• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2019
  • 2018
  • 2017
  • 2016
Edition logo

BSides Manchester 2017

2017-08-17
  • Thumbnail for the video - click to play

    ►

    Opening Remarks
    - BSidesMCR
  • Video will not be published
    Opening Remarks
    - BSidesMCR
  • Thumbnail for the video - click to play

    ►

    A Year In The Red
    - Dominic Chell and Vincent Yiu
  • Video will not be published
    A Forgotten HTTP Invisibility Cloak
    - Soroush Dalili
  • Thumbnail for the video - click to play

    ►

    Cracking The Lens Targeting HTTP's Hidden Attack Surface
    - James Kettle
  • Thumbnail for the video - click to play

    ►

    Digital Forensics: The Missing Piece Of Internet Of Things Promise
    - Ali Dehghantanha
  • Thumbnail for the video - click to play

    ►

    Cisco ASA Episode 3 A Journey In Analysing Heaps
    - Cedric Halbronn
  • Thumbnail for the video - click to play

    ►

    Repairing The Internet With Responsible Disclosures
    - Victor Gevers
  • Thumbnail for the video - click to play

    ►

    From MS08-067 To EternalBlue
    - Denis Isakov
  • Thumbnail for the video - click to play

    ►

    Testing Docker Images Security
    - Jose Manuel Ortega
  • Thumbnail for the video - click to play

    ►

    CTFs - Not Just For Halo
    - Ray Doyle and Clayton Dorsey
  • Thumbnail for the video - click to play

    ►

    Money Makes Money: How To Buy An ATM And What You Can Do With It
    - Leigh-Anne Galloway
  • Thumbnail for the video - click to play

    ►

    Malvertising: Under The Hood
    - Chris Boyd
  • Thumbnail for the video - click to play

    ►

    Echo Chambers In Infosec And What We Can Do About Them
    - Colette Weston
  • Thumbnail for the video - click to play

    ►

    Kubernetes Container Clustering, Catastrophe?
    - Rory McCune
  • Thumbnail for the video - click to play

    ►

    The Impact Of Stenography On Electronic Communications
    - Michael Hegarty
  • Thumbnail for the video - click to play

    ►

    Machine Learning Aided Malware Detection (With Focus On Android)
    - Nikola Milosevic
  • Thumbnail for the video - click to play

    ►

    Security Testing As Part Of The Release Pipeline For The DVSA
    - David Brownhill and Craig Scott-Angell
  • Thumbnail for the video - click to play

    ►

    Bow Ties In InfoSec Do They Have A Place?
    - Carolyn Yates
  • Thumbnail for the video - click to play

    ►

    How To Bypass Email Gateways Using Common Payloads
    - Neil Lines
  • Thumbnail for the video - click to play

    ►

    Practical Serialization Attacks
    - Nicky Bloor
  • Thumbnail for the video - click to play

    ►

    Hacking Wireless Home Security Systems
    - Eric Escobar
  • Thumbnail for the video - click to play

    ►

    How To Obtain 100 Facebook Accounts Per Day Through Internet Searches
    - Guillermo Buendia and Yael Basurto
  • Thumbnail for the video - click to play

    ►

    Breaking Into The Data Centre
    - Greg Smith
  • Thumbnail for the video - click to play

    ►

    DOM Based Angular Sandbox Escapes
    - Gareth Hayes
  • Thumbnail for the video - click to play

    ►

    Fast Forward 10 Years Fact, Fiction & Failure
    - Ian Thornton-Trump
  • Thumbnail for the video - click to play

    ►

    Return Of The Jedi - Considering The Role Of The Security Professional In Light Of Exceptional Times
    - Charl Van Der Walt
  • Thumbnail for the video - click to play

    ►

    Revocation Is Broken Here's How We're Fixing It
    - Scott Helme
  • Thumbnail for the video - click to play

    ►

    Closing Remarks
    - BSidesMCR