Great stuff Adrian! Thanks once again!


> On Sep 30, 2013, at 6:28 PM, Adrian Crenshaw <[email protected]> wrote:
> 
> 
> I think I have all of tracks 1 and 2 posted:, more to come
> 
> Scanning Darkly - HD Moore (keynote)
> Kinetic Pwnage: Obliterating the Line Between Computers and the Physical 
> World - Ed Skoudis (keynote)
> Look Ma - No Exploits! - The Recon-ng Framework - Tim “LaNMaSteR53? Tomes
> Practical Exploitation Using A Malicious Service Set Identifier (SSID) - 
> Deral Heiland
> JTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand
> Seeing red in your future? - Ian Iamit
> TMI: How to attack SharePoint servers and tools to make it easier - Kevin 
> Johnson and James Jardine
> The High Risk of Low Risk Applications - conrad reynolds
> It’s Okay to Touch Yourself - Ben Ten (Ben0xA)
> Collaborative Penetration Testing With Lair - Tom Steele and Dan Kottmann
> Malware Automation - Christopher Elisan
> What’s common in Oracle and Samsung? They tried to think differently about 
> crypto. - L·szlÛ TÛth - Ferenc Spala
> Burning the Enterprise with BYOD - Georgia Weidman
> Getting the goods with smbexec - Eric Milam(brav0hax) and Martin Bos 
> (purehate)
> Shattering the Glass: Crafting Post Exploitation Tools with PowerShell - Matt 
> Johnson
> Cheat Codez: Level UP Your SE Game - Eric Smith
> My Experiments with truth: a different route to bug-hunting - Devesh Bhatt
> The Art and Science of Hacking Any Organization - Tyler Wrightson
> Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation - 
> Christopher Campbell & Matthew Graeber
> Cracking Corporate Passwords - Exploiting Password Policy Weaknesses - Minga 
> / Rick Redman
> Ownage From Userland: Process Puppeteering - Nick Cano
> ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation 
> Techniquesí)%00 - Roberto Salgado
> Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to 
> Pwn the Network - SOLOMON SONYA and NICK KULESZA
> Phishing Like The Pros - Luis “Connection” Santana
> Raspberry Pi - Media Centers - and AppleTV - David Schuetz
> Cognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy 
> Ellis
> IOCAware - Actively Collect Compromise Indicators and Test Your Entire 
> Enterprise - Matt Jezorek and Dennis Kuntz
> Cash is King: Who’s Wearing Your Crown? - Tom Eston and Spencer McIntyre
> Security Sucks - and You’re Wearing a Nursing Bra - Paul Asadoorian
> Windows Attacks: AT is the new black - Rob Fuller and Chris Gates
> How Good is Your Phish - @sonofshirt
> Identifying Evil: An introduction to Reverse Engineering Malware and other 
> software - Bart ‘d4ncind4n’ Hopper
> How Im going to own your organization in just a few days. - RazorEQX
> Pass-The-Hash 2: The Admin’s Revenge - Skip Duckwall and Chris Campbell
> The Cavalry Is Us: Protecting the public good and our profession - Josh Corman
> Love letters to Frank Abagnale (How do I pwn thee let me count the ways) - 
> Jayson E. Street
> The Message and The Messenger - James Arlen
> 50 Shades of RED: Stories from the "Playroom" - Chris Nickerson
> Beyond Information Warfare “You Ain’t Seen Nothing Yet” - Winn Schwartau
> Stop Fighting Anti-Virus - Integgroll
> How the Grid Will Be Hacked - Josh Axelrod and Matt Davis
> help for the helpdesk - Mick Douglas
> Weaponizing your Coffee Pot - Daniel Buentello
> Practical OSINT - Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY TALK - 
> 18+ or older)
> Stop making excuses; it’s time to own your HIV (High Impact Vulnerabilities) 
> - Jack D. Nichelson
> Uncloaking IP Addresses on IRC - Derek Callaway
> 
> 
> 
> -- 
> "The ability to quote is a serviceable substitute for wit." ~ W. Somerset 
> Maugham
> "The ability to Google can be a serviceable substitute for technical 
> knowledge." ~ Adrian D. Crenshaw
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to