Channel Avatar

BSidesDFW @UCWrKU8yE6KNOqztYwIGvI3Q@youtube.com

271 subscribers - no pronouns :c

More from this channel (soon)


47:01
Do you know where your secrets are? Exploring the problem of secret sprawl and management maturity
56:06
You're In... Now what? A LotL discussion
30:51
Let Me In!!! An Overview of RFID Badge Systems and Attacks
36:34
White Phoenix: Beating Intermittent Encryption
23:52
What the smish!?
39:13
Minimizing AWS S3 bucket attack vectors at scale
47:01
Effective DFIR Triage Techniques to Detect Modern Rootkits
39:35
Visual Badge Forgery
47:30
Cybersecurity Imposter Syndrome and Burnout
45:16
Broken Access Control How to Protect Your APIs Against the World's Top Vulnerability
40:11
Routers HATE This One Neat Trick Exploiting Cisco Smart Routers HATE This
51:16
Rosetta 2 Keeping Mac Malware Alive for Years to Come
45:34
Purple Teaming Cloud Identity Simulation Labs for Red and Blue teams
47:04
Intro to API Hacking
35:21
Container Crisis 3 More Containers More Problems
29:00
Unraveling the Russian Snake Turla
49:29
HTTP and De-Sync Attacks
36:40
Hashcat and Survivorship Bias: Cracking uncommon passwords
44:52
Credential Compromise: Well what Now?
55:43
Automated Triage Collection at Scale in the AWS Cloud
51:27
First Contact with Container Security
35:15
PowerShell's Return to Power
55:29
Protecting the penguin! Linux security as amour!
33:34
Personal Security Preparedness & Risk Management for All
39:35
Just Because It's Crazy Doesn't Make It Wrong: Bringing Your Hacker POV to the Election
37:21
Hack Your Dog: Dog Training, Communication When There is No Common Language
46:20
Target Acquired
58:34
The Cognitive Stairways of Analysis
48:07
Can Cryptocurrency Replace the US Dollar?
46:28
Information Applications of Lessons Learned from the Weapons from the Stone, Bronze, & Iron Ages
42:45
Confessions of a S***y SysAdmin
33:09
Hey I Hacked Your Skimmer
16:15
What the DLL is happening? A practical approach to identifying SOH.
52:03
I broke in, now what? Linux manual privilege escalation 101.
50:50
Modern Web Application Vulnerabilities (on the perimeter right now)
37:17
Automating Threat Hunting on the Dark Web and other nitty-gritty things
46:41
Who's Driving This Thing? Hacking AI
34:39
A Drop of Jupyter: A Modular Approach to Penetration Testing
50:03
Threat Hunting: Where Evil Hides
40:20
Dissecting and Comparing different Binaries to Malware Analysis
37:30
Chasing a red team from the dressing room into the cloud
40:52
Managing Misfits: Lessons Learned from a decade leading a penetration testing team.
49:25
"Your Phone Hates You"
02:58
BsidesDFW 2013 Memories
03:31
BsidesDFW 2013 Branden Williams & James Adamson
04:18
BsidesDFW 2013 Lily Maxwell & Kyle Maxwell
01:25
BsidesDFW 2013 Brian 'Hermit' Mork
02:00
BsidesDFW 2013 Thomas 'TwoPipe' Bennett
03:07
BsideDFW 2013 Mike Landeck
02:20
Bsides DFW 2013 David Cowan
02:14
BsidesDFW 2013 Brian Wylie
04:01
Bsides DFW 2013 Valerie Thomas
03:48
Bsides DFW 2013 Tony James & Ryan Reynolds
04:38
Bsides DFW 2013 Josh Scott
04:41
Bsides DFW 2013 David Balcar
03:45
Bsides DFW 2013 Chris Nickerson
02:49
Bsides DFW 2013 Scott Roberts