Feel free to include my content in your page via my RSS feed Follow @irongeek_adc
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment:
ShmooCon Firetalks 2013 (Hacking Illustrated Series InfoSec Tutorial Videos) ShmooCon Firetalks 2013
These are the videos I have for the ShmooCon Firetalks 2013. Thanks to: http://novahackers.blogspot.com http://www.irongeek.com “Thin Slicing a Black Swan: A Search for the Unknowns” by Michele “@mrsyiswhy” Chubirka & Ronald Reck “When Did the Smartphone Pentest Framework Get Awesome?” by by Georgia “@georgiaweidman” Weidman “ShellSquid: Distributed Shells With Node” by Tom Steele “If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone” by Nicolle “@rogueclown” Neulist “Becoming a Time Lord – Implications of Attacking Time Sources” Joe “@joeklein” Klein “Swinging Security Style: An Immodest Proposal” by Wendy “@451wendy” Nather “Drones: Augmenting your cyber attack tool bag with aerial weapon systems” by Zac “@ph3n0” Hinkel “Managed Service Providers: Pwn One and Done” Damian “@integrisec” Profancik “No Tools? No Problem! Building a PowerShell Botnet” Christopher “@obscuresec” Campbell “Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling” John “@pinfosec” Willis “Protecting Big Data From Cyber APT in the Cloud” Bill “@oncee” Gardner “Writing a Thumbdrive for Active Disk Antiforensics” Travis “@travisgoodspeed” Goodspeed
These are the videos I have for the ShmooCon Firetalks 2013.
Thanks to: http://novahackers.blogspot.com http://www.irongeek.com
“Thin Slicing a Black Swan: A Search for the Unknowns” by Michele “@mrsyiswhy” Chubirka & Ronald Reck
“When Did the Smartphone Pentest Framework Get Awesome?” by by Georgia “@georgiaweidman” Weidman
“ShellSquid: Distributed Shells With Node” by Tom Steele
“If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone” by Nicolle “@rogueclown” Neulist
“Becoming a Time Lord – Implications of Attacking Time Sources” Joe “@joeklein” Klein
“Swinging Security Style: An Immodest Proposal” by Wendy “@451wendy” Nather
“Drones: Augmenting your cyber attack tool bag with aerial weapon systems” by Zac “@ph3n0” Hinkel
“Managed Service Providers: Pwn One and Done” Damian “@integrisec” Profancik
“No Tools? No Problem! Building a PowerShell Botnet” Christopher “@obscuresec” Campbell
“Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling” John “@pinfosec” Willis
“Protecting Big Data From Cyber APT in the Cloud” Bill “@oncee” Gardner
“Writing a Thumbdrive for Active Disk Antiforensics” Travis “@travisgoodspeed” Goodspeed
Printable version of this article
15 most recent posts on Irongeek.com:
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek Louisville / Kentuckiana Information Security Enthusiast