GrrCON 2016 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)
GrrCON 2016 Videos
These are the videos of the presentations from GrrCON 2016.
Big thanks to EggDropX and Jaime for having me out, and my video crew
(Chris, Erick, & Cooper) for
Act Three, The Evolution of Privacy
Strolling Through Your Internet Museum
solcrush3r (not recorded)
Weaponizing Nanotechnology and hacking humans; defining the boundaries
Becoming a Cyborg: The First Step Into Implantable Technology
Lie To Me - LIE TO THEM
Buckaroo (not recorded)
Abnormal Behavior Detection in Large Environments
Ghosts in the IOT
NinjaSl0th (not recorded)
No Title Given
atlas of d00m (not posting)
No Title Given
and bad mistakes I've made a few...
Jayson Street (Only first 30 min)
Predator to Prey: Tracking Criminals with Trojans and Data Mining for Fun and Profit
J Wolfgang Goerlich
Back to the Future: Understanding our future but following the past
Breaking Android Apps for Fun and Profit
Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years
Security Guards -- LOL!
Brent White & Tim Roberts
Matt Bromiley & Preston Lewis
GrrCON Presents, Celebrity Bumfight CybergeddonPirates
Duncan Manuts & B3ltf4ce (not posted)
Internet of Things (IoT) radio frequency (RF) Analysis With Software Defined Radio
So You Want to Be a Pentester
What do you mean I'm pwn'd!
I turned on automatic updates!
Scott Thomas & Jeff Baruth
Surreal Paradigms: Automotive Culture Crash
Reversing and Exploiting Embedded Devices (Walking the software and hardware stack)
Threat Detection & Response with Hipara
J. Brett Cunningham
Security 3.0: The future of information security, from beginning to End-point
Vinny Troia (replaced with talk below)
Still Broken After All These Years Aka Utility Security For Smarties
Threat Detection Response with Hipara
J Brett Cunningham
Quick and Easy Windows Timelines with Pyhon, MySQL, and Shell Scripting
Dr. Phil Polstra
Cruise Ship Pentesting OR Hacking the High Seas
Chad M. Dewey
Using Virus Total Intelligence to track the latest Phishing Document campaigns
Encryption, Mobility & Cloud Oh My!
Magnetic Stripes 101
Machine Duping: Pwning Deep Learning Systems
Money, Fame, Power - Build your success as a security professional
Tales from the Crypt...(analyst)
What's in your Top Ten? Intelligent Application Security Prioritization
Phish your employees for fun!Mad Scientists
- Defending Against Next-generation Attacks
Five Nights At Freddys: What We Can Learn About Security From Possessed Bears
Make STEHM Great Again
David "HealWHans" Schwartzberg
Pentester-to-customer:I will 0wn your network! - Customer-to-pentester:No, I will make you cry!
David Fletcher & Sally Vandeven
How Do You Secure What You Don't Control
Fighting the Enemy Within
Getting to the Root of Advanced Threats Before Impact
Establishing Privileged Account Security Best Practices To
Reduce Cyber Security Threats
Reality-Checking Your AppSec Program
How to Implement Crypto Poorly
Stop attacking your mother's car!
Charles Parker, II
Contracting: Privacy Security and 3rd Party
Nathan Steed & Kenneth Coleman
Alignment of business and IT Security
Establishing a Quality Vulnerability Management Program without Wasting Time or Money
Zee Abdelnabi (not posting)
So You've Inherited a Security Department, Now What?
Piercing the Air Gap: Network Steganography for Everyone
On being an Eeyore in Infosec
Welcome to The World of Yesterday, Tomorrow!
Download videos from: