GrrCON 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)
GrrCON 2015 Videos
These are the videos of the presentations from GrrCON 2015.
Big thanks to EggDropX and Jaime for having me out, and my video crew
(Chris, Justine, Aaron & Brian) for
recording.
AntiFreeze
Subject matter to be determined by the number of federal agents present in the audience
Chris Roberts
Breaking in Bad (I,m The One Who Doesn,t Knock)
Jayson Street
Process The Salvation of Incident Response - Charles Herring
the art of hacking a human.
Zee Abdelnabi (not posted)
But Can They Hack?: Examining Technological Proficiency in the US Far Right
Tom Holt
The wrong side of history - everything that is old is new again
Arron Finnon
Poking The Bear
Mike Kemp
The Hitch Hikers Guide to Information Security
Kellman Meghu
Backdooring Git
John Menerick
Spanking the Monkey (or how pentesters can do it better!)
Justin Whithead, Chester Bishop
Adding +10 Security to Your Scrum Agile Environment
tehEx0dus
How I Got Network Creds Without Even Asking: A Social Engineering Case Study
Jen Fox
Through The Wire
NinjaSl0th
(not recorded)
Shooting Phish in a Barrel and Other Terrible Fish Related Puns
infosystir
This title intentionally left blank
geekspeed
(not recorded)
This Is All Your Fault
Duncan Manuts
The Safety You Think You Have is Only a Masquerade
Nathan Dragun
Bumper Massage
Security Incident Response
Derek Milroy
Hacking the Next Generation
HealWHans
Findings Needles in a Needlestack: Enterprise Mass Triage
Keven Murphy
My boss is our biggest vulnerability
Aaron Shaver (No show or not recorded)
Punch and Counter-punch Part Deux: Web Applications
J Wolfgang Goerlich, NerdyBeardo
Application Recon - The Lost Art
Tony Miller
The Hand That Rocks the Cradle: Hacking Baby Monitors
Mark Stanislav
Software Security IWR
Thomas "G13" Richards
Cyber 101 - Upstaring your career in a leading industry
Johnny Deutsch
Understanding and Improving the Military Cyber Culture
Dariusz Mikulski
AV is not dead!
Charles Parker, II
(Video screw up, not recorded)
Harness the Force for Better Penetration Testing
Patrick Fussell
Targeted Attacks and the Privileged Pivot
Mark Nafe
Shell scripting live Linux Forensics
Dr. Phil Polstra
Can you patch a cloud?
Scott Thomas
Is it EVIL?
Chaoticflaws
Submerssion Therapy
Ticking me off: From Threat Intel to Reversing
Juan Cortes
Securing Todays Enterprise WAN
Andy Mansfield
Footprints of This Year's Top Attack Vectors
Kerstyn Clover
Welcome to the Internet of (insecure) things
Chandler Howell
(not recorded)
Medical Devices, the Flat Network of Unknown Risks
Arlie Hartman
(not recorded)
Phones and Privacy for Consumers
Matt Hoy (mattrix) and David Khudaverdyan (deltaflyer)
Path Well-Traveled: Common Mistakes with SIEM
Nick Jacob
On the care and feeding of cyber ninjas
atlas
(not posted)
How compliance doesn't have to suck….at least totally
Robert Carson & Bradley Stine
What is a cloud access broker and do I need one?
Tom Doane
Security Frameworks: What was once old is new again
Brian Wrozek
Attacks Against Critical Infrastructures Weakest Links
Jonathan Curtis
There is no perimeter: Lessons from historical fortresses on how to defend our organizations
Nathaniel "Dr. Whom" Husted
(not recorded)
Physical - Internal - Remediation - old title Stupid Pentester Tricks - OR - Great Sysadmin Tips
Alex Gatti
(not recorded)
Wireless Intrusion Detection Systems with the Raspberry Pi
Chris J
No One Cares About Your Data Breach Except You ... And Why Should They?
Joel Cardella
Download videos from:
https://archive.org/details/GrrCON2015