FileMood

Download TROOPERS

TROOPERS

Name

TROOPERS

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

24.7 GB

Total Files

692

Hash

908D5567EDE4DDCD1CB250E5C65C268ADA5AA69D

/

TROOPERS logo.gif

38.6 KB

TROOPERS logo.png

295.5 KB

TROOPERS thank you.txt

0.8 KB

/TROOPERS 2008/

AMATO Francisco - evilgrade.mp4

1.0 MB

baier access control service.mp4

47.4 MB

BELENKO Andrej - password recovery.mp4

64.2 MB

BRANCO Rodrigo - KIDS.mp4

58.0 MB

bratus embedded devices.mp4

32.8 MB

BRATUS Sergey - AP fingerprinting.mp4

36.6 MB

BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4

68.9 MB

CALLAS Jon - Straight Talk abaou Crypto.mp4

68.6 MB

CHIESA Raoul - SCADA and national critical infrastructures.mp4

63.5 MB

De Haas Job - Side channel analysis.mp4

62.3 MB

DJB - Keynote.mp4

82.6 MB

gauci henrique web application firewalls.mp4

40.4 MB

HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4

80.2 MB

HOLZ Thorsten - virtual-honeypots.mp4

70.2 MB

KEMP Michael - virtualise.mp4

49.5 MB

KLOSE Roger - ERNW ESX-In-Security.mp4

34.8 MB

KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4

48.5 MB

Kuhn Friedwart - RMS.mp4

56.5 MB

LOGLOGIC - log management.mp4

70.3 MB

rey keynote stop the madness.mp4

21.0 MB

rey ruediger codenomicon fuzzer.mp4

23.0 MB

ROECHER Dror-John - the data went down the drain.mp4

58.5 MB

SPEICHERT Horst - hackertools according to german law.mp4

61.7 MB

STREHLE Rolf - self defending networks.mp4

56.5 MB

THUMANN Michael - Reversing.mp4

58.9 MB

THUMANN Michael - Secondlife (TM).mp4

59.5 MB

Troopers IBM Appscan.mp4

59.7 MB

WAISSBEIN Ariel - penetration testing learning kit.mp4

59.5 MB

/TROOPERS 2009/

.NET Access Control Service - Dominick Baier.mp4

47.0 MB

.NET Access Control Service - Dominick Baier.srt

49.7 KB

Stop the Madness - Keynote by Enno Rey.mp4

50.7 MB

Stop the Madness - Keynote by Enno Rey.srt

52.6 KB

The Truth about Web Application Firewalls - Sandro Gauci - Wendel Guglielmetti.mp4

64.8 MB

The Truth about Web Application Firewalls - Sandro Gauci - Wendel Guglielmetti.srt

40.4 KB

Vulnerability Testing, a Case Study - Ruediger Rey.mp4

24.1 MB

Vulnerability Testing, a Case Study - Ruediger Rey.srt

15.4 KB

/TROOPERS 2010/

A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4

68.6 MB

A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt

84.8 KB

Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4

56.7 MB

Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt

72.0 KB

Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4

70.2 MB

Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt

95.4 KB

Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4

45.5 MB

Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt

60.3 KB

Federated Identity - Opportunities and Dangers - Dominick Baier.mp4

66.4 MB

Federated Identity - Opportunities and Dangers - Dominick Baier.srt

90.7 KB

History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4

58.8 MB

History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt

83.6 KB

How to fail an audit - Martin Freiss.mp4

66.9 MB

How to rate the security of closed source software - Michael Thumann.mp4

68.3 MB

How to rate the security of closed source software - Michael Thumann.srt

74.0 KB

Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4

80.1 MB

Letting your fuzzer knows about target s internals - Rodrigo Branco.srt

121.0 KB

Netscreen of Death - Graeme Neilson.mp4

74.4 MB

Netscreen of Death - Graeme Neilson.srt

84.4 KB

Rapid Risk Assessment - Enno Rey.mp4

67.8 MB

Rapid Risk Assessment - Enno Rey.srt

85.8 KB

Return Oriented Rootkits - Ralf Hund.mp4

60.6 MB

Return Oriented Rootkits - Ralf Hund.srt

84.5 KB

Some notes on SAP security - Alexandr Polyakov.mp4

61.8 MB

Some notes on SAP security - Alexandr Polyakov.srt

31.4 KB

Tools of the Trade for a modern CISO - Enno Rey.mp4

56.8 MB

Tools of the Trade for a modern CISO - Enno Rey.srt

69.6 KB

Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4

39.2 MB

Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt

33.5 KB

/TROOPERS 2011/

Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4

64.6 MB

Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt

79.9 KB

Cache on Delivery - Marco Slaviero.mp4

58.6 MB

Cache on Delivery - Marco Slaviero.srt

77.9 KB

Do you know what s happening in your $application - Felix Leder.mp4

68.2 MB

Do you know what s happening in your $application - Felix Leder.srt

94.0 KB

Femtocell - Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4

52.0 MB

Femtocell - Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt

76.6 KB

Forging Canon Original Decision Data - Dmitry Sklyarov.mp4

51.1 MB

Forging Canon Original Decision Data - Dmitry Sklyarov.srt

56.9 KB

I FOCA a MIL Domain - Chema Alonso.mp4

55.2 MB

Keynote Day 1 - Enno Rey.mp4

53.9 MB

Keynote Day 1 - Enno Rey.srt

68.4 KB

Keynote Day 2 - Richard Thieme.mp4

73.9 MB

Keynote Day 2 - Richard Thieme.srt

100.0 KB

Milking a horse - Meder Kydyraliev.mp4

49.3 MB

Milking a horse - Meder Kydyraliev.srt

75.2 KB

OMG WTF PDF - What you didn t know about Acrobat - Julia Wolf.mp4

57.4 MB

OMG WTF PDF - What you didn t know about Acrobat - Julia Wolf.srt

52.3 KB

Owning the data center using Cisco NX-OS - George Hedfors.mp4

35.2 MB

Owning the data center using Cisco NX-OS - George Hedfors.srt

38.2 KB

SAP GUI Hacking - Andreas Wiegenstein.mp4

33.0 MB

SAP GUI Hacking - Andreas Wiegenstein.srt

38.5 KB

/TROOPERS 2012/

Closing Remarks.mp4

7.1 MB

Opening Teaser.mp4

7.7 MB

/TROOPERS 2013/

Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4

32.6 MB

Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt

13.9 KB

Corporate Espionage via Mobile Compromise - A Technical Deep Dive - David Weinstein.mp4

