Bandwidth and equipment aren't free, I just donated $20 to Adrian and what he does for the community. All of those who liked the work he puts in so we can view the talks is worth much more than that.
Who's gonna match? -@gchetrick On Oct 4, 2013, at 10:07 AM, Julian Makas <[email protected]> wrote: > Adrian, > > You rock! DerbyCon 3 was a blast! It was great to meet you and shake your > hand to say thanks. > > Being able to watch some of the talks I missed on the flight home from the > con was amazing. How are you able to get everything sorted out so fast. Do > you ever take any down time. > > All the effort and work you put into keeping the community informed is very > much appreciated. > > Thank you! > > Julian > > From: [email protected] > [mailto:[email protected]] On Behalf Of Adrian Crenshaw > Sent: Monday, September 30, 2013 5:29 PM > To: PaulDotCom Security Weekly Mailing List > Subject: [Pauldotcom] Derbycon 3.0 Videos Tracks 1 & 2 > > > I think I have all of tracks 1 and 2 posted:, more to come > > Scanning Darkly - HD Moore (keynote) > Kinetic Pwnage: Obliterating the Line Between Computers and the Physical > World - Ed Skoudis (keynote) > Look Ma - No Exploits! - The Recon-ng Framework - Tim “LaNMaSteR53? Tomes > Practical Exploitation Using A Malicious Service Set Identifier (SSID) - > Deral Heiland > JTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand > Seeing red in your future? - Ian Iamit > TMI: How to attack SharePoint servers and tools to make it easier - Kevin > Johnson and James Jardine > The High Risk of Low Risk Applications - conrad reynolds > It’s Okay to Touch Yourself - Ben Ten (Ben0xA) > Collaborative Penetration Testing With Lair - Tom Steele and Dan Kottmann > Malware Automation - Christopher Elisan > What’s common in Oracle and Samsung? They tried to think differently about > crypto. - L·szlÛ TÛth - Ferenc Spala > Burning the Enterprise with BYOD - Georgia Weidman > Getting the goods with smbexec - Eric Milam(brav0hax) and Martin Bos > (purehate) > Shattering the Glass: Crafting Post Exploitation Tools with PowerShell - Matt > Johnson > Cheat Codez: Level UP Your SE Game - Eric Smith > My Experiments with truth: a different route to bug-hunting - Devesh Bhatt > The Art and Science of Hacking Any Organization - Tyler Wrightson > Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation - > Christopher Campbell & Matthew Graeber > Cracking Corporate Passwords - Exploiting Password Policy Weaknesses - Minga > / Rick Redman > Ownage From Userland: Process Puppeteering - Nick Cano > ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation > Techniquesí)%00 - Roberto Salgado > Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to > Pwn the Network - SOLOMON SONYA and NICK KULESZA > Phishing Like The Pros - Luis “Connection” Santana > Raspberry Pi - Media Centers - and AppleTV - David Schuetz > Cognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy > Ellis > IOCAware - Actively Collect Compromise Indicators and Test Your Entire > Enterprise - Matt Jezorek and Dennis Kuntz > Cash is King: Who’s Wearing Your Crown? - Tom Eston and Spencer McIntyre > Security Sucks - and You’re Wearing a Nursing Bra - Paul Asadoorian > Windows Attacks: AT is the new black - Rob Fuller and Chris Gates > How Good is Your Phish - @sonofshirt > Identifying Evil: An introduction to Reverse Engineering Malware and other > software - Bart ‘d4ncind4n’ Hopper > How Im going to own your organization in just a few days. - RazorEQX > Pass-The-Hash 2: The Admin’s Revenge - Skip Duckwall and Chris Campbell > The Cavalry Is Us: Protecting the public good and our profession - Josh Corman > Love letters to Frank Abagnale (How do I pwn thee let me count the ways) - > Jayson E. Street > The Message and The Messenger - James Arlen > 50 Shades of RED: Stories from the "Playroom" - Chris Nickerson > Beyond Information Warfare “You Ain’t Seen Nothing Yet” - Winn Schwartau > Stop Fighting Anti-Virus - Integgroll > How the Grid Will Be Hacked - Josh Axelrod and Matt Davis > help for the helpdesk - Mick Douglas > Weaponizing your Coffee Pot - Daniel Buentello > Practical OSINT - Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY TALK - > 18+ or older) > Stop making excuses; it’s time to own your HIV (High Impact Vulnerabilities) > - Jack D. Nichelson > Uncloaking IP Addresses on IRC - Derek Callaway > > > > -- > "The ability to quote is a serviceable substitute for wit." ~ W. Somerset > Maugham > "The ability to Google can be a serviceable substitute for technical > knowledge." ~ Adrian D. Crenshaw > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
