<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://bsidesvienna.at/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/cfp/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/talks/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/schedule/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/venue/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/registration/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/sponsors/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/code_of_conduct/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/past-events/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/sponsorlevel/</loc>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/attack_points_in_health_apps_wearable_devices.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/bending_and_twisting_networks.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/enhancing_mobile_malware_an_android_rat_case_study.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/how_we_hacked_online_banking_malware.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/on_the_security_of_security_extensions_for_ip_based_knx_networks.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/ospf_open_shortest_pwn_first.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/sentinel_semi_automated_web_application_testing.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/smashing_the_buffer.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/the_a_and_the_p_of_the_t.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/vulnerability_assessments_on_scada_networks_outsmarting_the_smart_grid.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2014/why_malware_works_in_face_of_antivirus_software.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/a_case_study_on_the_security_of_application_whitelisting.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/closing_slides.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/crypto_wars_2.0.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/cryptography_tools_identity_vectors_for_djihadists.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/digital_supply_chain_security.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/exploit_workshop.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/incident_handling_automation_with_intelmq.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/kci_based_man_in_the_middle_attacks_against_tls.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/la_quadrature_du_cercle_the_apts_that_werent.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/mess_with_the_web.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/ossec_hids.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/pole_vaulting_over_agile_security_pits.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/practical_invalid_curve_attacks_on_tls-ecdh.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/privilege_escalation_via_client_management_software.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/steganography_in_file_system_metadata.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/the_aws_survival_guide.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/the_fuzzing_project.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/the_psychology_of_security.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2015/zigbee_smart_homes_a_hackers_open_house.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2016/exploiting_first_hop_protocols_to_own_the_network.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2016/nosql_means_no_security.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2016/running_a_bug_bounty_what_you_need_to_know.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2016/the_law_of_tls_breakage.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2016/the_modern_soc_adapting_the_security_operations_model_to_how_we_work.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2016/transport_layer_security_beyond_crypto.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2016/visualize_your_threats.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2016/when_your_firewall_turns_against_you.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2017/five_days_in_the_life_of_a_cms_brute_forcing_malware.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2017/high_performance_web_application_fingerprinting_based_on_scm_repositories.pdf</loc>
<lastmod>2026-03-30T21:03:25+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2017/manati_web_assistance_for_the_threat_analyst_supported_by_domain_similarity.pdf</loc>
<lastmod>2026-03-30T21:03:26+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2017/pushing_left_like_a_boss.pdf</loc>
<lastmod>2026-03-30T21:03:26+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2017/the_art_of_fuzzing.pdf</loc>
<lastmod>2026-03-30T21:03:26+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/slides/2017/true_cost_and_real_benefits_of_industrial_internet_of_things_security.pdf</loc>
<lastmod>2026-03-30T21:03:26+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/sponsorslides/</loc>
<lastmod>2026-03-30T21:03:26+00:00</lastmod>
</url>
<url>
<loc>https://bsidesvienna.at/sponsorslides/plugin/notes/speaker-view.html</loc>
<lastmod>2026-03-30T21:03:26+00:00</lastmod>
</url>
</urlset>
