FileMood

Download TROOPERS

TROOPERS

Name

TROOPERS

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

74.1 GB

Total Files

594

Hash

A94E961A56B476593879AAF89DAE48469D7DE32F

/TROOPERS 2008/

TROOPERS08.org_AMATO Francisco - evilgrade.mp4

3.1 MB

TROOPERS08.org_BELENKO Andrej - password recovery.mp4

161.5 MB

TROOPERS08.org_BRANCO Rodrigo - KIDS.mp4

168.2 MB

TROOPERS08.org_BRATUS Sergey - AP fingerprinting.bak.mp4

112.2 MB

TROOPERS08.org_BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4

174.1 MB

TROOPERS08.org_CALLAS Jon - Straight Talk abaou Crypto.mp4

173.8 MB

TROOPERS08.org_CHIESA Raoul - SCADA and national critical infrastructures.mp4

159.1 MB

TROOPERS08.org_DJB - Keynote.mp4

169.5 MB

TROOPERS08.org_De Haas Job - Side channel analysis.mp4

169.7 MB

TROOPERS08.org_HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4

182.6 MB

TROOPERS08.org_HOLZ Thorsten - virtual-honeypots.mp4

161.4 MB

TROOPERS08.org_KEMP Michael - virtualise.mp4

150.7 MB

TROOPERS08.org_KLOSE Roger - ERNW_ESX-In-Security.mp4

107.5 MB

TROOPERS08.org_KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4

147.8 MB

TROOPERS08.org_Kuhn Friedwart - RMS.mp4

170.2 MB

TROOPERS08.org_LOGLOGIC - log management.mp4

164.0 MB

TROOPERS08.org_ROECHER Dror-John - the data went down the drain.mp4

159.6 MB

TROOPERS08.org_SPEICHERT Horst - hackertools according to german law.mp4

170.1 MB

TROOPERS08.org_STREHLE Rolf - self defending networks.mp4

168.1 MB

TROOPERS08.org_THUMANN Michael - Reversing.mp4

162.2 MB

TROOPERS08.org_THUMANN Michael - Secondlife (TM).mp4

165.6 MB

TROOPERS08.org_Troopers IBM Appscan.mp4

161.7 MB

TROOPERS08.org_WAISSBEIN Ariel - penetration testing learning kit.mp4

170.8 MB

TROOPERS09_baier_access_control_service.mp4

145.0 MB

TROOPERS09_bratus_embedded_devices.mp4

110.9 MB

TROOPERS09_gauci_henrique_web_application_firewalls.mp4

57.7 MB

TROOPERS09_rey_keynote_stop_the_madness.mp4

28.8 MB

TROOPERS09_rey_ruediger_codenomicon_fuzzer.mp4

88.6 MB

/TROOPERS 2009/

TROOPERS09 - .NET Access Control Service - Dominick Baier.mp4

89.1 MB

TROOPERS09 - .NET Access Control Service - Dominick Baier.srt

49.7 KB

TROOPERS09 - Stop the Madness - Keynote by Enno Rey.mp4

63.0 MB

TROOPERS09 - Stop the Madness - Keynote by Enno Rey.srt

52.6 KB

TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.mp4

140.3 MB

TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.srt

40.4 KB

TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.mp4

47.9 MB

TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.srt

15.4 KB

/TROOPERS 2010/

TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4

178.9 MB

TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt

84.8 KB

TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4

108.4 MB

TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt

72.0 KB

TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4

148.8 MB

TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt

95.4 KB

TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4

92.3 MB

TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt

60.3 KB

TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.mp4

102.4 MB

TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.srt

90.7 KB

TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4

143.3 MB

TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt

83.6 KB

TROOPERS10 - How to fail an audit - Martin Freiss.mp4

126.1 MB

TROOPERS10 - How to rate the security of closed source software - Michael Thumann.mp4

142.7 MB

TROOPERS10 - How to rate the security of closed source software - Michael Thumann.srt

74.0 KB

TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4

166.5 MB

TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.srt

121.0 KB

TROOPERS10 - Netscreen of Death - Graeme Neilson.mp4

136.3 MB

TROOPERS10 - Netscreen of Death - Graeme Neilson.srt

84.4 KB

TROOPERS10 - Rapid Risk Assessment - Enno Rey.mp4

121.4 MB

TROOPERS10 - Rapid Risk Assessment - Enno Rey.srt

85.8 KB

TROOPERS10 - Return Oriented Rootkits - Ralf Hund.mp4

120.3 MB

TROOPERS10 - Return Oriented Rootkits - Ralf Hund.srt

84.5 KB

TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.mp4

113.1 MB

TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.srt

31.4 KB

TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.mp4

104.5 MB

TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.srt

69.6 KB

TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4

50.5 MB

TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt

33.5 KB

/TROOPERS 2011/

TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4

140.2 MB

TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt

79.9 KB

TROOPERS11 - Cache on Delivery - Marco Slaviero.mp4

117.9 MB

TROOPERS11 - Cache on Delivery - Marco Slaviero.srt

77.9 KB

TROOPERS11 - Do you know what s happening in your $application - Felix Leder.mp4

160.0 MB

TROOPERS11 - Do you know what s happening in your $application - Felix Leder.srt

94.0 KB

TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4

93.0 MB

TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt

76.6 KB

TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.mp4

92.4 MB

TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.srt

56.9 KB

TROOPERS11 - I FOCA a MIL Domain - Chema Alonso.mp4

86.5 MB

TROOPERS11 - Keynote Day 1 - Enno Rey.mp4

80.9 MB

TROOPERS11 - Keynote Day 1 - Enno Rey.srt

68.4 KB

TROOPERS11 - Keynote Day 2 - Richard Thieme.mp4

161.6 MB

TROOPERS11 - Keynote Day 2 - Richard Thieme.srt

100.0 KB

TROOPERS11 - Milking a horse - Meder Kydyraliev.mp4

71.1 MB

TROOPERS11 - Milking a horse - Meder Kydyraliev.srt

75.2 KB

TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.mp4

102.5 MB

TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.srt

52.3 KB

TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.mp4

81.0 MB

TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.srt

38.2 KB

TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.mp4

50.8 MB

TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.srt

38.5 KB

/TROOPERS 2012/

TROOPERS12 - Closing Remarks.mp4

20.8 MB

TROOPERS12 - Opening Teaser.mp4

21.2 MB

/TROOPERS 2013/

TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4

185.8 MB

TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt

13.9 KB

TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.mp4

193.4 MB

TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.srt

43.8 KB

TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.mp4

643.6 MB

TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.srt

73.7 KB

TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.mp4

40.4 MB

TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.srt

43.8 KB

TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4

112.5 MB

TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt

50.7 KB

TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.mp4

367.2 MB

TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.srt

61.1 KB

TROOPERS13 - Hacking and Craft - Jeff Gough.mp4

348.6 MB

TROOPERS13 - Hacking and Craft - Jeff Gough.srt

67.5 KB

TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.mp4

378.9 MB

TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.srt

71.9 KB

TROOPERS13 - Keynote Day 1 by Rodrigo Branco.mp4

490.3 MB

TROOPERS13 - Keynote Day 1 by Rodrigo Branco.srt

122.1 KB

TROOPERS13 - Keynote Day 2 by Chris Nickerson.mp4

284.0 MB

TROOPERS13 - Keynote Day 2 by Chris Nickerson.srt

74.1 KB

TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.mp4

725.7 MB

TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.srt

84.6 KB

TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.mp4

415.0 MB

TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.srt

75.1 KB

TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4

602.3 MB

TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.srt

68.0 KB

TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4

545.0 MB

TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt

94.7 KB

TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.mp4

270.9 MB

TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.srt

69.5 KB

TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.mp4

266.4 MB

TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.srt

77.2 KB

TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.mp4

389.0 MB

TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.srt

71.4 KB

TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4

40.8 MB

TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.srt

67.4 KB

TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4

224.4 MB

TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt

75.2 KB

TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4

702.2 MB

TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt

72.1 KB

TROOPERS13 - We Came In Peace - They Don t Hackers vs. CyberWar - fx.srt

80.9 KB

TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.mp4

448.1 MB

TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.srt

82.5 KB

TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.mp4

390.8 MB

TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.srt

62.7 KB

/TROOPERS 2014/

TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.mp4

266.4 MB

TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.srt

72.6 KB

TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4

320.5 MB

TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt

55.9 KB

TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.mp4

136.3 MB

TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.srt

40.6 KB

TROOPERS14 - Closing Remarks - Enno Rey.mp4

203.8 MB

TROOPERS14 - Closing Remarks - Enno Rey.srt

26.1 KB

TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4

326.4 MB

TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).srt

81.5 KB

TROOPERS14 - Georg Bakos - Keynote.mp4

529.9 MB

TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.mp4

303.6 MB

TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.srt

88.3 KB

TROOPERS14 - Granular Trust; making it work - Toby Kohlenberg.srt

93.4 KB

TROOPERS14 - Granular Trust_ making it work - Toby Kohlenberg.mp4

431.6 MB

TROOPERS14 - How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4

250.6 MB

TROOPERS14 - How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4

258.3 MB

TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4

403.6 MB

TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.srt

55.1 KB

TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4

289.8 MB

TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt

44.3 KB

TROOPERS14 - Keynote - FX.mp4

93.2 MB

TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4

408.7 MB

TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt

42.8 KB

TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.mp4

355.8 MB

TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.srt

92.8 KB

TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.mp4

168.1 MB

TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.srt

79.4 KB

TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4

400.1 MB

TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt

64.8 KB

TROOPERS14 - Psychology of Security - Stefan Schumacher.mp4

249.5 MB

TROOPERS14 - Psychology of Security - Stefan Schumacher.srt

86.2 KB

TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4

418.7 MB

TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt

70.2 KB

TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4

381.4 MB

TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt

72.3 KB

TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.mp4

356.7 MB

TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.srt

62.4 KB

TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.mp4

34.3 MB

TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.srt

69.1 KB

TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.mp4

309.6 MB

TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.srt

86.7 KB

TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.mp4

272.8 MB

TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.srt

64.6 KB

TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4

41.1 MB

TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt

58.8 KB

TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.mp4

6.2 MB

TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.srt

29.8 KB

/TROOPERS 2015 IPv6 Security Summit/

[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4

1.9 GB

[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt

98.7 KB

[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).mp4

1.9 GB

[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).srt

116.0 KB

[TROOPERS15] Christopher Werny - Basic Attacks and Defences (2 2).mp4

750.5 MB

[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.mp4

1.6 GB

[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.srt

106.8 KB

[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4

998.4 MB

[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt

66.9 KB

[TROOPERS15] Enno Rey - 48 Considered Harmful.mp4

1.2 GB

[TROOPERS15] Enno Rey - 48 Considered Harmful.srt

66.6 KB

[TROOPERS15] Enno Rey - Reliable & Secure DHCPv6.mp4

751.6 MB

[TROOPERS15] Eric Vyncke - Routing Header Is Back... Should We Panic.mp4

359.3 MB

[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4

1.9 GB

[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt

125.5 KB

[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4

1.8 GB

[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.srt

142.7 KB

[TROOPERS15] Gabriel Muller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4

