2021-12-12 | Relaying EMV Contactless Transactions Using Off The Self Android Devices | 43:07 | 11 | |
|
2021-12-12 | Hopping on the CAN Bus Black Hat - Asia - Singapore - 2015 | 49:10 | 10 | |
|
2021-12-12 | Decentralized Malware on The Blockchain Black Hat - Asia - Singapore - 2015 | 49:29 | 7 | |
|
2021-12-12 | The Nightmare Behind The Cross Platform Mobile Apps Dream | 45:27 | 2 | |
|
2021-12-12 | Next Level Cheating and Leveling Up Mitigations Black Hat - Asia - Singapore - 2015 | 48:29 | 5 | |
|
2021-12-12 | Hiding Behind Android Runtime ART Black Hat - Asia - Singapore - 2015 | 53:15 | 12 | |
|
2021-12-12 | DABiD The Powerful Interactive Android Debugger for Android Malware Analysis | 31:18 | 8 | |
|
2021-12-12 | Say It Ain't So An Implementation of Deniable Encryption by Ari Trachtenberg | 19:10 | 12 | |
|
2021-12-12 | Scan All the Things Project Sonar by Mark Schloesser Black Hat - Asia - Singapore - 2014 | 1:03:54 | 2 | |
|
2021-12-12 | JS Suicide Using JavaScript Security Features to Kill JS Security by Ahamed Nafeez | 42:57 | 6 | |
|
2021-12-12 | Comprehensive Virtual Appliance Detection by Kang Li Black Hat - Asia - Singapore - 2014 | 53:39 | 1 | |
|
2021-12-12 | Building Trojan Hardware at Home by JP Dunning Black Hat - Asia - Singapore - 2014 | 59:19 | 3 | |
|
2021-12-12 | SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal | 44:25 | 4 | |
|
2021-12-12 | I Know You Want Me Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki | 59:18 | 4 | |
|
2021-12-12 | UI Redressing Attacks on Android Devices Revisited by Marcus Niemietz | 37:01 | 7 | |
|
2021-12-12 | Privacy by Design for the Security Practitioner by Richard Chow | 50:02 | 3 | |
|
2021-12-12 | Beyond Check The Box Powering Intrusion Investigations by Jim Aldridge | 1:00:52 | 0 | |
|
2021-12-12 | Dude, WTF in My CAN by Alberto Garcia Illera & Javier Vazquez Vidal | 56:36 | 15 | |
|
2021-12-12 | Tomorrow's News is Today's Intel Journalists as Targets and Compromise Vectors by Shane Huntley | 58:53 | 3 | |
|
2021-12-12 | Persist It Using and Abusing Microsoft's Fix It Patches by Jon Erickson | 49:28 | 9 | |
|
2021-12-12 | Diving Into IE 10's Enhanced Protected Mode Sandbox by Mark Vincent Yason | 48:13 | 5 | |
|
2021-12-12 | AIS Exposed Understanding Vulnerabilities and Attacks 2 0 by Marco Balduzzi | 59:23 | 5 | |
|
2021-12-12 | The Machines That Betrayed Their Masters by Glenn Wilkinson | 58:18 | 4 | |
|
2021-12-12 | PDF Attack A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza | 1:03:33 | 4 | |
|
2021-12-12 | Discovering Debug Interfaces with the JTAGulator Part 2 by Joe Grand | 43:28 | 11 | |
|
2021-12-12 | Abusing the Internet of Things Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani | 42:47 | 0 | |
|
2021-12-12 | Owning a Building Exploiting Access Control and Facility Management Systems by Billy Rios | 1:05:14 | 6 | |
|
2021-12-12 | The Inner Workings of Mobile Cross Platform Technologies by Simon Roses Femerling | 58:33 | 0 | Vlog |
|
2021-12-12 | PDF Attack A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza | 52:31 | 3 | |
|
2021-12-12 | Discovering Debug Interfaces with the JTAGulator Part 1 by Joe Grand Black Hat - Asia - Singapore | 42:20 | 16 | |
|
2021-12-12 | Z Make Troy, Not War Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang | 43:30 | 0 | |
|
2021-12-12 | You Can't See Me A Mac OS X Rootkit Uses the Tricks You Haven't Known Yet | 4:14 | 11 | |
|
2021-12-12 | Solutum Cumulus Mediocris by Eldar Marcussen Black Hat - Asia - Singapore - 2014 | 53:11 | 2 | |
|
2021-12-12 | OFFENSIVE Exploiting DNS Servers Changes by Leonardo Nve | 1:03:22 | 5 | |
|
2021-12-12 | Disasters in the Making How I Torture Open Government Data Systems for Fun, Profit, and Time Trave | 49:02 | 2 | |
|
2021-12-12 | Keynote by Dr Steve Crocker Black Hat - Asia - Singapore - 2014 | 52:32 | 0 | |
|
2021-12-12 | USB Attacks Need Physical Access Right Not Any More… by Andy Davis | 47:23 | 0 | |
|
2021-12-12 | Ultimate Dom Based XSS Detection Scanner on Cloud by Nera W C Liu & Albert Yu | 27:40 | 1 | |
|
2021-12-12 | Black Alps 2019 PatrOwl Red Flavour Of SOC Automation Nicolas Mattiocco | 36:37 | 3 | Let's Play |
|
2021-12-12 | Hash Collision Exploitation Ange Albertini Black Alps 2019 | 1:53:53 | 5 | Let's Play |
|
2021-12-12 | OS X RAM Forensic Analysis Extracting Encryption Keys And Other Secrets Léo Cortès | 40:15 | 6 | |
|
2021-12-12 | Opening Words Sylvain Pasini Black Alps 2019 | 13:21 | 4 | Let's Play |
|
2021-12-12 | Battle In The Clouds Attacker Vs Defender On AWS Dani Goland and Mohsan Farid | 45:38 | 3 | |
|
2021-12-12 | New Tales Of Wireless Input Devices Matthias Deeg and Gerhard Klostermeier | 41:45 | 5 | |
|
2021-12-12 | Computing On Encrypted Data A Survey Pascal Junod Black Alps 2019 | 51:36 | 1 | Let's Play |
|
2021-12-12 | Google Bug Hunters Eduardo Vela Nava Black Alps 2019 | 33:02 | 7 | Let's Play |
|
2021-12-12 | Building Your Own WAF As A Service And Forgetting About False Positives J Berner | 39:55 | 5 | |
|
2021-12-12 | The Inner Guts Of A Connected Glucose Sensor For Diabetes A Apvrille, T Goodspeed | 51:16 | 34 | |
|
2021-12-12 | Black Alps 2019 Maintaining Cryptographic Library for 11 languages Anastasiia Voitova | 53:40 | 0 | Let's Play |
|
2021-12-12 | Fuzzing Java Code With The Help Of JQF Tobias Ospelt Black Alps 2019 | 41:50 | 2 | Let's Play |
|
2021-12-12 | Swisscom Bug Bounty Retour D'Un Chercheur Daniel Le Gall Black Alps 2019 | 48:04 | 2 | Let's Play |
|
2021-12-12 | How To Find And Prevent Entire Classes Of Security Vulnerabilities Sam Lanning | 35:53 | 1 | Guide |
|
2021-12-12 | Blockchain Vulnerabilities And Exploitation In Practice Nils Amiet Black Alps 2019 | 2:33:46 | 15 | Let's Play |
|
2021-12-12 | Ethereum Taking Control of Smart Contracts Olivier Kopp Black Alps 2019 | 37:45 | 7 | Let's Play |
|
2021-12-12 | Opening Words Sylvain Pasini and Yohann Perron Black Alps 2018 | 3:43 | 1 | Let's Play |
|
2021-12-12 | Opening by Sylvain Pasini, president of BlackAlps Black Alps 2018 | 14:18 | 0 | Let's Play |
|
2021-12-12 | Nail In The JKS Coffin Tobias Ospelt Black Alps 2018 | 32:56 | 2 | Let's Play |
|
2021-12-12 | Challenges And Opportunities In Cloud Security Scott Piper Black Alps 2018 | 37:26 | 9 | Let's Play |
|
2021-12-12 | Group123 Korea In The Crosshairs Paul Rascagneres Black Alps 2018 | 43:01 | 0 | Let's Play |
|
2021-12-12 | State Of The Art In Security Applied To An Insulin Pump Stephan Proennecke | 23:20 | 0 | |
|
2021-12-12 | Reversing Cryptographic Primitives Using Quantum Computing Renaud Lifchitz | 57:47 | 9 | |
|
2021-12-12 | Build Your Own Hardware Implant Nicolas Oberli Black Alps 2018 | 47:38 | 2 | Let's Play |
|
2021-12-12 | Dilemmas Everywhere Get It Right Or Get Pwned Ethan Schorer Black Alps 2018 | 45:43 | 7 | Let's Play |
|
2021-12-12 | Round Table Pierre François Regamey,Stephan Proennecke and Kim Rochat Black Alps 2018 | 25:06 | 3 | Let's Play |
|
2021-12-12 | Current Status Of Regulations On Cybersecurity For Medical Devices Kim Rochat | 16:25 | 2 | |
|
2021-12-12 | Application Level DDoS The Rise Of CDNs And The End Of The Free Internet C Folini Black Alps | 52:38 | 3 | Let's Play |
|
2021-12-12 | Unlocking Secrets Of The Proxmark3 RDV4 0 Christian Herrmann And Kevin Barker Black Alps 2018 | 49:27 | 89 | Let's Play |
|
2021-12-12 | Let's Create A Redteam Mission Alex Kouzmine Black Alps 2018 | 46:12 | 13 | Let's Play |
|
2021-12-12 | Cryptocurrency Mobile Malware Axelle Apvrille Black Alps 2018 | 44:58 | 5 | Let's Play |
|
2021-12-12 | Switzerland Has Bunkers, We Have Vault Christophe Tafani Dereeper Black Alps 2019 | 48:54 | 3 | Let's Play |
|
2021-12-12 | Reversing And Vulnerability Research Of Ethereum Smart Contracts Patrick Ventuzelo Black Alps 2018 | 2:04:31 | 19 | Let's Play |
|
2021-12-12 | How To Provide Security Fixes In A High Constraint Ecosystem Wadeck Follonier Black Alps 2018 | 45:39 | 6 | Let's Play |
|
2021-12-12 | Challenges Of Our Hospitals When Working With Connected Devices P F Regamey Black Alps 2018 | 22:35 | 2 | Let's Play |
|
2021-12-12 | Snuffleupagus Killing bug classes in PHP7, virtual patching the rest | 47:15 | 21 | |
|
2021-12-12 | Down the rabbit hole how hackers exploit weak SSH credentials to build DDos botnets | 30:07 | 6 | |
|
2021-12-12 | From zero to sixty in 3 years by Jad Boutros | 47:57 | 0 | |
|
2021-12-12 | Let's play with WinDBG & NET by Paul Rascagneres | 44:28 | 11 | Let's Play |
|
2021-12-12 | Security review of proximity technologies Beacons and physical web by Renaud Lifchitz | 44:41 | 4 | Review |
|
2021-12-12 | Exploiting Hash Collisions by Ange Albertini | 51:37 | 0 | |
|
2021-12-12 | Improvements to internet voting in Geneva by Thomas Hofer | 46:28 | 0 | |
|
2021-12-12 | Parsing JSON is a minefield by Nicolas Seriot | 47:36 | 7 | |
|
2021-12-12 | Smoking the Locky ransomware code by Rommel Joven | 49:23 | 2 | |
|
2021-12-12 | Leveraging threat modeling for improved information risk management | 38:53 | 1 | Guide |
|
2021-12-12 | 16 ans de Cyber Sécurité en Suisse Romande évolutions, perspectives | 49:53 | 4 | |
|
2021-12-12 | Fingerprint all the things with scannerl by Adrien Giner | 38:14 | 0 | |
|
2021-12-12 | Java JSR 241 and 341 RCE state of mind by Gregory Draperi | 35:48 | 1 | |
|
2021-12-12 | Nicolas Boeckh | 29:35 | 3 | |
|
2021-12-12 | Vix Szymanska | 23:58 | 4 | |
|
2021-12-12 | Dan Conn | 30:35 | 0 | |
|
2021-12-12 | James Hare | 28:41 | 1 | |
|
2021-12-12 | Will Thomas | 29:44 | 3 | |
|
2021-12-12 | Nikhil Mohanlal | 21:45 | 0 | |
|
2021-12-12 | Day 1 Closing Remarks | 3:53 | 0 | |
|
2021-12-12 | Joshua Moore | 29:04 | 0 | |
|
2021-12-12 | Parker | 18:32 | 0 | |
|
2021-12-12 | Day 1 Opening Remarks | 11:08 | 0 | |
|
2021-12-12 | Zak Slater | 15:37 | 2 | |
|
2021-12-12 | Aqeeb Hussain | 29:22 | 3 | |
|
2021-12-12 | Rae Jeffries Harris | 30:13 | 0 | |
|
2021-12-12 | Seán G | 35:26 | 0 | |
|