Kevin Mitnick + Dave Kennedy -- Adaptive Penetration Testing
DEF CON 23 - Social Engineering Village - Dave Kennedy - Understanding End-User Attacks
DEF CON 18 - Barnaby Jack - Jackpotting Automated Teller Machines Redux
DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle
AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically
DEF CON Safe Mode Red Team Village - Jorge Orchilles - Deep Dive into Adversary Emulation Ransomware
Discovering C&C in Malicious PDFs with obfuscation, encoding, and other techniques by Filipi Pires
DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity
Evading Microsoft ATA for Active Directory Domination
Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S
Daniel Bohannon – Invoke-Obfuscation: PowerShell obFUsk8tion
DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering
No hay comentarios:
Publicar un comentario