A Deep Look into a Chinese Advanced Attack - Michael Gough
And You Shall Know Me By My Trail of Documentation
Ansible. And Why it Works for Me.
APT Cyber Cloud of the Internet of Things
A Survey of Powershell Enabled Malware
Attacking Packing: Captain Hook Beats Down on Peter Packer
Backdooring Git
Blue Team Army - It’s *Your* Network - Defend It!
Blue Team Starter Kit
Breaking in Bad (I’m The One Who Doesn’t Knock)
Bugspray - The 802.15.4 Attack Surface
Building a Better Honeypot Network
Building a Brain for Infosec
Bypassing 2Factor Auth with Android Trojans
Bypass Surgery: Abusing Content Delivery Networks With Server-Side-Request Forgery (SSRF), Flash, and DNS
Circles & Boxes - Drawing SecArch into Your Program
Closing Ceremonies
Confessions of a Crypto Cluster Operator
Credential Assessment: Mapping Privilege Escalation at Scale
Crypto 101: An Intro to Real-World Crypto
Cryptography and You
Current Trends in Computer Law
CyberSecurity Alphabets - Hacker Edition
Dec0ding Humans Live
Detecting Phishing Attacks with DNS Reconnaissance
Developers: Care and Feeding
Disecting Wassenaar
DNS Miner - A Semi-Automatic Incident Response and Threat Intelligence Tool for Small - Over Worked Security Teams
Dog the Freaking (OSINT) Bounty Hunter - Helping Law Enforcement Catch Criminals For (Mostly) Fun - And (Probably No) Profit
Don’t Laugh - I Dare You!
Dynamic Analysis of Flash Files
Fingerprinting the Modern Digital Footprint
Five Hardware Hacking Projects Under $30
Gadgets Zoo: Bypassing Control Flow Guard in Windows 10
Geeks Need Basements!
Getting Started with PowerShell
Gnuradio Demystifying RF Black Magic
Going AUTH the Rails on a Crazy Train
Gray Hat PowerShell
HackerQue
Hackers vs. Defenders: Can the Defender Ever Stop Playing Catch Up and Win?
Hacking for Homeschoolers
Hacking the Next Generation
Hacking Virtual Appliances
Hacking Web Apps
Hack My Derby
HardenedBSD Internals
HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware
$helling Out (Getting Root) on a ‘Smart Drone’
HFC Update
High Stake Target: Lo-Tech Attack
Hijacking Label Switched Networks in the Cloud
Homebrewing for Hackers
Honeypots for Active Defense
How I Stopped Worrying and Learned to Love InfraOps
How Not to Infosec
How to Build Your Own Covert SIGINT Vehicle
Hunting Unicorns and Jerks - Irrational, Defensible, or Necessary?
InfoSec Big Picture and Some Quick Wins
Intercepting USB Traffic for Attack and Defense
Introducing the RITA VM: Hunting for Bad Guys on Your Network For Free with Math.
Intro to x86
Intrusion Hunting for the Masses - A Practical Guide
Invasion of the Hash Snatchers
ISLET: An Attempt to Improve Linux-based Software Training
Is That a Router in Your Pocket or Are You Trying to P0wn Me?
Keynote Panel - Information Security Today and in the Future
Latest Tools in Automotive Hacking
Learning Mainframe Hacking: Where the Hell Did All My Free Time Go?
Learning Through Mentorship
LongTail SSH Attack Analysis
Losing Battles - Winning Wars - Active Defense Rebooted
Malfunction’s Functions : Automated Static Malware Analysis Using Function Level Signatures
Malware is Hard. Let’s Go Shopping!
Manufactorum Terminatus - The Attack and Defense of Industrial Manufacturers
Marketers are Friends - Not Food
Medical Devices: Pwnage and Honeypots
Metasploit Town Hall
Mobile Application Reverse Engineering: Under the Hood
Moving Target Defense - Learning from Hackers
My Password Cracking Brings All the Hashes to the Yard.
On Defending Against Doxxing
Operating in the Shadows
OSINT for AppSec: Recon-ng and Beyond
Pavlovian Security: How to Change the Way Your Users Respond When the Bell Rings
People Buy You
PHaaS - Phishing as a Service
Phishing: Going from Recon to Creds
Practical Attacks Against Multifactor
Practical Hardware Attacks Against Soho Routers & the Internet of Things
Practical Windows Kernel Exploitation
Putting the Management into Vulnerability Management (or - YOU’VE GOT BEARS!!!)
Pwning People Personally
Python for InfoSec
Red Teaming Enemy of the State
Red vs. Blue: Modern Active Directory Attacks & Defense
Security Hopscotch
Shooting Phish in a Barrel and Other Fish Related Puns
Simplified SIEM Use Case Management
Social Media Risk Metrics. When OMGWTFBBQ Meets Risk Algorithms.
Spanking the Monkey (or How Pentesters Can Do It Better!)
Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage
Stacking the Virtual Deck: Attacks by Predicting RNGs
Stagefright: Scary Code in the Heart of Android
Started from the bottom, now I’m here?: How to ruin your life by getting everything you ever wanted
State of the Metasploit Framework
Stealthier Attacks and Smarter Defending with TLS Fingerprinting
Stealthy and Persistent Back Door for Z- Wave Gateways
Sticky Honey Pots
Stretching the Sandbox with Malware Feature Vectors
Surveillance Using Spare Stuff
Surviving Your Startup
Tactical Diversion-Driven Defense
TBD
The Human Interface Device Attack Vector: Research and Development
The Law of Drones
The Little-Known Horrors of Web Application Session Management
The M/o/Vfuscator - Turning ‘Mov’ into a Soul-crushing RE Nightmare
The Pentesters Framework
The Phony Pony: Phreaks Blazed The Way
The Problems with JNI Obfuscation in the Android Operating System
The State of Information Security Today
Tool Drop: Free as in Beer
Top Ten is Old Skool - Meet the New Age of AppSec
Unbillable: Exploiting Android in App Purchases
Using Windows diagnostics for system compromise
Voltron: Defender of Your Inferiors
Welcome to the Family - Intro
We Owe You Nothing
When A Powerful Platform Benefits Both Attackers and Defenders: Secure Enhancements to Scripting Hosts in Windows 10
WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis
Windows 10 Defense in Depth