BITCQ

ShmooCon

Size: 45.8 GB
Magnet link

Name Size
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/45167485_20676abaec.jpg 146 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/Building an Enterprise Class Surveillance System ver 3.2.ppt 10.2 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/Church of WiFi.odp 115 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/Presentation Index.txt 2 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/Shmoo2006-Butti-Veysset-WiFi-1.pdf 829 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/ShmooCon 2006 Amini-Eagle.ppt 377 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/ShmooCon 2006 Asterisk Presentation.ppt 2.5 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/bejtlich_bianco_nsm-sguil_shmoocon06_13jan06.ppt 5 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/bitchslapping.wids.ppt 497 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/cowpatty-3.0.tgz 65 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/fwknop-0.9.6.tar.bz2 321 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/geer.shmoocon.13i06.mp4 1.2 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/now-you-do-it.JPG 145 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/presentation.html 2 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/shmoocon-2006-sn.ppt 838 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/shmoocon_2k6_ejsmith_layer2.pdf 3.7 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/shmoocon_Jim Noble.pps 2.6 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/shmoocon_LanceJames.ppt 787 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/shmoocon_fwknop.pdf 121 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/shmoocon_preso_voip_wifi_phone_merdinger.pdf 697 KB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Presentations/webapphack.pdf 1.7 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Abend-MagCards.mp4 50.7 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Acidus-Covert.mp4 53.7 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/AminiEagle-RE.mp4 49.3 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Anonym.os.mp4 50.5 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Beetle-Own.mp4 55.4 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Beetle-Own.mp4.mp4 55.4 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Bejtlich-Squil.mp4 50.7 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Butti-WiFi.mp4 52.9 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Callas-Disclosure.mp4 50.3 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Cazz-snort.mp4 51.2 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/ChurchOfWiFi.mp4 48.2 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Dunin-Kryptos.mp4 55.5 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Fisher-Web.mp4 50 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Fyodor-nmap.mp4 49.1 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Granick-Liberties.mp4 62.9 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/James-Trojans.mp4 51.3 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Kaminsky-BlackOps.mp4 54.1 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Long-HollywoodANDClosing.mp4 105.8 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Marinescu-Heap.mp4 49.7 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Merdinger-VOIP.mp4 49 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Nomad-Sky.mp4 53.7 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Ollam-Lockpicking.mp4 109.1 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Rash-SinglePacket.mp4 51.4 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Smith-Layer2.mp4 51.9 MB
ShmooCon/ShmooCon 2006/ShmooCon 2006 Videos/Sprickerhoff-WIDS.mp4 51.4 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/0wn the Con - The Shmoo Group.mp4 66.7 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/A Hacker Looks at 50 - G. Mark Hardy.mp4 71.3 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Assess the security of your online back without going to jail - Chuck Willis.mp4 62.6 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Attack Detection and Response with Linux Firewalls - Michael Rash.mp4 65.5 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Auditing Cached Credentials with Cachedump - Eoin Miller and Adair Collins.mp4 29.5 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Backbone Fuzzing - Raven.mp4 49.5 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Boomstick-Fu The Fundamentals of Physical Security at its Most Basic Level- Deviant Ollam, Noid and Thorn.mp4 33 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Bypassing NAC Systems (Part II) - Ofir Arkin.mp4 63.8 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Dissecting ShmooCon Labs - The Shmoo Group.mp4 69.1 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Encrypted Protocol Identification via Statistical Analysis - Rob King and Rohlt Dhamankar.mp4 50.6 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Extend Your Code Into the Real World - Ryan Clarke.mp4 62.1 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Hacker Potpourri - Simple Nomad.mp4 64.4 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Hacking Digital Cameras - John Maushammer.mp4 64.4 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Hacking the Airwaves with FPGAs - h1kari.mp4 30.6 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/JavaScript Malware for a Grey Goo Tomorrow - Billy Hoffman.mp4 65 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/No-Tech Hacking - Johnny Long.mp4 37.6 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/OLPC Panel An Examination of OLPC Security and the Impact on Society - Sean Coyne, Ivan Krstic, Jason Scott, Scott Roberts.mp4 85.1 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Opening Remarks.mp4 41.6 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/RFIDiots - Major Malfunction.mp4 69.6 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Security Breaches are Good for You - Adam Shostack.mp4 34.8 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Standard Bodies - What are these Guys Drinking - Al Potter, Renderman, and Russ Housley.mp4 67.3 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/The Church of WiFi presents A Hacker in Iraq - Michael Schearer.mp4 54.7 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/The Hacker Foundation - The Ethic in Action - Jesse Krembs and Nick Farr.mp4 59.2 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Three Crypto Geeks on the Current State of Cryptography and the Internet - Rodney Thayer, Jon Callas and Ben Laurie.mp4 67.8 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/VOIP, Vonage, and Why I Hate Asterisk - Joel Bruno and Eric Smith.mp4 44.3 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Vulnerability Disclosure Panel Palaver (or 0-day OK, No Way, or For Pay) - Katie Moussouris.mp4 59.8 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/WPAD - Proxy Attack - Chris Paget.mp4 65.5 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Weaponizing Noam Chomsky, or Hacking with Pattern Languages - Dan Kaminsky.mp4 66 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Web Application Incident Preparation - Matt Fisher, Cygnus and PresMike.mp4 53.5 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Windows Mobile Software Raw and Exposed - Seth Fogie.mp4 61.5 MB
ShmooCon/ShmooCon 2007/ShmooCon 2007 Videos/Wireless (and Wired) Networks at Security Cons - Luiz Eduardo.mp4 62.7 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/21st Century Shellcode for Solaris 1 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/21st Century Shellcode for Solaris 2 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/21st Century Shellcode for Solaris 3 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/21st Century Shellcode for Solaris 4 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/21st Century Shellcode for Solaris 5 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/21st Century Shellcode for Solaris 6 6.mp4 9.5 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Baked not Fried Performing an Unauthorized Phishing Awareness Exercise 1 3.mp4 18.7 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Baked not Fried Performing an Unauthorized Phishing Awareness Exercise 2 3.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Baked not Fried Performing an Unauthorized Phishing Awareness Exercise 3 3.mp4 16.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forced Internet Condom 1 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forced Internet Condom 2 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forced Internet Condom 3 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forced Internet Condom 4 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forced Internet Condom 5 6.mp4 18.8 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forced Internet Condom 6 6.mp4 6 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forensic Image Analysis to Recover Passwords 1 3.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forensic Image Analysis to Recover Passwords 2 3.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Forensic Image Analysis to Recover Passwords 3 3.mp4 9.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Got Citrix Hack It! 1 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Got Citrix Hack It! 2 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Got Citrix Hack It! 3 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Got Citrix Hack It! 4 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Got Citrix Hack It! 5 5.mp4 2 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Hacking Windows Vista Security 1 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Hacking Windows Vista Security 2 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Hacking Windows Vista Security 3 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Hacking Windows Vista Security 4 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Hacking Windows Vista Security 5 5.mp4 18 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/How do I Pwn Thee Let Me Count the Ways 1 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/How do I Pwn Thee Let Me Count the Ways 2 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/How do I Pwn Thee Let Me Count the Ways 3 5.mp4 18.8 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/How do I Pwn Thee Let Me Count the Ways 4 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/How do I Pwn Thee Let Me Count the Ways 5 5.mp4 12 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Live Demo from Backtrack to the MAX 1 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Live Demo from Backtrack to the MAX 2 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Live Demo from Backtrack to the MAX 3 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Live Demo from Backtrack to the MAX 4 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Live Demo from Backtrack to the MAX 5 5.mp4 9.2 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Malware Software Armoring Circumvention 1 5.mp4 20 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Malware Software Armoring Circumvention 2 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Malware Software Armoring Circumvention 3 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Malware Software Armoring Circumvention 4 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Malware Software Armoring Circumvention 5 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/On the Social Respnsbility of Hackers 1 7.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/On the Social Respnsbility of Hackers 2 7.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/On the Social Respnsbility of Hackers 3 7.mp4 19 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/On the Social Respnsbility of Hackers 4 7.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/On the Social Respnsbility of Hackers 5 7.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/On the Social Respnsbility of Hackers 6 7.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/On the Social Respnsbility of Hackers 7 7.mp4 7.8 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/PEAP Pwned Extensible Authentication Protocol 1 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/PEAP Pwned Extensible Authentication Protocol 2 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/PEAP Pwned Extensible Authentication Protocol 3 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/PEAP Pwned Extensible Authentication Protocol 4 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/PEAP Pwned Extensible Authentication Protocol 5 5.mp4 10.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Path X Explosive Security Testing Tools using XPath 1 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Path X Explosive Security Testing Tools using XPath 2 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Path X Explosive Security Testing Tools using XPath 3 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Path X Explosive Security Testing Tools using XPath 4 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Path X Explosive Security Testing Tools using XPath 5 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Practical Hacker Crypto 1 7.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Practical Hacker Crypto 2 7.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Practical Hacker Crypto 3 7.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Practical Hacker Crypto 4 7.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Practical Hacker Crypto 5 7.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Practical Hacker Crypto 6 7.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Practical Hacker Crypto 7 7.mp4 8.8 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/SIPing Your Network 1 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/SIPing Your Network 2 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/SIPing Your Network 3 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/SIPing Your Network 4 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/SIPing Your Network 5 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/SIPing Your Network 6 6.mp4 5.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/TL1 Device Security 1 3.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/TL1 Device Security 2 3.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/TL1 Device Security 3 3.mp4 18.4 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes 1 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes 2 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes 3 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes 4 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes 5 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes 6 6.mp4 5.4 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Using Aspect Oriented Programming to Prevent Application Attacks 1 6.mp4 18.8 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Using Aspect Oriented Programming to Prevent Application Attacks 2 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Using Aspect Oriented Programming to Prevent Application Attacks 3 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Using Aspect Oriented Programming to Prevent Application Attacks 4 6.mp4 16.4 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Using Aspect Oriented Programming to Prevent Application Attacks 5 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Using Aspect Oriented Programming to Prevent Application Attacks 6 6.mp4 3.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Virtual Worlds - Real Exploits 1 6.mp4 18.5 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Virtual Worlds - Real Exploits 2 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Virtual Worlds - Real Exploits 3 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Virtual Worlds - Real Exploits 4 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Virtual Worlds - Real Exploits 5 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Virtual Worlds - Real Exploits 6 6.mp4 9.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/VoIP Penetration Testing Lessons Learned 1 5.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/VoIP Penetration Testing Lessons Learned 2 5.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/VoIP Penetration Testing Lessons Learned 3 5.mp4 20.2 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/VoIP Penetration Testing Lessons Learned 4 5.mp4 20.2 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/VoIP Penetration Testing Lessons Learned 5 5.mp4 5.8 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Why are Databases so Hard to Secure 1 6.mp4 18.8 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Why are Databases so Hard to Secure 2 6.mp4 18.9 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Why are Databases so Hard to Secure 3 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Why are Databases so Hard to Secure 4 6.mp4 14.3 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Why are Databases so Hard to Secure 5 6.mp4 14.4 MB
ShmooCon/ShmooCon 2008/ShmooCon 2008 Videos/Why are Databases so Hard to Secure 6 6.mp4 6.8 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/10 Things About Hard Drives Part 1 6.mp4 15.7 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/10 Things About Hard Drives Part 2 6.mp4 16.6 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/10 Things About Hard Drives Part 3 6.mp4 18.2 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/10 Things About Hard Drives Part 4 6.mp4 18.1 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/10 Things About Hard Drives Part 5 6.mp4 16.8 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/10 Things About Hard Drives Part 6 6.mp4 15.5 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/802.11 obgyn 1 5.mp4 24.8 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/802.11 obgyn 2 5.mp4 29.3 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/802.11 obgyn 3 5.mp4 25.1 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/802.11 obgyn 4 5.mp4 29.3 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/802.11 obgyn 5 5.mp4 7.4 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/FastTrack 1 5.mp4 27.2 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/FastTrack 2 5.mp4 27.3 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/FastTrack 3 5.mp4 25.2 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/FastTrack 4 5.mp4 26.5 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/FastTrack 5 5.mp4 94 KB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/building wireless sensor hardware and software 1 6.mp4 28.9 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/building wireless sensor hardware and software 2 6.mp4 22.9 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/building wireless sensor hardware and software 3 6.mp4 25 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/building wireless sensor hardware and software 4 6.mp4 29.3 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/building wireless sensor hardware and software 5 6.mp4 29.2 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/building wireless sensor hardware and software 6 6.mp4 6.1 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/wireless recon visualizing the airwaves 1 5.mp4 17.5 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/wireless recon visualizing the airwaves 2 5.mp4 17.7 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/wireless recon visualizing the airwaves 3 5.mp4 17.6 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/wireless recon visualizing the airwaves 4 5.mp4 18.9 MB
ShmooCon/ShmooCon 2009/ShmooCon 2009 Videos/wireless recon visualizing the airwaves 5 5.mp4 8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 An Existential Threat To Security As We Know It 1 6.mp4 12.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 An Existential Threat To Security As We Know It 2 6.mp4 11.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 An Existential Threat To Security As We Know It 3 6.mp4 9.7 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 An Existential Threat To Security As We Know It 4 6.mp4 11.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 An Existential Threat To Security As We Know It 5 6.mp4 9.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 BaSO4 A Dynamic Dataflow Analysis Tool for Auditing and Reversing 1 5.mp4 14.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 BaSO4 A Dynamic Dataflow Analysis Tool for Auditing and Reversing 2 5.mp4 13 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 BaSO4 A Dynamic Dataflow Analysis Tool for Auditing and Reversing 3 5.mp4 13.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 BaSO4 A Dynamic Dataflow Analysis Tool for Auditing and Reversing 4 5.mp4 15.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 BaSO4 A Dynamic Dataflow Analysis Tool for Auditing and Reversing 5 5.mp4 7.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Back to the Glass House 1 6.mp4 18.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Back to the Glass House 2 6.mp4 27.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Back to the Glass House 3 6.mp4 22.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Back to the Glass House 4 6.mp4 22.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Back to the Glass House 5 6.mp4 24 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Back to the Glass House 6 6.mp4 3.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Becoming Jack Flack Real Life Cloak & Dagger 1 6.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Becoming Jack Flack Real Life Cloak & Dagger 2 6.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Becoming Jack Flack Real Life Cloak & Dagger 3 6.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Becoming Jack Flack Real Life Cloak & Dagger 4 6.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Becoming Jack Flack Real Life Cloak & Dagger 5 6.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Becoming Jack Flack Real Life Cloak & Dagger 6 6.mp4 5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Better Approaches to Physical Tamper Detection 1 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Better Approaches to Physical Tamper Detection 2 6.mp4 18.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Better Approaches to Physical Tamper Detection 3 6.mp4 16.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Better Approaches to Physical Tamper Detection 4 6.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Better Approaches to Physical Tamper Detection 5 6.mp4 16.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Better Approaches to Physical Tamper Detection 6 6.mp4 6.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Blackberry Mobile Spyware - The Monkey Steals the Berries 1 6.mp4 20 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Blackberry Mobile Spyware - The Monkey Steals the Berries 2 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Blackberry Mobile Spyware - The Monkey Steals the Berries 3 6.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Blackberry Mobile Spyware - The Monkey Steals the Berries 4 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Blackberry Mobile Spyware - The Monkey Steals the Berries 5 6.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Blackberry Mobile Spyware - The Monkey Steals the Berries 6 6.mp4 14 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Bluetooth Keyboards Who Owns Your Keystrokes 1 5.mp4 14.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Bluetooth Keyboards Who Owns Your Keystrokes 2 5.mp4 14.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Bluetooth Keyboards Who Owns Your Keystrokes 3 5.mp4 14.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Bluetooth Keyboards Who Owns Your Keystrokes 4 5.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Bluetooth Keyboards Who Owns Your Keystrokes 5 5.mp4 13.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Build your own Predator UAV @ 99.95% Discount 1 6.mp4 29.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Build your own Predator UAV @ 99.95% Discount 2 6.mp4 29.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Build your own Predator UAV @ 99.95% Discount 3 6.mp4 24.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Build your own Predator UAV @ 99.95% Discount 4 6.mp4 32.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Build your own Predator UAV @ 99.95% Discount 5 6.mp4 29.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Build your own Predator UAV @ 99.95% Discount 6 6.mp4 25.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cracking the Foundation Attacking WCF Web Services 1 5.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cracking the Foundation Attacking WCF Web Services 2 5.mp4 18.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cracking the Foundation Attacking WCF Web Services 3 5.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cracking the Foundation Attacking WCF Web Services 4 5.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cracking the Foundation Attacking WCF Web Services 5 5.mp4 13.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cyborg Information Security Defense Against the Dark Arts 1 5.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cyborg Information Security Defense Against the Dark Arts 2 5.mp4 17.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cyborg Information Security Defense Against the Dark Arts 3 5.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cyborg Information Security Defense Against the Dark Arts 4 5.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Cyborg Information Security Defense Against the Dark Arts 5 5.mp4 3.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 DIY Hard Drive Diagnostics Understanding a Broken Drive 1 7.mp4 21.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 DIY Hard Drive Diagnostics Understanding a Broken Drive 2 7.mp4 24.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 DIY Hard Drive Diagnostics Understanding a Broken Drive 3 7.mp4 21.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 DIY Hard Drive Diagnostics Understanding a Broken Drive 4 7.mp4 21.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 DIY Hard Drive Diagnostics Understanding a Broken Drive 5 7.mp4 24.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 DIY Hard Drive Diagnostics Understanding a Broken Drive 6 7.mp4 21.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 DIY Hard Drive Diagnostics Understanding a Broken Drive 7 7.mp4 13.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 De Gustibus - The Science Behind Taste 1 6.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 De Gustibus - The Science Behind Taste 2 6.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 De Gustibus - The Science Behind Taste 3 6.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 De Gustibus - The Science Behind Taste 4 6.mp4 19.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 De Gustibus - The Science Behind Taste 5 6.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 De Gustibus - The Science Behind Taste 6 6.mp4 4.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Exposed More Attacking the Extended Web 1 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Exposed More Attacking the Extended Web 2 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Exposed More Attacking the Extended Web 3 6.mp4 21.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Exposed More Attacking the Extended Web 4 6.mp4 20 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Exposed More Attacking the Extended Web 5 6.mp4 21.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Exposed More Attacking the Extended Web 6 6.mp4 2.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Flying Instruments-Only Legal and Privacy Issues in Cloud Computing 1 5.mp4 20 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Flying Instruments-Only Legal and Privacy Issues in Cloud Computing 2 5.mp4 16.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Flying Instruments-Only Legal and Privacy Issues in Cloud Computing 3 5.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Flying Instruments-Only Legal and Privacy Issues in Cloud Computing 4 5.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Flying Instruments-Only Legal and Privacy Issues in Cloud Computing 5 5.mp4 16.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 GSM SRSLY 1 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 GSM SRSLY 2 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 GSM SRSLY 3 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 GSM SRSLY 4 6.mp4 18.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 GSM SRSLY 5 6.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 GSM SRSLY 6 6.mp4 3.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Information disclosure via P2P networks 1 3.mp4 18.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Information disclosure via P2P networks 2 3.mp4 16.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Information disclosure via P2P networks 3 3.mp4 5.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Infrastructural Weaknesses in Distributed Wireless Communication Services 1 6.mp4 15.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Infrastructural Weaknesses in Distributed Wireless Communication Services 2 6.mp4 14.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Infrastructural Weaknesses in Distributed Wireless Communication Services 3 6.mp4 14.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Infrastructural Weaknesses in Distributed Wireless Communication Services 4 6.mp4 14.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Infrastructural Weaknesses in Distributed Wireless Communication Services 5 6.mp4 14.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Infrastructural Weaknesses in Distributed Wireless Communication Services 6 6.mp4 9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Jsunpack-network Edition Release JavaScript Decoding and Intrusion Detection 1 4.mp4 18.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Jsunpack-network Edition Release JavaScript Decoding and Intrusion Detection 2 4.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Jsunpack-network Edition Release JavaScript Decoding and Intrusion Detection 3 4.mp4 14.7 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Jsunpack-network Edition Release JavaScript Decoding and Intrusion Detection 4 4.mp4 7.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Keynote Closing the TLS Authentication Gap 1 7.mp4 16.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Keynote Closing the TLS Authentication Gap 2 7.mp4 16.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Keynote Closing the TLS Authentication Gap 3 7.mp4 20 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Keynote Closing the TLS Authentication Gap 4 7.mp4 16.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Keynote Closing the TLS Authentication Gap 5 7.mp4 16.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Keynote Closing the TLS Authentication Gap 6 7.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Keynote Closing the TLS Authentication Gap 7 7.mp4 591 KB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Ring -1 vs. Ring -2 Containerizing Malicious SMM Interupt Handlers on AMD-V 1 5.mp4 23.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Ring -1 vs. Ring -2 Containerizing Malicious SMM Interupt Handlers on AMD-V 2 5.mp4 9.7 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Ring -1 vs. Ring -2 Containerizing Malicious SMM Interupt Handlers on AMD-V 3 5.mp4 9.7 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Ring -1 vs. Ring -2 Containerizing Malicious SMM Interupt Handlers on AMD-V 4 5.mp4 11 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Ring -1 vs. Ring -2 Containerizing Malicious SMM Interupt Handlers on AMD-V 5 5.mp4 7.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Security Risks in the Next Generation of Offline Web Applications 1 4.mp4 20.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Security Risks in the Next Generation of Offline Web Applications 2 4.mp4 22.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Security Risks in the Next Generation of Offline Web Applications 3 4.mp4 22.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Security Risks in the Next Generation of Offline Web Applications 4 4.mp4 15.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Social Zombies II Your Friends Need More Brains 1 5.mp4 26.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Social Zombies II Your Friends Need More Brains 2 5.mp4 26.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Social Zombies II Your Friends Need More Brains 3 5.mp4 24.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Social Zombies II Your Friends Need More Brains 4 5.mp4 24.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Social Zombies II Your Friends Need More Brains 5 5.mp4 3.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Stealing Guests The VMware Way 1 3.mp4 19.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Stealing Guests The VMware Way 2 3.mp4 16.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Stealing Guests The VMware Way 3 3.mp4 5.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Friendly Traitor Our Software Wants to Kill Us 1 4.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Friendly Traitor Our Software Wants to Kill Us 2 4.mp4 18.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Friendly Traitor Our Software Wants to Kill Us 3 4.mp4 19 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Friendly Traitor Our Software Wants to Kill Us 4 4.mp4 11.7 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The New World of Smartphone Security - What Your iPhone Disclosed About You 1 5.mp4 20 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The New World of Smartphone Security - What Your iPhone Disclosed About You 2 5.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The New World of Smartphone Security - What Your iPhone Disclosed About You 3 5.mp4 20 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The New World of Smartphone Security - What Your iPhone Disclosed About You 4 5.mp4 16.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The New World of Smartphone Security - What Your iPhone Disclosed About You 5 5.mp4 944 KB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Splendiferous Story of Archive Team and the Disappearing Digital Heritage 1 7.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Splendiferous Story of Archive Team and the Disappearing Digital Heritage 2 7.mp4 20 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Splendiferous Story of Archive Team and the Disappearing Digital Heritage 3 7.mp4 16.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Splendiferous Story of Archive Team and the Disappearing Digital Heritage 4 7.mp4 18.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Splendiferous Story of Archive Team and the Disappearing Digital Heritage 5 7.mp4 16.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Splendiferous Story of Archive Team and the Disappearing Digital Heritage 6 7.mp4 16.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 The Splendiferous Story of Archive Team and the Disappearing Digital Heritage 7 7.mp4 5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WLCCP - Analysis of a Potentially Flawed Protocol 1 6.mp4 23.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WLCCP - Analysis of a Potentially Flawed Protocol 2 6.mp4 24.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WLCCP - Analysis of a Potentially Flawed Protocol 3 6.mp4 21.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WLCCP - Analysis of a Potentially Flawed Protocol 4 6.mp4 24.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WLCCP - Analysis of a Potentially Flawed Protocol 5 6.mp4 24.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WLCCP - Analysis of a Potentially Flawed Protocol 6 6.mp4 20.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WiFi Bombs Shaken not Stirred 1 4.mp4 20 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WiFi Bombs Shaken not Stirred 2 4.mp4 16.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WiFi Bombs Shaken not Stirred 3 4.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 WiFi Bombs Shaken not Stirred 4 4.mp4 12.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Wifi Security, or Descending into Depression and Drink 1 3.mp4 16.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Wifi Security, or Descending into Depression and Drink 2 3.mp4 14.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Wifi Security, or Descending into Depression and Drink 3 3.mp4 4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Windows File Pseudonyms Strange filenames and haiku 1 3.mp4 14.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Windows File Pseudonyms Strange filenames and haiku 2 3.mp4 16.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Windows File Pseudonyms Strange filenames and haiku 3 3.mp4 4.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 honeyM A Framework For Virtual Mobile Device Honeyclients 1 4.mp4 25.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 honeyM A Framework For Virtual Mobile Device Honeyclients 2 4.mp4 24.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 honeyM A Framework For Virtual Mobile Device Honeyclients 3 4.mp4 24.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 honeyM A Framework For Virtual Mobile Device Honeyclients 4 4.mp4 10.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Funnypots and Skiddy Baiting 1 2.mp4 22.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Funnypots and Skiddy Baiting 2 2.mp4 17.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks How to Stay Awake for 20 Hours a Day without Turning into a Zombie 1 2.mp4 22.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Payment Application Dont Secure Sh!t (PA-DSS) 1 3.mp4 22.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Payment Application Dont Secure Sh!t (PA-DSS) 2 3.mp4 19.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Payment Application Dont Secure Sh!t (PA-DSS) 3 3.mp4 8.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Pentoo.mp4 18.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Browser Fingerprinting Using a Stopwatch 2 2.mp4 11.7 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks How to Stay Awake for 20 Hours a Day without Turning into a Zombie 2 2.mp4 9.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Influencing Security 1 2.mp4 22.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Influencing Security 2 2.mp4 10.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks SHODAN for Penetration Testers 1 2.mp4 19.5 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks SHODAN for Penetration Testers 2 2.mp4 15.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Shmoocon 2010 Firetalks Browser Fingerprinting Using a Stopwatch 1 2.mp4 24.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Social Engineering Toolkit v0.4 Overview 1 2.mp4 19.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmoocon 2010 Firetalks Social Engineering Toolkit v0.4 Overview 2 2.mp4 22.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Detection of rogue access points using clock skews does it really work 1 6.mp4 14.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Detection of rogue access points using clock skews does it really work 2 6.mp4 15.7 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Detection of rogue access points using clock skews does it really work 3 6.mp4 14.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Detection of rogue access points using clock skews does it really work 4 6.mp4 14.1 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Detection of rogue access points using clock skews does it really work 5 6.mp4 14.2 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Detection of rogue access points using clock skews does it really work 6 6.mp4 3.6 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 How To Be An RSol Effective Bug Hunting in Solaris 1 5.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 How To Be An RSol Effective Bug Hunting in Solaris 2 5.mp4 18.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 How To Be An RSol Effective Bug Hunting in Solaris 3 5.mp4 18.3 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 How To Be An RSol Effective Bug Hunting in Solaris 4 5.mp4 21.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 How To Be An RSol Effective Bug Hunting in Solaris 5 5.mp4 2.8 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Learning by Breaking A New Project for Insecure Web Applications 1 3.mp4 19.9 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Learning by Breaking A New Project for Insecure Web Applications 2 3.mp4 18.4 MB
ShmooCon/ShmooCon 2010/ShmooCon 2010 Videos/Shmooncon 2010 Learning by Breaking A New Project for Insecure Web Applications 3 3.mp4 3.7 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Are you receiving me Recent issues in wifi privacy.mp4 85.4 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Defeating mTANs for profit.mp4 135.8 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Hackers for Charity.mp4 64.1 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Hop Hacking Hedy.mp4 171.2 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Inside the App All Your Data are Belong to Me.mp4 141.7 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Keynote Analytic Framework for Cyber Security.mp4 154.5 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Printer to PWND Leveraging Multifunction Printers During Penetration Testing.mp4 121.1 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Printers Gone Wild!.mp4 85.5 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Project Ubertooth Building a Better Bluetooth Adapter.mp4 137.4 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP.mp4 61.8 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 URL Enlargement Is it for You.mp4 176.6 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 USB Autorun attacks against Linux.mp4 139.2 MB
ShmooCon/ShmooCon 2011/ShmooCon 2011 Videos/ShmooCon 2011 ZigBee Security Find, Fix, Finish.mp4 52.3 MB
ShmooCon/ShmooCon 2012/Dan Tentler Shmoocon 2012.zip 593.1 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/Android_Mind_Reading.pdf 837 KB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/Brad_Bowers_Shmoocon 2012.pdf 5.5 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/Danny_Quist-3dmalware-shmoocon2012.pdf 6.3 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/David_Schuetz_InsideAppleMDM_ShmooCon_2012.pdf 2.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/Jeong_Wook_Oh_AVM Inception - ShmooCon2012.pdf 4.8 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/Keith_Howell_ShmooCon-Jan-2012.pdf 1.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/Paget_shmoocon2012-credit-cards.pdf 629 KB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/Schuetz_BadgeSolution_ClosingSlides.pdf 5.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/ShmooCon-Whack-a-Mobile.pdf 4.9 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/TTL-Penetration-Shmoo.pdf 64.5 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Presentations/Toby_Kohlenberg_Rethinking Security-update 2012-01-11.final.pdf 667 KB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 37mm Aerial Surveillance Romance between a Camera and a Flare Launcher (EN).mp4 92.8 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 A Blackhat s Tool Chest How We Tear Into That Little Green Man (EN).mp4 141.2 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 A Fistful of Fire Hoses Putting out Fires Without Crossing Streams (EN).mp4 77.2 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 A New Model for Enterprise Defense (EN).mp4 106.3 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 AVM Inception How We Can Use AVM Instrumenting in a Beneficial Way (EN).mp4 96 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 All Your Codes Belong To Me! (EN).mp4 96 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 And That s How I Didn t Lose an Eye Emergency Data Destruction (EN).mp4 88.9 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Android Mind Reading Memory Acquisition and Analysis with DMD and Volatility (EN).mp4 104.9 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Closing.mp4 106.3 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Corrupting the Youth (EN).mp4 130.7 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Credit Card Fraud The Contactless Generation (EN).mp4 120.9 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Cyber Fast Track (EN).mp4 85.6 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Destroying Evidence Before Its Evidence (EN).mp4 106.3 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Encryption, Passwords and Data Security Latest on the Law and Best Practices (EN).mp4 85.6 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Fire Talks Friday (EN).mp4 191.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Fire Talks Saturday (EN).mp4 170.6 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 GPS tracking (EN).mp4 115.5 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Gathering all the DNS (EN).mp4 54.9 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Inside Apple s MDM Black Box (EN).mp4 132.8 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Inside the OODA Loop - Towards an Aggressive Defense (EN).mp4 96 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Intro to Near Field Communication (NFC) Mobile Security (EN).mp4 106.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Java backdoors and Cross Framework Abuse (EN).mp4 48.9 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Lessons of the Kobayashi Maru Cheating is Fundamental (EN).mp4 57.3 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Malware Visualization in 3D (EN).mp4 116.6 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Malware as Art Building and Animating Malware Network Graphs (EN).mp4 106.3 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 OPFOR Works Both Ways How Offense and Defense Must Train Each Other (EN).mp4 106.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Opening.mp4 95.7 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Own te Con.mp4 140.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Raising The White Flag (EN).mp4 106.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 SNSCat What You Don t Know About Sometimes Hurts the Most (EN).mp4 95.6 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Sacrificial Computing for Land and Sky (EN).mp4 69.5 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Soft Markers in Attack Attribution (EN).mp4 85.6 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 TTL of a Penetration (EN).mp4 89.1 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 The Science of Insecurity (EN).mp4 142.4 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Training Security Nerds, Faster, Better, Stronger (EN).mp4 68 MB
ShmooCon/ShmooCon 2012/ShmooCon 2012 Videos/ShmooCon 2012 Whack-a-Mobile Getting a Handle on Mobile Testing with MobiSec Live Environment (EN).mp4 136.3 MB
ShmooCon/ShmooCon 2013/Dan Tentler Shmoocon 2013.zip 383.2 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 0wn the con.mp4 154.5 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Apple iOS Certificate Tomfoolery.mp4 47.9 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Armor For Your Android Apps.mp4 131.6 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Attacking Scada Wireless Systems For Fun And Profit - And Fixing.mp4 140.8 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Beyond Nymwars An Analysis Of The Online Identity Battleground.mp4 131.8 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Bright Shiny Things = Why We Need Intelligent Data Access Controls.mp4 126.3 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 C10M -- Defending the Internet At Scale.mp4 126.5 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Chopshop Busting The Gh0St.mp4 156.1 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Crypto You re Doing It Wrong.mp4 166.8 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 DIY Using Trust To Secure Embedded Projects.mp4 136.1 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Fire Talks.mp4 261.5 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Forensics - ExFat Bastardized for Cameras.mp4 139.9 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 From Shotgun Parsers to Better Software Stacks.mp4 148.8 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Generalized Single Packet Authorization For Cloud Computing Environments.mp4 154.7 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Hackers get Schooled Learning Lessons from Academia.mp4 172.9 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Hacking As An Act Of War.mp4 121.9 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Hide And Seek, Post-Exploitation Style.mp4 78.7 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 How Smart Is Bluetooth Smart.mp4 123.6 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 How To Own A Building Exploiting the Physical World With Bacnet.mp4 59.7 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Identity-Based Internet Protocol Network.mp4 104 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Is Practical Information Sharing Possible.mp4 130.5 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Ka-Ching! How To Make Real Money.mp4 156.9 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Mainframed The Secrets Inside That Black Box.mp4 69.3 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Malware Analysis Collaboration, Automation & Training.mp4 109.1 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Moloch A New And Free Way To Index Your Packet Capture Repository.mp4 125.1 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 NSM And More With Bro Network Monitor.mp4 170.8 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Opening Remarks & Rants.mp4 123.9 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Openstack Security Brief.mp4 115.7 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Page Fault Liberation Army Or Better Security Through Trapping.mp4 90 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Paparazzi Over IP.mp4 153.4 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Protecting Sensitive Information on iOS Devices.mp4 130.1 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 PunkSPIDER An Open Source, Scalable Distributed Fuzzing Project.mp4 141.4 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Running a CTF Panel and Discussion on the Art of Hacker Gaming.mp4 138.6 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Ten Strategies of a World-Class Computer Security Incident Response Team.mp4 98.4 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 The Cloud - Storms On The Horizon.mp4 132.2 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 The Computer Fraud and Abuse Act Swartz, Auernheimer, and Beyond.mp4 147.9 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 These Go to Eleven When the Law Goes Too Far.mp4 112.8 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 Wipe The Drive!!! - Techniques For Malware Persistence.mp4 65 MB
ShmooCon/ShmooCon 2013/ShmooCon 2013 Videos/ShmooCon 2013 astiff Automated Static Analysis Framework.mp4 144.3 MB
ShmooCon/ShmooCon 2014/Dan Tentler Shmoocon 2014.zip 416.7 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 0wn the Con.mp4 146.3 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 A Critical Review of Spatial Analysis.mp4 114.8 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 ADD -- Complicating Memory Forensics Through Memory Disarray.mp4 136.3 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 AV Evasion With the Veil Framework.mp4 128.4 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 An Open and Affordable USB Man in the Middle Device.mp4 100.5 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Arms Race The Story of (In)-Secure Bootloaders.mp4 95 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Attacker Ghost Stories Mostly Free Defenses That Give Attackers Nightmares.mp4 52.1 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 CCTV Setup, Attack Vectors, and Laws.mp4 73.8 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Closing Plenary - Large Scale Network and Application Scanning.mp4 122.1 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Closing Remarks.mp4 224.1 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Controlling USB Flash Drive Controllers Expose of Hidden Features.mp4 102.8 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Data Whales and Troll Tears Beat the Odds in InfoSec.mp4 103 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Dissipation of Hackers in the Enterprise.mp4 68.9 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Fire Talks (friday).mp4 301.8 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Fire Talks (saturday).mp4 222.4 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Genuinely Trusted Computing Free and Open Hardware Security Modules.mp4 108.8 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 History of Bletchley Park and How They Invented Cryptography and the Computer Age.mp4 96.9 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 How Hackers for Charity (Possibly) Saved Me a Lot of Money.mp4 59.4 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 How to Train your Snapdragon Exploring Power Frameworks on Android.mp4 102.2 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 ISP s Unauthenticated SOAP Service = Find (Almost) All The Things!.mp4 115.6 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Introducing DARPA s Cyber Grand Challenge.mp4 94.7 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Introducing idb - Simplified Blackbox iOS App Pentesting.mp4 112.5 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Keynote - Privacy Online What Now.mp4 124.7 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 LTE vs. Darwin.mp4 124.1 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Malicious Online Activities Related to the 2012 U.S. General Election.mp4 102.1 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Malicious Threats, Vulnerabilities in Mobile Instant Messaging Platforms.mp4 101.5 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Opening Remarks, Rumblings, and Rants.mp4 157.8 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Operationalizing Threat Information Sharing Beyond Policies and Platitudes.mp4 127.2 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Practical Applications of Data Science in Detection.mp4 138.4 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Raising Costs for Your Attackers Instead of Your CFO.mp4 106.6 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 SafeCurves Choosing Safe Curves for Elliptic-Curve Cryptography.mp4 164.9 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Security Analytics Less Hype, More Data.mp4 62.1 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Syncing Mentorship Between Winners And Beginners.mp4 115.4 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Technology Law Issues for Security Professionals.mp4 131.8 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 The Science of Cyber and the Next Generation of Security Tools.mp4 98.9 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 The NSA Capabilities and Countermeasures.mp4 125.4 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Timing-Based Attestation Sexy Defense, or the Sexiest.mp4 149.7 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Unambiguous Encapsulation - Separating Data and Signaling.mp4 109.1 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 Vehicle Forensics - The Data Beyond the Dashboard.mp4 91.3 MB
ShmooCon/ShmooCon 2014/ShmooCon 2014 Videos/ShmooCon 2014 You Don t Have the Evidence.mp4 162.6 MB
ShmooCon/ShmooCon 2015/Dan Tentler Shmoocon 2015.zip 182.3 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/0wn the Con [SC2015].mp4 131.3 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/5 Usability [SC2015].mp4 42.4 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Analyzing POS Malware [SC2015].mp4 90 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Ask EFF [SC2015].mp4 159.1 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Automated Binary Analysis with Pin and Python [SC2015].mp4 108.2 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/BIOS Bugs [SC2015].mp4 58.9 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Closing Remarks [SC2015].mp4 169.6 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Cockroach Analysis [SC2015].mp4 101.3 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/College Hacking [SC2015].mp4 92.8 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Come to the Dark Side [SC2015].mp4 74.9 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Crypto [SC2015].mp4 80.3 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Dark Art of Data Visualization [SC2015].mp4 86.7 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Deception for the Cyber Defender [SC2015].mp4 109.5 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Eliminating Timing Side Channel Attacks [SC2015].mp4 96.1 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Get off my lawn [SC2015].mp4 173.9 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/How Random Is Your RNG [SC2015].mp4 103.9 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Infrastructure Tracking [SC2015].mp4 210 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Keynote [SC2015].mp4 145.6 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Knock Knock [SC2015].mp4 83 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Malicious Image Spam [SC2015].mp4 40.4 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Manually Searching Advisories and Blogs for Threat Data [SC2015].mp4 164 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Micronesia [SC2015].mp4 114.9 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/NSA USB Playset [SC2015].mp4 111.8 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/NaCl Crypto Library [SC2015].mp4 100.8 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/No Budget Threat Intel [SC2015].mp4 141.9 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Opening Rants [SC2015].mp4 163.8 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Practical Machine Learning for Network Security [SC2015].mp4 148.2 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Quantum Computing [SC2015].mp4 104.8 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Rethinking Securitys Role in CompSci Edu [SC2015].mp4 111.6 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/SEWIFI [SC2015].mp4 43.9 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Saturday Firetalks [SC2015].mp4 294.6 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Tap On Tap Off [SC2015].mp4 112.1 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/The Joy of Intelligent Proactive Security [SC2015].mp4 180.7 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Understanding a New Memory Corruption Defense [SC2015].mp4 161.5 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Userland Persistance [SC2015].mp4 37.2 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Where The Wild Things Are [SC2015].mp4 93.9 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Wheres Waldo [SC2015].mp4 155.7 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/White is the New Black [SC2015].mp4 65.5 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Whitelisting Evasion [SC2015].mp4 46.3 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/Windows Sandbox Paradox [SC2015].mp4 112.7 MB
ShmooCon/ShmooCon 2015/ShmooCon 2015 Videos/httpscreenshot [SC2015].mp4 117.2 MB
ShmooCon/ShmooCon 2016/#thingswikfound #omarax What Is It And Why You May Care.mp4 31.6 MB
ShmooCon/ShmooCon 2016/(P G) Ohst Exploitation.mp4 29.5 MB
ShmooCon/ShmooCon 2016/0wn The Con.mp4 70.5 MB
ShmooCon/ShmooCon 2016/Ask the EFF.mp4 70.7 MB
ShmooCon/ShmooCon 2016/Attack On Titans.mp4 46.7 MB
ShmooCon/ShmooCon 2016/Av Leak.mp4 70 MB
ShmooCon/ShmooCon 2016/Be Free Little Guardbunny.mp4 57.4 MB
ShmooCon/ShmooCon 2016/Breaking Bulbs Briskly By Bogus Broadcasts 1.mp4 23.6 MB
ShmooCon/ShmooCon 2016/Building An Encyclopedia Of Malware Configs.mp4 55.6 MB
ShmooCon/ShmooCon 2016/Closing Infosec Programs In Academia.mp4 84.3 MB
ShmooCon/ShmooCon 2016/Compressed Context Analytical Results For Computer Vision.mp4 54.7 MB
ShmooCon/ShmooCon 2016/Containing An Attack With Linux Containers.mp4 60.3 MB
ShmooCon/ShmooCon 2016/Crypto And Quantum And Post Quantum.mp4 27 MB
ShmooCon/ShmooCon 2016/Dan Tentler Shmoocon 2016.zip 405.6 MB
ShmooCon/ShmooCon 2016/Exploiting Memory Corruption.mp4 52 MB
ShmooCon/ShmooCon 2016/Gatekeeper Exposed.mp4 43.9 MB
ShmooCon/ShmooCon 2016/Hacking The Wireless World.mp4 46.5 MB
ShmooCon/ShmooCon 2016/Hiding From The Investigator.mp4 17.3 MB
ShmooCon/ShmooCon 2016/Keynote Address.mp4 90.4 MB
ShmooCon/ShmooCon 2016/LTE Security Protocol Exploits.mp4 46.8 MB
ShmooCon/ShmooCon 2016/Lostpass.mp4 37.6 MB
ShmooCon/ShmooCon 2016/Making Milware.mp4 67.5 MB
ShmooCon/ShmooCon 2016/My Hash Is My Passport.mp4 51.7 MB
ShmooCon/ShmooCon 2016/No Easy Breach.mp4 70.2 MB
ShmooCon/ShmooCon 2016/Online No One Knows Youre Dead.mp4 68.5 MB
ShmooCon/ShmooCon 2016/Opening Remarks Rumblings Ruminatons Rants.mp4 90.1 MB
ShmooCon/ShmooCon 2016/Osx Vulnerability Research And Why We Wrote Our Own Debugger.mp4 49.3 MB
ShmooCon/ShmooCon 2016/Penetration Testing Custom Tls Stacks.mp4 47.4 MB
ShmooCon/ShmooCon 2016/Resistance Is Futile.mp4 49.1 MB
ShmooCon/ShmooCon 2016/Reverse Engineering Wireless Scada Systems.mp4 41.1 MB
ShmooCon/ShmooCon 2016/Software Security By The Numbers.mp4 51.8 MB
ShmooCon/ShmooCon 2016/Speak Security And Enter.mp4 73.4 MB
ShmooCon/ShmooCon 2016/Static Malware Smtp Fail Analysis.mp4 28.3 MB
ShmooCon/ShmooCon 2016/The Road To System.mp4 38.5 MB
ShmooCon/ShmooCon 2016/Users Are People Too.mp4 65.8 MB
ShmooCon/ShmooCon 2016/Using The Algebraic Eraser To Secure Low Power Devices.mp4 56.3 MB
ShmooCon/ShmooCon 2016/Where Do The Phishers Live.mp4 23 MB
ShmooCon/ShmooCon 2016/You Aint Seen Nothing Yet.mp4 82 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - 0wn The Con 2017.mp4 241.6 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - 35 Years of CyberWar.mp4 78.9 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - A Content-Aware Kernel IPC Firewall For Android.mp4 253.2 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - A Widening Attack Plain.mp4 200.4 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Anti-Ransomware Prevention.mp4 281.8 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Ask The Feds.mp4 216.7 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Ask the EFF.mp4 197.2 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Can A Drunk Person Authenticate Using Brain Waves.mp4.mp4 71.4 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Challenges and Opportunities Application Containers.mp4.mp4 181.1 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Closing Remarks.mp4 268.7 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - CoreOS Arbitrary Code.mp4 217.3 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Cyborg Self Hacking.mp4 87.7 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Defeating Sandbox Evasion.mp4 212.1 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Designing and Executing The First All-Computer Hacking Competition.mp4 209.6 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Dig Out Your Brick Phone.mp4 197.9 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Does A Bear Leak In The Woods.mp4.mp4 227.6 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Excuse Me Server Do You Have The Time.mp4.mp4 200.7 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Exploring The Infrared World.mp4.mp4 214.3 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Flailing Is Learning.mp4.mp4 212.4 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Friday Night Fire talks.mp4.mp4 463.6 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Goodnight Moon The House Of Horrors.mp4.mp4 202.8 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - H_cek.mp4 163.6 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - I Have A Graphdb Now What.mp4.mp4 175.7 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Implantable Logic Analyzers Unlocking Doors.mp4.mp4 89.2 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Insecure Messaging With Scimp And Omemo.mp4 167.3 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Introducing Jak.mp4 88.3 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Keynote - Seven Things.mp4 211.2 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Langsec For Pen Testing.mp4.mp4 205.4 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Leveraging Threat Intel Disinformation Campaigns.mp4.mp4 150.9 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Metadata Is The Message And The MessageIs The Metadata.mp4 212.2 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Nickle Tour Of The Ad Fraud Ecosystem.mp4.mp4 225.4 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Plug-in Electric Vehicle Fingerprinting.mp4.mp4 166.1 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Quick Dirty Arm Emulation.mp4.mp4 83.8 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Ripr.mp4 186.2 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Safety Bot Guaranteed.mp4 190.4 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - So You Want To Hack Radios.mp4 74 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - The State Of Secure Messaging.mp4.mp4 210.7 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - U2f Zero.mp4.mp4 86.5 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - User-focused Security At Netflix.mp4.mp4 109.5 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Wave Converter.mp4 196.5 MB
ShmooCon/ShmooCon 2017/ShmooCon2017 - Welcome.mp4 273 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-0wnTheCon.mp4 258.1 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-ASocialScienceApproachToCybersecurityEducation.mp4 82.1 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-Afl-unicornFuzzingTheUnfuzzable.mp4 106.5 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-AwsHoneyTokensWithSpacecrab.mp4 79.9 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-BetterGitHacking.mp4 46.5 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-BlinkForYourPasswordBlinkAwayYourCivilRights.mp4 98.3 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-BuildingAbsurdChristmasLightShows.mp4 200.2 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-CatchMeIfYouCan.mp4 210.6 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-Certgraph.mp4 96.5 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-CitlQuantitativeComparableSoftwareRiskReporting.mp4 213.2 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-ClosingRemarks.mp4 281 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-CyberlawYearInReview.mp4 89.3 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-Debates.mp4 225.5 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-DeepLearningForRealtimeMalwareDetection.mp4 153.1 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-DefendingAgainstRobotAttacks.mp4 200.7 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-DontIgnoreGdprItMattersNow.mp4 114.6 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-ElectronicVotingIn2018ThreatOrMenace.mp4 211.9 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-EmbeddedDeviceVulnerabilityAnalysisCaseStudyUsingTrommel.mp4 127.5 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-FridayNightFireTalks-1.mp4 633.8 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-FridayNightFireTalks-2.mp4 87.4 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-GettingCozyWithOpenbsmAuditingOnMacos.mp4 171.1 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-HackingTheNewsAnInfosecGuideToTheMediaAndHowToTalkToThem.mp4 197.9 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-IotRceAStudyWithDisneyaudioMissingTill3rdMinute.mp4 208.6 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-Keynote.mp4 228.9 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-ListingThe1337.mp4 89.8 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-OkGoogleTellMeAboutMyselfpart.mp4 67.6 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-OpeningClosedSystemsWithGlitchkit.mp4 204.3 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-OpeningRemarksRumblingsRuminationsAndRants.mp4 257.2 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-ProfilingAndDetectingAllThingsSslWithJa3.mp4 209.6 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-Pseudo-dopplerRedux.mp4 104.1 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-Radare2InConversation.mp4 77.6 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-RunningAMarathonWithoutBreakingASweat.mp4 80.8 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-SecuringBareMetalHardwareAtScale.mp4 208.4 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-SigintOnABudget.mp4 219.6 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-SkillBuildingByRevisitingPastCves.mp4 88.8 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-SomeoneIsLyingToYouOnTheInternet.mp4 75 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-TapTapIsThisThingOnTestingEdrCapabilities.mp4 83.3 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-TheFriedmanTombstone.mp4 82.1 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-ThisIsNotYourGrandfathersSiem.mp4 206.1 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-TimeSignatureBasedMatching...InCyberRelevantLogs.mp4 92.8 MB
ShmooCon/ShmooCon 2018/Shmoocon2018-WhenCanCant.mp4 199 MB
ShmooCon/ShmooCon logo.jpg 15 KB
ShmooCon/ShmooCon thank you.t.txt 741 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
ShmooCon Video 52.7 GB 6
ShmooCon Video 45.8 GB 2
ShmooCon Video 49.9 GB 1

Loading...