-
Welcome To Cyberweek
- Dhillon 'L33tdawg' Kannabhiran
-
Ask Bruce
- Bruce Schneier
-
Workshop: Penetration Testing Of ECU (Red Team Version)
- Arun Mane
-
Understanding Exploitation Techniques And
Attacks On Hosting Assets And Access For Resale
- Vladimir Kropotov and Fyodor Yarochkin
-
Android RAT Detection With A Machine Learning-Based Python IDS
- Sebastian Garcia and Kamila Babayeva
-
Hacking The 0day Marketplace
- Andrea Zapparoli Manzoni
-
The Work of Cyber in the Age of Mechanical Reproduction
- Juan Andres Guerrero-Saade
-
Data Breaches Related To Critical Infrastructure:
An In-Depth Analysis Of Cyber Risk To The Critical
Infrastructure Of The United States Of America
- Mars Cheng,YenTing Lee and Max Farrell
-
Constructing An OS X Cyber Range For Red & Blue Teams
- Yi-Hsien Chen and Yen-Ta Lin
-
Your First Hardware Device and Firmware:
Adventures in Building a CAN Bus Sniffer
- Andrey Voloshin,Sasha Olenyev and Illia Tolokonnikov
-
The Continuous Journey For Manufacturers
To Develop Cyber Resilient IoT Devices
- Chen and Ku-Chieh
-
Panel: Pre-empting Attacks - Relevance Of Red Teaming In Enterprises
- Emmanuel Gadaix,Erdal Ozkaya,Kiran Kumar P G,Bryson Bort and Anant Shrivastava
-
Anatomy Of Automated Account Takeovers
- Tal Eliyahu
-
Kernel Exploitation With A File System Fuzzer
- SeungPyo Hong,HeoungJin Jo,Dong Hee Kim and WonYoung Jung
-
Bit Leaker: Subverting Bit Locker With One Vulnerability
- Seunghun Han
-
Hunting The Hunters:
Detection and Efficiency Testing of Endpoint Security Sensors
- Filipi Pires
-
Writing Bare-Metal ARM Shellcode
- Munawwar Hussain Shelia
-
Zero Trust Networks:
Opportunities And Challenges For Red Team Ops
- Dan Levy
-
How To Train Your Self-Driving (Dragon) Car
- Dhillon 'l33tdawg' Kannabhiran and Jonathan Tse
-
The Art of Exploiting Logical Flaws in Web Applications
- SaifAllah BenMassaoud
-
Evolution Of Offensive Security:
It Was Always About Providing Business Value
- Jorge Orchilles and Bryson Bort
-
A Practical Introduction to BLE Security Without Any Special Hardware
- Slawomir Jasek
-
Attacking Storage Services:
The Lynchpin Of Cloud Services
- Anant Shrivastava
-
Privilege Escalation In Da House
- Carlos Polop Martin
-
Applied Defense On Docker And Kubernetes (Cancelled)
- Sol Ozzan
-
Qiling Framework with IDA Pro
- Kai Jern Lau,Wu ChenXu and Kong ZiQiao
-
Signal Processing With GNURadio And SDRs
- Ateet Kumar
-
The War for Control of DNS Encryption
- Paul Vixie
-
Threat Hunting With Elastic Security
- Aravind Putrevu and Haran Kumar
-
Trust, But Verify:
Maintaining Democracy In Spite Of Информационные Контрмеры
- Allie Mellen
-
RAMN: Resistant Automotive Minimal Network
- Camille Gay,Tsuyoshi Toyama and Hisashi Oguma
-
Develop Your Enterprise Security Strategy
Leveraging On Zero Trust Approach
- Aloysius Cheang
-
Machine Learning Security Evasion Competition 2020
- Zoltan Balazs and Hyrum Anderson
-
Visibility In The Clouds:
Introducing A New Open Source Tool For Cloud Security
- Ilia Rabinovich and Oleg Lerner
-
Jailbreaks Never Die: Exploiting iOS 13.7
- @08Tc3wBB
-
Industrial Protocol Gateways:
A Deep-Dive Of Moxa MGate 5105-MB-EIP
- Philippe Lin
-
Blue Team Visibility
- Ibrahim Mohammed Alshmranie
-
So You Have A Blacklist: Optimizing The Protection Of IoT
Devices By A Scored-Prioritized Aging BlackList Of Attackers
- Thomas O’Hara,Maria Jose Erquiaga and Sebastian Garcia
-
Offensive Embedded Exploitation:
Getting Hands Dirty With Hardware Hacking And Firmware Analysis
- kaustubh Padwad and Arun Mane
-
AEZAKMI: Browser Anonymity & Fingerprinting Bypass
- Timur Nasirov
-
The Road Towards 365 Bugs In Microsoft Office 365
- Ashar Javed
-
Inside The Mind Of A Threat Actor: Beyond Pentesting
- Philip Wylie
-
Spoofing Your Location On IOS Without Jailbreaking
- Kelvin Wong
-
Red Team Vs. Blue Team Exercises For ICS/SCADA Security
- Mars Cheng
-
Payload Delivery For Initial Access In
Red Team Engagement And Adversary Simulation
- Jean Marie Bourbon
-
CI/CD With SAST And DAST For Embedded Devices
- Andrey Voloshin,Sasha Olenyev and Illia Tolokonnikov
-
Trustworthy Shield – A Cheap TPM Module For Older Systems
- Heyi Wu
-
Fuzzing: Finding Your Own Bugs And 0days!
- Rodolpho Concurde
-
Old Still Cool: Classic SE Formats Merge For
High Complex Context In Three Peculiar Tales
- Daniel Isler
-
Hands-On Purple Team Exercises
- Jorge Orchilles
-
Analysing Malicious Word And Excel Documents
- Josh Stroschein
-
Hands-on Introduction to Timeless Debugging & Analysis
- Mathieu Favreaux