2022-11-14 | Chris Nickerson Compliance An Assault on Reason | 47:30 | 10 | |
|
2022-11-14 | Chris Nickerson, Ian Amit, David Kennedy, Stefan Friedli PTES How to fix the industry | 48:52 | 1 | Guide |
|
2022-11-14 | Christian Bockermann Protecting Databases with Trees | 50:48 | 4 | |
|
2022-11-14 | Christian Folini Sniping Slowloris Taking out DDoS attackers with minimal harm | 43:01 | 0 | |
|
2022-11-14 | Dale Pearson Social Engineering Like In Movies Reality of awareness and manipulation | 51:34 | 3 | |
|
2022-11-14 | David Kennedy Making Sense of inSecurity | 47:53 | 3 | |
|
2022-11-14 | Felix FX Lindner Targeted Industrial Control System Attacks Lessons from Stuxnet | 49:25 | 7 | |
|
2022-11-14 | Frederic Bourla Cybercrime in nowadays businesses A real case study of targeted attack | 53:31 | 5 | |
|
2022-11-14 | Hans Peter Waldegger Mobile ID The framework for secure transactions | 51:08 | 1 | |
|
2022-11-14 | Iftach Ian Amit Pushing in, and pulling out slowly without anyone paying attention | 53:56 | 0 | |
|
2022-11-14 | Jean Philippe Aumasson Cryptanalysis vs Reality | 52:26 | 1 | |
|
2022-11-14 | Juan Galiana Lara & Javier Marcos de Prado Pwning intranets with HTML5 | 42:50 | 4 | |
|
2022-11-14 | Marc Ruef & Luca Dal Molin Code Plagiarism Technical Detection and Legal Prosecution | 55:13 | 0 | |
|
2022-11-14 | Pascal Kocher Closing ceremony | 13:39 | 1 | |
|
2022-11-14 | Adrian Wiesmann You hack, we laugh Watch 31337 h4x0r5 at work | 23:49 | 3 | |
|
2022-11-14 | Morgan Marquis Boire All Your Evidence Is Belong To Us Antiforensics and You | 57:20 | 25 | |
|
2022-11-14 | Andrea Lelli and Mario Ballano Barcena Tidserv Shaping the rootkit landscape | 42:07 | 2 | |
|
2022-11-14 | Candid Wuest Badges and something about Stuxnet | 50:38 | 3 | |
|
2022-11-14 | Nicolas Seriot Apple iOS 4 Privacy | 45:00 | 1 | |
|
2022-11-14 | Opening Ceremony with Pascal Kocher | 9:30 | 1 | |
|
2022-11-14 | Christoph Weber Attacking with Cisco Devices | 49:18 | 4 | |
|
2022-11-14 | Pascal Junod Open Source Cryptographic Libraries and Embedded Platforms | 49:01 | 2 | |
|
2022-11-14 | Closing Ceremony with Candid Wuest | 21:12 | 0 | |
|
2022-11-14 | Pete Herzog No More of the Same Bad Security | 46:42 | 4 | |
|
2022-11-14 | Philipp Schroedel and Max Moser CARAT Metasploit Config and Risk Assessment Tool | 49:06 | 0 | |
|
2022-11-14 | Dale Pearson Head Hacking Magic of Suggestion and Perception | 53:10 | 1 | |
|
2022-11-14 | Emmanuel Bouillon Stealing credentials for fun and impersonation | 49:14 | 2 | |
|
2022-11-14 | Philippe Oechslin Testing the Limits of EV Certificates | 49:16 | 6 | |
|
2022-11-14 | Fabian Mihailowitsch Detecting Hardware Keyloggers | 47:52 | 11 | Vlog |
|
2022-11-14 | Rik van Bruggen Identity and Access Management Sponsor Talk | 18:37 | 1 | |
|
2022-11-14 | Hashdaysbadge hacking | 0:17 | 1 | |
|
2022-11-14 | Jesse Burns Android application security, the fun details | 51:44 | 9 | |
|
2022-11-14 | Security Conference Harald Welte OsmocomBB GSM protocol level security in GSM networks | 51:59 | 47 | |
|
2022-11-14 | Jurgen Pabel FrozenCache | 25:28 | 0 | |
|
2022-11-14 | Security Conference Stefan Buhlmann Helios fast, portable, transparent instruction tracer | 43:49 | 4 | Tutorial |
|
2022-11-14 | Karsten Nohl Busting Phone Encryption | 1:05:34 | 21 | |
|
2022-11-14 | Sven Vetsch GlastopfNG A web attack honeypot | 24:49 | 4 | |
|
2022-11-14 | Keynote Talk with Chris Nickerson | 23:56 | 4 | |
|
2022-11-14 | Tavis Ormandy There s a party at Ring0 and you re invited | 57:29 | 9 | |
|
2022-11-14 | Kimmo Kasslin and Antti Tikkanen Rootkits in the Real World Today | 53:37 | 1 | |
|
2022-11-14 | Marc Ruef Nmap NSE Hacking for IT Security Professionals | 34:03 | 4 | |
|
2022-11-13 | Alex Plaskett & James Loureiro The Mate Escape Android Pwn2Owning | 39:11 | 3 | |
|
2022-11-13 | Zsombor Kovacs Cheaters for Everything from Minesweeper to Mobile Banking Applications | 38:22 | 4 | |
|
2022-11-13 | Balazs Bucsay XFLTReaT Building a Tunnel | 32:36 | 2 | |
|
2022-11-13 | Zoltan Balazs Ethereum Smart Contract Hacking Explained like I'm Five | 46:32 | 5 | |
|
2022-11-13 | Brian Gorenc From Bounties to Bureaucracy Keynote Speech | 40:54 | 1 | |
|
2022-11-13 | Thaís Moreira Hamasaki The not so profitable Path towards Automated Heap Exploitation | 38:09 | 8 | |
|
2022-11-13 | Csongor Tamas Examples of Locality Sensitive Hashing & their Usage for Malware Classification | 17:59 | 0 | |
|
2022-11-13 | Vincent Ruijter ~Securing~ Attacking Kubernetes | 23:48 | 4 | |
|
2022-11-13 | Gabor Szappanos The Nigerians are in the Spajz | 42:19 | 2 | |
|
2022-11-13 | Stephan Gerling Hacking Yachts Remotely via Satcom or Maritime Internet Router | 43:05 | 2 | |
|
2022-11-13 | Rodrigo Branco How Offensive Security is Defining the Way We Compute Keynote Speech | 41:29 | 9 | |
|
2022-11-13 | Gabriel Cirlig & Stefan Tanase Smart Car Forensics & Vehicle Weaponization | 24:58 | 3 | |
|
2022-11-13 | Gergely Biczok Interdependent Privacy & the Psychology of Likes | 46:22 | 1 | Vlog |
|
2022-11-13 | Robert Neumann What's 4k in real Money | 33:46 | 0 | |
|
2022-11-13 | Paolo Stagno A Drone Tale All Your Drones Belong To Us | 41:57 | 8 | |
|
2022-11-13 | Inbar Raz Under the Hood The Automotive Challenge | 31:55 | 0 | |
|
2022-11-13 | Jack S linkcabin Becoming the Quiz Master Thanks RE | 31:35 | 0 | |
|
2022-11-13 | Joxean Koret Pigaios A Tool for Diffing Source Codes against Binaries | 36:37 | 4 | |
|
2022-11-13 | Kocsis Tamas & Kovacs Balint Az Informacioszivargas Monitorozasa Open Source Eszközökkel | 43:33 | 0 | |
|
2022-11-13 | Matthias Deeg Bypassing an Enterprise Grade Biometric Face Authentication System | 42:41 | 0 | |
|
2022-11-13 | Mike Ossmann Keynote Speech at Hacktivity2018 | 45:40 | 2 | |
|
2022-11-13 | Mikhail Egorov Hunting for bugs in Adobe Experience Manager webapps | 42:02 | 3 | |
|
2022-11-13 | Abdul Aziz Hariri Onix Zero Day Initiative Ruined my Life | 36:59 | 4 | |
|
2022-11-13 | Aleksandr Kolchanov Attacks on GSM Alarms, Smart Homes, Ind Control Sys & Smartwatches for Kids | 29:52 | 1 | |
|
2022-11-13 | Csaba Fitzl Gatekeeper Bypass or Not Bypass | 24:01 | 1 | |
|
2022-11-13 | Marcell Molnar Hacking ATMs on a Budget | 40:36 | 5 | |
|
2022-11-13 | Dave Lewis Sharks Petrol These Waters Keynote Presentation | 34:58 | 0 | |
|
2022-11-13 | Aman Sachdev & Himanshu Sharma Hacking Real Life Financial Applications | 36:18 | 2 | |
|
2022-11-13 | Mikhail Egorov What's Wrong with WebSocket APIs Unveiling Vulnerabilities in WebSocket APIs | 36:47 | 10 | |
|
2022-11-13 | David Liptay & Julia Borbala Csuha CANmap Network Discovery on CAN | 15:45 | 2 | |
|
2022-11-13 | Andrea Pierini WHOAMI PRIV Show Me Your Privileges and I Will Lead You to System | 41:03 | 0 | |
|
2022-11-13 | David Török A Friendly Guide on How to Avoid Getting Pwned Out of Business a Hacker's Memento | 45:47 | 0 | Guide |
|
2022-11-13 | Riport a TV2 TechGuru cimu musoraban in Hungarian | 5:18 | 0 | |
|
2022-11-13 | Tamas Kocsis & Balint Kovacs Fight Against Fake News Sites Using Open Source Tools in Hungarian | 1:02:04 | 1 | |
|
2022-11-13 | Arun Mane & Nikhil Bogam Making Anomaly Detection SystemADS for Vehicles Canbus and Lin | 36:40 | 4 | |
|
2022-11-13 | Frantisek Strasak & Jan Fajfer Increasing Efficiency of Encr Traffic Analysis of People at Risk | 31:58 | 4 | |
|
2022-11-13 | Gabriel Cirlig ADBHoney Analyzing the ADB Malware Ecosystem | 25:51 | 2 | |
|
2022-11-13 | Asad Qureshi Using Open Source Intelligence to Investigate CryptoCurrency Cybercrime | 32:05 | 10 | |
|
2022-11-13 | Thomas Debize A Decade of Infosec Tools | 40:44 | 1 | |
|
2022-11-13 | Ignat Korchagin Live Patching Weak Crypto with OpenSSL Engines | 30:22 | 2 | |
|
2022-11-13 | Barnabas Sztan Kovacs Notwork Security | 37:22 | 1 | |
|
2022-11-13 | TUnde Lendvai Chinese Social Credit System Security Issues and Social Impact | 22:05 | 1 | |
|
2022-11-13 | Inbar Raz Under Pressure Real World Damage with TPMS Spoofing | 37:05 | 1 | |
|
2022-11-13 | Christina Lekati Social Engineering through Social Media | 36:33 | 20 | |
|
2022-11-13 | Zoltan Balazs Oldschool is Still Cool | 41:01 | 1 | |
|
2022-11-13 | Interju a Duna TV Csaladbarat cimu musoraban in Hungarian | 5:36 | 11 | |
|
2022-11-13 | Interju az M1 Hiradoban in Hungarian | 7:06 | 2 | |
|
2022-11-13 | Itay Cohen & Ari Eitan The Red Square Mapping the Connections Inside Russia's APT Ecosystem | 18:47 | 0 | |
|
2022-11-13 | Jennifer Janesko Facepalm and Carry On A Tale of I's O's and T's | 35:22 | 0 | |
|
2022-11-13 | Kelly Shortridge To Err is Human Keynote Presentation | 34:44 | 13 | |
|
2022-11-13 | Kuba Gretzky Phishing Through Modern 2FA Defences With Evilginx | 23:53 | 42 | |
|
2022-11-13 | Laszlo Miklos Biro IoT Devices, Were Are You and What Do you Do | 25:57 | 7 | |
|
2022-11-12 | Adrian Vollmer Attacking RDP with Seth | 20:14 | 22 | |
|
2022-11-12 | Julien Thomas Limitations of Android permission system | 39:40 | 4 | |
|
2022-11-12 | Anto Joseph Bug hunting using symbolic virtual machines | 42:10 | 4 | |
|
2022-11-12 | Kirils Solovjovs Tools for effortless reverse engineering of MikroTik routers | 37:43 | 27 | |
|
2022-11-12 | Attila Szasz & Gergo Hosszu Dive into Magenta fuzzing Google's new kernel | 45:55 | 1 | |
|
2022-11-12 | Leigh Anne Galloway Money makes money How to buy an ATM and what you can do with it | 33:58 | 6 | Guide |
|
2022-11-12 | Mateusz Olejarka REST API, pentester's perspective | 34:04 | 3 | |
|