Vídeos de BSides Las Vegas 2012
Ya tenemos disponibles las charlas que se grabaron de BSides Las Vegas 2012:
1.1.0 KEYNOTE, Jack Daniel The State of Security BSides 1.1.1 Matt Weeks Ambush - Catching Intruders At Any Point 1.1.2 Robert Rowley Max Level Web App Security 1.1.3 Davi Ottenheimer Big Data’s Fourth V Or Why We’ll Never Find the L… 1.1.4 HD Moore Empirical Exploitation 1.1.5 Christopher Lytle Puzzle Competitions and You 1.1.6 Parth Patel Introducing Android Security Evaluation Framework - ASEF 1.1.7 Terry Gold RFID LOL 2.1.0 Michael Fornal How I managed to break into the InfoSec World 2.1.1 David Keene Breaking Microsoft Dynamics Great Plains - an insiders… 2.1.2 William Ghote Lotus Notes Password Hash Redux 2.1.3 Spencer McIntyre How I Learned To Stop Worrying and Love the Smart… 2.1.4 Christopher Campbell Shot With Your Own Gun How Appliances are Use… 2.1.5 Shawn Asmus, Kristov Widak Mirror Mirror – Reflected PDF Attacks… 2.1.6 Georgia Weidman Introducing the Smartphone Penetration Testing Fra… 1.2.0 Raphael Mudge Force Multipliers for Red Team Operations 1.2.1 Andrew Hay & Matt Johansen Applications and Cloud and Hackers, Oh My! 1.2.2 Brendan O’Connor Reticle Dropping an Intelligent F-BOMB 1.2.3 Josh Sokol Dan Cornell The Magic of Symbiotic Security Creating an… 1.2.4 James Lester & Joseph Tartaro Burp Suite Informing the 99% of what… 1 2 5 dc949 Stiltwalker Round 2 1 2 5 dc949 Stiltwalker Round 2 1.2.6 Gillis Jones The Badmin project (Na-na- nanana Na-na-nanana BADMIN) 1.2.7 IPv6 Panel Drinking Game 2.2.0 Phil Young Mainframed - The Forgotten Fortress 2.2.1 Walt Williams Metrics that Suck Even Less 2.2.2 Conrad Constantine The Leverage of Language or How I Realized Info…
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec