Vídeos de DeepSec 2015

deepsec.jpg

Después de que se publicara el material de DeepSec 2015, ahora también tenemos los vídeos disponibles:

[DS15] ZigBee Smart Homes – A Hacker’s Open House - Tobias Zillner, Florian Eichelberger [DS15] The German Data Privacy Laws and IT Security - Stefan Schumacher [DS15] Revisiting SOHO Router Attacks [DS15] Remote Browser Based Fingerprinting of Local Network Devices - Manfred Kaiser [DS15] Not so Smart - On Smart TV Apps - Marcus Niemietz [DS15] 50 Shades of WAF Exemplified at Barracuda & Sucuri - Ashar Javed [DS15] Yes, Now YOU Can Patch That Vulnerability Too! Mitja Kolsek [DS15] Visualizing Wi Fi Packets the Hacker’s Way - Milan Gabor [DS15] Temet Nosce - Know thy Endpoint Through and Through; Processes to Data - Thomas Fischer [DS15] Measuring the TOR Network - Jens Kubieziel [DS15] Keynote Can Societies manage the SIGINT Monster - Duncan Campbell [DS15] illusoryTLS Nobody But Us Impersonate,Tamper and Exploit - Alfonso De Gregorio [DS15] IntelMQ - L. Aaron Kaplan [DS15] How to Break XML Encryption – Automatically – Juraj Somorovsky [DS15] HORNET High speed Onion Routing at the Network Layer - Chen Chen [DS15] Have We Penetrated Yet?? - Johnny Deutsch [DS15] HackingTeam – How They Infected Your Android Device By 0days - Attila Marosi [DS15] Hacking Cookies in Modern Web Applications and Browsers - Dawid Czagan [DS15] File Format Fuzzing in Android Giving a Stagefright to the Android Installer [DS15] Extending a Legacy Platform Providing a Minimalistic, Secure Single Sign On Library [DS15] Agile Security The Good, The Bad, and mostly the Ugly - Daniel Liber [DS15] Bridging the Air Gap Data Exfiltration from Air Gap Networks - [DS15] Building a Better Honeypot Network - Josh Pyorre [DS15] Chw00t How To Break Out from Various Chroot Solutions - Balazs Bucsay [DS15] Continuous Intrusion Why CI Tools Are an Attacker’s Best Friends - Nikhil Mittal [DS15] Cryptographic Enforcement of Segregation of Duty within Work Flows - Thomas Maus [DS15] Cryptography Tools, Identity Vectors for ‘Djihadists’ - Julie Gommes [DS15] Deactivating Endpoint Protection Software in an Unauthorized Manner Matthias Deeg [DS15] DDoS Barbarians at the Gateway - Dave Lewis [DS15] Cyber Cyber Cyber Warfare Mistakes from the MoDs – Raoul Chiesa [DS15] A Case Study on the Security of Application Whitelisting René Freingruber [DS15] A Death in Athens The inherent Vulnerability of “Lawful Intercept” Programs James Bamford [DS15] Advanced SOHO Router Exploitation - Lyon Yang [DS15] Legal Responses Against Cyber Incidents - Oscar Serrano