Till they get uploaded I find http://keepvid.com/ a very good way to grab them directly from Youtube.
Robin On 4 October 2013 16:02, Adrian Crenshaw <[email protected]> wrote: > Yes, I plan to upload them to Archive.org when I've got them all done. > > Thanks, > Adrian > > > On Thu, Oct 3, 2013 at 5:58 AM, James Wooley <[email protected]> wrote: >> >> Hey Adrian, >> >> Thanks for posting these! The speed you get them out is insane. Are there >> any plans to have them go onto the Archive.org site in the future? There >> much easier to download from there and put on my tablet. >> >> >> On 30 September 2013 23:28, Adrian Crenshaw <[email protected]> wrote: >>> >>> >>> I think I have all of tracks 1 and 2 posted:, more to come >>> >>> Scanning Darkly - HD Moore (keynote) >>> Kinetic Pwnage: Obliterating the Line Between Computers and the Physical >>> World - Ed Skoudis (keynote) >>> Look Ma - No Exploits! - The Recon-ng Framework - Tim “LaNMaSteR53? Tomes >>> Practical Exploitation Using A Malicious Service Set Identifier (SSID) - >>> Deral Heiland >>> JTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand >>> Seeing red in your future? - Ian Iamit >>> TMI: How to attack SharePoint servers and tools to make it easier - Kevin >>> Johnson and James Jardine >>> The High Risk of Low Risk Applications - conrad reynolds >>> It’s Okay to Touch Yourself - Ben Ten (Ben0xA) >>> Collaborative Penetration Testing With Lair - Tom Steele and Dan Kottmann >>> Malware Automation - Christopher Elisan >>> What’s common in Oracle and Samsung? They tried to think differently >>> about crypto. - L·szlÛ TÛth - Ferenc Spala >>> Burning the Enterprise with BYOD - Georgia Weidman >>> Getting the goods with smbexec - Eric Milam(brav0hax) and Martin Bos >>> (purehate) >>> Shattering the Glass: Crafting Post Exploitation Tools with PowerShell - >>> Matt Johnson >>> Cheat Codez: Level UP Your SE Game - Eric Smith >>> My Experiments with truth: a different route to bug-hunting - Devesh >>> Bhatt >>> The Art and Science of Hacking Any Organization - Tyler Wrightson >>> Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation - >>> Christopher Campbell & Matthew Graeber >>> Cracking Corporate Passwords - Exploiting Password Policy Weaknesses - >>> Minga / Rick Redman >>> Ownage From Userland: Process Puppeteering - Nick Cano >>> ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation >>> Techniquesí)%00 - Roberto Salgado >>> Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat >>> to Pwn the Network - SOLOMON SONYA and NICK KULESZA >>> Phishing Like The Pros - Luis “Connection” Santana >>> Raspberry Pi - Media Centers - and AppleTV - David Schuetz >>> Cognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy >>> Ellis >>> IOCAware - Actively Collect Compromise Indicators and Test Your Entire >>> Enterprise - Matt Jezorek and Dennis Kuntz >>> Cash is King: Who’s Wearing Your Crown? - Tom Eston and Spencer McIntyre >>> Security Sucks - and You’re Wearing a Nursing Bra - Paul Asadoorian >>> Windows Attacks: AT is the new black - Rob Fuller and Chris Gates >>> How Good is Your Phish - @sonofshirt >>> Identifying Evil: An introduction to Reverse Engineering Malware and >>> other software - Bart ‘d4ncind4n’ Hopper >>> How Im going to own your organization in just a few days. - RazorEQX >>> Pass-The-Hash 2: The Admin’s Revenge - Skip Duckwall and Chris Campbell >>> The Cavalry Is Us: Protecting the public good and our profession - Josh >>> Corman >>> Love letters to Frank Abagnale (How do I pwn thee let me count the ways) >>> - Jayson E. Street >>> The Message and The Messenger - James Arlen >>> 50 Shades of RED: Stories from the "Playroom" - Chris Nickerson >>> Beyond Information Warfare “You Ain’t Seen Nothing Yet” - Winn Schwartau >>> Stop Fighting Anti-Virus - Integgroll >>> How the Grid Will Be Hacked - Josh Axelrod and Matt Davis >>> help for the helpdesk - Mick Douglas >>> Weaponizing your Coffee Pot - Daniel Buentello >>> Practical OSINT - Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY TALK >>> - 18+ or older) >>> Stop making excuses; it’s time to own your HIV (High Impact >>> Vulnerabilities) - Jack D. Nichelson >>> Uncloaking IP Addresses on IRC - Derek Callaway >>> >>> >>> >>> -- >>> "The ability to quote is a serviceable substitute for wit." ~ W. Somerset >>> Maugham >>> "The ability to Google can be a serviceable substitute for technical >>> knowledge." ~ Adrian D. Crenshaw >>> >>> _______________________________________________ >>> Pauldotcom mailing list >>> [email protected] >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >>> Main Web Site: http://pauldotcom.com >> >> >> >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > > > > > -- > "The ability to quote is a serviceable substitute for wit." ~ W. Somerset > Maugham > "The ability to Google can be a serviceable substitute for technical > knowledge." ~ Adrian D. Crenshaw > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
