Vídeos de la DerbyCon 2012
Este era otra de las entradas que tenía pendiente de publicar. Como ya bien anunciaron en Security By Default, en IronGeek estaban subiendo los vídeos de la DerbyCon 2012. Hasta ahora sólo faltan 2 vídeos, el de Kevin Mitnick, pendiente de aprobar y otro titulado “You Can’t Buy Security. Building an Open Sourced Information Security Program”, del cual parece ser tuvieron alguna dificultad técnica. Para que quede registrado por aquí, esta es la lista:
- Opening Ceremony
- HD Moore The Wild West
- Dan Kaminsky Black Ops
- Mudge Cyber Fast Track; from the trenches
- Jayson E. Street Securing the Internet: YOUre doing
- it wrong (An INFOSEC Intervention)
- Jason Scott Rescuing The Prince of Persia from the sands of time
- Dave Marcus 2FA-Enabled Fraud: Dissecting Operation
- High Roller
- Rafal Los House of Cards
- Rob Fuller / Chris Gates Dirty Little Secrets Part 2
- Chris Hadnagy Nonverbal Human Hacking
- Rick Farina: The Hacker Ethos meets the FOSS ethostd>
- Brent Huston Info overload..Future shock.. IBM & nature of modern crime
- Ian Amit SexyDefense the red team tore you a new one. Now what?
- egyp7 Privilege Escalation with the Metasploit Framework
- Larry Pesce / Darren Wigley Hacking Survival: So. You want to compute post-apocalypse?
- James Arlen Doubt Deceit -Deficiency and Decency a
- Decade of Disillusionment
- Carlos Perez DNS Reconnaissance
- Sam Gaudet: Pentesting for non-pentesters through virtual machines
- Ryan Linn Collecting Underpants To Win Your Network
- Jerry Gamblin: is it time for another firewall or a security awareness program?
- Skip Duckwall / Chris Campbell Puff Puff Pass
- Getting the most out of your hash
- Johnny Long The Evolution of HFC
- Michael Schearer Flex your right constituion and political activism in the hacker community
- Christopher Domas The future of RE: Dynamic Binary Visualization
- Jordan Harbinger Social Engineering Defense
- Contractors on LinkedIn and Facebook: Who's plugged into your employees?
- Dual Core (int0x80) Moar Anti-Forensics Moar Louise
- Eric Smith Penetration testing from a Hot Tub Time Machine
- Tom Eston / Kevin Johnson Social Zombies: Rise of the Mobile Dead
- Paul Asadoorian / John Strand Everything they told me about security was wrong.
- Bruce Potter Security Epistemology: Beliefs Truth and Knowledge in the Infosec Community
- Chris Nickerson (ind303) Tactical Surveillance: Look at me now!
- KC. Yerrid / Matt Jezorek / Boris Sverdlik (JadedSecurity)- It's not your perimenter. It's you
- Zack Fasel Pwned in 60 Seconds -From Network Guest to Windows Domain Admin
- Josh More Pen Testing Security Vendors
- Jamie Murdock How to create a one man SOC
- Deral Heiland -Format String Vulnerabilities 101
- Ryan Elkins Simple Security Defense to thwart an Army of Cyber Ninja Warriors
- Jason Gunnoe & Chris Centore -Building the next generation IDS with OSINT
- Branden Miller / Bill Gardner Building an Awareness and training program
- Jack Daniel How Screwed Are We?
- atlas: RfCat-subghz or bust
- Babak Javadi / Keith Howell: 4140 Ways your alarm system can fail
- Dan Crowley / Chris Vinecombe Vulnerability Spidey Sense
- Kellep Charles: Security Vulnerablity Assessments.
- Process and best practices
- Georgia Weidman Introducing the Smartphone Pentest Framework
- Benjamin Mauch Creating a powerful user defense against attackers
- Nathaniel Husted Everything you always wanted to know about
- Security Academia (But were too afraid too ask)
- John Woods So you got yourself an infosec manager job. Now what?
- Gillis Jones The Badmin Project
- Bart Hopper Hunting Evil
- Bill Sempf What locksport can teach us about security
- K.C. Holland (DevAuto) - Personal Darknet or How to get pr0n @ work
- Kyle (kos) Osborn Physical Drive-By Downloads
- Doug Burks Security Onion Network Security monitoring in minutes
- JP Dunning (.ronin) - The Glitch: Hardware With Hacking Made Easy
- Tony DeLaGrange / Jason Wood:SH5ARK ATTACK- taking a byte out of HTML5!
- Matthew Sullivan: Cookie Cadger taking cookie hijacking to a new level
- Matt Weeks: Ambush- Catching Intruders at Any Point
- Joshua Marpet: separating security intelligence from security FUD
- Steve Werby: Building dictionaries and destroying hashes w/amazon EC2
- Stephen Haywood (AverageSecurityGuy) - Introduction to Metasploit Post Exploitation Modules
- Raphael Mudge: Dirty Red Team Tricks II
- David Schuetz (Darth Null) Slow down cowpoke When enthusiasm outpaces common sense
- Noah Beddome: The devils in the Details-A look at bad SE and how to do better
- Nicolle Neulist: Write your own tools with Python
- David McGuire: Maturing the Pen Testing Professional
- Jay James & Shane MacDougall: Usine McAfee secure/trustguard as attack tools
- Matt Presson: Building a database security program
- Chris Jenks: Intro to Linux system hardening
- Eric Milam: Becoming Mallory
- Roamer and Deviant Ollam - Welcome to NinjaTel, press 2 to activate your device now
- Patrick Tatro: Why isn't everyone pulling security- this is combat
- Jason Frisvold: Taming Skynet-using the cloud to automate baseline scanning
- JP Dunning & Chris Silvers: Wielding Katana- A live security suite
- Laszlo Toth & Ferenc Spala: Think differently about database hacking
- Mick Douglas Sprinkler: IR
- Matthew Perry: Current trends in computer law
- Leonard Isham: SE me SE you
- CLOSING CEREMONY
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec