TROOPERS/TROOPERS 2008/TROOPERS08.org_AMATO Francisco - evilgrade.mp4 |
2.9 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_BELENKO Andrej - password recovery.mp4 |
154 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_BRANCO Rodrigo - KIDS.mp4 |
160.4 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_BRATUS Sergey - AP fingerprinting.bak.mp4 |
107 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4 |
166 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_CALLAS Jon - Straight Talk abaou Crypto.mp4 |
165.8 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_CHIESA Raoul - SCADA and national critical infrastructures.mp4 |
151.7 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_DJB - Keynote.mp4 |
161.7 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_De Haas Job - Side channel analysis.mp4 |
161.8 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4 |
174.2 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_HOLZ Thorsten - virtual-honeypots.mp4 |
153.9 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_KEMP Michael - virtualise.mp4 |
143.7 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_KLOSE Roger - ERNW_ESX-In-Security.mp4 |
102.5 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4 |
141 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_Kuhn Friedwart - RMS.mp4 |
162.3 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_LOGLOGIC - log management.mp4 |
156.4 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_ROECHER Dror-John - the data went down the drain.mp4 |
152.2 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_SPEICHERT Horst - hackertools according to german law.mp4 |
162.2 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_STREHLE Rolf - self defending networks.mp4 |
160.3 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_THUMANN Michael - Reversing.mp4 |
154.7 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_THUMANN Michael - Secondlife (TM).mp4 |
157.9 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_Troopers IBM Appscan.mp4 |
154.2 MB |
TROOPERS/TROOPERS 2008/TROOPERS08.org_WAISSBEIN Ariel - penetration testing learning kit.mp4 |
162.9 MB |
TROOPERS/TROOPERS 2008/TROOPERS09_baier_access_control_service.mp4 |
138.2 MB |
TROOPERS/TROOPERS 2008/TROOPERS09_bratus_embedded_devices.mp4 |
105.8 MB |
TROOPERS/TROOPERS 2008/TROOPERS09_gauci_henrique_web_application_firewalls.mp4 |
55 MB |
TROOPERS/TROOPERS 2008/TROOPERS09_rey_keynote_stop_the_madness.mp4 |
27.4 MB |
TROOPERS/TROOPERS 2008/TROOPERS09_rey_ruediger_codenomicon_fuzzer.mp4 |
84.5 MB |
TROOPERS/TROOPERS 2009/TROOPERS09 - .NET Access Control Service - Dominick Baier.mp4 |
84.9 MB |
TROOPERS/TROOPERS 2009/TROOPERS09 - .NET Access Control Service - Dominick Baier.srt |
49 KB |
TROOPERS/TROOPERS 2009/TROOPERS09 - Stop the Madness - Keynote by Enno Rey.mp4 |
60.1 MB |
TROOPERS/TROOPERS 2009/TROOPERS09 - Stop the Madness - Keynote by Enno Rey.srt |
51 KB |
TROOPERS/TROOPERS 2009/TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.mp4 |
133.8 MB |
TROOPERS/TROOPERS 2009/TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.srt |
39 KB |
TROOPERS/TROOPERS 2009/TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.mp4 |
45.7 MB |
TROOPERS/TROOPERS 2009/TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.srt |
15 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4 |
170.6 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt |
83 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4 |
103.4 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt |
70 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4 |
142 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt |
93 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4 |
88 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt |
59 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.mp4 |
97.7 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.srt |
89 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4 |
136.6 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt |
82 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - How to fail an audit - Martin Freiss.mp4 |
120.2 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - How to rate the security of closed source software - Michael Thumann.mp4 |
136 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - How to rate the security of closed source software - Michael Thumann.srt |
72 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4 |
158.8 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.srt |
118 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Netscreen of Death - Graeme Neilson.mp4 |
130 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Netscreen of Death - Graeme Neilson.srt |
82 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Rapid Risk Assessment - Enno Rey.mp4 |
115.8 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Rapid Risk Assessment - Enno Rey.srt |
84 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Return Oriented Rootkits - Ralf Hund.mp4 |
114.7 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Return Oriented Rootkits - Ralf Hund.srt |
83 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.mp4 |
107.8 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.srt |
31 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.mp4 |
99.6 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.srt |
68 KB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4 |
48.2 MB |
TROOPERS/TROOPERS 2010/TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt |
33 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4 |
133.7 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt |
78 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Cache on Delivery - Marco Slaviero.mp4 |
112.5 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Cache on Delivery - Marco Slaviero.srt |
76 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Do you know what s happening in your $application - Felix Leder.mp4 |
152.6 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Do you know what s happening in your $application - Felix Leder.srt |
92 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4 |
88.6 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt |
75 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.mp4 |
88.1 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.srt |
56 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - I FOCA a MIL Domain - Chema Alonso.mp4 |
82.5 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Keynote Day 1 - Enno Rey.mp4 |
77.1 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Keynote Day 1 - Enno Rey.srt |
67 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Keynote Day 2 - Richard Thieme.mp4 |
154.1 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Keynote Day 2 - Richard Thieme.srt |
98 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Milking a horse - Meder Kydyraliev.mp4 |
67.8 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Milking a horse - Meder Kydyraliev.srt |
73 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.mp4 |
97.8 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.srt |
51 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.mp4 |
77.3 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.srt |
37 KB |
TROOPERS/TROOPERS 2011/TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.mp4 |
48.5 MB |
TROOPERS/TROOPERS 2011/TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.srt |
38 KB |
TROOPERS/TROOPERS 2012/TROOPERS12 - Closing Remarks.mp4 |
19.8 MB |
TROOPERS/TROOPERS 2012/TROOPERS12 - Opening Teaser.mp4 |
20.2 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4 |
177.2 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt |
14 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.mp4 |
184.4 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.srt |
43 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.mp4 |
613.8 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.srt |
72 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.mp4 |
38.5 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.srt |
43 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4 |
107.3 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt |
49 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.mp4 |
350.2 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.srt |
60 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Hacking and Craft - Jeff Gough.mp4 |
332.4 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Hacking and Craft - Jeff Gough.srt |
66 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.mp4 |
361.3 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.srt |
70 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Keynote Day 1 by Rodrigo Branco.mp4 |
467.6 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Keynote Day 1 by Rodrigo Branco.srt |
119 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Keynote Day 2 by Chris Nickerson.mp4 |
270.8 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Keynote Day 2 by Chris Nickerson.srt |
72 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.mp4 |
692.1 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.srt |
83 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.mp4 |
395.7 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.srt |
73 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4 |
574.4 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.srt |
66 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4 |
519.8 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt |
93 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.mp4 |
258.3 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.srt |
68 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.mp4 |
254 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.srt |
75 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.mp4 |
371 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.srt |
70 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4 |
38.9 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.srt |
66 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4 |
214 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt |
73 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4 |
669.6 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt |
70 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - We Came In Peace - They Don t Hackers vs. CyberWar - fx.srt |
79 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.mp4 |
427.3 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.srt |
81 KB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.mp4 |
372.7 MB |
TROOPERS/TROOPERS 2013/TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.srt |
61 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.mp4 |
254.1 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.srt |
71 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4 |
305.7 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt |
55 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.mp4 |
130 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.srt |
40 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Closing Remarks - Enno Rey.mp4 |
194.4 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Closing Remarks - Enno Rey.srt |
26 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4 |
311.3 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).srt |
80 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Georg Bakos - Keynote.mp4 |
505.3 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.mp4 |
289.5 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.srt |
86 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Granular Trust; making it work - Toby Kohlenberg.srt |
91 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Granular Trust_ making it work - Toby Kohlenberg.mp4 |
411.6 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4 |
238.9 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4 |
246.3 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4 |
384.9 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.srt |
54 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4 |
276.3 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt |
43 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Keynote - FX.mp4 |
88.9 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4 |
389.7 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt |
42 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.mp4 |
339.3 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.srt |
91 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.mp4 |
160.3 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.srt |
78 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4 |
381.6 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt |
63 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Psychology of Security - Stefan Schumacher.mp4 |
237.9 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Psychology of Security - Stefan Schumacher.srt |
84 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4 |
399.3 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt |
69 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4 |
363.8 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt |
71 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.mp4 |
340.2 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.srt |
61 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.mp4 |
32.7 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.srt |
68 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.mp4 |
295.3 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.srt |
85 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.mp4 |
260.2 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.srt |
63 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4 |
39.2 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt |
57 KB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.mp4 |
5.9 MB |
TROOPERS/TROOPERS 2014/TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.srt |
29 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4 |
1.7 GB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt |
96 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).mp4 |
1.8 GB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).srt |
113 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (2 2).mp4 |
715.7 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.mp4 |
1.5 GB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.srt |
104 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4 |
952.1 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt |
65 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - 48 Considered Harmful.mp4 |
1.1 GB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - 48 Considered Harmful.srt |
65 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - Reliable & Secure DHCPv6.mp4 |
716.8 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Eric Vyncke - Routing Header Is Back... Should We Panic.mp4 |
342.6 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4 |
1.8 GB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt |
123 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4 |
1.7 GB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.srt |
139 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Gabriel Muller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4 |
574.4 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4 |
329.2 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4 |
715.4 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Julian Bangert - Tales of 6006 Protocols.mp4 |
264.6 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4 |
1.9 GB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt |
124 KB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4 |
496.9 MB |
TROOPERS/TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt |
83 KB |
TROOPERS/TROOPERS 2015/TROOPERS15 - Welcome Trailer.mp4 |
9.1 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Andreas Lindh - Defender Economics.mp4 |
139.8 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Andreas Lindh - Defender Economics.srt |
61 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4 |
701 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.mp4 |
277.7 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.srt |
50 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.mp4 |
312.3 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.srt |
54 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4 |
215.7 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt |
95 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4 |
335.8 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt |
75 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.mp4 |
227.5 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.srt |
69 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.mp4 |
220.3 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.srt |
48 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Enno Rey - Opening Remarks.mp4 |
66.7 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Enno Rey - Opening Remarks.srt |
9 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4 |
280.5 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4 |
263.4 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt |
66 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.mp4 |
268.8 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.srt |
82 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4 |
236.9 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt |
65 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4 |
173.5 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt |
38 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Haroon Meer - Keynote.mp4 |
163.5 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Haroon Meer - Keynote.srt |
94 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Ivan Pepelnjak - Automating Network Security.mp4 |
112.9 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Ivan Pepelnjak - Automating Network Security.srt |
71 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.mp4 |
220.2 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.srt |
84 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4 |
314.4 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt |
66 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4 |
472.2 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt |
87 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Martijn Grooten - The State of Email in 2015.mp4 |
87.1 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Martijn Grooten - The State of Email in 2015.srt |
65 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.mp4 |
217.2 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.srt |
78 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4 |
281.8 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt |
86 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4 |
440.5 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt |
86 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4 |
152.4 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt |
95 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4 |
235.8 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.srt |
72 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergej Bratus - Keynote.mp4 |
304 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergej Bratus - Keynote.srt |
84 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4 |
135.3 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt |
46 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4 |
232 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt |
71 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4 |
152.4 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt |
67 KB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4 |
204.3 MB |
TROOPERS/TROOPERS 2015/[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt |
77 KB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Advanced IPv6 Attacks Using Chiron Training.mp4 |
705.8 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Advanced IPv6 Network Reconnaisance.mp4 |
484.8 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Anonymization IPv6 in PCAPs - Challenges and Wins.mp4 |
183.3 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Automating IPv6 Deployments.mp4 |
127.4 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Basic Attacks and Mitigation Strategies.mp4 |
437.4 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Building a Reliable and Secure IPv6 WiFi Network.mp4 |
218.8 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Developing an Enterprise IPv6 Security Strategy.mp4 |
211.2 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/IPv6 First Hop Security Features on HP Devices.mp4 |
128.4 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/IPv6 Security Fundamentals.mp4 |
364.3 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/NATTED - A Field Report.mp4 |
208.5 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Recent IPv6 Standardization Efforts.mp4 |
400.6 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Remote Access and Business Partner Connections.mp4 |
265.2 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4 |
107.9 MB |
TROOPERS/TROOPERS 2016 IPv6 Summit/Security Assessment of Microsoft DirectAccess.mp4 |
199.6 MB |
TROOPERS/TROOPERS 2016/An unknown SAP default Account.mp4 |
189.6 MB |
TROOPERS/TROOPERS 2016/Attacking Nextgen Firewalls.mp4 |
254.3 MB |
TROOPERS/TROOPERS 2016/Attacking and Protecting Big Data Environments.mp4 |
154.4 MB |
TROOPERS/TROOPERS 2016/Better Crypto.mp4 |
80 MB |
TROOPERS/TROOPERS 2016/Broadcasting your Attack.mp4 |
203.5 MB |
TROOPERS/TROOPERS 2016/Caring for File Formats.mp4 |
91.5 MB |
TROOPERS/TROOPERS 2016/Closing Remarks.mp4 |
310 MB |
TROOPERS/TROOPERS 2016/Crypto Code.mp4 |
100.4 MB |
TROOPERS/TROOPERS 2016/Deep dive into SAP archive file formats.mp4 |
241.9 MB |
TROOPERS/TROOPERS 2016/Exploiting the Unexploitable.mp4 |
187.6 MB |
TROOPERS/TROOPERS 2016/Freifunk.mp4 |
65.9 MB |
TROOPERS/TROOPERS 2016/Hiding your White Box Designs is Not Enough.mp4 |
256.2 MB |
TROOPERS/TROOPERS 2016/Hollywood Hacking Facts and Fiction.mp4 |
150.4 MB |
TROOPERS/TROOPERS 2016/How to Implement an SDL in a Large Company.mp4 |
89.2 MB |
TROOPERS/TROOPERS 2016/Imma Chargin Mah Lazer.mp4 |
240.9 MB |
TROOPERS/TROOPERS 2016/Keynote - A Praise for Hackers.mp4 |
300.1 MB |
TROOPERS/TROOPERS 2016/Keynote - Ethics in Networked Systems Research.mp4 |
184.6 MB |
TROOPERS/TROOPERS 2016/Lets Play Hide and Seek in the Cloud.mp4 |
23.1 MB |
TROOPERS/TROOPERS 2016/Medical Device Security Hack or Hype.mp4 |
246.4 MB |
TROOPERS/TROOPERS 2016/Mind The Gap.mp4 |
110.2 MB |
TROOPERS/TROOPERS 2016/Offensive Active Directory with Powershell.mp4 |
114.1 MB |
TROOPERS/TROOPERS 2016/One Tool To Rule Them All.mp4 |
24.7 MB |
TROOPERS/TROOPERS 2016/Passive Intelligence Gathering Analytics.mp4 |
175.2 MB |
TROOPERS/TROOPERS 2016/Patch me if you can.mp4 |
252.6 MB |
TROOPERS/TROOPERS 2016/Preventing vulns in HANA based deployments.mp4 |
214 MB |
TROOPERS/TROOPERS 2016/Protecting Hosts in IPv6 Networks.mp4 |
242.1 MB |
TROOPERS/TROOPERS 2016/Rapid Radio Reversing.mp4 |
117.5 MB |
TROOPERS/TROOPERS 2016/Real Life Software Defined Security.mp4 |
94.8 MB |
TROOPERS/TROOPERS 2016/Reverse engineering a Digital Two way Radio.mp4 |
95.2 MB |
TROOPERS/TROOPERS 2016/Security Evaluation of Dual-Stack Systems.mp4 |
202.3 MB |
TROOPERS/TROOPERS 2016/TR16 - Day 1 Visuals.mp4 |
89.1 MB |
TROOPERS/TROOPERS 2016/TROOPERS Conference 360 Teaser - must watch in YouTube app.mp4 |
12.4 MB |
TROOPERS/TROOPERS 2016/The Chimaera Processor.mp4 |
41.9 MB |
TROOPERS/TROOPERS 2016/The Internet of Deadly Things.mp4 |
30.4 MB |
TROOPERS/TROOPERS 2016/The Joy of Sandbox Mitigations.mp4 |
98.3 MB |
TROOPERS/TROOPERS 2016/The Kings in your Castle.mp4 |
113.6 MB |
TROOPERS/TROOPERS 2016/The Road to secure Smart Cars.mp4 |
190.1 MB |
TROOPERS/TROOPERS 2016/Towards a LangSec Aware SDLC.mp4 |
91.4 MB |
TROOPERS/TROOPERS 2016/Unpatchable.mp4 |
204.4 MB |
TROOPERS/TROOPERS 2016/Witness the Russian attack Live demos of their steps tools techniques.mp4 |
77.4 MB |
TROOPERS/TROOPERS 2016/unrubby.mp4 |
108.7 MB |
TROOPERS/TROOPERS 2017/TR17 - IoT to Gateway - Gabriel Mueller.mp4 |
130.3 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Authenticate Like A Boss Pete Herzog.mp4 |
69.5 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Dissecting Modern 3G 4G Cellular Modems Harald Welte.mp4 |
93.8 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Hacks and Case Studies Cellular Communications Brian Butterly.mp4 |
127 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Looking through the web of pages to the Internet of Things Gabriel Weaver.mp4 |
106.3 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Metasploit Hardware Bridge Hacking Craig Smith.mp4 |
103.3 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Pufs ’n stuff Getting the most of the digital world through physical identities An.mp4 |
81.1 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 Robo Ethnography Just what can Robots do Brittany Postnikoff.mp4 |
100.8 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 So You Want To Hack Radios Matt Knight, Marc Newlin.mp4 |
64.4 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK1 What happened to your home IoT Hacking and Forensic with 0 Days Soohyun Jin, Moonbe.mp4 |
98.6 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK2 Crashing Cisco's Autonomic Network Omar Eissa.mp4 |
71.8 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK2 IPv6 Configuration Approaches for Servers Enno Rey.mp4 |
196.4 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK2 RIPE Atlas Measuring The Internet Alvaro Vives.mp4 |
125 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK3 BLE Authentication Design Challenges On Smartphone Controlled IoT Devices Analyzing.mp4 |
104.2 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 An Introduction to Automotive ECU Research Dieter Spaar.mp4 |
139.8 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 Hacking TP Link Devices Fernando Gont.mp4 |
147.6 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 Hidden in plain sight_ How possibly could a decades old standard be broken Paul Mel.mp4 |
77.3 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 Rusting up your GREATFET Richo Healey, Dominic Spill.mp4 |
164.8 MB |
TROOPERS/TROOPERS 2017/TR17 NGI TRACK4 The Hardware Striptease Club Letting The Smart Home Strip Down To Its Innards Stefan.mp4 |
825.1 MB |
TROOPERS/TROOPERS 2017/TR17 NGI Track2 An attack in depth analysis of multicast DNS and DNS service recovery Antonios Atlas.mp4 |
137 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 2nd Day Keynote Mara Tam.mp4 |
141 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 A sense of self for bootloaders no more magical writes Rebecca ”bx” Shapiro.mp4 |
56.6 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Blinded Random Block Corruptions Rodrigo Branco.mp4 |
90.8 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Closing Procedure.mp4 |
96.5 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Demystifying COM James Foreshaw.mp4 |
116.6 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Exploring North Korea's Surveillance Technology Florian Grunow Niklaus Schiess.mp4 |
110.3 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Exploring The Infrared World,Part 2 Mike Ossmann, Dominic Spill.mp4 |
138.4 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Graph me, I'm famous! Automated static malware analysis and indicator extraction for bi.mp4 |
128 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Hardware Root of Mistrust Joseph FitzPatrick Michael Leibowitz.mp4 |
106.6 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 How we hacked Distributed CMSs Francis Alexander, Bharadwaj Machiraju.mp4 |
116.4 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Intel ME The Way of the Static Analysis Dmitry Sklyarov.mp4 |
106.2 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Opening Keynote Enno Rey.mp4 |
101 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Software Attacks on Hypervisor Emulation of Hardware Oleksandr Bazhaniuk.mp4 |
88.5 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK1 Unsafe JAX RS Breaking REST API Mikhail Egorov.mp4 |
51.6 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Active Directory Security Best Practices - Friedwart Kuhn, Heinrich Wiederkehr.mp4 |
1.3 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Architecting a Modern Defense using Device Guard Matt Graeber, Casey Smith.mp4 |
153.4 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew (2).mp4 |
112.9 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Arming Small Security Programs Network Baseline Generation and Alerts with Bropy Matthew.mp4 |
112.9 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Data Demolition Gone In 60 Seconds Zoz Brooks.mp4 |
127.3 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Hunting Them All Veronica Valeros.mp4 |
122 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Ruler Pivoting Through Exchange Etienne Stalmans.mp4 |
129.3 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Samsung Pay Tokenized Numbers, Flaws and Issues Salvador Mendoza.mp4 |
73.1 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Securing Network Automation Ivan Pepelnjak.mp4 |
146.1 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Surprise Bitches! The Grugq.mp4 |
406.1 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Volatile Memory Behavioral Game Theory in Defensive Security Kelly Shortridge.mp4 |
82.9 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK2 Vox Ex Machina Graeme Neilson - YouTube.mp4 |
100.2 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 Habibi Works An Update On TROOPERS Charity Florian Horsch.mp4 |
46.1 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 Holy crap I need to pentest SAP from Citrix Joffrey Czarny.mp4 |
90.5 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 Intercepting SAP SNC protected traffic Martin Gallo.mp4 |
40.5 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 Lightning Talks Peter Hessler, Edmond Rogers, Sreepriya Chalakkal.mp4 |
16.5 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 PHP Internals Exploit Dev Edition Emmanuel Law.mp4 |
58.1 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 Protecting SAP HANA from vulnerabilities and exploits Pablo Artuso, Nahuel Sanchez.mp4 |
80.9 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 Reverse Engineering ABAP Bytecode for Malware Analysis Hans Christian Esperer, Frederik.mp4 |
83.2 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 SAP strikes back Your SAP server now counter attacks Vahagn Vardanyan, Dmitry Yudin.mp4 |
100.4 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 The Metabrik Platform Rapid Development of Reusable Security Tools Patrice Auffret.mp4 |
75.8 MB |
TROOPERS/TROOPERS 2017/TR17 TRACK3 You've got mail Owning your business with one email Joris van de Vis.mp4 |
66 MB |
TROOPERS/TROOPERS 2018/TR18 A Stepping Stone To Car Hacking.en.transcribed.srt |
102 KB |
TROOPERS/TROOPERS 2018/TR18 A Stepping Stone To Car Hacking.mp4 |
55.9 MB |
TROOPERS/TROOPERS 2018/TR18 Active Directory Security The Journey.en.transcribed.srt |
163 KB |
TROOPERS/TROOPERS 2018/TR18 Active Directory Security The Journey.mp4 |
114 MB |
TROOPERS/TROOPERS 2018/TR18 Ads networks are following you, follow them back.en.transcribed.srt |
118 KB |
TROOPERS/TROOPERS 2018/TR18 All Your Cloud Are Belong To Us.en.transcribed.srt |
183 KB |
TROOPERS/TROOPERS 2018/TR18 All Your Cloud Are Belong To Us.mp4 |
152.6 MB |
TROOPERS/TROOPERS 2018/TR18 An ACE Up The Sleeve Designing Security Descriptor Based Backdoors.en.transcribed.srt |
155 KB |
TROOPERS/TROOPERS 2018/TR18 An ACE Up The Sleeve Designing Security Descriptor Based Backdoors.mp4 |
110.9 MB |
TROOPERS/TROOPERS 2018/TR18 Attack and defend Microsoft Enhanced Security Administrative Environment.en.transcribed.srt |
136 KB |
TROOPERS/TROOPERS 2018/TR18 Attack and defend Microsoft Enhanced Security Administrative Environment.mp4 |
99.3 MB |
TROOPERS/TROOPERS 2018/TR18 Blue Team Sprint.en.transcribed.srt |
159 KB |
TROOPERS/TROOPERS 2018/TR18 Blue Team Sprint.mp4 |
128.8 MB |
TROOPERS/TROOPERS 2018/TR18 Closing Remarks.en.transcribed.srt |
39 KB |
TROOPERS/TROOPERS 2018/TR18 Closing Remarks.mp4 |
42.2 MB |
TROOPERS/TROOPERS 2018/TR18 From Zero to Secure Continuous Delivery in 60 Minutes.en.transcribed.srt |
169 KB |
TROOPERS/TROOPERS 2018/TR18 From Zero to Secure Continuous Delivery in 60 Minutes.mp4 |
186.6 MB |
TROOPERS/TROOPERS 2018/TR18 Hacking and Securing SAP Hana Applications.en.transcribed.srt |
84 KB |
TROOPERS/TROOPERS 2018/TR18 Hacking and Securing SAP Hana Applications.mp4 |
75.6 MB |
TROOPERS/TROOPERS 2018/TR18 Hunting Android Malware.en.transcribed.srt |
122 KB |
TROOPERS/TROOPERS 2018/TR18 Hunting Android Malware.mp4 |
49.6 MB |
TROOPERS/TROOPERS 2018/TR18 Hunting crypto secrets in SAP systems.en.transcribed.srt |
139 KB |
TROOPERS/TROOPERS 2018/TR18 Hunting crypto secrets in SAP systems.mp4 |
102.2 MB |
TROOPERS/TROOPERS 2018/TR18 I forgot Your password.en.transcribed.srt |
103 KB |
TROOPERS/TROOPERS 2018/TR18 I forgot Your password.mp4 |
99.4 MB |
TROOPERS/TROOPERS 2018/TR18 Introducing a Comprehensive Active Directory Security Metric.en.transcribed.srt |
111 KB |
TROOPERS/TROOPERS 2018/TR18 Introducing a Comprehensive Active Directory Security Metric.mp4 |
108.3 MB |
TROOPERS/TROOPERS 2018/TR18 Mind the Gap, Bro.en.transcribed.srt |
167 KB |
TROOPERS/TROOPERS 2018/TR18 Mind the Gap, Bro.mp4 |
103.6 MB |
TROOPERS/TROOPERS 2018/TR18 Mobile App Security Fails and How To Survive Them.en.transcribed.srt |
129 KB |
TROOPERS/TROOPERS 2018/TR18 Mobile App Security Fails and How To Survive Them.mp4 |
123.4 MB |
TROOPERS/TROOPERS 2018/TR18 NFC Payments.en.transcribed.srt |
72 KB |
TROOPERS/TROOPERS 2018/TR18 NFC Payments.mp4 |
43.2 MB |
TROOPERS/TROOPERS 2018/TR18 No royal road advanced analysis for 'advanced' threats.en.transcribed.srt |
140 KB |
TROOPERS/TROOPERS 2018/TR18 No royal road advanced analysis for 'advanced' threats.mp4 |
129.1 MB |
TROOPERS/TROOPERS 2018/TR18 Real-Life Network and Security Automation.en.transcribed.srt |
108 KB |
TROOPERS/TROOPERS 2018/TR18 Real-Life Network and Security Automation.mp4 |
126.7 MB |
TROOPERS/TROOPERS 2018/TR18 Reverse Engineering Black Box Systems with GreatFET.en.transcribed.srt |
157 KB |
TROOPERS/TROOPERS 2018/TR18 Reverse Engineering Black Box Systems with GreatFET.mp4 |
89.7 MB |
TROOPERS/TROOPERS 2018/TR18 Robots Panel.en.transcribed.srt |
206 KB |
TROOPERS/TROOPERS 2018/TR18 Robots Panel.mp4 |
98.8 MB |
TROOPERS/TROOPERS 2018/TR18 SAP BUGS The Phantom Security.en.transcribed.srt |
42 KB |
TROOPERS/TROOPERS 2018/TR18 SAP BUGS The Phantom Security.mp4 |
47.9 MB |
TROOPERS/TROOPERS 2018/TR18 SAP IGS The 'vulnerable' forgotten component.en.transcribed.srt |
85 KB |
TROOPERS/TROOPERS 2018/TR18 SAP IGS The 'vulnerable' forgotten component.mp4 |
73.9 MB |
TROOPERS/TROOPERS 2018/TR18 SAP Security patches_ The importance, difficulties and solutions!.mp4 |
51.1 MB |
TROOPERS/TROOPERS 2018/TR18 Security Appliances Internals.en.transcribed.srt |
126 KB |
TROOPERS/TROOPERS 2018/TR18 Security Appliances Internals.mp4 |
118.8 MB |
TROOPERS/TROOPERS 2018/TR18 Subverting Trust in Windows.en.transcribed.srt |
127 KB |
TROOPERS/TROOPERS 2018/TR18 Subverting Trust in Windows.mp4 |
114.7 MB |
TROOPERS/TROOPERS 2018/TR18 The Language of Security.en.transcribed.srt |
160 KB |
TROOPERS/TROOPERS 2018/TR18 The Language of Security.mp4 |
136.1 MB |
TROOPERS/TROOPERS 2018/TR18 The Wolf In SGX Clothing.en.transcribed.srt |
163 KB |
TROOPERS/TROOPERS 2018/TR18 The Wolf In SGX Clothing.mp4 |
71.7 MB |
TROOPERS/TROOPERS 2018/TR18 Unifying RF Fuzzing Techniques under a Common API.en.transcribed.srt |
144 KB |
TROOPERS/TROOPERS 2018/TR18 Unifying RF Fuzzing Techniques under a Common API.mp4 |
68 MB |
TROOPERS/TROOPERS 2018/TR18 When Virtual Hell Freezes Over.en.transcribed.srt |
85 KB |
TROOPERS/TROOPERS 2018/TR18 When Virtual Hell Freezes Over.mp4 |
45.7 MB |
TROOPERS/TROOPERS 2018/TR18 Keynote Mike Ossmann (Inkl. Opening Remarks).en.transcribed.srt |
147 KB |
TROOPERS/TROOPERS 2018/TR18 Keynote Mike Ossmann (Inkl. Opening Remarks).mp4 |
162.7 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Advances in IPv6 Network Reconnaissance.en.transcribed.srt |
55 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Advances in IPv6 Network Reconnaissance.mp4 |
31.5 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Are you sure - you are alone Pwning IoT-CCTV devices!.en.transcribed.srt |
40 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Are you sure - you are alone Pwning IoT-CCTV devices!.mp4 |
41.3 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 BREAKING THE LAWS OF ROBOTICS ATTACKING INDUSTRIAL ROBOTS.mp4 |
82.9 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Dynamic IPv6 Prefix Problems and VPNs.en.transcribed.srt |
105 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Dynamic IPv6 Prefix Problems and VPNs.mp4 |
63.2 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Frustrating Emulation with Delay Slots in MIPS and MIPS16.en.transcribed.srt |
73 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Frustrating Emulation with Delay Slots in MIPS and MIPS16.mp4 |
59.9 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Hacking Robots Before Skynet.mp4 |
96.8 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 IPv6 Address Management - The First Five Years.en.transcribed.srt |
124 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 IPv6 Address Management - The First Five Years.mp4 |
92.5 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 IPv6 in the Cloud - Back to Square One.en.transcribed.srt |
108 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 IPv6 in the Cloud - Back to Square One.mp4 |
95.1 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 IoT processor and binary breakdown.en.transcribed.srt |
145 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 IoT processor and binary breakdown.mp4 |
82 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Knockin' on IPv6's doors.en.transcribed.srt |
167 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Knockin' on IPv6's doors.mp4 |
104.8 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 NGI18 Keynote by Graeme Neilson.en.transcribed.srt |
100 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 NGI18 Keynote by Graeme Neilson.mp4 |
64.8 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Practical Magic Behavior-based Safety Design for IoT.en.transcribed.srt |
128 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Practical Magic Behavior-based Safety Design for IoT.mp4 |
71.3 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Securing your in-ear fitness coach Challenges in hardening next generation wearables.en.transcribed.srt |
141 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Securing your in-ear fitness coach Challenges in hardening next generation wearables.mp4 |
84.5 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.en.transcribed.srt |
143 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Security and Privacy for Multi-Prefix and Provisioning Domains in IPv6.mp4 |
101.3 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Subs, Ships, & Satellites The Internet of Invisible Things.en.transcribed.srt |
181 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Subs, Ships, & Satellites The Internet of Invisible Things.mp4 |
110.6 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Swimming IoT or how to hack a Yacht.mp4 |
88.3 MB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Things Attack Peek into a 18 months IoT honeypot.en.transcribed.srt |
109 KB |
TROOPERS/TROOPERS 2018/TR18 NGI18 Things Attack Peek into a 18 months IoT honeypot.mp4 |
68.1 MB |
TROOPERS/TROOPERS 2018/The Hackers' Sanctuary City.mp4 |
12.1 MB |
TROOPERS/TROOPERS 2019/TR19 A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.en.transcribed.srt |
187 KB |
TROOPERS/TROOPERS 2019/TR19 A Diet of Poisoned Fruit Designing Implants and OT Payloads for ICS Embedded Devices.mp4 |
59.7 MB |
TROOPERS/TROOPERS 2019/TR19 A PKI distributed is a PKI solved.en.transcribed.srt |
51 KB |
TROOPERS/TROOPERS 2019/TR19 A PKI distributed is a PKI solved.mp4 |
25.3 MB |
TROOPERS/TROOPERS 2019/TR19 Abusing privileged file operations on Windows.en.transcribed.srt |
44 KB |
TROOPERS/TROOPERS 2019/TR19 Abusing privileged file operations on Windows.mp4 |
33.3 MB |
TROOPERS/TROOPERS 2019/TR19 Active Directory and Azure - Core Security Principles.en.transcribed.srt |
137 KB |
TROOPERS/TROOPERS 2019/TR19 Active Directory and Azure - Core Security Principles.mp4 |
94.2 MB |
TROOPERS/TROOPERS 2019/TR19 Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.en.transcribed.srt |
79 KB |
TROOPERS/TROOPERS 2019/TR19 Alfred, find the Attacker A primer on AI and ML applications in the IT Security Domain.mp4 |
35.7 MB |
TROOPERS/TROOPERS 2019/TR19 Automotive Penetration Testing with Scapy.mp4 |
79.1 MB |
TROOPERS/TROOPERS 2019/TR19 BIZEC Discussion Panel Past, Present and Future of SAP Security.en.transcribed.srt |
123 KB |
TROOPERS/TROOPERS 2019/TR19 BIZEC Discussion Panel Past, Present and Future of SAP Security.mp4 |
43.9 MB |
TROOPERS/TROOPERS 2019/TR19 Beyond Windows Forensics with Built-in Microsoft Tooling.en.transcribed.srt |
130 KB |
TROOPERS/TROOPERS 2019/TR19 Beyond Windows Forensics with Built-in Microsoft Tooling.mp4 |
65.2 MB |
TROOPERS/TROOPERS 2019/TR19 BloodHound and the Adversary Resilience Methodology.en.transcribed.srt |
139 KB |
TROOPERS/TROOPERS 2019/TR19 BloodHound and the Adversary Resilience Methodology.mp4 |
73.4 MB |
TROOPERS/TROOPERS 2019/TR19 Bluetooth, does it spark joy.en.transcribed.srt |
125 KB |
TROOPERS/TROOPERS 2019/TR19 Bluetooth, does it spark joy.mp4 |
66.6 MB |
TROOPERS/TROOPERS 2019/TR19 Car Manufacturer meets Security Community.en.transcribed.srt |
147 KB |
TROOPERS/TROOPERS 2019/TR19 Car Manufacturer meets Security Community.mp4 |
62.5 MB |
TROOPERS/TROOPERS 2019/TR19 Closing Remarks.en.transcribed.srt |
38 KB |
TROOPERS/TROOPERS 2019/TR19 Closing Remarks.mp4 |
47.8 MB |
TROOPERS/TROOPERS 2019/TR19 CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics....en.transcribed.srt |
133 KB |
TROOPERS/TROOPERS 2019/TR19 CypherDog 2.0 - Attackers think in Graphs, Managements needs Metrics....mp4 |
65.2 MB |
TROOPERS/TROOPERS 2019/TR19 Dark Clouds ahead Attacking a Cloud Foundry Implementation.en.transcribed.srt |
117 KB |
TROOPERS/TROOPERS 2019/TR19 Dark Clouds ahead Attacking a Cloud Foundry Implementation.mp4 |
61.5 MB |
TROOPERS/TROOPERS 2019/TR19 Digital Forensics and Incident Response in G Suite.en.transcribed.srt |
82 KB |
TROOPERS/TROOPERS 2019/TR19 Digital Forensics and Incident Response in G Suite.mp4 |
38 MB |
TROOPERS/TROOPERS 2019/TR19 Distributed Security Alerting.en.transcribed.srt |
137 KB |
TROOPERS/TROOPERS 2019/TR19 Distributed Security Alerting.mp4 |
56.1 MB |
TROOPERS/TROOPERS 2019/TR19 Ethics in Attacker Research.en.transcribed.srt |
19 KB |
TROOPERS/TROOPERS 2019/TR19 Ethics in Attacker Research.mp4 |
12.1 MB |
TROOPERS/TROOPERS 2019/TR19 Evolution of kernel fuzzers in NetBSD.mp4 |
37.4 MB |
TROOPERS/TROOPERS 2019/TR19 Fetch exploit - Attacks against source code downloaders.en.transcribed.srt |
101 KB |
TROOPERS/TROOPERS 2019/TR19 Fetch exploit - Attacks against source code downloaders.mp4 |
79.7 MB |
TROOPERS/TROOPERS 2019/TR19 Finding the best threat intelligence provider.en.transcribed.srt |
127 KB |
TROOPERS/TROOPERS 2019/TR19 Finding the best threat intelligence provider.mp4 |
47 MB |
TROOPERS/TROOPERS 2019/TR19 From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.en.transcribed.srt |
196 KB |
TROOPERS/TROOPERS 2019/TR19 From Workstation to Domain Admin Why Secure Administration Isn't Secure and How to Fix It.mp4 |
91.5 MB |
TROOPERS/TROOPERS 2019/TR19 Fun and Pitfalls in a World of VDSL.en.transcribed.srt |
132 KB |
TROOPERS/TROOPERS 2019/TR19 Fun and Pitfalls in a World of VDSL.mp4 |
53.3 MB |
TROOPERS/TROOPERS 2019/TR19 Fun with LDAP and Kerberos Attacking AD from non-Windows machines.en.transcribed.srt |
179 KB |
TROOPERS/TROOPERS 2019/TR19 Fun with LDAP and Kerberos Attacking AD from non-Windows machines.mp4 |
71.9 MB |
TROOPERS/TROOPERS 2019/TR19 HackDMI.en.transcribed.srt |
66 KB |
TROOPERS/TROOPERS 2019/TR19 HackDMI.mp4 |
36.8 MB |
TROOPERS/TROOPERS 2019/TR19 Hardware Side Channel attacks on the cheapest.en.transcribed.srt |
129 KB |
TROOPERS/TROOPERS 2019/TR19 Hardware Side Channel attacks on the cheapest.mp4 |
60.7 MB |
TROOPERS/TROOPERS 2019/TR19 Hitting the Gym The Anatomy of a Killer Workout.mp4 |
50.9 MB |
TROOPERS/TROOPERS 2019/TR19 How we made the badge BEFORE you showed up!.en.transcribed.srt |
50 KB |
TROOPERS/TROOPERS 2019/TR19 How we made the badge BEFORE you showed up!.mp4 |
29.9 MB |
TROOPERS/TROOPERS 2019/TR19 I am AD FS and so can you Attacking Active Directory Federated Services.en.transcribed.srt |
142 KB |
TROOPERS/TROOPERS 2019/TR19 I am AD FS and so can you Attacking Active Directory Federated Services.mp4 |
54.7 MB |
TROOPERS/TROOPERS 2019/TR19 I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.en.transcribed.srt |
117 KB |
TROOPERS/TROOPERS 2019/TR19 I'm in your cloud, reading everyone's emails - hacking Azure AD via Active Directory.mp4 |
68.1 MB |
TROOPERS/TROOPERS 2019/TR19 IPv666 – Address of the Beast.en.transcribed.srt |
145 KB |
TROOPERS/TROOPERS 2019/TR19 IPv666 – Address of the Beast.mp4 |
52 MB |
TROOPERS/TROOPERS 2019/TR19 Introducing Faction A modern, powerful, multiplayer C2 framework.en.transcribed.srt |
158 KB |
TROOPERS/TROOPERS 2019/TR19 Introducing Faction A modern, powerful, multiplayer C2 framework.mp4 |
109.9 MB |
TROOPERS/TROOPERS 2019/TR19 Introduction to Practical Ethics for Security Practitioners.en.transcribed.srt |
141 KB |
TROOPERS/TROOPERS 2019/TR19 Introduction to Practical Ethics for Security Practitioners.mp4 |
64.1 MB |
TROOPERS/TROOPERS 2019/TR19 IoT backdoors in cars.mp4 |
60.6 MB |
TROOPERS/TROOPERS 2019/TR19 Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.en.transcribed.srt |
156 KB |
TROOPERS/TROOPERS 2019/TR19 Is 2019 finally the year of Linux on the Desktop And what about v6-only in WiFi networks.mp4 |
72.4 MB |
TROOPERS/TROOPERS 2019/TR19 Keynote - Inside the Machine.en.transcribed.srt |
190 KB |
TROOPERS/TROOPERS 2019/TR19 Keynote - Inside the Machine.mp4 |
78.9 MB |
TROOPERS/TROOPERS 2019/TR19 MS Office file format sorcery.en.transcribed.srt |
121 KB |
TROOPERS/TROOPERS 2019/TR19 MS Office file format sorcery.mp4 |
86.5 MB |
TROOPERS/TROOPERS 2019/TR19 Medical Device Security - Please (don't) be patient!.en.transcribed.srt |
105 KB |
TROOPERS/TROOPERS 2019/TR19 Medical Device Security - Please (don't) be patient!.mp4 |
39.1 MB |
TROOPERS/TROOPERS 2019/TR19 Microsoft IT (secure) journey to IPv6-only.en.transcribed.srt |
174 KB |
TROOPERS/TROOPERS 2019/TR19 Microsoft IT (secure) journey to IPv6-only.mp4 |
57.5 MB |
TROOPERS/TROOPERS 2019/TR19 Modmob tools Home made tools to test mobile devices and monitor networks.en.transcribed.srt |
137 KB |
TROOPERS/TROOPERS 2019/TR19 Modmob tools Home made tools to test mobile devices and monitor networks.mp4 |
66.8 MB |
TROOPERS/TROOPERS 2019/TR19 NAT64 Day 2019 @ AWK.en.transcribed.srt |
99 KB |
TROOPERS/TROOPERS 2019/TR19 NAT64 Day 2019 @ AWK.mp4 |
55.1 MB |
TROOPERS/TROOPERS 2019/TR19 NGI - Keynote.en.transcribed.srt |
176 KB |
TROOPERS/TROOPERS 2019/TR19 NGI - Keynote.mp4 |
92.9 MB |
TROOPERS/TROOPERS 2019/TR19 NGI - Opening Remarks.en.transcribed.srt |
8 KB |
TROOPERS/TROOPERS 2019/TR19 NGI - Opening Remarks.mp4 |
3.1 MB |
TROOPERS/TROOPERS 2019/TR19 No more dumb hex!.en.transcribed.srt |
122 KB |
TROOPERS/TROOPERS 2019/TR19 No more dumb hex!.mp4 |
52.4 MB |
TROOPERS/TROOPERS 2019/TR19 Not A Security Boundary Breaking Forest Trusts.en.transcribed.srt |
123 KB |
TROOPERS/TROOPERS 2019/TR19 Not A Security Boundary Breaking Forest Trusts.mp4 |
50.5 MB |
TROOPERS/TROOPERS 2019/TR19 Old New Things An examination of the Philips TriMedia architecture.en.transcribed.srt |
68 KB |
TROOPERS/TROOPERS 2019/TR19 Old New Things An examination of the Philips TriMedia architecture.mp4 |
43.6 MB |
TROOPERS/TROOPERS 2019/TR19 Opening remarks.en.transcribed.srt |
34 KB |
TROOPERS/TROOPERS 2019/TR19 Opening remarks.mp4 |
26.6 MB |
TROOPERS/TROOPERS 2019/TR19 Practical attack simulations in Critical National Infrastructure (CNI).en.transcribed.srt |
62 KB |
TROOPERS/TROOPERS 2019/TR19 Practical attack simulations in Critical National Infrastructure (CNI).mp4 |
20.4 MB |
TROOPERS/TROOPERS 2019/TR19 SI6 IPv6 Toolkit v3.0.en.transcribed.srt |
101 KB |
TROOPERS/TROOPERS 2019/TR19 SI6 IPv6 Toolkit v3.0.mp4 |
59.9 MB |
TROOPERS/TROOPERS 2019/TR19 SIM Simulator.en.transcribed.srt |
47 KB |
TROOPERS/TROOPERS 2019/TR19 SIM Simulator.mp4 |
22.5 MB |
TROOPERS/TROOPERS 2019/TR19 Sneaking Past Device Guard.en.transcribed.srt |
110 KB |
TROOPERS/TROOPERS 2019/TR19 Sneaking Past Device Guard.mp4 |
71.3 MB |
TROOPERS/TROOPERS 2019/TR19 The Anatomy of Windows Telemetry.en.transcribed.srt |
128 KB |
TROOPERS/TROOPERS 2019/TR19 The Anatomy of Windows Telemetry.mp4 |
58.7 MB |
TROOPERS/TROOPERS 2019/TR19 The evolution of IoT botnets, including Torii and a smart-home hack..en.transcribed.srt |
83 KB |
TROOPERS/TROOPERS 2019/TR19 The evolution of IoT botnets, including Torii and a smart-home hack..mp4 |
43.5 MB |
TROOPERS/TROOPERS 2019/TR19 Threat Modelling and Beyond for Cisco ACI.en.transcribed.srt |
91 KB |
TROOPERS/TROOPERS 2019/TR19 Threat Modelling and Beyond for Cisco ACI.mp4 |
36 MB |
TROOPERS/TROOPERS 2019/TR19 VXLAN Security or Injection, and protection.mp4 |
49 MB |
TROOPERS/TROOPERS 2019/TR19 Vehicle alarms' insecurity and something else.en.transcribed.srt |
77 KB |
TROOPERS/TROOPERS 2019/TR19 Vehicle alarms' insecurity and something else.mp4 |
59.6 MB |
TROOPERS/TROOPERS 2019/TR19 Watchgate - How stupid smartwatches threaten the security and safety of our children.en.transcribed.srt |
95 KB |
TROOPERS/TROOPERS 2019/TR19 Watchgate - How stupid smartwatches threaten the security and safety of our children.mp4 |
61.4 MB |
TROOPERS/TROOPERS 2019/TR19 We are Listening – Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..en.transcribed.srt |
125 KB |
TROOPERS/TROOPERS 2019/TR19 We are Listening – Common Flaws in Encrypted VoIP SIP-over-TLS and sRTP..mp4 |
45.8 MB |
TROOPERS/TROOPERS 2019/TR19 What are the IPv6 news from the IETF.en.transcribed.srt |
217 KB |
TROOPERS/TROOPERS 2019/TR19 What are the IPv6 news from the IETF.mp4 |
108.1 MB |
TROOPERS/TROOPERS 2019/TR19 Wild West of Conference Apps Security.en.transcribed.srt |
84 KB |
TROOPERS/TROOPERS 2019/TR19 Wild West of Conference Apps Security.mp4 |
31.3 MB |
TROOPERS/TROOPERS 2019/TR19 You (dis)liked mimikatz Wait for kekeo.en.transcribed.srt |
146 KB |
TROOPERS/TROOPERS 2019/TR19 You (dis)liked mimikatz Wait for kekeo.mp4 |
77.9 MB |
TROOPERS/TROOPERS 2019/TR19 You try to detect mimikatz.en.transcribed.srt |
66 KB |
TROOPERS/TROOPERS 2019/TR19 You try to detect mimikatz.mp4 |
49.9 MB |
TROOPERS/TROOPERS 2019/TR19 macOS - Gaining root with harmless AppStore apps.en.transcribed.srt |
101 KB |
TROOPERS/TROOPERS 2019/TR19 macOS - Gaining root with harmless AppStore apps.mp4 |
106.6 MB |
TROOPERS/TROOPERS 2019/TROOPERS19 - Day #2 - A Morning Address.en.transcribed.srt |
1 KB |
TROOPERS/TROOPERS 2019/TROOPERS19 - Day #2 - A Morning Address.mp4 |
6.5 MB |
TROOPERS/TROOPERS logo.gif |
38 KB |
TROOPERS/TROOPERS logo.png |
289 KB |
TROOPERS/TROOPERS thank you.txt |
612 B |