1 |
|
Drones! |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2393 |
None |
2 |
|
Ghz Or Bust: Def Con |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2479 |
None |
3 |
|
Blind Xss |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3483 |
None |
4 |
|
Should The Wall Of Sheep Be Illegal? A Debate Over Whether And How Open Wifi Sniffing Should Be Regulated |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2423 |
None |
5 |
|
Cryptohaze Cloud Cracking |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2797 |
None |
6 |
|
Overwriting The Exception Handling Cache Pointerdwarf Oriented Programming |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2434 |
None |
7 |
|
Exploit Archaeology: Raiders Of The Lost Payphones |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2476 |
None |
8 |
|
Hardware Backdooring Is Practical |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3076 |
None |
9 |
|
Diy Electric Car |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2422 |
None |
10 |
|
Tenacious Diggity: Skinny Dippin' In A Sea Of Bing |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2654 |
None |
11 |
|
Kinectasploitv2: Kinect Meets 20 Security Tools |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3247 |
None |
12 |
|
Fuzzing Online Games |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2667 |
None |
13 |
|
The Open Cyber Challenge Platform |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2577 |
None |
14 |
|
Into The Droid: Gaining Access To Android User Data |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2642 |
None |
15 |
|
Panel: Meet The Feds 1 - Law Enforcement |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2389 |
None |
16 |
|
Meet The Feds 2 - Policy |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2449 |
None |
17 |
|
Sigint And Traffic Analysis For The Rest Of Us |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2465 |
None |
18 |
|
Bad (And Sometimes Good) Tech Policy: It's Not Just A Dc Thing |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2202 |
None |
19 |
|
Life Inside A Skinner Box: Confronting Our Future Of Automated Law Enforcement |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2372 |
None |
20 |
|
Owning The Network: Adventures In Router Rootkits |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3340 |
None |
21 |
|
World War 3.0: Chaos, Control And The Battle For The Net |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2695 |
None |
22 |
|
Why I Am Pessimistic About The Future |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2131 |
None |
23 |
|
Dns Sec Today |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2614 |
None |
24 |
|
The Power Of Names: How We Define Technology, And How Technology Defines Us |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2144 |
None |
25 |
|
The Safety Dance: Wardriving The 4.9ghz Public Safety Band |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2952 |
None |
26 |
|
P Law: Myths And Facts |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2152 |
None |
27 |
|
Build Free Hardware In Geda |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2476 |
None |
28 |
|
Starting Up A Crypto Party |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2985 |
None |
29 |
|
Android Best Practices And Side Projects |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2666 |
None |
30 |
|
The Effects Of Online Gaming Addiction |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2823 |
None |
31 |
|
Where We're Going We Don't Need Keys |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2194 |
None |
32 |
|
Hiring The Unhireable: Solving The Cyber Security Hiring Crisis From Dhs To Wall Street |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2160 |
None |
33 |
|
Network King Of The Hill (Netkoth): A Hacker Wargame For Organizers Who Are Lazy Bastards |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
1973 |
None |
34 |
|
Homebrew Roundtable |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2255 |
None |
35 |
|
Repurposing Technology |
11 years, 5 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
1902 |
None |
36 |
|
Something About Middleware |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2182 |
None |
37 |
|
Own The Network – Own The Data |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
3198 |
None |
38 |
|
Magnets, How Do They Work? |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, PhreakNIC 16 |
2352 |
None |
39 |
|
Not-So-Limited Warranty: Target Attacks On Warranties For Fun And Profit |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2268 |
None |
40 |
|
Hacking Humanity: Human Augmentation And You |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2316 |
None |
41 |
|
Dc Recognize Awards |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2115 |
None |
42 |
|
Sql Injection To Mips Overflows: Rooting Soho Routers |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
3165 |
None |
43 |
|
Looking Into The Eye Of The Meter |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, defcon-20, defcon-2012 |
2591 |
None |
44 |
|
Securing Javascript - Douglas Crockford |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2501 |
None |
45 |
|
Cracking The Code Of Mobile Application |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2774 |
None |
46 |
|
Put Your Robots To Work: Security Automation At Twitter |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2195 |
None |
47 |
|
Incident Response: Security After Compromise |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2578 |
None |
48 |
|
Exploiting Internal Network Vulns Via The Browser Using Beef Bind |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2629 |
None |
49 |
|
Web App Crypto - A Study In Failure |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1996 |
None |
50 |
|
Practical Exploitation Of Embedded Systems |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2327 |
None |
51 |
|
You And Your Research |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2099 |
None |
52 |
|
Data Mining A Mountain Of Vulnerabilities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2473 |
None |
53 |
|
Hackers The Movie: A Retrospective |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3023 |
None |
54 |
|
Why Telcos Keep Getting Hacked |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2754 |
None |
55 |
|
Opsec: Because Jail Is For Wuftpd |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3143 |
None |
56 |
|
Defibrilating Web Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2258 |
None |
57 |
|
Supercomputing, Malware And Correlation |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2132 |
None |
58 |
|
A Historical Look At The Phreaking Scene |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1904 |
None |
59 |
|
A Short History Of The Javascript Security Arsenal |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2192 |
None |
60 |
|
Ios 6 Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2393 |
None |
61 |
|
Mozilla Apps, Firefox Os And You |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1977 |
None |
62 |
|
Ipv6 Insecurity Revolutions |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2350 |
None |
63 |
|
Hacking In The Far East |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2332 |
None |
64 |
|
Silo Busting In Information Security: The Isc Sie Approach |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1968 |
None |
65 |
|
Why Web Security Is Fundamentally Broken |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
5513 |
1 |
66 |
|
Scalable Malware Analysis |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2273 |
None |
67 |
|
How To Get Along With Vendors Without Really Trying |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2040 |
None |
68 |
|
Security Industry Panel Discussion |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2156 |
None |
69 |
|
Innovative Approaches To Exploit Delivery |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1769 |
None |
70 |
|
Xss And Csrf Strike Back -- Powered By Html5 |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
4511 |
None |
71 |
|
Crypto For The Public Cloud |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1787 |
None |
72 |
|
Ios / Os X Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2308 |
None |
73 |
|
Finding The Weak Link In Binaries |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1894 |
None |
74 |
|
Cracking Wpa/Wpa2 Personal And Enterprise For Fun And Profit |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
6590 |
None |
75 |
|
Journey To The Bottom Of A Black Hole |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
1972 |
None |
76 |
|
Hunting And Exploiting Bugs In Kernel Drivers |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2749 |
None |
77 |
|
What Makes The Analysis Of Malware Like Duqu Or Flame Different? |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2238 |
None |
78 |
|
Give Me A Phone That Can't Be Traced! |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2686 |
None |
79 |
|
Messing Up The Kids Playground |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
1978 |
None |
80 |
|
Behind Enemy Lines |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2189 |
1 |
81 |
|
Study Of Malware Obfuscation Techniques |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3085 |
None |
82 |
|
Information Warfare And Cyberwar: What's The Story Morning |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3314 |
None |
83 |
|
Hacking Huawei Vrp |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
3203 |
None |
84 |
|
Element 1337 In The Periodic Table: Pwnium |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2280 |
None |
85 |
|
Something Mega |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hitb-2012 |
2112 |
None |
86 |
|
The Geek Girl's Case With The Tiara |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2070 |
None |
87 |
|
Spot The Web Vulnerability |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2311 |
None |
88 |
|
Self Defending Database |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2219 |
None |
89 |
|
To Secure Data Is To Prepare For Jailbreak |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2243 |
None |
90 |
|
Android Security - An Introduction |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2936 |
None |
91 |
|
Big Bang Theory: The Evolution Of Pentesting High Security Environments |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
3435 |
None |
92 |
|
Software Threat Modeling |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2514 |
None |
93 |
|
Alternative Internet |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2261 |
None |
94 |
|
Nat Attack |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
3236 |
None |
95 |
|
Usb = Universal Security Bug? |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2737 |
None |
96 |
|
The Rise And Fall Of Ddos Attacks In 2012 |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2103 |
None |
97 |
|
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access To The Source Code And Server Side Structure Of Any Application |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2262 |
None |
98 |
|
Think Differently About Database Hacking Presentation |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2161 |
None |
99 |
|
Top 10 Most Interesting Sap Vulnerabilities And Attacks |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2246 |
None |
100 |
|
Zombie Browsers, Spiced With Rootkit Extensions |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2693 |
None |
101 |
|
Digipass Instrumentation For Fun And Profit |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2255 |
None |
102 |
|
Alternative Usage Of Pki Devices |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2054 |
