One extra large cloud assessment please? - Why testing at scale needs a different approach | Christian Philipov Mohit Gupta | fwd:cloudsec 2024 | Watch | Download |
Taking the B Out of DBA: An Unconventional Attack Path Against AD FS Through Database Administration | Max Keasley | BalCCon 2024 | Watch | Download |
Hunting for macOS Application Logic Bugs, Logic Not Included! | Max Keasley | Beacon 2024 | Watch | Download |
Taking the B Out of DBA: An Unconventional Attack Path Against AD FS Through Database Administration | Max Keasley | Beacon 2024 | Watch | Download |
You Sh[e|a]ll Not Pass! Gentle Introduction To EDR Bypasses | Devid Lana Riccardo Ancarani | BSides Dublin 2024 | Watch | Download |
Kubernetes Attack Simulation: The Definitive Guide | Leo Tsaousis | DEFCON Adversary Village 2024 | Watch | Download |
Hunting for macOS Application Logic Bugs, Logic Not Included! | Max Keasley | x33fcon 2024 | Watch | Download |
Clear Skies: Avoiding Security Breaches in AWS | Nick Jones | AWS Community Day DACH 2023 | Watch | Download |
Securing AWS Estates at Scale | Nick Jones | AWS Community Day Nordics 2023 | Watch | Download |
Securing AWS Estates at Scale | Nick Jones | AWS Cloud Security Community Day 2023 | Watch | Download |
Stormy Skies: Modern Cloud Attacks And Their Countermeasures | Nick Jones | Disobey 2023 | Watch | Download |
Open, Sesame! - Unlocking Bluetooth Padlocks With Kind Requests | Alex Pettifer Miłosz Gaczkowski | BSides London 2023 | Watch | Download |
Dangers of Service as a Principal - AWS | Matthew Keogh Tom Taylor-Maclean | Disobey 2023 | Watch | Download |
Passing The Security Burden - How To See The Unforeseen | Matthew Keogh | fwd:cloudsec North America 2023 | Watch | Download |
Methods of Lateral Movement using Windows OpenSSH | Matthew Lucas | SEC-T 2023 | Watch | Download |
Breaking Boundaries, Securing Perimeters: A pragmatic approach to Attack Surface Management | Katie Inns | Blue Team Con 2022 | Watch | Download |
SaaSy detection: purple teaming Software-as-a-Service platforms | Christian Philipov Nick Jones | Blue Team Con 2022 | Watch | Download |
Alsanna | Jason Johnson | DEF CON Demo Labs 2022 | Watch | Download |
Dismantling the Beast: Formally Proving Access at Scale in AWS | Mohit Gupta Nick Jones | fwd:cloudsec North America 2022 | Watch | Download |
Unorthodox Lateral Movement: Stepping Away from the Standard Tradecraft | Riccardo Ancarani | TROOPERS 2022 | Watch | Download |
Come to the Dark Side, We Have Apples: Turning macOS Management Evil | Calum Hall Luke Roberts | Black Hat USA 2021 | Watch | Download |
I'm a Hacker Get Me Out Of Here! Breaking Network Segregation Using Esoteric Command & Control Channels | Alfie Champion James Coote | Black Hat USA 2021 | Watch | Download |
Click Here For Free TV! - Chaining Bugs to Takeover Wind Vision Accounts | Leo Tsaousis | BSides Athens 2021 | Watch | Download |
Has Anyone Seen the Principal | Christian Philipov Emilian Cebuc | fwd:cloudsec North America 2021 | Watch | Download |
Click Here For Free TV! - Chaining Bugs to Takeover Wind Vision Accounts | Leo Tsaousis | ROOTCON 2021 | Watch | Download |
Beyond Public Buckets: Lessons Learned on Attack Detection in the Cloud | Alfie Champion Nick Jones | RSA Conference 2021 | Watch | Download |
Building Effective Attack Detection in the Cloud | Alfie Champion Nick Jones | Cloud Native Security Day 2020 | Watch | Download |
Getting Shells on z/OS with Surrogat Chains | Jake LaBelle | DEF CON 2020 | Watch | Download |
Attacking the Helmsman | Mohit Gupta | DEF CON Cloud Village 2020 | Watch | Download |
Identifying attack paths with BloodHound | Henri Nurmi Niklas Sarokaari | Disobey 2020 | Watch | Download |
Let's get physical | Robert Bearsby Timo Hirvonen | Disobey 2020 | Watch | Download |
Automating Attack Simulation in the Cloud | Nick Jones | fwd:cloudsec North America 2020 | Watch | Download |
An Attacker's Perspective on Jamf Configurations | Calum Hall Luke Roberts | Objective by the Sea 2020 | Watch | Download |
Command Injection in F5 iRules | Christoffer Jerkeby | Black Hat USA 2019 | Watch | Download |
Voodoo People | Dave Hartley | BSides Bristol 2019 | Watch | Download |
Ghost in the Locks - Owning electronic locks without leaving a trace | Timo Hirvonen Tomi Tuominen | Disobey 2019 | Watch | Download |
Future Forests: Realistic Strategies for AD Security & Red Forest Architecture | Katie Knowles | RSA Conference 2019 | Watch | Download |
Detecting Sophisticated Threat Actors in AWS | Alfie Champion Nick Jones | T2 2019 | Watch | Download |
USB armory reloaded | Andrea Barisani | T2 2019 | Watch | Download |
DK-1016 Docker Security Workshop | Mohit Gupta | Texas Cyber Summit 2019 | Watch | Download |
Ghost in the Locks - Owning Electronic Locks without Leaving a Trace | Timo Hirvonen Tomi Tuominen | 44CON 2018 | Watch | Download |
Overt Command & Control: The Art of Blending In | Dave Hartley William Knowles | Blue Hat v18 2018 | Watch | Download |
Chainspotting: Building Exploit Chains with Logic Bugs | Georgi Geshev | CanSecWest 2018 | Watch | Download |
Hacking BLE Bicycle Locks for Fun and a Small Profit | Vincent Tan | DEF CON 2018 | Watch | Download |
Whatever happened to attack aware applications? | Matthew Pendlebury | DevSecCon London 2018 | Watch | Download |
All your encrypted computers are belongs to us | Timo Hirvonen Tomi Tuominen | Disobey 2018 | Watch | Download |
Chainspotting: Building Exploit Chains with Logic Bugs | Georgi Geshev Robert Miller | Infiltrate 2018 | Watch | Download |
Signal Safari: Investigating RF Controls with RTL-SDR | Katie Knowles | LayerOne 2018 | Watch | Download |
Re-using your targets code against them | Olle Segerdahl | Security Fest 2018 | Watch | Download |
An ice-cold Boot to break BitLocker | Olle Segerdahl | T2 2018 | Watch | Download |
Assessing digital physical access control systems | Knud Hojgaard | T2 2018 | Watch | Download |
Big Game Fuzzing: Going on a Pwn2Own Safari | Alex Plaskett Fabian Beterke | T2 2018 | Watch | Download |
Chainspotting: Building Exploit Chains with Logic Bugs | Georgi Geshev | TenSec 2018 | Watch | Download |
Red Teaming in the EDR age | William Burgess | Wild West Hackin' Fest 2018 | Watch | Download |
Biting the Apple that feeds you - macOS Kernel Fuzzing | Alex Plaskett James Loureiro | 44CON 2017 | Watch | Download |
Persisting with Microsoft Office: Abusing Extensibility Options | William Knowles | 44CON 2017 | Watch | Download |
Logic Bug Hunting in Chrome on Android | Georgi Geshev Robert Miller | CanSecWest 2017 | Watch | Download |
Lock, Stock And Two Smoking Apples - XNU Kernel Security | Alex Plaskett James Loureiro | DeepSec 2017 | Watch | Download |
Persisting with Microsoft Office: Abusing Extensibility Options | William Knowles | DEF CON 2017 | Watch | Download |
Logic Bug Hunting in Chrome on Android | Georgi Geshev Robert Miller | Infiltrate 2017 | Watch | Download |
Exploring enterprise Wi-Fi security with Aruba | Christoffer Jerkeby | T2 2017 | Watch | Download |
Needle: Finding Issues within iOS Applications | Marco Lancini | AppSec USA 2016 | Watch | Download |
Bug Hunting with Static Code Analysis | Nick Jones | BSides London 2016 | Watch | Download |
LoRa the Explorer - Attacking and Defending LoRa Systems | Robert Miller | BSides London 2016 | Watch | Download |
99 Problems but a Microkernel ain't one! | Alex Plaskett | BSides NYC 2016 | Watch | Download |
QNX: 99 Problems but a Microkernel ain't one! | Alex Plaskett Georgi Geshev | Confidence 2016 | Watch | Download |
Warranty Void if Label Removed: Attacking MPLS Networks | Georgi Geshev | DC4420 2016 | Watch | Download |
Platform Agnostic Kernel Fuzzing | Alex Plaskett James Loureiro | DEF CON 2016 | Watch | Download |
Static analysis for code and infrastructure? | Nick Jones | DevSecCon London 2016 | Watch | Download |
A Penetration Tester's Guide to the Azure Cloud | Apostolos Mastoris | HOPE 2016 | Watch | Download |
LoRa the Explorer - Attacking and Defending LoRa systems | Robert Miller | SyScan 360 2016 | Watch | Download |
One Template to Rule 'Em All | Kostas Lintovois | T2 2016 | Watch | Download |
QNX: 99 Problems but a Microkernel ain't one! | Alex Plaskett Georgi Geshev | TROOPERS 2016 | Watch | Download |
Why bother assessing popular software? | David Middlehurst James Loureiro | BSides London 2015 | Watch | Download |
Detect & Protect Securing financial applications in hostile environments | Luke Drakeford | BSides Manchester 2015 | Watch | Download |
Fracking With Hybrid Mobile Applications | Dave Hartley | CRESTCon 2015 | Watch | Download |
Warranty Void If Label Removed: Attacking MPLS Networks | Georgi Geshev | ekoparty 2015 | Watch | Download |
Warranty Void If Label Removed: Attacking MPLS Networks | Georgi Geshev | PacSec 2015 | Watch | Download |
Forging the USB armory | Andrea Barisani | T2 2015 | Watch | Download |
Washing away the snake oil of threat intelligence | David Chismon | T2 2015 | Watch | Download |
Windows kernel fuzzing | Nils | T2 2015 | Watch | Download |
Warranty Void If Label Removed: Attacking MPLS Networks | Georgi Geshev | ZeroNights 2015 | Watch | Download |
Mission mPOSsible | Jon Butler Nils | Black Hat USA 2014 | Watch | Download |
Fracking With Hybrid Mobile Applications | Dave Hartley | BSides Cape Town 2014 | Watch | Download |
Keyless entry exploration/exploitation | Knud Hojgaard | T2 2014 | Watch | Download |
Style over Substance - how OEMs are breaking Android security | Robert Miller | T2 2014 | Watch | Download |
Hack The Gibson: Exploiting Supercomputers | John Fitzpatrick Luke Jennings | DeepSec 2013 | Watch | Download |
Fully arbitrary 802.3 packet injection: maximizing the Ethernet attack surface. | Andrea Barisani | T2 2013 | Watch | Download |
Hack the Gibson - Exploiting Supercomputers | John Fitzpatrick Luke Jennings | T2 2013 | Watch | Download |
PinPadPwn | Nils Rafael Dominguez Vega | Black Hat USA 2012 | Watch | Download |
PinPadPwn | Nils | T2 2012 | Watch | Download |
SAP Slapping - A pentesters guide | Dave Hartley | T2 2012 | Watch | Download |
Chip & PIN is Definitely Broken | Andrea Barisani | T2 2011 | Watch | Download |
Critical infrastructure insecurity - Why vendor obscurity will kick us in the teeth | Tom van de Wiele | T2 2011 | Watch | Download |
Windows Pwn 7 OEM - Owned Every Mobile? | Alex Plaskett | T2 2011 | Watch | Download |
Attacking ATMs: Putting the Art into Smart Cards | Rafael Dominguez Vega | T2 2010 | Watch | Download |
The Threat in Your Pocket? | Nils | T2 2010 | Watch | Download |
USB Attacks: Fun with Plug & 0wn | Rafael Dominguez Vega | DEF CON 2009 | Watch | Download |
Sniff Keystrokes with Lasers/Voltmeters - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage | Andrea Barisani | T2 2009 | Watch | Download |
USB Attacks: Fun with Plug & 0wn | Rafael Dominguez Vega | T2 2009 | Watch | Download |
Virtually Hacking | John Fitzpatrick | DEF CON 2008 | Watch | Download |
SUN BURNS - Java Insecurities | Joakim Sandstrom | T2 2008 | Watch | Download |
MQ Jumping | Martyn Ruks | DEF CON 2007 | Watch | Download |
One Token to Rule Them All: Post-Exploitation Fun in Windows Environments | Luke Jennings | DEF CON 2007 | Watch | Download |
IBM Networking Attacks-Or The Easiest Way To Own A Mainframe Without Getting The Removals Men In | Martyn Ruks | DEF CON 2006 | Watch | Download |
200 MKAY - Web Application Exploitation | Joakim Sandstrom | T2 2006 | Watch | Download |