From BruCON 2015
Showing below up to 20 results in range #51 to #70.
View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)
- Philip Polstra (00:27, 27 August 2014)
- Autonomous Remote Hacking Drones (00:27, 27 August 2014)
- Linux Forensics Workshop (00:29, 27 August 2014)
- Hal Pomeranz (00:29, 27 August 2014)
- Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber (00:31, 27 August 2014)
- Adam Schoeman (00:31, 27 August 2014)
- Counterfeiting the Pipes with FakeNet 2.0 (00:34, 27 August 2014)
- Michael Sikorski (00:35, 27 August 2014)
- Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network (00:36, 27 August 2014)
- Solomon Sonya (00:36, 27 August 2014)
- Training Digital Forensics with Open Source Tools (10:59, 8 September 2014)
- Hendrik Adrian (21:10, 9 September 2014)
- Let's help law enforcement more to drag malware actors into the law (21:11, 9 September 2014)
- Markus Vervier (21:29, 9 September 2014)
- Stealing a Mobile Identity Using Wormholes (21:31, 9 September 2014)
- Jake Valletta (21:33, 9 September 2014)
- Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android (21:33, 9 September 2014)
- Didier Stevens (21:34, 9 September 2014)
- Network device forensics (21:35, 9 September 2014)
- Xavier Mertens (21:36, 9 September 2014)