A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


BSides Augusta 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)

BSides Augusta 2015 Videos

These are the videos from the BSides Augusta conference. Thanks to Lawrence Abrams, and all of the BSides Crew for having me out to help record and render the videos and Pentestfail, Robert, Mike, John, Ryan, Harry and others for manning capture rigs.

Keynotes

Welcome
Major General Fogarty

Keynote
Ed Skoudis

Blue Team Track 1

Fundamental Understanding of Baseline Analysis and Remediation for Industrial Control Systems
Juli Joyner and Jeffrey Medsger

Taking a Distributed Computing Approach to Network Detection with Bro and “The Cloud”
Mike Reeves

 A Scout's Perspective on Network Defense
Justin Edgar

Doomsday Preppers: APT Edition
Tanner Payne

Building a Better Security Analyst Using Cognitive Psychology
Chris Sanders

Viper Framework for Malware Analysis
Paul Melson

Infiltrating C2 Infrastructure
Tim Crothers

Building “Muscle Memory” with Rekall Memory Forensic Framework
Alissa Torres

The Blue Team Starter Kit
Timothy De Block

Red Team Track

Using a HackRF One to Infiltrate the Digital Thetford Wall
Patrick Perry

Malvertizing Like a Pro
Alex Rymdeko-Harvey

Weaponizing our youth: The Case for Integrated Cyber Ethics
Josh Rykowski

Making Everything Old New Again
Andrew Cole and Rich Moulton

DIY Vulnerability Discovery with DLL Side Loading
Jake Williams

Recon-ng and Beyond
Tim Tomes

Attacking OWASP - Exploiting the Top 10
David Coursey

Blue Team Track 2

Go Hack Yourself
Jason Frank

2015 - It's not over yet…
Joel Esler

How to Get Into ICS Security
Chris Sistrunk

Destruction as a Service: Security Through Reanimation
Jon Medina

The Programmatic Evolution of Technology Defense.
Roland Cloutier

Lessons Learned from Analyzing Terabytes of Malware
Wes Widner

Download Videos From:
https://archive.org/details/BSidesAugusta2015

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast