CIP Cyber
Get Trained
Blog
Resources
Company
About Us
Contact Us
Search
Close
Log In
Menu
Get Trained
Blog
Resources
Company
About Us
Contact Us
Log In
Category: Talks
Metasploit & Windows Kernel Exploitation
July 1, 2015
Stalking a City for Fun and Frivolity – Defcon 21
May 6, 2015
Use Software Defined Radio to Hack Wireless World
March 16, 2015
You Guys don’t Get the Process to Exploit Microsoft Kerberos
March 7, 2015
Unexpected Stories From a Hacker Who Made it Inside the Government
March 1, 2015
APT Attribution and DNS Profiling
January 2, 2015
The Machines That Betrayed Their Masters
October 28, 2014
Bluetooth is Watching: Detect the Surveillance Systems
October 26, 2014
Building Trojan Hardware at Home
September 9, 2014