PaulDotCom mailing list archives
Re: Derbycon 3.0 Videos Tracks 1 & 2
From: Adrian Crenshaw <irongeek () irongeek com>
Date: Fri, 4 Oct 2013 17:41:33 -0400
I think I have the rest up now: Track 3 (Teach Me) It's Only a Game: Learning Security through Gaming – Bruce Potter<http://www.irongeek.com/i.php?page=videos/derbycon3/3101-its-only-a-game-learning-security-through-gaming-bruce-potter> Ooops – Now What? :: The Stolen Data Impact Model (SDIM) – Brent Huston<http://www.irongeek.com/i.php?page=videos/derbycon3/3102-ooops-now-what-the-stolen-data-impact-model-sdim-brent-huston> Anti-Forensics: Memory or something – I forget. – int0x80<http://www.irongeek.com/i.php?page=videos/derbycon3/3103-anti-forensics-memory-or-something-i-forget-int0x80> The Mysterious Mister Hokum – Jason Scott<http://www.irongeek.com/i.php?page=videos/derbycon3/3104-the-mysterious-mister-hokum-jason-scott> Appsec Tl;dr – Gillis Jones<http://www.irongeek.com/i.php?page=videos/derbycon3/3105-appsec-tl-dr-gillis-jones> DIY Command & Control For Fun And *No* Profit – David Schwartzberg<http://www.irongeek.com/i.php?page=videos/derbycon3/3106-diy-command-control-for-fun-and-no-profit-david-schwartzberg> IPv6 is here (kind of) – what can I do with it? – Dan Wilkins<http://www.irongeek.com/i.php?page=videos/derbycon3/3107-ipv6-is-here-kind-of-what-can-i-do-with-it-dan-wilkins> Dancing With Dalvik – Thomas Richards<http://www.irongeek.com/i.php?page=videos/derbycon3/3108-dancing-with-dalvik-thomas-richards> Big Hugs for Big Data – Davi Ottenheimer<http://www.irongeek.com/i.php?page=videos/derbycon3/3201-big-hugs-for-big-data-davi-ottenheimer> Antivirus Evasion: Lessons Learned – thelightcosine<http://www.irongeek.com/i.php?page=videos/derbycon3/3202-antivirus-evasion-lessons-learned-thelightcosine> Jared DeMott – Is Auditing C/C++ Different Nowadays?<http://www.irongeek.com/i.php?page=videos/derbycon3/3203-jared-demott-is-auditing-cc-different-nowadays> Getting Schooled: Security with no budget in a hostile environment – Jim Kennedy<http://www.irongeek.com/i.php?page=videos/derbycon3/3204-getting-schooled-security-with-no-budget-in-a-hostile-environment-jim-kennedy> Browser Pivoting (FU2FA) – Raphael Mudge<http://www.irongeek.com/i.php?page=videos/derbycon3/3205-browser-pivoting-fu2fa-raphael-mudge> Taking the BDSM out of PCI-DSS Through Open-Source Solutions – Zack Fasel & Erin “SecBarbie” Jacobs<http://www.irongeek.com/i.php?page=videos/derbycon3/3206-taking-the-bdsm-out-of-pci-dss-through-open-source-solutions-zack-fasel-erin-secbarbie-jacobs> John Strand – Hacking Back – Active Defense and Internet Tough Guys<http://www.irongeek.com/i.php?page=videos/derbycon3/3207-john-strand-hacking-back-active-defense-and-internet-tough-guys> An Encyclpwnia of Persistence – Skip Duckwall & Will Peteroy<http://www.irongeek.com/i.php?page=videos/derbycon3/3208-an-encyclpwnia-of-persistence-skip-duckwall-will-peteroy> Your Turn! – Johnny Long – HFC<http://www.irongeek.com/i.php?page=videos/derbycon3/3209-your-turn-johnny-long-hfc> Practical File Format Fuzzing – Jared Allar<http://www.irongeek.com/i.php?page=videos/derbycon3/3301-practical-file-format-fuzzing-jared-allar> Surviving the Dead – Christopher ‘EggDropX’ Payne<http://www.irongeek.com/i.php?page=videos/derbycon3/3302-surviving-the-dead-christopher-eggdropx-payne> How can I do that? Intro to hardware hacking with an RFID badge reader – Kevin Bong<http://www.irongeek.com/i.php?page=videos/derbycon3/3303-how-can-i-do-that-intro-to-hardware-hacking-with-an-rfid-badge-reader-kevin-bong> A SysCall to ARMs – Brendan Watters<http://www.irongeek.com/i.php?page=videos/derbycon3/3304-a-syscall-to-arms-brendan-watters> The Netsniff-NG Toolkit – Jon Schipp<http://www.irongeek.com/i.php?page=videos/derbycon3/3305-the-netsniff-ng-toolkit-jon-schipp> Why Dumpster Dive when I can pwn right in? – Terry Gold<http://www.irongeek.com/i.php?page=videos/derbycon3/3306-why-dumpster-dive-when-i-can-pwn-right-in-terry-gold> Track 4 (The 3-Way) Pigs Don’t Fly – Why owning a typical network is so easy – and how to build a secure one. – Matt “scriptjunkie” Weeks<http://www.irongeek.com/i.php?page=videos/derbycon3/4101-pigs-don-t-fly-why-owning-a-typical-network-is-so-easy-and-how-to-build-a-secure-one-matt-scriptjunkie-weeks> Finding The Signal in the Noise: Quantifying Advanced Malware – Dave Marcus<http://www.irongeek.com/i.php?page=videos/derbycon3/4102-finding-the-signal-in-the-noise-quantifying-advanced-malware-dave-marcus> Applying the 32 Zombieland Rules to IT Security – Larry Pesce<http://www.irongeek.com/i.php?page=videos/derbycon3/4103-applying-the-32-zombieland-rules-to-it-security-larry-pesce> Windows 0wn3d By Default – Mark Baggett<http://www.irongeek.com/i.php?page=videos/derbycon3/4206-windows-0wn3d-by-default-mark-baggett> Android 4.0: Ice Cream “Sudo Make Me a” Sandwich – Max Sobell<http://www.irongeek.com/i.php?page=videos/derbycon3/4105-android-40-ice-cream-sudo-make-me-a-sandwich-max-sobell> Attacking the Next Generation Air Traffic Control System; Hackers – liquor and commercial airliners. – Renderman<http://www.irongeek.com/i.php?page=videos/derbycon3/4107-attacking-the-next-generation-air-traffic-control-system-hackers-liquor-and-commercial-airliners-renderman> Antivirus Evasion through Antigenic Variation (Why the Blacklisting Approach to AV is Broken) – Trenton Iveys<http://www.irongeek.com/i.php?page=videos/derbycon3/4108-antivirus-evasion-through-antigenic-variation-why-the-blacklisting-approach-to-av-is-broken-trenton-iveyneal-bridges> Hello ASM World: A Painless and Contextual Introduction to x86 Assembly – nicolle neulist (rogueclown)<http://www.irongeek.com/i.php?page=videos/derbycon3/4201-hello-asm-world-a-painless-and-contextual-introduction-to-x86-assembly-nicolle-neulist-rogueclown> SQL injection with sqlmap – Conrad Reynolds CISA<http://www.irongeek.com/i.php?page=videos/derbycon3/4202-sql-injection-with-sqlmap-conrad-reynolds-cisa> The Internet of Things: Vulns – Botnets and Detection – Kyle Stone (@essobi) – Liam Randall<http://www.irongeek.com/i.php?page=videos/derbycon3/4203-the-internet-of-things-vulns-botnets-and-detection-kyle-stone-liam-randall> The Malware Management Framework – a process you can use to find advanced malware. We found WinNTI with it! – Michael Gough and Ian Robertson<http://www.irongeek.com/i.php?page=videos/derbycon3/4204-the-malware-management-framework-a-process-you-can-use-to-find-advanced-malware-we-found-winnti-with-it-michael-gough-ian-robertson> Hack the Hustle! – Eve Adams<http://www.irongeek.com/i.php?page=videos/derbycon3/4205-hack-the-hustle-eve-adams> Operationalizing Security Intelligence in the Enterprise- Rafal Los<http://www.irongeek.com/i.php?page=videos/derbycon3/4104-operationalizing-security-intelligence-in-the-enterprise-rafal-los> New Shiny in the Metasploit Framework – egypt<http://www.irongeek.com/i.php?page=videos/derbycon3/4207-new-shiny-in-the-metasploit-framework-egypt> Everything you ever wanted to know on how to start a Credit Union – but were afraid to ask. – Jordan Modell<http://www.irongeek.com/i.php?page=videos/derbycon3/4208-everything-you-ever-wanted-to-know-on-how-to-start-a-credit-union-but-were-afraid-to-ask-jordan-modell> A developer’s guide to pentesting – Bill Sempf<http://www.irongeek.com/i.php?page=videos/derbycon3/4209-a-developer-s-guide-to-pentesting-bill-sempf> Steal All of the Databases. – Alejandro Caceres<http://www.irongeek.com/i.php?page=videos/derbycon3/4301-steal-all-of-the-databases-alejandro-caceres> Sandboxes from a pen tester’s view – Rahul Kashyap<http://www.irongeek.com/i.php?page=videos/derbycon3/4303-sandboxes-from-a-pen-tester-s-view-rahul-kashyap> iOS Reverse #=> iPWn Apps – Mano ‘dash4rk’ Paul<http://www.irongeek.com/i.php?page=videos/derbycon3/4304-ios-reverse-ipwn-apps-mano-dash4rk-paul> Terminal Cornucopia – Evan “treefort” Booth<http://www.irongeek.com/i.php?page=videos/derbycon3/4305-terminal-cornucopia-evan-treefort-booth> Wait; How is All This Stuff Free?!? – Gene Bransfield<http://www.irongeek.com/i.php?page=videos/derbycon3/4306-wait-how-is-all-this-stuff-free-gene-bransfield> Track 5 – Hybrid Room Building An Information Security Awareness Program from Scratch – Bill Gardner – Valerie Thomas<http://www.irongeek.com/i.php?page=videos/derbycon3/5101-building-an-information-security-awareness-program-from-scratch-bill-gardner-valerie-thomas> Malware : testing malware scenarios on your network – Tony Huffman (@myne_us) – Juan Cortes (@kongo_86)<http://www.irongeek.com/i.php?page=videos/derbycon3/5102-malware-testing-malware-scenarios-on-your-network-tony-huffman-myne-us-juan-cortes-kongo-86> Password Intelligence Project – Advanced Password Recovery and Modern Mitigation Strategies – John Moore “Rabid Security”<http://www.irongeek.com/i.php?page=videos/derbycon3/5103-password-intelligence-project-advanced-password-recovery-and-modern-mitigation-strategies-john-moore-rabid-security> Tizen Security: Hacking the new mobile OS – Mark Manning (AntiTree)<http://www.irongeek.com/i.php?page=videos/derbycon3/5104-tizen-security-hacking-the-new-mobile-os-mark-manning-antitree> RAWR – Rapid Assessment of Web Resources – Adam Byers – Tom Moore<http://www.irongeek.com/i.php?page=videos/derbycon3/5105-rawr-rapid-assessment-of-web-resources-adam-byers-tom-moore> Decoding Bug Bounty Programs – Jon Rose<http://www.irongeek.com/i.php?page=videos/derbycon3/5106-decoding-bug-bounty-programs-jon-rose> Patching Windows Executables with the Backdoor Factory – Joshua Pitts<http://www.irongeek.com/i.php?page=videos/derbycon3/5107-patching-windows-executables-with-the-backdoor-factory-joshua-pitts> Jason Scott – Defcon Documentary Q&A<http://www.irongeek.com/i.php?page=videos/derbycon3/5108-jason-scott-defcon-documentary> Panel: Building and Growing a Hacker Space – Joey Maresca – Dave Marcus – Nick Farr – SkyDog<http://www.irongeek.com/i.php?page=videos/derbycon3/5201-panel-building-and-growing-a-hacker-space-joey-maresca-dave-marcus-nick-farr-skydog-1-if-selected-will-extend-invite-to-lvl1-team> SO Hopelessly Broken: the implications of pervasive vulnerabilities in SOHO router products. – Jacob Holcomb<http://www.irongeek.com/i.php?page=videos/derbycon3/5202-so-hopelessly-broken-the-implications-of-pervasive-vulnerabilities-in-soho-router-products-jacob-holcomb> Put Me In Coach: How We Got Started In Infosec – pr1me – Chris “g11tch” Hodges – Frank Hackett – Dave “ReL1K” Kennedy<http://www.irongeek.com/i.php?page=videos/derbycon3/5203-put-me-in-coach-how-we-got-started-in-infosec-pr1me-chris-g11tch-hodges-frank-hackett-dave-rel1k-kennedy> Alice Goes Deeper (Down the Rabbit Hole) – Redirection 2.0 – Nathan Magniez<http://www.irongeek.com/i.php?page=videos/derbycon3/5204-alice-goes-deeper-down-the-rabbit-hole-redirection-20-nathan-magniez> Emergent Vulnerabilities: What ant colonies – schools of fish – and security have in common. – Nathaniel “Dr. Whom” Husted<http://www.irongeek.com/i.php?page=videos/derbycon3/5205-emergent-vulnerabilities-what-ant-colonies-schools-of-fish-and-security-have-in-common-nathaniel-dr-whom-husted> Why Your IT Bytes – Frank J. Hackett<http://www.irongeek.com/i.php?page=videos/derbycon3/5206-why-your-it-bytes-frank-j-hackett> Using Facial Recognition Software In Digital Forensics And Information Security – Brian Lockrey<http://www.irongeek.com/i.php?page=videos/derbycon3/5207-using-facial-recognition-software-in-digital-forensics-and-information-security-brian-lockrey> How to Fight a War Without Actually Starting One – Brendan O’Connor<http://www.irongeek.com/i.php?page=videos/derbycon3/5208-how-to-fight-a-war-without-actually-starting-one-brendan-o-connor> Crypto-Exploit Exercises: A tool for reinforcing basic topics in Cryptography – Nancy Snoke<http://www.irongeek.com/i.php?page=videos/derbycon3/5209-crypto-exploit-exercises-a-tool-for-reinforcing-basic-topics-in-cryptography-nancy-snoke> Stable Talks Gen Y:Getting Them to Talk Rather than Text at Work – Nancy Kovanic<http://www.irongeek.com/i.php?page=videos/derbycon3/s101-gen-ygetting-them-to-talk-rather-than-text-at-work-nancy-kovanic> Battle Scars And Friendly Fire: Threat Research Team War Stories – Will Gragido and Seth Geftic<http://www.irongeek.com/i.php?page=videos/derbycon3/s102-battle-scars-and-friendly-fire-threat-research-team-war-stories-will-gragido-and-seth-geftic> Unmasking Miscreants – Allixon Nixon – Brandon Levene<http://www.irongeek.com/i.php?page=videos/derbycon3/s103-unmasking-miscreants-allixon-nixon-brandon-levene> gitDigger: Creating useful wordlists from public GitHub repositories – Jaime Filson (WiK)<http://www.irongeek.com/i.php?page=videos/derbycon3/s104-gitdigger-creating-useful-wordlists-from-public-github-repositories-jaime-filson-wik> PowerShell and Windows Throw the Best Shell Parties – Piotr Marszalik<http://www.irongeek.com/i.php?page=videos/derbycon3/s105-powershell-and-windows-throw-the-best-shell-parties-piotr-marszalik> Owning Computers Without Shell Access – Royce Davis<http://www.irongeek.com/i.php?page=videos/derbycon3/s106-owning-computers-without-shell-access-royce-davis> Sixnet Tools: for poking at Sixnet Things – Mehdi Sabraoui<http://www.irongeek.com/i.php?page=videos/derbycon3/s107-sixnet-tools-for-poking-at-sixnet-things-mehdi-sabraoui> Hardening Windows 8 apps for the Windows Store – Bill Sempf<http://www.irongeek.com/i.php?page=videos/derbycon3/s110-hardening-windows-8-apps-for-the-windows-store-bill-sempf> Intro to Dynamic Access Control in Windows Server 2012 – Evan Anderson<http://www.irongeek.com/i.php?page=videos/derbycon3/s111-intro-to-dynamic-access-control-in-windows-server-2012-evan-anderson> Evolutionary Security – Embracing Failure to Attain “Good Enough” – Josh More<http://www.irongeek.com/i.php?page=videos/derbycon3/s112-evolutionary-security-embracing-failure-to-attain-good-enough-josh-more> DIY Forensics: When Incident Response Morphs into Digital Forensics – John Sammons<http://www.irongeek.com/i.php?page=videos/derbycon3/s206-diy-forensics-when-incident-response-morphs-into-digital-forensics-john-sammons> ANOTHER Log to Analyze – Utilizing DNS to Discover Malware in Your Network – Nathan Magniez<http://www.irongeek.com/i.php?page=videos/derbycon3/s114-another-log-to-analyze-utilizing-dns-to-discover-malware-in-your-network-nathan-magniez> Phishing Frenzy: 7 seconds from hook to sinker – Brandon <zeknox> McCann<http://www.irongeek.com/i.php?page=videos/derbycon3/s201-phishing-frenzy-7-seconds-from-hook-to-sinker-brandon-zeknox-mccann> Electronic Safe Fail: Common Vulnerabilities in Electronic Safes – Jeff Popio<http://www.irongeek.com/i.php?page=videos/derbycon3/s202-electronic-safe-fail-common-vulnerabilities-in-electronic-safes-jeff-popio> The Good Samaritan Identity Protection Project www.thegsipp.org – Zack Hibbard – Chris Brown and Jon Sternstein<http://www.irongeek.com/i.php?page=videos/derbycon3/s203-the-good-samaritan-identity-protection-project-wwwthegsipporg-zack-hibbard-chris-brownjon-sternstein> Some defensive ideas from offensive guys. – Justin Elze and Robert Chuvala<http://www.irongeek.com/i.php?page=videos/derbycon3/s204-some-defensive-ideas-from-offensive-guys-justin-elze-robert-chuvala> Grim Trigger – Jeff “ghostnomad” Kirsch<http://www.irongeek.com/i.php?page=videos/derbycon3/s207-grim-trigger-jeff-ghostnomad-kirsch> A n00bie’s perspective on Pentesting… – Brandon Edmunds<http://www.irongeek.com/i.php?page=videos/derbycon3/s301-a-n00bie-s-perspective-on-pentesting-brandon-edmunds> My Security is a Graph – Your Argument is Invalid – Gabriel Bassett<http://www.irongeek.com/i.php?page=videos/derbycon3/s210-my-security-is-a-graph-your-arguement-is-invalid-gabriel-bassett> Follow the Foolish Zebras: Finding Threats in Your Logs – Chris Larsen<http://www.irongeek.com/i.php?page=videos/derbycon3/s211-follow-the-foolish-zebras-finding-threats-in-your-logs-chris-larsen> Security Training and Research Cloud (STRC) – Jimmy Murphy<http://www.irongeek.com/i.php?page=videos/derbycon3/s212-security-training-and-research-cloud-strc-jimmy-murphy> Passive Aggressive Defense – Jason Clark<http://www.irongeek.com/i.php?page=videos/derbycon3/s213-passive-aggressive-defense-jason-clark> So you want to be a pentester? – Raymond Gabler<http://www.irongeek.com/i.php?page=videos/derbycon3/s214-so-you-want-to-be-a-pentester-raymond-gabler> Digital Energy – BPT – Paul Coggin<http://www.irongeek.com/i.php?page=videos/derbycon3/s215-digital-energy-bpt-paul-coggin> An Anti-Forensics Primer – Jason Andress<http://www.irongeek.com/i.php?page=videos/derbycon3/s216-an-anti-forensics-primer-jason-andress> What if Petraeus was a hacker? Email privacy for the rest of us – Phil Cryer (@faker)<http://www.irongeek.com/i.php?page=videos/derbycon3/s217-what-if-petraeus-was-a-hacker-email-privacy-for-the-rest-of-us-phil-cryer-faker> On Fri, Oct 4, 2013 at 11:07 AM, Julian Makas <jmakas () mimictechnologies com>wrote:
Adrian,**** ** ** You rock! DerbyCon 3 was a blast! It was great to meet you and shake your hand to say thanks.**** ** ** Being able to watch some of the talks I missed on the flight home from the con was amazing. How are you able to get everything sorted out so fast. Do you ever take any down time. **** ** ** All the effort and work you put into keeping the community informed is very much appreciated. **** ** ** Thank you!**** ** ** Julian**** ** ** *From:* pauldotcom-bounces () mail pauldotcom com [mailto: pauldotcom-bounces () mail pauldotcom com] *On Behalf Of *Adrian Crenshaw *Sent:* Monday, September 30, 2013 5:29 PM *To:* PaulDotCom Security Weekly Mailing List *Subject:* [Pauldotcom] Derbycon 3.0 Videos Tracks 1 & 2**** ** ** ** ** I think I have all of tracks 1 and 2 posted:, more to come**** Scanning Darkly - HD Moore (keynote)<http://www.irongeek.com/i.php?page=videos/derbycon3/1102-scanning-darkly-hd-moore-keynote> Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World - Ed Skoudis (keynote)<http://www.irongeek.com/i.php?page=videos/derbycon3/1103-kinetic-pwnage-obliterating-the-line-between-computers-and-the-physical-world-ed-skoudis-keynote> Look Ma - No Exploits! - The Recon-ng Framework - Tim “LaNMaSteR53? Tomes<http://www.irongeek.com/i.php?page=videos/derbycon3/1104-look-ma-no-exploits-the-recon-ng-framework-tim-lanmaster53-tomes> Practical Exploitation Using A Malicious Service Set Identifier (SSID) - Deral Heiland<http://www.irongeek.com/i.php?page=videos/derbycon3/1105-practical-exploitation-using-a-malicious-service-set-identifier-ssid-deral-heiland> JTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand<http://www.irongeek.com/i.php?page=videos/derbycon3/1106-jtagulator-assisted-discovery-of-on-chip-debug-interfaces-joe-grand> Seeing red in your future? - Ian Iamit<http://www.irongeek.com/i.php?page=videos/derbycon3/1107-seeing-red-in-your-future-ian-iamit> TMI: How to attack SharePoint servers and tools to make it easier - Kevin Johnson and James Jardine<http://www.irongeek.com/i.php?page=videos/derbycon3/1108-tmi-how-to-attack-sharepoint-servers-and-tools-to-make-it-easier-kevin-johnson-james-jardine> The High Risk of Low Risk Applications - conrad reynolds<http://www.irongeek.com/i.php?page=videos/derbycon3/1109-the-high-risk-of-low-risk-applications-conrad-reynolds> It’s Okay to Touch Yourself - Ben Ten (Ben0xA)<http://www.irongeek.com/i.php?page=videos/derbycon3/1110-it-s-okay-to-touch-yourself-ben-ten-ben0xa> Collaborative Penetration Testing With Lair - Tom Steele and Dan Kottmann<http://www.irongeek.com/i.php?page=videos/derbycon3/1111-collaborative-penetration-testing-with-lair-tom-steeledan-kottmann> Malware Automation - Christopher Elisan<http://www.irongeek.com/i.php?page=videos/derbycon3/1201-malware-automation-christopher-elisan> What’s common in Oracle and Samsung? They tried to think differently about crypto. - L·szlÛ TÛth - Ferenc Spala<http://www.irongeek.com/i.php?page=videos/derbycon3/1202-what-s-common-in-oracle-and-samsung-they-tried-to-think-differently-about-crypto-laszlo-toth-ferenc-spala> Burning the Enterprise with BYOD - Georgia Weidman<http://www.irongeek.com/i.php?page=videos/derbycon3/1203-burning-the-enterprise-with-byod-georgia-weidman> Getting the goods with smbexec - Eric Milam(brav0hax) and Martin Bos (purehate)<http://www.irongeek.com/i.php?page=videos/derbycon3/1204-getting-the-goods-with-smbexec-eric-milam-brav0hax-and-martin-bos-purehate> Shattering the Glass: Crafting Post Exploitation Tools with PowerShell - Matt Johnson<http://www.irongeek.com/i.php?page=videos/derbycon3/1205-shattering-the-glass-crafting-post-exploitation-tools-with-powershell-matt-johnson> Cheat Codez: Level UP Your SE Game - Eric