• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 15
  • 14
  • 13
  • 11
  • 10
  • 9
  • 8
Edition logo

Nullcon 8

2017-03-02 - 2017-03-04
  • Video will not be published
    Blackshield Awards
    -
  • Video will not be published
    NULL Community Talk
    -
  • Thumbnail for the video - click to play

    ►

    The Mirai BotNet And Where DDoS Attacks Are Headed
    - Ben Herzberg
  • Thumbnail for the video - click to play

    ►

    Case Study On RFID (Proximity Cards) Hacking
    - Sarwar Jahan and Ashwath Kumar
  • Thumbnail for the video - click to play

    ►

    Hackers! Do We Shoot Or Do We Hug?
    - Edwin Van Andel
  • Video will not be published
    Opening Note
    -
  • Thumbnail for the video - click to play

    ►

    Silicon: Security's New Layer
    - Joshua Pennel
  • Thumbnail for the video - click to play

    ►

    Antivirus Evasion Reconstructed - Veil 3.0
    - Christopher Truncer
  • Thumbnail for the video - click to play

    ►

    How To Be Successful In The Azure Bug Bounty
    - Michael Hendrickx
  • Thumbnail for the video - click to play

    ►

    Digital Warriors: India And The Future Of Conflict On The Internet
    - CXO Panel
  • Thumbnail for the video - click to play

    ►

    Invoke-Obfuscation: PowerShell obFUsk8tion Techniques And How To (Try To) D""e`Tec`T 'Th'+'em'
    - Daniel Bohannon
  • Thumbnail for the video - click to play

    ►

    Increasing Your Impact On Facebook Bug Bounty
    - Jack Whitton
  • Thumbnail for the video - click to play

    ►

    Breach Response Time To Shake Up The Status Quo
    - CXO Panel
  • Thumbnail for the video - click to play

    ►

    Nearly generic fuzzing of XML-based formats
    - Nicolas Gregoire
  • Video will not be published
    Great Bugs In Google VRP In 2016
    - Martin Straka and Karshan Sharma
  • Thumbnail for the video - click to play

    ►

    Securing Critical National Infrastructure
    - CXO Panel
  • Thumbnail for the video - click to play

    ►

    Drone Hijacking and other IoT hacking with GNU Radio and SDR
    - Arthur Garipov
  • Thumbnail for the video - click to play

    ►

    How To Interact With Bug Bounty Programs
    - Faraz
  • Thumbnail for the video - click to play

    ►

    Barbarians At The Gate(way)
    - Dave Lewis
  • Thumbnail for the video - click to play

    ►

    Bug Bounty Reports - How Do they Work
    - Adam Bacchus
  • Thumbnail for the video - click to play

    ►

    Hardware Security: Foundational Block Of Cyber Battlefield
    - CXO Panel
  • Video will not be published
    Hackers InSight
    -
  • Thumbnail for the video - click to play

    ►

    When Enough Is Enough: The Limits Of Desirable Security
    - Karsten Nohl
  • Thumbnail for the video - click to play

    ►

    Training Machines For Application Scanning In Retro Style
    - Bharadwaj Machiraju
  • Thumbnail for the video - click to play

    ►

    Hypervisors In Your Toolbox: Monitoring And Controlling System Events With HyperPlatform
    - Satoshi Tanda & Timo Kreuzer
  • Thumbnail for the video - click to play

    ►

    Cyber Security Blueprint For A Future
    - CXO Panel
  • Video will not be published
    Explorer's Guide To Shooting Satellite Transponders
    - Jay Turla
  • Thumbnail for the video - click to play

    ►

    Case Study Of SS7/Sigtran Assessment
    - Akib Sayyed
  • Thumbnail for the video - click to play

    ►

    Application Security Opportunities And Challenges In A DevOps World
    - CXO Panel
  • Thumbnail for the video - click to play

    ►

    Hacking Medical Devices And Infrastructure
    - Anirudh Duggal
  • Thumbnail for the video - click to play

    ►

    7 Sins Of ATM Protection Against Logical Attacks
    - Timur Yunusov
  • Thumbnail for the video - click to play

    ►

    DevOpSec: Rapid Security In The Cloud With AWS And CIS
    - Mikhail Advani and Rajesh Tamhane
  • Thumbnail for the video - click to play

    ►

    Blockchain And Security : Bank And Insurance Applications
    - Renaud Lifchitz
  • Thumbnail for the video - click to play

    ►

    The Art Of Bootloader Unlocking: Exploiting Samsung Sboot
    - Nitay Artenstein
  • Thumbnail for the video - click to play

    ►

    Engineering Better Security At Facebook
    - Karen Sittig
  • Thumbnail for the video - click to play

    ►

    Injecting Security Into Web Apps With Runtime Patching And Context Learning
    - Ajin Abraham
  • Thumbnail for the video - click to play

    ►

    p≡p ≡ pretty Easy privacy: Making Privacy The Default For Everyone
    - SVA