Top results
1. making badusb work for you adam caudill (@adamcaudill) brandon wilson (@brandonlwilson) 2. what is badusb? ● not a technical flaw ● not a vulnerability 3. patriot…
making badusb work for you adam caudill (@adamcaudill) brandon wilson (@brandonlwilson) hi, i'm adam caudill - i'm a developer and independent security researcher, i'm here…
srlabs template v12 badusb — on accessories that turn evil karsten nohl sascha krißler jakob lell 2 demo 1 –…
srlabs template v12 badusb — on accessories that turn evil karsten nohl sascha krißler jakob lell 2 demo 1 –…
1. arduino intrusion that little bad guy 2. chi? eclipse spark 3. chi? eclipse spark quello di parrot security 4. chi? eclipse spark quello di parrot security lorenzo faletra,…
1. breaking into security 1 2. johnny long 2 3. joe mccray 3 4. brian domschke 4 5. w ho are we ? 5 6. justin “spridel” brown osint ninjaweb app ninja in training hfc…
raspberry pi, cars, and appletv david schuetz (@darthnull) derbycon 3.0 september 28, 2013 requisite background ⢠senior consultant at intrepidus group âwholly owned…
srlabs template v12 badusb — on accessories that turn evil karsten nohl sascha krißler jakob lell 2 demo 1 –…
srlabs template v12 badusb — on accessories that turn evil karsten nohl sascha krißler jakob lell 2 demo 1 –…
1. passing the torch: old school red teaming, new school tactics? dave mcguire, will schroeder veris group’s adaptive threat division 2. @davidpmcguire ● director of…
1. sandboxes: a pen-tester’s perspective rahul kashyap [email protected] rahul kashyap, [email protected] 2. bromium confidential • previously led mcafee labs vuln research…
powershell command line argument obfuscation techniques invoke-obfuscation: powershell obfusk8tion techniques & how to (try to) d""e`tec`t 'th'+'em' daniel…
1. getting schooled security with no budget in a hostile environment. 2. whois [email protected] @tonikjdk 3. environment 12 buildings in a metro area, fiber back…
badusb & beyond threats hiding inside the enterprise #scchi hello chicago! adam caudill @adamcaudill [email protected] brandon wilson @brandonlwilson [email protected]…
copyright © fireeye, inc. all rights reserved.1 no easy breach derbycon 2016 #noeasybreach matt dunwoody @matthewdunwoody nick carr @itsreallynick copyright © fireeye,…
bad usb 12/07/2014 #lt駆動開発09 もりたこ about me もりたこ twitter : @mrtc0 blog : http://mrt-k.github.io/ ハニーポット観察 badusbを体験して なるほどね…
1. cms hacking tricks! owning content management systems ! ! greg foss | oscp, gpen, gwapt, gcih, ceh! senior security research engineer | logrhythm labs 2. just a few content…
automated pentest toolkit automated pentest toolkit adam compton, senior security consultant austin lane, security consultant 1 who am i? adam in 5 words: father 5 years…
tactical diversion-driven defense thomas hegel incident response and security analytics engineer gcfe, cissp, pie etr greg foss secops lead / sr. researcher oscp, gawn, gpen,…
fear & loathing on your desk badusb, and what you should do about it robert fisk outline 1. why usb = universal serial badness 2. current defenses 3. hardware defense…