602.3 MB

[TROOPERS15] Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4

345.2 MB

[TROOPERS15] Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4

750.1 MB

[TROOPERS15] Julian Bangert - Tales of 6006 Protocols.mp4

277.5 MB

[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4

2.1 GB

[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt

127.5 KB

[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4

521.0 MB

[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt

85.4 KB

/TROOPERS 2015/

TROOPERS15 - Welcome Trailer.mp4

9.6 MB

[TROOPERS15] Andreas Lindh - Defender Economics.mp4

146.5 MB

[TROOPERS15] Andreas Lindh - Defender Economics.srt

62.4 KB

[TROOPERS15] Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4

735.0 MB

[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.mp4

291.2 MB

[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.srt

51.0 KB

[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.mp4

327.5 MB

[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.srt

55.6 KB

[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4

226.1 MB

[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt

97.6 KB

[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4

352.1 MB

[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt

77.0 KB

[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.mp4

238.5 MB

[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.srt

70.5 KB

[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.mp4

231.0 MB

[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.srt

49.5 KB

[TROOPERS15] Enno Rey - Opening Remarks.mp4

69.9 MB

[TROOPERS15] Enno Rey - Opening Remarks.srt

9.3 KB

[TROOPERS15] Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4

294.1 MB

[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4

276.2 MB

[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt

67.2 KB

[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.mp4

281.9 MB

[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.srt

84.4 KB

[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4

248.4 MB

[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt

66.9 KB

[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4

181.9 MB

[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt

39.0 KB

[TROOPERS15] Haroon Meer - Keynote.mp4

171.4 MB

[TROOPERS15] Haroon Meer - Keynote.srt

96.0 KB

[TROOPERS15] Ivan Pepelnjak - Automating Network Security.mp4

118.4 MB

[TROOPERS15] Ivan Pepelnjak - Automating Network Security.srt

72.9 KB

[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.mp4

230.9 MB

[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.srt

86.4 KB

[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4

329.7 MB

[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt

68.1 KB

[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4

495.1 MB

[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt

89.2 KB

[TROOPERS15] Martijn Grooten - The State of Email in 2015.mp4

91.4 MB

[TROOPERS15] Martijn Grooten - The State of Email in 2015.srt

66.2 KB

[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.mp4

227.8 MB

[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.srt

80.0 KB

[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4

295.5 MB

[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt

87.7 KB

[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4

461.9 MB

[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt

88.3 KB

[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4

159.8 MB

[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt

96.8 KB

[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4

247.2 MB

[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.srt

73.7 KB

[TROOPERS15] Sergej Bratus - Keynote.mp4

318.8 MB

[TROOPERS15] Sergej Bratus - Keynote.srt

86.4 KB

[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4

141.8 MB

[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt

47.1 KB

[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4

243.3 MB

[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt

72.7 KB

[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4

159.8 MB

[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt

68.4 KB

[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4

214.2 MB

[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt

79.1 KB

/TROOPERS 2016 IPv6 Summit/

Advanced IPv6 Attacks Using Chiron Training.mp4

740.1 MB

Advanced IPv6 Network Reconnaisance.mp4

508.4 MB

Anonymization IPv6 in PCAPs - Challenges and Wins.mp4

192.3 MB

Automating IPv6 Deployments.mp4

133.6 MB

Basic Attacks and Mitigation Strategies.mp4

458.7 MB

Building a Reliable and Secure IPv6 WiFi Network.mp4

229.4 MB

Developing an Enterprise IPv6 Security Strategy.mp4

221.5 MB

IPv6 First Hop Security Features on HP Devices.mp4

134.7 MB

IPv6 Security Fundamentals.mp4

382.0 MB

NATTED - A Field Report.mp4

218.6 MB

Recent IPv6 Standardization Efforts.mp4

420.1 MB

Remote Access and Business Partner Connections.mp4

278.1 MB

Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4

113.2 MB

Security Assessment of Microsoft DirectAccess.mp4

209.3 MB

/TROOPERS 2016/

An unknown SAP default Account.mp4

198.9 MB

Attacking Nextgen Firewalls.mp4

266.7 MB

Attacking and Protecting Big Data Environments.mp4

161.9 MB

Better Crypto.mp4

83.9 MB

Broadcasting your Attack.mp4

213.4 MB

Caring for File Formats.mp4

95.9 MB

Closing Remarks.mp4

325.0 MB

Crypto Code.mp4

105.3 MB

Deep dive into SAP archive file formats.mp4

253.7 MB

Exploiting the Unexploitable.mp4

196.7 MB

Freifunk.mp4

69.1 MB

Hiding your White Box Designs is Not Enough.mp4

268.7 MB

Hollywood Hacking Facts and Fiction.mp4

157.7 MB

How to Implement an SDL in a Large Company.mp4

93.6 MB

Imma Chargin Mah Lazer.mp4

252.6 MB

Keynote - A Praise for Hackers.mp4

314.7 MB

Keynote - Ethics in Networked Systems Research.mp4

193.6 MB

Lets Play Hide and Seek in the Cloud.mp4

24.2 MB

Medical Device Security Hack or Hype.mp4

258.3 MB

Mind The Gap.mp4

115.5 MB

Offensive Active Directory with Powershell.mp4

119.6 MB

One Tool To Rule Them All.mp4

25.9 MB

Passive Intelligence Gathering Analytics.mp4

183.7 MB

Patch me if you can.mp4

264.9 MB

Preventing vulns in HANA based deployments.mp4

224.4 MB

Protecting Hosts in IPv6 Networks.mp4

253.9 MB

Rapid Radio Reversing.mp4

123.2 MB

Real Life Software Defined Security.mp4

99.4 MB

Reverse engineering a Digital Two way Radio.mp4

99.9 MB

Security Evaluation of Dual-Stack Systems.mp4

212.2 MB

TR16 - Day 1 Visuals.mp4

93.4 MB

TROOPERS Conference 360 Teaser - must watch in YouTube app.mp4

13.0 MB

The Chimaera Processor.mp4

43.9 MB

The Internet of Deadly Things.mp4

31.8 MB

The Joy of Sandbox Mitigations.mp4

103.1 MB

The Kings in your Castle.mp4

119.1 MB

The Road to secure Smart Cars.mp4

199.3 MB

Towards a LangSec Aware SDLC.mp4

95.8 MB

Unpatchable.mp4

214.3 MB

Witness the Russian attack Live demos of their steps tools techniques.mp4

81.2 MB

unrubby.mp4

114.0 MB

/TROOPERS 2017/

TR17 - IoT to Gateway - Gabriel Mueller.mp4

136.6 MB

TR17 NGI TRACK1 Authenticate Like A Boss Pete Herzog.mp4

72.9 MB

TR17 NGI TRACK1 Dissecting Modern 3G 4G Cellular Modems Harald Welte.mp4

98.4 MB

TR17 NGI TRACK1 Hacks and Case Studies Cellular Communications Brian Butterly.mp4

133.1 MB

TR17 NGI TRACK1 Looking through the web of pages to the Internet of Things Gabriel Weaver.mp4

111.4 MB

TR17 NGI TRACK1 Metasploit Hardware Bridge Hacking Craig Smith.mp4

108.3 MB

TR17 NGI TRACK1 Pufs ’n stuff Getting the most of the digital world through physical identities An.mp4

85.1 MB

TR17 NGI TRACK1 Robo Ethnography Just what can Robots do Brittany Postnikoff.mp4

105.7 MB

TR17 NGI TRACK1 So You Want To Hack Radios Matt Knight, Marc Newlin.mp4

67.5 MB

TR17 NGI TRACK1 What happened to your home IoT Hacking and Forensic with 0 Days Soohyun Jin, Moonbe.mp4

103.4 MB

TR17 NGI TRACK2 Crashing Cisco's Autonomic Network Omar Eissa.mp4

75.3 MB

TR17 NGI TRACK2 IPv6 Configuration Approaches for Servers Enno Rey.mp4

205.9 MB

TR17 NGI TRACK2 RIPE Atlas Measuring The Internet Alvaro Vives.mp4

131.0 MB

TR17 NGI TRACK3 BLE Authentication Design Challenges On Smartphone Controlled IoT Devices Analyzing.mp4

109.2 MB

TR17 NGI TRACK4 An Introduction to Automotive ECU Research Dieter Spaar.mp4

146.6 MB

TR17 NGI TRACK4 Hacking TP Link Devices Fernando Gont.mp4

154.8 MB

TR17 NGI TRACK4 Hidden in plain sight_ How possibly could a decades old standard be broken Paul Mel.mp4

81.0 MB

TR17 NGI TRACK4 Rusting up your GREATFET Richo Healey, Dominic Spill.mp4

172.8 MB

TR17 NGI TRACK4 The Hardware Striptease Club Letting The Smart Home Strip Down To Its Innards Stefan.mp4

865.2 MB

TR17 NGI Track2 An attack in depth analysis of multicast DNS and DNS service recovery Antonios Atlas.mp4

143.7 MB

TR17 TRACK1 2nd Day Keynote Mara Tam.mp4

147.8 MB

TR17 TRACK1 A sense of self for bootloaders no more magical writes Rebecca ”bx” Shapiro.mp4

59.3 MB

TR17 TRACK1 Blinded Random Block Corruptions Rodrigo Branco.mp4

95.2 MB

TR17 TRACK1 Closing Procedure.mp4

101.2 MB

TR17 TRACK1 Demystifying COM James Foreshaw.mp4

122.3 MB

TR17 TRACK1 Exploring North Korea's Surveillance Technology Florian Grunow Niklaus Schiess.mp4

115.6 MB

TR17 TRACK1 Exploring The Infrared World,Part 2 Mike Ossmann, Dominic Spill.mp4

145.1 MB

TR17 TRACK1 Graph me, I'm famous! Automated static malware analysis and indicator extraction for bi.mp4

134.2 MB

TR17 TRACK1 Hardware Root of Mistrust Joseph FitzPatrick Michael Leibowitz.mp4

111.8 MB

TR17 TRACK1 How we hacked Distributed CMSs Francis Alexander, Bharadwaj Machiraju.mp4

122.1 MB

TR17 TRACK1 Intel ME The Way of the Static Analysis Dmitry Sklyarov.mp4

111.4 MB

TR17 TRACK1 Opening Keynote Enno Rey.mp4

105.9 MB

TR17 TRACK1 Software Attacks on Hypervisor Emulation of Hardware Oleksandr Bazhaniuk.mp4

92.8 MB

TR17 TRACK1 Unsafe JAX RS Breaking REST API Mikhail Egorov.mp4

54.2 MB

TR17 TRACK2 Active Directory Security Best Practices - Friedwart Kuhn, Heinrich Wiederkehr.mp4

1.4 MB

TR17 TRACK2 Architecting a Modern Defense using Device Guard Matt Graeber, Casey Smith.mp4

160.9 MB

TR17 TRACK2 Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew (2).mp4

118.3 MB

TR17 TRACK2 Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew.mp4

118.3 MB

TR17 TRACK2 Data Demolition Gone In 60 Seconds Zoz Brooks.mp4

133.5 MB

TR17 TRACK2 Hunting Them All Veronica Valeros.mp4

128.0 MB

TR17 TRACK2 Ruler Pivoting Through Exchange Etienne Stalmans.mp4

135.6 MB

TR17 TRACK2 Samsung Pay Tokenized Numbers, Flaws and Issues Salvador Mendoza.mp4

76.7 MB

TR17 TRACK2 Securing Network Automation Ivan Pepelnjak.mp4

153.2 MB

TR17 TRACK2 Surprise Bitches! The Grugq.mp4

425.8 MB

TR17 TRACK2 Volatile Memory Behavioral Game Theory in Defensive Security Kelly Shortridge.mp4

86.9 MB

TR17 TRACK2 Vox Ex Machina Graeme Neilson - YouTube.mp4

105.0 MB

TR17 TRACK3 Habibi Works An Update On TROOPERS Charity Florian Horsch.mp4

48.3 MB

TR17 TRACK3 Holy crap I need to pentest SAP from Citrix Joffrey Czarny.mp4

94.9 MB

TR17 TRACK3 Intercepting SAP SNC protected traffic Martin Gallo.mp4

42.5 MB

TR17 TRACK3 Lightning Talks Peter Hessler, Edmond Rogers, Sreepriya Chalakkal.mp4

17.4 MB

TR17 TRACK3 PHP Internals Exploit Dev Edition Emmanuel Law.mp4

60.9 MB

TR17 TRACK3 Protecting SAP HANA from vulnerabilities and exploits Pablo Artuso, Nahuel Sanchez.mp4

84.8 MB

TR17 TRACK3 Reverse Engineering ABAP Bytecode for Malware Analysis Hans Christian Esperer, Frederik.mp4

87.2 MB

TR17 TRACK3 SAP strikes back Your SAP server now counter attacks Vahagn Vardanyan, Dmitry Yudin.mp4

105.3 MB

TR17 TRACK3 The Metabrik Platform Rapid Development of Reusable Security Tools Patrice Auffret.mp4

79.5 MB

TR17 TRACK3 You've got mail Owning your business with one email Joris van de Vis.mp4

69.2 MB

/TROOPERS 2018/

TR18 A Stepping Stone To Car Hacking.en.transcribed.srt

104.7 KB

TR18 A Stepping Stone To Car Hacking.mp4

58.6 MB

TR18 Active Directory Security The Journey.en.transcribed.srt

167.0 KB

TR18 Active Directory Security The Journey.mp4

119.6 MB

TR18 Ads networks are following you, follow them back.en.transcribed.srt

121.2 KB

TR18 All Your Cloud Are Belong To Us.en.transcribed.srt

187.0 KB

TR18 All Your Cloud Are Belong To Us.mp4

160.1 MB

TR18 An ACE Up The Sleeve Designing Security Descriptor Based Backdoors.en.transcribed.srt

158.7 KB

TR18 An ACE Up The Sleeve Designing Security Descriptor Based Backdoors.mp4

116.3 MB

TR18 Attack and defend Microsoft Enhanced Security Administrative Environment.en.transcribed.srt

139.7 KB

TR18 Attack and defend Microsoft Enhanced Security Administrative Environment.mp4

104.2 MB

TR18 Blue Team Sprint.en.transcribed.srt

163.3 KB

TR18 Blue Team Sprint.mp4

135.1 MB

TR18 Closing Remarks.en.transcribed.srt

40.4 KB

TR18 Closing Remarks.mp4

44.3 MB

TR18 From Zero to Secure Continuous Delivery in 60 Minutes.en.transcribed.srt

173.4 KB

TR18 From Zero to Secure Continuous Delivery in 60 Minutes.mp4

195.6 MB

TR18 Hacking and Securing SAP Hana Applications.en.transcribed.srt

86.0 KB

TR18 Hacking and Securing SAP Hana Applications.mp4

79.3 MB

TR18 Hunting Android Malware.en.transcribed.srt

124.7 KB

TR18 Hunting Android Malware.mp4

52.1 MB

TR18 Hunting crypto secrets in SAP systems.en.transcribed.srt

142.8 KB

TR18 Hunting crypto secrets in SAP systems.mp4

107.2 MB

TR18 I forgot Your password.en.transcribed.srt

105.0 KB

TR18 I forgot Your password.mp4

104.2 MB

TR18 Introducing a Comprehensive Active Directory Security Metric.en.transcribed.srt

113.8 KB

TR18 Introducing a Comprehensive Active Directory Security Metric.mp4

113.6 MB

TR18 Mind the Gap, Bro.en.transcribed.srt

171.1 KB

TR18 Mind the Gap, Bro.mp4

108.6 MB

TR18 Mobile App Security Fails and How To Survive Them.en.transcribed.srt

131.7 KB

TR18 Mobile App Security Fails and How To Survive Them.mp4

129.3 MB

TR18 NFC Payments.en.transcribed.srt

73.5 KB

TR18 NFC Payments.mp4

45.3 MB

TR18 No royal road advanced analysis for 'advanced' threats.en.transcribed.srt

143.1 KB

TR18 No royal road advanced analysis for 'advanced' threats.mp4

135.4 MB

TR18 Real-Life Network and Security Automation.en.transcribed.srt

111.0 KB

TR18 Real-Life Network and Security Automation.mp4

132.8 MB

TR18 Reverse Engineering Black Box Systems with GreatFET.en.transcribed.srt

160.5 KB

TR18 Reverse Engineering Black Box Systems with GreatFET.mp4

94.1 MB

TR18 Robots Panel.en.transcribed.srt

211.4 KB

TR18 Robots Panel.mp4

103.6 MB

TR18 SAP BUGS The Phantom Security.en.transcribed.srt

43.4 KB

TR18 SAP BUGS The Phantom Security.mp4

50.2 MB

TR18 SAP IGS The 'vulnerable' forgotten component.en.transcribed.srt

86.8 KB

TR18 SAP IGS The 'vulnerable' forgotten component.mp4

77.5 MB

TR18 SAP Security patches_ The importance, difficulties and solutions!.mp4

53.6 MB

TR18 Security Appliances Internals.en.transcribed.srt

129.4 KB

TR18 Security Appliances Internals.mp4

124.6 MB

TR18 Subverting Trust in Windows.en.transcribed.srt

129.6 KB

TR18 Subverting Trust in Windows.mp4

120.3 MB

TR18 The Language of Security.en.transcribed.srt

163.4 KB

TR18 The Language of Security.mp4

142.7 MB

TR18 The Wolf In SGX Clothing.en.transcribed.srt

167.0 KB

TR18 The Wolf In SGX Clothing.mp4

75.2 MB

TR18 Unifying RF Fuzzing Techniques under a Common API.en.transcribed.srt

147.3 KB

TR18 Unifying RF Fuzzing Techniques under a Common API.mp4

71.3 MB

TR18 When Virtual Hell Freezes Over.en.transcribed.srt

87.5 KB

TR18 When Virtual Hell Freezes Over.mp4

47.9 MB

TR18 Keynote Mike Ossmann (Inkl. Opening Remarks).en.transcribed.srt

150.6 KB

TR18 Keynote Mike Ossmann (Inkl. Opening Remarks).mp4

170.6 MB

TR18 NGI18 Advances in IPv6 Network Reconnaissance.en.transcribed.srt

56.2 KB

TR18 NGI18 Advances in IPv6 Network Reconnaissance.mp4

33.1 MB

TR18 NGI18 Are you sure - you are alone Pwning IoT-CCTV devices!.en.transcribed.srt

41.1 KB

TR18 NGI18 Are you sure - you are alone Pwning IoT-CCTV devices!.mp4

43.3 MB

TR18 NGI18 BREAKING THE LAWS OF ROBOTICS ATTACKING INDUSTRIAL ROBOTS.mp4

86.9 MB

TR18 NGI18 Dynamic IPv6 Prefix Problems and VPNs.en.transcribed.srt

107.8 KB

TR18 NGI18 Dynamic IPv6 Prefix Problems and VPNs.mp4

66.2 MB

TR18 NGI18 Frustrating Emulation with Delay Slots in MIPS and MIPS16.en.transcribed.srt

74.9 KB

TR18 NGI18 Frustrating Emulation with Delay Slots in MIPS and MIPS16.mp4

62.8 MB

TR18 NGI18 Hacking Robots Before Skynet.mp4

101.5 MB

TR18 NGI18 IPv6 Address Management - The First Five Years.en.transcribed.srt

127.0 KB

TR18 NGI18 IPv6 Address Management - The First Five Years.mp4

97.0 MB

TR18 NGI18 IPv6 in the Cloud - Back to Square One.en.transcribed.srt

110.6 KB

TR18 NGI18 IPv6 in the Cloud - Back to Square One.mp4

99.7 MB

TR18 NGI18 IoT processor and binary breakdown.en.transcribed.srt

148.1 KB

TR18 NGI18 IoT processor and binary breakdown.mp4

85.9 MB

TR18 NGI18 Knockin' on IPv6's doors.en.transcribed.srt

170.7 KB

TR18 NGI18 Knockin' on IPv6's doors.mp4

109.9 MB

TR18 NGI18 NGI18 Keynote by Graeme Neilson.en.transcribed.srt

102.6 KB

TR18 NGI18 NGI18 Keynote by Graeme Neilson.mp4

68.0 MB

TR18 NGI18 Practical Magic Behavior-based Safety Design for IoT.en.transcribed.srt

131.3 KB

TR18 NGI18 Practical Magic Behavior-based Safety Design for IoT.mp4

74.7 MB

TR18 NGI18 Securing your in-ear fitness coach Challenges in hardening next generation wearables.en.transcribed.srt

144.6 KB

TR18 NGI18 Securing your in-ear fitness coach Challenges in hardening next generation wearables.mp4

88.6 MB

TR18 NGI18 Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.en.transcribed.srt

146.0 KB

TR18 NGI18 Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.mp4

106.2 MB

TR18 NGI18 Subs, Ships, & Satellites The Internet of Invisible Things.en.transcribed.srt

184.9 KB

TR18 NGI18 Subs, Ships, & Satellites The Internet of Invisible Things.mp4

116.0 MB

TR18 NGI18 Swimming IoT or how to hack a Yacht.mp4

92.6 MB

TR18 NGI18 Things Attack Peek into a 18 months IoT honeypot.en.transcribed.srt

111.4 KB

TR18 NGI18 Things Attack Peek into a 18 months IoT honeypot.mp4

71.4 MB

The Hackers' Sanctuary City.mp4

12.7 MB

/TROOPERS 2019/

TR19 A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.en.transcribed.srt

191.1 KB

TR19 A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.mp4

62.6 MB

TR19 A PKI distributed is a PKI solved.en.transcribed.srt

52.3 KB

TR19 A PKI distributed is a PKI solved.mp4

26.5 MB

TR19 Abusing privileged file operations on Windows.en.transcribed.srt

45.3 KB

TR19 Abusing privileged file operations on Windows.mp4

34.9 MB

TR19 Active Directory and Azure - Core Security Principles.en.transcribed.srt

140.1 KB

TR19 Active Directory and Azure - Core Security Principles.mp4

98.8 MB

TR19 Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.en.transcribed.srt

81.0 KB

TR19 Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.mp4

37.4 MB

TR19 Automotive Penetration Testing with Scapy.mp4

82.9 MB

TR19 BIZEC Discussion Panel Past, Present and Future of SAP Security.en.transcribed.srt

125.6 KB

TR19 BIZEC Discussion Panel Past, Present and Future of SAP Security.mp4

46.1 MB

TR19 Beyond Windows Forensics with Built-in Microsoft Tooling.en.transcribed.srt

133.1 KB

TR19 Beyond Windows Forensics with Built-in Microsoft Tooling.mp4

68.4 MB

TR19 BloodHound and the Adversary Resilience Methodology.en.transcribed.srt

142.6 KB

TR19 BloodHound and the Adversary Resilience Methodology.mp4

77.0 MB

TR19 Bluetooth, does it spark joy.en.transcribed.srt

128.3 KB

TR19 Bluetooth, does it spark joy.mp4

69.8 MB

TR19 Car Manufacturer meets Security Community.en.transcribed.srt

150.8 KB

TR19 Car Manufacturer meets Security Community.mp4

65.5 MB

TR19 Closing Remarks.en.transcribed.srt

38.9 KB

TR19 Closing Remarks.mp4

50.1 MB

TR19 CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics....en.transcribed.srt

136.1 KB

TR19 CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics....mp4

68.4 MB

TR19 Dark Clouds ahead Attacking a Cloud Foundry Implementation.en.transcribed.srt

119.8 KB

TR19 Dark Clouds ahead Attacking a Cloud Foundry Implementation.mp4

64.5 MB

TR19 Digital Forensics and Incident Response in G Suite.en.transcribed.srt

84.5 KB

TR19 Digital Forensics and Incident Response in G Suite.mp4

39.8 MB

TR19 Distributed Security Alerting.en.transcribed.srt

139.9 KB

TR19 Distributed Security Alerting.mp4

58.8 MB

TR19 Ethics in Attacker Research.en.transcribed.srt

19.7 KB

TR19 Ethics in Attacker Research.mp4

12.7 MB

TR19 Evolution of kernel fuzzers in NetBSD.mp4

39.2 MB

TR19 Fetch exploit - Attacks against source code downloaders.en.transcribed.srt

103.1 KB

TR19 Fetch exploit - Attacks against source code downloaders.mp4

83.6 MB

TR19 Finding the best threat intelligence provider.en.transcribed.srt

130.0 KB

TR19 Finding the best threat intelligence provider.mp4

49.2 MB

TR19 From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.en.transcribed.srt

200.4 KB

TR19 From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.mp4

96.0 MB

TR19 Fun and Pitfalls in a World of VDSL.en.transcribed.srt

135.4 KB

TR19 Fun and Pitfalls in a World of VDSL.mp4

55.8 MB

TR19 Fun with LDAP and Kerberos Attacking AD from non-Windows machines.en.transcribed.srt

183.1 KB

TR19 Fun with LDAP and Kerberos Attacking AD from non-Windows machines.mp4

75.4 MB

TR19 HackDMI.en.transcribed.srt

67.8 KB

TR19 HackDMI.mp4

38.5 MB

TR19 Hardware Side Channel attacks on the cheapest.en.transcribed.srt

132.2 KB

TR19 Hardware Side Channel attacks on the cheapest.mp4

63.7 MB

TR19 Hitting the Gym The Anatomy of a Killer Workout.mp4

53.4 MB

TR19 How we made the badge BEFORE you showed up!.en.transcribed.srt

50.7 KB

TR19 How we made the badge BEFORE you showed up!.mp4

31.3 MB

TR19 I am AD FS and so can you Attacking Active Directory Federated Services.en.transcribed.srt

145.7 KB

TR19 I am AD FS and so can you Attacking Active Directory Federated Services.mp4

57.3 MB

TR19 I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.en.transcribed.srt

119.6 KB

TR19 I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.mp4

71.4 MB

TR19 IPv666 – Address of the Beast.en.transcribed.srt

148.1 KB

TR19 IPv666 – Address of the Beast.mp4

54.5 MB

TR19 Introducing Faction A modern, powerful, multiplayer C2 framework.en.transcribed.srt

161.6 KB

TR19 Introducing Faction A modern, powerful, multiplayer C2 framework.mp4

115.2 MB

TR19 Introduction to Practical Ethics for Security Practitioners.en.transcribed.srt

144.1 KB

TR19 Introduction to Practical Ethics for Security Practitioners.mp4

67.2 MB

TR19 IoT backdoors in cars.mp4

63.5 MB

TR19 Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.en.transcribed.srt

160.1 KB

TR19 Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.mp4

76.0 MB

TR19 Keynote - Inside the Machine.en.transcribed.srt

194.3 KB

TR19 Keynote - Inside the Machine.mp4

82.7 MB

TR19 MS Office file format sorcery.en.transcribed.srt

124.0 KB

TR19 MS Office file format sorcery.mp4

90.7 MB

TR19 Medical Device Security - Please (don't) be patient!.en.transcribed.srt

107.2 KB

TR19 Medical Device Security - Please (don't) be patient!.mp4

41.0 MB

TR19 Microsoft IT (secure) journey to IPv6-only.en.transcribed.srt

177.9 KB

TR19 Microsoft IT (secure) journey to IPv6-only.mp4

60.3 MB

TR19 Modmob tools Home made tools to test mobile devices and monitor networks.en.transcribed.srt

140.4 KB

TR19 Modmob tools Home made tools to test mobile devices and monitor networks.mp4

70.0 MB

TR19 NAT64 Day 2019 @ AWK.en.transcribed.srt

101.5 KB

TR19 NAT64 Day 2019 @ AWK.mp4

57.8 MB

TR19 NGI - Keynote.en.transcribed.srt

179.8 KB

TR19 NGI - Keynote.mp4

97.4 MB

TR19 NGI - Opening Remarks.en.transcribed.srt

7.7 KB

TR19 NGI - Opening Remarks.mp4

3.3 MB

TR19 No more dumb hex!.en.transcribed.srt

124.8 KB

TR19 No more dumb hex!.mp4

54.9 MB

TR19 Not A Security Boundary Breaking Forest Trusts.en.transcribed.srt

126.1 KB

TR19 Not A Security Boundary Breaking Forest Trusts.mp4

52.9 MB

TR19 Old New Things An examination of the Philips TriMedia architecture.en.transcribed.srt

69.3 KB

TR19 Old New Things An examination of the Philips TriMedia architecture.mp4

45.8 MB

TR19 Opening remarks.en.transcribed.srt

34.8 KB

TR19 Opening remarks.mp4

27.9 MB

TR19 Practical attack simulations in Critical National Infrastructure (CNI).en.transcribed.srt

63.7 KB

TR19 Practical attack simulations in Critical National Infrastructure (CNI).mp4

21.4 MB

TR19 SI6 IPv6 Toolkit v3.0.en.transcribed.srt

103.9 KB

TR19 SI6 IPv6 Toolkit v3.0.mp4

62.8 MB

TR19 SIM Simulator.en.transcribed.srt

48.1 KB

TR19 SIM Simulator.mp4

23.5 MB

TR19 Sneaking Past Device Guard.en.transcribed.srt

112.4 KB

TR19 Sneaking Past Device Guard.mp4

74.7 MB

TR19 The Anatomy of Windows Telemetry.en.transcribed.srt

130.8 KB

TR19 The Anatomy of Windows Telemetry.mp4

61.6 MB

TR19 The evolution of IoT botnets, including Torii and a smart-home hack..en.transcribed.srt

85.2 KB

TR19 The evolution of IoT botnets, including Torii and a smart-home hack..mp4

45.7 MB

TR19 Threat Modelling and Beyond for Cisco ACI.en.transcribed.srt

92.8 KB

TR19 Threat Modelling and Beyond for Cisco ACI.mp4

37.7 MB

TR19 VXLAN Security or Injection, and protection.mp4

51.4 MB

TR19 Vehicle alarms' insecurity and something else.en.transcribed.srt

78.7 KB

TR19 Vehicle alarms' insecurity and something else.mp4

62.5 MB

TR19 Watchgate - How stupid smartwatches threaten the security and safety of our children.en.transcribed.srt

97.6 KB

TR19 Watchgate - How stupid smartwatches threaten the security and safety of our children.mp4

64.4 MB

TR19 We are Listening – Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..en.transcribed.srt

128.5 KB

TR19 We are Listening – Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..mp4

48.1 MB

TR19 What are the IPv6 news from the IETF.en.transcribed.srt

222.3 KB

TR19 What are the IPv6 news from the IETF.mp4

113.3 MB

TR19 Wild West of Conference Apps Security.en.transcribed.srt

86.3 KB

TR19 Wild West of Conference Apps Security.mp4

32.9 MB

TR19 You (dis)liked mimikatz Wait for kekeo.en.transcribed.srt

149.5 KB

TR19 You (dis)liked mimikatz Wait for kekeo.mp4

81.7 MB

TR19 You try to detect mimikatz.en.transcribed.srt

68.0 KB

TR19 You try to detect mimikatz.mp4

52.3 MB

TR19 macOS - Gaining root with harmless AppStore apps.en.transcribed.srt

103.1 KB

TR19 macOS - Gaining root with harmless AppStore apps.mp4

111.7 MB

TROOPERS19 - Day #2 - A Morning Address.en.transcribed.srt

1.3 KB

TROOPERS19 - Day #2 - A Morning Address.mp4

6.8 MB

/

TROOPERS logo.gif

38.6 KB

TROOPERS logo.png

295.5 KB

TROOPERS thank you.txt

0.6 KB

 

Total files 594


Copyright © 2025 FileMood.com