1. Rooting your internals Inter Protocol Exploitation, custom shellcode and BeEF

    Rooting your internals Inter Protocol Exploitation, custom shellcode and BeEF

    21
  2. Content Security Policy the panacea for XSS or placebo

    Content Security Policy the panacea for XSS or placebo

    20
  3. Panel Discussion Is Application Security a Losing Battle 2 3

    Panel Discussion Is Application Security a Losing Battle 2 3

    18
  4. Q Box and H Box Raspberry PI for the Infrastructure and Hacker

    Q Box and H Box Raspberry PI for the Infrastructure and Hacker

    17
  5. Promon TestSuite Client Based Penetration Testing Tool 2 3

    Promon TestSuite Client Based Penetration Testing Tool 2 3

    51
  6. Precision Timing Attacking browser privacy with SVG and CSS

    Precision Timing Attacking browser privacy with SVG and CSS

    2
  7. Keynote Secure all the things fiction from the Web s immediate future

    Keynote Secure all the things fiction from the Web s immediate future

    9
  8. Lightning Talk Creating Accessible Security Testing with ZAP

    Lightning Talk Creating Accessible Security Testing with ZAP

    2
  9. Keynote Angela s Top 10 list of reasons why users bypass security measures

    Keynote Angela s Top 10 list of reasons why users bypass security measures

    6
  10. Keynote Cryptography in Web Security Stupid, Broken, and maybe Working

    Keynote Cryptography in Web Security Stupid, Broken, and maybe Working

    8
  11. Product Security Management in Agile Product Management 3 3

    Product Security Management in Agile Product Management 3 3

    6
  12. Session Fixation the Forgotten Vulnerability 1 3

    Session Fixation the Forgotten Vulnerability 1 3

    4
  13. HTTPS Based Clustering for Assisted Cybercrime Investigations

    HTTPS Based Clustering for Assisted Cybercrime Investigations

    4
  14. Radio Hacking: Cars, Hardware, and more!

    Radio Hacking: Cars, Hardware, and more!

    4