Cookie Cadger: Taking Cookie Hijacking To A New Level
Ambush – Catching Intruders At Any Point
Separating Security Intelligence from Security FUD
Building Dictionaries and Destroying Hashes Using Amazon EC2
Why Integgroll sucks at Python, and you can too!
Active Directory Reconnaissance, Attacks, and Post-Exploitation
Everything they told me about security was wrong
Ghost in the Wires: The Unbelievable True Story of Kevin Mitnick’s Life as a the World’s Most Wanted Computer Hacker
Dirty Red Team Tricks II
Slow Down, Cowpoke: When Enthusiasm Outpaces Common Sense
Professional Pen Testing and Learning From Your Mistakes
Hack Your Way Into A DoD Security Clearance
The Devil's in the Details: A look at bad SE and how to do better
You Can't Buy Security. Building an Open Sourced Information Security Program
Write Your Own Tools With Python!
Maturing The Penetration Testing Profession
Easy Passwords = Easy Break-Ins
PHP Website Security, Attack Analysis, & Mitigations
Using McAfee Secure/TrustGuard as Attack Tools
Building a Database Security Program
Intro to Linux System Hardening, and Applying it to BackTrack Linux
Becoming Mallory – How to Win Creds and Influence Devices
Alice in Exploit Redirection-land – A trip down the rabbit hole
Appearance Hacking 101: The Art of Everyday Camouflage
Easy Cracking with NetLM Downgrade Attacks
Why Isn’t Everyone Pulling Security, This is Combat
Taming Skynet : Using the Cloud to Automate Baseline Scanning
Wielding Katana: A Live Security Suite
SQL Injection 101
How I Learned To Stop Worrying and Love the Smart Meter
Think differently about database hacking
Sprinkler: IR
Current Trends in Computer Law
SE me, SE you
Closing Ceremonies