GrrCON 2018 Videos
These are the videos of the presentations from GrrCON 2018. Big thanks to EggDropX and Jaime for having me out, and my video crew (paint27, Erick, Jason, brettahansen, Angela, Luke & others) for recording.
An
Inconvenient Truth: Evading the Ransomware Protection in Windows
10
Soya Aoyama
Everyday De-Obfuscation
Kyle Shattuck
(Not Recorded)
So how the actual f**k did i end up as root here
Arron "Finux" Finnon
(Not Recorded)
You're
right, this talk isn't really about you!
Jayson E Street
Analyzing
Pwned Passwords with Apache Spark
Kelley Robinson
How to rob a bank over the phone
Joshua "Naga" Crumbaugh
Vibing
Your Way Through an Enterprise: How Attackers are Becoming More
Sneaky
Matthew Eidelberg
Hacker Family Feud
(Not Recorded)
Keynote
Matthew Mattrix, Hoy
(Not Recorded)
PwnBook:
Penetrating with Google's Chromebook
Corey Batiuk
Life,
Death + the Nematodes: Long live Cyber Resilience!
Chad Calease
Data
Data Everywhere but No One Stops to Think
Scott Thomas, Carl Hertz & Robert Wagner
Automation
and Open Source: Turning the Tide on Attackers
John Grigg
w.e
w.e Internet Explorer Does What It Wants
Aaron Heikkila
Pacu:
Attack and Post-Exploitation in AWS
Spencer Gietzen
Do it Fast, Do it Right: Incident Response to Counter Modern
Attackers
Aaron Shanas
(Not Recorded?)
Hacker
Tools, Compliments of Microsoft
David Fletcher & Sally Vandeven
Duncan Manuts
(Not Recorded)
Wrap up
(Not Recorded)
Over
the Phone Authentication
Spencer Brown
Designing
a Cloud Security Blueprint
Sarah Elie
To
Fail is Divine
Danny Akacki
Living the Phreaker Life
David "Heal" Schwartzberg
(Not Recorded)
Zero
to Owned in 1 Hour: Securing Privilege in Cloud, DevOps, On-Prem
Workflows
Brandon Traffanstedt
Automate the boring Incident Response stuff
Dan Cao
(Not Recorded)
emulacra
and emulation: an intro to emulating binary code with Vivisect
Atlas of D00m
Social Engineering At Work: How to use positive influence to
gain management buy-in for anything
April Wright
(Not Recorded)
Threat
Hunting: the macOS edition
Megan Carney
The
Hybrid Analyst: How Phishing Created A New Type of Intel Analyst
Rachel Giacobozzi
Dragnet:
Your Social Engineering Sidekick
Truman Kain
Guaranteed
Failure: Awareness The Greatest Cyber Insanity
Joshua "Naga" Crumbaugh
Threat
Modeling: How to actually do it and make it useful
Derek Milroy
How
this 20 Year Old Changed the Security Industry
James O'Neill
Stop
Boiling The Ocean! How To Succeed With Small Gains
Joel Cardella
Do
I have a signature to detect that malware?
Ken Donze
2018
SIEM Trends: What is my Mean Time to Value?
Bill Lampe
Advanced
Attackers Hiding Inside Encrypted Traffic at the Endpoint
Jared Phipps
More
Tales from the Crypt-Analyst
Jeff Man
My
First year in Application Security
Whitney Phillips
Cloud Based Security Alerting from Scratch
John Ventura
(Not Recorde)
Career
Risk Management: 10 tips to keep you employed
Chris Burrows
Red
vs Blue: The Untold Chapter
Aaron Herndon & Thomas Somerville
Analyzing
Multi-Dimensional Malware Dataset
Ankur Tyagi
Physicals,
Badges, and why it matters
Alex Fernandez-Gatti
Murky Waters: Diving into Phishing Kits
Kyle Eaton
(Not Recorded)
InSpec:
Compliance as Code
Kent picat, Gruber
Bounty
Hunters
J Wolfgang Goerlich
Download videos from:
https://archive.org/details/GrrCON2018
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek