Bio: Adrian Crenshaw has worked in the IT industry for the last
twenty three years.
He runs the information security website Irongeek.com,
which specializes in videos and articles that illustrate how to use various
pen-testing and security tools. He did the cert chase for awhile (MCSE NT
4, CNE, A+, Network+. i-Net+) but stopped once he had to start paying for the
tests himself. He holds a Master of Science in Security Informatics, and is one of the
co-founders of Derbycon.
Most of my research is posted as articles on Irongeek.com.
I've also presented at many conferences, local organization meetings and held
classes. A rough CV would be:
Video Tales and Fails: Recording your conference and sharing it with
the community
Skydocon 3, Nashville, TN, Oct 22nd, 2013
http://www.irongeek.com/i.php?page=videos/skydogcon3/irongeek-skydog-con-video-rig-enhancements
Character Assassination: Fun and Games with Unicode
Hack3rCon^4, Charleston, WV, Oct 20th, 2013
HackerHalted, Atlanta, GA, Sept 21st, 2013
http://www.irongeek.com/i.php?page=videos/hack3rcon4/03-character-assassination-fun-and-games-with-unicode-adrian-crenshaw
Information Security in University Campus and Open Environments
Louisville Infosec, Louisville, KY, Oct 3rd, 2013
http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2013/information-security-in-university-campus-and-open-environments-adrian-crenshaw
Webshells: History, Techniques, Obfuscation and Automated Collection
TAKEDOWNCON St. Louis, MO, June 4th, 2013
OISF, Dayton, OH, July 13th, 2013
http://www.irongeek.com/i.php?page=videos/oisf2013/webshells-history-techniques-obfuscation-and-automated-collection-adrian-crenshaw
Network King Of The Hill (NetKotH): A hacker wargame for organizers
who are lazy
AIDE 2013, April 18th, 2013
http://www.irongeek.com/i.php?page=videos/aide2013/network-king-of-the-hill-netkoth-a-hacker-wargame-for-organizers-who-are-lazy-adrian-crenshaw-irongeek
Inside the Hacker's Studio - Billy Hoffman and IronGeek
Outerz0ne 9, April 6th, 2013
http://www.irongeek.com/i.php?page=videos/outerz0ne9/11-inside-the-hackers-studio-billy-hoffman-and-irongeek
Network King Of The Hill (NetKotH): A hacker wargame for organizers
who are lazy bastards
PhreakNIC 16, November 9th, 2012
http://www.irongeek.com/i.php?page=videos/phreaknic16/08-network-king-of-the-hill-netkoth-a-hacker-wargame-for-organizers-who-are-lazy-bastards-adrian-crenshaw
EMP, yeah you know me..
Hack3rcon 3, October 20th, 2012
http://www.irongeek.com/i.php?page=videos/hack3rcon3/11-emp-yeah-you-know-me-adrian-crenshaw
Building a Blackthrow with the Raspberry Pi: More inexpensive hardware
to leave behind on someone else's network
Cleveland Bsides, July 13th 2012
OISF, July 14th 2012
http://www.irongeek.com/i.php?page=videos/bsidescleveland2012/dingleberry-pi-building-a-blackthrow-more-inexpensive-hardware-to-leave-behind-on-someone-elses-network-adrian-irongeek-crenshaw
http://www.irongeek.com/i.php?page=videos/oisf2012/dingleberry-pi-building-a-blackthrow-more-inexpensive-hardware-to-leave-behind-on-someone-elses-network-adrian-crenshaw
Out of Character: Use of Punycode and Homoglyph Attacks to Obfuscate
URLs for Phishing
AIDE 2012, May 24th 2012
http://www.irongeek.com/i.php?page=videos/aide2012/out-of-character-use-of-punycode-and-homoglyph-attacks-to-obfuscate-urls-for-phishing-adrian-crenshaw
Anti-Forensics: Occult Computing
AIDE 2012, May 24th 2012
http://www.irongeek.com/i.php?page=videos/aide2012/anti-forensics-occult-computing-adrian-crenshaw
PHUKD/Keylogger Hybrid
NEOISF, December 2011
http://www.irongeek.com/i.php?page=videos/phukd-keylogger-hybrid
More PHUKED Than Ever
Skydogcon, Novermber 4th 2011
PhreakNIC, November 4th 2011
http://www.irongeek.com/i.php?page=videos/skydogcon1/irongeek-more-phuked-than-ever
Building a Svartkast: Cheap hardware to leave behind on someone else’s
network
Derbycon 2011, October 30th 2011
http://www.irongeek.com/i.php?page=videos/derbycon1/adrian-crenshaw-building-a-svartkast-cheap-hardware-to-leave-behind-on-someone-elses-network
Pilfering Local Data: Things an Attacker Would Want to Grab with Short
Term Local Access
Nashville Infosec, Sept 15th 2011
http://www.irongeek.com/i.php?page=videos/pilfering-local-data
Security Tips For The Small Business From 70,000 Feet - Joseph Hollingsworth and
Adrian Crenshaw
Kiwanis club, Aug 19th 2011
http://www.irongeek.com/i.php?page=videos/security-tips-for-the-small-business-from-70000-feet
Cipherspaces/Darknets An Overview Of Attack Strategies
Defcon 19, Aug 6th 2011
http://www.irongeek.com/i.php?page=videos/cipherspaces-darknets-an-overview-of-attack-strategies
Common Darknet Weaknesses
AIDE 2011, July 15th 2011
http://www.irongeek.com/i.php?page=videos/aide-2011-summer#Common_Darknet_Weaknesses
I2P/Tor Workshop
Defcon 19, Aug 6th 2011
http://www.irongeek.com/i.php?page=security/i2p-tor-workshop-notes
Making Windows 7 SP1 32/64bit Boot CD/DVD/USBs with Winbuilder
OSIF, July 16th 2011
http://www.irongeek.com/i.php?page=videos/oisf-2011#Making_Windows_7_SP1_32/64bit_Boot_CD/DVD/USBs_with_Winbuilder
Common Darknet Weaknesses
AIDE at Marshall University, July 15th 2011
http://www.irongeek.com/i.php?page=videos/aide-2011-summer#Common_Darknet_Weaknesses
Portable Boot Devices (USB/CD/DVD): Or in Canadian, what is this all aboot?
Kentuckiana ISSA, June 3rd 2011
http://www.irongeek.com/i.php?page=security/winbuilder-win7pe-se-tutorial
Cyberstalking, Footprinting and Recon class
Fort Wayne, May 21st 2011
http://www.irongeek.com/i.php?page=videos/osint-cyberstalking-footprinting-recon
Crude, Inconsistent Threat: Understanding Anonymous
Central Ohio InfoSec Summit, May 13th 2011
http://www.irongeek.com/i.php?page=videos/crude-inconsistent-threat-understanding-anonymous-adrian-crenshaw
Funnypots and Skiddy Baiting: Screwing with those that screw with you
Notacon, April 16th 2011
http://www.irongeek.com/i.php?page=videos/funnypots-and-skiddy-baiting-notacon-2011
Rendering Hacker Con Videos with AviSynth
Outerz0ne, Mar 18th 2011
http://www.irongeek.com/i.php?page=videos/outerz0ne-2011-hacker-con#IronGeek_-_Rendering_Hacker_Con_Videos_with_AviSynth
Network Sniffers Class for the Kentuckiana ISSA 2011
Kentuckiana ISSA, Mar 9th 2011
http://www.irongeek.com/i.php?page=videos/network-sniffers-class
Darknets: anonymizing private networks
AIDE Winter Meeting at Marshall University, Feb 17th-18th 2011
http://www.irongeek.com/i.php?page=videos/aide-winter-2011#Cipherspace/Darknets:_anonymizing_private_networks
Identifying the true IP/Network identity of I2P service hosts
Blackhat DC, Jan 18-19 2011
http://www.irongeek.com/i.php?page=videos/identifying-the-true-ip-network-identity-of-i2p-service-hosts-talk-adrian-crenshaw-blackhat-dc-2011
Malicious USB Devices Talk (at five events)
Louisville Infosec, Oct 2nd 2010
Phreaknic 14, Oct 15th-17th, 2010
CACR Security Seminar, Nov 18th 2010
DojoCon, Dec 11th-12th, 2010
ShmooCon, Jan 28th-30th 2011
http://www.irongeek.com/i.php?page=videos/malicious-usb-devices-phreaknic-14
Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device
Defcon 18, Jul 30th - Aug 1st 2010
http://www.irongeek.com/i.php?page=videos/phukd-defcon-18
Anti-forensics
Notacon 7, April 2010
Programmable USB HID Dongle for Pen-testing
Outerz0ne 2010, Mar 2010
http://www.irongeek.com/i.php?page=videos/outerz0ne-2010-videos
Turning the Zipit 2 into a mobile hacking device
Outerz0ne 2010, Mar 2010
http://www.irongeek.com/i.php?page=videos/outerz0ne-2010-videos
Funnypots and Skiddy Baiting
Shmoocon, Feb 2010
http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2010
Building a Hacklab, and a little about the Louisville CTF event
Kentuckian ISSA, Nov 2009
http://www.irongeek.com/i.php?page=videos/building-a-hacklab
Darknets: anonymizing private networks talk from Phreaknic
(Networks covered
include Tor, Freenet, AnoNet/DarkNET Conglomeration and I2P)
Kentuckian ISSA, Oct 2009
and again at:
Phreaknic 13, Oct 2009
http://www.irongeek.com/i.php?page=security/darknet-slides-tor-i2p-freenet
Anti-Forensics Class
Kentuckian ISSA, Aug 2009
http://www.irongeek.com/i.php?page=videos/anti-forensics-occult-computing
OWASP Top 5 and Mutillidae: Intro to common web vulnerabilities like Cross Site
Scripting (XSS), SQL/Command Injection Flaws, Malicious File Execution/RFI,
Insecure Direct Object Reference and Cross Site Request Forgery (CSRF/XSRF)
Louisville OWASP, Jun 2009
http://www.irongeek.com/i.php?page=videos/owasp-top-5-louisville
802.11 Wireless Security Class for the Louisville ISSA
Kentuckian ISSA, May 2009
http://www.irongeek.com/i.php?page=videos/802-11-wireless-security-class-part-1
Hacker Con WiFi Hijinx Video: Protecting Yourself On Potentially Hostile
Networks
Kentuckian ISSA, May 2009
http://www.irongeek.com/i.php?page=videos/hacker-con-hostile-networks-louisville-issa
Making Hacking Videos
Notacon 2009, Cleveland Ohio, April 2009
http://www.irongeek.com/i.php?page=videos/making-hacking-videos-notacon-2009
Footprinting, scoping and recon with DNS, Google Hacking and Metadata
Kentuckian ISSA, March 2009
http://www.irongeek.com/i.php?page=videos/footprinting-scoping-and-recon-with-dns-google-hacking-and-metadata
Sniffers Class for the Louisville ISSA
Kentuckian ISSA, Nov 2008
http://www.irongeek.com/i.php?page=videos/sniffers-class-for-the-louisville-issa
Hardware Keyloggers: Use, Review, and Stealth
Phreaknic 12, Nashville, Tennessee, Oct 2008
http://www.irongeek.com/i.php?page=videos/pn12/irongeek-hardware-keyloggers-use-review-and-stealth
Nmap presentation for the ISSA in Louisville Kentucky
Kentuckian ISSA, September 2008
http://www.irongeek.com/i.php?page=videos/nmap-louisville-issa
Creating a Windows Live CD for System Recovery and Pen-Testing Presentation
PhreakNIC 10, Nashville, Tennessee, Oct 21 2006
Hacking Network Printers Presentation
Notacon 2006, Cleveland, Ohio, Apr 8 2006
http://www.irongeek.com/i.php?page=videos/notacon2006printerhacking
Local Password Cracking and Defense Presentation
Indiana Higher Education Cybersecurity Summit 2005, IUPUI Campus, Indianapolis,
Indiana, Apr 29 2005