59 min
Little Security, Despite Obscurity
75 min
We Track Harder - We Track More! Take the pain out of…
56 min
How to Hack the Pfandsystem
34 min
How In The End We Got It All!
90 min
Oder: worüber wir nächstes Jahr lachen werden
57 min
Revisiting the legendary computer in a joystick
59 min
Typische Sicherheitslücken
57 min
how to own critical infrastructures
63 min
or how B.A.T.M.A.N. learned to fly
59 min
How to find that special one out of millions
53 min
An analysis of targeted attacks from 2005 to 2007
42 min
Practical VM exploiting based on CACAO
50 min
An introduction into anonymous communication with I2P
44 min
New ideas for old practices
46 min
Look what I found under the carpet
62 min
Keeping your enemies close
48 min
Post-Exploitation Fun in Windows Environments
42 min
A couple of stories about kernel exploiting
44 min
A Web Hacker's Bag O' Tricks
52 min
A swiss army knife for automatic social investigation