Top results
1. 1 stealth servers need stealth packets stealth servers need stealth packets jaime sanchez (@segofensiva) www.seguridadofensiva.com 2. 2 stealth servers need stealth packets…
1. breaking into security 1 2. johnny long 2 3. joe mccray 3 4. brian domschke 4 5. w ho are we ? 5 6. justin “spridel” brown osint ninjaweb app ninja in training hfc…
raspberry pi, cars, and appletv david schuetz (@darthnull) derbycon 3.0 september 28, 2013 requisite background ⢠senior consultant at intrepidus group âwholly owned…
1. passing the torch: old school red teaming, new school tactics? dave mcguire, will schroeder veris group’s adaptive threat division 2. @davidpmcguire ● director of…
1. sandboxes: a pen-tester’s perspective rahul kashyap [email protected] rahul kashyap, [email protected] 2. bromium confidential • previously led mcafee labs vuln research…
powershell command line argument obfuscation techniques invoke-obfuscation: powershell obfusk8tion techniques & how to (try to) d""e`tec`t 'th'+'em' daniel…
1. getting schooled security with no budget in a hostile environment. 2. whois [email protected] @tonikjdk 3. environment 12 buildings in a metro area, fiber back…
copyright © fireeye, inc. all rights reserved.1 no easy breach derbycon 2016 #noeasybreach matt dunwoody @matthewdunwoody nick carr @itsreallynick copyright © fireeye,…
1. cms hacking tricks! owning content management systems ! ! greg foss | oscp, gpen, gwapt, gcih, ceh! senior security research engineer | logrhythm labs 2. just a few content…
automated pentest toolkit automated pentest toolkit adam compton, senior security consultant austin lane, security consultant 1 who am i? adam in 5 words: father 5 years…
tactical diversion-driven defense thomas hegel incident response and security analytics engineer gcfe, cissp, pie etr greg foss secops lead / sr. researcher oscp, gawn, gpen,…
1. making badusb work for you adam caudill (@adamcaudill) brandon wilson (@brandonlwilson) 2. what is badusb? ● not a technical flaw ● not a vulnerability 3. patriot…
1. it's okay to touch yourself! derbycon 2013 ben ten (@ben0xa) 2. about me ● 12+ years experience in health care information systems ● vice president & security…
powerpoint presentation marketers are friends, not food kara drapala 1 agenda about me/intro nlprank case study communications 101 help us help you how to not go crazy while…
stealthier attacks & smarter defending with tls fingerprinting lee brotherston @synackpse #tlsfp … a “zero math, (almost) zero crypto”, tls talk lee brotherston…
making badusb work for you adam caudill (@adamcaudill) brandon wilson (@brandonlwilson) hi, i'm adam caudill - i'm a developer and independent security researcher, i'm here…
1. regular expressions (regex) overview september 24, 2017 matt scheurer @c3rkah slides: https://www.slideshare.net/cerkah ((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9]).(25[0-5]|2[0-4]…
1. practical powershell programming for professional people ben ten (@ben0xa) slides: http://www.slideshare.net/benten0xa derbycon 2014 2. practical powe rshell programming…
1. thomas richards10/2/2012 2. thomas richards security consultant at cigital twitter: @g13net website: www.g13net.com oscp, oswp, security+, gpen hacking…
1. rawr rapid assessment of web resources https://www.bitbucket.org/al14s/rawr 2. introduction adam byers [@al14s] started with basic – antic mag… the…