Smith<http://www.irongeek.com/i.php?page=videos/derbycon3/1206-cheat-codez-level-up-your-se-game-eric-smith> My Experiments with truth: a different route to bug-hunting - Devesh Bhatt<http://www.irongeek.com/i.php?page=videos/derbycon3/1207-my-experiments-with-truth-a-different-route-to-bug-hunting-devesh-bhatt> The Art and Science of Hacking Any Organization - Tyler Wrightson<http://www.irongeek.com/i.php?page=videos/derbycon3/1208-the-art-and-science-of-hacking-any-organization-tyler-wrightson> Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation - Christopher Campbell & Matthew Graeber<http://www.irongeek.com/i.php?page=videos/derbycon3/1209-living-off-the-land-a-minimalist-s-guide-to-windows-post-exploitation-christopher-campbell-matthew-graeber> Cracking Corporate Passwords - Exploiting Password Policy Weaknesses - Minga / Rick Redman<http://www.irongeek.com/i.php?page=videos/derbycon3/1301-cracking-corporate-passwords-exploiting-password-policy-weaknesses-minga-rick-redman> Ownage From Userland: Process Puppeteering - Nick Cano<http://www.irongeek.com/i.php?page=videos/derbycon3/1302-ownage-from-userland-process-puppeteering-nick-cano> ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation Techniquesí)%00 - Roberto Salgado<http://www.irongeek.com/i.php?page=videos/derbycon3/1303-union-select-this-talk-as-new-exploitation-and-obfuscation-techniques-00-roberto-salgado> Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to Pwn the Network - SOLOMON SONYA and NICK KULESZA<http://www.irongeek.com/i.php?page=videos/derbycon3/1304-exploiting-the-zeroth-hour-developing-your-advanced-persistent-threat-to-pwn-the-network-solomon-sonya-nick-kulesza> Phishing Like The Pros - Luis “Connection” Santana<http://www.irongeek.com/i.php?page=videos/derbycon3/1305-phishing-like-the-pros-luis-connection-santana> Raspberry Pi - Media Centers - and AppleTV - David Schuetz<http://www.irongeek.com/i.php?page=videos/derbycon3/1306-raspberry-pi-media-centers-and-appletv-david-schuetz> Cognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy Ellis<http://www.irongeek.com/i.php?page=videos/derbycon3/2101-cognitive-injection-reprogramming-the-situation-oriented-human-os-andy-ellis> IOCAware - Actively Collect Compromise Indicators and Test Your Entire Enterprise - Matt Jezorek and Dennis Kuntz<http://www.irongeek.com/i.php?page=videos/derbycon3/2102-iocaware-actively-collect-compromise-indicators-and-test-your-entire-enterprise-matt-jezorek-dennis-kuntz> Cash is King: Who’s Wearing Your Crown? - Tom Eston and Spencer McIntyre<http://www.irongeek.com/i.php?page=videos/derbycon3/2103-cash-is-king-who-s-wearing-your-crown-tom-eston-and-spencer-mcintyre> Security Sucks - and You’re Wearing a Nursing Bra - Paul Asadoorian<http://www.irongeek.com/i.php?page=videos/derbycon3/2104-security-sucks-and-you-re-wearing-a-nursing-bra-paul-asadoorian> Windows Attacks: AT is the new black - Rob Fuller and Chris Gates<http://www.irongeek.com/i.php?page=videos/derbycon3/2105-windows-attacks-at-is-the-new-black-rob-fuller-and-chris-gates> How Good is Your Phish - @sonofshirt<http://www.irongeek.com/i.php?page=videos/derbycon3/2106-how-good-is-your-phish-sonofshirt> Identifying Evil: An introduction to Reverse Engineering Malware and other software - Bart ‘d4ncind4n’ Hopper<http://www.irongeek.com/i.php?page=videos/derbycon3/2107-identifying-evil-an-introduction-to-reverse-engineering-malware-and-other-software-bart-d4ncind4n-hopper> How Im going to own your organization in just a few days. - RazorEQX<http://www.irongeek.com/i.php?page=videos/derbycon3/2108-how-im-going-to-own-your-organization-in-just-a-few-days-razoreqx> Pass-The-Hash 2: The Admin’s Revenge - Skip Duckwall and Chris Campbell<http://www.irongeek.com/i.php?page=videos/derbycon3/2201-pass-the-hash-2-the-admin-s-revenge-skip-duckwall-chris-campbell> The Cavalry Is Us: Protecting the public good and our profession - Josh Corman<http://www.irongeek.com/i.php?page=videos/derbycon3/2202-the-cavalry-is-us-protecting-the-public-good-and-our-profession-josh-corman> Love letters to Frank Abagnale (How do I pwn thee let me count the ways) - Jayson E. Street<http://www.irongeek.com/i.php?page=videos/derbycon3/2203-love-letters-to-frank-abagnale-how-do-i-pwn-thee-let-me-count-the-ways-jayson-e-street> The Message and The Messenger - James Arlen<http://www.irongeek.com/i.php?page=videos/derbycon3/2204-the-message-and-the-messenger-james-arlen> 50 Shades of RED: Stories from the "Playroom" - Chris Nickerson<http://www.irongeek.com/i.php?page=videos/derbycon3/2205-50-shades-of-red-stories-from-the-playroom-chris-nickerson> Beyond Information Warfare “You Ain’t Seen Nothing Yet” - Winn Schwartau<http://www.irongeek.com/i.php?page=videos/derbycon3/2206-beyond-information-warfare-you-ain-t-seen-nothing-yet-winn-schwartau> Stop Fighting Anti-Virus - Integgroll<http://www.irongeek.com/i.php?page=videos/derbycon3/2207-stop-fighting-anti-virus-integgroll> How the Grid Will Be Hacked - Josh Axelrod and Matt Davis<http://www.irongeek.com/i.php?page=videos/derbycon3/2301-how-the-grid-will-be-hacked-josh-axelrod-matt-davis> help for the helpdesk - Mick Douglas<http://www.irongeek.com/i.php?page=videos/derbycon3/2302-help-for-the-helpdesk-mick-douglas> Weaponizing your Coffee Pot - Daniel Buentello<http://www.irongeek.com/i.php?page=videos/derbycon3/2303-weaponizing-your-coffee-pot-daniel-buentello> Practical OSINT - Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY TALK - 18+ or older)<http://www.irongeek.com/i.php?page=videos/derbycon3/2304-practical-osint-shane-macdougall> Stop making excuses; it’s time to own your HIV (High Impact Vulnerabilities) - Jack D. Nichelson<http://www.irongeek.com/i.php?page=videos/derbycon3/2305-stop-making-excuses-it-s-time-to-own-your-hiv-high-impact-vulnerabilities-jack-d-nichelson> Uncloaking IP Addresses on IRC - Derek Callaway<http://www.irongeek.com/i.php?page=videos/derbycon3/2306-uncloaking-ip-addresses-on-irc-derek-callaway> **** -- "The ability to quote is a serviceable substitute for wit." ~ W. Somerset Maugham "The ability to Google can be a serviceable substitute for technical knowledge." ~ Adrian D. Crenshaw**** _______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
-- "The ability to quote is a serviceable substitute for wit." ~ W. Somerset Maugham "The ability to Google can be a serviceable substitute for technical knowledge." ~ Adrian D. Crenshaw
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Re: Derbycon 3.0 Videos Tracks 1 & 2, (continued)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Frank Michael (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 James Wooley (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Robin Wood (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 packetjack (Oct 06)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Greg Hetrick (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Omid Mohammadi (Oct 09)