Christian Becker | Red Team Excercises - A case study | Video |
Rene Freingruber | An overview on modern fuzzing techniques | Video |
Gertjan Franken | Who left open the cookie jar? ... | Video |
Michele Orrù | All your sessions are belong to us | Video |
Johannes Dahse | State-of-the-art PHP Exploitation Techniques | Video |
Mathy Vanhoef | KRACKing WPA2 and Mitigating Future Vulnerabilities | Video |
Ange Albertini | Beyond your studies - You studied X at Y. Now what? | Video |
Florian Kohlar | Tales from an IT-Security consultant | Video |
Enno Rey | Properties of IPv6 and Their Implications for Offense & Defense | Video |
Nicolas Grégoire | Nearly generic fuzzing of XML-based formats | No Video available |
Mario Heiderich | My Sweet Innocence Exposed - Eleven Reasons why we will all miss you, "e" | Video |
Victor van der Veen | Drammer: Making-Of | Video |
Johannes Dahse | An Advent Calendar full of PHP Security Bugs | Video |
Martin Schmiedecker | Turning Incident Response to Eleven | Video |
Anders Fogh | Covert shotgun: Automatically finding covert channels in SMT | Video |
Clémentine Maurice | Reverse-engineering CPUs for fun and profit | Video |
Tom Van Goethem | Breaking privacy and security by abusing cross-origin resource size | Video |
Ben Stock | From Facepalm to Brain Bender - Exploring Client-Side Cross-Site Scripting | Video |
Christian Rossow | Zeus P2PWNED: Monitoring and Disrupting Modern P2P Botnets | Video |
Hanno Böck | TLS - the most important crypto protocol | Video |
Sven Schlueter | Modern penetration testing | Video |
Dirk Wetter | Intricacies testing SSL: sockets, schools, threa{t,d}s and sometimes no shake-hands | Video |
Ibrahim Köse | Managing Security Testing | Video |
Michele Orru | Dark Fairy Tales from a Phisherman (Vol. III) | Video |
Matthias Kaiser | Exploiting Deserializsation Vulnerabilities in Java | Video |
Christian Schneider | Security DevOps - Free pentesters time to focus on high-hanging fruits | Video |
Sebastian Lekies | 25 Million Flows Later: Detection and Exploitation of DOM-based XSS at Scale | Video |
Frederik Braun | Using a CDN that can not XSS you - with Subresourece Integrity | Video |
Thomas Patzke | Near Field Communication Security | Video |
Joern Schneeweisz | Bug Tales | Video |
Sebastian Schinzel | Remote Timing Attacks | Video |
Johannes Dahse | Static Detection of Vulnerabilities in Modern PHP Applications | Video |
Collin Mulliner | Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in GUIs | Video |
Alex Inführ | Adobe Reader - Pictures and Text on Steroids | Video |
Mathias Karlsson | Polyglot payloads in practice | Video |
Steven Van Acker | A Hero´s guide to taming the JavaScript beast | Video |
Mathias Bynens | Hacking with Unicodehttps://www.youtube.com/watch?v=1hjc2PQR8uc | Video |
Felix Gröbert | Security Analysis of Apple FileVault2 | Video |
Mike West | User Agent Lockdown | Video |
Stefan Esser | iOS 7 Security Overview | Video |
Miroslav Stampar | Curious Case of SQLi | Video |
Fabian Yamaguchi | Information Retrieval and Machine Learning for Interactive Bug Hunting | Video |
Andreas Kurtz | Pentesting IOs Apps - Runtime Analysis and Manipulation | Video |
Karsten Nohl | In-depth crypto attacks - It always takes two bugs | Video |
Giorgio Maone | Defending the Indefensible - The Unsung Battles & Legacy of NoScript | Video |
Jeremiah Grossman | The real state of website security and the truth about accountability and "Best-Practices." | Video |
Matthias Kaiser | Recent Java Exploitation Techniques | Video |
Jürgen Pabel | Information Security Management | Video |
Felix Lindner | Security is Privacy | Video |
Svetlana Gaivoronski | Shellcode detection techniques | Video |
Arthur Gerkis | Dynamic PHP web-appliaktion analysis | Video |
Roberto Suggi Liverani | Cross Context Scripting (XCS) - Attacks and Exploitation | Video |
Soroush Dalili | File Uploaders Vulnerabilities - Fire in the hole! | Video |
Tuomas Kärkkäinen | Fuzzing scale and in style | Video |
Jonas Magazinius | Crossing Origins by Crossing Formats | Video |
Ange Albertini | A challenge in your pocket, an introduction to brainteasers | Video |
Sandro Gauci | Webapp Exploit Payloads - tools built for & during the job | Video |
Alexey Sintsov | Lotus Domino: Penetration Through the Controller | Video |
Vladimir Vorontsov | Blind XXE injections | Video |
Michele Orru | Beef, what a tasty piece of meat | Video |
Paul Stone | Browser Timing Attacks via the Graphics Stack | Video |
Nicolas Gregoire | Attacking xml processing | Video |