Channel Avatar

Shakacon LLC @UCIvytJLrQS3x8lTusvTLaOQ@youtube.com

13K subscribers - no pronouns :c

Shakacon, an Information Technology (IT) Security Conference


09:57
Turbo Talk: Darktrace (Silver Sponsor)
48:51
Web DisAssembly In Depth Peek at the VM Running Inside Your Web Browser by Christophe Alladoum
05:33
Turbo Talk: Herjavec Group (Gold Sponsor)
46:27
Network Defender Archeology By Justin Warner
40:15
Macdoored by Jaron Bradley
32:14
I Can Be Apple, and So Can You by Joshua Pitts
33:29
Cloud Forensics: Putting the Bits Back Together by Brandon Sherman
36:18
Building Defenses Like You Mean It by Elissa Shevinsky
12:32
Turbo Talk: Microsoft (Gold Sponsor)
18:02
Turbo Talk: ForeScout (Gold Sponsor)
32:05
The Road to IOS Sandbox Escape by Rani Idan
44:33
The Current State of Active Directory Security by Sean Metcalf
45:49
Stealth Mango & Tangelo: Selling Your Fruits to State Actors by Andrew Blaich & Michael Flossman
38:53
Hacking Smart Contracts by Konstantinos Karagiannis
12:16
Turbo Talk: Splunk (Silver Sponsor) by Cindy McCririe
15:30
Turbo Talk : Talos (Gold Sponsor) by Earl Carter
16:37
Turbo Talk: Tanium (Gold Sponsor) by Andre McGregor
15:32
Turbo Talk: Palo Alto Networks (Gold Sponsor) by Sam Pierre
51:49
WiFi Based IMSI Catcher by Piers O'Hanlon
32:09
Silent Protest a Wearable Protest Network by Jonathan Brossard & Richard Redditt
39:56
reductio ad absurdum by Christopher Domas
41:52
Pwned in Translation From Subtitles to RCE by Omri Herscovici & Omer Gull
47:49
Modern Reconnaissance Phase on APT Projection Layer by Paul Rascagneres
45:07
Honey, I Stole Your C2 Server A Dive into Attacker Infructure by Andrew Rector
44:16
DockIR: Incident Response in a Containerized, Immutable, Continually Deployed Env by Philip Martin
53:06
Building Next Generation Security Tools with Reverse Engineering Trilogy by Nguyen Anh Quynh
37:36
XLFLTreaT A New Dimension in Tunneling by Balazs Bucsay
35:56
Sad Panda Analysts by Richard Wartell
38:23
Reviewing the Security of ASoC Drivers in Andriod Kernal by Seven Shen
40:57
Pwning the macOS Sierra Kernel Inside the Safari Sandbox by Tielei Wang
50:08
Oversight Exposing Spies on macOS by Patrick Wardle
46:50
Digging into the core of Boot by Alex Bazhaniuk
44:43
A Deccompiler for Blockchain Based Smart Contracts Bytecode by Matt Suiche
45:57
0Day Hunting AKA the story of a Proper CPE Test - Balazs Bucsay
48:27
Fruit vs Zombie: Defeat Non Jailbroken iOS Malware - Claud Xiao
34:33
Swift Reversing - Ryan Stortz
29:44
The Nihilists Guide to Wrecking Humans & Systems - Christina Camilleri
50:50
The Search for the Perfect Door - Deviant Ollam
13:11
Turbo Talk - FireEye, Alexis Culp
46:59
When Encryption Is Not Enough... - Sumanth Naropath, Chandra Prakash Gopalaiah & Kavya Racharla
39:24
50 Shades of Fuzzing - Marco Grassi & Peter Hlavaty
28:00
Anti Reversing A Cake Full of Onions - Richard Wartell
50:43
Faux Disk Encryption Realities of Secure Storage on Mobile Devices - Daniel Mayer & Drew Suarez
55:00
Hunting Government Backdoors - Joseph Menn
48:25
Let's Play Doctor:Practical OSX Malware Detection and Analysis - Patrick Wardle
47:59
Making a Scalable Automated Hacking Systems - Artem Dinaburg
17:12
Turbo Talk: OccamSec, Rudolph Pereira
15:19
Turbo Talk: ForeScout, Zachary Dworak & Optiv, Joe DelRosario
28:09
Windows Systems & Code Signing Protection - Paul Rascagneres
25:14
Turbo Talk (Day 1) - Alexis Culp, FireEye
44:33
Project Zero: making 0day harder - Chris Evans, Google
05:34
Turbo Talk Day 2 - Beyond Security
49:42
Suns Out Guns Out: Hacking without a Vehicle - Chris Valasek, IOActive & Charlie Miller, Twitter
45:49
There's Waldo - Patrick Wardle & Colby Moore, Synack
48:21
Social Engineering the Windows Kernel - James Forshaw, Google
58:18
Exploiting Elevator Security Weaknesses - Deviant Ollam, The CORE Group
45:52
Breaking Vaults: Stealing LastPass Protected Secrets - Martin Vigo, Salesforce
52:11
Automotive Exploitation Techniques - Craig Smith, Open Garages & Theia Labs
53:21
I am the 100% (terms and conditions apply) - Chris Evans & Natalie Silvanovich, Google
54:41
Medical Devices: Passwords to Pwnage - Scott Erven, Protiviti