Index of /docs/Slides/2015
Name Last modified Size Description
Parent Directory -
Cyber_Cyber_Cyber_Warfare___Mistakes_of_the_DoDs_-_Raoul Chiesa.pdf 2015-11-20 10:22 2.7M
OSINT_Barncat___Mining_Malware_for_Intelligence_at_Scale_-_John_Bambenek.pdf 2015-11-20 10:40 57M
Agile_Security_The_Good,_The_Bad,_(and_Mostly)_The_Ugly_-_Daniel_Liber.pdf 2015-11-21 17:03 937K
Bridging_the_Air-Gap_Data_Exfiltration_from_Air-Gap_ Networks_-_Yisroel_Mirsky.pdf 2015-11-26 10:31 1.3M
Can_societies_manage_ the_SIGINT_monster_-_Duncan_Campbell.pdf 2015-11-26 10:33 14M
Chw00t_How_To_Break Out_from_Various_Chroot_Solutions_-_Bucsay_Balazs.pdf 2015-11-26 10:38 6.4M
Yes,_Now_YOU_Can_ Patch_That_Vulnerability_Too!_-_Mitja_Kolsek.pdf 2015-11-26 11:33 1.9M
Hacking Cookies in Modern Web Applications_and_Browsers_-_Dawid_Czagan.pdf 2015-11-26 13:09 75K
Not_so_Smart_On_ Smart_TV_Apps_-_Marcus_Niemietz.pdf 2015-11-26 13:36 16M
Extending_a_Legacy_ Platform_Providing_a_Minimalistic,_Secure_Single-Sign-On-Library_-_Bernhard_Goeschelberger,_Sebastian_Goettfert.pdf 2015-12-01 14:37 329K
File_Format_Fuzzing_in_Android_-Alexandru_Blanda.pdf 2015-12-01 15:06 605K
How_To_Break_XML_Encryption_-_Automatically_-_Juraj_Somorovsky.pdf 2015-12-02 10:37 3.2M
German_Privacy_Law_And_IT_Security_-_Stefan_Schumacher.pdf 2015-12-02 11:08 465K
ZigBee_SmartHomes_A_Hackers_Open_House_-_Tobias_Zillner,_Florian_Eichelberger.pdf 2015-12-02 11:22 13M
Deactivating_Endpoint_Protection_Software_in_an_Unauthorized_ Manner_-_Matthias_Deeg.pdf 2015-12-02 11:26 1.7M
Revisiting_SOHO_Router_Attacks_-_Jose_Antonio _Rodriguez_Garcia,_Ivan _Sanz_de_Castro,_Álvaro_Folgado_Rueda.pdf 2015-12-02 11:48 5.8M
Continuous_Intrusion_Why_CI_Tools_Are_an_Attacker's_Best_Friends_-_Nikhil_Mittal.pdf 2015-12-02 12:44 6.2M
Legal_Responses_ Against_Cyber_ Incidents_-_Oscar_Serrano.pdf 2015-12-03 10:57 47M
Building_a_Better_ Honeypot_Network_-_Josh_Pyorre.pdf 2015-12-03 14:09 21M
DDoS_-_Barbarians_at_the_Gate(way)_-_Dave_Lewis.pdf 2015-12-09 10:35 11M
Cryptography_Tools_-_ Identity_Vectors_for_ Djihadists_-_Julie_Gommes.pdf 2015-12-09 11:15 1.1M
Temet_Nosce_Know_Thy_Endpoint_Through_and_Through_Processes_to_Data_-_Thomas_Fischer.pdf 2015-12-09 11:32 4.0M
Crypto-Segregation_of_Duty_within_Work-flows_-_Thomas_Maus.pdf 2015-12-09 12:27 259K
Advanced_SOHO_ Router_Exploitation_-Lyon_Yang.pdf 2015-12-15 11:33 11M
illusoryTLS_Nobody_But Us_Impersonate_Tamper_and_Exploit_-_Alfonso_De_Gregorio.pdf 2015-12-17 13:01 13M
Visualizing_Wi-Fi_Packets_the_Hacker's_Way_-_Milan_Gabor.pdf 2015-12-24 11:40 3.7M
Have_We_Penetrated_Yet_-_Johnny_Deutsch.pdf 2016-01-07 10:52 459K