- [Deleted Video]
- [Deleted Video]
- [Deleted Video]
- Hacking The Media For Fame And Profit Jenn Ellis Steven Regan
- Parenting In Infosec Rafal Los
- [Private Video]
- [Private Video]
- Soft Skills for a Technical World Justin Herman
- t112 Interceptor A PowerShell SSL MITM Script Casey Smith
- t113 More New Shiny in the Metasploit Framework Egypt
- t115 The Human Buffer Overflow aka Amygdala Hijacking Christopher Hadnagy
- t116 Shellcode Time Come on Grab Your Friends Wartortell
- t117 The Internet Of Insecure Things 10 Most Wanted List Paul Asadoorian
- t118 DDoS Botnet 1000 Knives and a Scalpel Josh Abraham
- t119 wifu2 Cameron Maerz
- t120 Attacking Microsoft Kerberos Kicking the Guard Dog of Hades Tim Medin
- t121 Introducing Network Scout Defending The Soft Center of Your Network Bill oncee Gardner Aaedan S
- t122 Getting Windows to Play with Itself A Pen Testers Guide to Windows API Abuse Brady Bloxham
- t124 Protocol Me Maybe How to Date SCADA Stephen Hilt
- t125 Attacks and Countermeasures Advanced Network Traffic Manipulation Matt Kelly and Ryan Reynolds
- t126 What to expect when youre expectinga pentest Martin Bos and Eric Milam
- t201 A Guided Tour of the Internet Ghetto Introduction to Tor Hidden Services Brent Huston
- t203 How not to suck at pen testing John Strand
- t204 Mainframes Mopeds and Mischief A PenTesters Year in Review Tyler Wrightson
- t205 The Multibillion Dollar Industry Thats Ignored Jason Montgomery and Ryan Sevey
- t206 Code Insecurity or Code in Security Mano dash4rk Paul
- t207 C3CM Defeating the Command Control and Communications of Digital Assailants Russ McRee
- t208 Attack Paths Breaking Into Infosec From IT Or Other Totally Different Fields Eve Adams and John
- t209 How to Secure and Sys Admin Windows like a Boss Jim Kennedy
- t210 Red white and blue Making sense of Red Teaming for good Ian Amit
- t211 Around the world in 80 Cons Jayson E Street
- t212 Mirage Next Gen Honeyports Adam Crompton and Mick Douglas
- t214 Active Directory Real Defense for Domain Admins Jason Lang
- t215 The Wireless World of the Internet of Things JP Dunning ronin
- t216 Open Source Threat Intelligence Developing a Threat intelligence program using open source tool
- t300 Patching the Human Vulns Leonard Isham
- t301 Burp For All Languages Tom Steele
- t302 Passing the Torch Old School Red Teaming New School Tactics David McGuire and Will Schroeder
- t303 I Am The Cavalry Year 0 Space Rogue and Beau Woods
- t304 University Education In Security Panel Bill Gardner oncee Ray Davidson Adrian Crenshaw Sam Lile
- t305 What happened to the A How to leverage BCPDR for your Info Sec Program Moey
- t307 Hackers Are People Too Amanda Berlin Infosystir
- t308 Ethical Control Ethics and Privacy in a Target Rich Environment Kevin Johnson and James Jardine
- t309 The Road to Compliancy Success Plus Plus James Arlen
- t310 Are You a Janitor Or a Cleaner John Stauffacher and Matt Hoy
- t311 Practical PowerShell Programming for Professional People Ben Ten Ben0xA
- t312 GROK atlas
- t313 How building a better hacker accidentally built a better defender Casey Ellis
- t314 Exploring Layer 2 Network Security in Virtualized Environments Ronny L Bull Dr Jeanna N Matthew
- t315 Hardware Tamper Resistance Why and How Ryan Lackey
- t400 Subverting ML Detections for Fun and Profit Ram Shankar Siva Kumar John Walton
- t401 Secrets of DNS Ron Bowes
- t402 Snort OpenAppID How to Build an Open Source Next Generation Firewall Adam Hogan
- t403 GET A Grip on Your Hustle Glassdoor Exfil Toolkit Parker Schmitt Kyle Stone essobi Chris Hodges
- t404 DNS Based Authentication of Named Entities DANE Can we fix our broken CA model Tony Cargile
- t405 Exploiting Browsers Like A Boss w WhiteLightning Bryce Kunz
- t406 Real World Intrusion Response Lessons from the Trenches Katherine Trame and David Sharpe
- t407 Application Whitelisting Be Careful Where The Silver Bullet Is Aimed David McCartney
- t408 Making Mongo Cry Attacking NoSQL for Pen Testers Russell Butturini
- t409 Step On In The Waters Fine An Introduction To Security Testing Within A Virtualized Environment
- t410 Give me your data Obtaining sensitive data without breaking in Dave Chronister
- t411 Third Party Code FIX ALL THE THINGS Kymberlee Price Jake Kouns
- t412 Just What The Doctor Ordered Scott Erven
- t413 Powershell Drink the Kool Aid Wayne Pruitt Zack Wojton
- t414 powercat Mick Douglas
- t415 Macro Malware Lives Putting the sexy back into MS Office document macros Joff Thyer
- t416 Girl Fault Interrupted Maggie Jauregui
- t500 NeXpose For Automated Compromise Detection Luis connection Santana
- t501 A girl some passion and some tech stuff Branden Miller and Emily Miller
- t502 InfoSec from the mouth of babes or an 8 year old Reuben A Paul RAPstar and Mano Paul
- t503 Why Aim for the Ground Teaching Our School Kids All of the Right Computer Skills Phillip Fitzpa
- t504 NoSQL Injections Moving Beyond or 11 Matt Bromiley
- t505 SWF Seeking Lazy Admin for Cross Domain Action Seth Art
- t506 Planning for Failure Noah Beddome
- t507 The Social Engineering Savants The Psychopathic Profile Kevin Miller
- t508 Hiding the breadcrumbs Forensics and anti forensics on SAP systems Juan Perez Etchegoyen
- t509 Youre in the butter zone now baby Chris Scott
- t510 Making BadUSB Work For You Adam Caudill Brandon Wilson
- t511 PassCrackNet When everything else fails just crack hashes Adam Ringwood
- t512 Vulnerability Assessment 20 John Askew
- t513 Social Engineering your progeny to be hackers Sydney Liles
- t514 A Brief History of Exploitation Devin Cook
- t515 Hunting Malware on Linux Production Servers The Windigo Backstory Olivier Bilodeau
- t516 Human Trafficking in the Digital Age
- t517 Cat Herding in the Wild Wild West What I Learned Running A Hackercon CFP Nathaniel Husted
- t518 How to Stop a Hack Jason Samide
- t519 We dont need no stinking Internet Greg Simo
- t520 ZitMo NoM David Schwartzberg
- t521 Penetrate your OWA Nate Power
- t522 RavenHID Remote Badge Gathering or Why we sit in client bathrooms
- t523 Interns Down for What Tony Turner
- t524 i r web app hacking and so can you Brandon Perry
- t525 Building a Modern Security Engineering Organization Zane Lackey
- t526 Information Security Team Management How to keep your edge while embracing the dark side Stephe
- t527 5min web audit Security in the startup world Evan Johnson
- t528 Project SCEVRON SCan EVrything with ruby
- t530 Gone in 60 minutes a Practical Approach to Hacking an Enterprise with Yasuo Saurabh Harit and S
- t531 Snarf Capitalizing on Man in the Middle Victor Mata Josh Stone
- t532 Electronic locks in firearms Oh My Travis Hartman
- The Achilles Heel Of The Banking System