Channel Avatar

Info Con @UCv6LJeK92VdftQzOYg87ORA@youtube.com

384 subscribers - no pronouns :c

This is a central hub/mirror for Infosec Videos. All propert


01:04:51
#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.mp4
49:24
#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.mp4
49:07
#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.mp4
39:48
#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.mp4
46:46
#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.mp4
23:59
#HITBGSEC SG 2016 CommSec Track D1 - Reverse Engineering Swift Applications - Michael Gianarakis.mp4
35:40
#HITBGSEC 2016 SG Conference Track D2 - Fuzzing The Windows Kernel - Koh Yong Chuan.mp4
36:46
#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.mp4
00:31
#HITBGSEC Replicating a VASCO DIGIPASS Token Instance (DIGIPASS DEMO for Android 4.10.0).mp4
00:51
#HITBGSEC Replicating a RSA SecurID Token Instance (RSA SecurID 2.0.4).mp4
54:54
#HITBGSEC 2016 SG Conference Track D1 - A Next Generation Assembler Framework - Nguyen Anh Quynh.mp4
35:29
#HITBGSEC 2016 SG Conference Track D1 - Attacking Software Tokens - Bernhard Mueller.mp4
35:38
#HITBGSEC 2016 SG Conference Track D1 - Trust No One - O. Kochetova & A. Osipov.mp4
34:12
#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.mp4
53:09
#HITBGSEC 2016 SG CommSec Track D1 - Data Driven Software Security - Sweety Chauhan.mp4
27:41
#HITBGSEC 2016 SG CommSec Track D2 - Vulnerabilities and Ethics - Alfonso De Gregorio.mp4
28:17
#HITBGSEC 2016 SG CommSec Track D2 - Fake President Fraud Defrauded - Florian Lukavsky.mp4
31:22
#HITBGSEC 2016 SG CommSec Track D2 - IoT Honeypots - Tan Kean Siong.mp4
21:20
#HITBGSEC 2016 SG CommSec Track D2 - Local Privilege Escalation in 2016 - Paul Craig.mp4
20:08
#HITBGSEC 2016 SG CommSec Track D1- Halcyon - An IDE for Faster NSE Development - Sanoop Thomas.mp4
32:08
#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.mp4
16:56
#HITBGSEC 2016 SG CommSec Track D2 - Copy-paste Vulnerabilities - Vanessa Henderson.mp4
55:07
#HITB2016AMS D2T2 New Methods For Exploiting ORM Injections Mikhail Egorov and Sergey Soldatov
49:48
#HITB2016AMS CommSec Track D1 Exploiting GLIBC Hacking Everything Gal De Leon and Nadav Markus
48:32
#HITB2016AMS CLOSING KEYNOTE Hardware Side Channels in Virtualized Environments Sophia D Antoine
53:01
#HITB2016AMS D2T2 Breaking Naive ESSID WPA2 Key Generation Algorithms Peter Blasty Geissler
52:38
#HITB2016AMS CommSec Track D1 Applying Regulatory Data to IoT RF Reverse Engineering Marc Newlin
59:33
#HITB2016AMS D2T1 In Plain Sight The Perfect Exfiltration Technique Itzik Kotler and Amit Klein
49:06
#HITB2016AMS D1T1 TeLeScope Peering Into The Depths Of TLS Traffic In Real Time Radu Caragea
59:02
#HITB2016AMS D1T2 - Sandjacking Profiting From iOS Malware - Chilik Tamir.mp4
53:10
#HITB2016AMS KEYNOTE 2 - The Future Has Arrived And It s Effin Hilarious - Adam Laurie.mp4
01:05:19
#HITB2016AMS D2T2 - Go Speed Tracer Guided Fuzzing - Richard Johnson.mp4
40:00
#HITB2016AMS D2T2 - Perf From Profiling To Kernel Exploiting - Wish Wu.mp4
14:04
#HITB2016AMS WELCOME ADDRESS - Patricia M Zorko.mp4
58:43
#HITB2016AMS D2T1 - CANsee An Automobile Intrusion Detection System - Jun Li.mp4
27:18
#HITB2016AMS KEYNOTE 1 - Beyond FBI vs Apple What s Next For The Crypto Wars - John Adams.mp4
40:54
#HITB2016AMS - D2T1 - Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.mp4
12:15
#HITB2016AMS - The Women In Cyber Security Woman Of The Year 2016 Award Ceremony.mp4
44:28
#HITB2016AMS D2T2 - Advanced Exploitation Xen Hypervisor VM Escape - Shangcong Luan.mp4
54:18
#HITB2016AMS D2T1 - Attacking Next Generation Firewalls Breaking PAN OS - Felix Wilhelm.mp4
53:49
#HITB2016AMS D2T1 - Cache Side Channel Attacks CPU Design As A Security Problem - Anders Fogh.mp4
51:37
#HITB2016AMS D1T2 - Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.mp4
01:04:04
#HITB2016AMS D1T2 - CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.mp4
53:49
#HITB2016AMS D1T2 - Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.mp4
55:43
#HITB2016AMS D1T2 - Hardsploit Project - Yann Allain and Julien Moinard.mp4
41:46
#HITB2016AMS D1T2 - IRON HID Create Your Own Bad USB Device - Seunghun Han.mp4
51:38
#HITB2016AMS D1T1 - Virtualization System Vulnerability Discovery Framework - Tang Qinghao.mp4
51:21
#HITB2016AMS D1T1 - Exploit Kits Hunting The Hunters - Nick Biasini.mp4
50:01
#HITB2016AMS D1T1 - Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.mp4
38:16
#HITB2016AMS D1T1 Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.mp4
33:54
#HITB2016AMS D1T1 - Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.mp4
30:30
#HITB2016AMS CommSec Track D2 - Inspeckage Android Package Inspector - Antonio Martins.mp4
30:24
#HITB2016AMS CommSec Track D2 - Park This! Yet Another Parking Meter Talk - Paul Moreno.mp4
27:14
#HITB2016AMS CommSec Track D2 - Where Malware Meets Murphy - Mattijs Van Ommeren.mp4
33:30
#HITB2016AMS CommSec Track D1 - Pentesting Chatops - Melanie Rieback.mp4
27:17
#HITB2016AMS CommSec Track D2 - Anatomy Of An APT Attack - Paul Mason.mp4
22:32
#HITB2016AMS CommSec Track D2 - Hack In The Class - Barry Fish van Kampen.mp4
20:40
#HITB2016AMS CommSec Track D2 - Facebook Presents Capture The Flag - Paul Marinescu.mp4
25:08
#HITB2016AMS CommSec Track D1 - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.mp4
23:44
#HITB2016AMS CommSec Track D1 - Don t Feed The Hippos - Martin Knobloch.mp4