Business Ramifications of Internet’s unclean conflicts
How I Owned Your Vending Machine
The Patsy Proxy: Getting others to do your dirty work
BYOD: “Bring Your Own Doom or Sane Business Decision?”
The Art and Science of Hacking Any Target
Rapid Blind SQL Injection Exploitation with BBQSQL
ISO8583: How to pentest when given a target that is not your “normal” target.
Android in the Healthcare Workplace: A Case Study
Nice to Meet You
Introduction to Metasploit Post Exploitation Modules
Next Generation Web Reconnaissance
Running a successful Red Team
Managed Service Providers: Pwn One and Done
CounterSploit! (MSF as a defense platform)
Off-Grid Communications with Android: Meshing the Mobile World
Beyond Strings – Memory Analysis during Incident Response
Ma and Pa Sleep with the Door Unlocked: A Look at Information Security in the Small Business
Medical Device Security: Current State of the Art
We go in over the phone lines, pop the firewall, drop in the hydra and wait for the money” and other movie lines that fail.
Breaking into Security
Are You HIPAA to the Jive?: How Focus on HIPAA Compliance Over Better Security Practices Hurts Us All
An Introduction to Reverse Engineering with Ida Pro Free
Doxing and Anti-Doxing: Information Reconnaissance for the Stalker and the Stalked
Why Integgroll sucks at Python, and you can too!
Active Directory Reconnaissance, Attacks, and Post-Exploitation
Professional Pen Testing and Learning From Your Mistakes
Hack Your Way Into A DoD Security Clearance
Easy Passwords = Easy Break-Ins
PHP Website Security, Attack Analysis, & Mitigations
Alice in Exploit Redirection-land – A trip down the rabbit hole
Appearance Hacking 101: The Art of Everyday Camouflage
SQL Injection 101
How I Learned To Stop Worrying and Love the Smart Meter