2:43
TROOPERS24 Aftermovie
TROOPERS IT Security Conference
33:44
TROOPERS24: Keynote - A question of time
51:03
TROOPERS24: The Red Teamer’s Guide to Deception
58:07
TROOPERS24: Fuzzing at Mach Speed: Uncovering IPC Vulnerabilities on MacOS
51:38
TROOPERS24: How to travel the C SAFely with .json when there are no Argonauts
57:56
TROOPERS24: IBM i for Wintel Hackers
1:03:20
TROOPERS24: A Decade of Active Directory Attacks: What We've Learned & What's Next
45:32
TROOPERS24: Say Hello to your new cache flow!
53:54
TROOPERS24: ADillesHeel - Making the Impossible Possible in AD Attack Path Analysis
44:07
TROOPERS24: Decrypting the Directory - A Journey into a static analysis of the Active Directory NTDS
58:44
TROOPERS24: Open Source Vulnerability Management for Software Development and Cloud Environments
59:26
TROOPERS24: From ASCII to UTF-16: Leveraging Encodings to Break Software
51:22
TROOPERS24: WatchWitch — Hacking the Apple Watch
54:33
TROOPERS24: 10 Years of Windows Privilege Escalation with "Potatoes"
1:02:50
TROOPERS24: Forensic Security Monitoring in Automotive Cybersecurity
53:27
TROOPERS24: DoubleDrive - Double Agents Hide Behind The Clouds
54:49
TROOPERS24: Relay Your Heart Away - An OPSEC-Conscious Approach to 445 Takeover
1:08:53
TROOPERS24: Analyzing and Executing ADCS Attack Paths with BloodHound
1:04:00
TROOPERS24: So You Performed A Forest Recovery – The Sequel
51:15
TROOPERS24: The (almost) complete LDAP guide
56:56
TROOPERS24: Breaking Barriers and Boundaries
51:35
TROOPERS24: Hitchhiker's Guide to Automotive Container Security using eBPF
58:15
TROOPERS24: Considerations on AI Security
58:16
TROOPERS24: V2GEvil: Ghost in the wires
51:04
TROOPERS24: Exploiting Token-Based Authentication: Attacking and Defending Identities in the 2020s.
55:27
TROOPERS24: Attacking Primary Refresh Tokens using their MacOS implementation
1:00:55
TROOPERS24: Deep Dive into Windows Defender: Smart App Control and ETW
51:11
TROOPERS24: Attacking and Defending Kubernetes Cluster with KubeHound Attack Graph Model
49:37
TROOPERS24: So I became a node: Kubernetes bootstrap tokens and AKS
1:01:37
TROOPERS24: Misconfiguration Manager: Overlooked and Overprivileged
26:28
TROOPERS24: Insert coin: Hacking arcades for fun
27:02
TROOPERS24: Complexity Kills: Examining IT Security Challenges in Healthcare Facilities
31:46
TROOPERS24: The Registry Rundown
31:42
TROOPERS24: Apple CarPlay - What's Under the Hood