/TROOPERS 2015 IPv6 Security Summit/
|
[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4
|
2.1 GB
|
[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4
|
1.9 GB
|
[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt
|
98.7 KB
|
[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).mp4
|
1.9 GB
|
[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).srt
|
116.0 KB
|
[TROOPERS15] Christopher Werny - Basic Attacks and Defences (2 2).mp4
|
750.5 MB
|
[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.mp4
|
1.6 GB
|
[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.srt
|
106.8 KB
|
[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4
|
998.4 MB
|
[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt
|
66.9 KB
|
[TROOPERS15] Enno Rey - 48 Considered Harmful.mp4
|
1.2 GB
|
[TROOPERS15] Enno Rey - 48 Considered Harmful.srt
|
66.6 KB
|
[TROOPERS15] Enno Rey - Reliable & Secure DHCPv6.mp4
|
751.6 MB
|
[TROOPERS15] Eric Vyncke - Routing Header Is Back... Should We Panic.mp4
|
359.3 MB
|
[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4
|
1.9 GB
|
[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt
|
125.5 KB
|
[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4
|
1.8 GB
|
[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.srt
|
142.7 KB
|
[TROOPERS15] Gabriel Muller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4
|
602.3 MB
|
[TROOPERS15] Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4
|
345.2 MB
|
[TROOPERS15] Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4
|
750.1 MB
|
[TROOPERS15] Julian Bangert - Tales of 6006 Protocols.mp4
|
277.5 MB
|
[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt
|
127.5 KB
|
[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4
|
521.0 MB
|
[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt
|
85.4 KB
|
/TROOPERS 2008/
|
TROOPERS08.org_BELENKO Andrej - password recovery.mp4
|
161.5 MB
|
TROOPERS08.org_BRANCO Rodrigo - KIDS.mp4
|
168.2 MB
|
TROOPERS08.org_BRATUS Sergey - AP fingerprinting.bak.mp4
|
112.2 MB
|
TROOPERS08.org_BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4
|
174.1 MB
|
TROOPERS08.org_CALLAS Jon - Straight Talk abaou Crypto.mp4
|
173.8 MB
|
TROOPERS08.org_CHIESA Raoul - SCADA and national critical infrastructures.mp4
|
159.1 MB
|
TROOPERS08.org_De Haas Job - Side channel analysis.mp4
|
169.7 MB
|
TROOPERS08.org_DJB - Keynote.mp4
|
169.5 MB
|
TROOPERS08.org_HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4
|
182.6 MB
|
TROOPERS08.org_HOLZ Thorsten - virtual-honeypots.mp4
|
161.4 MB
|
TROOPERS08.org_KEMP Michael - virtualise.mp4
|
150.7 MB
|
TROOPERS08.org_KLOSE Roger - ERNW_ESX-In-Security.mp4
|
107.5 MB
|
TROOPERS08.org_KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4
|
147.8 MB
|
TROOPERS08.org_Kuhn Friedwart - RMS.mp4
|
170.2 MB
|
TROOPERS08.org_LOGLOGIC - log management.mp4
|
164.0 MB
|
TROOPERS08.org_ROECHER Dror-John - the data went down the drain.mp4
|
159.6 MB
|
TROOPERS08.org_SPEICHERT Horst - hackertools according to german law.mp4
|
170.1 MB
|
TROOPERS08.org_STREHLE Rolf - self defending networks.mp4
|
168.1 MB
|
TROOPERS08.org_THUMANN Michael - Reversing.mp4
|
162.2 MB
|
TROOPERS08.org_THUMANN Michael - Secondlife (TM).mp4
|
165.6 MB
|
TROOPERS08.org_Troopers IBM Appscan.mp4
|
161.7 MB
|
TROOPERS08.org_WAISSBEIN Ariel - penetration testing learning kit.mp4
|
170.8 MB
|
TROOPERS09_baier_access_control_service.mp4
|
145.0 MB
|
TROOPERS09_bratus_embedded_devices.mp4
|
110.9 MB
|
TROOPERS09_gauci_henrique_web_application_firewalls.mp4
|
57.7 MB
|
TROOPERS09_rey_keynote_stop_the_madness.mp4
|
28.8 MB
|
TROOPERS09_rey_ruediger_codenomicon_fuzzer.mp4
|
88.6 MB
|
TROOPERS08.org_AMATO Francisco - evilgrade.mp4
|
3.1 MB
|
/TROOPERS 2009/
|
TROOPERS09 - .NET Access Control Service - Dominick Baier.mp4
|
89.1 MB
|
TROOPERS09 - .NET Access Control Service - Dominick Baier.srt
|
49.7 KB
|
TROOPERS09 - Stop the Madness - Keynote by Enno Rey.mp4
|
63.0 MB
|
TROOPERS09 - Stop the Madness - Keynote by Enno Rey.srt
|
52.6 KB
|
TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.mp4
|
140.3 MB
|
TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.srt
|
40.4 KB
|
TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.mp4
|
47.9 MB
|
TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.srt
|
15.4 KB
|
/TROOPERS 2010/
|
TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4
|
178.9 MB
|
TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt
|
84.8 KB
|
TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4
|
108.4 MB
|
TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt
|
72.0 KB
|
TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4
|
148.8 MB
|
TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt
|
95.4 KB
|
TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4
|
92.3 MB
|
TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt
|
60.3 KB
|
TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.mp4
|
102.4 MB
|
TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.srt
|
90.7 KB
|
TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4
|
143.3 MB
|
TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt
|
83.6 KB
|
TROOPERS10 - How to fail an audit - Martin Freiss.mp4
|
126.1 MB
|
TROOPERS10 - How to rate the security of closed source software - Michael Thumann.mp4
|
142.7 MB
|
TROOPERS10 - How to rate the security of closed source software - Michael Thumann.srt
|
74.0 KB
|
TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4
|
166.5 MB
|
TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.srt
|
121.0 KB
|
TROOPERS10 - Netscreen of Death - Graeme Neilson.mp4
|
136.3 MB
|
TROOPERS10 - Netscreen of Death - Graeme Neilson.srt
|
84.4 KB
|
TROOPERS10 - Rapid Risk Assessment - Enno Rey.mp4
|
121.4 MB
|
TROOPERS10 - Rapid Risk Assessment - Enno Rey.srt
|
85.8 KB
|
TROOPERS10 - Return Oriented Rootkits - Ralf Hund.mp4
|
120.3 MB
|
TROOPERS10 - Return Oriented Rootkits - Ralf Hund.srt
|
84.5 KB
|
TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.mp4
|
113.1 MB
|
TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.srt
|
31.4 KB
|
TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.mp4
|
104.5 MB
|
TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.srt
|
69.6 KB
|
TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4
|
50.5 MB
|
TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt
|
33.5 KB
|
/TROOPERS 2011/
|
TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4
|
140.2 MB
|
TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt
|
79.9 KB
|
TROOPERS11 - Cache on Delivery - Marco Slaviero.mp4
|
117.9 MB
|
TROOPERS11 - Cache on Delivery - Marco Slaviero.srt
|
77.9 KB
|
TROOPERS11 - Do you know what s happening in your $application - Felix Leder.mp4
|
160.0 MB
|
TROOPERS11 - Do you know what s happening in your $application - Felix Leder.srt
|
94.0 KB
|
TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4
|
93.0 MB
|
TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt
|
76.6 KB
|
TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.mp4
|
92.4 MB
|
TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.srt
|
56.9 KB
|
TROOPERS11 - I FOCA a MIL Domain - Chema Alonso.mp4
|
86.5 MB
|
TROOPERS11 - Keynote Day 1 - Enno Rey.mp4
|
80.9 MB
|
TROOPERS11 - Keynote Day 1 - Enno Rey.srt
|
68.4 KB
|
TROOPERS11 - Keynote Day 2 - Richard Thieme.mp4
|
161.6 MB
|
TROOPERS11 - Keynote Day 2 - Richard Thieme.srt
|
100.0 KB
|
TROOPERS11 - Milking a horse - Meder Kydyraliev.mp4
|
71.1 MB
|
TROOPERS11 - Milking a horse - Meder Kydyraliev.srt
|
75.2 KB
|
TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.mp4
|
102.5 MB
|
TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.srt
|
52.3 KB
|
TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.mp4
|
81.0 MB
|
TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.srt
|
38.2 KB
|
TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.mp4
|
50.8 MB
|
TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.srt
|
38.5 KB
|
/TROOPERS 2012/
|
TROOPERS12 - Closing Remarks.mp4
|
20.8 MB
|
TROOPERS12 - Opening Teaser.mp4
|
21.2 MB
|
/TROOPERS 2013/
|
TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4
|
185.8 MB
|
TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt
|
13.9 KB
|
TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.mp4
|
193.4 MB
|
TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.srt
|
43.8 KB
|
TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.mp4
|
643.6 MB
|
TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.srt
|
73.7 KB
|
TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.mp4
|
40.4 MB
|
TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.srt
|
43.8 KB
|
TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4
|
112.5 MB
|
TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt
|
50.7 KB
|
TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.mp4
|
367.2 MB
|
TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.srt
|
61.1 KB
|
TROOPERS13 - Hacking and Craft - Jeff Gough.mp4
|
348.6 MB
|
TROOPERS13 - Hacking and Craft - Jeff Gough.srt
|
67.5 KB
|
TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.mp4
|
378.9 MB
|
TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.srt
|
71.9 KB
|
TROOPERS13 - Keynote Day 1 by Rodrigo Branco.mp4
|
490.3 MB
|
TROOPERS13 - Keynote Day 1 by Rodrigo Branco.srt
|
122.1 KB
|
TROOPERS13 - Keynote Day 2 by Chris Nickerson.mp4
|
284.0 MB
|
TROOPERS13 - Keynote Day 2 by Chris Nickerson.srt
|
74.1 KB
|
TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.mp4
|
725.7 MB
|
TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.srt
|
84.6 KB
|
TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.mp4
|
415.0 MB
|
TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.srt
|
75.1 KB
|
TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4
|
602.3 MB
|
TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.srt
|
68.0 KB
|
TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4
|
545.0 MB
|
TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt
|
94.7 KB
|
TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.mp4
|
270.9 MB
|
TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.srt
|
69.5 KB
|
TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.mp4
|
389.0 MB
|
TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.srt
|
71.4 KB
|
TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.mp4
|
266.4 MB
|
TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.srt
|
77.2 KB
|
TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4
|
40.8 MB
|
TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.srt
|
67.4 KB
|
TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4
|
224.4 MB
|
TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt
|
75.2 KB
|
TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4
|
702.2 MB
|
TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt
|
72.1 KB
|
TROOPERS13 - We Came In Peace - They Don t Hackers vs. CyberWar - fx.srt
|
80.9 KB
|
TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.mp4
|
448.1 MB
|
TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.srt
|
82.5 KB
|
TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.mp4
|
390.8 MB
|
TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.srt
|
62.7 KB
|
/TROOPERS 2014/
|
TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.mp4
|
266.4 MB
|
TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.srt
|
72.6 KB
|
TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4
|
320.5 MB
|
TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt
|
55.9 KB
|
TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.mp4
|
136.3 MB
|
TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.srt
|
40.6 KB
|
TROOPERS14 - Closing Remarks - Enno Rey.mp4
|
203.8 MB
|
TROOPERS14 - Closing Remarks - Enno Rey.srt
|
26.1 KB
|
TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4
|
326.4 MB
|
TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).srt
|
81.5 KB
|
TROOPERS14 - Georg Bakos - Keynote.mp4
|
529.9 MB
|
TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.mp4
|
303.6 MB
|
TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.srt
|
88.3 KB
|
TROOPERS14 - Granular Trust; making it work - Toby Kohlenberg.srt
|
93.4 KB
|
TROOPERS14 - Granular Trust_ making it work - Toby Kohlenberg.mp4
|
431.6 MB
|
TROOPERS14 - How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4
|
250.6 MB
|
TROOPERS14 - How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4
|
258.3 MB
|
TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4
|
403.6 MB
|
TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.srt
|
55.1 KB
|
TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4
|
289.8 MB
|
TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt
|
44.3 KB
|
TROOPERS14 - Keynote - FX.mp4
|
93.2 MB
|
TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4
|
408.7 MB
|
TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt
|
42.8 KB
