A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


ShowMeCon 2014 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)

ShowMeCon 2014 Videos

These are the videos ShowMeCon 2014. Thanks to Renee & Dave Chronister (@bagomojo), Ben Miller (@Securithid) and others for having me out to record and speak. Also thanks to my video crew Josh Tepen, Robert Young, Kali Baker, Andrew Metzger & Brian Wahoff.
 

Track 1

Introduction - Parameter

Hacking Hollywood - Ralph Echemendia

Give Me Your Data - Dave Chronister

Terminal Cornucopia: Demystifying The Mullet - Evan Booth

Thinking Outside The (Sand)Box - Kyle Adams

Protecting The Seams: Military Doctrine Applied To Application And Network Security - Paul Vencill

Start With The BPT Then Worry About The APT! - Kevin Cardwel

Introduction - Parameter (Rolled in with next talk)

Cognitive Injection - Andy Ellis

Inside The World’S Most Dangerous Search Engine - John Matherly

Hacking To Get Caught: A Concept For Adversary Replication And Penetration Testing - Raphael Mudge



Track 2

Power-Ups And Princesses: What Video Games Taught Me About Building A Security Awareness Program - Aamir Lakhani

Powershell And You: Using Microsoft’S Post-Exploitation Language - Chris Campbell

Dropping Docs On Darknets: How People Got Caught - Adrian Crenshaw

Around The World In 80 Cons - Jayson E Street (not recorded)

Threat Modeling In The C-Suite, A Practical Guide - Erick Rudiak (pending review)

The Call Of Community: Modern Warfare - Ben0xa 

Physical (In)Security – It’S Not All About Cyber - Inbar Raz

Bending And Twisting Networks - Paul Coggin

Here, Let Me Hold That For You. Consumer Metadata And Its Dangers - Robert Reed
 

Downloads:

https://archive.org/details/ShowMeCon2014

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast