Malware Automation
Pass-The-Hash 2: The Admin’s Revenge
Big Hugs for Big Data
Hello ASM World: A Painless and Contextual Introduction to x86 Assembly
Panel: Building and Growing a Hacker Space
Phishing Frenzy: 7 seconds from hook to sinker
Electronic Safe Fail: Common Vulnerabilities in Electronic Safes
What’s common in Oracle and Samsung? They tried to think differently about crypto.
The Cavalry Is Us: Protecting the public good and our profession
Antivirus Evasion: Lessons Learned
SQL injection with sqlmap
SO Hopelessly Broken: the implications of pervasive vulnerabilities in SOHO router products.
The Good Samaritan Identity Protection Project – www.thegsipp.org
Some defensive ideas from offensive guys.
Burning the Enterprise with BYOD
Love letters to Frank Abagnale (How do I pwn thee let me count the ways)
Is Auditing C/C++ Different Nowadays?
The Internet of Things: Vulns, Botnets and Detection
Put Me In Coach: How We Got Started In Infosec
Raising Hacker Kids: For Good or for Awesome
Getting the goods with smbexec
The Message and The Messenger
Getting Schooled: Security with no budget in a hostile environment.
The Malware Management Framework, a process you can use to find advanced malware. We found WinNTI with it!
Alice Goes Deeper (Down the Rabbit Hole) – Redirection 2.0
Grim Trigger
Stealth servers need Stealth Packets
Shattering the Glass: Crafting Post Exploitation Tools with PowerShell
50 Shades of RED: Stories from the “Playroom”
Browser Pivoting (FU2FA)
Hack the Hustle!
Emergent Vulnerabilities: What ant colonies, schools of fish, and security have in common.
A n00bie’s perspective on Pentesting…
My Security is a Graph – Your Arguement is Invalid
Cheat Codez: Level UP Your SE Game
Beyond Information Warfare “You Ain’t Seen Nothing Yet”
Taking the BDSM out of PCI-DSS Through Open-Source Solutions
Operationalizing Security Intelligence in the Enterprise
Why Your IT Bytes
Follow the Foolish Zebras: Finding Threats in Your Logs
Security Training and Research Cloud (STRC)
My Experiments with truth: a different route to bug-hunting
Stop Fighting Anti-Virus
Hacking Back, Active Defense and Internet Tough Guys
New Shiny in the Metasploit Framework
Using Facial Recognition Software In Digital Forensics And Information Security
Passive Aggressive Defense
So you want to be a pentester?
The Art and Science of Hacking Any Organization
An Encyclpwnia of Persistence
Everything you ever wanted to know on how to start a Credit Union, but were afraid to ask.
How to Fight a War Without Actually Starting One
Digital Energy – BPT
An Anti-Forensics Primer
Living Off the Land: A Minimalist’s Guide to Windows Post-Exploitation
Your Turn!
A developer’s guide to pentesting
Crypto-Exploit Exercises: A tool for reinforcing basic topics in Cryptography
What if Petraeus was a hacker? Email privacy for the rest of us
First line of defense