From BruCON 2015
Showing below up to 50 results in range #51 to #100.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Philip Polstra (00:27, 27 August 2014)
- Autonomous Remote Hacking Drones (00:27, 27 August 2014)
- Linux Forensics Workshop (00:29, 27 August 2014)
- Hal Pomeranz (00:29, 27 August 2014)
- Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber (00:31, 27 August 2014)
- Adam Schoeman (00:31, 27 August 2014)
- Counterfeiting the Pipes with FakeNet 2.0 (00:34, 27 August 2014)
- Michael Sikorski (00:35, 27 August 2014)
- Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network (00:36, 27 August 2014)
- Solomon Sonya (00:36, 27 August 2014)
- Training Digital Forensics with Open Source Tools (10:59, 8 September 2014)
- Hendrik Adrian (21:10, 9 September 2014)
- Let's help law enforcement more to drag malware actors into the law (21:11, 9 September 2014)
- Markus Vervier (21:29, 9 September 2014)
- Stealing a Mobile Identity Using Wormholes (21:31, 9 September 2014)
- Jake Valletta (21:33, 9 September 2014)
- Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android (21:33, 9 September 2014)
- Didier Stevens (21:34, 9 September 2014)
- Network device forensics (21:35, 9 September 2014)
- Xavier Mertens (21:36, 9 September 2014)
- Veteran startup CTO and author focused on bringing security and privacy to customers. Currently doing so at Microsoft. (21:37, 9 September 2014)
- Thunderbolts and Lightning / Very, Very Frightening (21:39, 9 September 2014)
- Snare (21:40, 9 September 2014)
- Wim Remes (21:42, 9 September 2014)
- Daniela Zapata (21:42, 9 September 2014)
- The dirty secrets of client-side exploitation and protection (21:43, 9 September 2014)
- Daan Raman (21:44, 9 September 2014)
- A distributed approach to mobile malware scanning (21:45, 9 September 2014)
- Vivek Ramachandran (21:46, 9 September 2014)
- Javascript for Pentesters with over 20 Challenges (21:46, 9 September 2014)
- Chris Lytle (21:49, 9 September 2014)
- Leigh Lytle (21:52, 9 September 2014)
- Old School Crypto (21:53, 9 September 2014)
- OWASP: OWTF (21:54, 9 September 2014)
- Bharadwaj Machiraju (21:55, 9 September 2014)
- OWTF Botnet mode (21:57, 9 September 2014)
- Marios Kourtesis (21:58, 9 September 2014)
- Conpot (21:59, 9 September 2014)
- Daniel Haslinger (22:00, 9 September 2014)
- Lukas Rist (22:00, 9 September 2014)
- Johnny Vestergaard (22:01, 9 September 2014)
- Beer brewing workshop (22:04, 9 September 2014)
- Machtelt Garrels (22:05, 9 September 2014)
- OWTF re-architecture (22:06, 9 September 2014)
- Alessandro Fanio González (22:06, 9 September 2014)
- Paco Hope (22:12, 9 September 2014)
- Noel Dunne (22:12, 9 September 2014)
- Security Makes Strange Bedfellows: Using Legal and Procurement To Secure Software (22:13, 9 September 2014)
- WPScan Vulnerability Database (22:14, 9 September 2014)
- Ryan Dewhurst (22:14, 9 September 2014)