|
TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.mp4
|
355.8 MB
|
TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.srt
|
92.8 KB
|
TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.mp4
|
168.1 MB
|
TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.srt
|
79.4 KB
|
TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4
|
400.1 MB
|
TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt
|
64.8 KB
|
TROOPERS14 - Psychology of Security - Stefan Schumacher.mp4
|
249.5 MB
|
TROOPERS14 - Psychology of Security - Stefan Schumacher.srt
|
86.2 KB
|
TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4
|
418.7 MB
|
TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt
|
70.2 KB
|
TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4
|
381.4 MB
|
TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt
|
72.3 KB
|
TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.mp4
|
356.7 MB
|
TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.srt
|
62.4 KB
|
TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.mp4
|
34.3 MB
|
TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.srt
|
69.1 KB
|
TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.mp4
|
309.6 MB
|
TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.srt
|
86.7 KB
|
TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.mp4
|
272.8 MB
|
TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.srt
|
64.6 KB
|
TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4
|
41.1 MB
|
TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt
|
58.8 KB
|
TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.mp4
|
6.2 MB
|
TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.srt
|
29.8 KB
|
/TROOPERS 2015/
|
TROOPERS15 - Welcome Trailer.mp4
|
9.6 MB
|
[TROOPERS15] Andreas Lindh - Defender Economics.mp4
|
146.5 MB
|
[TROOPERS15] Andreas Lindh - Defender Economics.srt
|
62.4 KB
|
[TROOPERS15] Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4
|
735.0 MB
|
[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.mp4
|
291.2 MB
|
[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.srt
|
51.0 KB
|
[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.mp4
|
327.5 MB
|
[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.srt
|
55.6 KB
|
[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4
|
226.1 MB
|
[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt
|
97.6 KB
|
[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4
|
352.1 MB
|
[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt
|
77.0 KB
|
[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.mp4
|
238.5 MB
|
[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.srt
|
70.5 KB
|
[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.mp4
|
231.0 MB
|
[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.srt
|
49.5 KB
|
[TROOPERS15] Enno Rey - Opening Remarks.mp4
|
69.9 MB
|
[TROOPERS15] Enno Rey - Opening Remarks.srt
|
9.3 KB
|
[TROOPERS15] Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4
|
294.1 MB
|
[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4
|
276.2 MB
|
[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt
|
67.2 KB
|
[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.mp4
|
281.9 MB
|
[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.srt
|
84.4 KB
|
[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4
|
248.4 MB
|
[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt
|
66.9 KB
|
[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4
|
181.9 MB
|
[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt
|
39.0 KB
|
[TROOPERS15] Haroon Meer - Keynote.mp4
|
171.4 MB
|
[TROOPERS15] Haroon Meer - Keynote.srt
|
96.0 KB
|
[TROOPERS15] Ivan Pepelnjak - Automating Network Security.mp4
|
118.4 MB
|
[TROOPERS15] Ivan Pepelnjak - Automating Network Security.srt
|
72.9 KB
|
[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.mp4
|
230.9 MB
|
[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.srt
|
86.4 KB
|
[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4
|
329.7 MB
|
[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt
|
68.1 KB
|
[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4
|
495.1 MB
|
[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt
|
89.2 KB
|
[TROOPERS15] Martijn Grooten - The State of Email in 2015.mp4
|
91.4 MB
