DerbyCon 2011
54 videos • 998 views • by Christiaan008
For a description of the videos visit: http://bit.ly/derbycon_talks
1
Adrian Crenshaw -- Building a Svartkast: Cheap hardware to leave behind on someone else's network
Adrian Crenshaw
Download
2
Adrian, Dave, Martin: Welcome to DerbyCon 2011 -- Intro to the con and events
Adrian Crenshaw
Download
3
atlas -- sploit me if you can
Adrian Crenshaw
Download
4
Bart Hopper -- Avoiding the Landmines in your own Backyard
Adrian Crenshaw
Download
5
Ben Feinstein & Jeff Jarmoc -- Get Off of My Cloud: Cloud Credential Compromise and Exposure
Adrian Crenshaw
Download
6
Bill Sempf -- Is locksport a sport?
Adrian Crenshaw
Download
7
Boris Sverdlik -- Your perimeter sucks
Adrian Crenshaw
Download
8
Brent Huston -- Realize Your Hacker Heritage: Do The Needful
Adrian Crenshaw
Download
9
Brian Baskin -- Walking the Green Mile: How to Get Fired After a Security Incident
Adrian Crenshaw
Download
10
Bruce Potter -- The Details Don't Matter
Adrian Crenshaw
Download
11
Carlos Perez (darkoperator) -- Tactical Post Exploitation
Adrian Crenshaw
Download
12
Charlie Miller -- Battery Firmware Hacking
Adrian Crenshaw
Download
13
Chris Gates and Rob Fuller -- The Dirty Little Secrets They Didn't Teach You In Pentesting Class
Adrian Crenshaw
Download
14
Chris Nickerson -- Compliance: An Assault on Reason
Adrian Crenshaw
Download
15
Chris Roberts -- A Tribute to Dr. Strangelove
Adrian Crenshaw
Download
16
Dennis Kuntz -- Mining Sensitive Information From Images Using Command-Line OCR
Adrian Crenshaw
Download
17
Derbycon Closing Ceremony
Adrian Crenshaw
Download
18
Deviant Ollam -- Distinguishing Lockpicks: Raking vs Lifting vs Jiggling and More
Adrian Crenshaw
Download
19
Evan Booth -- Hide yo kids, hide yo wife: Residential security and monitoring the bottom line
Adrian Crenshaw
Download
20
Georgia Weidman -- Throw It in the River? Towards Real Live Actual Smartphone Security
Adrian Crenshaw
Download
21
HD MOORE -- Acoustic Intrusions
Adrian Crenshaw
Download
22
Infojanitor -- Virtual trust, Virtual Permission and the Illusion of Security
Adrian Crenshaw
Download
23
int0x80 (of Dual Core) -- Anti-Forensics for the Louise
Adrian Crenshaw
Download
24
Jack Daniel -- Surviving a Teleporter Accident (It could happen to you)
Adrian Crenshaw
Download
25
Jason Scott -- Jason Scott's Shareware Calvacade
Adrian Crenshaw
Download
26
Jayson E. Street -- Steal Everything, Kill Everyone, Cause Total Financial Ruin!
Adrian Crenshaw
Download
27
Jimmy Shah -- Mobile App Moolah: Profit taking with Mobile Malware
Adrian Crenshaw
Download
28
Joe Schorr -- "Rule 1: Cardio" (and 9 other rules to keep intruders out)
Adrian Crenshaw
Download
29
Johnny Long -- Hackers for Charity Update
Adrian Crenshaw
Download
30
Josh Kelley (winfang98) -- Infectious Media -- Bypassing AutoRun once and for all
Adrian Crenshaw
Download
31
Joshua Drake (jduck) -- Exploiting Java Memory Corruption Vulnerabilities
Adrian Crenshaw
Download
32
Kevin Johnson & Tom Eston -- Desktop Betrayal: Exploiting Clients through the Features They Demand
Adrian Crenshaw
Download
33
Kevin Mitnick + Dave Kennedy -- Adaptive Penetration Testing
Adrian Crenshaw
Download
34
Kyle Osborne (kos) -- The Hidden XSS -- Attacking the Desktop
Adrian Crenshaw
Download
35
Larry Pesce -- You are the Smart Meter: Making (and hacking) of the 2011 MA-CCDC electronic badges
Adrian Crenshaw
Download
36
matthew becker 73o7@ki survival hacking your way out of armageddon
Adrian Crenshaw
Download
37
McCorkle & Rios -- 100 bugs in 100 days: An analysis of ICS (SCADA) software
Adrian Crenshaw
Download
38
Michael Arpaia -- Beat to 1337: Creating A Successful University Cyber Defense Organization
Adrian Crenshaw
Download
39
Mick Douglas - Blue team is sexy -Part II - All you baseline are belong to us
Adrian Crenshaw
Download
40
Pat McCoy & Chris Silvers -- Hook, Line and Syncer: The Liar for Hire's Ultimate Tacklebox
Adrian Crenshaw
Download
41
Paul Asadoorian + John Strand: Offensive Countermeasures: Still trying to bring sexy back
Adrian Crenshaw
Download
42
Peter Van Eeckhoutte & Elliot Cutright -- Win32 Exploit Development With Mona and Metasploit
Adrian Crenshaw
Download
43
Rafal Los -- You're Going to Need a Bigger Shovel -- A Critical Look at Software Security Assurance
Adrian Crenshaw
Download
44
Raphael Mudge -- Dirty Red Team tricks
Adrian Crenshaw
Download
45
Rick Farina -- Free Floating Hostility
Adrian Crenshaw
Download
46
Rick Hayes + Karthik Rangarajan -- OSINT Beyond the Basics (Sync Fix)
Adrian Crenshaw
Download
47
Rick Redman -- Tomorrow you can patch that 0day -- but your users will still get you p0wn3d
Adrian Crenshaw
Download
48
Rob Simon & Josh Kelly -- Pentesting over Powerlines
Adrian Crenshaw
Download
49
Ryan Linn -- collecting Underpants To Win Your Network
Adrian Crenshaw
Download
50
The Penetration Testing Execution Standard (PTES) Panel
Adrian Crenshaw
Download
51
Thomas Hoffecker -- Exploiting PKI for Fun & Profit or The Next Yellow Padlock Icon?
Adrian Crenshaw
Download
52
thomas-dotreppe-mister-x-openwips-ng.avi
Adrian Crenshaw
Download
53
Tony Huffman (Myne-us) -- When Fuzzers Miss: The no Hanging Fruit.
Adrian Crenshaw
Download
54
Tottenkoph -- Data Mining for (Neuro) hackers
Adrian Crenshaw
Download