2015

Archives

(Keynote Speaker) Security Circus - Kevin Johnson

(Keynote Speaker) Security Circus - Kevin Johnson

 

Software Vulnerability Discovery and Exploitation during Red Team Assessments - Ryan Wincey

Software Vulnerability Discovery and Exploitation during Red Team Assessments - Ryan Wincey

 

You spent $20,000 so that my throw away email can have full recon on your internal network? - Chris O'Rourke

You spent $20,000 so that my throw away email can have full recon on your internal network? - Chris O'Rourke

 

Get-Help: An intro to Powershell and how to use it for evil - Jared Height

Get-Help: An intro to Powershell and how to use it for evil - Jared Height

 

How to pen test off the grid.. and in the middle of the Pacific - Dave Keene

How to pen test off the grid.. and in the middle of the Pacific - Dave Keene

 

(Keynote Speaker) InfoSec(Cyber Security) We're Doing It Wrong - Bill Gardner

(Keynote Speaker) InfoSec(Cyber Security) We're Doing It Wrong - Bill Gardner

 

Internet of Things Hacking - Jason Davison

Internet of Things Hacking - Jason Davison

 

The State of Information Security Today - Jeff Man

The State of Information Security Today - Jeff Man

 

Hacking Web Apps - Brent White and Tim Roberts

Hacking Web Apps - Brent White and Tim Roberts

 

Building BURP Extentions - Jason Gillam

Building BURP Extentions - Jason Gillam

 

Going Nuclear: Exploiting Mass Emergency Notification Systems - Evan Davison

Going Nuclear: Exploiting Mass Emergency Notification Systems - Evan Davison

 

FAIL-in-Depth - Marcus J. Carey

FAIL-in-Depth - Marcus J. Carey

 

diff -q 3rdpartyassessments internalteams | grep qualified assessments - Kelly O'Donnell

diff -q 3rdpartyassessments internalteams | grep qualified assessments - Kelly O'Donnell

 

Router Fail - John Garrett

Router Fail - John Garrett