PaulDotCom mailing list archives
Re: Derbycon 3.0 Videos Tracks 1 & 2
From: Greg Hetrick <greg.hetrick () gmail com>
Date: Fri, 4 Oct 2013 13:28:44 -0500
Bandwidth and equipment aren't free, I just donated $20 to Adrian and what he does for the community. All of those who liked the work he puts in so we can view the talks is worth much more than that. Who's gonna match? -@gchetrick On Oct 4, 2013, at 10:07 AM, Julian Makas <jmakas () mimictechnologies com> wrote:
Adrian, You rock! DerbyCon 3 was a blast! It was great to meet you and shake your hand to say thanks. Being able to watch some of the talks I missed on the flight home from the con was amazing. How are you able to get everything sorted out so fast. Do you ever take any down time. All the effort and work you put into keeping the community informed is very much appreciated. Thank you! Julian From: pauldotcom-bounces () mail pauldotcom com [mailto:pauldotcom-bounces () mail pauldotcom com] On Behalf Of Adrian Crenshaw Sent: Monday, September 30, 2013 5:29 PM To: PaulDotCom Security Weekly Mailing List Subject: [Pauldotcom] Derbycon 3.0 Videos Tracks 1 & 2 I think I have all of tracks 1 and 2 posted:, more to come Scanning Darkly - HD Moore (keynote) Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World - Ed Skoudis (keynote) Look Ma - No Exploits! - The Recon-ng Framework - Tim “LaNMaSteR53? Tomes Practical Exploitation Using A Malicious Service Set Identifier (SSID) - Deral Heiland JTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand Seeing red in your future? - Ian Iamit TMI: How to attack SharePoint servers and tools to make it easier - Kevin Johnson and James Jardine The High Risk of Low Risk Applications - conrad reynolds It’s Okay to Touch Yourself - Ben Ten (Ben0xA) Collaborative Penetration Testing With Lair - Tom Steele and Dan Kottmann Malware Automation - Christopher Elisan What’s common in Oracle and Samsung? They tried to think differently about crypto. - L·szlÛ TÛth - Ferenc Spala Burning the Enterprise with BYOD - Georgia Weidman Getting the goods with smbexec - Eric Milam(brav0hax) and Martin Bos (purehate) Shattering the Glass: Crafting Post Exploitation Tools with PowerShell - Matt Johnson Cheat Codez: Level UP Your SE Game - Eric Smith My Experiments with truth: a different route to bug-hunting - Devesh Bhatt The Art and Science of Hacking Any Organization - Tyler Wrightson Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation - Christopher Campbell & Matthew Graeber Cracking Corporate Passwords - Exploiting Password Policy Weaknesses - Minga / Rick Redman Ownage From Userland: Process Puppeteering - Nick Cano ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation Techniquesí)%00 - Roberto Salgado Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to Pwn the Network - SOLOMON SONYA and NICK KULESZA Phishing Like The Pros - Luis “Connection” Santana Raspberry Pi - Media Centers - and AppleTV - David Schuetz Cognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy Ellis IOCAware - Actively Collect Compromise Indicators and Test Your Entire Enterprise - Matt Jezorek and Dennis Kuntz Cash is King: Who’s Wearing Your Crown? - Tom Eston and Spencer McIntyre Security Sucks - and You’re Wearing a Nursing Bra - Paul Asadoorian Windows Attacks: AT is the new black - Rob Fuller and Chris Gates How Good is Your Phish - @sonofshirt Identifying Evil: An introduction to Reverse Engineering Malware and other software - Bart ‘d4ncind4n’ Hopper How Im going to own your organization in just a few days. - RazorEQX Pass-The-Hash 2: The Admin’s Revenge - Skip Duckwall and Chris Campbell The Cavalry Is Us: Protecting the public good and our profession - Josh Corman Love letters to Frank Abagnale (How do I pwn thee let me count the ways) - Jayson E. Street The Message and The Messenger - James Arlen 50 Shades of RED: Stories from the "Playroom" - Chris Nickerson Beyond Information Warfare “You Ain’t Seen Nothing Yet” - Winn Schwartau Stop Fighting Anti-Virus - Integgroll How the Grid Will Be Hacked - Josh Axelrod and Matt Davis help for the helpdesk - Mick Douglas Weaponizing your Coffee Pot - Daniel Buentello Practical OSINT - Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY TALK - 18+ or older) Stop making excuses; it’s time to own your HIV (High Impact Vulnerabilities) - Jack D. Nichelson Uncloaking IP Addresses on IRC - Derek Callaway -- "The ability to quote is a serviceable substitute for wit." ~ W. Somerset Maugham "The ability to Google can be a serviceable substitute for technical knowledge." ~ Adrian D. Crenshaw _______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Re: Derbycon 3.0 Videos Tracks 1 & 2, (continued)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Chuck Milich (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Frank Michael (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 James Wooley (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Robin Wood (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 packetjack (Oct 06)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Greg Hetrick (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Omid Mohammadi (Oct 09)