/TROOPERS 2008/
|
TROOPERS08.org_AMATO Francisco - evilgrade.mp4
|
3.1 MB
|
TROOPERS08.org_BELENKO Andrej - password recovery.mp4
|
161.5 MB
|
TROOPERS08.org_BRANCO Rodrigo - KIDS.mp4
|
168.2 MB
|
TROOPERS08.org_BRATUS Sergey - AP fingerprinting.bak.mp4
|
112.2 MB
|
TROOPERS08.org_BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4
|
174.1 MB
|
TROOPERS08.org_CALLAS Jon - Straight Talk abaou Crypto.mp4
|
173.8 MB
|
TROOPERS08.org_CHIESA Raoul - SCADA and national critical infrastructures.mp4
|
159.1 MB
|
TROOPERS08.org_DJB - Keynote.mp4
|
169.5 MB
|
TROOPERS08.org_De Haas Job - Side channel analysis.mp4
|
169.7 MB
|
TROOPERS08.org_HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4
|
182.6 MB
|
TROOPERS08.org_HOLZ Thorsten - virtual-honeypots.mp4
|
161.4 MB
|
TROOPERS08.org_KEMP Michael - virtualise.mp4
|
150.7 MB
|
TROOPERS08.org_KLOSE Roger - ERNW_ESX-In-Security.mp4
|
107.5 MB
|
TROOPERS08.org_KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4
|
147.8 MB
|
TROOPERS08.org_Kuhn Friedwart - RMS.mp4
|
170.2 MB
|
TROOPERS08.org_LOGLOGIC - log management.mp4
|
164.0 MB
|
TROOPERS08.org_ROECHER Dror-John - the data went down the drain.mp4
|
159.6 MB
|
TROOPERS08.org_SPEICHERT Horst - hackertools according to german law.mp4
|
170.1 MB
|
TROOPERS08.org_STREHLE Rolf - self defending networks.mp4
|
168.1 MB
|
TROOPERS08.org_THUMANN Michael - Reversing.mp4
|
162.2 MB
|
TROOPERS08.org_THUMANN Michael - Secondlife (TM).mp4
|
165.6 MB
|
TROOPERS08.org_Troopers IBM Appscan.mp4
|
161.7 MB
|
TROOPERS08.org_WAISSBEIN Ariel - penetration testing learning kit.mp4
|
170.8 MB
|
TROOPERS09_baier_access_control_service.mp4
|
145.0 MB
|
TROOPERS09_bratus_embedded_devices.mp4
|
110.9 MB
|
TROOPERS09_gauci_henrique_web_application_firewalls.mp4
|
57.7 MB
|
TROOPERS09_rey_keynote_stop_the_madness.mp4
|
28.8 MB
|
TROOPERS09_rey_ruediger_codenomicon_fuzzer.mp4
|
88.6 MB
|
/TROOPERS 2009/
|
TROOPERS09 - .NET Access Control Service - Dominick Baier.mp4
|
89.1 MB
|
TROOPERS09 - .NET Access Control Service - Dominick Baier.srt
|
49.7 KB
|
TROOPERS09 - Stop the Madness - Keynote by Enno Rey.mp4
|
63.0 MB
|
TROOPERS09 - Stop the Madness - Keynote by Enno Rey.srt
|
52.6 KB
|
TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.mp4
|
140.3 MB
|
TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.srt
|
40.4 KB
|
TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.mp4
|
47.9 MB
|
TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.srt
|
15.4 KB
|
/TROOPERS 2010/
|
TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4
|
178.9 MB
|
TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt
|
84.8 KB
|
TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4
|
108.4 MB
|
TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt
|
72.0 KB
|
TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4
|
148.8 MB
|
TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt
|
95.4 KB
|
TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4
|
92.3 MB
|
TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt
|
60.3 KB
|
TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.mp4
|
102.4 MB
|
TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.srt
|
90.7 KB
|
TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4
|
143.3 MB
|
TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt
|
83.6 KB
|
TROOPERS10 - How to fail an audit - Martin Freiss.mp4
|
126.1 MB
|
TROOPERS10 - How to rate the security of closed source software - Michael Thumann.mp4
|
142.7 MB
|
TROOPERS10 - How to rate the security of closed source software - Michael Thumann.srt
|
74.0 KB
|
TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4
|
166.5 MB
|
TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.srt
|
121.0 KB
|
TROOPERS10 - Netscreen of Death - Graeme Neilson.mp4
|
136.3 MB
|
TROOPERS10 - Netscreen of Death - Graeme Neilson.srt
|
84.4 KB
|
TROOPERS10 - Rapid Risk Assessment - Enno Rey.mp4
|
121.4 MB
|
TROOPERS10 - Rapid Risk Assessment - Enno Rey.srt
|
85.8 KB
|
TROOPERS10 - Return Oriented Rootkits - Ralf Hund.mp4
|
120.3 MB
|
TROOPERS10 - Return Oriented Rootkits - Ralf Hund.srt
|
84.5 KB
|
TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.mp4
|
113.1 MB
|
TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.srt
|
31.4 KB
|
TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.mp4
|
104.5 MB
|
TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.srt
|
69.6 KB
|
TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4
|
50.5 MB
|
TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt
|
33.5 KB
|
/TROOPERS 2011/
|
TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4
|
140.2 MB
|
TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt
|
79.9 KB
|
TROOPERS11 - Cache on Delivery - Marco Slaviero.mp4
|
117.9 MB
|
TROOPERS11 - Cache on Delivery - Marco Slaviero.srt
|
77.9 KB
|
TROOPERS11 - Do you know what s happening in your $application - Felix Leder.mp4
|
160.0 MB
|
TROOPERS11 - Do you know what s happening in your $application - Felix Leder.srt
|
94.0 KB
|
TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4
|
93.0 MB
|
TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt
|
76.6 KB
|
TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.mp4
|
92.4 MB
|
TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.srt
|
56.9 KB
|
TROOPERS11 - I FOCA a MIL Domain - Chema Alonso.mp4
|
86.5 MB
|
TROOPERS11 - Keynote Day 1 - Enno Rey.mp4
|
80.9 MB
|
TROOPERS11 - Keynote Day 1 - Enno Rey.srt
|
68.4 KB
|
TROOPERS11 - Keynote Day 2 - Richard Thieme.mp4
|
161.6 MB
|
TROOPERS11 - Keynote Day 2 - Richard Thieme.srt
|
100.0 KB
|
TROOPERS11 - Milking a horse - Meder Kydyraliev.mp4
|
71.1 MB
|
TROOPERS11 - Milking a horse - Meder Kydyraliev.srt
|
75.2 KB
|
TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.mp4
|
102.5 MB
|
TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.srt
|
52.3 KB
|
TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.mp4
|
81.0 MB
|
TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.srt
|
38.2 KB
|
TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.mp4
|
50.8 MB
|
TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.srt
|
38.5 KB
|
/TROOPERS 2012/
|
TROOPERS12 - Closing Remarks.mp4
|
20.8 MB
|
TROOPERS12 - Opening Teaser.mp4
|
21.2 MB
|
/TROOPERS 2013/
|
TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4
|
185.8 MB
|
TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt
|
13.9 KB
|
TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.mp4
|
193.4 MB
|
TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.srt
|
43.8 KB
|
TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.mp4
|
643.6 MB
|
TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.srt
|
73.7 KB
|
TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.mp4
|
40.4 MB
|
TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.srt
|
43.8 KB
|
TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4
|
112.5 MB
|
TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt
|
50.7 KB
|
TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.mp4
|
367.2 MB
|
TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.srt
|
61.1 KB
|
TROOPERS13 - Hacking and Craft - Jeff Gough.mp4
|
348.6 MB
|
TROOPERS13 - Hacking and Craft - Jeff Gough.srt
|
67.5 KB
|
TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.mp4
|
378.9 MB
|
TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.srt
|
71.9 KB
|
TROOPERS13 - Keynote Day 1 by Rodrigo Branco.mp4
|
490.3 MB
|
TROOPERS13 - Keynote Day 1 by Rodrigo Branco.srt
|
122.1 KB
|
TROOPERS13 - Keynote Day 2 by Chris Nickerson.mp4
|
284.0 MB
|
TROOPERS13 - Keynote Day 2 by Chris Nickerson.srt
|
74.1 KB
|
TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.mp4
|
725.7 MB
|
TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.srt
|
84.6 KB
|
TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.mp4
|
415.0 MB
|
TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.srt
|
75.1 KB
|
TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4
|
602.3 MB
|
TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.srt
|
68.0 KB
|
TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4
|
545.0 MB
|
TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt
|
94.7 KB
|
TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.mp4
|
270.9 MB
|
TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.srt
|
69.5 KB
|
TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.mp4
|
266.4 MB
|
TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.srt
|
77.2 KB
|
TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.mp4
|
389.0 MB
|
TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.srt
|
71.4 KB
|
TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4
|
40.8 MB
|
TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.srt
|
67.4 KB
|
TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4
|
224.4 MB
|
TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt
|
75.2 KB
|
TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4
|
702.2 MB
|
TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt
|
72.1 KB
|
TROOPERS13 - We Came In Peace - They Don t Hackers vs. CyberWar - fx.srt
|
80.9 KB
|
TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.mp4
|
448.1 MB
|
TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.srt
|
82.5 KB
|
TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.mp4
|
390.8 MB
|
TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.srt
|
62.7 KB
|
/TROOPERS 2014/
|
TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.mp4
|
266.4 MB
|
TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.srt
|
72.6 KB
|
TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4
|
320.5 MB
|
TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt
|
55.9 KB
|
TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.mp4
|
136.3 MB
|
TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.srt
|
40.6 KB
|
TROOPERS14 - Closing Remarks - Enno Rey.mp4
|
203.8 MB
|
TROOPERS14 - Closing Remarks - Enno Rey.srt
|
26.1 KB
|
TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4
|
326.4 MB
|
TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).srt
|
81.5 KB
|
TROOPERS14 - Georg Bakos - Keynote.mp4
|
529.9 MB
|
TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.mp4
|
303.6 MB
|
TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.srt
|
88.3 KB
|
TROOPERS14 - Granular Trust; making it work - Toby Kohlenberg.srt
|
93.4 KB
|
TROOPERS14 - Granular Trust_ making it work - Toby Kohlenberg.mp4
|
431.6 MB
|
TROOPERS14 - How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4
|
250.6 MB
|
TROOPERS14 - How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4
|
258.3 MB
|
TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4
|
403.6 MB
|
TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.srt
|
55.1 KB
|
TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4
|
289.8 MB
|
TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt
|
44.3 KB
|
TROOPERS14 - Keynote - FX.mp4
|
93.2 MB
|
TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4
|
408.7 MB
|
TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt
|
42.8 KB
|
TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.mp4
|
355.8 MB
|
TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.srt
|
92.8 KB
|
TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.mp4
|
168.1 MB
|
TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.srt
|
79.4 KB
|
TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4
|
400.1 MB
|
TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt
|
64.8 KB
|
TROOPERS14 - Psychology of Security - Stefan Schumacher.mp4
|
249.5 MB
|
TROOPERS14 - Psychology of Security - Stefan Schumacher.srt
|
86.2 KB
|
TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4
|
418.7 MB
|
TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt
|
70.2 KB
|
TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4
|
381.4 MB
|
TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt
|
72.3 KB
|
TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.mp4
|
356.7 MB
|
TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.srt
|
62.4 KB
|
TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.mp4
|
34.3 MB
|
TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.srt
|
69.1 KB
|
TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.mp4
|
309.6 MB
|
TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.srt
|
86.7 KB
|
TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.mp4
|
272.8 MB
|
TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.srt
|
64.6 KB
|
TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4
|
41.1 MB
|
TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt
|
58.8 KB
|
TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.mp4
|
6.2 MB
|
TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.srt
|
29.8 KB
|
/TROOPERS 2015 IPv6 Security Summit/
|
[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4
|
1.9 GB
|
[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt
|
98.7 KB
|
[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).mp4
|
1.9 GB
|
[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).srt
|
116.0 KB
|
[TROOPERS15] Christopher Werny - Basic Attacks and Defences (2 2).mp4
|
750.5 MB
|
[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.mp4
|
1.6 GB
|
[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.srt
|
106.8 KB
|
[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4
|
998.4 MB
|
[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt
|
66.9 KB
|
[TROOPERS15] Enno Rey - 48 Considered Harmful.mp4
|
1.2 GB
|
[TROOPERS15] Enno Rey - 48 Considered Harmful.srt
|
66.6 KB
|
[TROOPERS15] Enno Rey - Reliable & Secure DHCPv6.mp4
|
751.6 MB
|
[TROOPERS15] Eric Vyncke - Routing Header Is Back... Should We Panic.mp4
|
359.3 MB
|
[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4
|
1.9 GB
|
[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt
|
125.5 KB
|
[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4
|
1.8 GB
|
[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.srt
|
142.7 KB
|
[TROOPERS15] Gabriel Muller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4
|
602.3 MB
|
[TROOPERS15] Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4
|
345.2 MB
|
[TROOPERS15] Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4
|
750.1 MB
|
[TROOPERS15] Julian Bangert - Tales of 6006 Protocols.mp4
|
277.5 MB
|
[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4
|
2.1 GB
|
[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt
|
127.5 KB
|
[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4
|
521.0 MB
|
[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt
|
85.4 KB
|
/TROOPERS 2015/
|
TROOPERS15 - Welcome Trailer.mp4
|
9.6 MB
|
[TROOPERS15] Andreas Lindh - Defender Economics.mp4
|
146.5 MB
|
[TROOPERS15] Andreas Lindh - Defender Economics.srt
|
62.4 KB
|
[TROOPERS15] Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4
|
735.0 MB
|
[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.mp4
|
291.2 MB
|
[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.srt
|
51.0 KB
|
[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.mp4
|
327.5 MB
|
[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.srt
|
55.6 KB
|
[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4
|
226.1 MB
|
[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt
|
97.6 KB
|
[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4
|
352.1 MB
|
[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt
|
77.0 KB
|
[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.mp4
|
238.5 MB
|
[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.srt
|
70.5 KB
|
[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.mp4
|
231.0 MB
|
[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.srt
|
49.5 KB
|
[TROOPERS15] Enno Rey - Opening Remarks.mp4
|
69.9 MB
|
[TROOPERS15] Enno Rey - Opening Remarks.srt
|
9.3 KB
|
[TROOPERS15] Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4
|
294.1 MB
|
[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4
|
276.2 MB
|
[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt
|
67.2 KB
|
[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.mp4
|
281.9 MB
|
[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.srt
|
84.4 KB
|
[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4
|
248.4 MB
|
[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt
|
66.9 KB
|
[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4
|
181.9 MB
|
[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt
|
39.0 KB
|
[TROOPERS15] Haroon Meer - Keynote.mp4
|
171.4 MB
|
[TROOPERS15] Haroon Meer - Keynote.srt
|
96.0 KB
|
[TROOPERS15] Ivan Pepelnjak - Automating Network Security.mp4
|
118.4 MB
|
[TROOPERS15] Ivan Pepelnjak - Automating Network Security.srt
|
72.9 KB
|
[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.mp4
|
230.9 MB
|
[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.srt
|
86.4 KB
|
[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4
|
329.7 MB
|
[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt
|
68.1 KB
|
[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4
|
495.1 MB
|
[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt
|
89.2 KB
|
[TROOPERS15] Martijn Grooten - The State of Email in 2015.mp4
|
91.4 MB
|
[TROOPERS15] Martijn Grooten - The State of Email in 2015.srt
|
66.2 KB
|
[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.mp4
|
227.8 MB
|
[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.srt
|
80.0 KB
|
[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4
|
295.5 MB
|
[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt
|
87.7 KB
|
[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4
|
461.9 MB
|
[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt
|
88.3 KB
|
[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4
|
159.8 MB
|
[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt
|
96.8 KB
|
[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4
|
247.2 MB
|
[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.srt
|
73.7 KB
|
[TROOPERS15] Sergej Bratus - Keynote.mp4
|
318.8 MB
|
[TROOPERS15] Sergej Bratus - Keynote.srt
|
86.4 KB
|
[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4
|
141.8 MB
|
[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt
|
47.1 KB
|
[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4
|
243.3 MB
|
[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt
|
72.7 KB
|
[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4
|
159.8 MB
|
[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt
|
68.4 KB
|
[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4
|
214.2 MB
|
[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt
|
79.1 KB
|
/TROOPERS 2016 IPv6 Summit/
|
Advanced IPv6 Attacks Using Chiron Training.mp4
|
740.1 MB
|
Advanced IPv6 Network Reconnaisance.mp4
|
508.4 MB
|
Anonymization IPv6 in PCAPs - Challenges and Wins.mp4
|
192.3 MB
|
Automating IPv6 Deployments.mp4
|
133.6 MB
|
Basic Attacks and Mitigation Strategies.mp4
|
458.7 MB
|
Building a Reliable and Secure IPv6 WiFi Network.mp4
|
229.4 MB
|
Developing an Enterprise IPv6 Security Strategy.mp4
|
221.5 MB
|
IPv6 First Hop Security Features on HP Devices.mp4
|
134.7 MB
|
IPv6 Security Fundamentals.mp4
|
382.0 MB
|
NATTED - A Field Report.mp4
|
218.6 MB
|
Recent IPv6 Standardization Efforts.mp4
|
420.1 MB
|
Remote Access and Business Partner Connections.mp4
|
278.1 MB
|
Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4
|
113.2 MB
|
Security Assessment of Microsoft DirectAccess.mp4
|
209.3 MB
|
/TROOPERS 2016/
|
An unknown SAP default Account.mp4
|
198.9 MB
|
Attacking Nextgen Firewalls.mp4
|
266.7 MB
|
Attacking and Protecting Big Data Environments.mp4
|
161.9 MB
|
Better Crypto.mp4
|
83.9 MB
|
Broadcasting your Attack.mp4
|
213.4 MB
|
Caring for File Formats.mp4
|
95.9 MB
|
Closing Remarks.mp4
|
325.0 MB
|
Crypto Code.mp4
|
105.3 MB
|
Deep dive into SAP archive file formats.mp4
|
253.7 MB
|
Exploiting the Unexploitable.mp4
|
196.7 MB
|
Freifunk.mp4
|
69.1 MB
|
Hiding your White Box Designs is Not Enough.mp4
|
268.7 MB
|
Hollywood Hacking Facts and Fiction.mp4
|
157.7 MB
|
How to Implement an SDL in a Large Company.mp4
|
93.6 MB
|
Imma Chargin Mah Lazer.mp4
|
252.6 MB
|
Keynote - A Praise for Hackers.mp4
|
314.7 MB
|
Keynote - Ethics in Networked Systems Research.mp4
|
193.6 MB
|
Lets Play Hide and Seek in the Cloud.mp4
|
24.2 MB
|
Medical Device Security Hack or Hype.mp4
|
258.3 MB
|
Mind The Gap.mp4
|
115.5 MB
|
Offensive Active Directory with Powershell.mp4
|
119.6 MB
|
One Tool To Rule Them All.mp4
|
25.9 MB
|
Passive Intelligence Gathering Analytics.mp4
|
183.7 MB
|
Patch me if you can.mp4
|
264.9 MB
|
Preventing vulns in HANA based deployments.mp4
|
224.4 MB
|
Protecting Hosts in IPv6 Networks.mp4
|
253.9 MB
|
Rapid Radio Reversing.mp4
|
123.2 MB
|
Real Life Software Defined Security.mp4
|
99.4 MB
|
Reverse engineering a Digital Two way Radio.mp4
|
99.9 MB
|
Security Evaluation of Dual-Stack Systems.mp4
|
212.2 MB
|
TR16 - Day 1 Visuals.mp4
|
93.4 MB
|
TROOPERS Conference 360 Teaser - must watch in YouTube app.mp4
|
13.0 MB
|
The Chimaera Processor.mp4
|
43.9 MB
|
The Internet of Deadly Things.mp4
|
31.8 MB
|
The Joy of Sandbox Mitigations.mp4
|
103.1 MB
|
The Kings in your Castle.mp4
|
119.1 MB
|
The Road to secure Smart Cars.mp4
|
199.3 MB
|
Towards a LangSec Aware SDLC.mp4
|
95.8 MB
|
Unpatchable.mp4
|
214.3 MB
|
Witness the Russian attack Live demos of their steps tools techniques.mp4
|
81.2 MB
|
unrubby.mp4
|
114.0 MB
|
/TROOPERS 2017/
|
TR17 - IoT to Gateway - Gabriel Mueller.mp4
|
136.6 MB
|
TR17 NGI TRACK1 Authenticate Like A Boss Pete Herzog.mp4
|
72.9 MB
|
TR17 NGI TRACK1 Dissecting Modern 3G 4G Cellular Modems Harald Welte.mp4
|
98.4 MB
|
TR17 NGI TRACK1 Hacks and Case Studies Cellular Communications Brian Butterly.mp4
|
133.1 MB
|
TR17 NGI TRACK1 Looking through the web of pages to the Internet of Things Gabriel Weaver.mp4
|
111.4 MB
|
TR17 NGI TRACK1 Metasploit Hardware Bridge Hacking Craig Smith.mp4
|
108.3 MB
|
TR17 NGI TRACK1 Pufs ’n stuff Getting the most of the digital world through physical identities An.mp4
|
85.1 MB
|
TR17 NGI TRACK1 Robo Ethnography Just what can Robots do Brittany Postnikoff.mp4
|
105.7 MB
|
TR17 NGI TRACK1 So You Want To Hack Radios Matt Knight, Marc Newlin.mp4
|
67.5 MB
|
TR17 NGI TRACK1 What happened to your home IoT Hacking and Forensic with 0 Days Soohyun Jin, Moonbe.mp4
|
103.4 MB
|
TR17 NGI TRACK2 Crashing Cisco's Autonomic Network Omar Eissa.mp4
|
75.3 MB
|
TR17 NGI TRACK2 IPv6 Configuration Approaches for Servers Enno Rey.mp4
|
205.9 MB
|
TR17 NGI TRACK2 RIPE Atlas Measuring The Internet Alvaro Vives.mp4
|
131.0 MB
|
TR17 NGI TRACK3 BLE Authentication Design Challenges On Smartphone Controlled IoT Devices Analyzing.mp4
|
109.2 MB
|
TR17 NGI TRACK4 An Introduction to Automotive ECU Research Dieter Spaar.mp4
|
146.6 MB
|
TR17 NGI TRACK4 Hacking TP Link Devices Fernando Gont.mp4
|
154.8 MB
|
TR17 NGI TRACK4 Hidden in plain sight_ How possibly could a decades old standard be broken Paul Mel.mp4
|
81.0 MB
|
TR17 NGI TRACK4 Rusting up your GREATFET Richo Healey, Dominic Spill.mp4
|
172.8 MB
|
TR17 NGI TRACK4 The Hardware Striptease Club Letting The Smart Home Strip Down To Its Innards Stefan.mp4
|
865.2 MB
|
TR17 NGI Track2 An attack in depth analysis of multicast DNS and DNS service recovery Antonios Atlas.mp4
|
143.7 MB
|
TR17 TRACK1 2nd Day Keynote Mara Tam.mp4
|
147.8 MB
|
TR17 TRACK1 A sense of self for bootloaders no more magical writes Rebecca ”bx” Shapiro.mp4
|
59.3 MB
|
TR17 TRACK1 Blinded Random Block Corruptions Rodrigo Branco.mp4
|
95.2 MB
|
TR17 TRACK1 Closing Procedure.mp4
|
101.2 MB
|
TR17 TRACK1 Demystifying COM James Foreshaw.mp4
|
122.3 MB
|
TR17 TRACK1 Exploring North Korea's Surveillance Technology Florian Grunow Niklaus Schiess.mp4
|
115.6 MB
|
TR17 TRACK1 Exploring The Infrared World,Part 2 Mike Ossmann, Dominic Spill.mp4
|
145.1 MB
|
TR17 TRACK1 Graph me, I'm famous! Automated static malware analysis and indicator extraction for bi.mp4
|
134.2 MB
|
TR17 TRACK1 Hardware Root of Mistrust Joseph FitzPatrick Michael Leibowitz.mp4
|
111.8 MB
|
TR17 TRACK1 How we hacked Distributed CMSs Francis Alexander, Bharadwaj Machiraju.mp4
|
122.1 MB
|
TR17 TRACK1 Intel ME The Way of the Static Analysis Dmitry Sklyarov.mp4
|
111.4 MB
|
TR17 TRACK1 Opening Keynote Enno Rey.mp4
|
105.9 MB
|
TR17 TRACK1 Software Attacks on Hypervisor Emulation of Hardware Oleksandr Bazhaniuk.mp4
|
92.8 MB
|
TR17 TRACK1 Unsafe JAX RS Breaking REST API Mikhail Egorov.mp4
|
54.2 MB
|
TR17 TRACK2 Active Directory Security Best Practices - Friedwart Kuhn, Heinrich Wiederkehr.mp4
|
1.4 MB
|
TR17 TRACK2 Architecting a Modern Defense using Device Guard Matt Graeber, Casey Smith.mp4
|
160.9 MB
|
TR17 TRACK2 Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew (2).mp4
|
118.3 MB
|
TR17 TRACK2 Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew.mp4
|
118.3 MB
|
TR17 TRACK2 Data Demolition Gone In 60 Seconds Zoz Brooks.mp4
|
133.5 MB
|
TR17 TRACK2 Hunting Them All Veronica Valeros.mp4
|
128.0 MB
|
TR17 TRACK2 Ruler Pivoting Through Exchange Etienne Stalmans.mp4
|
135.6 MB
|
TR17 TRACK2 Samsung Pay Tokenized Numbers, Flaws and Issues Salvador Mendoza.mp4
|
76.7 MB
|
TR17 TRACK2 Securing Network Automation Ivan Pepelnjak.mp4
|
153.2 MB
|
TR17 TRACK2 Surprise Bitches! The Grugq.mp4
|
425.8 MB
|
TR17 TRACK2 Volatile Memory Behavioral Game Theory in Defensive Security Kelly Shortridge.mp4
|
86.9 MB
|
TR17 TRACK2 Vox Ex Machina Graeme Neilson - YouTube.mp4
|
105.0 MB
|
TR17 TRACK3 Habibi Works An Update On TROOPERS Charity Florian Horsch.mp4
|
48.3 MB
|
TR17 TRACK3 Holy crap I need to pentest SAP from Citrix Joffrey Czarny.mp4
|
94.9 MB
|
TR17 TRACK3 Intercepting SAP SNC protected traffic Martin Gallo.mp4
|
42.5 MB
|
TR17 TRACK3 Lightning Talks Peter Hessler, Edmond Rogers, Sreepriya Chalakkal.mp4
|
17.4 MB
|
TR17 TRACK3 PHP Internals Exploit Dev Edition Emmanuel Law.mp4
|
60.9 MB
|
TR17 TRACK3 Protecting SAP HANA from vulnerabilities and exploits Pablo Artuso, Nahuel Sanchez.mp4
|
84.8 MB
|
TR17 TRACK3 Reverse Engineering ABAP Bytecode for Malware Analysis Hans Christian Esperer, Frederik.mp4
|
87.2 MB
|
TR17 TRACK3 SAP strikes back Your SAP server now counter attacks Vahagn Vardanyan, Dmitry Yudin.mp4
|
105.3 MB
|
TR17 TRACK3 The Metabrik Platform Rapid Development of Reusable Security Tools Patrice Auffret.mp4
|
79.5 MB
|
TR17 TRACK3 You've got mail Owning your business with one email Joris van de Vis.mp4
|
69.2 MB
|
/TROOPERS 2018/
|
TR18 A Stepping Stone To Car Hacking.en.transcribed.srt
|
104.7 KB
|
TR18 A Stepping Stone To Car Hacking.mp4
|
58.6 MB
|
TR18 Active Directory Security The Journey.en.transcribed.srt
|
167.0 KB
|
TR18 Active Directory Security The Journey.mp4
|
119.6 MB
|
TR18 Ads networks are following you, follow them back.en.transcribed.srt
|
121.2 KB
|
TR18 All Your Cloud Are Belong To Us.en.transcribed.srt
|
187.0 KB
|
TR18 All Your Cloud Are Belong To Us.mp4
|
160.1 MB
|
TR18 An ACE Up The Sleeve Designing Security Descriptor Based Backdoors.en.transcribed.srt
|
158.7 KB
|
TR18 An ACE Up The Sleeve Designing Security Descriptor Based Backdoors.mp4
|
116.3 MB
|
TR18 Attack and defend Microsoft Enhanced Security Administrative Environment.en.transcribed.srt
|
139.7 KB
|
TR18 Attack and defend Microsoft Enhanced Security Administrative Environment.mp4
|
104.2 MB
|
TR18 Blue Team Sprint.en.transcribed.srt
|
163.3 KB
|
TR18 Blue Team Sprint.mp4
|
135.1 MB
|
TR18 Closing Remarks.en.transcribed.srt
|
40.4 KB
|
TR18 Closing Remarks.mp4
|
44.3 MB
|
TR18 From Zero to Secure Continuous Delivery in 60 Minutes.en.transcribed.srt
|
173.4 KB
|
TR18 From Zero to Secure Continuous Delivery in 60 Minutes.mp4
|
195.6 MB
|
TR18 Hacking and Securing SAP Hana Applications.en.transcribed.srt
|
86.0 KB
|
TR18 Hacking and Securing SAP Hana Applications.mp4
|
79.3 MB
|
TR18 Hunting Android Malware.en.transcribed.srt
|
124.7 KB
|
TR18 Hunting Android Malware.mp4
|
52.1 MB
|
TR18 Hunting crypto secrets in SAP systems.en.transcribed.srt
|
142.8 KB
|
TR18 Hunting crypto secrets in SAP systems.mp4
|
107.2 MB
|
TR18 I forgot Your password.en.transcribed.srt
|
105.0 KB
|
TR18 I forgot Your password.mp4
|
104.2 MB
|
TR18 Introducing a Comprehensive Active Directory Security Metric.en.transcribed.srt
|
113.8 KB
|
TR18 Introducing a Comprehensive Active Directory Security Metric.mp4
|
113.6 MB
|
TR18 Mind the Gap, Bro.en.transcribed.srt
|
171.1 KB
|
TR18 Mind the Gap, Bro.mp4
|
108.6 MB
|
TR18 Mobile App Security Fails and How To Survive Them.en.transcribed.srt
|
131.7 KB
|
TR18 Mobile App Security Fails and How To Survive Them.mp4
|
129.3 MB
|
TR18 NFC Payments.en.transcribed.srt
|
73.5 KB
|
TR18 NFC Payments.mp4
|
45.3 MB
|
TR18 No royal road advanced analysis for 'advanced' threats.en.transcribed.srt
|
143.1 KB
|
TR18 No royal road advanced analysis for 'advanced' threats.mp4
|
135.4 MB
|
TR18 Real-Life Network and Security Automation.en.transcribed.srt
|
111.0 KB
|
TR18 Real-Life Network and Security Automation.mp4
|
132.8 MB
|
TR18 Reverse Engineering Black Box Systems with GreatFET.en.transcribed.srt
|
160.5 KB
|
TR18 Reverse Engineering Black Box Systems with GreatFET.mp4
|
94.1 MB
|
TR18 Robots Panel.en.transcribed.srt
|
211.4 KB
|
TR18 Robots Panel.mp4
|
103.6 MB
|
TR18 SAP BUGS The Phantom Security.en.transcribed.srt
|
43.4 KB
|
TR18 SAP BUGS The Phantom Security.mp4
|
50.2 MB
|
TR18 SAP IGS The 'vulnerable' forgotten component.en.transcribed.srt
|
86.8 KB
|
TR18 SAP IGS The 'vulnerable' forgotten component.mp4
|
77.5 MB
|
TR18 SAP Security patches_ The importance, difficulties and solutions!.mp4
|
53.6 MB
|
TR18 Security Appliances Internals.en.transcribed.srt
|
129.4 KB
|
TR18 Security Appliances Internals.mp4
|
124.6 MB
|
TR18 Subverting Trust in Windows.en.transcribed.srt
|
129.6 KB
|
TR18 Subverting Trust in Windows.mp4
|
120.3 MB
|
TR18 The Language of Security.en.transcribed.srt
|
163.4 KB
|
TR18 The Language of Security.mp4
|
142.7 MB
|
TR18 The Wolf In SGX Clothing.en.transcribed.srt
|
167.0 KB
|
TR18 The Wolf In SGX Clothing.mp4
|
75.2 MB
|
TR18 Unifying RF Fuzzing Techniques under a Common API.en.transcribed.srt
|
147.3 KB
|
TR18 Unifying RF Fuzzing Techniques under a Common API.mp4
|
71.3 MB
|
TR18 When Virtual Hell Freezes Over.en.transcribed.srt
|
87.5 KB
|
TR18 When Virtual Hell Freezes Over.mp4
|
47.9 MB
|
TR18 Keynote Mike Ossmann (Inkl. Opening Remarks).en.transcribed.srt
|
150.6 KB
|
TR18 Keynote Mike Ossmann (Inkl. Opening Remarks).mp4
|
170.6 MB
|
TR18 NGI18 Advances in IPv6 Network Reconnaissance.en.transcribed.srt
|
56.2 KB
|
TR18 NGI18 Advances in IPv6 Network Reconnaissance.mp4
|
33.1 MB
|
TR18 NGI18 Are you sure - you are alone Pwning IoT-CCTV devices!.en.transcribed.srt
|
41.1 KB
|
TR18 NGI18 Are you sure - you are alone Pwning IoT-CCTV devices!.mp4
|
43.3 MB
|
TR18 NGI18 BREAKING THE LAWS OF ROBOTICS ATTACKING INDUSTRIAL ROBOTS.mp4
|
86.9 MB
|
TR18 NGI18 Dynamic IPv6 Prefix Problems and VPNs.en.transcribed.srt
|
107.8 KB
|
TR18 NGI18 Dynamic IPv6 Prefix Problems and VPNs.mp4
|
66.2 MB
|
TR18 NGI18 Frustrating Emulation with Delay Slots in MIPS and MIPS16.en.transcribed.srt
|
74.9 KB
|
TR18 NGI18 Frustrating Emulation with Delay Slots in MIPS and MIPS16.mp4
|
62.8 MB
|
TR18 NGI18 Hacking Robots Before Skynet.mp4
|
101.5 MB
|
TR18 NGI18 IPv6 Address Management - The First Five Years.en.transcribed.srt
|
127.0 KB
|
TR18 NGI18 IPv6 Address Management - The First Five Years.mp4
|
97.0 MB
|
TR18 NGI18 IPv6 in the Cloud - Back to Square One.en.transcribed.srt
|
110.6 KB
|
TR18 NGI18 IPv6 in the Cloud - Back to Square One.mp4
|
99.7 MB
|
TR18 NGI18 IoT processor and binary breakdown.en.transcribed.srt
|
148.1 KB
|
TR18 NGI18 IoT processor and binary breakdown.mp4
|
85.9 MB
|
TR18 NGI18 Knockin' on IPv6's doors.en.transcribed.srt
|
170.7 KB
|
TR18 NGI18 Knockin' on IPv6's doors.mp4
|
109.9 MB
|
TR18 NGI18 NGI18 Keynote by Graeme Neilson.en.transcribed.srt
|
102.6 KB
|
TR18 NGI18 NGI18 Keynote by Graeme Neilson.mp4
|
68.0 MB
|
TR18 NGI18 Practical Magic Behavior-based Safety Design for IoT.en.transcribed.srt
|
131.3 KB
|
TR18 NGI18 Practical Magic Behavior-based Safety Design for IoT.mp4
|
74.7 MB
|
TR18 NGI18 Securing your in-ear fitness coach Challenges in hardening next generation wearables.en.transcribed.srt
|
144.6 KB
|
TR18 NGI18 Securing your in-ear fitness coach Challenges in hardening next generation wearables.mp4
|
88.6 MB
|
TR18 NGI18 Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.en.transcribed.srt
|
146.0 KB
|
TR18 NGI18 Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.mp4
|
106.2 MB
|
TR18 NGI18 Subs, Ships, & Satellites The Internet of Invisible Things.en.transcribed.srt
|
184.9 KB
|
TR18 NGI18 Subs, Ships, & Satellites The Internet of Invisible Things.mp4
|
116.0 MB
|
TR18 NGI18 Swimming IoT or how to hack a Yacht.mp4
|
92.6 MB
|
TR18 NGI18 Things Attack Peek into a 18 months IoT honeypot.en.transcribed.srt
|
111.4 KB
|
TR18 NGI18 Things Attack Peek into a 18 months IoT honeypot.mp4
|
71.4 MB
|
The Hackers' Sanctuary City.mp4
|
12.7 MB
|
/TROOPERS 2019/
|
TR19 A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.en.transcribed.srt
|
191.1 KB
|
TR19 A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.mp4
|
62.6 MB
|
TR19 A PKI distributed is a PKI solved.en.transcribed.srt
|
52.3 KB
|
TR19 A PKI distributed is a PKI solved.mp4
|
26.5 MB
|
TR19 Abusing privileged file operations on Windows.en.transcribed.srt
|
45.3 KB
|
TR19 Abusing privileged file operations on Windows.mp4
|
34.9 MB
|
TR19 Active Directory and Azure - Core Security Principles.en.transcribed.srt
|
140.1 KB
|
TR19 Active Directory and Azure - Core Security Principles.mp4
|
98.8 MB
|
TR19 Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.en.transcribed.srt
|
81.0 KB
|
TR19 Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.mp4
|
37.4 MB
|
TR19 Automotive Penetration Testing with Scapy.mp4
|
82.9 MB
|
TR19 BIZEC Discussion Panel Past, Present and Future of SAP Security.en.transcribed.srt
|
125.6 KB
|
TR19 BIZEC Discussion Panel Past, Present and Future of SAP Security.mp4
|
46.1 MB
|
TR19 Beyond Windows Forensics with Built-in Microsoft Tooling.en.transcribed.srt
|
133.1 KB
|
TR19 Beyond Windows Forensics with Built-in Microsoft Tooling.mp4
|
68.4 MB
|
TR19 BloodHound and the Adversary Resilience Methodology.en.transcribed.srt
|
142.6 KB
|
TR19 BloodHound and the Adversary Resilience Methodology.mp4
|
77.0 MB
|
TR19 Bluetooth, does it spark joy.en.transcribed.srt
|
128.3 KB
|
TR19 Bluetooth, does it spark joy.mp4
|
69.8 MB
|
TR19 Car Manufacturer meets Security Community.en.transcribed.srt
|
150.8 KB
|
TR19 Car Manufacturer meets Security Community.mp4
|
65.5 MB
|
TR19 Closing Remarks.en.transcribed.srt
|
38.9 KB
|
TR19 Closing Remarks.mp4
|
50.1 MB
|
TR19 CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics....en.transcribed.srt
|
136.1 KB
|
TR19 CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics....mp4
|
68.4 MB
|
TR19 Dark Clouds ahead Attacking a Cloud Foundry Implementation.en.transcribed.srt
|
119.8 KB
|
TR19 Dark Clouds ahead Attacking a Cloud Foundry Implementation.mp4
|
64.5 MB
|
TR19 Digital Forensics and Incident Response in G Suite.en.transcribed.srt
|
84.5 KB
|
TR19 Digital Forensics and Incident Response in G Suite.mp4
|
39.8 MB
|
TR19 Distributed Security Alerting.en.transcribed.srt
|
139.9 KB
|
TR19 Distributed Security Alerting.mp4
|
58.8 MB
|
TR19 Ethics in Attacker Research.en.transcribed.srt
|
19.7 KB
|
TR19 Ethics in Attacker Research.mp4
|
12.7 MB
|
TR19 Evolution of kernel fuzzers in NetBSD.mp4
|
39.2 MB
|
TR19 Fetch exploit - Attacks against source code downloaders.en.transcribed.srt
|
103.1 KB
|
TR19 Fetch exploit - Attacks against source code downloaders.mp4
|
83.6 MB
|
TR19 Finding the best threat intelligence provider.en.transcribed.srt
|
130.0 KB
|
TR19 Finding the best threat intelligence provider.mp4
|
49.2 MB
|
TR19 From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.en.transcribed.srt
|
200.4 KB
|
TR19 From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.mp4
|
96.0 MB
|
TR19 Fun and Pitfalls in a World of VDSL.en.transcribed.srt
|
135.4 KB
|
TR19 Fun and Pitfalls in a World of VDSL.mp4
|
55.8 MB
|
TR19 Fun with LDAP and Kerberos Attacking AD from non-Windows machines.en.transcribed.srt
|
183.1 KB
|
TR19 Fun with LDAP and Kerberos Attacking AD from non-Windows machines.mp4
|
75.4 MB
|
TR19 HackDMI.en.transcribed.srt
|
67.8 KB
|
TR19 HackDMI.mp4
|
38.5 MB
|
TR19 Hardware Side Channel attacks on the cheapest.en.transcribed.srt
|
132.2 KB
|
TR19 Hardware Side Channel attacks on the cheapest.mp4
|
63.7 MB
|
TR19 Hitting the Gym The Anatomy of a Killer Workout.mp4
|
53.4 MB
|
TR19 How we made the badge BEFORE you showed up!.en.transcribed.srt
|
50.7 KB
|
TR19 How we made the badge BEFORE you showed up!.mp4
|
31.3 MB
|
TR19 I am AD FS and so can you Attacking Active Directory Federated Services.en.transcribed.srt
|
145.7 KB
|
TR19 I am AD FS and so can you Attacking Active Directory Federated Services.mp4
|
57.3 MB
|
TR19 I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.en.transcribed.srt
|
119.6 KB
|
TR19 I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.mp4
|
71.4 MB
|
TR19 IPv666 – Address of the Beast.en.transcribed.srt
|
148.1 KB
|
TR19 IPv666 – Address of the Beast.mp4
|
54.5 MB
|
TR19 Introducing Faction A modern, powerful, multiplayer C2 framework.en.transcribed.srt
|
161.6 KB
|
TR19 Introducing Faction A modern, powerful, multiplayer C2 framework.mp4
|
115.2 MB
|
TR19 Introduction to Practical Ethics for Security Practitioners.en.transcribed.srt
|
144.1 KB
|
TR19 Introduction to Practical Ethics for Security Practitioners.mp4
|
67.2 MB
|
TR19 IoT backdoors in cars.mp4
|
63.5 MB
|
TR19 Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.en.transcribed.srt
|
160.1 KB
|
TR19 Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.mp4
|
76.0 MB
|
TR19 Keynote - Inside the Machine.en.transcribed.srt
|
194.3 KB
|
TR19 Keynote - Inside the Machine.mp4
|
82.7 MB
|
TR19 MS Office file format sorcery.en.transcribed.srt
|
124.0 KB
|
TR19 MS Office file format sorcery.mp4
|
90.7 MB
|
TR19 Medical Device Security - Please (don't) be patient!.en.transcribed.srt
|
107.2 KB
|
TR19 Medical Device Security - Please (don't) be patient!.mp4
|
41.0 MB
|
TR19 Microsoft IT (secure) journey to IPv6-only.en.transcribed.srt
|
177.9 KB
|
TR19 Microsoft IT (secure) journey to IPv6-only.mp4
|
60.3 MB
|
TR19 Modmob tools Home made tools to test mobile devices and monitor networks.en.transcribed.srt
|
140.4 KB
|
TR19 Modmob tools Home made tools to test mobile devices and monitor networks.mp4
|
70.0 MB
|
TR19 NAT64 Day 2019 @ AWK.en.transcribed.srt
|
101.5 KB
|
TR19 NAT64 Day 2019 @ AWK.mp4
|
57.8 MB
|
TR19 NGI - Keynote.en.transcribed.srt
|
179.8 KB
|
TR19 NGI - Keynote.mp4
|
97.4 MB
|
TR19 NGI - Opening Remarks.en.transcribed.srt
|
7.7 KB
|
TR19 NGI - Opening Remarks.mp4
|
3.3 MB
|
TR19 No more dumb hex!.en.transcribed.srt
|
124.8 KB
|
TR19 No more dumb hex!.mp4
|
54.9 MB
|
TR19 Not A Security Boundary Breaking Forest Trusts.en.transcribed.srt
|
126.1 KB
|
TR19 Not A Security Boundary Breaking Forest Trusts.mp4
|
52.9 MB
|
TR19 Old New Things An examination of the Philips TriMedia architecture.en.transcribed.srt
|
69.3 KB
|
TR19 Old New Things An examination of the Philips TriMedia architecture.mp4
|
45.8 MB
|
TR19 Opening remarks.en.transcribed.srt
|
34.8 KB
|
TR19 Opening remarks.mp4
|
27.9 MB
|
TR19 Practical attack simulations in Critical National Infrastructure (CNI).en.transcribed.srt
|
63.7 KB
|
TR19 Practical attack simulations in Critical National Infrastructure (CNI).mp4
|
21.4 MB
|
TR19 SI6 IPv6 Toolkit v3.0.en.transcribed.srt
|
103.9 KB
|
TR19 SI6 IPv6 Toolkit v3.0.mp4
|
62.8 MB
|
TR19 SIM Simulator.en.transcribed.srt
|
48.1 KB
|
TR19 SIM Simulator.mp4
|
23.5 MB
|
TR19 Sneaking Past Device Guard.en.transcribed.srt
|
112.4 KB
|
TR19 Sneaking Past Device Guard.mp4
|
74.7 MB
|
TR19 The Anatomy of Windows Telemetry.en.transcribed.srt
|
130.8 KB
|
TR19 The Anatomy of Windows Telemetry.mp4
|
61.6 MB
|
TR19 The evolution of IoT botnets, including Torii and a smart-home hack..en.transcribed.srt
|
85.2 KB
|
TR19 The evolution of IoT botnets, including Torii and a smart-home hack..mp4
|
45.7 MB
|
TR19 Threat Modelling and Beyond for Cisco ACI.en.transcribed.srt
|
92.8 KB
|
TR19 Threat Modelling and Beyond for Cisco ACI.mp4
|
37.7 MB
|
TR19 VXLAN Security or Injection, and protection.mp4
|
51.4 MB
|
TR19 Vehicle alarms' insecurity and something else.en.transcribed.srt
|
78.7 KB
|
TR19 Vehicle alarms' insecurity and something else.mp4
|
62.5 MB
|
TR19 Watchgate - How stupid smartwatches threaten the security and safety of our children.en.transcribed.srt
|
97.6 KB
|
TR19 Watchgate - How stupid smartwatches threaten the security and safety of our children.mp4
|
64.4 MB
|
TR19 We are Listening – Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..en.transcribed.srt
|
128.5 KB
|
TR19 We are Listening – Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..mp4
|
48.1 MB
|
TR19 What are the IPv6 news from the IETF.en.transcribed.srt
|
222.3 KB
|
TR19 What are the IPv6 news from the IETF.mp4
|
113.3 MB
|
TR19 Wild West of Conference Apps Security.en.transcribed.srt
|
86.3 KB
|
TR19 Wild West of Conference Apps Security.mp4
|
32.9 MB
|
TR19 You (dis)liked mimikatz Wait for kekeo.en.transcribed.srt
|
149.5 KB
|
TR19 You (dis)liked mimikatz Wait for kekeo.mp4
|
81.7 MB
|
TR19 You try to detect mimikatz.en.transcribed.srt
|
68.0 KB
|
TR19 You try to detect mimikatz.mp4
|
52.3 MB
|
TR19 macOS - Gaining root with harmless AppStore apps.en.transcribed.srt
|
103.1 KB
|
TR19 macOS - Gaining root with harmless AppStore apps.mp4
|
111.7 MB
|
TROOPERS19 - Day #2 - A Morning Address.en.transcribed.srt
|
1.3 KB
|
TROOPERS19 - Day #2 - A Morning Address.mp4
|
6.8 MB
|
/
|
TROOPERS logo.gif
|
38.6 KB
|
TROOPERS logo.png
|
295.5 KB
|
TROOPERS thank you.txt
|
0.6 KB
|
Total files 594
|