TROOPERS IT Security Conference
Welcome TROOPER,
on our channel you will find talks and impressions around the ITsecurity conference TROOPERS in Heidelberg, hosted by ERNW.
Enjoy the talks of the last years and exchange with the community, because WEareTROOPERS.
TROOPERS25: Finding Entra ID CA Bypasses - The Structured Way
TROOPERS25: Getting developers to follow standards is easy, and other lies we tell ourselves
TROOPERS25: Eerie Glow - Unveiling Security Vulnerabilities in Open Source Satellite Protocols
TROOPERS25: iOS Inactivity Reboot
TROOPERS25: Caught in the FortiNet - Compromising Organizations Using Endpoint Protection
TROOPERS25: Closing
TROOPERS25: Headphone Jacking - A Key to Your Phone
TROOPERS25: Demystifying Managed Service Accounts
TROOPERS25: Hopping Accross Devices - Expanding Lateral Movement through Pass the Certificate Attack
TROOPERS25: SBOMs - The right way
TROOPERS25: The Ultimate Guide for Protecting Hybrid Identities in Entra ID
TROOPERS25: Securing the Airwaves Emulation, Fuzzing, and Reverse Engineering of iPhone Baseband
TROOPERS25: Becoming the Trainer - Attacking ML Training Infrastructure
TROOPERS25: Roaming Agreements - The Hidden 5G Attack Surface
TROOPERS25: Eastern Promises - Mobile VRP Lessons For Bug Hunters
TROOPERS25: DHL Hackstation - What's inside
TROOPERS25: Scriptless Attacks - Why CSS is My Favorite Programming Language
TROOPERS25: Beyond LSASS - Cutting Edge Techniques for Undetectable Threat Emulation
TROOPERS25: Anti Forensics - You are doing it wrong Believe me, I'm an IR consultant
TROOPERS25: Misconfiguration Manager - Still Overlooked, Still Overprivileged
TROOPERS25: Authenticating through Windows Hello for Business, a reverse engineering story
TROOPERS25: Spoofed & Trusted - Next Generation Email Attacks Targeting Design & Implementation
TROOPERS25: Building Zero Trust Architecture in Public Health
TROOPERS25: Revisiting Cross Session Activation attacks
TROOPERS25: RBAC - The Shady Place Behind Basic Entra ID Security
TROPPERS25: Decoding RFID - A comprehensive overview of security, attacks and the latest innovations
TROOPERS25: The Crypto Game of North Korea Stealing Money with Chrome 0 days
TROOPERS25: Breaking Boundaries - Unraveling AD Cross Forest Attack Paths
TROOPERS25: Say Cheese! How We Pwned Your Security Camera
TROPPERS25: Adobe and SAP - All Your Business Documents Belong To Us