2023-05-24 | Strom Carlson Why your mom will never care about Linux | 48:34 | 0 | |
|
2023-05-24 | Datagram Lockpicking Forensics | 1:01:03 | 0 | |
|
2023-05-24 | David Bryan Hacking with GNU Radio | 47:49 | 1 | |
|
2023-05-24 | DC949 TwatFS | 32:38 | 1 | |
|
2023-05-24 | Deviant Ollam Packing and the Friendly Skies | 39:16 | 1 | |
|
2023-05-24 | Deviant Ollam's L1 Promo | 3:24 | 0 | |
|
2023-05-24 | Don Ankney Is XSS Solveable | 41:11 | 2 | |
|
2023-05-24 | Doug Cohen Computation and Modeling | 39:06 | 1 | |
|
2023-05-24 | Erik Berls Deploying DNSSEC | 52:55 | 0 | |
|
2023-05-24 | Jim O'Gorman Policy The Biscuit Game of InfoSec | 55:34 | 1 | |
|
2023-05-24 | Joe McCray Advanced SQL Injection | 44:59 | 1 | |
|
2023-05-24 | Kevin Nassery Diplomatic Security Consulting | 1:00:24 | 0 | |
|
2023-05-24 | Ryan Upton Incident Response 101 | 1:01:46 | 0 | |
|
2023-05-24 | Aditya K Sood Insidious Infections Mangling with Botnets | 53:04 | 0 | |
|
2023-05-24 | Vyrus and Frank2 My Other Shellcode is the da Vinci Virus | 31:48 | 0 | |
|
2023-05-24 | Robert Rowley Juice Jacking 101 Learning from Shennanigans | 47:27 | 0 | |
|
2023-05-24 | Robert Rowley Securing Web Applications m4v | 47:07 | 1 | |
|
2023-05-24 | Dan Tentler Carpe Datum Drinking from the espresso fire hose we know as Shodan | 45:24 | 0 | |
|
2023-05-24 | Sam Bowne Layer 7 DoS Attacks m4v | 46:35 | 0 | |
|
2023-05-24 | Datagram and Schuyler Towne Disc Detainer Lockpicking | 1:04:42 | 0 | |
|
2023-05-24 | Schuyler Towne History of Locksport 1800 1900 m4v | 48:14 | 0 | |
|
2023-05-24 | David Bryan Building the DEFCON Network m4v | 56:48 | 1 | |
|
2023-05-24 | DC949 Codename Stiltwalker | 1:18:24 | 0 | |
|
2023-05-24 | Evan Booth Residential Security m4v | 33:52 | 0 | |
|
2023-05-24 | Ghostwood Youve been DDoSd so what m4v | 59:50 | 0 | |
|
2023-05-24 | Jimmy Shah Mobile Malware Moolah m4v | 36:09 | 0 | |
|
2023-05-24 | Joe McCray You spent all that money m4v | 1:11:30 | 1 | |
|
2023-05-24 | John Norman DIY Access Control m4v | 56:54 | 1 | |
|
2023-05-24 | John Norman Physical Security Bridging the Gap With Open Source Hardware | 1:02:12 | 0 | |
|
2023-05-24 | Kevin Nassery Security Prioritization m4v | 56:31 | 0 | |
|
2023-05-24 | Krs Designing the LayerOne badge m4v | 28:31 | 0 | |
|
2023-05-24 | Merlin Ouroboros for Daemon Lovers m4v | 16:57 | 1 | |
|
2023-05-24 | Petty Larceny Personal Disaster Preparedness m4v | 49:26 | 1 | |
|
2023-05-24 | Karthik Raman Selecting Features to Classify Malware | 45:36 | 0 | |
|
2023-05-24 | Datagram Intro to Safecracking | 41:57 | 0 | |
|
2023-05-24 | David Bryan I pwned your router, oops | 41:14 | 0 | |
|
2023-05-24 | Jimmy Shah Real Advances in Android Malware | 43:39 | 0 | |
|
2023-05-24 | Joe McCray Big Bang Theory The Evolution of Pentesting High Security Environments | 48:22 | 4 | |
|
2023-05-24 | Jon McCoy Hacking NETC# Applications The Black Arts v2 | 1:11:20 | 1 | |
|
2023-05-24 | Hardware Reverse Engineering 101 | 1:00:03 | 2 | |
|
2023-05-24 | Improving Social Engineering Campaigns with Narrative Construction | 53:09 | 0 | |
|
2023-05-24 | Introduction and welcome | 2:26 | 0 | |
|
2023-05-24 | Lockpicking Village Intro to Lockpicking | 20:12 | 0 | |
|
2023-05-24 | Long Lost Locks The X Patents | 49:40 | 0 | |
|
2023-05-24 | Teaching your WAF new tricks | 48:46 | 0 | |
|
2023-05-24 | The Architects Room What goes on when Neo isn t getting lectured | 31:38 | 2 | |
|
2023-05-24 | The Dark Arts of OSINT | 1:00:41 | 4 | |
|
2023-05-24 | You have been DDoSed so what Two years later | 45:22 | 0 | |
|
2023-05-24 | Closing remarks by datagram | 20:55 | 0 | |
|
2023-05-24 | Cognitive Enhancement Drugs, Electricity and Bullsh t | 31:49 | 3 | |
|
2023-05-24 | Data Evaporation on SSDs plus DoS | 58:05 | 0 | |
|
2023-05-24 | Differential Cryptanalysis for Dummies | 38:49 | 1 | |
|
2023-05-24 | Discovering Dark Matter Towards Better Android Malware Heuristics | 44:20 | 0 | |
|
2023-05-24 | You've been DDoSed it s not a joke anymore | 43:58 | 0 | |
|
2023-05-24 | 3D Printing Our Way to Skynet | 1:00:48 | 1 | |
|
2023-05-24 | Are You A Janitor Or A Cleaner | 1:05:21 | 0 | |
|
2023-05-24 | Beyond the Perimeter The reality of the new application security landscape | 41:14 | 1 | |
|
2023-05-24 | Bug Bounty Extortion | 27:25 | 1 | |
|
2023-05-24 | Closing Remarks | 46:00 | 0 | |
|
2023-05-24 | Detecting and Defending Against State Actor Surveillance | 40:45 | 0 | |
|
2023-05-24 | Lockpicking In Popular Media | 51:05 | 1 | |
|
2023-05-24 | Making of the 2014 L1 badge | 26:29 | 0 | |
|
2023-05-24 | Next Generation Red Teaming | 54:10 | 2 | |
|
2023-05-24 | Privacy and Policy | 46:42 | 0 | |
|
2023-05-24 | Reverse Engineering 101 | 1:14:36 | 0 | |
|
2023-05-24 | Violent Python & the Antivirus Scam | 56:06 | 0 | |
|
2023-05-24 | You're HIPAA certified and Bob just killed someone from the parking lot | 35:23 | 0 | |
|
2023-05-24 | Stealth The Death of Privacy | 50:21 | 0 | |
|
2023-05-24 | Viss How Not to InfoSec | 52:31 | 0 | |
|
2023-05-24 | Arclight Enterprise IT on the Cheap | 55:01 | 0 | |
|
2023-05-24 | Chi Barnett The Ethical Spy | 52:34 | 0 | |
|
2023-05-24 | Dr Tran Insurance for your Cyber | 34:49 | 0 | |
|
2023-05-24 | Dr Amade Nyirak Social Engineering Defense for the Masses | 47:17 | 0 | |
|
2023-05-24 | Ghostwood Another Year Another DDoS | 50:46 | 0 | |
|
2023-05-24 | HotelBravo Let s Talk about sec baby, Let s talk about it in healthcare | 25:45 | 0 | Discussion |
|
2023-05-24 | Jos Weyers Showing Keys in Public What Could Possibly Go Wrong | 53:29 | 1 | |
|
2023-05-24 | Matt Hoy & David Khudaverdyan Smartphone Security and Privacy for the General Public | 42:48 | 1 | |
|
2023-05-24 | Robert Rowley An 0 day in the life of a security researcher | 45:30 | 2 | |
|
2023-05-24 | Sam Bowne How to Trojan Financial Android Apps & SSL Validation Failures | 52:55 | 7 | Guide |
|
2023-05-20 | OWASP Top 10 Free Training LASCON 2016 4 4 | 1:35:23 | 3 | |
|
2023-05-20 | OWASP Top 10 Free Training LASCON 2016 3 4 | 1:24:55 | 3 | |
|
2023-05-20 | Architecting for Security in the Cloud Josh Sokol | 39:37 | 2 | |
|
2023-05-20 | Serverless security A pragmatic primer for builders and defenders James Wickett | 47:17 | 3 | |
|
2023-05-20 | Won't somebody please think of the data Sarah Jane Madden | 45:00 | 1 | |
|
2023-05-20 | Are you ready for my call Responsible Disclosure Preparedness Jason Kent | 48:13 | 0 | |
|
2023-05-20 | Startup Security Making Everyone Happy Michael McCabe, Brian Henderson | 47:12 | 11 | |
|
2023-05-20 | The Rest of the Story Securing a Raspberry Pi Home Monitoring System Laurel Marotta | 36:07 | 1 | |
|
2023-05-20 | IOT Assimilation Resistance is Futile Mark Szewczul | 59:11 | 0 | |
|
2023-05-20 | Attack Vectors in Biometric Recognition Systems Clare Nelson | 48:53 | 0 | |
|
2023-05-20 | The Role of Empathy in Vulnerability Disclosure Practices for Software Vendors Adam Goodman | 45:33 | 0 | |
|
2023-05-20 | Breaking into Security Tommy Dew, Gisela Hinojosa | 41:14 | 2 | |
|
2023-05-20 | Keynote Chris Nickerson | 44:31 | 1 | |
|
2023-05-20 | Threat Modeling For Secure Software Design | 51:47 | 1 | |
|
2023-05-20 | Cloud Ops MasterClass Lessons learned from cloud automation Michael Osburn, Nathan Wallace | 55:38 | 0 | |
|
2023-05-20 | Keynote Georgia Weidman | 51:18 | 0 | |
|
2023-05-20 | Using Identity to Evolve Application Security Kevin Paige | 47:16 | 0 | |
|
2023-05-20 | Core Rule Set for the Masses Lessons from taming ModSecurity rules at massive scale Tin Zaw | 49:59 | 0 | |
|
2023-05-20 | Layer 8 and Why People are the Most Important Security Tool | 43:16 | 2 | |
|
2023-05-20 | Where we’re going we won’t need passwords Matt Hajda | 52:54 | 1 | |
|
2023-05-20 | Demystifying the Ransomware and IoT Threat Christopher Elisan | 40:57 | 0 | |
|