Never Ending Security

It starts all here

GrrCON 2014 Video’s

Video’s from: https://archive.org/details/GrrCON2014

Movie Files Animated GIF MPEG4 Ogg Video Thumbnail Flash Video h.264
Board-Breaking-Challenge.mp4 288.7 KB 297.8 MB 87.5 MB 6.5 KB
GrrCon-TAP.mp4 196.8 KB 67.7 MB 81.7 MB 4.1 KB
Grrcon-14-closing.mp4 300.9 KB 259.9 MB 89.3 MB 6.5 KB
PUNKED t04-Finding-Our-Way-a-From-Pwned-to-StrategyA-David-Kennedy.flv 309.8 KB 217.6 MB 5.7 KB 585.7 MB 304.1 MB
PUNKED t05-Emulate-SandBox-and-VMs-to-avoid-malware-infections-Jordi-Vazquez.flv 316.6 KB 130.6 MB 5.8 KB 350.8 MB 182.4 MB
PUNKED t06-Security-Hopscotch-Chris-Roberts-1.flv 307.0 KB 164.9 MB 6.3 KB 450.4 MB 229.9 MB
PUNKED t06-Security-Hopscotch-Chris-Roberts-2.flv 127.5 KB 28.5 MB 5.8 KB 76.5 MB 40.0 MB
PUNKED t07-Email-DLP-Simple-concept-often-poorly-implemented-c0rrup7R3x.flv 178.3 KB 68.2 MB 6.6 KB 183.0 MB 95.3 MB
PUNKED t08-Look-Observe-Link-LOL-a-How-I-learned-to-love-OSINT-NinjaSl0th-1.flv 131.0 KB 26.1 MB 5.1 KB 70.2 MB 36.5 MB
PUNKED t08-Look-Observe-Link-LOL-a-How-I-learned-to-love-OSINT-NinjaSl0th-2.flv 311.4 KB 195.6 MB 5.6 KB 526.3 MB 272.6 MB
b00-Hack-the-Hustle-Career-Strategies-For-Information-Security-Professionals-Eve-Adams.mp4 357.1 KB 153.9 MB 181.8 MB 5.9 KB
b01-The-Challenge-of-Natural-Security-Systems-Rockie-Brockway.mp4 277.2 KB 201.3 MB 168.1 MB 5.2 KB
b02-Application-Pen-Testing-Chris-Pfoutz.mp4 296.0 KB 167.2 MB 216.4 MB 3.2 KB
b03-Advanced-Breaches-of-2013-vs-Behavioral-Detection-Charles-Herring.mp4 311.3 KB 137.0 MB 207.5 MB 5.5 KB
b04-Security-On-The-Cheap-Joel-Cardella.mp4 317.3 KB 186.3 MB 223.1 MB 4.0 KB
b05-Home-Grown-Linux-Phil-Polstra.mp4 339.9 KB 127.4 MB 143.0 MB 6.7 KB
b06-Cyber-Security-Incidents-Red-Blue-Team-Unc13-Fuck3r.mp4 263.9 KB 77.9 MB 99.5 MB 5.6 KB
intro.mp4 154.9 KB 34.4 MB 29.7 MB 6.5 KB
s00-Advanced-Threats-and-Lateral-MovementA-Terrance-Davis.mp4 288.9 KB 102.1 MB 103.1 MB 5.1 KB
s01-Adopting-a-Risk-based-Threat-Model-to-Secure-Your-Defenses-and-Regain-Control-of-Your-Critical-Data-Todd-Bursch.mp4 301.4 KB 72.9 MB 114.7 MB 4.8 KB
s02-New-World-New-Realities-Endpoint-threat-Detection-Response-and-Prevention-Brian-Orr.mp4 298.0 KB 66.2 MB 105.9 MB 6.3 KB
s03-Reducing-Your-Organizationas-Social-Engineering-Attack-Surface-Jen-Fox.mp4 303.1 KB 88.9 MB 109.8 MB 5.3 KB
s04-Memory-Forensics-with-Hyper-V-Virtual-Machines-Wyatt-Roersma.mp4 225.0 KB 55.9 MB 102.7 MB 4.7 KB
s05-T-My-Industry-Says-Kellman-Meghu.mp4 316.4 KB 150.6 MB 192.9 MB 2.7 KB
s06-Bringing-PWNED-To-You-Interesting-Honeypot-Trends-Elliott-Brink.mp4 175.7 KB 44.5 MB 71.8 MB 5.1 KB
s07-The-Security-Implications-of-Software-Defined-Networks-Shane-Praay.mp4 337.5 KB 104.3 MB 113.5 MB 6.3 KB
s08-Lessons-from-the-front-lines-Top-focus-areas-for-information-security-leaders-Shogo-Cottrell.mp4 312.5 KB 181.5 MB 266.5 MB 5.2 KB
s09-How-to-budget-IDSs-Brian-Arcane-Heitzman.mp4 277.7 KB 87.9 MB 108.1 MB 5.3 KB
s10-LEVIATHAN-Command-and-Control-Communications-on-Planet-Earth-Kevin-Thompson.mp4 247.1 KB 82.8 MB 94.4 MB 7.6 KB
s11-Red-Teaming-Back-and-Forth-5ever-FuzzyNop.mp4 341.1 KB 163.2 MB 204.4 MB 8.0 KB
s12-Intelligence-Driven-Security-Shane-Harsch.mp4 329.0 KB 105.5 MB 176.6 MB 6.3 KB
s13-Security-for-the-People-End-User-Authentication-Security-on-the-Internet-Mark-Stanislav.mp4 320.2 KB 98.3 MB 172.6 MB 5.2 KB
s14-Hackers-Are-People-Too-Infosystir.mp4 368.7 KB 116.6 MB 147.1 MB 6.4 KB
s15-Vaccinating-APKs-Milan-Gabor.mp4 363.6 KB 171.4 MB 218.6 MB 7.1 KB
t00-Around-the-world-in-80-Cons-A-tale-of-perspectives-Jayson-E-Street.mp4 323.0 KB 295.6 MB 270.4 MB 6.3 KB
t01-Infosec-in-the-21st-century-Tim-Crothers.mp4 286.6 KB 171.6 MB 192.5 MB 5.8 KB
t02-Securing-our-Ethics-Ethics-and-Privacy-in-a-Target-Rich-Environment-Kevin-Johnson.mp4 319.4 KB 257.8 MB 244.2 MB 6.6 KB
t03-Social-Engineering-Can-Kill-Me-But-It-Can’t-Make-Me-Care-Gavin-Jac0byterebel-Ewan.mp4 369.3 KB 279.7 MB 208.6 MB 7.9 KB
t09-ZitMo-NoM-David-HealWHans-Schwartzberg.mp4 347.1 KB 167.6 MB 192.3 MB 8.2 KB
t10-Bigger-Boys-Made-Us-Mike-Kemp.mp4 295.9 KB 288.8 MB 241.0 MB 5.3 KB
t11-Full-Douchesclosure-Duncan-Manuts.mp4 286.1 KB 204.0 MB 212.6 MB 5.3 KB
t12-Finuxs-Historical-Tour-Of-IDS-Evasion-Insertions-and-Other-Odditie-Arron-Finux-Finnon.mp4 274.1 KB 235.6 MB 252.4 MB 6.0 KB
v00-Beating-the-Infosec-Learning-Curve-Without-Burning-Out-Scott-secureholio-Thomas.mp4 296.5 KB 170.8 MB 179.7 MB 4.4 KB
v01-Picking-Blackberries-Thomas-G13-Richards.mp4 327.0 KB 110.4 MB 146.9 MB 4.6 KB
v02-Exercising-with-Threat-Models-J-Wolfgang-Goerlich.mp4 318.5 KB 219.0 MB 206.2 MB 5.9 KB
v03-Seeing-Purple-Hybrid-Security-Teams-for-the-Enterprise-B31tf4c3.mp4 306.7 KB 151.9 MB 152.7 MB 6.1 KB
v04-CryptoRush-a-Rising-from-the-Ashes-King-Dragon.mp4 310.2 KB 222.4 MB 229.7 MB 5.7 KB
v05-Autonomous-Remote-Hacking-Drones-Dr-Phil-Polstra.mp4 340.6 KB 151.9 MB 216.1 MB 5.1 KB
v06-Proof-That-Windows-Computer-Forensics-is-Sexy-Kyle-Chaoticflaws-Andrus.mp4 338.5 KB 134.0 MB 149.1 MB 4.8 KB
v07-BioHacking-Becoming-the-Best-Me-I-Can-Be-Leonard.mp4 320.8 KB 135.9 MB 167.5 MB 4.4 KB
v08-Vulnerable-By-Design-a-The-Backdoor-That-Came-Through-the-Front-Matthew-mandatory-Bryant.mp4 290.8 KB 111.7 MB 119.9 MB 5.3 KB
v09-OAuth20-a-Itas-the-Implementation-Stupid-Tony-Miller.mp4 314.8 KB 212.5 MB 208.5 MB 6.2 KB
v10-Breach-Stains-Matt-The-Streaker-Johnson.mp4 330.1 KB 166.6 MB 168.1 MB 6.1 KB
v11-Are-you-a-janitor-or-a-cleaner-John-ageekspeeda-Stauffacher-Matthew-Mattrix-Hoy.mp4 305.5 KB 140.4 MB 206.0 MB 4.1 KB
v12-PCI-and-Crypto-The-Good-The-Bad-and-The-Frankly-Ugly-Robert-Formera.mp4 222.3 KB 154.8 MB 152.6 MB 5.6 KB
Information Format Size
GrrCON2014_files.xml Metadata [file]
GrrCON2014_meta.sqlite Metadata 94.0 KB
GrrCON2014_meta.xml Metadata 683.0 B
Other Files Archive BitTorrent
GrrCON2014_archive.torrent 74.2 KB

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s