2022-01-02 | Exposing Bootkits with BIOS Emulation | 47:28 | 19 | |
|
2022-01-02 | Attacking Mobile Broadband Modems Like a Criminal Would | 25:01 | 3 | Guide |
|
2022-01-02 | Creating a Spider Goat Security with Intel CPU Transactional Memory Support | 1:00:02 | 5 | |
|
2022-01-02 | APT Attribution and DNS Profiling | 22:11 | 4 | |
|
2022-01-02 | Exploiting Unpatched iOS Vulnerabilities for Fun and Profit | 43:46 | 4 | |
|
2022-01-02 | Contemporary Automatic Program Analysis | 42:24 | 4 | |
|
2022-01-02 | Android FakeID Vulnerability Walkthrough | 29:49 | 7 | Walkthrough |
|
2022-01-02 | Full System Emulation Achieving Successful Automated Dynamic Analysis of Evasive Malware | 50:30 | 9 | Guide |
|
2022-01-02 | Breaking the Security of Physical Devices by Silvio Cesare | 43:31 | 3 | |
|
2022-01-02 | A Practical Attack Against VDI Solutions | 47:58 | 6 | |
|
2022-01-02 | Bringing Software Defined Radio to the Penetration Testing Community | 37:17 | 10 | |
|
2022-01-02 | Building Safe Systems at Scale Lessons from Six Months at Yahoo | 1:00:08 | 0 | |
|
2022-01-02 | A Scalable, Ensemble Approach for Building and Visualizing Deep Code Sharing Networks | 22:06 | 4 | |
|
2022-01-02 | GRR Find All the Badness, Collect All the Things | 57:50 | 6 | Discussion |
|
2022-01-02 | A Survey of Remote Automotive Attack Surfaces | 57:37 | 3 | |
|
2022-01-02 | Call To Arms A Tale of the Weaknesses of Current Client Side XSS Filtering | 54:42 | 2 | |
|
2022-01-02 | Hacking the Wireless World with Software Defined Radio 2 0 | 53:19 | 9 | |
|
2022-01-02 | Abuse of CPE Devices and Recommended Fixes | 27:25 | 0 | |
|
2022-01-02 | Abusing Microsoft Kerberos Sorry You Guys Don't Get It | 50:33 | 14 | |
|
2022-01-02 | Capstone Next Generation Disassembly Framework | 51:37 | 22 | |
|
2022-01-02 | Digging for IE11 Sandbox Escapes Part 1 | 56:32 | 2 | |
|
2022-01-02 | Catching Malware En Masse DNS and IP Style | 58:59 | 0 | |
|
2022-01-02 | Abusing Performance Optimization Weaknesses to Bypass ASLR | 45:06 | 2 | |
|
2022-01-02 | Digging for IE11 Sandbox Escapes Part 2 | 40:02 | 0 | |
|
2022-01-02 | Dynamic Flash Instrumentation for Fun and Profit | 50:14 | 0 | |
|
2022-01-02 | Cellular Exploitation on a Global Scale The Rise and Fall of the Control Protocol | 51:40 | 0 | |
|
2022-01-02 | Epidemiology of Software Vulnerabilities A Study of Attack Surface Spread | 27:34 | 0 | Vlog |
|
2022-01-02 | CloudBots Harvesting Crypto Coins Like a Botnet Farmer | 51:14 | 10 | |
|
2022-01-02 | Evasion of High End IPS Devices in the Age of IPv6 | 25:25 | 4 | |
|
2022-01-02 | Computrace Backdoor Revisited | 1:06:20 | 10 | |
|
2022-01-02 | Lifecycle of a Phone Fraudster Exposing Fraud Activity | 54:09 | 2 | |
|
2022-01-02 | Probabilistic Spying on Encrypted Tunnels | 22:20 | 0 | |
|
2022-01-02 | Stay Out of the Kitchen A DLP Security Bake Off | 54:10 | 4 | |
|
2022-01-02 | Protecting Data In Use from Firmware and Physical Attacks | 26:58 | 0 | |
|
2022-01-02 | Miniaturization | 47:08 | 1 | |
|
2022-01-02 | SVG Exploiting Browsers without Image Parsing Bugs | 24:05 | 1 | |
|
2022-01-02 | Pulling Back the Curtain on Airport Security Can a Weapon Get Past TSA | 31:53 | 1 | |
|
2022-01-02 | Mission mPOSsible by Nils Jon Butler | 37:39 | 3 | |
|
2022-01-02 | RAVAGE Runtime Analysis of Vulnerabilities and Generation of Exploits | 46:37 | 1 | |
|
2022-01-02 | Mobile Device Mismanagement | 48:05 | 1 | |
|
2022-01-02 | Multipath TCP Breaking Today s Networks with Tomorrow s Protocols | 46:36 | 9 | |
|
2022-01-02 | Reflections on Trusting TrustZone | 39:26 | 2 | |
|
2022-01-02 | MoRE Shadow Walker The Progression of TLB Splitting on x86 | 44:19 | 4 | |
|
2022-01-02 | Researching Android Device Security with the Help of a Droid Army | 58:01 | 0 | |
|
2022-01-02 | My Google Glass Sees Your Passwords | 24:27 | 1 | |
|
2022-01-02 | How Smartcard Payment Systems Fail | 58:56 | 7 | |
|
2022-01-02 | Network Attached Shell N A S ty Systems that Store Network Accessible Shells | 51:33 | 1 | |
|
2022-01-02 | Reverse Engineering Flash Memory for Fun and Benefit | 44:31 | 11 | |
|
2022-01-02 | How to Leak a 100 Million Node Social Graph in Just One Week | 31:02 | 1 | Guide |
|
2022-01-02 | Nobody is Listening to Your Phone Calls Really A Debate and Discussion on the NSA s Activities | 51:36 | 4 | Discussion |
|
2022-01-02 | How to Wear Your Password | 25:57 | 2 | Guide |
|
2022-01-02 | Reverse Engineering the Supra iBox Exploitation of a Hardened MSP430 Based Device | 47:53 | 11 | |
|
2022-01-02 | I Know Your Filtering Policy Better than You Do | 48:48 | 0 | |
|
2022-01-02 | One Packer to Rule Them All | 26:14 | 2 | |
|
2022-01-02 | SAP, Credit Cards, and the Bird that Talks Too Much | 49:05 | 4 | |
|
2022-01-02 | OpenStack Cloud at Yahoo Scale How to Avoid Disaster | 26:30 | 6 | Guide |
|
2022-01-02 | SATCOM Terminals Hacking by Air, Sea, and Land by Ruben Santamarta | 47:39 | 24 | |
|
2022-01-02 | Revealing Embedded Fingerprints Deriving intelligence from USB stack interactions | 46:53 | 0 | |
|
2022-01-02 | The Factoring Dead Preparing for Cyptopocalypse | 54:12 | 1 | |
|
2022-01-02 | PWNIE AWARDS | 39:53 | 0 | |
|
2022-01-02 | Teridian SoC Exploitation Exploration of Harvard Architecture Smart Grid Systems | 56:17 | 12 | |
|
2022-01-02 | Press ROOT to Continue Detecting OSX and Windows Bootkits with RDFU | 48:25 | 4 | |
|
2022-01-02 | UART THOU MAD | 52:42 | 1 | |
|
2022-01-02 | Truncating TLS Connections to Violate Beliefs in Web Applications | 25:23 | 1 | |
|
2022-01-02 | Stepping p3wns Adventures in Full Spectrum Embedded Exploitation | 56:26 | 0 | |
|
2022-01-02 | OptiROP The Art of Hunting ROP Gadgets | 1:06:35 | 8 | |
|
2022-01-02 | Tribute to Barnaby Jack | 8:13 | 2 | |
|
2022-01-02 | Predicting Susceptibility to Socialbots on Twitter | 1:00:37 | 0 | |
|
2022-01-02 | OPSEC Failures of Spies | 25:11 | 7 | |
|
2022-01-02 | With BIGDATA comes BIG responsibility Practical exploiting of MDX injections | 44:36 | 0 | |
|
2022-01-02 | New Trends in FastFlux Networks | 22:23 | 10 | |
|
2022-01-02 | SSL, Gone in 30 Seconds A BREACH beyond CRIME | 56:06 | 1 | |
|
2022-01-02 | Power Analysis Attacks for Cheapskates | 59:57 | 0 | |
|
2022-01-02 | What s on the Wire Physical Layer Tapping with Project Daisho | 56:52 | 1 | |
|
2022-01-02 | Multiplexed Wired Attack Surfaces | 1:01:46 | 2 | |
|
2022-01-02 | Spy jacking the Booters | 57:30 | 1 | |
|
2022-01-02 | Mobile Malware Why the Traditional AV Paradigm is Doomed | 25:16 | 0 | |
|
2022-01-02 | Post Exploitation Operations with Cloud Synchronization | 56:35 | 0 | |
|
2022-01-02 | TOR ALL THE THINGS | 25:58 | 3 | |
|
2022-01-02 | Welcome & Introduction to Black Hat USA 2013 | 53:36 | 2 | |
|
2022-01-02 | Million Browser Botnet | 48:30 | 3 | |
|
2022-01-02 | Virtual Deobfuscator A DARPA Cyber Fast Track Funded Effort | 35:54 | 1 | |
|
2022-01-02 | TLS SECRETS | 54:07 | 1 | |
|
2022-01-02 | RFID Hacking Live Free or RFID Hard | 1:00:13 | 4 | |
|
2022-01-02 | Password Hashing The Future is Now | 25:05 | 0 | |
|
2022-01-01 | The Web IS Vulnerable XSS Defense on the BattleFront | 27:02 | 1 | |
|
2022-01-01 | Pass the Hash 2 The Admin's Revenge | 50:03 | 0 | |
|
2022-01-01 | Smashing the Font Scaler Engine in Windows Kernel | 46:21 | 5 | |
|
2022-01-01 | Using Online Activity as Digital DNA to Create a Better Spear Phisher | 50:29 | 0 | |
|
2022-01-01 | Shattering Illusions in Lock Free Worlds Compiler Hardware Behaviors in OS and VMs | 19:00 | 0 | |
|
2022-01-01 | Pass the Hash and other credential theft and reuse Preventing Lateral Movement | 39:59 | 1 | |
|
2022-01-01 | The SCADA That Didn't Cry Wolf Who s Really Attacking Your ICS Devices 2 2 | 54:21 | 11 | |
|
2022-01-01 | Untwining Twine | 22:52 | 0 | |
|
2022-01-01 | Owning the Routing Table Part II | 40:51 | 0 | |
|
2022-01-01 | Universal DDoS Mitigation Bypass | 55:44 | 10 | |
|
2022-01-01 | The Outer Limits Hacking The Samsung Smart TV | 59:32 | 11 | |
|
2022-01-01 | Rooting SIM Cards | 58:32 | 2 | |
|
2022-01-01 | Out of Control Demonstrating SCADA Device Exploitation | 37:30 | 2 | |
|
2022-01-01 | BIOS Security | 59:26 | 10 | |
|
2022-01-01 | Dissecting CSRF Attacks and Countermeasures | 46:32 | 1 | |
|