Vídeos de la DerbyCon 3.0
A través de la magnífica web de Irongeek, podemos ver todos los vídeos de las charlas dadas (tracks 1 y 2 y algunas de la 3) en la DerbyCon 3.0.
La lista de los vídeos publicados es:
- Scanning Darkly – HD Moore (keynote)
- Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World – Ed Skoudis (keynote)
- Look Ma – No Exploits! – The Recon-ng Framework – Tim “LaNMaSteR53? Tomes
- Cognitive Injection: Reprogramming the Situation-Oriented Human OS – Andy Ellis
- It's Only a Game: Learning Security through Gaming – Bruce Potter
- Practical Exploitation Using A Malicious Service Set Identifier (SSID) – Deral Heiland
- IOCAware – Actively Collect Compromise Indicators and Test Your Entire Enterprise – Matt Jezorek and Dennis Kuntz
- Ooops – Now What? :: The Stolen Data Impact Model (SDIM) – Brent Huston
- JTAGulator: Assisted discovery of on-chip debug interfaces – Joe Grand
- Cash is King: Who’s Wearing Your Crown? – Tom Eston and Spencer McIntyre
- Anti-Forensics: Memory or something – I forget. – int0x80
- Seeing red in your future? – Ian Iamit
- Security Sucks – and You’re Wearing a Nursing Bra – Paul Asadoorian
- TMI: How to attack SharePoint servers and tools to make it easier – Kevin Johnson and James Jardine
- Windows Attacks: AT is the new black – Rob Fuller and Chris Gates
- The High Risk of Low Risk Applications – conrad reynolds
- How Good is Your Phish – @sonofshirt
- It’s Okay to Touch Yourself – Ben Ten (Ben0xA)
- Identifying Evil: An introduction to Reverse Engineering Malware and other software – Bart ‘d4ncind4n’ Hopper
- Collaborative Penetration Testing With Lair – Tom Steele and Dan Kottmann
- How Im going to own your organization in just a few days. – RazorEQX
- Malware Automation – Christopher Elisan
- Pass-The-Hash 2: The Admin’s Revenge – Skip Duckwall and Chris Campbell
- What’s common in Oracle and Samsung? They tried to think differently about crypto. – L·szlÛ TÛth – Ferenc Spala
- The Cavalry Is Us: Protecting the public good and our profession – Josh Corman
- Burning the Enterprise with BYOD – Georgia Weidman
- Love letters to Frank Abagnale (How do I pwn thee let me count the ways) – Jayson E. Street
- Getting the goods with smbexec – Eric Milam(brav0hax) and Martin Bos (purehate)
- The Message and The Messenger – James Arlen
- Shattering the Glass: Crafting Post Exploitation Tools with PowerShell – Matt Johnson
- 50 Shades of RED: Stories from the "Playroom" – Chris Nickerson
- Cheat Codez: Level UP Your SE Game – Eric Smith
- Beyond Information Warfare “You Ain’t Seen Nothing Yet” – Winn Schwartau
- My Experiments with truth: a different route to bug-hunting – Devesh Bhatt
- Stop Fighting Anti-Virus – Integgroll
- The Art and Science of Hacking Any Organization – Tyler Wrightson
- Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation – Christopher Campbell & Matthew Graeber
- Cracking Corporate Passwords – Exploiting Password Policy Weaknesses – Minga / Rick Redman
- How the Grid Will Be Hacked – Josh Axelrod and Matt Davis
- Ownage From Userland: Process Puppeteering – Nick Cano
- help for the helpdesk – Mick Douglas
- ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation Techniquesí)%00 – Roberto Salgado
- Weaponizing your Coffee Pot – Daniel Buentello
- Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to Pwn the Network – SOLOMON SONYA and NICK KULESZA
- Practical OSINT – Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY TALK – 18+ or older)
- Phishing Like The Pros – Luis “Connection” Santana
- Stop making excuses; it’s time to own your HIV (High Impact Vulnerabilities) – Jack D. Nichelson
- Raspberry Pi – Media Centers – and AppleTV – David Schuetz
- Uncloaking IP Addresses on IRC – Derek Callaway
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec