Surveillance Cameras..... Michael Viscuso at 44CON 2012.
Main 44con channel | 0 views | 2019-07-29
Surveillance Cameras: The Real-World Has Them Everywhere, Why Not The Computer? Michael Viscuso at 44CON 2012 in London.
Surveillance Cameras: The Real-World Has Them Everywhere, Why Not The Computer? Michael Viscuso at 44CON 2012 in London.
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012 in London.
Robert Weiss & Ben Gatti present the Cryptanalysis Of The Enigma Machine at 44CON 2012 in London.
I'm The Butcher, Would You Like Some Beef? Thomas Mackenzie & Michele Orru at 44CON 2012 in London
Securing The Internet: You're Doing It Wrong (An Infosec Intervention) presented by Jayson E Street at 44CON 2012 in London. 44CON will return in 2013, subscribe to our announcements mailing list at http://eepurl.com/f4PUX for more information ...
An Idiot Abroad. Don A. Bailey at 44CON 2012 in London. 44CON will return in 2013, subscribe to our announcements mailing list at http://eepurl.com/f4PUX for more information on the event as it is released. You can also purchase the 44CON ...
Terrorism, Tracking, Privacy And Human Interactions. Daniel Cuthbert and Glenn Wilkinson, SensePost at 4CON 2012 in London. 44CON will return in 2013, subscribe to our announcements mailing list at http://eepurl.com/f4PUX for more information o...
Snippet from a video from the Chinnyvision YouTube channel played inside an ANSI terminal! Auto converted with my latest project.
44CON 2011 Technical Track, Haroon Meer of thinkst presentation tittled Penetration Testing Considered Harmful.
44CON 2011 Technical Track, Alex Plaskett of MWR presentation tittled Windows Pwn 7 OEM - Owned Every Mobile?.
44CON 2011 Technical Track, Philip Polstra presentation tittled USB Flash Drive Forensics.
44CON 2011 Technical Track, Ian De Villiers of SensePost presentation tittled Systems Applications Proxy Pwnage.
44CON 2011 Business Track presentation by Steve Armstrong, titled Communicating with the Boss - don't talk S, it's BS that the C's understand Or how to talk to your Executives.
Unbiased Review of Trusteer Rapport, Neil Kettle at 44CON London September 2011.
Companies nowadays are choosing between on-premise, cloud and hybrid deployment models. The common factor across all of these scenarios is the underlying platform, used in the background to run all on-premise and cloud-based applications developed...
Presented By Kevin O’Reilly Within the fields of malware research and threat intelligence, one of the biggest challenges faced by the security industry is the significant time and skill required to reverse engineer new malware samples. This has l...
That cyber-crime has driven the rise of malware during the last decade is not in doubt; how large that increase has been most certainly is. This measurement has, I would argue, been more speculative than evidential. The problem being that attempts...
This talk aims to provide the fundamental architectural knowledge and resources for a security research interested in misuse of the x86 platform to conduct their own research with less “boiler-plate”. Covering the privileges and architectural even...
“A good exploit is one that is delivered with style”. Stegosploit creates a new way to encode “drive-by” browser exploits and deliver them through image files. These payloads are undetectable using current means. This paper discusses two broad un...
In the face of clear & present threats to Body, Mind & Soul from our accelerating adoption of technology into our society it is clear: The Cavalry Isn’t Coming… it falls to us… the willing & able… and we have to try to have impact. Over the past y...
Antivirus software is a common component of today’s computer systems ranging from home users to corporate and government servers. However, security issues related to the AV software itself are not usually considered when deploying such security so...
There are over 2.9 BILLION subscribers on GSM networks today. How many of these subscribers are susceptible to trivial attacks that can leave phone calls, text messages and web surfing habits accessible to an attacker? This talk intends to discuss...
In the last few years, Android has become the world’s leading smart phone operating system. Unfortunately, the diversity and sheer number of devices in the ecosystem represent a significant challenge to security researchers. Primarily, auditing an...
Let’s take a quick trip across the sea to the halls of Black Hat. What made the training network tick? How was it created, who was attacking the network, and how was it defended? How do you keep the wired training network up and reliable when you ...