Systems Applications Proxy Pwnage, Ian De Villiers - 44CON 2011
Systems Applications Proxy Pwnage, Ian De Villiers 44CON 2011
How to pick a lock
Trusteer Rapport, Neil Kettle - 44CON 2011
t218 Hacking Mainframes Vulnerabilities in applications exposed over TN3270 Dominic White
Windows Pwn 7 OEM, Alex Plaskett - 44CON 2011
An Idiot Abroad. Don A. Bailey at 44CON 2012
44 facts about 44con
Hacking And Forensics On The Go. Phil Polstra at 44CON 2012.
44CON 2013 - Security Lessons from Dictators - Jerry Gamblin
Profiler: Polishing the Tests and Bug Hunting
Surveillance Cameras..... Michael Viscuso at 44CON 2012.
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012.
[DEFCON 20] Bypassing Endpoint Security for $20 or Less
m00 Practical interception of mobile device traffic Jeremy Druin
Chris Phillips, Head of Physical Security at 2-sec explains why companies need penetration testing