Top results
automated pentest toolkit automated pentest toolkit adam compton, senior security consultant austin lane, security consultant 1 who am i? adam in 5 words: father 5 years…
welcome to your new apartment ;) here’s a little tour… the living room! a better look at the couches… *it’s a sofa bed…so our guests can have a place to sleep.…
1. breaking into security 1 2. johnny long 2 3. joe mccray 3 4. brian domschke 4 5. w ho are we ? 5 6. justin “spridel” brown osint ninjaweb app ninja in training hfc…
raspberry pi, cars, and appletv david schuetz (@darthnull) derbycon 3.0 september 28, 2013 requisite background ⢠senior consultant at intrepidus group âwholly owned…
1. passing the torch: old school red teaming, new school tactics? dave mcguire, will schroeder veris group’s adaptive threat division 2. @davidpmcguire ● director of…
1. sandboxes: a pen-tester’s perspective rahul kashyap [email protected] rahul kashyap, [email protected] 2. bromium confidential • previously led mcafee labs vuln research…
powershell command line argument obfuscation techniques invoke-obfuscation: powershell obfusk8tion techniques & how to (try to) d""e`tec`t 'th'+'em' daniel…
1. getting schooled security with no budget in a hostile environment. 2. whois [email protected] @tonikjdk 3. environment 12 buildings in a metro area, fiber back…
copyright © fireeye, inc. all rights reserved.1 no easy breach derbycon 2016 #noeasybreach matt dunwoody @matthewdunwoody nick carr @itsreallynick copyright © fireeye,…
1. cms hacking tricks! owning content management systems ! ! greg foss | oscp, gpen, gwapt, gcih, ceh! senior security research engineer | logrhythm labs 2. just a few content…
tactical diversion-driven defense thomas hegel incident response and security analytics engineer gcfe, cissp, pie etr greg foss secops lead / sr. researcher oscp, gawn, gpen,…
web pentester api pentester general testing techniques tools utilized project deliverables and overarching goals endpoint technicalities vulnerability impact and severity
go on cyber offense with pentest+ certification pentest+ for government agencies and contractors “pentest+ demonstrates knowledge beyond entry- level and that the individual…
1. making badusb work for you adam caudill (@adamcaudill) brandon wilson (@brandonlwilson) 2. what is badusb? ● not a technical flaw ● not a vulnerability 3. patriot…
1. it's okay to touch yourself! derbycon 2013 ben ten (@ben0xa) 2. about me ● 12+ years experience in health care information systems ● vice president & security…
powerpoint presentation marketers are friends, not food kara drapala 1 agenda about me/intro nlprank case study communications 101 help us help you how to not go crazy while…
stealthier attacks & smarter defending with tls fingerprinting lee brotherston @synackpse #tlsfp … a “zero math, (almost) zero crypto”, tls talk lee brotherston…
making badusb work for you adam caudill (@adamcaudill) brandon wilson (@brandonlwilson) hi, i'm adam caudill - i'm a developer and independent security researcher, i'm here…
1. 1 stealth servers need stealth packets stealth servers need stealth packets jaime sanchez (@segofensiva) www.seguridadofensiva.com 2. 2 stealth servers need stealth packets…
1. regular expressions (regex) overview september 24, 2017 matt scheurer @c3rkah slides: https://www.slideshare.net/cerkah ((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9]).(25[0-5]|2[0-4]…