Conference Talks

Title Speakers Event Video Slides
One extra large cloud assessment please? - Why testing at scale needs a different approach Christian Philipov Mohit Gupta fwd:cloudsec 2024 Watch Download
Taking the B Out of DBA: An Unconventional Attack Path Against AD FS Through Database Administration Max Keasley BalCCon 2024 Watch Download
Hunting for macOS Application Logic Bugs, Logic Not Included! Max Keasley Beacon 2024 Watch Download
Taking the B Out of DBA: An Unconventional Attack Path Against AD FS Through Database Administration Max Keasley Beacon 2024 Watch Download
You Sh[e|a]ll Not Pass! Gentle Introduction To EDR Bypasses Devid Lana Riccardo Ancarani BSides Dublin 2024 Watch Download
Kubernetes Attack Simulation: The Definitive Guide Leo Tsaousis DEFCON Adversary Village 2024 Watch Download
Hunting for macOS Application Logic Bugs, Logic Not Included! Max Keasley x33fcon 2024 Watch Download
Clear Skies: Avoiding Security Breaches in AWS Nick Jones AWS Community Day DACH 2023 Watch Download
Securing AWS Estates at Scale Nick Jones AWS Community Day Nordics 2023 Watch Download
Securing AWS Estates at Scale Nick Jones AWS Cloud Security Community Day 2023 Watch Download
Stormy Skies: Modern Cloud Attacks And Their Countermeasures Nick Jones Disobey 2023 Watch Download
Open, Sesame! - Unlocking Bluetooth Padlocks With Kind Requests Alex Pettifer Miłosz Gaczkowski BSides London 2023 Watch Download
Dangers of Service as a Principal - AWS Matthew Keogh Tom Taylor-Maclean Disobey 2023 Watch Download
Passing The Security Burden - How To See The Unforeseen Matthew Keogh fwd:cloudsec North America 2023 Watch Download
Methods of Lateral Movement using Windows OpenSSH Matthew Lucas SEC-T 2023 Watch Download
Breaking Boundaries, Securing Perimeters: A pragmatic approach to Attack Surface Management Katie Inns Blue Team Con 2022 Watch Download
SaaSy detection: purple teaming Software-as-a-Service platforms Christian Philipov Nick Jones Blue Team Con 2022 Watch Download
Alsanna Jason Johnson DEF CON Demo Labs 2022 Watch Download
Dismantling the Beast: Formally Proving Access at Scale in AWS Mohit Gupta Nick Jones fwd:cloudsec North America 2022 Watch Download
Unorthodox Lateral Movement: Stepping Away from the Standard Tradecraft Riccardo Ancarani TROOPERS 2022 Watch Download
Come to the Dark Side, We Have Apples: Turning macOS Management Evil Calum Hall Luke Roberts Black Hat USA 2021 Watch Download
I'm a Hacker Get Me Out Of Here! Breaking Network Segregation Using Esoteric Command & Control Channels Alfie Champion James Coote Black Hat USA 2021 Watch Download
Click Here For Free TV! - Chaining Bugs to Takeover Wind Vision Accounts Leo Tsaousis BSides Athens 2021 Watch Download
Has Anyone Seen the Principal Christian Philipov Emilian Cebuc fwd:cloudsec North America 2021 Watch Download
Click Here For Free TV! - Chaining Bugs to Takeover Wind Vision Accounts Leo Tsaousis ROOTCON 2021 Watch Download
Beyond Public Buckets: Lessons Learned on Attack Detection in the Cloud Alfie Champion Nick Jones RSA Conference 2021 Watch Download
Building Effective Attack Detection in the Cloud Alfie Champion Nick Jones Cloud Native Security Day 2020 Watch Download
Getting Shells on z/OS with Surrogat Chains Jake LaBelle DEF CON 2020 Watch Download
Attacking the Helmsman Mohit Gupta DEF CON Cloud Village 2020 Watch Download
Identifying attack paths with BloodHound Henri Nurmi Niklas Sarokaari Disobey 2020 Watch Download
Let's get physical Robert Bearsby Timo Hirvonen Disobey 2020 Watch Download
Automating Attack Simulation in the Cloud Nick Jones fwd:cloudsec North America 2020 Watch Download
An Attacker's Perspective on Jamf Configurations Calum Hall Luke Roberts Objective by the Sea 2020 Watch Download
Command Injection in F5 iRules Christoffer Jerkeby Black Hat USA 2019 Watch Download
Voodoo People Dave Hartley BSides Bristol 2019 Watch Download
Ghost in the Locks - Owning electronic locks without leaving a trace Timo Hirvonen Tomi Tuominen Disobey 2019 Watch Download
Future Forests: Realistic Strategies for AD Security & Red Forest Architecture Katie Knowles RSA Conference 2019 Watch Download
Detecting Sophisticated Threat Actors in AWS Alfie Champion Nick Jones T2 2019 Watch Download
USB armory reloaded Andrea Barisani T2 2019 Watch Download
DK-1016 Docker Security Workshop Mohit Gupta Texas Cyber Summit 2019 Watch Download
Ghost in the Locks - Owning Electronic Locks without Leaving a Trace Timo Hirvonen Tomi Tuominen 44CON 2018 Watch Download
Overt Command & Control: The Art of Blending In Dave Hartley William Knowles Blue Hat v18 2018 Watch Download
Chainspotting: Building Exploit Chains with Logic Bugs Georgi Geshev CanSecWest 2018 Watch Download
Hacking BLE Bicycle Locks for Fun and a Small Profit Vincent Tan DEF CON 2018 Watch Download
Whatever happened to attack aware applications? Matthew Pendlebury DevSecCon London 2018 Watch Download
All your encrypted computers are belongs to us Timo Hirvonen Tomi Tuominen Disobey 2018 Watch Download
Chainspotting: Building Exploit Chains with Logic Bugs Georgi Geshev Robert Miller Infiltrate 2018 Watch Download
Signal Safari: Investigating RF Controls with RTL-SDR Katie Knowles LayerOne 2018 Watch Download
Re-using your targets code against them Olle Segerdahl Security Fest 2018 Watch Download
An ice-cold Boot to break BitLocker Olle Segerdahl T2 2018 Watch Download
Assessing digital physical access control systems Knud Hojgaard T2 2018 Watch Download
Big Game Fuzzing: Going on a Pwn2Own Safari Alex Plaskett Fabian Beterke T2 2018 Watch Download
Chainspotting: Building Exploit Chains with Logic Bugs Georgi Geshev TenSec 2018 Watch Download
Red Teaming in the EDR age William Burgess Wild West Hackin' Fest 2018 Watch Download
Biting the Apple that feeds you - macOS Kernel Fuzzing Alex Plaskett James Loureiro 44CON 2017 Watch Download
Persisting with Microsoft Office: Abusing Extensibility Options William Knowles 44CON 2017 Watch Download
Logic Bug Hunting in Chrome on Android Georgi Geshev Robert Miller CanSecWest 2017 Watch Download
Lock, Stock And Two Smoking Apples - XNU Kernel Security Alex Plaskett James Loureiro DeepSec 2017 Watch Download
Persisting with Microsoft Office: Abusing Extensibility Options William Knowles DEF CON 2017 Watch Download
Logic Bug Hunting in Chrome on Android Georgi Geshev Robert Miller Infiltrate 2017 Watch Download
Exploring enterprise Wi-Fi security with Aruba Christoffer Jerkeby T2 2017 Watch Download
Needle: Finding Issues within iOS Applications Marco Lancini AppSec USA 2016 Watch Download
Bug Hunting with Static Code Analysis Nick Jones BSides London 2016 Watch Download
LoRa the Explorer - Attacking and Defending LoRa Systems Robert Miller BSides London 2016 Watch Download
99 Problems but a Microkernel ain't one! Alex Plaskett BSides NYC 2016 Watch Download
QNX: 99 Problems but a Microkernel ain't one! Alex Plaskett Georgi Geshev Confidence 2016 Watch Download
Warranty Void if Label Removed: Attacking MPLS Networks Georgi Geshev DC4420 2016 Watch Download
Platform Agnostic Kernel Fuzzing Alex Plaskett James Loureiro DEF CON 2016 Watch Download
Static analysis for code and infrastructure? Nick Jones DevSecCon London 2016 Watch Download
A Penetration Tester's Guide to the Azure Cloud Apostolos Mastoris HOPE 2016 Watch Download
LoRa the Explorer - Attacking and Defending LoRa systems Robert Miller SyScan 360 2016 Watch Download
One Template to Rule 'Em All Kostas Lintovois T2 2016 Watch Download
QNX: 99 Problems but a Microkernel ain't one! Alex Plaskett Georgi Geshev TROOPERS 2016 Watch Download
Why bother assessing popular software? David Middlehurst James Loureiro BSides London 2015 Watch Download
Detect & Protect Securing financial applications in hostile environments Luke Drakeford BSides Manchester 2015 Watch Download
Fracking With Hybrid Mobile Applications Dave Hartley CRESTCon 2015 Watch Download
Warranty Void If Label Removed: Attacking MPLS Networks Georgi Geshev ekoparty 2015 Watch Download
Warranty Void If Label Removed: Attacking MPLS Networks Georgi Geshev PacSec 2015 Watch Download
Forging the USB armory Andrea Barisani T2 2015 Watch Download
Washing away the snake oil of threat intelligence David Chismon T2 2015 Watch Download
Windows kernel fuzzing Nils T2 2015 Watch Download
Warranty Void If Label Removed: Attacking MPLS Networks Georgi Geshev ZeroNights 2015 Watch Download
Mission mPOSsible Jon Butler Nils Black Hat USA 2014 Watch Download
Fracking With Hybrid Mobile Applications Dave Hartley BSides Cape Town 2014 Watch Download
Keyless entry exploration/exploitation Knud Hojgaard T2 2014 Watch Download
Style over Substance - how OEMs are breaking Android security Robert Miller T2 2014 Watch Download
Hack The Gibson: Exploiting Supercomputers John Fitzpatrick Luke Jennings DeepSec 2013 Watch Download
Fully arbitrary 802.3 packet injection: maximizing the Ethernet attack surface. Andrea Barisani T2 2013 Watch Download
Hack the Gibson - Exploiting Supercomputers John Fitzpatrick Luke Jennings T2 2013 Watch Download
PinPadPwn Nils Rafael Dominguez Vega Black Hat USA 2012 Watch Download
PinPadPwn Nils T2 2012 Watch Download
SAP Slapping - A pentesters guide Dave Hartley T2 2012 Watch Download
Chip & PIN is Definitely Broken Andrea Barisani T2 2011 Watch Download
Critical infrastructure insecurity - Why vendor obscurity will kick us in the teeth Tom van de Wiele T2 2011 Watch Download
Windows Pwn 7 OEM - Owned Every Mobile? Alex Plaskett T2 2011 Watch Download
Attacking ATMs: Putting the Art into Smart Cards Rafael Dominguez Vega T2 2010 Watch Download
The Threat in Your Pocket? Nils T2 2010 Watch Download
USB Attacks: Fun with Plug & 0wn Rafael Dominguez Vega DEF CON 2009 Watch Download
Sniff Keystrokes with Lasers/Voltmeters - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage Andrea Barisani T2 2009 Watch Download
USB Attacks: Fun with Plug & 0wn Rafael Dominguez Vega T2 2009 Watch Download
Virtually Hacking John Fitzpatrick DEF CON 2008 Watch Download
SUN BURNS - Java Insecurities Joakim Sandstrom T2 2008 Watch Download
MQ Jumping Martyn Ruks DEF CON 2007 Watch Download
One Token to Rule Them All: Post-Exploitation Fun in Windows Environments Luke Jennings DEF CON 2007 Watch Download
IBM Networking Attacks-Or The Easiest Way To Own A Mainframe Without Getting The Removals Men In Martyn Ruks DEF CON 2006 Watch Download
200 MKAY - Web Application Exploitation Joakim Sandstrom T2 2006 Watch Download