Vídeos de GrrCON 2016
Ya tenemos acceso a los vídeos de las charlas de GrrCON 2016, celebrada en Michigan los pasados 6 y 7 de octubre.
- 116 Security Guards LOL Brent White Tim Roberts
- 115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years
- 318 Welcome to The World of Yesterday Tomorrow Joel Cardella
- 317 On being an Eeyore in Infosec Stefan Edwards
- 217 Phish your employees for fun Kristoffer Marshall
- 216 Binary Ninja Jared Demott
- 316 Piercing the Air Gap Network Steganography for Everyone John Ventura
- 315 So Youve Inherited a Security Department Now What Amanda Berlin
- 215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller
- 214 Tales from the Cryptanalyst Jeff Man
- 114 Breaking Android Apps for Fun and Profit Bill Sempf
- 113 Back to the Future Understanding our future but following the past Kevin Johnson
- 313 Alignment of business and IT Security Shane Harsch
- 213 Money Fame Power Build your success as a security professional Nathan Dragun
- 212 Machine Duping Pwning Deep Learning Systems Clarence Chio
- 211 Magnetic Stripes 101 Tyler Keeton
- 112 Guarding Lunch J Wolfgang Goerlich
- 111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin
- 110 and bad mistakes Ive made a few Jayson Street
- 312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman
- 312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman
- 110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so)
- 210 Encryption Mobility Cloud Oh My Bill Harmer
- 209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma
- 311 Stop attacking your mothers car Charles Parker II
- 208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey
- 207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra
- 310 How to Implement Crypto Poorly Sean Cassidy
- 309 Reality Checking Your AppSec Program Darren Meyer
- 308 Bad Guys Look Just Like You Justin Beard
- 205 Threat Detection Response with Hipara J Brett Cunningham
- 204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado
- 203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0
- 108 Secure Dicks Michael Kemp
- 206 still broken after all these years aka utility security for smarties doug nibbelink
- 307 Getting to the Root of Advanced Threats Before Impact Josh Fazio
- 306 Fighting the Enemy Within Matt Crowe
- 305 How Do You Secure What You Dont Control Dimitri Vlachos
- 304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F
- 303 Make STEHM Great Again David HealWHans Schwartzberg
- 205 Threat Detection Response with Hipara J Brett Cunningham
- 204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado
- 203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0
- 105 Abnormal Behavior Detection in Large Environments Dave Kennedy
- 302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob
- 300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould
- 202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth
- 201 So You Want to Be a Pentester Absolute0x0
- 200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong
- 103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau
- 102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts
- 100 Act Three The Evolution of Privacy Finux
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec