From BruCON 2015
Showing below up to 86 results in range #51 to #136.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
- Philip Polstra (00:27, 27 August 2014)
- Autonomous Remote Hacking Drones (00:27, 27 August 2014)
- Linux Forensics Workshop (00:29, 27 August 2014)
- Hal Pomeranz (00:29, 27 August 2014)
- Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber (00:31, 27 August 2014)
- Adam Schoeman (00:31, 27 August 2014)
- Counterfeiting the Pipes with FakeNet 2.0 (00:34, 27 August 2014)
- Michael Sikorski (00:35, 27 August 2014)
- Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network (00:36, 27 August 2014)
- Solomon Sonya (00:36, 27 August 2014)
- Training Digital Forensics with Open Source Tools (10:59, 8 September 2014)
- Hendrik Adrian (21:10, 9 September 2014)
- Let's help law enforcement more to drag malware actors into the law (21:11, 9 September 2014)
- Markus Vervier (21:29, 9 September 2014)
- Stealing a Mobile Identity Using Wormholes (21:31, 9 September 2014)
- Jake Valletta (21:33, 9 September 2014)
- Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android (21:33, 9 September 2014)
- Didier Stevens (21:34, 9 September 2014)
- Network device forensics (21:35, 9 September 2014)
- Xavier Mertens (21:36, 9 September 2014)
- Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft. (21:37, 9 September 2014)
- Thunderbolts and Lightning / Very, Very Frightening (21:39, 9 September 2014)
- Snare (21:40, 9 September 2014)
- Wim Remes (21:42, 9 September 2014)
- Daniela Zapata (21:42, 9 September 2014)
- The dirty secrets of client-side exploitation and protection (21:43, 9 September 2014)
- Daan Raman (21:44, 9 September 2014)
- A distributed approach to mobile malware scanning (21:45, 9 September 2014)
- Vivek Ramachandran (21:46, 9 September 2014)
- Javascript for Pentesters with over 20 Challenges (21:46, 9 September 2014)
- Chris Lytle (21:49, 9 September 2014)
- Leigh Lytle (21:52, 9 September 2014)
- Old School Crypto (21:53, 9 September 2014)
- OWASP: OWTF (21:54, 9 September 2014)
- Bharadwaj Machiraju (21:55, 9 September 2014)
- OWTF Botnet mode (21:57, 9 September 2014)
- Marios Kourtesis (21:58, 9 September 2014)
- Conpot (21:59, 9 September 2014)
- Daniel Haslinger (22:00, 9 September 2014)
- Lukas Rist (22:00, 9 September 2014)
- Johnny Vestergaard (22:01, 9 September 2014)
- Beer brewing workshop (22:04, 9 September 2014)
- Machtelt Garrels (22:05, 9 September 2014)
- OWTF re-architecture (22:06, 9 September 2014)
- Alessandro Fanio González (22:06, 9 September 2014)
- Paco Hope (22:12, 9 September 2014)
- Noel Dunne (22:12, 9 September 2014)
- Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software (22:13, 9 September 2014)
- WPScan Vulnerability Database (22:14, 9 September 2014)
- Ryan Dewhurst (22:14, 9 September 2014)
- Rzn (22:15, 9 September 2014)
- "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics (22:16, 9 September 2014)
- Willi Ballenthin (22:17, 9 September 2014)
- Antonios Atlasis (22:18, 9 September 2014)
- Coming soon... (22:29, 9 September 2014)
- Joseph Tartaro (22:32, 9 September 2014)
- DJ Jackalope (Las Vegas) (22:33, 9 September 2014)
- DJ workshop (22:34, 9 September 2014)
- Ocean Lam (22:37, 9 September 2014)
- DJ Jackalope (22:49, 9 September 2014)
- The Bug Bash (10:57, 12 September 2014)
- Chiron - An All-In-One Penetration-Testing Framework for IPv6 (11:03, 12 September 2014)
- How to use SCHED.org (12:12, 24 September 2014)
- Spring Training 2015 - Red Team Testing (21:54, 21 January 2015)
- Jennifer Minella (07:32, 14 April 2015)
- Adam Shostack (07:37, 14 April 2015)
- Training 2015 - Practical Malware Analysis - Rapid Introduction (20:23, 25 April 2015)
- Training 2015 - Cyber Breach Management (21:52, 28 April 2015)
- Contact (21:49, 3 May 2015)
- Training 2015 - Offensive IoT Exploitation (11:54, 26 May 2015)
- Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more (15:10, 24 June 2015)
- Travel (21:33, 22 July 2015)
- Training 2015 - Tactical Exploitation and Response (21:43, 29 August 2015)
- Training 2015 - Assessing and Exploiting Control Systems (22:00, 29 August 2015)
- Training 2015 - Wireshark WiFi and Lua-Packet Class (22:39, 9 September 2015)
- Training (10:14, 17 September 2015)
- Network (18:22, 21 September 2015)
- Hacker Run (05:30, 3 October 2015)
- Events (07:55, 3 October 2015)
- Schedule (08:38, 3 October 2015)
- Frequently Asked Questions (08:40, 3 October 2015)
- Tickets (17:43, 5 October 2015)
- Lightning Talks (00:18, 8 October 2015)
- Main Page (08:53, 8 October 2015)
- Video (13:50, 13 October 2015)
- Presentations (13:50, 13 October 2015)