File List
-
文件过大导致无法格式化,将以元数据展示。
[{"path": "BSides Charleston South Carolina/BSidesCHS 2013/BSidesCHS 2013 - Session 03 - Waging War on an Entire City.mp4", "length": 1736061200}, {"path": "BSides Nashville/BSides Nashville 2014/001 bsides harmonicas and communication skills jack daniel.mp4", "length": 149002503}, {"path": "BSides Nashville/BSides Nashville 2014/201 the bsidesnash talk that keeps YouTube up all night (2).mp4", "length": 98360698}, {"path": "BSides Nashville/BSides Nashville 2014/203 healthcare security which protocal adam john.mp4", "length": 159713775}, {"path": "BSides Nashville/BSides Nashville 2014/301 succeeding with enterprise software security key performance indicators rafal los.mp4", "length": 200899630}, {"path": "BSides Nashville/BSides Nashville 2014/300 bending and twisting networks paul coggin.mp4", "length": 198212459}, {"path": "BSides Nashville/BSides Nashville 2014/100 attack paths breaking into infosec from it or other totally different fields eve adams.mp4", "length": 132741185}, {"path": "BSides Nashville/BSides Nashville 2014/002 closing ceremonies.mp4", "length": 16656639}, {"path": "BSides Nashville/BSides Nashville 2014/Applying analog thinking to digial networks Winn Schwartau.mp4", "length": 226647722}, {"path": "BSides Nashville/BSides Nashville 2014/102 beating the infosec learning curve without burning out scott thomas.mp4", "length": 82878638}, {"path": "BSides Nashville/BSides Nashville 2014/101 learn from your mistakes adam len compton.mp4", "length": 101642173}, {"path": "BSides Nashville/BSides Nashville 2014/200 making mongo cry automated nosql exploitation with nosqlmap russell butturini.mp4", "length": 90134463}, {"path": "BSides Nashville/BSides Nashville 2014/103 sun tzu was a punk confucius was an infosec rockstar branden miller.mp4", "length": 94726427}, {"path": "BSides Nashville/BSides Nashville 2014/201 the bsidesnash talk that keeps YouTube up all night.mp4", "length": 102193502}, {"path": "BSides Nashville/BSides Nashville 2014/Barry White version 100 attack paths breaking into infosec Eve Adams.mp4", "length": 165856752}, {"path": "BSides Nashville/BSides Nashville 2014/305 seeing purple hybrid security teams for the enterprise mark kikta.mp4", "length": 81724187}, {"path": "BSides Nashville/BSides Nashville 2014/000 welcome to bsides nashville.mp4", "length": 33849135}, {"path": "BSides Nashville/BSides Nashville 2014/302 scaling security in the enterprise making people a stronger link kevin riggs.mp4", "length": 161801778}, {"path": "BSides Nashville/BSides Nashville 2014/204 why you can t prove you re pwnd but you are ben miller.mp4", "length": 172615958}, {"path": "BSides Nashville/BSides Nashville 2014/202 how do i hack thee let me count the ways stewart fey.mp4", "length": 211124597}, {"path": "BSides Nashville/BSides Nashville 2015/B03 Nobody Understands Me Better Executive Metrics Michael St Vincent.mp4", "length": 118960731}, {"path": "BSides Nashville/BSides Nashville 2015/BSides Nashville Intro and Pondering the False Economy of Secrets Trey Ford @TreyFord.mp4", "length": 105573710}, {"path": "BSides Nashville/BSides Nashville 2015/B02 The Great Trojan Demo Ben Miller.mp4", "length": 99590240}, {"path": "BSides Nashville/BSides Nashville 2015/R00 From Parking Lot to Server Room Tim Roberts and Brent White.mp4", "length": 172313728}, {"path": "BSides Nashville/BSides Nashville 2015/B00 Applied Detection and Analysis Using Flow Data Jason A Smith.mp4", "length": 125259828}, {"path": "BSides Nashville/BSides Nashville 2015/G02 Thats NOT my RJ45 Jack IRL Networking for Humans Johnny Xmas.mp4", "length": 81793665}, {"path": "BSides Nashville/BSides Nashville 2015/G03 Finding Low Hanging Fruit with Kali Stephen Haywood.mp4", "length": 108994150}, {"path": "BSides Nashville/BSides Nashville 2015/R01 N4P Wireless Pentesting So easy even a caveman can do it Chris Scott.mp4", "length": 140670628}, {"path": "BSides Nashville/BSides Nashville 2015/R04 Skiddiemonkeys Fling stuff at your Defenses and See What Sticks Russell Butturini Joshua Tower.mp4", "length": 94564149}, {"path": "BSides Nashville/BSides Nashville 2015/B04 Agile and Security Oil and Water Ron Parker.mp4", "length": 83598231}, {"path": "BSides Nashville/BSides Nashville 2015/G04 What do infosec practitioners actually do Slade Griffin.mp4", "length": 122566412}, {"path": "BSides Nashville/BSides Nashville 2015/R02 hashcat NSAKEY.mp4", "length": 133621013}, {"path": "BSides Nashville/BSides Nashville 2015/G01 We Built This So Can You Tim Fowler.mp4", "length": 114330569}, {"path": "BSides Nashville/BSides Nashville 2015/B01 Using devops monitoring tools to increase security visibility Chris Rimondi.mp4", "length": 60692269}, {"path": "BSides Nashville/BSides Nashville 2016/G04 InfoSecs in the City Starting a Successful CitySec Meetup Johnny Xmas Fletcher Munson Chris Carl.srt", "length": 75028}, {"path": "BSides Nashville/BSides Nashville 2016/G03 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.srt", "length": 22897}, {"path": "BSides Nashville/BSides Nashville 2016/B01 Collection and Detection with Flow Data A Follow Up Jason Smith.srt", "length": 70651}, {"path": "BSides Nashville/BSides Nashville 2016/K00 And bad mistakes Ive made a few Jayson Street.mp4", "length": 133343563}, {"path": "BSides Nashville/BSides Nashville 2016/B00 At the mountains of malware Wes Widner.srt", "length": 68795}, {"path": "BSides Nashville/BSides Nashville 2016/G02 How to get into ICS security mark heard.srt", "length": 86330}, {"path": "BSides Nashville/BSides Nashville 2016/G00 AppSec Enigma and Mirage When Good Ideas Can Go Awry Frank Catucci.mp4", "length": 55269975}, {"path": "BSides Nashville/BSides Nashville 2016/R02 Forging Your Identity Credibility Beyond Words Tim Roberts Brent White.srt", "length": 59846}, {"path": "BSides Nashville/BSides Nashville 2016/B02 Container Chaos Docker Security Container Auditing Chris Huntington.mp4", "length": 55038032}, {"path": "BSides Nashville/BSides Nashville 2016/B04 Threat Modeling the Minecraft Way Jarred White.mp4", "length": 106034552}, {"path": "BSides Nashville/BSides Nashville 2016/R03 IAM Complicated Why you need to know about Identity and Access Management Ron Parker.mp4", "length": 69397292}, {"path": "BSides Nashville/BSides Nashville 2016/R04 Put a Socket in it Understanding and Attacking Sockets on Android Jake Valletta.srt", "length": 64011}, {"path": "BSides Nashville/BSides Nashville 2016/G01 The Art of the Jedi Mind Trick Jeff Man.srt", "length": 62695}, {"path": "BSides Nashville/BSides Nashville 2016/B03 Its Not If But When How to Create Your Cyber Incident Response Plan Lucie Hayward Marc Brawner.mp4", "length": 70979914}, {"path": "BSides Nashville/BSides Nashville 2016/G01 The Art of the Jedi Mind Trick Jeff Man.mp4", "length": 70100110}, {"path": "BSides Nashville/BSides Nashville 2016/B03 Its Not If But When How to Create Your Cyber Incident Response Plan Lucie Hayward Marc Brawner.srt", "length": 29218}, {"path": "BSides Nashville/BSides Nashville 2016/R04 Put a Socket in it Understanding and Attacking Sockets on Android Jake Valletta.mp4", "length": 65169274}, {"path": "BSides Nashville/BSides Nashville 2016/B02 Container Chaos Docker Security Container Auditing Chris Huntington.srt", "length": 76864}, {"path": "BSides Nashville/BSides Nashville 2016/B04 Threat Modeling the Minecraft Way Jarred White.srt", "length": 86495}, {"path": "BSides Nashville/BSides Nashville 2016/R02 Forging Your Identity Credibility Beyond Words Tim Roberts Brent White.mp4", "length": 119476709}, {"path": "BSides Nashville/BSides Nashville 2016/B00 At the mountains of malware Wes Widner.mp4", "length": 131295965}, {"path": "BSides Nashville/BSides Nashville 2016/G02 How to get into ICS security mark heard.mp4", "length": 57482140}, {"path": "BSides Nashville/BSides Nashville 2016/G00 AppSec Enigma and Mirage When Good Ideas Can Go Awry Frank Catucci.srt", "length": 66199}, {"path": "BSides Nashville/BSides Nashville 2016/B01 Collection and Detection with Flow Data A Follow Up Jason Smith.mp4", "length": 140823490}, {"path": "BSides Nashville/BSides Nashville 2016/R01 Ever Present Persistence Established Footholds Seen in the Wild Evan Pena Chris Truncer.mp4", "length": 132462996}, {"path": "BSides Nashville/BSides Nashville 2016/G04 InfoSecs in the City Starting a Successful CitySec Meetup Johnny Xmas Fletcher Munson Chris Carl.mp4", "length": 142748677}, {"path": "BSides Nashville/BSides Nashville 2016/G03 The Ransomware Threat Tracking the Digital Footprints Kevin Bottomley.mp4", "length": 36925458}, {"path": "BSides Cleveland/BSides Cleveland 2015/GS06-The-Entropy-of-Obfuscated-Code-Adam-Hogan-adamwhogan.mp4", "length": 53725588}, {"path": "BSides Cleveland/BSides Cleveland 2015/GS05-Outside-the-Box-David-Kennedy-Larry-Spohn-HackingDave-Spoonman1091.mp4", "length": 85011790}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL05-Building-a-Threat-Intelligence-Program-Edward-McCabe-edwardmccabe.mp4", "length": 386899674}, {"path": "BSides Cleveland/BSides Cleveland 2015/GS00-Morning-Keynote-Jack-Daniel.mp4", "length": 101409690}, {"path": "BSides Cleveland/BSides Cleveland 2015/GS02-PwnDrone-The-Modern-Airborne-Cyber-Threat-Devin-Gergen-DevinGergen.mp4", "length": 71901301}, {"path": "BSides Cleveland/BSides Cleveland 2015/GS03-Afternoon-Keynote-Chris-Nickerson.mp4", "length": 73928289}, {"path": "BSides Cleveland/BSides Cleveland 2015/BP05-10-Reasons-Your-Security-Education-Program-Sucks-Kris-French-Jr-Turtl3Up.mp4", "length": 71282546}, {"path": "BSides Cleveland/BSides Cleveland 2015/BP00-DIY-Hacker-Training-a-Walkthrough-Warren-Kopp-warrenkopp.mp4", "length": 30589875}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL08-Cleveland-Locksport-Jeff-Moss-Doug-Hiwiller-Damon-Ramsey-jeffthemossman.mp4", "length": 43678853}, {"path": "BSides Cleveland/BSides Cleveland 2015/BP02-Flourishing-in-a-Hostile-Work-Environment-Dennis-Goodlett.mp4", "length": 43244628}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL00-Why-the-foundation-of-security-is-broken-Alex-Kot.mp4", "length": 36849573}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL06-Phishing-Witout-Ruby-Brandan-Geise-Spencer-McIntyre-coldfusion39.mp4", "length": 38319634}, {"path": "BSides Cleveland/BSides Cleveland 2015/BP04-EMET-Overview-and-Demo-Kevin-Gennuso-kevvyg.mp4", "length": 45070620}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL01-Desired-State-Configuration-DSC-Dream-Tool-or-Nightmare-for-Security-Baseline-and-Configuration-Management-Zack-Wojton-Wayne-Pruitt-zbirdflipper.mp4", "length": 37585972}, {"path": "BSides Cleveland/BSides Cleveland 2015/BP03-Defense-in-Depth-Your-Security-Castle-Tom-Kopchak-tomkopchak.mp4", "length": 66391952}, {"path": "BSides Cleveland/BSides Cleveland 2015/GS04-Why-the-Web-is-Broken-Bill-Sempf-sempf.mp4", "length": 384839820}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL07-Security-Not-Guaranteed-Or-how-to-hold-off-the-bad-guys-for-another-day-James-Gifford-Elijah-Snow-Rackley-jrgifford.mp4", "length": 35043848}, {"path": "BSides Cleveland/BSides Cleveland 2015/closing.mp4", "length": 3268740}, {"path": "BSides Cleveland/BSides Cleveland 2015/BP01-Quick-start-your-Burp-Suite-extensions-Jython-and-automation-Marius-Nepomuceno.mp4", "length": 30016691}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL02-Common-Sense-Security-Framework-Jerod-Brennen-slandail.mp4", "length": 46121724}, {"path": "BSides Cleveland/BSides Cleveland 2015/BP06-Call-of-Duty-Crypto-Ransomware-Brett-Hawkins-hawkbluedevil.mp4", "length": 74286593}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL03-Secure-Test-Driven-Development-Brakeman-Gauntlet-OWASP-and-the-Work-Still-to-Be-Done-Ricky-Rickard-rrickardjr.mp4", "length": 69307712}, {"path": "BSides Cleveland/BSides Cleveland 2015/GS01-Metasploit-Windows-Kernel-Exploitation-Spencer-McIntyre-zeroSteiner.mp4", "length": 76414529}, {"path": "BSides Cleveland/BSides Cleveland 2015/BL09-Augmenting-Mobile-Security-and-Privacy-Controls-Brian-Krupp-briankrupp.mp4", "length": 133371233}, {"path": "BSides Cleveland/BSides Cleveland 2014/Pentesting Layers 2 and 3 Kevin Gennuso and Eric Mikulas.mp4", "length": 169970986}, {"path": "BSides Cleveland/BSides Cleveland 2014/Keynote Dave Kennedy.mp4", "length": 107431939}, {"path": "BSides Cleveland/BSides Cleveland 2014/Threat Models that Exercise your SIEM and Incident Response J Wolfgang Goerlich and Nick Jacob.mp4", "length": 98344010}, {"path": "BSides Cleveland/BSides Cleveland 2014/Hacking Diversity Gregorie Thomas.mp4", "length": 69028107}, {"path": "BSides Cleveland/BSides Cleveland 2014/Lockade Locksport Electronic Games Adrian Crenshaw.mp4", "length": 171584855}, {"path": "BSides Cleveland/BSides Cleveland 2014/Phishing Like a Monarch With King Phisher Brandon Geise and Spencer McIntyre.mp4", "length": 59800221}, {"path": "BSides Cleveland/BSides Cleveland 2014/Am I an Imposter Warren Kopp.mp4", "length": 66970409}, {"path": "BSides Cleveland/BSides Cleveland 2014/Cleveland Locksport Jeff Moss Doug Hiwiller and Damon Ramsey.mp4", "length": 69982941}, {"path": "BSides Cleveland/BSides Cleveland 2014/Fun with Dr Brown Spencer McIntyre.mp4", "length": 70963565}, {"path": "BSides Cleveland/BSides Cleveland 2014/Malware Evolution Epidemiology Adam Hogan.mp4", "length": 125830147}, {"path": "BSides Cleveland/BSides Cleveland 2014/Password Defense Controls your users wont hate Nathaniel Maier.mp4", "length": 71239711}, {"path": "BSides Cleveland/BSides Cleveland 2014/APT2 Building a Resiliency Program to Protect Business Edward McCabe.mp4", "length": 91206871}, {"path": "BSides Cleveland/BSides Cleveland 2014/Plunder Pillage and Print The art of leverage multifunction printers during penetration testing Dera.mp4", "length": 115086663}, {"path": "BSides Cleveland/BSides Cleveland 2014/The importance of threat intel in your information security program Jamie Murdock.mp4", "length": 66917505}, {"path": "BSides Cleveland/BSides Cleveland 2014/Dave Kennedy and Mentos.mp4", "length": 7162522}, {"path": "BSides Cleveland/BSides Cleveland 2014/Thinking Outside the Bunker Security as a practice not a target Steven Legg.mp4", "length": 48123934}, {"path": "BSides Cleveland/BSides Cleveland 2014/Attacking and Defending Full Disk Encryption Tom Kopchak.mp4", "length": 155166913}, {"path": "BSides Cleveland/BSides Cleveland 2014/PowerShell cool $h!t Zach Wojton.mp4", "length": 103747058}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Security Onions and Honey Potz -- Ethan Dodge.mp4", "length": 204114390}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - Cloud Security - Scott Arveseth.mp4", "length": 262838862}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Take Charge of Your Infosec Career! -- Glen Roberts.mp4", "length": 114164307}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- How to prevent eavesdropping on office VoIP calls -- Dmitry Dessiatnikov.mp4", "length": 178188498}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - RBAC is Dead. So now what - Adam Fisher.mp4", "length": 135481281}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Why You Need To Be Red Team ed -- Nate McConnell.mp4", "length": 98946612}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Feeding the Shark -- Jeremy Pierson.mp4", "length": 173096921}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- You Must Search Before You Destroy -- Adam Steed.mp4", "length": 150231167}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - From Vim Muggle to Wizard in 10 Easy Steps - Erik Falor.mp4", "length": 262003229}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Social Engineering The Good, the Bad, and the Ugly -- Stephanie Carruthers.mp4", "length": 76611496}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Leading Change -- John Overbaugh.mp4", "length": 173423347}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Psst, Come Check Out My Lair!! #notacreeper -- Justin Larson.mp4", "length": 118557406}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - Malware Fun - Kenny Long.mp4", "length": 86977938}, {"path": "BSides Salt Lake City/BSdiesSLC 2015 -- What To Do When Something Bad Has Happened -- Jason Wood.mp4", "length": 101797574}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - Hey Guys, I m a Pentester! - Metacortex.mp4", "length": 50731077}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - Asymmetric Warfare and Corollaries in Network Defense - Jason Tracy.mp4", "length": 87040401}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- BREAKING in BAD (I m the one who doesn t knock) -- Jayson E. Street.mp4", "length": 337713293}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- The Inception Framework Cloud Based Attack -- Waylon Grange.mp4", "length": 111364780}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Bad USB Weaponized -- Dan Anderson and Steve Fink.mp4", "length": 70196667}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - PlagueScanner An Open Source Multiple AV Scanner Framework - Robert Simmons.mp4", "length": 151710004}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - Building AppSec In - Seth Law.mp4", "length": 113109805}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- The Secret Lives of Debuggers -- Lance Buttars.mp4", "length": 167683130}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- InfoSec, Just Doing It -- Rob Jorgensen.mp4", "length": 184543524}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Security Researcher, Security Besmircher -- Kevin Johnson.mp4", "length": 101423081}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Authenticode in-depth -- Scott Piper.mp4", "length": 153276525}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Pragmatic Cloud Security -- Joshua Danielson.mp4", "length": 130201666}, {"path": "BSides Salt Lake City/BSidesSLC 2015 -- Trends In Exploit Kits -- Jeffrey Doty.mp4", "length": 224711758}, {"path": "BSides Salt Lake City/BSidesSLC -- Fundamentals That Time Forgot -- Jup1t3r.mp4", "length": 167440274}, {"path": "BSides Salt Lake City/BSidesSLC 2015 - Fighting Hardware Attacks with Software - Doktor Unicorn.mp4", "length": 147770998}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Connecting IT Security s community through B-Sides.mp4", "length": 4012778}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Preview to Using a Blender Game for Security Visualization.mp4", "length": 7320156}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Preview to Level Up - How Security is not like a Video Game.mp4", "length": 7856309}, {"path": "BSides Portland/BSides Portland 2011/Security B-Sides co-founder speaks about the evolution of B-Sides.mp4", "length": 9039820}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Covert Calling - Secrets of Social Engineering Revealed.mp4", "length": 5663310}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Recap on The Need for Hackers, Hackerspaces and Hacktivism.mp4", "length": 11451762}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 When IT Fails by Tripwire s Founder, Gene Kim.mp4", "length": 8412433}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Driving Secure Development Using a Threat Model.mp4", "length": 4194228}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Recap on OS Security for Specific Purpose Devices.mp4", "length": 8794401}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Highlights about BSidesPDX from Organizers.mp4", "length": 19483830}, {"path": "BSides Portland/BSides Portland 2011/B-Sides Portland 2011 Preview of SCADA Security - Why is it So Hard.mp4", "length": 9213695}, {"path": "BSides Raleigh/BSides Raleigh 2014/grep visualization var logs unused - Dr Carrie Gates - BSides Raleigh.mp4", "length": 243711305}, {"path": "BSides Raleigh/BSides Raleigh 2014/Dan Kaminsky - BSides Raleigh.mp4", "length": 388153215}, {"path": "BSides Raleigh/BSides Raleigh 2014/Slaying the Hydra Evolution and Mitigation of Denial-of-Service Attacks - BSides Raleigh.mp4", "length": 169763034}, {"path": "BSides Raleigh/BSides Raleigh 2014/Security on the Blockchain Past Present & The Future - Shannon Code.mp4", "length": 165469230}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG08-Building-an-Empire-with-PowerShell-Will-Schroeder-Justin-Warner.mp4", "length": 74105502}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG02-Practice-Safe-Cyber-The-Miseducation-of-American-Students-on-Internet-Safety-Vivienne-Pustell.mp4", "length": 50075502}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG09-SIEMple-technology-Bill-Davison.mp4", "length": 32146269}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG07-Fight-back-raising-awareness-infosec-Petri-Koivisto.mp4", "length": 34575422}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG16-FAA-FTC-FCC-FU-How-Three-F-ing-Agencies-are-Shaping-Info-Sec-Elizabeth-Wharton.mp4", "length": 46193537}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/ATGP00-Underground-Wi-Fi-Hacking-for-Web-Pentesters-Greg-Foss.mp4", "length": 201106398}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW25-No-More-Graphical-Passwords-Mark-Brunett.mp4", "length": 35308523}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/ATGP06-Wi-Door-BindRev-Shells-for-your-Wi-Fi-Vivek-Ramachandran.mp4", "length": 111884015}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW24-Password-Alert-by-Google.mp4", "length": 40134525}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/ATGP03-Intro-for-New-WCTFers-Russell-Handorf-Rick-Farina.mp4", "length": 193379983}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/GT08-Intro-to-Data-Science-for-Security-Rob-Bird-Alex-Shagla-McKotch.mp4", "length": 167957573}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW05-Tell-Me-Who-You-Are-and-I-Will-Tell-You-Your-Lock-Pattern-Marte-LAge.mp4", "length": 196796068}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG04-The-Journey-To-ICS-Larry-Vandenaweele.mp4", "length": 26293552}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG13-Phishing-Going-from-Recon-to-Credentials-Adam-Compton-Eric-Gershman.mp4", "length": 41244750}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG01-Getting-the-data-out-using-social-media-Dakota-Nelson-Gabriel-Butterick-Byron-Wasti.mp4", "length": 32035836}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/ATGP01-radBIOS-Wireless-networking-with-audio-Richo-Healey.mp4", "length": 116900564}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG08-What-the-heck-is-this-radio-stuff-anyway-Nick-Kartsioukas.mp4", "length": 34544665}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG17-10-Knowledge-Sharing-What-You-Learn-For-the-Benefit-of-the-Everyman-Ashley-Miller.mp4", "length": 57157572}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG03-Check-That-Certificate-Jacob-Jernigan-Andrew-Sorensen.mp4", "length": 41171224}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW21-Auth-for-Encrypted-Services-with-Server-Side-APT.mp4", "length": 46420443}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG05-A-hackers-guide-to-using-the-YubiKey-how-to-add-inexpensive-2-factor-authentication-to-your-next-project-Russ-Gritzo.mp4", "length": 84633845}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG23-Serial-Box-Primer-for-dealing-with-Serial-and-JTAG-for-basic-hardware-hacking-Matthew-Jakubowski.mp4", "length": 46071129}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/GT09-When-steganography-stops-being-cool-David-Sancho.mp4", "length": 51878123}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW00-passwords-privacy-keystroke-dynamics-Per-Thorsheim.mp4", "length": 38577695}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW08-Privileges-in-the-Real-World-Securing-Password-Management-Andrey-Dulkin.mp4", "length": 35093895}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG10-Rethink-Repurpose-Reuse-Rain-Hell-Michael-Zupo.mp4", "length": 44712653}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW20-Password-Based-Encryption-Using-IO-Hardness-Greg-Zaverucha.mp4", "length": 32995175}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW12-Towards-Standardizing-Comparisons-of-Password-Guessability-Sean-Segreti-Blase-Ur.mp4", "length": 43851397}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG00-Speaking-Metrics-to-Executives-Michael-St-Vincent.mp4", "length": 37035570}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/IATC00-Intro-and-Hack-the-Future-Keren-Elazari1.mp4", "length": 81806132}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG01-Dropping-hell0days-Business-Interaction-for-Security-Professionals-Or-Anyone-Else-Elliot-Johnson.mp4", "length": 31922983}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG19-Embedding-Web-Apps-in-MITMProxy-Scripts-Chris-Czub.mp4", "length": 27423888}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/ATGP07-Software-Defined-Radio-Signal-Processing-with-a-5-Microcontroller-Jared-Boone.mp4", "length": 94136843}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG10-Crash-The-IoT-Train-Yourself-Intentionally-Vulnerable-WRT-IV-WRT-Paul-Asadoorian-Nick-Curran.mp4", "length": 78986488}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/GT07-Advancing-Internet-Security-Research-with-Big-Data-and-Graph-Databases-Andrew-Hess.mp4", "length": 19580683}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG21-Out-of-Denial-A-12-Step-Program-for-Recovering-Admins-Paul-Lee.mp4", "length": 23869630}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW11-Harvesting-Passwords-from-Source-Code-Scripts-and-Code-Repositories-Philippe-Paquet.mp4", "length": 48488424}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG06-Adding-10-Security-to-Your-Scrum-Agile-Environment-Josh-Louden.mp4", "length": 155243406}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/ATGP02-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4", "length": 94696868}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG00-Barely-Legal-the-Hackeras-Guide-to-Cybersecurity-Legislation-Jen-Ellis.mp4", "length": 105876423}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG06-WhyMI-so-Sexy-WMI-Attacks-Real-Time-Defense-and-Advanced-Forensic-Analysis-William-Ballenthin-Claudiu-Teodorescu-Matthew-Graeber.mp4", "length": 69575185}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/GT03-Crema-A-LangSec-inspired-Language-Sergey-Bratus-Jacob-Torrey.mp4", "length": 76602564}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG03-NSA-Playset-Bridging-the-Airgap-without-Radios-Michael-Leibowitz.mp4", "length": 60974272}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG07-TAPIOCA-TAPIOCA-Automated-Processing-for-IOC-Analysis-Ryan-J-Chapman-Moses-Schwartz.mp4", "length": 71367679}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW22-Blind-Hashing.mp4", "length": 39389500}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW23-PBKDF2-Performance-Matters.mp4", "length": 30901108}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG22-Why-We-Cant-Have-Nice-Things-Original-Research-on-Conflict-Resolution-Styles-in-Information-Security-Risk-Management-Rachael-Lininger.mp4", "length": 38299496}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW03-What-would-fix-passwords-Some-weekly-password-audits-Pretty-graphs-to-prove-it-A-Haiku-Rick-Redman-Dale-Corpron.mp4", "length": 41386465}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG10-How-I-learnt-hacking-in-highschool-Lokesh-Pidawekar.mp4", "length": 38239062}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW26-How-Secure-Are-Multi-Word-Random-Passphrases.mp4", "length": 39224849}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG09-Remote-Access-the-APT-Ian-Latter.mp4", "length": 56814563}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG15-Cats-and-Mice-Ever-evolving-attackers-and-other-game-changerse-Eric-Kmetz.mp4", "length": 34409934}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW06-Scrutinizing-WPA2-Password-Generating-Algorithms-in-Wireless-Routers-Eduardo-Novella.mp4", "length": 36209656}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG03-How-Portal-Can-Change-Your-Security-Forever-Katrina-Rodzon.mp4", "length": 76443748}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/GT09-No-More-Fudge-Factors-and-Made-up-Shit-Performance-Numbers-That-Mean-Something-Russell-Thomas.mp4", "length": 121874369}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG05-Your-Electronic-Device-Please-Understanding-the-Border-Search-Exception-Electronic-Devices-Whitney-Merrill.mp4", "length": 104952938}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/GT01-Adversary-Intelligence-from-Conflict-to-Consensus-Alex-Valdevia-Rich-Barger.mp4", "length": 64629693}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/IATC03-State-of-Medical-Device-Cyber-Safety-Beau-Woods-Scott-Erven.mp4", "length": 55085242}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW02-Pushing-on-String-Adventures-in-the-Dont-Care-Regions-of-Password-Strength-Cormac-Herley.mp4", "length": 86569821}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/BG00-Injection-on-Steroids-Code-less-Code-Injections-and-0-Day-Techniques-Paul-Schofield-Udi-Yavo.mp4", "length": 81189536}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/IATC01-Hack-the-Future-Keren-Elazari.mp4", "length": 42692742}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW10-I-Forgot-My-Password-Michal-A-paAek.mp4", "length": 59461824}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG08-Yes-you-too-can-perform-daring-acts-of-Live-Acquisition-D0n-Quix0te.mp4", "length": 70554761}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG02-Dont-hate-the-Disclosure-Hate-the-Vulnerability-How-the-government-is-bringing-researchers-and-vendors-together-to-talk-vulnerability-disclosure-Allan-Friedman.mp4", "length": 82299682}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG20-What-Lurks-in-the-Shadow-Cheryl-Biswas.mp4", "length": 29634643}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/GT04-Making-Breaking-Machine-Learning-Anomaly-Detectors-in-Real-Life-Clarence-Chio.mp4", "length": 335951172}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG05-Catching-Linux-Post-Exploitation-with-Auditd-Eric-Gershman.mp4", "length": 34228262}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/ATGP05-Better-Spectrum-Monitoring-with-Software-Defined-Radio-Michael-Ossmann.mp4", "length": 103336385}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW01-Unspeakable-passwords-pronounceable-or-Diceware-Jeffery-Goldberg.mp4", "length": 70344746}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/IATC00-IATC-Track-Introduction-and-Overview-Josh-Corman-joshcorman-Nicholas-J-Percoco.mp4", "length": 39332662}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW07-Poppin-Digital-Locks-Devin-Egan.mp4", "length": 35032502}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG11-ZOMG-Its-OSINT-Heaven-Tazz-Tazz.mp4", "length": 58572278}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG04-Angler-Lurking-in-the-Domain-Shadows-Nick-Biasini.mp4", "length": 64453715}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG01-Pentesting-with-Docker-Tom-Steele.mp4", "length": 63517679}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/IATC04-Leading-in-a-Do-ocracy-Chris-Nickerson-Beau-Woods-Tod-Beardsley-Tim-Remes.mp4", "length": 167079070}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG18-Maximizing-Bro-Detection-John-B-Althouse.mp4", "length": 38180477}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW09-Security-Questions-Considered-Harmful-Jim-Fenton.mp4", "length": 31310512}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW27-Are-You-Sure-That-You-Still-Need-Passwords.mp4", "length": 23992583}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PW04-Breachego-Christian-Heinrich.mp4", "length": 42361934}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/ATGP08-All-Your-RFz-Are-Belong-to-Me-Software-Defined-Radio-Exploits-Balint-Seeber.mp4", "length": 86186425}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG06-Haking-the-Next-Generation-David-Schwartzberg.mp4", "length": 77185543}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/IATC05-State-of-Automotive-Cyber-Safety-Josh-Corman-joshcorman-Craig-Smith.mp4", "length": 102770430}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/CG07-Backdooring-MS-Office-documents-with-secret-master-keys-Yoshinori-Takesako-Shigeo-Mitsunari.mp4", "length": 45968821}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/GT06-Who-Watches-the-Watchers-Metrics-for-Security-Strategy-Michael-Roytman.mp4", "length": 80812408}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG12-Classic-Misdirection-Social-Engineering-to-Counter-Surveillance-Peter-Clemenko-III.mp4", "length": 36721130}, {"path": "BSides Las Vegas/BSides Las Vegas 2015/PG14-Social-Media-in-Incident-Response-Program-JoEtta-LeSueur.mp4", "length": 25684434}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1530 Brendan OConnor HARK The Hacker Archive.mp4", "length": 42683792}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 6 Hack the Hustle! Career Strategies for Information Security Professionals Ev.mp4", "length": 189510282}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 7 What if Petraeus was a hacker Email privacy for the rest of us Fak3r.mp4", "length": 118234557}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 3 EC2 or Bust - How to Build Your Own Pen Testing Lab in Amazon EC2 Grecs.mp4", "length": 146598873}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 2 Say It to My Face Shannon Sistrunk.mp4", "length": 210952628}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 5 The Erudite Inebriate s Guide to Life, Liberty, and the Purfuit of Happinefs.mp4", "length": 166266234}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 05 GPS Hacking @recompiler).mp4", "length": 52886864}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 3 Mom! I Broke My Insulin Pump Again! Jay Rad Radcliffe.mp4", "length": 175684645}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 02 Hack cellular metabolism by targeting mitochondria @ambimorph).mp4", "length": 62193313}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 1 You Are Being Watched! Bharat Jogi.mp4", "length": 159218589}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 4 Popping the Penguin An Introduction to the Principles of Linux Persistence M.mp4", "length": 145596717}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 5 You can t make people act more securely, you can help them want to.mp4", "length": 186895024}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 2 2 Breach Panel Davi Ottenheimer, Raymond Umerley, Jack Daniel, Steve Werby, Da.mp4", "length": 210573665}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 1 Never Mind Your Diet, Cut the Crap From Your Vocabulary Keli Hay Brian Marti.mp4", "length": 183389659}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 7 The Sensual Side of 3D Printing Kat Sweet Javvad Malik).mp4", "length": 131691072}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 5 The Goodness is Baked In Baking Assurance into Software Ebony Davi Ottenheim.mp4", "length": 125004877}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 07 SSD data evaporation @sambrowne).mp4", "length": 46294995}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 4 GTFO FTW Hacking Your Lifestyle for Fun and Profit Beau Woods and Taylor Ban.mp4", "length": 216177622}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 6 Flameout Burnout Supernova Dan Ward Ally Miller).mp4", "length": 186030347}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 3 Alex Dreams of Risk How the Concept of Being a Craftsma.mp4", "length": 207440198}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 3 The Little Dutch Boy D0n Quix0te Bill E Ghote).mp4", "length": 190034698}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 6 Matriux Leandros An Open Source Penetration Testing and Forensic Distribution.mp4", "length": 146576451}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 1 Diamonds, Fitness and Cults Manipulation for Fun and Profit Katie Rodzon.mp4", "length": 166479421}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 5 Malware Management Framework We detected WinNTI with it! Michael Gough.mp4", "length": 160014565}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 8 Strange interactions in personal data Brokers and the CFAA Christine Dudley.mp4", "length": 100424402}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 3 The Truth, You Thought We Wouldn t Know Wolf Flight Terry Gold).mp4", "length": 198975627}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 5 Stop Shooting Blanks No magic bullets in your arsenal Renegade6 Nicolle Neul.mp4", "length": 213337461}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/2 2 1 Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn t Suck Josh.mp4", "length": 180906856}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 2 Using Machine Learning to Support Information Security Alex Pinto Joel Wilba.mp4", "length": 228908766}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 5 HiveMind Distributed File Storage Using JavaScript Botnets Sean Malone.mp4", "length": 197374880}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 2 Calling All Researchers A Discussion on Building a Security Research F.mp4", "length": 164880947}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 2 1 Attribution Shmatribution! FIX YOUR SHIT! Krypt3ia.mp4", "length": 155251281}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 8 Social Aftermath Responding to Social Pwnage Steven F Fox.mp4", "length": 101104819}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 6 Your Droid Has No Clothes Mike Murray and Allan Zhang.mp4", "length": 191836659}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 7 Collaborative Penetration Testing With Lair Tom Steele and Dan Kottmann.mp4", "length": 153910775}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 1 Silence Equals Death Violet Blue.mp4", "length": 276036789}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 3 A Fire In The Eye Olli Pekka Niemi and Antti Levomaki.mp4", "length": 132802897}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 7 Information Sharing, or I ve got 99 problems and they re probably.mp4", "length": 95768759}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 1 Fun with WebSockets using Socket Puppet Mister Glass Weasel).mp4", "length": 104375317}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 2 3 OMFG China! T Prophet.mp4", "length": 222187280}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 2 Discovering Dark Matter Towards better Android Malware Heuristics Jim.mp4", "length": 219028792}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 1 The Security Industry How to Survive Becoming Management Christien Rioux.mp4", "length": 247807124}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 6 Crunching the Top 10,000 Websites Password Policies and Controls Steve Werb.mp4", "length": 211036199}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 01 Least Authority File System @zooko.mp4", "length": 83989296}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 5 Network Survival WCS James Costello.mp4", "length": 180324250}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 6 The Slings and Arrows of Open Source Security Tod Beardsley and Mister X.mp4", "length": 202674549}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 5 1 1 Attacking and Defending Full.mp4", "length": 200232103}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 2 How embracing social media helped me stop the hackers, save the world and get.mp4", "length": 136450855}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 Cookie Reuse Sam Bowne.mp4", "length": 67246820}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 7 Governments and UFOs A Historical Analysis of Disinformation and Deception R.mp4", "length": 216018623}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 2 3 Malware Automation Christopher Elisan.mp4", "length": 229847602}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 4 Vulnerabilities in Application Whitelisting Malware Case Studies Jared Sperl.mp4", "length": 156368872}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 