59.9 MB

Corporate Espionage via Mobile Compromise - A Technical Deep Dive - David Weinstein.srt

43.8 KB

Detecting white-collar cybercrime - SAP Forensics.mp4

71.9 MB

Detecting white-collar cybercrime - SAP Forensics.srt

73.7 KB

Flash Storage Forensics - Dmitry Sklyarov.mp4

9.6 MB

Flash Storage Forensics - Dmitry Sklyarov.srt

43.8 KB

Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4

21.9 MB

Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt

50.7 KB

Hacking & Defending the big 4 Databases - Alex Rothacker.mp4

68.7 MB

Hacking & Defending the big 4 Databases - Alex Rothacker.srt

61.1 KB

Hacking and Craft - Jeff Gough.mp4

63.3 MB

Hacking and Craft - Jeff Gough.srt

67.5 KB

Introducing Daisho - Michael Ossmann & Dominic Spill.mp4

85.5 MB

Introducing Daisho - Michael Ossmann & Dominic Spill.srt

71.9 KB

Keynote Day 1 by Rodrigo Branco.mp4

141.1 MB

Keynote Day 1 by Rodrigo Branco.srt

122.1 KB

Keynote Day 2 by Chris Nickerson.mp4

79.2 MB

Keynote Day 2 by Chris Nickerson.srt

74.1 KB

Malicious pixels - QR-codes as attack vectors - Peter Kieseberg.mp4

95.1 MB

Malicious pixels - QR-codes as attack vectors - Peter Kieseberg.srt

84.6 KB

OAuth2 - Ready or not (here I come) - Dominick Baier.mp4

82.3 MB

OAuth2 - Ready or not (here I come) - Dominick Baier.srt

75.1 KB

Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4

98.0 MB

Paparazzi over IP - Daniel Mende & Pascal Turbing.srt

68.0 KB

Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4

101.2 MB

Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt

94.7 KB

Smart TV Security - Lee (beist) SeungJin.mp4

82.6 MB

Smart TV Security - Lee (beist) SeungJin.srt

69.5 KB

The future of data exfiltration and malicious communication - Steffen Wendzel.mp4

92.2 MB

The future of data exfiltration and malicious communication - Steffen Wendzel.srt

71.4 KB

The Interim Years of Cyberspace - Security in a Domain of Warfare -Robert M. Lee.mp4

71.6 MB

The Interim Years of Cyberspace - Security in a Domain of Warfare -Robert M. Lee.srt

77.2 KB

UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4

9.4 MB

UI Redressing Attacks on Android Devices - Marcus Niemietz.srt

67.4 KB

Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4

70.6 MB

Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt

75.2 KB

Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4

78.9 MB

Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt

72.1 KB

We Came In Peace - They don't - Hackers vs. CyberWar - fx.mp4

89.3 MB

We Came In Peace - They don't - Hackers vs. CyberWar - fx.srt

80.9 KB

You wouldn t share a syringe. Would you share a USB port.mp4

96.6 MB

You wouldn t share a syringe. Would you share a USB port.srt

82.5 KB

Your IPv6 default config meets FOCA (and starts to cry) - Chema Alonso.mp4

80.8 MB

Your IPv6 default config meets FOCA (and starts to cry) - Chema Alonso.srt

62.7 KB

/TROOPERS 2014/

20 Ways Past Secure Boot - Job de Haas.mp4

66.3 MB

20 Ways Past Secure Boot - Job de Haas.srt

72.6 KB

Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4

74.0 MB

Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt

55.9 KB

Bro - A Flexible Open-Source Platform - Robin Summer.mp4

34.0 MB

Bro - A Flexible Open-Source Platform - Robin Summer.srt

40.6 KB

Closing Remarks - Enno Rey.mp4

47.5 MB

Closing Remarks - Enno Rey.srt

26.1 KB

Compromise-as-a-Service - Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4

86.6 MB

Compromise-as-a-Service - Our PleAZURE - Matthias Luft & Felix Wilhelm).srt

81.5 KB

Georg Bakos - Keynote.mp4

145.0 MB

Get Over It - Privacy is Good for Security - Rob Lee.mp4

66.9 MB

Get Over It - Privacy is Good for Security - Rob Lee.srt

88.3 KB

Granular Trust - making it work - Toby Kohlenberg.mp4

91.5 MB

Granular Trust - making it work - Toby Kohlenberg.srt

93.4 KB

How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4

62.8 MB

How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4

59.6 MB

Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4

85.1 MB

Implementing an USB Host Driver Fuzzer - Daniel Mende.srt

55.1 KB

Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4

75.0 MB

Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt

44.3 KB

Keynote - FX.mp4

23.9 MB

Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4

87.7 MB

Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt

42.8 KB

Medical Device Cyber Security - The First 164 Years - Kevin Fu.mp4

82.7 MB

Medical Device Cyber Security - The First 164 Years - Kevin Fu.srt

92.8 KB

Modern Smartphone Forensics - Vladimir Katalov.mp4

53.5 MB

Modern Smartphone Forensics - Vladimir Katalov.srt

79.4 KB

OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4

86.3 MB

OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt

64.8 KB

Psychology of Security - Stefan Schumacher.mp4

63.9 MB

Psychology of Security - Stefan Schumacher.srt

86.2 KB

Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4

107.9 MB

Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt

70.2 KB

SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4

100.8 MB

SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt

72.3 KB

SAP s Network Protocols Revisited - Martin Gallo.mp4

91.6 MB

SAP s Network Protocols Revisited - Martin Gallo.srt

62.4 KB

Security and SDN - A perfect fit or oil-and-water - Ivan Pepelnjak.mp4

7.8 MB

Security and SDN - A perfect fit or oil-and-water - Ivan Pepelnjak.srt

69.1 KB

The Three Billion Dollar App - Vladimir Wolstencroft.mp4

77.6 MB

The Three Billion Dollar App - Vladimir Wolstencroft.srt

86.7 KB

Vulnerability Classification in the SaaS Era - Noam Liran.mp4

60.6 MB

Vulnerability Classification in the SaaS Era - Noam Liran.srt

64.6 KB

What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4

9.0 MB

What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt

58.8 KB

Why IPv6 Security is so hard - Enno Rey.mp4

2.0 MB

Why IPv6 Security is so hard - Enno Rey.srt

29.8 KB

/TROOPERS 2015/

Andreas Lindh - Defender Economics.mp4

44.6 MB

Andreas Lindh - Defender Economics.srt

62.4 KB

Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4

136.2 MB

Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV - a Dead Hands Tale.mp4

45.4 MB

Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV - a Dead Hands Tale.srt

51.0 KB

Atilla Marosi - Hacking FinSpy - a Case Study.mp4

54.9 MB

Atilla Marosi - Hacking FinSpy - a Case Study.srt

55.6 KB

Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4

69.1 MB

Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt

97.6 KB

Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4

67.1 MB

Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt

77.0 KB

Catherine Pearce, Patrick Thomas - Multipath TCP.mp4

53.0 MB

Catherine Pearce, Patrick Thomas - Multipath TCP.srt

70.5 KB

Craig Smith - Introduction to Hacking in Car Systems.mp4

77.7 MB

Craig Smith - Introduction to Hacking in Car Systems.srt

114.4 KB

Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEO’s mobile.mp4

44.9 MB

Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEO’s mobile.srt

49.5 KB

Enno Rey - Opening Remarks.mp4

14.9 MB

Enno Rey - Opening Remarks.srt

9.3 KB

Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4

40.2 MB

Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4

65.7 MB

Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt

67.2 KB

Frederik Armknecht - Crypto in the Cloud.mp4

65.7 MB

Frederik Armknecht - Crypto in the Cloud.srt

84.4 KB

Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4

62.3 MB

Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt

66.9 KB

Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4

35.0 MB

Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt

39.0 KB

Haroon Meer - Keynote.mp4

66.2 MB

Haroon Meer - Keynote.srt

96.0 KB

Ivan Pepelnjak - Automating Network Security.mp4

48.7 MB

Ivan Pepelnjak - Automating Network Security.srt

72.9 KB

Jacob Torrey - The foundation is rotting and the basement is flooding.mp4

55.5 MB

Jacob Torrey - The foundation is rotting and the basement is flooding.srt

86.4 KB

Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4

60.6 MB

Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt

68.1 KB

Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4

96.9 MB

Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt

89.2 KB

Martijn Grooten - The State of Email in 2015.mp4

37.3 MB

Martijn Grooten - The State of Email in 2015.srt

66.2 KB

Martin Gallo - HoneySAP - Who really wants your money.mp4

56.9 MB

Martin Gallo - HoneySAP - Who really wants your money.srt

80.0 KB

Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4

63.7 MB

Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt

87.7 KB

Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4

72.2 MB

Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt

88.3 KB

Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4

57.5 MB

Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt

96.8 KB

Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4

55.5 MB

Richard Rushing - Game Over, Does the CISO get an Extra Life.srt

73.7 KB

Sergej Bratus - Keynote.mp4

74.9 MB

Sergej Bratus - Keynote.srt

86.4 KB

Sergey Bratus - Keynote.mp4

74.9 MB

Sergey Bratus - Keynote.srt

86.4 KB

Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4

33.2 MB

Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt

47.1 KB

Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4

52.5 MB

Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt

72.7 KB

Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4

54.3 MB

Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt

68.4 KB

TROOPERS15 - Welcome Trailer.mp4

3.6 MB

Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4

50.3 MB

Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt

79.1 KB

/TROOPERS 2015 IPv6 Summit/

Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4

81.8 MB

Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt

98.7 KB

Christopher Werny - Basic Attacks and Defences (1 2).mp4

91.2 MB

Christopher Werny - Basic Attacks and Defences (1 2).srt

116.0 KB

Christopher Werny - Basic Attacks and Defences (2 2).mp4

123.8 MB

Christopher Werny - Case Study - Building a Secure IPv6 Guest Wifi Network.mp4

69.1 MB

Christopher Werny - Case Study - Building a Secure IPv6 Guest Wifi Network.srt

106.8 KB

Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4

36.5 MB

Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt

66.9 KB

Enno Rey - 48 Considered Harmful.mp4

43.4 MB

Enno Rey - 48 Considered Harmful.srt

66.6 KB

Enno Rey - Reliable & Secure DHCPv6.mp4

97.8 MB

Eric Vyncke - Routing Header Is Back Should We Panic.mp4

55.7 MB

Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4

64.0 MB

Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt

125.5 KB

Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4

78.9 MB

Fernando Gont - Recent IPv6 Security Standardization Efforts.srt

142.7 KB

Gabriel Müller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4

86.2 MB

Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4

52.7 MB

Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4

135.9 MB

Julian Bangert - Tales of 6006 Protocols.mp4

38.6 MB

Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4

70.7 MB

Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt

127.5 KB

Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4

44.3 MB

Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt

85.4 KB

/TROOPERS 2016/

An unknown SAP default Account.mp4

39.2 MB

Attacking and Protecting Big Data Environments.mp4

64.8 MB

Attacking Nextgen Firewalls.mp4

53.4 MB

Better Crypto.mp4

45.6 MB

Broadcasting your Attack.mp4

42.1 MB

Caring for File Formats.mp4

40.5 MB

Closing Remarks.mp4

55.1 MB

Crypto Code.mp4

22.3 MB

Day 1 Visuals.mp4

23.0 MB

Deep dive into SAP archive file formats.mp4

52.3 MB

Exploiting the Unexploitable.mp4

39.4 MB

Freifunk.mp4

21.1 MB

Hiding your White Box Designs is Not Enough.mp4

49.8 MB

Hollywood Hacking Facts and Fiction.mp4

45.3 MB

How to Implement an SDL in a Large Company.mp4

55.2 MB

Imma Chargin Mah Lazer.mp4

47.1 MB

Keynote - A Praise for Hackers.mp4

66.2 MB

Keynote - Ethics in Networked Systems Research.mp4

73.4 MB

Lets Play Hide and Seek in the Cloud.mp4

12.9 MB

Medical Device Security Hack or Hype.mp4

53.0 MB

Mind The Gap.mp4

45.0 MB

Offensive Active Directory with Powershell.mp4

51.3 MB

One Tool To Rule Them All.mp4

13.4 MB

Passive Intelligence Gathering Analytics.mp4

53.5 MB

Patch me if you can.mp4

54.1 MB

Preventing vulns in HANA based deployments.mp4

47.2 MB

Protecting Hosts in IPv6 Networks.mp4

52.4 MB

Rapid Radio Reversing.mp4

51.0 MB

Real Life Software Defined Security.mp4

57.7 MB

Reverse engineering a Digital Two way Radio.mp4

28.8 MB

Security Evaluation of Dual-Stack Systems.mp4

38.3 MB

The Chimaera Processor.mp4

18.3 MB

The Impact of Extension Headers on IPv6 Access Control Lists - Real Life Use Cases.mp4

23.6 MB

The Internet of Deadly Things.mp4

13.2 MB

The Joy of Sandbox Mitigations.mp4

44.8 MB

The Kings in your Castle.mp4

47.4 MB

The Road to secure Smart Cars.mp4

40.3 MB

Towards a LangSec Aware SDLC.mp4

58.0 MB

TROOPERS Conference 360° Teaser [must watch in YouTube app].mp4

3.2 MB

Unpatchable.mp4

41.8 MB

unrubby.mp4

45.5 MB

Witness the Russian attack Live demos of their steps tools techniques.mp4

48.4 MB

/TROOPERS 2016 IPv6 Summit/

Advanced IPv6 Attacks Using Chiron Training.mp4

155.9 MB

Advanced IPv6 Network Reconnaisance.mp4

112.1 MB

Anonymization IPv6 in PCAPs - Challenges and Wins.mp4

41.6 MB

Automating IPv6 Deployments.mp4

29.8 MB

Basic Attacks and Mitigation Strategies.mp4

86.3 MB

Building a Reliable and Secure IPv6 WiFi Network.mp4

70.2 MB

Developing an Enterprise IPv6 Security Strategy.mp4

68.7 MB

IPv6 First Hop Security Features on HP Devices.mp4

40.2 MB

IPv6 Security Fundamentals.mp4

90.5 MB

NATTED - A Field Report.mp4

64.3 MB

Recent IPv6 Standardization Efforts.mp4

96.0 MB

Remote Access and Business Partner Connections.mp4

60.1 MB

Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4

36.3 MB

Security Assessment of Microsoft DirectAccess.mp4

45.2 MB

/TROOPERS 2017/

2nd Day Keynote Mara Tam.mp4

72.8 MB

A sense of self for bootloaders no more magical writes Rebecca bx Shapiro.mp4

53.8 MB

Active Directory Security Best Practices - Friedwart Kuhn, Heinrich Wiederkehr.mp4

834.9 KB

An attack in depth analysis of multicast DNS and DNS service recovery Antonios Atlas.mp4

87.0 MB

An Introduction to Automotive ECU Research Dieter Spaar.mp4

84.4 MB

Architecting a Modern Defense using Device Guard Matt Graeber, Casey Smith.mp4

85.8 MB

Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew (2).mp4

71.7 MB

Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew.mp4

71.7 MB

Authenticate Like A Boss Pete Herzog.mp4

79.4 MB

BLE Authentication Design Challenges On Smartphone Controlled IoT Devices Analyzing.mp4

66.3 MB

Blinded Random Block Corruptions Rodrigo Branco.mp4

49.8 MB

Closing Procedure.mp4

41.7 MB

Closing Procedure.srt

39.6 KB

Crashing Cisco's Autonomic Network Omar Eissa.mp4

42.6 MB

Data Demolition Gone In 60 Seconds Zoz Brooks.mp4

79.9 MB

Demystifying COM James Foreshaw.mp4

55.5 MB

Dissecting Modern 3G 4G Cellular Modems Harald Welte.mp4

62.4 MB

Exploring North Korea's Surveillance Technology Florian Grunow Niklaus Schiess.mp4

53.2 MB

Exploring The Infrared World,Part 2 Mike Ossmann, Dominic Spill.mp4

62.5 MB

Graph me, I'm famous Automated static malware analysis and indicator extraction for bi.mp4

59.3 MB

Habibi Works An Update On TROOPERS Charity Florian Horsch.mp4

42.4 MB

Hacking TP Link Devices Fernando Gont.mp4

97.9 MB

Hacks and Case Studies Cellular Communications Brian Butterly.mp4

76.6 MB

Hardware Root of Mistrust Joseph FitzPatrick Michael Leibowitz.mp4

48.4 MB

Hidden in plain sight - How possibly could a decades old standard be broken Paul Mel.mp4

54.2 MB

Holy crap I need to pentest SAP from Citrix Joffrey Czarny.mp4

49.5 MB

How we hacked Distributed CMSs Francis Alexander, Bharadwaj Machiraju.mp4

52.6 MB

Hunting Them All Veronica Valeros.mp4

75.9 MB

Intel ME The Way of the Static Analysis Dmitry Sklyarov.mp4

54.1 MB

Intercepting SAP SNC protected traffic Martin Gallo.mp4

26.6 MB

IoT to Gateway - Gabriel Mueller.mp4

84.9 MB

IPv6 Configuration Approaches for Servers Enno Rey.mp4

121.1 MB

Lightning Talks Peter Hessler, Edmond Rogers, Sreepriya Chalakkal.mp4

8.8 MB

Looking through the web of pages to the Internet of Things Gabriel Weaver.mp4

68.4 MB

Metasploit Hardware Bridge Hacking Craig Smith.mp4

64.1 MB

Opening Keynote Enno Rey.mp4

50.6 MB

PHP Internals Exploit Dev Edition Emmanuel Law.mp4

43.2 MB

Protecting SAP HANA from vulnerabilities and exploits Pablo Artuso, Nahuel Sanchez.mp4

41.7 MB

Pufs ’n stuff Getting the most of the digital world through physical identities An.mp4

87.6 MB

Reverse Engineering ABAP Bytecode for Malware Analysis Hans Christian Esperer, Frederik.mp4

52.7 MB

RIPE Atlas Measuring The Internet Alvaro Vives.mp4

82.7 MB

Robo Ethnography Just what can Robots do Brittany Postnikoff.mp4

65.0 MB

Ruler Pivoting Through Exchange Etienne Stalmans.mp4

79.4 MB

Rusting up your GREATFET Richo Healey, Dominic Spill.mp4

96.5 MB

Samsung Pay Tokenized Numbers, Flaws and Issues Salvador Mendoza.mp4

51.8 MB

Samsung Pay Tokenized Numbers, Flaws and Issues Salvador Mendoza.srt

68.7 KB

SAP strikes back Your SAP server now counter attacks Vahagn Vardanyan, Dmitry Yudin.mp4

52.4 MB

Securing Network Automation Ivan Pepelnjak.mp4

84.9 MB

So You Want To Hack Radios Matt Knight, Marc Newlin.mp4

71.6 MB

Software Attacks on Hypervisor Emulation of Hardware Oleksandr Bazhaniuk.mp4

44.3 MB

Surprise Bitches The Grugq.mp4

92.8 MB

The Hardware Striptease Club Letting The Smart Home Strip Down To Its Innards Stefan.mp4

205.3 MB

The Metabrik Platform Rapid Development of Reusable Security Tools Patrice Auffret.mp4

51.2 MB

Unsafe JAX RS Breaking REST API Mikhail Egorov.mp4

27.9 MB

Volatile Memory Behavioral Game Theory in Defensive Security Kelly Shortridge.mp4

56.7 MB

Vox Ex Machina Graeme Neilson.mp4

60.5 MB

What happened to your home IoT Hacking and Forensic with 0 Days Soohyun Jin, Moonbe.mp4

64.9 MB

You've got mail Owning your business with one email Joris van de Vis.mp4

33.8 MB

/TROOPERS 2018/

A Stepping Stone To Car Hacking.eng.srt

104.7 KB

A Stepping Stone To Car Hacking.mp4

37.7 MB

Active Directory Security - The Journey.eng.srt

167.0 KB

Active Directory Security - The Journey.mp4

74.7 MB

Ads networks are following you, follow them back.eng.srt

121.2 KB

Ads networks are following you, follow them back.mp4

36.0 MB

Advances in IPv6 Network Reconnaissance.eng.srt

56.2 KB

Advances in IPv6 Network Reconnaissance.mp4

20.4 MB

All Your Cloud Are Belong To Us.eng.srt

187.0 KB

All Your Cloud Are Belong To Us.mp4

75.7 MB

An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors.eng.srt

158.7 KB

An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors.mp4

74.9 MB

Are you sure - you are alone Pwning IoT-CCTV devices.eng.srt

41.1 KB

Are you sure - you are alone Pwning IoT-CCTV devices.mp4

28.9 MB

Attack and defend Microsoft Enhanced Security Administrative Environment.eng.srt

139.7 KB

Attack and defend Microsoft Enhanced Security Administrative Environment.mp4

59.7 MB

Blue Team Sprint.eng.srt

163.3 KB

Blue Team Sprint.mp4

69.5 MB

BREAKING THE LAWS OF ROBOTICS - ATTACKING INDUSTRIAL ROBOTS.mp4

59.7 MB

Closing Remarks.eng.srt

40.4 KB

Closing Remarks.mp4

21.6 MB

Dynamic IPv6 Prefix Problems and VPNs.eng.srt

107.8 KB

Dynamic IPv6 Prefix Problems and VPNs.mp4

41.3 MB

From Zero to Secure Continuous Delivery in 60 Minutes.eng.srt

173.4 KB

From Zero to Secure Continuous Delivery in 60 Minutes.mp4

92.4 MB

Frustrating Emulation with Delay Slots in MIPS and MIPS16.eng.srt

74.9 KB

Frustrating Emulation with Delay Slots in MIPS and MIPS16.mp4

38.5 MB

Hacking and Securing SAP Hana Applications.eng.srt

86.0 KB

Hacking and Securing SAP Hana Applications.mp4

46.7 MB

Hacking Robots Before Skynet.mp4

67.3 MB

Hunting Android Malware.eng.srt

124.7 KB

Hunting Android Malware.mp4

35.4 MB

Hunting crypto secrets in SAP systems.eng.srt

142.8 KB

Hunting crypto secrets in SAP systems.mp4

73.2 MB

I forgot Your password.eng.srt

105.0 KB

I forgot Your password.mp4

64.6 MB

Introducing a Comprehensive Active Directory Security Metric.eng.srt

113.8 KB

Introducing a Comprehensive Active Directory Security Metric.mp4

69.7 MB

IoT processor and binary breakdown.eng.srt

148.1 KB

IoT processor and binary breakdown.mp4

48.2 MB

IPv6 Address Management - The First Five Years.eng.srt

127.0 KB

IPv6 Address Management - The First Five Years.mp4

62.4 MB

IPv6 in the Cloud - Back to Square One.eng.srt

110.6 KB

IPv6 in the Cloud - Back to Square One.mp4

61.0 MB

Keynote Mike Ossmann (Inkl. Opening Remarks).eng.srt

150.6 KB

Keynote Mike Ossmann (Inkl. Opening Remarks).mp4

66.1 MB

Knockin' on IPv6's doors.eng.srt

170.7 KB

Knockin' on IPv6's doors.mp4

68.4 MB

Mind the Gap, Bro.eng.srt

171.1 KB

Mind the Gap, Bro.mp4

65.0 MB

Mobile App Security Fails and How To Survive Them.eng.srt

131.7 KB

Mobile App Security Fails and How To Survive Them.mp4

70.0 MB

NFC Payments.eng.srt

73.5 KB

NFC Payments.mp4

26.3 MB

NGI18 Keynote by Graeme Neilson.eng.srt

102.6 KB

NGI18 Keynote by Graeme Neilson.mp4

44.6 MB

No royal road - advanced analysis for 'advanced' threats.eng.srt

143.1 KB

No royal road - advanced analysis for 'advanced' threats.mp4

73.9 MB

Practical Magic - Behavior-based Safety Design for IoT.eng.srt

131.3 KB

Practical Magic - Behavior-based Safety Design for IoT.mp4

46.3 MB

Real-Life Network and Security Automation.eng.srt

111.0 KB

Real-Life Network and Security Automation.mp4

72.0 MB

Reverse Engineering Black Box Systems with GreatFET.eng.srt

160.5 KB

Reverse Engineering Black Box Systems with GreatFET.mp4

50.5 MB

Robots Panel.eng.srt

211.4 KB

Robots Panel.mp4

54.1 MB

SAP BUGS - The Phantom Security.eng.srt

43.4 KB

SAP BUGS - The Phantom Security.mp4

34.1 MB

SAP IGS - The 'vulnerable' forgotten component.eng.srt

86.8 KB

SAP IGS - The 'vulnerable' forgotten component.mp4

52.8 MB

SAP Security patches - The importance, difficulties and solutions.mp4

33.9 MB

Securing your in-ear fitness coach - Challenges in hardening next generation wearables.eng.srt

144.6 KB

Securing your in-ear fitness coach - Challenges in hardening next generation wearables.mp4

53.6 MB

Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.eng.srt

146.0 KB

Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.mp4

66.0 MB

Security Appliances Internals.eng.srt

129.4 KB

Security Appliances Internals.mp4

64.4 MB

Subs, Ships, & Satellites - The Internet of Invisible Things.eng.srt

184.9 KB

Subs, Ships, & Satellites - The Internet of Invisible Things.mp4

71.1 MB

Subverting Trust in Windows.eng.srt

129.6 KB

Subverting Trust in Windows.mp4

57.1 MB

Swimming IoT or how to hack a Yacht.mp4

63.8 MB

The Hackers' Sanctuary City.mp4

6.5 MB

The Language of Security.eng.srt

163.4 KB

The Language of Security.mp4

73.0 MB

The Wolf In SGX Clothing.eng.srt

167.0 KB

The Wolf In SGX Clothing.mp4

45.0 MB

Things Attack - Peek into a 18 months IoT honeypot.eng.srt

111.4 KB

Things Attack - Peek into a 18 months IoT honeypot.mp4

47.6 MB

Unifying RF Fuzzing Techniques under a Common API.eng.srt

147.3 KB

Unifying RF Fuzzing Techniques under a Common API.mp4

39.4 MB

When Virtual Hell Freezes Over.eng.srt

87.5 KB

When Virtual Hell Freezes Over.mp4

27.7 MB

/TROOPERS 2019/

A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.eng.srt

191.1 KB

A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.mp4

63.5 MB

A Morning Address.eng.srt

1.3 KB

A Morning Address.mp4

6.5 MB

A PKI distributed is a PKI solved.eng.srt

52.3 KB

A PKI distributed is a PKI solved.mp4

25.5 MB

Abusing privileged file operations on Windows.eng.srt

45.3 KB

Abusing privileged file operations on Windows.mp4

26.5 MB

Active Directory and Azure - Core Security Principles.eng.srt

140.1 KB

Active Directory and Azure - Core Security Principles.mp4

81.9 MB

Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.eng.srt

81.0 KB

Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.mp4

36.1 MB

Automotive Penetration Testing with Scapy.mp4

71.7 MB

Beyond Windows Forensics with Built-in Microsoft Tooling.eng.srt

133.1 KB

Beyond Windows Forensics with Built-in Microsoft Tooling.mp4

61.7 MB

BIZEC Discussion Panel Past, Present and Future of SAP Security.eng.srt

125.6 KB

BIZEC Discussion Panel Past, Present and Future of SAP Security.mp4

47.2 MB

BloodHound and the Adversary Resilience Methodology.eng.srt

142.6 KB

BloodHound and the Adversary Resilience Methodology.mp4

64.8 MB

Bluetooth, does it spark joy.eng.srt

128.3 KB

Bluetooth, does it spark joy.mp4

51.5 MB

Car Manufacturer meets Security Community.eng.srt

150.8 KB

Car Manufacturer meets Security Community.mp4

64.2 MB

Closing Remarks.eng.srt

38.9 KB

Closing Remarks.mp4

31.0 MB

CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics.eng.srt

136.1 KB

CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics.mp4

62.6 MB

Dark Clouds ahead Attacking a Cloud Foundry Implementation.eng.srt

119.8 KB

Dark Clouds ahead Attacking a Cloud Foundry Implementation.mp4

59.3 MB

Digital Forensics and Incident Response in G Suite.eng.srt

84.5 KB

Digital Forensics and Incident Response in G Suite.mp4

26.4 MB

Distributed Security Alerting.eng.srt

139.9 KB

Distributed Security Alerting.mp4

60.3 MB

Ethics in Attacker Research.eng.srt

19.7 KB

Ethics in Attacker Research.mp4

10.4 MB

Evolution of kernel fuzzers in NetBSD.mp4

35.7 MB

Fetch exploit - Attacks against source code downloaders.eng.srt

103.1 KB

Fetch exploit - Attacks against source code downloaders.mp4

31.4 MB

Finding the best threat intelligence provider.eng.srt

130.0 KB

Finding the best threat intelligence provider.mp4

47.6 MB

From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.eng.srt

200.4 KB

From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.mp4

82.2 MB

Fun and Pitfalls in a World of VDSL.eng.srt

135.4 KB

Fun and Pitfalls in a World of VDSL.mp4

64.9 MB

Fun with LDAP and Kerberos Attacking AD from non-Windows machines.eng.srt

183.1 KB

Fun with LDAP and Kerberos Attacking AD from non-Windows machines.mp4

71.8 MB

HackDMI.eng.srt

67.8 KB

HackDMI.mp4

40.1 MB

Hardware Side Channel attacks on the cheapest.eng.srt

132.2 KB

Hardware Side Channel attacks on the cheapest.mp4

55.4 MB

Hitting the Gym The Anatomy of a Killer Workout.mp4

55.2 MB

How we made the badge BEFORE you showed up.eng.srt

50.7 KB

How we made the badge BEFORE you showed up.mp4

29.2 MB

I am AD FS and so can you Attacking Active Directory Federated Services.eng.srt

145.7 KB

I am AD FS and so can you Attacking Active Directory Federated Services.mp4

57.7 MB

I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.eng.srt

119.6 KB

I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.mp4

61.9 MB

Introducing Faction A modern, powerful, multiplayer C2 framework.eng.srt

161.6 KB

Introducing Faction A modern, powerful, multiplayer C2 framework.mp4

75.6 MB

Introduction to Practical Ethics for Security Practitioners.eng.srt

144.1 KB

Introduction to Practical Ethics for Security Practitioners.mp4

77.6 MB

IoT backdoors in cars.mp4

57.8 MB

IPv666 - Address of the Beast.eng.srt

148.1 KB

IPv666 - Address of the Beast.mp4

50.2 MB

Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.eng.srt

160.1 KB

Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.mp4

80.9 MB

Keynote - Inside the Machine.eng.srt

194.3 KB

Keynote - Inside the Machine.mp4

82.6 MB

macOS - Gaining root with harmless AppStore apps.eng.srt

103.1 KB

macOS - Gaining root with harmless AppStore apps.mp4

53.2 MB

Medical Device Security - Please (don't) be patient.eng.srt

107.2 KB

Medical Device Security - Please (don't) be patient.mp4

41.4 MB

Microsoft IT (secure) journey to IPv6-only.eng.srt

177.9 KB

Microsoft IT (secure) journey to IPv6-only.mp4

62.8 MB

Modmob tools Home made tools to test mobile devices and monitor networks.eng.srt

140.4 KB

Modmob tools Home made tools to test mobile devices and monitor networks.mp4

67.5 MB

MS Office file format sorcery.eng.srt

124.0 KB

MS Office file format sorcery.mp4

64.9 MB

NAT64 Day 2019 @ AWK.eng.srt

101.5 KB

NAT64 Day 2019 @ AWK.mp4

54.7 MB

NGI - Keynote.eng.srt

179.8 KB

NGI - Keynote.mp4

60.9 MB

NGI - Opening Remarks.eng.srt

7.7 KB

NGI - Opening Remarks.mp4

4.1 MB

No more dumb hex.eng.srt

124.8 KB

No more dumb hex.mp4

56.0 MB

Not A Security Boundary Breaking Forest Trusts.eng.srt

126.1 KB

Not A Security Boundary Breaking Forest Trusts.mp4

47.0 MB

Old New Things An examination of the Philips TriMedia architecture.eng.srt

69.3 KB

Old New Things An examination of the Philips TriMedia architecture.mp4

41.9 MB

Opening remarks.eng.srt

34.8 KB

Opening remarks.mp4

19.2 MB

Practical attack simulations in Critical National Infrastructure (CNI).eng.srt

63.7 KB

Practical attack simulations in Critical National Infrastructure (CNI).mp4

22.5 MB

SI6 IPv6 Toolkit v3.0.eng.srt

103.9 KB

SI6 IPv6 Toolkit v3.0.mp4

55.3 MB

SIM Simulator.eng.srt

48.1 KB

SIM Simulator.mp4

21.4 MB

Sneaking Past Device Guard.eng.srt

112.4 KB

Sneaking Past Device Guard.mp4

54.7 MB

The Anatomy of Windows Telemetry.eng.srt

130.8 KB

The Anatomy of Windows Telemetry.mp4

58.7 MB

The evolution of IoT botnets, including Torii and a smart-home hack..eng.srt

85.2 KB

The evolution of IoT botnets, including Torii and a smart-home hack.mp4

43.9 MB

Threat Modelling and Beyond for Cisco ACI.eng.srt

92.8 KB

Threat Modelling and Beyond for Cisco ACI.mp4

37.5 MB

Vehicle alarms' insecurity and something else.eng.srt

78.7 KB

Vehicle alarms' insecurity and something else.mp4

51.9 MB

VXLAN Security or Injection, and protection.mp4

51.1 MB

Watchgate - How stupid smartwatches threaten the security and safety of our children.eng.srt

97.6 KB

Watchgate - How stupid smartwatches threaten the security and safety of our children.mp4

61.0 MB

We are Listening - Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..eng.srt

128.5 KB

We are Listening - Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP.mp4

49.3 MB

What are the IPv6 news from the IETF.eng.srt

222.3 KB

What are the IPv6 news from the IETF.mp4

99.3 MB

Wild West of Conference Apps Security.eng.srt

86.3 KB

Wild West of Conference Apps Security.mp4

31.8 MB

You (dis)liked mimikatz Wait for kekeo.eng.srt

149.5 KB

You (dis)liked mimikatz Wait for kekeo.mp4

77.0 MB

You try to detect mimikatz.eng.srt

68.0 KB

You try to detect mimikatz.mp4

44.3 MB

/TROOPERS 2022/

42 things - Keynote by Gary McGraw.eng.srt

78.7 KB

42 things - Keynote by Gary McGraw.mp4

71.8 MB

Abusing Family Refresh Tokens for Unauthorized Access and Persistence in Azure AD.eng.srt

73.1 KB

Abusing Family Refresh Tokens for Unauthorized Access and Persistence in Azure AD.mp4

52.6 MB

Aftermovie.eng.srt

3.8 KB

Aftermovie.mp4

6.6 MB

Automotive Network Scans with Scapy.eng.srt

19.7 KB

Automotive Network Scans with Scapy.mp4

55.7 MB

Breaking Azure AD joined endpoints in zero-trust environments.eng.srt

103.0 KB

Breaking Azure AD joined endpoints in zero-trust environments.mp4

72.2 MB

DDoS Testing Your Infrastructure, including IPv6 SYN floods.eng.srt

116.1 KB

DDoS Testing Your Infrastructure, including IPv6 SYN floods.mp4

84.9 MB

Hack my Talk But it's deployed on Kubernetes.eng.srt

73.0 KB

Hack my Talk But it's deployed on Kubernetes.mp4

61.3 MB

Kates’ Pot Finding Attacks Against Kubernetes Deployments.eng.srt

68.1 KB

Kates’ Pot Finding Attacks Against Kubernetes Deployments.mp4

32.9 MB

Neutralizing Keyloggers, an intimate story between the keyboard and the system.eng.srt

120.5 KB

Neutralizing Keyloggers, an intimate story between the keyboard and the system.mp4

73.3 MB

Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry system.mp4

88.7 MB

Resurrecting Active Directory After a Ransomware Attack.eng.srt

121.4 KB

Resurrecting Active Directory After a Ransomware Attack.mp4

99.0 MB

/TROOPERS 2023/

(Windows) Hello from the other side.eng.srt

110.2 KB

(Windows) Hello from the other side.mp4

65.3 MB

All your parcel are belong to us.eng.srt

62.9 KB

All your parcel are belong to us.mp4

45.1 MB

Attacking Ultra-Wideband Security Analysis of UWB Applications in Smartphones.eng.srt

91.7 KB

Attacking Ultra-Wideband Security Analysis of UWB Applications in Smartphones.mp4

56.7 MB

Beyond Java Obfuscating Android Apps with Purely Native Code.eng.srt

121.6 KB

Beyond Java Obfuscating Android Apps with Purely Native Code.mp4

73.8 MB

Cat & Mouse - or chess.eng.srt

101.9 KB

Cat & Mouse - or chess.mp4

66.0 MB

Das IT-Security-Lagebild aus Heise-Sicht.eng.srt

91.6 KB

Das IT-Security-Lagebild aus Heise-Sicht.mp4

63.3 MB

Detection And Blocking With BPF Via YAML.eng.srt

99.4 KB

Detection And Blocking With BPF Via YAML.mp4

61.9 MB

Dumping NTHashes from Azure AD.eng.srt

84.4 KB

Dumping NTHashes from Azure AD.mp4

58.8 MB

Everyone knows SAP, everyone uses SAP, everyone uses RFC, no one knows RFC.eng.srt

92.2 KB

Everyone knows SAP, everyone uses SAP, everyone uses RFC, no one knows RFC.mp4

76.7 MB

Fact Based Post Exploitation - Office365 Edition.eng.srt

51.9 KB

Fact Based Post Exploitation - Office365 Edition.mp4

33.0 MB

Forensic analysis on real incidents inside Microsoft Remote Desktop Services.eng.srt

72.8 KB

Forensic analysis on real incidents inside Microsoft Remote Desktop Services.mp4

52.6 MB

Forensic Examination of Ceph.eng.srt

72.4 KB

Forensic Examination of Ceph.mp4

57.2 MB

GPT-like Pre-Training on Unlabeled System Logs for Malware Detection.eng.srt

86.4 KB

GPT-like Pre-Training on Unlabeled System Logs for Malware Detection.mp4

59.4 MB

Hidden Pathways.eng.srt

74.2 KB

Hidden Pathways.mp4

58.6 MB

Homophonic Collisions Hold me closer Tony Danza.eng.srt

48.3 KB

Homophonic Collisions Hold me closer Tony Danza.mp4

31.1 MB

Horror Stories from the Automotive Industry.eng.srt

72.4 KB

Horror Stories from the Automotive Industry.mp4

47.4 MB

Jupysec Auditing Jupyter to Improve AI Security.eng.srt

59.8 KB

Jupysec Auditing Jupyter to Improve AI Security.mp4

46.8 MB

Keynote - Mikko Hyppönen.eng.srt

97.7 KB

Keynote - Mikko Hyppönen.mp4

82.9 MB

Monitoring Solutions Attacking IT Infrastructure at its Core.eng.srt

107.0 KB

Monitoring Solutions Attacking IT Infrastructure at its Core.mp4

72.8 MB

OAuth and Proof of Possession - The long way round.eng.srt

77.4 KB

OAuth and Proof of Possession - The long way round.mp4

65.2 MB

OopsSec - The bad, the worst and the ugly of APT’s operations security.eng.srt

82.5 KB

OopsSec - The bad, the worst and the ugly of APT’s operations security.mp4

75.3 MB

Priority for Effective Action.eng.srt

85.1 KB

Priority for Effective Action.mp4

64.5 MB

Real world detection engineering in a multi-cloud environment.eng.srt

109.0 KB

Real world detection engineering in a multi-cloud environment.mp4

68.1 MB

Reportly - keep your head in the clouds..eng.srt

46.1 KB

Reportly - keep your head in the clouds.mp4

28.4 MB

SAP (Anti-)Forensics Detecting White-Collar Cyber-Crime.eng.srt

69.3 KB

SAP (Anti-)Forensics Detecting White-Collar Cyber-Crime.mp4

56.6 MB

Security Heroes versus the Power of Privacy.eng.srt

82.4 KB

Security Heroes versus the Power of Privacy.mp4

56.6 MB

So You Performed A Forest Recovery. How Do You Reconnect Your AD Again With Azure AD.eng.srt

89.8 KB

So You Performed A Forest Recovery. How Do You Reconnect Your AD Again With Azure AD.mp4

65.7 MB

Spooky authentication at a distance.eng.srt

105.2 KB

Spooky authentication at a distance.mp4

85.9 MB

Stay fit Hack a Jump Rope.eng.srt

41.7 KB

Stay fit Hack a Jump Rope.mp4

36.9 MB

Testing and Fuzzing the Kubernetes Admission Configuration.eng.srt

100.1 KB

Testing and Fuzzing the Kubernetes Admission Configuration.mp4

66.4 MB

The Anatomy of Windows Telemetry Part 2.eng.srt

74.2 KB

The Anatomy of Windows Telemetry Part 2.mp4

54.9 MB

The Power of Coercion Techniques in Windows Environments.eng.srt

77.7 KB

The Power of Coercion Techniques in Windows Environments.mp4

50.0 MB

The Wire on Fire The Spies Who Loved Telcos.eng.srt

60.9 KB

The Wire on Fire The Spies Who Loved Telcos.mp4

39.1 MB

Vulnerabilities in the TPM 2.0 reference implementation code.eng.srt

94.1 KB

Vulnerabilities in the TPM 2.0 reference implementation code.mp4

63.6 MB

 

Total files 692


Copyright © 2025 FileMood.com