Cracking Corporate Passwords – Exploiting Password Policy Weaknesses
How the Grid Will Be Hacked
Practical File Format Fuzzing
Steal All of the Databases.
Ownage From Userland: Process Puppeteering
help for the helpdesk
Surviving the Dead
After SS7 its LTE
‘) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation Techniques’)%00
Weaponizing your Coffee Pot
How can I do that? Intro to hardware hacking with an RFID badge reader
Sandboxes from a pen tester’s view
Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to Pwn the Network
Practical OSINT
A SysCall to ARMs
iOS.reverse #=> iPwn Apps
Phishing Like The Pros
Stop making excuses; it’s time to own your HIV (High Impact Vulnerabilities)
The Netsniff-NG Toolkit
Terminal Cornucopia
Raspberry Pi, Media Centers, and AppleTV
Uncloaking IP Addresses on IRC
Why Dumpster Dive when I can pwn right in?
Wait; How is All This Stuff Free?!?
Closing Ceremonies