2021-12-25 | Lance Spitzner Honeypots Black Hat - USA - 2003 | 1:09:36 | 2 | |
|
2021-12-25 | Greg Hoglund Runtime Decompilation Black Hat - USA - 2003 | 45:51 | 17 | |
|
2021-12-25 | Curtis E Karnow Running the Matrix Black Hat - USA - 2003 | 1:03:22 | 12 | |
|
2021-12-25 | Rain Forest Puppy Novell The Forgotten OS Black Hat - USA - 2002 | 1:13:57 | 2 | |
|
2021-12-25 | Web Application Security: "Stuff Your Mother Never Told You" - Dennis Groves and Bill Pennington | 1:12:06 | 1 | |
|
2021-12-25 | Shaun Clowes Fixing and Making Holes in Binaries Black Hat - USA - 2002 | 1:11:10 | 9 | |
|
2021-12-25 | Paul Knight Dynamic Routing Inside IPsec VPNs Black Hat - USA - 2002 | 48:35 | 3 | |
|
2021-12-25 | Jed Haile Hogwash Black Hat - USA - 2002 | 1:03:55 | 1 | |
|
2021-12-25 | Dave Aitel An Introduction to Spike Black Hat - USA - 2002 | 58:16 | 5 | |
|
2021-12-25 | Jeff Jonas Non Obvious Relationship Awareness Black Hat - USA - 2002 | 33:30 | 34 | |
|
2021-12-25 | Sutton&Greene The Art Of File Format Fuzz Black Hat - USA - 2002 | 43:19 | 0 | |
|
2021-12-25 | Len Sassaman Forensic Dead Ends | 53:45 | 266 | |
|
2021-12-25 | Diana Kelly and Ian Poynter Single Sign On 101 | 1:12:41 | 2 | |
|
2021-12-25 | The Honeynet Project 2nd Generation Honeynet Technologies | 1:25:36 | 11 | Vlog |
|
2021-12-25 | Rich Murphy Locking Down Your FreeBSD Install | 1:12:38 | 19 | |
|
2021-12-25 | Mark Eckenwiler USA Patriot Act and Criminal Investigations | 1:12:18 | 0 | |
|
2021-12-25 | Dow Herath Mehta Spencer and Flake Professional Source Code Auditing | 1:24:12 | 0 | |
|
2021-12-25 | Richard Clarke Keynote National Strategy for Securing Cyberspace | 45:40 | 4 | |
|
2021-12-25 | Tim Mullen Neutralizing Nimda Automated Strikeback | 1:12:07 | 1 | |
|
2021-12-25 | Fischbach and Lacoste Seris IP Backbone Security Black Hat - USA - 2002 | 1:12:36 | 3 | |
|
2021-12-25 | Richard George Views On The Future Direction of Information Assurance | 39:00 | 2 | Guide |
|
2021-12-25 | Aaron Higbee and Chris Davis DC Phone Home Black Hat - USA - 2002 | 1:04:38 | 4 | |
|
2021-12-25 | Rick Smith The Biometrics Dilemma Black Hat - USA - 2002 | 1:07:35 | 1 | |
|
2021-12-25 | Maximiliano Caceres Syscall Proxying Black Hat - USA - 2002 | 1:05:56 | 0 | |
|
2021-12-25 | Goldman and Marotta Securing Your Computing Environment to Conform to Privacy Regulations | 1:03:16 | 0 | |
|
2021-12-25 | Bruce Potter 802 11X Black Hat - USA - 2002 | 55:04 | 0 | |
|
2021-12-25 | Robert Baird and Mike Lynn Advanced 80211b Attack Black Hat - USA - 2002 | 1:08:56 | 7 | |
|
2021-12-25 | Mike Schiffman The Need for an 802 11b Toolkit Black Hat - USA - 2002 | 1:11:07 | 31 | |
|
2021-12-25 | Halvar Flake Graph Based Binary Analysis Black Hat - USA - 2002 | 54:05 | 18 | |
|
2021-12-25 | Cean Convery Hacking Layer Two Black Hat - USA - 2002 | 1:22:06 | 2 | |
|
2021-12-25 | ian Goldberg Off the Record Messaging Black Hat - USA - 2002 | 1:23:07 | 9 | |
|
2021-12-25 | Roelof Temmingh and Haroon Meer Setiri Black Hat - USA - 2002 | 1:02:26 | 4 | |
|
2021-12-25 | Ofir Arkin Cracking VoIP Architecture Black Hat - USA - 2002 | 1:17:18 | 0 | |
|
2021-12-25 | Dan Kaminsky Black Ops of TCPIP Black Hat - USA - 2002 | 1:18:19 | 8 | |
|
2021-12-25 | Roger Dingledine Why is Anonymity So Hard Black Hat - USA - 2002 | 1:18:59 | 21 | |
|
2021-12-25 | Jay Beale Attacking and Securing UNIX FTP Servers Black Hat - USA - 2002 | 1:01:48 | 3 | |
|
2021-12-25 | Panel Hacker Court Black Hat - USA - 2002 | 1:57:51 | 5 | |
|
2021-12-25 | Dan Veeneman Vulnerabilities of Cellular and Satellite based Voice and Data Networks | 1:07:26 | 4 | |
|
2021-12-25 | Scott Blake Politics of Vulnerabilities | 50:11 | 19 | |
|
2021-12-25 | Kevin McPeake and Chris Goggins Falling Dominos | 1:30:23 | 8 | |
|
2021-12-25 | Daniel VanBelleghem Solving Network Mysteries | 44:09 | 0 | |
|
2021-12-25 | Walter Gary Sharp Key Legal Implications of Computer Network Defense | 1:11:05 | 1 | |
|
2021-12-25 | Rain Forest Puppy TBD | 1:08:59 | 9 | |
|
2021-12-25 | Gregory S Miles Computer Forensics a Critical Process in Your Incident Response Plan | 1:17:09 | 5 | |
|
2021-12-25 | Scott Blake Dog of War Attack Box Design | 50:39 | 1 | |
|
2021-12-25 | Renaud Deraison The Nessus Project Reducing the Costs of Vulnerability Assessment | 1:05:09 | 12 | |
|
2021-12-25 | Lance Spitzner The Honey Net Project | 1:19:48 | 10 | |
|
2021-12-25 | Halvar Flake Hit Them Where It Hurts Finding Holes in COTS Software Part 1 | 1:01:44 | 12 | |
|
2021-12-25 | Simple Nomad and Todd Sabin The RAZOR Warez | 46:39 | 5 | |
|
2021-12-25 | Richard Thieme Defending the Information Web New Ways of Thinking About Security | 35:43 | 5 | Guide |
|
2021-12-25 | Last Stage Of Delirium Research Group UNIX Assembly Codes Development for Vulnerabilities | 1:25:24 | 43 | |
|
2021-12-25 | Steven Christey CVE Behind the Scenes The Complexity of Being Simple | 58:08 | 3 | |
|
2021-12-25 | Andrew van der Stock Alternatives to Honeypots | 1:00:36 | 2 | |
|
2021-12-25 | Robert Hansen htaccess Scripts in Apache Environments | 38:05 | 2 | Guide |
|
2021-12-25 | Mandy Andress Wireless LAN Security | 33:30 | 5 | |
|
2021-12-25 | Thomas Olofsson Building a Blind IP Spoofed Portscanning Tool | 43:39 | 9 | |
|
2021-12-25 | Brian Martin and B K DeLong Lessons Learned From attrition org | 1:18:13 | 9 | |
|
2021-12-25 | Halvar Flake Hit Them Where It Hurts Finding Holes in COTS Software Part 2 | 1:01:27 | 4 | |
|
2021-12-25 | Marshall Beddoe and Chris Abad The Siphon Project | 1:09:27 | 1 | |
|
2021-12-25 | Tim Newsham Cracking WEP Keys | 41:36 | 5 | |
|
2021-12-25 | Ian Goldberg Breaking 80211 WEP | 1:20:19 | 9 | |
|
2021-12-25 | Bruce Schneier Paradigms Lost Engineering vs Risk Management | 24:56 | 19 | |
|
2021-12-25 | Martin Roesch Snort | 1:13:19 | 4 | |
|
2021-12-25 | Chad R Skipper Polymorphism and Intrusion Detection Systems | 44:06 | 2 | |
|
2021-12-25 | Chip Andrews SQL Security Revisited | 1:18:20 | 3 | |
|
2021-12-25 | James Bamford Researching Secrets Part II | 47:07 | 28 | |
|
2021-12-25 | Mike Beekey ARP Vulnerabilities Indefensible Local Network Attacks | 1:03:01 | 9 | |
|
2021-12-25 | Jay Beale Attacking and Defending BIND DJBDNS DNS Servers | 1:01:03 | 7 | |
|
2021-12-25 | Cory Scott Systems Management in an Untrusted Network | 1:10:22 | 2 | |
|
2021-12-25 | Timothy Mullen Grabbing User Credentials via W2k ODBC Libraries | 43:12 | 4 | |
|
2021-12-25 | Palante Top 25 Overlooked Security Configuration on Your Switches and Routers | 58:07 | 3 | |
|
2021-12-25 | Jose Nazario The Future of Network Worms | 42:08 | 7 | |
|
2021-12-25 | Daji Sanai Promiscuous Node Detection Using ARP Packets | 51:48 | 5 | |
|
2021-12-24 | David Litchfield Compromising web Servers and Defensive Techniques | 1:13:31 | 6 | |
|
2021-12-24 | Jericho and Munge Hard Core Web Defacement Statistics Trends and Analysis | 1:04:48 | 1 | |
|
2021-12-24 | Job De Haas Getting Rooted and Never Knowing It | 57:31 | 0 | |
|
2021-12-24 | Mark Kadrich Intrusion Detection in High Speed Networks | 52:40 | 1 | |
|
2021-12-24 | Mudge An Analysis of Tactics Used in Discovering Passive Monitoring Devices | 1:01:35 | 1 | |
|
2021-12-24 | Mudge Analysis of Tactis used in discovering passive monitoring devices continuation of 25 | 1:19:11 | 3 | |
|
2021-12-24 | Padgett Peterson Securing EMail Gateways from Attacks What to do While Waiting for Vendors to Re | 56:07 | 3 | |
|
2021-12-24 | Richard Theime Strategies of Sun Tzu and Multiple Levels of Deception How to Play Chess While the | 32:26 | 0 | Guide |
|
2021-12-24 | Diana Kelly Translasting US Privacy Regulations for Implementation | 59:44 | 1 | |
|
2021-12-24 | Jeremy Rauch The Security of Network Devices | 1:08:48 | 17 | |
|
2021-12-24 | Security Research Teams How To Manage, Grow And Retain Them Guy Barnhart Magen | 1:01:58 | 1 | |
|
2021-12-24 | RMGirl | 20:29 | 0 | |
|
2021-12-24 | James Chappell & Zak Doffman | 19:51 | 1 | |
|
2021-12-24 | Jenny Radcliffe & Stu Hirst | 22:17 | 3 | |
|
2021-12-24 | Joe Pettit | 19:59 | 0 | |
|
2021-12-24 | Dr Daniel Dresner | 9:46 | 2 | |
|
2021-12-24 | Dr Jessica Barker & FC | 20:41 | 3 | |
|
2021-12-24 | Ed Tucker | 23:18 | 0 | |
|
2021-12-24 | El Jefe | 23:27 | 0 | |
|
2021-12-24 | Frootware | 21:08 | 1 | |
|
2021-12-24 | Gabby | 23:31 | 0 | |
|
2021-12-24 | Gabe | 22:51 | 0 | |
|
2021-12-24 | Graham Cluley & Carole Theriault | 21:59 | 3 | |
|
2021-12-24 | Hacker Fantastic | 19:21 | 3 | |
|
2021-12-24 | Hacking a Professional Drone | 27:57 | 15 | |
|
2021-12-24 | Su A Cyder Homebrewing Malware for IOS Like a BO$$ | 2:38:45 | 1 | |
|
2021-12-24 | Let's See What's Out There Mapping the Wireless IOT | 48:53 | 2 | Guide |
|