PaulDotCom mailing list archives

Re: Derbycon 3.0 Videos Tracks 1 & 2


From: Omid Mohammadi <omid () mohammadi co uk>
Date: Mon, 7 Oct 2013 22:50:47 +1100

Thanks!

On Saturday, October 5, 2013, Adrian Crenshaw wrote:

I think I have the rest up now:

Track 3 (Teach Me)
 It's Only a Game: Learning Security through Gaming – Bruce 
Potter<http://www.irongeek.com/i.php?page=videos/derbycon3/3101-its-only-a-game-learning-security-through-gaming-bruce-potter>
 Ooops – Now What? :: The Stolen Data Impact Model (SDIM) – Brent 
Huston<http://www.irongeek.com/i.php?page=videos/derbycon3/3102-ooops-now-what-the-stolen-data-impact-model-sdim-brent-huston>
 Anti-Forensics: Memory or something – I forget. – 
int0x80<http://www.irongeek.com/i.php?page=videos/derbycon3/3103-anti-forensics-memory-or-something-i-forget-int0x80>
 The Mysterious Mister Hokum – Jason 
Scott<http://www.irongeek.com/i.php?page=videos/derbycon3/3104-the-mysterious-mister-hokum-jason-scott>
 Appsec Tl;dr – Gillis Jones<http://www.irongeek.com/i.php?page=videos/derbycon3/3105-appsec-tl-dr-gillis-jones>
 DIY Command & Control For Fun And *No* Profit – David 
Schwartzberg<http://www.irongeek.com/i.php?page=videos/derbycon3/3106-diy-command-control-for-fun-and-no-profit-david-schwartzberg>
 IPv6 is here (kind of) – what can I do with it? – Dan 
Wilkins<http://www.irongeek.com/i.php?page=videos/derbycon3/3107-ipv6-is-here-kind-of-what-can-i-do-with-it-dan-wilkins>
 Dancing With Dalvik – Thomas 
Richards<http://www.irongeek.com/i.php?page=videos/derbycon3/3108-dancing-with-dalvik-thomas-richards>
 Big Hugs for Big Data – Davi 
Ottenheimer<http://www.irongeek.com/i.php?page=videos/derbycon3/3201-big-hugs-for-big-data-davi-ottenheimer>
 Antivirus Evasion: Lessons Learned – 
thelightcosine<http://www.irongeek.com/i.php?page=videos/derbycon3/3202-antivirus-evasion-lessons-learned-thelightcosine>
 Jared DeMott – Is Auditing C/C++ Different 
Nowadays?<http://www.irongeek.com/i.php?page=videos/derbycon3/3203-jared-demott-is-auditing-cc-different-nowadays>
 Getting Schooled: Security with no budget in a hostile environment – Jim
Kennedy<http://www.irongeek.com/i.php?page=videos/derbycon3/3204-getting-schooled-security-with-no-budget-in-a-hostile-environment-jim-kennedy>
 Browser Pivoting (FU2FA) – Raphael 
Mudge<http://www.irongeek.com/i.php?page=videos/derbycon3/3205-browser-pivoting-fu2fa-raphael-mudge>
 Taking the BDSM out of PCI-DSS Through Open-Source Solutions – Zack Fasel
& Erin “SecBarbie” 
Jacobs<http://www.irongeek.com/i.php?page=videos/derbycon3/3206-taking-the-bdsm-out-of-pci-dss-through-open-source-solutions-zack-fasel-erin-secbarbie-jacobs>
 John Strand – Hacking Back – Active Defense and Internet Tough 
Guys<http://www.irongeek.com/i.php?page=videos/derbycon3/3207-john-strand-hacking-back-active-defense-and-internet-tough-guys>
 An Encyclpwnia of Persistence – Skip Duckwall & Will 
Peteroy<http://www.irongeek.com/i.php?page=videos/derbycon3/3208-an-encyclpwnia-of-persistence-skip-duckwall-will-peteroy>
 Your Turn! – Johnny Long – HFC<http://www.irongeek.com/i.php?page=videos/derbycon3/3209-your-turn-johnny-long-hfc>
 Practical File Format Fuzzing – Jared 
Allar<http://www.irongeek.com/i.php?page=videos/derbycon3/3301-practical-file-format-fuzzing-jared-allar>
 Surviving the Dead – Christopher ‘EggDropX’ 
Payne<http://www.irongeek.com/i.php?page=videos/derbycon3/3302-surviving-the-dead-christopher-eggdropx-payne>
 How can I do that? Intro to hardware hacking with an RFID badge reader –
Kevin 
Bong<http://www.irongeek.com/i.php?page=videos/derbycon3/3303-how-can-i-do-that-intro-to-hardware-hacking-with-an-rfid-badge-reader-kevin-bong>
 A SysCall to ARMs – Brendan 
Watters<http://www.irongeek.com/i.php?page=videos/derbycon3/3304-a-syscall-to-arms-brendan-watters>
 The Netsniff-NG Toolkit – Jon 
Schipp<http://www.irongeek.com/i.php?page=videos/derbycon3/3305-the-netsniff-ng-toolkit-jon-schipp>
 Why Dumpster Dive when I can pwn right in? – Terry 
Gold<http://www.irongeek.com/i.php?page=videos/derbycon3/3306-why-dumpster-dive-when-i-can-pwn-right-in-terry-gold>

Track 4 (The 3-Way)
 Pigs Don’t Fly – Why owning a typical network is so easy – and how to
build a secure one. – Matt “scriptjunkie” 
Weeks<http://www.irongeek.com/i.php?page=videos/derbycon3/4101-pigs-don-t-fly-why-owning-a-typical-network-is-so-easy-and-how-to-build-a-secure-one-matt-scriptjunkie-weeks>
 Finding The Signal in the Noise: Quantifying Advanced Malware – Dave
Marcus<http://www.irongeek.com/i.php?page=videos/derbycon3/4102-finding-the-signal-in-the-noise-quantifying-advanced-malware-dave-marcus>
 Applying the 32 Zombieland Rules to IT Security – Larry 
Pesce<http://www.irongeek.com/i.php?page=videos/derbycon3/4103-applying-the-32-zombieland-rules-to-it-security-larry-pesce>
 Windows 0wn3d By Default – Mark 
Baggett<http://www.irongeek.com/i.php?page=videos/derbycon3/4206-windows-0wn3d-by-default-mark-baggett>
 Android 4.0: Ice Cream “Sudo Make Me a” Sandwich – Max 
Sobell<http://www.irongeek.com/i.php?page=videos/derbycon3/4105-android-40-ice-cream-sudo-make-me-a-sandwich-max-sobell>
 Attacking the Next Generation Air Traffic Control System; Hackers –
liquor and commercial airliners. – 
Renderman<http://www.irongeek.com/i.php?page=videos/derbycon3/4107-attacking-the-next-generation-air-traffic-control-system-hackers-liquor-and-commercial-airliners-renderman>
 Antivirus Evasion through Antigenic Variation (Why the Blacklisting
Approach to AV is Broken) – Trenton 
Iveys<http://www.irongeek.com/i.php?page=videos/derbycon3/4108-antivirus-evasion-through-antigenic-variation-why-the-blacklisting-approach-to-av-is-broken-trenton-iveyneal-bridges>
 Hello ASM World: A Painless and Contextual Introduction to x86 Assembly –
nicolle neulist 
(rogueclown)<http://www.irongeek.com/i.php?page=videos/derbycon3/4201-hello-asm-world-a-painless-and-contextual-introduction-to-x86-assembly-nicolle-neulist-rogueclown>
 SQL injection with sqlmap – Conrad Reynolds 
CISA<http://www.irongeek.com/i.php?page=videos/derbycon3/4202-sql-injection-with-sqlmap-conrad-reynolds-cisa>
 The Internet of Things: Vulns – Botnets and Detection – Kyle Stone
(@essobi) – Liam 
Randall<http://www.irongeek.com/i.php?page=videos/derbycon3/4203-the-internet-of-things-vulns-botnets-and-detection-kyle-stone-liam-randall>
 The Malware Management Framework – a process you can use to find advanced
malware. We found WinNTI with it! – Michael Gough and Ian 
Robertson<http://www.irongeek.com/i.php?page=videos/derbycon3/4204-the-malware-management-framework-a-process-you-can-use-to-find-advanced-malware-we-found-winnti-with-it-michael-gough-ian-robertson>
 Hack the Hustle! – Eve Adams<http://www.irongeek.com/i.php?page=videos/derbycon3/4205-hack-the-hustle-eve-adams>
 Operationalizing Security Intelligence in the Enterprise- Rafal 
Los<http://www.irongeek.com/i.php?page=videos/derbycon3/4104-operationalizing-security-intelligence-in-the-enterprise-rafal-los>
 New Shiny in the Metasploit Framework – 
egypt<http://www.irongeek.com/i.php?page=videos/derbycon3/4207-new-shiny-in-the-metasploit-framework-egypt>
 Everything you ever wanted to know on how to start a Credit Union – but
were afraid to ask. – Jordan 
Modell<http://www.irongeek.com/i.php?page=videos/derbycon3/4208-everything-you-ever-wanted-to-know-on-how-to-start-a-credit-union-but-were-afraid-to-ask-jordan-modell>
 A developer’s guide to pentesting – Bill 
Sempf<http://www.irongeek.com/i.php?page=videos/derbycon3/4209-a-developer-s-guide-to-pentesting-bill-sempf>
 Steal All of the Databases. – Alejandro 
Caceres<http://www.irongeek.com/i.php?page=videos/derbycon3/4301-steal-all-of-the-databases-alejandro-caceres>
 Sandboxes from a pen tester’s view – Rahul 
Kashyap<http://www.irongeek.com/i.php?page=videos/derbycon3/4303-sandboxes-from-a-pen-tester-s-view-rahul-kashyap>
 iOS Reverse #=> iPWn Apps – Mano ‘dash4rk’ 
Paul<http://www.irongeek.com/i.php?page=videos/derbycon3/4304-ios-reverse-ipwn-apps-mano-dash4rk-paul>
 Terminal Cornucopia – Evan “treefort” 
Booth<http://www.irongeek.com/i.php?page=videos/derbycon3/4305-terminal-cornucopia-evan-treefort-booth>
 Wait; How is All This Stuff Free?!? – Gene 
Bransfield<http://www.irongeek.com/i.php?page=videos/derbycon3/4306-wait-how-is-all-this-stuff-free-gene-bransfield>

Track 5 – Hybrid Room
 Building An Information Security Awareness Program from Scratch – Bill
Gardner – Valerie 
Thomas<http://www.irongeek.com/i.php?page=videos/derbycon3/5101-building-an-information-security-awareness-program-from-scratch-bill-gardner-valerie-thomas>
 Malware : testing malware scenarios on your network – Tony Huffman
(@myne_us) – Juan Cortes 
(@kongo_86)<http://www.irongeek.com/i.php?page=videos/derbycon3/5102-malware-testing-malware-scenarios-on-your-network-tony-huffman-myne-us-juan-cortes-kongo-86>
 Password Intelligence Project – Advanced Password Recovery and Modern
Mitigation Strategies – John Moore “Rabid 
Security”<http://www.irongeek.com/i.php?page=videos/derbycon3/5103-password-intelligence-project-advanced-password-recovery-and-modern-mitigation-strategies-john-moore-rabid-security>
 Tizen Security: Hacking the new mobile OS – Mark Manning 
(AntiTree)<http://www.irongeek.com/i.php?page=videos/derbycon3/5104-tizen-security-hacking-the-new-mobile-os-mark-manning-antitree>
 RAWR – Rapid Assessment of Web Resources – Adam Byers – Tom 
Moore<http://www.irongeek.com/i.php?page=videos/derbycon3/5105-rawr-rapid-assessment-of-web-resources-adam-byers-tom-moore>
 Decoding Bug Bounty Programs – Jon 
Rose<http://www.irongeek.com/i.php?page=videos/derbycon3/5106-decoding-bug-bounty-programs-jon-rose>
 Patching Windows Executables with the Backdoor Factory – Joshua 
Pitts<http://www.irongeek.com/i.php?page=videos/derbycon3/5107-patching-windows-executables-with-the-backdoor-factory-joshua-pitts>
 Jason Scott – Defcon Documentary 
Q&A<http://www.irongeek.com/i.php?page=videos/derbycon3/5108-jason-scott-defcon-documentary>
 Panel: Building and Growing a Hacker Space – Joey Maresca – Dave Marcus –
Nick Farr – 
SkyDog<http://www.irongeek.com/i.php?page=videos/derbycon3/5201-panel-building-and-growing-a-hacker-space-joey-maresca-dave-marcus-nick-farr-skydog-1-if-selected-will-extend-invite-to-lvl1-team>
 SO Hopelessly Broken: the implications of pervasive vulnerabilities in
SOHO router products. – Jacob 
Holcomb<http://www.irongeek.com/i.php?page=videos/derbycon3/5202-so-hopelessly-broken-the-implications-of-pervasive-vulnerabilities-in-soho-router-products-jacob-holcomb>
 Put Me In Coach: How We Got Started In Infosec – pr1me – Chris “g11tch”
Hodges – Frank Hackett – Dave “ReL1K” 
Kennedy<http://www.irongeek.com/i.php?page=videos/derbycon3/5203-put-me-in-coach-how-we-got-started-in-infosec-pr1me-chris-g11tch-hodges-frank-hackett-dave-rel1k-kennedy>
 Alice Goes Deeper (Down the Rabbit Hole) – Redirection 2.0 – Nathan
Magniez<http://www.irongeek.com/i.php?page=videos/derbycon3/5204-alice-goes-deeper-down-the-rabbit-hole-redirection-20-nathan-magniez>
 Emergent Vulnerabilities: What ant colonies – schools of fish – and
security have in common. – Nathaniel “Dr. Whom” 
Husted<http://www.irongeek.com/i.php?page=videos/derbycon3/5205-emergent-vulnerabilities-what-ant-colonies-schools-of-fish-and-security-have-in-common-nathaniel-dr-whom-husted>
 Why Your IT Bytes – Frank J. 
Hackett<http://www.irongeek.com/i.php?page=videos/derbycon3/5206-why-your-it-bytes-frank-j-hackett>
 Using Facial Recognition Software In Digital Forensics And Information
Security – Brian 
Lockrey<http://www.irongeek.com/i.php?page=videos/derbycon3/5207-using-facial-recognition-software-in-digital-forensics-and-information-security-brian-lockrey>
 How to Fight a War Without Actually Starting One – Brendan 
O’Connor<http://www.irongeek.com/i.php?page=videos/derbycon3/5208-how-to-fight-a-war-without-actually-starting-one-brendan-o-connor>
 Crypto-Exploit Exercises: A tool for reinforcing basic topics in
Cryptography – Nancy 
Snoke<http://www.irongeek.com/i.php?page=videos/derbycon3/5209-crypto-exploit-exercises-a-tool-for-reinforcing-basic-topics-in-cryptography-nancy-snoke>
Stable Talks
 Gen Y:Getting Them to Talk Rather than Text at Work – Nancy 
Kovanic<http://www.irongeek.com/i.php?page=videos/derbycon3/s101-gen-ygetting-them-to-talk-rather-than-text-at-work-nancy-kovanic>
 Battle Scars And Friendly Fire: Threat Research Team War Stories – Will
Gragido and Seth 
Geftic<http://www.irongeek.com/i.php?page=videos/derbycon3/s102-battle-scars-and-friendly-fire-threat-research-team-war-stories-will-gragido-and-seth-geftic>
 Unmasking Miscreants – Allixon Nixon – Brandon 
Levene<http://www.irongeek.com/i.php?page=videos/derbycon3/s103-unmasking-miscreants-allixon-nixon-brandon-levene>
 gitDigger: Creating useful wordlists from public GitHub repositories –
Jaime Filson 
(WiK)<http://www.irongeek.com/i.php?page=videos/derbycon3/s104-gitdigger-creating-useful-wordlists-from-public-github-repositories-jaime-filson-wik>
 PowerShell and Windows Throw the Best Shell Parties – Piotr 
Marszalik<http://www.irongeek.com/i.php?page=videos/derbycon3/s105-powershell-and-windows-throw-the-best-shell-parties-piotr-marszalik>
 Owning Computers Without Shell Access – Royce 
Davis<http://www.irongeek.com/i.php?page=videos/derbycon3/s106-owning-computers-without-shell-access-royce-davis>
 Sixnet Tools: for poking at Sixnet Things – Mehdi 
Sabraoui<http://www.irongeek.com/i.php?page=videos/derbycon3/s107-sixnet-tools-for-poking-at-sixnet-things-mehdi-sabraoui>
 Hardening Windows 8 apps for the Windows Store – Bill 
Sempf<http://www.irongeek.com/i.php?page=videos/derbycon3/s110-hardening-windows-8-apps-for-the-windows-store-bill-sempf>
 Intro to Dynamic Access Control in Windows Server 2012 – Evan 
Anderson<http://www.irongeek.com/i.php?page=videos/derbycon3/s111-intro-to-dynamic-access-control-in-windows-server-2012-evan-anderson>
 Evolutionary Security – Embracing Failure to Attain “Good Enough” – Josh
More<http://www.irongeek.com/i.php?page=videos/derbycon3/s112-evolutionary-security-embracing-failure-to-attain-good-enough-josh-more>
 DIY Forensics: When Incident Response Morphs into Digital Forensics –
John 
Sammons<http://www.irongeek.com/i.php?page=videos/derbycon3/s206-diy-forensics-when-incident-response-morphs-into-digital-forensics-john-sammons>
 ANOTHER Log to Analyze – Utilizing DNS to Discover Malware in Your
Network – Nathan 
Magniez<http://www.irongeek.com/i.php?page=videos/derbycon3/s114-another-log-to-analyze-utilizing-dns-to-discover-malware-in-your-network-nathan-magniez>
 Phishing Frenzy: 7 seconds from hook to sinker – Brandon <zeknox> 
McCann<http://www.irongeek.com/i.php?page=videos/derbycon3/s201-phishing-frenzy-7-seconds-from-hook-to-sinker-brandon-zeknox-mccann>
 Electronic Safe Fail: Common Vulnerabilities in Electronic Safes – Jeff
Popio<http://www.irongeek.com/i.php?page=videos/derbycon3/s202-electronic-safe-fail-common-vulnerabilities-in-electronic-safes-jeff-popio>
 The Good Samaritan Identity Protection Project  www.thegsipp.org – Zack
Hibbard – Chris Brown and Jon 
Sternstein<http://www.irongeek.com/i.php?page=videos/derbycon3/s203-the-good-samaritan-identity-protection-project-wwwthegsipporg-zack-hibbard-chris-brownjon-sternstein>
 Some defensive ideas from offensive guys. – Justin Elze and Robert 
Chuvala<http://www.irongeek.com/i.php?page=videos/derbycon3/s204-some-defensive-ideas-from-offensive-guys-justin-elze-robert-chuvala>
 Grim Trigger – Jeff “ghostnomad” 
Kirsch<http://www.irongeek.com/i.php?page=videos/derbycon3/s207-grim-trigger-jeff-ghostnomad-kirsch>
 A n00bie’s perspective on Pentesting… – Brandon 
Edmunds<http://www.irongeek.com/i.php?page=videos/derbycon3/s301-a-n00bie-s-perspective-on-pentesting-brandon-edmunds>
 My Security is a Graph – Your Argument is Invalid – Gabriel 
Bassett<http://www.irongeek.com/i.php?page=videos/derbycon3/s210-my-security-is-a-graph-your-arguement-is-invalid-gabriel-bassett>
 Follow the Foolish Zebras: Finding Threats in Your Logs – Chris 
Larsen<http://www.irongeek.com/i.php?page=videos/derbycon3/s211-follow-the-foolish-zebras-finding-threats-in-your-logs-chris-larsen>
 Security Training and Research Cloud (STRC) – Jimmy 
Murphy<http://www.irongeek.com/i.php?page=videos/derbycon3/s212-security-training-and-research-cloud-strc-jimmy-murphy>
 Passive Aggressive Defense – Jason 
Clark<http://www.irongeek.com/i.php?page=videos/derbycon3/s213-passive-aggressive-defense-jason-clark>
 So you want to be a pentester? – Raymond 
Gabler<http://www.irongeek.com/i.php?page=videos/derbycon3/s214-so-you-want-to-be-a-pentester-raymond-gabler>
 Digital Energy – BPT – Paul 
Coggin<http://www.irongeek.com/i.php?page=videos/derbycon3/s215-digital-energy-bpt-paul-coggin>
 An Anti-Forensics Primer – Jason 
Andress<http://www.irongeek.com/i.php?page=videos/derbycon3/s216-an-anti-forensics-primer-jason-andress>
 What if Petraeus was a hacker? Email privacy for the rest of us – Phil
Cryer 
(@faker)<http://www.irongeek.com/i.php?page=videos/derbycon3/s217-what-if-petraeus-was-a-hacker-email-privacy-for-the-rest-of-us-phil-cryer-faker>


On Fri, Oct 4, 2013 at 11:07 AM, Julian Makas <
jmakas () mimictechnologies com <javascript:_e({}, 'cvml',
'jmakas () mimictechnologies com');>> wrote:



-- 

Regards,
Omid.
Mobile 0415 449 070
Sent from a mobile device
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Current thread: