PaulDotCom mailing list archives
Re: Derbycon 3.0 Videos Tracks 1 & 2
From: Omid Mohammadi <omid () mohammadi co uk>
Date: Mon, 7 Oct 2013 22:50:47 +1100
Thanks! On Saturday, October 5, 2013, Adrian Crenshaw wrote:
I think I have the rest up now: Track 3 (Teach Me) It's Only a Game: Learning Security through Gaming – Bruce Potter<http://www.irongeek.com/i.php?page=videos/derbycon3/3101-its-only-a-game-learning-security-through-gaming-bruce-potter> Ooops – Now What? :: The Stolen Data Impact Model (SDIM) – Brent Huston<http://www.irongeek.com/i.php?page=videos/derbycon3/3102-ooops-now-what-the-stolen-data-impact-model-sdim-brent-huston> Anti-Forensics: Memory or something – I forget. – int0x80<http://www.irongeek.com/i.php?page=videos/derbycon3/3103-anti-forensics-memory-or-something-i-forget-int0x80> The Mysterious Mister Hokum – Jason Scott<http://www.irongeek.com/i.php?page=videos/derbycon3/3104-the-mysterious-mister-hokum-jason-scott> Appsec Tl;dr – Gillis Jones<http://www.irongeek.com/i.php?page=videos/derbycon3/3105-appsec-tl-dr-gillis-jones> DIY Command & Control For Fun And *No* Profit – David Schwartzberg<http://www.irongeek.com/i.php?page=videos/derbycon3/3106-diy-command-control-for-fun-and-no-profit-david-schwartzberg> IPv6 is here (kind of) – what can I do with it? – Dan Wilkins<http://www.irongeek.com/i.php?page=videos/derbycon3/3107-ipv6-is-here-kind-of-what-can-i-do-with-it-dan-wilkins> Dancing With Dalvik – Thomas Richards<http://www.irongeek.com/i.php?page=videos/derbycon3/3108-dancing-with-dalvik-thomas-richards> Big Hugs for Big Data – Davi Ottenheimer<http://www.irongeek.com/i.php?page=videos/derbycon3/3201-big-hugs-for-big-data-davi-ottenheimer> Antivirus Evasion: Lessons Learned – thelightcosine<http://www.irongeek.com/i.php?page=videos/derbycon3/3202-antivirus-evasion-lessons-learned-thelightcosine> Jared DeMott – Is Auditing C/C++ Different Nowadays?<http://www.irongeek.com/i.php?page=videos/derbycon3/3203-jared-demott-is-auditing-cc-different-nowadays> Getting Schooled: Security with no budget in a hostile environment – Jim Kennedy<http://www.irongeek.com/i.php?page=videos/derbycon3/3204-getting-schooled-security-with-no-budget-in-a-hostile-environment-jim-kennedy> Browser Pivoting (FU2FA) – Raphael Mudge<http://www.irongeek.com/i.php?page=videos/derbycon3/3205-browser-pivoting-fu2fa-raphael-mudge> Taking the BDSM out of PCI-DSS Through Open-Source Solutions – Zack Fasel & Erin “SecBarbie” Jacobs<http://www.irongeek.com/i.php?page=videos/derbycon3/3206-taking-the-bdsm-out-of-pci-dss-through-open-source-solutions-zack-fasel-erin-secbarbie-jacobs> John Strand – Hacking Back – Active Defense and Internet Tough Guys<http://www.irongeek.com/i.php?page=videos/derbycon3/3207-john-strand-hacking-back-active-defense-and-internet-tough-guys> An Encyclpwnia of Persistence – Skip Duckwall & Will Peteroy<http://www.irongeek.com/i.php?page=videos/derbycon3/3208-an-encyclpwnia-of-persistence-skip-duckwall-will-peteroy> Your Turn! – Johnny Long – HFC<http://www.irongeek.com/i.php?page=videos/derbycon3/3209-your-turn-johnny-long-hfc> Practical File Format Fuzzing – Jared Allar<http://www.irongeek.com/i.php?page=videos/derbycon3/3301-practical-file-format-fuzzing-jared-allar> Surviving the Dead – Christopher ‘EggDropX’ Payne<http://www.irongeek.com/i.php?page=videos/derbycon3/3302-surviving-the-dead-christopher-eggdropx-payne> How can I do that? Intro to hardware hacking with an RFID badge reader – Kevin Bong<http://www.irongeek.com/i.php?page=videos/derbycon3/3303-how-can-i-do-that-intro-to-hardware-hacking-with-an-rfid-badge-reader-kevin-bong> A SysCall to ARMs – Brendan Watters<http://www.irongeek.com/i.php?page=videos/derbycon3/3304-a-syscall-to-arms-brendan-watters> The Netsniff-NG Toolkit – Jon Schipp<http://www.irongeek.com/i.php?page=videos/derbycon3/3305-the-netsniff-ng-toolkit-jon-schipp> Why Dumpster Dive when I can pwn right in? – Terry Gold<http://www.irongeek.com/i.php?page=videos/derbycon3/3306-why-dumpster-dive-when-i-can-pwn-right-in-terry-gold> Track 4 (The 3-Way) Pigs Don’t Fly – Why owning a typical network is so easy – and how to build a secure one. – Matt “scriptjunkie” Weeks<http://www.irongeek.com/i.php?page=videos/derbycon3/4101-pigs-don-t-fly-why-owning-a-typical-network-is-so-easy-and-how-to-build-a-secure-one-matt-scriptjunkie-weeks> Finding The Signal in the Noise: Quantifying Advanced Malware – Dave Marcus<http://www.irongeek.com/i.php?page=videos/derbycon3/4102-finding-the-signal-in-the-noise-quantifying-advanced-malware-dave-marcus> Applying the 32 Zombieland Rules to IT Security – Larry Pesce<http://www.irongeek.com/i.php?page=videos/derbycon3/4103-applying-the-32-zombieland-rules-to-it-security-larry-pesce> Windows 0wn3d By Default – Mark Baggett<http://www.irongeek.com/i.php?page=videos/derbycon3/4206-windows-0wn3d-by-default-mark-baggett> Android 4.0: Ice Cream “Sudo Make Me a” Sandwich – Max Sobell<http://www.irongeek.com/i.php?page=videos/derbycon3/4105-android-40-ice-cream-sudo-make-me-a-sandwich-max-sobell> Attacking the Next Generation Air Traffic Control System; Hackers – liquor and commercial airliners. – Renderman<http://www.irongeek.com/i.php?page=videos/derbycon3/4107-attacking-the-next-generation-air-traffic-control-system-hackers-liquor-and-commercial-airliners-renderman> Antivirus Evasion through Antigenic Variation (Why the Blacklisting Approach to AV is Broken) – Trenton Iveys<http://www.irongeek.com/i.php?page=videos/derbycon3/4108-antivirus-evasion-through-antigenic-variation-why-the-blacklisting-approach-to-av-is-broken-trenton-iveyneal-bridges> Hello ASM World: A Painless and Contextual Introduction to x86 Assembly – nicolle neulist (rogueclown)<http://www.irongeek.com/i.php?page=videos/derbycon3/4201-hello-asm-world-a-painless-and-contextual-introduction-to-x86-assembly-nicolle-neulist-rogueclown> SQL injection with sqlmap – Conrad Reynolds CISA<http://www.irongeek.com/i.php?page=videos/derbycon3/4202-sql-injection-with-sqlmap-conrad-reynolds-cisa> The Internet of Things: Vulns – Botnets and Detection – Kyle Stone (@essobi) – Liam Randall<http://www.irongeek.com/i.php?page=videos/derbycon3/4203-the-internet-of-things-vulns-botnets-and-detection-kyle-stone-liam-randall> The Malware Management Framework – a process you can use to find advanced malware. We found WinNTI with it! – Michael Gough and Ian Robertson<http://www.irongeek.com/i.php?page=videos/derbycon3/4204-the-malware-management-framework-a-process-you-can-use-to-find-advanced-malware-we-found-winnti-with-it-michael-gough-ian-robertson> Hack the Hustle! – Eve Adams<http://www.irongeek.com/i.php?page=videos/derbycon3/4205-hack-the-hustle-eve-adams> Operationalizing Security Intelligence in the Enterprise- Rafal Los<http://www.irongeek.com/i.php?page=videos/derbycon3/4104-operationalizing-security-intelligence-in-the-enterprise-rafal-los> New Shiny in the Metasploit Framework – egypt<http://www.irongeek.com/i.php?page=videos/derbycon3/4207-new-shiny-in-the-metasploit-framework-egypt> Everything you ever wanted to know on how to start a Credit Union – but were afraid to ask. – Jordan Modell<http://www.irongeek.com/i.php?page=videos/derbycon3/4208-everything-you-ever-wanted-to-know-on-how-to-start-a-credit-union-but-were-afraid-to-ask-jordan-modell> A developer’s guide to pentesting – Bill Sempf<http://www.irongeek.com/i.php?page=videos/derbycon3/4209-a-developer-s-guide-to-pentesting-bill-sempf> Steal All of the Databases. – Alejandro Caceres<http://www.irongeek.com/i.php?page=videos/derbycon3/4301-steal-all-of-the-databases-alejandro-caceres> Sandboxes from a pen tester’s view – Rahul Kashyap<http://www.irongeek.com/i.php?page=videos/derbycon3/4303-sandboxes-from-a-pen-tester-s-view-rahul-kashyap> iOS Reverse #=> iPWn Apps – Mano ‘dash4rk’ Paul<http://www.irongeek.com/i.php?page=videos/derbycon3/4304-ios-reverse-ipwn-apps-mano-dash4rk-paul> Terminal Cornucopia – Evan “treefort” Booth<http://www.irongeek.com/i.php?page=videos/derbycon3/4305-terminal-cornucopia-evan-treefort-booth> Wait; How is All This Stuff Free?!? – Gene Bransfield<http://www.irongeek.com/i.php?page=videos/derbycon3/4306-wait-how-is-all-this-stuff-free-gene-bransfield> Track 5 – Hybrid Room Building An Information Security Awareness Program from Scratch – Bill Gardner – Valerie Thomas<http://www.irongeek.com/i.php?page=videos/derbycon3/5101-building-an-information-security-awareness-program-from-scratch-bill-gardner-valerie-thomas> Malware : testing malware scenarios on your network – Tony Huffman (@myne_us) – Juan Cortes (@kongo_86)<http://www.irongeek.com/i.php?page=videos/derbycon3/5102-malware-testing-malware-scenarios-on-your-network-tony-huffman-myne-us-juan-cortes-kongo-86> Password Intelligence Project – Advanced Password Recovery and Modern Mitigation Strategies – John Moore “Rabid Security”<http://www.irongeek.com/i.php?page=videos/derbycon3/5103-password-intelligence-project-advanced-password-recovery-and-modern-mitigation-strategies-john-moore-rabid-security> Tizen Security: Hacking the new mobile OS – Mark Manning (AntiTree)<http://www.irongeek.com/i.php?page=videos/derbycon3/5104-tizen-security-hacking-the-new-mobile-os-mark-manning-antitree> RAWR – Rapid Assessment of Web Resources – Adam Byers – Tom Moore<http://www.irongeek.com/i.php?page=videos/derbycon3/5105-rawr-rapid-assessment-of-web-resources-adam-byers-tom-moore> Decoding Bug Bounty Programs – Jon Rose<http://www.irongeek.com/i.php?page=videos/derbycon3/5106-decoding-bug-bounty-programs-jon-rose> Patching Windows Executables with the Backdoor Factory – Joshua Pitts<http://www.irongeek.com/i.php?page=videos/derbycon3/5107-patching-windows-executables-with-the-backdoor-factory-joshua-pitts> Jason Scott – Defcon Documentary Q&A<http://www.irongeek.com/i.php?page=videos/derbycon3/5108-jason-scott-defcon-documentary> Panel: Building and Growing a Hacker Space – Joey Maresca – Dave Marcus – Nick Farr – SkyDog<http://www.irongeek.com/i.php?page=videos/derbycon3/5201-panel-building-and-growing-a-hacker-space-joey-maresca-dave-marcus-nick-farr-skydog-1-if-selected-will-extend-invite-to-lvl1-team> SO Hopelessly Broken: the implications of pervasive vulnerabilities in SOHO router products. – Jacob Holcomb<http://www.irongeek.com/i.php?page=videos/derbycon3/5202-so-hopelessly-broken-the-implications-of-pervasive-vulnerabilities-in-soho-router-products-jacob-holcomb> Put Me In Coach: How We Got Started In Infosec – pr1me – Chris “g11tch” Hodges – Frank Hackett – Dave “ReL1K” Kennedy<http://www.irongeek.com/i.php?page=videos/derbycon3/5203-put-me-in-coach-how-we-got-started-in-infosec-pr1me-chris-g11tch-hodges-frank-hackett-dave-rel1k-kennedy> Alice Goes Deeper (Down the Rabbit Hole) – Redirection 2.0 – Nathan Magniez<http://www.irongeek.com/i.php?page=videos/derbycon3/5204-alice-goes-deeper-down-the-rabbit-hole-redirection-20-nathan-magniez> Emergent Vulnerabilities: What ant colonies – schools of fish – and security have in common. – Nathaniel “Dr. Whom” Husted<http://www.irongeek.com/i.php?page=videos/derbycon3/5205-emergent-vulnerabilities-what-ant-colonies-schools-of-fish-and-security-have-in-common-nathaniel-dr-whom-husted> Why Your IT Bytes – Frank J. Hackett<http://www.irongeek.com/i.php?page=videos/derbycon3/5206-why-your-it-bytes-frank-j-hackett> Using Facial Recognition Software In Digital Forensics And Information Security – Brian Lockrey<http://www.irongeek.com/i.php?page=videos/derbycon3/5207-using-facial-recognition-software-in-digital-forensics-and-information-security-brian-lockrey> How to Fight a War Without Actually Starting One – Brendan O’Connor<http://www.irongeek.com/i.php?page=videos/derbycon3/5208-how-to-fight-a-war-without-actually-starting-one-brendan-o-connor> Crypto-Exploit Exercises: A tool for reinforcing basic topics in Cryptography – Nancy Snoke<http://www.irongeek.com/i.php?page=videos/derbycon3/5209-crypto-exploit-exercises-a-tool-for-reinforcing-basic-topics-in-cryptography-nancy-snoke> Stable Talks Gen Y:Getting Them to Talk Rather than Text at Work – Nancy Kovanic<http://www.irongeek.com/i.php?page=videos/derbycon3/s101-gen-ygetting-them-to-talk-rather-than-text-at-work-nancy-kovanic> Battle Scars And Friendly Fire: Threat Research Team War Stories – Will Gragido and Seth Geftic<http://www.irongeek.com/i.php?page=videos/derbycon3/s102-battle-scars-and-friendly-fire-threat-research-team-war-stories-will-gragido-and-seth-geftic> Unmasking Miscreants – Allixon Nixon – Brandon Levene<http://www.irongeek.com/i.php?page=videos/derbycon3/s103-unmasking-miscreants-allixon-nixon-brandon-levene> gitDigger: Creating useful wordlists from public GitHub repositories – Jaime Filson (WiK)<http://www.irongeek.com/i.php?page=videos/derbycon3/s104-gitdigger-creating-useful-wordlists-from-public-github-repositories-jaime-filson-wik> PowerShell and Windows Throw the Best Shell Parties – Piotr Marszalik<http://www.irongeek.com/i.php?page=videos/derbycon3/s105-powershell-and-windows-throw-the-best-shell-parties-piotr-marszalik> Owning Computers Without Shell Access – Royce Davis<http://www.irongeek.com/i.php?page=videos/derbycon3/s106-owning-computers-without-shell-access-royce-davis> Sixnet Tools: for poking at Sixnet Things – Mehdi Sabraoui<http://www.irongeek.com/i.php?page=videos/derbycon3/s107-sixnet-tools-for-poking-at-sixnet-things-mehdi-sabraoui> Hardening Windows 8 apps for the Windows Store – Bill Sempf<http://www.irongeek.com/i.php?page=videos/derbycon3/s110-hardening-windows-8-apps-for-the-windows-store-bill-sempf> Intro to Dynamic Access Control in Windows Server 2012 – Evan Anderson<http://www.irongeek.com/i.php?page=videos/derbycon3/s111-intro-to-dynamic-access-control-in-windows-server-2012-evan-anderson> Evolutionary Security – Embracing Failure to Attain “Good Enough” – Josh More<http://www.irongeek.com/i.php?page=videos/derbycon3/s112-evolutionary-security-embracing-failure-to-attain-good-enough-josh-more> DIY Forensics: When Incident Response Morphs into Digital Forensics – John Sammons<http://www.irongeek.com/i.php?page=videos/derbycon3/s206-diy-forensics-when-incident-response-morphs-into-digital-forensics-john-sammons> ANOTHER Log to Analyze – Utilizing DNS to Discover Malware in Your Network – Nathan Magniez<http://www.irongeek.com/i.php?page=videos/derbycon3/s114-another-log-to-analyze-utilizing-dns-to-discover-malware-in-your-network-nathan-magniez> Phishing Frenzy: 7 seconds from hook to sinker – Brandon <zeknox> McCann<http://www.irongeek.com/i.php?page=videos/derbycon3/s201-phishing-frenzy-7-seconds-from-hook-to-sinker-brandon-zeknox-mccann> Electronic Safe Fail: Common Vulnerabilities in Electronic Safes – Jeff Popio<http://www.irongeek.com/i.php?page=videos/derbycon3/s202-electronic-safe-fail-common-vulnerabilities-in-electronic-safes-jeff-popio> The Good Samaritan Identity Protection Project www.thegsipp.org – Zack Hibbard – Chris Brown and Jon Sternstein<http://www.irongeek.com/i.php?page=videos/derbycon3/s203-the-good-samaritan-identity-protection-project-wwwthegsipporg-zack-hibbard-chris-brownjon-sternstein> Some defensive ideas from offensive guys. – Justin Elze and Robert Chuvala<http://www.irongeek.com/i.php?page=videos/derbycon3/s204-some-defensive-ideas-from-offensive-guys-justin-elze-robert-chuvala> Grim Trigger – Jeff “ghostnomad” Kirsch<http://www.irongeek.com/i.php?page=videos/derbycon3/s207-grim-trigger-jeff-ghostnomad-kirsch> A n00bie’s perspective on Pentesting… – Brandon Edmunds<http://www.irongeek.com/i.php?page=videos/derbycon3/s301-a-n00bie-s-perspective-on-pentesting-brandon-edmunds> My Security is a Graph – Your Argument is Invalid – Gabriel Bassett<http://www.irongeek.com/i.php?page=videos/derbycon3/s210-my-security-is-a-graph-your-arguement-is-invalid-gabriel-bassett> Follow the Foolish Zebras: Finding Threats in Your Logs – Chris Larsen<http://www.irongeek.com/i.php?page=videos/derbycon3/s211-follow-the-foolish-zebras-finding-threats-in-your-logs-chris-larsen> Security Training and Research Cloud (STRC) – Jimmy Murphy<http://www.irongeek.com/i.php?page=videos/derbycon3/s212-security-training-and-research-cloud-strc-jimmy-murphy> Passive Aggressive Defense – Jason Clark<http://www.irongeek.com/i.php?page=videos/derbycon3/s213-passive-aggressive-defense-jason-clark> So you want to be a pentester? – Raymond Gabler<http://www.irongeek.com/i.php?page=videos/derbycon3/s214-so-you-want-to-be-a-pentester-raymond-gabler> Digital Energy – BPT – Paul Coggin<http://www.irongeek.com/i.php?page=videos/derbycon3/s215-digital-energy-bpt-paul-coggin> An Anti-Forensics Primer – Jason Andress<http://www.irongeek.com/i.php?page=videos/derbycon3/s216-an-anti-forensics-primer-jason-andress> What if Petraeus was a hacker? Email privacy for the rest of us – Phil Cryer (@faker)<http://www.irongeek.com/i.php?page=videos/derbycon3/s217-what-if-petraeus-was-a-hacker-email-privacy-for-the-rest-of-us-phil-cryer-faker> On Fri, Oct 4, 2013 at 11:07 AM, Julian Makas < jmakas () mimictechnologies com <javascript:_e({}, 'cvml', 'jmakas () mimictechnologies com');>> wrote:
-- Regards, Omid. Mobile 0415 449 070 Sent from a mobile device
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Re: Derbycon 3.0 Videos Tracks 1 & 2, (continued)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 James Wooley (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Robin Wood (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 packetjack (Oct 06)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 James Wooley (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Greg Hetrick (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Adrian Crenshaw (Oct 04)
- Re: Derbycon 3.0 Videos Tracks 1 & 2 Omid Mohammadi (Oct 09)