/
|
TROOPERS logo.gif
|
38.6 KB
|
TROOPERS logo.png
|
295.5 KB
|
TROOPERS thank you.txt
|
0.8 KB
|
/TROOPERS 2008/
|
AMATO Francisco - evilgrade.mp4
|
1.0 MB
|
baier access control service.mp4
|
47.4 MB
|
BELENKO Andrej - password recovery.mp4
|
64.2 MB
|
BRANCO Rodrigo - KIDS.mp4
|
58.0 MB
|
bratus embedded devices.mp4
|
32.8 MB
|
BRATUS Sergey - AP fingerprinting.mp4
|
36.6 MB
|
BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4
|
68.9 MB
|
CALLAS Jon - Straight Talk abaou Crypto.mp4
|
68.6 MB
|
CHIESA Raoul - SCADA and national critical infrastructures.mp4
|
63.5 MB
|
De Haas Job - Side channel analysis.mp4
|
62.3 MB
|
DJB - Keynote.mp4
|
82.6 MB
|
gauci henrique web application firewalls.mp4
|
40.4 MB
|
HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4
|
80.2 MB
|
HOLZ Thorsten - virtual-honeypots.mp4
|
70.2 MB
|
KEMP Michael - virtualise.mp4
|
49.5 MB
|
KLOSE Roger - ERNW ESX-In-Security.mp4
|
34.8 MB
|
KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4
|
48.5 MB
|
Kuhn Friedwart - RMS.mp4
|
56.5 MB
|
LOGLOGIC - log management.mp4
|
70.3 MB
|
rey keynote stop the madness.mp4
|
21.0 MB
|
rey ruediger codenomicon fuzzer.mp4
|
23.0 MB
|
ROECHER Dror-John - the data went down the drain.mp4
|
58.5 MB
|
SPEICHERT Horst - hackertools according to german law.mp4
|
61.7 MB
|
STREHLE Rolf - self defending networks.mp4
|
56.5 MB
|
THUMANN Michael - Reversing.mp4
|
58.9 MB
|
THUMANN Michael - Secondlife (TM).mp4
|
59.5 MB
|
Troopers IBM Appscan.mp4
|
59.7 MB
|
WAISSBEIN Ariel - penetration testing learning kit.mp4
|
59.5 MB
|
/TROOPERS 2009/
|
.NET Access Control Service - Dominick Baier.mp4
|
47.0 MB
|
.NET Access Control Service - Dominick Baier.srt
|
49.7 KB
|
Stop the Madness - Keynote by Enno Rey.mp4
|
50.7 MB
|
Stop the Madness - Keynote by Enno Rey.srt
|
52.6 KB
|
The Truth about Web Application Firewalls - Sandro Gauci - Wendel Guglielmetti.mp4
|
64.8 MB
|
The Truth about Web Application Firewalls - Sandro Gauci - Wendel Guglielmetti.srt
|
40.4 KB
|
Vulnerability Testing, a Case Study - Ruediger Rey.mp4
|
24.1 MB
|
Vulnerability Testing, a Case Study - Ruediger Rey.srt
|
15.4 KB
|
/TROOPERS 2010/
|
A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4
|
68.6 MB
|
A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt
|
84.8 KB
|
Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4
|
56.7 MB
|
Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt
|
72.0 KB
|
Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4
|
70.2 MB
|
Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt
|
95.4 KB
|
Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4
|
45.5 MB
|
Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt
|
60.3 KB
|
Federated Identity - Opportunities and Dangers - Dominick Baier.mp4
|
66.4 MB
|
Federated Identity - Opportunities and Dangers - Dominick Baier.srt
|
90.7 KB
|
History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4
|
58.8 MB
|
History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt
|
83.6 KB
|
How to fail an audit - Martin Freiss.mp4
|
66.9 MB
|
How to rate the security of closed source software - Michael Thumann.mp4
|
68.3 MB
|
How to rate the security of closed source software - Michael Thumann.srt
|
74.0 KB
|
Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4
|
80.1 MB
|
Letting your fuzzer knows about target s internals - Rodrigo Branco.srt
|
121.0 KB
|
Netscreen of Death - Graeme Neilson.mp4
|
74.4 MB
|
Netscreen of Death - Graeme Neilson.srt
|
84.4 KB
|
Rapid Risk Assessment - Enno Rey.mp4
|
67.8 MB
|
Rapid Risk Assessment - Enno Rey.srt
|
85.8 KB
|
Return Oriented Rootkits - Ralf Hund.mp4
|
60.6 MB
|
Return Oriented Rootkits - Ralf Hund.srt
|
84.5 KB
|
Some notes on SAP security - Alexandr Polyakov.mp4
|
61.8 MB
|
Some notes on SAP security - Alexandr Polyakov.srt
|
31.4 KB
|
Tools of the Trade for a modern CISO - Enno Rey.mp4
|
56.8 MB
|
Tools of the Trade for a modern CISO - Enno Rey.srt
|
69.6 KB
|
Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4
|
39.2 MB
|
Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt
|
33.5 KB
|
/TROOPERS 2011/
|
Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4
|
64.6 MB
|
Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt
|
79.9 KB
|
Cache on Delivery - Marco Slaviero.mp4
|
58.6 MB
|
Cache on Delivery - Marco Slaviero.srt
|
77.9 KB
|
Do you know what s happening in your $application - Felix Leder.mp4
|
68.2 MB
|
Do you know what s happening in your $application - Felix Leder.srt
|
94.0 KB
|
Femtocell - Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4
|
52.0 MB
|
Femtocell - Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt
|
76.6 KB
|
Forging Canon Original Decision Data - Dmitry Sklyarov.mp4
|
51.1 MB
|
Forging Canon Original Decision Data - Dmitry Sklyarov.srt
|
56.9 KB
|
I FOCA a MIL Domain - Chema Alonso.mp4
|
55.2 MB
|
Keynote Day 1 - Enno Rey.mp4
|
53.9 MB
|
Keynote Day 1 - Enno Rey.srt
|
68.4 KB
|
Keynote Day 2 - Richard Thieme.mp4
|
73.9 MB
|
Keynote Day 2 - Richard Thieme.srt
|
100.0 KB
|
Milking a horse - Meder Kydyraliev.mp4
|
49.3 MB
|
Milking a horse - Meder Kydyraliev.srt
|
75.2 KB
|
OMG WTF PDF - What you didn t know about Acrobat - Julia Wolf.mp4
|
57.4 MB
|
OMG WTF PDF - What you didn t know about Acrobat - Julia Wolf.srt
|
52.3 KB
|
Owning the data center using Cisco NX-OS - George Hedfors.mp4
|
35.2 MB
|
Owning the data center using Cisco NX-OS - George Hedfors.srt
|
38.2 KB
|
SAP GUI Hacking - Andreas Wiegenstein.mp4
|
33.0 MB
|
SAP GUI Hacking - Andreas Wiegenstein.srt
|
38.5 KB
|
/TROOPERS 2012/
|
Closing Remarks.mp4
|
7.1 MB
|
Opening Teaser.mp4
|
7.7 MB
|
/TROOPERS 2013/
|
Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4
|
32.6 MB
|
Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt
|
13.9 KB
|
Corporate Espionage via Mobile Compromise - A Technical Deep Dive - David Weinstein.mp4
|
59.9 MB
|
Corporate Espionage via Mobile Compromise - A Technical Deep Dive - David Weinstein.srt
|
43.8 KB
|
Detecting white-collar cybercrime - SAP Forensics.mp4
|
71.9 MB
|
Detecting white-collar cybercrime - SAP Forensics.srt
|
73.7 KB
|
Flash Storage Forensics - Dmitry Sklyarov.mp4
|
9.6 MB
|
Flash Storage Forensics - Dmitry Sklyarov.srt
|
43.8 KB
|
Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4
|
21.9 MB
|
Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt
|
50.7 KB
|
Hacking & Defending the big 4 Databases - Alex Rothacker.mp4
|
68.7 MB
|
Hacking & Defending the big 4 Databases - Alex Rothacker.srt
|
61.1 KB
|
Hacking and Craft - Jeff Gough.mp4
|
63.3 MB
|
Hacking and Craft - Jeff Gough.srt
|
67.5 KB
|
Introducing Daisho - Michael Ossmann & Dominic Spill.mp4
|
85.5 MB
|
Introducing Daisho - Michael Ossmann & Dominic Spill.srt
|
71.9 KB
|
Keynote Day 1 by Rodrigo Branco.mp4
|
141.1 MB
|
Keynote Day 1 by Rodrigo Branco.srt
|
122.1 KB
|
Keynote Day 2 by Chris Nickerson.mp4
|
79.2 MB
|
Keynote Day 2 by Chris Nickerson.srt
|
74.1 KB
|
Malicious pixels - QR-codes as attack vectors - Peter Kieseberg.mp4
|
95.1 MB
|
Malicious pixels - QR-codes as attack vectors - Peter Kieseberg.srt
|
84.6 KB
|
OAuth2 - Ready or not (here I come) - Dominick Baier.mp4
|
82.3 MB
|
OAuth2 - Ready or not (here I come) - Dominick Baier.srt
|
75.1 KB
|
Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4
|
98.0 MB
|
Paparazzi over IP - Daniel Mende & Pascal Turbing.srt
|
68.0 KB
|
Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4
|
101.2 MB
|
Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt
|
94.7 KB
|
Smart TV Security - Lee (beist) SeungJin.mp4
|
82.6 MB
|
Smart TV Security - Lee (beist) SeungJin.srt
|
69.5 KB
|
The future of data exfiltration and malicious communication - Steffen Wendzel.mp4
|
92.2 MB
|
The future of data exfiltration and malicious communication - Steffen Wendzel.srt
|
71.4 KB
|
The Interim Years of Cyberspace - Security in a Domain of Warfare -Robert M. Lee.mp4
|
71.6 MB
|
The Interim Years of Cyberspace - Security in a Domain of Warfare -Robert M. Lee.srt
|
77.2 KB
|
UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4
|
9.4 MB
|
UI Redressing Attacks on Android Devices - Marcus Niemietz.srt
|
67.4 KB
|
Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4
|
70.6 MB
|
Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt
|
75.2 KB
|
Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4
|
78.9 MB
|
Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt
|
72.1 KB
|
We Came In Peace - They don't - Hackers vs. CyberWar - fx.mp4
|
89.3 MB
|
We Came In Peace - They don't - Hackers vs. CyberWar - fx.srt
|
80.9 KB
|
You wouldn t share a syringe. Would you share a USB port.mp4
|
96.6 MB
|
You wouldn t share a syringe. Would you share a USB port.srt
|
82.5 KB
|
Your IPv6 default config meets FOCA (and starts to cry) - Chema Alonso.mp4
|
80.8 MB
|
Your IPv6 default config meets FOCA (and starts to cry) - Chema Alonso.srt
|
62.7 KB
|
/TROOPERS 2014/
|
20 Ways Past Secure Boot - Job de Haas.mp4
|
66.3 MB
|
20 Ways Past Secure Boot - Job de Haas.srt
|
72.6 KB
|
Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4
|
74.0 MB
|
Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt
|
55.9 KB
|
Bro - A Flexible Open-Source Platform - Robin Summer.mp4
|
34.0 MB
|
Bro - A Flexible Open-Source Platform - Robin Summer.srt
|
40.6 KB
|
Closing Remarks - Enno Rey.mp4
|
47.5 MB
|
Closing Remarks - Enno Rey.srt
|
26.1 KB
|
Compromise-as-a-Service - Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4
|
86.6 MB
|
Compromise-as-a-Service - Our PleAZURE - Matthias Luft & Felix Wilhelm).srt
|
81.5 KB
|
Georg Bakos - Keynote.mp4
|
145.0 MB
|
Get Over It - Privacy is Good for Security - Rob Lee.mp4
|
66.9 MB
|
Get Over It - Privacy is Good for Security - Rob Lee.srt
|
88.3 KB
|
Granular Trust - making it work - Toby Kohlenberg.mp4
|
91.5 MB
|
Granular Trust - making it work - Toby Kohlenberg.srt
|
93.4 KB
|
How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4
|
62.8 MB
|
How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4
|
59.6 MB
|
Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4
|
85.1 MB
|
Implementing an USB Host Driver Fuzzer - Daniel Mende.srt
|
55.1 KB
|
Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4
|
75.0 MB
|
Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt
|
44.3 KB
|
Keynote - FX.mp4
|
23.9 MB
|
Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4
|
87.7 MB
|
Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt
|
42.8 KB
|
Medical Device Cyber Security - The First 164 Years - Kevin Fu.mp4
|
82.7 MB
|
Medical Device Cyber Security - The First 164 Years - Kevin Fu.srt
|
92.8 KB
|
Modern Smartphone Forensics - Vladimir Katalov.mp4
|
53.5 MB
|
Modern Smartphone Forensics - Vladimir Katalov.srt
|
79.4 KB
|
OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4
|
86.3 MB
|
OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt
|
64.8 KB
|
Psychology of Security - Stefan Schumacher.mp4
|
63.9 MB
|
Psychology of Security - Stefan Schumacher.srt
|
86.2 KB
|
Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4
|
107.9 MB
|
Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt
|
70.2 KB
|
SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4
|
100.8 MB
|
SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt
|
72.3 KB
|
SAP s Network Protocols Revisited - Martin Gallo.mp4
|
91.6 MB
|
SAP s Network Protocols Revisited - Martin Gallo.srt
|
62.4 KB
|
Security and SDN - A perfect fit or oil-and-water - Ivan Pepelnjak.mp4
|
7.8 MB
|
Security and SDN - A perfect fit or oil-and-water - Ivan Pepelnjak.srt
|
69.1 KB
|
The Three Billion Dollar App - Vladimir Wolstencroft.mp4
|
77.6 MB
|
The Three Billion Dollar App - Vladimir Wolstencroft.srt
|
86.7 KB
|
Vulnerability Classification in the SaaS Era - Noam Liran.mp4
|
60.6 MB
|
Vulnerability Classification in the SaaS Era - Noam Liran.srt
|
64.6 KB
|
What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4
|
9.0 MB
|
What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt
|
58.8 KB
|
Why IPv6 Security is so hard - Enno Rey.mp4
|
2.0 MB
|
Why IPv6 Security is so hard - Enno Rey.srt
|
29.8 KB
|
/TROOPERS 2015/
|
Andreas Lindh - Defender Economics.mp4
|
44.6 MB
|
Andreas Lindh - Defender Economics.srt
|
62.4 KB
|
Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4
|
136.2 MB
|
Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV - a Dead Hands Tale.mp4
|
45.4 MB
|
Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV - a Dead Hands Tale.srt
|
51.0 KB
|
Atilla Marosi - Hacking FinSpy - a Case Study.mp4
|
54.9 MB
|
Atilla Marosi - Hacking FinSpy - a Case Study.srt
|
55.6 KB
|
Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4
|
69.1 MB
|
Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt
|
97.6 KB
|
Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4
|
67.1 MB
|
Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt
|
77.0 KB
|
Catherine Pearce, Patrick Thomas - Multipath TCP.mp4
|
53.0 MB
|
Catherine Pearce, Patrick Thomas - Multipath TCP.srt
|
70.5 KB
|
Craig Smith - Introduction to Hacking in Car Systems.mp4
|
77.7 MB
|
Craig Smith - Introduction to Hacking in Car Systems.srt
|
114.4 KB
|
Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEO’s mobile.mp4
|
44.9 MB
|
Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEO’s mobile.srt
|
49.5 KB
|
Enno Rey - Opening Remarks.mp4
|
14.9 MB
|
Enno Rey - Opening Remarks.srt
|
9.3 KB
|
Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4
|
40.2 MB
|
Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4
|
65.7 MB
|
Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt
|
67.2 KB
|
Frederik Armknecht - Crypto in the Cloud.mp4
|
65.7 MB
|
Frederik Armknecht - Crypto in the Cloud.srt
|
84.4 KB
|
Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4
|
62.3 MB
|
Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt
|
66.9 KB
|
Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4
|
35.0 MB
|
Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt
|
39.0 KB
|
Haroon Meer - Keynote.mp4
|
66.2 MB
|
Haroon Meer - Keynote.srt
|
96.0 KB
|
Ivan Pepelnjak - Automating Network Security.mp4
|
48.7 MB
|
Ivan Pepelnjak - Automating Network Security.srt
|
72.9 KB
|
Jacob Torrey - The foundation is rotting and the basement is flooding.mp4
|
55.5 MB
|
Jacob Torrey - The foundation is rotting and the basement is flooding.srt
|
86.4 KB
|
Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4
|
60.6 MB
|
Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt
|
68.1 KB
|
Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4
|
96.9 MB
|
Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt
|
89.2 KB
|
Martijn Grooten - The State of Email in 2015.mp4
|
37.3 MB
|
Martijn Grooten - The State of Email in 2015.srt
|
66.2 KB
|
Martin Gallo - HoneySAP - Who really wants your money.mp4
|
56.9 MB
|
Martin Gallo - HoneySAP - Who really wants your money.srt
|
80.0 KB
|
Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4
|
63.7 MB
|
Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt
|
87.7 KB
|
Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4
|
72.2 MB
|
Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt
|
88.3 KB
|
Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4
|
57.5 MB
|
Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt
|
96.8 KB
|
Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4
|
55.5 MB
|
Richard Rushing - Game Over, Does the CISO get an Extra Life.srt
|
73.7 KB
|
Sergej Bratus - Keynote.mp4
|
74.9 MB
|
Sergej Bratus - Keynote.srt
|
86.4 KB
|
Sergey Bratus - Keynote.mp4
|
74.9 MB
|
Sergey Bratus - Keynote.srt
|
86.4 KB
|
Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4
|
33.2 MB
|
Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt
|
47.1 KB
|
Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4
|
52.5 MB
|
Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt
|
72.7 KB
|
Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4
|
54.3 MB
|
Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt
|
68.4 KB
|
TROOPERS15 - Welcome Trailer.mp4
|
3.6 MB
|
Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4
|
50.3 MB
|
Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt
|
79.1 KB
|
/TROOPERS 2015 IPv6 Summit/
|
Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4
|
81.8 MB
|
Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt
|
98.7 KB
|
Christopher Werny - Basic Attacks and Defences (1 2).mp4
|
91.2 MB
|
Christopher Werny - Basic Attacks and Defences (1 2).srt
|
116.0 KB
|
Christopher Werny - Basic Attacks and Defences (2 2).mp4
|
123.8 MB
|
Christopher Werny - Case Study - Building a Secure IPv6 Guest Wifi Network.mp4
|
