DerbyCon8/DerbyCon8_meta.sqlite |
289 KB |
DerbyCon8/.____padding_file/126 |
1.7 MB |
DerbyCon8/DerbyCon8_meta.xml |
768 B |
DerbyCon8/.____padding_file/1 |
2 MB |
DerbyCon8/Derbycon-8-Closing-Ceremonies.mp4 |
290.2 MB |
DerbyCon8/.____padding_file/125 |
1.8 MB |
DerbyCon8/Derbycon-8-Opening-Ceremony.mp4 |
147.8 MB |
DerbyCon8/.____padding_file/124 |
230 KB |
DerbyCon8/Keynote-00-How-to-influence-security-technology-in-kiwi-underpants-Benjamin-Delpy.mp4 |
104 MB |
DerbyCon8/.____padding_file/123 |
2 MB |
DerbyCon8/Keynote-01-Panel-Discussion-At-a-Glance-Information-Security-Ed-Skoudis-John-Strand-Lesley-Carhart-Moderated-by-Dave-Kennedy.mp4 |
603.4 MB |
DerbyCon8/.____padding_file/122 |
572 KB |
DerbyCon8/Stable-00-Red-Teaming-gaps-and-musings-Samuel-Sayen.mp4 |
67.7 MB |
DerbyCon8/.____padding_file/121 |
266 KB |
DerbyCon8/Stable-01-A-Process-is-No-One-Hunting-for-Token-Manipulation-Jared-Atkinson-Robby-Winchester.mp4 |
89.5 MB |
DerbyCon8/.____padding_file/120 |
476 KB |
DerbyCon8/Stable-02-Fuzz-your-smartphone-from-4G-base-station-side-Tso-Jen-Liu.mp4 |
68.2 MB |
DerbyCon8/.____padding_file/119 |
1.8 MB |
DerbyCon8/Stable-03-Clippy-for-the-Dark-Web-Looks-Like-Youre-Trying-to-Buy-Some-Dank-Kush-Can-I-Help-You-With-That-Emma-Zaballos.mp4 |
130.7 MB |
DerbyCon8/.____padding_file/118 |
1.3 MB |
DerbyCon8/Stable-04-Synfuzz-Building-a-Grammar-Based-Re-targetable-Test-Generation-Framework-Joe-Rozner.mp4 |
143.6 MB |
DerbyCon8/.____padding_file/117 |
431 KB |
DerbyCon8/Stable-05-Escoteric-Hashcat-Attacks-Evilmog.mp4 |
52.2 MB |
DerbyCon8/.____padding_file/116 |
1.8 MB |
DerbyCon8/Stable-07-RFID-Luggage-Tags-IATA-vs-Real-Life-Daniel-Lagos.mp4 |
187.1 MB |
DerbyCon8/.____padding_file/115 |
931 KB |
DerbyCon8/Stable-08-LOL-They-Placed-Their-DMZ-in-the-Cloud-Easy-Pwnage-or-Disruptive-Protection-Carl-Alexander.mp4 |
55.3 MB |
DerbyCon8/.____padding_file/114 |
734 KB |
DerbyCon8/Stable-09-Maintaining-post-exploitation-opsec-in-a-world-with-EDR-Michael-Roberts-Martin-Roberts.mp4 |
147.6 MB |
DerbyCon8/.____padding_file/113 |
416 KB |
DerbyCon8/Stable-10-Hey-I-found-a-vulnerability-now-what-Lisa-Bradley-CRob.mp4 |
87.2 MB |
DerbyCon8/.____padding_file/112 |
787 KB |
DerbyCon8/Stable-11-Foxtrot-C2-A-Journey-of-Payload-Delivery-Dimitry-Snezhkov.mp4 |
83.3 MB |
DerbyCon8/.____padding_file/111 |
749 KB |
DerbyCon8/Stable-12-Ridesharks-Kaleb-Brown.mp4 |
37.3 MB |
DerbyCon8/.____padding_file/110 |
768 KB |
DerbyCon8/Stable-13-Tales-From-the-Bug-Mine-Highlights-from-the-Android-VRP-Brian-Claire-Young.mp4 |
41.4 MB |
DerbyCon8/.____padding_file/109 |
583 KB |
DerbyCon8/Stable-14-Decision-Analysis-Applications-in-Threat-Analysis-Frameworks-Emily-Shawgo.mp4 |
34.5 MB |
DerbyCon8/.____padding_file/107 |
1.5 MB |
DerbyCon8/Stable-15-Threat-Intel-On-The-Fly-Tazz.mp4 |
555.4 MB |
DerbyCon8/.____padding_file/108 |
655 KB |
DerbyCon8/Stable-16-Make-Me-Your-Dark-Web-Personal-Shopper-Emma-Zaballos.mp4 |
69.4 MB |
DerbyCon8/.____padding_file/106 |
637 KB |
DerbyCon8/Stable-17-Driving-Away-Social-Anxiety-Joey-Maresca.mp4 |
49.3 MB |
DerbyCon8/.____padding_file/105 |
755 KB |
DerbyCon8/Stable-18-Off-grid-coms-and-power-Justin-Herman.mp4 |
454.2 MB |
DerbyCon8/.____padding_file/104 |
1.8 MB |
DerbyCon8/Stable-19-CTFs-Leveling-Up-Through-Competition-Alex-Flores.mp4 |
50.4 MB |
DerbyCon8/.____padding_file/103 |
1.6 MB |
DerbyCon8/Stable-21-Extending-Burp-to-Find-Struts-and-XXE-Vulnerabilities-Chris-Elgee.mp4 |
47.8 MB |
DerbyCon8/.____padding_file/102 |
217 KB |
DerbyCon8/Stable-22-Introduction-to-x86-Assembly-DazzleCatDuo.mp4 |
50.9 MB |
DerbyCon8/.____padding_file/101 |
1.1 MB |
DerbyCon8/Stable-23-Pacu-Attack-and-Post-Exploitation-in-AWS-Spencer-Gietzen.mp4 |
101.2 MB |
DerbyCon8/.____padding_file/100 |
774 KB |
DerbyCon8/Stable-24-An-Inconvenient-Truth-Evading-the-Ransomware-Protection-in-Windows-10-Soya-Aoyama.mp4 |
89.6 MB |
DerbyCon8/.____padding_file/99 |
394 KB |
DerbyCon8/Stable-25-Brutal-Blogging-Go-for-the-Jugular-Kate-Brew.mp4 |
78.4 MB |
DerbyCon8/.____padding_file/98 |
1.6 MB |
DerbyCon8/Stable-26-RID-Hijacking-Maintaining-Access-on-Windows-Machines-Sebastin-Castro.mp4 |
90 MB |
DerbyCon8/.____padding_file/97 |
2 MB |
DerbyCon8/Stable-27-Your-Training-Data-is-Bad-and-You-Should-Feel-Bad-Ryan-J-OGrady.mp4 |
71 MB |
DerbyCon8/.____padding_file/96 |
1 MB |
DerbyCon8/Stable-28-So-many-pentesting-tools-from-a-4-Arduino-Kevin-Bong-Michael-Vieau.mp4 |
62.1 MB |
DerbyCon8/.____padding_file/95 |
1.9 MB |
DerbyCon8/Stable-29-Patching-Show-me-where-it-hurts-Cheryl-Biswas.mp4 |
67.7 MB |
DerbyCon8/.____padding_file/94 |
318 KB |
DerbyCon8/Stable-30-Advanced-Deception-Technology-Through-Behavioral-Biometrics-Curt-Barnard-Dawud-Gordon.mp4 |
83.1 MB |
DerbyCon8/.____padding_file/93 |
918 KB |
DerbyCon8/Stable-31-We-are-all-on-the-spectrum-What-my-10-year-old-taught-me-about-leading-teams-Carla-A-Raisler.mp4 |
110.4 MB |
DerbyCon8/.____padding_file/92 |
1.6 MB |
DerbyCon8/Stable-32-No-Place-Like-Home-Real-Estate-OSINT-and-OPSec-Fails-John-Bullinger.mp4 |
60.6 MB |
DerbyCon8/.____padding_file/91 |
1.4 MB |
DerbyCon8/Stable-33-The-Layer2-Nightmare-Chris-Mallz.mp4 |
621.5 MB |
DerbyCon8/.____padding_file/90 |
535 KB |
DerbyCon8/Stable-34-Attacking-Azure-Environments-with-PowerShell-Karl-Fosaaen.mp4 |
