TakeDownCon/Take Down Con thank you.txt |
677 B |
TakeDownCon/TakeDownCon 2014 Rocket City/02 Dropping Docs on Darknets How People Got Caught Adrian Crenshaw.mp4 |
73.5 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/03 How Networks are Getting Hacked The Evolution of Network Security Omar Santos.mp4 |
106.1 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/04 Building on Device Vulnerabilities Attack Modes for ICS Bryan Singer.mp4 |
77.3 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/05 Survival in an Evolving Threat Landscape David Hobbs.mp4 |
100.2 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/06 Practical Side Channel Attacks On Modern Browsers Angelo Prado.mp4 |
116.4 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/07 IPv6 Attack tools Scott Hogg.mp4 |
110.1 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/09 Mobile Forensics and Its App Analysis Dr Charline Nixon.en.transcribed.srt |
63 KB |
TakeDownCon/TakeDownCon 2014 Rocket City/09 Mobile Forensics and Its App Analysis Dr Charline Nixon.mp4 |
100.3 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/10 Keynote How Not to do Security Kellman Meghu.mp4 |
155.7 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/12 Hijacking Label Switched Networks in the Cloud Paul Coggin.mp4 |
52.3 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/13 Shepherds Pi Herding Sheep with a Raspberry Pi Timothy Mulligan.en.transcribed.srt |
35 KB |
TakeDownCon/TakeDownCon 2014 Rocket City/13 Shepherds Pi Herding Sheep with a Raspberry Pi Timothy Mulligan.mp4 |
33.9 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/14 Radio Hack Shack Security Analysis of the Radio Transmission Paula Januszkiewicz.en.transcribed.srt |
66 KB |
TakeDownCon/TakeDownCon 2014 Rocket City/14 Radio Hack Shack Security Analysis of the Radio Transmission Paula Januszkiewicz.mp4 |
94.9 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/15 IT Security Myths How you are helping your enemy Joe Vest.mp4 |
94.7 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/16 Splinter the RAT Attack Creating Custom RATs to Exploit the Network Solomon Sonja.en.transcribed.srt |
95 KB |
TakeDownCon/TakeDownCon 2014 Rocket City/16 Splinter the RAT Attack Creating Custom RATs to Exploit the Network Solomon Sonja.mp4 |
95.6 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/17 Policy Defined Segmentation with Metadata Scott Kirby.en.transcribed.srt |
56 KB |
TakeDownCon/TakeDownCon 2014 Rocket City/17 Policy Defined Segmentation with Metadata Scott Kirby.mp4 |
61.7 MB |
TakeDownCon/TakeDownCon 2014 Rocket City/18 Cyber Attack Mitigation Christopher Elisan.mp4 |
75.4 MB |