Vídeos de Shmoocon 2016
Ya tenemos disponibles los vídeos de la última edición de Shmoocon, conferencia de seguridad que se celebra en Washington DC.
- 0wn The Con
- Ask the EFF
- Attack On Titans
- AVLeak: Turning Antivirus Emulators Inside Out
- Be Free Little Guardbunny
- Breaking Bulbs Briskly By Bogus Broadcasts 1
- Building an Encyclopedia of Malware Configs (to punch miscreants)
- Closing Plenary: Information Security Programs in Academia
- Compressed Context Analytical Results For Computer Vision
- Containing an Attack with Linux Containers and AppArmor/SELinux
- Crypto and Quantum and Post Quantum
- Exploiting Memory Corruption
- Gatekeeper Exposed
- Hacking The Wireless World
- Hiding From The Investigator
- Keynote Address
- LostPass: Pixel-perfect LastPass Phishing
- LTE Security & Protocol Exploits
- Making Milware
- My Hash Is My Passport
- No Easy Breach
- Online No One Knows You're Dead
- Opening Remarks Rumblings Ruminatons Rants
- OSX Vulnerability Research and Why We Wrote Our Own Debugger
- P G Ohst Exploitation
- Penetration Testing Custom Tls Stacks
- Resistance Is Futile
- Reverse Engineering Wireless Scada Systems
- Software Security By The Numbers
- Speak Security And Enter
- Static Malware & Smtp Fail Analysis
- The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack
- #thingswikfound #omarax What Is It, And Why You May Care
- This Message Will Self Destruct In 10 Seconds
- Users Are People Too: How to Make Your Tools Not Suck for Humans
- Using The Algebraic Eraser To Secure Low Power Devices
- Where Do The Phishers Live
- You Ain't Seen Nothing Yet
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec