This is great, Adrian!! Awesome stuff, I'll be up all night now.....

On Friday, October 4, 2013, Adrian Crenshaw wrote:

> I've got them uploading to Archive.org right now. At 18GB, it will be
> awhile.
>
> Adrian
>
>
> On Fri, Oct 4, 2013 at 3:12 PM, Robin Wood <[email protected]> wrote:
>
> Till they get uploaded I find http://keepvid.com/ a very good way to
> grab them directly from Youtube.
>
> Robin
>
> On 4 October 2013 16:02, Adrian Crenshaw <[email protected]> wrote:
> > Yes, I plan to upload them to Archive.org when I've got them all done.
> >
> > Thanks,
> > Adrian
> >
> >
> > On Thu, Oct 3, 2013 at 5:58 AM, James Wooley <[email protected]>
> wrote:
> >>
> >> Hey Adrian,
> >>
> >> Thanks for posting these! The speed you get them out is insane. Are
> there
> >> any plans to have them go onto the Archive.org site in the future? There
> >> much easier to download from there and put on my tablet.
> >>
> >>
> >> On 30 September 2013 23:28, Adrian Crenshaw <[email protected]>
> wrote:
> >>>
> >>>
> >>> I think I have all of tracks 1 and 2 posted:, more to come
> >>>
> >>> Scanning Darkly - HD Moore (keynote)
> >>> Kinetic Pwnage: Obliterating the Line Between Computers and the
> Physical
> >>> World - Ed Skoudis (keynote)
> >>> Look Ma - No Exploits! - The Recon-ng Framework - Tim “LaNMaSteR53?
> Tomes
> >>> Practical Exploitation Using A Malicious Service Set Identifier (SSID)
> -
> >>> Deral Heiland
> >>> JTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand
> >>> Seeing red in your future? - Ian Iamit
> >>> TMI: How to attack SharePoint servers and tools to make it easier -
> Kevin
> >>> Johnson and James Jardine
> >>> The High Risk of Low Risk Applications - conrad reynolds
> >>> It’s Okay to Touch Yourself - Ben Ten (Ben0xA)
> >>> Collaborative Penetration Testing With Lair - Tom Steele and Dan
> Kottmann
> >>> Malware Automation - Christopher Elisan
> >>> What’s common in Oracle and Samsung? They tried to think differently
> >>> about crypto. - L·szlÛ TÛth - Ferenc Spala
> >>> Burning the Enterprise with BYOD - Georgia Weidman
> >>> Getting the goods with smbexec - Eric Milam(brav0hax) and Martin Bos
> >>> (purehate)
> >>> Shattering the Glass: Crafting Post Exploitation Tools with PowerShell
> -
> >>> Matt Johnson
> >>> Cheat Codez: Level UP Your SE Game - Eric Smith
> >>> My Experiments with truth: a different route to bug-hunting - Devesh
> >>> Bhatt
> >>> The Art and Science of Hacking Any Organization - Tyler Wrightson
> >>> Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation
> -
> >>> Christopher Campbell & Matthew Graeber
> >>> Cracking Corporate Passwords - Exploiting Password Policy Weaknesses -
> >>> Minga / Rick Redman
> >>> Ownage From Userland: Process Puppeteering - Nick Cano
> >>> ) UNION SELECT `This_Talk` AS (‘New Exploitation and Obfuscation
> >>> Techniquesí)%00 - Roberto Salgado
> >>> Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent
> Threat
> >>> to Pwn the Network - SOLOMON SONYA and NICK KULESZA
> >>> Phishing Like The Pros - Luis “Connection” Santana
> >>> Raspberry Pi - Media Centers - and AppleTV - David Schuetz
> >>> Cognitive Injection: Reprogramming the Situation-Oriented Human OS -
> Andy
> >>> Ellis
> >>> IOCAware - Actively Collect Compromise Indicators and Test Your Entire
> >>> Enterprise - Matt Jezorek and Dennis Kuntz
> >>> Cash is King: Who’s Wearing Your Crown? - Tom Eston and Spencer
> McIntyre
> >>> Security Sucks - and You’re Wearing a Nursing Bra - Paul Asadoorian
> >>> Windows Attacks: AT is the new black - Rob Fuller and Chris Gates
> >>> How Good is Your Phish - @sonofshirt
> >>> Identifying Evil: An introduction to Reverse Engineering Malware and
> >>> other software - Bart ‘d4ncind4n’ Hopper
> >>> How Im going to own your organization in just a few days. - RazorEQX
> >>> Pass-The-Hash 2: The Admin’s Revenge - Skip Duckwall and Chris Campbell
> >>> The Cavalry Is
>
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to