1 |
|
Drones! |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2424 |
None |
2 |
|
Ghz Or Bust: Def Con |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2508 |
None |
3 |
|
Blind Xss |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3509 |
None |
4 |
|
Should The Wall Of Sheep Be Illegal? A Debate Over Whether And How Open Wifi Sniffing Should Be Regulated |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2449 |
None |
5 |
|
Cryptohaze Cloud Cracking |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2821 |
None |
6 |
|
Overwriting The Exception Handling Cache Pointerdwarf Oriented Programming |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2458 |
None |
7 |
|
Exploit Archaeology: Raiders Of The Lost Payphones |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2501 |
None |
8 |
|
Hardware Backdooring Is Practical |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3106 |
None |
9 |
|
Diy Electric Car |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2447 |
None |
10 |
|
Tenacious Diggity: Skinny Dippin' In A Sea Of Bing |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2680 |
None |
11 |
|
Kinectasploitv2: Kinect Meets 20 Security Tools |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3279 |
None |
12 |
|
Fuzzing Online Games |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2707 |
None |
13 |
|
The Open Cyber Challenge Platform |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2608 |
None |
14 |
|
Into The Droid: Gaining Access To Android User Data |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2671 |
None |
15 |
|
Panel: Meet The Feds 1 - Law Enforcement |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2417 |
None |
16 |
|
Meet The Feds 2 - Policy |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2479 |
None |
17 |
|
Sigint And Traffic Analysis For The Rest Of Us |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2495 |
None |
18 |
|
Bad (And Sometimes Good) Tech Policy: It's Not Just A Dc Thing |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2228 |
None |
19 |
|
Life Inside A Skinner Box: Confronting Our Future Of Automated Law Enforcement |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2400 |
None |
20 |
|
Owning The Network: Adventures In Router Rootkits |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3366 |
None |
21 |
|
World War 3.0: Chaos, Control And The Battle For The Net |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2720 |
None |
22 |
|
Why I Am Pessimistic About The Future |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2152 |
None |
23 |
|
Dns Sec Today |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2630 |
None |
24 |
|
The Power Of Names: How We Define Technology, And How Technology Defines Us |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2166 |
None |
25 |
|
The Safety Dance: Wardriving The 4.9ghz Public Safety Band |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2976 |
None |
26 |
|
P Law: Myths And Facts |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2175 |
None |
27 |
|
Build Free Hardware In Geda |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2495 |
None |
28 |
|
Starting Up A Crypto Party |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
3001 |
None |
29 |
|
Android Best Practices And Side Projects |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2693 |
None |
30 |
|
The Effects Of Online Gaming Addiction |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2844 |
None |
31 |
|
Where We're Going We Don't Need Keys |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2219 |
None |
32 |
|
Hiring The Unhireable: Solving The Cyber Security Hiring Crisis From Dhs To Wall Street |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2181 |
None |
33 |
|
Network King Of The Hill (Netkoth): A Hacker Wargame For Organizers Who Are Lazy Bastards |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
1996 |
None |
34 |
|
Homebrew Roundtable |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2273 |
None |
35 |
|
Repurposing Technology |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
1925 |
None |
36 |
|
Something About Middleware |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2206 |
None |
37 |
|
Own The Network – Own The Data |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
3218 |
None |
38 |
|
Magnets, How Do They Work? |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2369 |
None |
39 |
|
Not-So-Limited Warranty: Target Attacks On Warranties For Fun And Profit |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2291 |
None |
40 |
|
Hacking Humanity: Human Augmentation And You |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2343 |
None |
41 |
|
Dc Recognize Awards |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2143 |
None |
42 |
|
Sql Injection To Mips Overflows: Rooting Soho Routers |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3193 |
None |
43 |
|
Looking Into The Eye Of The Meter |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2617 |
None |
44 |
|
Securing Javascript - Douglas Crockford |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2525 |
None |
45 |
|
Cracking The Code Of Mobile Application |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2791 |
None |
46 |
|
Put Your Robots To Work: Security Automation At Twitter |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2216 |
None |
47 |
|
Incident Response: Security After Compromise |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2595 |
None |
48 |
|
Exploiting Internal Network Vulns Via The Browser Using Beef Bind |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2652 |
None |
49 |
|
Web App Crypto - A Study In Failure |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2014 |
None |
50 |
|
Practical Exploitation Of Embedded Systems |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2348 |
None |
51 |
|
You And Your Research |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2119 |
None |
52 |
|
Data Mining A Mountain Of Vulnerabilities |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2491 |
None |
53 |
|
Hackers The Movie: A Retrospective |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3041 |
None |
54 |
|
Why Telcos Keep Getting Hacked |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2773 |
None |
55 |
|
Opsec: Because Jail Is For Wuftpd |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3162 |
None |
56 |
|
Defibrilating Web Security |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2279 |
None |
57 |
|
Supercomputing, Malware And Correlation |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2154 |
None |
58 |
|
A Historical Look At The Phreaking Scene |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1923 |
None |
59 |
|
A Short History Of The Javascript Security Arsenal |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2210 |
None |
60 |
|
Ios 6 Security |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2412 |
None |
61 |
|
Mozilla Apps, Firefox Os And You |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1997 |
None |
62 |
|
Ipv6 Insecurity Revolutions |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2370 |
None |
63 |
|
Hacking In The Far East |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2353 |
None |
64 |
|
Silo Busting In Information Security: The Isc Sie Approach |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1987 |
None |
65 |
|
Why Web Security Is Fundamentally Broken |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
5539 |
1 |
66 |
|
Scalable Malware Analysis |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2295 |
None |
67 |
|
How To Get Along With Vendors Without Really Trying |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2060 |
None |
68 |
|
Security Industry Panel Discussion |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2184 |
None |
69 |
|
Innovative Approaches To Exploit Delivery |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1794 |
None |
70 |
|
Xss And Csrf Strike Back -- Powered By Html5 |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
4531 |
None |
71 |
|
Crypto For The Public Cloud |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1811 |
None |
72 |
|
Ios / Os X Security |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2329 |
None |
73 |
|
Finding The Weak Link In Binaries |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1911 |
None |
74 |
|
Cracking Wpa/Wpa2 Personal And Enterprise For Fun And Profit |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
6634 |
None |
75 |
|
Journey To The Bottom Of A Black Hole |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
1990 |
None |
76 |
|
Hunting And Exploiting Bugs In Kernel Drivers |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2770 |
None |
77 |
|
What Makes The Analysis Of Malware Like Duqu Or Flame Different? |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2257 |
None |
78 |
|
Give Me A Phone That Can't Be Traced! |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2706 |
None |
79 |
|
Messing Up The Kids Playground |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1997 |
None |
80 |
|
Behind Enemy Lines |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2210 |
1 |
81 |
|
Study Of Malware Obfuscation Techniques |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3109 |
None |
82 |
|
Information Warfare And Cyberwar: What's The Story Morning |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3333 |
None |
83 |
|
Hacking Huawei Vrp |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3223 |
None |
84 |
|
Element 1337 In The Periodic Table: Pwnium |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2300 |
None |
85 |
|
Something Mega |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2134 |
None |
86 |
|
The Geek Girl's Case With The Tiara |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2090 |
None |
87 |
|
Spot The Web Vulnerability |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2333 |
None |
88 |
|
Self Defending Database |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2247 |
None |
89 |
|
To Secure Data Is To Prepare For Jailbreak |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2264 |
None |
90 |
|
Android Security - An Introduction |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2954 |
None |
91 |
|
Big Bang Theory: The Evolution Of Pentesting High Security Environments |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
3458 |
None |
92 |
|
Software Threat Modeling |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2535 |
None |
93 |
|
Alternative Internet |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2280 |
None |
94 |
|
Nat Attack |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
3257 |
None |
95 |
|
Usb = Universal Security Bug? |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2756 |
None |
96 |
|
The Rise And Fall Of Ddos Attacks In 2012 |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2121 |
None |
97 |
|
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access To The Source Code And Server Side Structure Of Any Application |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2283 |
None |
98 |
|
Think Differently About Database Hacking Presentation |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2183 |
None |
99 |
|
Top 10 Most Interesting Sap Vulnerabilities And Attacks |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2263 |
None |
100 |
|
Zombie Browsers, Spiced With Rootkit Extensions |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2715 |
None |
101 |
|
Digipass Instrumentation For Fun And Profit |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2275 |
None |
102 |
|
Alternative Usage Of Pki Devices |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2072 |
None |
103 |
|
The Security And Vulnerability Of The Biometry |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2515 |
None |
104 |
|
Attacking The First Hop Redundancy |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2192 |
None |
105 |
|
Disabling Antivirus Program(S) |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2694 |
None |
106 |
|
Paypass Vulnerabilities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2698 |
None |
107 |
|
Security Problems At Hungarian Everydays |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2689 |
None |
108 |
|
Security Code Review |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2010 |
None |
109 |
|
Impressioning |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
1767 |
None |
110 |
|
Cyberspace And Beyond - Evolution In Action |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2126 |
None |
111 |
|
So You Want To Be A Cyber Spook - Open Source Intelligence |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
3602 |
None |
112 |
|
Effective Approaches To Web Application Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2803 |
None |
113 |
|
Bug Bounty Programs |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2319 |
None |
114 |
|
Origin(Al) Sins |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2415 |
None |
115 |
|
Four Axes Of Evil |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2604 |
None |
116 |
|
Top Ten Web Defenses |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2747 |
None |
117 |
|
Building A Web Attacker Dashboard With Modsecurity And Beef |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
4080 |
None |
118 |
|
Gauntlt: Rugged By Example |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2332 |
None |
119 |
|
Xss And Csrf With Html5 - Attack, Exploit And Defense |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3050 |
None |
120 |
|
Cross Site Port Scanning |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3145 |
None |
121 |
|
Hack Your Way To A Degree: A New Direction In Teaching Application Security At Universities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2749 |
1 |
122 |
|
Hacking With Web Sockets |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2755 |
None |
123 |
|
Mobile Applications &Amp; Proxy Shenanigans |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2327 |
None |
124 |
|
Web Framework Vulnerabilties |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2993 |
None |
125 |
|
Keynote-Infosec At Ludicrious Speed: Rugged Devops And More |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2202 |
None |
126 |
|
Counterintelligence Attack Theory |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2751 |
None |
127 |
|
Appsec Training, Securing The Sdlc, Webgoat.Net And The Meaning Of Life |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2167 |
None |
128 |
|
Blended Threats And Javascript: A Plan For Permanent Network Compromise |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2332 |
None |
129 |
|
Spin The Bottle: Coupling Technology And Se For One Awesome Hack |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2117 |
None |
130 |
|
Securing The Ssl Channel Against Man-In-The-Middle Attacks |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2491 |
None |
131 |
|
Get Off Your Amf And Don't Rest On Json |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2291 |
None |
132 |
|
Reverse Engineering Secure Http Api's With An Ssl Proxy |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3095 |
None |
133 |
|
Using Interactive Static Analysis For Early Detection Of Software Vulnerabilities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2392 |
None |
134 |
|
Devops Distilled: The Devops Panel |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1908 |
None |
135 |
|
Keynote - Some Lessons From The Trenches |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2160 |
None |
136 |
|
Interactive Application Security Testing(Iast), Beyond Sast/Dast |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2896 |
None |
137 |
|
The Same-Origin Saga |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2138 |
None |
138 |
|
Real World Cloud Application Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2112 |
None |
139 |
|
Keynote- The State Of Owasp |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2104 |
None |
140 |
|
Analyzing And Fixing Password Protection Schemes |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2968 |
None |
141 |
|
Unraveling Some Of The Mysteries Around Dom-Based Xss |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2370 |
None |
142 |
|
Builders Vs. Breakers |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1874 |
None |
143 |
|
Sql Server Exploitation, Escalation And Pilfering |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2573 |
None |
144 |
|
Secure Code Reviews Magic Or Art? A Simplified Approach To Secure Code Reviews |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1831 |
None |
145 |
|
How We Tear Into That Little Green Man |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1965 |
None |
146 |
|
Hacking .Net Applications: Reverse Engineering 101 |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3107 |
None |
147 |
|
The 7 Qualities Of Highly Secure Software |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2183 |
None |
148 |
|
Iran's Real Life Cyberwar |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3603 |
None |
149 |
|
Unbreakable Oracle Erps? Attacks On Siebel &Amp; Jd Edwards |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2429 |
None |
150 |
|
Demystifying Security In The Cloud: Aws Scout |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2059 |
None |