69.1 MB
|
Christopher Werny - Case Study - Building a Secure IPv6 Guest Wifi Network.srt
|
106.8 KB
|
Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4
|
36.5 MB
|
Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt
|
66.9 KB
|
Enno Rey - 48 Considered Harmful.mp4
|
43.4 MB
|
Enno Rey - 48 Considered Harmful.srt
|
66.6 KB
|
Enno Rey - Reliable & Secure DHCPv6.mp4
|
97.8 MB
|
Eric Vyncke - Routing Header Is Back Should We Panic.mp4
|
55.7 MB
|
Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4
|
64.0 MB
|
Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt
|
125.5 KB
|
Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4
|
78.9 MB
|
Fernando Gont - Recent IPv6 Security Standardization Efforts.srt
|
142.7 KB
|
Gabriel Müller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4
|
86.2 MB
|
Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4
|
52.7 MB
|
Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4
|
135.9 MB
|
Julian Bangert - Tales of 6006 Protocols.mp4
|
38.6 MB
|
Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4
|
70.7 MB
|
Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt
|
127.5 KB
|
Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4
|
44.3 MB
|
Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt
|
85.4 KB
|
/TROOPERS 2016/
|
An unknown SAP default Account.mp4
|
39.2 MB
|
Attacking and Protecting Big Data Environments.mp4
|
64.8 MB
|
Attacking Nextgen Firewalls.mp4
|
53.4 MB
|
Better Crypto.mp4
|
45.6 MB
|
Broadcasting your Attack.mp4
|
42.1 MB
|
Caring for File Formats.mp4
|
40.5 MB
|
Closing Remarks.mp4
|
55.1 MB
|
Crypto Code.mp4
|
22.3 MB
|
Day 1 Visuals.mp4
|
23.0 MB
|
Deep dive into SAP archive file formats.mp4
|
52.3 MB
|
Exploiting the Unexploitable.mp4
|
39.4 MB
|
Freifunk.mp4
|
21.1 MB
|
Hiding your White Box Designs is Not Enough.mp4
|
49.8 MB
|
Hollywood Hacking Facts and Fiction.mp4
|
45.3 MB
|
How to Implement an SDL in a Large Company.mp4
|
55.2 MB
|
Imma Chargin Mah Lazer.mp4
|
47.1 MB
|
Keynote - A Praise for Hackers.mp4
|
66.2 MB
|
Keynote - Ethics in Networked Systems Research.mp4
|
73.4 MB
|
Lets Play Hide and Seek in the Cloud.mp4
|
12.9 MB
|
Medical Device Security Hack or Hype.mp4
|
53.0 MB
|
Mind The Gap.mp4
|
45.0 MB
|
Offensive Active Directory with Powershell.mp4
|
51.3 MB
|
One Tool To Rule Them All.mp4
|
13.4 MB
|
Passive Intelligence Gathering Analytics.mp4
|
53.5 MB
|
Patch me if you can.mp4
|
54.1 MB
|
Preventing vulns in HANA based deployments.mp4
|
47.2 MB
|
Protecting Hosts in IPv6 Networks.mp4
|
52.4 MB
|
Rapid Radio Reversing.mp4
|
51.0 MB
|
Real Life Software Defined Security.mp4
|
57.7 MB
|
Reverse engineering a Digital Two way Radio.mp4
|
28.8 MB
|
Security Evaluation of Dual-Stack Systems.mp4
|
38.3 MB
|
The Chimaera Processor.mp4
|
18.3 MB
|
The Impact of Extension Headers on IPv6 Access Control Lists - Real Life Use Cases.mp4
|
23.6 MB
|
The Internet of Deadly Things.mp4
|
13.2 MB
|
The Joy of Sandbox Mitigations.mp4
|
44.8 MB
|
The Kings in your Castle.mp4
|
47.4 MB
|
The Road to secure Smart Cars.mp4
|
40.3 MB
|
Towards a LangSec Aware SDLC.mp4
|
58.0 MB
|
TROOPERS Conference 360° Teaser [must watch in YouTube app].mp4
|
3.2 MB
|
Unpatchable.mp4
|
41.8 MB
|
unrubby.mp4
|
45.5 MB
|
Witness the Russian attack Live demos of their steps tools techniques.mp4
|
48.4 MB
|
/TROOPERS 2016 IPv6 Summit/
|
Advanced IPv6 Attacks Using Chiron Training.mp4
|
155.9 MB
|
Advanced IPv6 Network Reconnaisance.mp4
|
112.1 MB
|
Anonymization IPv6 in PCAPs - Challenges and Wins.mp4
|
41.6 MB
|
Automating IPv6 Deployments.mp4
|
29.8 MB
|
Basic Attacks and Mitigation Strategies.mp4
|
86.3 MB
|
Building a Reliable and Secure IPv6 WiFi Network.mp4
|
70.2 MB
|
Developing an Enterprise IPv6 Security Strategy.mp4
|
68.7 MB
|
IPv6 First Hop Security Features on HP Devices.mp4
|
40.2 MB
|
IPv6 Security Fundamentals.mp4
|
90.5 MB
|
NATTED - A Field Report.mp4
|
64.3 MB
|
Recent IPv6 Standardization Efforts.mp4
|
96.0 MB
|
Remote Access and Business Partner Connections.mp4
|
60.1 MB
|
Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4
|
36.3 MB
|
Security Assessment of Microsoft DirectAccess.mp4
|
45.2 MB
|
/TROOPERS 2017/
|
2nd Day Keynote Mara Tam.mp4
|
72.8 MB
|
A sense of self for bootloaders no more magical writes Rebecca bx Shapiro.mp4
|
53.8 MB
|
Active Directory Security Best Practices - Friedwart Kuhn, Heinrich Wiederkehr.mp4
|
834.9 KB
|
An attack in depth analysis of multicast DNS and DNS service recovery Antonios Atlas.mp4
|
87.0 MB
|
An Introduction to Automotive ECU Research Dieter Spaar.mp4
|
84.4 MB
|
Architecting a Modern Defense using Device Guard Matt Graeber, Casey Smith.mp4
|
85.8 MB
|
Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew (2).mp4
|
71.7 MB
|
Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew.mp4
|
71.7 MB
|
Authenticate Like A Boss Pete Herzog.mp4
|
79.4 MB
|
BLE Authentication Design Challenges On Smartphone Controlled IoT Devices Analyzing.mp4
|
66.3 MB
|
Blinded Random Block Corruptions Rodrigo Branco.mp4
|
49.8 MB
|
Closing Procedure.mp4
|
41.7 MB
|
Closing Procedure.srt
|
39.6 KB
|
Crashing Cisco's Autonomic Network Omar Eissa.mp4
|
42.6 MB
|
Data Demolition Gone In 60 Seconds Zoz Brooks.mp4
|
79.9 MB
|
Demystifying COM James Foreshaw.mp4
|
55.5 MB
|
Dissecting Modern 3G 4G Cellular Modems Harald Welte.mp4
|
62.4 MB
|
Exploring North Korea's Surveillance Technology Florian Grunow Niklaus Schiess.mp4
|
53.2 MB
|
Exploring The Infrared World,Part 2 Mike Ossmann, Dominic Spill.mp4
|
62.5 MB
|
Graph me, I'm famous Automated static malware analysis and indicator extraction for bi.mp4
|
59.3 MB
|
Habibi Works An Update On TROOPERS Charity Florian Horsch.mp4
|
42.4 MB
|
Hacking TP Link Devices Fernando Gont.mp4
|
97.9 MB
|
Hacks and Case Studies Cellular Communications Brian Butterly.mp4
|
76.6 MB
|
Hardware Root of Mistrust Joseph FitzPatrick Michael Leibowitz.mp4
|
48.4 MB
|
Hidden in plain sight - How possibly could a decades old standard be broken Paul Mel.mp4
|
54.2 MB
|
Holy crap I need to pentest SAP from Citrix Joffrey Czarny.mp4
|
49.5 MB
|
How we hacked Distributed CMSs Francis Alexander, Bharadwaj Machiraju.mp4
|
52.6 MB
|
Hunting Them All Veronica Valeros.mp4
|
75.9 MB
|
Intel ME The Way of the Static Analysis Dmitry Sklyarov.mp4
|
54.1 MB
|
Intercepting SAP SNC protected traffic Martin Gallo.mp4
|
26.6 MB
|
IoT to Gateway - Gabriel Mueller.mp4
|
84.9 MB
|
IPv6 Configuration Approaches for Servers Enno Rey.mp4
|
121.1 MB
|
Lightning Talks Peter Hessler, Edmond Rogers, Sreepriya Chalakkal.mp4
|
8.8 MB
|
Looking through the web of pages to the Internet of Things Gabriel Weaver.mp4
|
68.4 MB
|
Metasploit Hardware Bridge Hacking Craig Smith.mp4
|
64.1 MB
|
Opening Keynote Enno Rey.mp4
|
50.6 MB
|
PHP Internals Exploit Dev Edition Emmanuel Law.mp4
|
43.2 MB
|
Protecting SAP HANA from vulnerabilities and exploits Pablo Artuso, Nahuel Sanchez.mp4
|
41.7 MB
|
Pufs ’n stuff Getting the most of the digital world through physical identities An.mp4
|
87.6 MB
|
Reverse Engineering ABAP Bytecode for Malware Analysis Hans Christian Esperer, Frederik.mp4
|
52.7 MB
|
RIPE Atlas Measuring The Internet Alvaro Vives.mp4
|
82.7 MB
|
Robo Ethnography Just what can Robots do Brittany Postnikoff.mp4
|
65.0 MB
|
Ruler Pivoting Through Exchange Etienne Stalmans.mp4
|
79.4 MB
|
Rusting up your GREATFET Richo Healey, Dominic Spill.mp4
|
96.5 MB
|
Samsung Pay Tokenized Numbers, Flaws and Issues Salvador Mendoza.mp4
|
51.8 MB
|
Samsung Pay Tokenized Numbers, Flaws and Issues Salvador Mendoza.srt
|
68.7 KB
|
SAP strikes back Your SAP server now counter attacks Vahagn Vardanyan, Dmitry Yudin.mp4
|
52.4 MB
|
Securing Network Automation Ivan Pepelnjak.mp4
|
84.9 MB
|
So You Want To Hack Radios Matt Knight, Marc Newlin.mp4
|
71.6 MB
|
Software Attacks on Hypervisor Emulation of Hardware Oleksandr Bazhaniuk.mp4
|
44.3 MB
|
Surprise Bitches The Grugq.mp4
|
92.8 MB
|
The Hardware Striptease Club Letting The Smart Home Strip Down To Its Innards Stefan.mp4
|
205.3 MB
|
The Metabrik Platform Rapid Development of Reusable Security Tools Patrice Auffret.mp4
|
51.2 MB
|
Unsafe JAX RS Breaking REST API Mikhail Egorov.mp4
|
27.9 MB
|
Volatile Memory Behavioral Game Theory in Defensive Security Kelly Shortridge.mp4
|
56.7 MB
|
Vox Ex Machina Graeme Neilson.mp4
|
60.5 MB
|
What happened to your home IoT Hacking and Forensic with 0 Days Soohyun Jin, Moonbe.mp4
|
64.9 MB
|
You've got mail Owning your business with one email Joris van de Vis.mp4
|
33.8 MB
|
/TROOPERS 2018/
|
A Stepping Stone To Car Hacking.eng.srt
|
104.7 KB
|
A Stepping Stone To Car Hacking.mp4
|
37.7 MB
|
Active Directory Security - The Journey.eng.srt
|
167.0 KB
|
Active Directory Security - The Journey.mp4
|
74.7 MB
|
Ads networks are following you, follow them back.eng.srt
|
121.2 KB
|
Ads networks are following you, follow them back.mp4
|
36.0 MB
|
Advances in IPv6 Network Reconnaissance.eng.srt
|
56.2 KB
|
Advances in IPv6 Network Reconnaissance.mp4
|
20.4 MB
|
All Your Cloud Are Belong To Us.eng.srt
|
187.0 KB
|
All Your Cloud Are Belong To Us.mp4
|
75.7 MB
|
An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors.eng.srt
|
158.7 KB
|
An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors.mp4
|
74.9 MB
|
Are you sure - you are alone Pwning IoT-CCTV devices.eng.srt
|
41.1 KB
|
Are you sure - you are alone Pwning IoT-CCTV devices.mp4
|
28.9 MB
|
Attack and defend Microsoft Enhanced Security Administrative Environment.eng.srt
|
139.7 KB
|
Attack and defend Microsoft Enhanced Security Administrative Environment.mp4
|
59.7 MB
|
Blue Team Sprint.eng.srt
|
163.3 KB
|
Blue Team Sprint.mp4
|
69.5 MB
|
BREAKING THE LAWS OF ROBOTICS - ATTACKING INDUSTRIAL ROBOTS.mp4
|
59.7 MB
|
Closing Remarks.eng.srt
|
40.4 KB
|
Closing Remarks.mp4
|
21.6 MB
|
Dynamic IPv6 Prefix Problems and VPNs.eng.srt
|
107.8 KB
|
Dynamic IPv6 Prefix Problems and VPNs.mp4
|
41.3 MB
|
From Zero to Secure Continuous Delivery in 60 Minutes.eng.srt
|
173.4 KB
|
From Zero to Secure Continuous Delivery in 60 Minutes.mp4
|
92.4 MB
|
Frustrating Emulation with Delay Slots in MIPS and MIPS16.eng.srt
|
74.9 KB
|
Frustrating Emulation with Delay Slots in MIPS and MIPS16.mp4
|
38.5 MB
|
Hacking and Securing SAP Hana Applications.eng.srt
|
86.0 KB
|
Hacking and Securing SAP Hana Applications.mp4
|
46.7 MB
|
Hacking Robots Before Skynet.mp4
|
67.3 MB
|
Hunting Android Malware.eng.srt
|
124.7 KB
|
Hunting Android Malware.mp4
|
35.4 MB
|
Hunting crypto secrets in SAP systems.eng.srt
|
142.8 KB
|
Hunting crypto secrets in SAP systems.mp4
|
73.2 MB
|
I forgot Your password.eng.srt
|
105.0 KB
|
I forgot Your password.mp4
|
64.6 MB
|
Introducing a Comprehensive Active Directory Security Metric.eng.srt
|
113.8 KB
|
Introducing a Comprehensive Active Directory Security Metric.mp4
|
69.7 MB
|
IoT processor and binary breakdown.eng.srt
|
148.1 KB
|
IoT processor and binary breakdown.mp4
|
48.2 MB
|
IPv6 Address Management - The First Five Years.eng.srt
|
127.0 KB
|
IPv6 Address Management - The First Five Years.mp4
|
62.4 MB
|
IPv6 in the Cloud - Back to Square One.eng.srt
|
110.6 KB
|
IPv6 in the Cloud - Back to Square One.mp4
|
61.0 MB
|
Keynote Mike Ossmann (Inkl. Opening Remarks).eng.srt
|
150.6 KB
|
Keynote Mike Ossmann (Inkl. Opening Remarks).mp4
|
66.1 MB
|
Knockin' on IPv6's doors.eng.srt
|
170.7 KB
|
Knockin' on IPv6's doors.mp4
|
68.4 MB
|
Mind the Gap, Bro.eng.srt
|
171.1 KB
|
Mind the Gap, Bro.mp4
|
65.0 MB
|
Mobile App Security Fails and How To Survive Them.eng.srt
|
131.7 KB
|
Mobile App Security Fails and How To Survive Them.mp4
|
70.0 MB
|
NFC Payments.eng.srt
|
73.5 KB
|
NFC Payments.mp4
|
26.3 MB
|
NGI18 Keynote by Graeme Neilson.eng.srt
|
102.6 KB
|
NGI18 Keynote by Graeme Neilson.mp4
|
44.6 MB
|
No royal road - advanced analysis for 'advanced' threats.eng.srt
|
143.1 KB
|
No royal road - advanced analysis for 'advanced' threats.mp4
|
73.9 MB
|
Practical Magic - Behavior-based Safety Design for IoT.eng.srt
|
131.3 KB
|
Practical Magic - Behavior-based Safety Design for IoT.mp4
|
46.3 MB
|
Real-Life Network and Security Automation.eng.srt
|
111.0 KB
|
Real-Life Network and Security Automation.mp4
|
72.0 MB
|
Reverse Engineering Black Box Systems with GreatFET.eng.srt
|
160.5 KB
|
Reverse Engineering Black Box Systems with GreatFET.mp4
|
50.5 MB
|
Robots Panel.eng.srt
|
211.4 KB
|
Robots Panel.mp4
|
54.1 MB
|
SAP BUGS - The Phantom Security.eng.srt
|
43.4 KB
|
SAP BUGS - The Phantom Security.mp4
|
34.1 MB
|
SAP IGS - The 'vulnerable' forgotten component.eng.srt
|
86.8 KB
|
SAP IGS - The 'vulnerable' forgotten component.mp4
|
52.8 MB
|
SAP Security patches - The importance, difficulties and solutions.mp4
|
33.9 MB
|
Securing your in-ear fitness coach - Challenges in hardening next generation wearables.eng.srt
|
144.6 KB
|
Securing your in-ear fitness coach - Challenges in hardening next generation wearables.mp4
|
53.6 MB
|
Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.eng.srt
|
146.0 KB
|
Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.mp4
|
66.0 MB
|
Security Appliances Internals.eng.srt
|
129.4 KB
|
Security Appliances Internals.mp4
|
64.4 MB
|
Subs, Ships, & Satellites - The Internet of Invisible Things.eng.srt
|
184.9 KB
|
Subs, Ships, & Satellites - The Internet of Invisible Things.mp4
|
71.1 MB
|
Subverting Trust in Windows.eng.srt
|
129.6 KB
|
Subverting Trust in Windows.mp4
|
57.1 MB
|
Swimming IoT or how to hack a Yacht.mp4
|
63.8 MB
|
The Hackers' Sanctuary City.mp4
|
6.5 MB
|
The Language of Security.eng.srt
|
163.4 KB
|
The Language of Security.mp4
|
73.0 MB
|
The Wolf In SGX Clothing.eng.srt
|
167.0 KB
|
The Wolf In SGX Clothing.mp4
|
45.0 MB
|
Things Attack - Peek into a 18 months IoT honeypot.eng.srt
|
111.4 KB
|
Things Attack - Peek into a 18 months IoT honeypot.mp4
|
47.6 MB
|
Unifying RF Fuzzing Techniques under a Common API.eng.srt
|
147.3 KB
|
Unifying RF Fuzzing Techniques under a Common API.mp4
|
39.4 MB
|
When Virtual Hell Freezes Over.eng.srt
|
87.5 KB
|
When Virtual Hell Freezes Over.mp4
|
27.7 MB
|
/TROOPERS 2019/
|
A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.eng.srt
|
191.1 KB
|
A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.mp4
|
63.5 MB
|
A Morning Address.eng.srt
|
1.3 KB
|
A Morning Address.mp4
|
6.5 MB
|
A PKI distributed is a PKI solved.eng.srt
|
52.3 KB
|
A PKI distributed is a PKI solved.mp4
|
25.5 MB
|
Abusing privileged file operations on Windows.eng.srt
|
45.3 KB
|
Abusing privileged file operations on Windows.mp4
|
26.5 MB
|
Active Directory and Azure - Core Security Principles.eng.srt
|
140.1 KB
|
Active Directory and Azure - Core Security Principles.mp4
|
81.9 MB
|
Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.eng.srt
|
81.0 KB
|
Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.mp4
|
36.1 MB
|
Automotive Penetration Testing with Scapy.mp4
|
71.7 MB
|
Beyond Windows Forensics with Built-in Microsoft Tooling.eng.srt
|
133.1 KB
|
Beyond Windows Forensics with Built-in Microsoft Tooling.mp4
|
61.7 MB
|
BIZEC Discussion Panel Past, Present and Future of SAP Security.eng.srt
|
125.6 KB
|
BIZEC Discussion Panel Past, Present and Future of SAP Security.mp4
|
47.2 MB
|
BloodHound and the Adversary Resilience Methodology.eng.srt
|
142.6 KB
|
BloodHound and the Adversary Resilience Methodology.mp4
|
64.8 MB
|
Bluetooth, does it spark joy.eng.srt
|
128.3 KB
|
Bluetooth, does it spark joy.mp4
|
51.5 MB
|
Car Manufacturer meets Security Community.eng.srt
|
150.8 KB
|
Car Manufacturer meets Security Community.mp4
|
64.2 MB
|
Closing Remarks.eng.srt
|
38.9 KB
|
Closing Remarks.mp4
|
31.0 MB
|
CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics.eng.srt
|
136.1 KB
|
CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics.mp4
|
62.6 MB
|
Dark Clouds ahead Attacking a Cloud Foundry Implementation.eng.srt
|
119.8 KB
|
Dark Clouds ahead Attacking a Cloud Foundry Implementation.mp4
|
59.3 MB
|
Digital Forensics and Incident Response in G Suite.eng.srt
|
84.5 KB
|
Digital Forensics and Incident Response in G Suite.mp4
|
26.4 MB
|
Distributed Security Alerting.eng.srt
|
139.9 KB
|
Distributed Security Alerting.mp4
|
60.3 MB
|
Ethics in Attacker Research.eng.srt
|
19.7 KB
|
Ethics in Attacker Research.mp4
|
10.4 MB
|
Evolution of kernel fuzzers in NetBSD.mp4
|
35.7 MB
|
Fetch exploit - Attacks against source code downloaders.eng.srt
|
103.1 KB
|
Fetch exploit - Attacks against source code downloaders.mp4
|
31.4 MB
|
Finding the best threat intelligence provider.eng.srt
|
130.0 KB
|
Finding the best threat intelligence provider.mp4
|
47.6 MB
|
