2022-01-30 | wavelength Header Steganography Abusing the IPv6 Header for Data Exfiltration | 34:30 | 3 | |
|
2022-01-30 | CackalackyCon 1 Aleks Kircanski Depressing the Crypto Economy with DoS Bugs | 51:52 | 5 | |
|
2022-01-30 | Takko The Boss Gotta Keep Em Separated Wait, but do we though Well maybe not so much | 57:12 | 2 | |
|
2022-01-30 | Deral Heiland Uboot to Root | 55:47 | 7 | |
|
2022-01-29 | Wes Lambert Augmenting the Onion Facilitating Enhanced Detection & Response with Open Source Tool | 52:18 | 1 | |
|
2022-01-29 | Ryan Linn Practical Payload Hiding in Office Docs | 40:54 | 4 | |
|
2022-01-29 | Gabe Marshall Making Alexa Do Your Dirty Work Improving Your Toolkit with Serverless Computing | 34:22 | 1 | |
|
2022-01-29 | Foemat Fantastic Bluesnarfs and Where to Find Them Teams | 47:11 | 1 | |
|
2022-01-29 | Drew Kirkpatrick ENNEoS Evolutionary Neural Network Encoder of Shenanigans | 50:26 | 3 | |
|
2022-01-29 | Lisa Lorenzin Rise of the Weird Machines | 32:38 | 2 | |
|
2022-01-29 | Patrick McNeil The Right Way To Do Wrong | 52:19 | 11 | |
|
2022-01-29 | Jarrod Overson Analysis of an exploited npm package | 25:27 | 1 | |
|
2022-01-29 | Grant Harris & Tyler Colgan Windows Kernel Fuzzing for Mere Mortals | 35:28 | 33 | |
|
2022-01-29 | Deviant Ollam Forged in Fire Casting Copied Keys in the Field | 49:55 | 26 | |
|
2022-01-29 | CC9 The Crimeware Arms Race Modern Techniques in Malware Armoring & Evasion | 50:46 | 11 | |
|
2022-01-29 | CC9 Q&A Learning Offensive Security with Project V^3 VulnHub VirtualBox Vagrant | 11:22 | 3 | |
|
2022-01-29 | CC9 Stealing a Password Through Interpretive Dance, and Other Wild Video Game Hacks | 45:11 | 2 | |
|
2022-01-29 | CC9 Q&A Keynote Eva Galperin | 11:25 | 23 | |
|
2022-01-29 | CC9 Introduction to Car Hacking Basics | 20:20 | 13 | |
|
2022-01-29 | CC9 Hands on Purple Team Workshop | 56:40 | 3 | |
|
2022-01-29 | CC9 Hacking with Skynet How AI is Empowering Adversaries | 47:31 | 1 | |
|
2022-01-29 | CC9 Extracting a Bootloader's AES Key via a Power Analysis Side Channel Attack | 47:08 | 13 | |
|
2022-01-29 | CC9 Day One Wrapup | 11:22 | 0 | |
|
2022-01-29 | CC9 Reverse Engineering Websites | 49:38 | 5 | |
|
2022-01-29 | CC9 Can Artificial Intelligence AI Detect Advanced Persistent Threats | 49:14 | 2 | |
|
2022-01-29 | CC9 Q&A Worst of Cybersecurity Reporting 2021 | 22:20 | 0 | |
|
2022-01-29 | CC9 Q&A When Your Memory Forensics Tools Only Tell Half the Story | 7:34 | 1 | |
|
2022-01-29 | CC9 Q&A The full purple juice, not the watered down stuff | 7:41 | 0 | |
|
2022-01-29 | CC9 Q&A The Crimeware Arms Race Modern Techniques in Malware Armoring and Evasion | 6:39 | 1 | |
|
2022-01-29 | CC9 CactusCon 9 Opening Ceremony | 55:29 | 6 | |
|
2022-01-29 | CC9 Q&A Keynote April C Wright | 4:45 | 3 | |
|
2022-01-29 | CC9 Q&A Introduction to Car Hacking Basics | 8:24 | 2 | |
|
2022-01-29 | CC9 Q&A Stealing a password through interpretive dance, and other wild video game hacks | 10:31 | 2 | |
|
2022-01-29 | CC9 Q&A Hacking with Skynet How AI is Empowering Adversaries | 5:27 | 0 | |
|
2022-01-29 | CC9 Q&A Reverse Engineering Websites | 8:11 | 1 | |
|
2022-01-29 | CC9 Q&A Extracting a Bootloader’s AES Key via a Power Analysis Side Channel Attack | 9:16 | 3 | |
|
2022-01-29 | CC9 Q&A Can Artificial Intelligence AI detect Advanced Persistent Threats | 8:16 | 3 | |
|
2022-01-29 | CC9 Worst of Cybersecurity Reporting 2021 | 33:22 | 3 | |
|
2022-01-29 | CC9 CactusCon 9 Closing Ceremonies | 1:03:36 | 0 | |
|
2022-01-29 | CC9 Q&A Analyzing Suspicious Artifacts deep dive | 13:25 | 0 | |
|
2022-01-29 | CC9 When Your Memory Forensics Tools Only Tell Half the Story | 50:17 | 1 | |
|
2022-01-29 | CC9 MQTT Tiny Protocol, Big Vulnerabilities | 41:13 | 9 | |
|
2022-01-29 | CC9 Analyzing Suspicious Artifacts deep dive | 42:53 | 0 | |
|
2022-01-29 | CC9 Linux IR Windows of Opportunity | 36:04 | 0 | |
|
2022-01-29 | CC9 The Full Purple Juice, Not the Watered Down Stuff | 51:04 | 4 | |
|
2022-01-29 | CC9 Learning Offensive Security with Project V^3 VulnHub VirtualBox Vagrant | 18:25 | 0 | |
|
2022-01-29 | CC9 Q&A MQTT Tiny Protocol, Big Vulnerabilities | 13:16 | 2 | |
|
2022-01-29 | CC9 Q&A Linux IR Windows of Opportunity | 19:15 | 0 | |
|
2022-01-29 | CactusCon 2018 ARMaHYDAN Misadventures of ARM instruction encodings | 45:29 | 3 | Tutorial |
|
2022-01-29 | CactusCon 2017 Ring 0 Assembly | 41:11 | 3 | |
|
2022-01-29 | CactusCon 2015 Internalized Context | 48:51 | 0 | |
|
2022-01-29 | CactusCon 2015 Badge Completed | 0:25 | 4 | |
|
2022-01-29 | CactusCon 2014 PresidentBeef Making Life Easier w Static Analysis Tools | 53:31 | 1 | |
|
2022-01-29 | CactusCon 2014 1o57 keynote | 50:39 | 1 | |
|
2022-01-29 | Barely Whispering | 8:12 | 0 | |
|
2022-01-29 | False Leaks A Network Lens on Cyber Enabled Information Operations | 31:41 | 3 | Guide |
|
2022-01-29 | Outsourcing Cyberwar | 11:10 | 0 | |
|
2022-01-29 | Disinformation or Debate Finding Signal Amid Political Noise | 34:48 | 1 | Guide |
|
2022-01-29 | Infosec 1930 CYBERWARCON Keynote | 19:22 | 5 | |
|
2022-01-29 | An Analysis of Micro and Macro Cyber Attacks in the Ongoing War in Yemen | 29:28 | 1 | |
|
2022-01-29 | Unrestricted Warfare on Campus Chinese Information Operations and American Higher Education | 24:03 | 6 | Guide |
|
2022-01-29 | Influencer Vaccine Identifying Information Operations Infrastructure | 30:37 | 1 | Guide |
|
2022-01-29 | Behind the Next Destructive Attack | 10:11 | 1 | |
|
2022-01-29 | Revisiting Known Perps Behavioral Profiling for Continuous Monitoring of Threat Actors | 26:58 | 1 | |
|
2022-01-29 | GreyEnergy Beyond BlackEnergy and NotPetya | 22:44 | 2 | |
|
2022-01-29 | Bears in the Lines Russian Critical Infrastructure Espionage in the Face of US Grid Resilience | 18:47 | 4 | |
|
2022-01-29 | John Pilon & Karl Galbraith | 33:11 | 3 | |
|
2022-01-29 | David Pearson | 40:43 | 1 | |
|
2022-01-29 | Simon Zuckerbraun | 50:44 | 3 | |
|
2022-01-29 | Jeremy Blackthorne | 50:37 | 22 | |
|
2022-01-29 | Saumil Shah | 43:19 | 3 | |
|
2022-01-29 | Costin Raiu & Vitaly Kamluk | 49:41 | 13 | |
|
2022-01-29 | Jamie Sanbower | 45:52 | 1 | |
|
2022-01-29 | Ryan Warns | 53:09 | 0 | |
|
2022-01-29 | Andrew Hay | 44:35 | 1 | |
|
2022-01-29 | Nicholas Rowe | 36:19 | 2 | |
|
2022-01-29 | Alex Hemmati | 17:34 | 3 | |
|
2022-01-29 | Roger Ofarril | 49:51 | 3 | |
|
2022-01-29 | Marc Brouillard | 30:35 | 1 | |
|
2022-01-29 | James Smith | 30:33 | 0 | |
|
2022-01-29 | Renee DiResta | 36:08 | 15 | |
|
2022-01-29 | Nick Palmer | 17:54 | 1 | |
|
2022-01-29 | Eldar Marcussen | 45:27 | 2 | |
|
2022-01-29 | Luc Dandurand | 1:09:47 | 4 | |
|
2022-01-29 | Zeshan Aziz | 39:20 | 0 | |
|
2022-01-29 | Douglas Santos | 41:26 | 0 | |
|
2022-01-29 | Sophie D'Antoine | 34:51 | 4 | |
|
2022-01-29 | Diana Kelley | 43:23 | 2 | |
|
2022-01-28 | Chris Hallenbeck | 44:35 | 6 | |
|
2022-01-28 | Paul Kivikink & Ian Redden | 47:57 | 10 | |
|
2022-01-28 | André Boucher | 23:53 | 2 | |
|
2022-01-28 | Alex Arndt | 27:41 | 2 | |
|
2022-01-28 | Panel Discussion | 1:01:21 | 0 | Discussion |
|
2022-01-28 | Ken Lemay | 31:12 | 2 | |
|
2022-01-28 | Nathasha Sasha Hellberg | 47:08 | 0 | |
|
2022-01-28 | Keith Rayle | 48:37 | 2 | |
|
2022-01-28 | Mike Morris | 47:03 | 0 | |
|
2022-01-28 | Jeff Crume | 46:58 | 4 | |
|
2022-01-28 | Matthieu Faou | 44:01 | 2 | |
|
2022-01-28 | Imraan Bashir | 37:26 | 0 | |
|