43:41
The New Wave Of Account Checkers And Underground Rewards Fraud (Benjamin Brown)
Hackfest Communication
22:22
BurpSmartBuster - A smart way to find hidden treasures, the next steps (Patrick R. Mathieu)
35:41
This Phish Goes To 11 (Stephanie “Snow” Carruthers)
21:57
Abusing PHP 7’s OPcache to Spawn Webshells (Ian Bouchard)
40:52
Introducing CSE’s open source AssemblyLine (Steve Garon & John O’Brien)
36:46
Practical Analysis of Awareness (Kendra Coooley)
41:45
Superhéros Tous! Comment l’empathie peut aider l’inclusion des personnel avec ASD-ADHD (Michelle)
43:32
Creating a Professional-Quality Embedded Device on a Budget (Michael Vieau & Kevin Bong)
1:02:34
Banking on Insecurity: Why Attackers Can Take the Money and Run (Cheryl Biswas)
38:01
Between You and Me and the Network Security Boundary (Patrick Fussell)
17:48
100 Facebooks accounts per day through internet searches (Guillermo Buendia & Yael Basurto)
55:10
Stantinko : Un botnet aux multiples facettes (Matthieu Faou & Frédéric Vachon)
52:06
Vaccination - An Anti-Honeypot Approach (Gal Bitensky)
17:38
Élection présidentielle Française 2 0 (Damien Bancal)
40:12
SniffAir – OpenSource Framework for WiFi Security Assessments (Matthew Eidelberg & Steven Daracott)
51:55
BITSInject - control your BITS, get SYSTEM (Dor Azouri)
46:55
Rage Against the Weaponized A.I. Propaganda Machine (Chris Sumner)
45:54
Dissecting a Metamorphic File-Infecting Ransomware (Raul Alvarez)
39:38
Genetic Algorithms for Brute Forcing (Christopher Ellis)
51:07
Selenium: dark side of the moon (Adam Reiser)
52:31
Lessons Learned Hunting IoT Malware (Olivier Bilodeau)
48:21
Attack Driven Development: Getting Started in Application Security (Keith Hoodlet)
1:05:35
How To Pwn an Enterprise in 2017 (or 2016, or 2015. . .) (Johnny Xmas)
45:22
Fingerprinting Android malware packaging thru static analysis identify creator (François Gagnon)
24:20
Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité (Marc-André Bélanger)
49:56
Hadoop safari : Hunting for vulnerabilities (Mahdi Braik & Thomas Debize)
39:48
The Black Art of Wireless Post-Exploitation (Gabriel Ryan)
52:26
Static-Analysis Tools: Now you’re Playing with Power! (Philippe Arteau)
59:53
Propriétés des preuves numériques et considérations à leur cueillette (Sylvain Desharnais)
38:30
Your configs are bad and you should feel bad (Stephen Hall)
40:41
Unveiling One of the World’s Biggest and Oldest Cybercrime Gangs (Sun Huang & Wayne Huang)
55:51
How I Darkweb Economies (and You Can Too!) (Johnny Xmas & Benjamin Brown)
39:11
Game Hacking Exposed (Mickael Nadeau)
49:31
Adversarial Simulation: Why your defenders are the Fighter Pilots (Chris Nickerson)
43:33
De-anonymizing Bitcoin one transaction at a time (Mathieu Lavoie & David Décary-Hétu)
41:53
Untangling the Dark Web: Unmasking Onion Services (Sarah Jamie Lewis)
25:40
Catching IMSI Catchers (Geoffrey Vaughan)
1:01:50
Hacking the Internet of Dongs (RenderMan and Murdoch_Monkey)
29:52
Pentesting Cruise Ships OR Hacking the High Seas (Chad M. Dewey)
49:15
Racing the Web (Aaron Hnatiw)
20:32
Hunting with LimaCharlie (Maxime Lamothe-Brassard)
48:24
Fixing the Java Serialization mess (Pierre Ernst)
27:22
Sécurité Docker en production (Alexandre Guédon)
20:08
Exploit Kits: The Biggest Threat You Know Nothing About (Sunny Wear)
58:01
A Stuxnet for Mainframes (Cheryl Biswas)
52:57
Come Bring all your Drones to the Yard (Blake Cornell)
30:11
Windows systems & code signing protection (Paul Rascagnères)
36:49
Histoire d'un hack (Bernard Bolduc)
53:17
Make iOS Hacking Great Again: The Easy Wins! (Aaron Guzman)
45:02
Hypotheses on burnout and stress related illnesses in relation to Cyber Security practitioners
Blue Team Reboot (Cheryl Biswas & Haydn Johnson)
47:56
Stratégies de fouille et recherches de preuves (Nadia Vigneault & Sylvain Desharnais)
38:53
Clogging the Futures Series of Tubes: A look at HTTP2 DDoS Attacks (Michael Bennet)