A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


BSidesCharm 2019 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)

BSidesCharm 2019 Videos

These are the videos BSidesCharm (Baltimore) 2019. Thanks for inviting me down to record. Thanks to my video team Robert, Ethan, Cory, Tim Steven, Trevor, Tom, Menachem and Josh.



Matt Blaze

Embrace the Red: Enhancing detection capabilities with adversary simulation
Mauricio Velazco

I'lll Complete My Threat Model Later Mom!: Infosec in Middle School
Ashley Benitez Smith

Cleaning the Apple Orchard - Using Venator to Detect macOS Compromise
Richie Cyrus

More Tales From the Crypt...Analyst
Jeffrey Man

Anatomy & Evolution of a Fast Flux Malware Campaign
Emily Crose

COM Under The Radar: Circumventing Application Control Solutions
Jimmy Bayne

On The Line: What Phishing Really Impacts
Steven Becker

Automated Adversary Emulation
David Hunt

Comparing Malicious Files
Robert Simmons

How to Start a Cyber War: Lessons from Brussels
Chris Kubecka

You Moved to Office 365, Now What?
Sean Metcalf

You're Not as Safe as You Think: Clearing Up Common Security Misconceptions
Joshua Meyer

Keynote: The Declarative Future
Liam Randall

Exploring Community Volunteering Through a Career Development Lens
Kathleen Smith and Doug Munro

Defense in Depth Against DDoS Diminishes Dollars Destroyed
Daniel Gordon

Reasonable Rapid Recognition and Response to Rogues
Craig Bowser

BloodHound From Red to Blue
Mathieu Saulnier

A Code Pirate's Cutlass: Recovering Software Architecture from Embedded Binaries

Technical Leadership: It's Not All Ones and Zeros
Timothy Schulz

Hunting for Threats in Industrial Environments and Other Scary Places
Nick Tsamis

It's Malware Time - A Bar Crawl from Skunked Homebrew to Rotten Apples
Erika Noerenberg

J-J-J-JEA Power
James Honeycutt

What did the SIEM Say?
JR Presmy and Shawn Thomas

Bash Can Get Uglier: Using Bashfuscator to Generate Bash Obfuscation




Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast