A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


GrrCON 2019 Videos

GrrCON 2019 Videos

These are the videos of the presentations from GrrCON 2019. Big thanks to P1nkN1ghtmare and EggDropX for having me out, and my video crew  (paint27, LizardSlack, BrettAHansen, and ZTC1980) for recording.

Welcome to GrrCON
EggDropX
(Not Recorded)

Keynote
Amanda 'Infosystir' Berlin

Baselining Behavior Tradecraft through Simulations
Dave Kenendy

I PWN thee, I PWN thee not!
Jayson Street

Automating Phishing Analysis
Kyle Eaton

Black Hats & White Collars : Bitcoin, Dark Nets and Insider Trading
Ken Westin

Ssshhhh
Atlas of Doom

How Nathan Crashed and Burned
Nathan Dragun

Reverse Engineering Malware for N00bs
GregB33f/James

Host-Hunting on a Budget
cyberGoatPsyOps

Keynote
Rachel "Soul Crusher86" G

Cons & Careers
SciaticNerd

Atomic Threat Coverage: operationalized ATT&CK
Mikhail Aksenov
(Didn't happen)

Hacking the Boardroom: How to communicate effectively to get your budget
Ryan Wisniewski

Power Detection
Kyle Shattuck
(Didn't happen, see link above for bonus talk)

The Science of Breaking and Entering
Alissa dnsprincess

Hashes; Smothered and Scattered: Modern Password Cracking as a Methodology
Lee Wangenheim & Joshua Platz

Inhumane: Making Security Hard on Criminals, Easy on Everyone Else
J Wolfgang Goerlich
(Not Posted)

Big Plane, Little Plane: How common aviation attacks affect airlines and general aviation
Phil Polstra

Bundespwn leak!!!! If you have noting to hide you have nothing to fear......
Arron "Finux" Finnon
(Not Recorded)

Closing Ceremony & Prizes
EggDropX
(Not Recorded)

PSD2, SCA, WTF?!
Kelley Robinson

Nerding out with machine data
Nick Maier

Breaking NBAD and UEBA Detection
Charles Herring
(Not Recorded)

The Past, Present & Future of Cyber Threats
Chris Russell

Symbolically executing a fuzzy tyrant
Lojikil

A Theme of Fear: Hacking the Paradigm
Catherine Ullman

Q&A on our industry and other things that are top of mind
Chris Roberts

How to Make a Honeypot Stickier (SSH*)
Jose Hernandez

Data Access Rights Exploits under New Privacy Laws
Amber Welch

Data Security: How to avoid an embarrassing breach
Matt "mattrix" Hoy

MSSPs are great...and other lies I tell myself
Scott Thomas

Devaluing Cloud Breaches while Gaining Safe Harbor
Eric Wolff

Good Cyber Hygiene and using analytics to drive the need for it on Print
David Rose

Varna: Custom, robust AWS monitoring for cents a day using EQL
Adam Ringwood

A Day in the Life of a Security Operations Center: What do you get when you partner with cybersecurity experts?
Milan Patel

Malicious Cryptomining is Exploding: Are you at risk?
John Fatten

Threat Hunting Like a Gutter Punk
Trey Underwood
(Not Recorded)

The Economic's of Cyber Security
Todd White
(Not Recorded)

Dance, Fancybear, Dance: a study in macOS
Cat Self

The Spider Economy: Emotet, Dridex, and TrickBot, Oh My
Adam Hogan

Cloudy with a chance of SecOps
Ricardo Lafosse & Matthew Speakman

Destroy Everything
Tom Somerville

Surfing and Security - Ride the wave
Chris Burrows

The Importance of IT Asset Visibility
Brian Berk

From Idea to Badge: Getting Started & Finished with badge making
Dave Schwartzberg

CyberCrime Trends of 2019: A Look Into Cybercrime, Nation State and Ransomware Monetization Activities
Jared Phipps

Using Next Generation Fuzzing Tools: Fixing Bugs and Writing Memory Corruption Exploits
Dr. Jared DeMott & John Stigerwalt

What Are We Doing Here? Rethinking Security
Jeff Man

How Hackers Evade Your AI-enabled Endpoint Detection Tools
Dan Allen

Hillbilly Storytime - Pentest Fails
Adam Compton

Want to Play a Game..
John DeRyke

The Hacker Hippocampus: Meet your brain on games
Chloe Messdaghi

Departing Employees = Departing Data
Todd Thorsen

Beginner's Guide to Mobile Applications Penetration Testing
Whitney Phillips

Understanding how public places introduce additional risks to business travelers & how the tools used by hackers continue to evolve
Len Noe

Million Dollar Malware: Using the Viper Framework to Investigate and Track Ryuk's Success
Colin Cowie

The Importance of Relevant, Timely, and Qualitative Intelligence Analysis
Aamil AK

Deepfakes: If anything can be real then nothing is real
April C Wright

Network exploitation of IoT ecosystems
Fotios (ithilgore) Chantzis

Download videos from:
https://archive.org/details/20191026_20191026_2029

Printable version of this article

15 most recent posts on Irongeek.com:


    If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

    Copyright 2019, IronGeek
    Louisville / Kentuckiana Information Security Enthusiast