Bsides Las Vegas 2015 Videos (Hacking Illustrated Series InfoSec Tutorial
Videos)
BSides Las Vegas 2015 Videos
These are the videos from the
BSides Las Vegas conference. Thanks to all of
the BSides Crew (Steven, Evan, Will, AJ, Jamison and others I'm forgetting) for having me out to help record and render the videos.
@bsideslv,
@banasidhe,
@jack_daniel,
@SciaticNerd and all my video crew
Above The Ground Plane
Underground Wi-Fi Hacking for Web Pentesters
Greg Foss
#radBIOS: Wireless networking with audio
Richo Healey
I Amateur Radio (And So Can You!)
Kat Sweet
How to WCTF
Russell Handorf, Russell_Handorf III, Russell Handorf II
Better Spectrum Monitoring with Software Defined Radio
Michael Ossmann
Wi-Door - Bind/Rev Shells for your Wi-Fi
Vivek Ramachandran
Software-Defined Radio Signal Processing with a $5 Microcontroller.
Jared Boone
All Your RFz Are Belong to Me – Software Defined Radio Exploits
Balint Seeber
Breaking Through Cellular Gateway Devices
Mike Brancato (Not recorded?)
Breaking Ground
Injection on Steroids: Code-less Code Injections and 0-Day Techniques
Tomer Bitton, Udi Yavo
Getting the data out using social media
Dakota Nelson, Gabriel Butterick, Byron Wasti, Bonnie Ishiguro
An introduction of the Kobra, a client for the Badger version 2.0, providing tactical situational awareness, physical tampering protection, and automatic process mitigation
Edmond Rogers, Ahmed Fawaz, William Rogers
NSA Playset: Bridging the Airgap without Radios
Michael Leibowitz
Your Electronic Device, Please: Understanding the Border Search Exception & Electronic Devices
Whitney Merrill
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
William Ballenthin, Claudiu Teodorescu, Matthew Graeber
TAPIOCA (TAPIOCA Automated Processing for IOC Analysis)
Ryan J. Chapman, Moses Schwartz
Building an Empire with PowerShell
Will Schroeder, Justin Warner
Remote Access, the APT
Ian Latter
Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)
Paul Asadoorian, Nick Curran
Common Ground
Barely Legal: the Hacker's Guide to Cybersecurity Legislation
Jen Ellis
Pentesting with Docker
Tom Steele
Don't hate the Disclosure, Hate the Vulnerability: How the government is bringing researchers and vendors together to talk vulnerability disclosure.
Allan Friedman
How Portal Can Change Your Security Forever
Katrina Rodzon
Angler Lurking in the Domain Shadows
Nick Biasini
A hackers guide to using the YubiKey - how to add inexpensive 2-factor authentication to your next project.
Russ Gritzo
Haking the Next Generation
David Schwartzberg
Backdooring MS Office documents with secret master keys
Yoshinori Takesako, Shigeo Mitsunari
Yes, you too can perform daring acts of Live Acquisition.
D0n Quix0te
For love of country: 15 years of Security Clearance Decisions
Kevin Tyers
Rethink, Repurpose, Reuse... Rain Hell
Michael Zupo
Adversary Intelligence from Conflict to Consensus
Alex Valdevia & Rich Barger
Why does InfoSec play bass? And other observations about hacker culture.
Adrian Sanabria
Ground Truth
Verum - How Skynet Started as a Context Graph
Gabriel Bassett
When steganography stops being cool
David Sancho
Analogue Network Security
Winn Schwartau
Crema: A LangSec-inspired Language
Sergey Bratus, Jacob Torrey
Making & Breaking Machine Learning Anomaly Detectors in Real Life
Clarence Chio
Have I seen you before?
Daniel Reich, Maxim Pevzner
Who Watches the Watchers? Metrics for Security Strategy
Michael Roytman
No More Fudge Factors and Made-up Shit: Performance Numbers That Mean Something
Russell Thomas
Advancing Internet Security Research with Big Data and Graph Databases
Andrew Hess
Intro to Data Science for Security
Rob Bird, Alex Shagla-McKotch
I Am The Cavalry
IATC Track Introduction and Overview
Josh Corman @joshcorman, Nicholas J. Percoco
Intro and Hack the Future
Keren Elazari
State of Medical Device Cyber Safety
Beau Woods, Scott Erven
How can we ensure safer Automobiles?
Chris Nickerson, Josh Corman @joshcorman
How can we ensure safer Medical Devices?
Beau Woods, Scott Erven
Leading in a 'Do'-ocracy
Chris Nickerson
State of Automotive Cyber Safety
Josh Corman @joshcorman, Craig Smith
Passwords
Passwords
Privacy Keystroke Dynamics
Per Thorsheim
Unspeakable passwords pronounceable or Diceware
Jeffery Goldberg
Pushing on String: Adventures in the 'Don't Care' Regions of Password Strength
Cormac Herley
What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
Rick Redman, Dale Corpron
Breachego
Christian Heinrich, Daniel Cuthbert
Tell Me Who You Are, and I Will Tell You Your Lock Pattern
Marte Løge
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
Eduardo Novella
Poppin' (Digital) Locks
Devin Egan
Privileges in the Real World: Securing Password Management
Andrey Dulkin
Security Questions Considered Harmful
Jim Fenton
I
Forgot My Password
Michal Špaček
Harvesting Passwords from Source Code, Scripts, and Code Repositories
Philippe Paquet
Towards Standardizing Comparisons of Password Guessability
Sean Segreti, Blase Ur
Stronger Password-Based Encryption Using I/O Hardness
Greg Zaverucha
Auth for Encrypted Services with Server Side APT
Steve Thomas
Blind Hashing
Jeremy Spilman
PBKDF2: Performance Matters
Joseph Birr-Pixton
Password Alert by Google
Drew Hintz
No More Graphical Passwords
Mark Burnett
How Secure Are Multi-Word Random Passphrases?
Bruce K. Marshall
Are You Sure That You Still Need Passwords?
Bjorn Pirrwitz, Daniele Vantaggiato
Proving Ground
Speaking Metrics to Executives
Michael St. Vincent
Dropping hell0days: Business Interaction for Security Professionals - Or Anyone Else
Elliot Johnson
Practice Safe Cyber: The Miseducation of American Students on Internet Safety
Vivienne Pustell
Check That Certificate
Jacob Jernigan, Andrew Sorensen
The Journey To ICS
Larry Vandenaweele
Catching Linux Post-Exploitation with Auditd
Eric Gershman
Adding +10 Security to Your Scrum Agile Environment
Josh Louden
Fight
back – raising awareness
Petri Koivisto @infosec
What the heck is this radio stuff, anyway?
Nick Kartsioukas
SIEMple technology
Bill Davison
How I learnt hacking in highschool
Lokesh Pidawekar
ZOMG It's OSINT Heaven!
Tazz Tazz
Classic Misdirection: Social Engineering to Counter Surveillance
Peter Clemenko III
Phishing: Going from Recon to Credentials
Adam Compton, Eric Gershman
Social Media in Incident Response Program
JoEtta LeSueur
Cats and Mice - Ever evolving attackers and other game changers
Eric Kmetz
FAA, FTC, FCC - FU: How Three F'ing Agencies are Shaping Info Sec
Elizabeth Wharton
+10 Knowledge: Sharing What You Learn For the Benefit of the Everyman.
Ashley Miller
Maximizing Bro Detection
John B. Althouse
Embedding Web Apps in MITMProxy Scripts
Chris Czub
Out of Denial: A 12-Step Program for Recovering Admins
Paul Lee
Serial Box - Primer for dealing with Serial and JTAG for basic hardware hacking
Matthew Jakubowski
What Lurks in the Shadow
Cheryl Biswas
Why We Can't Have Nice Things: Original Research on Conflict Resolution Styles in Information Security & Risk Management
Rachael Lininger
Download Videos From:
https://archive.org/details/BSidesLV2015