56 MB |
DerbyCon8/.____padding_file/89 |
2 MB |
DerbyCon8/Stable-35-Blue-Blood-Injection-Transitioning-Red-to-Purple-Lsly-Ayyy.mp4 |
80 MB |
DerbyCon8/.____padding_file/88 |
40 KB |
DerbyCon8/Stable-36-Mirai-Satori-OMG-and-Owari-IoT-Botnets-Oh-My-Peter-Arzamendi.mp4 |
88.4 MB |
DerbyCon8/.____padding_file/87 |
1.6 MB |
DerbyCon8/Stable-37-Comparing-apples-to-Apple-Adam-Mathis.mp4 |
116.5 MB |
DerbyCon8/.____padding_file/86 |
1.5 MB |
DerbyCon8/Stable-38-How-online-dating-made-me-better-at-threat-modeling-Isaiah-Sarju.mp4 |
102.5 MB |
DerbyCon8/.____padding_file/85 |
1.5 MB |
DerbyCon8/Stable-39-Threat-Hunting-with-a-Raspberry-Pi-Jamie-Murdock.mp4 |
77 MB |
DerbyCon8/.____padding_file/84 |
1013 KB |
DerbyCon8/Stable-40-MA-Defense-and-Integration-All-that-Glitters-is-not-Gold-Sara-Leal-Jason-Morrow.mp4 |
178.6 MB |
DerbyCon8/.____padding_file/83 |
1.4 MB |
DerbyCon8/Track-1-00-IRS-HR-Microsoft-and-your-Grandma-What-they-all-have-in-common-Christopher-Hadnagy-Cat-Murdock.mp4 |
165.2 MB |
DerbyCon8/.____padding_file/82 |
795 KB |
DerbyCon8/Track-1-01-LOLBins-Nothing-to-LOL-about-Oddvar-Moe.mp4 |
132.2 MB |
DerbyCon8/.____padding_file/81 |
1.8 MB |
DerbyCon8/Track-1-02-Everything-Else-I-Learned-About-Security-I-Learned-From-Hip-Hop-Paul-Asadoorian.mp4 |
105.8 MB |
DerbyCon8/.____padding_file/80 |
244 KB |
DerbyCon8/Track-1-03-Hackers-Hugs-Drugs-Mental-Health-in-Infosec-Amanda-Berlin.mp4 |
425.1 MB |
DerbyCon8/.____padding_file/79 |
955 KB |
DerbyCon8/Track-1-04-Android-App-Penetration-Testing-101-Joff-Thyer-Derek-Banks.mp4 |
141.4 MB |
DerbyCon8/.____padding_file/78 |
620 KB |
DerbyCon8/Track-1-05-Draw-a-Bigger-Circle-InfoSec-Evolves-Cheryl-Biswas.mp4 |
133.8 MB |
DerbyCon8/.____padding_file/77 |
155 KB |
DerbyCon8/Track-1-06-Building-an-Empire-with-IronPython-Jim-Shaver.mp4 |
85.6 MB |
DerbyCon8/.____padding_file/76 |
390 KB |
DerbyCon8/Track-1-07-SAEDY-Subversion-and-Espionage-Directed-Against-You-Judy-Towers.mp4 |
163.5 MB |
DerbyCon8/.____padding_file/75 |
522 KB |
DerbyCon8/Track-1-08-OSXPirrit-Reverse-engineering-mac-OSX-malware-and-the-legal-department-of-the-company-who-makes-it-Amit-Serper-Niv-Yona-Yuval-Chuddy.mp4 |
251.9 MB |
DerbyCon8/.____padding_file/74 |
139 KB |
DerbyCon8/Track-1-09-How-to-test-Network-Investigative-TechniquesNITs-used-by-the-FBI-Dr-Matthew-Miller.mp4 |
100.7 MB |
DerbyCon8/.____padding_file/73 |
1.3 MB |
DerbyCon8/Track-1-10-Cloud-Computing-Therapy-Session-Cara-Marie-Andy-Cooper.mp4 |
104.7 MB |
DerbyCon8/.____padding_file/72 |
1.3 MB |
DerbyCon8/Track-1-11-Silent-Compromise-Social-Engineering-Fortune-500-Businesses-Joe-Gray.mp4 |
113.4 MB |
DerbyCon8/.____padding_file/71 |
624 KB |
DerbyCon8/Track-1-12-Dexter-the-friendly-forensics-expert-on-the-Coinbase-security-team-Hayden-Parker.mp4 |
78.6 MB |
DerbyCon8/.____padding_file/70 |
1.4 MB |
DerbyCon8/Track-1-13-Going-on-a-Printer-Safari-Hunting-Zebra-Printers-James-Edge.mp4 |
84.5 MB |
DerbyCon8/.____padding_file/69 |
1.5 MB |
DerbyCon8/Track-1-14-Social-Engineering-At-Work-How-to-use-positive-influence-to-gain-management-buy-in-for-anything-April-Wright.mp4 |
113.5 MB |
DerbyCon8/.____padding_file/68 |
487 KB |
DerbyCon8/Track-1-15-Ham-Radio-4-Hackers-Eric-Watkins-Devin-Noel.mp4 |
126.9 MB |
DerbyCon8/.____padding_file/67 |
1.1 MB |
DerbyCon8/Track-1-16-Getting-Control-of-Your-Vendors-Before-They-Take-You-Down-Dan-Browder.mp4 |
91.2 MB |
DerbyCon8/.____padding_file/66 |
811 KB |
DerbyCon8/Track-1-17-Cyber-Intelligence-There-Are-No-Rules-and-No-Certainties-Coleman-Kane.mp4 |
113.1 MB |
DerbyCon8/.____padding_file/65 |
958 KB |
DerbyCon8/Track-1-18-Getting-Started-in-CCDC-Russell-Nielsen.mp4 |
56.1 MB |
DerbyCon8/.____padding_file/64 |
1.9 MB |
DerbyCon8/Track-1-19-Changing-Our-Mindset-From-Technical-To-Psychological-Defenses-Andrew-Kalat.mp4 |
99.7 MB |
DerbyCon8/.____padding_file/63 |
337 KB |
DerbyCon8/Track-2-00-I-Can-Be-Apple-and-So-Can-You-Josh-Pitts.mp4 |
262.1 MB |
DerbyCon8/.____padding_file/62 |
1.9 MB |
DerbyCon8/Track-2-01-From-Workstation-to-Domain-Admin-Why-Secure-Administration-Isnt-Secure-and-How-to-Fix-It-Sean-Metcalf.mp4 |
345.9 MB |
DerbyCon8/.____padding_file/61 |
51 KB |
DerbyCon8/Track-2-02-MS17-010-zerosum0x0.mp4 |
324.2 MB |
DerbyCon8/.____padding_file/60 |
1.8 MB |
DerbyCon8/Track-2-03-The-Unintended-Risks-of-Trusting-Active-Directory-Lee-Christensen-Will-Schroeder-Matt-Nelson.mp4 |
414.4 MB |
DerbyCon8/.____padding_file/59 |
1.6 MB |
DerbyCon8/Track-2-04-Lessons-Learned-by-the-WordPress-Security-Team-Aaron-D-Campbell.mp4 |
317.6 MB |
DerbyCon8/.____padding_file/58 |
426 KB |
DerbyCon8/Track-2-05-IronPython-omfg-Marcello-Salvati.mp4 |
400.1 MB |
DerbyCon8/.____padding_file/57 |
1.9 MB |
DerbyCon8/Track-2-06-Hardware-Slashing-Smashing-and-Reconstructing-for-Root-access-Deral-Heiland.mp4 |
125 MB |
DerbyCon8/.____padding_file/56 |
1020 KB |
DerbyCon8/Track-2-07-App-o-Lockalypse-now-Oddvar-Moe.mp4 |
140.7 MB |
DerbyCon8/.____padding_file/55 |
1.3 MB |
DerbyCon8/Track-2-08-Web-App-101-Getting-the-lay-of-the-land-Mike-Saunders.mp4 |
85.7 MB |
DerbyCon8/.____padding_file/54 |
319 KB |
DerbyCon8/Track-2-09-Invoke-DOSfuscation-Techniques-FOR-F-IN-style-DO-S-level-CMD-Obfuscation-Daniel-Bohannon.mp4 |
115 MB |
DerbyCon8/.____padding_file/53 |
1 MB |
DerbyCon8/Track-2-10-WE-ARE-THE-ARTILLERY-Using-Google-Fu-To-Take-Down-The-Grids-Chris-Sistrunk-Krypt3ia-SynAckPwn.mp4 |
90.9 MB |
DerbyCon8/.____padding_file/52 |
1.1 MB |
DerbyCon8/Track-2-11-Just-Let-Yourself-In-David-Boyd.mp4 |
131.9 MB |
DerbyCon8/.____padding_file/51 |
123 KB |
DerbyCon8/Track-2-12-A-Crash-Course-in-Exploiting-Buffer-Overflows-Live-Demos-Parker-Garrison.mp4 |
116.6 MB |
DerbyCon8/.____padding_file/50 |
1.4 MB |
DerbyCon8/Track-2-13-Living-in-a-Secure-Container-Down-by-the-River-Jack-Mannino.mp4 |
78.7 MB |
DerbyCon8/.____padding_file/49 |
1.3 MB |
DerbyCon8/Track-2-14-Red-Mirror-Bringing-Telemetry-to-Red-Teaming-Zach-Grace.mp4 |
101.6 MB |
DerbyCon8/.____padding_file/48 |
385 KB |
DerbyCon8/Track-2-15-Two-Factor-Too-Furious-Evading-and-Protecting-Evolving-MFA-Schemes-Austin-Baker-Doug-Bienstock.mp4 |
96.9 MB |
DerbyCon8/.____padding_file/47 |
1.1 MB |
DerbyCon8/Track-2-16-IoT-Not-Even-Your-Bed-Is-Safe-Darby-Mullen.mp4 |
111.2 MB |
DerbyCon8/.____padding_file/46 |
816 KB |
DerbyCon8/Track-2-17-Fingerprinting-Encrypted-Channels-for-Detection-John-Althouse.mp4 |
70.8 MB |
DerbyCon8/.____padding_file/45 |
1.2 MB |
DerbyCon8/Track-2-18-On-the-Nose-Bypassing-Huaweis-Fingerprint-authentication-by-exploiting-the-TrustZone-Nick-Stephens.mp4 |
77.2 MB |
DerbyCon8/.____padding_file/44 |
820 KB |
DerbyCon8/Track-2-19-Bypassing-Port-Security-In-2018-Defeating-MacSEC-and-8021x-2010-Gabriel-Ryan.mp4 |
98.5 MB |
DerbyCon8/.____padding_file/43 |
1.5 MB |
DerbyCon8/Track-3-00-Invoke-EmpireHound-Merging-BloodHound-Empire-for-Enhanced-Red-Team-Workflow-Walter-Legowski.mp4 |
221.7 MB |
DerbyCon8/.____padding_file/42 |
265 KB |
DerbyCon8/Track-3-01-When-Macs-Come-Under-ATTCK-Richie-Cyrus.mp4 |
222.5 MB |
DerbyCon8/.____padding_file/41 |
1.5 MB |
DerbyCon8/Track-3-02-Abusing-IoT-Medical-Devices-For-Your-Precious-Health-Records-Saurabh-Harit-Nick-Delewski.mp4 |
253.7 MB |
DerbyCon8/.____padding_file/40 |
351 KB |
DerbyCon8/Track-3-03-Detecting-WMI-exploitation-Michael-Gough.mp4 |
258 MB |
DerbyCon8/.____padding_file/39 |
2 MB |
DerbyCon8/Track-3-04-Gryffindor-Pure-JavaScript-Covert-Exploitation-Matthew-Toussain.mp4 |
210.9 MB |
DerbyCon8/.____padding_file/38 |
1.1 MB |
DerbyCon8/Track-3-05-Instant-Response-Making-IR-faster-than-you-thought-possible-Mick-Douglas-Josh-Johnson.mp4 |
231.4 MB |
DerbyCon8/.____padding_file/37 |
663 KB |
DerbyCon8/Track-3-06-VBA-Stomping-Advanced-Malware-Techniques-Carrie-Roberts-Kirk-Sayre-Harold-Ogden-.mp4 |
453.9 MB |
DerbyCon8/.____padding_file/36 |
136 KB |
DerbyCon8/Track-3-07-Media-hacks-an-Infosec-guide-to-dealing-with-journalists-Sean-Gallagher-Steve-Ragan-Paul-Wagenseil.mp4 |
354.5 MB |
DerbyCon8/.____padding_file/35 |
1.5 MB |
DerbyCon8/Track-3-08-Deploying-Deceptive-Systems-Luring-Attackers-from-the-Shadows-Kevin-Gennuso.mp4 |
191.7 MB |
DerbyCon8/.____padding_file/34 |
338 KB |
DerbyCon8/Track-3-09-The-Money-Laundering-Cannon-Real-cash-Real-Criminals-and-Real-Layoffs-Arian-Evans.mp4 |
259.8 MB |
DerbyCon8/.____padding_file/33 |
206 KB |
DerbyCon8/Track-3-10-Perfect-Storm-Taking-the-Helm-of-Kubernetes-Ian-Coldwater.mp4 |
281.2 MB |
DerbyCon8/.____padding_file/32 |
783 KB |
DerbyCon8/Track-3-11-How-to-put-on-a-Con-for-Fun-and-Non-Profit-Benny-Karnes-John-Moore-Rick-Hayes-Matt-Perry-Bill-Gardner-Justin-Rogosky-Mike-Fry-Steve-Truax.mp4 |
279.1 MB |
DerbyCon8/.____padding_file/31 |
956 KB |
DerbyCon8/Track-3-12-Web-app-testing-classroom-in-a-box-the-good-the-bad-and-the-ugly-Lee-Neely-Chelle-Clements-James-McMurry.mp4 |
210.9 MB |
DerbyCon8/.____padding_file/30 |
1.1 MB |
DerbyCon8/Track-3-13-Metasploit-Town-Hall-0x4-Brent-Cook-Aaron-Soto-Adam-Cammack-Cody-Pierce.mp4 |
281.4 MB |
DerbyCon8/.____padding_file/29 |
615 KB |
DerbyCon8/Track-3-14-Community-Based-Career-Development-or-How-to-Get-More-than-a-T-Shirt-When-Participating-as-part-of-the-Community-Kathleen-Smith-Magen-Wu-Cindy-Jones-Kathryn-Seymour-Kirsten-Renner.mp4 |
479.7 MB |
DerbyCon8/.____padding_file/28 |
328 KB |
DerbyCon8/Track-3-15-Goodbye-Obfuscation-Hello-Invisi-Shell-Hiding-Your-Powershell-Script-in-Plain-Sight-Omer-Yair.mp4 |
148.4 MB |
DerbyCon8/.____padding_file/27 |
1.6 MB |
DerbyCon8/Track-3-16-Cloud-Forensics-Putting-The-Bits-Back-Together-Brandon-Sherman-.mp4 |
149.1 MB |
DerbyCon8/.____padding_file/26 |
888 KB |
DerbyCon8/Track-3-17-Killsuit-The-Equation-Groups-Swiss-Army-knife-for-persistence-evasion-and-data-exfil-Francisco-Donoso.mp4 |
142.2 MB |
DerbyCon8/.____padding_file/25 |
1.8 MB |
DerbyCon8/Track-3-18-The-MS-Office-Magic-Show-Stan-Hegt-Pieter-Ceelen.mp4 |
126.9 MB |
DerbyCon8/.____padding_file/24 |
1.1 MB |
DerbyCon8/Track-3-19-Living-off-the-land-enterprise-post-exploitation-Adam-Reiser.mp4 |
74.5 MB |
DerbyCon8/.____padding_file/23 |
1.5 MB |
DerbyCon8/Track-3-20-Hillbilly-Storytime-Pentest-Fails-Adam-Compton.mp4 |
132 MB |
DerbyCon8/.____padding_file/22 |
1 KB |
DerbyCon8/Track-4-00-The-History-of-the-Future-of-Cyber-Education-Winn-Schwartau.mp4 |
462.3 MB |
DerbyCon8/.____padding_file/2 |
1.7 MB |
DerbyCon8/Track-4-01-State-of-Win32k-Security-Revisiting-Insecure-design-Vishal-Chauhan.mp4 |
61.9 MB |
DerbyCon8/.____padding_file/3 |
100 KB |
DerbyCon8/Track-4-02-Offensive-Browser-Extension-Development-Michael-Weber.mp4 |
90.2 MB |
DerbyCon8/.____padding_file/4 |
1.8 MB |
DerbyCon8/Track-4-03-Protect-Your-Payloads-Modern-Keying-Techniques-Leo-Loobeek.mp4 |
76.7 MB |
DerbyCon8/.____padding_file/5 |
1.3 MB |
DerbyCon8/Track-4-04-Jump-Into-IOT-Hacking-with-the-Damn-Vulnerable-Habit-Helper-Device-Nancy-Snoke-Phoenix-Snoke.mp4 |
86.5 MB |
DerbyCon8/.____padding_file/6 |
1.5 MB |
DerbyCon8/Track-4-06-Disaster-Strikes-A-Hackers-Cook-book-Jose-Quinones-Carlos-Perez.mp4 |
112.7 MB |
DerbyCon8/.____padding_file/7 |
1.3 MB |
DerbyCon8/Track-4-07-Ninja-Looting-Like-a-Pirate-Infojanitor.mp4 |
84.7 MB |
DerbyCon8/.____padding_file/8 |
1.3 MB |
DerbyCon8/Track-4-08-Hacking-Mobile-Applications-with-Frida-David-Coursey.mp4 |
163.5 MB |
DerbyCon8/.____padding_file/9 |
554 KB |
DerbyCon8/Track-4-09-Victor-or-Victim-Strategies-for-Avoiding-an-InfoSec-Cold-War-Jason-Lang-Stuart-McIntosh.mp4 |
134 MB |
DerbyCon8/.____padding_file/10 |
2 MB |
DerbyCon8/Track-4-10-Ubiquitous-Shells-Jon-Gorenflo.mp4 |
159.7 MB |
DerbyCon8/.____padding_file/11 |
308 KB |
DerbyCon8/Track-4-11-99-Reasons-Your-Perimeter-Is-Leaking-Evolution-of-CC-John-Askew.mp4 |
139.4 MB |
DerbyCon8/.____padding_file/12 |
569 KB |
DerbyCon8/Track-4-12-Ship-Hacking-a-Primer-for-Todays-Pirate-Brian-Satira-Brian-Olson.mp4 |
129.7 MB |
DerbyCon8/.____padding_file/13 |
358 KB |
DerbyCon8/Track-4-13-Code-Execution-with-JDK-Scripting-Tools-Nashorn-Javascript-Engine-Brett-Hawkins.mp4 |
84 MB |
DerbyCon8/.____padding_file/14 |
2 MB |
DerbyCon8/Track-4-14-PHONOPTICON-leveraging-low-rent-mobile-ad-services-to-achieve-state-actor-level-mass-surveillance-on-a-shoestring-budget-Mark-Milhouse.mp4 |
167.8 MB |
DerbyCon8/.____padding_file/15 |
187 KB |
DerbyCon8/Track-4-15-Bug-Hunting-in-RouterOS-Jacob-Baines.mp4 |
95.1 MB |
DerbyCon8/.____padding_file/16 |
879 KB |
DerbyCon8/Track-4-16-Breaking-Into-Your-Building-A-Hackers-Guide-to-Unauthorized-Access-Tim-Roberts-Brent-White.mp4 |
113.3 MB |
DerbyCon8/.____padding_file/17 |
715 KB |
DerbyCon8/Track-4-17-The-making-of-an-iOS-11-jailbreak-Kiddie-to-kernel-hacker-in-14-sleepless-nights-Bryce-soen-Bearchell.mp4 |
73.3 MB |
DerbyCon8/.____padding_file/18 |
689 KB |
DerbyCon8/Track-4-18-Who-Watches-the-Watcher-Detecting-Hypervisor-Introspection-from-Unprivileged-Guests-Tomasz-Tuzel.mp4 |
76.6 MB |
DerbyCon8/.____padding_file/19 |
1.4 MB |
DerbyCon8/Track-4-19-Pwning-in-the-Sandbox-OSX-Macro-Exploitation-Beyond-Adam-Gold-Danny-Chrastil.mp4 |
83 MB |
DerbyCon8/.____padding_file/20 |
996 KB |
DerbyCon8/Track-4-20-IOCs-Today-Intelligence-Led-Security-Tomorrow-Katie-Kusjanovic-Matthew-Shelton.mp4 |
88.6 MB |
DerbyCon8/.____padding_file/21 |
1.4 MB |