From BruCON 2015
Jump to: navigation, search

Showing below up to 86 results in range #51 to #136.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. Philip Polstra‏‎ (00:27, 27 August 2014)
  2. Autonomous Remote Hacking Drones‏‎ (00:27, 27 August 2014)
  3. Linux Forensics Workshop‏‎ (00:29, 27 August 2014)
  4. Hal Pomeranz‏‎ (00:29, 27 August 2014)
  5. Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber‏‎ (00:31, 27 August 2014)
  6. Adam Schoeman‏‎ (00:31, 27 August 2014)
  7. Counterfeiting the Pipes with FakeNet 2.0‏‎ (00:34, 27 August 2014)
  8. Michael Sikorski‏‎ (00:35, 27 August 2014)
  9. Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network‏‎ (00:36, 27 August 2014)
  10. Solomon Sonya‏‎ (00:36, 27 August 2014)
  11. Training Digital Forensics with Open Source Tools‏‎ (10:59, 8 September 2014)
  12. Hendrik Adrian‏‎ (21:10, 9 September 2014)
  13. Let's help law enforcement more to drag malware actors into the law‏‎ (21:11, 9 September 2014)
  14. Markus Vervier‏‎ (21:29, 9 September 2014)
  15. Stealing a Mobile Identity Using Wormholes‏‎ (21:31, 9 September 2014)
  16. Jake Valletta‏‎ (21:33, 9 September 2014)
  17. Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android‏‎ (21:33, 9 September 2014)
  18. Didier Stevens‏‎ (21:34, 9 September 2014)
  19. Network device forensics‏‎ (21:35, 9 September 2014)
  20. Xavier Mertens‏‎ (21:36, 9 September 2014)
  21. Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft.‏‎ (21:37, 9 September 2014)
  22. Thunderbolts and Lightning / Very, Very Frightening‏‎ (21:39, 9 September 2014)
  23. Snare‏‎ (21:40, 9 September 2014)
  24. Wim Remes‏‎ (21:42, 9 September 2014)
  25. Daniela Zapata‏‎ (21:42, 9 September 2014)
  26. The dirty secrets of client-side exploitation and protection‏‎ (21:43, 9 September 2014)
  27. Daan Raman‏‎ (21:44, 9 September 2014)
  28. A distributed approach to mobile malware scanning‏‎ (21:45, 9 September 2014)
  29. Vivek Ramachandran‏‎ (21:46, 9 September 2014)
  30. Javascript for Pentesters with over 20 Challenges‏‎ (21:46, 9 September 2014)
  31. Chris Lytle‏‎ (21:49, 9 September 2014)
  32. Leigh Lytle‏‎ (21:52, 9 September 2014)
  33. Old School Crypto‏‎ (21:53, 9 September 2014)
  34. OWASP: OWTF‏‎ (21:54, 9 September 2014)
  35. Bharadwaj Machiraju‏‎ (21:55, 9 September 2014)
  36. OWTF Botnet mode‏‎ (21:57, 9 September 2014)
  37. Marios Kourtesis‏‎ (21:58, 9 September 2014)
  38. Conpot‏‎ (21:59, 9 September 2014)
  39. Daniel Haslinger‏‎ (22:00, 9 September 2014)
  40. Lukas Rist‏‎ (22:00, 9 September 2014)
  41. Johnny Vestergaard‏‎ (22:01, 9 September 2014)
  42. Beer brewing workshop‏‎ (22:04, 9 September 2014)
  43. Machtelt Garrels‏‎ (22:05, 9 September 2014)
  44. OWTF re-architecture‏‎ (22:06, 9 September 2014)
  45. Alessandro Fanio González‏‎ (22:06, 9 September 2014)
  46. Paco Hope‏‎ (22:12, 9 September 2014)
  47. Noel Dunne‏‎ (22:12, 9 September 2014)
  48. Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software‏‎ (22:13, 9 September 2014)
  49. WPScan Vulnerability Database‏‎ (22:14, 9 September 2014)
  50. Ryan Dewhurst‏‎ (22:14, 9 September 2014)
  51. Rzn‏‎ (22:15, 9 September 2014)
  52. "The audit log was cleared" won’t stop me: Advanced Windows Event Log Forensics‏‎ (22:16, 9 September 2014)
  53. Willi Ballenthin‏‎ (22:17, 9 September 2014)
  54. Antonios Atlasis‏‎ (22:18, 9 September 2014)
  55. Coming soon...‏‎ (22:29, 9 September 2014)
  56. Joseph Tartaro‏‎ (22:32, 9 September 2014)
  57. DJ Jackalope (Las Vegas)‏‎ (22:33, 9 September 2014)
  58. DJ workshop‏‎ (22:34, 9 September 2014)
  59. Ocean Lam‏‎ (22:37, 9 September 2014)
  60. DJ Jackalope‏‎ (22:49, 9 September 2014)
  61. The Bug Bash‏‎ (10:57, 12 September 2014)
  62. Chiron - An All-In-One Penetration-Testing Framework for IPv6‏‎ (11:03, 12 September 2014)
  63. How to use SCHED.org‏‎ (12:12, 24 September 2014)
  64. Spring Training 2015 - Red Team Testing‏‎ (21:54, 21 January 2015)
  65. Jennifer Minella‏‎ (07:32, 14 April 2015)
  66. Adam Shostack‏‎ (07:37, 14 April 2015)
  67. Training 2015 - Practical Malware Analysis - Rapid Introduction‏‎ (20:23, 25 April 2015)
  68. Training 2015 - Cyber Breach Management‏‎ (21:52, 28 April 2015)
  69. Contact‏‎ (21:49, 3 May 2015)
  70. Training 2015 - Offensive IoT Exploitation‏‎ (11:54, 26 May 2015)
  71. Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more‏‎ (15:10, 24 June 2015)
  72. Travel‏‎ (21:33, 22 July 2015)
  73. Training 2015 - Tactical Exploitation and Response‏‎ (21:43, 29 August 2015)
  74. Training 2015 - Assessing and Exploiting Control Systems‏‎ (22:00, 29 August 2015)
  75. Training 2015 - Wireshark WiFi and Lua-Packet Class‏‎ (22:39, 9 September 2015)
  76. Training‏‎ (10:14, 17 September 2015)
  77. Network‏‎ (18:22, 21 September 2015)
  78. Hacker Run‏‎ (05:30, 3 October 2015)
  79. Events‏‎ (07:55, 3 October 2015)
  80. Schedule‏‎ (08:38, 3 October 2015)
  81. Frequently Asked Questions‏‎ (08:40, 3 October 2015)
  82. Tickets‏‎ (17:43, 5 October 2015)
  83. Lightning Talks‏‎ (00:18, 8 October 2015)
  84. Main Page‏‎ (08:53, 8 October 2015)
  85. Video‏‎ (13:50, 13 October 2015)
  86. Presentations‏‎ (13:50, 13 October 2015)

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)