Videos 91
Content List
1. Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant
2. All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate
3. IMP4GT - IMPersonation Attacks in 4G NeTworks
4. Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers
5. A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
6. Demystifying Modern Windows Rootkits
7. My Cloud is APT's Cloud - Investigating and Defending Office 365
8. Hunting Invisible Salamanders - Cryptographic (in)Security with Attacker-Controlled Keys
9. Office Drama on macOS
10. Remote Timing Attacks on TPMs, AKA TPM-Fail
11. Decade of the RATs – Custom Chinese Linux Rootkits for Everyone
12. About Directed Fuzzing and Use-After-Free - How to Find Complex & Silent Bugs
13. CloudLeak - DNN Model Extractions from Commercial MLaaS Platforme
14. Routopsy - Modern Routing Protocol Vulnerability Analysis and Exploitation
15. Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic
16. Security Research on Mercedes-Benz - From Hardware to Car Control
17. Virtually Private Networks
18. Plundervolt - Flipping Bits from Software without Rowhammer
19. Operation Chimera - APT Operation Targets Semiconductor Vendors
20. A Framework for Evaluating and Patching the Human Factor in Cybersecurity
21. NoJITsu - Locking Down JavaScript Engines
22. Hiding Process Memory via Anti-Forensic Techniques
23. EtherOops - Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks
24. Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
25. Industrial Protocol Gateways Under Analysis
26. When Lightning Strikes Thrice - Breaking Thunderbolt 3 Security
27. Beyond Root - Custom Firmware for Embedded Mobile Chipsets
28. Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon
29. Lamphone - Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps
30. Emulating Samsung's Baseband for Security Testing
31. Hacking the Voter - Lessons from a Decade of Russian Military Operations
32. Detecting Access Token Manipulation
33. Escaping Virtualized Containers
34. Ruling StarCraft Game Spitefully -- Exploiting the Blind Spot of AI-Powered Game Bots
35. Practical Defenses Against Adversarial Machine Learning
36. Reverse Engineering the Tesla Battery Management System to increase Power Available
37. Needing the DoH - The Ongoing Encryption and Centralization of DNS
38. Policy Implications of Faulty Cyber Risk Models and How to Fix Them
39. A Little Less Speculation, a Little More Action - Deep Dive into Fuchsia's Mitigations for CPU Side
40. Kr00k - Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices
41. Experimenting with Real-Time Event Feeds
42. Black-Box Laser Fault Injection on a Secure Memory
43. Portable Document Flaws 101
44. Breaking VSM by Attacking SecureKernel
45. TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020
46. I calc'd Calc - Exploiting Excel Online
47. Reversing the Root - Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
48. Breaking Brains, Solving Problems - Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros
49. Room for Escape - Scribbling Outside the Lines of Template Security
50. Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot
51. IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets
52. Improving Mental Models of End-to-End Encrypted Communication
53. Exploiting Kernel Races through Taming Thread Interleaving
54. Fooling Windows through Superfetch
55. Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
56. Dive into Apple IO80211FamilyV2
57. HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges
58. Demigod - The Art of Emulating Kernel Rootkits
59. Spectra - Breaking Separation Between Wireless Chips
60. Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication
61. An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers
62. You have No Idea Who Sent that Email - 18 Attacks on Email Sender Authentication
63. Carrying our Insecurities with Us - The Risks of Implanted Medical Devices in Secure Spaces
64. How I Created My Clone Using AI - Next-Gen Social Engineeringg
65. Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets
66. Detecting Fake 4G Base Stations in Real Time
67. iOS Kernel PAC, One Year Later
68. Web Cache Entanglement - Novel Pathways to Poisoning
69. Heroku Abuse Operations - Hunting Wolves in Sheep's Clothing
70. A Decade After Stuxnet's Printer Vulnerability - Printing is Still the Stairway to Heaven
71. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
72. Engineering Empathy - Adapting Software Engineering Principles and Process to Security
73. Healthscare – An Insider's Biopsy of Healthcare Application Security
74. Stopping Snake Oil with Smaller Healthcare Providers - Addressing Security with Actionable Plans
75. Discovering Hidden Properties to Attack the Node.js Ecosystem
76. Repurposing Neural Networks to Generate Synthetic Media for Information Operations
77. The Paramedic's Guide to Surviving Cybersecurity
78. OTRazor - Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts
79. Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices
80. When TLS Hacks You
81. The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis
82. Whispers Among the Stars - A Practical Look at Perpetrating Satellite Eavesdropping Attacks
83. FASTCash and INJX_Pure - How Threat Actors Use Public Standards for Financial Fraud
84. EdTech - The Ultimate APT
85. Election Security - Securing America's Future
86. Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
87. Hacking Public Opinion
88. Mind Games - Using Data to Solve for the Human Element
89. Stress Testing Democracy Election Integrity During A Global Pandemic
90. The Devils in the Dependency Data Driven Software Composition Analysis
91. We Went to Iowa and All We Got were These Felony Arrest Records
Content List
1. Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant
2. All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate
3. IMP4GT - IMPersonation Attacks in 4G NeTworks
4. Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers
5. A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
6. Demystifying Modern Windows Rootkits
7. My Cloud is APT's Cloud - Investigating and Defending Office 365
8. Hunting Invisible Salamanders - Cryptographic (in)Security with Attacker-Controlled Keys
9. Office Drama on macOS
10. Remote Timing Attacks on TPMs, AKA TPM-Fail
11. Decade of the RATs – Custom Chinese Linux Rootkits for Everyone
12. About Directed Fuzzing and Use-After-Free - How to Find Complex & Silent Bugs
13. CloudLeak - DNN Model Extractions from Commercial MLaaS Platforme
14. Routopsy - Modern Routing Protocol Vulnerability Analysis and Exploitation
15. Uncommon Sense - Detecting Exploits with Novel Hardware Performance Counters and ML Magic
16. Security Research on Mercedes-Benz - From Hardware to Car Control
17. Virtually Private Networks
18. Plundervolt - Flipping Bits from Software without Rowhammer
19. Operation Chimera - APT Operation Targets Semiconductor Vendors
20. A Framework for Evaluating and Patching the Human Factor in Cybersecurity
21. NoJITsu - Locking Down JavaScript Engines
22. Hiding Process Memory via Anti-Forensic Techniques
23. EtherOops - Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks
24. Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
25. Industrial Protocol Gateways Under Analysis
26. When Lightning Strikes Thrice - Breaking Thunderbolt 3 Security
27. Beyond Root - Custom Firmware for Embedded Mobile Chipsets
28. Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon
29. Lamphone - Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps
30. Emulating Samsung's Baseband for Security Testing
31. Hacking the Voter - Lessons from a Decade of Russian Military Operations
32. Detecting Access Token Manipulation
33. Escaping Virtualized Containers
34. Ruling StarCraft Game Spitefully -- Exploiting the Blind Spot of AI-Powered Game Bots
35. Practical Defenses Against Adversarial Machine Learning
36. Reverse Engineering the Tesla Battery Management System to increase Power Available
37. Needing the DoH - The Ongoing Encryption and Centralization of DNS
38. Policy Implications of Faulty Cyber Risk Models and How to Fix Them
39. A Little Less Speculation, a Little More Action - Deep Dive into Fuchsia's Mitigations for CPU Side
40. Kr00k - Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices
41. Experimenting with Real-Time Event Feeds
42. Black-Box Laser Fault Injection on a Secure Memory
43. Portable Document Flaws 101
44. Breaking VSM by Attacking SecureKernel
45. TiYunZong Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from 2015-2020
46. I calc'd Calc - Exploiting Excel Online
47. Reversing the Root - Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
48. Breaking Brains, Solving Problems - Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros
49. Room for Escape - Scribbling Outside the Lines of Template Security
50. Breaking Samsung's Root of Trust - Exploiting Samsung S10 Secure Boot
51. IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets
52. Improving Mental Models of End-to-End Encrypted Communication
53. Exploiting Kernel Races through Taming Thread Interleaving
54. Fooling Windows through Superfetch
55. Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
56. Dive into Apple IO80211FamilyV2
57. HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges
58. Demigod - The Art of Emulating Kernel Rootkits
59. Spectra - Breaking Separation Between Wireless Chips
60. Stealthily Access Your Android Phones - Bypass the Bluetooth Authentication
61. An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers
62. You have No Idea Who Sent that Email - 18 Attacks on Email Sender Authentication
63. Carrying our Insecurities with Us - The Risks of Implanted Medical Devices in Secure Spaces
64. How I Created My Clone Using AI - Next-Gen Social Engineeringg
65. Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets
66. Detecting Fake 4G Base Stations in Real Time
67. iOS Kernel PAC, One Year Later
68. Web Cache Entanglement - Novel Pathways to Poisoning
69. Heroku Abuse Operations - Hunting Wolves in Sheep's Clothing
70. A Decade After Stuxnet's Printer Vulnerability - Printing is Still the Stairway to Heaven
71. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
72. Engineering Empathy - Adapting Software Engineering Principles and Process to Security
73. Healthscare – An Insider's Biopsy of Healthcare Application Security
74. Stopping Snake Oil with Smaller Healthcare Providers - Addressing Security with Actionable Plans
75. Discovering Hidden Properties to Attack the Node.js Ecosystem
76. Repurposing Neural Networks to Generate Synthetic Media for Information Operations
77. The Paramedic's Guide to Surviving Cybersecurity
78. OTRazor - Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts
79. Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices
80. When TLS Hacks You
81. The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis
82. Whispers Among the Stars - A Practical Look at Perpetrating Satellite Eavesdropping Attacks
83. FASTCash and INJX_Pure - How Threat Actors Use Public Standards for Financial Fraud
84. EdTech - The Ultimate APT
85. Election Security - Securing America's Future
86. Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
87. Hacking Public Opinion
88. Mind Games - Using Data to Solve for the Human Element
89. Stress Testing Democracy Election Integrity During A Global Pandemic
90. The Devils in the Dependency Data Driven Software Composition Analysis
91. We Went to Iowa and All We Got were These Felony Arrest Records
Last edited by a moderator: