Vídeos de Derbycon 2016
Ya tenemos disponibles los vídeos (faltan algunos) de una de las conferencias que más ha crecido en los últimos años: Derbycon. La edición de este año 2016 acaba de terminar y nos ha dejado un gran número de charlas interesantes:
- Key Note - Jeffrey Snover, Lee Holmes
- Carlos Perez - Thinking Purple
- Ed Skoudis - Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S.
- David Maloney, James Lee, Brent Cook, Tod Beardsley, Lance Sanchez - Metasploit Townhall
- Parker Schmitt - Data Obfuscation: How to hide data and payloads to make them "not exist"
- Jason Smith - Go with the Flow
- Devon Greene - Abusing RTF: Evasion, Exploitation and Counter Measures
- Mubix "Rob" Fuller - Writing malware while the blue team is staring at you
- Christopher Hadnagy - Mind Reading for Fun and Profit using DISC
- JDuck - Stagefright: An Android Exploitation Case Study
- Arian J Evans & James Pleger - Top 10 2015-2016 compromise patterns observed & how to use non-traditional Internet datasets to detect & avoid them
- Aaron Lafferty - Information Security Proposed Solutions Series - 1. Talent
- Alfredo Ramirez - DNSSUX
- Tyler Halfpop , Jacob Soo - Macs Get Sick Too
- Joe Desimone - Hunting for Exploit Kits
- Stephen Breen, Chris Mallz - Rotten Potato - Privilege Escalation from Service Accounts to SYSTEM
- Nick Cano - +1,000,000 -0: Cloning a Game Using Game Hacking and Terabytes of Data
- Wartortell and Aaron Bayles - Nose Breathing 101: A Guide to Infosec Interviewing
- William McLaughlin - Android Patchwork
- Will Schroeder, Matt Nelson - A Year in the Empire
- Kevin Johnson and Jason Gillam - Next Gen Web Pen Testing: Handling modern applications in a penetration test
- Ken Johnson, Chris Gates - DevOops Redux
- Ryan Voloch and Peter Giannoutsos - To Catch a Penetration Tester: Top SIEM Use Cases
- Spencer McIntyre - Is that a penguin in my Windows?
- Brent White && Tim Roberts - Real World Attacks VS Check-box Security
- Ben0xA - PowerShell Secrets and Tactics
- Michael Allen - Beyond The ?Cript: Practical iOS Reverse Engineering
- Jayson E. Street - .... and bad mistakes I've made a few.....
- Matthew Dunwoody, Nick Carr - No Easy Breach: Challenges and Lessons from an Epic Investigation
- Natalie Vanatta - ARRR Maties! A map to the legal hack-back
- Michael Wharton, Project MVP - Hacking and Protecting SharePoint
- Marcello Salvati - CrackMapExec - Owning Active Directory by using Active Directory
- Rockie Brockway & Adam Hogan - Adaptation of the Security Sub-Culture
- Zach Grace, Brian Genz - Better Network Defense Through Threat Injection and Hunting
- nyxgeek - Hacking Lync (or, 'The Weakest Lync')
- Kevin Gennuso - Responder for Purple Teams
- Ken Toler - Metaprogramming in Ruby and doing it wrong.
- Paul Coggin - Exploiting First Hop Protocols to Own the Network
- Nick Landers - Outlook and Exchange for the Bad Guys
- Valerie Thomas and Harry Regan - It's Never So Bad That It Can't Get Worse
- Nathan Clark - AWSh*t. Pay-as-you-go Mobile Penetration Testing
- Nancy Snoke - Evolving your Office's Security Culture
- Michael Schearer - Confronting Obesity in Infosec
- Mark Mager - Defeating The Latest Advances in Script Obfuscation
- Michael Gough - From Commodity to Advanced (APT) malware, are automated malware analysis sandboxes as useful as your own basic manual analysis?
- Tim MalcomVetter - Breaking Credit Card Tokenization Without Cryptanalysis
- Bill V – Privileged Access Workstations (PAWs)
- Scott Lyons and Joshua Marpet - Business Developement: The best non-four letter dirty word in infosec.
- Scot Berner, Jason Lang - Tool Drop 2.0 - Free As In Pizza
- Joseph Tegg - We're a Shooting Gallery, Now What?
- Doug Burns - Malicious Office Doc Analysis for EVERYONE!
- Sean Metcalf & Will Schroeder - Attacking EvilCorp: Anatomy of a Corporate Hack
- Matt Graeber, Jared Atkinson - Living Off the Land 2: A Minimalist's Guide to Windows Defense
- Kyle Wilhoit - Point of Sale Voyuer- Threat Actor Attribution Through POS Honeypots
- Jeremy Mio, David Lauer, Mike Woolard - The Art of War, Attacking the Organization and Raising the Defense
- Justin Herman & Anna-Jeannine Herman - The 1337 Gods of Geek Mythology
- Josh Huff - Open Source Intelligence - What I learned by being an OSINT creeper
- Jay Beale - Phishing without Failure and Frustration
- Larry Pesce - I don't give one IoTA: Introducing the Internet of Things Attack Methodology.
- Anti-Forensics AF int0x80 (of Dual Core)
- Deral Heiland, Matthew Kienow - Managed to Mangled: Exploitation of Enterprise Network Management Systems
- Joey Maresca - Finding Your Balance
- EvilMog - Hashcat State of the Union
- egypt - New Shiny in Metasploit Framework
- Hacking with Ham Radios: What I have learned in 25 years of being a ham.
- John Strand - Penetration Testing Trends
- Ellen Hartstack and Matthew Sullivan - Garbage in, garbage out
- Casey Smith - Establishing A Foothold With JavaScript
- Jesika McEvoy - Overcoming Imposter Syndrome (even if you're totally faking it)
- FuzzyNop - Embrace the Bogeyman: Tactical Fear Mongering for Those Who Penetrate
- Eric Conrad - Introducing DeepBlueCLI, a PowerShell module for hunt teaming via Windows event logs
- Dr. Jared DeMott & Mr. Josh Stroschein - Using Binary Ninja for Modern Malware Analysis
- Scott M - Fuzzing basics...how to break software
- Craig Bowser - Security v. Ops: Bridging the Gap
- Chris "Lopi" Spehn - From Gaming to Hacking The Planet
- Jason Blanchard - How to Social Engineer your way into your dream job!
- Lee Holmes - Attackers Hunt Sysadmins - It's time to fight back
- Adam Compton, Austin Lane - Scripting Myself Out of a Job - Automating the Penetration Test with APT2
- Branden Miller - Hacking for Homeschoolers: STEM projects for under $20
- Scott Sutherland - SQL Server Hacking on Scale using PowerShell
- Brian Marks, Andrea Sancho Silgado - Dive into DSL: Digital Response Analysis with Elasticsearch
- David Schwartzberg and Chris Sistrunk - Make STEHM Great Again
- Charles L. Yost - Python 3: It's Time
- Philip Martin - DNS in Enterprise IR: Collection, Analysis and Response
- Drew Branch - Need More Sleep? REST Could Help
- Bill Gardner - Making Our Profession More Professional
- Abe Miller - How are tickets paid for?
- Bill Sempf - Breaking Android Apps for Fun and Profit
- Amanda Berlin & Lee Brotherston - So You've Inherited a Security Department, Now What?
- Brandon Young - Reverse engineering all the malware... and why you should stop.
- Nathan Magniez - Body Hacking 101 (or a Healthy Lifestyle for Security Pros)
- Jimmy Byrd - Security Automation in your Continuous Integration Pipeline
- Chad M. Dewey - Cruise Ship Security OR Hacking the High Seas
- Karl Fosaaen - Attacking ADFS Endpoints with PowerShell
- Stephen Hilt - The 90's called, they want their technology back
- Lee Neely - Web Security for Dummies
- Kirk Hayes - I Love myBFF (Brute Force Framework)
- Cameron Craig, Keith Conway - Nobody gets fired by choosing IBM... but maybe they should.
- Mirovengi - Shackles, Shims, and Shivs - Understanding Bypass Techniques
- Jared Haight - Introducing PowerShell into your Arsenal with PS>Attack
- James Jardine - Recharging Penetration Testing to Maximize Value
- hypervista - Poetically Opaque (or other John Updike Quotes)
- David Boyd - Hack Yourself: Building A Pentesting Lab
- Ronnie Flathers - Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features
- Salvador Mendoza - Samsung Pay: Tokenized Numbers, Flaws and Issues
- Andrew Krug & Alex McCormack - Hardening AWS Environments and Automating Incident Response
- Andrew Plunkett - Yara Rule QA: Can't I Write Code to do This for Me?
- Anthony Kasza - Java RATS: Not even your Macs are safe
- Beau Bullock, Derek Banks, Joff Thyer - The Advanced Persistent Pentester (All Your Networks Are Belong 2 Us)
- Russell Butturini - Fire Away! Sinking the Next Gen Firewall
- Daniel Bohannon - Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em'
- Dav Wilson - Mobile Device Forensics
- Casey Cammilleri & Hans Lakhan - Hashview, a new tool aimed to improve your password cracking endeavors.
- Brian Fehrman - Hardware Hacking the Easyware Way
- Matthew Lichtenberger - PacketKO - Data Exfiltration Via Port Knocking
- Jamie Murdock - Ransomware: An overview
- Ben Stillman - MariaDB: Lock it down like a chastity belt
- Aaron Guzman - IoT Defenses - Software, Hardware, Wireless and Cloud
- Adam Cammack & Brent Cook - Static PIE: How and Why
- Braden Hollembaek, Adam Pond - Finding a Weak Link: Attacking Windows OEM Kernel Drivers
- Dan Bougere - The Beginner's Guide to ICS: How to Never Sleep Soundly Again
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec