A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


AIDE 2011 Conference Videos (Hacking Illustrated Series InfoSec Tutorial Videos)

AIDE 2011 Conference Videos

These are the presentations from the AIDE 2011 conference at Marshall University. We had some issues early on with the schedule not matching the talks, so descriptions are incomplete. The descriptions I do have are largely Ligatted from the AIDE website.

Social Networks - Evan Patterson
Who are you going to call? - Evan Patterson
WV Crimes requiring Electronic & Digital Evidence - Philip Morrison
Common Darknet Weaknesses - Adrian "Irongeek" Crenshaw
Recent HIPAA/HITECH Changes - Caleb Knight
Hacking A Mature Security Program - David "ReL1K" Kennedy



Social Networks
Presented by Evan Patterson, FBI


 

Download:
http://www.archive.org/download/AideSummer2011/aide1.avi

 


Who are you going to call?
Presented by Evan Patterson, FBI
When, how and who to contract when you see a tech crime



Download:
http://www.archive.org/download/AideSummer2011/aide2a.avi

 

Common Darknet Weaknesses
Presented by Adrian Crenshaw MCSE NT 4, CNE, A+, Network+. i-Net+ "Irongeek"
Ok, this talk did not come out quite as well as I hoped. I should be able to polish it more before Defcon
Darknets/Cipherspaces such as Tor and I2P have been covered before in great detail. Sometimes it can be hard to follow attack strategies that have been used against them as the papers written on the topic have been academic and abstract. What this talk will attempt to do is step back and give an overview of the topic in a manner hopefully more conducive to the understanding of security practitioners, giving more concrete examples. While little to nothing in this talk will be "new and groundbreaking" it should lead to a better understanding of how encrypted anonymizing networks can be subverted to reveal identities.

 

Download:
http://www.archive.org/download/AideSummer2011/aide3.avi



Recent HIPAA/HITECH Changes
Presented by Caleb Knight
As part of the American Recovery and Reinvestment Act of 2009, Congress enacted the Health Information Technology for Economic and Clinical Health (HITECH) Act to broaden and increase HIPAA's scope of protecting the privacy and security of personal health information. This talk will provide an overview of the HITECH Act and examine some of the recent changes.

 

Download:
http://www.archive.org/download/AideSummer2011/aide4.avi


Hacking A Mature Security Program
Presented by David Kennedy, OSCE, OSCP, GSEC, MSCE, CISSP "ReL1K"
http://www.secmaniac.com/
Most organizations are acclimated to the standard penetration tests we see in the industry. For those companies that have proactively been increasing their overall security posture through years of program maturity and hard work need something different. This talk will cover tailoring a penetration test based on the security level of the target and ripping through their security environment with some crazy sophistication. We'll be going into depth on the future of penetration testing through the Penetration Testing Execution Standard (PTES) and what it takes in order to elevate your security posture in today's crazy world.This is a technical talk, not for the faint of heart, and some direction on where we need to head in the security industry.

 

Download:
http://www.archive.org/download/AideSummer2011/aide5.avi

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast