From BruCON 2015
Jump to: navigation, search

Showing below up to 20 results in range #51 to #70.

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

  1. Philip Polstra‏‎ (00:27, 27 August 2014)
  2. Autonomous Remote Hacking Drones‏‎ (00:27, 27 August 2014)
  3. Linux Forensics Workshop‏‎ (00:29, 27 August 2014)
  4. Hal Pomeranz‏‎ (00:29, 27 August 2014)
  5. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber‏‎ (00:31, 27 August 2014)
  6. Adam Schoeman‏‎ (00:31, 27 August 2014)
  7. Counterfeiting the Pipes with FakeNet 2.0‏‎ (00:34, 27 August 2014)
  8. Michael Sikorski‏‎ (00:35, 27 August 2014)
  9. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network‏‎ (00:36, 27 August 2014)
  10. Solomon Sonya‏‎ (00:36, 27 August 2014)
  11. Training Digital Forensics with Open Source Tools‏‎ (10:59, 8 September 2014)
  12. Hendrik Adrian‏‎ (21:10, 9 September 2014)
  13. Let's help law enforcement more to drag malware actors into the law‏‎ (21:11, 9 September 2014)
  14. Markus Vervier‏‎ (21:29, 9 September 2014)
  15. Stealing a Mobile Identity Using Wormholes‏‎ (21:31, 9 September 2014)
  16. Jake Valletta‏‎ (21:33, 9 September 2014)
  17. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android‏‎ (21:33, 9 September 2014)
  18. Didier Stevens‏‎ (21:34, 9 September 2014)
  19. Network device forensics‏‎ (21:35, 9 September 2014)
  20. Xavier Mertens‏‎ (21:36, 9 September 2014)

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)