Channel Avatar

ROOTCON Hacking Conference @UC44Kzvw_lSz7VNL_iK9Vahg@youtube.com

2K subscribers - no pronouns :c

More from this channel (soon)


32:46
Custom Software Development - Speedtalk from PhilIT
28:43
Tracking Adversaries through Signals Intelligence - Speedtalk from Security Scorecard
27:42
Why DFIR needs a hacker mindset - SpeedTalk from Kroll
13:51
ISOG Membership - Speedtalk from ISOG
18:03
Exploring Android Accessibility Malware - Speedtalk from Appdome
24:26
State of Cybersecurity 2023: The Business Impact of Adversaries - Speedtalk from Sophos
19:19
Accelerating Security Transformation - The Value of Managed Security - SpeedTalk from Nexus
27:49
DNS Detection and Response - SpeedTalk from Infoblox
01:01:36
Red Team Village - Initial Payload Development: The One That Gets Away by: Ian Secretario
01:02:36
Cellular Assault Village: Uncovering Cellphone Risks by: Henry Caga
01:09:46
Red Team Village - Introduction to Red Teaming by: TheJanitor
27:20
101 Village - Hacking 101 by: Ariz Soriano
43:52
Car Hacking Village - Analysis of an In-vehicular network: From CAN bus to infotainment by Div0 CSQ
01:04:49
101 Village - Mobile Pentesting 101 by: Christian Villapando
32:01
Recon Village - CTI 101 by: Heremias Esquibal
49:20
Car Hacking Village - An overview of Automotive Defensive Engineering By Scott Sheahan
28:05
RECON Village - OSIF by: Eskie Cirrus James Maquilang
31:47
AI's Underbelly: The Zero-Day Goldmineby: Dan McInerney
51:00
A 3-Year Tale of Hacking a Pwn2Own Target by: Orange Tsai
59:07
Active Directory Domination through Configuration Abuse and OPSE by: Mars Cheng & Dexter Chen
34:45
Scarlet OT - OT adversary emulation for fun and profitby: Vic Huang & Sol Yang
26:49
Breaking Barriers: Using XSS to Achieve RCEby: Aden Yap, Ali Radzali, Azrul Zulkifli, Sheikh Rizan
38:43
Phish MOMUKAMO by: Eric Reyata
01:02:33
Unleashing Cyber Chaos by: Scott Jarkoff and Aaron Ng
37:59
The Creation of the Out-Of-Band Anti Virus Dock (OOBAVD) by: Yu Pengfei and Tan Jing Zhi
46:51
Hacking Back Your car by: Kamel Ghali
49:34
Car Hacking Scene in the PH: How Far We've Come by: Jay Turla
34:08
Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation by: Raunak Parmar
29:17
Technical Surveillance Counter Measure TSCM by: JJ Giner
10:54
Security and Hacking Issues with The METAVERSE: Speedtalk from ISOG
30:44
Making the World Healthier, Safer and Smarter and More Sustainable: Speedtalk from Emerson
21:35
Learning after doing 200 Pentests: Speedtalk from Theos
33:21
Unifying Cybersecurity The New “Infinity War”: Speedtalk from Cyware
18:47
Why trust 0x00 Trust Matters: Speedtalk from Nexus Technologies
29:49
Tales from the Frontlines: Speedtalk from Mandiant
01:41:13
ROOTCON 16 Soundtrack by Icetre Normal
13:48
Human Controlled Fuzzing With AFL by Maxim Grishin Igor Korkin
27:35
The Simple Yet Lethal Anatomy of a Software Supply Chain Attack by Yehuda Galb
41:34
AWSGoat A Damn Vulnerable AWS Infrastructure by Jeswin Mathai Shantanu Kale and Sanjeev Mahunta
46:23
How Did I Get Here? I still don’t know Getting into The Lifelong Adventure of Learning Cybersecurity
30:05
Signs Signs Everywhere There are Signs of a Ransomware Intrusion by Allan Liska
45:52
Wild IoT Tales from power grids to oil pipelines by Barak Sternberg
28:51
Alternative ways to detect mimikatz by Balazs Bucsay
25:00
ROOTCON 16 Sponsors AVP Loop
38:50
Pwnppeteer Phishing Post ExploitAutomattion at Scale
01:03:45
Understanding and Re creating Process Injection Techniques through Nimjector by Ariz Soriano
26:04
Uncovering 0days in Healthcare Management Applications by Aden Yap Chuen Zhen Sheikh Rizan and Muham
33:26
Streamline security with shift left A cloud approach by Avinash Jain
45:06
Building defensive playbooks from others misfortune by Chester Wisniewski
35:45
Security Like the 80's How I stole your RF by Ayyappan Rajesh
36:40
A new secret stash for fileless malware by Denis Legezo
34:12
Microsoft Defender Will Be Defended MemoryRanger Prevents Blinding Windows post processed
38:59
SCARY HACKS by Tikbalang
34:46
OAuth Authentication Bypass by Sheikh Rizan
32:51
Buzzard Crafting your post-exploitation framework against odds by Aravindha Hariharan and Subhaj
01:17:55
Fuzzing Revisiting Software Security by Nafiez
40:13
Crafting your own combat hardware
21:51
Hack the Planet! Desecuritise Cyberspace Keynote by Emil Tan
31:43
Malware Hunting Using python as attack weapon by Filipi Pires
36:21
Discovering C&C in Malicious PDF with obfuscation, encoding and other techniques by Filipi