herring.mp4
|
77.2 MB
|
Minecraft Security Riese Goerlich.mp4
|
45.0 MB
|
Seeing Purple Hybrid Security Teams for the Enterprise Belt.mp4
|
45.2 MB
|
Sit stay proxy Good beagle Why I love the beaglebone black and why you should too Colin Vallance.mp4
|
58.0 MB
|
The SMB Security Gap Mike Kavka.mp4
|
61.9 MB
|
The Ultimate INFOSEC Interview Why must I be surrounded by frickin idiots Dr Evil 1997 Stephen Heath.mp4
|
180.4 MB
|
/.../Bsides Cincinnati 2015/
|
BsidesCincy-2015-00-Welcome-and-Introduction-Josh-Ohmer-President-BSidesCincy.mp4
|
13.0 MB
|
BsidesCincy-2015-01-Lateral-Movement-Harlan-Carvey.mp4
|
360.0 MB
|
BsidesCincy-2015-02-Automated-Detection-Strategies-John-Davison.mp4
|
68.0 MB
|
BsidesCincy-2015-03-Powershell-for-Incident-Responders-Jesse-Lands.mp4
|
66.5 MB
|
BsidesCincy-2015-04-Cyber-Intelligence-Concrete-Analysis-in-a-Fluid-World-Coleman-Kane.mp4
|
81.5 MB
|
BsidesCincy-2015-05-The-Response-Ready-Infrastructure-Justin-Hall.mp4
|
73.3 MB
|
BsidesCincy-2015-06-A-Distributed-Computing-Approach-for-Network-Detection-Mike-Reeves.mp4
|
67.6 MB
|
BsidesCincy-2015-07-The-Value-of-a-Simple-DLP-Program-Chris-Tyo.mp4
|
60.5 MB
|
/.../BSides Cleveland 2014/
|
Am I an Imposter Warren Kopp.mp4
|
67.0 MB
|
APT2 Building a Resiliency Program to Protect Business Edward McCabe.mp4
|
91.2 MB
|
Attacking and Defending Full Disk Encryption Tom Kopchak.mp4
|
155.2 MB
|
Cleveland Locksport Jeff Moss Doug Hiwiller and Damon Ramsey.mp4
|
70.0 MB
|
Dave Kennedy and Mentos.mp4
|
7.2 MB
|
Fun with Dr Brown Spencer McIntyre.mp4
|
71.0 MB
|
Hacking Diversity Gregorie Thomas.mp4
|
69.0 MB
|
Keynote Dave Kennedy.mp4
|
107.4 MB
|
Lockade Locksport Electronic Games Adrian Crenshaw.mp4
|
171.6 MB
|
Malware Evolution Epidemiology Adam Hogan.mp4
|
125.8 MB
|
Password Defense Controls your users wont hate Nathaniel Maier.mp4
|
71.2 MB
|
Pentesting Layers 2 and 3 Kevin Gennuso and Eric Mikulas.mp4
|
170.0 MB
|
Phishing Like a Monarch With King Phisher Brandon Geise and Spencer McIntyre.mp4
|
59.8 MB
|
Plunder Pillage and Print The art of leverage multifunction printers during penetration testing Dera.mp4
|
115.1 MB
|
PowerShell cool $h!t Zach Wojton.mp4
|
103.7 MB
|
The importance of threat intel in your information security program Jamie Murdock.mp4
|
66.9 MB
|
Thinking Outside the Bunker Security as a practice not a target Steven Legg.mp4
|
48.1 MB
|
Threat Models that Exercise your SIEM and Incident Response J Wolfgang Goerlich and Nick Jacob.mp4
|
98.3 MB
|
/.../BSides Cleveland 2015/
|
BL00-Why-the-foundation-of-security-is-broken-Alex-Kot.mp4
|
36.8 MB
|
BL01-Desired-State-Configuration-DSC-Dream-Tool-or-Nightmare-for-Security-Baseline-and-Configuration-Management-Zack-Wojton-Wayne-Pruitt-zbirdflipper.mp4
|
37.6 MB
|
BL02-Common-Sense-Security-Framework-Jerod-Brennen-slandail.mp4
|
46.1 MB
|
BL03-Secure-Test-Driven-Development-Brakeman-Gauntlet-OWASP-and-the-Work-Still-to-Be-Done-Ricky-Rickard-rrickardjr.mp4
|
69.3 MB
|
BL05-Building-a-Threat-Intelligence-Program-Edward-McCabe-edwardmccabe.mp4
|
386.9 MB
|
BL06-Phishing-Witout-Ruby-Brandan-Geise-Spencer-McIntyre-coldfusion39.mp4
|
38.3 MB
|
BL07-Security-Not-Guaranteed-Or-how-to-hold-off-the-bad-guys-for-another-day-James-Gifford-Elijah-Snow-Rackley-jrgifford.mp4
|
35.0 MB
|
BL08-Cleveland-Locksport-Jeff-Moss-Doug-Hiwiller-Damon-Ramsey-jeffthemossman.mp4
|
43.7 MB
|
BL09-Augmenting-Mobile-Security-and-Privacy-Controls-Brian-Krupp-briankrupp.mp4
|
133.4 MB
|
BP00-DIY-Hacker-Training-a-Walkthrough-Warren-Kopp-warrenkopp.mp4
|
30.6 MB
|
BP01-Quick-start-your-Burp-Suite-extensions-Jython-and-automation-Marius-Nepomuceno.mp4
|
30.0 MB
|
BP02-Flourishing-in-a-Hostile-Work-Environment-Dennis-Goodlett.mp4
|
43.2 MB
|
BP03-Defense-in-Depth-Your-Security-Castle-Tom-Kopchak-tomkopchak.mp4
|
66.4 MB
|
BP04-EMET-Overview-and-Demo-Kevin-Gennuso-kevvyg.mp4
|
45.1 MB
|
BP05-10-Reasons-Your-Security-Education-Program-Sucks-Kris-French-Jr-Turtl3Up.mp4
|
71.3 MB
|
BP06-Call-of-Duty-Crypto-Ransomware-Brett-Hawkins-hawkbluedevil.mp4
|
74.3 MB
|
closing.mp4
|
3.3 MB
|
GS00-Morning-Keynote-Jack-Daniel.mp4
|
101.4 MB
|
GS01-Metasploit-Windows-Kernel-Exploitation-Spencer-McIntyre-zeroSteiner.mp4
|
76.4 MB
|
GS02-PwnDrone-The-Modern-Airborne-Cyber-Threat-Devin-Gergen-DevinGergen.mp4
|
71.9 MB
|
GS03-Afternoon-Keynote-Chris-Nickerson.mp4
|
73.9 MB
|
GS04-Why-the-Web-is-Broken-Bill-Sempf-sempf.mp4
|
384.8 MB
|
GS05-Outside-the-Box-David-Kennedy-Larry-Spohn-HackingDave-Spoonman1091.mp4
|
85.0 MB
|
GS06-The-Entropy-of-Obfuscated-Code-Adam-Hogan-adamwhogan.mp4
|
53.7 MB
|
/.../BSides Columbus 2015/
|
Defense00 Got software Need a security test plan Got you covered Bill Sempf.mp4
|
98.6 MB
|
Defense01 Corporate Wide SSL Interception and Inspection Frank Shaw.mp4
|
63.1 MB
|
Defense02 How to Rapidly Prototype Machine Learning Solutions to Solve Security Problems Jason Montg.mp4
|
192.3 MB
|
Defense03 A Basic Guide to Advanced Incident Response Scott Roberts.mp4
|
104.1 MB
|
Defense04 Supply and Demand Solving the InfoSec Talent Shortage Brandon Allen.mp4
|
85.4 MB
|
Jason Street Keynote.mp4
|
141.1 MB
|
Keynote00 Cloud and Virtualization Theory Grauben Guevara.mp4
|
90.1 MB
|
Offense00 User Behavior Analysis Matt Bianco.mp4
|
96.1 MB
|
Offense01 Plunder Pillage and Print The art of leverage multifunction printers during penetration te.mp4
|
167.9 MB
|
Offense02 Common Sense Security Framework Jerod Brennen.mp4
|
151.3 MB
|
Offense04 OWASP Mobile Top Ten Why They Matter and What We Can Do Ricky Rickard.mp4
|
115.1 MB
|
Special Teams00 Do We Still Need Pen Testing Jeff Mann.mp4
|
127.2 MB
|
Special Teams01 Trolling Attackers for Fun Profit Stephen Hosom.mp4
|
51.1 MB
|
Special Teams02 Inurlrobotstxt What are YOU hiding David Young.mp4
|
45.6 MB
|
Special Teams03 Malware Development as the Evolution of Parasites Adam Hogan.mp4
|
77.6 MB
|
Special Teams04 Snort Beyond IDS Open Source Application and File Control Adam Hogan.mp4
|
160.9 MB
|
/BSides DC/
|
BSides DC 2014 - A Better Way to Get Intelligent About Threats.mp4
|
216.9 MB
|
BSides DC 2014 - Adventures in Asymmetric Warfare Fighting the AV Vendors.mp4
|
448.4 MB
|
BSides DC 2014 - All About The Bass - Sing Off.mp4
|
26.4 MB
|
BSides DC 2014 - Bug Bounty Hunters Lessons From Darth Vader.mp4
|
589.6 MB
|
BSides DC 2014 - Building and Using A GPU Password Cracker.mp4
|
420.2 MB
|
BSides DC 2014 - Closing Remarks.mp4
|
41.6 MB
|
BSides DC 2014 - Cynomix Fireside Chat Demo.mp4
|
175.6 MB
|
BSides DC 2014 - Diamond Model for Intrusion Analysis What You Need to Know.mp4
|
308.4 MB
|
BSides DC 2014 - Diversity in IT #epicfail or #makingprogress.mp4
|
499.1 MB
|
BSides DC 2014 - Doctor Docker Building Your Infrastructure s Immune System.mp4
|
164.4 MB
|
BSides DC 2014 - Fighting Back Against SSL Interception (or How SSL Should Work).mp4
|
282.6 MB
|
BSides DC 2014 - Hacking Rants (from an almost old guy).mp4
|
352.2 MB
|
BSides DC 2014 - How Headlines Make Heads Roll The Media s Impact On Security.mp4
|
594.9 MB
|
BSides DC 2014 - in ur scm, bein a ninja.mp4
|
467.0 MB
|
BSides DC 2014 - Keynote.mp4
|
260.9 MB
|
BSides DC 2014 - MalwareViz a free Malware Visualizer.mp4
|
492.9 MB
|
BSides DC 2014 - Meatspace Indicators and Incident Response.mp4
|
441.2 MB
|
BSides DC 2014 - Network Attached Shell N.A.S.ty systems that store network accessible shells..mp4
|
272.0 MB
|
BSides DC 2014 - Once upon a time... InfoSec History 101.mp4
|
337.2 MB
|
BSides DC 2014 - Opening Acts How Attackers Get Their Big Breaks.mp4
|
426.9 MB
|
BSides DC 2014 - SWF Seeking Lazy Admin for Cross-Domain Action.mp4
|
388.7 MB
|
BSides DC 2014 - Training with Raspberry Pi.mp4
|
208.6 MB
|
BSides DC 2014 - What Does It Actually Take to Start a Security Product Company.mp4
|
615.5 MB
|
/.../BSides Delaware 2012/
|
Angry Cars Hacking the Car as a Platform.mp4
|
26.4 MB
|
Cyber Security for the Industrial Environment An Intro to ISA IEC 62443.mp4
|
247.3 MB
|
Firewalling dynamic infrastructures (the cloud) with Chef and Netfilter.mp4
|
176.7 MB
|
Hacking the Male and Female OS (Men are from Windows, Women are from Linux).mp4
|
193.0 MB
|
Introduction to the use after free vulnerability and why it matters.mp4
|
76.5 MB
|
Social Engineering CTF Intro @SquirrelsNaBrrl.mp4
|
73.9 MB
|
The Security Vulnerability Assessment Process, Best Practices & Challenges.mp4
|
93.2 MB
|
/.../BSides Delaware 2013/
|
Bsides 2013 how to become an unwitting accomplice in a phishing attack mark hufe hufemj.mp4
|
108.4 MB
|
Bsides Delaware 2013 Wireless Penetration Testing For Realz Mellendick.mp4
|
302.8 MB
|
BSidesDE 2013 1 1 110 years of vulnerabilities brian martin aka jericho.mp4
|
244.8 MB
|
BSidesDE 2013 1 11 software security game day evan oslick eoslick.mp4
|
126.8 MB
|
BSidesDE 2013 1 2 html 5 security justin klein keane @madirish2600.mp4
|
188.7 MB
|
BSidesDE 2013 1 4 cloud business and academia bringing it all together cloud security alliance delaw.mp4
|
212.3 MB
|
BSidesDE 2013 1 5 uncloaking ip addresses on irc derek callaway decalresponds.mp4
|
164.1 MB
|
BSidesDE 2013 1 6 baking even more clam av s for fun profit nathan gibbs christ media 2nd try.mp4
|
50.8 MB
|
BSidesDE 2013 1 6 baking even more clam av s for fun profit nathan gibbs christ media.mp4
|
44.4 MB
|
BSidesDE 2013 1 8 introducing intelligence into your malware analysis brian baskin.mp4
|
260.0 MB
|
BSidesDE 2013 1 9 another log to analyze utilizing dns to detect malware in your network nathan magn.mp4
|
262.5 MB
|
BSidesDE 2013 2 1 winning isnt everything how trolling can be as much fun joey l0stkn0wledge.mp4
|
99.8 MB
|
BSidesDE 2013 2 2 antipwny a windows based ids ips for metasploit rohan vazarkar david bitner.mp4
|
87.4 MB
|
BSidesDE 2013 2 3 playing the forensics game forensic analysis of gaming applications for fun and pr.mp4
|
49.6 MB
|
BSidesDE 2013 2 4 project phree phucking the nsa bts square r00t.mp4
|
155.2 MB
|
BSidesDE 2013 2 6 hacking benjamins bob weiss pwcrack.mp4
|
390.8 MB
|
bsidesde 2013 growing up in the information security community forgottensec.mp4
|
82.5 MB
|
BsidesDE 2013 LinkedAllUpIn Your Email utkonos.mp4
|
95.7 MB
|
BsidesDE 2013 Pentoo Zero Chaos.mp4
|
43.0 MB
|
/.../BSides Detroit 2015/
|
keynote00-Information-Security-Reconciliation-The-Scene-and-The-Profession-Mark-Stanislav.mp4
|
100.2 MB
|
Track100-Level-One-How-To-Break-Into-The-Security-Field-Aaron-Moffett.mp4
|
36.3 MB
|
Track101-Hacker-High-Why-We-Need-To-Teach-Computer-Hacking-In-Schools-Ron-Woerner.mp4
|
74.9 MB
|
Track102-Getting-Started-Help-Me-Help-You-David-Trollman.mp4
|
77.6 MB
|
Track103-From-Blue-To-Red-What-Matters-and-What-Really-Doesnt-Jason-Lang.mp4
|
78.7 MB
|
Track104-Clear-as-FUD-How-fear-uncertainty-and-doubt-are-affecting-users-our-laws-and-technologies-Christopher-Maddalena.mp4
|
63.5 MB
|
Track105-Data-Breaches-Simply-The-Cost-Of-Doing-Business-Joel-Cardella.mp4
|
65.0 MB
|
Track106-Eating-the-SMB-Security-Elephant-An-ITSEC-framework-for-small-IT-shops-Austen-Bommarito.mp4
|
28.3 MB
|
Track200-Enterprise-Class-Vulnerability-Management-Like-A-Boss-Rockie-Brockway.mp4
|
69.7 MB
|
Track201-Funny-Money-What-Payment-Systems-Teach-us-about-Security-Drew-Sutter.mp4
|
242.3 MB
|
Track202-Building-a-sturdy-foundation-a-program-based-approach-to-IT-Operations-Application-Development-and-Information-Security-in-business-Steven-Legg.mp4
|
389.3 MB
|
Track203-Moving-past-Metasploit-Writing-your-first-exploit-Calvin-Hedler.mp4
|
68.6 MB
|
Track205-Wielding-BurpSuite-quick-start-your-extensions-and-automation-rules-Marius-Nepomuceno.mp4
|
72.6 MB
|
Track207-Browser-and-Windows-Environment-Hardening-Kurtis-Armour.mp4
|
36.9 MB
|
/.../BSides Knoxville 2015/
|
Track-100-Keynote-Travis-Goodspeed.mp4
|
53.4 MB
|
Track-101-How-Ive-hacked-and-un-hacked-a-logic-game-20-years-to-Lights-Out-Gyora-Benedek.mp4
|
65.1 MB
|
Track-103-Finding-Bad-Guys-with-35-million-Flows-2-Analysts-5-Minutes-and-0-Dollars-Russell-Butturini.mp4
|
57.4 MB
|
Track-104-Multipath-TCP-Breaking-Todays-Networks-with-Tomorrows-Protocols-Catherine-Pearce.mp4
|
317.0 MB
|
Track-105-Phishing-Going-from-Recon-to-Credentials-Adam-Compton-Eric-Gershman.mp4
|
70.3 MB
|
Track-106-High-Performance-Fuzzing-Richard-Johnson.mp4
|
79.8 MB
|
Track-107-Cyber-Cyber-Cyber-Student-Security-Competitions-Eric-Gershman-Raymond-Borges.mp4
|
65.4 MB
|
Track-200-The-Impossibility-of-Protecting-the-Enterprise-at-725-an-hour-Kevin-Thomas.mp4
|
73.0 MB
|
Track-201-Ive-met-the-enemy-information-security-and-it-is-us-Slade-Griffin.mp4
|
76.0 MB
|
Track-202-The-Poetry-of-Secrets-An-Introduction-to-Cryptography-Eric-Kolb.mp4
|
72.9 MB
|
Track-203-From-X-to-Totally-Pwned-Russel-Van-Tuyl-Matt-Smith.mp4
|
77.2 MB
|
Track-204-Introducing-User-Centered-Design-to-Augment-Human-Performance-in-Cyber-Warfare-Frank-Cohee-Joe-Davis.mp4
|
80.1 MB
|
Track-205-Back-to-the-Future-Neil-Desai.mp4
|
81.1 MB
|
Track-206-Virtualized-Routers-Soup-to-Nuts-Jeff-Nichols-Benjamin-Taylor-Tommy-Hardin.mp4
|
83.1 MB
|
/.../Bsides Las Vegas 2012/
|
1 2 5 dc949 Stiltwalker Round 2.mp4
|
147.0 MB
|
1.1.0 KEYNOTE, Jack Daniel The State of Security BSides.mp4
|
95.5 MB
|
1.1.1 Matt Weeks Ambush - Catching Intruders At Any Point.mp4
|
108.9 MB
|
1.1.2 Robert Rowley Max Level Web App Security.mp4
|
87.4 MB
|
1.1.3 Davi Ottenheimer Big Data s Fourth V Or Why We ll Never Find the Loch Ness Monster.mp4
|
92.0 MB
|
1.1.4 HD Moore Empirical Exploitation.mp4
|
92.1 MB
|
1.1.5 Christopher Lytle Puzzle Competitions and You.mp4
|
79.1 MB
|
1.1.6 Parth Patel Introducing Android Security Evaluation Framework - ASEF.mp4
|
82.3 MB
|
1.1.7 Terry Gold RFID LOL.mp4
|
86.2 MB
|
1.2.0 Raphael Mudge Force Multipliers for Red Team Operations.mp4
|
97.5 MB
|
1.2.1 Andrew Hay & Matt Johansen Applications and Cloud and Hackers, Oh My!.mp4
|
102.3 MB
|
1.2.2 Brendan O Connor Reticle Dropping an Intelligent F-BOMB.mp4
|
246.1 MB
|
1.2.3 Josh Sokol Dan Cornell The Magic of Symbiotic Security Creating an Ecosystem of Security.mp4
|
80.2 MB
|
1.2.4 James Lester & Joseph Tartaro Burp Suite Informing the 99% of what the 1%ers.mp4
|
104.4 MB
|
1.2.6 Gillis Jones The Badmin project (Na-na- nanana Na-na-nanana BADMIN).mp4
|
53.5 MB
|
1.2.7 IPv6 Panel Drinking Game.mp4
|
78.3 MB
|
2.1.0 Michael Fornal How I managed to break into the InfoSec World.mp4
|
75.8 MB
|
2.1.1 David Keene Breaking Microsoft Dynamics Great Plains - an insiders guide.mp4
|
84.0 MB
|
2.1.2 William Ghote Lotus Notes Password Hash Redux.mp4
|
62.1 MB
|
2.1.3 Spencer McIntyre How I Learned To Stop Worrying and Love the Smart Meter.mp4
|
89.7 MB
|
2.1.4 Christopher Campbell Shot With Your Own Gun How Appliances are Used Against You.mp4
|
95.0 MB
|
2.1.5 Shawn Asmus, Kristov Widak Mirror Mirror -- Reflected PDF Attacks using SQL Injection.mp4
|
100.2 MB
|
2.1.6 Georgia Weidman Introducing the Smartphone Penetration Testing Framework.mp4
|
77.1 MB
|
2.2.0 Phil Young Mainframed - The Forgotten Fortress.mp4
|
96.5 MB
|
2.2.1 Walt Williams Metrics that Suck Even Less.mp4
|
112.5 MB
|
2.2.2 Conrad Constantine The Leverage of Language or How I Realized Information Theory.mp4
|
95.6 MB
|
2.2.3 Jason Ding The Blooming Social Media Economics Built on Fake Identities.mp4
|
94.5 MB
|
2.2.4 Lightning Talks.mp4
|
217.1 MB
|
/.../BSides Las Vegas 2013/
|
2 2 1 Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn t Suck Josh.mp4
|
180.9 MB
|
BSidesLV 2013 1 1 1 The Security Industry How to Survive Becoming Management Christien Rioux.mp4
|
247.8 MB
|
BSidesLV 2013 1 1 2 Discovering Dark Matter Towards better Android Malware Heuristics Jim.mp4
|
219.0 MB
|
BSidesLV 2013 1 1 3 Mom! I Broke My Insulin Pump Again! Jay Rad Radcliffe.mp4
|
175.7 MB
|
BSidesLV 2013 1 1 4 Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth Evan.mp4
|
165.9 MB
|
BSidesLV 2013 1 1 5 HiveMind Distributed File Storage Using JavaScript Botnets Sean Malone.mp4
|
197.4 MB
|
BSidesLV 2013 1 1 6 gitDigger Creating useful wordlists from public GitHub repositories WiK and.mp4
|
101.7 MB
|
BSidesLV 2013 1 1 7 Collaborative Penetration Testing With Lair Tom Steele and Dan Kottmann.mp4
|
153.9 MB
|
BSidesLV 2013 1 1 8 Social Aftermath Responding to Social Pwnage Steven F Fox.mp4
|
101.1 MB
|
BSidesLV 2013 1 2 1 Silence Equals Death Violet Blue.mp4
|
276.0 MB
|
BSidesLV 2013 1 2 2 The Cavalry Isn t Coming Starting the Revolution to Fsck it All!.mp4
|
191.3 MB
|
BSidesLV 2013 1 2 3 A Fire In The Eye Olli Pekka Niemi and Antti Levomaki.mp4
|
132.8 MB
|
BSidesLV 2013 1 2 4 Defense Evasion Modeling Frank Artes.mp4
|
215.4 MB
|
BSidesLV 2013 1 2 5 Malware Management Framework We detected WinNTI with it! Michael Gough.mp4
|
160.0 MB
|
BSidesLV 2013 1 2 6 Crunching the Top 10,000 Websites Password Policies and Controls Steve Werb.mp4
|
211.0 MB
|
BSidesLV 2013 1 2 7 Governments and UFOs A Historical Analysis of Disinformation and Deception R.mp4
|
216.0 MB
|
BSidesLV 2013 1 2 8 Strange interactions in personal data Brokers and the CFAA Christine Dudley.mp4
|
100.4 MB
|
BSidesLV 2013 1530 Brendan OConnor HARK The Hacker Archive.mp4
|
42.7 MB
|
BSidesLV 2013 1550 Jack Whitsitt Critical Infrastructure Protection As Code.mp4
|
73.2 MB
|
BSidesLV 2013 2 1 1 Diamonds, Fitness and Cults Manipulation for Fun and Profit Katie Rodzon.mp4
|
166.5 MB
|
BSidesLV 2013 2 1 2 Vulnerability & Exploit Trends A Deep Look Inside The Data Ed Bellis, Michae.mp4
|
167.7 MB
|
BSidesLV 2013 2 1 3 EC2 or Bust - How to Build Your Own Pen Testing Lab in Amazon EC2 Grecs.mp4
|
146.6 MB
|
BSidesLV 2013 2 1 4 Techniques for Escaping the AppSec Labyrinth Andrew Hay.mp4
|
161.1 MB
|
BSidesLV 2013 2 1 5 The Erudite Inebriate s Guide to Life, Liberty, and the Purfuit of Happinefs.mp4
|
166.3 MB
|
BSidesLV 2013 2 1 6 Hack the Hustle! Career Strategies for Information Security Professionals Ev.mp4
|
189.5 MB
|
BSidesLV 2013 2 1 7 Information Sharing, or I ve got 99 problems and they re probably.mp4
|
95.8 MB
|
BSidesLV 2013 2 2 2 How embracing social media helped me stop the hackers, save the world and get.mp4
|
136.5 MB
|
BSidesLV 2013 2 2 3 Malware Automation Christopher Elisan.mp4
|
229.8 MB
|
BSidesLV 2013 2 2 4 Popping the Penguin An Introduction to the Principles of Linux Persistence M.mp4
|
145.6 MB
|
BSidesLV 2013 2 2 5 Network Survival WCS James Costello.mp4
|
180.3 MB
|
BSidesLV 2013 2 2 6 The Slings and Arrows of Open Source Security Tod Beardsley and Mister X.mp4
|
202.7 MB
|
BSidesLV 2013 2 2 7 What if Petraeus was a hacker Email privacy for the rest of us Fak3r.mp4
|
118.2 MB
|
BSidesLV 2013 3 1 1 Never Mind Your Diet, Cut the Crap From Your Vocabulary Keli Hay Brian Marti.mp4
|
183.4 MB
|
BSidesLV 2013 3 1 2 The 7 habits of highly effective CISOs Franklin Tallah Wendy Nather).mp4
|
196.4 MB
|
BSidesLV 2013 3 1 3 The Little Dutch Boy D0n Quix0te Bill E Ghote).mp4
|
190.0 MB
|
BSidesLV 2013 3 1 5 Stop Shooting Blanks No magic bullets in your arsenal Renegade6 Nicolle Neul.mp4
|
213.3 MB
|
BSidesLV 2013 3 1 6 Flameout Burnout Supernova Dan Ward Ally Miller).mp4
|
186.0 MB
|
BSidesLV 2013 3 1 7 The Sensual Side of 3D Printing Kat Sweet Javvad Malik).mp4
|
131.7 MB
|
BSidesLV 2013 3 2 1 Fun with WebSockets using Socket Puppet Mister Glass Weasel).mp4
|
104.4 MB
|
BSidesLV 2013 3 2 2 Using Machine Learning to Support Information Security Alex Pinto Joel Wilba.mp4
|
228.9 MB
|
BSidesLV 2013 3 2 3 The Truth, You Thought We Wouldn t Know Wolf Flight Terry Gold).mp4
|
199.0 MB
|
BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl.mp4
|
156.4 MB
|
BSidesLV 2013 3 2 5 The Goodness is Baked In Baking Assurance into Software Ebony Davi Ottenheim.mp4
|
125.0 MB
|
BSidesLV 2013 3 2 6 Matriux Leandros An Open Source Penetration Testing and Forensic Distribution.mp4
|
146.6 MB
|
BSidesLV 2013 3 2 7 Sixteen Colors Archiving the Evolution of ANSI and ASCII Art Doug Moore Bren.mp4
|
219.3 MB
|
BSidesLV 2013 4 1 1 You Are Being Watched! Bharat Jogi.mp4
|
159.2 MB
|
BSidesLV 2013 4 1 2 Calling All Researchers A Discussion on Building a Security Research F.mp4
|
164.9 MB
|
BSidesLV 2013 4 1 3 Evil Empire SIEM FTW EggDropX and Tha CheezMan.mp4
|
149.1 MB
|
BSidesLV 2013 4 2 1 Attribution Shmatribution! FIX YOUR SHIT! Krypt3ia.mp4
|
155.3 MB
|
BSidesLV 2013 4 2 2 Breach Panel Davi Ottenheimer, Raymond Umerley, Jack Daniel, Steve Werby, Da.mp4
|
210.6 MB
|
BSidesLV 2013 5 1 1 Attacking and Defending Full.mp4
|
200.2 MB
|
BSidesLV 2013 5 1 2 Say It to My Face Shannon Sistrunk.mp4
|
211.0 MB
|
BSidesLV 2013 5 1 3 Alex Dreams of Risk How the Concept of Being a Craftsma.mp4
|
207.4 MB
|
BSidesLV 2013 5 1 4 GTFO FTW Hacking Your Lifestyle for Fun and Profit Beau Woods and Taylor Ban.mp4
|
216.2 MB
|
BSidesLV 2013 5 1 5 You can t make people act more securely, you can help them want to.mp4
|
186.9 MB
|
BSidesLV 2013 5 1 6 Your Droid Has No Clothes Mike Murray and Allan Zhang.mp4
|
191.8 MB
|
BSidesLV 2013 5 2 3 OMFG China! T Prophet.mp4
|
222.2 MB
|
BSidesLV 2013 Cookie Reuse Sam Bowne.mp4
|
67.2 MB
|
BSidesLV 2013 LT 01 Least Authority File System @zooko.mp4
|
84.0 MB
|
BSidesLV 2013 LT 02 Hack cellular metabolism by targeting mitochondria @ambimorph).mp4
|
62.2 MB
|
BSidesLV 2013 LT 04 Cross Platform Metasploit Payloads @bperry).mp4
|
40.5 MB
|
BSidesLV 2013 LT 05 GPS Hacking @recompiler).mp4
|
52.9 MB
|
BSidesLV 2013 LT 07 SSD data evaporation @sambrowne).mp4
|
46.3 MB
|
/.../BSides Las Vegas 2014/
|
bg00 opening keynote beyond good and evil towards effective security adam shostack.mp4
|
117.9 MB
|
bg01 usb write blocking with usbproxy dominic spill.mp4
|
86.4 MB
|
bg02 allow myself to encrypt myself evan davison.mp4
|
114.0 MB
|
bg03 what reaction to packet loss reveals about a vpn anna shubina sergey bratus.mp4
|
79.6 MB
|
bg04 untwisting the mersenne twister how i killed the prng moloch.mp4
|
90.7 MB
|
bg05 anatomy of memory scraping credit card stealing pos malware amol sarwate.mp4
|
138.3 MB
|
bg06 cluck cluck on intels broken promises jacob torrey.mp4
|
94.5 MB
|
bg07 a better way to get intelligent about threats adam vincent.mp4
|
143.6 MB
|
bg08 bring your own risky apps michael raggo kevin watkins.mp4
|
135.7 MB
|
bg09 invasive roots of anti cheat software alissa torres.mp4
|
135.9 MB
|
bg10 vaccinating android milan gabor danijel grah.mp4
|
107.9 MB
|
bg11 security testing for smart metering infrastructure steve vandenberg robert hawk.mp4
|
134.9 MB
|
bg12 the savage curtain tony trummer tushar dalvi.mp4
|
128.3 MB
|
bg13 we hacked the gibson now what philip young.mp4
|
117.3 MB
|
cg00 sha 1 backdooring and exploitation jean philippe aumasson.mp4
|
63.8 MB
|
cg01 evading code emulation writing ridiculously obvious malware that bypasses av kyle adams.mp4
|
171.6 MB
|
cg02 security management without the suck tony turner tim krabec.mp4
|
130.8 MB
|
cg04 malware analysis 101 n00b to ninja in 60 minutes grecs.mp4
|
127.3 MB
|
cg05 travel hacking with the telecom informer tprophet.mp4
|
117.5 MB
|
cg06 the untold story about atm malware daniel regalado.mp4
|
98.7 MB
|
cg07 using superpowers for hardware reverse engineering joe grand.mp4
|
156.3 MB
|
cg08 why am i surrounded by friggin idiots because you hired them stephen heath.mp4
|
151.2 MB
|
cg09 demystiphying and fingerprinting the 802 15 4 zigbee phy ira ray jenkins sergey bratus.mp4
|
122.8 MB
|
cg10 insider threat kill chain human indicators of compromise ken westin.mp4
|
47.1 MB
|
cg11 a place to hang our hats security community and culture domenic rizzolo.mp4
|
45.5 MB
|
cg12 booze devils advocate and hugs the best debates panel youll see at bsideslv 2014 david mortman.mp4
|
166.2 MB
|
gt00 the power law of information michael roytman.mp4
|
161.4 MB
|
gt01 measuring the iq of your threat intelligence feeds alex pinto kyle maxwell.mp4
|
197.2 MB
|
gt02 strategies without frontiers meredith l patterson.mp4
|
177.4 MB
|
gt03 clusterf ck actionable intelligence from machine learning mike sconzo.mp4
|
117.0 MB
|
gt04 know thy operator misty blowers.mp4
|
132.9 MB
|
gt05 improving security by avoiding traffic and still get what you want in data transfers art conkli.mp4
|
115.6 MB
|
pg00 edsec hacking for education jessy irwin.mp4
|
63.3 MB
|
pg02 securing sensitive data a strange game jeff elliot.mp4
|
44.8 MB
|
pg03 brick in the wall vs hole in the wall caroline d hardin.mp4
|
59.9 MB
|
pg04 cut the shit how to reign in your ids tony robinson da 667.mp4
|
60.5 MB
|
pg05 geek welfare confessions of a convention swag hoarder rachel keslensky.mp4
|
95.1 MB
|
pg06 no infosec staff no problem anthony czarnik.mp4
|
83.8 MB
|
pg07 can i code against an api to learn a product adrienne merrick tagore.mp4
|
37.0 MB
|
pg08 bridging the air gap cross domain solutions patrick orzechowski.mp4
|
96.8 MB
|
pg09 back dooring the digital home david lister.mp4
|
87.9 MB
|
pg11 ios url schemes omg guillaume k ross.mp4
|
64.3 MB
|
pg12 oops that wasnt suppossed to happen bypassing internet explorers cross site scripting filter ca.mp4
|
71.3 MB
|
pg13 what ive learned as a con man masterchen.mp4
|
66.3 MB
|
pg14 training with raspberry pi nathaniel davis.mp4
|
48.1 MB
|
pg15 black magic and secrets how certificates influence you robert lucero.mp4
|
67.4 MB
|
pg16 attacking drupal greg foss.mp4
|
90.6 MB
|
pg17 hackers vs auditors dan anderson.mp4
|
66.0 MB
|
pg18 third party service provider diligence why are we doing it all wrong patrice coles.mp4
|
80.3 MB
|
pg19 pwning the hapless or how to make your security program not suck casey dunham emily pience.mp4
|
55.0 MB
|
pg20 teach a man to phish vinny lariza.mp4
|
63.2 MB
|
pg21 the lore shows the way eric rand.mp4
|
61.9 MB
|
/.../BSides Las Vegas 2015/
|
ATGP00-Underground-Wi-Fi-Hacking-for-Web-Pentesters-Greg-Foss.mp4
|
201.1 MB
|
ATGP01-radBIOS-Wireless-networking-with-audio-Richo-Healey.mp4
|
116.9 MB
|
ATGP02-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4
|
94.7 MB
|
ATGP03-Intro-for-New-WCTFers-Russell-Handorf-Rick-Farina.mp4
|
193.4 MB
|
ATGP05-Better-Spectrum-Monitoring-with-Software-Defined-Radio-Michael-Ossmann.mp4
|
103.3 MB
|
ATGP06-Wi-Door-BindRev-Shells-for-your-Wi-Fi-Vivek-Ramachandran.mp4
|
111.9 MB
|
ATGP07-Software-Defined-Radio-Signal-Processing-with-a-5-Microcontroller-Jared-Boone.mp4
|
94.1 MB
|
ATGP08-All-Your-RFz-Are-Belong-to-Me-Software-Defined-Radio-Exploits-Balint-Seeber.mp4
|
86.2 MB
|
BG00-Injection-on-Steroids-Code-less-Code-Injections-and-0-Day-Techniques-Paul-Schofield-Udi-Yavo.mp4
|
81.2 MB
|
BG01-Getting-the-data-out-using-social-media-Dakota-Nelson-Gabriel-Butterick-Byron-Wasti.mp4
|
32.0 MB
|
BG03-NSA-Playset-Bridging-the-Airgap-without-Radios-Michael-Leibowitz.mp4
|
61.0 MB
|
BG05-Your-Electronic-Device-Please-Understanding-the-Border-Search-Exception-Electronic-Devices-Whitney-Merrill.mp4
|
105.0 MB
|
BG06-WhyMI-so-Sexy-WMI-Attacks-Real-Time-Defense-and-Advanced-Forensic-Analysis-William-Ballenthin-Claudiu-Teodorescu-Matthew-Graeber.mp4
|
69.6 MB
|
BG07-TAPIOCA-TAPIOCA-Automated-Processing-for-IOC-Analysis-Ryan-J-Chapman-Moses-Schwartz.mp4
|
71.4 MB
|
BG08-Building-an-Empire-with-PowerShell-Will-Schroeder-Justin-Warner.mp4
|
74.1 MB
|
BG09-Remote-Access-the-APT-Ian-Latter.mp4
|
56.8 MB
|
BG10-Crash-The-IoT-Train-Yourself-Intentionally-Vulnerable-WRT-IV-WRT-Paul-Asadoorian-Nick-Curran.mp4
|
79.0 MB
|
CG00-Barely-Legal-the-Hackeras-Guide-to-Cybersecurity-Legislation-Jen-Ellis.mp4
|
105.9 MB
|
CG01-Pentesting-with-Docker-Tom-Steele.mp4
|
63.5 MB
|
CG02-Dont-hate-the-Disclosure-Hate-the-Vulnerability-How-the-government-is-bringing-researchers-and-vendors-together-to-talk-vulnerability-disclosure-Allan-Friedman.mp4
|
82.3 MB
|
CG03-How-Portal-Can-Change-Your-Security-Forever-Katrina-Rodzon.mp4
|
76.4 MB
|
CG04-Angler-Lurking-in-the-Domain-Shadows-Nick-Biasini.mp4
|
64.5 MB
|
CG05-A-hackers-guide-to-using-the-YubiKey-how-to-add-inexpensive-2-factor-authentication-to-your-next-project-Russ-Gritzo.mp4
|
84.6 MB
|
CG06-Haking-the-Next-Generation-David-Schwartzberg.mp4
|
77.2 MB
|
CG07-Backdooring-MS-Office-documents-with-secret-master-keys-Yoshinori-Takesako-Shigeo-Mitsunari.mp4
|
46.0 MB
|
CG08-Yes-you-too-can-perform-daring-acts-of-Live-Acquisition-D0n-Quix0te.mp4
|
70.6 MB
|
CG10-Rethink-Repurpose-Reuse-Rain-Hell-Michael-Zupo.mp4
|
44.7 MB
|
GT01-Adversary-Intelligence-from-Conflict-to-Consensus-Alex-Valdevia-Rich-Barger.mp4
|
64.6 MB
|
GT03-Crema-A-LangSec-inspired-Language-Sergey-Bratus-Jacob-Torrey.mp4
|
76.6 MB
|
GT04-Making-Breaking-Machine-Learning-Anomaly-Detectors-in-Real-Life-Clarence-Chio.mp4
|
336.0 MB
|
GT06-Who-Watches-the-Watchers-Metrics-for-Security-Strategy-Michael-Roytman.mp4
|
80.8 MB
|
GT07-Advancing-Internet-Security-Research-with-Big-Data-and-Graph-Databases-Andrew-Hess.mp4
|
19.6 MB
|
GT08-Intro-to-Data-Science-for-Security-Rob-Bird-Alex-Shagla-McKotch.mp4
|
168.0 MB
|
GT09-No-More-Fudge-Factors-and-Made-up-Shit-Performance-Numbers-That-Mean-Something-Russell-Thomas.mp4
|
121.9 MB
|
GT09-When-steganography-stops-being-cool-David-Sancho.mp4
|
51.9 MB
|
IATC00-IATC-Track-Introduction-and-Overview-Josh-Corman-joshcorman-Nicholas-J-Percoco.mp4
|
39.3 MB
|
IATC00-Intro-and-Hack-the-Future-Keren-Elazari1.mp4
|
81.8 MB
|
IATC01-Hack-the-Future-Keren-Elazari.mp4
|
42.7 MB
|
IATC03-State-of-Medical-Device-Cyber-Safety-Beau-Woods-Scott-Erven.mp4
|
55.1 MB
|
IATC04-Leading-in-a-Do-ocracy-Chris-Nickerson-Beau-Woods-Tod-Beardsley-Tim-Remes.mp4
|
167.1 MB
|
IATC05-State-of-Automotive-Cyber-Safety-Josh-Corman-joshcorman-Craig-Smith.mp4
|
102.8 MB
|
PG00-Speaking-Metrics-to-Executives-Michael-St-Vincent.mp4
|
37.0 MB
|
PG01-Dropping-hell0days-Business-Interaction-for-Security-Professionals-Or-Anyone-Else-Elliot-Johnson.mp4
|
31.9 MB
|
PG02-Practice-Safe-Cyber-The-Miseducation-of-American-Students-on-Internet-Safety-Vivienne-Pustell.mp4
|
50.1 MB
|
PG03-Check-That-Certificate-Jacob-Jernigan-Andrew-Sorensen.mp4
|
41.2 MB
|
PG04-The-Journey-To-ICS-Larry-Vandenaweele.mp4
|
26.3 MB
|
PG05-Catching-Linux-Post-Exploitation-with-Auditd-Eric-Gershman.mp4
|
34.2 MB
|
PG06-Adding-10-Security-to-Your-Scrum-Agile-Environment-Josh-Louden.mp4
|
155.2 MB
|
PG07-Fight-back-raising-awareness-infosec-Petri-Koivisto.mp4
|
34.6 MB
|
PG08-What-the-heck-is-this-radio-stuff-anyway-Nick-Kartsioukas.mp4
|
34.5 MB
|
PG09-SIEMple-technology-Bill-Davison.mp4
|
32.1 MB
|
PG10-How-I-learnt-hacking-in-highschool-Lokesh-Pidawekar.mp4
|
38.2 MB
|
PG11-ZOMG-Its-OSINT-Heaven-Tazz-Tazz.mp4
|
58.6 MB
|
PG12-Classic-Misdirection-Social-Engineering-to-Counter-Surveillance-Peter-Clemenko-III.mp4
|
36.7 MB
|
PG13-Phishing-Going-from-Recon-to-Credentials-Adam-Compton-Eric-Gershman.mp4
|
41.2 MB
|
PG14-Social-Media-in-Incident-Response-Program-JoEtta-LeSueur.mp4
|
25.7 MB
|
PG15-Cats-and-Mice-Ever-evolving-attackers-and-other-game-changerse-Eric-Kmetz.mp4
|
34.4 MB
|
PG16-FAA-FTC-FCC-FU-How-Three-F-ing-Agencies-are-Shaping-Info-Sec-Elizabeth-Wharton.mp4
|
46.2 MB
|
PG17-10-Knowledge-Sharing-What-You-Learn-For-the-Benefit-of-the-Everyman-Ashley-Miller.mp4
|
57.2 MB
|
PG18-Maximizing-Bro-Detection-John-B-Althouse.mp4
|
38.2 MB
|
PG19-Embedding-Web-Apps-in-MITMProxy-Scripts-Chris-Czub.mp4
|
27.4 MB
|
PG20-What-Lurks-in-the-Shadow-Cheryl-Biswas.mp4
|
29.6 MB
|
PG21-Out-of-Denial-A-12-Step-Program-for-Recovering-Admins-Paul-Lee.mp4
|
23.9 MB
|
PG22-Why-We-Cant-Have-Nice-Things-Original-Research-on-Conflict-Resolution-Styles-in-Information-Security-Risk-Management-Rachael-Lininger.mp4
|
38.3 MB
|
PG23-Serial-Box-Primer-for-dealing-with-Serial-and-JTAG-for-basic-hardware-hacking-Matthew-Jakubowski.mp4
|
46.1 MB
|
PW00-passwords-privacy-keystroke-dynamics-Per-Thorsheim.mp4
|
38.6 MB
|
PW01-Unspeakable-passwords-pronounceable-or-Diceware-Jeffery-Goldberg.mp4
|
70.3 MB
|
PW02-Pushing-on-String-Adventures-in-the-Dont-Care-Regions-of-Password-Strength-Cormac-Herley.mp4
|
86.6 MB
|
PW03-What-would-fix-passwords-Some-weekly-password-audits-Pretty-graphs-to-prove-it-A-Haiku-Rick-Redman-Dale-Corpron.mp4
|
41.4 MB
|
PW04-Breachego-Christian-Heinrich.mp4
|
42.4 MB
|
PW05-Tell-Me-Who-You-Are-and-I-Will-Tell-You-Your-Lock-Pattern-Marte-LAge.mp4
|
196.8 MB
|
PW06-Scrutinizing-WPA2-Password-Generating-Algorithms-in-Wireless-Routers-Eduardo-Novella.mp4
|
36.2 MB
|
PW07-Poppin-Digital-Locks-Devin-Egan.mp4
|
35.0 MB
|
PW08-Privileges-in-the-Real-World-Securing-Password-Management-Andrey-Dulkin.mp4
|
35.1 MB
|
PW09-Security-Questions-Considered-Harmful-Jim-Fenton.mp4
|
31.3 MB
|
PW10-I-Forgot-My-Password-Michal-A-paAek.mp4
|
59.5 MB
|
PW11-Harvesting-Passwords-from-Source-Code-Scripts-and-Code-Repositories-Philippe-Paquet.mp4
|
48.5 MB
|
PW12-Towards-Standardizing-Comparisons-of-Password-Guessability-Sean-Segreti-Blase-Ur.mp4
|
43.9 MB
|
PW20-Password-Based-Encryption-Using-IO-Hardness-Greg-Zaverucha.mp4
|
33.0 MB
|
PW21-Auth-for-Encrypted-Services-with-Server-Side-APT.mp4
|
46.4 MB
|
PW22-Blind-Hashing.mp4
|
39.4 MB
|
PW23-PBKDF2-Performance-Matters.mp4
|
30.9 MB
|
PW24-Password-Alert-by-Google.mp4
|
40.1 MB
|
PW25-No-More-Graphical-Passwords-Mark-Brunett.mp4
|
35.3 MB
|
PW26-How-Secure-Are-Multi-Word-Random-Passphrases.mp4
|
39.2 MB
|
PW27-Are-You-Sure-That-You-Still-Need-Passwords.mp4
|
24.0 MB
|
/BSides London/
|
Alec Muffett - sex, lies and instant messenger.mp4
|
31.6 MB
|
Aman Hardikar - Introducing Opabinia (SSLAuditor4) (Rookie Track).mp4
|
24.1 MB
|
Arron Finnon Finuxs Historical Tour of IDS Evasion, Insertions and Other Oddities.mp4
|
256.5 MB
|
Arron Finnon - DNS Tunnelling It s all in the name!.mp4
|
99.7 MB
|
B-Sides London 2013 Memories.mp4
|
18.7 MB
|
Beverley A MacKenzie - Why Information Security Should Be Important To All Of Us (Rookie Track).mp4
|
26.1 MB
|
Brian Honan - Layer 8 Security.mp4
|
133.7 MB
|
BSides London 2014 Promo.mp4
|
6.8 MB
|
BSidesLondon 2014 Closing Ceremony.mp4
|
441.6 MB
|
Cam Buchanan - Probe to Pwn (Rookie Track).mp4
|
27.9 MB
|
Craig Young Easy Ways to Bypass Anti Virus Systems.mp4
|
198.2 MB
|
d3sre - RFID Hacking - An Introduction (Rookie Track).mp4
|
33.8 MB
|
Dalian Terry & Sam Sanoop - Teaching Kids Programming and Cyber Security (Rookie Track).mp4
|
27.1 MB
|
David Rook - Jedi Mind Tricks.mp4
|
149.4 MB
|
Dr Gareth Owen TOR - Attacks and Countermeasures.mp4
|
194.9 MB
|
Dr Paul Judge - Social Media & Security.mp4
|
275.0 MB
|
Frederic Mohr - CSP Analysis - Attacking XSS Mitigation (Rookie Track).mp4
|
40.4 MB
|
Gavin Holt Honeywords - Detectable Password Theft.mp4
|
68.2 MB
|
Georgi Boiko - Is Privacy Still A Thing (Rookie Track).mp4
|
31.8 MB
|
Graham Sutherland Breaking Binary Protocols and Bad Crypto.mp4
|
258.7 MB
|
Grant Willcox - Crawling Metadata with Recon-ng (Rookie Track).mp4
|
27.2 MB
|
Herbie Zimmerman - When a noob becomes aware (Rookie Track).mp4
|
28.6 MB
|
Jack Daniel Impromptu Talk on B-Sides.mp4
|
254.5 MB
|
Jim Shields - The Funny Thing About Information Security.mp4
|
89.5 MB
|
Jimmy Blake - Cloud Computing.mp4
|
143.8 MB
|
Joseph Gwynne-Jones - The Joy of Passwords (Rookie Track).mp4
|
25.5 MB
|
Justin Clarke - Practical Crypto Attacks Against Web Applications.mp4
|
155.6 MB
|
Kaitlyn Garratley - A Look at Modern Warfare (Rookie Track).mp4
|
25.7 MB
|
Kevin Breen RATs and IOC s - The Easy Way.mp4
|
128.7 MB
|
Ollie Whitehouse Defensive Security Research is Sexy too (& Real Sign of Skill).mp4
|
172.8 MB
|
Paul Amar CSRFT, A Toolkit for CSRF Vunerabilities.mp4
|
193.2 MB
|
Rafal Wojtczuk LoL (Layers on Layers) - Bypassing Security for Fun and Profit V2.mp4
|
192.0 MB
|
Rory McCune - Penetration Testing Must Die.mp4
|
92.6 MB
|
Sasha Zivojinovic - Run-time Tools to aid Application Security Assessments (Rookie Track).mp4
|
32.1 MB
|
Scott MacKenzie - InfoSec is a Board Responsibility (Rookie Track).mp4
|
30.6 MB
|
Shaun Jones - Social Engineering Phishing Stories (Rookie Track).mp4
|
31.2 MB
|
Stephen de Vries Contininuous Security Testing in a DevOps World (Rerelease).mp4
|
289.8 MB
|
Trey Ford - Keynote Virus! Malware! and Threats! Oh My!.mp4
|
305.7 MB
|
Wicked Clown - Breaking out of Restricted RDP.mp4
|
71.2 MB
|
Xavier Mertens - All Your Logs Are Belong To You!.mp4
|
199.2 MB
|
/.../BSides Nashville 2014/
|
000 welcome to bsides nashville.mp4
|
33.8 MB
|
001 bsides harmonicas and communication skills jack daniel.mp4
|
149.0 MB
|
002 closing ceremonies.mp4
|
16.7 MB
|
100 attack paths breaking into infosec from it or other totally different fields eve adams.mp4
|
132.7 MB
|
101 learn from your mistakes adam len compton.mp4
|
101.6 MB
|
102 beating the infosec learning curve without burning out scott thomas.mp4
|
82.9 MB
|
103 sun tzu was a punk confucius was an infosec rockstar branden miller.mp4
|
94.7 MB
|
200 making mongo cry automated nosql exploitation with nosqlmap russell butturini.mp4
|
90.1 MB
|
201 the bsidesnash talk that keeps YouTube up all night (2).mp4
|
98.4 MB
|
201 the bsidesnash talk that keeps YouTube up all night.mp4
|
102.2 MB
|
202 how do i hack thee let me count the ways stewart fey.mp4
|
211.1 MB
|
203 healthcare security which protocal adam john.mp4
|
159.7 MB
|
204 why you can t prove you re pwnd but you are ben miller.mp4
|
172.6 MB
|
300 bending and twisting networks paul coggin.mp4
|
198.2 MB
|
301 succeeding with enterprise software security key performance indicators rafal los.mp4
|
200.9 MB
|
302 scaling security in the enterprise making people a stronger link kevin riggs.mp4
|
161.8 MB
|
305 seeing purple hybrid security teams for the enterprise mark kikta.mp4
|
81.7 MB
|
Applying analog thinking to digial networks Winn Schwartau.mp4
|
226.6 MB
|
Barry White version 100 attack paths breaking into infosec Eve Adams.mp4
|
165.9 MB
|
/.../BSides Nashville 2015/
|
B00 Applied Detection and Analysis Using Flow Data Jason A Smith.mp4
|
125.3 MB
|
B01 Using devops monitoring tools to increase security visibility Chris Rimondi.mp4
|
60.7 MB
|
B02 The Great Trojan Demo Ben Miller.mp4
|
99.6 MB
|
B03 Nobody Understands Me Better Executive Metrics Michael St Vincent.mp4
|
119.0 MB
|
B04 Agile and Security Oil and Water Ron Parker.mp4
|
83.6 MB
|
BSides Nashville Intro and Pondering the False Economy of Secrets Trey Ford @TreyFord.mp4
|
105.6 MB
|
G01 We Built This So Can You Tim Fowler.mp4
|
114.3 MB
|
G02 Thats NOT my RJ45 Jack IRL Networking for Humans Johnny Xmas.mp4
|
81.8 MB
|
G03 Finding Low Hanging Fruit with Kali Stephen Haywood.mp4
|
109.0 MB
|
G04 What do infosec practitioners actually do Slade Griffin.mp4
|
122.6 MB
|
R00 From Parking Lot to Server Room Tim Roberts and Brent White.mp4
|
172.3 MB
|
R01 N4P Wireless Pentesting So easy even a caveman can do it Chris Scott.mp4
|
140.7 MB
|
R02 hashcat NSAKEY.mp4
|
133.6 MB
|
R04 Skiddiemonkeys Fling stuff at your Defenses and See What Sticks Russell Butturini Joshua Tower.mp4
|
94.6 MB
|
/.../B-Sides Orlando 2013/
|
Bsides Orlando - Joey Belans - Hacking Like It s 1999.mp4
|
66.5 MB
|
Bsides Orlando - Jordan Wiens - Capture The Flag Introduction.mp4
|
113.5 MB
|
Bsides Orlando - Luis Santana - Hacking Non-Traditional Systems.mp4
|
211.4 MB
|
Bsides Orlando - Owen Redwood - Lessons From Training Ninjas.mp4
|
78.4 MB
|
Bsides Orlando - Tim Armstrong - Android Malware Grows Up.mp4
|
67.0 MB
|
/.../B-Sides Orlando 2014/
|
Alex Hutton - Alex Dreams of Risk.mp4
|
162.8 MB
|
Jack Daniel - Survival Skills for Infosec Pros.mp4
|
89.3 MB
|
Jeff Toth - Tacticool Mindset.mp4
|
48.3 MB
|
Jess Hires - Physical Security From Locks to Dox.mp4
|
70.8 MB
|
Jorge Orchilles -- Windows Phone 8 Security and Testing WP8 Apps.mp4
|
136.3 MB
|
Keith Perry - Roll Your Own Internet of Things Search Engine.mp4
|
107.4 MB
|
Lee V Mangold - Decoding the Air An introduction to low cost SDR decoding.mp4
|
136.5 MB
|
Luis Connection Santana (hacktalk) - Phishing Like The Pros.mp4
|
65.0 MB
|
Rod Soto - Civilianization of War Paramilitarization of Cyberspace.mp4
|
128.8 MB
|
Vikram Dhillon - Wrecking the ultimate defense Human Body.mp4
|
132.3 MB
|
voodooKobra - When Frameworks... Don t.mp4
|
27.5 MB
|
/.../BSides Portland 2011/
|
B-Sides Portland 2011 Connecting IT Security s community through B-Sides.mp4
|
4.0 MB
|
B-Sides Portland 2011 Covert Calling - Secrets of Social Engineering Revealed.mp4
|
5.7 MB
|
B-Sides Portland 2011 Driving Secure Development Using a Threat Model.mp4
|
4.2 MB
|
B-Sides Portland 2011 Highlights about BSidesPDX from Organizers.mp4
|
19.5 MB
|
B-Sides Portland 2011 Preview of SCADA Security - Why is it So Hard.mp4
|
9.2 MB
|
B-Sides Portland 2011 Preview to Level Up - How Security is not like a Video Game.mp4
|
7.9 MB
|
B-Sides Portland 2011 Preview to Using a Blender Game for Security Visualization.mp4
|
7.3 MB
|
B-Sides Portland 2011 Recap on OS Security for Specific Purpose Devices.mp4
|
8.8 MB
|
B-Sides Portland 2011 Recap on The Need for Hackers, Hackerspaces and Hacktivism.mp4
|
11.5 MB
|
B-Sides Portland 2011 When IT Fails by Tripwire s Founder, Gene Kim.mp4
|
8.4 MB
|
Security B-Sides co-founder speaks about the evolution of B-Sides.mp4
|
9.0 MB
|
/.../BSides Raleigh 2014/
|
Dan Kaminsky - BSides Raleigh.mp4
|
388.2 MB
|
grep visualization var logs unused - Dr Carrie Gates - BSides Raleigh.mp4
|
243.7 MB
|
Security on the Blockchain Past Present & The Future - Shannon Code.mp4
|
165.5 MB
|
Slaying the Hydra Evolution and Mitigation of Denial-of-Service Attacks - BSides Raleigh.mp4
|
169.8 MB
|
/BSides Rhode Island/
|
BsidesRI 2013 0 Large scale application security Charlie Eriksen.mp4
|
155.3 MB
|
BsidesRI 2013 1 0 Hacking Your Neighbors for Fun! Josh Wright.mp4
|
163.9 MB
|
BsidesRI 2013 1 1 Public cloud PCI compliance or a sharp stick in the eye, which to choose Chris.mp4
|
213.6 MB
|
BsidesRI 2013 1 2 Bite the Wax Tadpole The importance of culture in user security Kati Rodzon.mp4
|
219.5 MB
|
BsidesRI 2013 1 3 Exploiting the Top Ten Database Vulnerabilities and Misconfigurations Josh Sha.mp4
|
184.2 MB
|
BsidesRI 2013 1 4 Exploit Development for Mere Mortals Joe McCray.mp4
|
197.1 MB
|
BsidesRI 2013 1 5 Future Trends in IT security Ron Gula.mp4
|
179.5 MB
|
BsidesRI 2013 1 6 The Freaky Economics Of Cybersecurity Robert David Graham.mp4
|
170.7 MB
|
BsidesRI 2013 1 SMB SRMF for identifying top 10 risks Jim Peeler.mp4
|
205.8 MB
|
BsidesRI 2013 2 0 Booting the Booters, Stressing the Stressors Allison Nixon and Brandon Levene.mp4
|
174.9 MB
|
BsidesRI 2013 2 1 Talk More Better Jack Daniel.mp4
|
196.0 MB
|
BsidesRI 2013 2 3 So, you want to compute post apocalypse Larry Pesce & Darren Wigley.mp4
|
198.2 MB
|
BsidesRI 2013 2 4 Feeling Sick Healthcare Information Security Roy Wattanasin.mp4
|
155.8 MB
|
BsidesRI 2013 2 5 Blitzing with Your Defense Ben Jackson.mp4
|
184.3 MB
|
BsidesRI 2013 2 6 Lessons Learned Why I became a PaulDotCom Intern and why you should become an In.mp4
|
90.8 MB
|
BsidesRI 2013 2 7 Learning Security on the Cheap Patrick Laverty.mp4
|
64.3 MB
|
BsidesRI 2013 2 How I Do a Weekly Podcast or Three) Paul Asadoorian.mp4
|
217.8 MB
|
BsidesRI 2013 3 Show and Tell Super Minipwner James Edge.mp4
|
171.8 MB
|
BsidesRI 2013 4 Opening the Treasure Chest Attacking Network Attached Storage on a Pen Test Russ.mp4
|
173.2 MB
|
BsidesRI 2013 Closing Paul Asadoorian, Patrick Laverty & Mike Perez.mp4
|
42.3 MB
|
BsidesRI 2013 Intro with Paul Asadoorian, Patrick Laverty & Mike Perez.mp4
|
29.3 MB
|
/BSides Salt Lake City/
|
BSdiesSLC 2015 -- What To Do When Something Bad Has Happened -- Jason Wood.mp4
|
101.8 MB
|
BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.mp4
|
167.4 MB
|
BSidesSLC 2015 - Asymmetric Warfare and Corollaries in Network Defense - Jason Tracy.mp4
|
87.0 MB
|
BSidesSLC 2015 - Building AppSec In - Seth Law.mp4
|
113.1 MB
|
BSidesSLC 2015 - Cloud Security - Scott Arveseth.mp4
|
262.8 MB
|
BSidesSLC 2015 - Fighting Hardware Attacks with Software - Doktor Unicorn.mp4
|
147.8 MB
|
BSidesSLC 2015 - From Vim Muggle to Wizard in 10 Easy Steps - Erik Falor.mp4
|
262.0 MB
|
BSidesSLC 2015 - Hey Guys, I m a Pentester! - Metacortex.mp4
|
50.7 MB
|
BSidesSLC 2015 - Malware Fun - Kenny Long.mp4
|
87.0 MB
|
BSidesSLC 2015 - PlagueScanner An Open Source Multiple AV Scanner Framework - Robert Simmons.mp4
|
151.7 MB
|
BSidesSLC 2015 - RBAC is Dead. So now what - Adam Fisher.mp4
|
135.5 MB
|
BSidesSLC 2015 -- Authenticode in-depth -- Scott Piper.mp4
|
153.3 MB
|
BSidesSLC 2015 -- Bad USB Weaponized -- Dan Anderson and Steve Fink.mp4
|
70.2 MB
|
BSidesSLC 2015 -- BREAKING in BAD (I m the one who doesn t knock) -- Jayson E. Street.mp4
|
337.7 MB
|
BSidesSLC 2015 -- Feeding the Shark -- Jeremy Pierson.mp4
|
173.1 MB
|
BSidesSLC 2015 -- How to prevent eavesdropping on office VoIP calls -- Dmitry Dessiatnikov.mp4
|
178.2 MB
|
BSidesSLC 2015 -- InfoSec, Just Doing It -- Rob Jorgensen.mp4
|
184.5 MB
|
BSidesSLC 2015 -- Leading Change -- John Overbaugh.mp4
|
173.4 MB
|
BSidesSLC 2015 -- Pragmatic Cloud Security -- Joshua Danielson.mp4
|
130.2 MB
|
BSidesSLC 2015 -- Psst, Come Check Out My Lair!! #notacreeper -- Justin Larson.mp4
|
118.6 MB
|
BSidesSLC 2015 -- Security Onions and Honey Potz -- Ethan Dodge.mp4
|
204.1 MB
|
BSidesSLC 2015 -- Security Researcher, Security Besmircher -- Kevin Johnson.mp4
|
101.4 MB
|
BSidesSLC 2015 -- Social Engineering The Good, the Bad, and the Ugly -- Stephanie Carruthers.mp4
|
76.6 MB
|
BSidesSLC 2015 -- Take Charge of Your Infosec Career! -- Glen Roberts.mp4
|
114.2 MB
|
BSidesSLC 2015 -- The Inception Framework Cloud Based Attack -- Waylon Grange.mp4
|
111.4 MB
|
BSidesSLC 2015 -- The Secret Lives of Debuggers -- Lance Buttars.mp4
|
167.7 MB
|
BSidesSLC 2015 -- Trends In Exploit Kits -- Jeffrey Doty.mp4
|
224.7 MB
|
BSidesSLC 2015 -- Why You Need To Be Red Team ed -- Nate McConnell.mp4
|
98.9 MB
|
BSidesSLC 2015 -- You Must Search Before You Destroy -- Adam Steed.mp4
|
150.2 MB
|
/.../BSides San Francisco 2012/
|
Security s Best Asset are Argumentative Geeks.mp4
|
22.8 MB
|
/.../BSides San Francisco 2015/
|
00 BSidesSF 2015 Intro.mp4
|
14.2 MB
|
100 Stick a Pin in Certificate Pinning How to Inspect Mobile Traffic and Stop Data Exfiltration Gopa.mp4
|
122.5 MB
|
101 OSXCollector Forensic Collection and Automated Analysis for OS X Ivan Leichtling.mp4
|
93.0 MB
|
102 DNS Spikes Strikes and The Like thomas mathew.mp4
|
49.8 MB
|
103 Ask the EFF Kurt Opsahl.mp4
|
179.8 MB
|
104 Your Users Passwords Are Already Stolen Lucas Zaichkowsky.mp4
|
48.6 MB
|
106 Medical Device Security From Detection To Compromise Scott Erven.mp4
|
139.0 MB
|
107 How SecOps Can Convince DevOps To Believe In The Bogeyman Leif Dreizler.mp4
|
103.5 MB
|
108 Human Hunting Sean Gillespie.mp4
|
139.3 MB
|
109 Phighting Phishers Phake Phronts Kevin Bottomley.mp4
|
85.4 MB
|
110 Corporate Governance For Fun and NonProfit Christie Dudley.mp4
|
103.5 MB
|
111 HIPAA 2015 Wrath of the Audits W Hudson Harris.mp4
|
137.4 MB
|
112 Lessons Learned from Building and Running MHN the Worlds Largest Crowdsourced Honeynet Jason Tro.mp4
|
76.9 MB
|
113 Getting started Let me help you David Trollman.mp4
|
130.0 MB
|
200 Critical Infrastructure The Cloud loves me The Cloud loves me not Bryan Owen.mp4
|
130.3 MB
|
201 Fck These Guys Practical Countersurveillance Lisa Lorenzin.mp4
|
128.1 MB
|
202 Collective Action Problems in Cybersecurity Allan Friedman.mp4
|
86.1 MB
|
203 Intrusion Detection in the clouds Josh Pyorre.mp4
|
52.2 MB
|
204 Hacker or criminal Repairing the reputation of the infosec community Melanie Ensign.mp4
|
144.5 MB
|
205 Student Surveillance How Hackers Can Help Protect Student Privacy Jessy Irwin.mp4
|
144.6 MB
|
206 When Doing the Right Thing Goes Wrong Impact of Certificates on Service Based Infrastructure Rob.mp4
|
88.2 MB
|
