Marcus Niemietz
автор TROOPERScon дата 16.04.2013
Slides and more info at: https://www.troopers.de Next TROOPERS14: March 17-21. 2014, Heidelberg Germany Follow us on Twitter: ...
- СКАЧАТЬ MP4
автор Marcus Niemietz дата 30.05.2016
Peer-to-peer (P2P) and thus fully decentralized botnets have gained some popularity in the recent years. But how do these botnets really work? And even more ...
- СКАЧАТЬ MP4
автор Marcus Niemietz дата 21.01.2016
Penetration testing has changed considerably over the last few years. Applications have become much more complex and difficult to test. Not only have the ...
- СКАЧАТЬ MP4
автор Marcus Niemietz дата 24.01.2019
Two-factor authentication is considered a great solution to prevent phishing. In reality, only Universal Two-factor (U2F) is somehow useful once hardware keys ...
- СКАЧАТЬ MP4
автор Marcus Niemietz дата 16.07.2018
A student's life ago, the author somehow managed to graduate. On the way, he made a lot of mistakes – and he still does. A few people since called him ...
- СКАЧАТЬ MP4
- СКАЧАТЬ MP4
автор Marcus Niemietz дата 19.01.2017
We've all been there - this one course at university where they tell you to actually read the log files, do proper incident response, and document everything.
- СКАЧАТЬ MP4
автор Marcus Niemietz дата 21.07.2017
This talk will briefly cover eleven weird and often unexpected technologies and features that are embedded in MSIE. Technologies that are relevant for ...
- СКАЧАТЬ MP4
автор Sicherheitsforschung дата 05.04.2016
One of the main characteristics of Smart TVs are apps. Apps extend the Smart TVs menu with various functionalities, ranging from usage of social networks or ...
- СКАЧАТЬ MP4
автор Marcus Niemietz дата 19.07.2017
Drammer is an attack that exploits the Rowhammer hardware vulnerability on Android devices. It is the first Android root exploit that requires no user permissions ...
- СКАЧАТЬ MP4
автор Tutti quanti дата 19.10.2013
Clickjacking und UI-Redressing Wie Hacker vorgehen und wie man sich schützen kann UI-Redressing ist eine Technik, welche die Veränderung des Verhaltens ...
- СКАЧАТЬ MP4
автор USENIX дата 15.09.2017
Jörg Schwenk, Marcus Niemietz, and Christian Mainka, Horst Görtz Institute for IT Security, Chair for Network and Data Security, Ruhr-University Bochum The ...
- СКАЧАТЬ MP4