message

BruCON

Likes 0 Dislikes 0
Seeders 0
Leechers 0
File Size 9.94 GB
Downloads 1
Uploaded Dec 27, 2021
Files
Trackers
More Info
FolderBruCON
FolderBruCON 0x07 2015
FileNightmares of a Pentester - Chris Nickerson.mp4 - 163 MB
FileHacking as Practice for Transplanetary Life in the 21st Century - Richard Thieme.mp4 - 63.3 MB
FileLevelling Up Security @ Riot Games - Mark Hillick.mp4 - 57.3 MB
FileCreating REAL Threat Intelligence .. with Evernote - L. Grecs.mp4 - 45.6 MB
FileShims For The Win - Willi Ballenthin & Jon Tomczak.mp4 - 44.3 MB
FileKeynote - Looking Forward - Finding the right balance for INFOSEC - David Kennedy.mp4 - 43.1 MB
FileBrain Waves Surfing - (In)Security in EEG Technologies - Alejandro Hernandez.mp4 - 39.6 MB
FileThe .11 Veil, Camouflage & Covert Invisible WiFi, Revealed - R. Nandedkar & A. Iyer.mp4 - 37.6 MB
FileAdvanced WiFi Attacks using Commodity Hardware - Mathy Vanhoef.mp4 - 33.7 MB
FileSSO It s the SAML SAML Situation - David Mortman.mp4 - 33.3 MB
FileUnified DNS View to Track Threats - Dhia Mahjoub & Thomas Mathew.mp4 - 31.4 MB
FileCVE-Search - Alexandre Dulaunoy & Pieter-Jan Moreels.mp4 - 29.8 MB
FileKeynote - What BASE Jumping Taught Me about Risk - Shyama Rose.mp4 - 28.8 MB
FileDesired state compromised - Ryan Kazanciyan & Matt Hastings.mp4 - 25.8 MB
FileOSXCollector Automated forensic evidence collection & analysis for OS X - Kuba Sendor.mp4 - 23.9 MB
FileLevelling Up Security @ Riot Games - Mark Hillick.srt - 91.1 kB
FileNightmares of a Pentester - Chris Nickerson.srt - 87.3 kB
FileKeynote - Looking Forward - Finding the right balance for INFOSEC - David Kennedy.srt - 85.3 kB
FileShims For The Win - Willi Ballenthin & Jon Tomczak.srt - 74.1 kB
FileUnified DNS View to Track Threats - Dhia Mahjoub & Thomas Mathew.srt - 67.4 kB
FileCreating REAL Threat Intelligence .. with Evernote - L. Grecs.srt - 67.1 kB
FileDesired state compromised - Ryan Kazanciyan & Matt Hastings.srt - 58.4 kB
FileSSO It s the SAML SAML Situation - David Mortman.srt - 53.6 kB
FileHacking as Practice for Transplanetary Life in the 21st Century - Richard Thieme.srt - 51.3 kB
FileKeynote - What BASE Jumping Taught Me about Risk - Shyama Rose.srt - 46.7 kB
FileBrain Waves Surfing - (In)Security in EEG Technologies - Alejandro Hernandez.srt - 43.3 kB
FileThe .11 Veil, Camouflage & Covert Invisible WiFi, Revealed - R. Nandedkar & A. Iyer.srt - 33.7 kB
FileOSXCollector Automated forensic evidence collection & analysis for OS X - Kuba Sendor.srt - 30.6 kB
FolderBruCON 0x0B 2019
FileAutomated adversary emulation using Caldera - Erik Van Buggenhout.mp4 - 151 MB
FileTales from professional thieves - Dan McInerney and Justin Wynn.mp4 - 137 MB
FileIncident response in the cloud foggy with a ray of sunshine - Jeroen Vandeleur.mp4 - 128 MB
FileCloud SIEM What happened and what's next - Gunter Ollmann.mp4 - 126 MB
FileWhy isn't infosec working Did you turn it off and back on again - Rob Fuller.mp4 - 116 MB
FileInternet Scale analysis of AWS Cognito Security - Andres Riancho.mp4 - 115 MB
FileSecurity transition from 4G to 5G are we secure enough - Altaf Shaik and Ravisha.mp4 - 109 MB
FileIt takes a village. - Kimber Dowsett.mp4 - 101 MB
FileA hackers view to the upcoming ISO SAE 21434 - Martin Schmiedecker.mp4 - 83.2 MB
FileDefeating Bluetooth Low Energy 5 PRNG for fun and jamming - Damien Cauquil.mp4 - 81.2 MB
FileCatching WMI lateral movement in an enterprise network - Jaco Blokker.mp4 - 78.3 MB
FileWeaknesses in WPA3's Dragonfly Handshake - Mathy Vanhoef.mp4 - 75.9 MB
FileHuman side-channels and their implications for security and privacy.mp4 - 67.2 MB
FileAtomic Threat Coverage being Threat Centric - Daniil Yugoslavskiy and Mateusz Wy.mp4 - 39.9 MB
FileBruCON Opening.mp4 - 11.2 MB
FileBruCON Closing.mp4 - 10.6 MB
FileSecurity transition from 4G to 5G are we secure enough - Altaf Shaik and Ravisha.eng.srt - 119 kB
FileTales from professional thieves - Dan McInerney and Justin Wynn.eng.srt - 118 kB
FileAutomated adversary emulation using Caldera - Erik Van Buggenhout.eng.srt - 112 kB
FileCloud SIEM What happened and what's next - Gunter Ollmann.eng.srt - 105 kB
FileHuman side-channels and their implications for security and privacy.eng.srt - 98.5 kB
FileWeaknesses in WPA3's Dragonfly Handshake - Mathy Vanhoef.eng.srt - 97.1 kB
FileIt takes a village. - Kimber Dowsett.eng.srt - 88.5 kB
FileWhy isn't infosec working Did you turn it off and back on again - Rob Fuller.eng.srt - 74.8 kB
FileInternet Scale analysis of AWS Cognito Security - Andres Riancho.eng.srt - 64.8 kB
FileA hackers view to the upcoming ISO SAE 21434 - Martin Schmiedecker.eng.srt - 62.6 kB
FileDefeating Bluetooth Low Energy 5 PRNG for fun and jamming - Damien Cauquil.eng.srt - 53.3 kB
FileAtomic Threat Coverage being Threat Centric - Daniil Yugoslavskiy and Mateusz Wy.eng.srt - 38.9 kB
FileBruCON Opening.eng.srt - 6.94 kB
FileBruCON Closing.eng.srt - 5.37 kB
FolderBruCON 0x0A 2018
FileAll Your Cloud Are Belong To Us - Hunting Compromise in Azure - Nate Warfield.mp4 - 139 MB
FileHacking driverless vehicles - ZoZ.mp4 - 139 MB
File(Re)Investigating Powershell attacks - Matt Hastings and Ryan Kazanciyan.mp4 - 132 MB
FileForging Trusts for Deception in Active Directory - Nikhil Mittal.mp4 - 131 MB
FileFinding 0days in embedded systems with code coverage guided fuzzing.mp4 - 122 MB
File$SignaturesAreDead = Long Live RESILIENT Signatures wide ascii nocase.mp4 - 121 MB
FileWhen Lemon Markets, Imposter Syndrome & Dunning-Kruger collide - Haroon Meer.mp4 - 117 MB
FileoT RCE, a Study With Disney - Lilith Wyatt.mp4 - 117 MB
FileLevelling Up Security @ Riot Games - Mark Hillick.mp4 - 108 MB
FileUsing blue team techniques in red team ops - Mark Bergman & Marc Smeets.mp4 - 106 MB
FileAdvanced WiFi Attacks using Commodity Hardware - Mathy Vanhoef.mp4 - 95.8 MB
FileSocial engineering for penetration testers - Sharon Conheady.mp4 - 87.5 MB
FileThe 99c heart surgeon dilemma - Stefan Friedli.mp4 - 80.6 MB
FileShaving the beard.mp4 - 75.2 MB
FileProcess Control through Counterfeit Comms - Jared Rittle.mp4 - 70.4 MB
FileBruCON Retro Opening.mp4 - 70.3 MB
FileHunting Android Malware A novel runtime technique for identifying applications.mp4 - 65.8 MB
FileNerdland podcast recording - Lieven Scheire.mp4 - 47.8 MB
FileDissecting Of Non Malicious Artifacts One IP At A Time - Dani Goland & Ido Naor.mp4 - 33.9 MB
FileDisrupting the Kill Chain - Vineet Bhatia.mp4 - 16.8 MB
FileBruCON Opening.mp4 - 10.2 MB
FileAll Your Cloud Are Belong To Us - Hunting Compromise in Azure - Nate Warfield.eng.srt - 205 kB
File$SignaturesAreDead = Long Live RESILIENT Signatures wide ascii nocase.eng.srt - 196 kB
File(Re)Investigating Powershell attacks - Matt Hastings and Ryan Kazanciyan.eng.srt - 192 kB
FileHacking driverless vehicles - ZoZ.eng.srt - 187 kB
FileSocial engineering for penetration testers - Sharon Conheady.eng.srt - 171 kB
FileDisrupting the Kill Chain - Vineet Bhatia.eng.srt - 171 kB
FileWhen Lemon Markets, Imposter Syndrome & Dunning-Kruger collide - Haroon Meer.eng.srt - 156 kB
FileLevelling Up Security @ Riot Games - Mark Hillick.eng.srt - 150 kB
FileUsing blue team techniques in red team ops - Mark Bergman & Marc Smeets.eng.srt - 145 kB
FileAdvanced WiFi Attacks using Commodity Hardware - Mathy Vanhoef.eng.srt - 139 kB
FileoT RCE, a Study With Disney - Lilith Wyatt.eng.srt - 136 kB
FileForging Trusts for Deception in Active Directory - Nikhil Mittal.eng.srt - 126 kB
FileThe 99c heart surgeon dilemma - Stefan Friedli.eng.srt - 119 kB
FileHunting Android Malware A novel runtime technique for identifying applications.eng.srt - 103 kB
FileProcess Control through Counterfeit Comms - Jared Rittle.eng.srt - 93.2 kB
FileBruCON Retro Opening.eng.srt - 85.1 kB
FileFinding 0days in embedded systems with code coverage guided fuzzing.eng.srt - 81.2 kB
FileDissecting Of Non Malicious Artifacts One IP At A Time - Dani Goland & Ido Naor.eng.srt - 37.9 kB
FileShaving the beard.eng.srt - 36.9 kB
FileBruCON Opening.eng.srt - 10.9 kB
FolderBruCON 0x08 2016
FileNew Adventures In Active Defense, Offensive… - John Strand.mp4 - 138 MB
FileKeynote - Inventing Defense - Allison Miller.mp4 - 137 MB
FileKeynote - The Birth Of A Discipline - Corey Schou.mp4 - 123 MB
FileBuilding A Successful Internal Adversarial Simulation Team - C. Gates & C. Nickerson.mp4 - 116 MB
FileInvoke obfuscation powershell obfusk8tion techniques - DanielBohannon.mp4 - 112 MB
FileAnt-Forensics AF - Dual Core.mp4 - 109 MB
FileHello To The Dark Side - L. Grecs.mp4 - 105 MB
FileWhat Does The Perfect Door Or Padlock Look Like - Deviant Ollam.mp4 - 105 MB
FileVirtual Terminals, POS Security And Becoming A.. - Grigorios Fragkos.mp4 - 102 MB
FileEsoteric Web Application Vulnerabilities - Andres Riancho.mp4 - 93.7 MB
FileSmart Sheriff, Dumb Idea. - Abraham Aranguren & Fabian Fässler.mp4 - 92 MB
FileSecurity Through Design - Jelle Niemantsverdriet.mp4 - 86.6 MB
FileHacking KPN Lessons From The Trenches - Jeremy Goldstein & Bouke Van Laethem.mp4 - 82.1 MB
FileScraping Leaky Browsers for fun and Passwords - Stefaan Truijen - Adrian Toma.mp4 - 74.2 MB
FileDecepticon - R. Nandedkar-Amrita Iyer-Krishnakant Patil.mp4 - 55.2 MB
FolderBruCON 0x01 2009
FileRed and tiger team - Chris Nickerson.mp4 - 77.1 MB
FileBelgian beer lovers guide to cloud computing - Craig Balding.mp4 - 67.6 MB
FileAttacking backbone technologies - Daniel Mende - Roger Klose.mp4 - 61.1 MB
FileTransition to ipv6 on the internet threats and mitigation - Eric Vyncke.mp4 - 58 MB
FileBuilding hackerspaces everywhere - Astera.mp4 - 57.6 MB
FileDispelling the myths and discussing the facts global cyber warfare - Jaseon E Street.mp4 - 57.2 MB
FileSocial engineering for penetration testers - Sharon Conheady.mp4 - 57.1 MB
FileRage against the kiosk - Paul James Craig.mp4 - 51.7 MB
FileA new web attack vector script fragmentation - Stephan Chenette.mp4 - 51.4 MB
FileBotnets ransomware malware and stuff - Julia Wolf.mp4 - 43 MB
FileKnowing me knowing you dangers of social networks - Brian Honan.ogg.mp4 - 34.9 MB
FileOpen source information gathering - Chris Gates.mp4 - 34.5 MB
FolderBruCON 0x04 2012
FileCyberwar Not What We Were Expecting.mp4 - 73 MB
FileRecent Advances in IPv6 Security.mp4 - 68.1 MB
FileHow I met your pointer (Hijacking client software for fuzz and profit).mp4 - 50.5 MB
FileWe have you by the gadgets.mp4 - 50.2 MB
FileShotgun parsers in the cross-hairs.mp4 - 49.2 MB
FileMoar Anti-Forensics for the Louise.mp4 - 46.1 MB
FileHTML5 - A Whole New Attack Vector.mp4 - 36.6 MB
FilepMap, the silent killer.mp4 - 36.1 MB
FileUncovering SAP vulnerabilities dissecting and breaking the Diag protocol.mp4 - 35 MB
FileIntroducing the Smartphone Penetration Testing Framework.mp4 - 26 MB
FileKeynote by Katie Moussouris.mp4 - 17.5 MB
FileWelcome.mp4 - 3.9 MB
FileCyberwar Not What We Were Expecting.srt - 66.8 kB
FileShotgun parsers in the cross-hairs.srt - 63.9 kB
FileMoar Anti-Forensics for the Louise.srt - 63.9 kB
FilepMap, the silent killer.srt - 49 kB
FileHTML5 - A Whole New Attack Vector.srt - 47.1 kB
FileUncovering SAP vulnerabilities dissecting and breaking the Diag protocol.srt - 46.6 kB
FileWe have you by the gadgets.srt - 46.2 kB
FileKeynote by Katie Moussouris.srt - 21 kB
FileWelcome.srt - 4.69 kB
FolderBruCON 0x05 2013
FileDavid Perez, Jose Pico - Geolocation of GSM mobile devices.mp4 - 68.6 MB
FileDavid Mortman s Keynote.mp4 - 64.5 MB
FileAmelia Andersdotter s keynote.mp4 - 62.9 MB
FileDan Guido s Keynote.mp4 - 60.2 MB
FileLightning Talks Session #1.mp4 - 59.3 MB
FileErin Jacobs, Zack Fasel - Taking the BDSM out of PCI-DSS through open-source solutions.mp4 - 55.5 MB
FileJake Valletta - CobraDroid.mp4 - 51.7 MB
FileTB. Henriques, T. Martins, J. Gouveia - Realtime analysis and visualization of ..mp4 - 47.6 MB
FileDevops Panel (part 2).mp4 - 47.3 MB
FileRobert Graham - Data-plane networking.mp4 - 45.4 MB
FileVaagn Toukharian - HTTP Time Bandit.mp4 - 41.8 MB
FileRuss Gideon - Paint by Numbers vs. Monet.mp4 - 35.8 MB
FileAloria - .NET The Framework, the Myth, the Legend.mp4 - 28.2 MB
FileDevops Panel.mp4 - 11.4 MB
FileFacebook CTF.mp4 - 5.64 MB
FileAmelia Andersdotter s keynote.srt - 83.3 kB
FileErin Jacobs, Zack Fasel - Taking the BDSM out of PCI-DSS through open-source solutions.srt - 78.7 kB
FolderBruCON 0x09 2017
FileOpen Soure Security Orchestration - Gregory Pickett.mp4 - 65.6 MB
FileEvading Microsoft ATA for Active Directory Domination - Nikhil Mittal.mp4 - 55.4 MB
FileBrowser Exploits Grab them by the… collar - Debasish Mandal.mp4 - 55 MB
FileSecure channels Building real world crypto systems - Sander Demeester.mp4 - 53.6 MB
FileXFLTReaT a new dimension in tunnelling - Balazs Bucsay.mp4 - 52.7 MB
FileHow hackers changed the security industry - Chris Wysopal.mp4 - 48.6 MB
FileHacking invisibly and silently with light and sound - Matt Wixey.mp4 - 47.8 MB
FileWeaponizing the BBC Micro Bit - Damien Cauquil.mp4 - 45.3 MB
FileDetecting malware even when it is encrypted - František Střasák.mp4 - 40.3 MB
FileFrom Weakest Link to Retaliation Weapon - Vlad Styran.mp4 - 39.4 MB
FileDYODE - Arnaud Soullié.mp4 - 38.1 MB
FileAn overview of the CMS brute-forcing malware landscape - Anna Shirokova.mp4 - 36.6 MB
FileA market solution for product safety and corporate governance - Justine Bone.mp4 - 32.8 MB
FolderBruCON 0x06 2014
FileData transforming your sewage into signatures - Adam Schoeman.mp4 - 64.2 MB
FileThe project of prototype this - Joe Grand & Zoz.mp4 - 60.2 MB
FileKeynote - Jennifer Minella.mp4 - 59.8 MB
FileSecurity model bedfellows - Noel Dunne & Paco Hope.mp4 - 57.3 MB
FileKeynote - Adam Shostack.mp4 - 55.2 MB
FileCyber necromancy - resurrecting the dead - Matthew Halchyshak Joseph Tartaro.mp4 - 46.9 MB
FileOne packer to rule them all - Arne Swinnen & Alaeddine Mesbahi.mp4 - 45.4 MB
FileUsing superpowers for hw reverse engineering - Joe Grand.mp4 - 45.2 MB
FileBiting into the forbidden fruit - Krzysztof Kotowicz.mp4 - 44.2 MB
FileThunderbolts and Lightning - Snare.mp4 - 43.3 MB
FileInvestigating Powershell attacks - Matt Hastings & Ryan Kazanciyan.mp4 - 38.6 MB
FileStealing a mobile using wormholes - Markus Vervier.mp4 - 33.6 MB
FileHacking driverless vehicles - Zoz.mp4 - 13.7 MB
FileLightning Talks - Voting Stage.mp4 - 7.43 MB
FileLightning Talks - tunnelshade.mp4 - 5.55 MB
FileLightning Talks - Matt Erasmus.mp4 - 4.25 MB
FileLightning Talks - Gavin Millard.mp4 - 3.77 MB
FileLightning Talks - Nikos Danopoulos.mp4 - 2.86 MB
FileLightning Talks - 404 @JQuePublic.mp4 - 2.73 MB
FileLightning Talks - Jan Kadijk.mp4 - 2.57 MB
FileKeynote - Adam Shostack.srt - 90.2 kB
FileBiting into the forbidden fruit - Krzysztof Kotowicz.srt - 83.6 kB
FileThunderbolts and Lightning - Snare.srt - 65.2 kB
FileStealing a mobile using wormholes - Markus Vervier.srt - 38.9 kB
FileHacking driverless vehicles - Zoz.srt - 25.5 kB
FileLightning Talks - tunnelshade.srt - 8.12 kB
FileLightning Talks - Gavin Millard.srt - 6.6 kB
FileLightning Talks - Matt Erasmus.srt - 6.55 kB
FileLightning Talks - 404 @JQuePublic.srt - 5.45 kB
FileLightning Talks - Jan Kadijk.srt - 5.36 kB
FolderBruCON 0x02 2010
Foldervideos
FileDale Pearson.mp4 - 63.6 MB
FileMitch Altman - Inventing TV B Gone.mp4 - 60.8 MB
FileIan Amit.mp4 - 59.9 MB
FileMikko Hypponen - Memoirs of a Data Security Fighter.mp4 - 59.3 MB
FileCraig Balding - Project Skylab.mp4 - 56.4 MB
FilePaul Asadoorian - Hacking Embedded Systems.mp4 - 54.5 MB
FileJoe McCray - You Spent All That Money And You Still Got Owned.mp4 - 53.1 MB
FileStephan.mp4 - 52.2 MB
FileMatias Madou.mp4 - 50.8 MB
FileChris Nickerson.mp4 - 50.3 MB
FileFkooman Verdult.mp4 - 49.8 MB
FileAndy Moser, Olivier Thonnard - The Wombat Project.mp4 - 49.5 MB
FileLightnig Talks.mp4 - 49.4 MB
FileLieven Desmet.mp4 - 41.7 MB
FileFabian Van Den Broek - GSM Security.mp4 - 32.9 MB
FileEnd.mp4 - 10.3 MB
FileIntroduction.mp4 - 1.11 MB
Folderpresentations
FileHH.pdf - 26.2 MB
FileEmbeddedHacking TakeOverWorldv2.pdf - 17.9 MB
FileEmbeddedHacking TakeOverWorldv1.5.pdf - 16.6 MB
FileOlivierT AndyM.pptx - 12.9 MB
Fileschenette final.pdf - 5.55 MB
FileIdeaToReality.ppt - 5.33 MB
Fileskylabv1.pdf - 5.1 MB
FileYou Spent All That Money and Still Got Owned.ppt - 2.28 MB
FileRepellingTheWilyInsider.pdf - 1.78 MB
FileMemoirsPublic.pptx - 1.66 MB
FileMonkeyBerries.pdf - 1.56 MB
FileSecurityInnovationNetwork Cybersecurity 100925.pdf - 1.43 MB
FileGSM Security Fact and Fiction.pdf - 1.12 MB
FileDVWA.ppt - 872 kB
FileCsFire.pdf.zip - 749 kB
FileCreatingACertAtWarSpeed.pptx - 383 kB
FolderBruCON 0x03 2011
Foldervideos
FileDan Kaminski.mp4 - 60.3 MB
FileAndreas Bogk.mp4 - 56.7 MB
FileAlex Hutton.mp4 - 54.1 MB
FileAndrey Belenko.mp4 - 52.1 MB
FileAlluc.mp4 - 50.4 MB
FileIan Amit.mp4 - 47.5 MB
Folderpresentations
Fileyou and your research - Haroon Meer.pdf - 39.2 MB
FileSEMovies.pdf - 36.5 MB
FileA crushing blow at the heart of SAPs J2EE Engine_BRUCON.pdf - 4.54 MB
FileVivek Ramachandran.pdf - 3.29 MB
Fileadityaks botnet_and_browsers.pdf - 2.4 MB
FileBotnet Identification & remediation.pdf - 2.37 MB
FileDataExfiltration iiamit Brucon 2011.pdf - 1.36 MB
FileBelenko iOS Data Protection.pdf - 1.2 MB
FileMythbusting Risk v4.pdf - 754 kB
Fileabusing_locality.pdf - 659 kB
FileWhite hat shellcode workshop paper.pdf - 82.2 kB
FileWhite hat shellcode workshop slides.pdf - 71.2 kB
FileBeerworkshop.pdf - 68.4 kB
Fileincidendresponse.pdf - 56.2 kB
FileBruCON logo.jpg - 6.57 kB
FileBruCON thank you.txt - 1.07 kB
Tracker Seeder Leecher
udp://tracker.opentrackr.org:1337/announce 0 0
  • InfoHash: 429DF2909F467FAE3502E5E1FE108E9506062DDA
  • Last Updated: Jan 23, 2022
  • File Count: 262
  • File Category: 1
  • Tags: brucon
Comments (0)
 

Write your comment

Did you like this torrent? [Optional]