Christian Becker | Red Team Excercises - A case study | Zum Video |
Rene Freingruber | An overview on modern fuzzing techniques | Zum Video |
Gertjan Franken | Who left open the cookie jar? ... | Zum Video |
Michele Orrù | All your sessions are belong to us | Zum Video |
Johannes Dahse | State-of-the-art PHP Exploitation Techniques | Zum Video |
Mathy Vanhoef | KRACKing WPA2 and Mitigating Future Vulnerabilities | Zum Video |
Ange Albertini | Beyond your studies - You studied X at Y. Now what? | Zum Video |
Florian Kohlar | Tales from an IT-Security consultant | Zum Video |
Enno Rey | Properties of IPv6 and Their Implications for Offense & Defense | Zum Video |
Nicolas Grégoire | Nearly generic fuzzing of XML-based formats | Kein Video vorhanden |
Mario Heiderich | My Sweet Innocence Exposed - Eleven Reasons why we will all miss you, "e" | Zum Video |
Victor van der Veen | Drammer: The Making-Of | Zum Video |
Johannes Dahse | An Advent Calendar full of PHP Security Bugs | Zum Video |
Martin Schmiedecker | Turning Incident Response to Eleven | Zum Video |
Anders Fogh | Covert shotgun: Automatically finding covert channels in SMT | Zum Video |
Clémentine Maurice | Reverse-engineering CPUs for fun and profit | Zum Video |
Tom Van Goethem | Breaking privacy and security by abusing cross-origin resource size | Zum Video |
Ben Stock | From Facepalm to Brain Bender - Exploring Client-Side Cross-Site Scripting | Zum Video |
Christian Rossow | Zeus P2PWNED: Monitoring and Disrupting Modern P2P Botnets | Zum Video |
Hanno Böck | TLS - the most important crypto protocol | Zum Video |
Sven Schlueter | Modern penetration testing | Zum Video |
Dirk Wetter | Intricacies testing SSL: sockets, schools, threa{t,d}s and sometimes no shake-hands | Zum Video |
Ibrahim Köse | Managing Security Testing | Zum Video |
Michele Orru | Dark Fairy Tales from a Phisherman (Vol. III) | Zum Video |
Matthias Kaiser | Exploiting Deserializsation Vulnerabilities in Java | Zum Video |
Christian Schneider | Security DevOps - Free pentesters time to focus on high-hanging fruits | Zum Video |
Sebastian Lekies | 25 Million Flows Later: Detection and Exploitation of DOM-based XSS at Scale | Zum Video |
Frederik Braun | Using a CDN that can not XSS you - with Subresourece Integrity | Zum Video |
Thomas Patzke | Near Field Communication Security | Zum Video |
Joern Schneeweisz | Bug Tales | Zum Video |
Sebastian Schinzel | Remote Timing Attacks | Zum Video |
Johannes Dahse | Static Detection of Vulnerabilities in Modern PHP Applications | Zum Video |
Collin Mulliner | Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in GUIs | Zum Video |
Alex Inführ | Adobe Reader - Pictures and Text on Steroids | Zum Video |
Mathias Karlsson | Polyglot payloads in practice | Zum Video |
Steven Van Acker | A Hero´s guide to taming the JavaScript beast | Zum Video |
Mathias Bynens | Hacking with Unicode | Zum Video |
Felix Gröbert | Security Analysis of Apple FileVault2 | Zum Video |
Mike West | User Agent Lockdown | Zum Video |
Stefan Esser | iOS 7 Security Overview | Zum Video |
Miroslav Stampar | Curious Case of SQLi | Zum Video |
Fabian Yamaguchi | Information Retrieval and Machine Learning for Interactive Bug Hunting | Zum Video |
Andreas Kurtz | Pentesting IOs Apps - Runtime Analysis and Manipulation | Zum Video |
Karsten Nohl | In-depth crypto attacks - It always takes two bugs | Zum Video |
Giorgio Maone | Defending the Indefensible - The Unsung Battles & Legacy of NoScript | Zum Video |
Jeremiah Grossman | The real state of website security and the truth about accountability and "Best-Practices." | Zum Video |
Matthias Kaiser | Recent Java Exploitation Techniques | Zum Video |
Jürgen Pabel | Information Security Management | Zum Video |
Felix Lindner | Security is Privacy | Zum Video |
Svetlana Gaivoronski | Shellcode detection techniques | Zum Video |
Arthur Gerkis | Dynamic PHP web-appliaktion analysis | Zum Video |
Roberto Suggi Liverani | Cross Context Scripting (XCS) - Attacks and Exploitation | Zum Video |
Soroush Dalili | File Uploaders Vulnerabilities - Fire in the hole! | Zum Video |
Tuomas Kärkkäinen | Fuzzing scale and in style | Zum Video |
Jonas Magazinius | Crossing Origins by Crossing Formats | Zum Video |
Ange Albertini | A challenge in your pocket, an introduction to brainteasers | Zum Video |
Sandro Gauci | Webapp Exploit Payloads - tools built for & during the job | Zum Video |
Alexey Sintsov | Lotus Domino: Penetration Through the Controller | Zum Video |
Vladimir Vorontsov | Blind XXE injections | Zum Video |
Michele Orru | Beef, what a tasty piece of meat | Zum Video |
Paul Stone | Browser Timing Attacks via the Graphics Stack | Zum Video |
Nicolas Gregoire | Attacking xml processing | Zum Video |