None |
103 |
|
The Security And Vulnerability Of The Biometry |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2489 |
None |
104 |
|
Attacking The First Hop Redundancy |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2171 |
None |
105 |
|
Disabling Antivirus Program(S) |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2675 |
None |
106 |
|
Paypass Vulnerabilities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2678 |
None |
107 |
|
Security Problems At Hungarian Everydays |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2668 |
None |
108 |
|
Security Code Review |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
1990 |
None |
109 |
|
Impressioning |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
1747 |
None |
110 |
|
Cyberspace And Beyond - Evolution In Action |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
2103 |
None |
111 |
|
So You Want To Be A Cyber Spook - Open Source Intelligence |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, hacktivity-2012 |
3582 |
None |
112 |
|
Effective Approaches To Web Application Security |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2781 |
None |
113 |
|
Bug Bounty Programs |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2299 |
None |
114 |
|
Origin(Al) Sins |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2396 |
None |
115 |
|
Four Axes Of Evil |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2587 |
None |
116 |
|
Top Ten Web Defenses |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2727 |
None |
117 |
|
Building A Web Attacker Dashboard With Modsecurity And Beef |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
4062 |
None |
118 |
|
Gauntlt: Rugged By Example |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2311 |
None |
119 |
|
Xss And Csrf With Html5 - Attack, Exploit And Defense |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3031 |
None |
120 |
|
Cross Site Port Scanning |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3123 |
None |
121 |
|
Hack Your Way To A Degree: A New Direction In Teaching Application Security At Universities |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2732 |
1 |
122 |
|
Hacking With Web Sockets |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2736 |
None |
123 |
|
Mobile Applications &Amp; Proxy Shenanigans |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2308 |
None |
124 |
|
Web Framework Vulnerabilties |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2972 |
None |
125 |
|
Keynote-Infosec At Ludicrious Speed: Rugged Devops And More |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2185 |
None |
126 |
|
Counterintelligence Attack Theory |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2734 |
None |
127 |
|
Appsec Training, Securing The Sdlc, Webgoat.Net And The Meaning Of Life |
11 years, 4 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2148 |
None |
128 |
|
Blended Threats And Javascript: A Plan For Permanent Network Compromise |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2310 |
None |
129 |
|
Spin The Bottle: Coupling Technology And Se For One Awesome Hack |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2097 |
None |
130 |
|
Securing The Ssl Channel Against Man-In-The-Middle Attacks |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2470 |
None |
131 |
|
Get Off Your Amf And Don't Rest On Json |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2273 |
None |
132 |
|
Reverse Engineering Secure Http Api's With An Ssl Proxy |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3071 |
None |
133 |
|
Using Interactive Static Analysis For Early Detection Of Software Vulnerabilities |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2375 |
None |
134 |
|
Devops Distilled: The Devops Panel |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1881 |
None |
135 |
|
Keynote - Some Lessons From The Trenches |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2139 |
None |
136 |
|
Interactive Application Security Testing(Iast), Beyond Sast/Dast |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2872 |
None |
137 |
|
The Same-Origin Saga |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2117 |
None |
138 |
|
Real World Cloud Application Security |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2094 |
None |
139 |
|
Keynote- The State Of Owasp |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2069 |
None |
140 |
|
Analyzing And Fixing Password Protection Schemes |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2945 |
None |
141 |
|
Unraveling Some Of The Mysteries Around Dom-Based Xss |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2346 |
None |
142 |
|
Builders Vs. Breakers |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1851 |
None |
143 |
|
Sql Server Exploitation, Escalation And Pilfering |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2550 |
None |
144 |
|
Secure Code Reviews Magic Or Art? A Simplified Approach To Secure Code Reviews |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1812 |
None |
145 |
|
How We Tear Into That Little Green Man |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
1946 |
None |
146 |
|
Hacking .Net Applications: Reverse Engineering 101 |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3086 |
None |
147 |
|
The 7 Qualities Of Highly Secure Software |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2159 |
None |
148 |
|
Iran's Real Life Cyberwar |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
3587 |
None |
149 |
|
Unbreakable Oracle Erps? Attacks On Siebel &Amp; Jd Edwards |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2413 |
None |
150 |
|
Demystifying Security In The Cloud: Aws Scout |
11 years, 3 months |
Securitytube_Poster |
securitytube, hacking, hackers, information security, convention, computer-security, appsecusa, appsecus-2012 |
2045 |
None |