From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.eng.srt
|
200.4 KB
|
From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.mp4
|
82.2 MB
|
Fun and Pitfalls in a World of VDSL.eng.srt
|
135.4 KB
|
Fun and Pitfalls in a World of VDSL.mp4
|
64.9 MB
|
Fun with LDAP and Kerberos Attacking AD from non-Windows machines.eng.srt
|
183.1 KB
|
Fun with LDAP and Kerberos Attacking AD from non-Windows machines.mp4
|
71.8 MB
|
HackDMI.eng.srt
|
67.8 KB
|
HackDMI.mp4
|
40.1 MB
|
Hardware Side Channel attacks on the cheapest.eng.srt
|
132.2 KB
|
Hardware Side Channel attacks on the cheapest.mp4
|
55.4 MB
|
Hitting the Gym The Anatomy of a Killer Workout.mp4
|
55.2 MB
|
How we made the badge BEFORE you showed up.eng.srt
|
50.7 KB
|
How we made the badge BEFORE you showed up.mp4
|
29.2 MB
|
I am AD FS and so can you Attacking Active Directory Federated Services.eng.srt
|
145.7 KB
|
I am AD FS and so can you Attacking Active Directory Federated Services.mp4
|
57.7 MB
|
I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.eng.srt
|
119.6 KB
|
I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.mp4
|
61.9 MB
|
Introducing Faction A modern, powerful, multiplayer C2 framework.eng.srt
|
161.6 KB
|
Introducing Faction A modern, powerful, multiplayer C2 framework.mp4
|
75.6 MB
|
Introduction to Practical Ethics for Security Practitioners.eng.srt
|
144.1 KB
|
Introduction to Practical Ethics for Security Practitioners.mp4
|
77.6 MB
|
IoT backdoors in cars.mp4
|
57.8 MB
|
IPv666 - Address of the Beast.eng.srt
|
148.1 KB
|
IPv666 - Address of the Beast.mp4
|
50.2 MB
|
Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.eng.srt
|
160.1 KB
|
Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.mp4
|
80.9 MB
|
Keynote - Inside the Machine.eng.srt
|
194.3 KB
|
Keynote - Inside the Machine.mp4
|
82.6 MB
|
macOS - Gaining root with harmless AppStore apps.eng.srt
|
103.1 KB
|
macOS - Gaining root with harmless AppStore apps.mp4
|
53.2 MB
|
Medical Device Security - Please (don't) be patient.eng.srt
|
107.2 KB
|
Medical Device Security - Please (don't) be patient.mp4
|
41.4 MB
|
Microsoft IT (secure) journey to IPv6-only.eng.srt
|
177.9 KB
|
Microsoft IT (secure) journey to IPv6-only.mp4
|
62.8 MB
|
Modmob tools Home made tools to test mobile devices and monitor networks.eng.srt
|
140.4 KB
|
Modmob tools Home made tools to test mobile devices and monitor networks.mp4
|
67.5 MB
|
MS Office file format sorcery.eng.srt
|
124.0 KB
|
MS Office file format sorcery.mp4
|
64.9 MB
|
NAT64 Day 2019 @ AWK.eng.srt
|
101.5 KB
|
NAT64 Day 2019 @ AWK.mp4
|
54.7 MB
|
NGI - Keynote.eng.srt
|
179.8 KB
|
NGI - Keynote.mp4
|
60.9 MB
|
NGI - Opening Remarks.eng.srt
|
7.7 KB
|
NGI - Opening Remarks.mp4
|
4.1 MB
|
No more dumb hex.eng.srt
|
124.8 KB
|
No more dumb hex.mp4
|
56.0 MB
|
Not A Security Boundary Breaking Forest Trusts.eng.srt
|
126.1 KB
|
Not A Security Boundary Breaking Forest Trusts.mp4
|
47.0 MB
|
Old New Things An examination of the Philips TriMedia architecture.eng.srt
|
69.3 KB
|
Old New Things An examination of the Philips TriMedia architecture.mp4
|
41.9 MB
|
Opening remarks.eng.srt
|
34.8 KB
|
Opening remarks.mp4
|
19.2 MB
|
Practical attack simulations in Critical National Infrastructure (CNI).eng.srt
|
63.7 KB
|
Practical attack simulations in Critical National Infrastructure (CNI).mp4
|
22.5 MB
|
SI6 IPv6 Toolkit v3.0.eng.srt
|
103.9 KB
|
SI6 IPv6 Toolkit v3.0.mp4
|
55.3 MB
|
SIM Simulator.eng.srt
|
48.1 KB
|
SIM Simulator.mp4
|
21.4 MB
|
Sneaking Past Device Guard.eng.srt
|
112.4 KB
|
Sneaking Past Device Guard.mp4
|
54.7 MB
|
The Anatomy of Windows Telemetry.eng.srt
|
130.8 KB
|
The Anatomy of Windows Telemetry.mp4
|
58.7 MB
|
The evolution of IoT botnets, including Torii and a smart-home hack..eng.srt
|
85.2 KB
|
The evolution of IoT botnets, including Torii and a smart-home hack.mp4
|
43.9 MB
|
Threat Modelling and Beyond for Cisco ACI.eng.srt
|
92.8 KB
|
Threat Modelling and Beyond for Cisco ACI.mp4
|
37.5 MB
|
Vehicle alarms' insecurity and something else.eng.srt
|
78.7 KB
|
Vehicle alarms' insecurity and something else.mp4
|
51.9 MB
|
VXLAN Security or Injection, and protection.mp4
|
51.1 MB
|
Watchgate - How stupid smartwatches threaten the security and safety of our children.eng.srt
|
97.6 KB
|
Watchgate - How stupid smartwatches threaten the security and safety of our children.mp4
|
61.0 MB
|
We are Listening - Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..eng.srt
|
128.5 KB
|
We are Listening - Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP.mp4
|
49.3 MB
|
What are the IPv6 news from the IETF.eng.srt
|
222.3 KB
|
What are the IPv6 news from the IETF.mp4
|
99.3 MB
|
Wild West of Conference Apps Security.eng.srt
|
86.3 KB
|
Wild West of Conference Apps Security.mp4
|
31.8 MB
|
You (dis)liked mimikatz Wait for kekeo.eng.srt
|
149.5 KB
|
You (dis)liked mimikatz Wait for kekeo.mp4
|
77.0 MB
|
You try to detect mimikatz.eng.srt
|
68.0 KB
|
You try to detect mimikatz.mp4
|
44.3 MB
|
/TROOPERS 2022/
|
42 things - Keynote by Gary McGraw.eng.srt
|
78.7 KB
|
42 things - Keynote by Gary McGraw.mp4
|
71.8 MB
|
Abusing Family Refresh Tokens for Unauthorized Access and Persistence in Azure AD.eng.srt
|
73.1 KB
|
Abusing Family Refresh Tokens for Unauthorized Access and Persistence in Azure AD.mp4
|
52.6 MB
|
Aftermovie.eng.srt
|
3.8 KB
|
Aftermovie.mp4
|
6.6 MB
|
Automotive Network Scans with Scapy.eng.srt
|
19.7 KB
|
Automotive Network Scans with Scapy.mp4
|
55.7 MB
|
Breaking Azure AD joined endpoints in zero-trust environments.eng.srt
|
103.0 KB
|
Breaking Azure AD joined endpoints in zero-trust environments.mp4
|
72.2 MB
|
DDoS Testing Your Infrastructure, including IPv6 SYN floods.eng.srt
|
116.1 KB
|
DDoS Testing Your Infrastructure, including IPv6 SYN floods.mp4
|
84.9 MB
|
Hack my Talk But it's deployed on Kubernetes.eng.srt
|
73.0 KB
|
Hack my Talk But it's deployed on Kubernetes.mp4
|
61.3 MB
|
Kates’ Pot Finding Attacks Against Kubernetes Deployments.eng.srt
|
68.1 KB
|
Kates’ Pot Finding Attacks Against Kubernetes Deployments.mp4
|
32.9 MB
|
Neutralizing Keyloggers, an intimate story between the keyboard and the system.eng.srt
|
120.5 KB
|
Neutralizing Keyloggers, an intimate story between the keyboard and the system.mp4
|
73.3 MB
|
Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry system.mp4
|
88.7 MB
|
Resurrecting Active Directory After a Ransomware Attack.eng.srt
|
121.4 KB
|
Resurrecting Active Directory After a Ransomware Attack.mp4
|
99.0 MB
|
/TROOPERS 2023/
|
(Windows) Hello from the other side.eng.srt
|
110.2 KB
|
(Windows) Hello from the other side.mp4
|
65.3 MB
|
All your parcel are belong to us.eng.srt
|
62.9 KB
|
All your parcel are belong to us.mp4
|
45.1 MB
|
Attacking Ultra-Wideband Security Analysis of UWB Applications in Smartphones.eng.srt
|
91.7 KB
|
Attacking Ultra-Wideband Security Analysis of UWB Applications in Smartphones.mp4
|
56.7 MB
|
Beyond Java Obfuscating Android Apps with Purely Native Code.eng.srt
|
121.6 KB
|
Beyond Java Obfuscating Android Apps with Purely Native Code.mp4
|
73.8 MB
|
Cat & Mouse - or chess.eng.srt
|
101.9 KB
|
Cat & Mouse - or chess.mp4
|
66.0 MB
|
Das IT-Security-Lagebild aus Heise-Sicht.eng.srt
|
91.6 KB
|
Das IT-Security-Lagebild aus Heise-Sicht.mp4
|
63.3 MB
|
Detection And Blocking With BPF Via YAML.eng.srt
|
99.4 KB
|
Detection And Blocking With BPF Via YAML.mp4
|
61.9 MB
|
Dumping NTHashes from Azure AD.eng.srt
|
84.4 KB
|
Dumping NTHashes from Azure AD.mp4
|
58.8 MB
|
Everyone knows SAP, everyone uses SAP, everyone uses RFC, no one knows RFC.eng.srt
|
92.2 KB
|
Everyone knows SAP, everyone uses SAP, everyone uses RFC, no one knows RFC.mp4
|
76.7 MB
|
Fact Based Post Exploitation - Office365 Edition.eng.srt
|
51.9 KB
|
Fact Based Post Exploitation - Office365 Edition.mp4
|
33.0 MB
|
Forensic analysis on real incidents inside Microsoft Remote Desktop Services.eng.srt
|
72.8 KB
|
Forensic analysis on real incidents inside Microsoft Remote Desktop Services.mp4
|
52.6 MB
|
Forensic Examination of Ceph.eng.srt
|
72.4 KB
|
Forensic Examination of Ceph.mp4
|
57.2 MB
|
GPT-like Pre-Training on Unlabeled System Logs for Malware Detection.eng.srt
|
86.4 KB
|
GPT-like Pre-Training on Unlabeled System Logs for Malware Detection.mp4
|
59.4 MB
|
Hidden Pathways.eng.srt
|
74.2 KB
|
Hidden Pathways.mp4
|
58.6 MB
|
Homophonic Collisions Hold me closer Tony Danza.eng.srt
|
48.3 KB
|
Homophonic Collisions Hold me closer Tony Danza.mp4
|
31.1 MB
|
Horror Stories from the Automotive Industry.eng.srt
|
72.4 KB
|
Horror Stories from the Automotive Industry.mp4
|
47.4 MB
|
Jupysec Auditing Jupyter to Improve AI Security.eng.srt
|
59.8 KB
|
Jupysec Auditing Jupyter to Improve AI Security.mp4
|
46.8 MB
|
Keynote - Mikko Hyppönen.eng.srt
|
97.7 KB
|
Keynote - Mikko Hyppönen.mp4
|
82.9 MB
|
Monitoring Solutions Attacking IT Infrastructure at its Core.eng.srt
|
107.0 KB
|
Monitoring Solutions Attacking IT Infrastructure at its Core.mp4
|
72.8 MB
|
OAuth and Proof of Possession - The long way round.eng.srt
|
77.4 KB
|
OAuth and Proof of Possession - The long way round.mp4
|
65.2 MB
|
OopsSec - The bad, the worst and the ugly of APT’s operations security.eng.srt
|
82.5 KB
|
OopsSec - The bad, the worst and the ugly of APT’s operations security.mp4
|
75.3 MB
|
Priority for Effective Action.eng.srt
|
85.1 KB
|
Priority for Effective Action.mp4
|
64.5 MB
|
Real world detection engineering in a multi-cloud environment.eng.srt
|
109.0 KB
|
Real world detection engineering in a multi-cloud environment.mp4
|
68.1 MB
|
Reportly - keep your head in the clouds..eng.srt
|
46.1 KB
|
Reportly - keep your head in the clouds.mp4
|
28.4 MB
|
SAP (Anti-)Forensics Detecting White-Collar Cyber-Crime.eng.srt
|
69.3 KB
|
SAP (Anti-)Forensics Detecting White-Collar Cyber-Crime.mp4
|
56.6 MB
|
Security Heroes versus the Power of Privacy.eng.srt
|
82.4 KB
|
Security Heroes versus the Power of Privacy.mp4
|
56.6 MB
|
So You Performed A Forest Recovery. How Do You Reconnect Your AD Again With Azure AD.eng.srt
|
89.8 KB
|
So You Performed A Forest Recovery. How Do You Reconnect Your AD Again With Azure AD.mp4
|
65.7 MB
|
Spooky authentication at a distance.eng.srt
|
105.2 KB
|
Spooky authentication at a distance.mp4
|
85.9 MB
|
Stay fit Hack a Jump Rope.eng.srt
|
41.7 KB
|
Stay fit Hack a Jump Rope.mp4
|
36.9 MB
|
Testing and Fuzzing the Kubernetes Admission Configuration.eng.srt
|
100.1 KB
|
Testing and Fuzzing the Kubernetes Admission Configuration.mp4
|
66.4 MB
|
The Anatomy of Windows Telemetry Part 2.eng.srt
|
74.2 KB
|
The Anatomy of Windows Telemetry Part 2.mp4
|
54.9 MB
|
The Power of Coercion Techniques in Windows Environments.eng.srt
|
77.7 KB
|
The Power of Coercion Techniques in Windows Environments.mp4
|
50.0 MB
|
The Wire on Fire The Spies Who Loved Telcos.eng.srt
|
60.9 KB
|
The Wire on Fire The Spies Who Loved Telcos.mp4
|
39.1 MB
|
Vulnerabilities in the TPM 2.0 reference implementation code.eng.srt
|
94.1 KB
|
Vulnerabilities in the TPM 2.0 reference implementation code.mp4
|
63.6 MB
|
Total files 692
|