207 How to Lie with Statistics Information Security Edition Tony Martin Vegue.mp4
|
117.5 MB
|
208 Ground Zero Financial Services The Latest Targeted Attacks from the Darknet Brian Contos.mp4
|
80.4 MB
|
209 Securing the Hastily Formed Network Infosec for Disaster Relief and Emergency Response Rakesh Bh.mp4
|
164.8 MB
|
210 GitReview Reflective Control In Action Jon Debonis.mp4
|
57.1 MB
|
212 Blink The Network Perimeter is Gone Rick Farina ZeroChaos.mp4
|
143.0 MB
|
213 Federating AWS CLI Paul Moreno.mp4
|
67.0 MB
|
/BSides Sao Paulo/
|
Bsides 2013 - Escalonador seguro para sistemas embarcados (Rodrigo Maximiano).mp4
|
185.0 MB
|
Bsides 2013 - Mobile Maware (Fernando Cardoso).mp4
|
153.6 MB
|
Bsides 2013 - Mobile or not mobile bank for financial transactions (Thiago Bordini).mp4
|
139.6 MB
|
Bsides 2013 - Seguranca Acessivel (Fabiola e Fernando).mp4
|
186.1 MB
|
Bsides 2013 - The Bozo Security goes to (Rodrigo(Sp0oKeR) Montoro).mp4
|
172.6 MB
|
Bsides 2013 - Utilizando um smartphone como pivo para um ataque interno (Rener Alberto).mp4
|
229.4 MB
|
/BSides St. Johns/
|
B-Sides St. John s 2013 - Session 01 - Travis Barlow.mp4
|
119.3 MB
|
B-Sides St. John s 2013 - Session 02 - Mark Nunnikhoven.mp4
|
182.2 MB
|
B-Sides St. John s 2013 - Session 03 - Chris Vernon.mp4
|
83.8 MB
|
B-Sides St. John s 2013 - Session 04 - Peter Rawsthorne.mp4
|
52.1 MB
|
B-Sides St. John s 2013 - Session 05 - Zack Mullaly.mp4
|
45.5 MB
|
B-Sides St. John s 2013 - Session 06 - Charles Robertson.mp4
|
209.7 MB
|
B-Sides St. John s 2013 - Session 07 - Darryl MacLeod.mp4
|
63.4 MB
|
B-Sides St. John s 2013 - Session 08 - Joe Dawson.mp4
|
110.2 MB
|
B-Sides St. John s 2013 - Session 09 - Garry Coldwells.mp4
|
97.6 MB
|
/.../BSides Tampa 2015/
|
100 Bug Bounties and Security Research Kevin Johnson.mp4
|
99.8 MB
|
101 Securing The Cloud Alan Zukowski.mp4
|
132.2 MB
|
102 Hacking Chris Berberich.mp4
|
108.7 MB
|
103 Vendor Induced Security Issues Dave Chronister.mp4
|
114.6 MB
|
104 Pentest Apocalypse Beau Bullock.mp4
|
95.5 MB
|
105 Kippo and Bits and Bits Chris Teodorski.mp4
|
97.1 MB
|
106 The Art of Post infection Response Mitigation Caleb Crable.mp4
|
110.5 MB
|
107 The Need for Pro active Defense and Threat Hunting Within Organizations Andrew Case.mp4
|
148.7 MB
|
200 Finding Common Ground Within the Industry and Beyond David Shearer.mp4
|
92.4 MB
|
201 Ways to Identify Malware on a System Ryan Irving.mp4
|
136.0 MB
|
202 Android Malware and Analysis Shane Hartman.mp4
|
135.3 MB
|
203 Teaching Kids and Even Some Adults Security Through Gaming Le Grecs.mp4
|
116.3 MB
|
204 Evaluating Commercial Cyber Threat Intelligence John Berger.mp4
|
123.7 MB
|
300 Cyber Geography and the Manifest Destiny of the 21st Century Joe Blankenship.mp4
|
67.3 MB
|
301 Mitigating Brand Damage From A Cyber Attack Guy Hagen.mp4
|
114.6 MB
|
302 What is a security analyst and what job role will they perform James Risler.mp4
|
111.6 MB
|
303 Live Forensic Acquisition Techniques Joe Partlow.mp4
|
114.1 MB
|
304 Cyber Security Awareness for Healthcare Professionals Marco Polizzi.mp4
|
144.5 MB
|
/BSides Toronto/BSidesTO 2014/
|
BSidesTO 2014 - A Practical Approach to Hacking an Enterprise with YASUO - Saurabh & Stephen.mp4
|
56.2 MB
|
BSidesTO 2014 - Batch Firmware Analysis - Jeremy Richards.mp4
|
48.7 MB
|
BSidesTO 2014 - Blackhat Python - Dan Frisch.mp4
|
113.3 MB
|
BSidesTO 2014 - Communities @ Risk - Katie Kleemola.mp4
|
34.4 MB
|
BSidesTO 2014 - Corporations in the middle - Lee Brotherson.mp4
|
59.5 MB
|
BSidesTO 2014 - Cryptocurrencies and Security - Michael Perklin.mp4
|
53.2 MB
|
BSidesTO 2014 - ELK Not P.O.S. - Jason Kendall.mp4
|
42.5 MB
|
BSidesTO 2014 - Honeydocs and Offensive Countermeasures - Roy Firestein.mp4
|
57.4 MB
|
BSidesTO 2014 - Hopping on the CAN Bus - Eric Evenchick.mp4
|
64.1 MB
|
BSidesTO 2014 - Logs and Tactical Defence - Allan Stojanovic.mp4
|
37.2 MB
|
BSidesTO 2014 - Pwning all the Internet of things for fun and profit - Ben Hughes.mp4
|
34.9 MB
|
BSidesTO 2014 - Recog Open Source Asset and Service Identification - Greg Wiseman.mp4
|
47.6 MB
|
BSidesTO 2014 - Security and Behavioural Economics - Augusto Barros.mp4
|
83.5 MB
|
BSidesTO 2014 - Shut the Front Door - Mark Bassegio.mp4
|
106.0 MB
|
BSidesTO 2014 - The Hitchhiker s Guide to Information Security - Kellman Meghu.mp4
|
118.5 MB
|
BSidesTO 2014 - Voltron - Richo Healey.mp4
|
113.6 MB
|
/BSides Vancouver/
|
BSides Vancouver 2015 - Alex Loffler - Advanced Security Analytics.mp4
|
240.4 MB
|
BSides Vancouver 2015 - Andree Toonk - BGP Hijack - Who s Stealing Your Prefixes.mp4
|
138.0 MB
|
BSides Vancouver 2015 - Bob Fruth - Threat Modeling in the Age of Connectivity to Everything.mp4
|
74.5 MB
|
BSides Vancouver 2015 - Irfahn Khimji & Ken Westin - I am The Insider Threat.mp4
|
194.1 MB
|
BSides Vancouver 2015 - Keynote Mark Weinstein - Reality Check Does Privacy Truly Matter Today.mp4
|
151.4 MB
|
BSides Vancouver 2015 - Keynote Steven Rambam - You ve Lost Privacy, Now They re Taking Anonymity.mp4
|
312.5 MB
|
BSides Vancouver 2015 - Robert Wood - Threat Modeling in the Gaming Industry.mp4
|
379.0 MB
|
BSides Vancouver 2015 - VEC Panel - Entrepreneurial lessons learned and best practices.mp4
|
176.6 MB
|
BSides Vancouver 2015 - Wesley Wineberg - Analyzing the EMU-2 Zigbee Home Energy Monitor.mp4
|
388.0 MB
|
/.../BSides Warsaw 2014/
|
Jakub Unknow Mrugalski - This is (s)hell!.mp4
|
185.6 MB
|
Maciej mak Kotowicz vel matematyk - Wakacyjne rachunki.mp4
|
134.7 MB
|
Mariusz oshogbo vx Zaborski - Budowanie appliance sieciowego w oparciu o otwarte oprogramowanie.mp4
|
120.8 MB
|
matt3.mp4
|
88.6 MB
|
/.../BSides Winnipeg 2013/
|
Adrien de Beaupre - Making Pen-Testing Analysis Sexy.mp4
|
171.1 MB
|
Brandon Enright - Detecting Malicious Activity and Malware on a Large Network.mp4
|
179.6 MB
|
Closing Ceremonies BSides Winnipeg 2013.mp4
|
61.7 MB
|
Ian Trump - Cyber Threat Intelligence Is it Real, or is it Hokum.mp4
|
234.1 MB
|
Jared Bater & Chris Kluka - Canadian Cyber Defence Challenge Building a War Zone.mp4
|
177.3 MB
|
Josh More - Security Metaphors Discussing problems with others while avoiding arguments.mp4
|
186.6 MB
|
Kyle Geske - Internet Bots for Fun & No Profit.mp4
|
106.9 MB
|
Leslie Bester - VoIP and VoIP Related Fraud.mp4
|
115.9 MB
|
Mark Jenkins - Auditable Offline Bitcoin Wallet Implementation.mp4
|
135.5 MB
|
Michael Legary - NFC & RFID Harvesting for REDACTED.mp4
|
206.7 MB
|
Michael Zapp - SSD Security Risks.mp4
|
236.8 MB
|
Richard Rodd & Chris Otto - USB A Look Inside.mp4
|
139.1 MB
|
Sergii Polishcuk - ARP attack on IXP infrastructure.mp4
|
82.9 MB
|
Theo Baschak - InfoSec from an ISP Perspective.mp4
|
120.8 MB
|
Yvan Boily - Security in the Open.mp4
|
208.2 MB
|
/
|
Security BSides thank you.txt
|
3.0 KB
|
Total files 759
|