|
[TROOPERS15] Martijn Grooten - The State of Email in 2015.srt
|
66.2 KB
|
[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.mp4
|
227.8 MB
|
[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.srt
|
80.0 KB
|
[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4
|
295.5 MB
|
[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt
|
87.7 KB
|
[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4
|
461.9 MB
|
[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt
|
88.3 KB
|
[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4
|
159.8 MB
|
[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt
|
96.8 KB
|
[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4
|
247.2 MB
|
[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.srt
|
73.7 KB
|
[TROOPERS15] Sergej Bratus - Keynote.mp4
|
318.8 MB
|
[TROOPERS15] Sergej Bratus - Keynote.srt
|
86.4 KB
|
[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4
|
141.8 MB
|
[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt
|
47.1 KB
|
[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4
|
243.3 MB
|
[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt
|
72.7 KB
|
[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4
|
159.8 MB
|
[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt
|
68.4 KB
|
[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4
|
214.2 MB
|
[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt
|
79.1 KB
|
/TROOPERS 2016/
|
An unknown SAP default Account.mp4
|
198.9 MB
|
Attacking and Protecting Big Data Environments.mp4
|
161.9 MB
|
Attacking Nextgen Firewalls.mp4
|
266.7 MB
|
Better Crypto.mp4
|
83.9 MB
|
Broadcasting your Attack.mp4
|
213.4 MB
|
Caring for File Formats.mp4
|
95.9 MB
|
Closing Remarks.mp4
|
325.0 MB
|
Crypto Code.mp4
|
105.3 MB
|
Deep dive into SAP archive file formats.mp4
|
253.7 MB
|
Exploiting the Unexploitable.mp4
|
196.7 MB
|
Freifunk.mp4
|
69.1 MB
|
Hiding your White Box Designs is Not Enough.mp4
|
268.7 MB
|
Hollywood Hacking Facts and Fiction.mp4
|
157.7 MB
|
How to Implement an SDL in a Large Company.mp4
|
93.6 MB
|
Imma Chargin Mah Lazer.mp4
|
252.6 MB
|
Keynote - A Praise for Hackers.mp4
|
314.7 MB
|
Keynote - Ethics in Networked Systems Research.mp4
|
193.6 MB
|
Lets Play Hide and Seek in the Cloud.mp4
|
24.2 MB
|
Medical Device Security Hack or Hype.mp4
|
258.3 MB
|
Mind The Gap.mp4
|
115.5 MB
|
Offensive Active Directory with Powershell.mp4
|
119.6 MB
|
One Tool To Rule Them All.mp4
|
25.9 MB
|
Passive Intelligence Gathering Analytics.mp4
|
183.7 MB
|
Patch me if you can.mp4
|
264.9 MB
|
Preventing vulns in HANA based deployments.mp4
|
224.4 MB
|
Protecting Hosts in IPv6 Networks.mp4
|
253.9 MB
|
Rapid Radio Reversing.mp4
|
123.2 MB
|
Real Life Software Defined Security.mp4
|
99.4 MB
|
Reverse engineering a Digital Two way Radio.mp4
|
99.9 MB
|
Security Evaluation of Dual-Stack Systems.mp4
|
212.2 MB
|
The Chimaera Processor.mp4
|
43.9 MB
|
The Internet of Deadly Things.mp4
|
31.8 MB
|
The Joy of Sandbox Mitigations.mp4
|
103.1 MB
|
The Kings in your Castle.mp4
|
119.1 MB
|
The Road to secure Smart Cars.mp4
|
199.3 MB
|
Towards a LangSec Aware SDLC.mp4
|
95.8 MB
|
TR16 - Day 1 Visuals.mp4
|
93.4 MB
|
TROOPERS Conference 360 Teaser - must watch in YouTube app.mp4
|
13.0 MB
|
Unpatchable.mp4
|
214.3 MB
|
unrubby.mp4
|
114.0 MB
|
Witness the Russian attack Live demos of their steps tools techniques.mp4
|
81.2 MB
|
/TROOPERS 2016 IPv6 Summit/
|
Advanced IPv6 Attacks Using Chiron Training.mp4
|
740.1 MB
|
Advanced IPv6 Network Reconnaisance.mp4
|
508.4 MB
|
Anonymization IPv6 in PCAPs - Challenges and Wins.mp4
|
192.3 MB
|
Automating IPv6 Deployments.mp4
|
133.6 MB
|
Basic Attacks and Mitigation Strategies.mp4
|
458.7 MB
|
Building a Reliable and Secure IPv6 WiFi Network.mp4
|
229.4 MB
|
Developing an Enterprise IPv6 Security Strategy.mp4
|
221.5 MB
|
IPv6 First Hop Security Features on HP Devices.mp4
|
134.7 MB
|
IPv6 Security Fundamentals.mp4
|
382.0 MB
|
NATTED - A Field Report.mp4
|
218.6 MB
|
Recent IPv6 Standardization Efforts.mp4
|
420.1 MB
|
Remote Access and Business Partner Connections.mp4
|
278.1 MB
|
Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4
|
113.2 MB
|
Security Assessment of Microsoft DirectAccess.mp4
|
209.3 MB
|
/
|
TROOPERS thank you.txt
|
0.6 KB
|
Total files 323
|