4 1 3 Evil Empire SIEM FTW EggDropX and Tha CheezMan.mp4", "length": 149068160}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1550 Jack Whitsitt Critical Infrastructure Protection As Code.mp4", "length": 73182719}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 1 2 The 7 habits of highly effective CISOs Franklin Tallah Wendy Nather).mp4", "length": 196365540}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 4 Techniques for Escaping the AppSec Labyrinth Andrew Hay.mp4", "length": 161147962}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 LT 04 Cross Platform Metasploit Payloads @bperry).mp4", "length": 40513407}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 6 gitDigger Creating useful wordlists from public GitHub repositories WiK and.mp4", "length": 101686852}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 1 4 Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth Evan.mp4", "length": 165922279}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 4 Defense Evasion Modeling Frank Artes.mp4", "length": 215447819}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 2 1 2 Vulnerability & Exploit Trends A Deep Look Inside The Data Ed Bellis, Michae.mp4", "length": 167704206}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 3 2 7 Sixteen Colors Archiving the Evolution of ANSI and ASCII Art Doug Moore Bren.mp4", "length": 219345313}, {"path": "BSides Las Vegas/BSides Las Vegas 2013/BSidesLV 2013 1 2 2 The Cavalry Isn t Coming Starting the Revolution to Fsck it All!.mp4", "length": 191259334}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg05 travel hacking with the telecom informer tprophet.mp4", "length": 117546456}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/gt01 measuring the iq of your threat intelligence feeds alex pinto kyle maxwell.mp4", "length": 197188538}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg04 untwisting the mersenne twister how i killed the prng moloch.mp4", "length": 90737085}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg15 black magic and secrets how certificates influence you robert lucero.mp4", "length": 67390868}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg16 attacking drupal greg foss.mp4", "length": 90607838}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg11 a place to hang our hats security community and culture domenic rizzolo.mp4", "length": 45538596}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg17 hackers vs auditors dan anderson.mp4", "length": 65966565}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg11 ios url schemes omg guillaume k ross.mp4", "length": 64260418}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg12 booze devils advocate and hugs the best debates panel youll see at bsideslv 2014 david mortman.mp4", "length": 166189739}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg00 sha 1 backdooring and exploitation jean philippe aumasson.mp4", "length": 63755577}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg11 security testing for smart metering infrastructure steve vandenberg robert hawk.mp4", "length": 134941207}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg01 evading code emulation writing ridiculously obvious malware that bypasses av kyle adams.mp4", "length": 171642810}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg02 allow myself to encrypt myself evan davison.mp4", "length": 113989347}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg02 securing sensitive data a strange game jeff elliot.mp4", "length": 44831995}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg10 vaccinating android milan gabor danijel grah.mp4", "length": 107885968}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg21 the lore shows the way eric rand.mp4", "length": 61938838}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/gt03 clusterf ck actionable intelligence from machine learning mike sconzo.mp4", "length": 117028766}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg00 edsec hacking for education jessy irwin.mp4", "length": 63347780}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg08 why am i surrounded by friggin idiots because you hired them stephen heath.mp4", "length": 151176471}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg00 opening keynote beyond good and evil towards effective security adam shostack.mp4", "length": 117905139}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg07 can i code against an api to learn a product adrienne merrick tagore.mp4", "length": 37049509}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg03 what reaction to packet loss reveals about a vpn anna shubina sergey bratus.mp4", "length": 79583216}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/gt04 know thy operator misty blowers.mp4", "length": 132942063}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg09 demystiphying and fingerprinting the 802 15 4 zigbee phy ira ray jenkins sergey bratus.mp4", "length": 122787427}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/gt02 strategies without frontiers meredith l patterson.mp4", "length": 177350686}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/gt05 improving security by avoiding traffic and still get what you want in data transfers art conkli.mp4", "length": 115643183}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg13 we hacked the gibson now what philip young.mp4", "length": 117289885}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg04 cut the shit how to reign in your ids tony robinson da 667.mp4", "length": 60503645}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg20 teach a man to phish vinny lariza.mp4", "length": 63160319}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg04 malware analysis 101 n00b to ninja in 60 minutes grecs.mp4", "length": 127304752}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg19 pwning the hapless or how to make your security program not suck casey dunham emily pience.mp4", "length": 54952239}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg12 the savage curtain tony trummer tushar dalvi.mp4", "length": 128261482}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg07 using superpowers for hardware reverse engineering joe grand.mp4", "length": 156304616}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg06 the untold story about atm malware daniel regalado.mp4", "length": 98666282}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg03 brick in the wall vs hole in the wall caroline d hardin.mp4", "length": 59890297}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg02 security management without the suck tony turner tim krabec.mp4", "length": 130849864}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg08 bring your own risky apps michael raggo kevin watkins.mp4", "length": 135697552}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg05 anatomy of memory scraping credit card stealing pos malware amol sarwate.mp4", "length": 138275557}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg08 bridging the air gap cross domain solutions patrick orzechowski.mp4", "length": 96812578}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg18 third party service provider diligence why are we doing it all wrong patrice coles.mp4", "length": 80336960}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg09 back dooring the digital home david lister.mp4", "length": 87884528}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg01 usb write blocking with usbproxy dominic spill.mp4", "length": 86365211}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg07 a better way to get intelligent about threats adam vincent.mp4", "length": 143580711}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg13 what ive learned as a con man masterchen.mp4", "length": 66265380}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg05 geek welfare confessions of a convention swag hoarder rachel keslensky.mp4", "length": 95146341}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg06 no infosec staff no problem anthony czarnik.mp4", "length": 83767395}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg06 cluck cluck on intels broken promises jacob torrey.mp4", "length": 94523951}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/gt00 the power law of information michael roytman.mp4", "length": 161411616}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg14 training with raspberry pi nathaniel davis.mp4", "length": 48082201}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/bg09 invasive roots of anti cheat software alissa torres.mp4", "length": 135886008}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/cg10 insider threat kill chain human indicators of compromise ken westin.mp4", "length": 47069321}, {"path": "BSides Las Vegas/BSides Las Vegas 2014/pg12 oops that wasnt suppossed to happen bypassing internet explorers cross site scripting filter ca.mp4", "length": 71272688}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.2.1 Andrew Hay & Matt Johansen Applications and Cloud and Hackers, Oh My!.mp4", "length": 102307290}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.2.4 James Lester & Joseph Tartaro Burp Suite Informing the 99% of what the 1%ers.mp4", "length": 104367924}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.2.0 Raphael Mudge Force Multipliers for Red Team Operations.mp4", "length": 97505881}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.1.6 Parth Patel Introducing Android Security Evaluation Framework - ASEF.mp4", "length": 82347192}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.1.5 Christopher Lytle Puzzle Competitions and You.mp4", "length": 79129909}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.1.3 Spencer McIntyre How I Learned To Stop Worrying and Love the Smart Meter.mp4", "length": 89735408}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.1.0 KEYNOTE, Jack Daniel The State of Security BSides.mp4", "length": 95469449}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.2.1 Walt Williams Metrics that Suck Even Less.mp4", "length": 112510056}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.1.5 Shawn Asmus, Kristov Widak Mirror Mirror -- Reflected PDF Attacks using SQL Injection.mp4", "length": 100221309}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.1.3 Davi Ottenheimer Big Data s Fourth V Or Why We ll Never Find the Loch Ness Monster.mp4", "length": 91996880}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.1.1 Matt Weeks Ambush - Catching Intruders At Any Point.mp4", "length": 108905454}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.2.2 Conrad Constantine The Leverage of Language or How I Realized Information Theory.mp4", "length": 95601248}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.1.4 Christopher Campbell Shot With Your Own Gun How Appliances are Used Against You.mp4", "length": 94963899}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.2.6 Gillis Jones The Badmin project (Na-na- nanana Na-na-nanana BADMIN).mp4", "length": 53455673}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.2.4 Lightning Talks.mp4", "length": 217071062}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.1.7 Terry Gold RFID LOL.mp4", "length": 86247892}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1 2 5 dc949 Stiltwalker Round 2.mp4", "length": 147042863}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.1.4 HD Moore Empirical Exploitation.mp4", "length": 92066668}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.2.3 Jason Ding The Blooming Social Media Economics Built on Fake Identities.mp4", "length": 94458353}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.1.0 Michael Fornal How I managed to break into the InfoSec World.mp4", "length": 75819281}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.2.0 Phil Young Mainframed - The Forgotten Fortress.mp4", "length": 96478169}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.2.3 Josh Sokol Dan Cornell The Magic of Symbiotic Security Creating an Ecosystem of Security.mp4", "length": 80195323}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.1.6 Georgia Weidman Introducing the Smartphone Penetration Testing Framework.mp4", "length": 77102409}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.1.2 William Ghote Lotus Notes Password Hash Redux.mp4", "length": 62120470}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.1.2 Robert Rowley Max Level Web App Security.mp4", "length": 87419948}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/2.1.1 David Keene Breaking Microsoft Dynamics Great Plains - an insiders guide.mp4", "length": 84005366}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.2.2 Brendan O Connor Reticle Dropping an Intelligent F-BOMB.mp4", "length": 246113921}, {"path": "BSides Las Vegas/Bsides Las Vegas 2012/1.2.7 IPv6 Panel Drinking Game.mp4", "length": 78336224}, {"path": "BSides Huntsville/BSides Huntsville 2016/200-Hacking-Peoples-Lives-with-Google-Sync-Shawn-Edwards-Sean-Hopkins.mp4", "length": 119675027}, {"path": "BSides Huntsville/BSides Huntsville 2016/101-Slaying-Rogue-Access-Points-with-Python-and-Cheap-Hardware-Gabriel-Ryan.mp4", "length": 31673430}, {"path": "BSides Huntsville/BSides Huntsville 2016/107-BSides-Closeout-Paul-Coggin.mp4", "length": 11020049}, {"path": "BSides Huntsville/BSides Huntsville 2016/104-At-the-mountains-of-malware-Lessons-learned-from-analyzing-terabytes-of-malware-Wes-Widner.mp4", "length": 20131611}, {"path": "BSides Huntsville/BSides Huntsville 2016/102-Web-shells-as-a-covert-channel-Joe-Vest.mp4", "length": 72195632}, {"path": "BSides Huntsville/BSides Huntsville 2016/202-Threat-Modeling-the-Minecraft-Way-Jarred-White.mp4", "length": 133914898}, {"path": "BSides Huntsville/BSides Huntsville 2016/204-History-of-WRT-and-Wireless-Mesh-protocols-Alex-Kot.mp4", "length": 37797731}, {"path": "BSides Huntsville/BSides Huntsville 2016/100-Opening-Keynote-Jack-Daniel.mp4", "length": 61336749}, {"path": "BSides Augusta/BSides Augusta 2015/00-Welcome-Major-General-Fogarty.mp4", "length": 76814535}, {"path": "BSides Augusta/BSides Augusta 2015/BT205-Lessons-Learned-from-Analyzing-Terabytes-of-Malware-Wes-Widner.mp4", "length": 59029022}, {"path": "BSides Augusta/BSides Augusta 2015/BT106-Infiltrating-C2-Infrastructure-Tim-Crothers.mp4", "length": 109413458}, {"path": "BSides Augusta/BSides Augusta 2015/BT204-The-Programmatic-Evolution-of-Technology-Defense-Roland-Cloutier.mp4", "length": 66692359}, {"path": "BSides Augusta/BSides Augusta 2015/BT107-Building-aMuscle-Memory-with-Rekall-Memory-Forensic-Framework-Alissa-Torres.mp4", "length": 77715811}, {"path": "BSides Augusta/BSides Augusta 2015/BT101-Taking-a-Distributed-Computing-Approach-to-Network-Detection-with-Bro-and-aThe-Clouda-Mike-Reeves.mp4", "length": 223584859}, {"path": "BSides Augusta/BSides Augusta 2015/RT102-Weaponizing-our-youth-The-Case-for-Integrated-Cyber-Ethics-Josh-Rykowski.mp4", "length": 48326687}, {"path": "BSides Augusta/BSides Augusta 2015/BT200-Go-Hack-Yourself-Jason-Frank.mp4", "length": 66244889}, {"path": "BSides Augusta/BSides Augusta 2015/BT100-Fundamental-Understanding-of-Baseline-Analysis-and-Remediation-for-Industrial-Control-Systems-Juli-Joyner-and-Jeffrey-Medsger.mp4", "length": 82200155}, {"path": "BSides Augusta/BSides Augusta 2015/BT102-A-A-Scouts-Perspective-on-Network-Defense-Justin-Edgar.mp4", "length": 185457841}, {"path": "BSides Augusta/BSides Augusta 2015/RT104-DIY-Vulnerability-Discovery-with-DLL-Side-Loading-Jake-Williams.mp4", "length": 72517874}, {"path": "BSides Augusta/BSides Augusta 2015/BT103-Doomsday-Preppers-APT-Edition-Tanner-Payne.mp4", "length": 34070204}, {"path": "BSides Augusta/BSides Augusta 2015/01-Keynote-Ed-Skoudis.mp4", "length": 70102537}, {"path": "BSides Augusta/BSides Augusta 2015/RT103-Making-Everything-Old-New-Again-Andrew-Cole-and-Rich-Moulton.mp4", "length": 319548677}, {"path": "BSides Augusta/BSides Augusta 2015/RT106-Attacking-OWASP-Exploiting-the-Top-10-David-Coursey.mp4", "length": 65453488}, {"path": "BSides Augusta/BSides Augusta 2015/BT105-Viper-Framework-for-Malware-Analysis-Paul-Melson.mp4", "length": 33346626}, {"path": "BSides Augusta/BSides Augusta 2015/BT104-Building-a-Better-Security-Analyst-Using-Cognitive-Psychology-Chris-Sanders.mp4", "length": 40555627}, {"path": "BSides Augusta/BSides Augusta 2015/BT108-The-Blue-Team-Starter-Kit-Timothy-De-Block.mp4", "length": 57061043}, {"path": "BSides Augusta/BSides Augusta 2015/BT201-2015-Its-not-over-yet-Joel-Esler.mp4", "length": 112859408}, {"path": "BSides Augusta/BSides Augusta 2015/RT105-Recon-ng-and-Beyond-Tim-Tomes.mp4", "length": 89403318}, {"path": "BSides Augusta/BSides Augusta 2015/BT203-Destruction-as-a-Service-Security-Through-Reanimation-Jon-Medina.mp4", "length": 61888097}, {"path": "BSides Augusta/BSides Augusta 2015/BT202-How-to-Get-Into-ICS-Security-Chris-Sistrunk.mp4", "length": 75612894}, {"path": "BSides Augusta/BSides Augusta 2015/RT100-Using-a-HackRF-One-to-Infiltrate-the-Digital-Thetford-Wall-Patrick-Perry.mp4", "length": 60008276}, {"path": "BSides Augusta/BSides Augusta 2015/RT101-Malvertizing-Like-a-Pro-Alex-Rymdeko-Harvey.mp4", "length": 66445241}, {"path": "BSides Augusta/BSides Agusta Logo.jpg", "length": 81437}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America04 Using Ransomware Against Itself Tim Crothers and Ryan Borres.srt", "length": 51547}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You00 Using Honeypots for Network Security Monitoring Chris Sanders.mp4", "length": 73524408}, {"path": "BSides Augusta/BSides Augusta 2016/Keynote Rob Joyce.mp4", "length": 65068050}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You06 ICS SCADA Threat Hunting Robert M Lee Jon Lavender.srt", "length": 89403}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You04 Beyond Math Practical Security Analytics Martin Holste.mp4", "length": 52713995}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You03 Moving Target Defense Evasive Maneuvers in Cyberspace Adam Duby.mp4", "length": 30219774}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here06 Flaying out the Blockchain Ledger for Fun Profit and Hip Hop Andrew Morris.mp4", "length": 61492687}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here07 Network Situational Awareness with Flow Data Jason Smith.srt", "length": 76242}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You02 This is not your Mommas Threat Intelligence Rob Gresham.mp4", "length": 30724194}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad01 Incident Response Awakens Tom Webb.mp4", "length": 40245666}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here02 Micro segmentation and Security The Way Forward Jack Koons.mp4", "length": 45214018}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad04 Detection of malicious capabilities using YARA Brian Bell.mp4", "length": 30673444}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here03 Adventures in RAT dev Hunter Hardman.mp4", "length": 26915447}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad00 Mobile Hacking Aaron Guzman.mp4", "length": 77435507}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad07 Internet of Terrible Brandon McCrillis.mp4", "length": 77747545}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You07 Agilely Compliant yet Insecure Tom Ruff.srt", "length": 42278}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America02 Finding Evil in DNS Traffic Keelyn Roberts.mp4", "length": 24507156}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here00 Gamification for the Win Josh Rykowski and Scott Hamilton.mp4", "length": 73180533}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad03 Exploit Kits Machine Learning Patrick Perry.srt", "length": 33612}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America01 You TOO can defend against MILLIONS of cyber attacks Michael Banks.srt", "length": 29801}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America03 Ransomware Threats to the Healthcare Industry Tim Gurganis.srt", "length": 36272}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here05 How About a Piece of Pi Experiences with Robots and Raspberry Pi Hacking Joh.srt", "length": 51626}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America06 Automating Malware Analysis for Threat Intelligence Paul Melson.mp4", "length": 78033289}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America05 Hunting Defense Against The Dark Arts Jacqueline Stokes Danny Akacki and Stephen.mp4", "length": 74807340}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America07 Hide and Seek with EMET Jonathan Creekmore and Michael Edie.srt", "length": 58075}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You01 This one weird trick will secure your web server David Coursey.mp4", "length": 26169065}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad06 RAT Reusing Adversary Tradecraft Alexander Rymdeko Harvey.srt", "length": 73219}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here04 Linux privilege escalation for fun profit and all around mischief Jake Willi.srt", "length": 61165}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America00 A worm in the Apple examining OSX malware Wes Widner.mp4", "length": 71959675}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad02 Dr Pentester or How I Learned To Stop Worrying and Love the Blue Team Ryan OHoro.srt", "length": 34007}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad05 Owning MS Outlook with Powershell Andrew Cole.mp4", "length": 66102763}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You05 Exploit Kits and Indicators of Compromise Brad Duncan.srt", "length": 50134}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here01 IDSIPS Choices Benefits Drawback and Configurations ForgottenSec.srt", "length": 33085}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You05 Exploit Kits and Indicators of Compromise Brad Duncan.mp4", "length": 67123200}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here01 IDSIPS Choices Benefits Drawback and Configurations ForgottenSec.mp4", "length": 38549698}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad05 Owning MS Outlook with Powershell Andrew Cole.srt", "length": 63829}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America05 Hunting Defense Against The Dark Arts Jacqueline Stokes Danny Akacki and Stephen.srt", "length": 72345}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America07 Hide and Seek with EMET Jonathan Creekmore and Michael Edie.mp4", "length": 90005655}, {"path": "BSides Augusta/BSides Augusta 2016/I Got You01 This one weird trick will secure your web server David Coursey.srt", "length": 22553}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad06 RAT Reusing Adversary Tradecraft Alexander Rymdeko Harvey.mp4", "length": 93486750}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here04 Linux privilege escalation for fun profit and all around mischief Jake Willi.mp4", "length": 73821924}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America00 A worm in the Apple examining OSX malware Wes Widner.srt", "length": 54031}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad02 Dr Pentester or How I Learned To Stop Worrying and Love the Blue Team Ryan OHoro.mp4", "length": 55409930}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America06 Automating Malware Analysis for Threat Intelligence Paul Melson.srt", "length": 52620}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad03 Exploit Kits Machine Learning Patrick Perry.mp4", "length": 39971303}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America01 You TOO can defend against MILLIONS of cyber attacks Michael Banks.mp4", "length": 44833100}, {"path": "BSides Augusta/BSides Augusta 2016/Living In America03 Ransomware Threats to the Healthcare Industry Tim Gurganis.mp4", "length": 39437109}, {"path": "BSides Augusta/BSides Augusta 2016/Its Too Funky In Here05 How About a Piece of Pi Experiences with Robots and Raspberry Pi Hacking Joh.mp4", "length": 53702877}, {"path": "BSides Augusta/BSides Augusta 2016/Super Bad04 Detection of
Download Info
-
Tips
“Security BSides” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.