Till they get uploaded I find http://keepvid.com/ a very good way to
grab them directly from Youtube.

Robin

On 4 October 2013 16:02, Adrian Crenshaw <[email protected]> wrote:
> Yes, I plan to upload them to Archive.org when I've got them all done.
>
> Thanks,
> Adrian
>
>
> On Thu, Oct 3, 2013 at 5:58 AM, James Wooley <[email protected]> wrote:
>>
>> Hey Adrian,
>>
>> Thanks for posting these! The speed you get them out is insane. Are there
>> any plans to have them go onto the Archive.org site in the future? There
>> much easier to download from there and put on my tablet.
>>
>>
>> On 30 September 2013 23:28, Adrian Crenshaw <[email protected]> wrote:
>>>
>>>
>>> I think I have all of tracks 1 and 2 posted:, more to come
>>>
>>> Scanning Darkly - HD Moore (keynote)
>>> Kinetic Pwnage: Obliterating the Line Between Computers and the Physical
>>> World - Ed Skoudis (keynote)
>>> Look Ma - No Exploits! - The Recon-ng Framework - Tim “LaNMaSteR53? Tomes
>>> Practical Exploitation Using A Malicious Service Set Identifier (SSID) -
>>> Deral Heiland
>>> JTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand
>>> Seeing red in your future? - Ian Iamit
>>> TMI: How to attack SharePoint servers and tools to make it easier - Kevin
>>> Johnson and James Jardine
>>> The High Risk of Low Risk Applications - conrad reynolds
>>> It’s Okay to Touch Yourself - Ben Ten (Ben0xA)
>>> Collaborative Penetration Testing With Lair - Tom Steele and Dan Kottmann
>>> Malware Automation - Christopher Elisan
>>> What’s common in Oracle and Samsung? They tried to think differently
>>> about crypto. - L·szlÛ TÛth - Ferenc Spala
>>> Burning the Enterprise with BYOD - Georgia Weidman
>>> Getting the goods with smbexec - Eric Milam(brav0hax) and Martin Bos
>>> (purehate)
>>> Shattering the Glass: Crafting Post Exploitation Tools with PowerShell -
>>> Matt Johnson
>>> Cheat Codez: Level UP Your SE Game - Eric Smith
>>> My Experiments with truth: a different route to bug-hunting - Devesh
>>> Bhatt
>>> The Art and Science of Hacking Any Organization - Tyler Wrightson
>>> Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation -
>>> Christopher Campbell & Matthew Graeber
>>> Cracking Corporate Passwords - Exploiting Password Policy Weaknesses -
>>> Minga / Rick Redman
>>> Ownage From Userland: Process Puppeteering - Nick Cano
>>> ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation
>>> Techniquesí)%00 - Roberto Salgado
>>> Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat
>>> to Pwn the Network - SOLOMON SONYA and NICK KULESZA
>>> Phishing Like The Pros - Luis “Connection” Santana
>>> Raspberry Pi - Media Centers - and AppleTV - David Schuetz
>>> Cognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy
>>> Ellis
>>> IOCAware - Actively Collect Compromise Indicators and Test Your Entire
>>> Enterprise - Matt Jezorek and Dennis Kuntz
>>> Cash is King: Who’s Wearing Your Crown? - Tom Eston and Spencer McIntyre
>>> Security Sucks - and You’re Wearing a Nursing Bra - Paul Asadoorian
>>> Windows Attacks: AT is the new black - Rob Fuller and Chris Gates
>>> How Good is Your Phish - @sonofshirt
>>> Identifying Evil: An introduction to Reverse Engineering Malware and
>>> other software - Bart ‘d4ncind4n’ Hopper
>>> How Im going to own your organization in just a few days. - RazorEQX
>>> Pass-The-Hash 2: The Admin’s Revenge - Skip Duckwall and Chris Campbell
>>> The Cavalry Is Us: Protecting the public good and our profession - Josh
>>> Corman
>>> Love letters to Frank Abagnale (How do I pwn thee let me count the ways)
>>> - Jayson E. Street
>>> The Message and The Messenger - James Arlen
>>> 50 Shades of RED: Stories from the "Playroom" - Chris Nickerson
>>> Beyond Information Warfare “You Ain’t Seen Nothing Yet” - Winn Schwartau
>>> Stop Fighting Anti-Virus - Integgroll
>>> How the Grid Will Be Hacked - Josh Axelrod and Matt Davis
>>> help for the helpdesk - Mick Douglas
>>> Weaponizing your Coffee Pot - Daniel Buentello
>>> Practical OSINT - Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY TALK
>>> - 18+ or older)
>>> Stop making excuses; it’s time to own your HIV (High Impact
>>> Vulnerabilities) - Jack D. Nichelson
>>> Uncloaking IP Addresses on IRC - Derek Callaway
>>>
>>>
>>>
>>> --
>>> "The ability to quote is a serviceable substitute for wit." ~ W. Somerset
>>> Maugham
>>> "The ability to Google can be a serviceable substitute for technical
>>> knowledge." ~ Adrian D. Crenshaw
>>>
>>> _______________________________________________
>>> Pauldotcom mailing list
>>> [email protected]
>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>> Main Web Site: http://pauldotcom.com
>>
>>
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
>
>
>
> --
> "The ability to quote is a serviceable substitute for wit." ~ W. Somerset
> Maugham
> "The ability to Google can be a serviceable substitute for technical
> knowledge." ~ Adrian D. Crenshaw
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to