NorthSec/NorthSec 2015/NorthSec 2015 - Chris Prince - Privacy, Surveillance & Oversight.mp4 |
51.5 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Dave Lewis - DDoS Barbarians at the Gate.mp4 |
49.6 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Eric Evenchick - Hopping on the CAN bus.mp4 |
28.7 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Eugene Rodionov & Aleksandr Matrosov - OO RE with HexraysCodeXplorer.mp4 |
43.9 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Guillaume Ross - CTF or WTF.mp4 |
26.3 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Jean Francois Cloutier & Francois Gagnon - CHEKS.mp4 |
38.1 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Joan Calvet - The Sednit Group, Cyber Espionage In Eastern Europe.mp4 |
32.3 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Mathieu Lavoie - Bitcoin Putting the Pseudo Back in Pseudonymous.mp4 |
22.2 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Olivier Bilodeau - Two Years Of Montrehack the local CTF training initiative.mp4 |
31.3 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Paul Rascagneres - The Uroburos case Analysis of the tools used by this Actor.mp4 |
46.9 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Philip Young - Why You Should (But Don't) Care About Mainframe Security.mp4 |
73 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Philippe Arteau - Breaking PRNGs.mp4 |
17.5 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Rene Freingruber - EMET 5.2 Armor or Curtain.mp4 |
88 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Robert Wood - Threat Modeling for the Gaming Industry.mp4 |
39.8 MB |
NorthSec/NorthSec 2015/NorthSec 2015 - Trevor Perrin - TextSecure Protocol Present and Future.mp4 |
27.5 MB |
NorthSec/NorthSec 2016/Eric Evenchick - CANtact An Open Tool for Automotive Exploitation.mp4 |
34.9 MB |
NorthSec/NorthSec 2016/Etienne Martineau - Inter VM Data Exfiltration The Art of Cache Timing Covert Channel ....mp4 |
64.6 MB |
NorthSec/NorthSec 2016/Eugene Rodionov & Alexander Matrosov Analysis of High level Intermediate ....mp4 |
53 MB |
NorthSec/NorthSec 2016/Gabriella Coleman - How Anonymous narrowly Evaded the Cyberterrorism Rhetorical Machine.mp4 |
70.1 MB |
NorthSec/NorthSec 2016/Guillaume Ross & Jordan Rogers - Real Solutions From Real Incidents Save Money and Your Job!.mp4 |
116.2 MB |
NorthSec/NorthSec 2016/Jake Sethi Reiner - Security Problems of an Eleven Year Old and How to Solve Them.mp4 |
9.7 MB |
NorthSec/NorthSec 2016/Laurent Desaulniers - Stupid Pentester Tricks.mp4 |
37 MB |
NorthSec/NorthSec 2016/Lex Gill - Law, Metaphor and the Encrypted Machine.mp4 |
43.9 MB |
NorthSec/NorthSec 2016/Mark Stanislav - Hide Yo’ Kids Hacking Your Family’s Connected Things.mp4 |
81.6 MB |
NorthSec/NorthSec 2016/Masashi Crete Nishihata & John Scott Railton - Not Safe For Organizing....mp4 |
61.5 MB |
NorthSec/NorthSec 2016/Miroslav Stampar - Android Practical Introduction into the (In)Security.mp4 |
68.7 MB |
NorthSec/NorthSec 2016/Olivier Bilodeau & Hugo Genesse - Applying DevOps Principles for Better Malware Analysis - YouTube.mp4 |
54.2 MB |
NorthSec/NorthSec 2016/Philippe Arteau - The New Wave of Deserialization Bugs.mp4 |
40.9 MB |
NorthSec/NorthSec 2016/René Freingruber - Bypassing Application Whitelisting in Critical Infrastructures.mp4 |
62.5 MB |
NorthSec/NorthSec 2016/Sophia D’Antoine - Practical Uses of Program Analysis Automatic Exploit Generation.mp4 |
43.5 MB |
NorthSec/NorthSec 2017/Adam Shostack - Pentesting Lessons from Star Wars.mp4 |
79.9 MB |
NorthSec/NorthSec 2017/Charles F. Hamilton - Don’t Kill My Cat.mp4 |
20.8 MB |
NorthSec/NorthSec 2017/Chris Prince - How Surveillance Law was Expanded in Canada, What the Media has Reported, What’s Next.mp4 |
33.1 MB |
NorthSec/NorthSec 2017/David Goulet - Deep Dive Into Tor Onion Services.mp4 |
51.7 MB |
NorthSec/NorthSec 2017/Dimitry Snezhkov - Abusing Webhooks for Command and Control.mp4 |
27.1 MB |
NorthSec/NorthSec 2017/Jackson Thuraisamy & Jason Tran - Hacking POS PoS Systems.mp4 |
30.3 MB |
NorthSec/NorthSec 2017/James Kettle - Backslash Powered Scanning Implementing Human Intuition.mp4 |
32 MB |
NorthSec/NorthSec 2017/Laurent Desaulniers - Stupid RedTeamer Tricks.mp4 |
32.4 MB |
NorthSec/NorthSec 2017/Masarah Paquet-Clouston & Olivier Bilodeau - Attacking Linux Moose Unraveled an Ego Market.mp4 |
43 MB |
NorthSec/NorthSec 2017/Paul Rascagneres - Modern Reconnaissance Phase by APT – Protection Layer.mp4 |
40.1 MB |
NorthSec/NorthSec 2017/Pierre-Alexandre Braeken - Hack Microsoft Using Microsoft Signed Binaries.mp4 |
42.6 MB |
NorthSec/NorthSec 2017/Richard Thieme - The Impact of Dark Knowledge and Secrets on Security and Intelligence Professionals.mp4 |
96.5 MB |
NorthSec/NorthSec 2017/Shawn Marriott - Data Science Tools and Techniques for the Blue Team.mp4 |
34.4 MB |
NorthSec/NorthSec 2017/Thomas Pornin - BearSSL SSL For all Things.mp4 |
59.7 MB |
NorthSec/NorthSec Logo.jpg |
12 KB |
NorthSec/NorthSec thank you.txt |
757 B |