FileMood

Download TROOPERS

TROOPERS

Name

TROOPERS

 DOWNLOAD Copy Link

Total Size

58.9 GB

Total Files

323

Hash

84DA857B5904C0843252147BBE9716A9F606C11C

/TROOPERS 2015 IPv6 Security Summit/

[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4

2.1 GB

[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4

1.9 GB

[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt

98.7 KB

[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).mp4

1.9 GB

[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).srt

116.0 KB

[TROOPERS15] Christopher Werny - Basic Attacks and Defences (2 2).mp4

750.5 MB

[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.mp4

1.6 GB

[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.srt

106.8 KB

[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4

998.4 MB

[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt

66.9 KB

[TROOPERS15] Enno Rey - 48 Considered Harmful.mp4

1.2 GB

[TROOPERS15] Enno Rey - 48 Considered Harmful.srt

66.6 KB

[TROOPERS15] Enno Rey - Reliable & Secure DHCPv6.mp4

751.6 MB

[TROOPERS15] Eric Vyncke - Routing Header Is Back... Should We Panic.mp4

359.3 MB

[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4

1.9 GB

[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt

125.5 KB

[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4

1.8 GB

[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.srt

142.7 KB

[TROOPERS15] Gabriel Muller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4

602.3 MB

[TROOPERS15] Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4

345.2 MB

[TROOPERS15] Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4

750.1 MB

[TROOPERS15] Julian Bangert - Tales of 6006 Protocols.mp4

277.5 MB

[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt

127.5 KB

[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4

521.0 MB

[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt

85.4 KB

/TROOPERS 2008/

TROOPERS08.org_BELENKO Andrej - password recovery.mp4

161.5 MB

TROOPERS08.org_BRANCO Rodrigo - KIDS.mp4

168.2 MB

TROOPERS08.org_BRATUS Sergey - AP fingerprinting.bak.mp4

112.2 MB

TROOPERS08.org_BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4

174.1 MB

TROOPERS08.org_CALLAS Jon - Straight Talk abaou Crypto.mp4

173.8 MB

TROOPERS08.org_CHIESA Raoul - SCADA and national critical infrastructures.mp4

159.1 MB

TROOPERS08.org_De Haas Job - Side channel analysis.mp4

169.7 MB

TROOPERS08.org_DJB - Keynote.mp4

169.5 MB

TROOPERS08.org_HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4

182.6 MB

TROOPERS08.org_HOLZ Thorsten - virtual-honeypots.mp4

161.4 MB

TROOPERS08.org_KEMP Michael - virtualise.mp4

150.7 MB

TROOPERS08.org_KLOSE Roger - ERNW_ESX-In-Security.mp4

107.5 MB

TROOPERS08.org_KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4

147.8 MB

TROOPERS08.org_Kuhn Friedwart - RMS.mp4

170.2 MB

TROOPERS08.org_LOGLOGIC - log management.mp4

164.0 MB

TROOPERS08.org_ROECHER Dror-John - the data went down the drain.mp4

159.6 MB

TROOPERS08.org_SPEICHERT Horst - hackertools according to german law.mp4

170.1 MB

TROOPERS08.org_STREHLE Rolf - self defending networks.mp4

168.1 MB

TROOPERS08.org_THUMANN Michael - Reversing.mp4

162.2 MB

TROOPERS08.org_THUMANN Michael - Secondlife (TM).mp4

165.6 MB

TROOPERS08.org_Troopers IBM Appscan.mp4

161.7 MB

TROOPERS08.org_WAISSBEIN Ariel - penetration testing learning kit.mp4

170.8 MB

TROOPERS09_baier_access_control_service.mp4

145.0 MB

TROOPERS09_bratus_embedded_devices.mp4

110.9 MB

TROOPERS09_gauci_henrique_web_application_firewalls.mp4

57.7 MB

TROOPERS09_rey_keynote_stop_the_madness.mp4

28.8 MB

TROOPERS09_rey_ruediger_codenomicon_fuzzer.mp4

88.6 MB

TROOPERS08.org_AMATO Francisco - evilgrade.mp4

3.1 MB

/TROOPERS 2009/

TROOPERS09 - .NET Access Control Service - Dominick Baier.mp4

89.1 MB

TROOPERS09 - .NET Access Control Service - Dominick Baier.srt

49.7 KB

TROOPERS09 - Stop the Madness - Keynote by Enno Rey.mp4

63.0 MB

TROOPERS09 - Stop the Madness - Keynote by Enno Rey.srt

52.6 KB

TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.mp4

140.3 MB

TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.srt

40.4 KB

TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.mp4

47.9 MB

TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.srt

15.4 KB

/TROOPERS 2010/

TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4

178.9 MB

TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt

84.8 KB

TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4

108.4 MB

TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt

72.0 KB

TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4

148.8 MB

TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt

95.4 KB

TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4

92.3 MB

TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt

60.3 KB

TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.mp4

102.4 MB

TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.srt

90.7 KB

TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4

143.3 MB

TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt

83.6 KB

TROOPERS10 - How to fail an audit - Martin Freiss.mp4

126.1 MB

TROOPERS10 - How to rate the security of closed source software - Michael Thumann.mp4

142.7 MB

TROOPERS10 - How to rate the security of closed source software - Michael Thumann.srt

74.0 KB

TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4

166.5 MB

TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.srt

121.0 KB

TROOPERS10 - Netscreen of Death - Graeme Neilson.mp4

136.3 MB

TROOPERS10 - Netscreen of Death - Graeme Neilson.srt

84.4 KB

TROOPERS10 - Rapid Risk Assessment - Enno Rey.mp4

121.4 MB

TROOPERS10 - Rapid Risk Assessment - Enno Rey.srt

85.8 KB

TROOPERS10 - Return Oriented Rootkits - Ralf Hund.mp4

120.3 MB

TROOPERS10 - Return Oriented Rootkits - Ralf Hund.srt

84.5 KB

TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.mp4

113.1 MB

TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.srt

31.4 KB

TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.mp4

104.5 MB

TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.srt

69.6 KB

TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4

50.5 MB

TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt

33.5 KB

/TROOPERS 2011/

TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4

140.2 MB

TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt

79.9 KB

TROOPERS11 - Cache on Delivery - Marco Slaviero.mp4

117.9 MB

TROOPERS11 - Cache on Delivery - Marco Slaviero.srt

77.9 KB

TROOPERS11 - Do you know what s happening in your $application - Felix Leder.mp4

160.0 MB

TROOPERS11 - Do you know what s happening in your $application - Felix Leder.srt

94.0 KB

TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4

93.0 MB

TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt

76.6 KB

TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.mp4

92.4 MB

TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.srt

56.9 KB

TROOPERS11 - I FOCA a MIL Domain - Chema Alonso.mp4

86.5 MB

TROOPERS11 - Keynote Day 1 - Enno Rey.mp4

80.9 MB

TROOPERS11 - Keynote Day 1 - Enno Rey.srt

68.4 KB

TROOPERS11 - Keynote Day 2 - Richard Thieme.mp4

161.6 MB

TROOPERS11 - Keynote Day 2 - Richard Thieme.srt

100.0 KB

TROOPERS11 - Milking a horse - Meder Kydyraliev.mp4

71.1 MB

TROOPERS11 - Milking a horse - Meder Kydyraliev.srt

75.2 KB

TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.mp4

102.5 MB

TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.srt

52.3 KB

TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.mp4

81.0 MB

TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.srt

38.2 KB

TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.mp4

50.8 MB

TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.srt

38.5 KB

/TROOPERS 2012/

TROOPERS12 - Closing Remarks.mp4

20.8 MB

TROOPERS12 - Opening Teaser.mp4

21.2 MB

/TROOPERS 2013/

TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4

185.8 MB

TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt

13.9 KB

TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.mp4

193.4 MB

TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.srt

43.8 KB

TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.mp4

643.6 MB

TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.srt

73.7 KB

TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.mp4

40.4 MB

TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.srt

43.8 KB

TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4

112.5 MB

TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt

50.7 KB

TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.mp4

367.2 MB

TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.srt

61.1 KB

TROOPERS13 - Hacking and Craft - Jeff Gough.mp4

348.6 MB

TROOPERS13 - Hacking and Craft - Jeff Gough.srt

67.5 KB

TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.mp4

378.9 MB

TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.srt

71.9 KB

TROOPERS13 - Keynote Day 1 by Rodrigo Branco.mp4

490.3 MB

TROOPERS13 - Keynote Day 1 by Rodrigo Branco.srt

122.1 KB

TROOPERS13 - Keynote Day 2 by Chris Nickerson.mp4

284.0 MB

TROOPERS13 - Keynote Day 2 by Chris Nickerson.srt

74.1 KB

TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.mp4

725.7 MB

TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.srt

84.6 KB

TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.mp4

415.0 MB

TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.srt

75.1 KB

TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4

602.3 MB

TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.srt

68.0 KB

TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4

545.0 MB

TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt

94.7 KB

TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.mp4

270.9 MB

TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.srt

69.5 KB

TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.mp4

389.0 MB

TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.srt

71.4 KB

TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.mp4

266.4 MB

TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.srt

77.2 KB

TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4

40.8 MB

TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.srt

67.4 KB

TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4

224.4 MB

TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt

75.2 KB

TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4

702.2 MB

TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt

72.1 KB

TROOPERS13 - We Came In Peace - They Don t Hackers vs. CyberWar - fx.srt

80.9 KB

TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.mp4

448.1 MB

TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.srt

82.5 KB

TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.mp4

390.8 MB

TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.srt

62.7 KB

/TROOPERS 2014/

TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.mp4

266.4 MB

TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.srt

72.6 KB

TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4

320.5 MB

TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt

55.9 KB

TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.mp4

136.3 MB

TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.srt

40.6 KB

TROOPERS14 - Closing Remarks - Enno Rey.mp4

203.8 MB

TROOPERS14 - Closing Remarks - Enno Rey.srt

26.1 KB

TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4

326.4 MB

TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).srt

81.5 KB

TROOPERS14 - Georg Bakos - Keynote.mp4

529.9 MB

TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.mp4

303.6 MB

TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.srt

88.3 KB

TROOPERS14 - Granular Trust; making it work - Toby Kohlenberg.srt

93.4 KB

TROOPERS14 - Granular Trust_ making it work - Toby Kohlenberg.mp4

431.6 MB

TROOPERS14 - How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4

250.6 MB

TROOPERS14 - How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4

258.3 MB

TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4

403.6 MB

TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.srt

55.1 KB

TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4

289.8 MB

TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt

44.3 KB

TROOPERS14 - Keynote - FX.mp4

93.2 MB

TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4

408.7 MB

TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt

42.8 KB

TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.mp4

355.8 MB

TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.srt

92.8 KB

TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.mp4

168.1 MB

TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.srt

79.4 KB

TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4

400.1 MB

TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt

64.8 KB

TROOPERS14 - Psychology of Security - Stefan Schumacher.mp4

249.5 MB

TROOPERS14 - Psychology of Security - Stefan Schumacher.srt

86.2 KB

TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4

418.7 MB

TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt

70.2 KB

TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4

381.4 MB

TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt

72.3 KB

TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.mp4

356.7 MB

TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.srt

62.4 KB

TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.mp4

34.3 MB

TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.srt

69.1 KB

TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.mp4

309.6 MB

TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.srt

86.7 KB

TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.mp4

272.8 MB

TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.srt

64.6 KB

TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4

41.1 MB

TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt

58.8 KB

TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.mp4

6.2 MB

TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.srt

29.8 KB

/TROOPERS 2015/

TROOPERS15 - Welcome Trailer.mp4

9.6 MB

[TROOPERS15] Andreas Lindh - Defender Economics.mp4

146.5 MB

[TROOPERS15] Andreas Lindh - Defender Economics.srt

62.4 KB

[TROOPERS15] Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4

735.0 MB

[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.mp4

291.2 MB

[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.srt

51.0 KB

[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.mp4

327.5 MB

[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.srt

55.6 KB

[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4

226.1 MB

[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt

97.6 KB

[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4

352.1 MB

[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt

77.0 KB

[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.mp4

238.5 MB

[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.srt

70.5 KB

[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.mp4

231.0 MB

[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.srt

49.5 KB

[TROOPERS15] Enno Rey - Opening Remarks.mp4

69.9 MB

[TROOPERS15] Enno Rey - Opening Remarks.srt

9.3 KB

[TROOPERS15] Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4

294.1 MB

[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4

276.2 MB

[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt

67.2 KB

[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.mp4

281.9 MB

[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.srt

84.4 KB

[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4

248.4 MB

[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt

66.9 KB

[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4

181.9 MB

[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt

39.0 KB

[TROOPERS15] Haroon Meer - Keynote.mp4

171.4 MB

[TROOPERS15] Haroon Meer - Keynote.srt

96.0 KB

[TROOPERS15] Ivan Pepelnjak - Automating Network Security.mp4

118.4 MB

[TROOPERS15] Ivan Pepelnjak - Automating Network Security.srt

72.9 KB

[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.mp4

230.9 MB

[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.srt

86.4 KB

[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4

329.7 MB

[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt

68.1 KB

[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4

495.1 MB

[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt

89.2 KB

[TROOPERS15] Martijn Grooten - The State of Email in 2015.mp4

91.4 MB

[TROOPERS15] Martijn Grooten - The State of Email in 2015.srt

66.2 KB

[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.mp4

227.8 MB

[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.srt

80.0 KB

[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4

295.5 MB

[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt

87.7 KB

[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4

461.9 MB

[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt

88.3 KB

[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4

159.8 MB

[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt

96.8 KB

[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4

247.2 MB

[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.srt

73.7 KB

[TROOPERS15] Sergej Bratus - Keynote.mp4

318.8 MB

[TROOPERS15] Sergej Bratus - Keynote.srt

86.4 KB

[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4

141.8 MB

[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt

47.1 KB

[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4

243.3 MB

[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt

72.7 KB

[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4

159.8 MB

[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt

68.4 KB

[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4

214.2 MB

[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt

79.1 KB

/TROOPERS 2016/

An unknown SAP default Account.mp4

198.9 MB

Attacking and Protecting Big Data Environments.mp4

161.9 MB

Attacking Nextgen Firewalls.mp4

266.7 MB

Better Crypto.mp4

83.9 MB

Broadcasting your Attack.mp4

213.4 MB

Caring for File Formats.mp4

95.9 MB

Closing Remarks.mp4

325.0 MB

Crypto Code.mp4

105.3 MB

Deep dive into SAP archive file formats.mp4

253.7 MB

Exploiting the Unexploitable.mp4

196.7 MB

Freifunk.mp4

69.1 MB

Hiding your White Box Designs is Not Enough.mp4

268.7 MB

Hollywood Hacking Facts and Fiction.mp4

157.7 MB

How to Implement an SDL in a Large Company.mp4

93.6 MB

Imma Chargin Mah Lazer.mp4

252.6 MB

Keynote - A Praise for Hackers.mp4

314.7 MB

Keynote - Ethics in Networked Systems Research.mp4

193.6 MB

Lets Play Hide and Seek in the Cloud.mp4

24.2 MB

Medical Device Security Hack or Hype.mp4

258.3 MB

Mind The Gap.mp4

115.5 MB

Offensive Active Directory with Powershell.mp4

119.6 MB

One Tool To Rule Them All.mp4

25.9 MB

Passive Intelligence Gathering Analytics.mp4

183.7 MB

Patch me if you can.mp4

264.9 MB

Preventing vulns in HANA based deployments.mp4

224.4 MB

Protecting Hosts in IPv6 Networks.mp4

253.9 MB

Rapid Radio Reversing.mp4

123.2 MB

Real Life Software Defined Security.mp4

99.4 MB

Reverse engineering a Digital Two way Radio.mp4

99.9 MB

Security Evaluation of Dual-Stack Systems.mp4

212.2 MB

The Chimaera Processor.mp4

43.9 MB

The Internet of Deadly Things.mp4

31.8 MB

The Joy of Sandbox Mitigations.mp4

103.1 MB

The Kings in your Castle.mp4

119.1 MB

The Road to secure Smart Cars.mp4

199.3 MB

Towards a LangSec Aware SDLC.mp4

95.8 MB

TR16 - Day 1 Visuals.mp4

93.4 MB

TROOPERS Conference 360 Teaser - must watch in YouTube app.mp4

13.0 MB

Unpatchable.mp4

214.3 MB

unrubby.mp4

114.0 MB

Witness the Russian attack Live demos of their steps tools techniques.mp4

81.2 MB

/TROOPERS 2016 IPv6 Summit/

Advanced IPv6 Attacks Using Chiron Training.mp4

740.1 MB

Advanced IPv6 Network Reconnaisance.mp4

508.4 MB

Anonymization IPv6 in PCAPs - Challenges and Wins.mp4

192.3 MB

Automating IPv6 Deployments.mp4

133.6 MB

Basic Attacks and Mitigation Strategies.mp4

458.7 MB

Building a Reliable and Secure IPv6 WiFi Network.mp4

229.4 MB

Developing an Enterprise IPv6 Security Strategy.mp4

221.5 MB

IPv6 First Hop Security Features on HP Devices.mp4

134.7 MB

IPv6 Security Fundamentals.mp4

382.0 MB

NATTED - A Field Report.mp4

218.6 MB

Recent IPv6 Standardization Efforts.mp4

420.1 MB

Remote Access and Business Partner Connections.mp4

278.1 MB

Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4

113.2 MB

Security Assessment of Microsoft DirectAccess.mp4

209.3 MB

/

TROOPERS thank you.txt

0.6 KB

 

Total files 323


Copyright © 2024 FileMood.com