Thanks! On Saturday, October 5, 2013, Adrian Crenshaw wrote:
> I think I have the rest up now: > > Track 3 (Teach Me) > It's Only a Game: Learning Security through Gaming – Bruce > Potter<http://www.irongeek.com/i.php?page=videos/derbycon3/3101-its-only-a-game-learning-security-through-gaming-bruce-potter> > Ooops – Now What? :: The Stolen Data Impact Model (SDIM) – Brent > Huston<http://www.irongeek.com/i.php?page=videos/derbycon3/3102-ooops-now-what-the-stolen-data-impact-model-sdim-brent-huston> > Anti-Forensics: Memory or something – I forget. – > int0x80<http://www.irongeek.com/i.php?page=videos/derbycon3/3103-anti-forensics-memory-or-something-i-forget-int0x80> > The Mysterious Mister Hokum – Jason > Scott<http://www.irongeek.com/i.php?page=videos/derbycon3/3104-the-mysterious-mister-hokum-jason-scott> > Appsec Tl;dr – Gillis > Jones<http://www.irongeek.com/i.php?page=videos/derbycon3/3105-appsec-tl-dr-gillis-jones> > DIY Command & Control For Fun And *No* Profit – David > Schwartzberg<http://www.irongeek.com/i.php?page=videos/derbycon3/3106-diy-command-control-for-fun-and-no-profit-david-schwartzberg> > IPv6 is here (kind of) – what can I do with it? – Dan > Wilkins<http://www.irongeek.com/i.php?page=videos/derbycon3/3107-ipv6-is-here-kind-of-what-can-i-do-with-it-dan-wilkins> > Dancing With Dalvik – Thomas > Richards<http://www.irongeek.com/i.php?page=videos/derbycon3/3108-dancing-with-dalvik-thomas-richards> > Big Hugs for Big Data – Davi > Ottenheimer<http://www.irongeek.com/i.php?page=videos/derbycon3/3201-big-hugs-for-big-data-davi-ottenheimer> > Antivirus Evasion: Lessons Learned – > thelightcosine<http://www.irongeek.com/i.php?page=videos/derbycon3/3202-antivirus-evasion-lessons-learned-thelightcosine> > Jared DeMott – Is Auditing C/C++ Different > Nowadays?<http://www.irongeek.com/i.php?page=videos/derbycon3/3203-jared-demott-is-auditing-cc-different-nowadays> > Getting Schooled: Security with no budget in a hostile environment – Jim > Kennedy<http://www.irongeek.com/i.php?page=videos/derbycon3/3204-getting-schooled-security-with-no-budget-in-a-hostile-environment-jim-kennedy> > Browser Pivoting (FU2FA) – Raphael > Mudge<http://www.irongeek.com/i.php?page=videos/derbycon3/3205-browser-pivoting-fu2fa-raphael-mudge> > Taking the BDSM out of PCI-DSS Through Open-Source Solutions – Zack Fasel > & Erin “SecBarbie” > Jacobs<http://www.irongeek.com/i.php?page=videos/derbycon3/3206-taking-the-bdsm-out-of-pci-dss-through-open-source-solutions-zack-fasel-erin-secbarbie-jacobs> > John Strand – Hacking Back – Active Defense and Internet Tough > Guys<http://www.irongeek.com/i.php?page=videos/derbycon3/3207-john-strand-hacking-back-active-defense-and-internet-tough-guys> > An Encyclpwnia of Persistence – Skip Duckwall & Will > Peteroy<http://www.irongeek.com/i.php?page=videos/derbycon3/3208-an-encyclpwnia-of-persistence-skip-duckwall-will-peteroy> > Your Turn! – Johnny Long – > HFC<http://www.irongeek.com/i.php?page=videos/derbycon3/3209-your-turn-johnny-long-hfc> > Practical File Format Fuzzing – Jared > Allar<http://www.irongeek.com/i.php?page=videos/derbycon3/3301-practical-file-format-fuzzing-jared-allar> > Surviving the Dead – Christopher ‘EggDropX’ > Payne<http://www.irongeek.com/i.php?page=videos/derbycon3/3302-surviving-the-dead-christopher-eggdropx-payne> > How can I do that? Intro to hardware hacking with an RFID badge reader – > Kevin > Bong<http://www.irongeek.com/i.php?page=videos/derbycon3/3303-how-can-i-do-that-intro-to-hardware-hacking-with-an-rfid-badge-reader-kevin-bong> > A SysCall to ARMs – Brendan > Watters<http://www.irongeek.com/i.php?page=videos/derbycon3/3304-a-syscall-to-arms-brendan-watters> > The Netsniff-NG Toolkit – Jon > Schipp<http://www.irongeek.com/i.php?page=videos/derbycon3/3305-the-netsniff-ng-toolkit-jon-schipp> > Why Dumpster Dive when I can pwn right in? – Terry > Gold<http://www.irongeek.com/i.php?page=videos/derbycon3/3306-why-dumpster-dive-when-i-can-pwn-right-in-terry-gold> > > Track 4 (The 3-Way) > Pigs Don’t Fly – Why owning a typical network is so easy – and how to > build a secure one. – Matt “scriptjunkie” > Weeks<http://www.irongeek.com/i.php?page=videos/derbycon3/4101-pigs-don-t-fly-why-owning-a-typical-network-is-so-easy-and-how-to-build-a-secure-one-matt-scriptjunkie-weeks> > Finding The Signal in the Noise: Quantifying Advanced Malware – Dave > Marcus<http://www.irongeek.com/i.php?page=videos/derbycon3/4102-finding-the-signal-in-the-noise-quantifying-advanced-malware-dave-marcus> > Applying the 32 Zombieland Rules to IT Security – Larry > Pesce<http://www.irongeek.com/i.php?page=videos/derbycon3/4103-applying-the-32-zombieland-rules-to-it-security-larry-pesce> > Windows 0wn3d By Default – Mark > Baggett<http://www.irongeek.com/i.php?page=videos/derbycon3/4206-windows-0wn3d-by-default-mark-baggett> > Android 4.0: Ice Cream “Sudo Make Me a” Sandwich – Max > Sobell<http://www.irongeek.com/i.php?page=videos/derbycon3/4105-android-40-ice-cream-sudo-make-me-a-sandwich-max-sobell> > Attacking the Next Generation Air Traffic Control System; Hackers – > liquor and commercial airliners. – > Renderman<http://www.irongeek.com/i.php?page=videos/derbycon3/4107-attacking-the-next-generation-air-traffic-control-system-hackers-liquor-and-commercial-airliners-renderman> > Antivirus Evasion through Antigenic Variation (Why the Blacklisting > Approach to AV is Broken) – Trenton > Iveys<http://www.irongeek.com/i.php?page=videos/derbycon3/4108-antivirus-evasion-through-antigenic-variation-why-the-blacklisting-approach-to-av-is-broken-trenton-iveyneal-bridges> > Hello ASM World: A Painless and Contextual Introduction to x86 Assembly – > nicolle neulist > (rogueclown)<http://www.irongeek.com/i.php?page=videos/derbycon3/4201-hello-asm-world-a-painless-and-contextual-introduction-to-x86-assembly-nicolle-neulist-rogueclown> > SQL injection with sqlmap – Conrad Reynolds > CISA<http://www.irongeek.com/i.php?page=videos/derbycon3/4202-sql-injection-with-sqlmap-conrad-reynolds-cisa> > The Internet of Things: Vulns – Botnets and Detection – Kyle Stone > (@essobi) – Liam > Randall<http://www.irongeek.com/i.php?page=videos/derbycon3/4203-the-internet-of-things-vulns-botnets-and-detection-kyle-stone-liam-randall> > The Malware Management Framework – a process you can use to find advanced > malware. We found WinNTI with it! – Michael Gough and Ian > Robertson<http://www.irongeek.com/i.php?page=videos/derbycon3/4204-the-malware-management-framework-a-process-you-can-use-to-find-advanced-malware-we-found-winnti-with-it-michael-gough-ian-robertson> > Hack the Hustle! – Eve > Adams<http://www.irongeek.com/i.php?page=videos/derbycon3/4205-hack-the-hustle-eve-adams> > Operationalizing Security Intelligence in the Enterprise- Rafal > Los<http://www.irongeek.com/i.php?page=videos/derbycon3/4104-operationalizing-security-intelligence-in-the-enterprise-rafal-los> > New Shiny in the Metasploit Framework – > egypt<http://www.irongeek.com/i.php?page=videos/derbycon3/4207-new-shiny-in-the-metasploit-framework-egypt> > Everything you ever wanted to know on how to start a Credit Union – but > were afraid to ask. – Jordan > Modell<http://www.irongeek.com/i.php?page=videos/derbycon3/4208-everything-you-ever-wanted-to-know-on-how-to-start-a-credit-union-but-were-afraid-to-ask-jordan-modell> > A developer’s guide to pentesting – Bill > Sempf<http://www.irongeek.com/i.php?page=videos/derbycon3/4209-a-developer-s-guide-to-pentesting-bill-sempf> > Steal All of the Databases. – Alejandro > Caceres<http://www.irongeek.com/i.php?page=videos/derbycon3/4301-steal-all-of-the-databases-alejandro-caceres> > Sandboxes from a pen tester’s view – Rahul > Kashyap<http://www.irongeek.com/i.php?page=videos/derbycon3/4303-sandboxes-from-a-pen-tester-s-view-rahul-kashyap> > iOS Reverse #=> iPWn Apps – Mano ‘dash4rk’ > Paul<http://www.irongeek.com/i.php?page=videos/derbycon3/4304-ios-reverse-ipwn-apps-mano-dash4rk-paul> > Terminal Cornucopia – Evan “treefort” > Booth<http://www.irongeek.com/i.php?page=videos/derbycon3/4305-terminal-cornucopia-evan-treefort-booth> > Wait; How is All This Stuff Free?!? – Gene > Bransfield<http://www.irongeek.com/i.php?page=videos/derbycon3/4306-wait-how-is-all-this-stuff-free-gene-bransfield> > > Track 5 – Hybrid Room > Building An Information Security Awareness Program from Scratch – Bill > Gardner – Valerie > Thomas<http://www.irongeek.com/i.php?page=videos/derbycon3/5101-building-an-information-security-awareness-program-from-scratch-bill-gardner-valerie-thomas> > Malware : testing malware scenarios on your network – Tony Huffman > (@myne_us) – Juan Cortes > (@kongo_86)<http://www.irongeek.com/i.php?page=videos/derbycon3/5102-malware-testing-malware-scenarios-on-your-network-tony-huffman-myne-us-juan-cortes-kongo-86> > Password Intelligence Project – Advanced Password Recovery and Modern > Mitigation Strategies – John Moore “Rabid > Security”<http://www.irongeek.com/i.php?page=videos/derbycon3/5103-password-intelligence-project-advanced-password-recovery-and-modern-mitigation-strategies-john-moore-rabid-security> > Tizen Security: Hacking the new mobile OS – Mark Manning > (AntiTree)<http://www.irongeek.com/i.php?page=videos/derbycon3/5104-tizen-security-hacking-the-new-mobile-os-mark-manning-antitree> > RAWR – Rapid Assessment of Web Resources – Adam Byers – Tom > Moore<http://www.irongeek.com/i.php?page=videos/derbycon3/5105-rawr-rapid-assessment-of-web-resources-adam-byers-tom-moore> > Decoding Bug Bounty Programs – Jon > Rose<http://www.irongeek.com/i.php?page=videos/derbycon3/5106-decoding-bug-bounty-programs-jon-rose> > Patching Windows Executables with the Backdoor Factory – Joshua > Pitts<http://www.irongeek.com/i.php?page=videos/derbycon3/5107-patching-windows-executables-with-the-backdoor-factory-joshua-pitts> > Jason Scott – Defcon Documentary > Q&A<http://www.irongeek.com/i.php?page=videos/derbycon3/5108-jason-scott-defcon-documentary> > Panel: Building and Growing a Hacker Space – Joey Maresca – Dave Marcus – > Nick Farr – > SkyDog<http://www.irongeek.com/i.php?page=videos/derbycon3/5201-panel-building-and-growing-a-hacker-space-joey-maresca-dave-marcus-nick-farr-skydog-1-if-selected-will-extend-invite-to-lvl1-team> > SO Hopelessly Broken: the implications of pervasive vulnerabilities in > SOHO router products. – Jacob > Holcomb<http://www.irongeek.com/i.php?page=videos/derbycon3/5202-so-hopelessly-broken-the-implications-of-pervasive-vulnerabilities-in-soho-router-products-jacob-holcomb> > Put Me In Coach: How We Got Started In Infosec – pr1me – Chris “g11tch” > Hodges – Frank Hackett – Dave “ReL1K” > Kennedy<http://www.irongeek.com/i.php?page=videos/derbycon3/5203-put-me-in-coach-how-we-got-started-in-infosec-pr1me-chris-g11tch-hodges-frank-hackett-dave-rel1k-kennedy> > Alice Goes Deeper (Down the Rabbit Hole) – Redirection 2.0 – Nathan > Magniez<http://www.irongeek.com/i.php?page=videos/derbycon3/5204-alice-goes-deeper-down-the-rabbit-hole-redirection-20-nathan-magniez> > Emergent Vulnerabilities: What ant colonies – schools of fish – and > security have in common. – Nathaniel “Dr. Whom” > Husted<http://www.irongeek.com/i.php?page=videos/derbycon3/5205-emergent-vulnerabilities-what-ant-colonies-schools-of-fish-and-security-have-in-common-nathaniel-dr-whom-husted> > Why Your IT Bytes – Frank J. > Hackett<http://www.irongeek.com/i.php?page=videos/derbycon3/5206-why-your-it-bytes-frank-j-hackett> > Using Facial Recognition Software In Digital Forensics And Information > Security – Brian > Lockrey<http://www.irongeek.com/i.php?page=videos/derbycon3/5207-using-facial-recognition-software-in-digital-forensics-and-information-security-brian-lockrey> > How to Fight a War Without Actually Starting One – Brendan > O’Connor<http://www.irongeek.com/i.php?page=videos/derbycon3/5208-how-to-fight-a-war-without-actually-starting-one-brendan-o-connor> > Crypto-Exploit Exercises: A tool for reinforcing basic topics in > Cryptography – Nancy > Snoke<http://www.irongeek.com/i.php?page=videos/derbycon3/5209-crypto-exploit-exercises-a-tool-for-reinforcing-basic-topics-in-cryptography-nancy-snoke> > Stable Talks > Gen Y:Getting Them to Talk Rather than Text at Work – Nancy > Kovanic<http://www.irongeek.com/i.php?page=videos/derbycon3/s101-gen-ygetting-them-to-talk-rather-than-text-at-work-nancy-kovanic> > Battle Scars And Friendly Fire: Threat Research Team War Stories – Will > Gragido and Seth > Geftic<http://www.irongeek.com/i.php?page=videos/derbycon3/s102-battle-scars-and-friendly-fire-threat-research-team-war-stories-will-gragido-and-seth-geftic> > Unmasking Miscreants – Allixon Nixon – Brandon > Levene<http://www.irongeek.com/i.php?page=videos/derbycon3/s103-unmasking-miscreants-allixon-nixon-brandon-levene> > gitDigger: Creating useful wordlists from public GitHub repositories – > Jaime Filson > (WiK)<http://www.irongeek.com/i.php?page=videos/derbycon3/s104-gitdigger-creating-useful-wordlists-from-public-github-repositories-jaime-filson-wik> > PowerShell and Windows Throw the Best Shell Parties – Piotr > Marszalik<http://www.irongeek.com/i.php?page=videos/derbycon3/s105-powershell-and-windows-throw-the-best-shell-parties-piotr-marszalik> > Owning Computers Without Shell Access – Royce > Davis<http://www.irongeek.com/i.php?page=videos/derbycon3/s106-owning-computers-without-shell-access-royce-davis> > Sixnet Tools: for poking at Sixnet Things – Mehdi > Sabraoui<http://www.irongeek.com/i.php?page=videos/derbycon3/s107-sixnet-tools-for-poking-at-sixnet-things-mehdi-sabraoui> > Hardening Windows 8 apps for the Windows Store – Bill > Sempf<http://www.irongeek.com/i.php?page=videos/derbycon3/s110-hardening-windows-8-apps-for-the-windows-store-bill-sempf> > Intro to Dynamic Access Control in Windows Server 2012 – Evan > Anderson<http://www.irongeek.com/i.php?page=videos/derbycon3/s111-intro-to-dynamic-access-control-in-windows-server-2012-evan-anderson> > Evolutionary Security – Embracing Failure to Attain “Good Enough” – Josh > More<http://www.irongeek.com/i.php?page=videos/derbycon3/s112-evolutionary-security-embracing-failure-to-attain-good-enough-josh-more> > DIY Forensics: When Incident Response Morphs into Digital Forensics – > John > Sammons<http://www.irongeek.com/i.php?page=videos/derbycon3/s206-diy-forensics-when-incident-response-morphs-into-digital-forensics-john-sammons> > ANOTHER Log to Analyze – Utilizing DNS to Discover Malware in Your > Network – Nathan > Magniez<http://www.irongeek.com/i.php?page=videos/derbycon3/s114-another-log-to-analyze-utilizing-dns-to-discover-malware-in-your-network-nathan-magniez> > Phishing Frenzy: 7 seconds from hook to sinker – Brandon <zeknox> > McCann<http://www.irongeek.com/i.php?page=videos/derbycon3/s201-phishing-frenzy-7-seconds-from-hook-to-sinker-brandon-zeknox-mccann> > Electronic Safe Fail: Common Vulnerabilities in Electronic Safes – Jeff > Popio<http://www.irongeek.com/i.php?page=videos/derbycon3/s202-electronic-safe-fail-common-vulnerabilities-in-electronic-safes-jeff-popio> > The Good Samaritan Identity Protection Project www.thegsipp.org – Zack > Hibbard – Chris Brown and Jon > Sternstein<http://www.irongeek.com/i.php?page=videos/derbycon3/s203-the-good-samaritan-identity-protection-project-wwwthegsipporg-zack-hibbard-chris-brownjon-sternstein> > Some defensive ideas from offensive guys. – Justin Elze and Robert > Chuvala<http://www.irongeek.com/i.php?page=videos/derbycon3/s204-some-defensive-ideas-from-offensive-guys-justin-elze-robert-chuvala> > Grim Trigger – Jeff “ghostnomad” > Kirsch<http://www.irongeek.com/i.php?page=videos/derbycon3/s207-grim-trigger-jeff-ghostnomad-kirsch> > A n00bie’s perspective on Pentesting… – Brandon > Edmunds<http://www.irongeek.com/i.php?page=videos/derbycon3/s301-a-n00bie-s-perspective-on-pentesting-brandon-edmunds> > My Security is a Graph – Your Argument is Invalid – Gabriel > Bassett<http://www.irongeek.com/i.php?page=videos/derbycon3/s210-my-security-is-a-graph-your-arguement-is-invalid-gabriel-bassett> > Follow the Foolish Zebras: Finding Threats in Your Logs – Chris > Larsen<http://www.irongeek.com/i.php?page=videos/derbycon3/s211-follow-the-foolish-zebras-finding-threats-in-your-logs-chris-larsen> > Security Training and Research Cloud (STRC) – Jimmy > Murphy<http://www.irongeek.com/i.php?page=videos/derbycon3/s212-security-training-and-research-cloud-strc-jimmy-murphy> > Passive Aggressive Defense – Jason > Clark<http://www.irongeek.com/i.php?page=videos/derbycon3/s213-passive-aggressive-defense-jason-clark> > So you want to be a pentester? – Raymond > Gabler<http://www.irongeek.com/i.php?page=videos/derbycon3/s214-so-you-want-to-be-a-pentester-raymond-gabler> > Digital Energy – BPT – Paul > Coggin<http://www.irongeek.com/i.php?page=videos/derbycon3/s215-digital-energy-bpt-paul-coggin> > An Anti-Forensics Primer – Jason > Andress<http://www.irongeek.com/i.php?page=videos/derbycon3/s216-an-anti-forensics-primer-jason-andress> > What if Petraeus was a hacker? Email privacy for the rest of us – Phil > Cryer > (@faker)<http://www.irongeek.com/i.php?page=videos/derbycon3/s217-what-if-petraeus-was-a-hacker-email-privacy-for-the-rest-of-us-phil-cryer-faker> > > > On Fri, Oct 4, 2013 at 11:07 AM, Julian Makas < > [email protected] <javascript:_e({}, 'cvml', > '[email protected]');>> wrote: > >> -- Regards, Omid. Mobile 0415 449 070 Sent from a mobile device
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
