26:17
TROOPERS23: Fact Based Post Exploitation - Office365 Edition
TROOPERS IT Security Conference
50:42
TROOPERS23: Forensic Examination of Ceph
38:56
TROOPERS23: All your parcel are belong to us
1:02:40
TROOPERS23: Spooky authentication at a distance
28:09
TROOPERS23: Stay fit: Hack a Jump Rope
55:37
TROOPERS23: OopsSec - The bad, the worst and the ugly of APT’s operations security
50:54
TROOPERS23: Attacking Ultra-Wideband: Security Analysis of UWB Applications in Smartphones
56:41
TROOPERS23: Monitoring Solutions: Attacking IT Infrastructure at its Core
44:42
TROOPERS23: The Anatomy of Windows Telemetry Part 2
53:48
TROOPERS23: Everyone knows SAP, everyone uses SAP, everyone uses RFC, no one knows RFC
56:10
TROOPERS23: Testing and Fuzzing the Kubernetes Admission Configuration