2022-01-26 | Gigamon Piotr Pietras Hiding in Plain Sight Adam Burt | 26:57 | 1 | |
|
2022-01-26 | Windows privilege escalation using 3rd party services Kacper Szurek | 34:34 | 5 | |
|
2022-01-26 | Hackers vs SOC 12 hours to break in, 250 days to detect Gabriel Wierzbieniec | 33:09 | 3 | |
|
2022-01-26 | Where should I host my malware Attila Marosi | 32:50 | 0 | |
|
2022-01-26 | Odpowiedz organow scigania na przestepczosc Dominik Rozdzialowski | 45:49 | 1 | |
|
2022-01-26 | Interview with Rafal zbikowski and Virpi Heinonen Mulish UBS | 6:07 | 8 | |
|
2022-01-26 | Threat Management in Mozilla Michal Purzynski | 38:40 | 4 | |
|
2022-01-26 | Interview with Gawel Mikolajczyk Cisco | 9:43 | 24 | |
|
2022-01-26 | Dlaczego strategia bezpieczenstwa to za malo Filip Nowak | 40:45 | 2 | |
|
2022-01-26 | CONFidence 2016 trailer | 0:56 | 1 | Preview |
|
2022-01-26 | Lessons from Vanity Zero Knowledge Work David Fuhr | 38:59 | 2 | |
|
2022-01-26 | Android RE and malware analysis 101 Alexander Antukh, Daniel Ramirez Martin | 24:36 | 7 | |
|
2022-01-26 | Introduction to iOS Application Security Testing Slawomir Kosowski | 44:12 | 2 | |
|
2022-01-26 | SOTI and Attacks Marco Pacchiardo | 42:47 | 2 | |
|
2022-01-26 | Live from CONFidence 2016 | 0:39 | 0 | |
|
2022-01-26 | From a life of SOC Analyst Jacek Grymuza | 39:59 | 7 | |
|
2022-01-26 | Analiza przypadku Carbanak jak uniknac powtorki Przemyslaw Skowron | 38:54 | 1 | |
|
2022-01-26 | H4x0rPsch0rr | 18:55 | 2 | |
|
2022-01-26 | Abusing apns for profit Karol Wiesek | 25:14 | 9 | |
|
2022-01-26 | Polska cyber armia ochotnikow Gatis GRAUDINS | 58:07 | 1 | |
|
2022-01-26 | Fuzz your way into the web server s zoo Andrey Plastunov | 42:56 | 1 | |
|
2022-01-26 | first day | 2:46 | 0 | |
|
2022-01-26 | pgp you said a crypto rant with aluc Aluc Dracul | 48:22 | 8 | |
|
2022-01-26 | DTrace OS X = Fun Andrzej Dyjak | 40:38 | 67 | |
|
2022-01-26 | Opening Ceremony | 5:21 | 0 | |
|
2022-01-26 | Dragon Sector, CONFidence CTF intro | 9:01 | 3 | |
|
2022-01-26 | Polska Cyber Armia Ochotnikow panel dyskusyjny | 1:57:35 | 3 | |
|
2022-01-26 | Wywiad z Miroslawem Majem | 8:47 | 0 | |
|
2022-01-26 | Wywiad z Michalem Olczakiem | 4:28 | 0 | |
|
2022-01-26 | MIMOSAWRITERROUTER Abusing EPC on Cisco Router Joaquim Espinhara, Rafael Silva | 34:55 | 3 | |
|
2022-01-26 | Defensive Time Out Time & Security Blazej Boczula | 42:17 | 11 | |
|
2022-01-26 | Wywiad z Jaroslawem Sordylem | 5:28 | 0 | |
|
2022-01-26 | Who put the backdoor in my modem Ewerson Crash Guimaraes | 27:04 | 1 | |
|
2022-01-26 | when something overflowing Peter Hlavaty | 26:50 | 1 | |
|
2022-01-26 | Unusual security problems in web applications Michal Sajdak | 44:34 | 0 | |
|
2022-01-26 | dcua | 9:56 | 11 | |
|
2022-01-26 | Trust boundaries Mateusz Kocielski | 39:49 | 18 | |
|
2022-01-26 | CONFidence CTF 2015 Tasks explained | 36:00 | 3 | |
|
2022-01-26 | making of | 0:57 | 0 | |
|
2022-01-26 | Closing Ceremony | 4:52 | 0 | |
|
2022-01-26 | The Modern Wired Terrorist Mind Spy versus Bot versus Spy Richard Thieme | 56:09 | 17 | |
|
2022-01-26 | Let s play SOCer Security Operations Center i Teoria Chaosu Michal Horubala | 26:52 | 2 | |
|
2022-01-26 | CaaS Crime as a Service czy kazdy moze zostac cyberprzestepca Jaroslaw Sordyl | 29:26 | 2 | |
|
2022-01-26 | The IoThings you don t even need to hack Should we worry Slawomir Jasek | 41:47 | 0 | |
|
2022-01-26 | Bypassing malware detection mechanisms Jakub Kaluzny, Mateusz Olejarka | 41:31 | 2 | |
|
2022-01-26 | SNATCH THE ROOT | 10:01 | 2 | |
|
2022-01-26 | iOS Hacking Advanced Pentest & Forensic Techniques Omer S Coskun | 41:35 | 13 | |
|
2022-01-26 | Interview with Richard Thieme | 6:22 | 5 | |
|
2022-01-26 | Security challenges in an ever changing world Zoltan Bakos | 14:34 | 0 | |
|
2022-01-26 | Interview with Rafael Silva | 3:49 | 5 | |
|
2022-01-26 | Interview with Martin Nystrom | 6:48 | 5 | |
|
2022-01-26 | Interview with Gynvael Coldwind | 4:13 | 24 | |
|
2022-01-26 | Automated Security scanning Frank Breedijk, Glenn ten Cate | 36:41 | 0 | |
|
2022-01-26 | SCADA and mobile Alexander Bolshev, Ivan Iushkevich | 42:11 | 5 | |
|
2022-01-26 | Recap | 2:30 | 0 | |
|
2022-01-26 | APT x 3 wybrane studium przypadkow Borys Lacki | 43:10 | 1 | |
|
2022-01-26 | How to Steal Bitcoins Daniel Shearer, Nick Zeeb | 47:17 | 9 | Guide |
|
2022-01-26 | AppSec, the untrustable dev Timur Khrotko | 41:34 | 1 | |
|
2022-01-26 | Real World Threat Hunting Martin Nystrom | 43:57 | 2 | |
|
2022-01-26 | High Availability of Onet Sites and Services Rafal Chyzy | 40:28 | 1 | |
|
2022-01-26 | HackingForSoju | 14:05 | 8 | |
|
2022-01-26 | Wywiad z Natalia Luczak | 4:05 | 3 | |
|
2022-01-26 | Exploring treasures of 77FEh Vlatko Kosturjak | 41:39 | 0 | |
|
2022-01-26 | Shameful secrets of proprietary protocols Slawomir Jasek, Jakub Kaluzny | 45:12 | 0 | |
|
2022-01-26 | Evaluation of Transactional Controls in e Banking Systems A Bolibok, P Golen | 44:12 | 3 | |
|
2022-01-26 | CONFidence 2014 | 3:30 | 0 | |
|
2022-01-26 | Preventing violation of memory safety in C C software Andreas Bogk | 33:37 | 3 | |
|
2022-01-26 | Security Implications of the Cross Origin Resource Sharing Gergely Revay | 44:16 | 1 | |
|
2022-01-26 | ATMs We kick their ass Marcel Carlsson, Yaniv Miron | 42:37 | 4 | |
|
2022-01-26 | Scaling Security Robert Kiss, Mihaly Zagon, Attila Zseller | 41:54 | 1 | |
|
2022-01-26 | On the battlefield with the Dragons G Coldwind, M Jurczyk | 45:27 | 2 | |
|
2022-01-26 | Asymmetric Defense Using your home field advantage Brian Wohlwinder | 48:11 | 5 | |
|
2022-01-26 | SCADA deep inside protocols and security mechanisms Alexander Timorin | 37:30 | 4 | |
|
2022-01-26 | All your SAP P@$$w0ЯdZ belong to us Dimitry Chastuhin | 33:33 | 0 | |
|
2022-01-26 | NSA for dummies methods to break RSA Aluc Dracul | 43:41 | 1 | |
|
2022-01-26 | 50 Shades of RED Stories from the Playroom Chris Nickerson | 46:13 | 4 | |
|
2022-01-26 | Protecting Big Data at Scale Davi Ottenheimer | 41:47 | 0 | |
|
2022-01-26 | CONFidence 2014 making of | 0:44 | 0 | |
|
2022-01-26 | Xtraction Point | 2:48 | 1 | |
|
2022-01-26 | The Tale of 100 CVE s Prajal Kulkarni | 16:18 | 0 | |
|
2022-01-26 | Hacking the Czech Parliament via SMS J Bednar, P Luptak | 45:31 | 2 | |
|
2022-01-26 | Bitcoin Forensics Fact or Fiction Evgeny Neyolov | 40:06 | 1 | |
|
2022-01-25 | Joanna Rutkowska | 1:15:18 | 324 | |
|
2022-01-25 | Grzegorz Wrobel | 43:21 | 2 | |
|
2022-01-25 | Dinis Cruz | 44:00 | 2 | |
|
2022-01-25 | Dan Gryffin | 39:32 | 2 | |
|
2022-01-25 | Wojciech Swiatek | 57:02 | 3 | |
|
2022-01-25 | Sarah Deacon | 41:24 | 1 | |
|
2022-01-25 | Angelo Rosiello | 1:00:26 | 8 | |
|
2022-01-25 | Alessio | 50:38 | 0 | |
|
2022-01-25 | Alberto Revelli | 59:28 | 9 | |
|
2022-01-25 | Raoul Chiesa Hackers | 45:10 | 36 | |
|
2022-01-25 | Adrian Pastor | 59:41 | 2 | |
|
2022-01-25 | pdp | 51:27 | 0 | |
|
2022-01-25 | Grzegorz Wrobel | 43:21 | 8 | |
|
2022-01-25 | Lukasz Bromirski | 43:58 | 5 | |
|
2022-01-25 | Felix Kronlage | 33:40 | 1 | |
|
2022-01-25 | John Fitzgerald Tomasz Miklas | 42:07 | 9 | |
|
2022-01-25 | rutkowska malware | 1:32:43 | 5 | |
|
2022-01-25 | bylina | 40:34 | 0 | |
|