Recorded at AIDE 2012. Big thanks to Bill Gardner (@oncee) for having me out to record.
Anti-Forensics: Occult Computing
Adrian Crenshaw
Out of Character: Use of Punycode and Homoglyph Attacks to Obfuscate URLs for
Phishing
Adrian Crenshaw
An Introduction to Traffic Analysis: A Pragmatic Approach
Jon Shipp
Pen Testing Web 2.0: The Client
Jeremy Druin
Breaking into Security
Frank J. Hackett and Justin Brown
Sabu the Hacker: The capture, the crimes, the damage done, the slip, the
apprehension, and the fallout.
Dr. Marcus Rogers
Jill McIntyre
Boris Sverdlik
Ronald Layton, U.S. Secret Service
BNAT Hijacking: Repairing Broken Communication Channels
Jonathan Claudius
Setting up BackTrack and automating various tasks with bash scripts
Lee Baird
Going on the Offensive - Proactive Measures in Securing YOUR Company
Dave Kennedy
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek