TROOPERS

mp4   Hot:59   Size:54.86 GB   Created:2017-10-03 18:48:49   Update:2017-10-23 11:56:17  

Download link

File List

  • TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.mp4 1.93 GB
    TROOPERS 2008/TROOPERS08.org_BELENKO Andrej - password recovery.mp4 154.02 MB
    TROOPERS 2008/TROOPERS08.org_BRANCO Rodrigo - KIDS.mp4 160.45 MB
    TROOPERS 2008/TROOPERS08.org_BRATUS Sergey - AP fingerprinting.bak.mp4 107.04 MB
    TROOPERS 2008/TROOPERS08.org_BRATUS Sergey - Organizing and analyzing logdata with entropy.mp4 166 MB
    TROOPERS 2008/TROOPERS08.org_CALLAS Jon - Straight Talk abaou Crypto.mp4 165.75 MB
    TROOPERS 2008/TROOPERS08.org_CHIESA Raoul - SCADA and national critical infrastructures.mp4 151.7 MB
    TROOPERS 2008/TROOPERS08.org_De Haas Job - Side channel analysis.mp4 161.81 MB
    TROOPERS 2008/TROOPERS08.org_DJB - Keynote.mp4 161.66 MB
    TROOPERS 2008/TROOPERS08.org_HOFF Christopher - Virtualization Floor Wax & Dessert Topping.mp4 174.15 MB
    TROOPERS 2008/TROOPERS08.org_HOLZ Thorsten - virtual-honeypots.mp4 153.93 MB
    TROOPERS 2008/TROOPERS08.org_KEMP Michael - virtualise.mp4 143.74 MB
    TROOPERS 2008/TROOPERS08.org_KLOSE Roger - ERNW_ESX-In-Security.mp4 102.48 MB
    TROOPERS 2008/TROOPERS08.org_KORNBRUS Alexandert - Hardening oracle in corporate environments.mp4 140.95 MB
    TROOPERS 2008/TROOPERS08.org_Kuhn Friedwart - RMS.mp4 162.3 MB
    TROOPERS 2008/TROOPERS08.org_LOGLOGIC - log management.mp4 156.38 MB
    TROOPERS 2008/TROOPERS08.org_ROECHER Dror-John - the data went down the drain.mp4 152.24 MB
    TROOPERS 2008/TROOPERS08.org_SPEICHERT Horst - hackertools according to german law.mp4 162.18 MB
    TROOPERS 2008/TROOPERS08.org_STREHLE Rolf - self defending networks.mp4 160.28 MB
    TROOPERS 2008/TROOPERS08.org_THUMANN Michael - Reversing.mp4 154.72 MB
    TROOPERS 2008/TROOPERS08.org_THUMANN Michael - Secondlife (TM).mp4 157.88 MB
    TROOPERS 2008/TROOPERS08.org_Troopers IBM Appscan.mp4 154.21 MB
    TROOPERS 2008/TROOPERS08.org_WAISSBEIN Ariel - penetration testing learning kit.mp4 162.88 MB
    TROOPERS 2008/TROOPERS09_baier_access_control_service.mp4 138.24 MB
    TROOPERS 2008/TROOPERS09_bratus_embedded_devices.mp4 105.79 MB
    TROOPERS 2008/TROOPERS09_gauci_henrique_web_application_firewalls.mp4 55 MB
    TROOPERS 2008/TROOPERS09_rey_keynote_stop_the_madness.mp4 27.45 MB
    TROOPERS 2008/TROOPERS09_rey_ruediger_codenomicon_fuzzer.mp4 84.46 MB
    TROOPERS 2009/TROOPERS09 - .NET Access Control Service - Dominick Baier.mp4 84.93 MB
    TROOPERS 2009/TROOPERS09 - .NET Access Control Service - Dominick Baier.srt 48.52 KB
    TROOPERS 2009/TROOPERS09 - Stop the Madness - Keynote by Enno Rey.mp4 60.05 MB
    TROOPERS 2009/TROOPERS09 - Stop the Madness - Keynote by Enno Rey.srt 51.35 KB
    TROOPERS 2009/TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.mp4 133.82 MB
    TROOPERS 2009/TROOPERS09 - The Truth about Web Application Firewalls - Sandro Gauci + Wendel Guglielmetti.srt 39.41 KB
    TROOPERS 2009/TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.mp4 45.68 MB
    TROOPERS 2009/TROOPERS09 - Vulnerability Testing, a Case Study - Ruediger Rey.srt 15.05 KB
    TROOPERS 2010/TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.mp4 170.58 MB
    TROOPERS 2010/TROOPERS10 - A security assessment of Cisco Enterprise WLAN component - Oliver Roeschke&Daniel Mende.srt 82.79 KB
    TROOPERS 2010/TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.mp4 103.38 MB
    TROOPERS 2010/TROOPERS10 - Bugs & Kisses - Spying On BlackBerry Users For Fun - Sheran Gunasekera.srt 70.33 KB
    TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.mp4 141.95 MB
    TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 1 2) - Marco Slaviero.srt 93.16 KB
    TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.mp4 87.99 MB
    TROOPERS 2010/TROOPERS10 - Clobbering the Cloud (Part 2 2) - Marco Slaviero.srt 58.88 KB
    TROOPERS 2010/TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.mp4 97.66 MB
    TROOPERS 2010/TROOPERS10 - Federated Identity - Opportunities and Dangers - Dominick Baier.srt 88.55 KB
    TROOPERS 2010/TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.mp4 136.63 MB
    TROOPERS 2010/TROOPERS10 - History of the TLS Authentication Gap Bug - Steve Dispensa & Marsh Ray.srt 81.68 KB
    TROOPERS 2010/TROOPERS10 - How to fail an audit - Martin Freiss.mp4 120.24 MB
    TROOPERS 2010/TROOPERS10 - How to rate the security of closed source software - Michael Thumann.mp4 136.05 MB
    TROOPERS 2010/TROOPERS10 - How to rate the security of closed source software - Michael Thumann.srt 72.29 KB
    TROOPERS 2010/TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.mp4 158.77 MB
    TROOPERS 2010/TROOPERS10 - Letting your fuzzer knows about target s internals - Rodrigo Branco.srt 118.16 KB
    TROOPERS 2010/TROOPERS10 - Netscreen of Death - Graeme Neilson.mp4 130 MB
    TROOPERS 2010/TROOPERS10 - Netscreen of Death - Graeme Neilson.srt 82.47 KB
    TROOPERS 2010/TROOPERS10 - Rapid Risk Assessment - Enno Rey.mp4 115.8 MB
    TROOPERS 2010/TROOPERS10 - Rapid Risk Assessment - Enno Rey.srt 83.78 KB
    TROOPERS 2010/TROOPERS10 - Return Oriented Rootkits - Ralf Hund.mp4 114.71 MB
    TROOPERS 2010/TROOPERS10 - Return Oriented Rootkits - Ralf Hund.srt 82.5 KB
    TROOPERS 2010/TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.mp4 107.83 MB
    TROOPERS 2010/TROOPERS10 - Some notes on SAP security - Alexandr Polyakov.srt 30.67 KB
    TROOPERS 2010/TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.mp4 99.63 MB
    TROOPERS 2010/TROOPERS10 - Tools of the Trade for a modern CISO - Enno Rey.srt 67.97 KB
    TROOPERS 2010/TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.mp4 48.18 MB
    TROOPERS 2010/TROOPERS10 - Vulnerabilities in custom SAP ABAP Code - Markus Schuhmacher.srt 32.73 KB
    TROOPERS 2011/TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.mp4 133.74 MB
    TROOPERS 2011/TROOPERS11 - Adventures in SCADA - Sergey Bratus & Edmond Rogers.srt 77.99 KB
    TROOPERS 2011/TROOPERS11 - Cache on Delivery - Marco Slaviero.mp4 112.48 MB
    TROOPERS 2011/TROOPERS11 - Cache on Delivery - Marco Slaviero.srt 76.06 KB
    TROOPERS 2011/TROOPERS11 - Do you know what s happening in your $application - Felix Leder.mp4 152.6 MB
    TROOPERS 2011/TROOPERS11 - Do you know what s happening in your $application - Felix Leder.srt 91.84 KB
    TROOPERS 2011/TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.mp4 88.65 MB
    TROOPERS 2011/TROOPERS11 - Femtocell Femtostep to the Holy Grail - Ravishankar Borgaonkar & Kevin Redon.srt 74.76 KB
    TROOPERS 2011/TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.mp4 88.09 MB
    TROOPERS 2011/TROOPERS11 - Forging Canon Original Decision Data - Dmitry Sklyarov.srt 55.56 KB
    TROOPERS 2011/TROOPERS11 - I FOCA a MIL Domain - Chema Alonso.mp4 82.52 MB
    TROOPERS 2011/TROOPERS11 - Keynote Day 1 - Enno Rey.mp4 77.11 MB
    TROOPERS 2011/TROOPERS11 - Keynote Day 1 - Enno Rey.srt 66.79 KB
    TROOPERS 2011/TROOPERS11 - Keynote Day 2 - Richard Thieme.mp4 154.07 MB
    TROOPERS 2011/TROOPERS11 - Keynote Day 2 - Richard Thieme.srt 97.61 KB
    TROOPERS 2011/TROOPERS11 - Milking a horse - Meder Kydyraliev.mp4 67.8 MB
    TROOPERS 2011/TROOPERS11 - Milking a horse - Meder Kydyraliev.srt 73.44 KB
    TROOPERS 2011/TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.mp4 97.8 MB
    TROOPERS 2011/TROOPERS11 - OMG WTF PDF -- What you didn t know about Acrobat - Julia Wolf.srt 51.09 KB
    TROOPERS 2011/TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.mp4 77.27 MB
    TROOPERS 2011/TROOPERS11 - Owning the data center using Cisco NX-OS - George Hedfors.srt 37.33 KB
    TROOPERS 2011/TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.mp4 48.46 MB
    TROOPERS 2011/TROOPERS11 - SAP GUI Hacking - Andreas Wiegenstein.srt 37.59 KB
    TROOPERS 2012/TROOPERS12 - Closing Remarks.mp4 19.83 MB
    TROOPERS 2012/TROOPERS12 - Opening Teaser.mp4 20.21 MB
    TROOPERS 2013/TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.mp4 177.21 MB
    TROOPERS 2013/TROOPERS13 - Closing Remarks & TROOPERS Challenge Award Ceremony - Enno Rey.srt 13.57 KB
    TROOPERS 2013/TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.mp4 184.42 MB
    TROOPERS 2013/TROOPERS13 - Corporate Espionage via Mobile Compromise A Technical Deep Dive - David Weinstein.srt 42.79 KB
    TROOPERS 2013/TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.mp4 613.76 MB
    TROOPERS 2013/TROOPERS13 - Detecting white-collar cybercrime SAP Forensics.srt 71.98 KB
    TROOPERS 2013/TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.mp4 38.49 MB
    TROOPERS 2013/TROOPERS13 - Flash Storage Forensics - Dmitry Sklyarov.srt 42.75 KB
    TROOPERS 2013/TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.mp4 107.28 MB
    TROOPERS 2013/TROOPERS13 - Ghost in the Shell - Andreas Wiegenstein & Xu Jia.srt 49.48 KB
    TROOPERS 2013/TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.mp4 350.18 MB
    TROOPERS 2013/TROOPERS13 - Hacking & Defending the big 4 Databases - Alex Rothacker.srt 59.65 KB
    TROOPERS 2013/TROOPERS13 - Hacking and Craft - Jeff Gough.mp4 332.43 MB
    TROOPERS 2013/TROOPERS13 - Hacking and Craft - Jeff Gough.srt 65.93 KB
    TROOPERS 2013/TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.mp4 361.31 MB
    TROOPERS 2013/TROOPERS13 - Introducing Daisho - Michael Ossmann & Dominic Spill.srt 70.23 KB
    TROOPERS 2013/TROOPERS13 - Keynote Day 1 by Rodrigo Branco.mp4 467.59 MB
    TROOPERS 2013/TROOPERS13 - Keynote Day 1 by Rodrigo Branco.srt 119.21 KB
    TROOPERS 2013/TROOPERS13 - Keynote Day 2 by Chris Nickerson.mp4 270.81 MB
    TROOPERS 2013/TROOPERS13 - Keynote Day 2 by Chris Nickerson.srt 72.38 KB
    TROOPERS 2013/TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.mp4 692.11 MB
    TROOPERS 2013/TROOPERS13 - Malicious pixels QR-codes as attack vectors - Peter Kieseberg.srt 82.58 KB
    TROOPERS 2013/TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.mp4 395.73 MB
    TROOPERS 2013/TROOPERS13 - OAuth2 - Ready or not (here I come) - Dominick Baier.srt 73.33 KB
    TROOPERS 2013/TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.mp4 574.44 MB
    TROOPERS 2013/TROOPERS13 - Paparazzi over IP - Daniel Mende & Pascal Turbing.srt 66.39 KB
    TROOPERS 2013/TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.mp4 519.77 MB
    TROOPERS 2013/TROOPERS13 - Pitfalls of Vulnerability Rating & A New Approach Called ERRS.srt 92.52 KB
    TROOPERS 2013/TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.mp4 258.32 MB
    TROOPERS 2013/TROOPERS13 - Smart TV Security - Lee (beist) SeungJin.srt 67.84 KB
    TROOPERS 2013/TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.mp4 370.98 MB
    TROOPERS 2013/TROOPERS13 - The future of data exfiltration and malicious communication - Steffen Wendzel.srt 69.72 KB
    TROOPERS 2013/TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.mp4 254.01 MB
    TROOPERS 2013/TROOPERS13 - The Interim Years of Cyberspace Security in a Domain of Warfare -Robert M. Lee.srt 75.41 KB
    TROOPERS 2013/TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.mp4 38.95 MB
    TROOPERS 2013/TROOPERS13 - UI Redressing Attacks on Android Devices - Marcus Niemietz.srt 65.83 KB
    TROOPERS 2013/TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.mp4 213.98 MB
    TROOPERS 2013/TROOPERS13 - Understanding & Mitigating Large Scale DoS Attacks - Adem Sen.srt 73.39 KB
    TROOPERS 2013/TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.mp4 669.63 MB
    TROOPERS 2013/TROOPERS13 - Virtual firewalls - the Good, the Bad and the Ugly - Ivan Pepelnjak.srt 70.4 KB
    TROOPERS 2013/TROOPERS13 - We Came In Peace - They Don t Hackers vs. CyberWar - fx.srt 79.03 KB
    TROOPERS 2013/TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.mp4 427.32 MB
    TROOPERS 2013/TROOPERS13 - You wouldn t share a syringe. Would you share a USB port.srt 80.61 KB
    TROOPERS 2013/TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.mp4 372.73 MB
    TROOPERS 2013/TROOPERS13 - Your IPv6 default config meets FOCA (...and starts to cry) - Chema Alonso.srt 61.2 KB
    TROOPERS 2014/TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.mp4 254.06 MB
    TROOPERS 2014/TROOPERS14 - 20 Ways Past Secure Boot - Job de Haas.srt 70.91 KB
    TROOPERS 2014/TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.mp4 305.67 MB
    TROOPERS 2014/TROOPERS14 - Anti-forensics on SAP systems - Juan Perez-Etchegoyen & Will Vandevanter.srt 54.55 KB
    TROOPERS 2014/TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.mp4 129.98 MB
    TROOPERS 2014/TROOPERS14 - Bro A Flexible Open-Source Platform - Robin Summer.srt 39.66 KB
    TROOPERS 2014/TROOPERS14 - Closing Remarks - Enno Rey.mp4 194.39 MB
    TROOPERS 2014/TROOPERS14 - Closing Remarks - Enno Rey.srt 25.5 KB
    TROOPERS 2014/TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).mp4 311.27 MB
    TROOPERS 2014/TROOPERS14 - Compromise-as-a-Service Our PleAZURE - Matthias Luft & Felix Wilhelm).srt 79.64 KB
    TROOPERS 2014/TROOPERS14 - Georg Bakos - Keynote.mp4 505.31 MB
    TROOPERS 2014/TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.mp4 289.52 MB
    TROOPERS 2014/TROOPERS14 - Get Over It Privacy is Good for Security - Rob Lee.srt 86.21 KB
    TROOPERS 2014/TROOPERS14 - Granular Trust; making it work - Toby Kohlenberg.srt 91.23 KB
    TROOPERS 2014/TROOPERS14 - Granular Trust_ making it work - Toby Kohlenberg.mp4 411.57 MB
    TROOPERS 2014/TROOPERS14 - How I Latch on Me and Protect My Digital Life against Passwords - Chema Alonso.mp4 238.94 MB
    TROOPERS 2014/TROOPERS14 - How to Work towards Pharma Compliance for Cloud Computing - Martijn Jansen.mp4 246.33 MB
    TROOPERS 2014/TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.mp4 384.9 MB
    TROOPERS 2014/TROOPERS14 - Implementing an USB Host Driver Fuzzer - Daniel Mende.srt 53.77 KB
    TROOPERS 2014/TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.mp4 276.35 MB
    TROOPERS 2014/TROOPERS14 - Injecting evil code in your SAP J2EE systems - Alexander Polyakov & Dimitry Chastuhin.srt 43.22 KB
    TROOPERS 2014/TROOPERS14 - Keynote - FX.mp4 88.91 MB
    TROOPERS 2014/TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.mp4 389.73 MB
    TROOPERS 2014/TROOPERS14 - Making (and Breaking) an 802.15.4 WIDS - Sergey Bratus, Javier Vazquez, Ryan Speers.srt 41.76 KB
    TROOPERS 2014/TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.mp4 339.32 MB
    TROOPERS 2014/TROOPERS14 - Medical Device Cyber Security The First 164 Years - Kevin Fu.srt 90.61 KB
    TROOPERS 2014/TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.mp4 160.31 MB
    TROOPERS 2014/TROOPERS14 - Modern Smartphone Forensics - Vladimir Katalov.srt 77.57 KB
    TROOPERS 2014/TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.mp4 381.55 MB
    TROOPERS 2014/TROOPERS14 - OSMOSIS - Christian Sielaff & Daniel Hauenstein.srt 63.32 KB
    TROOPERS 2014/TROOPERS14 - Psychology of Security - Stefan Schumacher.mp4 237.94 MB
    TROOPERS 2014/TROOPERS14 - Psychology of Security - Stefan Schumacher.srt 84.21 KB
    TROOPERS 2014/TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.mp4 399.31 MB
    TROOPERS 2014/TROOPERS14 - Risks in hosted SAP Environments - Andreas Wiegenstein & Xu Jia.srt 68.6 KB
    TROOPERS 2014/TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.mp4 363.75 MB
    TROOPERS 2014/TROOPERS14 - SAP BusinessObjects Attacks - Juan Perez-Etchegoyen & Will Vandevanter.srt 70.62 KB
    TROOPERS 2014/TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.mp4 340.19 MB
    TROOPERS 2014/TROOPERS14 - SAP s Network Protocols Revisited - Martin Gallo.srt 60.9 KB
    TROOPERS 2014/TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.mp4 32.69 MB
    TROOPERS 2014/TROOPERS14 - Security and SDN -- A perfect fit or oil-and-water - Ivan Pepelnjak.srt 67.52 KB
    TROOPERS 2014/TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.mp4 295.3 MB
    TROOPERS 2014/TROOPERS14 - The Three Billion Dollar App - Vladimir Wolstencroft.srt 84.62 KB
    TROOPERS 2014/TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.mp4 260.19 MB
    TROOPERS 2014/TROOPERS14 - Vulnerability Classification in the SaaS Era - Noam Liran.srt 63.09 KB
    TROOPERS 2014/TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.mp4 39.22 MB
    TROOPERS 2014/TROOPERS14 - What Happens In Windows 7 Stays In Windows 7 - Marion Marschalek & Joseph Moti.srt 57.4 KB
    TROOPERS 2014/TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.mp4 5.9 MB
    TROOPERS 2014/TROOPERS14 - Why IPv6 Security is so hard - Enno Rey.srt 29.14 KB
    TROOPERS 2015/TROOPERS15 - Welcome Trailer.mp4 9.12 MB
    TROOPERS 2015/[TROOPERS15] Andreas Lindh - Defender Economics.mp4 139.76 MB
    TROOPERS 2015/[TROOPERS15] Andreas Lindh - Defender Economics.srt 60.99 KB
    TROOPERS 2015/[TROOPERS15] Ange Albertini, Kurt Pfeifle - Advanced PDF Tricks.mp4 700.99 MB
    TROOPERS 2015/[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.mp4 277.66 MB
    TROOPERS 2015/[TROOPERS15] Arrigo Triulzi - Pneumonia, Shardan, Antibiotics and Nasty MOV a Dead Hands Tale.srt 49.79 KB
    TROOPERS 2015/[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.mp4 312.29 MB
    TROOPERS 2015/[TROOPERS15] Atilla Marosi - Hacking FinSpy - a Case Study.srt 54.3 KB
    TROOPERS 2015/[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.mp4 215.67 MB
    TROOPERS 2015/[TROOPERS15] Azhar Desai, Marco Slaviero - Weapons of Mass Distraction.srt 95.33 KB
    TROOPERS 2015/[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.mp4 335.78 MB
    TROOPERS 2015/[TROOPERS15] Benedikt Stockebrand - Hardware YOU can (Audit and then) Trust.srt 75.19 KB
    TROOPERS 2015/[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.mp4 227.47 MB
    TROOPERS 2015/[TROOPERS15] Catherine Pearce, Patrick Thomas - Multipath TCP.srt 68.84 KB
    TROOPERS 2015/[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.mp4 220.27 MB
    TROOPERS 2015/[TROOPERS15] Dimitry Chastuhin, Alexander Polyakov - Hacking Fortune 2000th CEOs mobile.srt 48.37 KB
    TROOPERS 2015/[TROOPERS15] Enno Rey - Opening Remarks.mp4 66.67 MB
    TROOPERS 2015/[TROOPERS15] Enno Rey - Opening Remarks.srt 9.05 KB
    TROOPERS 2015/[TROOPERS15] Ertunga Arsal - SAP, Credit Cards and the Bird that Talks Too Much.mp4 280.51 MB
    TROOPERS 2015/[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.mp4 263.44 MB
    TROOPERS 2015/[TROOPERS15] Florian Grunow, Felix Wilhelm - General Pr0ken File System - Hacking IBMs GPFS.srt 65.61 KB
    TROOPERS 2015/[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.mp4 268.82 MB
    TROOPERS 2015/[TROOPERS15] Frederik Armknecht - Crypto in the Cloud.srt 82.4 KB
    TROOPERS 2015/[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.mp4 236.85 MB
    TROOPERS 2015/[TROOPERS15] Friedwart Kuhn - How to Efficiently Protect AD from Credential Theft & Compromise.srt 65.36 KB
    TROOPERS 2015/[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.mp4 173.5 MB
    TROOPERS 2015/[TROOPERS15] Hans-Christian Esperer, Frederik Weidemann - A Backdoor in Wonderland.srt 38.04 KB
    TROOPERS 2015/[TROOPERS15] Haroon Meer - Keynote.mp4 163.49 MB
    TROOPERS 2015/[TROOPERS15] Haroon Meer - Keynote.srt 93.78 KB
    TROOPERS 2015/[TROOPERS15] Ivan Pepelnjak - Automating Network Security.mp4 112.89 MB
    TROOPERS 2015/[TROOPERS15] Ivan Pepelnjak - Automating Network Security.srt 71.21 KB
    TROOPERS 2015/[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.mp4 220.2 MB
    TROOPERS 2015/[TROOPERS15] Jacob Torrey - The foundation is rotting and the basement is flooding.srt 84.35 KB
    TROOPERS 2015/[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.mp4 314.45 MB
    TROOPERS 2015/[TROOPERS15] Luca Carettoni, Mauro Gentile - The old is new, again. CVE20112461 is back.srt 66.5 KB
    TROOPERS 2015/[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.mp4 472.18 MB
    TROOPERS 2015/[TROOPERS15] Marion Marschalek, Joseph Moti - The Wallstreet of Windows Binaries.srt 87.16 KB
    TROOPERS 2015/[TROOPERS15] Martijn Grooten - The State of Email in 2015.mp4 87.13 MB
    TROOPERS 2015/[TROOPERS15] Martijn Grooten - The State of Email in 2015.srt 64.65 KB
    TROOPERS 2015/[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.mp4 217.24 MB
    TROOPERS 2015/[TROOPERS15] Martin Gallo - HoneySAP Who really wants your money.srt 78.11 KB
    TROOPERS 2015/[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.mp4 281.81 MB
    TROOPERS 2015/[TROOPERS15] Matthias Luft, Felix Wilhelm - Evaluating the APT Armor.srt 85.69 KB
    TROOPERS 2015/[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.mp4 440.52 MB
    TROOPERS 2015/[TROOPERS15] Michael Ossmann - RF Retroflectors, Emission Security and SDR.srt 86.22 KB
    TROOPERS 2015/[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.mp4 152.38 MB
    TROOPERS 2015/[TROOPERS15] Paul Coggin - Defending the Enterprise Against Network Infrastructure Attacks.srt 94.51 KB
    TROOPERS 2015/[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.mp4 235.76 MB
    TROOPERS 2015/[TROOPERS15] Richard Rushing - Game Over, Does the CISO get an Extra Life.srt 71.94 KB
    TROOPERS 2015/[TROOPERS15] Sergej Bratus - Keynote.mp4 304.03 MB
    TROOPERS 2015/[TROOPERS15] Sergej Bratus - Keynote.srt 84.36 KB
    TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.mp4 135.28 MB
    TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - Incident Response and SAP Systems.srt 45.98 KB
    TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.mp4 232.02 MB
    TROOPERS 2015/[TROOPERS15] Sergio Abraham, Juan Perez-Etchegoyen - JURASSIC SAP.srt 70.96 KB
    TROOPERS 2015/[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.mp4 152.4 MB
    TROOPERS 2015/[TROOPERS15] Sylvia Johnigk, Kai Nothdurft - Lets clear up the Debris.srt 66.82 KB
    TROOPERS 2015/[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.mp4 204.29 MB
    TROOPERS 2015/[TROOPERS15] Xu Jia, Andreas Wiegenstein - I know what You Coded last Summer.srt 77.29 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.mp4 1.74 GB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Antonios Atlasis, Rafael Schaefer - Evading IDS IPS by Exploiting IPv6 Features.srt 96.34 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).mp4 1.79 GB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (1 2).srt 113.29 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Basic Attacks and Defences (2 2).mp4 715.71 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.mp4 1.46 GB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - Case Study Building a Secure IPv6 Guest Wifi Network.srt 104.3 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.mp4 952.14 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Christopher Werny - IPv6 First Hop Security in Virtualized Environments.srt 65.38 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - 48 Considered Harmful.mp4 1.11 GB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - 48 Considered Harmful.srt 65.07 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Enno Rey - Reliable & Secure DHCPv6.mp4 716.76 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Eric Vyncke - Routing Header Is Back... Should We Panic.mp4 342.64 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.mp4 1.81 GB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - New Features of the SI6 Networks IPv6 Toolkit.srt 122.58 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.mp4 1.71 GB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Fernando Gont - Recent IPv6 Security Standardization Efforts.srt 139.37 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Gabriel Muller - .1.3.6.1.2.1.4.31.1.1 - Hello, anybody there.mp4 574.44 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Ivan Pepelnjak - IPv6 Microsegmentation Done Right.mp4 329.17 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Jayzon Salazar, Enno Rey, Antonios Atlasis - MLD Considered Harmful.mp4 715.37 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Julian Bangert - Tales of 6006 Protocols.mp4 264.61 MB
    TROOPERS 2008/TROOPERS08.org_AMATO Francisco - evilgrade.mp4 2.93 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Merike Kaeo - Deploying IPv6 Securely - Avoiding Mistakes Others Have Made.srt 124.48 KB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.mp4 496.89 MB
    TROOPERS 2015 IPv6 Security Summit/[TROOPERS15] Tarko Tikan - Enabling and Securing IPv6 in Service Provider Networks.srt 83.42 KB
    TROOPERS 2016/An unknown SAP default Account.mp4 189.65 MB
    TROOPERS 2016/Attacking and Protecting Big Data Environments.mp4 154.4 MB
    TROOPERS 2016/Attacking Nextgen Firewalls.mp4 254.35 MB
    TROOPERS 2016/Better Crypto.mp4 80 MB
    TROOPERS 2016/Broadcasting your Attack.mp4 203.53 MB
    TROOPERS 2016/Caring for File Formats.mp4 91.48 MB
    TROOPERS 2016/Closing Remarks.mp4 309.97 MB
    TROOPERS 2016/Crypto Code.mp4 100.41 MB
    TROOPERS 2016/Deep dive into SAP archive file formats.mp4 241.91 MB
    TROOPERS 2016/Exploiting the Unexploitable.mp4 187.62 MB
    TROOPERS 2016/Freifunk.mp4 65.91 MB
    TROOPERS 2016/Hiding your White Box Designs is Not Enough.mp4 256.23 MB
    TROOPERS 2016/Hollywood Hacking Facts and Fiction.mp4 150.36 MB
    TROOPERS 2016/How to Implement an SDL in a Large Company.mp4 89.23 MB
    TROOPERS 2016/Imma Chargin Mah Lazer.mp4 240.85 MB
    TROOPERS 2016/Keynote - A Praise for Hackers.mp4 300.12 MB
    TROOPERS 2016/Keynote - Ethics in Networked Systems Research.mp4 184.64 MB
    TROOPERS 2016/Lets Play Hide and Seek in the Cloud.mp4 23.06 MB
    TROOPERS 2016/Medical Device Security Hack or Hype.mp4 246.35 MB
    TROOPERS 2016/Mind The Gap.mp4 110.17 MB
    TROOPERS 2016/Offensive Active Directory with Powershell.mp4 114.08 MB
    TROOPERS 2016/One Tool To Rule Them All.mp4 24.66 MB
    TROOPERS 2016/Passive Intelligence Gathering Analytics.mp4 175.22 MB
    TROOPERS 2016/Patch me if you can.mp4 252.59 MB
    TROOPERS 2016/Preventing vulns in HANA based deployments.mp4 214.05 MB
    TROOPERS 2016/Protecting Hosts in IPv6 Networks.mp4 242.14 MB
    TROOPERS 2016/Rapid Radio Reversing.mp4 117.49 MB
    TROOPERS 2016/Real Life Software Defined Security.mp4 94.82 MB
    TROOPERS 2016/Reverse engineering a Digital Two way Radio.mp4 95.24 MB
    TROOPERS 2016/Security Evaluation of Dual-Stack Systems.mp4 202.34 MB
    TROOPERS 2016/The Chimaera Processor.mp4 41.86 MB
    TROOPERS 2016/The Internet of Deadly Things.mp4 30.37 MB
    TROOPERS 2016/The Joy of Sandbox Mitigations.mp4 98.29 MB
    TROOPERS 2016/The Kings in your Castle.mp4 113.58 MB
    TROOPERS 2016/The Road to secure Smart Cars.mp4 190.1 MB
    TROOPERS 2016/Towards a LangSec Aware SDLC.mp4 91.41 MB
    TROOPERS 2016/TR16 - Day 1 Visuals.mp4 89.1 MB
    TROOPERS 2016/TROOPERS Conference 360 Teaser - must watch in YouTube app.mp4 12.42 MB
    TROOPERS 2016/Unpatchable.mp4 204.42 MB
    TROOPERS 2016/unrubby.mp4 108.74 MB
    TROOPERS 2016/Witness the Russian attack Live demos of their steps tools techniques.mp4 77.41 MB
    TROOPERS 2016 IPv6 Summit/Advanced IPv6 Attacks Using Chiron Training.mp4 705.77 MB
    TROOPERS 2016 IPv6 Summit/Advanced IPv6 Network Reconnaisance.mp4 484.8 MB
    TROOPERS 2016 IPv6 Summit/Anonymization IPv6 in PCAPs - Challenges and Wins.mp4 183.35 MB
    TROOPERS 2016 IPv6 Summit/Automating IPv6 Deployments.mp4 127.37 MB
    TROOPERS 2016 IPv6 Summit/Basic Attacks and Mitigation Strategies.mp4 437.42 MB
    TROOPERS 2016 IPv6 Summit/Building a Reliable and Secure IPv6 WiFi Network.mp4 218.8 MB
    TROOPERS 2016 IPv6 Summit/Developing an Enterprise IPv6 Security Strategy.mp4 211.2 MB
    TROOPERS 2016 IPv6 Summit/IPv6 First Hop Security Features on HP Devices.mp4 128.43 MB
    TROOPERS 2016 IPv6 Summit/IPv6 Security Fundamentals.mp4 364.31 MB
    TROOPERS 2016 IPv6 Summit/NATTED - A Field Report.mp4 208.48 MB
    TROOPERS 2016 IPv6 Summit/Recent IPv6 Standardization Efforts.mp4 400.64 MB
    TROOPERS 2016 IPv6 Summit/Remote Access and Business Partner Connections.mp4 265.17 MB
    TROOPERS 2016 IPv6 Summit/Security Aspects of IPv6 Multi-Interface and Source Destination Routing.mp4 107.93 MB
    TROOPERS 2016 IPv6 Summit/Security Assessment of Microsoft DirectAccess.mp4 199.58 MB
    TROOPERS thank you.txt 578 B

Download Info

  • Tips

    “TROOPERS” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.