A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


ShmooCon Firetalks 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)

ShmooCon Firetalks 2013

These are the videos I have for the ShmooCon Firetalks 2013.

Thanks to:
http://novahackers.blogspot.com
http://www.irongeek.com

“Thin Slicing a Black Swan: A Search for the Unknowns” by Michele “@mrsyiswhy” Chubirka & Ronald Reck

“When Did the Smartphone Pentest Framework Get Awesome?” by by Georgia “@georgiaweidman” Weidman

“ShellSquid: Distributed Shells With Node” by Tom Steele

“If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone” by Nicolle “@rogueclown” Neulist

“Becoming a Time Lord – Implications of Attacking Time Sources” Joe “@joeklein” Klein

“Swinging Security Style: An Immodest Proposal” by Wendy “@451wendy” Nather

“Drones: Augmenting your cyber attack tool bag with aerial weapon systems” by Zac “@ph3n0” Hinkel

“Managed Service Providers: Pwn One and Done” Damian “@integrisec” Profancik

“No Tools? No Problem! Building a PowerShell Botnet” Christopher “@obscuresec” Campbell

“Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling” John “@pinfosec” Willis

“Protecting Big Data From Cyber APT in the Cloud” Bill “@oncee” Gardner

“Writing a Thumbdrive for Active Disk Antiforensics” Travis “@travisgoodspeed” Goodspeed

Night 1


Thin Slicing a Black Swan: A Search for the Unknowns” by Michele “@mrsyiswhy” Chubirka & Ronald Reck









When Did the Smartphone Pentest Framework Get Awesome?” by Georgia “@georgiaweidman” Weidman









ShellSquid: Distributed Shells With Node” by Tom Steele









If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone” by Nicolle “@rogueclown” Neulist









Becoming a Time Lord – Implications of Attacking Time Sources” Joe “@joeklein” Klein









Swinging Security Style: An Immodest Proposal” by Wendy “@451wendy” Nather









Night 2

Drones: Augmenting your cyber attack tool bag with aerial weapon systems” by Zac “@ph3n0” Hinkel









Managed Service Providers: Pwn One and Done” Damian “@integrisec” Profancik









No Tools? No Problem! Building a PowerShell Botnet” Christopher “@obscuresec” Campbell









Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling” John “@pinfosec” Willis









Protecting Big Data From Cyber APT in the Cloud” Bill “@oncee” Gardner









Writing a Thumbdrive for Active Disk Antiforensics” Travis “@travisgoodspeed” Goodspeed








Downloads:
https://archive.org/details/ShmooconFireTalks2013
 

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast