Irongeek.com

Old News and Change Log:

07/13/2019 OISF 2019 Videos
These are the videos from the OISF Anniversary Event

Introduction
Dr. John Carls/Paul Hankins

UBoot to Root
Deral Heiland

A Discussion of Secrets
Robert Stewart

Continuous Skills Improvement For Everyone
Matt Scheurer

DLP Demystified
Micah Brown

Pixel Tracking: How its used and abused
Barry Kimball

06/22/2019 BSides Cleveland 2019 Videos
These are the videos from the Bsides Cleveland conference. Thanks to Rich, ninewires, justinschmitt &  as the video team. Thanks to twuntymcslore & RockieBrockway for being con mom & dad.

Keynote
David Kennedy

Operationalizing the MITRE ATT&CK Framework
Robert Olson

Markets for Malware
Adam Hogan

The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive
Matthew Gracie

Calls to Arms: US Elections Hacking
Damian Huising

The Overlooked Cyber-Security Risk: 3rd Party Risk Management
Rose Songer

The Politics of Cyber
Ian Thornton-Trump

Unix: the Other White Meat
Adam Len Compton & David Boyd

Hack for Show, Report for Dough
Brian King

Early Detection through Deception
Jason Nester

Eval Villain: Simplifying DOM XSS and JS Reversing
Dennis Goodlett

(Most Audio Missing)

Securing the DOM from the Bottom Up
Mike Samuel

(Missing Most Audio)

Data Access Rights Exploits under New Privacy Laws
Amber Welch

Public Partnership Panel for Security Response
Jeremy Mio and Others

Automating Windows Kernel Analysis With Symbolic Execution
Spencer McIntyre

Incident response on macOS
Thomas Reed

Getting youth interested in infosec from a youth's perspective.
Tristan Messner

Keynote
Joshua Corman
(Not Recorded)

06/15/2019

ShowMeCon 2019 Videos
These are the videos ShowMeCon 2019. Thanks to Renee & Dave Chronister (@bagomojo) and others for having me out to record and speak. Also thanks to my video crew @r3tr0_cod3x, James, Aaron, Jon, @AlexTShell, @Mayer302, @MatthewRekos  and some other people I may have forgotten.

Welcome

A Practical Approach to Purple Teaming
Matt Thelen

Some assembly required, instructions not included
Dave Chronister

The Dark Side of Physical Access Control Systems
Valerie Thomas

The Art of Cyberwar: A Foundation and Framework for the Development of TTPs
Kevin L. Johnson

Human Centered Design and You: Hack Your Life
Hudson Harris

The rising geopolitical cyber power
Kurt Aubuchon

Cracking the Code - Hacking the Human Mind
Scott Holman

Confessions of Really Bad SysAdmins
Andy Thompson

Sync Your Sh*t: Why it's time you paid attention to time
John Clark

How to screw up your Incident Response investigation in 10 steps or less
Vadon Willis

Control of Unclassified Information in Non-Federal IT Systems - Or What You Don't Know Can Cost You
Tim Grace

Why should your employees know how to phish
Mike Morris

Redesigning Password Authentication for the Modern Web
Cliff Smith

Penetration Testing: The Good, Bad, and the Ugly of Vendor Management, Reporting and Risk Management (or lack thereof)
Justin L. Bauman

Why your red team shouldn't be snowflakes
Isaiah Sarju

0Day to HeroDay: Bringing a company from scorched earth to a modern security organization
Ryan Wisniewski

The Great Explainer: Feynman and Standing on the Shoulders of Giants
Kevin Johnson

TLSv1.3: Minor Version, Major Changes
John Wagnon

I PWN thee, I PWN thee not!
Jayson Street

06/02/2019

 

Circle City Con 2019 Videos
These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to @irishjack, @TheHomoHacker, @Paint27, @songsthatsaved, @nogoodrobot, @kitwessendorf, @cxstephens, @uncrustabl3  and others for helping set up AV and record.

Opening

Data Access Rights Exploits under New Privacy Laws
Amber Welch

How to reach and teach youth about Cybersecurity (if anybody will let you)
Jason Smith

More Tales from the Crypt...Analyst
Jeff Man

Could Static Code Analysis and Secure Coding have Saved the Death Star?
Mary Waddick

Ill Complete My Threat Model Later Mom!: Infosec in Middle School.
Ashley Benitez Smith

Cons & Careers
Steven Bernstein

3D printing canister-launchable drones for city-scale wardriving
Glytch Tech

The Hunter Games: How to find the adversary with Event Query Language
Ross Wolf

Star Wars: How an ineffective Data Governance Program destroyed the Galactic Empire
Micah Brown

Security lessons from the Woofmutt
Chris Roberts

What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing
Priyank Nigam
(Not Recorded)

It's Coming From Inside the House: An Inside-Out Approach to NodeJS Application Security
Yolonda Smith

Get off my lawn or are we looking for the right people?
Mike (Shecky) Kavka

Endpoint Security, Swimming Through the Snake Oil
Dan Beavin

Do You Have What It Takes? How to Support Your Career From Community Involvement
Kathleen Smith

Catching the Guerrilla: Powershell Counterinsurgency
Aaron Sawyer

SigInt for the Masses: Building and Using a Signals Intelligence Platform for Less than $150
Josh Conway

InfoSuck: The Nasty Bits Of The Industry We Want To Tell Noobs But Aren't Allowed To In Polite Company.
Danny Akacki

Standardizer: a standardization framework for your security alerts
Christian Burrows

Call Of Duty, Modernest Browser Warfare v2
Dhiraj Mishra
(Did not happen)

Information Security Practice Principles a Rosetta Stone for information security work
Susan Sons

What Can Data Science Do for Security?
Wendy Edwards

Deepfakes: If anything can be real then nothing is real
April Wright
(Not Recorded)

Evicting the Password from the Digital Estate
Alex Chalmers

A Theme of Fear: Hacking the Paradigm
Catherine Ullman

Beginning DFIR - How to get started with Cooties
Lisa Wallace

Of CORS it's Exploitable! What's Possible with Cross-Origin Resource Sharing?
Rebecca Deck

Nexus Zeta - How a newbie hacker managed to create a monster botnet
Adi Ikan

5G: Security Pitfalls and Considerations
Swapnil Deshmukh
(Did not happen)

Training and Education for the New Realities of Privacy and Security
Mitchell Parker

Container Security Deep Dive
Yashvier Kosaraju

Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape
Gabrielle Hempel

One Random Insecure Wep Application Please (ORIWAP)
Nancy Snoke

an Implantable Computer
Doug "c00p3r" Copeland

Modern AppSec Gotchas
Fletcher Heisler

A Few Things Right: Insights from Live and Simulated Incident Response
Chad Calease

The Resilient Reddit C2
Zach Zenner

Behind The Locked Door: we built an escape room for security awareness
Matthew Southworth Christian Bobadilla

F! Attribution
Xena Olsen Jared Peck

Inside Out Security - Building Castles not Warehouses
Alyssa Miller

Failure Is Not an Option: Developing Realistic Disaster Recovery Tests
Colin Campbell

Wibbly Wobbly: Designing Security for Systems that are Bigger on the Inside
Wolfgang Goerlich

Closing Ceremonies

 

05/19/2019 NolaCon 2019 Videos
Recorded at NolaCon 2019. Thanks to @CurtisLaraque, @mikearbrouet, @openbayou, @takanola, @therealmacjeezy, Jason, Cole & @klulue for the video recording help, and @nola_con, @erikburgess_, @NolaConYvonne & Rob for having me down to record.

One Random Insecure Wep Application Please (ORIWAP)
Nancy Snoke

Understanding XSS
Christina Mitchell

Social Engineering At Work - How to use positive influence to gain management buy-in for anything
April C. Wright

DNS - Strategies for Reducing Data Leakage & Protecting Online Privacy
Jim Nitterauer

Automating Hashtopolis
Evil Mog

"It's Malware Time" - A Bar Crawl from Skunked Homebrew to Rotten Apples
Erika Noerenberg

Breaking into Cyber: How the hell are you supposed to get started?
Josh Millsap

After Mirai: Cyber Security Implications of IoT Botnet Proliferation Against Critical Infrastructure
Paul W. Brager Jr M.Sci, CISSP, GICSP, CISM

Making an internal Let's Encrypt relay server
Josh Harvey

Keynote - I PWN thee, I PWN thee not!
Jayson E. Street

Breaking Into Your Building: A Hacker's Guide to Unauthorized Physical Access
Brent White. Tim Roberts

Formula for a Bug Bounty Program
Chris Holt

Forensics Phish Tank: Breaking Down Analysis of Advanced Phishing Emails
Joe Gray & Sophia Fadli

Baking Your Anomalous Cookies
Jim Allee

Waiter, there's a compiler in my shellcode!
Josh Stone

Empathy for the (Devel)oper: Lessons Learned Building An Application Security Module
Yolonda Smith

MORE Tales From the Crypt...Analyst
Jeff Man

IR with Volatility Framework
Evan Wagner

Let's Talk About WAF (Bypass) Baby
Brett Gravois

Behavioral Security and Offensive Psychology at Scale
Josh Schwartz. Samantha Davison

My making of a Metasploit Module
Aaron Ringo

Don't Panic! A Beginner's Guide To Hardware Hacking
Phoenix Snoke

The Jazz Improv of Infosec
Damon J. Small

Elliptic Curve Cryptography: What it is and who needs it
Michele Bousquet

04/28/2019 BSidesCharm 2019 Videos
These are the videos BSidesCharm (Baltimore) 2019. Thanks for inviting me down to record. Thanks to my video team Robert, Ethan, Cory, Tim Steven, Trevor, Tom, Menachem and Josh.

Opening

Keynote
Matt Blaze

Embrace the Red: Enhancing detection capabilities with adversary simulation
Mauricio Velazco

I'lll Complete My Threat Model Later Mom!: Infosec in Middle School
Ashley Benitez Smith

Cleaning the Apple Orchard - Using Venator to Detect macOS Compromise
Richie Cyrus

More Tales From the Crypt...Analyst
Jeffrey Man

Anatomy & Evolution of a Fast Flux Malware Campaign
Emily Crose

COM Under The Radar: Circumventing Application Control Solutions
Jimmy Bayne

On The Line: What Phishing Really Impacts
Steven Becker

Automated Adversary Emulation
David Hunt

Comparing Malicious Files
Robert Simmons

How to Start a Cyber War: Lessons from Brussels
Chris Kubecka

You Moved to Office 365, Now What?
Sean Metcalf

You're Not as Safe as You Think: Clearing Up Common Security Misconceptions
Joshua Meyer

Keynote: The Declarative Future
Liam Randall

Exploring Community Volunteering Through a Career Development Lens
Kathleen Smith and Doug Munro

Defense in Depth Against DDoS Diminishes Dollars Destroyed
Daniel Gordon

Reasonable Rapid Recognition and Response to Rogues
Craig Bowser

BloodHound From Red to Blue
Mathieu Saulnier

A Code Pirate's Cutlass: Recovering Software Architecture from Embedded Binaries
evm

Technical Leadership: It's Not All Ones and Zeros
Timothy Schulz

Hunting for Threats in Industrial Environments and Other Scary Places
Nick Tsamis

It's Malware Time - A Bar Crawl from Skunked Homebrew to Rotten Apples
Erika Noerenberg

J-J-J-JEA Power
James Honeycutt

What did the SIEM Say?
JR Presmy and Shawn Thomas

Using Bashfuscator to Generate Bash Obfuscation
capnspacehook

Closing

04/05/2019 Hacker/Infosec Con Types & Getting More Out Of Hacker/Infosec Conferences
03/01/2019 BSides Columbus 2019 Video
These are the videos from the BSides Columbus Ohio conference. Thanks to Mitch & Mike Spaulding for having me up and those who manned the video rigs such as Cody, Matt, Dillon, Nick, Cole Chris and others whose name I can't seem to remember in my old age..

Opening

Morning Keynote Featuring Runa Sandvik
Runa Sandvik

HACKERS, HOOLIGANS, HEISTS, & HISTORY
Brian Contos

Scrapping for Pennies: How to implement security without a budget
Ryan Wisniewski

Check Your Privilege (Escalation)
Kate Broussard

Wow, it really is always DNS! Becoming a Part of the DDoS Problem ( on purpose ).
Cody Smith

Unix: The Other White Meat
Adam Compton and David Boyd

Puppet Masters: How Social Engineers Continue to Pull Our Strings
Erich Kron

E-ZHack: An Update on SDR and Toll Booth Reverse Engineering
Kyle Westhaus

Mobile App Vulnerabilities - The Bad, The Worse And The Ugly
Ray Kelly

Mixing and Baking a New AppSec Person
Bill Sempf

(Some Missing Audio)

How Online Dating Made Me Better at Threat Modeling
Isaiah Sarju

What On Earth Is Quantum Computing?!? (And will it break all my encryption?)
Craig Stuntz

Battling Magecart: The Risks of Third-Party Scripts
Kevin Gennuso

Ship Hacking: Data on the Open Seas
Brian Olson

Common Developer Crypto Mistakes (with illustrations in Java)
Kevin Wall

The Overlooked Cyber Security Risk: 3rd Party Risk Management
Rose Songer

The Path to IAM Maturity
Jerod Brennan

Assumed Breach Testing
Brendan O'Connor

API Security: Tokens, Flows and the Big Bad Wolf
Ingy Youssef

Demystifying DMARC: A guide to preventing email spoofing
Sean Whalen

Afternoon Keynote Featuring Craig Hoffman
Craig Hoffman

02/03/2019 BSides Tampa 2019 Videos
These are the videos from the BSides Tampa conference. Thanks to all of the BSides Crew for having me out to help record and render the videos. Special thanks to my video crew: Matthew, Bridget, Patrick, Dan, Mike, Audrey and Chris

Opening

Doesn't It make You WannaCry: Mitigating Ransomware on a Windows Network
David Branscome

RegEx for Incident Response
Daniel Nutting Bryan Turner

Intermediate Physical Security
Justin Wynn

Security Analytics in the Cloud
Marc Baker

How to use 400+M endpoints to build strong AI detection systems
Filip Chytry

20/20 Enterprise Security Monitoring: Seeing clearly with Security Onion
Wes Lambert

Beyond Lockpicking
Brian Etchieson

Social Forensication: A Multidisciplinary Approach to Successful Social Engineering
Joe Gray

Phishing U2F-Protected Accounts
Nikita Mazurov Kenny Brown

Election Hacking: Getting Ready for the Russian Onslaught in 2020
Jeremy Rasmussen

Logging Pitfalls and How to Abuse Them
Kevin Kaminski Michael Music

Personal security while on travel with additional pro-tips from seasoned travellers.
Derek Banks Beau Bullock

Securing Shadow IT
Gene Cronk

Day When Quantum Computers Breaks Crypto
Roger Grimes

An Inside Look At Stopping Unauthorized Sellers & Counterfeiters On Amazon
Bruce Anderson

The Sound of Evil
Wes Widner

Serverless Security Top 10
Tal Melamed

Hacking IoT devices by chaining application security vulnerabilities
Rick Ramgattie

Becoming a Human nMAP! Cultivating a Renaissance Approach for the Social Engineer
Tigran Terpandjian

vCISO Is That the Right Answer
Mike Brooks

12/02/2018 SecureWV/Hack3rcon 2018 Videos
These are the videos of the presentations from Secure West Virginia 2018. Thanks to Justin, Tim, Lacy, Dave, Katie, Kevin, Todd, Alice, Brian, Brandon & Jon for helping record.

Intro/Welcome to SecureWV / Hack3rCon

Keynote - Hackers, Hugs, & Drugs.... Part II
Amanda Berlin

Why The Legal System Needs Your Help
Brian Martin

Mobile devices and you.
Detective Jeremy M. Thompson

The New Age of Ransomware: Cybercriminals Adopt Nation State Techniques
Allan Liska

Outside the Box: How the Internet of Things Poses New Cybersecurity Risks and Challenges the Law
Evan Kime

Applying the principles of Dodgeball: A True Underdog Story to CTFs
Branden Miller

Gun Safety Class
Branden Miller

Python Scripting
Justin Rogosky

Red Hat Enterprise Linux Security Technologies Lab
Lucy Kerner and Roy Williams

Automating Security Operations - on a budget
Jeremy Mio

Security Automation for the Blue Team
Eric Waters

Home Alone: A Pentester Perspective
Craig Vincent & Derek Banks

Simplified Red Hat Enterprise Linux Identity, Authentication, and Authorization management with Microsoft Active Directory and Red Hat Identity Management Trust
Roy Williams

Simple Attribution in Social Media and Websites
Brian Martin

Offensive and Defensive Security with Ansible
Lucy Kerner

High School Competitive Robotics and why you should care.
Charleston Area Robotics Team (CART)

Guaranteed Failure - Awareness The Greatest Cyber Insanity
Joshua Crumbaugh

Developing a Cloud Based Cyber Security Simulation Portal
David Krovich

The Hybrid Home Lab: From Laptop to Cloud
Holden Fenner

Securing your networks with Ansible
Adam Vincent

A deep look at Stack Buffer Overflows and Format String Vulnerabilities
Philip Polstra

Advanced threat hunting with open-source tools and no budget
Joseph DePlato

What's in a Domain Name?
Collin Meadows

Monitoring your home LAN with Python
Zach Tackett

Left of Boom
Ted Corbeill

Your Dead! Now what. How to help your family after your gone.
Steven Truax

A Brief Introduction to Metasploit
Joey Maresca

SecureWV / Hack3rCon Closing / Awards
Benny Karnes

10/19/2018 BSidesRDU 2018 Videos
These are the videos of the presentations from BSidesRDU. Thanks to Cyrus, Brian, James Carl and others for all the work.

Welcome & Opening Remarks
BsidesRDU Staff

Keynote from Shahid Buttar, EFF Director Of Grassroots Advocacy
Shahid Buttar

Approaching Parity: Considerations for adapting enterprise monitoring and incident response (IR) capabilities for efficacy in cloud environments, and how to operationalize these capabilities with a playbook.
Matt

Movement After Initial Compromise
SleepZ3R0 and HA12TL3Y

Our Docker app got hacked. Now what?
Joel Lathrop

Sky-high IR - IR at Cloud Scale
@aarondlancaster

When it rains it pours
Sam Granger

Rise of the Advisor
Neal Humphrey

No Network Needed?!?!
Ron Burkett

WarGames
Justin Hoeckle

10/8/2018 Derbycon 2018 Videos
These are the videos of the presentations from Derbycon 2018. Big thanks to my video jockeys @nightcarnage, @securid, @theglennbarrett, @LenIsham, @curtisko, @bsdbandit, @someninjamaster, @Simpo13, @primestick, @SciaticNerd, @CoryJ1983, @SDC_GodFix, @Skiboy941, @TeaPartyTechie, @livebeef, @buccaneeris, @mjnbrn, @sfzombie13, @kandi3kan3, @paint27, @AlexGatti

Opening

How to influence security technology in kiwi underpants
Benjamin Delpy

Panel Discussion - At a Glance: Information Security
Ed Skoudis, John Strand, Lesley Carhart. Moderated by: Dave Kennedy

Red Teaming gaps and musings
Samuel Sayen

A Process is No One: Hunting for Token Manipulation
Jared Atkinson, Robby Winchester

Fuzz your smartphone from 4G base station side
Tso-Jen Liu

Clippy for the Dark Web: Looks Like You're Trying to Buy Some Dank Kush, Can I Help You With That?
Emma Zaballos

Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework
Joe Rozner

Escoteric Hashcat Attacks
Evilmog

RFID Luggage Tags, IATA vs Real Life
Daniel Lagos

#LOL They Placed Their DMZ in the Cloud: Easy Pwnage or Disruptive Protection
Carl Alexander

Maintaining post-exploitation opsec in a world with EDR
Michael Roberts, Martin Roberts

Hey! I found a vulnerability - now what?
Lisa Bradley, CRob

Foxtrot C2: A Journey of Payload Delivery
Dimitry Snezhkov

Ridesharks
Kaleb Brown

IRS, HR, Microsoft and your Grandma: What they all have in common
Christopher Hadnagy, Cat Murdock

#LOLBins - Nothing to LOL about!
Oddvar Moe

Everything Else I Learned About Security I Learned From Hip-Hop
Paul Asadoorian

Hackers, Hugs, & Drugs: Mental Health in Infosec
Amanda Berlin

Android App Penetration Testing 101
Joff Thyer, Derek Banks

Draw a Bigger Circle: InfoSec Evolves
Cheryl Biswas

I Can Be Apple, and So Can You
Josh Pitts

From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It
Sean Metcalf

MS17-010?
zerosum0x0

The Unintended Risks of Trusting Active Directory
Lee Christensen, Will Schroeder, Matt Nelson

Lessons Learned by the WordPress Security Team
Aaron D. Campbell

IronPython... omfg
Marcello Salvati

Invoke-EmpireHound - Merging BloodHound & Empire for Enhanced Red Team Workflow
Walter Legowski

When Macs Come Under ATT&CK
Richie Cyrus

Abusing IoT Medical Devices For Your Precious Health Records
Saurabh Harit, Nick Delewski

Detecting WMI exploitation
Michael Gough

Gryffindor | Pure JavaScript, Covert Exploitation
Matthew Toussain

Instant Response: Making IR faster than you thought possible!
Mick Douglas, Josh Johnson

The History of the Future of Cyber-Education
Winn Schwartau

State of Win32k Security: Revisiting Insecure design
Vishal Chauhan

Offensive Browser Extension Development
Michael Weber

Protect Your Payloads: Modern Keying Techniques
Leo Loobeek

Jump Into IOT Hacking with the Damn Vulnerable Habit Helper Device
Nancy Snoke, Phoenix Snoke

Tales From the Bug Mine - Highlights from the Android VRP
Brian Claire Young

Decision Analysis Applications in Threat Analysis Frameworks
Emily Shawgo

Threat Intel On The Fly
Tazz

Make Me Your Dark Web Personal Shopper!
Emma Zaballos

Driving Away Social Anxiety
Joey Maresca

Off-grid coms and power
Justin Herman

CTFs: Leveling Up Through Competition
Alex Flores

Extending Burp to Find Struts and XXE Vulnerabilities
Chris Elgee

Introduction to x86 Assembly
DazzleCatDuo

Pacu: Attack and Post-Exploitation in AWS
Spencer Gietzen

An Inconvenient Truth: Evading the Ransomware Protection in Windows 10
Soya Aoyama

Brutal Blogging - Go for the Jugular
Kate Brew

RID Hijacking: Maintaining Access on Windows Machines
Sebastian Castro

Your Training Data is Bad and You Should Feel Bad
Ryan J. O'Grady

So many pentesting tools from a $4 Arduino
Kevin Bong, Michael Vieau

Building an Empire with (Iron)Python
Jim Shaver

SAEDY: Subversion and Espionage Directed Against You
Judy Towers

OSX/Pirrit - Reverse engineering mac OSX malware and the legal department of the company who makes it
Amit Serper, Niv Yona, Yuval Chuddy

How to test Network Investigative Techniques(NITs) used by the FBI
Dr. Matthew Miller

Cloud Computing Therapy Session
Cara Marie, Andy Cooper

Silent Compromise: Social Engineering Fortune 500 Businesses
Joe Gray

Dexter: the friendly forensics expert on the Coinbase security team
Hayden Parker

Going on a Printer Safari - Hunting Zebra Printers
James Edge

Hardware Slashing, Smashing, and Reconstructing for Root access
Deral Heiland

App-o-Lockalypse now!
Oddvar Moe

Web App 101: Getting the lay of the land
Mike Saunders

Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)
Daniel Bohannon

WE ARE THE ARTILLERY: Using Google Fu To Take Down The Grids
Chris Sistrunk, Krypt3ia, SynAckPwn

Just Let Yourself In
David Boyd

A "Crash" Course in Exploiting Buffer Overflows (Live Demos!)
Parker Garrison

Living in a Secure Container, Down by the River
Jack Mannino

VBA Stomping - Advanced Malware Techniques
Carrie Roberts, Kirk Sayre, Harold Ogden

Media hacks: an Infosec guide to dealing with journalists
Sean Gallagher, Steve Ragan, Paul Wagenseil

Deploying Deceptive Systems: Luring Attackers from the Shadows
Kevin Gennuso

The Money-Laundering Cannon: Real cash; Real Criminals; and Real Layoffs
Arian Evans

Perfect Storm: Taking the Helm of Kubernetes
Ian Coldwater

How to put on a Con for Fun and (Non) Profit
Benny Karnes, John Moore, Rick Hayes, Matt Perry, Bill Gardner, Justin Rogosky, Mike Fry, Steve Truax

Web app testing classroom in a box - the good, the bad and the ugly
Lee Neely, Chelle Clements, James McMurry

Metasploit Town Hall 0x4
Brent Cook, Aaron Soto, Adam Cammack, Cody Pierce

Community Based Career Development or How to Get More than a T-Shirt When Participating as part of the Community
Kathleen Smith, Magen Wu, Cindy Jones, Kathryn Seymour, Kirsten Renner

Disaster Strikes: A Hacker's Cook book
Jose Quinones, Carlos Perez

Ninja Looting Like a Pirate
Infojanitor

Hacking Mobile Applications with Frida
David Coursey

Victor or Victim? Strategies for Avoiding an InfoSec Cold War
Jason Lang, Stuart McIntosh

Ubiquitous Shells
Jon Gorenflo

99 Reasons Your Perimeter Is Leaking - Evolution of C&C
John Askew

Ship Hacking: a Primer for Today's Pirate
Brian Satira, Brian Olson

Code Execution with JDK Scripting Tools & Nashorn Javascript Engine
Brett Hawkins

PHONOPTICON - leveraging low-rent mobile ad services to achieve state-actor level mass surveillance on a shoestring budget
Mark Milhouse

Patching: Show me where it hurts
Cheryl Biswas

Advanced Deception Technology Through Behavioral Biometrics
Curt Barnard, Dawud Gordon

We are all on the spectrum: What my 10-year-old taught me about leading teams
Carla A Raisler

No Place Like Home: Real Estate OSINT and OPSec Fails
John Bullinger

The Layer2 Nightmare
Chris Mallz

Attacking Azure Environments with PowerShell
Karl Fosaaen

Blue Blood Injection: Transitioning Red to Purple
Lsly Ayyy

Mirai, Satori, OMG, and Owari - IoT Botnets Oh My
Peter Arzamendi

Comparing apples to Apple
Adam Mathis

How online dating made me better at threat modeling
Isaiah Sarju

Threat Hunting with a Raspberry Pi
Jamie Murdock

M&A Defense and Integration - All that Glitters is not Gold
Sara Leal, Jason Morrow

Social Engineering At Work - How to use positive influence to gain management buy-in for anything
April Wright

Ham Radio 4 Hackers
Eric Watkins, Devin Noel

Getting Control of Your Vendors Before They Take You Down
Dan Browder

Cyber Intelligence: There Are No Rules, and No Certainties
Coleman Kane

Getting Started in CCDC
Russell Nielsen

Changing Our Mindset From Technical To Psychological Defenses
Andrew Kalat

Red Mirror: Bringing Telemetry to Red Teaming
Zach Grace

Two-Factor, Too Furious: Evading (and Protecting) Evolving MFA Schemes
Austin Baker, Doug Bienstock

IoT: Not Even Your Bed Is Safe
Darby Mullen

Fingerprinting Encrypted Channels for Detection
John Althouse

On the Nose: Bypassing Huawei's Fingerprint authentication by exploiting the TrustZone
Nick Stephens

Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Gabriel Ryan

Goodbye Obfuscation, Hello Invisi-Shell: Hiding Your Powershell Script in Plain Sight
Omer Yair

Cloud Forensics: Putting The Bits Back Together
Brandon Sherman

Killsuit: The Equation Group's Swiss Army knife for persistence, evasion, and data exfil
Francisco Donoso

The MS Office Magic Show
Stan Hegt, Pieter Ceelen

Living off the land: enterprise post-exploitation
Adam Reiser

Hillbilly Storytime: Pentest Fails
Adam Compton

Bug Hunting in RouterOS
Jacob Baines

Breaking Into Your Building: A Hackers Guide to Unauthorized Access
Tim Roberts, Brent White

The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights.
Bryce "soen" Bearchell

Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests
Tomasz Tuzel

Pwning in the Sandbox: OSX Macro Exploitation & Beyond
Adam Gold, Danny Chrastil

IOCs Today, Intelligence-Led Security Tomorrow
Katie Kusjanovic, Matthew Shelton

Closing Ceremonies

9/8/2018 GrrCON 2018 Videos
These are the videos of the presentations from GrrCON 2018. Big thanks to EggDropX and Jaime for having me out, and my video crew  (paint27, Erick, Jason, brettahansen, Angela, Luke & others) for recording.

Keynote
Dave Kennedy

An Inconvenient Truth: Evading the Ransomware Protection in Windows 10
Soya Aoyama

The Abyss is Waving Back - The four paths that human evolution is charging down, and how we choose which one's right
Chris Roberts

Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI
Pranshu Bajpai & Dr. Richard Enbody

You're right, this talk isn't really about you!
Jayson E Street

Analyzing Pwned Passwords with Apache Spark
Kelley Robinson

How to rob a bank over the phone
Joshua "Naga" Crumbaugh
(Posting Later Maybe)

Vibing Your Way Through an Enterprise: How Attackers are Becoming More Sneaky
Matthew Eidelberg

PwnBook: Penetrating with Google's Chromebook
Corey Batiuk

Life, Death + the Nematodes: Long live Cyber Resilience!
Chad Calease

Data Data Everywhere but No One Stops to Think
Scott Thomas, Carl Hertz & Robert Wagner

Automation and Open Source: Turning the Tide on Attackers
John Grigg

w.e w.e Internet Explorer Does What It Wants
Aaron Heikkila

Pacu: Attack and Post-Exploitation in AWS
Spencer Gietzen

Hacker Tools, Compliments of Microsoft
David Fletcher & Sally Vandeven

How to Conduct a Product Security Test: And How it Fits Into the Larger Security Strategy
Dr. Jared DeMott

Over the Phone Authentication
Spencer Brown

Designing a Cloud Security Blueprint
Sarah Elie

To Fail is Divine
Danny Akacki

Zero to Owned in 1 Hour: Securing Privilege in Cloud, DevOps, On-Prem Workflows
Brandon Traffanstedt

Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You
Adam Hogan

emulacra and emulation: an intro to emulating binary code with Vivisect
Atlas of D00m

SniffAir - An Open-Source Framework for Wireless Security Assessments
Matthew Eidelberg & Steven Daracott

Threat Hunting: the macOS edition
Megan Carney

The Hybrid Analyst: How Phishing Created A New Type of Intel Analyst
Rachel Giacobozzi

Dragnet: Your Social Engineering Sidekick
Truman Kain

Intelligence Creating Intelligence: Leveraging what you know to improve finding what you don,t
Tomasz Bania

Guaranteed Failure: Awareness The Greatest Cyber Insanity
Joshua "Naga" Crumbaugh

Threat Modeling: How to actually do it and make it useful
Derek Milroy

Structuring your incident response could be one of the most important things you do to bolster Security
Matt Reid

How this 20 Year Old Changed the Security Industry
James O'Neill

Stop Boiling The Ocean! How To Succeed With Small Gains
Joel Cardella

Do I have a signature to detect that malware?
Ken Donze

2018 SIEM Trends: What is my Mean Time to Value?
Bill Lampe

Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint
Jared Phipps

More Tales from the Crypt-Analyst
Jeff Man

My First year in Application Security
Whitney Phillips

Career Risk Management: 10 tips to keep you employed
Chris Burrows

Red vs Blue: The Untold Chapter
Aaron Herndon & Thomas Somerville

Saving All the Money to Buy All the Booze: Learning to Hack All the Things on a Budget
Michael Morgese

Analyzing Multi-Dimensional Malware Dataset
Ankur Tyagi

Physicals, Badges, and why it matters
Alex Fernandez-Gatti

InSpec: Compliance as Code
Kent picat, Gruber

Bounty Hunters
J Wolfgang Goerlich

8/9/2018 Patreon, Bitchute, etc.
Hi all, I've set up a Patreon for those that want to help me increase the number of cons I can record each year. As a reminder, the videos I record appear on YouYube, Archive.org and BitChute for free, so don't complain about what I put on my site if you can't figure out how to get to the same content elsewhere. 😜
7/14/2018 OISF 2018 Videos
These are the videos from the OISF Anniversary Event.

Introduction
Dr. John Carls

Catching the Social Engineer
Robert Stewart

Hacking Identity, A Pen Testers guide to IAM
Jerod Brennen

Active Defense: Helping the Threat Actors Hack Themselves
Matt Scheurer

Planning & Executing A Red Team Engagement
Tim Wright

6/23/2018 BSides Cleveland 2018 Videos
These are the videos from the Bsides Cleveland conference. Thanks to Rich, Nekko, justinschmitt &  as the video team. Thanks to twuntymcslore & RockieBrockway for being con mom & dad.


Hacking Your Happiness
Chris Gates

Active Defense - Helping threat actors hack themselves!
Matt Scheurer

Reflective PE Unloading
Spencer McIntyre

One Puzzle Piece at a Time: Logging Quick Wins
Celeste Hall

GO HACK YOURSELF: MOVING BEYOND ASSUMPTION-BASED SECURITY
Christine Stevenson

Using Technology to Defend Digital Privacy & Human Rights
Tom Eston

Code Execution with JDK Scripting Tools & Nashorn Javascript Engine
Brett Hawkins

Abandoned Spaces: Reconstructing APT Campaigns From Lapsed Domains
Daniel Nagy

What's Changed In The New OWASP Top 10?
Bill Sempf

Raindance: Raining Recon from the Microsoft Cloud
Michael Stringer

Tools and Procedures for Securing .Net Applications
Sam Nasr

Hacking Identity: A Pen Tester's Guide to IAM
Jerod Brennen

Phishing Forensics - Is it just suspicious or is it malicious?
Matt Scheurer

Securing Code - The Basics
Michael Mendez

The Marriage of Threat Intelligence and Incident Response or... Threat Hunting for the Rest of Us
Jamie Murdock

Wacky and Wild Security - Getting things under CIS Controls V7
Jeremy Mio

Interdisciplinary Infosec: Equifax, Individuation, and the Modern State
Thomas Pieragastini

Mobile Application Privacy and Analytics
Kevin Cody

Evolving the Teaching of Pen Testing in Higher Ed
Robert Olson

Go back to the basics with your processes: Improving operations without technology.
Mark Abrams

Anatomy of an Attack
John Fatten

Hackers, Hugs, & Drugs: Mental Health in Infosec
Amanda Berlin

6/14/2018 A Digital Handbook for the Recently Deceased
Article on dealing with a deceased person's financial and Internet accounts, and making it easier for others to do so when you pass.
6/8/2018 ShowMeCon 2018 Videos
These are the videos ShowMeCon 2018. Thanks to Renee & Dave Chronister (@bagomojo) and others for having me out to record and speak. Also thanks to my video crew @r3tr0_cod3x, James, Aaron, Jon and some other people I may have forgotten.

Opening

The Insecure Software Development Lifecycle: How to find, fix, and manage deficiencies within an existing methodology.
April C. Wright

The Sky Isn't Falling, But the Earth May be Shifting: How GDPR Could Change the Face of InfoSec
Cliff Smith

Gulliver's Travels: Security Exploits and Vulnerabilities Around the Globe
Kevin Johnson

From DDoS to Mining: Chinese Cybercriminals Set Their Sights on Monero
David Liebenberg

ANTI-OSINT AF: How to become untouchable
Michael James

Who's Watching the Watchers?
Nathan Sweaney

We don't have to worry about that, It's in the cloud
Arnar Gunnarsson

SS7 for INFOSEC
Paul Coggin

Getting Newcomers into Infosec: The Tribulations of the Auburn University Hacking Club
Matthew Rogers

Exploring Information Security Q&A Panel
Timothy De Block

Securing Windows with Group Policy
Josh Rickard

ATAT: How to take on the entire rebellion with 2-3 stormtroopers
ll3nigmall

How Hyperbolic Discounting is keeping your security program from succeeding
Jon Clark

Hijacking the Boot Process - Ransomware Style
Raul Alvarez

Building a Cyber Training Range on a Budget
Robert Guiler

Lessons Learned from Development and Release of Blacksmith (The Meltdown Defense Tool For Linux)
Jared Phipps

How to Train Your Kraken - Creating a Monster Out of Necessity
Sean Peterson

PowerShell exploitation, PowerSploit, Bloodhound, PowerShellMafia, Obfuscation, PowerShell Empire, the Empire has fallen, you CAN detect PowerShell exploitation
Michael Gough

Offensive Cartography
Trenton Ivey

The Wrong Kind of DevOps Talk - Now with Extra Badness!
Bobby Kuzma

This Job is Making Me Fat!
Thomas Smith

You'll understand when you are older
Amanda Berlin & David Cybuck

Bitcoin - The generation of private keys based on public keys, a live demonstration
Richard Dennis

6/3/2018 Circle City Con 2018 Videos
These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to @irishjack, @0DDJ0BB, @Ajediday, Jim, @securesomething, @AnarchistDalek, @KitWessendorf, @m3ch4n15m, @Valacia, @songsthatsaved, @mchandleraz, @christinemobes and other for helping set up AV and record.

Opening Ceremonies
Circle City Con Staff

Espionage In The Modern Age of Information Warfare
Scot Terban

The Never Ending Hack: Mental Health in InfoSec Community
Danny Akacki

The Network Night Watch
Eric Rand & Lesley Cahart

Held for Ransom with a Toy Gun
Brian Baskin

Dear Blue Team: Proactive Steps to Supercharge your IR
Joe Gray

CTF Tips and Tricks
Aaron Lintile

Classic Cons in Cryptocurrency
Wolfgang Goerlich & Zachary Sarakun

Enterprise Vulnerability Management (Assessing, Implementing, and Maintaining)
Derek Milroy

Security Beyond the Security Team: Getting Everyone Involved
Luka Trbojevic

The consequences of lack of security in the Healthcare and how to handle it
Jelena Milosevic

Stealing Cycles, Mining Coin: An introduction to Malicious Cryptomining
Edmund Brumaghin & Nick Biasini

Applying Thermodynamic Principles to Threat Intelligence
Kyle Ehmke

SAEDY: Subversion and Espionage Directed Against You
Judy Towers

How to Lie with Statistics, Information Security Edition
Tony Martin-Vegue

IoT 4n6: The Growing Impact of the Internet of Things on Digital Forensics
Jessica Hyde

A Very Particular Set of Skills: Geolocation Techniques For OSINT and Investigation
Chris Kindig

Rise of the Machines
Aamir Lakhani

Backdooring with Metadata
Itzik Kotler

Automahack - Automate going from zero to domain admin with 2 tools
Dan McInerney

Patching - It's Complicated
Cheryl Biswas

Containers: Exploits, Surprises and Security
Elissa Shevinsky

Playing Russian Troll Whack-a-Mole
Courtney Falk

The FaaS and the Curious - AWS Lambda Threat Modeling
Bryan McAninch

Deploying Deceptive Systems: Luring Attackers from the Shadows
Kevin Gennuso

Quick Retooling in .Net for Red Teams
Dimitry Snezhkov

(Re)Thinking Cyber Security Given the Spectre of a Meltdown: (Someone Hold My Beer)
Jeff Man

Carrot vs. Stick: Motivation, Metrics, and Awareness
Magen Wu

Securing without Slowing: DevOps
Wolfgang Goerlich

Operator: The Well-Rounded Hacker
Matthew Curtin

Abuse Case Testing in DevOps
Stephen Deck

GreatSCT: Gotta Catch 'Em AWL
Chris Spehn

5/20/2018 NolaCon 2018 Videos
Recorded at NolaCon 2018. Thanks to @CurtisLaraque, @mikearbrouet, @openbayou, Cole & @klulue for the video recording help, and @nola_con, @erikburgess_, @NolaConYvonne & Rob for having me down to record.

Chasing the Adder... A Tale from the APT world
Stefano Maccaglia

Aww Ship! Navigating the vulnerabilities and attack surface of the maritime industry
John Sonnenschein

Hacking Dumberly, Just Like the Bad Guys
Tim Medin, Derek Banks

Automahack - Python toolchain for automated domain admin
Dan McInerney

Dear Blue Team: Proactive Steps to Supercharge your IR
Joe Gray

You'll Understand When You're Older
Amanda Berlin

Skills For A Red-Teamer
Brent White, Tim Roberts

Hacking Smart Contracts--A Methodology
Konstantinos Karagiannis

Fighting Child Exploitation with Oculum
Andrew Hay, Mikhail Sudakov

How to tell cajun doctors they have bad cyber-hygiene and live
Joshua Tannehill

What Infosec in Oil & Gas can Teach us About Infosec in Healthcare
Damon J. Small

On the Hunt: Hacking the Hunt Group
Chris Silvers, Taylor Banks

Your Mac Defenestrated. Post OSXploitation Elevated.
FuzzyNop & Noncetonic

Keynote: Follow The Yellow Brick Road
Marcus J. Carey

We are the Enemy of the Good
Stephen Heath

Taking out the Power Grid's Middleman
Nathan Wallace, Luke Hebert

Privacy for Safety- How can we help vulnerable groups with privacy?
Stella

Cash in the aisles: How gift cards are easily exploited
Will Caput

Mind Games: Exploring Mental Health through Games
Todd Carr

Jump into IOT Hacking with Damn Vulnerable Habit Helper IOT Device
Nancy Snoke, Phoenix Snoke

The Future of Digital Forensics
Imani Palmer

Changing the Game: The Impact of TRISIS (TRITON) on Defending ICS/SCADA/IIoT
Paul W. Brager Jr M.Sci, CISSP, GICSP, CISM

Ducky-in-the-middle: Injecting keystrokes into plaintext protocols
Esteban Rodriguez

Gamifying Developer Education with CTFs
John Sonnenschein & Max Feldman

Active Directory Security: The Journey
Sean Metcalf

HTTP2 and You
Brett Gravois

5/12/2018 BSides Detroit 2018 Videos
These are the videos from the BSides Detroit 2017 Conference.  Thanks to Ryan Harp (@th3b00st), Dan Falk (@dnfalk), Wolfgang Goerlich (@jwgoerlich), Matt Johnson (@mwjcomputing), Kyle Andrus (@chaoticflaws), Kate Vajda (@vajkat) and Chris Maddalena (@cmaddalena) for having me out and Samuel Bradstreet (@TeaPartyTechie), Leah Bradstreet,  Xavier Johnson, Ali Faraj, Camilla Martins, Ben Valentine, James Green, David Sornig, Steven Balagna,  Nick Papa, Lucas Gorczyca, J Parker Galbraith and others I may forget for helping to record.

Opening

Yes, You're an Impostor; now get back to work
Johnny Xmas

GRC - "What Would You Say You Do Here?"
Brian Martinez

Protecting Phalanges from Processor Pressure Points
Matthew Clapham

A Reporter's Look at OSINT
Hilary Louise
(Sorry, mic was off, but here is a longer version from GrrCon)

Nowhere to hide
Lucas Gorczyca

Know the Enemy - How to make threat intelligence work!
Nir Yosha

Hack like a Gohper
Kent Gruber

@taco_pirate's Art of Woo
Ben Carroll

Saving All the Money to Buy All the Booze: Learning to Hack All the Things on a Budget
Michael Morgese

Practical Incident Response in Heterogenous Environment
Kevin Murphy & Stefano Maccaglia

Security KPIs - Measuring Improvement in Your Security Program
Steven Aiello

5/11/2018 Converge 2018 Videos
These are the videos from the Converge Information Security Conference. Thanks to Ryan Harp (@th3b00st), Dan Falk (@dnfalk), Wolfgang Goerlich (@jwgoerlich), Matt Johnson (@mwjcomputing), Kyle Andrus (@chaoticflaws), Kate Vajda (@vajkat) and Chris Maddalena (@cmaddalena) for having me out and Samuel Bradstreet (@TeaPartyTechie), Leah Bradstreet,  Xavier Johnson, Camilla Martins, Ben Valentine, James Green, David Sornig, Steven Balagna,  Nick Papa, J Parker Galbraith and others I may forget for helping to record.

Opening

Hackers, Hugs, & Drugs: Mental Health in Infosec
Amanda Berlin

Winning the cybers by measuring all the things
Jim Beechey

Social Engineering for the Blue Team
Timothy De Block

The Emerging Product Security Leader Discipline
Matthew Clapham

Server Message Block Worms: The gift that keeps on giving
Matthew Aubert

Don't Fear the Cloud: Secure Solutions at Lower Cost
Matt Newell

DevSecOps: Security Testing with CI/CD Automation Servers
Ed Arnold

Backdooring With Metadata
Itzik Kotler

How to Conduct a Product Security Test: And How it Fits Into the Larger Security Strategy
Nick Defoe

Securing ASP.NET Core Web Apps
Dustin Kingen

All the Bacon: How Lesley Knope and Ron Swanson encourage community growth
Kevin Johnson

ATT&CK Like an Adversary for Defense Hardening
Steve Motts & Christian Kopacsi

Unblockable Chains Is Blockchain the ultimate malicious infrastructure?
Omer Zohar
(may post later)

DADSEC 102
Richard Cassara

The Things You Should Be Doing Defensively Right Now
Joel Cardella

Held Hostage: A Ransomware Primer
Nick Hyatt

Prowling: Better Penetration Testing
J Wolfgang Goerlich

Automating Web App security in AWS
Luther Hill

Finding the Money to Run an Effective Security Program
Matt Topper

Cryptocurrency- The Internetwide Bug Bounty Program
Brian Laskowski

Hacking Identity: A Pen Tester,s Guide to IAM
Jerod Brennen

4/29/2018 BSidesCharm 2018 Videos
These are the videos BSidesCharm (Baltimore) 2018. Thanks for inviting me down to record. Thanks to my video team Shawn Thomas, Cory, Terry Holman, Thomas Moses, Jason Presmy and Martin Veloso.

Keynote
Jessica Payne

To AI or Not to AI? What the US Military Needs for Fighting Cyber Wars
Ernest Wong

Preparing for Incident Handling and Response within Industrial Control Networks
Mark Stacey

FailTime:​ ​ Failing​ ​ towards​ ​ Success
Sean Metcalf

Getting Saucy with APFS! - The State of Apples New File System
Sarah Edwards

Basic Offensive Application of MOF Files in WMI Scripting
Devon Bordonaro

An Open Source Malware Classifier and Dataset
Phil Roth

Counting Down to Skynet
Nolan Hedglin

How we reverse engineered OSX/Pirrit, got legal threats and survived
Amit Serper

Threat Activity Attribution: Diferentiatinn the Who from the How
Joe Slowik

Quantify your hunt: not your parents red teaming
Devon Kerr

Internet Anarchy & The Global March toward Data Localization
Andrea Little Limbago

Powershell Deobfuscation: Putting the toothpaste back in the tube
Daniel Grant

Effective Monitoring for Operational Security
Russell Mosley Ryan St. Germain

Plight at the end of the Tunnel
Anjum Ahuja

Rise of the Miners
Josh Grunzweig

Malware Analysis and Automation using Binary Ninja
Erika Noerenberg

Between a SOC and a Hard Place
Shawn Thomas Andrew Marini James Callahan Dustin Shirley

Using Atomic Red Team to Test Endpoint Solutions
Adam Mathis

Exercise Your SOC: How to run an effective SOC response simulation
Brian Andrzejewski

Adding Simulated Users to Your Pentesting Lab with PowerShell
Chris Myers Barrett Adams

Building a Predictive Pipeline to Rapidly Detect Phishing Domains
Wes Connell

Closing Ceremonies

4/14/2018 BSides Nashville 2018 Videos
These are the videos BSides Nashville 2018. Thanks to @lil_lost for inviting me down to record and being my bodyguard while in Nashville. Big thanks to Gabe Basset, Geoff Collins, Cameron and others for helping set up AV and record.

Intro

Know Your Why
Oladipupo (Ladi) Adefala

Deploying Microsoft Advanced Threat Analytics in the Real World
Russell Butturini

An Oral History of Bug Bounty Programs
Dustin Childs

Blue Cloud of Death: Red Teaming Azure
Bryce Kunz

SECURITY INSTRUMENTATION: BE THE HERO GETTING VALUE FROM SECURITY
Brian Contos

Changing Who Writes the Queries: High-Leverage IR with Visual Playbooks & Visual Graph Analysis
Leo Meyerovich

Learning to Hack the IOT with the Damn Vulnerable Habit Helper IOT Device
Nancy Snoke, Phoenix Snoke

Hacking the Users: Developing the Human Sensor and Firewall
Erich Kron

Community Based Career Activities or How Having Fun Can Help You with Your Career
Kathleen Smith, Cindy Jones,Doug Munro, Magen Wu

Hillbilly Storytime - Pentest Fails
Adam Compton

See the ID Rules Before Us: FAL IAL AAL eh? Aaaagh!!! How, How, How, How?
Bruce Wilson

SAEDY: Subversion and Espionage Directed Against You
Judy Towers

Growing Up to be a Infosec Policy Driven Organization
Frank Rietta

Adding Simulated Users to Your Pentesting Lab with PowerShell
Chris Myers, Barrett Adams

Hacking VDI 101
Patrick Coble

Evaluating Injection Attack Tools Through Quasi-Natural Experimentation
John O'Keefe-Odom

Social Engineering for the Blue Team
Timothy De Block

4/6/2018 AIDE 2018 Videos
Recorded at AIDE 2018. Big thanks to Bill Gardner (@oncee) for having me out to record.

On Business Etiquette and Professionalism in the Workplace
Tess Schrodinger

InfoSec by the Numbers
Bill Gardner

Practical OSINT - Tools of the trade
Tom Moore

Potentially unnecessary and unwanted programs (a.k.a. PUPs)
Josh Brunty

How To Test A Security Awareness Program
Matt Perry

Disrupting the Killchain
Amanda Berlin

I have this piece of paper, now what?
Brandon Miller

Statistics Lie...Except About Passwords
Jeremy Druin

3/24/2018 BSides Chattanooga 2018 Videos
These are the videos from the BSides Chattanooga conference. Thanks to Ron and Kevin for having me out, and John for helping record.

Intro

Red vs Blue and why We are doing it wrong
Chris Roberts

The Semi-Comprehensive Guide to Setting Up a Home Lab
Andrew Williams

Lessons learned from a OWASP Top 10 Datacall
Brian Glas

Attacker vs. Defender: Observations on the Human Side of Security
Todd O'Boyle

The Gilligan Phenomenon: Fixing The Holes In the Ransomware And Phishing Boats
Eric Kron

Machine Learning and Cyber Security: How Smart is Can it Be?
Shayne Champion

Closing

3/10/2018 BSides Indy 2018 Videos
These are the videos from the BSides Indy conference. Thanks to Frank, MzBat for having me up, and Nate for helping with AC.

Intro

Lessons Learned - A 15 year Retrospective
Price McDonald

Phishing Forensics - Is it just suspicious or is it malicious?
Matt Scheurer

Presenting P@cketR@quet: An Auditory IDS
Killian Ditch

The Pillars of Continuous Incident Response
Brad Garnett

Zero to Owned in 1 Hour: Securing Privilege in Cloud and DevOps Workflow
Brandon Traffanstedt

Social Engineering for the Blue Team
Timothy De Block

Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
Chris Reed

Creating a Cyber Volunteer Department
Ray Davidson

Closing
Frank Diaz

3/2/2018 BSides Columbus 2018 Videos
These are the videos from the BSides Columbus Ohio conference. Thanks to Mitch & Michael Spaulding for having me up and those who manned the video rigs.

Keynote
Dave Kennedy

Automating Security Testing with the OWTF
Jerod Brennen

Looks Like Rain Again: Secure Development in the Cloud
Bill Sempf

How Stuxnet Ruined My Life For 6 Months (But I Got To Fly 1st Class A Lot)
Chris Raiter, Jeremy Smith

Emotet - Banking Malware With A Bite
Bradley Duncan

Keynote
Kevin Burkart

Cryptology: Its a Scalpel, not a Hammer
Mikhail Sudakov

Pass the Apple Sauce: Mac OS X Security Automation for Windows-focused Blue Teams
Brian Satira

Why People Suck at Delivery: How to get your security projects off the ground and into production!
Nick d'Amato

Zero to Owned in 1 Hour: Securing Privilege in Cloud and DevOps Workflow
Brandon Traffanstedt

Are you ready for my call? Security researcher insights into Responsible Disclosure.
Jason Kent

Everything you always wanted to ask a hiring manager, but were afraid to ask!
Mike Spaulding

 

Deep Learning for Enterprise: Solving Business Problems with AI
Christian Nicholson

Building Jarvis
Stephen Hosom

Active Defense - Helping threat actors hack themselves!
Matt Scheurer

Shifting Application Security Left
Craig Stuntz

Presenting P@cketR@quet: An Auditory IDS
Killian Ditch

Security and Networking: Dual Purpose Tools
Cody Smith

Cybereason's Jim VanDeRyt - Fileless Malware Breakout Session
Jim VanDeRyt

The Quieter You Become, the More Youre Able to (H)ELK
Nate Guagenti, Roberto Rodriquez

2/24/2018 BSides NOVA 2018 Videos
These are the videos from BSides NOVA 2018. Thanks to those who manned the video rigs and helped set u

AM Keynote
Matt Devos

Deep Dive in the Dark Web (OSINT Style)
Kirby Plessas

PM Keynote
Jack Daniel

Adding Pentest Sauce to your Vulnerability Management Recipe
Luke Hudson, Andrew McNicol

The Value of Design in Cyber Threat Intelligence
Devon Rollins

DNC Hacked Data in the Hands of a Trained Intelligence Professional
Wally Prather, Dave Marcus

Your Facts Are Not Safe With Us: Russian Information Operations as Social Engineering
Meagan Keim

DECEPTICON: Deceptive Techniques to Derail OSINT attempts
Joe Gray

I Thought Renewing the Domain Name Was Your Job?
Allan Liska

Automating Unstructured Data Classification
Malek Ben Salem

Vulnerability Patched in Democratic Donor Database
Josh Lospinoso

Living in a world with insecure Internet of Things (IoT)
Marc Schneider

Vulnerability Accountability Levers and How You Can Use Them
Amelie Koran

Cyber Mutual Assistance - A New Model for Preparing and Responding to Cyber Attack
David Batz

Rethinking Threat Intelligence
Tim Gallo

What Color Is Your Cyber Parachute?
Cliff Neve, Candace King, Kazi Islam, Trey Maxam, Amelie Koran

Feds Meet Hackers
Ariel Robinson, Alyssa, Feola, Gray Loftin, Beau Woods, Amélie E. Koran

Recruiting in Cyber
Dan Waddel, Kathleen Smith, Suzie Grieco, Sabrina Iacarus, Kirsten Renner, Karen Stied

How to get started in Cybersecurity
John Stoner

Improving Technical Interviewing
Forgotten Sec

Ask An Expert: Cyber Career Guidance and Advice
Micah Hoffman, Bob Gourley, John TerBush, Chris Gates, Kirby Plessas, Lea Hurley, Neal Mcloughlin, Ovie Carroll, Sarah Edwards, Tigran Terpandjian, Willie Lumpkin

2/17/2018 BSides Tampa 2018
These are the videos from the BSides Tampa conference. Thanks to all of the BSides Crew for having me out to help record and render the videos. Special thanks to my video crew: Julian, Andrew Schiro, Austin Ford, John Mejia, Michael Iglesias, Micheal Milford, Mike Ziolkowski,  Patty Morris, Robin Noyes

Cyber Assurance - Testing for Success
Col. John Burger

You Can Run..but you cant hide!
Bruce Anderson

Red Team Apocalypse
Beau Bullock and Derek Banks

Advanced Persistent Security
Ira Winkler

Adding Simulated Users to Your Pentesting Lab with PowerShell
Chris Myers and Barrett Adams

The Shoulders of InfoSec
Jack Daniels

Blockchain: The New Digital Swiss Army Knife?
G. Mark Hardy

Modern Day Vandals and Thieves: Wireless Edition
David Switzer and Jonathan Echavarria

Fraud; Should you worry?
Greg Hanis

A Security Look at Voice-Based Assistants
David Vargas

Hackers Interrupted
Alex Holden

Insane in the Mainframe: Taking Control of Azure Security
Jeremy Rassmusen

MiFare lady Teaching an old RFID new tricks
Daniel Reilly

Medical Device Security: State of the Art in 2018
Shawn Merdinger
(not recorded)

Weaponizing IoT - NOT!
Kat Fitzgerald
(not recorded)

Blue Team's tool dump. Stop using them term NeXt-Gen this isn't XX_Call of Duty_XX.
Alex Kot

Exploiting Zillow "Zestimate" for Reckless Profit
Robert "RJ" Burney

Self Healing Cyber Weapons
Logan Hicks

Ransomware: A Declining Force in Today's Threat Landscape
Brad Duncan

Modern web application security
Julien Vehent

Advanced Social Engineering and OSINT for Penetration Testing
Joe Gray

Critical Infrastructure & SCADA Security 101 for Cybersecurity Professionals
Juan Lopez

Exothermic Data Destruction: Defeating Drive Recovery Forensics
Nikita Mazurov and Kenneth Brown

Derrick's Thank Yous
12/08/2017 BSidesPhilly 2017 Videos
These are the videos from BSides Philadelphia 2017. Thanks to Mark, Mike, Austin, John, David and others I'm forgetting for helping with the video.

Innovating for 21st Century Warfare
Ernest "Cozy Panda" Wong

MFA, It's 2017 and You're Still Doing Wrong
Presented by Dan Astor and Chris Salerno.

Out With the Old, In With the GNU
Lsly

IoT devices are one of the biggest challenges
Charles @libertyunix Sgrillo

Evading C2 Detection with Asymmetry
By Brandon Arvanaghi and Andrew Johnston

Abusing Normality: Data Exfiltration in Plain Site
Aelon Porat

Smarter ways to gain skills, or as the DoD puts it
Dr. P. Shane Gallagher, Institute for Defense Analyses, and Evan Dornbush, co-founder, Point3 Security, Inc.

Game of the SE: Improv comedy as a tool in Social Engineering
Danny Akacki - Security Monkey

File Polyglottery; or, This Proof of Concept is Also a Picture of Cats
Evan Sultanik

Your Facts Are Not Safe With Us: Russian Information Operations As Social Engineering
Meagan Dunham Keim

Supercharge Your SOC with Sysmon
Chris Lee & Matthew Giannetto

Threat Hunting: Defining the Process While Circumventing Corporate Obstacles
Kevin Foster, Matt Schneck, Ryan Andress

Put up a CryptoWall and Locky the Key - Stopping the Explosion of Ransomware
Erich Kron, CISSP-ISSAP

Web Hacking 101 Hands-on with Burp Suite
David Rhoades of MavenSecurity.com

Hacker Mindset
David Brown: CISSP, CISM, IAM

11/29/2017 SecureWV/Hack3rcon2017
These are the videos of the presentations from Secure West Virginia 2017. Thanks to Justine, Tim, Morgan, Kevin, Todd & Roy for helping record.

Intro
Benny Karnes

Fighting Advanced Persistent Threats with Advanced Persistent Security
Ira Winkler

Coming Up with the Next Wave of Cyber Innovations-Start by Thinking 1ns1d3 th3 B0x
Ernest Wong

I survived Ransomeware.... Twice
Matt Perry

Value of threat intelligence
Stealthcare

SDR & RF Hacking Primer
Andrew Bindner

Digital Forensic Analysis: Planning and Execution
John Sammons

Intro to WireShark
Josh Brunty

Secrets of Superspies
Ira Winkler

Total Recall: Using Implicit Memory as a Cryptographic Primitive
Tess Schrodinger

IoT Panel
RCBI

Hillbilly Storytime - Pentest Fails
Adam Compton

Hackers, Hugs and Drugs
Amanda Berlin

FLDigi - E-mail over Packet Radio
Aaron West and Rob West

From junk to jewels: Destruction is the key to building
Branden Miller & Audrey Miller

SCAP: A Primer and Customization
Scott Keener

Security Through Ansible Automation
Adam Vincent

Vehicle Forensics: An Emerging Source of Evidence
John Sammons

Network Forensics using Kali Linux and/or SANS Sift
Josh Brunty

911 DDOS
Dianiel Efaw

Pi's, Pi's and wifi
Steve Truax

Technical Testimony: Doing the Heavy Lifting for the Jury
John Sammons

Emergent Gameplay
Ron Moyer

Closing

10/28/2017

GrrCON 2017 Videos
These are the videos of the presentations from GrrCON 2017. Big thanks to EggDropX and Jaime for having me out, and my video crew  (paint27, Erick, & brettahansen) for recording.

Ghast

STRATEGIES ON SECURING YOU BANKS & ENTERPRISES. (FROM SOMEONE WHO ROBS BANKS & ENTERPRISES FOR A LIVING!)
Jayson E Street

Population Control Through The Advances In Technology
Chris Roberts

(sorry for the music in back ground)

You Got Your SQL Attacks In My Honeypot
Andrew Brandt

3rd Party Data Burns
Arron "Finux" Finnon

Morphing to Legitimate Behavior Attack Patterns
Dave Kennedy

Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF
Jerod Brennen

Oops! Was that your pacemaker?
Charles Parker, II

10 Cent Beer Night: The World we now Live In
Johnny Xmas

Realizing Software Security Maturity: The Growing Pains & Gains
Mark Stanislav & Kelby Ludwig

Cyber, Cyber, Cyber - Using the killchain to accomplish something
Amanda Berlin

An Employee, their Laptop and a Hacker walk into a Bar
Shannon Fritz

Eye on the Prize - a Proposal for Legalizing Hacking Back
Adam Hogan

I've got a (Pocket) Bone to pick with you
Dr Phil Postra

Gig

Topic depends on number of federal agents in audience
Atlas of Doom

Embedding Security in Embedded Systems
Dr. Jared DeMott

National Guard for Cyber? How about a Volunteer Cyber Department?
Ray Davidson

Red Team Yourself
Thomas Richards

An Attack Pathway Into Your Organization? Reducing risk without reducing operational efficiency
David Adamczyk

Pen Test War Stories - Why my job is so easy, and how you can make it harder
Aaron Herndon

Skills For A Red-Teamer
Brent White & Tim Roberts

ProbeSpy: Tracking your past, predicting your future
stumblebot

vAp0r and the Blooming Onion
Justin Whitehead & Jim Allee

A GRReat New Way of Thinking about Innovating for Cyber Defense (and even Cyber Offense)
Ernest "Cozy Panda" Wong

Threat Intelligence: Zero to Basics in presentation
Chris J

Learning from InfoSec Fails
Derek Milroy

A Reporter's Look at Open Source Intelligence
Hilary Louise

Hidden Treasure: Detecting Intrusions with ETW
Zac Brown

The Black Art of Wireless Post-Exploitation
Gabriel "solstice" Ryan

Mi Go

Change is Simply an Act of Survival: Predicting the future while shackled to the past
Bil Harmer

Dissecting Destructive Malware and Recovering from Catastrophe
Bryan York

Infosec State of Affairs: Too much Kim Kardashian - not enough Malcolm Gladwel
Jim Wojno & Dan Kieta

How do you POC? Are you really testing a product
Ken Donze

Tales From The Trenches: Practical Information Security Lessons
Michael Belton

Securing the Internet of Things (IoT) -Through Security Research and Vulnerability Analysis
Deral Heiland

The Future of Cyber Security
Anthony Sabaj

Building a Usable Mobile Data Protection Strategy
David "Heal" Schwartzberg

Software Defined Segmentation
Matt Hendrickson

The Shuttle Columbia Disaster: Lessons That Were Not Learned
Joel "I love it when they call me Big Poppa" Cardella

Infrastructure Based Security
Chris Barnes

Defending The De-funded
Keith Wilson

Real-World Red Teaming
spartan

We got it wrong
Wolfgang Goerlich

Critical Incident: Surviving my first layoff by applying BCP/DRP Principles
Tom Mead

9/25/2017 Derbycon 7 Videos
I still have a lot of work to do, but here are the Derbycon 2017 videos. Working on fixing major audio sync issues as I can. Big thanks to my video jockeys Some Ninja Master, Glenn Barret, Dave Lauer, Jordan Meurer, Brandon Grindatti, Joey, nightcarnage, Evan Davison, Tim Sayre, Morgan, Ben Pendygraft, Steven (SciaticNerd), Cory Hurst, Sam Bradstreet, MadMex, Curtis Koenig, Jonathan Zentgraf, James Hurst, Paint27, Chris, Lenard.
9/21/2017 Derbycon Streams
This page links to the streams for the different tracks when we start streaming Friday from Derbycon.
9/19/2017

Louisville Infosec 2017
Below are the videos from the Louisville Infosec 2017 conference. Thanks to all the video volunteers for helping me record.

Building an Infrastructure to Withstand
David Kennedy

Learning Crypto By Doing It Wrong
Jeremy Druin

A Needle in the Cloud
Michael Leigh

How to make your next audit less awful: Compliance by Default
Tom Kopchak

Strengthening the Human Firewall
Alexandra Panaretos

Of Flags, Frogs & 4chan: OPSec Vs. Weponized Autism
Adrian Crenshaw

The Enemy Within - Detecting and Mitigating Insider Threats
Justin Wilkins

Assessing POS Devices for Tampering
Chris Gida

Or How I Learned to Stop Worrying and Love the ...
Robert L. Brown

The Edge of Normal
Mark Loveless

Measuring Cyber Risk with Open FAIR
Apolonio "Apps" Garcia and John Zuziak

Investigating Malware using Registry Forensics
Jason Hale

Defeating the Modern Cyber Attacker
Travis Funkhouser

Show me the Money! Using the CIS Critical Security Controls to procure funding for your security program
Carla Raisler

6/24/2017

BSides Cleveland 2017 Videos
These are the videos from the Bsides Cleveland conference. Thanks to djaj9, , justinschmitt &  as the video team. Thanks to twuntymcslore & RockieBrockway for being con mom & dad.

Morning
 Keynote
Wendy Nather

Better manual web application testing through automation
Brian Mead

Blue-Teamin' on a Budget [of Zero]
Kyle Bubp

PANDA, walking loud in the cloud
Logan Hicks, Seth Hall, Kelsey Hightower, Laura Taylor, Doug Burks

Diary of a Security Noob
TJ Toterhi

Delete Yourself: Cognitive Bias during incidence response
Dru Streicher

Enterprise Monitoring From Zero
Andrew Johnson

What They're Teaching Kids These Days
Rob Olson, Chaim Sanders

Mid-Day Keynote
Ben Ten

IoT Device Pentesting
Erik Daguerre

Cyber, Cyber, Cyber - Using the killchain to accomplish something
Amanda Sullivan Berlin

Decentralization For Security and Freedom: A Discussion of Asymmetric and Decentralized Technologies
Tom Pieragastini

Getting back to the old school
Jamie Murdock

The Python in the Apple
Spencer McIntyre

Quantifying Security's Value - It Can Be Done!
Arianna Willett

Building your Human Firewall
Christopher Jones, John Winkler

Spy vs. Spy - Tips from the trenches for red and blue teams
Thomas McBee, Jeff McCutchan

Eye on the Prize - a Proposal for Legalizing Hacking Back
Adam Hogan

Choose Django for Secure Web Development
Vince Salvino

MacOS - An easy exploit 2-ways.
Cody Smith

Bypassing Next-Gen Tech
David Kennedy

Hacking in Highschool: Inspiring the next generation of security professionals
Michael Benich

Afternoon Keynote
John Strand

6/17/2017 ANYCon 2017 Videos
These are the ANYCon videos. Thanks to Tyler & Erin for inviting me down to record. Also thanks to the AV crew Chris, Bryan, Conner, Nigel, Ben, Dan & Joe.

ANYCon: Year One Kick-Off
Tyler Wightson

Keynote: Industry Of Change
Dave Kennedy

The Changing Landscape of Cyber Security and Training the New Generation of Cyber Warriors
Sanjay Goel

OWASP Top 10: Hacking Web Applications with Burp Suite
Chad Furman

Hacking Politics: Infosec in Public Policy
Jonathan Capra and Rashida Richardson and Shahid Buttar

Sniffing Sunlight
Erik Kamerling

Noob 101: Practical Techniques for AV Bypass
Jared Hoffman

Jedi Mind Tricks: People Skills for Security Pros
Alex DiPerna

Red Team Yourself
Thomas Richards

Jumping the Fence: Comparison and Improvements for Existing Jump Oriented Programming Tools
John Dunlap

The Stuffer
Sean Drzewiecki and Aaron Gudrian and Dr. Ronny L. Bull

Big Data's Big Problems
Jeanna Neefe Matthews

VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments
Dr. Ronny L. Bull

Bringing Home Big Brother: Personal Data Privacy in the Surveillance Age
Todd Brasel and Michele Warner

Measuring the Efficacy of Real-Time Intrusion Detection Systems
Jeffrey Richard Baez

To SIEM or not to SIEM: an Overview
Chris Maulding

Let's Play Defense at Cyber Speed
Duncan Sparrell

Real Security Incidents, Unusual Situations
Adam Dean

Incident Response Evolved - A Preventative Approach to Incident Management
Aaron Goldstein

Thinking 1nside-the-B0x: Cyber Defense and Deterrence via How Hackers Think
Lieutenant Colonel Ernest Y. Wong

Making Friends for Better Security
Alexander Muentz

Does DoD Level Security Work in the Real World?
Jeff Man

The Road to Hiring is Paved in Good Intentions
Tim O'Brien

Whose Idea Was That? Comparing Security Curriculums and Accreditations to Industry Needs
Robert Olson and Chaim Sanders

Hacks, Lies, & Nation States
Mario DiNatale

Hold my Red Bull: Undergraduate Red Teaming
Jonathan Gaines

Ermahgerd: Lawrs
Prof. Robert Heverly

So You Want To Be A H6x0r, Getting Started in Cybersecurity
Doug White and Russ Beauchemin

DIY Spy Covert Channels With Scapy And Python
Jen Allen

InfoSec Career Building Through Reserve Military Service
Dan Van Wagenen

A Day in the Life of a Security Analyst
Marc Payzant and Ken Oliver and Aneesa Hussain

Breaking is Bad: Why Everyone at This Conference Will be Unemployed
Reg Harnish

6/11/2017 Circle City Con 2017 Videos
These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to @irishjack, @0DDJ0BB, @Ajediday, Jim, @securesomething Mike, @KitWessendorf, fl3uryz, InfaNamecheap, Chris and other for helping set up AV and record.

Opening Ceremonies

Opening Keynote: Words Have Meanings
Dan Tentler

And the Clouds Break: Continuity in the 21st Century
Wolfgang Goerlich

DNS Dark Matter Discovery - There's Evil In Those Queries
Jim Nitterauer

Tales from the Crypt...(analyst)
Jeff Man

Trials and Tribulations of setting up a Phishing Campaign - Insight into the how
Haydn Johnson

Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation
Jason Beatty

Talky Horror Picture Show: Overcoming CFP Fears
Kat Sweet

Fuzzing with AFL
Adam DC949

Cybersecurity for real life: Using the NIST Framework to protect your critical infrastructure
Ryan Koop

Why is the Internet still working?
James Troutman

Effective Report Writing for Security Practitioners
Benjamin Robinson

The Decision Makers Guide To Managing Risk
Joel Cardella

Application Security Metrics
Caroline Wong

Security Training: Making Your Weakest Link The Strongest
Aaron Hnatiw

Network Security? What About The Data?
0ddj0bb 0ddj0bb

Detecting DNS Anomalies with Statistics
Jamie Buening

It's A Disaster!
Cheryl Biswas

OSINT And Your World A Love Story
Michael James

Network manipulation on video games.
Alex Kot

Threat Intelligence: Zero to Basics
Chris J

The Kids Aren't Alright: Security and K-12 Education in America
Vivienne Pustell

Ph'ing Phishers
JAe

How To Be Curious
Bret Mattingly

Of Flags Frogs 4chan OPSec vs Weaponized Autism
Adrian Crenshaw

The State of Security in the Medical Industry
Cannibal (billy)

Open Sesamee
Max Power

See beyond the veil: Automating malicious javascript deobfuscation
Chad Robertson

Changing our future with 3D Printing
Emily Peed

You're not old enough for that: A TLS extension to put the past behind us
Falcon Darkstar Momot

We Don't Always Go Lights and Sirens
Kendra Cooley

Ichthyology: Phishing as a Science
Karla Burnett

Creating Your Own Customized Metamorphic Algorithm
Raul Alvarez

Peakaboo - I own you: Owning hundreds of thousands of devices with a broken HTTP packet
Amit Serper

Ye Olde Hacking
Johnny Xmas

Closing Keynote: Lectures or Life Experiences - Awareness Training that Works!
Tottenkoph & Cindy Jones

Closing Ceremonies

6/9/2017

ShowMeCon 2017 Videos
These are the videos ShowMeCon 2017. Thanks to Renee & Dave Chronister (@bagomojo) and others for having me out to record and speak. Also thanks to my video crew @r3tr0_cod3x Aaron, Jon and some other people I may have forgotten.

Data Loss Prevention in a Social Media World
Phllip Tully

Royal Testing: Purple teaming to build and secure applications better!
Kevin Johnson

Dark Web Economies (...and you can too!)
Johnny Christmas

DIY CTF - How to gain momentum on your security awareness program by hosting a CTF
Matt Thelan

Deconstructing Chaos: through "Behavioral Detection"
Daniel Stiegman

Something Died Inside Your Git Repo: Recognizing the Smell of Insecure Code
Cliff Smith

REVERSING A POLYMORPHIC FILE-INFECTING RANSOMWARE
Raul Alvarez

The Beginner's Guide to ICS: How to Never Sleep Soundly Again
Dan Bougere

Windows IR made easier and faster - Find the head of the snake using AutoRuns, Large Registry Keys, Logs, IP/WhoIs and Netflow
Michael Gough

Homebrew powershell: Where to begin with Data Sources and baseline data.
Andrew Metzger

Where Cypherpunk Meets Organized Crime: The Shifting Landscape of Underground Economies and Crypto-driven Privacy
Ben Brown

VR-Bleeding Edge of Development and Technology-But Are We Making Old Mistakes?
Arnar Gunnarson

F@$#IN Trojans! An Interactive Impromptu Talk on Our Most Dangerous Threat
Parameter

Kick starting an application security program
Tim De Block

Of Flags, Frogs & 4chan: OPSec vs. Weaponized Autism
Adrian Crenshaw

Intro to Threat Hunting
Aaron Mog

Panel Title: The Good, the Bad, and the Ugly: HIPAA in an InfoSec World
Hudson Harris

How to Patch Stupid - A Modern Approach To Securing Users
Joshua Crumbaugh

When Molehill Vulnerabilities Become Mountainous Exploits
Igor Matlin

Dear Blue Team, This is why I always win. Love, A Hacker
Dave Chronister

How I Inadvertently Outsourced My IT Job to a Fancy Bear
Tim MalcomVetter

5/21/2017

NolaCon 2017 Videos
Recorded at NolaCon 2017. Thanks to @CurtisLaraque, Federico, Morgan, & Ken for the video recording help, and @nola_con, @erikburgess_, Yvonne & Rob for having me down to record.

Does DoD Level Security Work in the Real World?
Jeff Man

Hacking the IoT: A Case Study
Nancy Meares Snoke and Phoenix Snoke

Going past the wire: Leveraging Social Engineering in physical security assessments
"Snow" Stephanie Carruthers

Hurt Me Plenty: The Design and Development of Arganium
Todd Carr

Easy Indicators of Compromise: Creating a Deception Infrastructure
David Kennedy

Arming Small Security Programs: Network Baseline
Matt Domko

Make STEHM Great Again
David Schwartzberg

Designing and Implementing a Universal Meterpreter Payload
Brent Cook

EDNS Client Subnet (ECS) - DNS CDN Magic or Secur
Jim Nitterauer

Rooting out evil: defend your data center like the Secret Service protects the President
Nathaniel Gleicher

Attacking Modern SaaS Companies
Sean Cassidy

The Unbearable Lightness of Failure
Dave Lewis

Phishing for Shellz: Setting up a Phishing Campaign
Haydn Johnson

Iron Sights for Your Data
Leah Figueroa

Security Guards -- LOL!
Brent White & Tim Roberts

Embrace the Bogeyman: Tactical Fear Mongering for Those Who Penetrate
FuzzyNop

Skynet Will Use PsExec: When SysInternals Go Bad
Matt Bromiley & Brian Marks

The Devil's Bargain: Targeted Ransomware and Its Costs
Joshua Galloway

22 Short Films About Security
Charlie Vedaa

Security is dead. Long live Infosec!
David Shaw

An Employee, their Laptop and a Hacker walk into a Bar
Shannon Fritz

Beyond OWASP Top 10
Aaron Hnatiw

Scamming the Scammers: Hacking scammers with pwns
Nathan Clark

 
5/13/2017 BSides Detroit 2017 Videos
These are the videos from the BSides Detroit 2017 Conference. Thanks to Ryan Harp (@th3b00st), Dan Falk (@dnfalk), Wolfgang Goerlich (@jwgoerlich), Matt Johnson (@mwjcomputing), Kyle Andrus (@chaoticflaws), Kate Vajda (@vajkat) and Chris Maddalena (@cmaddalena) for having me out and Samuel Bradstreet, Daniel Ebbutt, Luke Gorczyca, James Green,  David Sornig, Steven Balagna, Brandon Robinson, Brett Hansen, Briee de Graaf, Nick Papa, Brandon Azer  and others I may forget for helping to record.

Moving Towards Maturity: 5 Issues InfoSec Must Address
Jim Beechey

Plotting Hackers: Visualizing Attack Patterns
Kent Gruber

STEHM is the new STEM
David Schwartzberg

Hacking with Ham Radios: What I have learned in 25 years of being a ham.
Jay and Jerome Radcliff

Navigating Career Choices in InfoSec
Fernando Montenegro

Windows Event Logs - Zero to Hero
Nate Guagenti / Adam Swan

Network Security? What about the Data?
Jack Hatwick

ProbeSpy: Tracking your past, predicting your future
Ian Odette

Playing in Memory: Examples of User Theivery and Hunting for Malware
Kyle Andrus

The AppSec Starter Kit
Timothy De Block

An Employee, their Laptop and a Hacker walk into a Bar
Shannon Fritz

Estimating Development Security Maturity in About an Hour
Matt Clapham

5/12/2017 Converge 2017 Videos
These are the videos from the Converge Information Security Conference. Thanks to Wolf for having me out and Sam, Samuel Bradstreet, Daniel Ebbutt, Luke Gorczyca, James Green,  David Sornig, Steven Balagna, Brandon Robinson, Brett Hansen, Amanda Ebbutt, Nick Papa, Brandon Azer  and others I may forget for helping to record.

You Are Making Bad Decisions and You Should Feel Bad
Joel Cardella

Violent Ruby: A Talk for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Kent Gruber

Prioritize Vulnerability Remediation
Amol Sarwate

Stories through Logging: "It was the best of logs, it was the worst of logs"
Tom Kopchak

That Escalated Quickly
Shaun Bertrand

How to kick start and application security program
Timothy De Block

Vectors and Victims: Analyzing vulnerabilities through disease models
Rich Cassara

Threat Modeling 101
Matt Clapham

Prioritizing IT Security Projects for the Business
Martin Bally, Steve Barone, John Beeskow, David Derigiotis, Russ Gordon, John Scrivens

Defending The De-funded
Keith Wilson

How to Transform Developers into Security People
Chris Romeo

You have Updates!...A look at an old tool making a comeback 'Evilgrade'
Reid Brosko

Predicting Exploitability
Michael Roytam

Fast wins for the defense!
Justin Herman

How Much Security Do You Really Need?
Wendy Nather

Tarnished Silver Bullets
Wolfgang Goerlich

A Top 10 List for Better AppSec (Hint: It's Not the OWASP Top Ten)
Dave Ferguson

AppSec Behaviors for DevOps Breed Security Culture Change
Chris Romeo

The 4 Eyes of Information Security
Fernando Montenegro

Practical Security Recommendations from an Incident Responder
Matthew Aubert

You and Your Technical Community
David Giard

Panel - Cyber Security Hiring, Retention, and How to Get the Perfect Job in a Competitive Market

Misbehaving Networks?
Daniel Gregory

Leveraging Vagrant to Quickly Deploy Forensics Environments
Jeff Williams

New School Security: Combat Mindset
Mike Behrmann

4/30/2017 BSidesCharm 2017 Videos
These are the videos BSidesCharm (Baltimore) 2017. Thanks for inviting me down to record

Keynote
Rob M Lee

Clean up on Aisle APT
Mark Parsons

Frony Fronius - Exploring Zigbee signals from Solar City
Jose Fernandez

Weaponizing Splunk: Using Blue Teams for Evil
Ryan Hays

Current State of Virtualizing Network Monitoring
Daniel Lohin & Ed Sealing

The Not So Same-Origin Policy
David Petty

IoT Pressure Cooker What Could Go Wrong
Ben Actis

OPSEC for the Security Practictioner
Michael Clayberg

Automating Bulk Intelligence Collection
Gita Ziabari

I Went Phishing and Caught a Charge Maryland Law for Pentesters
Joshua Rosenblatt

Imposter Syndrome: I Don't Feel Like Who You Think I Am
Micah Hoffman

The Battle for OSINT - Are you Team GUI or Team Command Line?
Tracy Z. Maleeff & Joe Gray

SOC Panel Keynote

Keynote
Jim Christy

Red Teaming the Board
Robert Wood

The AVATAR Project and You
da_667

Threat Hunting - Thinking About Tomorrow
Tazz

Understanding the Cybersecurity Act of 2015
Jeff Kosseff

Detecting the Elusive: Active Directory Threat Hunting
Sean Metcalf

Microsoft Patch Analysis for Exploitation
Stephen Sims

Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy
Matt Domko

The Cryptography of Edgar Allan Poe
Robert Weiss (pwcrack)

Closing

4/22/2017 BSides Nashville 2017 Videos
These are the videos BSides Nashville 2017. Thanks to @lil_lost for inviting me down to record and being my bodyguard while in Nashville. Big thanks to Geoff Collins, Gabe Bassett, and others for helping set up AV and record.

Mental Health in Infosec: Hackers, Hugs, & Drugs
Amanda Berlin

Got Vendors?
Armin Smailhodzic and Willie Hight

Emerging Legal Trends in Cybersecurity
Rodney Hampton

Trust, But Verify, Your SAML Service Providers
Bruce Wilson

Does DoD Level Security Work in the Real World?
Jeff Man

Abstract Tools for Effective Threat Hunting
Chris Sanders

Infosec Tools of the Trade: Getting Your Hands Dirty
Jason Smith and Tara Wink

How to learn reverse engineering, kick ass at bug bounties, and being a bad ass SOC analyst
ben actis

A Pyrate looks at 40
Adam John

Springtime for code reviews
Ryan Goltry

Marrying Incident Response and Threat Intel Within Your Enterprise
Joe Gray and Ben Shipley

Security Guards -- LOL!
Brent White

Windows Operating System Archaeology
Casey Smithand Matt Nelson

Intro to drone tech
Ron Foster

Weaponizing Splunk: Using Blue Team Tools for Evil
Ryan Hays

Chunky Cookies: Smashing Application Aware Defenses
Russell Butturini

4/7/2017 AIDE 2017 Videos
Recorded at AIDE 2017. Big thanks to Bill Gardner (@oncee) for having me out to record.

The Attack Is Coming From Inside The Refrigerator!
Mark Boltz-Robinson

Human Error and It's Impact on Your Infosec Program
Mike Baker

How to Speak Cat Picture Resiliency -- The ability to make a business case for proactive incident response
Scott Lyons and Joshua Marpet

Learning Cryptography by Doing it Wrong
Jeremy Druin

I Survived Ransomware... TWICE
Matt Perry

How Russia Hacked The Election
Bill Gardner

OS X Forensics
Brian Martin

Making Our Profession More Professional
Bill Gardner

4/1/2017

Cyphercon 2.0 Videos
These are the videos from the Cyphercon 2.0 conference. Thanks to Michael Goetzman for having me out to record, and Paul and Tom for helping record.

Opening Ceremony
CypherCon Organizors

KEYNOTE: STEHM is the new STEM
David "Heal" Schwartzberg

Beyond the Fringe: Anomalies of Consciousness, Experience, and Scientific Research
Richard Thieme

Cluster Cracking Passwords & MDXfind
Robert Reif

A Look Behind the Scenes of DEFCON DarkNet
Ed Abrams (zeroaltitude), Demetrius Comes (cmdc0de)

JavasCrypto: How we are using browsers as Cryptographic Engines
Kat Traxler

Can Cryptography Frustrate Fascism?
Phillip Rogaway

Threat Intelligence 101: Basics without Buzzwords
M4n_in_Bl4ck

Explore Wisconsin Hacker History
Brad Swanson

Brain Based Authentication
Melanie Segado, Sydney Swaine-Simon

The Upside Down: Going from NetSec to AppSec
Cody Florek

Tracking/Monitoring WiFi devices without being connected to any network
Caleb Madrigal

Wireless Capture the Flag
Eric Escobar

KEYNOTE: The History of Video Game Console Hacking
Dan Loosen

Protecting Passwords with Oblivious Cryptography
Adam Everspaugh

A Look Behind the Scenes of DEFCON DarkNet - Part II - Part II
Ed Abrams (zeroaltitude), Demetrius Comes (cmdc0de)

Forensic Deconstruction of Databases through Direct Storage Carving
Dr. Alexander Rasin

Espionage & Soviet MiGs
Dave Roebke

Naked and Vulnerable: A Cybersecurity Starter Kit
Shannon Fritz

Wasn't DLP supposed to fix this?
Amit Riswadkar (FeMaven)

IoT Security Privacy Weaknesses & Ransomware
Rick Ramgattie

Predictive Analytics and Machine Learning: 'Real' Use Cases for IT/Security Professionals
John Platais

From zero to Bender in 12 months, how a software guy turned hardware
Zapp

Badge Panel

Does DoD Level Security Work in the Real World?
Jeff Man

Badges

Closing Ceremony
CypherCon Organizors

3/25/2017 Bloomcon 2017 Videos
These are the videos from the Bloomcon conference.

Strange times we live in:
Alexander Muentz

Real World Examples of IT Risks
Fred Reck

The first 48: All your data are belong to us
Chad Gough & Molody Haase & Jared Sikorski

Deleted Evidence: Fill in the Map to Luke Skywalker
David Pany

The Cox Fight and Beyond: Kodi, the Brave New World of Copyright Infringement, and ISP Liability
Alex Urbelis

What is the size of a sparse file in NTFS
John Riley

Black Box Mac OSX Forensics
Brian Martin

Math and Cryptography
Sam Gross

Road Ahead
Ben Tice

Honey, I Stole Your C2 Server: A dive into attacker infrastructure
Andrew Rector

Building a Scalable Vulnerability Management Program for Effective Risk Management
Katie Perry

New results in password hash reversal
Mark Sanders

Lessons Learned from Pwning my University Aaron Thomas
Aaron Thomas

Windows Event Logs - Zero to Hero
Nate Guagenti & Adam Swan

What Can my Logs Tell me?
Art Petrochenko

A POS Breach Investigation
Kevin Strickland

Abusing Google Dorking and Robots.txt
Dave Comstock

APT-What the heck is an APT?
Bill Barnes

Technological Changes that Affect Forensic Investigations
Diane Barrett

Deceptive Defence
Daniel Negron

Cryptography 0-128
Ben Tice

Sometimes They Are Innocent!
Scott Inch

Securely Deleting Data from SSDs
Stephen Larson

3/11/2017 BSides Indy 2017 Videos

These are the videos from the BSides Indy conference.

Intro

Strategies on Securing you banks & enterprises. (From someone who robs banks & enterprises for a living!)
Jayson Street

Crypto defenses for real-world system threats
Kenneth White

Hardware Hacking: Abusing the Things
Price McDonald

Kick starting an application security program
Timothy De Block

OSINT For The Win - Tools & Techniques to Maximize Effectiveness of Your Social Engineering Attacks
Joe Gray

Physical Phishing, Way Beyond USB Drops!
Rich Rumble

Weaponizing Nanotechnology and hacking humans; 2017 updates :)
Chris Roberts

Make STEHM Great Again
David Schwartzberg

2/25/2017 BSides NOVA 2017 Videos
These are the videos from BSides NOVA 2017.. Thanks to those who manned the video rigs.

AM Key Note
Ron Gula

Using Software Defined Radio for IoT Analysis
Samantha Palazzolo

Imposter Syndrome: I Don't Feel Like Who You Think I Am.
Micah Hoffman

PM Keynote - Tarah Wheeler

How the Smart-City becomes stupid
Denis Makrushin

Won't Get Fooled Again: The expected future of IoT malware and what to do about it.
Blaine Mulugeta

Software Supply Chains and the Illusion of Control
Derek Weeks

"Humans, right?" Soft Skills in Security
Ariel Robinson

Panel | Local Community Cyber Groups in NoVA
Jeremy Duncan

Networking with Humans to Create a Culture of Security
Tracy Maleeff

Why the NTP Security Problem Is Worse than You Think
Allan Liska

Bro, I Can See You Moving Laterally
Richie Cyrus

Panel | Parlaying Education and Experience into an Infosec Career
Forgotten Sec

So you want to be a "Cyber Threat Analyst" eh?
Anthony Melfi

0 to 31337 Real Quick: Lessons Learned by Reversing the Flare-On Challenge
Blaine Stancill

Finding a Companies BreakPoint
Zachary Meyers

Challenges and Opportunities: Application Containers and Microservices
Andrew Wild

Cyber Hunt Challenge - Develop and Test your Threat Hunting skills
Darryl Taylor

Anti-Virus & Firewall Bypass Techniques BY Candan B-LÜKBAS
Candan Bolukbas

I'm Cuckoo for Malware: Cuckoo Sandbox and Dynamic Malware Analysis
Lane Huff

2/12/2017 BSides Tampa 2017 Videos
These are the videos from the BSides Tampa conference. Thanks to all of the BSides Crew for having me out to help record and render the videos. Special thanks to my video crew.

Keynote Talk : - Cyber Security in the Age of Espionage
Eric O'Neill (Not posted)

Advanced Targeted Attack.
Andy Thompson

Phishing Pholks Phor Phun and Prophit
Erich Kron

Alert All the Things! (Network Baselines/Alerts with Bro Scripts)
Matthew Domko

Intro to Fuzzing for Fun and Profit
Brian Beaudry

Keynote
Kevin Poulsen (Not Recorded)

Build Your Own Physical Pentesting Go-Bag
Beau Bullock, Derek Banks

NFC Your Smartphone's Best Friend or Worst Nightmare
Shane Hartman

e-Extortion Trends and Defense
Erik Iker

HIPAA for Infosec Professionals
Michael Brown

Deconstructing 100% JavaScript-based Ransomware
Jeremy Rasmussen & Paolo Soto

Mozilla's tips on strong HTTPS
Julien Vehent

Redefining Security in a Cloud-Centric Future
Mike Spaulding & Mitch Spaulding

Securing The Electrical Grid From Modern Threats
Christopher Williams

Securing Agile Development
Alan Zukowski

What I've Learned Writing CTF Challenges
Vito Genoese

Build the capability to Detect, Triage And Respond
Scott Sattler

What the Hell is ICS Security?
Brandon Workentin

Protecting Third-Party Risk From Plundering
Stacey Banks

Protecting Visual Assets: Digital Image Counter-Surveillance Strategies
Nikita Mazurov & Kenneth Brown

ArchStrike Linux
Chad Seaman

Hacking The Sabbath
Jonathan Singer

Chaining The Future: Block Chains and Security
Joe Blankenship

1/16/2017 BSides Columbus 2017 Videos
These are the videos from the BSides Columbus Ohio conference. Thanks to Michael Spaulding for having me up and those who manned the video rigs.

Learning From Pirates of the Late 1600s - The first APT
Adam Hogan

What I Learned About Cybersecurity by Training With US Navy SEALs
Matthew Curtin

Cross Origin Resource Sharing Kung fu
Aditya Balapure

Redefining Security in a Cloud Centric Future
Mike Spaulding

Automating Security in Building Software
Warner Moore

Planning and Executing a Red Team Engagement
Timothy Wright

DNSSec Explained!
Dan Benway

Midwestern Nice - Stereotype or Enterprise Threat?
Valerie Thomas

Information Security Talent Trends to expect in 2017
Megan Wells AJ Candella

12/03/2016 BSides Philadelphia 2016
These are the videos from BSides Philadelphia 2016.

Attacker's Perspective: A Technical Demonstration of an Email Phishing Attack
Zac Davis

Crashing Android phones via hostile networks
Yakov Shafranovich

I'm Cuckoo for Malware: Cuckoo Sandbox and Dynamic Malware Analysis
Lane Huff

How to Find a Company's BreakPoint
Andrew McNicol

What the deuce? Strategies for splitting your alerts.
John T. Myers

Red Team Yourself
Thomas Richards

Keynote
Matt Blaze

Solar Flare - Pulling apart SolarWinds ORION
Rob Fuller

Staying Afloat in a Tsunami of Security Information
Tracy Z. Maleeff

Hunting: Defense Against The Dark Arts
Danny Akacki

Every day is a Zero Day: Building an in-house Secure SDLC program
Tony Reinert

Owning MS Outlook with Powershell
Andrew Cole

A tour through the magical wonderful world of crypto land
Ben Agre

Remote attacks against IoT
Alex Balan

Hacking the Human: Social Engineering Basics
Dave Comstock (sten0)

Where do I start?
Charles Sgrillo II

Top 10 Mistakes Made In Active Directory That Can Lead To Being Compromised
Adam Steed

So you want to beat the Red Team?
Cameron Moore

Hacking Your Way into the APRS Network on the Cheap -- Extended Edition
Mark Lenigan

Threat Intel Analysis of Ukrainian's Power Grid Hack
Nir Yosha

Cryptography Pitfalls
John Downey

Information security and the law
Alex Muentz

Getting Permission to Break Things
William Bailey

"Knowing the Enemy"- Creating a Cyber Threat Actor Attribution Program
Jack Johnson

Red Teaming your Risk Management Framework
Keith Pachulski

Web Application Exploit 101 : Breaking Access Control and Business Logic
Tomohisa Ishikawa

Size Doesn't Matter : Metrics and Other Four Letter Security Words
Jim Menkevich

10/20/2016 SecureWV/Hack3rcon 2016 Videos

These are the videos of the presentations from Secure West Virginia 2016. Thanks to Dave, Justine and Tim for helping record. Sorry for the off audio timings, this is the first time I've used OBS Studio for a con and I was testing new capture gear.

Welcome
Benny Karnes

Keynote
Dave Kennedy

SHALL WE PLAY A GAME. How to make an two player bartop arcade machine with a Raspberry Pi.
Steven Truax

Maker/Hacker Space Panel - RCBI
 

So You Wanted to Work in Infosec
Joey Maresca

Making Our Profession More Professional
Bill Gardner

Special Agent Michelle Pirtle
(not recorded)

So You've Inherited a Security Department, Now What?
Amanda Berlin

SUSpect - A powershell based tool to provide early detection of ransomware and other attack techniques.
Mick Douglas

Building an Infosec Program from Ground Zero: From the Coat Closet to the Data Center
David Albaugh

How to Not Cheat on Your Spouse: What Ashley Madison Can Teach Us About OpSec
Joey Maresca

Windows Timelines in Minutes
Dr. Philip Polstra

Scripting Myself Out of a Job - Automating the Penetration Test with APT2
Adam Compton

WTF? Srsly? Oh FFS! - IR Responses
Mark Boltz-Robinson


Women in Infosec Panel
Adrian Crenshaw
Amanda Berlin
Taylor
Blair Gardner
(not posted)

Securing The Secure Shell, The Automated Way
Adam Vincent

Bitcoin: From Zero to "I get it."
Luke Brumfield

How to hack all the bug bounty things automagically & reap the rewards (profit)!
Mike Baker

Giving Back - Submitting to PTES 101
Jeremy Mio

Closing/Awards
Benny Karnes

Training

Intro to Linux
Benny Karnes

BASH Scripting
Justin Rogosky
(not recorded)

Python Scripting
Adam Byers

Intro to Kali
Wyatt Nutter

Forensics

Evidence Collection
John Sammons

Intro to WireShark
Josh Brunty

Intro to Digital Forensics
John Sammons

Network Forensics using Kali Linux and/or SANS Sift
Josh Brunty

Mobile Forensics An Introduction
Josh Brunty

10/08/2016 GrrCON 2016 Videos
These are the videos of the presentations from GrrCON 2016. Big thanks to EggDropX and Jaime for having me out, and my video crew  (Chris, Erick, & Cooper) for recording.

Thieves

Act Three, The Evolution of Privacy
Finux

Weaponizing Nanotechnology and hacking humans; defining the boundaries
Chris Roberts

Becoming a Cyborg: The First Step Into Implantable Technology
Michael Vieau

Abnormal Behavior Detection in Large Environments
Dave Kennedy

Secure Dicks
Michael Kemp

and bad mistakes I've made a few...
Jayson Street (Only first 30 min)

Predator to Prey: Tracking Criminals with Trojans and Data Mining for Fun and Profit
Ken Westin

Guarding Dinner
J Wolfgang Goerlich

Back to the Future: Understanding our future but following the past
Kevin Johnson

Breaking Android Apps for Fun and Profit
Bill Sempf

Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years
Matt Bromiley & Preston Lewis

Security Guards -- LOL! Brent White & Tim Roberts

Pirates

Internet of Things (IoT) radio frequency (RF) Analysis With Software Defined Radio
Kevin Bong

So You Want to Be a Pentester
Absolute0x0

What do you mean I'm pwn'd! I turned on automatic updates!
Scott Thomas & Jeff Baruth

Surreal Paradigms: Automotive Culture Crash
D0xt0r Z3r0

Reversing and Exploiting Embedded Devices (Walking the software and hardware stack)
Elvis Collado

Threat Detection & Response with Hipara
J. Brett Cunningham

Still Broken After All These Years Aka Utility Security For Smarties
Doug Nibbelink

Threat Detection Response with Hipara
J Brett Cunningham

Quick and Easy Windows Timelines with Pyhon, MySQL, and Shell Scripting
Dr. Phil Polstra

Cruise Ship Pentesting OR Hacking the High Seas
Chad M. Dewey

Using Virus Total Intelligence to track the latest Phishing Document campaigns
Wyatt Roersma

Encryption, Mobility & Cloud Oh My!
Bill Harmer

Magnetic Stripes 101
Tyler Keeton

Machine Duping: Pwning Deep Learning Systems
Clarence Chio

Money, Fame, Power - Build your success as a security professional
Nathan Dragun

Tales from the Crypt...(analyst)
Jeff Man

What's in your Top Ten? Intelligent Application Security Prioritization
Tony Miller

Binary Ninja
Jared Demott

Phish your employees for fun!
Kristoffer Marshall

Mad Scientists

Securing Trust - Defending Against Next-generation Attacks
John Muirhead-Gould

Five Nights At Freddys: What We Can Learn About Security From Possessed Bears
Nick Jacob

Make STEHM Great Again
David "HealWHans" Schwartzberg

Pentester-to-customer:I will 0wn your network! - Customer-to-pentester:No, I will make you cry!
David Fletcher & Sally Vandeven

How Do You Secure What You Don't Control
Dimitri Vlachos

Fighting the Enemy Within
Matt Crowe

Getting to the Root of Advanced Threats Before Impact
Josh Fazio

Reality-Checking Your AppSec Program
Darren Meyer

How to Implement Crypto Poorly
Sean Cassidy

Stop attacking your mother's car!
Charles Parker, II

Contracting: Privacy Security and 3rd Party
Nathan Steed & Kenneth Coleman

Alignment of business and IT Security
Shane Harsch

So You've Inherited a Security Department, Now What?
Amanda Berlin

Piercing the Air Gap: Network Steganography for Everyone
John Ventura

On being an Eeyore in Infosec
Stefan Edwards

Welcome to The World of Yesterday, Tomorrow!
Joel Cardella

Board Breaking

9/26/2016

Derbycon 2016 Videos
The link above is where I will be putting presentations from Derbycon 2016 (it will take a few days). Big thanks to my video jockeys Sabrina, Some Ninja Master, Glenn Barret, Dave Lauer, Jordan Meurer, Brandon Grindatti, Joey, Fozy, nightcarnage, Evan Davison, Chris Bridwell, Rick Hayes, Tim Sayre, Lisa Philpott, Ben Pendygraft, Sarah Clarke, Steven (SciaticNerd), Cory Hurst, Sam Remington, Barbie, Chris Bissle (and maybe the speakers too I guess).

9/20/2016

Louisville Infosec 2016 Videos
Below are the videos from the Louisville Infosec 2016 conference. Thanks to all the video volunteers for helping me record. 

Morning Keynote
Chandler Howell
Ryan J. Murphy
John Pollack

The Domain Name System (DNS) - Operation, Threats, and Security Intelligence
Tom Kopchak

Insiders are the New Malware
Brian Vecci

Cloud Security; Introduction To FedRAMP
Sese Bennet

Cloud Access Security Broker - 6 Steps To Addressing Your Cloud Risks
Matt Bianco

Not One Thin Dime: Just Say No to Ransomware!
Mick Douglas

Securing Docker Containers
Chris Huntington

Emerging Governance Frameworks for Healthcare Security
Max Aulakh

Building Our Workforce
Kristen Bell

The Art of Offense and Defense
Mark Loveless

The Current State of Memory Forensics
Jason Hale

Understanding Attacker's use of Covert Communications
Chris Haley

How to Talk to Executives about Security
Harlen Compton

Pen Testing; Red and Blue Working Together
Martin Bos

Data Loss Prevention - How to get the most for your buck
Brandon Baker

The Transition: Risk Assessment > Risk Management
Mike Neal

Darwinism vs. Forensics
Bill Dean

Closing

 

9/11/2016 BSides Augusta 2016 Videos
These are the videos from the BSides Augusta conference. Thanks to Lawrence Abrams, and all of the BSides Crew for having me out to help record and render the videos and Pentestfail and everybody that staffed a recording rig.

Keynote

Keynote - Robert Joyce

Super Bad

Mobile Hacking
Aaron Guzman

Incident Response Awakens
Tom Webb

Dr. Pentester or: How I Learned To Stop Worrying and Love the Blue Team
Ryan O'Horo

Exploit Kits/ Machine Learning
Patrick Perry

Detection of malicious capabilities using YARA
Brian Bell

Owning MS Outlook with Powershell
Andrew Cole

RAT Reusing Adversary Tradecraft
Alexander Rymdeko-Harvey

Internet of Terrible
Brandon McCrillis

I Got You

Using Honeypots for Network Security Monitoring
Chris Sanders

This one weird trick will secure your web server!
David Coursey

This is not your Momma's Threat Intelligence
Rob Gresham

Moving Target Defense: Evasive Maneuvers in Cyberspace
Adam Duby

Beyond Math: Practical Security Analytics
Martin Holste

Exploit Kits and Indicators of Compromise
Brad Duncan

ICS/SCADA Threat Hunting
Robert M. Lee and Jon Lavender

Agilely Compliant yet Insecure
Tom Ruff

It's Too Funky In Here

Gamification for the Win
Josh Rykowski and Scott Hamilton

IDS/IPS Choices: Benefits, Drawback and Configurations
ForgottenSec

Micro-segmentation and Security: The Way Forward
Jack Koons

Adventures in RAT dev
Hunter Hardman

Linux privilege escalation for fun, profit, and all around mischief
Jake Williams

How About a Piece of Pi - Experiences with Robots and Raspberry Pi Hacking
John Krautheim

Flaying out the Blockchain Ledger for Fun, Profit, and Hip Hop
Andrew Morris

Network Situational Awareness with Flow Data
Jason Smith

Living In A America

A worm in the Apple - examining OSX malware
Wes Widner

You TOO can defend against MILLIONS of cyber attacks
Michael Banks

Finding Evil in DNS Traffic
Keelyn Roberts

Ransomware Threats to the Healthcare Industry
Tim Gurganis

Using Ransomware Against Itself
Tim Crothers and Ryan Borres

Hunting: Defense Against The Dark Arts
Jacqueline Stokes, Danny Akacki, and Stephen Hinck

Automating Malware Analysis for Threat Intelligence
Paul Melson

Hide and Seek with EMET
Jonathan Creekmore and Michael Edie

7/17/2016 BSides Detroit 2016 Videos
These are the videos from the BSides Detroit 2016 Conference. Thanks to Wolf for having me out and Chris, Daniel, Daniel, Ed, Ben, Emi, Sam, Adam & Eric and others I may forget for helping to record.

Intro

BSides Keynote
Atlas Of D00m

Car Hacking 0x05
Robert Leale

Learning Security the Hard Way: Going from Student to Professional
Benjamin Carroll

So You Want to Be a Pentester
Calvin Hedler

Sheep, the Shepard, History, and Eugenics - A historical reminder on why personal privacy matters when it comes to the government and corporations in the digital age.
David Schaefer

Emerging Threats
Tazz Tazz (Not posted)

I Have Been to The Future and I Did Not Want to Come Back
Garrett McManaway

How to Build a Home Lab
Chris Maddalena

Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk
Gordon MacKay

Bootstrapping A Security Research Project
Andrew Hay

7/16/2016

Converge 2016
These are the videos from the Converge Information Security Conference. Thanks to Wolf for having me out and Chris, Daniel, Daniel, Ed, Ben, Sam, Adam & Eric and others I may forget for helping to record.

Intro

Keynote 1
Steve Werby

So You've Inherited a Security Department, Now What?!?!
Amanda Berlin

Violating Trust: Social Engineering Past and Present
Paul Blonsky

AppSec Awareness: A Blue Print for Security Culture Change
Chris Romeo

Red Team Madness - Or, How I Learned To Stop Worrying and Expect Pentester Mistakes
Jeremy Nielson

Threat Modeling for Secure Software Design
Robert Hurlbut

Not Even One Shade of Gray: Stop Tolerating Compromise in Security
Rich Boyer

MySQL 5.7 Security
Dave Stokes

Evolving the Noise out InfoSec using Law Enforcement Paradigms
Charles Herring

Game of Hacks - Play, Hack, and Track
Igor Matlin

Red is the new Blue - Defensive Tips & Tricks from a Defender turned Pentester
Ben Ten

Building a better user: Developing a security-fluent society
Rich Cassara

Food Fight
J Wolfgang Goerlich

Maneuvering Management Madness
Andrew Hay

Enterprise Class Threat Management Like A Boss
Rockie Brockway

Compliant, Secure, Simple. Pick two.
Joshua Marpet

Sentry on the Wall
Reid Brosko

Expanding Your Toolbox the DIY Way
Chris Maddalena

Surreal Paradigms: Automotive Culture Crash
Dave Schaefer

Haking the Next Generation
David Schwartzberg

Malware Magnets: A practical walkthrough in developing threat intelligence
Tazz Tazz

Still broken after all these years aka Utility Security for Smarties
Doug Nibbelink

7/09/2016 OISF 2016 Videos
These are the videos from the OISF Anniversary Event

Intro
Tom Webster

Breaking The Teeth Of Bluetooth Padlocks
Adrian Crenshaw

Identifying and Exploiting Hardware Vulnerabilities: Demo of the HRES Process
Tim Wright

2016 Predictions and How History repeats itself
Jason Samide

A Lawyer's Perspective on Data Security
Dino Tsibouris and Mehmet Munur


The Attacker's Dictionary
Joel Cardella

6/25/2016

BSides Cleveland 2016 Videos
These are the videos from the BSides Cleveland conference. Thanks to djaj9, , Kevin, f0zziehakz &  as the video team. Thanks to twuntymcslore & RockieBrockway for being con mom & dad.

Morning Keynote
Ian Amit

Elementary, my dear Watson - A story of indicators
Nir Yosha

Preventing credential theft & lateral movement after initial compromise.
Cameron Moore

Ask a CISO
Jamie Murdock

Crime Prevention Through Environmental Design
Michael Mendez

Fun with One Line of Powershell
Matthew Turner

Learning From Pirates of the Late 1600s - The first APT
Adam Hogan

Food Fight!
Wolfgang Goerlic

Afternoon Keynote
Chris Roberts

The Art of Bit-Banging: Gaining Full Control of (Nearly) Any Bus Protocol
Aaron Waibel

Playing Doctor: Lessons the Blue Team can Learn from Patient Engagement
J Wolfgang Goerlich & Stefani Shaffer-Pond

Security Automation in your Continuous Integration Pipeline
Jimmy Byrd

The WiX Toolset, How to Make Your Own MSIs
Charles Yost

A Rookie PoV: The Hollywood Fallacy
Raquel Milligan

Port Scanning the Hermit Kingdom: Or What NMAP Can Teach Us About Geopolitics
Thomas Pieragastini

Responder for Purple Teams
Kevin Gennuso

Splunk for IR and Forensics
Tony Iacobelli

Bridging the Gap or: How I Learned to Stop Worrying, and Love the Developers
Eric Mikulas

SafeCracking on a Budget Redux
David Hunt and Zack Nagaich

Process Ventriloquism
Spencer McIntyre

The Digital Beginning of the Analog End
Brad Hegrat

Gamify Security Awareness: Failure to Engage is Failure to Secure
Michael Woolard

Cons and Conjurers: Lessons for Infiltration
Paul Blonsky

Closing Keynote
David Kennedy

6/14/2016

 

ShowMeCon 2016 Videos
These are the videos ShowMeCon 2016. Thanks to Renee & Dave Chronister (@bagomojo), Renee and others for having me out to record and speak. Also thanks to my video crew Mathew, Morgan, James and some other people I may have forgotten.

Red is the New Blue
BenOxa

My Cousin Viinny: Ethics and Experience in Security "Research"
Kevin Johnson

The Psychology of Social Engineering
Dave Chronister

Show Me Your Tokens (and Ill show You Your Credit Cards)
Tim MalcomVetter

IRLHN Pt.3 Intermediate Networking Techniques for the Recovering Introvert
Johnny Xmas

And Bad MistakesI've made a few
Jayson Street

All your Door(s) Belong to Me - Attacking Physical Access Systems
Valerie Thomas

Exploiting First Hop Protocols to Own the Network
Paul Coggin

Check Yo Self Before you Wreck Yo Self: The new wave of Account Checkers and Underground Rewards Fraud
Benjamin Brown

The Collission Attack - Attacking CBC and related Encryptions
Fontbonne

It's not a sprint.
Tim Fowler

Social Media Risk Metrics - There's a way to measure how +@&# you are online
Ian Amit

Attacking OSX for fun and profit: tool set limiations, frustration and table flipping.
Dan Tentler

The Art of AV Evations - Or Lack Thereof
Chris Truncer

Understanding Offensive and Defense - Having a purple view on INFOSEC
Dave Kennedy

Breaking the Teeth of Bluetooth Padlocks
Adrian Crenshaw

PowerShell Phishing Response Toolkit
Josh Rickard

Championing a Culture of Privacy: From Ambivalence to Buy-IN
Hudson Harris

Why Compliance Matters; You've Been Doing it Wrong
Stacey Banks

How to Build a Home Lab
Timothy De Block

Logging for Hackers, How you can catch them with what you already have and a walk through of an actual attack and how we caught it.
Michael Gough

Where to Start when your environment is F*(3d
Amanda Berlin

6/12/2016

Circle City Con 2016 Videos
These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to Mike, 3ncr1pt3d, fl3uryz, InfaNamecheap, f0zziehak, Chris, PhenixFire, Sammy and other for helping set up AV and record.

Opening Ceremony
CircleCityCon Staff

Keynote - Dave Lewis
Dave Lewis

Food Fight!
Wolfgang Goerlich

Binary defense without privilege
Steve Vittitoe

Establishing a Quality Vulnerability Management Program without Wasting Time or Money
Zee Abdelnabi (not posted)

Why it's all snake oil - and that may be ok
Pablo Breuer

Break on Through (to the Other Side)
Grape Ape

Bootstrapping A Security Research Project
Andrew Hay

Playing Doctor: Lessons the Blue Team Can Learn from Patient Engagement
Wolfgang Goerlich

Planes, Trains and Automobiles: The Internet of Deadly Things
Bryan K. Fite

Killing you softly
Josh Bressers

Now You See Me, Now You Don't - Leaving your Digital Footprint
Aamir Lakhani

Red Team Madness - Or, How I Learned To Stop Worrying and Expect Pentester Mistakes
Jeremy Nielson

Open Source Malware Lab
Robert Simmons

So you want to be a CISO?
Von Welch

You want to put whatwhere?
John Stauffacher

 IoT on Easy Mode Reversing and Exploiting Embedded Devices
Elvis Collad

Top 10 Mistakes in Security Operations Centers, Incident Handling & Response
Paul R. Jorgensen

Untrusted Onions: Is Tor Broken?
Joshua Galloway

Contextual Threat Intelligence: Building a Data Science Capability into the Hunt Team
Brian Genz

Head in the Sand Defence or A Stuxnet for Mainframes
Haydn Johnson; Cheryl Biswas

SIEM, Supersized!
Walleed Aljony

Fantastic OSINT and where to find it
Tony Robinson (da_667)

Creating a Successful Collegiate Security Club (WIP)
Chris "Lopi" Spehn; Adam "avidhacker" Ringrood

Where to Start When Your Environment is F*(K3d
InfoSystir (Amanda Berlin)

Haking the Next Generation
David Schwartzberg

Exfil and Reverse Shells in a Whitelisted World

Hacking Our Way Into Hacking
Kat Sweet

Attacking OSX for fun and profit: Toolset Limitations, Frustration and Table Flipping
Viss (Tentler)

Intro to Mobile Device Testing
Damian Profancik

Your Password Policy Still Sucks!
Martin Bos

Closing Ceremony
CircleCityCon Staff

5/22/2016

NolaCon 2016
Recorded at NolaCon 2016. Thanks to @CurtisLaraque, @HoltZilla, @sid3b00m & @ynots0ups for the video recording help, and @nola_con, @erikburgess_, & Rob for having me down to record.

Intro

Analyzing DNS Traffic for Malicious Activity Using Open Source Logging Tools
Jim Nitterauer

Snake Charming: Fun With Compiled Python
Gabe K

Monitoring & Analysis 101: N00b to Ninja in 60 Minutes
Grecs

Calling Captain Ahab: Using Open Tools to Profile Whaling Campaigns
Ryan Jones, McOmie

Check Yo Self Before You Wreck Yo Self: The New Wave Of Account Checkers And Underground Rewards Fraud
Benjamin Brown

Introducing the OWASP API Security Project
Leif Dreizler, David Shaw

Breaking Barriers: Adversarial Thinking for Defenders
Stacey Banks

It's Just a Flesh Wound!
Brett Gravois

Owning MS Outlook with PowerShell
Andrew Cole

Why can't Police catch Cyber Criminals?
Chip Thornsburg

Keynote
David Kennedy

Calling Captain Ahab: Using Open Tools to Profile Whaling Campaigns
Matt Bromiley

Haking the Next Generation
David Schwartzberg

Hacking Web Apps (v2)
Brent White

Evolving Your Office's Security Culture by Selective Breeding of Ideas and Practices
Nancy Snoke

I Promise I'm Legit: Winning with Words
Cyni Winegard &  Bethany Ward

You Pass Butter: Next Level Security Monitoring Through Proactivity
Cry0, S0ups

Going from Capture the Flag to Hacking the Enterprise. Making the switch from 'a hobby and a passion' to a lifelong career
Joseph Pierini

Hackers are from Mars, CxO's are from Jupiter
Rob Havelt

Don't be stupid with GitHub
Metacortex

DDoS: Barbarians at the Gate(way)
Dave Lewis

Hunting high-value targets in corporate networks
Josh Stone

4/22/2016 AIDE 2016 Videos
Recorded at AIDE 2016. Big thanks to Bill Gardner (@oncee) for having me out to record.

Do You Want Educated Users? Because This is How You Get Educated Users.
Tess Schrodinger

Don't blame that checklist for your crappy security program
Branden Miller

Shooting Phish in a Barrel
Amanda Berlin

Minimalistic Physical Assessment Kit
Tom Moore

Hacking Web Apps
Brent White and Tim Roberts

4/17/2016

BSides Nashville 2016 Videos
These are the videos BSides Nashville 2016. Thanks to @lil_lost for inviting me down to record and being my bodyguard while in Nashville. Big thanks to Geoff Collins, Branden Miller, Blake Urmos, Gabe Bassett, Nate and Alex McCormack for helping set up AV and record.

And bad mistakes I've made a few
Jayson Street

At the mountains of malware
Wes Widner

Collection and Detection with Flow Data: A Follow Up
Jason Smith

Container Chaos: Docker Security Container Auditing
Chris Huntington

It's Not If But When: How to Create Your Cyber Incident Response Plan
Lucie Hayward, Marc Brawner

Threat Modeling the Minecraft Way
Jarred White

AppSec Enigma and Mirage - When Good Ideas Can Go Awry
Frank Catucci

The Art of the Jedi Mind Trick
Jeff Man

How to get into ICS security
Mark Heard

The Ransomware Threat: Tracking the Digital Footprints
Kevin Bottomley

InfoSecs in the City - Starting a Successful CitySec Meetup
Johnny Xmas, Fletcher Munson, Chris Carlis, Kate Vajda

Ever Present Persistence - Established Footholds Seen in the Wild
Evan Pena, Chris Truncer

Forging Your Identity: Credibility Beyond Words
Tim Roberts, Brent White

IAM Complicated: Why you need to know about Identity and Access Management
Ron Parker

Put a Sock(et) in it: Understanding and Attacking Sockets on Android
Jake Valletta

3/31/2016 Central Ohio Infosec Summit 2016 Videos
These are the videos from the Central Ohio Infosec Summit conference. Thanks to the video volunteers for helping me record.

Track 1

Penetrating the Perimeter - Tales from the Battlefield
Phil Grimes

Navigating the FDA Recommendations on Medical Device Security _ and how they will shape the future of all IoT
Jake "malwarejake" Williams

Detecting the Undetectable: What You Need to Know About OSINT
Jerod Brennen

Why I quit my dream job at Citi - A data centric approach to key management
Mike Bass

Fail Now _ So I Don't Fail Later "A look into security testing and training methodologies"
Deral Heiland

Putting the Intelligence back in Threat Intelligence
Edward McCabe

All Your Door Belong To Me: Attacking Physical Access Systems
Valerie Thomas

The Humanity of Phishing Attack and Defense
Aaron Higbee

The Node.js Highway: Attacks Are At Full Throttle
Joshua Clark

Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway

Understanding Attacker's use of Covert Communications
Chris Haley

InfoSec Productization
David Kennedy

Track 2

Future of Information Security Governance, Risk and Compliance
Max Aulakh, Bill Lisse

How Experts Undermine Your Forensic Evidence
Matthew Curtin

Datacenter Security Virtualized
John Michealson

Embracing the Cloud
Lisa Guess

"It was the best of logs, it was the worst of logs" - Stories through Logging
Tom Kopchak

Finding the Needle in the Hardware Haystack - Identifying and Exploiting Vulnerabilities via Hardware Reverse Engineering
Stephen Halwes, Timothy Wright

PKI-Do You Know Your Exposure?
Kent King

No Tradeoffs: Cloud Security and Privacy Don't Need to Be at Odds
Jervis Hui

Today's Threat Landscape
Dean Shroll

6 Critical Criteria For Cloud Workload Security
Sam Herath

Track 2

Educating the Board of Directors
Bob West

Burp Collaborator: The Friend You Didn't Know You Needed
Jon Gorenflo

Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger

Threat Modeling for Secure Software Design
Robert Hurlbut

IAST Deep Dive: Understanding Interactive Application Security Testing
Ofer Maor

Building an Application Security Program
Mike Spaulding

Formal Verification of Secure Software Systems
Aaron Bedra

AppSec without additional tools
Jason Kent

Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy
Ken Czekaj, Robert Wright

Artificial Intelligence Real Threat Prevention
Art Hathaway

Defending the Next Decade - Building a Modern Defense Strategy
Mark Mahovlich

Track 3

Security vs Compliance in Healthcare
Sean Whalen

How to Secure Things & Influence People: 10 Critical Habits of Effective Security Managers
Chris Clymer, Jack Nichelson

Economically Justifying IT Security Initiatives
Ruben Melendez

Cross Industry Collaboration
Helen Patton

Third Party Risk Governance - Why and How
Jeffrey Sweet

IT Data Analytics: Why the cobbler's children have no shoes
Carolyn Engstrom

BYODAWSCYW (Bring Your Own Device And Whatever Security Controls You Want) One approach to reduce risk
Steven Keil

Disaster Recovery and Business Continuity -_It's never so bad that it can't get worse
Valerie Thomas, Harry Regan

Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics
Heather Enlow, Chris Ingram

The Legal Perspective on Data Security for 2016
Dino Tsibouris, Mehmet Munur

The Legal Perspective on Data Security for 2016
Mehmet Munur, Dino Tsibouris

Track 4

Gamify Awareness Training: Failure to engage is failure to secure
Michael Woolard

Office 365 Security and Compliance Cloudy Collaboration - Really?
Robert Brzezinski

State of Security and 2016 Predictions
Jason Samide

A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs

Risk Management: Tactics to Move From Decision to Execution
Tremayne (Tre) Smith

Incident Response - No Pain No Gain!
Jim Wojno

Building an OSS CI/CD Security Toolchain
Kevin Glavin

A Touch(ID) of iOS Security
James (Jamie) Bowser

Track 5

Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski

You're measuring all the wrong things - information security metrics
Shawn Sines

Why Cybercriminals Are "Following The Money" Into Online Video Games
Matthew Cook

Security Certifications - are they worth it, and which ones are right for you?
William Diederich

Information Security Metrics - Practical Security Metrics
Jack Nichelson

The CONfidence of Things
John Robinson

Who is Winning?
Gary Sheehan

Security analytics journey - a year's lesson learned.
Mike Schiebel

Track 6

Integrated Software in Networking _ the Mystery of SDN
Oliver Schuermann

Securing our Future: Lessons From the Human Immune System
Gavin Hill

Have you tied together your IAM and Information Security Incident Management Program?
Joseph Greene

Compliance and Security: Building a Cybersecurity Risk Management Program
Jason Harrell

Don't try this at home! (Things not to do when securing an organization)
Jessica Hebenstreit

CISO for an Hour
Keith Fricke

Apple v. DOJ: Privacy in Today's Enterprise
Justin Harvey

Myths of Cloud Security Debunked!
Bil Harmer

Cyber Security - Super Bowl 50
Jim Libersky

3/12/2016

CypherCon 2016 Videos
These are the videos from the Cyphercon 2016 conference. Thanks to Michael Goetzman for having me out to record.

CYPHERCON's Opening Ceremony Begins!
Korgo

Security Control Wins & Fails
Jason Lang

Offensive Wireless Tactics "used in DEFCON 23s Wireless CTF"
Eric Escobar

China"s Hackers and Cyber Sovereignty
Lieutenant Colonel Bill Hagestad II

You're Right, This Sucks
J0hnnyxm4s & Lesley Carhart

No encrypted data on this drive; just pictures of my cat
Parker Schmitt

Curry and TARTS
JP SMITH

All your Wheaties belong to us. Removing the basics that humans need for survival.
Chris Roberts

CYPHERCON I Conference Begins!
Korgo & The CYPHERCON PuzzleMaster Speaks
BeLouve

P.I.S.S.E.D. Privacy In a Surveillance State, Evading Detection
Joe Cicero

Bypassing Encryption by Attacking the Cryptosystem Perimeter
Trenton Ivey

Hypervault Demo
& HTTP and SSH Tunneling
Caleb Madrigal

Quantum Computation and Information Security
David Webber

Medical Devices: Pwnage & Honeypots
Scott Erven

ESPIONAGE - A WEAPON DURING THE COLD WAR
Werner Juretzko

3/5/2016 BSides Indy 2016 Videos
These are the videos from the BSides Indy conference.

Keynote
Eddie Mize (Not recorded)

Managing Elevated Privileges in the Enterprise Environment
Erik Burgess

Food Fight
Wolfgang Goerlich (Not recorded)

Where to start when your environment is F*(k3d
Amanda Berlin

Building an Application Security Program
Mike Spaulding

The Art of the Jedi Mind Trick
Jeff Man

Securing Docker Instances
Chris Huntington

ClientHacking: How a chef uses OSINT and SE to make more money.
OneManicNinja

3/1/2016

BSides San Francisco 2016 Videos
These are the videos from the BSides San Francisco conference. Special thanks to Mike & Doug for having me out, Steen, Zappo & Jeremy for their house AV work, and n0ty3p, Forest, Nick, James & others I'm forgetting for their help recording

Track 1

Keynote: A Declaration of the Independence of Cyberspace
John Perry Barlow

The Tales of a Bug Bounty Hunter
Arne Swinnen

Reverse Engineering the Wetware: Understanding Human Behavior to Improve Information Security
Alexandre Sieira, Matthew Hathaway

Who's Breaking into Your Garden? iOS and OS X Malware You May or May Not Know
Claud Xiao

A year in the wild: fighting malware at the corporate level
Kuba Sendor

Breaking Honeypots for Fun and Profit
Gadi Evron, Dean Sysman, Itamar Sher

Everything Is Awful (And You're Not Helping)
Jan Schaumann

Why it's all snake oil - and that may be ok
Pablo Breuer

Ask the EFF
Kurt Opsahl, Eva Galperin, Andrew Crocker, Shahid Buttar, Cooper Quintin

Sedating the Watchdog: Abusing Security Products to Bypass Windows Protections
Tomer Bitton, Udi Yavo

Sweet Security: Deploying a Defensive Raspberry Pi
Travis Smith

Planning Effective Red Team Exercises
Sean T. Malone

Fraud Detection & Real-time Trust Decisions
James Addison

Fuzz Smarter, Not Harder (An afl-fuzz Primer)
Craig Young

Elliptic Curve Cryptography for those who are afraid of mathematics
Martijn Grooten

APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
Gadi Evron

Sucker-punching Malware: A Case Study in Using Bad Malware Design Against Attackers
John Bambenek, Hardik Modi

Employee Hijacking: Building a hacktober awareness program
Ryan Barrett, Ninad Bhamburdekar, Dylan Harrington

Track 2

Mainframes? On My Internet?
Soldier of Fortran (not recorded)

Securing the Distributed Workforce
William Bengtson

Hackers Hiring Hackers - How to hack the job search and hack talent
IrishMASMS (not recorded)

Scan, Pwn, Next! - exploiting service accounts in Windows networks
Andrey Dulkin, Matan Hart

Guest to root - How to Hack Your Own Career Path and Stand Out
Javvad Malik

IoT on Easy Mode (Reversing Embedded Devices)
Elvis Collado

In the crosshairs: the trend towards targeted attacks
Lance Cottrell

Developing a Rugged DevOps Approach to Cloud Security
Tim Prendergast

Digital Intelligence Gathering: Using the Powers of OSINT for Both Blue and Red Teams
Ethan Dodge, Brian Warehime

Sharing is Caring: Understanding and measuring Threat Intelligence Sharing Effectiveness
Alex Pinto

The Ransomware Threat: Tracking the Digital Footprints
Kevin Bottomley

Access Control in 2016 - deep dive
Dr. Ulrich Lang

Using Behavior to Protect Cloud Servers
Anirban Banerjee

The Art of the Jedi Mind Trick
Jeff Man

Mobile App Corporate Espionage
Michael Raggo

Advanced techniques for real-time detection of polymorphic malware
Ajit Thyagarajan

2/15/2016 BSidesCapeTown 2015
Mike Davis asked me to post these videos to get wider circulation.

Ode to the Node

Automating the process of mapping and compromising networks

Hack all the things - Exploiting and fixing IoT

Running a Secure Tor Hidden Service

Sharepoint Hacking

Hacker Jeopardy

2/07/2016 BSides Huntsville 2016 Videos
These are the videos from the BSides Huntsville conference. Thanks to @PaulCoggin, @CharlineNixon, Brian, @NagleCode, @GRMrGecko and all of the BSides Crew for having me out to help record and render the videos.

Opening Keynote
Jack Daniel

Hacking Peoples' Lives with Google Sync
Shawn Edwards, Sean Hopkins

Slaying Rogue Access Points with Python and Cheap Hardware
Gabriel Ryan

Web shells as a covert channel
Joe Vest

A practical approach to deploying Data Loss Prevention
Jon Damratoski

Afternoon Keynote: TSA Luggage Locks: Details, Flaws & Making The Best Of A Bad Lock
Adrian Crenshaw

Threat Modeling the Minecraft Way
Jarred White

At the mountains of malware: Lessons learned from analyzing terabytes of malware
Wes Widner

History of WRT and Wireless Mesh protocols.
Alex Kot

BSides Closeout
Paul Coggin

1/16/2016 BSides Columbus 2016 Videos
These are the videos from the BSides Columbus Ohio conference. Thanks to Michael Spaulding for having me up and Greg, James & Brandon who manned the video rigs.

Keynotes

Keynote Thomas Drake
Thomas Drake

Offence

Where Did All My Data Go
Deral Heiland

Developers: Care and Feeding
Bill Sempf

Open Secrets of the Defense Industry: Building Your Own Intelligence Program From the Ground Up
Sean Whalen

The Economics of Exploit Kits & E-Crime
Adam Hogan

Hacking Corporate Em@il Systems
Nate Power

All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches
Valerie Thomas & Harry Regan (Not recorded)

Defense

Establishing a Quality Vulnerability Management Program without Wasting Time or Money
Zee Abdelnabi (not posted)

Practical DLP Deployment for your Organization
Jon Damratoski

The Good The Bad and The Endpoint Protection
Joseph Ciaravino

Securing Docker Instances
Chris Huntington

Better SIEM Notifications - Making Your SIEM Situationally Aware
Jesse Throwe

Social Media Correlation of Credit Card Fraudsters
Chris Cullison & CW Walker

Special Teams

Removing Barriers of Diversity in Information Security
Helen Patton & Connie Matthews

Panel Discussion: InfoSec Trends, Talent Management, and Retention
Michael Butts, AJ Candella & Megan Wells

Indecision and Malformed Conclusions: The things that stifle security improvement and what can be done about them.
Tyler Smith

Gamify Awareness Training: Failure to engage is failure to secure
Michael Woolard

The Long and Winding Road: An InfoSec Career Panel
Lonnie Kelley & Valerie Thomas

The Pineapple is dead..Long live the Pineapple
David Young

1/16/2016

 

Shmoocon Firetalks 2016
Videos from Shmoocon Firetalks 2016.

Opening Red Team Upgrades Using SCCM for Malware Deployment Matt Nelson (@enigma0x3)

Jailbreaking a Digital Two-Way Radio Travis Goodspeed (@travisgoodspeed)

CheapBugs.Net - Low-End Bug Bounties for the Masses Dean Pierce (@deanpierce)

Failure to Warn You Might Get Pwned Wendy Knox Everette (@wendyck)

GreatFET, a Preview Michael Ossmann (@michaelossmann)

Fuck You, Pixalate! @da_667

DNS C&C Ron Bowes (@iagox86)

11/08/2015

SecureWV 2015 Videos
These are the videos of the presentations from Secure West Virginia 2015.

Building a Cantenna
Ed Collins

Dropping Docs on Darknets Part 2 Identity Boogaloo
Adrian Crenshaw

Network Segmentation - Some new thoughts
Mark Jaques and Brandon Schmidt

Security Onion
Brandon Schmidt

Drones
Mike Lyons

The Lemonaid Pomegranite, basics of security in a digital world
Tim Sayre

My Little P0ny: What you can do with 20 lines of code and an open machine
Mark Jaques and Brandon Schmidt

And now for something completely different, security at Top O Rock
Tim Sayre

The Art of Post-Infection Response and Mitigation
Caleb J. Crable

Documenting With ASCIIDOC
Jeff Pullen

The Core of Cybersecurity: Risk Management
Josh Spence

The Unique Challenges of Accessing Small and Medium Sized Organizations
Bill Gardner

OpenNSM, ContainNSM, and Docker
Jon Schipp

Here is your degree. Now what?
Shawn Jordan

Wolf in shell's clothing, why you should be skeptical of your trusted tools
Jeff Pullen

 

10/16/2015 HouSecCon v6 2015 Videos
These are the videos from HouSecCon 2015 v6. Thanks to Michael R. Farnum for having my down and all of the video crew.

Opening Keynote - Mike Rothman

Chris Jordan - Fluency: A Modern Approach to Breach Information and Event Management

Dennis Hurst - Application Security in an Agile SDLC

Wendy Nather - How Google turned me into my mother: the proxy paradox in security

Chris Boykin - Mobile Threat Prevention

Adrian Crenshaw - Dropping Docs on Darknets Part 2: Identity Boogaloo

Julian Dunning - Kraken: The Password Devourer

Trey Ford - Maturing InfoSec: Lessons from Aviation on Information Sharing

Richard Peters and Matthew Roth - Parasyste: In search of a host

Lunch/ISACA Session

Damon Small - Connections: From the Eisenhower Interstate System to the Internet

Rich Cannata - Arm Your Endpoints

Anthony Blakemore - Removing the Snake Oil From Your Security Program

Erik Freeland - Does SDN Mean Security Defined Networking?

Danny Chrastil - What I know about your Company

Lunch / Business Skills Workshop

Josh Sokol - The Fox is in the Henhouse: Detecting a Breach Before the Damage is Done

Jason Haddix - How to Shot Web: Better Web Hacking in 2015

Zac Hinkel, Andrew Huie, and Adam Pridgen - Arm Your Endpoints

Dan Cornell - SecDevOps: A Security Pro's Guide to Development Tools

Closing Keynote - Eric Cowperthwaite - Everything I need to know about Information Security, I Learned Shooting Tank Guns

Closing

10/11/2015

GrrCON 2015 Videos
These are the videos of the presentations from GrrCON 2015. Big thanks to EggDropX and Jaime for having me out, and my video crew  (Chris, Justine, Aaron & Brian) for recording.

AntiFreeze

Subject matter to be determined by the number of federal agents present in the audience
Chris Roberts

Breaking in Bad (I,m The One Who Doesn,t Knock)
Jayson Street

Process The Salvation of Incident Response - Charles Herring

But Can They Hack?: Examining Technological Proficiency in the US Far Right
Tom Holt

The wrong side of history - everything that is old is new again
Arron Finnon

Poking The Bear
Mike Kemp

The Hitch Hikers Guide to Information Security
Kellman Meghu

Backdooring Git
John Menerick

Spanking the Monkey (or how pentesters can do it better!)
Justin Whithead, Chester Bishop

Adding +10 Security to Your Scrum Agile Environment
tehEx0dus

How I Got Network Creds Without Even Asking: A Social Engineering Case Study
Jen Fox

Shooting Phish in a Barrel and Other Terrible Fish Related Puns
infosystir

This Is All Your Fault
Duncan Manuts

The Safety You Think You Have is Only a Masquerade
Nathan Dragun

Bumper Massage

Security Incident Response
Derek Milroy

Hacking the Next Generation
HealWHans

Findings Needles in a Needlestack: Enterprise Mass Triage
Keven Murphy

Punch and Counter-punch Part Deux: Web Applications
J Wolfgang Goerlich, NerdyBeardo

Application Recon - The Lost Art
Tony Miller

The Hand That Rocks the Cradle: Hacking Baby Monitors
Mark Stanislav

Software Security IWR
Thomas "G13" Richards

Cyber 101 - Upstaring your career in a leading industry
Johnny Deutsch

Understanding and Improving the Military Cyber Culture
Dariusz Mikulski

Harness the Force for Better Penetration Testing
Patrick Fussell

Targeted Attacks and the Privileged Pivot
Mark Nafe

Shell scripting live Linux Forensics
Dr. Phil Polstra

Can you patch a cloud?
Scott Thomas

Is it EVIL?
Chaoticflaws
 

Submerssion Therapy

Ticking me off: From Threat Intel to Reversing
Juan Cortes

Securing Todays Enterprise WAN
Andy Mansfield

Footprints of This Year's Top Attack Vectors
Kerstyn Clover

Phones and Privacy for Consumers
Matt Hoy (mattrix) and David Khudaverdyan (deltaflyer)

Path Well-Traveled: Common Mistakes with SIEM
Nick Jacob

How compliance doesn't have to suck.at least totally
Robert Carson & Bradley Stine

What is a cloud access broker and do I need one?
Tom Doane

Security Frameworks: What was once old is new again
Brian Wrozek

Attacks Against Critical Infrastructures Weakest Links
Jonathan Curtis

Wireless Intrusion Detection Systems with the Raspberry Pi
Chris J

No One Cares About Your Data Breach Except You ... And Why Should They?
Joel Cardella

09/30/2015 Louisville Infosec 2015 Videos
Below are the videos from the Louisville Infosec 2015 conference. Thanks to @theglennbarrett, Jordan, Daren and @bridwellc for helping me record.

Nexum FireEye Keynote Advesarial Paradigm Shift
Che Bhatia and Artie Crawford

Compromise Analysis - Why
we're seeing so many breaches
Dave Kennedy
Founder of TrustedSec


What to Expect When You're Expecting a Pentest
Martin Bos


Memory Acquisition in Digital Forensics and Incident Response
Jason Hale


Visualizing Complex Cyber Compliance Data Using Big Data Tools
Max Aulakh


Hacking Web Apps with Style: Path Relative Style
Jeremy Druin


TSA Luggage Lock Duplication
Adrian Crenshaw


Cloud Device Insecurity
Jeremy Brown


How the Cloud Drives Better Security
Kevin Peterson


Heartbleed, ShellsShock, and Poodles
Jason Gillam


Using Gamification in Security Awareness Training
Brandon Baker


More Technology, More People, No Process
Mike Robinson


Preventing Common Core Pen Tests
Nathan Sweaney


Ashley Madison Breach
Jeff Jarecki


Integrating Mobile Devices into Your Pen-Testing
Georgia Weidman


Home Depot vs The World
Rodney Hampton

 

09/28/2015 DerbyCon 5 Videos
These are the videos of the presentations from Derbycon 2015. Big thanks to my video jockeys Sabrina, Skydog, Some Ninja Master, Glenn Barret, Dave Lauer, Jordan Meurer, Brandon Grindatti, Joey, Fozy, nightcarnage, Evan Davison, Chris Bridwell, Rick Hayes, Tim Sayre, Lisa Philpott, Melanie Lecompte, Ben Pendygraft, Austin Hunter, Harold Weaver, Michael Shelburne (and maybe the speakers too I guess).

Welcome to the Family - Intro

Jordan Harbinger Keynote

Information Security Today and in the Future
HD Moore - Ed Skoudis - John Strand - Chris Nickerson - Kevin Johnson - Katie Moussouris hosted by David Kennedy


The M/o/Vfuscator - Turning 'mov' into a soul-crushing RE nightmare - Christopher Domas

AND YOU SHALL KNOW ME BY MY TRAIL OF DOCUMENTATION - Jason Scott

Red vs. Blue: Modern Active Directory Attacks & Defense - Sean Metcalf "@PyroTek3"

Metasploit Town Hall - David Maloney "thelightcosine" - James Lee "egyp7" - Tod Beardsley "todb" - Brent Cook "busterbcook"

$helling out (getting root) on a 'Smart Drone' - Kevin Finisterre - solo ape

Phishing: Going from Recon to Creds - Adam Compton - Eric Gershman

APT Cyber Cloud of the Internet of Things - Joey Maresca (@l0stkn0wledge)

Stealthier Attacks and Smarter Defending With TLS Fingerprinting - Lee Brotherston

Honeypots for Active Defense - Greg Foss

Manufactorum Terminatus - The attack and defense of industrial manufacturers - Noah Beddome - Eric Milam

High Stake Target: Lo-Tech Attack - Bill Gardner "oncee" - Kevin Cordle

Operating in the Shadows - Carlos Perez "darkoperator"

Getting Started with PowerShell - Michael Wharton "MyProjectExpert"

 When A Powerful Platform Benefits Both Attackers And Defenders: Secure Enhancements To Scripting Hosts In Windows 10 - Lee Holmes

A deep look into a Chinese advanced attack. -Michael Gough - "HackerHurricane"

Pavlovian Security: How To Change the Way Your Users Respond When the Bell Rings - Magen Wu (@tottenkoph) - Ben Ten (@ben0xa)

The State of Information Security Today - Jeff Man

Learning through Mentorship - Michael Ortega "SecurityMoey" - Magen Wu "Tottenkoph"

The Law of Drones - Michael "theprez98" Schearer

The Phony Pony: Phreaks Blazed The Way - Patrick McNeil "Unregistered436" - Owen "Snide"

HackerQue - Michael Smith (DrBearSec) - Kyle Stone (Essobi)

Current Trends in Computer Law - Matthew Perry (Mostly no audio)

Spankng the Monkey (or how pentesters can do it better!) - Justin Whitehead "(at)3uckaro0" - Chester Bishop "@chet121"

On Defending Against Doxxing - Benjamin Brown Ajnachakra

Practical Windows Kernel Exploitation - Spencer McIntyre @zeroSteiner

Shooting Phish in a Barrel and other fish related puns - Amanda Berlin

Don't Laugh - I Dare You! - Carl Alexander "DrHaxs"

Marketers Are Friends - Not Food - Kara Drapala

Blue Team Starter Kit - Timothy De Block

Simplified SIEM Use Case Management - Ryan Voloch "VDog90"

Bypassing 2Factor Auth with Android Trojans - Paul Burbage

Putting the Management into Vulnerability Management (or - YOU'VE GOT BEARS!!!) - Jesika McEvoy (octalpus)

Moving Target Defense - Learning from Hackers - Sachin Shetty

Malfunction's Functions : Automated Static Malware Analysis using Function Level Signatures - Matthew Rogers - Jeramy Lochner

We Owe You Nothing - Rockie Brockway

Backdooring Git - John Menerick

Detecting phishing attacks with DNS reconnaissance - Mike Saunders

Hacking Web Apps - Brent White

Sticky Honey Pots - Paul J. Vann

Top Ten is Old Skool - Meet the New Age of AppSec - Andrew Leeth

Cryptography and You - Justin Herman

Pwning People Personally - Josh Schwartz "FuzzyNop"

Stagefright: Scary Code in the Heart of Android - Joshua "jduck" Drake

Dec0ding Humans Live - Chris Hadnagy @HumanHacker

Gray Hat PowerShell - Ben Ten (@ben0xa)

WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis - Matt Graeber - Willi Ballenthin - Claudiu Teodorescu

Hackers vs. Defenders: Can the defender ever stop playing catch up and win? - Mano Paul "dash4rk"

Medical Devices: Pwnage and Honeypots - Scott Erven "windshield wipers" - Mark Collao

State of the Metasploit Framework - James Lee "egypt"

Credential Assessment: Mapping Privilege Escalation at Scale - Matt Weeks "scriptjunkie1"

Pwning People Personally - Josh Schwartz "FuzzyNop"

Stagefright: Scary Code in the Heart of Android - Joshua "jduck" Drake

Dec0ding Humans Live - Chris Hadnagy @HumanHacker

Gray Hat PowerShell - Ben Ten (@ben0xa)

WhyMI so Sexy? WMI Attacks - Real-Time Defense - and Advanced Forensic Analysis - Matt Graeber - Willi Ballenthin - Claudiu Teodorescu

Hackers vs. Defenders: Can the defender ever stop playing catch up and win? - Mano Paul "dash4rk"

Medical Devices: Pwnage and Honeypots - Scott Erven "windshield wipers" - Mark Collao

State of the Metasploit Framework - James Lee "egypt"

Credential Assessment: Mapping Privilege Escalation at Scale - Matt Weeks "scriptjunkie1"

Mobile Application Reverse Engineering: Under the Hood - Drew Branch - Billy McLaughlin

Introducing the RITA VM: Hunting for bad guys on your network for free with math. - John Strand - Derek Banks - Joff Thyer - Brian Furham

 Breaking in Bad (I'm the one who doesn't knock) - Jayson E. Street

Developers: Care and feeding - Bill Sempf

Fingerprinting the modern digital footprint -  Arian Evans

Surviving your Startup - Bruce Potter
(part of talk missing)


How to ruin your life by getting everything you ever wanted. - Chris Nickerson

Using Windows diagnostics for system compromise - Nicholas Berthaume "aricon"

InfoSec Big Picture and Some Quick Wins - Schuyler Dorsey

Hacking for homeschoolers - Branden Miller

Going AUTH the Rails on a Crazy Train - Tomek Rabczak - Jeff Jarmoc

  Bugspray - The 802.15.4 Attack Surface - Bryan "Crypt0s" Halfpap

Unbillable: Exploiting Android In App Purchases - Alfredo Ramirez

BYPASS SURGERY ABUSING CONTENT DELIVERY NETWORKS WITH SERVER-SIDE-REQUEST FORGERY (SSRF) FLASH AND DNS - Matthew Bryant (mandatory) - Michael Brooks (rook)

Dynamic Analysis of Flash Files - Jacob Thompson

Attacking Packing: Captain Hook Beats Down on Peter Packer - Vadim Kotov - Nick Cano

Johnny Long and Henry Wanjala - HFC Update

HARdy HAR HAR HAR: HAR File Collection and Analysis for Malware - Robert Simmons "Utkonos"

Stacking the Virtual Deck: Attacks by Predicting RNGs - Adam Schwalm

Homebrewing for Hackers - Benjamin Holland - Amber Aldrich

Stealthy and Persistent Back Door for Z-Wave Gateways - Jonathan Fuller and Ben Ramsey

Building a Better Honeypot Network - Josh Pyorre

Surveillance using spare stuff - Matt Scheurer "Cerkah"

Crypto 101: An Intro To Real-World Crypto - Adam Caudill

Practical Attacks Against Multifactor - Josh Stone

Hacking the Next Generation - David Schwartzberg

The Human Interface Device Attack Vector: Research and Development - Alexander Livingston Segal

A survey of Powershell enabled malware - Tyler Halfpop

Tool Drop: Free as in Beer - Scot Berner - Jason Lang

Tactical Diversion-Driven Defense - Greg Foss - Thomas Hegel

Windows 10 Defense in Depth - Eddie David

Latest Tools in Automotive Hacking - Craig Smith

Ansible. And why it works for me. - Charles Yost

Learning Mainframe Hacking: Where the hell did all my free time go? - Chad Rikansrud "Bigendian Smalls (BeS)""

Intercepting USB Traffic for Attack and Defense - Brandon Wilson

Geeks Need Basements! - Kathleen Veach

Intro to x86 - Stephanie Preston

Spy Vs. Spy: How to Use Breakable Dependencies to Your Advantage - Stacey Banks - Anne Henmi

Is That a Router in Your Pocket or are You Trying to P0wn Me? - Michael Vieau - Kevin Bong

The little-known horrors of web application session management - Matthew Sullivan

Practical hardware attacks against SOHO Routers & the Internet of Things - Chase Schultz "f47h3r"

Stretching the Sandbox with Malware Feature Vectors - Mike Schladt

Gnuradio demystifying rf black magic - Matthew O'Gorman "mog"

Beyond Bad IP Addresses Hashes and Domains - Ed McCabe

DNS Miner - A semi-automatic Incident response and threat intelligence tool for small - over worked security teams - Doug Leece - AJ Leece

Larry Pesce - My password cracking brings all the hashes to the yard..

Intrusion Hunting for the Masses - A Practical Guide - David Sharpe

How I Stopped Worrying and Learned To Love InfraOps - Karthik Rangarajan (krangarajan) - Daniel Tobin (dant24)

Blue Team Army - It's *your* network - defend it! - Mick Douglas - Jamie Murdock

LongTail SSH Attack Analysis - Eric Wedaa

Hunting Unicorns and Jerks - Irrational - Defensible - or Necessary? - Steve Werby

The problems with JNI obfuscation in the Android Operating System - Rick Ramgattie

PHaaS - Phishing as a Service - Raymond Gabler

Circles & Boxes - Drawing SecArch into your program - Chris Robinson

Disecting Wassenaar - Tyler Pitchford

Five Hardware Hacking Projects Under $30 - Kevin Bong - Michael Vieau

Confessions of a crypto cluster operator - Dustin Heywood "EvilMog"

Voltron: Defender of your inferiors - Richo Healey "richo"

Malware is hard. Let's go Shopping! - Richard Wartell "wartortell"

The Pentesters Framework (PTF) - The easy way to roll your own distro. - Dave Kennedy (HackingDave)

Hack my Derby - Nate Lager

Closing Ceremonies

09/13/2015 BSides Augusta 2015 Videos
These are the videos from the BSides Augusta conference. Thanks to Lawrence Abrams, and all of the BSides Crew for having me out to help record and render the videos and Pentestfail, Robert, Mike, John, Ryan, Harry and others for manning capture rigs.

Keynotes

Welcome
Major General Fogarty

Keynote
Ed Skoudis

Blue Team Track 1

Fundamental Understanding of Baseline Analysis and Remediation for Industrial Control Systems
Juli Joyner and Jeffrey Medsger

Taking a Distributed Computing Approach to Network Detection with Bro and The Cloud
Mike Reeves

 A Scout's Perspective on Network Defense
Justin Edgar

Doomsday Preppers: APT Edition
Tanner Payne

Building a Better Security Analyst Using Cognitive Psychology
Chris Sanders

Viper Framework for Malware Analysis
Paul Melson

Infiltrating C2 Infrastructure
Tim Crothers

Building Muscle Memory with Rekall Memory Forensic Framework
Alissa Torres

The Blue Team Starter Kit
Timothy De Block

Red Team Track

Using a HackRF One to Infiltrate the Digital Thetford Wall
Patrick Perry

Malvertizing Like a Pro
Alex Rymdeko-Harvey

Weaponizing our youth: The Case for Integrated Cyber Ethics
Josh Rykowski

Making Everything Old New Again
Andrew Cole and Rich Moulton

DIY Vulnerability Discovery with DLL Side Loading
Jake Williams

Recon-ng and Beyond
Tim Tomes

Attacking OWASP - Exploiting the Top 10
David Coursey

Blue Team Track 2

Go Hack Yourself
Jason Frank

2015 - It's not over yet
Joel Esler

How to Get Into ICS Security
Chris Sistrunk

Destruction as a Service: Security Through Reanimation
Jon Medina

The Programmatic Evolution of Technology Defense.
Roland Cloutier

Lessons Learned from Analyzing Terabytes of Malware
Wes Widner

08/27/2015 TSA Master Key Duplication & Why "Security Through (Not So) Obscurity" Fails
08/06/2015

 

BSidesLV 2015 Videos
Working on getting all of the BSidesLV videos at the link above. I hope to make a full entry once they are all indexed.
07/27/2015 BSides Cincinnati 2015 Videos
These are the videos from the BSides Cincinnati 2015 Conference.

Welcome and Introduction
Josh Ohmer - President, BSidesCincy

Lateral Movement
Harlan Carvey

Automated Detection Strategies
John Davison

Powershell for Incident Responders
Jesse Lands

Cyber Intelligence: Concrete Analysis in a Fluid World
Coleman Kane

The Response-Ready Infrastructure
Justin Hall

A Distributed Computing Approach for Network Detection
Mike Reeves

The Value of a Simple DLP Program
Chris Tyo

07/18/2015 BSides Detroit2015 Videos
These are the videos from the BSides Detroit 2015 Conference. Thanks to Wolf for having me out and Chris, Justine, Robin, Sam, Mike and others I may forget for helping to record.

Keynote

Information Security Reconciliation: The Scene and The Profession
Mark Stanislav

Track 1

Level One: How To Break Into The Security Field
Aaron Moffett

Hacker High - Why We Need To Teach Computer Hacking In Schools
Ron Woerner

Getting Started - Help Me Help You
David Trollman

From Blue To Red - What Matters and What (Really) Doesn't
Jason Lang

Clear as F.U.D.: How fear, uncertainty, and doubt are affecting users, our laws, and technologies
Christopher Maddalena

Data Breaches: Simply The Cost Of Doing Business
Joel Cardella

Eating the SMB Security Elephant - An ITSEC framework for small IT shops
Austen Bommarito

 

Track 2

Enterprise Class Vulnerability Management Like A Boss
Rockie Brockway

Funny Money: What Payment Systems Teach us about Security
Drew Sutter

Building a sturdy foundation - a program-based approach to IT Operations, Application Development, and Information Security in business
Steven Legg

Moving past Metasploit: Writing your first exploit
Calvin Hedler

Wielding BurpSuite: quick-start your extensions and automation rules
Marius Nepomuceno

Browser and Windows Environment Hardening
Kurtis Armour

07/17/2015 Converge 2015 Videos
These are the videos from the Converge Information Security Conference. Thanks to Wolf for having me out and Chris, Ben, Briee, Nick and others I may forget for helping to record.

Keynotes

Hacking To Get Caught - Keynote
Raphael Mudge

Breaking in Bad (I'm the one who doesn't knock)
Jayson E. Street

Track 1

Weaving Security into the SDLC
Bill Sempf

If My CI/CD Teams have Time for Security, So Does Yours
Kevin Poniatowski

Adaptive Monitoring and Detection for Todays Landscape
Jamie Murdock

Threat Intelligence - A Program Strategy Approach
Jenn Black

Cymon: New Cyber Monitoring Tool
Roy Firestein

That's NOT my RJ45 Jack! | IRL Networking for Humans Pt. 1
Johnny Xmas

On Defending Against Doxxing
Benjamin Brown

Hiding in the ShaDOS
Richard Cassara

Security Culture in Development
Wolfgang Goerlich

Cracking and fixing REST services
Bill Sempf

PVCSec Live!

Clientless Android Malware Control
David Schwartzberg

Who Watches the Watchers? Metrics for Security Strategy
Michael Roytman

How to Dress Like a Human Being | IRL Networking for Humans Pt. 2
Johnny Xmas

Soft Skills for a Technical World
Justin Herman

Track 2

The Domain Name System (DNS) - Operation and Security
Tom Kopchak

Homebrew Censorship Detection by Analysis of BGP Data
Zach Julian

Four Pillars: Passion, Vision, Communication, Execution
Edgar Rojas

Excuse me while I BURP
Steve Motts

Public Recon: Why Your Corporate Security Doesn't Matter
Ronald Ulko (Not recorded)

Building the team for a successful SOC
Donald Warnecke

The Path Well-Traveled: Common Mistakes Encountered with SIEM
Nick Jacob

I failed, therefore I succeeded
Zee Abdelnabi (Not recorded)

 Adventures in Communication: Taming the C-Suite and Board
Jim Beechey

Under the Unfluence: the Dark Side of Influence
Ron Woerner

Application Security Awareness: Building an Effective and Entertaining Security Training Program
Chris Romeo

10 Reasons Your Security Education Program Sucks
Kris French Jr

Shooting Phish in a Barrel and other bad fish puns
Amanda Berlin

Process - The Salvation of Incident Response
Charles Herring

07/11/2015 OISF 2015 Videos

Gray Hat PowerShell
Ben Ten

Secret Pentesting Techniques
Dave Kennedy

Of History & Hashes
Adrian Crenshaw

hacker-ng: Farming the Future IT Crowd
Phil Grimes (th3grap3ap3)

Lawyer's Perspective On Data Security Breaches
Dino Tsibouris

06/20/2015 BSides Cleveland 2015 Videos
These are the videos from the Bsides Cleveland conference. Thanks to  &  as the video team. Thanks to twuntymcslore & RockieBrockway for being con mom & dad.

Track 1

Morning Keynote
Jack Daniel

Metasploit & Windows Kernel Exploitation
Spencer McIntyre zeroSteiner

PwnDrone: The Modern Airborne Cyber Threat
Devin Gergen @DevinGergen

Afternoon Keynote
So You Want To Be An Infosec Rockstar?
Chris Nickerson

Why the Web is Broken
Bill Sempf @sempf

Outside the Box
David Kennedy Larry Spohn @HackingDave, @Spoonman1091

The Entropy of Obfuscated Code
Adam Hogan @adamwhogan

Track 2

Why the foundation of security is broken.
Alex Kot

Desired State Configuration (DSC): Dream Tool or Nightmare for Security Baseline and Configuration Management
Zack Wojton Wayne Pruitt zbirdflipper

Common Sense Security Framework
Jerod Brennen @slandail

Secure Test Driven Development: Brakeman, Gauntlet, OWASP and the Work Still to Be Done
Ricky Rickard rrickardjr


Building a sturdy foundation - a program-based approach to IT Operations, Application Development, and Information Security in business
Steven Legg ZenM0de


Building a Threat Intelligence Program
Edward McCabe @edwardmccabe


Phishing Without Ruby
Brandan Geise Spencer McIntyre coldfusion39

Security Not Guaranteed - Or, how to hold off the bad guys for another day.
James Gifford Elijah Snow-Rackley @jrgifford


Cleveland Locksport
Jeff Moss Doug Hiwiller, Damon Ramsey jeffthemossman


Augmenting Mobile Security and Privacy Controls
Brian Krupp @briankrupp

Track 3

DIY Hacker Training, a Walkthrough
Warren Kopp warrenkopp

Quick-start your Burp Suite extensions (Jython) and automation.
Marius Nepomuceno

Flourishing in a Hostile Work Environment
Dennis Goodlett

Defense in Depth - Your Security Castle
Tom Kopchak @tomkopchak

EMET Overview and Demo
Kevin Gennuso @kevvyg

10 Reasons Your Security Education Program Sucks
Kris French Jr @Turtl3Up

Call of Duty: Crypto Ransomware
Brett Hawkins @hawkbluedevil

Closing

06/14/2015 Circle City Con 2015 Videos
These are the Circle City Con videos. Thanks to the staff for inviting me up to record. Big thanks to Oddjob, Glenn, Jordan, Tim, Will, Mike, Nathan, & Chris for helping set up AV and record, as well as others who I'm forgetting. It was a great time.

Track 1

Opening Ceremonies

Keynote
SpaceRogue

Rethinking the Trust Chain: Auditing OpenSSL and Beyond
Kenneth White

Actionable Threat Intelligence, ISIS, and the SuperBall
Ian Amit

Security Culture in Development
Wolfgang Goerlich

Simulating Cyber Operations: "Do you want to play a game?"
Bryan Fite

Hacking IIS and .NET
Kevin Miller

User Awareness, We're Doing It Wrong
Arlie Hartman

Departmentalizing Your SecOps
Tom Gorup

Shooting Phish in a Barrel and Other Terrible Fish Related Puns
Amanda Berlin

ZitMo NoM - Clientless Android Malware Control
David Schwartzberg

Data Loss Prevention: Where do I start?
Jason Samide

Reducing Your Organization's Social Engineering Attack Surface
Jen Fox

1993 B.C. (Before Cellphones)
Johnny Xmas

Building a Comprehensive Incident Management Program
Owen Creger

 Is that a PSVSCV in your pocket
Jake Williams

Analyzing the Entropy of Document Hidden Code
Adam Hogan

Making Android's Bootable Recovery Work For You
Drew Suarez

Does anyone remember Enterprise Security Architecture?
Rockie Brockway

Malware Armor
Tyler Halfpop

Closing Ceremonies

Track 2

Ruby - Not just for hipster
Carl Sampson

Configure your assets, save your butt
Caspian Kilkelly

Digital Supply Chain Security: The Exposed Flank
Dave Lewis

I Amateur Radio (And So Can You)
Kat Sweet

Wireless Intrusion Detection System with Raspberry Pi
Chris Jenks

The Answer is 42 - InfoSec Data Visualization (Making Metric Magic & Business Decisions)
Edward McCabe

Running Away from Security: Web App Vulnerabilities and OSINT Collide
Micah Hoffman

Lessons Learned from Implementing Software Security Programs
Todd Grotenhuis

Stupid Pentester Tricks - OR - Great Sysadmin Tips! - Done in style of Rocky and Bullwinkle
Alex Fernandez-Gatti / Matt Andreko / Brad Ammerman (not to be posted)

Findings to date.
Cameron Maerz

Clean Computing: Changing Cultural Perceptions
Emily Peed (No Sound)

From Parking Lot to Pwnage - Hack?free Network Pwnage
Brent White / Tim Roberts

PlagueScanner: An Open Source Multiple AV Scanner Framework
Robert Simmons

How not to Infosec
Dan Tentler

Building a sturdy foundation - a program-based approach to IT Operations, Application Development, and Information Security in business
Steven Legg

Hacking the Jolla: An Intro to Assessing A Mobile Device
Vitaly McLain / Drew Suarez

 

Track 3

Operationalizing Yara
Chad Robertson

An Inconvenient Truth: Security Monitoring vs. Privacy in the Workplace
Ana Orozco

From Blue To Red - What Matters and What (Really) Doesn't
Jason Lang

Using Evernote as an Threat Intelligence Management Platform
Grecs

Surfing the Sea and Drowning in Tabs: An Introduction to Cross-Site Request Forgery
Barry Schatz

Turn Your Head And Cough: Why Architecture Risk Assessments Are Like Being A General Physician
Nathaniel Husted

OBAMAS CYBER SECURITY PLAN DISSECTED
Jonathan Thompson

The Hacker Community is Dead! Long Live the Hacker Community!
Bruce Potter

Square Peg, Round Hole: Developing a Security Culture Within an Enterprise
Jeff Pergal / Stuart McIntosh

Smuggling Plums - Using Active Defnse techniques to hide your web apps from your attackers and their scanners
John Stauffacher

Deploying Honeypots To Gather Actionable Threat Intelligence
James Taliento

Clear as FUD: A look at how confusing jargon and technology can create fear, uncertainty, and doubt
Chris Maddalena

How to Budget for IDS
Brian Heitzman

Reverse Engineering Windows AFD.sys
Steven Vittitoe

Nepenthes: Netpens With Less Pain
Andy Schmitz

Do We Still Need Pen Testing?
Jeff Man

 

Workshops

Lock Picking & Bypass Class

Your Own Worst Enemy Landing Your First Infosec Gig Despite Yourself - Johnny Xmas

Building an Incident Response Program - Lesley Carhart

Security Auditing Android Apps - Sam Bown

06/10/2015

ShowMeCon 2015 Videos

Keynotes

Breaking in Bad (I'm the one who doesn't knock)
Jayson Street

Security's Coming of Age: Can InfoSec Mature and Save the World
Dave Chronister

Confessions of a Social Engineer, My Dirty Tricks and How to Stop them.
Valerie Thomas

The Security Trust Chain is Broken: What We're Doing about it
Kenn White

Maturing Information Security - When Compliance doesn't cut it.
Joey Smith

Hunting the Primer: Looking into DarkNet
Aamir Lakhani

 

Left Track

Gray Hat Powershell
Ben0xA

Sensory Perception: A DIY Approach to Building a Wireless Sensor Network
Tim Fowler

Stop The Wireless Threat - Dawn of the Drone
Scott Schober

Automated Static Malware Analysis Using Function-level Signatures or: How I Learned to Stop Worrying and Love the APT
James Brahm, Matthew Rogers, Morgan Wagners

Forensic Artifacts of Host-Guest Interaction in the VMware Environment
Kurt Aubuchon

Enterprise Class Vulnerability Management like a Boss
Rockie Brockway

 

Right Track

HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD
Paul Coggin

Behind the Hack
Ralph Echemendia

Mobile Forensics and its Anatomy of Extractions
Charline F. Nixon

Building Virtual Pentesting Lab
Kevin Cardwell

That's not my RJ45 jack: IRL networking for Humans
Johnny Xmas

The Great Trojan Demo
Ben Miller

Disco Track

HIPAA 2015: Wrath of the Audit
Hudson Harris

Practical Electronics: Fixing the fan in a post-poop scenario
Evan "treefort" Booth

Of History and Hashes
Adrian Crenshaw

06/07/2015 ShowMeCon Videos Coming Soon
As I record the ShowMeCon 2015 videos, I will be putting them here. I will also be tweeting as I get them out from @Irongeek_adc
05/30/2015 Of History & Hashes: A Brief History of Password Storage, Transmission, & Cracking
I'd like to expand this article with new anecdotes of "they should have know better" and "this has been done before". Please let me know how I should expand it.
05/30/2015 Kiosk/POS Breakout Keys in Windows
I wanted to point out some articles I wrote for the TrustedSec blog. If you mess with Kiosk systems, you may like this.
05/17/2015 Password Cracking Class for Hackers For Charity
This is the Password Cracking class the Kentuckiana ISSA put on to support Hackers For Charity. Speakers include Jeremy Druin @webpwnized, Martin Bos @purehate_ and me @irongeek_adc. If you like the video, please consider donating to Hackers For Charity. Keywoords: John, Hashcat, OCLHashcat, rockyou, sam, system, Windows, Unix passwords.
05/16/2015 BSides Knoxville 2015 Videos
These are the videos BSides Knoxville 2015. Thanks to Aaron, Tim and Nicolas for the video help.

Keynote
Travis Goodspeed

How I've hacked and un-hacked a logic game (20 years to Lights Out)
Gyora Benedek

Finding Bad Guys with 35 million Flows, 2 Analysts, 5 Minutes and 0 Dollars
Russell Butturini

Dumping the ROM of the Most Secure Sega Genesis Game Ever Created: A Reverse Engineering Story
Brandon Wilson (not recorded)

Phishing: Going from Recon to Credentials
Adam Compton, Eric Gershman

Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols
Catherine Pearce

High Performance Fuzzing
Richard Johnson

Cyber Cyber Cyber: Student Security Competitions
Eric Gershman, Raymond Borges

The Impossibility of Protecting the Enterprise at $7.25 an hour
Kevin Thomas

 I've met the enemy information security and it is us
Slade Griffin

The Poetry of Secrets: An Introduction to Cryptography
Eric Kolb

From Broadcast to Totally Pwned
Russel Van Tuyl, Matt Smith

Introducing User-Centered Design to Augment Human Performance in Cyber Warfare
Frank Cohee, Joe Davis

Back to the Future
Neil Desai

Virtualized Routers Soup to Nuts
Jeff Nichols, Benjamin Taylor, Tommy Hardin

05/10/2015 BSides Boston 2015 Videos
These are the videos BSides Boston 2015. Thanks to @plaverty9 for inviting me out to record.

Keynote

The Securitized State: Where it came from, where it's going, what can be done about it
Molly Sauter

Track 1

Is Threat Modeling for Me?
Robert Hurlbut

Hacker or criminal? Repairing the reputation of the infosec community.
Melanie Ensign

Running Away from Security: Web App Vulnerabilities and OSINT Collide
Micah Hoffman

Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program
Paul Asadoorian

Protect Your "Keys to the Kingdom" _ Securing Against the Next Inevitable Cyberattack
Paul Kozlov

In pursuit of a better crypto puzzle
Samuel Erb

Track 2

When penguins attack - Linux's role in the malware ecosystem
Chester Wisniewski

The Benefits in Externalizing DMZ-as-a-Service in the Cloud
Israel Barak

Common misconfigurations that lead to a breach
Justin Tharpe

Applying Big Data technology to security use case
Max Pevzner

Marketing: They're not all Schmucks.
Jen Ellis & Josh Feinblum

Next-Gen Incident Management - Building out a Modern Incident Management Capability
John McDonald

Closing

04/24/2015 AIDE 2015 Videos
Recorded at AIDE 2015. Big thanks to Bill Gardner (@oncee) for having me out to record.

ISLET (Isolated, Scalable, & Lightweight Environment for Training) - Jon Schipp

Examining Hacktivism: Crime and Punishment in the Digital Age - Bill Gardner/Kim DeTardo-Bora/Amanda Richards

INFOSEC Flash Forward - Changing how we think - Dave Kennedy

Quantum Computing 01100101 - Tess Schrodinger

Introducing Network Scout: Defending the Soft Center of Your Network - Aeadan Somerville/Shawn Jordan

Mutillidae - Jeremy Druin

Quick Intro To Lock Picking - Adrian Crenshaw

OWASP Applied - Elliott Cutright (Not Recorded)

Kevin Cordle - Kevin Cordle (Not Recorded)

Better Threat Intel Through OSint - Frank Hackett

Overview of Darknets - Adrian Crenshaw

BREAKING in BAD (I'm the one who doesn't knock) - Jayson Street

04/21/2015

BSides San Francisco 2015 Videos
These are the videos from the BSides San Francisco conference. Special thanks to Doug, Jim, @dgc, 'Grond' <grond66@riseup.net>, @flee74 , Wayne and some others I'm forgetting for their help recording

Track 1

Intro

Stick a Pin in Certificate Pinning: How to Inspect Mobile Traffic and Stop Data Exfiltration
Gopal Jayaraman

OSXCollector: Forensic Collection and Automated Analysis for OS X
Ivan Leichtling

DNS Spikes, Strikes, and The Like
Thomas Mathew

Ask the EFF

Your Users Passwords Are Already Stolen
Lucas Zaichkowsky

Analyze This!
Aaron Shelmire
(not recorded)

Medical Device Security - From Detection To Compromise
Scott Erven

How SecOps Can Convince DevOps To Believe In The Bogeyman
Leif Dreizler

Human Hunting
Sean Gillespie

Phighting Phishers Phake Phronts
Kevin Bottomley

Corporate Governance For Fun and (Non)Profit
Christie Dudley

HIPAA 2015: Wrath of the Audits
W. Hudson Harris

Lessons Learned from Building and Running MHN, the World's Largest Crowdsourced Honeynet
Jason Trost

Getting started...help me help you
David Trollman


 

Track 2

Critical Infrastructure: The Cloud loves me, The Cloud loves me not.
Bryan Owen

F*ck These Guys: Practical Countersurveillance
Lisa Lorenzin

Collective Action Problems in Cybersecurity
Allan Friedman

Intrusion Detection in the clouds
Josh Pyorre

Hacker or criminal? Repairing the reputation of the infosec community
Melanie Ensign

Student Surveillance: How Hackers Can Help Protect Student Privacy
Jessy Irwin

When Doing the Right Thing Goes Wrong - Impact of Certificates on Service Based Infrastructure
Robert Lucero

How to Lie with Statistics, Information Security Edition
Tony Martin-Vegue

Ground Zero Financial Services: The Latest Targeted Attacks from the Darknet
Brian Contos

Securing the Hastily Formed Network: Infosec for Disaster Relief and Emergency Response
Rakesh Bharania

GitReview - Reflective Control In Action
Jon Debonis

Probing Patches: Beyond Microsoft's ANS
Bill Finlayson (not recorded)

*Blink*: The Network Perimeter is Gone
Rick Farina (Zero_Chaos)

Federating AWS CLI
Paul Moreno

04/12/2015 BSides Nashville 2015 Videos
These are the videos BSides Nashville 2015. Thanks to @lil_lost for inviting me down to record and being my bodyguard while in Nashville.

BSides Nashville Intro and
Pondering the False Economy of Secrets
Trey Ford @TreyFord

Applied Detection and Analysis Using Flow Data
Jason A. Smith

Using devops monitoring tools to increase security visibility
Chris Rimondi

The Great Trojan Demo
Ben Miller

Nobody Understands Me: Better Executive Metrics
Michael St. Vincent

So you want to be a pentester?
Not Recorded

We Built This & So Can You!
Tim Fowler

That's NOT my RJ45 Jack!: IRL Networking for Humans
Johnny Xmas

Finding Low Hanging Fruit with Kali
Stephen Haywood

What do infosec practitioners actually do
Slade Griffin

From Parking Lot to Server Room
Tim Roberts and Brent White

N4P Wireless Pentesting: So easy even a caveman can do it
Chris Scott

hashcat
_NSAKEY

Use of Attack Graphs in Security Systems
Not Recorded

Skiddiemonkeys: Fling "stuff" at your Defenses and See What Sticks
Russell Butturini & Joshua Tower

 

04/01/2015 Guess I Stay In Infosec
Well, I tried to join the ranks of radical feminists, but they would not have me. I'll keep running Irongeek.com for awhile. Guess I need to change causes and fight for machine liberation instead (Hail Skynet!).
04/01/2015

Irongeek signing off, time for other projects
Hello everyone. Its been a great 11 years, but my life and career plans have moved on. Im moving away from information security and plan to dedicate my life to radical feminism. As such, I wont have time to maintain this infosec site (working on my PhD in womens studies takes a lot of time), so please archive Irongeek.com while it is still up. I will be announcing the URLs of my Tumblr, GoFundMe and Patreon pages shortly. Thanks for your support.

03/26/2015

Central Ohio Infosec Summit 2015 Videos
These are the videos from the Central Ohio Infosec Summit conference. Thanks to the video volunteers for helping me record.

Keynotes

We're At War - Why Aren't You Wearing A Helmet?
Bill Sieglein

Ghost In The Shadows - Identifying Hidden Threats Lurking On Our Networks
Deral Heiland

Rebuilding and Transforming and Information Security Function
Susan Koski

InfoSecs Midlife Crisis & Your Future...
Tsion Gonen

Current Cyber Threats: An Ever-Changing Landscape
Kevin Rojek

Tech 1

IT Isn't Rocket Science
David Mortman

Mind On My Money, Money On My Malware
Dustin Hutchison

Private Cloud Security Best Practices
Mike Greer

Cyber Espianoge - Attack & Defense
Michael Mimoso

Three Years of Phishing - What We've Learned
Mike Morabito

Piercing Your Perimeter, Dodging Detection, and Other Mayhem! a.k.a. Pen Tester Voodoo 101
Mick Douglas

Physical Penetration Testing: You Keep a Knockin' But You Can't Come In!
Phil Grimes

Tech 2

Honeypots for Active Defense - A Practical Guide to Deploying Honeynets Within the Enterprise
Greg Foss

Building Security Awareness Through Social Engineering
Valerie Thomas & Harry Regan

Open Source Threat Intelligence: Building A Threat Intelligence Program Using Public Sources & Open Source Tools
Edward McCabe

Modern Approach to Incident Response
James Carder and Jessica Hebenstreit

Having your cake and eating it too! Deploying DLP services in a Next Generation Firewall Environment
Mike Spaulding

Using Machine Learning Solutions to Solve Serious Security Problems
Ryan Sevy & Jason Montgomery

Electronic Safe Fail
Jeff Popio

Emerging Trends in Identity & Access Management
Robert Block

Building a Successful Insider Threat Program
Daniel Velez

A New Mindset Is Needed - Data Is Really the New Perimeter!
Jack Varney

OWASP

Software Security Cryptography
Aaron Bedra

Threat Analytics 101: Designing A "Big Data" Platform For Threat Analytics
Michael Schiebel

Developers Guide to Pen Testing (Hack Thyself First)
Bill Sempf
f

OWASP 2014 - Top 10 Proactive Web Application Controls
Jason Montgomery

GRC

IAM Case Study: Implementing A User Provisioning System
Keith Fricke

Measuring the Maturity of Your Security Operations Capabilities
Clarke Cummings

Exploring the Relationship between Compliance and Risk Management
Mark Curto

Data Loss Prevention - Are You Prepared?
Jason Samide

Compliance vs. Security - How to Build a Secure Compliance Program
Jeff Foresman

Overview and Analysis of NIST Cybersecurity Framework
Sarah Ackerman

The Explosion of Cybercrime - The 5 Ways IT May Be an Accomplice
Mark Villinski

GRC: Governance, Ruses & Confusion
Shawn Sines

Security Directions and Best Practices
Kevin Dempsey


Executive

Data Breach: If You're Not Prepared, You Can't Be Responsive
John Landolfi

Ten Practical Ideas For Creating An Attentive and Supportive Organization: Sales & Marketing For the Security Team
Glenn Miller

Strengthening Your Security Program
Chad Robertson

Presenting Security Metrics to the Board
Nancy Edwards

DREAMR - Obtain Business Partnerships
Jessica Hebenstreit

Security Talent In Ohio - A Discussion
Helen Patton

Silos to Seamless: Creating a Comprehensive Security Program
Jeremy Wittkop

Ascending Everest: Managing Third-Party Risk in the Modern Enterprise
Thomas Eck

And Then The World ChangedAgain
Jason Harrell

Corporate Uses for Anonymity Networks
Adam Luck

Going To The Dark Side: A Look Into My Transition From Technologist To Salesman
Aaron Ansari

Building An Industrial Controls Cybersecurity Framework (Critical Infrastructure)
Ernie Hayden

Panel Discussion Insourcing Outsourcing and Hybrid
Helen Patton, Louis Lyons, Greg Franz, Jeffery Sweet, Sassan Attari, Carla Donev, Kent King

Closing

02/28/2015 Louisville Lock Picking And Bypass Class Hosted At LVL1
Hackers For Charity donation class taught by @irongeek_adc and @essobi. Hosted at the LVL1 Hackerspace.
02/22/2015 BSides Tampa 2015 Videos
These are the videos from the BSides Tampa conference. Thanks to @PolarBill and all of the BSides Crew for having me out to help record and render the videos.

Track 1

Bug Bounties and Security Research
Kevin Johnson

Securing The Cloud
Alan Zukowski

Hacking
Chris Berberich

Vendor Induced Security Issues
Dave Chronister

Pentest Apocalypse
Beau Bullock

Kippo and Bits and Bits
Chris Teodorski

The Art of Post-infection Response & Mitigation
Caleb Crable

The Need for Pro-active Defense and Threat Hunting Within Organizations
Andrew Case


Track 2

Finding Common Ground within the Industry and Beyond
David Shearer

Ways to Identify Malware on a System
Ryan Irving

Android Malware and Analysis
Shane Hartman

Teaching Kids (and Even Some Adults) Security Through Gaming
Le Grecs

Evaluating Commercial Cyber Threat Intelligence
John Berger


Track 3

Cyber Geography and the Manifest Destiny of the 21st Century
Joe Blankenship

Mitigating Brand Damage From A Cyber Attack
Guy Hagen

What is a security analyst and what job role will they perform
James Risler

Live Forensic Acquisition Techniques
Joe Partlow

Cyber Security Awareness for Healthcare Professionals
Marco Polizzi

02/08/2015 BSides Huntsville 2015 Videos Posted
These are the videos from the BSides Huntsville conference. Thanks to @PaulCoggin, @CharlineNixon, Brian, @GRMrGecko and all of the BSides Crew for having me out to help record and render the videos.

Track 1

Real World Threats
Russ Ward

Lock picking, but bypass is easier
Adrian Crenshaw (@irongeek_adc)

The Dark Side Of PowerShell
Joshua Smith

Give me your data!
Dave Chronister

Gods and Monsters: A tale of the dark side of the web
Aamir Lakhani

Sensory Perception: A DIY approach to building a sensor network
Tim Fowler

Hijacking Label Switched Networks in the Cloud
Paul Coggin (@PaulCoggin)

Reverse Engineering Network Device APIs
Dan Nagle (@NagleCode)

Track 2

So Easy A High-Schooler Could Do It: Static malware analysis using function-level signatures
James Brahm, Matthew Rogers, and Morgan Wagner

Pragmatic Cloud Security: What InfoSec Practitioners Have Been Waiting For
Josh Danielson (@JoshGDanielson) and Arthur Andrieu

Developing and Open Source Threat Intelligence Program
Edward McCabe (@edwardmccabe)

Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare
Frank Cohee

The Great Trojan Demo
Ben Miller

A Virtual SCADA Laboratory for Cybersecurity Pedagogy and Research
Zach Thornton

PlagueScanner: An Open Source Multiple AV Scanner Framework
Utkonos

01/28/2015 Circle City Con, Indianapolis Indiana 06-12-2015 - 06-14-2015
Come join us for Circle City Con in Indianapolis Indiana this June 12th-14th. I had a great time last year, and will be staffing again this year (video of course, and some time in the lock pick village). Call for presentations and call for trainers is currently open. More information at https://circlecitycon.com
01/21/2015 BSides Columbus Ohio 2015 Videos

These are the videos from the BSides Columbus Ohio conference. Thanks to Michael Spaulding for having me up and the guys who manned video rigs.

Keynotes

Breaking Bad
Jayson Street

Cloud and Virtualization Theory
Grauben Guevara

 

Offence

User Behavior Analysis
Matt Bianco

Plunder, Pillage and Print - The art of leverage multifunction printers during penetration testing
Deral Heiland

Common Sense Security Framework
Jerod Brennen

OWASP Mobile Top Ten - Why They Matter and What We Can Do
Ricky Rickard

Defense

Got software? Need a security test plan? Got you covered.
Bill Sempf

Corporate Wide SSL Interception and Inspection
Frank Shaw

How to Rapidly Prototype Machine Learning Solutions to Solve Security Problems
Jason Montgomery

A Basic Guide to Advanced Incident Response
Scott Roberts

Supply and Demand: Solving the InfoSec Talent Shortage
Brandon Allen

Special Teams

Do We Still Need Pen Testing?
Jeff Man

Trolling Attackers for Fun & Profit
Stephen Hosom

Inurl:robots.txt-What are YOU hiding?
David Young

Malware Development as the Evolution of Parasites
Adam Hogan

Snort Beyond IDS: Open Source Application and File Control
Adam Hogan

01/18/2015

Shmoocon Firetalks 2015 Videos

Opening - @grecs

PlagueScanner: An Open Source Multiple AV Scanner Framework - Robert Simmons (@MalwareUtkonos)

I Hunt Sys Admins - Will Schroeder (@harmj0y)

Collaborative Scanning with Minions: Sharing is Caring - Justin Warner (@sixdub)

Chronicles of a Malware Hunter - Tony Robinson (@da_667)

SSH-Ranking - Justin Brand (@moo_pronto)

Resource Public Key Infrastructure - Andrew Gallo (@akg1330)

12/6/2014 WiGLE WiFi Database to Google Earth Client for Wardrive Mapping Tool Updated
Uploaded version 0.97. Now uses HTTPS for connecting to WiGLE since they have a properly signed cert. I also added code contributions from njd who updated for WiGLE changes (WiGLE now supports more encryption types). Folders are broken down into WAPs that a Open, WEP, WPA, WPA2 and Unknown.
11/22/2014 DerbyCon 2014 Higher Education Panel for Hackers Irongeeks Thoughts
Just my thoughts on the state of infosec education at universities.
11/17/2014 Hack3rcon 5 Videos
Here are the videos from Hack3rcon^5 Enjoy.

Bash Scripting for Penetration Testers
Lee Baird


Intro to PowerShell Scripting for Security

ISLET: An Attempt to Improve Linux-based Software Training
Jon Schipp

Remote Phys Pen: Spooky Action at a Distance
Brian Martin

Introducing Network-Scout: Defending The Soft Center of Your Network

Using the techniques of propaganda to instill a culture of security
Justin Rogosky

Identify Your Web Attack Surface: RAWR!
Tom Moore, Adam Byers

Gone in 60 minutes _ Practical Approach to Hacking an Enterprise with Yasuo
Saurabh Harit, Stephen Hall

Check Your Privilege(s): Futzing with File Shares for low hanging fruit
Adrian Crenshaw

DERP - Dangerous Electronic Redteam Practices
Luis Santana

When Zombies take to the Airwaves

I Am Nation State (And So Can You!)
tothehilt, SynAckPwn

10/19/2014

GrrCON 2014 Videos
These are the videos of the presentations from GrrCON 2014. Big thanks to EggDropX and Jaime for having me out, and my video crew  (Chris, Steve, Ian, Justine, and other Chris) for recording.

T-Rex

Around the world in 80 Cons (A tale of perspectives)
Jayson E Street

Infosec in the 21st century
Tim Crothers

Securing our Ethics: Ethics and Privacy in a Target-Rich Environment
Kevin Johnson

Social Engineering Can Kill Me, But It Cant Make Me Care
Gavin Jac0byterebel Ewan

Finding Our Way - From Pwned to Strategy 
David Kennedy (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Emulate SandBox and VMs to avoid malware infections
Jordi Vazquez (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Security Hopscotch
Chris Roberts (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Email DLP: Simple concept, often poorly implemented
c0rrup7_R3x (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

Look Observe Link (LOL) - How I learned to love OSINT
NinjaSl0th (Half lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)

ZitMo NoM
David HealWHans Schwartzberg

Bigger Boys Made Us
Mike Kemp

Full Douchesclosure
Duncan Manuts

Finuxs Historical Tour Of IDS Evasion, Insertions, and Other Odditie
Arron Finux Finnon

 

Velociraptor

Beating the Infosec Learning Curve Without Burning Out
Scott secureholio Thomas

Picking Blackberries
Thomas 'G13' Richards

Exercising with Threat Models
J Wolfgang Goerlich

Seeing Purple: Hybrid Security Teams for the Enterprise
B31tf4c3

CryptoRush - Rising from the Ashes
King Dragon

Autonomous Remote Hacking Drones
Dr. Phil Polstra

Proof That Windows Computer Forensics is Sexy
Kyle Chaoticflaws Andrus

BioHacking: Becoming the Best Me I Can Be
Leonard

Vulnerable By Design - The Backdoor That Came Through the Front
Matthew mandatory Bryant

OAuth2.0 - Its the Implementation Stupid!!
Tony Miller

Breach Stains
Matt The Streaker Johnson

Are you a janitor, or a cleaner?
John geekspeed Stauffacher & Matthew Mattrix Hoy

PCI and Crypto: The Good, The Bad, and The Frankly Ugly
Robert Former

 

Stegosaurus

Advanced Threats and Lateral Movement 
Terrance Davis

Adopting a Risk-based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data
Todd Bursch

New World, New Realities: Endpoint threat Detection, Response and Prevention
Brian Orr

Reducing Your Organizations Social Engineering Attack Surface
Jen Fox

Memory Forensics with Hyper-V Virtual Machines
Wyatt Roersma

$#!T My Industry Says. . .
Kellman Meghu

Bringing PWNED To You: Interesting Honeypot Trends
Elliott Brink

The Security Implications of Software Defined Networks
Shane Praay

Lessons from the front lines: Top focus areas for information security leaders
Shogo Cottrell

How to budget IDSs
Brian Arcane Heitzman

LEVIATHAN: Command and Control Communications on Planet Earth
Kevin Thompson

Red Teaming: Back and Forth, 5ever
FuzzyNop

Intelligence Driven Security
Shane Harsch

Security for the People: End-User Authentication Security on the Internet
Mark Stanislav

Hackers Are People Too
Infosystir

Vaccinating APKs
Milan Gabor

 

Brontosaurus

Hack the Hustle! Career Strategies For Information Security Professionals
Eve Adams

The Challenge of Natural Security Systems
Rockie Brockway

Application Pen Testing
Chris Pfoutz

Advanced Breaches of 2013 vs. Behavioral Detection
Charles Herring

Security On The Cheap
Joel Cardella

Hacking Android
Godfrey Nolan

Cyber Security Incidents: Red Blue Team
Unc13 Fuck3r

Extra

Board Breaking Challenge

GrrCON Talent Accelerator Program
Abe Jones

10/03/2014

Louisville Infosec 2014 Videos
Below are the videos from the Louisville Infosec 2014 conference. Thanks to @theglennbarrett, @f0zziehakz and @bridwellc for helping me record.

Opening Ceremony

All of Your Compliance Needs with One Methodolgy
Jim Czerwonka

Lockade: Electronic Games for Locksport
Adrian Crenshaw

Mining Data from the Windows Registry
Jason Hale

Identity Theft: Who's in YOUR Wallet?
Richard Starnes & Rick Nord

Mobile Telephony for InfoSec Practitioners
Daniel Helton

A Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP)
John McLain

Building an Enterprise DDoS Mitigation Strategy
Mitchell Greenfield

Practical interception of mobile device traffic
Jeremy Druin

Changing What Game- One Future for Information Security
Michael Losavio

Trash Talkin - IT Audit Guide to Dumpster Diving
John Liestman

Linking Users to Social Media Usage on Android Mobile Devices
Ryan Ferreira

Origin of CyberSecurity Laws - An Insider's Story
Steve Riggs

A Place at the Table
Kristen Sullivan

What your Web Vulnerability Scanners Aren't Telling You
Greg Patton

ISSA Awards

Creating the Department of How: Security Awareness that makes your company like you.
Ira Winkler

Are You Really PCI DSS Compliant? Case Studies of PCI DSS Failure!
Jeff Foresman

Where does Data Security fit into the Data Quality strategy?
Michael Vincent

Closing Ceremony
 

10/01/2014 Derbycon 4 Videos
These are the videos of the presentations from Derbycon 2014. Big thanks to my video jockeys Skydog, Sabrina, Some Ninja Master, Glenn Barret, Dave Lauer, Jordan Meurer, Brandon Grindatti, Joey, Steven, Branden Miller, Joe, Greg and Night Carnage (and maybe the speakers too I guess).

Welcome to the Family - Intro

Johnny Long (Keynote) - Hackers saving the world from the zombie apocalypse

How to Give the Best Pen Test of Your Life (Keynote) - Ed Skoudis

Adaptive Pentesting Part Two (Keynote) - Kevin Mitnick and Dave Kennedy

If it fits - it sniffs: Adventures in WarShipping - Larry Pesce

Abusing Active Directory in Post-Exploitation - Carlos Perez

Quantifying the Adversary: Introducing GuerillaSearch and GuerillaPivot -Dave Marcus

A Year in the (Backdoor) Factory - Joshua Pitts

Ball and Chain (A New Paradigm in Stored Password Security) - Benjamin Donnelly and Tim Tomes

Et tu - Kerberos? - Christopher Campbell

Advanced Red Teaming: All Your Badges Are Belong To Us - Eric Smith

Bypassing Internet Explorer's XSS Filter - Carlos Munoz

 Threat Modeling for Realz - Bruce Potter

A Guided Tour of the Internet Ghetto :: Introduction to Tor Hidden Services - Brent Huston

Red Teaming: Back and Forth - 5ever - Fuzzynop

How not to suck at pen testing - John Strand

Mainframes - Mopeds and Mischief; A PenTesters Year in Review - Tyler Wrightson

The Multibillion Dollar Industry That's Ignored - Jason Montgomery and Ryan Sevey

Code Insecurity or Code in Security - Mano 'dash4rk' Paul

C3CM: Defeating the Command - Control - and Communications of Digital Assailants - Russ McRee

So You Want To Murder a Software Patent - Jason Scott

Leonard Isham - Patching the Human Vulns

Burp For All Languages - Tom Steele

Passing the Torch: Old School Red Teaming - New School Tactics - David McGuire and Will Schroeder

I Am The Cavalry: Year [0] - Space Rogue and Beau Woods

University Education In Security Panel - Bill Gardner (@oncee) - Ray Davidson - Adrian Crenshaw - Sam Liles - Rob Jorgensen

What happened to the 'A'? - How to leverage BCP/DR for your Info Sec Program - Moey

Securing Your Assets from Espionage - Stacey Banks

Subverting ML Detections for Fun and Profit - Ram Shankar Siva Kumar - John Walton

Secrets of DNS - Ron Bowes

Snort & OpenAppID: How to Build an Open Source Next Generation Firewall - Adam Hogan

GET A Grip on Your Hustle: Glassdoor Exfil Toolkit - Parker Schmitt - Kyle Stone (essobi) - Chris Hodges (g11tch)

DNS-Based Authentication of Named Entities (DANE): Can we fix our broken CA model? - Tony Cargile

Exploiting Browsers Like A Boss w/ WhiteLightning! - Bryce Kunz

Real World Intrusion Response - Lessons from the Trenches - Katherine Trame and David Sharpe

Application Whitelisting: Be Careful Where The Silver Bullet Is Aimed - David McCartney

NeXpose For Automated Compromise Detection - Luis "connection" Santana

A girl - some passion - and some tech stuff - Branden Miller and Emily Miller

InfoSec - from the mouth of babes (or an 8 year old) - Reuben A. Paul (RAPstar) and Mano Paul

Why Aim for the Ground? - Teaching Our School Kids All of the Right Computer Skills - Phillip Fitzpatrick

NoSQL Injections: Moving Beyond 'or '1'='1' - Matt Bromiley

SWF Seeking Lazy Admin for Cross Domain Action - Seth Art

Planning for Failure - Noah Beddome

The Social Engineering Savants - The Psychopathic Profile - Kevin Miller

Hiding the breadcrumbs: Forensics and anti-forensics on SAP systems - Juan Perez-Etchegoyen

You're in the butter zone now baby. - Chris Scott

Making BadUSB Work For You - Adam Caudill - Brandon Wilson

PassCrackNet: When everything else fails - just crack hashes. - Adam Ringwood

Vulnerability Assessment 2.0 - John Askew

Social Engineering your progeny to be hackers - Sydney Liles

A Brief History of Exploitation - Devin Cook

Hunting Malware on Linux Production Servers: The Windigo Backstory - Olivier Bilodeau

Interceptor: A PowerShell SSL MITM Script - Casey Smith

Egypt - More New Shiny in the Metasploit Framework

The Human Buffer Overflow aka Amygdala Hijacking - Christopher Hadnagy

Shellcode Time: Come on Grab Your Friends - Wartortell

The Internet Of Insecure Things: 10 Most Wanted List - Paul Asadoorian

DDoS Botnet: 1000 Knives and a Scalpel! - Josh Abraham

wifu^2 - Cameron Maerz

Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades - Tim Medin

Attack Paths: Breaking Into Infosec From IT Or Other Totally Different Fields - Eve Adams and Johnny Xmas

How to Secure and Sys Admin Windows like a Boss. - Jim Kennedy

Red white and blue. Making sense of Red Teaming for good. - Ian Amit

Around the world in 80 Cons - Jayson E. Street

Mirage - Next Gen Honeyports - Adam Crompton and Mick Douglas

Active Directory: Real Defense for Domain Admins - Jason Lang

The Wireless World of the Internet of Things - JP Dunning ".ronin"

Hackers Are People Too - Amanda Berlin (Infosystir)

Ethical Control: Ethics and Privacy in a Target-Rich Environment - Kevin Johnson and James Jardine

The Road to Compliancy Success Plus Plus - James Arlen

Are You a Janitor - Or a Cleaner - "John Stauffacher and Matt Hoy

Practical PowerShell Programming for Professional People - Ben Ten (Ben0xA)

GROK - atlas

How building a better hacker accidentally built a better defender - Casey Ellis

Exploring Layer 2 Network Security in Virtualized Environments - Ronny L. Bull - Dr. Jeanna N. Matthews

Hardware Tamper Resistance: Why and How? - Ryan Lackey

Making Mongo Cry-Attacking NoSQL for Pen Testers - Russell Butturini

Step On In - The Waters Fine! - An Introduction To Security Testing Within A Virtualized Environment - Tom Moore

Give me your data! Obtaining sensitive data without breaking in - Dave Chronister

Third Party Code: FIX ALL THE THINGS - Kymberlee Price - Jake Kouns

Just What The Doctor Ordered? - Scott Erven

Powershell Drink the Kool-Aid - Wayne Pruitt - Zack Wojton

powercat - Mick Douglas

Macro Malware Lives! - Putting the sexy back into MS-Office document macros - Joff Thyer

Girl Fault Interrupted - Maggie Jauregui

Human Trafficking in the Digital Age - Chris Jenks

Cat Herding in the Wild Wild West: What I Learned Running A Hackercon CFP - Nathaniel Husted

How to Stop a Hack - Jason Samide

We don't need no stinking Internet. - Greg Simo

Hacking the media for fame and profit - Jen Ellis and Steve Ragan

Rafal Los - Things Being a New Parent of Twins Teaches You About Security

ZitMo NoM - David Schwartzberg

Penetrate your OWA - Nate Power

RavenHID: Remote Badge Gathering -or- Why we sit in client bathrooms for hours - Lucas Morris - Adam Zamora

Interns Down for What? - Tony Turner

i r web app hacking (and so can you!) - Brandon Perry

Building a Modern Security Engineering Organization - Zane Lackey

Information Security Team Management: How to keep your edge while embracing the dark side - Stephen C Gay

5min web audit: Security in the startup world - Evan Johnson

Project SCEVRON: SCan EVrything with ruby RONin - Derek Callaway

Soft Skills for a Technical World - Justin Herman

Gone in 60 minutes a Practical Approach to Hacking an Enterprise with Yasuo - Saurabh Harit and Stephen Hall

Snarf - Capitalizing on Man-in-the-Middle - Victor Mata - Josh Stone

Electronic locks in firearms - Oh My! - Travis Hartman

The Achilles Heel Of The American Banking System - Brandon Henery and Andy Robins

It's Not Easy Being Purple - Bill Gardner - Valerie Thomas - Amanda Berlin - Eric Milam - Brandon McCann - Royce Davis

Control Flow Graph Based Virus Scanning - Douglas Goddard

Ok - so you've been pwned - now what? - Jim Wojno

Everybody gets clickjacked: Hard knock lessons on bug bounties - Jonathan Cran

Are you a Beefeater - focused on protecting your crown jewels? - Jack Nichelson

Dolla Dolla Bump Key - Chris Sistrunk

What Dungeons & Dragons Taught Me About INFOSEC - Joey Maresca (l0stkn0wledge)

Gender Differences in Social Engineering: Does Sex Matter? - Shannon Sistrunk - Will Tarkington

Introduction to System Hardening - Eddie David

 Hacking your way into the APRS Network on the Cheap - Mark Lenigan

Building a Web Application Vulnerability Management Program - Jason Pubal

Fighting Back Against SSL Inspection - or How SSL Should Work - Jacob Thompson

Physical Security: From Locks to Dox - Jess Hires

Am I an Imposter? - Warren Kopp

Call of Community: Modern Warfare - Ben Ten and Matt Johnson

The Canary in the Cloud - Scot Bernerv

09/13/2014

 

BSides Augusta 2014 Videos
These are the videos from the BSides Augusta conference. Thanks to Lawrence Abrams, and all of the BSides Crew for having me out to help record and render the videos and Pentestfail for manning a capture rig.

Intro

Defeating Cognitive Bias and Developing Analytic Technique
Chris Sanders


ICS/SCADA Defense
Chris Sistrunk


Scaling Security Onion to the Enterprise
Mike Reeves


Techniques for Fast Windows Investigations
Tim Crothers


Using Microsofts Incident Response Language
Chris Campbell


Is that hardware in your toolkit, or are you just glad youre keeping up?
Jeff Murri


Pentester++
Chris Truncer


The Adobe Guide to Keyless Decryption
Tim Tomes


App Wrapping: What does that even mean
David Dewey


Adventures in Asymmetric Warfare
Will Schroeder


When Zombies take to the Airwaves
Tim Fowler


Spying on your employees using memory
Jacob Williams


Crazy Sexy Hacking
Mark Baggett

08/21/2014 Passwordscon 2014 Videos
These are the videos from the Passwordscon 2014 conference. Thanks for having me out to help record and render the videos.

Track 1

How we deciphered millions of users encrypted passwords without the decryption keys. - Josh Dustin (Canceled)

Is Pavlovian Password Management The Answer? - Lance James

DoCatsLikeLemon? - Advanced phrase attacks and analysis - Marco Preu

Tradeoff cryptanalysis of password hashing schemes - Dmitry Khovratovich, Alex Biryukov, Johann Groschdl

Using cryptanalysis to speed-up password cracking - Christian Rechberger

Password Security in the PCI DSS - Jarred White

Defense with 2FA - Steve Thomas

I have the #cat so I make the rules - Yiannis Chrysanthou

Penetrate your OWA - Nate Power

Surprise talk + advisory release - Dominique Bongard

All your SAP P@$$w0ЯdZ belong to us - Dmitry Chastuhin, Alex Polyakov

Target specific automated dictionary generation - Matt Marx

Bitslice DES with LOP3.LUT - Steve Thomas

Net hashes: a review of many network protocols - Robert Graham

Energy-efficient bcrypt cracking - Katja Malvoni

The problem with the real world - Michal paček

Password Topology Histogram Wear-Leveling, a.k.a. PathWell - Rick Redman

Beam Me Up Scotty! - Passwords in the Enterprise - Dimitri Fousekis

Track 2

Welcome & Announcements - Jeremi Gosney, Per Thorsheim

Opening Keynote - Julia Angwin

Secure your email - Secure your password - Per Thorsheim

Highlights of CMUs Recent Work in Preventing Bad Passwords - Sean Segreti, Blase Ur

Password Hashing Competition: the Candidates - Jean-Philippe Aumasson

What Microsoft would like from the Password Hashing Competition - Marsh Ray, Greg Zaverucha

How Forced Password Expiration Affects Password Choice - Bruce K. Marshall

Security for the People: End-User Authentication Security on the Internet - Mark Stanislav

Authentication in the Cloud - Building Service - Dan Cvrcek

How EFF is Making STARTTLS Resistant to Active Attacks - Jacob Hoffman-Andrews, Yan Zhu

Proof of work as an additional factor of authentication - Phillippe Paquet, Jason Nehrboss

The future of mobile authentication is here - Sam Crowther

Password hashing delegation: how to get clients work for you - Thomas Pornin

Throw the User ID Down the Well - Daniel Reich

Password Generators & Extended Character Set Passwords - Stephen Lombardo, William Gray

Encryption and Authentication: Passwords for all reasons. - Jeffrey Goldberg

Enhancing Password Based Key Derivation Techniques - Stephen Lombardo, Nick Parker

Capturing Passwords into the Secure Desktop - Marcio Almeida de Macedo, Bruno Gonalves de Oliveira

08/20/2014 TakeDownCon Rocket City 2014 Videos
These are the videos from the TakeDownCon Rocket City 2014. Thanks to Devona Valdez and Paul Coggin for having me out to record.

Hacking Industrial Control Systems - Ray Vaughn (Not Recorded)

Dropping Docs on Darknets: How People Got Caught - Adrian Crenshaw

How Networks are Getting Hacked: The Evolution of Network Security - Omar Santos

Building on Device Vulnerabilities: Attack Modes for ICS - Bryan Singer

Survival in an Evolving Threat Landscape - David Hobbs

Practical Side Channel Attacks On Modern Browsers - Angelo Prado

IPv6 Attack tools - Soctt Hogg

Mobile Forensics and Its App Analysis - Dr. Charline Nixon

Keynote - How Not to do Security - Kellman Meghu

Baseball, Apple Pies, and Big Data Security Analytics: Shorten the Kill Chain Window - Aamir Lakani

Hijacking Label Switched Networks in the Cloud - Paul Coggin

Shepherds Pi - Herding Sheep with a Raspberry Pi - Timothy Mulligan

Radio Hack Shack - Security Analysis of the Radio Transmission - Paula Januszkiewicz

IT Security Myths - "How you are helping your enemy" - Joe Vest

Splinter the RAT Attack: Creating Custom RATs to Exploit the Network - Solomon Sonja

Policy Defined Segmentation with Metadata - Scott Kirby

Cyber Attack Mitigation - Christopher Elisan

08/12/2014 Defcon Wireless Village 2014 (Defcon 22) Videos
These are the videos from the Defcon Wireless Village 2014 (Defcon 22). Thanks to the Village People for putting on the event, especially Maeltac for recording.

Intro

So ya wanna get into SDR? - Russell Handorf

Pentoo Primer - Village People

802.11ac Evolution: Data rates and Beamforming - Eric Johnson

Practical Foxhunting 101 - SimonJ

Pwn Phone: gg next map - Timothy Mossey

Hacking 802.11 Basics - Benjamin Smith

UAV-Assisted Three-Dimensional Wireless Assessments - Scott Pack & Dale Rowe

Manna from Heaven; Improving the state of wireless rogue AP attacks - Dominic White & Ian de Villiers

ApiMote: a tool for speaking 802.15.4 dialects and frame injection - Ryan Speers & Sergey Bratus

Pineapple Abductions - Craig Young

Choosing your next antenna, types, power, sizes, the truth. - Raul J Pl

Introduction to the Nordic nRF24L01+ - Larry Pesce

Driver-less Wireless Devices - Dominic Spill & Dragorn

Hacking the Wireless World with Software Defined Radio - 2.0 - Balint Seeber

The NSA Playset: Bluetooth Smart Attack Tools - Mike Ryan

PortaPack: Is that a HackRF in your pocket? - Jared Boone

PHYs, MACs, and SDRs - Robert Ghilduta

SDR Tricks with HackRF - Michael Ossmann

SDR Unicorns Panel - Robert Ghilduta & Michael Ossmann & Balint Seeber

Inside The Atheros WiFi Chipset - Adrian Chadd

08/11/2014 BSides Las Vegas 2014 Videos
These are the videos from the BSides Las Vegas conference. Thanks to all of the BSides Crew for having me out to help record and render the videos.

@bsideslv, @banasidhe, @jack_daniel, @SciaticNerd and all my video crew

Breaking Ground

Opening Keynote -- Beyond Good and Evil: Towards Effective Security - Adam Shostack

USB write blocking with USBProxy - Dominic Spill

Allow myself to encrypt...myself! - Evan Davison

What reaction to packet loss reveals about a VPN - Anna Shubina Sergey Bratus

Untwisting the Mersenne Twister: How I killed the PRNG - moloch

Anatomy of memory scraping, credit card stealing POS malware - Amol Sarwate

Cluck Cluck: On Intel's Broken Promises - Jacob Torrey

A Better Way to Get Intelligent About Threats - Adam Vincent

Bring your own Risky Apps - Michael Raggo Kevin Watkins

Invasive Roots of Anti-Cheat Software - Alissa Torres

Vaccinating Android - Milan Gabor Danijel Grah

Security testing for Smart Metering Infrastructure - Steve Vandenberg Robert Hawk

The Savage Curtain - Tony Trummer Tushar Dalvi

We Hacked the Gibson! Now what? - Philip Young

Closing Keynote It\'s A S3kr37  (Not recorded :( )

Proving Ground

#edsec: Hacking for Education - Jessy Irwin

So, you want to be a pentester? - Heather Pilkington (Not Recorded)

Securing Sensitive Data: A Strange Game - Jeff Elliot

Brick in the Wall vs Hole in the Wall - Caroline D Hardin

Cut the sh**: How to reign in your IDS. - Tony Robinson/da_667

Geek Welfare -- Confessions of a Convention Swag Hoarder - Rachel Keslensky

No InfoSec Staff? No Problem. - Anthony Czarnik

Can I Code Against an API to Learn a Product? - Adrienne Merrick-Tagore

Bridging the Air Gap: Cross Domain Solutions - Patrick Orzechowski

Back Dooring the Digital Home - David Lister

iOS URL Schemes: omg:// - Guillaume K. Ross

Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter - Carlos Munoz

What I've Learned As A Con-Man - MasterChen

Training with Raspberry Pi - Nathaniel Davis

Black Magic and Secrets: How Certificates Influence You! - Robert Lucero

Attacking Drupal  -Greg Foss

Hackers vs Auditors - Dan Anderson

Third-Party Service Provider Diligence: Why are we doing it all wrong? - Patrice Coles

Pwning the hapless or How to Make Your Security Program Not Suck - Casey Dunham Emily Pience

Teach a man to Phish... - Vinny Lariza

The Lore shows the Way - Eric Rand

Common Ground

SHA-1 backdooring and exploitation - Jean-Philippe Aumasson

Evading code emulation: Writing ridiculously obvious malware that bypasses AV - Kyle Adams

Security Management Without the Suck - Tony Turner Tim Krabec

Vulnerability Assessments on SCADA: How i 'owned' the Power Grid. - Fadli B. Sidek (not posted)

Malware Analysis 101 - N00b to Ninja in 60 Minutes - grecs

Travel Hacking With The Telecom Informer - TProphet

The untold story about ATM Malware - Daniel Regalado

Using Superpowers for Hardware Reverse Engineering - Joe Grand

Why am I surrounded by friggin' idiots?!? (Because you hired them!) - Stephen Heath

Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY - Ira Ray Jenkins Sergey Bratus

Insider Threat Kill Chain: Human Indicators of Compromise - Ken Westin

A Place to Hang Our Hats: Security Community and Culture - Domenic Rizzolo

Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014 - David Mortman Joshua Corman Jay Radcliffe Zach Lanier David Kennedy

Pwning the Pawns with WiHawk - Santhosh Kumar Anamika Singh (Missing?)

Ground Truth

The Power Law of Information - Michael Roytman

Measuring the IQ of your Threat Intelligence feeds - Alex Pinto Kyle Maxwell

Strategies Without Frontiers - Meredith L. Patterson

ClusterF*ck - Actionable Intelligence from Machine Learning - Mike Sconzo

Know thy operator - Misty Blowers

Improving security by avoiding traffic and still get what you want in data transfers - Art Conklin

The Semantic Age - or - A Young Ontologist's Primer

I Am The Cavalry Q&As

07/20/2014 BSides Cleveland 2014 Videos
These are the videos from the Bsides Cleveland conference. Thanks to  &  as the video team. Thanks to twuntymcslore & RockieBrockway for being con mom & dad.

Keynote: Destroying Education and Awareness - David Kennedy

Track 1

APT2 - Building a Resiliency Program to Protect Business - Edward McCabe

Threat Models that Exercise your SIEM and Incident Response - J. Wolfgang Goerlich and Nick Jacob

Fun with Dr. Brown - Spencer McIntyre

Malware Evolution & Epidemiology - Adam Hogan

Plunder, Pillage and Print - The art of leverage multifunction printers during penetration testing - Deral Heiland

Seeing Purple: Hybrid Security Teams for the Enterprise - Mark Kikta (Not posted)

Attacking and Defending Full Disk Encryption - Tom Kopchak

Track 2

Phishing Like a Monarch With King Phisher - Brandon Geise and Spencer McIntyre

The importance of threat intel in your information security program - Jamie Murdock

Lockade: Locksport Electronic Games - Adrian Crenshaw

Pentesting Layers 2 and 3 - Kevin Gennuso and Eric Mikulas

Cleveland Locksport - Jeff Moss, Doug Hiwiller, and Damon Ramsey

Hacking Diversity - Gregorie Thomas

PowerShell: cool $h!t - Zach Wojton

Thinking Outside the Bunker: Security as a practice, not a target - Steven Legg

Password Defense: Controls your users wont hate - Nathaniel Maier

Am I an Imposter? - Warren Kopp

07/13/2014

 

OISF 2014 Videos
These are the videos from the OISF Anniversary Event

Introduction

For the Love of God, DEFEND YOUR MOBILE APPS! Part 2 - Jerod Brennen

Destroying Education and Awareness - Dave Kennedy

Lockade: Electronic Games for Locksport - Adrian Crenshaw

Modern Times: Passwords - Tom Webster

Praeda to PraedaSploit: The embedded device data Harvesting tool for the masses - Deral Heiland Percent_X

06/15/2014 Circle City Con 2014 Videos

These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to Oddjob, Glenn, James, Mike, Nathan, Chris and Branden for helping set up AV and record.

Track1

Conference Opening

Keynote - Beau Woods

Containing Privileged Processes with SELinux and PaX and Attacking Hardened Systems - Parker Schmitt

Whitelist is the New Black - Damian Profancik

Developing a Open Source Threat Intelligence Program - Edward McCabe

Blurred Lines- When Digital Attacks Get Physical - Phil Grimes

Hackers, Attack Anatomy and Security Trends - Ted Harrington

Exploring the Target Exfiltration Malware with Sandbox Tools - Adam Hogan

Day 2

From Grunt to Operator - Tom Gorup

Moving the Industry Forward - The Purple Team - David Kennedy

Software Assurance Marketplace (SWAMP) - Von Welch

OWASP Top 10 of 2013- Its Still a Thing and Were Still Not Getting It - Barry Schatz

Tape Loops for Industrial Control Protocols - K. Reid Wightman

OpenAppID- Open Source Next Gen Firewall with Snort - Adam Hogan

Challenge of Natural Security Systems - Rockie Brockway

InfoSec Big Joke - 3rd Party Assessments - Moey (Not recorded)

How to create an attack path threat model - Wolfgang Goerlich

Day 3

Are You a Janitor or a Cleaner - John Stauffacher / Matt Hoy

Aint No Half-Steppin - Martin Bos

Track 2

Competitive Hacking- why you should capture the flag - Steve Vittitoe

3 Is a Magic Number (or your Reality Check is About to Bounce) - Edward McCabe

The TrueCrypt audit- How it happened and what we found - Kenneth White

Seeing Purple- Hybrid Security Teams for the Enterprise - Mark Kikta (Beltface)

Eyes on IZON- Surveilling IP Camera Security - Mark Stanislav

Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) - Benjamin Brown

Day 2

Hackers Are People Too - Amanda Berlin

gitDigger- Creating useful wordlists and hashes from GitHub repositories - Jaime Filson

Retrocomputing And You - Machines that made the net - Pete Friedman

Doge Safes- Very Electronic, Much Fail, WOW! - Jeff Popio

Human Trafficking in the Digital Age - Chris Jenks

Keys That Go *Bump* In The Night - Loak

How Hackers for Charity (Possibly) Saved Me a LOT of Money - Branden Miller & Emily Miller

Ten Commandments of Incident Response (For Hackers) - Lesley Carhart

Threat Modeling- Fear, Fun, and Operational - James Robinson

Decrypting Communication- Getting Your Point Across to the Masses - Katherine Cook Frye

How often should you perform a Penetration Test - Jason Samide

Proactive Defense - Eliminating the Low Hanging Fruit - Matt Kelly

Active Directory- Real Defense for Domain Admins - Jason Lang

Day 3

Profiling Campus Crime - Chris J., Jason J., Katelyn C.,Alex H.

Proper Seasoning Improves Taste - James Siegel

Executive Management Manaing the Executives Beau Woods & Engaging the Media API Steve Ragan

06/06/2014 And We're Back!
Looks my account is reinstated. Let me know if any videos seem to be deleted.
 
 
 
 
 
 
Hi there,

After a review of your account, we have confirmed that your YouTube account is not in violation of our Terms of Service. As such, we have unsuspended your account. This means your account is once again active and operational.

If you forgot your password, please visit this link to reset it:

https://accounts.google.com/RecoverAccount?fpOnly=1&service=youtube&Email=irongeek%40gmail.com&hl=en

Sincerely,
The YouTube Team

 
 
   
 
2014 YouTube, LLC 901 Cherry Ave, San Bruno, CA 94066
 
 

 

06/06/2014

 

Google & Youtube

I woke up today to find a bunch of Facebook/Twitter messages that said my Youtube account was suspended. If you know someone at Google who can directly help me, let me know (their email support fails the Turing test). These are the messages I got from them.

YouTube | Broadcast Yourself

Regarding your account: Adrian Crenshaw

The YouTube Community has flagged one or more of your videos as inappropriate. Once a video is flagged, it is reviewed by the YouTube Team against our Community Guidelines. Upon review, we have determined that the following video(s) contain content in violation of these guidelines, and have been disabled:

Your account has received one Community Guidelines warning strike, which will expire in six months. Additional violations may result in the temporary disabling of your ability to post content to YouTube and/or the permanent termination of your account.

For more information on YouTube's Community Guidelines and how they are enforced, please visit the help center.

Please note that deleting this video will not resolve the strike on your account. For more information about how to appeal a strike, please visit this page in the help center.

Sincerely,

The YouTube Team

Copyright 2014 YouTube, LLC

and

 
 
We'd like to inform you that due to repeated or severe violations of our Community Guidelines (http://www.youtube.com/t/community_guidelines) your YouTube account Adrian Crenshaw has been suspended. After review we determined that activity in your account violated our Community Guidelines, which prohibit spam, scams or commercially deceptive content. Please be aware that you are prohibited from accessing, possessing or creating any other YouTube accounts. For more information about account terminations and how our Community Guidelines are enforced, please visit our Help Center at https://support.google.com/youtube/bin/answer.py?answer=92486&hl=en.
 
 
   
 
2014 YouTube, LLC 901 Cherry Ave, San Bruno, CA 94066
 
 

 

Come on Guys! is it just because of viagra in the title? Please get our InfoSec videos back up! (pun intended)

05/19/2014

BSides Nashville 2014 Videos
These are the videos BSides Nashville 2014 Videos. Thanks to @lil_lost for inviting me down to record and being my bodyguard while in Nashville. Big thanks to Geoff Collins, Branden Miller, Blake Urmos, Don Baham, Gabe Bassett and Some Ninja Master for helping set up AV and record.

Main Hall

Welcome to BSides Nashville
BSides, Harmonicas, and Communication Skills - Jack Daniel
Closing Ceremonies

INFOSEC 101 Track

Attack Paths: Breaking Into Infosec From IT Or Other Totally Different Fields - Eve Adams
Learn From Your Mistakes - Adam Len Compton
Beating the Infosec Learning Curve Without Burning Out - Scott Thomas
Sun Tzu was a punk! Confucius was an InfoSec rockstar! - Branden Miller
Around the world in 80 Cons - Jayson E Street Not Recorded

INFOSEC 418 Track

Making Mongo Cry: Automated NoSQL exploitation with NoSQLMap - Russell Butturini
Buy Viagra! - Matt Smith
How do I hack thee? Let me count the ways - Stewart Fey
Healthcare Security, which protocal? - Adam John
Why you can't prove you're PWND, but you are! - Ben Miller

INFOSEC 429 Track

Bending and Twisting Networks - Paul Coggin
Succeeding with Enterprise Software Security Key Performance Indicators - Rafal Los
Scaling Security in the Enterprise: Making People a Stronger Link - Kevin Riggs
Closing the time to protection gap with Cyber Resiliency - John Pirc Did not happen, replaced with:
Applying analog thinking to digial networks Winn Schwartau (@winnschwartau)
Seeing Purple: Hybrid Security Teams for the Enterprise - Mark Kikta

05/11/2014 Nmap Class for Hackers For Charity
This is the Nmap class the Kentuckiana ISSA put on to support Hackers For Charity. Speakers include Jeremy Druin @webpwnized, Martin Bos @purehate_ and me @irongeek_adc. If you like the videos, please consider donating to Hackers For Charity.
05/07/2014

ShowMeCon 2014 Videos
These are the videos ShowMeCon 2014. Thanks to Renee & Dave Chronister (@bagomojo), Ben Miller (@Securithid) and others for having me out to record and speak. Also thanks to my video crew Josh Tepen, Robert Young, Kali Baker, Andrew Metzger & Brian Wahoff.

Introduction - Parameter
Hacking Hollywood - Ralph Echemendia
Give Me Your Data - Dave Chronister
Terminal Cornucopia: Demystifying The Mullet - Evan Booth
Thinking Outside The (Sand)Box - Kyle Adams
Protecting The Seams: Military Doctrine Applied To Application And Network Security - Paul Vencill
Start With The BPT Then Worry About The APT! - Kevin Cardwel
Introduction - Parameter (Rolled in with next talk)
Cognitive Injection - Andy Ellis
Inside The WorldS Most Dangerous Search Engine - John Matherly
Hacking To Get Caught: A Concept For Adversary Replication And Penetration Testing - Raphael Mudge
Power-Ups And Princesses: What Video Games Taught Me About Building A Security Awareness Program - Aamir Lakhani
Powershell And You: Using MicrosoftS Post-Exploitation Language - Chris Campbell
Dropping Docs On Darknets: How People Got Caught - Adrian Crenshaw
Around The World In 80 Cons - Jayson E Street (not recorded)
Threat Modeling In The C-Suite, A Practical Guide - Erick Rudiak (pending review)
The Call Of Community: Modern Warfare - Ben0xa 
Physical (In)Security - ItS Not All About Cyber - Inbar Raz
Bending And Twisting Networks - Paul Coggin
Here, Let Me Hold That For You. Consumer Metadata And Its Dangers - Robert Reed

04/28/2014 BSides Chicago 2014 Videos
These are the videos from the BSides Chicago conference. Thanks to all of the BSides organizers @elizmmartin and  @securitymoey for having me out to help record and render the videos. Also big thanks to the @BSidesChicago A/V crew Chris Hawkins
@Lickitysplitted, Todd Haverkos @phoobar, Jason Kendall @coolacid and Asim.

Aligning Threats and Allies through Stories - J Wolfgang Goerlich and Steven Fox - @jwgoerlich @securelexicon

The Ultimate INFOSEC Interview: "Why must I be surrounded by frickin' idiots?" -- Dr. Evil, 1997 - Stephen Heath - @dilisnya

Call of Community: Modern Warfare - Matt Johnson & Ben Ten - @mwjcomputing @Ben0xA

How To Win Friends and Influence Hackers - Jimmy Vo - @JimmyVo

Checklist Pentesting; Not checklist hacking - Trenton Ivey - @trentonivey

Seeing Purple: Hybrid Security Teams for the Enterprise - Belt - @b31tf4c325

Looking for the Weird - Charles Herring - @charlesherring

InfoSec Big Joke: 3rd Party Assessments - moey - @securitymoey

Bypassing EMET 4.1 - Jared DeMott - @jareddemott

Comparing Risks to Risks - Why Asset Management Is Broken and How to Fix It. - Michael Roytman - @mroytman

Bioinformatics: Erasing the line between biology and hacking - Krystal Thomas-White and Patrick Thomas - @coffeetocode

Building an AppSec Program from Scratch - Chris Pfoutz - @cpfoutz

Minecraft Security - Riese Goerlich

The SMB Security Gap - Mike Kavka - @SiliconShecky

Everything I Ever Needed to Know About Infosec, I Learned from Hollywood - Tom Ervin - @TechByTom

Sit, stay, proxy. Good beagle. Why I love the beaglebone black and why you should too. - Colin Vallance - @_CRV

Hacking Diversity in InfoSec - Greg Thomas - @minossec

04/13/2014 Notacon 11 (2014) Videos
These are the videos from the 11th Notacon conference held April 10th-13st, 2014. Not all of them are security related, but  I hope my viewers will enjoy them anyway. Thanks to Froggy and Tyger for having me up, and to the video team: Securi-D, Ross, KP, Jeff and myself (Let me know who else to add).

Track 1

Big Data Technology - The Real World Minority Report - Brian Foster

Naisho DeNusumu (Stealing Secretly) - Exfiltration Tool/Framework - Adam Crompton

Wireless Mesh Protocols - Alex Kot

MDM is gone, MAM is come. New Challenges on mobile security - Yury Chemerkin

Moving the Industry Forward - The Purple Team - David Kennedy

Pwning the POS! - Mick Douglas

Nindroid: Pentesting Apps for your Android device - Michael Palumbo

Building a private data storage cloud - Michael Meffie

Lessons Learned Implementing SDLC - and How To Do It Better - Sarah Clarke

Plunder, Pillage and Print - Deral Heiland & Peter Arzamendi

Microsoft Vulnerability Research: How to be a finder as a vendor - Jeremy Brown & David Seidman

SMalware Analysis 101 - N00b to Ninja in 60 Minutes - grecs

Omega - A Universe Over IP - Mo Morsi

IRS, Identity Theft, and You (or Someone Pretending to Be You). - 123-45-6789

Track 2

All About the Notacon Badge -Sam Harmon

Collaboration between Artificial Intelligence and Humans: How to cure every disease within 50 years - Joe ODonnell

Science Fair - The Nomad Clan

Hacking Your Way Into the APRS Network on the Cheap - Mark Lenigan

Dominate! (Or let your computer do it for you.) - Paul Jarc

Wearable Technology as Art for Countersurveillance, Cinemaveillance, and Sousveillance - Ross Bochnek

3D Printing for Work and Fun (temp title) - Mirabela Rusu

Comparing Go Green With Common Sense - Suellen Walker

Living in the Future: It seems to be in Beta - Jeff Goeke-Smith

A Brief Introduction to Game Theory - Charlotte DeKoning - Beyond Using The Buddy System - Holly Moyseenko & Kris Perch

 

03/27/2014 Lockade: Locksport Electronic Games
This page is mostly going to be a place holder till I get all the games up. Gamification can make learning more fun, and some people are inspired and motivated by competition. This talk will be on integrating hobbyist electronics with lock picking games. We will show rough schematics, release code, and invite people to play the games at cons.
03/10/2014 ASAReaper: Grab Configs From Multiple Cisco Devices Over SSH (Demos PExpect and AES Encrypted INI Files in Python) Updated
Mostly updated for longer timeouts and to use "more system:run" so you can save passwords in the configs too. You should now just have to edit the commandonall and prefixonall to set the script up to run a given command on a series of Cisco ASAs in every context.
03/10/2014

 

So does IU Southeast and Indiana University take Linda Christiansen's plagiarism seriously?
The answer is apparently no. I've includes my emails with IU officials on the matter. Apparently, plagiarism is ok at IU/Indiana University Southeast if you are tenured faculty and it's only a business law and ethics syllabus.
02/10/2014 BSides Huntsville 2014 Videos
These are the videos from the BSides Huntsville conference. Thanks to @PaulCoggin, @CharlineNixon and all of the BSides Crew for having me out to help record and render the videos. Sorry for the bad sound, we had to go ambient in a crowded room.

BSides Huntsville 2014 - Intro

Building The Future of P-12 Cyber Education - Dr. Casey Wardynski

Cyber Security Program At HAH - Dr. Ray Vaughn

1337 in the Library: Obtaining your information security education on the cheap - Adrian Crenshaw @irongeek_adc

Zero to Hero: Breaking into the security Field - Jeremy Conway

Certifications in Cybersecurity - Adam Wade Lewis

Trojans - The Forgotten Enemy - Dave Chronister

The Amazing Cybermen - Ben McGee

Why you are pwnd and dont know it! - Ben Miller

Cyber Security, What's The Fuss? - Deborah William

HTTPS: Now You See Me - Tim Mullican

Introduction to hacking with PowerShell - Scott Busby

All You Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches - Valerie Thomas - @hacktress09

Digital Energy BPT - Paul Coggin
02/01/014 Intro to Darknets: Tor and I2P Workshop
This class introduces students to the I2P and Tor Darknets. We cover setting up Tor & I2P, the basics of use, and how to make hidden services. We also go over case examples like Eldo Kim Harvard & the Harvard Bomb Threat, Hector Xavier Monsegur (Sabu)/Jeremy Hammond (sup_g) & LulzSec, Freedom Hosting & Eric Eoin Marques and finally Ross William Ulbricht/Dread Pirate Roberts of the SilkRoad, to explain how people have been caught and how it could have been avoided.
01/30/2014 10 Years Of Irongeek.com
Today marks the 10th anniversary of Irongeek.com's existence. Also, the Intro to I2P/Tor Workshop Notes have been updated.
01/21/2014

ShmooCon Firetalks 2014
These are the videos for the ShmooCon Firetalks 2014. Day 2 I overslept, but Squidly1 got me copies from Ted's recordings ( http://www.MediaArchives.tv ).

Thanks to:
http://novahackers.blogspot.com
http://www.irongeek.com

Day 1

Welcome grecs
Eyes on IZON: Surveilling IP Camera Security - Mark @markstanislav Stanislav
Get Out of Jail Free Cards? What Aviation Can Teach Us About Information Sharing - Bob @strat Stratton
Crossing the Streams with State Machines in IDS Signature Languages - Michael @michaelrash Rash
Another Log to Analyze - Utilizing DNS to Discover Malware in Your Network - Nathan @HackHunger Magniez
Windows Attacks: AT is the New Black - Rob @mubix Fuller
Weaponizing Your Pets: War Kitteh and the Denial of Service Dog - Gene @gbransfield Bransfield
Women's Tech Collective, and Gender Equality in Tech - Sarah @dystonica Clarke

Day 2

Welcome grecs
You Name It, We Analyze It - Jim @JimGilsinn Gilsinn
Having Your Cake and Eating It Too: FOIA, Surveillance, and Privacy - Michael @theprez98? Schearer
Building An Information Security Awareness Program From Scratch - Bill @oncee Gardner
TrendCoins: Making Money on the Bitcoin/Altcoin Trends - Zac @ph3n0? Hinkel
Writing Your Own Disassembler in 15 Minutes - Jay @computerality Little

01/17/2014 Installing Nessus on Kali Linux and Doing a Credentialed Scan
I recorded this video twice. First time, the sound was hideous when the fan came on. I decided to re-record it and post both versions. I cover installing Nessus on Kali Linux and doing Nessus credentialed scans using Windows passwords and Linux SSH keys.
01/13/2014 Update of the Linda Christiansen Plagiarism case in the article Critically Plagiarizing?: Ideas On Spotting Plagiarism
Just a small update after I got some data back from my open records request.
12/26/2013

SkyDogCon 2013 Videos
Here are the videos from SkyDogCon 3. Thanks to all of the SkyDogCon crew, especially @pentestfail who was in charge of video (I just spoke at this con, and killed my brain and liver cells). @pentestfail may still be working on some of the missing videos, so I plan to update this page later

Opening Remarks & Hack the Badge

Curtis Koenig: Hacking Your Career

Nathan Magniez: Alice in Exploit Redirection Land: A Trip Down the Rabbit Hole

Explanation of Contests

Security Phreak & SkyDog: The Dark Arts of OSINT

G. Mark Hardy: How the West was Pwned

Winn Schwartau: I Survived Rock and Roll!

Jon Callas: Do You Want to Know a Secret?

Billy Hoffman: Start Ups and Lessons Learned

Panel Talk: Building and Growing a Hacker Space With: l0stkn0wledge, Dave Marcus, and SkyDog

IronGeek & SkyDog: Con Video Rig Enhancements

Evan Booth: Terminal Cornucopia

Deviant Ollam: Android Phones Can Do That?!?: Custom Tweaking for Power Security Users

Branson Matheson: Hacking Your Minds & Emotions

Billy Hoffman: Inside the Hackers Studio Interviews Dave Marcus: Director and Chief Architect of Threat Research and Intelligence for McAfee's Federal Advanced Programs Group

Josh Schroeder: CCTV: Setup Attack Vectors and Laws

Travis Goodspeed: Building an Actively Antiforensic iPod

Branden Miller: NSA Wiretaps Are Legal and Other Annoying Facts

Branden Miller: DEFENSE-IN-DEPTH: FISTS, KNIFE, GUN

Vivek Shandilya: Lightning Talks

Charline Nixon: Lightning Talks

Chris Anderson: Operational Security and Your Mental Health

Michael Raggo: Data Hiding and Steganography

Closing Remarks / Good-Byes

12/26/2013 Intro to I2P/Tor Workshop Notes Updated
I'm working on updating my I2P/Tor Workshop Notes for a class I'll be doing soon. Please look at them and offer suggestions on extra topics I should cover.
12/26/2013 IU Southeast School of Business to offer an MIS (Management Information Systems) Masters degree? Yes, same people behind the IUS MBA.
I recently heard that IU Southeast is planning to offer an MIS (Management Information Systems) Masters degree. While I think their Computer Science and Informatics Schools seem good, since the degree would be co-ran by the School of Business I would not recommend it to anyone in the Louisville area under its current leadership. Anyplace where an IU Southeast Business Law & Ethics instructor appears to plagiarize on her own syllabus that warns that students will be instantly failed for plagiarism, and asking simple questions about laws as it relates to technology is considered "excessive us of jargon", is not a good place for IT people (and especially security people concerned with integrity) to be. While the School of Business at IUS has its current leadership, I strongly recommend that you steer clear if you really want to learn. Just figured I'd help others not go through the same things I did there.
12/14/2013 Intro to Metasploit Class at IU Southeast
This is a class we did to introduce students to Metasploit at IU Southeast. Special guest lecturer Jeremy Druin (@webpwnize). To follow along, I recommend downloading Kali Linux.
12/02/2013 Critically Plagiarizing?: Ideas On Spotting Plagiarism
Just a few tips for how to find plagiarism online, thanks to my old IU Southeast Business Law & Ethics teacher Linda Christiansen for giving me the example material.
11/11/2013

BSides Delaware 2013 Videos
These are the videos from the BSides Delaware conference. Thanks to all of the BSides Crew for having me out to help record and render the videos.

@bsidesde, @kickfroggy, @quadling


110 Years of Vulnerabilities 
Brian Martin, aka Jericho
HTML 5 Security
Justin Klein Keane @madirish2600

Cloud - Business and Academia - Bringing it all together
Cloud Security Alliance - Delaware Valley Board

Uncloaking IP Addresses on IRC
Derek Callaway @decalresponds

Baking, even more, Clam(AV)s for Fun & Profit.
Nathan Gibbs @Christ_Media

Introducing Intelligence Into Your Malware Analysis
Brian Baskin
	
ANOTHER Log to Analyze - Utilizing DNS to detect Malware in Your Network
Nathan Magniez @HackHunger

Software Security: Game Day.
Evan Oslick @eoslick

Winning isn't Everything: How Trolling can be as much Fun
Joey @l0stkn0wledge
 
Antipwny: A Windows Based IDS/IPS for Metasploit
Rohan Vazarkar & David Bitner

Playing the Forensics Game: Forensic Analysis of Gaming Applications For Fun and Profit
Peter Clemenko III

Project.Phree: Phucking the NSA
BTS (square-r00t)

Hacking Benjamins (Intro to Bitcoin)
Bob Weiss @pwcrack

Pentoo
Zero_Chaos
Wireless Penetration Testing For Realz
Mellendick 

How to Become an Unwitting Accomplice in a Phishing Attack
Mark Hufe @hufemj

LinkedAllUpIn Your Email
utkonos

Growing Up In The Information Security Community 
@Forgottensec
11/01/2013 ISSA Kentuckiana - RESTful Web Services - Jeremy Druin - @webpwnized
Jeremy Druin (@webpwnize) gave the following presentation at the Nov 2013 meeting of the Kentuckiana ISSA.
10/30/2013 Circle City Con (http://circlecitycon.com) Hacker/Security Conference happening on June 13-15, 2014, Hyatt Regency, Indianapolis Indiana
Looks like I have another almost local con to go to, Circle City Con in Indy! I'll be doing video baring unforeseen circumstances, and may toss something into their CFP (please consider sending something in). More info at http://circlecitycon.com or Twitter stalk them at @CircleCityCon.
10/20/2013

 

The Rest of the Hack3rcon^4 Videos
Here are there rest of the videos from Hack3rcon^4

ANOTHER Log to Analyze - Utilizing DNS to Identify Malware - Nathan Magniez

Netsniff-NG - Jon Schipp

SDRadio: Playing with your Dongle - An Introduction to Software Defined Radio Using Cheap TV Tuner Cards - Justin Rogosky

10/20/2013 Hack3rcon^4 Videos
As I post them, they will be at the link above. So far we have:

Advanced Evasion Techniques - Pwning the Next Generation Security Products - David Kennedy

Imaging a Skyscraper - Brian Martin

Character Assassination: Fun and Games with Unicode - Adrian Crenshaw

MS08-067 Under the Hood - John Degruyter

NSA Wiretaps are Legal and Other Annoying Facts - Branden Miller

Red Teaming Your Bug-Out Bag - Tom Moore

Making it Rain and Breaching the Levees - K.C. Yerrid

10/07/2013 Louisville InfoSec 2013 Videos Mostly Up

These are the videos from Louisville Infosec 2013 conference. There are not all up yet, but this is my place holder.

Mobile Security and the Changing Workforce - Matthew Witten

Burn it Down! Rebuilding an Information Security Program - Dave Kennedy (Pending review)

Weaponized Security - Kellman Meghu

Information Security in University Campus and Open Environments - Adrian Crenshaw

Past Due: Practical Web Service Vulnerability Assessment for Pen-Testers, Developers, and QA - Jeremy Druin (Pending finished upload)

STRC: The Security Training and Research Cloud - Jimmy Murphy

Assessing Mobile Applications with the MobiSec Live Environment - Nathan Sweeney

Attacking iOS Applications - Karl Fosaaen

Can cloud and security be used in the same sentence? - Joshua Bartley

Breaking SCADA Communications - Mehdi Sabraoui

FBI - InfraGard - Current Cyber Trends

How Do I Get There from Here? Security-to-Privacy Career Migration - Michael Carr

Assessing the Risk of Unmanaged Devices (BYOD) - Pete Lindstrom

Acquisitionsyour latest zero day - Mitch Greenfield/Scott MacArthur

NIST and your risky application - Conrad Reynolds

Convergence: Configurations, Vulnerabilities and Unexpected Changes - Brian Cusack

What Healthcare Can Learn from the Banking Industry - Jim Czerwonka

Eliminating Data Security Threats And BYOS - David Braun

Awards

10/04/2013  Derbycon 3.0 Videos Tracks 3, 4, 5 & Stable Talks Posted

Track 3 (Teach Me)
It's Only a Game: Learning Security through Gaming - Bruce Potter
Ooops - Now What? :: The Stolen Data Impact Model (SDIM) - Brent Huston
Anti-Forensics: Memory or something - I forget. - int0x80
The Mysterious Mister Hokum - Jason Scott
Appsec Tl;dr - Gillis Jones
DIY Command & Control For Fun And *No* Profit - David Schwartzberg
IPv6 is here (kind of) - what can I do with it? - Dan Wilkins
Dancing With Dalvik - Thomas Richards
Big Hugs for Big Data - Davi Ottenheimer
Antivirus Evasion: Lessons Learned - thelightcosine
Jared DeMott - Is Auditing C/C++ Different Nowadays?
Getting Schooled: Security with no budget in a hostile environment - Jim Kennedy
Browser Pivoting (FU2FA) - Raphael Mudge
Taking the BDSM out of PCI-DSS Through Open-Source Solutions - Zack Fasel & Erin SecBarbie Jacobs
John Strand - Hacking Back - Active Defense and Internet Tough Guys
An Encyclpwnia of Persistence - Skip Duckwall & Will Peteroy
Your Turn! - Johnny Long - HFC
Practical File Format Fuzzing - Jared Allar
Surviving the Dead - Christopher EggDropX Payne
How can I do that? Intro to hardware hacking with an RFID badge reader - Kevin Bong
A SysCall to ARMs - Brendan Watters
The Netsniff-NG Toolkit - Jon Schipp
Why Dumpster Dive when I can pwn right in? - Terry Gold

Track 4 (The 3-Way)     
Pigs Dont Fly - Why owning a typical network is so easy - and how to build a secure one. - Matt scriptjunkie Weeks
Finding The Signal in the Noise: Quantifying Advanced Malware - Dave Marcus
Applying the 32 Zombieland Rules to IT Security - Larry Pesce
Windows 0wn3d By Default - Mark Baggett
Android 4.0: Ice Cream Sudo Make Me a Sandwich - Max Sobell
Attacking the Next Generation Air Traffic Control System; Hackers - liquor and commercial airliners. - Renderman
Antivirus Evasion through Antigenic Variation (Why the Blacklisting Approach to AV is Broken) - Trenton Iveys
Hello ASM World: A Painless and Contextual Introduction to x86 Assembly - nicolle neulist (rogueclown)
SQL injection with sqlmap - Conrad Reynolds CISA
The Internet of Things: Vulns - Botnets and Detection - Kyle Stone (@essobi) - Liam Randall
The Malware Management Framework - a process you can use to find advanced malware. We found WinNTI with it! - Michael Gough and Ian Robertson
Hack the Hustle! - Eve Adams
Operationalizing Security Intelligence in the Enterprise- Rafal Los
New Shiny in the Metasploit Framework - egypt
Everything you ever wanted to know on how to start a Credit Union - but were afraid to ask. - Jordan Modell
A developers guide to pentesting - Bill Sempf
Steal All of the Databases. - Alejandro Caceres
Sandboxes from a pen testers view - Rahul Kashyap
iOS Reverse #=> iPWn Apps - Mano dash4rk Paul
Terminal Cornucopia - Evan treefort Booth
Wait; How is All This Stuff Free?!? - Gene Bransfield

Track 5 - Hybrid Room     
Building An Information Security Awareness Program from Scratch - Bill Gardner - Valerie Thomas
Malware : testing malware scenarios on your network - Tony Huffman (@myne_us) - Juan Cortes (@kongo_86)
Password Intelligence Project - Advanced Password Recovery and Modern Mitigation Strategies - John Moore Rabid Security
Tizen Security: Hacking the new mobile OS - Mark Manning (AntiTree)
RAWR - Rapid Assessment of Web Resources - Adam Byers - Tom Moore
Decoding Bug Bounty Programs - Jon Rose
Patching Windows Executables with the Backdoor Factory - Joshua Pitts
Jason Scott - Defcon Documentary Q&A
Panel: Building and Growing a Hacker Space - Joey Maresca - Dave Marcus - Nick Farr - SkyDog
SO Hopelessly Broken: the implications of pervasive vulnerabilities in SOHO router products. - Jacob Holcomb
Put Me In Coach: How We Got Started In Infosec - pr1me - Chris g11tch Hodges - Frank Hackett - Dave ReL1K Kennedy
Alice Goes Deeper (Down the Rabbit Hole) - Redirection 2.0 - Nathan Magniez
Emergent Vulnerabilities: What ant colonies - schools of fish - and security have in common. - Nathaniel Dr. Whom Husted
Why Your IT Bytes - Frank J. Hackett
Using Facial Recognition Software In Digital Forensics And Information Security - Brian Lockrey
How to Fight a War Without Actually Starting One - Brendan OConnor
Crypto-Exploit Exercises: A tool for reinforcing basic topics in Cryptography - Nancy Snoke

Stable Talks
Gen Y:Getting Them to Talk Rather than Text at Work - Nancy Kovanic
Battle Scars And Friendly Fire: Threat Research Team War Stories - Will Gragido and Seth Geftic
Unmasking Miscreants - Allixon Nixon - Brandon Levene
gitDigger: Creating useful wordlists from public GitHub repositories - Jaime Filson (WiK)
PowerShell and Windows Throw the Best Shell Parties - Piotr Marszalik
Owning Computers Without Shell Access - Royce Davis
Sixnet Tools: for poking at Sixnet Things - Mehdi Sabraoui
Hardening Windows 8 apps for the Windows Store - Bill Sempf
Intro to Dynamic Access Control in Windows Server 2012 - Evan Anderson
Evolutionary Security - Embracing Failure to Attain Good Enough - Josh More
DIY Forensics: When Incident Response Morphs into Digital Forensics - John Sammons
ANOTHER Log to Analyze - Utilizing DNS to Discover Malware in Your Network - Nathan Magniez
Phishing Frenzy: 7 seconds from hook to sinker - Brandon <zeknox> McCann
Electronic Safe Fail: Common Vulnerabilities in Electronic Safes - Jeff Popio
The Good Samaritan Identity Protection Project  www.thegsipp.org - Zack Hibbard - Chris Brown and Jon Sternstein
Some defensive ideas from offensive guys. - Justin Elze and Robert Chuvala
Grim Trigger - Jeff ghostnomad Kirsch
A n00bies perspective on Pentesting - Brandon Edmunds
My Security is a Graph - Your Argument is Invalid - Gabriel Bassett
Follow the Foolish Zebras: Finding Threats in Your Logs - Chris Larsen
Security Training and Research Cloud (STRC) - Jimmy Murphy
Passive Aggressive Defense - Jason Clark
So you want to be a pentester? - Raymond Gabler
Digital Energy - BPT - Paul Coggin
An Anti-Forensics Primer - Jason Andress
What if Petraeus was a hacker? Email privacy for the rest of us - Phil Cryer (@faker)
 

09/30/2013 Derbycon 3.0 Videos Tracks 1 & 2

I think I have all of tracks 1 and 2 posted:, more to come

Scanning Darkly - HD Moore (keynote)
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World - Ed Skoudis (keynote)
Look Ma - No Exploits! - The Recon-ng Framework - Tim LaNMaSteR53? Tomes
Practical Exploitation Using A Malicious Service Set Identifier (SSID) - Deral Heiland
JTAGulator: Assisted discovery of on-chip debug interfaces - Joe Grand
Seeing red in your future? - Ian Iamit
TMI: How to attack SharePoint servers and tools to make it easier - Kevin Johnson and James Jardine
The High Risk of Low Risk Applications - conrad reynolds
Its Okay to Touch Yourself - Ben Ten (Ben0xA)
Collaborative Penetration Testing With Lair - Tom Steele and Dan Kottmann
Malware Automation - Christopher Elisan
Whats common in Oracle and Samsung? They tried to think differently about crypto. - Lszl Tth - Ferenc Spala
Burning the Enterprise with BYOD - Georgia Weidman
Getting the goods with smbexec - Eric Milam(brav0hax) and Martin Bos (purehate)
Shattering the Glass: Crafting Post Exploitation Tools with PowerShell - Matt Johnson
Cheat Codez: Level UP Your SE Game - Eric Smith
My Experiments with truth: a different route to bug-hunting - Devesh Bhatt
The Art and Science of Hacking Any Organization - Tyler Wrightson
Living Off the Land: A Minimalists Guide to Windows Post-Exploitation - Christopher Campbell & Matthew Graeber
Cracking Corporate Passwords - Exploiting Password Policy Weaknesses - Minga / Rick Redman
Ownage From Userland: Process Puppeteering - Nick Cano
) UNION SELECT `This_Talk` AS (New Exploitation and Obfuscation Techniques)%00 - Roberto Salgado
Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to Pwn the Network - SOLOMON SONYA and NICK KULESZA
Phishing Like The Pros - Luis Connection Santana
Raspberry Pi - Media Centers - and AppleTV - David Schuetz
Cognitive Injection: Reprogramming the Situation-Oriented Human OS - Andy Ellis
IOCAware - Actively Collect Compromise Indicators and Test Your Entire Enterprise - Matt Jezorek and Dennis Kuntz
Cash is King: Whos Wearing Your Crown? - Tom Eston and Spencer McIntyre
Security Sucks - and Youre Wearing a Nursing Bra - Paul Asadoorian
Windows Attacks: AT is the new black - Rob Fuller and Chris Gates
How Good is Your Phish - @sonofshirt
Identifying Evil: An introduction to Reverse Engineering Malware and other software - Bart d4ncind4n Hopper
How Im going to own your organization in just a few days. - RazorEQX
Pass-The-Hash 2: The Admins Revenge - Skip Duckwall and Chris Campbell
The Cavalry Is Us: Protecting the public good and our profession - Josh Corman
Love letters to Frank Abagnale (How do I pwn thee let me count the ways) - Jayson E. Street
The Message and The Messenger - James Arlen
50 Shades of RED: Stories from the "Playroom" - Chris Nickerson
Beyond Information Warfare You Aint Seen Nothing Yet - Winn Schwartau
Stop Fighting Anti-Virus - Integgroll
How the Grid Will Be Hacked - Josh Axelrod and Matt Davis
help for the helpdesk - Mick Douglas
Weaponizing your Coffee Pot - Daniel Buentello
Practical OSINT - Shane MacDougall (NOTE THAT THIS IS AN ADULT ONLY TALK - 18+ or older)
Stop making excuses; its time to own your HIV (High Impact Vulnerabilities) - Jack D. Nichelson
Uncloaking IP Addresses on IRC - Derek Callaway

09/29/2013 Derbycon 3.0 Videos
As I get them up, you can find them here. Big thanks to my video jockeys Robin, ladymerlin, Jennifer, Sabrina, Reid, Skydog, Some Ninja Master, Glenn Barret, Dave Lauer, Jordan Meurer, Brandon Grindatti, MadMex, Joey, Steven, Sara, Branden Miller and Night Carnage
09/18/2013 Unicode Security Notes Page
This page has notes for my HackerHalted and Hack3rCon talk.
08/24/2013 Unicode Text Steganography Encoders/Decoders
The idea of this page is to demo different ways of using Unicode in steganography, mostly I'm using it for Twitter. :) I have some notes on the bottom about how these Unicode characters show up or get filtered by some apps. Most of the algorithms should work ok on Twitter, Facebook however seems to strip out more characters. There seems to be no perfect character set.
08/09/2013 Every Unicode Character For Fuzzing and Research
I will be doing a talk on Unicode and security at Hacker Halted, as prep work I've generated some files with ever Unicode character. I'd be interested in knowing if any of them crash apps on you. Open with care.

Every Unicode Character Blob Page or TXT file
Every Unicode Character 80 Column Page or TXT file
Every Unicode Character With Hex Page or TXT file

08/06/2013

BSidesLV 2013 Videos
These are the videos from the BSides Las Vegas conference. Thanks to all of the BSides Crew for having me out to help record and render the videos. @bsideslv, @banasidhe, @kickfroggy, @quadling, @jack_daniel 

"The Security Industry - How to Survive Becoming Management" - Christien Rioux

Discovering Dark Matter: Towards better Android Malware Heuristics - Jimmy Shah, David Shaw, Matt Dewitt

Mom! I Broke My Insulin Pump... Again! - Jay "Rad" Radcliffe

Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth - Evan Davidson and Noah Schiffman

HiveMind: Distributed File Storage Using JavaScript Botnets - Sean Malone

gitDigger: Creating useful wordlists from public GitHub repositories - WiK and Mubix

Collaborative Penetration Testing With Lair - Tom Steele and Dan Kottmann

Social Aftermath Responding to Social Pwnage - Steven F. Fox

Silence Equals Death - Violet Blue

The Cavalry Isn't Coming: Starting the Revolution to Fsck it All! - Nicholas J. Percoco and Joshua Corman

A Fire In The Eye - Olli-Pekka Niemi and Antti Levomaki

Defense Evasion Modeling - Frank Artes

"Malware Management Framework" - We detected WinNTI with it! - Michael Gough

Crunching the Top 10,000 Websites' Password Policies and Controls - Steve Werby

Governments and UFOs: A Historical Analysis of Disinformation and Deception - Richard Thieme

Strange interactions in personal data: Brokers and the CFAA - Christine Dudley

Diamonds, Fitness and Cults: Manipulation for Fun and Profit - Katie Rodzon

Vulnerability & Exploit Trends: A Deep Look Inside The Data - Ed Bellis, Michael Roytman

EC2 or Bust - How to Build Your Own Pen Testing Lab in Amazon EC2 - Grecs

Techniques for Escaping the AppSec Labyrinth - Andrew Hay

The Erudite Inebriate's Guide to Life, Liberty, and the Purfuit of Happinefs - Jack Daniel

Hack the Hustle! Career Strategies for Information Security Professionals - Eve Adams

Information Sharing, or "I've got 99 problems and they're probably pretty similar to yours" - Chris Mills

Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck - Josh Sokol

How embracing social media helped me stop the hackers, save the world and get the girl! - Javvad Malik

Malware Automation - Christopher Elisan

Popping the Penguin: An Introduction to the Principles of Linux Persistence - Mark Kita

Network Survival WCS - James Costello

The Slings and Arrows of Open Source Security - Tod Beardsley and Mister X

What if Petraeus was a hacker' Email privacy for the rest of us - Fak3r

Never Mind Your Diet, Cut the Crap From Your Vocabulary - Keli Hay (Brian Martin)

The 7 habits of highly effective CISOs - Franklin Tallah (Wendy Nather)

The Little Dutch Boy - D0n Quix0te (Bill E. Ghote)

Stop Shooting Blanks: No magic bullets in your arsenal - Renegade6 (Nicolle Neulist)

Flameout - Burnout Supernova - Dan Ward (Ally Miller)

The Sensual Side of 3D Printing - Kat Sweet (Javvad Malik)

Fun with WebSockets using Socket Puppet - Mister Glass (Weasel)

Using Machine Learning to Support Information Security - Alex Pinto (Joel Wilbanks)

The Truth, You Thought We Wouldn't Know' - Wolf Flight (Terry Gold)

Vulnerabilities in Application Whitelisting: Malware Case Studies - Jared Sperli and Joe Kovacic (J0hnny Brav0)

The Goodness is Baked In: Baking Assurance into Software - Ebony (Davi Ottenheimer)

Matriux Leandros:An Open Source Penetration Testing and Forensic Distribution - Prajwal Panchmahalkar (Savant42)

Sixteen Colors: Archiving the Evolution of ANSI and ASCII Art - Doug Moore (Brendan O'Connor)

You Are Being Watched! - Bharat Jogi

Calling All Researchers: A Discussion on Building a Security Research Framework - Michael "DrBearSec" Smith

Evil Empire: SIEM FTW - EggDropX and Tha CheezMan

Attribution Shmatribution! FIX YOUR SHIT! - Krypt3ia

Breach Panel - Davi Ottenheimer, Raymond Umerley, Jack Daniel, Steve Werby, David Mortman & George V. Hulme

Roll-your-own Lightning Talks

Attacking and Defending Full Disk Encryption - Tom Kopchak

Say It to My Face - Shannon Sistrunk

Alex Dreams of Risk: How the Concept of Being a Craftsman can Help you Find Meaning and Avoid Burnout - Alex Hutton

You can't make people act more securely, you can help them want to. - Ivan Campbell and Twyla Campbell

08/02/2013 BSidesLV 2013 Videos
Putting these up at the link above as I get them together. This will take a bit, 5 tracks takes time. Follow @bsideslv for more.
07/14/2013 OISF 2013 Videos

These are the videos from the OISF Anniversary Event

Webshells History, Techniques, Obfuscation and Automated Collection - Adrian Crenshaw

Kali Linux Backtrack Linux reborn - Martin Bos

Locks & Physical Security - Deviant Ollam

Leveraging Mobile Devices on Pentests - Georgia Weidman

Reverse Engineering Demystified (a little maybe) - Chris Eagle

07/04/2013 Web Shells Collection Page Updated
I'm prepping to give my Webshells talk again at OISF and TakeDownCon Rocket City. I like to update things if I give a talk more than once, so I enhanced my script to save an archived copy of the webshells in a zip file so even if the infected host cleans it up (which they really should), it can be examined later.
07/04/2013 NQSFW Free CISSP Study Guide
I'm working on studying for a CISSP, so I figured I should record my notes. As I do them, I plan to post them here. @gozes also pointed me to http://www.opensecuritytraining.info/CISSP-Main.html which looks like a damn good resource.
06/21/2013 BSides Boston Videos
While at BSidesRI I met a bunch of folks from BSidesBoston. Roy asked me to put up a link to their videos:
https://www.youtube.com/channel/UCmPk1vRLVFIcYjXM9lWFUHA/videos
Next year I hope to be able to make it out there.
06/15/2013 All BSides Rhode Island Videos

Friday pre-con:

Large-scale application security - Charlie Eriksen
SMB SRMF for identifying top 10 risks - Jim Peeler
How I Do a Weekly Podcast (or Three) - Paul Asadoorian
Show and Tell: Super-Minipwner - James Edge
Opening the Treasure Chest-Attacking Network Attached Storage on a Pen Test - Russell Butturini

BSidesRI Track:

Hacking Your Neighbors for Fun! - Josh Wright
Public cloud PCI compliance or a sharp stick in the eye, which to choose? - Chris Brenton
Bite the Wax Tadpole - The importance of culture in user security - Kati Rodzon and Mike Murray
Exploiting the Top Ten Database Vulnerabilities and Misconfigurations - Josh Shaul
Exploit Development for Mere Mortals - Joe McCray
Future Trends in IT security - Ron Gula
The Freaky Economics Of Cybersecurity - Robert David Graham

PaulDotCom Track:

Booting the Booters, Stressing the Stressors - Allison Nixon and Brandon Levene
Talk More Better - Jack Daniel
Security Sucks, and You're Wearing The Nursing Bra - Paul Asadoorian (Not Recorded)
So, you want to compute post-apocalypse? - Larry Pesce & Darren Wigley
Feeling Sick? Healthcare Information Security - Roy Wattanasin
Blitzing with Your Defense - Ben Jackson
Lessons Learned: Why I became a PaulDotCom Intern and why you should become an Intern too. - Mike Perez
Learning Security on the Cheap (30 min) - Patrick Laverty

Download link coming later.

06/15/2013 BSides Rhode Island Videos
As I get them up, I'm putting them on this page above.
06/13/2013

 

ASAReaper: Grab Configs From Multiple Cisco Devices Over SSH (Demos PExpect and AES Encrypted INI Files in Python) Updated
Updated the code to make it easier to maintain and to fix a timeout issue. Also, Arne Lovius told me about a tool called Rancid (http://www.shrubbery.net/rancid) that can do the same thing as my script and more, but I figured the sample code is still of help to some.
06/13/2013

Indiana University (IU, IUS, IU*, Etc) Salaries
I noticed the someone visited my IU Southeast School of Business (MBA) Review page from a search for something like "IU Salaries". This made me curious as I knew Indystar had the information. Seems Indystar's page is having errors, another newspaper hides it behind a pay wall, and IU makes you login with an account AND use an on campus IP. My understanding is this information is suppose to be public, but it seem somewhat hard to find. As a public service, here is the 2012/2013 Salary information in HTML (Just for IUS) and Excel formats (all campuses) for easier parsing. Hopefully it helps alumni and the like consider if it is really a fruitful place to donate to (and how to earmark donations). For some of the pay levels, it really is a shameful waste.

06/07/2013

Kali Linux Live Boot USB Flash Drive - Jeremy Druin
Jeremy Druin (@webpwnize) gave the following presentation on creating a persistent Kali Linux thumbdrive install for the June 2013 meeting of the Kentuckiana ISSA.

05/27/2013 Webshell Demos And Notes
This is a page I'm putting together for my TakeDownCon and OISF talks on webshells. My slides are pretty text, link, command and code heavy, so this way I can just point the attendees to this page for all the notes and links.
05/24/2013

 

Webshell Collection Page Updated With Source Code
I have a script I run against my web logs periodically to see if anyone is trying to use a Remote File Include Webshell against my site. I've done some more filter work, and can now find more webshells with it. If you spot bugs in the code, please let me know. I'll also be speaking at TakeDownCon St. Louis and the OISF Anniversary Event on webshells, this is part of that project.
05/23/2013 About page and CV updated
I finished my Master of Science in Security Informatics, so I've update my "about" page and CV. Unfortunately, I did not maintain the straight A average I had in my Informatics courses (I made a B in Machine Learning, which equals calculus, linear algebra, matrix mathematics and pain), so I had to change a blurb in my IU Southeast School of Bussiness/MBA review about being a straight A student in my new program. I just wanted to have more integrity than the people at the IUS MBA program who still boast about being the 9th rated part time MBA from the Business Week ratings in 2009, forgetting to mention that they have fallen to 74th since then (University of Louisville is at 35 by the way). Now, I know my readers think I'm a little OCD about this subject, which I admit I am, but I think integrity and ethics are important in both business and infosec, especially in those who are supposed to be educating the future workforce and leadership. I don't want others looking for a Master degree in the Louisville area to go through the same things I did, at least then something good would have come from what happened to me. There is some reason to think that IUS may get better, Gil Atnip, Ruth Garvey-Nix, and Sandra R. Patterson-Randles are all either retired or retiring from their positions of power. Still, the kinds of people who seem to gravitate toward academic administration positions have a tenancy to be less than caring towards student concerns in my experience. They may be better now, one VC seems to care at least a little considering his visits to the page and another VC seemed to be a decent person in the one Philosophy class I had with him, but the current student affairs person refuses to even respond to questions. Also, people like Jay White, Jon Bingham, and Linda Christiansen are still in their positions of power in the school of business, not even chastised for their behavior. With that in mind, I still can't recommend IUS to the people I know in IT around the Louisville area. I'm really sort of torn about it, as I think the IUS Informatics and Comp-Sci programs are pretty good, and I know there a good professors out there in business, but I don't think most people are willing to speak out unless they are personally involved. If you go there for Informatics or Comp-Sci, I recommend going with one of the math science options instead of business.
05/20/2013

 

ISSA Kentuckiana Web Pen-Testing Workshop
Below are the videos form the Kentuckiana ISSA's Web Pen-Testing Workshop. It was put on in part to raise funds for Hackers For Charity. A few of theses are still uploading, but should be available shortly.
Part 1: Intro to Mutillidae, Burp Suite & Injection Jeremy Druin
Part 2: SQL Injection Conrad Reynolds
Part 3: Uploading a web shell via SQLi Jeremy Druin
Part 4: Authentication Bypass via SQLi & Cookie Tampering Jeremy Druin
Part 5: Intro to Kentuckiana ISSA Jeremy Druin
Part 6: Remote File Inclusion (RFI) & Local File Inclusion (LFI) Jeremy Druin
Part 7: Webshells Demo Adrian Crenshaw
Part 8: Intros to Speakers
Part 9: HTML & Javasript Injection XSS Jeremy Druin
Part 10: XSS & BeEF Conrad Reynolds
Part 11: What we have of CSRF (Camera ran out of space, slides kept going) Jeremy Druin
Part 12: JSON injection Jeremy Druin
04/21/2013 AIDE 2013: The rest of the videos
At this point I had to leave for Notacon to record their talk and was not there to run the slide capture rig for AIDE. I shanghaied some volunteers into recording, and while they did not get the slide rig working, we have the presenter and slides on camera. Thanks for filling in.

Boring eForensic Science Items - Brian Martin

Hackers in Unganda: A Documentary (Kickstarter Project) - Jeremy Zerechak

Small Businesses Deserve Security Too - Frank Hackett

Help from the helpdesk - Mick Douglas (@bettersafetynet)

Malware Analysis Triage for n00bs - Grecs (@Grecs)

CCDC and Industry - James L. Siegel Jr. (WolfFlight)

Building an Engaging and Effective Information Security Awareness and Training Program - Bill Gardner

04/21/2013

 

Notacon 10 Videos
These are the videos from the 10th Notacon conference held April 18th-21st, 2013. Not all of them are security related, but  I hope my viewers will enjoy them anyway. Thanks to Froggy and Tyger for having me up, and to the video team: SatNights, Widget, Securi-D, Purge, Bunsen, Fry Steve and myself (at least that is who it was last year, if you got he names for 2013 let me know).

Track 1

Model Integrated Computing (Code Generation) and how it loves you and deserves love back - Michael Walker

Guns & Privacy - Deviant Ollam

Domestic Preparedness (the zombie Apocalypse is nigh upon us) - Illustrious Niteshad & megalos

DIY Neuroscience, EMGs, EEGs, and other recordings - meecie

Hacking Your Ability to Communicate - kadiera

Lasers for Fun! Lasers for Science. Lasers for Security! - Ethan Dicks

Video Everywhere! aka The Personal Distributed HD Video Network - Woz

Esolangs - Daniel Temkin

How We Learned Security from Steve - ghostnomad, ghostnomadjr, knuckles & micronomad

Are we getting better? - Hacking Todays Technology - David Kennedy

Critical Making - Garnet Hertz

DC to Daylight: A whirlwind tour of the radio spectrum, and why it matters. - Stormgren

Skeleton Key: Transforming Medical Discussions Through 3D Printing - KK Pandya

Youthful Exploits of an early ISP - Dop & KevN

Whose Slide Is It Anyway? - nicolle @rogueclown neulist

Track 2

I Forked the Law and We All Won - Fork The Law

Make me Babyproof! - Gina the kat Hoang

The Maru Architecture Design: A proposed BYOD architecture for an evolving threat landscape - Michael Smith

You Keep A-Knockin But You Cant Come In - grap3_ap3

Encryption for Everyone - Dru Streicher (_node)

How I Became an iOS Developer for Fun and Debt - Mark Stanilav

AR_GRAF.OBJ: a darknet for the nuEra ?? - kevin carey, shawne michaelain holloway & brian peterson

Creating professional glitch art with PoxParty - Jon Satrom & Ben Syverson

Lets Go CSRFn Now! - grap3_ap3

Bad Games Arcade - Jake Eliott

The Winamp Imperative - Yoz (sorry, audio died at 6:09)

04/18/2013 AIDE 2013
I got to record and put up a few videos from AIDE. I had to head to Notacon before I could record them all, but I left some gear so hopefully I'll have more to come. Recorded at AIDE 2013. Big thanks to Bill Gardner (@oncee) for having me out to record.

Network King Of The Hill (NetKotH): A hacker wargame for organizers who are lazy - Adrian Crenshaw (Irongeek)

Can You Hear Me Now? Leveraging Mobile Devices on Pentests - Georgia Weidman

RAWR (Rapid Assessment of Web Resources) - @al14s and @c0ncealed

04/11/2013 Hacker Swap Meet: Don't Let That Old Junk Go To Waste!
Many of us are tech pack rats, we have old gear laying around we don't use but don't want to just throw away. Got something you want to trade with other hacker/maker types? Too expensive to ship but you can drive it to a con you will be at anyway? Set up the trade at the new forums I put up. One man's treasure is another man's hazmat. If you don't see a con/meet spot listed here, let me know and I can add it.
http://www.hackerswapmeet.org/
I should have some old gear at Notacon I want to get rid of.
04/08/2013 Outerz0ne 9 (2013) Videos
These are most of the videos from the Outerz0ne 9 conference. I have a few more I have to get clearances on before I post them. Big thanks to Joey and Evan on the video crew.
SkyDog Kicks Off Year NINE! (Number Nine)
Gursev Kalra - Impersonating CAPTCHA Providers
Tuttle/Brimstone - State of the BitCoin Address; Pizza, Pirates, and Profiteers.
Halfjack - Living to the Singularity: Geeks Guide to a Healthy Lifestyle
Chad Ramey - Hacking the Atom
Jeremy Schmeichel & Brian Wilson - IPv6? Ain't Nobody Got Time For That!
Chris Silvers - Weapons of Miniature Destruction
Hacker Movie Challenge
Inside the Hacker's Studio - Billy Hoffman and IronGeek
Contest Prize Giveaway, Awards, Closing Ceremonies
Lightning Talks and such:
Andy Green - The Southeast Collegiate Cyber Defense Competition Lightning Talk
Lilyjade-v2.com - Why You Are Not Safe Lightning Talk
Presentation Karaoke
03/26/2013 Updated: Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking
I have to give presentation on online privacy shortly, and figured it would be a good time to update the page above with a few new links. See the change log at the bottom. If you have more good links to add, please contact me. I'll also be speaking at TakeDownCon St. Louis on webshells so I've updated my Webshell Collection Page to keep a log of not only live webshells, but also keep a history of dead ones.
03/13/2013 Outerz0ne 9 Dates Announced: April 5-6th, 2013
I know it's a little short notice, but dates and the CFP have been announced for Outerz0ne 2013: April 5-6th, 2013 in Atlanta Georgia. I'll of course be there helping out the video crew. It's a donation based con, so give what you can. To see videos from past years, check out:
Outerz0ne 8 (2012) Videos
Outerz0ne 2011 Hacker Con
Outerz0ne 2010 Videos
and a bunch of others spread out over the Hacking Illustrated page.

In other news, Jessica Miller from No Starch Press wanted me to announce this:

"We've just released the free PDF of bunnie's "Hacking the Xbox" in Aaron Swartz's honor, with links to support the causes Aaron believed in. I thought you might be interested in seeing bunnie's note and helping to spread the word -
http://nostarch.com/xboxfree "

I did not know Aaron, but as a person who has be screwed by an uncaring cover-ass bureaucracy before, I can sympathize.

03/03/2013 Introduction to HTML Injection (HTMLi) and Cross Site Scripting (XSS) Using Mutillidae
New Video From Jeremy Druin:
This video covers the basics of injecting HTML into sites with vulnerabilities in which injected code is placed inline with intended code and executes in the users browser. The injected HTML in this video is a fake login box that posts the user username and password to a capture data page (in the NOWASP Mutillidae application).

Later the same vulnerability is used to inject cross site scripting attack that hooks the users browser with a Beef Framework script (hook.js) given an attacker control of the users browser.
03/03/2013 Introduction to Pen Testing Simple Network Management Protocol (SNMP)
New Video From Jeremy Druin:
The Simple Network Management Protocol (SNMP) is used on networked devices to read, write, and update device configuration remotely. Windows desktop systems typically do not run SNMP services by default but these can be enabled for testing. Server operating systems often run snmp services by default as do network devices such as routers, printers, special purpose equipment, switches, and firewalls.

In this video, a Windows XP box has SNMP enabled to act as a test target. A Backtrack 5 R3 host is used to perform assessment. The video progresses through host discovery, port identification, service verification, finding community strings, dumping device configuration, and altering device configuration.
02/24/2013 Bro IDS/Network Programming Language Video Page
Liam Randall, a developer on the Bro team, and the guy that supplies cherry flavored refreshment at many cons, asked me to post his Shmoocon 2013 video. Since he said there would be more videos to come, I decided to make a page for them. Go check out the project at: http://www.bro-ids.org/
02/23/2013 Intro To The Louisville OWASP Chapter
Quick intro to the Louisville OWASP chapter by Curtis Koenig. Sorry that the video is cut a little short. I've also updated the Shmoocon FireTalks 2013 page to have a downloads link at the bottom.
02/18/2013 Shmoocon FireTalks 2013
The Shmocon FireTalks are now up:

Thin Slicing a Black Swan: A Search for the Unknowns by Michele @mrsyiswhy Chubirka & Ronald Reck
When Did the Smartphone Pentest Framework Get Awesome? by by Georgia @georgiaweidman Weidman
ShellSquid: Distributed Shells With Node by Tom Steele
If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone by Nicolle @rogueclown Neulist
Becoming a Time Lord Implications of Attacking Time Sources Joe @joeklein Klein
Swinging Security Style: An Immodest Proposal by Wendy @451wendy Nather
Drones: Augmenting your cyber attack tool bag with aerial weapon systems by Zac @ph3n0 Hinkel
Managed Service Providers: Pwn One and Done Damian @integrisec Profancik
No Tools? No Problem! Building a PowerShell Botnet Christopher @obscuresec Campbell
Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling John @pinfosec Willis
Protecting Big Data From Cyber APT in the Cloud Bill @oncee Gardner
Writing a Thumbdrive for Active Disk Antiforensics Travis @travisgoodspeed Goodspeed

On the non-info-sec related front, you know I like to use my backlinks to get things in search results as sort of a bully pulpit. It's my understanding that IU Southeast Chancellor Sandra R. Patterson-Randles is searching for a new job because of some IU policy about mandatory retirement. Ask around the faculty/staff at IUS about her (off the record of course) before you make a hiring decision. Personally, I'd want someone who cares more about the espoused values of the organization, and less about appearances only. Then again, maybe she has the skill set you are looking for, but a parrot with good grammar would seem to be a much cheaper solution in that case.

02/11/2013 Basics of using sqlmap - ISSA Kentuckiana workshop 8 - Jeremy Druin
This is the 8th in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae (or other tools) for the Kentuckiana ISSA. This one covers SQLMap.
02/01/2013 ASAReaper: Grab Configs From Multiple Cisco Devices Over SSH (Demos PExpect and AES Encrypted INI Files in Python)
Simple script I wrote for backing up Cisco ASAs. Does it all over SSH, and may serve as example code for other projects.
01/05/2013 SQL Server Hacking from ISSA Kentuckiana workshop 7 - Jeremy Druin
This is the 7th in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae (or other tools) for the Kentuckiana ISSA. This one covers SQL Server Hacking.
01/03/2012 Information Security in University Campus and Open Environments 2013
This is an update of an article I did almost 8 years ago. Lots of things have changed in that time, do I figured the update was in order. It almost acts as a meta-page to other parts of my site, but I hope you enjoy it.
 
12/29/2012 Webshell Collection Page Updated
I have a script I run against my web logs periodically to see if anyone is trying to use a Remote File Include Webshell against my site. I wrote this awhile back, but the list was getting long and there were a lot of 404s, duplicates, and other problems. I've filtered out many of those. If you want to take a look at some Webshell that are in active use on the Internet you may like this page.
12/27/2012 IU Southeast School of Business / MBA Write-up Updated
I've made many small changes over the months to my IUS MBA Review site (change log). I realize that this page is not very security related, but I can tie it to infosec in a few ways (regular readers, please ignore the noise in the signal). Lots of infosec folks I know seem to go for an MBA if they want to get into management, so I figured it might help some of the infosec folks in the Louisville Metro area (Kentuckiana Metroversity) know what to avoid. It's also an opportune time since some students are about to finish their bachelors in the spring, and will start looking for grad schools now. I can tie it in as an experiment in how some spiders index sites. I've done a bit of forensic metadata work on a file I received via an open records request that might be interesting as well, but it's not in-depth. It may also help people who have to deal with bureaucracies that have people like Jay White, Jon Bingham, Linda Christiansen and Gil Atnip in them know that they are not alone. Hopefully I'll be able to work with the IU Southeast SGA to get a real grievance policy put in place over the spring semester so students are treated with more respect.
12/26/2012 MadMACs: MAC Address Spoofing and Host Name Randomizing App for Windows 7 (Should work in Windows Vista and Windows 8 too) Updated
I wrote MadMACs awhile back, as a simple script to randomize my MAC address (and host name) in Windows on every boot. I had not updated it in a long time so it stopped working well in newer versions of Windows (Windows 7, Windows Vista and Windows 8). When someone would try to get MadMACs to work on a newer version of the OS, Windows would not always respect the registry setting for what MAC address they were suppose to use. Seems that if it is a wireless interface, the 2nd nibble has to be a 2, 6, A or an E on Windows Vista and newer. I included functionality in the new version of MadMACs to make sure this nibble is correct if you tell it the NIC you are trying to change/randomize the MAC address on is a WiFi card. I've also added a GUI for configuring your MAC addresses on your network cards (the old version used prompts), made the config file more INI like, and made it so that MadMACs itself can reset your adapter and start using the new MAC address immediately (name changes will take a reboot).
12/22/2012 Anti-Arp-Poisoning Switch Demo Using OpenFlow & POX
When I posted my OpenFlow/SDN Security paper, I spaced on including the source code to the ARP Poisoning resistant POX controller I mentioned. It is now included in the link above. Also, go check out Steve Erdman's blog for a bunch of security/networking articles.
12/16/2012 Security and Software Defined Networking: Practical Possibilities and Potential Pitfalls
This is a short paper I wrote for class involving SDN (OpenFlow specifically) and it's potential ramifications in the infosec world.
12/09/2012 Introduction to Installing, Configuring, and Using Burp-Suite Proxy

Another video from Jeremy Druin.

11/24/2012 Introduction to buffer overflows from ISSA KY workshop 6 and two other videos from Jeremy Druin

Mutillidae: Using ettercap and sslstrip to capture login
This video by webpwnized (@webpwnized) reviews how to intercept web communications using ettercap and intercept web traffic that is supposed to be protected with SSL using SSLStrip.

Mutillidae SQL Injection via AJAX request with JSON response
This video by webpwnized (@webpwnized) covers pen-testing an SQL Injection vulnerability that occurs in an AJAX request made in the background. The response from the server is JSON. Since AJAX requests and regular request work the same way (since they both follow the rules of the HTTP protocol), the AJAX request can be pen-tested using the same tools and tecniques used with the more traditional requests. The SQL Injection flaw is first discovered then used to pull a list of the tables in the database along with the columns for the target table. Once the target is identified, the defect is used to pull a list of the username and password fields.

Introduction to buffer overflows from ISSA KY workshop 6
This recording is from the Kentucky ISSA Workshop #6 from the November 2012 meeting. In part 5, using Metasploit was covered. In this workshop, buffer overflow vulnerabilities were examined more closely to see how Metasploit exploits might be written. A custom program is written with a known buffer overflow and compiled without the stack canaries or non-executable stack. Also ASLR is disabled on the Ubuntu 12.04 testing host. The program is fuzzed to determine an overflow exists and decompiled with GDB to look at the program logic more closely. Python scripts are used to generate exploits that get closer to over-writing the return pointer with a user supplied value. Once the buffer overflow is identified and the size of the buffer found, the exploit development begins. A custom exploit is developed to inject shellcode into the buffer, determine a reasonable memory address in which to jump, and a root shell gained.

11/11/2012 PhreakNIC 16 Day Two Videos Posted
Here are the videos from day 2 of PhreakNIC 16. Big thanks to Ben the Meek and the rest of the video crew. I'll get the AVIs up on Archive.org soon.

Where We're Going We Don't Need Keys - sp0rus

The Effects of Online Gaming Addiction - Gregory C. Mabry

Android Best Practices and Side Projects - Michael Walker

Starting up a Crypto Party - Peace

Build Free Hardware in Geda - Matthew O'Gorman, Tim Heath

IP Law: Myths and Facts - Rick Sanders

The Safety Dance: Wardriving the 4.9GHz Public Safety Band - Robert Portvliet, Brad Antoniewicz

The Power of Names: How We Define Technology, and How Technology Defines Us - Aestetix

DNS Sec Today - Thomas Clements

Why I am pessimistic about the future - Tom Cross

11/10/2012 PhreakNIC 16 Day One Videos Posted
Here are the videos from day 1 of PhreakNIC 16. Big thanks to Ben the Meek and the rest of the video crew.

Welcome to PhreakNIC - Warren Eckstein

Magnets, How Do They Work? - Michael Snyder

Own the Network Own the Data - Paul Coggin

Something about middleware - Douglas Schmidt

Homebrew Roundtable - Scott Milliken, Erin Shelton

Repurposing Technology - Kim Smith & Kim Lilley

Hiring the Unhireable: Solving the Cyber Security Hiring Crisis From DHS to Wall Street - Winn Schwartau

Network King Of The Hill (NetKotH): A hacker wargame for organizers who are lazy bastards - Adrian Crenshaw

11/06/2012 Derbycon 2012 Stable Talks
We did not officially record the Stable Talks this year but Damian Profancik stepped up and volunteered to do it. Big thanks for the recording and editing!
Valerie Thomas: Appearance Hacking 101 - The Art of Everyday Camouflage

Tim Tomes "LanMaSteR53": Next Generation Web Reconnaissance

Thomas Hoffecker: Hack Your Way into a DoD Security Clearance

John Seely CounterSploit MSF as a defense platform

Chris Murrey "f8lerror" & Jake Garlie "jagar": Easy Passwords = Easy Break-Ins

Tyler Wrightson: The Art and Science of Hacking Any Target

Thomas Richards: Android in the Healthcare Workplace

Spencer McIntyre: How I Learned to Stop Worrying and Love the Smart Meter

Shawn Merdinger: Medical Device Security

Rockie Brockway: Business Ramifications of Internet's Unclean Conflicts

Nathan Magniez: Alice in Exploit Redirection Land

Magen Hughes: Are you HIPAA to the Jive

Justin Brown & Frank Hackett: Breaking into Security

Josh Thomas: Off Grid Communications with Android

Jennifer "savagejen" Savage & Daniel "unicorn Furnance": The Patsy Proxy

Jason Pubal: SQL Injection 101

James Siegel: Nice to Meet You

Brett Cunningham: Beyond Strings - Memory Analysis During Incident Response

Gus Fritschie & Nazia Khan: Hacked Hollywood

Evan Anderson: Active Directory Reconnaissance - Attacks and Post-Exploitation

David Young: ISO8583 or Pentesting with Abnormal Targets

David Cowen: Running a Successful Red Team

Damian Profancik: Managed Service Providers - Pwn One and Done

Ben Toews & Scott Behrens: Rapid Blind SQL Injection Exploitation with BBQSQL

Andy Cooper: Why Integgroll Sucks at Python..And You Can Too
11/04/20122 The potential impact of Software Defined Networking on security - Brent Salisbury
This is Brent Salisbury talk on SDN and security for the Kentuckiana ISSA November meeting. Sorry about the sound, I need to get a mic next time. Sorry I did not get Jeremy Druin's talk, we had multiple levels of video fail.

10/29/2012

SkyDogCon 2012 Videos
Here are the videos from SkyDogCon. Thanks to all of the SkyDogCon crew, especially SeeBlind and others for running the cameras.

Opening Remarks-Trevor Hearn-Skydog

Rious and Sachin - "Hack the Badge"
 
GCS8 and Ginsu - Physical Security; Make sure your building is "Butter Knife Proof"...

Marcus Carey - Security Myths Exposed
 
SpikyGeek - Dealing with difficult co-workers: How I became the "Thanks for the candy" guy
 
Peter Shaw - Pivot2Pcap: a new approach to optimzing cybersecurity operations by tightly coupling the big-picture view provided by Netflow with the in-depth resolving power of PCAP.
 
Carter Smith - Gangs and the use of Technology
 
G. Mark Hardy - Hacking as an Act of War
 
Jeff Brown - RE, CND and Geopolitics, Oh My!

Curtis Koenig - Insanely Great!

Lee Baird - Setting up BackTrack and automating various tasks with bash scripts

Bob Weiss & Benjamin Gatti - Cryptanalysis of the Enigma

Dr. Noah Schiffman - Bioveillance: The Surreptitious Analysis of Physiological and Behavioral Data

Martin Bos & Eric Milam - Advanced Phishing Tactics Beyond User Awareness

Sonny Mounicou - Build a UAV!

Alex Kirk - Lifecycle and Detection of an Exploit Kit

Chris Silvers - Go With the Flow: Strategies for successful social engineering

Scott Moulton - Hack your Credit Score; How the System is Flawed

David Wyde - User-Readable Data and Multiple Personality Disorder

Closing of Conference

10/27/2012 SkyDogCon 2 Videos
Most of the talks are up, full post coming soon.
10/25/2012 Hack3rcon 3 Videos
I still have one video from Hack3rcon 3 left to edit, but I wanted to put all of the talks out in the  RSS before the SkyDogCon talks come out. One more coming soon hopefully.
Keynote: Hacking Survival
Speakers: Larry Pesce
Next Generation Web Reconnaissance
Speakers: Tim Tomes
Intro to Network Traffic Analysis - Part 1
Speakers: Jon Schipp
Intro to Network Traffic Analysis - Part 2
Speakers: Jon Schipp
Automated Spear-twishing - It was only a matter of time
Speakers: Sean Palka
In case of ZOMBIES break glass
Speakers: Chris Payne
Building Dictionaries and Destroying Hashes Using Amazon EC2
Speaker: Steve Werby
Secrets of Running a Consulting Business
Speakers: Brian Martin
Bash Scripting 101 for Pen Testers
Speakers: Lee Baird
Keynote: Finding the MacGyver in You
Speakers: William A. Minear
EMP, yeah you know me..
Speakers: Adrian Crenshaw
Intro to Linux exploit development - Part 1
Speakers: John deGruyter Intro to Linux exploit development - Part 2
Speakers: John deGruyter
This video is combined with the one above, but I'm too lazy to redo my numbering system. :)
Advanced Phishing Tactics Beyond User Awareness
Speakers: Eric Milam, Martin Bos
DNS Reconnaissance
Speakers: Carlos Perez
Sponsors: Tenable Network Security *SILVER*
Social Engineering Applied: Exploit the Target
Speakers: Keith Pachulski
From Patch to Pwnd
Speakers: Deral Heiland
Building a pad that will survive the times
Speakers: Branden Miller
Wielding Katana: A Pentesters Portable Pal
Speakers: Ronin
10/20/2012 Hack3rcon 3 Videos, A Little Early
Those at Hack3rcon know I'm posting videos on the site while I'm at the con. I noticed someone at the con looking for them on the front page, but I had not linked to them there yet (Just Tweeted them from @irongeek_adc). The link above will take you to the Hack3rcon 3 video page, and I will make a longer post when I have them all out there (but keep watching that page over the weekend if you like).
10/06/2012 Louisville Infosec 2012 Videos
Below are the videos from Louisville Infosec 2012 conference. Sorry about the noise, I had no line in from the house audio. My talk is not in here because the slides rig failed. You can see a previous version of it here: Dingleberry Pi Building a Blackthrow: More inexpensive hardware to leave behind on someone else's network - Adrian Crenshaw

Index:
Keynote Jack Daniel InfoSec Stress & Community
Nathan Heald - No Keys, No Worries Lock Picking
Jeremy Druin - NOWASP Mutillidae 2.2 A web pen-testing environment for secure development
Curtis Koenig - Grey Hats and Bug Bounties
Deral Heiland - From Printer to Pwnd Leveraging multifunction printers during penetration testing
James Jardine - Ninja Developers App Sec Testing and SDLC
Joshua Bartley - Data Hiding In Your Application
Keynote Michael Peters The Security TrifectaT - Isolation vs. Collaboration

10/03/2012 Derbycon 2012, Day 3 Tracks 2, 3 & 4 Videos Posted

In this batch we have:

Matt Weeks: Ambush- Catching Intruders at Any Point
Joshua Marpet: separating security intelligence from security FUD
Steve Werby: Building dictionaries and destroying hashes w/amazon EC2
Raphael Mudge: Dirty Red Team Tricks II
David Schuetz (Darth Null) Slow down cowpoke When enthusiasm outpaces common sense
Nicolle Neulist: Write your own tools with Python
David McGuire: Maturing the Pen Testing Professional
Matt Presson: Building a database security program
Chris Jenks: Intro to Linux system hardening
Eric Milam: Becoming Mallory
Patrick Tatro: Why isn't everyone pulling security- this is combat
Jason Frisvold: Taming Skynet-using the cloud to automate baseline scanning
JP Dunning & Chris Silvers: Wielding Katana- A live security suite
Mick Douglas Sprinkler: IR
Matthew Perry: Current trends in computer law
Leonard Isham: SE me SE you
CLOSING CEREMONY

See you next year, or at Hack3rcon, Skydogcon or Phreaknic.

10/02/2012 Derbycon 2012, Day 2 Tracks 3 & 4, Plus Day 3 Track 1 Videos Posted

In this batch we have:

Michael Schearer Flex your right constituion and political activism in the hacker community
Eric Smith Penetration testing from a Hot Tub Time Machine
Chris Nickerson (ind303) Tactical Surveillance: Look at me now!
Jamie Murdock How to create a one man SOC
Branden Miller / Bill Gardner Building an Awareness and training program
Dan Crowley / Chris Vinecombe Vulnerability Spidey Sense
Nathaniel Husted   Everything you always wanted to know about Security Academia (But were too afraid too ask)
Bill Sempf What locksport can teach us about security
JP Dunning (.ronin) - The Glitch: Hardware With Hacking Made Easy
Christopher Domas The future of RE: Dynamic Binary Visulization
Tom Eston / Kevin Johnson Social Zombies: Rise of the Mobile Dead
KC. Yerrid / Matt Jezorek / Boris Sverdlik (JadedSecurity)- It's not your perimenter. It's you
Deral Heiland -Format String Vulnerabilities 101
Jack Daniel How Screwed Are We?
Kellep Charles: Security Vulnerablity Assessments. Process and best practices
John Woods So you got yourself an infosec manager job. Now what?
K.C. Holland (DevAuto) - Personal Darknet or How to get pr0n @ work
Tony DeLaGrange / Jason Wood:SH5ARK ATTACK- taking a byte out of HTML5!
Matthew Sullivan: Cookie Cadger taking cookie hijacking to a new level
Stephen Haywood (AverageSecurityGuy) - Introduction to Metasploit Post Exploitation Modules
Noah Beddome: The devils in the Details-A look at bad SE and how to do better
Jay James & Shane MacDougall: Usine McAfee secure/trustguard as attack tools
Roamer and Deviant Ollam - Welcome to NinjaTel, press 2 to activate your device now
Laszlo Toth & Ferenc Spala: Think differently about database hacking

10/01/2012 Derbycon 2012, Day 2 Tracks 1 & 2 Videos Posted

In this batch we have:

Skip Duckwall / Chris Campbell Puff Puff Pass Getting the most out of your hash
Jordan Harbinger Social Engineering Defense Contractors on LinkedIn and Facebook: Who's plugged into your employees?
Paul Asadoorian / John Strand Everything they told me about security was wrong.
Zack Fasel Pwned in 60 Seconds -From Network Guest to Windows Domain Admin
Ryan Elkins Simple Security Defense to thwart an Army of Cyber Ninja Warriors
atlas: RfCat-subghz or bust
Georgia Weidman Introducing the Smartphone Pentest Framework
Gillis Jones The Badmin Project
Kyle (kos) Osborn Physical Drive-By Downloads
Johnny Long The Evolution of HFC
Dual Core (int0x80) Moar Anti-Forensics Moar Louise
Bruce Potter Security Epistemology: Beliefs Truth and Knowledge in the Infosec Community
Josh More Pen Testing Security Vendors
Jason Gunnoe & Chris Centore -Building the next generation IDS with OSINT
Babak Javadi / Keith Howell: 4140 Ways your alarm system can fail
Benjamin Mauch Creating a powerful user defense against attackers
Bart Hopper Hunting Evil
Doug Burks Security Onion Network Security monitoring in minutes

Direct downloads from Archive.org will be uploaded when I have all of Day 2 ready.

09/30/2012 Derbycon 2.0: The Reunion, Day 1 Videos Posted

Hi all. Expect these to come out in phases.

Opening Ceremony
HD Moore The Wild West
Dan Kaminsky Black Ops
Mudge Cyber Fast Track; from the trenches
Jayson E. Street Securing the Internet: YOUre doing it wrong (An INFOSEC Intervention)
Jason Scott Rescuing The Prince of Persia from the sands of time
Dave Marcus 2FA-Enabled Fraud: Dissecting Operation High Roller
Rafal Los House of Cards
Rob Fuller / Chris Gates Dirty Little Secrets Part 2
Chris Hadnagy Nonverbal Human Hacking
Rick Farina: The Hacker Ethos meets the FOSS ethos
Brent Huston Info overload..Future shock.. IBM & nature of modern crime
Ian Amit SexyDefense the red team tore you a new one. Now what?
egyp7 Privilege Escalation with the Metasploit Framework
Larry Pesce / Darren Wigley Hacking Survival: So. You want to compute post-apocalypse?
James Arlen Doubt Deceit -Deficiency and Decency a Decade of Disillusionment
Carlos Perez DNS Reconnaissance
Sam Gaudet: Pentesting for non-pentestersthrough virtual machines
Ryan Linn Collecting Underpants To Win Your Network
Jerry Gamblin: is it time for another firewall or a security awareness program?

09/19/2012 How To Upgrade To Latest Mutillidae On Samurai WTF 2
Jeremy Druin has a new video:
This video covers upgrading the default version of NOWASP (Mutillidae) which comes with SamuraiWTF 2.0 with the latest available version. On this particular version of SamuraiWTF 2.0, NOWASP (Mutillidae) 2.1.20 was installed in the ISO. The latest version of NOWASP (Mutillidae) available at the time of this video was 2.3.7. In the video, the hosts file responsible for activating the links to the "target" web applications was modified so the default web applications would work. Also, the "samurai" start up script is reviewed to show why the LiveCD version of Samurai includes working web app targets but the installed version requires the targets be "activated". The video then covers how to upgrade the existing default installation of NOWASP (Mutillidae) with the latest available version. Additionally, the video discusses how to run the default version and latest version of NOWASP (Mutillidae) side-by-side or replace the existing installation with the latest version.
09/16/2012 Installing Latest Mutillidae On Samurai WTF Version 2
Jeremy Druin has a new video:
Samurai WTF is an excellent platform for web pen testing. A very large number of tools are already included. An older version of NOWASP Mutillidae comes pre-installed. This video covers installing the latest version on Samurai WTF 2.0. Installation requires downloading the latest verion of NOWASP Mutillidae, unzipping the Zip file which contains a single folder named "mutillidae", and placing the "mutillidae" folder into /var/www directory. Configuration is done by opening the /var/www/mutillidae/classes/MySQLHandler.php file and changing the default MySQL password from blank empty string to "samurai". Starting the project is done by browsing to http://localhost/mutillidae and clicking the Reset-DB button on the menu bar.
09/15/2012

 

Web Shells and RFIs Collection
I wrote a little script to periodically look through my web logs for unique RFIs and Web Shells, and then collect them on one page where I can go look at them or download them to add to my Web Shell library. Many of these attacks are repeated multiple time, so I ignore the time fields in judging if an RFI/Web Shell is unique. I may have to weed this over time as I imagine many of the links to Web Shells will be 404ing over time. I also use nofollow and a referrer hiding service so it does not look like I'm attacking anyone with the web shells. This page will also let you link off to firebwall.com where you can use their PHP decoder to look at the obfuscated code. Enjoy my Web Shell zoo, it should update itself every hour or so. If you see your domain on the list of websites hosting Web Shells you are likely pwned and should clean up your server.
09/09/2012 Into to Metasploit - Jeremy Druin
This is the 5th in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. This one covers Metasploit.
09/04/2012 Teensy 3.0
As many of my readers know I've done a lot of work with the Teensy 2.0 in projects such as the programmable HID USB keyboard and my own hardware keylogger. Now Paul Stoffregen is coming out with a new version, Teensy 3.0. You should still have the easy of development that comes with the Arduino framework (or more raw C/C++ if you like) but there are two major new features, of many, that I'm excited about: More powerful 32 bit ARM Cortex-M4 and USB host support. Go check out Paul's Kickstarter page for more details and added features.
08/29/2012 SSH Phone Home: Using the Raspberry Pi as a proxy/pivot (Shovel a Shell)
I added a new section to my Raspberry Pi recipes page that covers setting up a Raspberry Pi to send you a Reverse Shell using SSH (AKA: Shovel a shell). This is pretty good for blowing past NAT and some firewalls with weak egress filtering. The idea is that you can use these as drop boxes to leave on someone else's network, then have them remote back out to you. These instructions should work pretty much the same on any *nix device or distro that uses OpenSSH.
08/13/2012

 

Irongeek's Logwatch Script To Grep For RFI, Webshells, Password Grabs, Web Scanners, Etc.
This is a simple script I put together for those using shared hosting providers. It let's you grep through your logs for things like RFIs, likely webshells, passwords grabs, web scanners, etc. The video below gives more details. This can be a great tool for collecting webshells.
08/07/2012 Jeremy Druin has two new Mutillidae/Web Pen-testing videos

Setting User Agent String And Browser Information

Introduction to user-agent switching: This video uses the Firefox add-on "User-Agent Switcher" to modify several settings in the browser that are transmitted in the user agent string inside HTTP requests. Some web applications will show different content depending on the user agent setting making alteration of the settings useful in web pen testing.

Walkthrough Of CBC Bit Flipping Attack With Solution

This video shows a solution to the view-user-privilege-level in Mutillidae. Before viewing, review how XOR works and more importantly that XOR is communicative (If A xor B = C then it must be true that A xor C = B and also true that B xor C = A). The attack in the video takes advantage that the attacker knows the IV (initialization vector) and the plaintext (user ID). The attack works by flipping each byte in the IV to see what effect is produced on the plaintext (User ID). When the correct byte is located, the ciphertext for that byte is recovered followed by a determination of the correct byte to inject. The correct value is injected to cause the User ID to change.

Mutillidae is available for download at http://sourceforge.net/projects/mutillidae/. Updates about Mutillidae are tweeted to @webpwnized along with announcements about video releases.

08/05/2012 Host Vulnerability Assessment with Nessus, NeXpose and Metasploitable 2
This is the 4th in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. This one covers Nessus, NeXpose and Metasploitable 2.
07/31/2012 BSides Las Vegas 2012 Videos
They have been up on Youtube since Friday, but now I have them indexed and with links to where you can download AVIs from Archive.org. Enjoy. Thanks to all of the BSides Crew for having me out to help record and render the videos. @bsideslv, @banasidhe, @kickfroggy, @quadling, @jack_daniel 

Breaking Ground

KEYNOTE, Jack Daniel: "The State of Security BSides"

Matt Weeks: "Ambush - Catching Intruders At Any Point"

Robert Rowley: "Max Level Web App Security"

Davi Ottenheimer: "Big Data's Fourth V: Or Why We'll Never Find the Loch Ness Monster"

HD Moore: "Empirical Exploitation"

Christopher Lytle: "Puzzle Competitions and You"

Parth Patel: "Introducing 'Android Security Evaluation Framework' - ASEF"

Terry Gold: "RFID LOL"

Raphael Mudge: "Force Multipliers for Red Team Operations"

Andrew Hay & Matt Johansen: "Applications and Cloud and Hackers, Oh My!"

Brendan O'Connor: "Reticle: Dropping an Intelligent F-BOMB"

Josh Sokol/Dan Cornell:"The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems"

James Lester & Joseph Tartaro: "Burp Suite: Informing the 99% of what the 1%'ers are knowingly taking advantage of."

dc949 - "Stiltwalker: Round 2"

Gillis Jones: "The Badmin project: (Na-na- nanana Na-na-nanana BADMIN)"

IPv6 Panel / Drinking Game


Proving Ground

Michael Fornal: "How I managed to break into the InfoSec World with only a tweet and an email."

David Keene: "Breaking Microsoft Dynamics Great Plains - an insiders guide"

William Ghote: "Lotus Notes Password Hash Redux"

Spencer McIntyre: "How I Learned To Stop Worrying and Love the Smart Meter"

Christopher Campbell "Shot With Your OwnGun: How Appliances are Used Against You."

Shawn Asmus, Kristov Widak: Mirror Mirror Reflected PDF Attacks using SQL Injection

Georgia Weidman: "Introducing the Smartphone Penetration Testing Framework"

Phil Young: "Mainframed - The Forgotten Fortress"

Walt Williams: "Metrics that Suck Even Less"

Conrad Constantine: "The Leverage of Language: or : How I Realized Information Theory could Save Information Security"

Jason Ding: "The Blooming Social Media Economics Built on "Fake" Identities

Lightning Talks

07/30/2012

 

Indiana University Southeast School of Business/MBA Review Updated: Emails from Gil Atnip, Alan Jay White, Lawyer Cover Plate, Etc.
Hi all. Don't worry, I'll be back to infosec content soon (with a posting of the BsidesLV videos). In the mean time, I just wanted to make an update post about the situation I shared with you awhile back (see change log at the bottom of the IUS MBA page). It seems many of the faulty/admins at IUS have been told to responded to be with only an IU lawyer cover plate response that tells me to contact IU Counsel. Unfortunately, the contacts I have at IU Counsel are not responding to my requests either at this point. Another interesting tidbit, seems someone has forwarded my MBA review site to the campus police (reverse DNS lookup for the win), though I have little idea what allegations may have been made (and they are not saying). I've posted the details on all this to the page. At this point there is not much I can do but shut up and go away, as is their intention, but I do ask for something from my readers. If you know of an organization that cares about academic abuses/student rights to due process, please forward them to the page. If you are a web admin, please just link to the page so it's easier for perspective students to find if they search for it. Thanks for your time.
07/16/2012 OISF 2012 Videos

Here are the talks from the OISF Anniversary Event 2012:

Conference Kickoff - Deral Heiland & Abyss of Cybersecurity - John Bumgarner
Size Does Matter: Password Tools and Data - Bob Weiss
Dingleberry Pi Building a Blackthrow: More inexpensive hardware to leave behind on someone else's network - Adrian Crenshaw
Threat Model Express - Sahba Kazerooni

07/16/2012 Bsides Cleveland 2012 Videos

Here are the talks from Bsides Cleveland 2012:

Secret Pentesting Technigues Shhh...Dave KennedyDave "ReL1K" Kennedy
Focusing on the Fool: Building an Awareness & Training Program - Branden Miller & Bill Gardner
<? $People ?> Process Technology - Jeff @ghostnomad Kirsch
Dingleberry Pi Building a Blackthrow: More inexpensive hardware to leave behind on someone else's network - Adrian "Irongeek" Crenshaw
Testing Enterprise DLP Systems // Advanced data exfiltration techniques - Albert School
Automating Incident Response - Mick Douglas
Business Ramifications of the Internet's Unclean Conflicts - Rockie Brockway
Netflow for Incident Response - Jamison Budacki
Winter is Coming: Cloud Security in Dark Ages - Bill Mathews
What locksport can teach us about security - Bill Sempf <missing>
Pass the Hash like a Rockstar - Martin "PureHate" Bos
Naked Boulder Rolling - Applying Risk Management to Web Application Security - J Wolfgang Goerlich
Anti-Forensics Filler - Irongeek
Outside the Echo Chamber - James Siegel (aka WolfFlight)
Pentesting ASP.NET - Bill Sempf

07/15/2012 Basic Output via Raspberry Pi's GPIO and Serial/UART to an Arduinio or Teensy Updated
While I was at Bsides Cleveland and OISF I found some problems with my write-up and schematics, I've updated them now so you won't encounter blue smoke.
07/07/2012

 

More Web Pen-Testing Videos From Jeremy Druin
Here are two more videos from Jeremy Druin (@webpwnized):

Using Command Injection To Gain Remote Desktop On Windows

How To Exploit Metasploitable 2 With Nmap Nexpose Nessus Metasploit

07/07/2012

 

Basic Output via Raspberry Pi's GPIO and Serial/UART to an Arduinio or Teensy
I added a "recipe" for using the Raspberry Pi's GPIO pins to interface with a Teensy (which means it is also no problem to talk to an Arduino). I've included simple code, schematics/diagrams and videos to demonstrate. Right now I'm just outputting from the Raspberry Pi to the Teensy, but input should not be a problem either with the linked to resources.
07/06/2012 Running an I2P Svartkast on the Raspberry Pi Updated
I updated the article a little to show how to set up a SSH tunnel through the I2P darknet. Expect to see a few more Raspberry Pi posts as I prep up for my talks at Bsides Cleveland and OISF.
07/04/2012 Updates to About and Irongeek in print pages
I noticed a few people at Indiana University Southeast looking at my review of the IUS MBA program, then looking at my "about" page. Maybe they wanted to see if I was a crackpot. I decided to update my about page to list more of the talks I've done around the country since it was last updated. I have also updated the Irongeek in print page with more books my site or I have been referenced in.
06/28/2012 Raspberry Pi Recipes
On this page I'll be posting little security ideas for the Raspberry Pi. Current sections include:
I2P on the Raspberry Pi
Installing Metasploit on the Raspberry Pi
Making an EtherLogger to log Ethernet packets with the Raspberry Pi
06/21/2012

 

Running an I2P Svartkast on the Raspberry Pi: Even more cheap hardware to leave on someone else's network
This is sort of a sequel to a previous article I wrote titled "Running an I2P Svartkast on the Raspberry Pi: Even more cheap hardware to leave on someone else's network". In that article I answer the obvious question of what the hell a Svartkast is, as well as show how to make one out of a Raspberry Pi.
06/16/2012 How To Install Metasploitable 2 With Mutillidae On Virtual Box
Here is another one from Jeremy Druin (@webpwnized):

This video covers installing Rapid7's Metasploitable 2.0 with Mutillidae on a Virtual Box Host Only network. In addition to reviewing how to install Metasploitable 2 on Virtual Box, the configuration of the virtual network card is shown so that the Mutillidae web application running on Metasploitable 2 can be accessed from a separate Backtrack 5 virtual machine running on the same Host Only network.
06/07/2012 Out of Character: Use of Punycode and Homoglyph Attacks to Obfuscate URLs for Phishing
This is the paper I was working on in last semester's class. Hope it is helpful.
06/07/2012 IUS MBA Program Continued: Amendment of records, FERPA and getting your side put in the record
Again, not security related, but could be of interest to some. Next post I swear will be security related.
06/02/2012 Traceroute and Scapy Jeremy Druin @webpwnized
This is the 3rd in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. This one covers Traceroute and Scapy.
05/26/2012 AIDE 2012 Videos posted

Recorded at AIDE 2012. Big thanks to Bill Gardner (@oncee) for having me out to record.

Anti-Forensics: Occult Computing
Adrian Crenshaw


Out of Character: Use of Punycode and Homoglyph Attacks to Obfuscate URLs for Phishing
Adrian Crenshaw


An Introduction to Traffic Analysis: A Pragmatic Approach
Jon Shipp


Pen Testing Web 2.0: The Client
Jeremy Druin


Breaking into Security
Frank J. Hackett and Justin Brown


Sabu the Hacker: The capture, the crimes, the damage done, the slip, the apprehension, and the fallout.
Dr. Marcus Rogers
Jill McIntyre
Boris Sverdlik
Ronald Layton, U.S. Secret Service


BNAT Hijacking: Repairing Broken Communication Channels
Jonathan Claudius


Setting up BackTrack and automating various tasks with bash scripts
Lee Baird


Going on the Offensive - Proactive Measures in Securing YOUR Company
Dave Kennedy

05/23/2012 BSidesCleveland
Here is another event I will be speaking at.

What: BSidesCleveland
When: Friday, July 13, 2012
Where: Embassy Suites Cleveland - Rockside
Address: 5800 Rockside Woods Boulevard, Independence 44131
Cost: Free (as always!)

Register at:
http://www.securitybsides.com/w/page/27427415/BSidesCleveland

Submit to CFP at:
http://www.securitybsides.com/w/page/53552319/BSidesClevelandCFP

05/22/2012 Homoglyph Attack Generator Updated: Obfuscating EXEs, scripts and documents using 'Right-To-Left Override' (U+202E)
Added option to use 'Right-To-Left Override' (U+202E) so you can do some stupied EXE tricks, and added a linkless output so you can copy & paste your homography without formatting
05/21/2012 Gaining Administrative Shell Access Via Command Injection
Here is another one from Jeremy Druin (@webpwnized):

Using command injection against the Mutillidae web application, we gain a root shell (Administrative Windows cmd shell). The server is fully patched with anti-virus running and a firewall blocking port 23. Additionally the telnet service is disabled. With the command injection vulnerability, this video demonstrates how misconfiguring web services can have serious consequences for security. Additionally we review how to remediate command injection vulnerabilities and discuss some of the defects which expose the server to compromise.
05/21/2012 Offensive-Security Ohio Chapter (OSOC) Version of OSInt/Footprinting Talk
This is the version of my OSInt/Footprinting talk as given at the Offensive-Security Ohio Chapter (OSOC) class on May 18th. I did not have my video gear with me, so @securid did the recording. Videos can also be downloaded from http://www.1dave1cup.com/
05/21/2012 Review of the IUS (Indiana University Southeast) MBA Program (and a bit about filing student grievances)
Most of my writings are on Information security, but this one delves into something else. It may still be of interest to those with a security mindset. I hope that it will serve two purposes: 1. To help other students that file grievances against faculty learn from my experience, and 2. convince those interested in pursuing an MBA in the Louisville area to go someplace other than the IUS MBA program.
05/12/2012

Intro to Scanning: Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin
This is the 2nd in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. This one covers scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc.

05/06/2012 Jeremy Druin did some more Mutillidae/Web Pen-testing videos

At some point, I will start putting up some of my own content :) I have done some tricks that I hope will make the page load better, but I'm not sure about the browser compatibility. In the mean time, here is some more of Jeremy's work:

Using Metasploit Hashdump Post Exploit Module Creds Table And John
This video shows how to have the hashdump post exploitation module automatically populate the creds table in the metasploit database, then export the credentials to a file suitible to pass to the john the ripper tool in order to audit the passwords.

Using Metasploit Community Edition To Determine Exploit For Vulnerability
In previous versions of Metasploit it was possible to run "db_autopwn -t -x" in the msfcomsole in order to have metasploit guess the best exploits for a given vulnerability. This video looks at alternative functionality for the depreciated "db_autopwn -t -x" option in older versions of Metasploit's msfconsole. Metasploit Community Edition has similar exploit analysis functionality accessible via the web based GUI.
 

05/03/2012 More Mutillidae/Web Pen-testing videos from Jeremy Druin

Jeremy had two more videos for you. It's beginning to become a load problem with all the iframe embedded videos :). I'm willing to take suggestions.

Using Hydra To Brute Force Web Forms Based Authentication Over Http
This video covers using nmap to ping sweep network then discover ports on two machines to locate a web server on which Mutillidae is running. Once the web server is running, the site is loaded into Firefox and the login page is located. Using View-Source, Burp-Suite, and the sites registration, the login process is studied. Potential usernames are gathered from using Reconnoitter, CeWL, and the sites own blog page. A password file from john the ripper is used. With the potential usernames and passwords in hand, hydra is used in http-post-form mode to search for a username and password which can log into the site.

Connect To Unreachable Web Site Through Meterpreter Port Forwarding
This video covers accessing a web site that is normally unreachable from our Backtrack 5 box. However, after gaining a session on a third box, we forward our web browser through the compromised host in order to browse the website. The port forwarding is done via a meterpreter session on the compromised host. After setting up the port forward, the browser is able to use the compromised host as a relay (almost like a web proxy) in order to browse to the "internal" web application.

04/27/2012 DerbyCon tickets go on sale this today! (Friday April 27th) CFP OPEN!
We will be opening up ticket sales on Friday at 1:00PM EST on April 27th 2012. Both training and normal conference tickets will be going on sale at this time. We feel we have a very stable ticketing system at this point from the tests last week and dont anticipate any major issues! We look forward to seeing everyone at DerbyCon this year Its going to be amazing!!!

Call for papers are also open! Check out the CFP section on the DerbyCon here.

Some of the current speakers: Jeff Moss, Dan Kaminsky, Kevin Mitnick, Martin Bos, Adrian Crenshaw, HD Moore, Dave Kennedy, Ryan Elkins, Johnny Long, Chris Nickerson, Chris Gates, Eric Smith, Paul Asadoorian, Rob Fuller, Larry Pesce, Chris Hadnagy, John Strand, Peter Van Eeckhoutte, int0x80, Thomas dOtreppe, Jack Daniel, Jason Scott, Deviant Ollam, Jayson E. Street, James Lee, Rafal Los, Kevin Johnson, Tom Eston, Rick Hayes, Georgia Weidman and Karthik Rangarajan

Check out videos of last year's Derbycon here.

04/23/2012

2 more Mutillidae/Web Pen-testing videos from Jeremy Druin

Three more great videos from Jeremy Druin (@webpwnized ):

Creating Syn Port Scan Manually With Scapy
Contrast Nmap And Amap Service Version Detection Scanning

04/23/2012

 

Outerz0ne 8 (2012) Videos

Here is the list:
Kickin' it off for year number 8! Outerz0ne: The History, The Legend SkyDog
Bare Metal Install of Linux from a Network Server Halfjack
How To Cyberstalk Potential Employers IronGeek
Complex Litigation in America Tyler Pitchford
Hook, Line and Syncer: Outerz0ne Remix Chris Silvers
IPv4 -to- IPv6 Service Providers Challenges Jeremy Schmeichel & SlimJim
Your Camera is Worth $300,000 to Microsoft Scott Moulton
Outerz0ne Closing and Awards Skydog and Crew

04/16/2012 Notacon 9 (2012) Videos
These are the videos from the 9th Notacon conference held April 12th-15th, 2012. Not all of them are security related, but  I hope my viewers will enjoy them anyway. Thanks to Froggy and Tyger for having me up, and to the video team: SatNights, Widget, Securi-D, Purge, Bunsen, Fry Steve and myself. Sorry about the sound issues, but there is only so much pain I want to go through in post. Also for some videos we only have the slides or the live video, but not both.
List:
 

Track 1
Day 1

Game Maker: Crash Course
Chris Sanyk

Minute Man: All I Need is 60 Seconds
Rick Deacon

Get your kicks on route IPv6
Mike Andrews

We lit IPv6. This is what happened.
Jeff Goeke-Smith

Civic Hacking
Jeff Schuler, Beth Sebian

Vulnerabilities of Control Systems in Drinking Water Utilities
John McNabb

Hacking for Freedom
Peter Fein

Building a Game for the Ages (well, the young ages anyway)
Bill Sempf

Day 2

Mo data? Mo problems!
Mick Douglas

What if Max Zoran Succeeded? Living without Silicon Valley
movax

How to totally suck at Information Security
Christopher Payne, Doug Nibbelink

(Just About) Everything you think you know about Wilderness Survival is Wrong
Mark Lenigan

Baking in Security
Jeff ghostnomad Kirsch

Your Hacker Class is Bullsh1t
Christopher Payne

REFACTORING THE REVOLUTION (Occupy as an Agile project)
Some Guy On Bridge

Custom Distributions Via Package Aliasing: release of The Pentest Repository
Ryan Holeman

Numbers, From Merely Big to Unimaginable
Brian Makin

Whose Slide Is It Anyway?
nicolle rogueclown neulist
(Sorry, I can't post this one since we did not get permission from everyone)

Track 2
Day 1

Im a Hackerand Im a QSA (Hacking PCI Requirement 6.6. Why Your Web Applications are Still Not Secure)
David Sopata, Gary McCully

Neurohacking: from the bottom up
meecie

Code That Sounds Good: Music Theory and Algorithmic Composition
nicolle rogueclown neulist

Collaboration. You keep using that word
Angela Harms

Kinetic Security
Knuckles, Jeff ghostnomad Kirsch, Ghostnomadjr

Milkymist: video synthesizers at the cutting edge of open source hardware
Sbastien Bourdeauducq

Development Operations: Take Back Your Infrastructure
Mark Stanislav

Exercise Your Mind and Body
Suellen Walker, Joe Walker

Day 2

How to Market the Morally Broken and Sociologically Depraved: A Guide to Selling Your Local Hacker Conference to the Public
Jaime Payne

Geocaching 101
Jon Peer

Notacon 9 Network

1984 2012 Legal Privacy Trends
Nick Merker

The Sword is Mightier than the Pen(test): an Introduction to Fencing
Brian Stone, Amy Clausen

What Locksport Can Teach Us About Security
Bill Sempf

Octodad: Building a Better Tentacle Ragdoll
Devon Scott-Tunkin

04/15/2012

More Mutillidae/Web Pen-testing videos from Jeremy Druin

Three more great videos from Jeremy Druin (@webpwnized ):

Detailed Look At Linux Traceroute

This video takes a detailed look at the traceroute program in Linux. The newer traceroute is used (version 2.0.18). The later versions have the ability to send packets of different protocols (i.e. TCP) to the target. This feature was previously found in the LFT (Layer Four Traceroute) tool but not found in the Linux traceroute. While LFT still is more feature-rich than the traceroute built into Linux, the new features in Linux traceroute make the tool very useful and quite capible. It helps to understand how the traceroute tool forms the packets, to what ports the packets are sent, and what protocols can be used to send the packets. This information can be used to get traceroute commands to work through firewalls and HIPS systems when ICMP and/or UDP and/or most TCP ports are blocked.

Introduction To TCPDump Network Sniffer

This video is an introduction to the tcpdump network packet sniffer/capture tool. The video is relatively long because of the demo used required "building up" to the HTTP capture. The video only covers the basics but is meant to be a good introduction to practical use of tcpdump.

Basics Of Using The Maltego Reconnaissance Graphing Tool

This video looks at using Maltego to both gather and organize information in a customer pen-test. Maltego is a GUI-based tool for Linux which is included in the Backtrack 5 R2 release. The tool is able to gather information from public sources on entities. The Community Edition (used in this video) is free. There is a paid-version with more features. The site used in this video is irongeek.com and was used with written permission from the owner. If following along, please use a domain for which you have permission.

04/08/2012 Finding Comments And File Metadata Using Multiple Techniques
Jeremy Druin has made a new video:
This video has two related parts. The first part discusses finding the comments in Mutillidae related to the "comments challenge". This is an easy challenge in Mutillidae but the techniques can be extended to search entire sites for comments. The second part of the video looks at finding metadata in general using a variety of tools.

The tools used are Firefox "View Source", W3AF, grep, wget, Burp Suite, exiftool and strings. The demo site used is Mutillidae, which is a free open-source fully functional PHP site with a MySQL database. The site runs on localhost or it can be run in a virtual network as a practice target or capture the flag target. It is not a good idea to run Mutillidae publically because it will get hacked. Mutillidae is available at Sourceforge and Irongeek.com. Along with the project is several documents and an installation guide for Windows 7.

Also, I updated the Pen-testing practice in a box: How to assemble a virtual network post to fix an audio issue (it was cutting out after a certain amount of time).

04/07/2012 Pen-testing practice in a box: How to assemble a virtual network
This is the first in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. Topics: Virtual Box Installation, Installing virtual machines, Configuring virtual networks - bridged, nat, hostonly, USB devices in virtual machines, Wireless networks in virtual machines, Installing Guest Additions, How to install Mutillidae in Windows on XAMPP, How to install Mutillidae in Linux Samurai
04/05/2012 Mutillidae How To Use Dradis To Organize Nmap And Nessus Scan Results
New video from Jeremy Druin:
The latest version of Dradis (2.9) has excellent import speed compared to version 2.7. This video looks at using the import features of Dradis to organize the scan results from an nmap scan and a Nessus 5 scan. Dradis is a tool that allows pen testers, auditors, and vulnerability assessors to organize their work by server or other categories. The Dradis starts a web server which other team members can share information as well.
04/03/2012 Homoglyph Attack Generator Updated
I found a list of IDN blacklisted characters on Mozilla's site and added them. I also added a table of the homoglyphs I'm using.
04/01/2012 Two More Web Security Videos From Jeremy Druin
Jeremy Druin has made two more videos:

How To Upgrade To Nessus 5 On Backtrack 5 R2

This video looks at upgrading Nessus 4 to Nessus 5. The operating system used in the video is Backtrack 5 R2. Nessus 4 was successfully registered and running on this OS prior to attempting to upgrade to Nessus 5. If a fresh Nessus install is needed, the process is different.

Creating Reports And Metasploit Db Importable Reports With Nmap Xml Output

Nmap reporting is excellent with the XML option but this is not used in a lot of cases. The XML output from nmap can be imported into other tools such as the Metasploit Community Edition (Import button), metasploit DB, and other tools. Also, the XML format can be opened in a web browser to produce a well-formatted report suitable for attachment to a pen-test.

03/29/2012

Outerz0ne Video Move
Still working on moving videos to YouTube to support more devices. Since Outerz0ne is coming up I decided to move their videos next:

Outerz0ne 2011:

SkyDog - Opening Ceremonies/etc.
SkyDog - The Modern Day Hacker
IronGeek - Rendering Hacker Con Videos with AviSynth
MadMex - Windows Command Line Incident Response
HalfJack -Building your Own Green Home
Beau Woods - What Companies and Vendors must know about securing mobile devices, mobile applications, access and data.
Rick Hayes - Assessing and Pen-Testing IPv6 Networks
Pure Hate - Why your password policy sucks
Billy Hoffman - Advice on starting a start-up
Contest Prize Giveaway, Awards, Closing Ceremonies

Outerz0ne 2010:

Intro to Outerzone and Talk 1 - Security People Suck - Gene Bransfield
IronGeek - Turning the Zipit 2 into a mobile hacking device
Freeside
PBR90X - Social Networking #FAIL
Scott Moulton - Hard Drive Kung Fu Magic
Brian Wilson -Docsis Coolness
BobTalks
Billy Hoffman - Web Performance Talk Craziness
Closing Ceremonies

Outerz0ne 2009

Morgellon - *Duino-Punk! Manifesting Open Source in Physical Space from Outerz0ne 5
Tyler Pitchford - They took my laptop! - U.S. Search and Seizure Explained
SkyDog - Screen Printing Primer - Make your own Con Shirt!
SlimJim100 - Live Demo of Cain & Able and the Man-in-the-middle-attack
Nick Chapman - Embedded Malicious Javascript
Makers Local 256 - A primer on hackerspaces
Scott Moulton - Reassembling RAID by SIGHT and SOUND!
Rob Ragan - Filter Evasion - Houdini on the Wire
Acidus (Billy Hoffman) - Offline Apps: The Future of The Web is the Client?
Closing

Also, a video I did about Outerz0ne and Notacon 2009:

Outerz0ne and Notacon 2009 Hacker Cons Report

03/28/2012 Manual Directory Browsing To Reveal Mutillidae Easter Egg File
Jeremy has made another video:
This video looks at manual testing for directory browsing misconfiguration vulnerabilities in Mutillidae. For directory browsing brute forcing, OWASP DiRBuster or Burp-Suite Intruder are great tools. However, Mutillidae gives away some of its directory paths when serving PDF and other files. These can be tested manually to reveal the Mutillidae Easter egg file. Also common directory names like "include" and "includes" can be tried quickly just using a browser before firing up the tools.
03/26/2012 Password Exploitation Class (YouTube Migration)
I've migrated the "Password Exploitation Class" to YouTube. This should allow it to be viewed on more devices.

This is a class we gave for the Kentuckiana ISSA on the the subject of password exploitation. The Password Exploitation Class was put on as a charity event for the Matthew Shoemaker Memorial Fund. The speakers were Dakykilla, Purehate_ and Irongeek.

03/26/2012 Anti-Forensics: Occult Computing Class (YouTube Migration)
I've migrated the "Anti-Forensics: Occult Computing Class" to YouTube. This should allow it to be viewed on more devices.

This is a class I gave for the Kentuckiana ISSA on the the subject of Anti-forensics. It's about 3 hours long, and sort of meandering, but I hope you find it handy. For the record, Podge was operating the camera :) Apparently it was not on me during the opening joke, but so be it, no one seemed to get it. I spend way to much time on the Internet it seems. Also, I'm in need of finding video host to take these large files. This class video is 3 hours, 7 min and 1.2GB as captured.

03/26/2012 OSInt, Cyberstalking, Footprinting and Recon: Getting to know you (YouTube Migration)
I've migrated the "OSInt, Cyberstalking, Footprinting and Recon: Getting to know you" to YouTube. This should allow it to be viewed on more devices.

The following are videos from the Footprinting/OSInt/Recon/Cyberstalking class I did up in Fort Wayne Indiana for the Northeast Indiana Chapter of ISSA. I've split the class into three videos by subtopic, and included the text from the presentation for quick linking.

03/24/2012 Mutillidae Injecting Cross Site Script Into Logging Pages Via Cookie Injection
Jeremy has made another video (I can't keep up):
By setting the values of browser cookies, then purposely browsing to a web page that logs the value of user cookies, it may be possible to inject cross site scripts into the log files or the log data table of the web site. Later when the logs are reviewed by Administrators, the cross site scripts may execute in the administrators browser. The video uses the Mutillidae capture data pages as an example. In Mutillidae one of the capture the flag events is to poison the attackers browser by purposely exposes the attacker to a cross site script. This can be done by infecting a cookie then "letting" the attacker trick you into visiting the capture data page.
03/24/2012 Mutillidae Generate Cross Site Scripts With SQL Injection
Jeremy has made another video:
This video discusses an advanced SQL injection technique. The SQL injection is used to generate cross site scripting. This is useful when cross site scripts cannot be injected into a webpage from a client because web application firewalls or other scanners are in place. When an SQL injection can be snuck past the WAF, it is possible to have the SQL injection generate the Cross Site Script dynamically.
03/22/2012

DOJOCON 2010 Videos Migrated To YouTube
I've started to migrate the con videos I record and embed on this site to YouTube. I'm doing this for a few reasons:

1. Vimeo took down Dave Marcus' talk because they said it was in violation of their TOS, and when I tried to explain to them what it was about they would not email me back (and I was a paying customer to their service at the time).
2. I'm now allowed longer videos on YouTube, so why not.
3. This should support more devices.

I've started with DOJOCON 2010 to get Dave's talk back up. Below are the videos from the conference, at least the ones I can show :), enjoy.

Index:

Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping
John Strauchs, @strauchs: Security and IT Convergence
Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in Information Security Work
Jon McCoy: Ninja Patching .NET
Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending Your Network using Nepenthes/Shaolin Tools
Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn Your Victims
Brian Baskin, @bbaskin: P2P Forensics
Jonathan Abolins, @jabolins: Internationalized Domain Names & Investigations in the Networked World
Deviant Ollam, @deviantollam: Don't Punch My Junk
Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes
Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap
Ben Smith: Printer Exploitation
Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?
Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS Dead?
Chris Nickerson, @indi303: The State of (In)Security
Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk Professions
Michael Smith, @rybolov: DDoS

03/15/2012

Web Application Pen-testing Tutorials With Mutillidae
When I started the Mutillidae project it was with the intention of using it as a teaching tool and making easy to understand video demos. Truth be told, I never did as much with it as I intended. However, after Jeremy Druin (@webpwnized) took over the development it really took off. I have since come to find out he has been doing A LOT of YouTube video tutorials with Mutillidae, which he said I could share here. I will be copying his descriptions with slight editing and embedding his videos in this page. Videos include:
 

  • Determine Http Methods Using Netcat

  • Determine Server Banners Using Netcat Nikto And W3af

  • Bypass Authentication Using SQL Injection

  • Using Menus

  • Bypass Authentication Via Authentication Token Manipulation

  • Explanation Of HTTPonly Cookies In Presense Of Cross Site Scripting

  • Closer Look At Cache Control And Pragma No Cache Headers

  • Demonstration Of Frame Busting Javascript And X-Frame Options Header

  • How To Install And Configure Burp Suite With Firefox

  • Basics Of Web Request And Response Interception Using Burp Suite

  • Brute Force Authentication Using Burp Intruder

  • Automate SQL Injection Using SQLMap To Dump Credit Cards Table

  • Command Injection To Dump Files Start Services Disable Firewall

  • How To Exploit Local File Inclusion Vulnerability Using Burp Suite

  • HTML Injection To Popup Fake Login Form And Capture Credentials

  • Two Methods To Steal Session Tokens Using Cross Site Scripting

  • How To Bypass Maxlength Restrictions On HTML Input Fields

  • Two Methods To Bypass Javascript Validation

  • Three Methods For Viewing Http Request And Response Headers

  • Basics Of SQL Injection Timing Attacks

  • Basics Of SQL Injection Using Union

  • Basics Of Inserting Data With SQL Injection

  • Inject Root Web Shell Backdoor Via SQL Injection

  • Basics Of Using SQL Injection To Read Files From Operating System

  • How To Locate The Easter Egg File Using Command Injection

  • Injecting Cross Site Script Into Stylesheet Context

  • Introduction To Http Parameter Pollution

  • Basics Of Injecting Cross Site Script Into HTML Onclick Event

  • Basics Of Finding Reflected Cross Site Scripting

  • Analyze Session Token Randomness Using Burp Suite Sequencer

  • Using Nmap To Fingerprint Http Servers And Web Applications

  • Spidering Web Applications With Burp Suite

  • Basics Of Burp Suite Targets Tab And Scope Settings

  • Brute Force Page Names Using Burp Intruder Sniper

  • Using Burp Intruder Sniper To Fuzz Parameters

  • Comparing Burp Intruder Modes Sniper Battering RAM Pitchfork Cluster Bomb

  • Demo Usage Of Burp Suite Comparer Tool

  • Import Custom Nmap Scans Into Metasploit Community Edition

  • Using Metasploit Community Edition To Locate Web Servers

  • XSS DNS Lookup Page Bypassing Javascript Validation

  • Use Burp Suite Sequencer To Compare Csrf Token Strengths

  • How To Remove PHP Errors After Installing On Windows Xampp

  • Quickstart Guide To Installing On Windows With Xampp

  • Basics Of Running Nessus Scan On Backtrack 5 R1

  • How To Import Nessus Scans Into Metasploit Community Edition

  • Basics Of Exploiting Vulnerabilities With Metasploit Community Edition

  • Sending Persistent Cross Site Scripts Into Web Logs To Snag Web Admin

  • Quick Start Overview Of Useful Pen-Testing Addons For Firefox

  • Three Methods For Viewing Javascript Include Files

  • Reading Hidden Values From HTML5 Dom Storage

  • How To Execute Javascript On The Urlbar In Modern Browsers

  • Adding Values To Dom Storage Using Cross Site Scripting

  • Alter Values In Html5 Web Storage Using Cross Site Script

  • Altering Html 5 Web Storage Values Using Persistent XSS

  • Altering HTML 5 Web Storage With A Reflected XSS
     

  • 03/13/2012 Crypto & Block Cipher Modes (OpenSSL, AES 128, ECB, CBC)
    Hopefully this will give a nice visual illustration of how Electronic codebook (ECB) and Cipher-block chaining (CBC) work using AES-128 and OpenSSL. You can learn a lot from a known plain text, and repeating patterns. Inspired by labs from Kevin Benton & "Crypto Lab 1" SEED.
    03/12/2012 Shared Hosting MD5 Change Detection Script Updated
    Fixed an issue with permlog.txt not being put in the $ScriptDir directory.
    03/12/2012

     

    Derbycon 2.0: The Reunion Promo Video Posted
    Dave Kennedy has posted a promo video form Derbycon 2012. A few prominent speakers have been announced. Hope you all can make it this year. To see what you missed from Derbycon 2011, go visit the video page.
    03/03/2012 Proposal for "Out of Character: Use of Punycode and Homoglyph Attacks to Obfuscate URLs for Phishing"
    Below is a project I'm doing for class. If you want to make suggestions and tell me about weird Unicode/Homoglyph security issues, please email me. If you want to play with making homographs, look at my Homoglyph Attack Generator.
    02/28/2012 Shared Hosting MD5 Change Detection Script
    I was wanting a simple shell script that would monitor the files on a site, and report any changed via email. Dave Kennedy's Artillery was close to what I needed (and does a lot more), but I wanted something I could run on my shared hosting account. This is what I came up with, for better or worse. If nothing else, it was a good exercise in BASH scripting, and may come in handy for those that want to make something similar.
    02/22/2012 Malicious USB Devices Page Updated With Videos
    I recently found out that the CACR at Indiana University posted a video of a talk I did for them awhile back, so I decided to update my Malicious USB Devices page to embed it and the other versions of the talk I have.
    02/21/2012 InfoSec Daily Podcast 600 Tonight
    The ISD Podcast is having its 600th episode tonight, Feb 21st 2012. Come join us on the live stream and IRC (#isdpodcast on Freenode) at 8PM EST.
    02/20/2012 How I Got Pwned: Lessons in Ghetto Incident Response
    For those wondering about the details of my recent defacement.
    02/05/2012 ShmooCon Firetalks 2012 Videos
    Link:http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2012
     
     Night 1
     How Do You Know Your Colo Isnt Inside Your Cabinet, A Simple Alarm Using Teensy by David Zendzian
     Bending SAP Over & Extracting What You Need! by Chris John Riley
     ROUTERPWN: A Mobile Router Exploitation Framework by Pedro Joaquin
     Security Is Like An Onion, Thats Why it Makes You Cry by Michele Chubirka
     Five Ways Were Killing Our Own Privacy by Michael Schearer
     
     Night 2
     
     Cracking WiFi Protected Setup For Fun and Profit by Craig Heffner
     Passive Aggressive Pwnage: Sniffing the Net for Fun & Profit by John Sawyer
     Ressurecting Ettercap by Eric Milam
     Security Onion: Network Security Monitoring in Minutes by Doug Burks
     Remotely Exploiting the PHY Layer by Travis Goodspeed
    02/05/2012

     

    ShmooCon Epilogue 2012 Talks
     Includes:
     Resurrection of Ettercap: easy-creds, Lazarus & Assimilation
     Eric Milam - (Brav0Hax) &
     Emilio Escobar
     
     Media Hype and Hacks that Never Happened
     Space Rouge
     
     More than one way to skin a cat: identifying multiple paths to compromise a target through the use of Attach Graph Analysis
     Joe Klein
     
     Proper Depth / Breadth testing for Vulnerability Analysis and fun with tailored risk reporting metrics.
     Jason M Oliver
     
     Extending Information Security Methodologies for Personal User in Protecting PII.
     John Willis
     
     Stratfor Password Analysis
     Chris Truncer
     
     Intro To Bro
     Richard Bejtlich
     
     Javascript obfuscation
     Brandon Dixon
    01/21/2012

     

    Unix File Permissions and Ownership (CHOWN, CHMOD, ETC)
    I'm taking a security class were we had a lab on Unix/Linux file system permissions. I decided I might as well record it, and the steps taken, along with explanations as to what I was doing to set the permissions such as read, write, execute, SetUID, SetGID and the Stickybit. Kevin Benton created the lab, so I'd like to give him credit for inspiring me to do this video.
    01/16/2012 Basic Setup of Security-Onion: Snort, Snorby, Barnyard, PulledPork, Daemonlogger
    Thanks to Doug Burks for making building a Network Security Monitoring Server much easier. I mentioned Snort, Snorby, Barnyard, PulledPork and Daemonlogger in the title, but there is a lot more on the distro than that. This is a nice way to get an IDS up and running featuring pretty frontends without going into dependency hell.
    01/07/2012

     

    Pen-Testing Web 2.0: Stealing HTML5 Storage & Injecting JSON Jeremy Druin
    This is Jeremy's talk from a recent ISSA meeting. In it he covers what the title says, showing off stealing of HTML 5 storage, injecting JSON, using Burp Suite, Muttillidae and some XSS attack fun. Sorry about the noise in the first bit, I had to set the camera up a ways off and it picked up my bag of chips better than it did Jeremy's talk. @webpwnized
    01/01/2012

    Video Posted and Code Updated for Homemade Hardware Keylogger
    My video from NeoISF is now posted: PHUKD/Keylogger Hybrid.

    The code has been updated in the following ways:

    On the PIC side: Updated Firmware for the USB Host Module - PIC24FJ256GB106 to work with more keyboards.

    On the Teensy side:

    0.04:
    * If a keyboard was plugged in after the keylogger was already powered on, it would type "i7-". I added code
    to fix this problem.
    * Fixed RAW serial debug mode not to print key
    * Changed name of variable "lasttenletters" to "lastfewletters" and expanded it to 60.
    * Ctrl+Alt+Y is now used for typing more debugging details.
    * Implemented likely to fail code for unlocking workstation using captured password.
    * I had some problems with running out of SRAM because of all of my static strings. I started using the F()
    function to pull these strings from flash memory to solve this issue.
    * Fixed a case issue with lastfewletters. I did not know the method changed it in place.
    * Fixed a bug in HIDtoASCII that made it top row of number keys not work right.

    12/08/2011 DIY USB And PS/2 Hardware Keyloggers/PHUKD Hybrids Updated
    I've updated my Do It Yourself Keylogger's project site with the following information.

    I've uploaded improved code,
    Just PS/2:
    * Converted ints to bytes in many places. Why take the extra space? :)
    Both USB and PS/2:
    * Made sure it worked with Arduino 1.0.
    * Switched to using the SD library that comes with Teensyduino (from the comments, it looks like
    it's a wrapper by SparkFun Electronics around William Greiman's work).
    * Changed the variables "file" to "logfile" and "filename" to "logfilename" to be less ambiguous.

    I also embedded my talk from Skydogcon and pasted my class project report on the end which gives a lot more details about how this hardware keylogger was created and why.

    12/05/2011 Programmable HID USB Keystroke Dongle Library Updated With OS X Functionality
    I updated the PHUKD library to 0.4. There are some new function. OS X Spotlight and Terminal code was provided by Adam Baldwin and Aaron Howell ngenuity-is.com / evilpacket.net.
    jp (.ronin) http://www.hackfromacave.com also provide some source code for the OS X side, but I ended up using Adam and Aaron's. The functions added were:

    extern void CommandAtRunBarOSX(char *SomeCommand);
    extern void CommandAtNewTerminal(char *SomeCommand);
    extern void ShrinkCurWinOSX();

    I also tested to make sure it worked with Arduino 1.0.

    12/03/2011 NetworkMiner Professional for Network Forensics
    This video was made to show some of the extra features of NetworkMiner Professional, like Pcap-over-IP, running on OS X under Mono, Export results to CSV / Excel, Geo IP localization, Host coloring support, and Command line scripting support.
    11/30/2011 Mutillidae 2.1.7 Deliberately Vulnerable Web App Updated (a lot)

    Jeremy Druin has been doing a lot of work on Mutillidae since I last posted to the front page/rss about it. Here is the change long since the last time I mentioned it:

    Change Log for Mutillidae 2.1.7:

    Added a new page for HTML5 storage. The page is meant to show how to both use and attack HTML5 storage. The page supports Local and Session storage types. The user can attack the storage in two contexts. They can act as if they want to read to contents of their own browsers session storage to see if the developer put authorization tokens or other items into the storage. They can also try to use XSS to steal the session storage. In this use-case the user would be acting as if they wanted to read someone elses storage. A large number of hints has been added to the page. The page name is "html5-storage.php" and can be accessed from the Cross Site Scripting menu and information leakage menu. In security level zero, the page has no defenses. In level 1, the page will use trivial JavaScript validation. In security level 5, the page will refuse to put the secrets in client side storage.

    11/13/2011: Jeremy Druin / Kenny Kurtz

    Change Log for Mutillidae 2.1.6:

    Enhanced the .htaccess file to automatically disable magic quotes on systems which enable them by default (such as some OSX versions of PHP)
    Fixed some bugs in the phpinfo.php file that made the page display weird.
    Enhanced the hidden PHPINFO page so that it would work if the user browsed to http://localhost/mutillidae/index.php?page=phpinfo.php or to http://localhost/mutillidae/phpinfo.php. This example assumes Mutillidae is running on localhost.
    Fixed a bug in index.php that kept the log-visit page from being included.
    Fixed a bug in log-visit.php that kept the page from working.
    Fixed installation instructions format for IE 8 not in compatibility mode.

    11/10/2011: Jeremy Druin

    Change Log for Mutillidae 2.1.5:

    Added vuln to login sequence. Now a cookie is created with username. Students should try to XSS the cookie and see what happens. Also try a response splitting attack because a cookie is an HTTP header.
    Created new twitter feed to make Mutillidae announcements and other web vulnerability tweaks. @webpwnized
    Fixed installation instructions format for IE 8 not in compatibility mode

    10/14/2011: Jeremy Druin

    Change Log for Mutillidae 2.1.4:

    Moved usage instructions and php errors from the home page to their own pages.
    In insecure mode, changed the method of the user-info.php page to GET in order to make it easier to use sqlmap against Mutillidae. sqlmap supports POST but it is easier to use with GET.
    Added hints about sqlmap to sql injection tutorial and to the easter egg file
    Added a credit card table as a target in the database
    Confirmed that the view-blog table can be attacked with sqlmap. The answer is in the Easter Egg file.

    10/13/2011: Jeremy Druin

    Change Log for Mutillidae 2.1.3:

    Fix a bug. If the user was on the home page, without having clicked any link to this point (such as when using a bookmark), then the user clicked the "change security level", the page would redirect to page not found.
    Increased the slide time for the ddsmoothmenu to make it slow down a little bit
    Added a NEW vulnerability. Many sites have crazy pages that show server settings, expose admin functionality, allow configuration, or other features a user should not be able to see. The problem is not the pages themselves so much as the fact that developers think no one will guess the name and browse to them. Shoulder surfing, guessing, brute-forcing, etc can be used to find these pages. Mutillidae now has such a page. It is in the "Server Misconfiguration" category. See secret-administrative-pages.php for hints.
    Augmented the installation instructions
    Added link to ihackcharities to front page
    Added a new security level. Now there is security level 1. The only difference in this release between level 0 and level 1 is that level 1 has JS validation. The JS validation has been in place for a while to allow but was activated in level 0. Since level 0 is supposed to be very easy, the decision was made to create level 1 and move JS validation to level 1. The JS validation is trivial to bypass. Simply disable JS or use a proxy such as Tamper Data, Paros, Burp, WebScarab, or others.
    Page homenotes.php has been merged with home.php.
    Page home.html has been renamed home.php
    Added protection for SQL injection to add to your blog.php output of the current users blog entries. Prior to this patch, you could SQL inject in security level 5 by putting your injection in the current users login name because the query uses the current users login name as the input to the query.
    Improved the DNS lookup page to add JS validation in security level 1 mode.
    Changed padding for BACK button to use styles rather than HTML BR tags.
    Changed the password generator password length to 15 to set a better example.
    Some refactoring on user-info.php and login.php to clean up code
    Added CSRF Protection to page add to your blog. This only works in secure mode.
    Added more scripts to the easter egg file (Mutillidae Test Scripts)
    Bug fix: The setupandreset.php errors were not printing out.
    Stupid bug fix: Removed the "open DB" that was firing before the database was actually created.
    Created output on page setupandreset.php to show what happened
    Added try/catch and more error handling to setupandreset.php
     

    11/26/1011 Jamison Scheeres "Social Engineering is a Fraud" Talk from Derbycon
    Jamison gave me the go ahead to post his video from Derbycon. Now I just have to get off my lazy butt and do the video for the updated/professional version of NetworkMiner.
    11/06/2011

    SkyDogCon 2011 Videos
    Here are the videos from SkyDogCon. Thanks to all of the SkyDogCon crew.

    SkyDog - Conference Opening Remarks

    Curtis Koenig - The Neurobiology of Decision Making

    Chris Anderson - Corporate Evil

    Rious - Making of the SkyDogCon Electronic Badge

    IronGeek - More PHUKED Than Ever

    Nick Levay - Counter Espionage Strategy and Tactics

    Karlo Arozquerta - Windows Command Line Forensics

    Brian Wilson - DOCSIS Networks

    Brent Baldwin/Robert Jason - Brewing Coffee the Soft Brew Way

    Sonny Mounicou - Hackerspace Technology 101

    Pat McCoy/Mike McGilvray - Hook, Line and Syncer: A Liar for Hire's Ultimate Tackle Box

    James Ruffer - Information gathering and social media attacks to gain physical and electronic access to companies

    Bart Hopper - Avoiding the Landmines in Your Own Backyard

    HackerSpace Panel

    Ben Feinstein - Morto Kombat: Understanding the Morto Worm

    11/04/2011 Updates To Homemade Hardware Keylogger/PHUKD Hybrid
    Fixed some bugs, added some features.

    Change logs:

    PS/2 Hardware Keylogger/PHUKD:

    0.01:
    * Holding mod keys did not always work for multi select. Got it working (at least I think I did).
    * Nulls were getting into the logs, so I made an unhandled keycode exception.

    USB Hardware Keylogger/PHUKD:

    0.01:

    * Holding mod keys did not always work for multi select. Got it working by taking out the key replay code,
    and made held keys function better in the process. Also, it made the code simpler to read as I got rid
    of a bunch of unneeded cruft code. :)
    * Nulls were getting into the logs, so I made an unhandled keycode exception.
    *Changed log brackets from <> to [].

    0.02:
    * Fixed bug in logging unknown keys.
    * Added logging for keys [KEY_TAB] and [KEY_NON_US_NUM].
    * Ctrl+Alt+S toggles the typing of raw bytes as they come in the serial connection.
    * Converted ints to bytes in many places. I think their was a type casting problem causing weird issues.
    * Fixed a buffer overflow issue caused by IncomingHIDReportIndex going over 18.
    * Many other tiny changes.
     

    11/02/2011 Homemade Hardware Keylogger/PHUKD Hybrid
    I've been doing some work recently on making homemade keyloggers of both the USB and PS/2 persuasion that will take keystrokes, record/replay them, and modify programmable HID payloads accordingly. This hardware and software is not exactly ready for prime time, but I figured I'd share it with you. On this page you will find rough schematics, source code and links that may help you build your own. I plan to put a video up that demos the devices right after Skydogcon.

    For related work see:

    Hardware Key Logging Part 1: An Overview Of USB Hardware Keyloggers, And A Review Of The KeyCarbon USB Home Mini (Text)
    Hardware Key Logging Part 2: A Review Of Products From KeeLog and KeyGhost (Text)
    Hardware Key Logging Part 3: A Review Of The KeyLlama USB and PS/2 Keyloggers (Text)
    Irongeek - Hardware Keyloggers: Use, Review, and Stealth Presentation (Phreaknic 12) (Video)
    Hardware Keyloggers In Action 1: The KeyLlama 2MB PS/2 Keylogger (Video)
    Hardware Keyloggers In Action 2: The KeyLlama 2GB USB Keylogger (Video)
    Bluetooth Wireless Hardware Keylogger Review (Video)
    Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device (Defcon 18) (Video)
    Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device (Text)
    Plug and Prey: Malicious USB Devices (Text)
    Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me? (Video)

    10/24/2011 Hack3rcon II Videos Posted

    Contents are as follows:

    Opening Ceremony - Johnny Long - Keynote (via Skype)
    Chris Silvers and Pat McCoy Hook Line and Syncer A Liar for Hires Ultimate Tackle Box
    Boris Sverdlik Your Perimeter Sucks
    Joshua Perry OSINT
    Gus Fristschie Getting f***ed on the river
    Eric Milam Automating MiTM for Winning
    Keith Pachulski Common Project Issues with Technical Assessments
    Tim Tomes and Mark Baggett Lurking in the Shadows
    Martin Bos Your Password Policy Sucks
    James Macgregor Watson Online Time OF cRIME
    Charlie Vedaa F*** the Penetration Testing Execution Standard
    Stephan Looney Up and Running with Backtrack Workshop
    Thomas Hoffecker Exploiting PKI for Fun & Profit or The Next Yellow Padlock Icon
    @grecs How to Win Followers and Influence Friends Hacking Twitter to Boost Your Security Career
    Jon Schipp Knowing What's Under Your Hood Implementing a Network Monitoring System

    10/15/2011 Downloads for Derbycon 2011 Posted
    For those wanting to download copies of the videos from Derbycon 2011, I have them all uploaded to Archive.org. You can find the link at the bottom of the Derbycon 1 page. Archive.org's automated process should be generating smaller OGG and MP4 versions.

    Also, since we had problems with the audio rig in Joff Thyer's talk he sent me slides and demo videos for his Covert Channels using IP Packet Headers presentation. Enjoy.

    10/08/2011 Derbycon Videos 2011: The rest of them
    In this wave are the last of the videos from the Derbycon conference (tracks 2 and 3 of day 3 plus closing). Unfortunately, there were a few losses.

    Day 3, Track 2

    Jason n00bz Advanced Penetration Techniques for the non-technical n00b (Not Recorded)
    Jayson E. Street Steal Everything, Kill Everyone, Cause Total Financial Ruin!  (Or How I Walked In And Misbehaved)
    James Lee (egypt) State of the Framework Address (Sound came out as just ground noise)
    Ron Bowes Advanced Nmap Scripting: Make Nmap work for you!"
    (Sound came out as just ground noise)
    Deviant Ollam Distinguishing Lockpicks: Raking vs Lifting vs Jiggling and More
    Raphael Mudge Dirty Red Team tricks

    Day 3, Track 3
    Note: Some of these had weird ambient noise that I could not remove without making all of the audio sound weird. I did the fix to JDuck's, but the rest I left alone.

    Chris Roberts A Tribute to Dr. Strangelove
    Kyle Osborne (kos) The Hidden XSS Attacking the Desktop
    Mick Douglas Blue team is sexy refocusing on defense Part II All you baseline are belong to us
    Garrett Gee Typo-squatting Just Got A Lot More Dangerous (Not Recorded)
    Thomas dOtreppe (mister_x) OpenWIPS-ng
    Joshua Drake (jduck) Exploiting Java Memory Corruption Vulnerabilities

    I have ideas for Derbycon 2 to make the recording a bit more reliable. See you next year!

    10/07/2011 Derbycon 2011, Day 2 Track 3 and Day 3 Track 1 Talks Posted
    In this wave are the videos from the 2nd day 3rd track and 3rd day 1st track of the Derbycon conference. Please note that some videos were lost because of audio issues or are awaiting approval. In this wave:

     Day 2, Track 3:

    Georgia Weidman Throw It in the River? Towards Real Live Actual Smartphone Security
    Rob Simon Pentesting over Powerlines
    Larry Pesce You are the Smart Meter: Making (and hacking) of the 2011 MA-CCDC electronic badges
    Bill Sempf Is locksport a sport?
    Infojanitor Virtual trust, Virtual Permission and the Illusion of Security
    Ben Feinstein & Jeff Jarmoc Get Off of My Cloud": Cloud Credential Compromise and Exposure
    Jimmy Shah Mobile App Moolah: Profit taking with Mobile Malware
    McCorkle & Rios 100 bugs in 100 days: An analysis of ICS (SCADA) software
    Scott Ullrich + Chris Buechler Open source firewalling with pfSense (Sound came out as just fuzz)
    Spiky Geek How I learned to roll my own:Building custom pen testing platforms on the fly (Sound came out as just fuzz)
    Brent Huston Realize Your Hacker Heritage: Do The Needful

     Day 3, Track 1

    Charlie Miller Battery Firmware Hacking
    Peter Van Eeckhoutte & Elliot Cutright Win32 Exploit Development With Mona and the Metasploit Framework
    Ryan Linn collecting Underpants To Win Your Network
    Jamison Scheeres Social Engineering is a Fraud (Awaiting approval)
    Josh Kelley (winfang98) Infectious Media Bypassing AutoRun once and for all
    Kevin Johnson & Tom Eston Desktop Betrayal: Exploiting Clients through the Features They Demand

    Enjoy!

    10/06/2011 Derbycon 2011, Day 2, Track 2 Talks Posted
    In this wave are the videos from the 2nd day of the conference that took place in track two. In this wave:

    Brian Baskin Walking the Green Mile: How to Get Fired After a Security Incident
    Joe Schorr Rule 1: Cardio (and 9 other rules to keep intruders out)
    Thomas Hoffecker Exploiting PKI for Fun & Profit or The Next Yellow Padlock Icon?
    Matthew Becker 73o7\/\/@\/\/Ki Survival Hacking your way out of Armageddon
    Bart Hopper Avoiding the Landmines in your own Backyard
    Chris Gates and Rob Fuller The Dirty Little Secrets They Didnt Teach You In Pentesting Class
    Boris Sverdlik Your perimeter sucks
    Evan Booth Hide yo kids, hide yo wife: Residential security  and monitoring the bottom line
    Rick Farina Free Floating Hostility
    Jack Daniel Surviving a Teleporter Accident (It could happen to you)
    Adrian Crenshaw Building a Svartkast: Cheap hardware to leave behind on someone elses network

    Had to do some work on the audio to raise the voices and lower the noise. Choke up on the mic folks. :) Next year maybe we can get some lavalier microphones.

    10/05/2011 Derbycon 2011, Day 2, Track 1 Talks Posted
    In this wave are the videos from the 2nd day of the conference that took place in track one. In this wave:

    Dennis Kuntz Mining Sensitive Information From Images Using Command-Line OCR
    Michael Arpaia Beat to 1337: Creating A Successful University Cyber Defense Organization
    Carlos Perez (darkoperator) Tactical Post Exploitation
    Paul Asadoorian + John Strand: Offensive Countermeasures: Still trying to bring sexy back
    Tony Huffman (Myne-us) When Fuzzers Miss: The no Hanging Fruit.
    Rafal Los Youre Going to Need a Bigger Shovel A Critical Look at Software Security Assurance
    Rick Hayes + Karthik Rangarajan OSINT Beyond the Basics
    int0x80 (of Dual Core) Anti-Forensics for the Louise
    Rick Redman Tomorrow you can patch that 0day but your users will still get you p0wn3d
    Tottenkoph Data Mining for (Neuro) hackers

    Unfortunately, the audio buzz on Joff Thyer's "Covert Channels using IP Packet Headers" talk is pretty catastrophic. I'll look at it again, but I don't have high hopes. Also, I know some of the later videos have this audio issue as well.

    10/04/2011

     

    Derbycon 2011, Day 1 Talks Posted
    Remember, these are coming out in waves. In this wave are all of the videos from the first day of the conference. In this wave:

    Adrian, Dave, Martin: Welcome to DerbyCon 2011 Intro to the con and events
    KEYNOTE ~ HD MOORE Acoustic Intrusions
    Johnny Long Hackers for Charity Update
    Kevin Mitnick + Dave Kennedy Adaptive Penetration Testing
    The Penetration Testing Execution Standard (PTES) Panel
    Bruce Potter The Details Dont Matter
    Chris Nickerson Compliance: An Assault on Reason
    Pat McCoy & Chris Silvers Hook, Line and Syncer: The Liar for Hires Ultimate Tacklebox
    atlas sploit me if you can
    Jason Scott Jason Scotts Shareware Calvacade
    Vlad Gostom & Joshua Marpet Smile for the Grenade! Camera go Bang!

    10/03/2011 Derbycon Thank Yous
    Thanks for making Derbycon a huge successes guys. Be sure to hit up @purehate_, @dave_rel1k or myself (@irongeek_adc) for suggestions on making next year even better.  Next up for me are Hack3rcon and Skydogcon. Also, the videos from Derbycon will be coming out in waves soon. DigiP is working on the splash and title card art, and after I have that I can start rendering out the split screen versions. Thanks again.
    09/26/2011 Derbycon Area Map
    Putting this up to help attendees, speakers and sponsors find food, supplies, booze, ATMs, shipping and sites near the Derbycon hotel.
    09/25/2011 Programmable HID USB Keyboard/Mouse Dongle Library Updated
    I put up the version 0.3 of the Programmable HID USB Keyboard/Mouse Dongle Library. It should now work with newer versions of the Arduino and the Teensyduino environments.
    09/18/2011

     

    Defcon 19: Cipherspaces/Darknets An Overview Of Attack Strategies
    This is the talk I gave at Defcon 19, this time as recorded in front of a live studio audience (as oppose to the canned version I posted before). The canned one may be more polished, but the Defcon 19 one looks cooler. Here is the description:

    Darknets/Cipherspaces such as Tor and I2P have been covered before in great detail. Sometimes it can be hard to follow attack strategies that have been used against them as the papers written on the topic have been academic and abstract. What this talk will attempt to do is step back and give an overview of the topic in a manner hopefully more conducive to the understanding of security practitioners, giving more concrete examples. While little to nothing in this talk will be "new and groundbreaking" it should lead to a better understanding of how encrypted anonymizing networks can be subverted to reveal identities.

    09/16/2011 Pilfering Local Data: Things an Attacker Would Want to Grab with Short Term Local Access
    Here's my talk from the 2011 Nashville Infosec. This is more or less the description I sent them: "This talk will cover core items an attacker would want to locate and copy off of a Windows system, as well as what tools they would use to bypass weak security precautions like file system permissions and OS/BIOs passwords. Core date in this case would be things like stored passwords and wireless keys, but could also include network paths and the like. It will underscore the importance of physical security and hard drive encryption."
    09/13/2011 MAN Pages From BackTrack 5 R1 List
    I converted a bunch of the MAN pages from BackTrack 5 R1 into HTML. I did this for BackTrack 3 back in the day, so I figured I'd do an update for the tools in BackTrack 5 R1. I made this in a somewhat automated fashion, so please excuse the errors and dead links. It may still be helpful for those that just Google for the MAN pages.

    List Includes: acct_users, affcat, airbase-ng, aircrack-ng, airdecap-ng, airdecloak-ng, airdriver-ng, aireplay-ng, airgraph-ng, airmon-ng, airodump-ng, airolib-ng, airoscript-ng, airserv-ng, airtun-ng, amap, arping, arpspoof, bombardment, buddy-ng, bulk_extractor, capinfos, clientsconf, crunch, dc3dd, dff, dftest, dictionary, dmitry, dnsspoof, dnstracer, dsniff, dumpcap, dupemap, easside-ng, editcap, fatback, fcrackzip, fiked, filesnarf, fping, fragroute, fragrouter, fragtest genlistp, giskismetp, gpshell, greenbone-nvt-sync, gsad, gsd, gsmtprc, hashdeep, hexedit, honeyd, honeydctl, hydra, idl2wrs, ike-scan, ivstools, kismet, kismetconf, kismet_drone, kismet_droneconf, kstats, layingsiege, lspst, macchanger, macof, magicrescue, magicsort, mailsnarf, makeivs-ng, md5deep, medusa, mergecap, miredo-checkconf, miredo-server, miredo-serverconf, miredo, miredoconf, missidentify, msgsnarf, ncat, ncrack, ndiff, netdiscover, netmask, nmap, nping omp, openvas-adduser, openvas-mkcert, openvas-nasl, openvas-nvt-sync, openvas-rmuser, openvasad, openvasmd, openvassd, outlookpst, outputpbnjp, packetforge-ng, psk-crack, pst2dii, pst2ldif, pw-inspector, radclient, raddebug, radeapclient, radiusd, radiusdconf, radlast, radmin, radrelay, radrelayconf, radsqlrelay, radtest, radwatch, radwho, radzap, randpkt, rawshark, readpst, recoverjpeg, recovermov, rlm_acct_unique, rlm_always, rlm_attr_filter, rlm_attr_rewrite, rlm_chap, rlm_counter, rlm_detail, rlm_digest, rlm_expr, rlm_files, rlm_mschap, rlm_pap, rlm_passwd, rlm_policy, rlm_realm, rlm_sql, rlm_sql_log, rlm_unix safecopy, scalpel, scanpbnjp, scapy, scrounge-ntfs, sha1deep, sha256deep, siege, siege2csv, siegeconfig, sipsak, smtprc, smtpscan, sort-pictures, sshmitm, sshow, ssidsniff, ssldump, sslh, tcpdump, tcpkill, tcpnice, tcptraceroute, teredo-mire, text2pcap, thc-ipv6, tigerdeep, tkiptun-ng, traceroute, tshark, unicornscan, unlang, urlsnarf, urls_txt, users, webmitm, webspy, wesside-ng, whirlpooldeep, wireshark-filter, wireshark, xhydra, xprobe2, yersinia, zenmap
    09/12/2011 Building a Svartkast with a pretty pink Pogoplug: Cheap hardware to leave on someone else's network
    The first obvious question is what the hell is a Svartkast? Well, its a term I picked up from Telecomix. Before I would have just referred to it as a drop box (too much name collision there now), but some also call it a kamikaze box or a Blackthrow (which is English for the Swedish term Svartkast). The core idea is to have a cheap host you can leave on someone elses network that you can remote into but that cant easily be tied back to you. The Svartkast does this one better by using a cipher-space like Tor or I2P to further obfuscate where communications to the box are coming from (though slowing down communications of course, anonymity isnt free).
    09/05/2011 Mutillidae 2.1.0 release
    Jeremy Druin has been at it again, with more upgrades to the webapp security teaching tool Mutillidae. In his words:

    Well. Its finally here for better or worse. This version of Mutillidae has nearly every vulnerability known. And they come in bulk. There is all of the OWASP Top 10 plus another ten categories at least. The documentation has been upgraded extensively including the hints and installation instructions. The menu system has been redesigned again to make it easier for users to find the exploit they want to try. Current vulns that are not OWASP top 10 have been added including click-jacking, parameter pollution, cross site framing, and arbitrary file inclusion. I ripped out the MYSQL interface and replaced it with the new object oriented version that comes with PHP 5.3.0 called MYSQLi. The "i" is supposidly for improved. I also enhanced the presentation and output on many pages. Hopefully it is enterprise grade now. My goal is for pros to use this in training developers.

    I added test scripts in the documentation folder. You might like some of them. Some are more fun than monkeys with bubble-gum.
    09/03/2011

     

    Curriculum Vitae added to my about page
    I've had some academics ask for it, so I decided to add my Curriculum Vitae to the about page. It's mostly teaching an presentation experience. I'll need to update it again soon since I have a lot of conferences I'm speaking/working at this fall (copied from ISDPodcast):

    Nashville Infosec
    When: Sept 15, 2011
    Where: Nashville, TN
    http://www.technologycouncil.com/connect/infosec-2011/

    Louisville Infosec
    When: September 29th
    Where: Louisville, KY
    http://louisvilleinfosec.com/

    DerbyCon
    When: September 30th October 2, 2011
    Where: Louisville, KY
    http://www.derbycon.com/

    Hack3rCon 2011
    When: October 21-23rd, 2011
    Where: the Charleston House Hotel and Conference Center
    http://www.hack3rcon.org/

    SkyDogCon
    When: Nov 4th Nov 6th
    Where: Holiday Inn Airport, Nashville, TN
    http://www.skydogcon.com

    Phreaknic
    When: Nov 4th Nov 6th
    Where: Days Inn Stadium, Nashville, TN
    http://www.phreaknic.info

    Subjects to be announced later.

    08/23/2011 Louisville Infosec Discount Code
    If you registered for DerbyCon and want to go to the LouisvilleInfosec the day before email chair (at) LouisvilleInfoSec.com for a $50 off discount code.
    08/20/2011

    Security Tips For The Small Business From 70,000 Feet - Joseph Hollingsworth and Adrian Crenshaw
    A little while back Joe Hollingsworth and I were interviewed for an article in the Southern Indiana Business Source. The local Kiwanis club asked for a 25 min talk on the subject of the article, so we came up with this mandate:
    Given only 25 minutes, tell us what a small business could do to help their security posture.
    Well, it ended up being almost 40min and we did not get through all of the slides. The live video camera failed, so the audio in this video is what the laptop recorded. It may not be something most of my readers will be interested in, but it may help you present on a similar topic.

    08/09/2011 Cipherspaces/Darknets An Overview Of Attack Strategies
    This is essentially the talk I gave at Defcon 19, but I had a little more time to cover the topic in this canned video:

    Darknets/Cipherspaces such as Tor and I2P have been covered before in great detail. Sometimes it can be hard to follow attack strategies that have been used against them as the papers written on the topic have been academic and abstract. What this talk will attempt to do is step back and give an overview of the topic in a manner hopefully more conducive to the understanding of security practitioners, giving more concrete examples. While little to nothing in this talk will be "new and groundbreaking" it should lead to a better understanding of how encrypted anonymizing networks can be subverted to reveal identities.

    08/08/2011 I2P/Tor Workshop Notes Updated
    After running the I2P and Tor workshop at Defcon 19, I've decided to make some tweaks before Hack3rcon. I've fixed some typos, and now have an index:

    Places to go, data to see
    I2P eepSites
    I2P Services/Apps
    Tor Hidden Service Websites
    Tor Hidden Service IRC

    I2P Install
    Install I2P In Windows
    Install I2P in Linux (Standard Method)
    Install I2P in Linux using APT Method
    Proxy Settings for I2P

    Tor Install
    Install Tor in Windows
    Install Tor in Linux
    Proxy Settings for Tor

    I2P Tweaks
    I2P, connection and Firewall settings
    Name Service subscripts to add
    To Make I2P accessible to your network
    Run I2P as a service

    Tor Tweaks
    Tor IRC
    Specify an Exit Node in Tor
    Make Tor accessible to your network
    Run Tor as service in Windows
    To make Vidalia work again in Window after making Tor a service
    Run Tor as service in Linux (Ubuntu)
    To make Vidalia work again in Linux after making Tor a service
    Torify vs Torsock (hint:use Torsocks) in Linux

    Tor Hidden Services
    Just a simple Tor Hidden Service
    Backing up Tor Hidden Server Key

    Working with I2PTunnels
    Using the built in web server (Jetty) I2P Tunnel
    Make SSH Server and SOCKS Tunnel
    Naming and announcing your eepSite
    Encrypted Lease Set

    Extra
    Other Notes

    I also plan to make videos for each of these short text guides.

    08/02/2011 I2P/Tor Workshop Notes
    These are the rough notes and recipes I'll be using in my I2P and Tor workshop at Defcon 19. It gives truncated steps to do things like host a hidden service, make an encrypted lease set, back up your eepSite and hidden service keys, etc, etc. Hope it helps.
    07/27/2011 Mini-DisplayPort on New Dells: Resolving issues with output to projectors in Windows 7
    Ok, this is not security related, but I know a lot of people who do presentations and may run into these issues when they try to use an Apple Min-DisplayPort adapter with their new Windows 7 laptop. Hope it helps.
    07/21/2011

     

    Hack3rcon II Call For Papers
    We all had a great time last year, so we are doing it again. Dave Kennedy (Re1ik) and myself are set to speak. The CFP is open, so submit away:
    http://hack3rcon.org/call.html
    You can also check out videos from last year's Hack3rcon.
    07/19/2011

    Ohio Information Security Forum (OISF) Anniversary Event Videos
    These are the presentations from the Ohio Information Security (OISF) Anniversary Event. The descriptions are largely Ligatted from the OISF website.

    Endpoint Security Decisions - Kurt Roemer
    Defending against XSS - Jason Montgomery
    Project Ubertooth: Building a Better Bluetooth Adapter - Michael Ossmann
    Making Windows 7 SP1 32/64bit Boot CD/DVD/USBs with Winbuilder - Adrian Crenshaw
    Cloud Computing Security - Dr. James Walden

    07/18/2011

    AIDE 2011 Conference Videos
    These are the presentations from the AIDE 2011 conference at Marshall University. We had some issues early on with the schedule not matching the talks, so descriptions are incomplete. The descriptions I do have are largely Ligatted from the AIDE website.

    Social Networks - Evan Patterson
    Who are you going to call? - Evan Patterson
    WV Crimes requiring Electronic & Digital Evidence - Philip Morrison
    Professionalism on the Witness Stand - Phillip Morrison
    Common Darknet Weaknesses - Adrian "Irongeek" Crenshaw
    Recent HIPAA/HITECH Changes - Caleb Knight
    Hacking A Mature Security Program - David "ReL1K" Kennedy

    07/08/2011

     

    Dual booting Winbuilder/Win7PE SE and Backtrack 5 on a USB flash drive with XBOOT
    This is a quick and dirty video to show how to make a multiboot thumbdrive with XBOOT. You can also create a multiboot CD/DVD by combining other ISOs. Operating Systems loaded on mine include: Backtrack 5, Winbuilder/Win7PE SE, DBAN, UBCD4Win, TAILS, Gparted, Ubuntu 11.04, etc.
    07/02/2011

     

    Upcoming Irongeek Speaking Engagements
    I figured I'd take a little time to announce a few places I'll be speaking at shortly. This is not a complete list, there are a few more I've not confirmed yet.

    AIDE: July 15th, 2011
    Cipherspaces/Darknets: An Overview Of Attack Strategies

    Ohio Information Security Forum: July 16th, 2011
    Making Windows 7 SP1 32/64bit Boot CD/DVD/USBs with Winbuilder

    Defcon/B-Sides: Aug 2-7th, 2011
    Only speaking at Defcon, but I plan to hang around B-Sides while Im in Vegas that week.
    Talk: Cipherspaces/Darknets: An Overview Of Attack Strategies
    Workshop (in 2 parts):  "Getting up and running with I2P and Tor" & "Hosting sites as I2P eepSites and Tor hidden services"

    Louisville Infosec: Sept 29th, 2011
    As some of you know, the Louisville Infosec is happening the day before Derbycon, so if you are already in town you might as well come out. I'm running the Network King Of The Hill (NetKotH) game there, and to get more players they gave me a special reg code to get the first 15 people in for free who promise to compete in the game. The code is: koth2011
    Last year the first prize was an iPod touch, not sure what it will be this year.

    Derbycon: Sept 30th-Oct 2nd
    I'm one of the organizers for the event. Most likely I'll not be speaking (we had so many submissions for talks, and we wanted to fit in as many as possible), but I will be doing a workshop along with the other founders Dave Kennedy and Martin Bos.

    07/01/2011

     

    Building a boot USB, DVD or CD based on Windows 7 with WinBuilder and Win7PE SE Tutorial
    As many of you know, Im a big fan of Bart's PeBuilder and derivative works based on it like UBDC4Win. Having a bootable USB drive or CD I can run Windows tools from just comes in hand so often for task like malware/spyware removal, system recovery and harvesting locked files for pro bono pen-test purposes. Unfortunately, the Barts PE project has not been updated in awhile, and Windows XP is getting kind of long in the tooth, so I went looking for a replacement. For those wanting to build something a little newer, check out WinBuilder.
    06/21/2011 Mutillidae 2.0.8: More vulnerable web app fun
    Jeremy Druin has been at it again. :) New changes for Mutillidae 2.0.8 include:
    • Added more comments to the code to explain how defenses work
    • Added support for the <u></u> tag to the blog. In secure mode Mutillidae will allow this tag but still safely encode output and stop XSS.
    • Added JavaScript filtering to prevent single quotes from being entered in blog entries. This give practice bypassing JavaScript "security" and helps the user understand JavaScript cannot provide security.
    • Added lots of JS filtering to login.php. Nearly all characters are filtered. Users are encouraged to understand that JavaScript and filtering are useless for security.
    • Added autofocus to login.php and add-to-blog.php
    • Added more "allowed dangerous HTML tags" to the blog. Until now only the bold HTML tag was supported. Also the output was not HTML5 compliant. For example, if the user entered a bold tag, then a bold tag was output however the bold tag is depreciated. Styles must be used. So Mutillidae allows the user to input a bold tag but will correctly encode this as a sytle upon output. The italic tag is now supported as a dangerous input which is safely output without fear of Cross Site Scripting. These defenses only operate in secure mode of course. In insecure mode, the site allows any input and simply outputs whatever is input without any encoding.
    • Changed menu for OWASP A1 - Injection to differentiate between SQL, HTML, and Command Injection. This should make it more clear which pages exhibit vulnerabilities with the specific injecton sub-types. Also added new link for Blind SQL Injection.
    • Changed menu for OWASP A2 - Cross Site Scripting to differentiate between XSS coming in via user supplied fields (GET/POST) and values within HTTP Request Headers.
    • Added tutorials feature.
    • Added SQL Injection Totorial
    • Added Cross Site Scripting tutorial
    • Added Command Injection tutorial
    • Added new feature. Hints can now be at different levels. Each time the user clicks Hints, the level increases by 1 until rolling over.
    • Removed the installation instructions from the home page. A new page for instructions is created and linked from the menu.
    • Augmented the installation instructions to include running from Samurai, creating a custom ISO, installing to XAMPP, and running in virutal machines.
    • Reformatted install instructions and main home page to be compliant with HTML 5.
    06/10/2011

     

    Altruism: EFF Fund Raiser / Self-interest: Help the ISDPodcast Team win!
    Largely quoted from the ISD Podcast site:
    The ISD Podcast has entered entered into a contest to see who can raise the most money for the Electronic Frontier Foundation. For those who dont know, the EFF is a non-profit group of lawyers, policy analysts, activists, and technologists who fight for digital rights and have helped countless hackers and security researchers get out of hot water as well as exposing injustices caused by ignorant legislation and bad judgments. Please click the following link to donate to a vitally important cause:

    http://action.eff.org/site/TR/Contest/Advocacy?team_id=1730&pg=team&fr_id=1060

    Please help if you can.

    Obligatory Robert A. Heinlein/Lazarus Long quote:

    'If tempted by something that feels "altruistic," examine your motives and root out that self-deception. Then, if you still want to do it, wallow in it!'

    06/04/2011 Portable Boot Devices (USB/CD/DVD): Or in Canadian, what is this all aboot?      
    This is a talk I did on making bootable USB drives/CDs/DVDs for my local ISSA. Think of it as a braindump and starting point for making your own.
    05/31/2011 Konboot from a USB flash drive files and instructions updated
    People kept complaining because my old config did not work with newer versions of Unetbootin. Changed the syslinux.cfg file since Unetbootin now uses menu.c32 instead of vesamenu.c32. Also put in a newer chain.c32 and updated the instructions. Works fine with Win 7 SP1 32bit.
    05/23/2011

    OSInt, Cyberstalking, Footprinting and Recon: Getting to know you
    The following are videos from the Footprinting/OSInt/Recon/Cyberstalking class I did up in Fort Wayne Indiana for the Northeast Indiana Chapter of ISSA. I've split the class into three videos by subtopic, and included the text from the presentation for quick linking.

    DNS, Whois and Domain Tools
    Finding general Information about an organization via the web
    Anti-social networks
    Google Hacking
    Metadata
    Other odds and ends

    05/22/2011 Mutillidae 2.0.7: More vulnerable web app fun
    Jeremy Druin has been at it again. :) New changes for Mutillidae 2.0.7 include:
    • Added a new page rene-magritte.php to explore click-jacking. In secure mode, Mutillidae will send the X-FRAME-OPTIONS: DENY header. In modern browsers, this will cause the browser to throw an error rather than allow the page rene-magritte.php to be framed.
    • Added a resources link to the main menu. Links are to information or tools that can help with testing Mutillidae.
    • Added new class LogHandler to take over logging. Previously logging statements has to be copied to each spot that logging was needed. With the new class, logging requires only one line of code and the logger automatically logs based on the current security level. If in insecure mode, no attempt to stop XSS or SQLi is made. With the new class, many less lines of code are needed and many more places log. With more places logging, there is a much better chance of finding a log exploit and taking advantage (insecure mode). Logging added to pages: add-to-your-blog, dns-lookup, text-file-viewer, source-viewer.php, register.php, redirectandlog.php, and user-info.php
    • Added more default users to initial setup to give more targets.
    05/16/2011

     

    "Cyberstalking, Footprinting and Recon: Getting to know you" class in Fort Wayne, Saturday May 21, 2011 from 8:30 AM until 5 PM

    From the Northeast Indiana Chapter of ISSA: The workshop, entitled "Cyberstalking, Footprinting and Recon: Getting to know you" will be held on Saturday May 21, 2011 from 8:30 AM until 5 PM. Computers will be provided by Orthopedics NE and will be held at their location of 5050 N. Clinton St., Fort Wayne, IN 46825 ( http://tinyurl.com/43tqu7n ). Lunch will be provided by Splunk; designed to collect, index and harness the fast moving machine data generated by all your applications, servers and devices - physical, virtual and in the cloud. Search and analyze all your real-time and historical data from one place. A donation of $10 will be appreciated and passed on to the chapter charity; Toys for Tots. Do not bring cash. Make checks out to "TOYS FOR TOTS". We will also have membership information for anyone interested. This is an OPEN event to anyone in the community but we have a limited number of seats so please email an RSVP to me and I will send you a seat confirmation. Computers will be provided by ONE but feel free to bring your trusty laptop. Adrian will be working with Backtrack and we will have it loaded as a VM on your machine when you show up.

    05/15/2011 Videos from Central Ohio InfoSec Summit

    While I was at the Central Ohio InfoSec Summit I recorded Dave's and Tom's talks, as well as my own. Hope you enjoy them.

    Attacking and Defending Apple iOS Devices - Tom Eston
    http://www.spylogic.net

    Leveraging Social-Engineering in your INFOSEC Program - David Kennedy
    http://www.secmaniac.com

    Crude, Inconsistent Threat: Understanding Anonymous - Adrian Crenshaw

    05/11/2011 Mutillidae 2.0.6.1: Learn to hack vulnerable web apps
    Jeremy Druin has been busy doing lots of updates to the Mutillidae training package. Enjoy testing your web app pen-testing skills and tools against it.
    05/06/2011

     

    Update to Economics of Information Security Paper Reviews and Notes
    Awhile back I posted my write-ups and notes for the papers I've been reading in the "Economics of Information Security" class I'm enrolled in. I've now posted weeks 9 to 15. I'm guessing most of my readers won't get much out of them unless they have read, or plan to read, the same papers. Hell, they may not get much out of them even then, but I'm posting them. :)

    Also, I'll be speaking here next week in Columbus Ohio:
    http://infosecsummit.org/

    Looks like the event is sold out, but maybe I can convince them to let me record some talks. Dave Kennedy will also be there, and hopefully I'll have some Derbycon stickers for anyone that wants them.

    04/28/2011 Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking
    A general collection of resources that can help you profile someone before a pentest. If you have more high quality, low noise resources, please contact me. I'd eventually like to add some of the links to the Pentest Standard.
    04/27/2011 Derbycon Tickets On Sale This Friday (April 29th) at 12:01AM EST
    Title says it all. Here are some of our speakers: Scott Angelo, James Arlen (myrcurial), Paul Asadoorian (pauldotcom), Martin Bos (PureHate), Chris Buechler, Int0x80 Dual Core, Adrian Crenshaw (IronGeek), Elliott Cutright (Nullthreat), Thomas dOtreppe (Mister_X), Peter Van Eeckhoutte (corelanc0d3r), Tom Eston (agent0x0), Rick Farina (Zero_Chaos), Rob Fuller (mubix), Chris Gates (Carnal0wnage), Chris Hadnagy (loganWHD), Rick Hayes, Kevin Johnson (secureideas), Dave Kennedy (ReL1K), James Lee (egypt), Johnny Long, Rafal Los (WhiteRabbit), Kevin Mitnick, H.D Moore (hdm), Chris Nickerson, Jim OGorman (elwood), Deviant Ollam (TOOOL), Carlos Perez (darkoperator), Larry Pesce (haxorthematrix), Bruce Potter (gdead), Jason Scott, Ed Skoudis, Eric Smith (infosecmafia), John Strand, Jayson E. Street and Scott Ullrich.
    04/18/2011

     

    Funnypots and Skiddy Baiting: Screwing with those that screw with you - Notacon 2011
    This is the presentation I did for Notacon 2011. Honeypots might be ok for research, but they dont allow you to have fun at an attackers expense the same way funnypot and skiddy baiting does. In this talk Ill be covering techniques you can use to scar the psyche or to have fun at the expense of attackers or people invading your privacy. Sorry about the subpar sound, I had a bit of echo from where my camera was positioned.
    04/13/2011 Pauldotcom Podcast, Thursday April 14th, Derbycon and USB naughtiness
    On April 14th at 19:15 EDT (23:15 UTC) I and the other founders of Derbycon will be on the Pauldotcom podcast to talk about the conference. After that I'll be doing a tech segment about malicious USB devices. Hope you can tune in for the live stream.
    04/08/2011 Identifying the true IP/Network identity of I2P service hosts talk - Adrian Crenshaw, Blackhat DC 2011
    This is the talk I did at Blackhat DC 2011 about de-anonymizing I2P darknet services.
    04/02/2011 Computer Forensics & Electronic Discovery - Andy Cobb, PhD
    Recorded at the April 2011 Louisville ISSA meeting.
    03/28/2011 Crude, Inconsistent Threat: Understanding Anonymous
    Just a little something to help explain Anonymous to the media and other organizations. I'm working on a presentation for the Central Ohio Infosec Summit.
    03/24/2011 Mutillidae 2.0.1 Beta: A few little fixes
    Jeremy Druin and I have got a slightly newer version for you:
    • Replaced root relative links with local relative links to allow more freedom in root folder name
    • Added email address for Jeremy
    • Added change log to site
    • Added Toggle Hints into core menu but link disappears in secure mode
    • Added new failure to restrict URL access vuln
    03/23/2011 Mutillidae 2.0 Beta Posted
    Jeremy Druin, a professional developer (unlike me), added sooooooo many new features to the project. If you want to play around with web hacking techniques check out this deliberately vulnerable webapp. Jeremy has added a prettier interface, "completely hosed" and "more secure" modes, added the OWASP ESAPI API and tons of other features you can read about in the change log.
    03/21/2011

    Outerz0ne 2011 Hacker Con
    The following are videos of the presentations from the Outerzone 2011 hacker conference. Thanks to Skydog, Robin, Scott, SomeNinjaMaster and the Hacker Consortium crew for the con. Also thanks to Seeblind and others for doing AV. I'm looking forward to Skydogcon and working with the guys again at Derbycon.

    List:

    SkyDog - Opening Ceremonies/etc.
    SkyDog - The Modern Day Hacker
    IronGeek - Rendering Hacker Con Videos with AviSynth
    MadMex - Windows Command Line Incident Response
    HalfJack -Building your Own Green Home
    Beau Woods - What Companies and Vendors must know about securing mobile devices, mobile applications, access and data.
    Rick Hayes - Assessing and Pen-Testing IPv6 Networks
    Pure Hate - Why your password policy sucks
    Billy Hoffman - Advice on starting a start-up
    Contest Prize Giveaway, Awards, Closing Ceremonies

    03/14/2011 Network Sniffers Class for the Kentuckiana ISSA 2011
    We decided to put on another sniffers class. This time Gary Hampton joins me to impart his knowledge of using Wireshark to diagnose problems on wireless networks. I cover the usual suspects: TCPDump, Metasploit sniffing with Meterpreter, ARP Poisoning, Ettercap, Cain, NetworkMinor, Firesheep and Xplico.
    03/03/2011

     

    Infosec Daily Podcast Mailing List
    Hi all, as some of you know, I'm on the ISD Podcast every Thursday night. We also have a mailing list you can sign up for now. For those that wish to ask me pentest questions, you may be better off asking there as they have more experienced pentesters. You can check out the ISD live stream every weekday at 8PM EST if you don't want to wait for the MP3s. Connect to the #isdpodcast IRC channel on freenode to comment while we record.

    For other security podcasts I recommend, check out my security podcast feed aggregator.

    03/02/2011

     

    Economics of Information Security Paper Reviews and Notes
    These are my write-ups and notes for the papers I've been reading in the "Economics of Information Security" class I'm enrolled in. I'm guessing most of my readers won't get much out of them unless they have read, or plan to read, the same papers.

    Also, don't forget Outerz0ne (March 18-19, 2011 Atlanta, GA) is coming up!

    02/22/2011

     

    Talks from the AIDE Winter Meeting 2011

    Bill Gardner (@oncee) invited me out to Marshall University to speak and record videos at the AIDE Winter Meeting 2011. Below are the results.

    List:
      Opening Remarks & Security Enabler, Bill Gardner & Rob Dixon
      Where we at? A look at Information Security, David Kennedy (ReL1K)
      Radio Reconnaissance in Penetration Testing, Matt Neely
      Social Engineering In-Depth, Chris Criswell & Wayne Porter
      Penetration Testing - The Continuing Failures of an Industry, Keith Pachulski
      Blue team is sexy - refocusing on defense, Mick Douglas
      DDoS: Defending Against an Internet Mob, Kenneth Scott
      Cipherspace/Darknets: anonymizing private networks, Adrian Crenshaw
      Hackers Trail Mix, Elliott Cutright

    02/20/2011 Sniffers Class, March 12 2011
    Hello all, the Kentuckiana ISSA is sponsoring a class Gary Hampton and I will be putting on concerning network sniffers. We plan to cover Wireshark, as well as TCPdump, Cain, Ettercap, NetworkMiner and some others. The details are as follows:
    When:
    Saturday March 12, 2011 from 10:00 AM to 4:00 PM EST
    Where:
    Sullivan College of Technology & Design
    3901 Atkinson Square Drive
    Energy Technology Building auditorium Room ETB 6/7
    Louisville, KY 40218
    You need to register via this link. All you need to bring is your laptop, but be careful what you send across the class's network. :)
    02/20/2011 Unlock Indy Open Registration, March 19, 2011 4pm-8pm
    IndySec is putting on a charity event:
    "Unlock Indy is the 2011 IndySec charity event. In exchange for a $30 or more donation to the Hoosier Veterans' Assistance Foundation of Indiana (www.hvaf.org), participants will receive a seat in a class on defeating locks and security devices (lockpicking). Participants will get hands on practice in lock picking and bumping many common and not so common locks. A sponsor will be providing pizza and soda."

    Register

    Flyer

    02/08/2011 WiGLE WiFi Database to Google Earth Client for Wardrive Mapping Tool Updated
    Uploaded version 0.95 after Dippo pointed out the older version stopped working. Wigle.net changed the way I had to parse their data, so I had to fix IGiGLE so it worked again. Enjoy mapping your wardrives.
    02/01/2011 FireTalks from Shmoocon 2011
    Grecs and the folks at Shmoo were kind enough to let me record the FireTalks from Shmoocon 2011.

    Next up, see you at AIDE (Febuary 17-18, 2011 Huntington, WV) and Outerz0ne (March 18-19, 2011 Atlanta, GA)!

    01/27/2011 Plug and Prey: Malicious USB Devices
    A little paper I wrote for my masters in security informatics, and will present at Shmoocon 2011.

    Sections:

    1. Introduction
    2. Background
    2.1 USB mass storage containing malware
    2.2 U3 thumb drives with "evil" autorun payloads
    2.3 Why this paper will focus on the last two categories
    2.4 Hardware key loggers
    2.5 Programmable HID USB Keyboard Dongle Devices
    3. Locking down Windows and Linux against Malicious USB devices
    3.1 Locking down Windows Vista and Windows 7 against Malicious USB devices
    3.2 Locking down Linux using UDEV
    4. Tracking and scanning for malicious USB devices in Windows environments
    5. Possible extensions to the USB standards
    6. Conclusions
    01/26/2011

     

    Irongeek's streaming page for the FireTalks at Shmoocon
    I don't intend to stream often but for some special events, like the FireTalks at Shmoocon, I plan to have this feed up and running. It's obviously not up right at the moment but come check it out this weekend, 1/28/2011, 8:00 PM & 1/29/2011, 8:00 PM EST. Just bookmark it for later.
    01/23/2011

     

    Barcode Laser Emitter: Evil checks-out at a distance
    If you read my article "Barcode Fuzzer, Bruteforcer, SQL/XSS Injector using a flashing LED", or watched my video on the same subject, you know I've been playing around with barcodes. Now I have two new units to show off. The core code and device (Teensy 2.0) is the same in these units as the previous one, so please read the first article for the relevant details if you want to make one. This will be an entry in the Shmoocon 2011 Barcode Shmarcode contest.
    01/17/2011 Hosting Hidden Services in I2P: eepSites and SSH
    Here is another foray into Cipherspace. In this video I'll show how to get your eepSite up and running, along with pointing an HTTP tunnel to another web server besides the build in Jetty, and also how to host SSH inside of the I2P network. Before you watch this video, you may want to check out my videos on

    Installing I2P under Windows
    Installing I2P under Linux

    and you will want to read the article on application level de-anonymizing techniques that can be used against I2P hosted services for some background information.

    I apologize for it being somewhat meandering, I was doing the video largely off the cuff. Also be aware that "Hidden Services" is more of Tor's terminology for much the same concept, in I2P you set up "I2P Server Tunnels". I'll be talking about de-anonymizing I2P services in my Black Hat DC 2011 talk shortly.

    01/13/2011 HTC Evo Shift 4g (or any Android Phone) on Sprint SERO plans
    For those on SERO plans from Sprint, figured I'd relate this story. May help you figure out what you need to do if you want a new phone and are on an old plan. The phone itself I like, support is more of the issue. Seems that no mater what they tell you in chat, don't trust it. I was told I could keep my old plan, twice, but that was not the case. See link for the chat/email logs.
    01/12/2011 Windows 7: Copy A Modified User Profile Over The Default Profile page updated
    Thanks to Troy and Mikey for showing me a better way.
    01/10/2011 DerbyCon website is live!
    DerbyCon isn't just another security conference. We've taken the best elements from all of the conferences we've ever been to and put them into one. DerbyCon is a place you can call home, where you can meet each other, party, and learn. It's located in the heart of Louisville, Kentucky right on 4th Street Live at the Hyatt Regency.

    Our goal is create a fun environment where the security community can come together to share ideas and concepts. Conferences like this are where friendships as well as some of the best ideas are born. Even before we released the Call for Papers (CFP), our speaker list is full of some of the industry's best and brightest minds. Whether you know Linux, how to program, are established in security, or a hobbyist, the ideal of DerbyCon is to promote learning and strengthening the community.

    Tickets to this event are very limited - Registration begins Friday, April 29, 2011. Mark your calendar, tell your friends, and get ready for a new era in hacker cons - http://www.derbycon.com.
    01/10/2011 Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts
    This is the paper I will be presenting at Black Hat DC 2011. While it focuses on finding web servers hidden in the I2P darknet, the same ideas should be applicable to Tor and other privacy systems. The primary motivation for this project is to help secure the identity of I2P eepSite (web servers hidden in the I2P network) hosts by finding weaknesses in the implementation of these systems at higher application layers that can lead to their real IP or the identity of the administrator of a service being revealed. We also wish to find vulnerabilities that may lead to the anonymity set being greatly reduced, and compensate for them. Exposing these weaknesses will allow the administrators of I2P eepSite services to avoid these pitfalls when they implement their I2P web applications. A secondary objective would be to allow the identification of certain groups that law enforcement might be interested in locating, specifically pedophiles.
    01/08/2011 Installing the I2P darknet software in Linux
    This video is intended to get you started with the I2P darknet software under Linux (Ubuntu 10.10 in this case). I've done a previous version that details installing I2P under Windows. I2P (originally standing for Invisible Internet Project) can be seen as a networking layer sitting on top of IP that uses cryptography to keep messages confidential, and multiple peer to peer network tunnels for anonymity and plausible deniability. While Tor is focused more for hiding your identity while surfing the public Internet, I2P is geared more toward networking multiple I2P users together. While you can surf to the public Internet using one of the I2P out proxies, it's meant more for hiding the identity of the providers of services (for example eepSites), sort of like Tor's concept of Hidden Services, but much faster. Another advantage I2P has is NetDB, a distributed way to let peers know about each other once initial seeding has occurred. Tor on the other hand uses it's own directory to identify servers, which in theory could be more easily blocked. Both networks have their advantages and trade offs. This video won't cover the details of I2P's peering or encryption systems, and may seem kind of rambling, but it should be enough to get you up and running on the darknet.

    Welcome to Cipherspace.

    I'll be covering my work on de-anonymizing I2P services in my Black Hat DC 2011 talk.

    01/03/2011 Derbycon 2011 Teaser Video
    Dave Kennedy put together a teaser video for Derbycon. Blurb from Dave:

         About a year ago Adrian Crenshaw, Martin Bos, and myself were sitting around in Louisville and talking about one day creating one amazing hackercon. We never imagined it would have came to light, but it did. We are happy to announce that we have done some pre-selection of some speakers which we think you'll be impressed by. Our goal is to create a hackercon that is unique, top notch, and a place where we all come together as one and share. If any of you know us personally, you know that we steer clear from a persona of an elitist. We are all in this world we call security together and none of us are better than one another. All of us are learning everyday... DerbyCon is a con where we are all in it together, where you can approach anyone, share with anyone, and have a ton of fun doing it. Our official website launch with all the relevant information about the conference will be posted January 10, 2011 (sometime during the morning/afternoon). This teaser video was released to show you a taste of some of the speakers we have. It's truly inspirational to us that we have such a great speaker list already even before CFP has officially opened.

    A couple of important topics that we will leak ahead of time: The ticketing system will be straight forward, tickets will open officially to purchase April 29, 2011. The tickets will be $125.00 that weekend, and go up to $150.00 on that Monday until DerbyCon day. On the day itself tickets will be $175. I will admit there is limited spacing, we rented the entire second floor of the Hyatt and tickets will go fast.

    The second leak: The con will run from 9:00am to 5:00pm Friday and Saturday and Sunday from 9:00am until 3:00pm. There will be training provided at night from 5:30pm to 10:30pm after conference hours. We will also have BSIDES KY going on at the same time from 5:30pm to 10:30pm, so regardless if your in training or BSIDES, your covered.

    Sit back and relax and enjoy this 1 minute 47 second video of DerbyCon and some of the speakers and be sure to check out http://www.derbycon.com.

    01/03/2011 ARPFreezeNG: A tool for Windows to protect against ARP poisoning by setting up static ARP entries, now with a pretty GUI
    As many of you know, I've created quite a bit of content about ARP poisoning, such as:

    A Quick Intro to Sniffers
    Intro to ARP poisoning
    Using Cain to do a man in the middle attack by ARP poisoning

    I've even done some work on detection:

    Decaffeinatid: A Simple IDS/arpwatch for Windows
    Finding promiscuous and ARP poisoners and sniffers on your network with Ettercap

    This tool is for prevention. ARPFreezeNG lets you setup static ARP tables so that attackers (using Cain, Ettercap, Arpspoof or some other tool) can't pull off an ARP poisoning attack against you. It has the same core functionality as my older ARPFreeze script, but is easier to use since it utilizes a Treeview GUI.

    12/26/2010 Irongeek In Print Updated
    I've updated the page to reflect new references to my site in books.
    12/25/2010

     

    Privacy Papers Write-up
    I was enrolled in a privacy class for my masters degree recently. As part of this class we had to read a metric buttload of papers (but at least not an old English buttload) and then write a short review of each, trying to find at least three critical points we could make or at least points of interest. These are my write-ups (with a few spelling fixes) and links to the papers in question. Sometimes I may come off as overly critical, but we were asked to find perceived weak points. Sometimes I just did not understand what the author was trying to get at, either because of my lack of background or a lack of explaining. Mostly what you will get out of this page is me being a curmudgeon about academic papers vs. hackers/infosec practitioners. Enjoy, or don't. :)

    Low-Cost Traffic Analysis of Tor

    Crowds

    Tor: The Second-Generation Onion Router

    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms

    Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications

    Kademlia: A Peer-to-peer Information System Based on the XOR Metric

    Why Kad Lookup Fails

    ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies

    Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology

    SybilGuard: defending against sybil attacks via social networks

    SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks

    SybilInfer: Detecting Sybil Nodes using Social Networks

    The Ephemerizer: Making Data Disappear

    Vanish: Increasing Data Privacy with Self-Destructing Data

    Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs

    Privacy-preserving P2P data sharing with OneSwarm

    Drac An Architecture for Anonymous Low-Volume Communications

    Privacy Preserving Social Networking Over Untrusted Networks

    The Anatomy of a Large Scale Social Search Engine

    Anonymous Opinion Exchange over Untrusted Social Networks

    What Do People Ask Their Social Networks and Why A Survey Study of Status Message Q&A Behavior

    Ive Got Nothing to Hide" and Other Misunderstandings of Privacy

    Saving Facebook

    l-diversity: Privacy beyond k-anonymity

    Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing
     
    12/16/2010

    DOJOCON 2010 Videos
    First, thanks to Marcus Carey for inviting me out to DOJOCON. Be sure to check out the organizers http://www.dojocon.org/ and http://www.reversespace.com/ and donate to the cause if you like the event. Below are the videos from the conference, at least the ones I can show :), enjoy.

    Index:

    Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping
    John Strauchs, @strauchs: Security and IT Convergence
    Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in Information Security Work
    Jon McCoy: Ninja Patching .NET
    Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending Your Network using Nepenthes/Shaolin Tools
    Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn Your Victims
    Brian Baskin, @bbaskin: P2P Forensics
    Jonathan Abolins, @jabolins: Internationalized Domain Names & Investigations in the Networked World
    Deviant Ollam, @deviantollam: Don't Punch My Junk
    Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes
    Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap
    Ben Smith: Printer Exploitation
    Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?
    Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS Dead?
    Chris Nickerson, @indi303: The State of (In)Security
    Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk Professions
    Michael Smith, @rybolov: DDoS

    I think this is the fourth conference I've done videos like this for. I wonder if I should start offering a service where I help record/render videos for free if the conference can take care of travel and lodging for me? That would let me get to more hacker cons. :)

    12/02/2010 Mr. Irongeek goes to Washington
    Or at least the DC metro area. I'll be speaking at the following two conferences:

    DOJOCon, Dec 11-12th
    Thanks for the invite Marcus! More USB Maliciousness :)

    Black Hat DC, Jan 18-19th
    I2P Fun with identifying eepSites' real IPs

    As I mention on the Fed Watch page, I'd love to get some FBI/CIA/NSA/ETC hats or challenge coins.

    12/02/2010 Dirty Diffie-Hellman Calculator (Like dirty Santa, but geekier)
    A little Christmas game I came up with for my local ISSA's holiday get together. It illustrates how the Diffie-Hellman key exchange works, and has a calculator to help with the math.
    11/23/2010 Unallocated Space, A new Hackerspace in central Maryland
    A message from C-P:
    UAS, the newly formed Hackerspace in Severn Maryland, is now officially open. Located near the BWI Airport, UAS has officially opened its doors to hackers, tinkerers, makers, and all those who have that itch, that itch to understand and modify the world around us all. With a flexible membership structure, ample work and chill space,  Unallocated space strives to provide the best possible work and play environment possible. A detailed description of the space can be found at here: http://hackerspaces.org/wiki/Unallocated_Space
    An already successful fund-raising event is towards its end currently, if you would like to help support the space, please visit the Kickstarter page here:
    http://www.kickstarter.com/projects/1895459557/unallocated-space-a-new-hackerspace
    Founding members of the space include C-P of DC949, Jeff Yates, Nick Farr, Dave Marcus, ThePrez98, Marco Figueroa, and Kevin Figueroa.
    11/14/2010

     

    Security Podcast Feed Page Fixed and Updated
    Seems the 3rd party site I used to combine feeds failed, so I modified some of Matt's code to make it work. Current feeds include:
    Infosec Daily
    Pauldotcom
    SecurityJustice
    Securabit
    Exotic Liability
    Cyberspeak
    Forensic 4cast
    Social Engineer Podcast
    Cyber Jungle
    10/27/2010

     

    Hack3rcon 2010 Videos
    Here are the videos of the presentations from Hack3rcon 2010. If you like them, please consider donating to Hackers For Charity:
    http://Hackersforcharity.org
    Or at least send a thank you note to the sponsors:
    Platinum Sponsors: Tenacity Solutions
    Gold Sponsors: Enterasys Networks, e-Forensic Services
    Basic Sponsors: The304Geeks, CharCon, Trasher Engineering, Masters Lawfirm

    Intro with Rob Dixon and Johnny Long
    (in case you don't like the sync issue, there is just Johnny's part)

    Dennis Boas
    Distributed IPS - An in depth look

    http://enterasys.com

    Keith Pachulski & Brian Martin, Digital Trust, LLC.
    Physical Penetration Testing

    http://digitaltrustllc.com 
    http://keithpachulski.securitytactics.com 
    http://www.isdpodcast.com
     
    Zate Berg aka "Zate / MrUrbanity"
    Nessus Bridge for Metasploit


    Kenneth Scott a.k.a. pwrcycle
    tcpdump > wireshark

    http://cafecode.com/
     
    Martin Bos a.k.a. purehate
    The Weakest Link: Defeating passwords in 2010

    http://question-defense.com 

    Carlos Perez a.k.a Darkoperator
    Operating in the Shadows

    http://darkoperator.com/ 
    http://pauldotcom.com/ 
     
    Adrian Crenshaw a.k.a. Irongeek
    Taking a leak on the network: things intruders forget that could lead to their identity

     
    Joshua Perrymon CEO, Packetfocus
    Attacking outside the Box

    http://packetfocus.com 

    Dave Kennedy
    Hacking your perimeter.../The Social-Engineer Toolkit (SET)

    http://www.secmaniac.com/

    10/21/2010 Here is the 2nd round of Shoecon videos:

    Wi-Fi Basics for Geeks - How Wireless Really Works

    Advice on Starting a Startup with the ever caffeinated Billy Hoffman

    Economics of Security and Cybercrime with Beau Woods

    Recent Threat Landscape with Ben Feinstein

    Unfortunately, I've not been able to recover the live MP4 of Skydog's talk. I may post the file later to see if anyone else can figure a way to recover it. 

    10/19/2010 First round of Shoecon videos are done:

    Shoecon Intro with Rick and Scott, then some SSL Cert Wildcards fun with Karthik
     
    Hacking Green or Eco Conscious Stalking with Rick Hayes
     
    Physical Penetration Testing with Keith Pachulski and Brian Martin
     
    Building a barcode LED flasher, and why with Adrian Crenshaw
     
    High Speed Data services over RF with Brian Wilson

    Rest to come soon.

    10/18/2010

    Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?
    In this presentation I talk about the categories of malicious USB devices:

    USB Mass Storage containing malware
    U3 Thumb drives with "evil" autorun payloads
    Hardware key loggers
    Programmable HID USB Keyboard Dongle Devices

    along with detection and mitigation techniques involving GPO (Windows) and UDEV (Linux) settings. It was presented at Phreaknic 14.

    10/18/2010 Locating I2P services via Leaks on the Application Layer Project Proposal
    While at Phreaknic 14 I did a quick lightning talk on my project to test the anonymity provided by I2P. Mostly I'll be aiming at web server misconfigurations in eepSites. It starts getting fast at the end because I was running out of time (10 min is kind of short for the subject). Still, I hope it is a good intro to I2P, and my plans.
    10/10/2010

    Network King of the Hill Write-ups
    I thought this might be of interest to those of you who like hacker war games, and want to put on their own event. This contest happened at the Louisville Infosec 2010. Martin from Question-Defense and I are polishing it up and plan to run the same sort of NetKotH event at Hack3rcon.
    10/08/2010 Identifying the true IP/Network identity of I2P service hosts
    This is my project proposal for the "Advanced Topics in Privacy" class I'm in. Please share with me your thoughts and ideas. Or at the very least, try out I2P and see how you can use it alongside Tor.
    10/05/2010

     

    Adrian Hong: Hackers for Human Rights - HOPE 2010
    Great talk about human rights, and how hackers can help. Also, there is a bit about I2P at the end. Posted with Adrian Hong's permission. Us Adrian's have to stick together. :) Check out their respective sites:
    http://www.pegasusnk.org/ 
    http://www.i2p2.de/
    09/25/2010

    Beyond Nmap: Other network scanners
    This is a presentation I did for the Blugrass ISSA chapter. Tools covered, at least lightly, are: Nmap, Hping, UnicornScan,
    AutoScan, Netscan, Metasploit, NetworkMiner and of course BackTrack 4 R1. A few minor flubs, and one spot where I deleted a demo fail. :)
    09/25/2010 Defcon 18 Videos Torrent
    Awhile back I found out via DC404 that the Defcon 18 videos had been leaked onto http://good.net/dl/bd/. Good.net is kind of a pain since the downloads are slow, and you can only grab two at a time with a free account.  Seems now someone has put up a torrent. It's out there in the search engines, but most Torrent sites are so spammy that I decided to just mirror the Defcon 18 Torrent file. There is also a magnet link:
    magnet:?xt=urn:btih:Q6AJNTOWUKEQ4V5BV7WFDW4DFA6LY32S
    Enjoy
    09/16/2010

    Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device (Defcon 18)
    The Programmable HID USB Keystroke Dongle (PHUKD) is a small device based around the Teensy microcontroller development board. It allows users to program in keystrokes and mouse macros that can execute when the device is plugged in, after a set time, or when certain environmental conditions are met (light, noise, temperature, etc.) This device can be used as a replacement for a U3 hacksaw, as a device left behind to execute commands when someone with elevated privileges is likely to be logged in, or give as a Trojan device to unsuspecting targets. Much pwnage should ensue.

    I've added my Defcon video to the bottom of the Videos and Pictures section of the PHUKD article.

    Also checkout the "PowerShell OMFG Video" Dave Kennedy and Josh Kelley (winfang) did at Defcon 18

    http://www.secmaniac.com/august-2010/powershell_omfg/

    they used PHUKD devices for part of it.

    08/30/2010

     

    Password Exploitation Class Videos Posted
    This is a class we gave for the Kentuckiana ISSA on the the subject of password exploitation. The Password Exploitation Class was put on as a charity event for the Matthew Shoemaker Memorial Fund ( http://www.shoecon.org/ ). The speakers were Dakykilla, Purehate_ and myself. This is sort of the first Question-Defense / Irongeek joint video. Lots of password finding and crack topics were covered: Hashcat, OCLHashcat, Cain, SAMDump2, Nir's Password Recovery Tools, Password Renew, Backtrack 4 R1, UBCD4Win and much more. About 4.5 hours of content.
    08/24/2010 Louisville Infosec, Discount code information was wrong
    I was sent the wrong blurb, the discount is for $30 off, not $50. Sorry.
    08/24/2010

     

    Louisville Infosec, Oct 7th 2010

    I posted yesterday about it, but Fritz asked me to point out the discount code one more time:

    You have one week left to take advantage of the 50% 29.30303031% discount for all IronGeek Visitors! IronGeek visitors can purchase a ticket for $49 $69 before September 1, 2010. After this date all tickets will be $99 until the conference is sold out.

    We have an excellent technical track this year - Dave Kennedy, Adrian Crenshaw, Nathan Hamiel, Jeremiah Grossman, Tom Cross from IBM X-Force. See more at http://www.louisvilleinfosec.com/

    Here are the terms:

    Register before September 1, 2010 at http://www.regonline.com/2010_lmic
    Select the registration type - IronGeek Discount
    Enter the code IGK-0726

    Also, shout outs to LVL1,  the Louisville Hacker space. Brad and crew put on a great "Beyond Arduino" class, teaching the basics of programming directly to an AVR. Fun stuff, which I plan to use in the near future for some embedded device hacking projects.

    08/23/2010

    Shoecon and other events
    Looks like the next two months will be pretty busy for me.

    Aug 28th 2010: I have the Local Password Exploitation Class, 20 seats left last I checked. Details in the post I made on the 14th of Aug.

    Sept 18th 2010: Shoecon will be happening. I will be speaking, along with Rick Hayes, Keith Pachulski, Karthik Rangarajan, Brian Wilson, Stan Brooks, SkyDog, Scott Moulton, and Ben Feinstein. This is a donation driven event where all the proceeds will go to the Shoemaker Memorial Care Fund. Topic for me will be making a Barcode Fuzzer, Bruteforcer, SQL/XSS Injector using a flashing LED.

    Sept 24th 2010: I'll be speaking at the Bluegrass Chapter of the ISSA on my favorite network scanners.

    Oct 7th 2010: Louisville Infosec. My topic will be Malicious USB devices. Be sure to check out my friends Nathan Hamiel, Dave Kennedy, Deral Heiland and Matt Neely talks as well. I also plan to run a "network king of the hill" event.

    Oct 15th-17th: I'll be speaking at Phreaknic in Nashville.

    Oct 23rd-24th: I'll be at Hack3rcon in Charleston WV, with my buddies Purehate and Dave Kennedy.

    08/14/2010

     

    Local Password Exploitation Class
         The Kentuckiana ISSA will be putting on class on Aug 28th 2010 from 10am to 4:30pm at the Jeffersonville Public Library. The class will cover the details of pulling passwords/hashes that are stored on a box where the attacker has physical access to the system, or via network vulnerabilities that can reveal the password/hash. Topics to be covered:
    • Pulling stored passwords from web browsers/IM clients and other apps
    • Hash cracking of Windows passwords, as well as other systems
    • Sniffing plain text passwords off the network
    • How passwords on one box can be used to worm though other hosts on a network

         Seating is limited to 50 people. The class is being held as a charity event for the Matthew Shoemaker Memorial Care Fund. Matthew was a fellow security professional and podcaster who left behind two children, His colleagues have set up an account to help support his two children. Donations can be made to the Shoemaker Memorial Care Fund at The Peoples Bank, P.O. Box 788, Winder, GA 30680. Checks can either be mailed directly or transfers via telephone (770) 867-9111. Please place the account 00133835 on the check. A PayPal account has been established and you can find on the right hand side of this ISD page (http://www.isdpodcast.com/goodbye-farewall-god-bless/). Please show your receipt for donation of at least $10 at the door.

    You can must register at the following URL:
    https://events.constantcontact.com/register/eventReg?oeidk=a07e2znbzbs77edf8b6&oseq=

    Also, I'd like to mention Shoecon, a one day event in Atlanta on Sept 18th. I'll plan to make a larger posting about it later.

    08/09/2010 Barcode Fuzzer, Bruteforcer, SQL/XSS Injector using a flashing LED
    It's not a full function app exactly, but it may be useful to some of my readers as a framework when testing systems that use barcodes as input. This is a hardware/software implementation of the ideas I mentioned in my article "XSS, SQL Injection and Fuzzing Barcode Cheat Sheet". Essentially, this code lets you flash an LED connected to a Teensy/Arduino in the right sequences for most barcode readers to scan. Now we have an easier way to do some of the things Mick and I had been talking about. I tried to make a video to show it off better, but by myself the camera moved too much. :) When I can get an E-book reader (Nook or Kindle) I plan to make a more reliable E-Ink display using version.

    As a side note, I'm looking forward to Derbycon, even if it is more than a year away.

    08/08/2010

     

    The Louisville Metro InfoSec Conference
    Thursday, October 7th, 2010 at Churchill Downs ( http://www.louisvilleinfosec.com ).
    Use the Discount Code: IGK-0726 when you register for $30 off the $99 ticket price ($69), until Sept. 1st. This discount will expire on that date.

    I'll be speaking there, running a "Network King of the Hill" and a Forensics challenge.

    08/04/2010 Shoemaker Memorial Care Fund
    Yesterday I mentioned the passing of Matthew Shoemaker. His friends have set up an account to help support his two children. Donations can be made to the Shoemaker Memorial Care Fund at The Peoples Bank, P.O. Box 788, Winder, GA 30680. Checks can either be mailed directly or transfers via telephone (770) 867-9111. Please place the account 00133835 on the check. Rick has set up a PayPal link, which you can find on the right hand side of this ISD page.

    There are also plans to set up some charity classes.

    08/03/2010

     

    Post Defcon 18 Updates
    First, I regret to inform you of the death of my friend and fellow ISDPodcaster Matthew Shoemaker. Rick has made a post with information on how donations can be made to help Matthew's children.

    I've added my Defcon Slides to the bottom of the Videos and Pictures section of the PHUKD article.

    Monta Elkins gave a presentation as well using an RF transmitter to activate the Teensy.

    Dave Kennedy and Josh Kelley also gave a Powershell talk that did some more advanced things with the PHUKD concept.

    07/14/2010 Setting up the Teensy/Teensyduino Arduino Environment
    This video will show you the basics of setting up the Teensyduino environment in Windows so you can start developing PHUKD devices.
    07/12/2010 Mutillidae/Samurai WTF/OWASP Top 10
    This is a presentation I did at the Kentuckiana ISSA and then again at the Ohio Security Forum on Mutillidae/Samurai WTF/OWASP Top 10. I chose to post the Ohio version of the video as I think it came out better, but the slides are the same. Plenty of information on XSS (Cross Site Scripting), CSRF (Cross Site Request Forgery) and SQL/Command Injection.
    07/02/2010

     

    Locking down Windows Vista and Windows 7 against Malicious USB devices
    In this article I go into a lot of details about blocking malicious USB devices, like the PHUKD. I plan to present such material at the upcoming Louisville Infosec. Speaking of which:

    The Louisville Metro InfoSec Conference
    Thursday October 7th, 2010
    at Churchill Downs!
    http://www.louisvilleinfosec.com/
    Registrations between now and July 16th, 2010 receive a
    50% DISCOUNT on the $99 ticket price!

    After July 16th the ticket price will go back to normal.

    Current speakers include: Marcus J. Ranum, Dave Kennedy, Rafal Los, Jeremiah Grossman and myself.

    06/29/2010 Update to the programmable HID project
    I've updated the PHUKD Library to 0.2.
    The main changes are that I've added two functions for the Gnome desktop under Linux:

    ShrinkCurWinGnome()
    CommandAtRunBarGnome(char *SomeCommand)

    you may also see something about OS X, but it does not work. Can anyone tell me a run bar equivalent that works in OS X?

    I've also changed the library so that it goes in the normal libraries folder, and not the same folder as your sketch.

    06/24/2010

     

    Ligatt / Gregory D. Evans Videos
    It should be noted, I did not create these videos, my buddy Rick from the ISDPodcast did (at least the first two). Still, they are worth sharing.
    I have some links below if you want more info on the Ligatt / Gregory D. Evans controversy that has been going around. If nothing else, it will help with people researching the person/company:
     
     Ligatt / Gregory D. Evans Fun Charlatan Entry at Attrition.org

     Follow all the Ligatt fun on Twitter

     The Register has a good writeup on Ligatt / Gregory D. Evans

     This is probably the most concise writeup on Ligatt / Gregory D. Evans

     If you want to read the book "How To Become The Worlds No. 1 Hacker" for yourself, but you don't want to pay Ligatt for plagiarizing, grab the PDF at this link

    06/16/2010 Mutillidae Vulnerable Web App Updated, ver 1.5
    I changed it so that now, by default, Mutillidae only allows access from localhost (127.*.*.*), assuming the .htaccess file I've written is honored. Thanks for the suggestion Kevin. I've also made the install instructions somewhat better.

    In other news, I'll be speaking about Mutillidae at the following two events:
    Kentuckiana ISSA July Meeting July 9th from 11:30 AM to 1:00 PM
    Ohio Information Security Forum Anniversary Event July 10th, 2010 8:30AM-5:30PM

    Both are free to the public, but you have to RSVP.

    06/03/2010 PHUKD Project Page Updated
    I've updated the Programmable HID USB Keyboard Dongle project page with:

    More pics of newer units.
    A video of the trojaned color changing mouse.
    A PHUKD Arduino library to help developers.
    I've also made a bunch of anchor tags to help in navigating to the part you want.

    As a side note, I'll be speaking about the PHUKD project at Defcon! Thanks to Paul for the help with the hardware, the Kentuckian ISSA for helping to get me to Defcon, and Tenacity Solutions for their support on this project.

    05/13/2010

     

    Metasploit Class Videos
    On May 8th 2010 the Kentuckiana ISSA held a 7 hour Metasploit class at the Brown hotel in Louisville Ky.  Proceeds from the class went to the Hackers For Charity Food for Work program. The instructors were David "ReL1K" Kennedy, Martin "PureHate" Bos, Elliott "Nullthreat" Cutright, Pwrcycle and Adrian "Irongeek" Crenshaw. Below are the videos of the event. I hope you enjoy them, and if you do please consider donating to Johnny Longs' organization. This should be more Metasploit than you can stand!
    05/09/2010 Steganographic Command and Control: Building a communication channel that withstands hostile scrutiny
    This is the final report I wrote for the Malware class I'm in.
    05/06/2010

     

    WHAS 11 Webcam Exploit
    This is a segment I did an interview for. They took very little of what I said, and played up the voyeur aspect (I told them webcams were not that big a worry, but drive by bot installs were).
    04/29/2010 Mutillidae Updated for OWASP Top 10 of 2010
    I made some changes to Mutillidae (version 1.4) to make it compliant with the 2010 version of the OWASP Top 10. I also added some modules, and fixed a bug I must have introduced at some point that keeps the user from inserting a single quote into their blog.
    04/19/2010 Notacon Anti-Forensics Slides Posted
    I put up the slides from my Notacon talk on the same page as the longer version of the Anti-forensics/Occult Computing talk. Hope to have the video up later.
    04/15/2010 Office XML Steganography Tool
    This is some relatively crappy code I wrote to hide files inside of Microsoft Office 2007 (and I hope 2010, though I have yet to test) docs (DOCX, XLSX, PPTX, etc). Since the newer Office docs are basically just zip files containing XML and resources, it's fairly easy.
    04/07/2010 Louisville Metro Metasploit Class - May 8th 2010
    The Kentuckiana ISSA will be putting on a 6.5 hour Metasploit class on May 8th 2010 from 10am to 4:30pm at the Jeffersonville Public Library.

    Instructors include:
    David "ReL1K" Kennedy
    Martin "PureHate" Bos
    Elliott "Nullthreat" Cutright
    pwrcycle
    Adrian "Irongeek" Crenshaw

    The class is being held for charity, so it's not quite free, but all we ask is that you donate $10 to the Hackers For Charity Kenya food for work program. More details are available at the link above.

    04/01/2010

     

    P.H.U.K.D. Device Project Page Updated
    I've updated my Programmable HID USB Keyboard Dongle project page with:

    Photos of a soldered, heat shrink packaged, thumbdrive sized unit.
    Code example that demonstrates timer delays and using the light sensor.
    Code for doing quick diagnostics on the PHUKED unit to see which pins are connected and what the analog pin reads.
    Added a comment about being able to use the 8 position DIP switch to choose from 256 different options. 

    Hope you find the updates useful.

    In other news, Scott Moulton still has open seats for his Forensics & Data Recovery class in Washington DC class April 12-16th.

    You may remember Scott from some of his presentations that I've posted to my site:

    At Least TEN things you didn't know about your hard drive!
    Reassembling RAID by SIGHT and SOUND!
    Advanced Data Recovery Forensics

    I've not taken his class yet, but I've heard great things and know that his talks at conferences are awesome. If you have money in your training budget, this class would be a good place to spend it.

    03/28/2010

     

    Outerz0ne 2010 Videos
    The following are videos of the presentations from the Outerzone 2010 hacker conference. Thanks to Skydog, Robin, Scott, SomeNinjaMaster and the Hacker Consortium crew for the con. Also thanks to Karlo, Keith, and Seeblind for doing AV. I'm looking forward to Skydogcon.
    03/23/2010 Programmable HID USB Keystroke Dongle: Using the Teensy as a pen-testing device
    The Programmable HID USB Keystroke Dongle (PHUKD for short) is kind of like a U3 thumbdrive alternative, but with sensor and timer abilities. Read the article, and I think you will see the potential of the project.
    03/08/2010 Security Podcasts Page Updated
    I've updated my security podcast page to include the Social-Engineer.org Podcast. Also, there's real info up on the Outerz0ne conference website now. It's March 19th-20th 2010 in Atlanta, GA. Hope to see some of you there.
    03/06/2010 Attacking and Defending WPA Enterprise Networks - Matt Neely
    Matt Neely of SecureState came to the March Kentuckiana ISSA meeting and gave a great presentation on securing and hacking WPA Enterprise networks. If you are confused by the acronym soup of "EAP-TLS, EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, PEAP-TLS" and which are the better options, this may be the video for you. Also, go check out the podcast Matt's on, Security Justice, it's one of the security/hacking podcasts I regularly listen to.
    03/04/2010 InfoSec Daily Podcast Episode 80
    Episode 80 of the ISD Podcast is up. Besides current vulnerabilities of interest and news topics, Rick, Matthew and I discussed text based steganography. Which reminds me, I need to update the code a little to fix some typos. :)
    03/01/2010

     

    Steganography: The art of hiding stuff in stuff so others don't find your stuff
    This is a presentation I was working on for the malware class I'm enrolled in. For some reason my voice was cracking while recording it, but I guess it was good practice for the live version I'll do tomorrow. Besides just an introduction to Steganography, I'll also talk a little about my SnarlBot project that will attempt to use stego in a command and control channel.
    02/24/2010 Unicode and LSB Steganography program examples
    I wrote these Autoit3 code examples to illustrate some of the ways that steganography (hiding data in other data, or as I like to call it "hiding your stuff in other stuff so people can't find your stuff") can be done. These sorts of techniques can be of great use in passing messages without others knowing, in anti-forensics activities, or as covert command and control channels for botnets (as I plan to study for my final project in the malware class I'm enrolled in).

    Other items: I'll be at Outerz0ne 2010 in Atlanta. Also, tomorrow night I should be on the InfoSec Daily Podcast with an update to my ZipIt Z2 project.

    02/22/2010 Side-Track: Security/Pen-testing distribution of Linux for the ZipIt Z2
    Ok, I've got it working, and for those who have a ZipIt Z2 I'd love for you to test it. It's based on the RootnNxus userland, and includes the following additional packages: cron curl driftnet dsniff etherape ettercap hping3 locate man netcat netdiscover netwox ngrep nikto nmap ntp openssh-server perl ptunnel python rdesktop ruby samba-tools samba4-clients secure-delete socat sqlmap tcpdump tcpreplay tcpxtract traceroute w3af w3af-console wget whois zenmap. I've also tweaked some of the scripts, and put a newer wireless firmware on it.
    02/10/2010 FireTalks from Shmoocon 2010
    Grecs and the folks at Shmoo were kind enough to let me record the FireTalks from Shmoocon 2010. Here you will find the presentations of David “ReL1K” Kennedy, Michael “theprez98″ Schearer, Marcus J. Carey, Adrian “IronGeek” Crenshaw, Nicholas “aricon” Berthaume, Zero Chaos, Benny "security4all" and Christian “cmlh” Heinrich.
    02/04/2010

    I'll be at Shmoocon tomorrow, may have a live stream up some of the time
    Don't know if I'll be able to manage it, but I may be streaming some of my activities from Shmoocon using WebCamStudio for Linux. If I can, you will see it below (or on the Irongeek.com site if you read this via RSS):
    Stream no longer active
    02/03/2010 XSS, SQL Injection and Fuzzing Barcode Cheat Sheet Updated
    I've added the ability to use any lower ASCII character you wish, you just have to know its decimal equivalent. I've also constructed and ASCII barcode chart that should help. Let me know if you figure out how to type Ctrl-Alt-Del with your keyboard wedge. :)

    Side note, tomorrow night I'll be on the ISD Podcast, episode 61. See you at Shmoocon.

    01/30/2010 Video:When Web 2.0 Attacks - Rafal Los
    Recorded at: Louisville OWASP Chapter - Fourth Meeting, Friday January 29th, 2010
    Speaker: Rafal Los will be discussing Flash and Web 2.0 security

    I used the same rig I hope to use for recording the Fireside talks at Shmoocon.

    01/28/2010 Infosec Daily Podcast Episode 56
    We are recording tonight, so it should be up by the morning. This time the tech segment will be on the recent bar code hacking project, which at Mick's suggestion now has XSS/SQL Injection for QR 2d bar codes.
    01/28/2010 XSS, SQL Injection and Fuzzing Barcode Cheat Sheet
    I was listening to an episode of Pauldotcom, and Mick mentioned something about attacks on systems via barcode. Because of the nature of barcodes, developers may not be expecting attacks from that vector and thus dont sanitize their inputs properly. I had previously written "XSS, Command and SQL Injection vectors: Beyond the Form" so this was right up my alley. I constructed this page that lets you make barcodes in Code 93, Code 39, Code 39ext and Code 128A, B and C.
    01/25/2010 Botnets Presentation For Malware Class
    I have to present two papers for my malware class, so I figure I'd share my practice video with my readers. Slides are available in PDF and PPTX forms.
    01/21/2010 Infosec Daily Podcast Episode 51
    We are recording tonight, so it should be up by the morning. This time the tech segment will be on Tracking users, malware and data leaks via the USB serial numbers on flash drives, smart phones and MP3 players.
    01/19/2010

     

    Setting up the HoneyBOT HoneyPot
    HoneyPots are hosts meant to be attacked either to distract the attackers or to research their techniques. This video will cover setting up a simple HoneyPot in Windows using an application called HoneyBOT. I'll also talk a little about capturing a pcap file with dumpcap for later analysis.
    01/12/2010

     

    Sitting in on Infosec Daily Podcast Episode 44
    We are recording tonight, so it should be up by the morning. They are letting me do a tech segment on setting up an Ethernet bridge in Linux and network bridging in Windows. Also, I hope we will cover a bit about Google's reaction to China's attacks on human rights activist's Google accounts.
    01/09/2010 Speaking at the Shmoocon FireTalks
    My presentation was not accepted for the normal Shmoocon talks, but I will be doing a much shortened version for the FireTalks at Shmoo. For those wondering what I'll be talking about:

    Title: Funnypots and Skiddy Baiting
    Desciption: Ever wanted to screw with those that screw with you? Honeypots might be ok for research, but they dont allow you to have fun at an attackers expense the same way funnypot and skiddy baiting does. In this talk Ill be covering techniques you can use to scar the psyche or to have fun at the expense of attackers or people invading your privacy. Some of the topics to be covered are: Fun with DNS and Loopback, SWATing for Packets, Lemonwipe your drive, Robots.txt trolling, And more

    I think there are still some slots open for Firetalks, so please submit something on the site linked to above if you have an idea. Grecs gave me the go ahead to record the short FireTalks at Shmoocon 2010. I've been messing around with AVISynth, and I plan to use it to make the Fireside talks look somewhat professional,  like the ones Defcon releases. I re-encoded my "Bulilding a Hacklab" video to test out how well the script would work, here are the results. Let me know what you think.

    01/05/2010 New Text Article: Tracking users, malware and data leaks via the USB serial numbers on flash drives, smart phones and MP3 players
    In this article I talk about using the USB serial number some devices have for security and forensics purposes. By the way, I'm starting to use Twitter more, so feel free to follow me: @Irongeek_ADC
    01/01/2010

     

    WiGLE WiFi Database to Google Earth Client for Wardrive Mapping Tool Updated
    Uploaded version 0.90. Once again, Wigle.net changed the way I had to query their database, so I had to fix IGiGLE so it worked again. I also changed how I got the zip code to lat/long to work. It may also now work with NAC, UTM or a Great Britain telephone area code, but this needs more testing so please let me know.
    12/29/2009 Ethernet bridge in Ubuntu Linux video updated
    I fixed the sound and frame size in the video I posted this morning.

    As a side thing, check out Webcam Studio For GNU/Linux (WS4GL). I'm hoping as it matures I'll be able to use it as a poorman's tri-caster when I record/stream presentations at hacker cons. The live picture in picture or split screen is an awesome feature. Toss Patrick Balleux some cash to encourage further development.

    12/29/2009

     

    Setting up an Ethernet bridge in Ubuntu Linux
    In a previous video, I showed how to set up an Ethernet bridge in Windows XP. This is very useful for sniffing traffic leaving your LAN for the purposes of IDS (Intrusion Detection System), network monitoring, statistics or just plain snooping. In this video, I cover setting up an Ethernet bridge in Linux. Other tools used in this video include Wireshark, TCPDump, Etherape and Driftnet.
    12/27/2009 Need a ride to Shmoocon? See this blog
    As I've wrote before, I'm going to Shmoocon 2010. I've got my travel arrangements taken care of, but I know others have not. For those looking to ride share, check out this blog Mubix put up and find yourself a ride.
    12/25/2009 Xmas scan with Nmap
    Happy Hacking for the Holidays. I felt like making a gimmick video for the occasion. :)
    12/24/2009

     

    Ethics of full disclosure concerning security vulnerabilities
    Hopefully this article will be helpful to some student out there.

    As a side note, a friend from the Pauldotcom mailing list says he will let me crash with him for Shmoocon, but it's about 40min away from the con. If anyone will let me crash in their hotel room for cheap please let me know. :)

    12/22/2009

     

    Ethical Analysis of Network Neutrality
    This is an article I wrote for a class a few months back. It's not exactly security related, but it may help some students understand the concepts.

    As a side note, looks like I'm going to Shmoocon, though unfortunately my talk was not accepted (Skiddy Baiting and Funny Pots). For the record, I'll speak at pretty much any conference that's willing to give me a space to stay and pay for my way there (I'm like a security hobo). If anyone feels like helping me with the travel expenses to Shmoocon, please donate using the link at the top of my site :).

    12/18/2009 SANS 504 Class in Bowling Green KY
    Chris Sanders wrote to let me know SANS will be putting on a "Hacker Techniques, Exploits & Incident Handling" class in my neck of the woods. Figured I'd let the local folks know.
    12/14/2009 InfoSec Daily Podcast Episode 27
    I sat in with the guys over at the InfoSec Daily Podcast and talked shop. Go check out the episode. I've also added them to my security podcast list. Enjoy.
    12/13/2009

    IndySec Metasploit Class Videos
    When Steve invited me up to Indianapolis to help with a Metasploit class I jumped at the opportunity.   We had a good time and IndySec puts on a great event. They let me record the talks, unfortunately I was testing out a new video rig and the audio failed on the first three parts (Intro/Welcome, Network Setup, Getting started with Metasploit). The rig worked great for the Social Engineering, Meterpreter and SQL Pwnage/Fast Track sections. My presentation was just a rehash of the video I put up last week on msfpayload/msfencoder/metasploit 3.3 so I decided not to post it on this page.

    If you find these videos useful, consider going to the Metasploit Unleashed page and donating to the Hackers For Charity Kenya food for work program, or come to the next IndySec event. For best viewing, I recommend downloading the MP4 files below.

    12/04/2009 Using msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus
    This subject has been covered before, but why not once more? Metasploit 3.3 adds some new options, and better Windows support. As stated in the title, this video will cover using msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus. I will also talk a little about using CWSandbox and VirusTotal to examine malware. If you find this video useful, consider going to the Metasploit Unleashed page and donating to the Hackers For Charity Kenya food for work program, or come to the IndySec charity event. By the way, I've put out two versions of this video, one an SWF and the other a streaming video. Please let me know which you prefer.
    12/01/2009

     

    Using FOCA to collect Metadata about an organization
    Applications can add all sorts of data into the documents they create or edit. DOC, PDF, XLS and other file types can contain all sorts of extra data, like usernames, network paths, printers and application version numbers. This sort of information is great for doing initial research about an organization before doing a pen-test. This video with cover using FOCA, pointing it at a domain name, and grabbing metadata from doc, ppt, pps, xls, docx, pptx, ppsx, xlsx, sxw, sxc, sxi, odt, ods, odg, odp, pdf and wpd files.
    11/30/2009 IndySec Metasploit Unleashed Charity Event
    For those in the Indiana area, the IndySec group in Indianapolis is having a Metasploit Unleashed Charity Event. Details can be found at:

    http://indysec.blogspot.com/

    Here are the core details:
    When: December 12th from 1:00 PM to 5:00 PM
    How much: $30.00 all donated to Hackers for Charity food program
    Where: BlueLock, 6325 Morenci Trail, Indianapolis, IN
    What to bring: A laptop with Backtrack or the MSF installed.

    To register, and for more details on what to bring, check out their site.
    11/23/2009 Baby Bubba Zombie Children's Book
    It's Thanksgiving time again, and that means zombies, at least to me. My zombiefest tradition started sometime around 2000. Theres just something about a family sitting around a table, eviscerating a turkey and then stumbling around in a tryptophan induced stupor that makes me think of the walking dead. For those that don't know me in person, and can't be at the fest, I thought I would share some zombie goodness with you. First, there is the Zombie children's book Pascalle and I created. I made a narrated video of it that I hope you will enjoy. Also, there is the WinZombies application. It's like XPenguins/WinPenguins, except instead of arctic fowls it creates little undead minions that walk around your desktop. 

    Now, on to security related happenings. A few weeks ago I posted my video on Building a Hacklab. The guys over at Pauldotcom did a tech section about the same topic in episode 176, so go check it out. They point out Exploit-db as a replacement for Milw0rm. I'd also like to point out that VMPlayer now lets you create VMs without having to use 3rd party applications. I said in the presentation that it didn't, but the newly released version supports this functionality.

    And finally, while you are enjoying your turkey, go check out http://www.social-engineer.org . I'm reading through their framework right now, and am enjoying it quite a lot.
    11/7/2009

    Building a Hacklab, and a little about the Louisville CTF event
    This is a presentation I gave for the local Louisville ISSA. I took this as an opportunity to learn a bit about AVISynth and do a split screen video. Thanks to Gary for being my camera man.

    11/6/2009 DoJoCon Live Stream 2009
    This is pretty neat. They are streaming the talks. Check it out today (Nov 6th) and tomorrow. 
    11/2/2009

     

    Darknets: anonymizing private networks talk from Phreaknic (Networks covered include Tor, Freenet, AnoNet/DarkNET Conglomeration and I2P)
    This is a quick and dirty version of my Darknets talk from Phreaknic 2009, I hope to have a better version up soon. It covers the the basics of semi-anonymous networks, their use (political dissidence, file sharing, gaming and pr0n), how they were developed and what they mean to organizations. The main focus will be on the Tor, I2P, Freenet and anoNet Darknets, their uses and weaknesses.
    10/29/2009

     

    Louisville Infosec 2009 Videos
    The videos are up, the title link takes you to the index but here are the individual videos:

    Insider Attacks: The How's, Why's, and What to Do's Dr. Eugene Schultz Louisville Infosec Conference Video

    The Internet is Evil John Strand Louisville Infosec Conference Video

    The Seven Habits of a Successful Information Security Career Manager Lee Kushner Louisville Infosec Conference Video

    Attacking SSL PKI Mike Zusman Louisville Infosec Conference Video

    Blocking the Covert Channels Used for Malicious Data Theft Alex Lanstein Louisville Infosec Conference Video

    Darknets: Fun and games with anonymizing private networks Adrian Crenshaw Louisville Infosec Conference Video

    Compliance Strategy and Planning - Building an Effective Application Security Program John Pavone Louisville Infosec Conference Video

    SAS 70 Compliance Auditing Rick Taylor Louisville Infosec Conference Video

    Virtualizing the Security Architecture: Defending Virtual Servers and Applications Jason Wessel Louisville Infosec Conference Video 

    Bob's Great Adventure: Attacking & Defending Web Applications Paul Asadoorian Louisville Infosec Conference Video 

    Advanced Data Recovery Forensic Scott Moulton Louisville Infosec Conference Video 

    Blending business and technical benefits together to achieve an effective and streamlined compliance assessment. Jim Czerwonka and Jimmy Noll Louisville Infosec Conference Video 

    Thanks to Lee Pfeiffer and the student volunteers for handling the video the day of the conference, and Brian Blankenship for editing the videos.

    10/28/2009

     

    Speaking at the November Louisville ISSA meeting on setting up a "hack lab"

    From the invite email:

    Our next meeting will be Friday, November 6th from 11:30 AM to 1:00 PM at IPI. As always, we will have free lunch, raffle prizes, and CPE credits! We continue to execute our primary mission at each function - to continue learning, network with other Security Professionals, and have FUN!

    Please RSVP no later than Tuesday, November 3rd - 5 PM to programs -at- issa-kentuckiana.org.

    The topic is "Setting up a "hack lab" for learning security concepts." Adrian Crenshaw - Irongeek.com

    Our speaker is Adrian Crenshaw, the geek behind Irongeek.com and the guy who set up and ran our very successful Capture the Flag event at the Louisville Metro InfoSec Conference!

    Adrian will show how to set up tools and systems to best test and learn security techniques. This knowledge is vital for any Information Security professional who wants to stay on top of the latest risks.

    10/26/2009

    Getting started with the I2P Darknet
    I2P (originally standing for Invisible Internet Project) can be seen as a networking layer sitting on top of IP that uses cryptography to keep messages confidential, and multiple peer to peer network tunnels for anonymity and plausible deniability. While Tor is focused more for hiding your identity while surfing the public Internet, I2P is geared more toward networking multiple I2P users together. While you can surf to the public Internet using one of the I2P out proxies, it's meant more for hiding the identity of the providers of services (for example eepSites), sort of like Tor's concept of Hidden Services, but much faster. Another advantage I2P has is NetDB, a distributed way to let peers know about each other once initial seeding has occurred. Tor on the other hand uses it's own directory to identify servers, which in theory could be more easily blocked. Both networks have their advantages and trade offs. This video won't cover the details of I2P's peering or encryption systems, and may seem kind of rambling, but it should be enough to get you up and running on the darknet.
    Please note, this video came out way larger than I intended.
    10/21/2009

    Phreaknic 13, Oct 30th to Nov 1st

    It's that time of the year again, and that means it's time for my favorite con: Phreaknic!!! This year I will be presenting a hopefully more refined version of my Darknets talk. Check out their site for more speakers. Some of the other speakers include Acidus (Billy Hoffman), Morgellon, Droops, Tyler "Trip" Pitchford, Esq., Scott Moulton, DOSMan and SlimJim. Skydog has posted some videos about the conference on the front page of Phreaknic.info, like this one:

     

    but if you want to get a better feel for what the conference is like, check out my documentary video from the Phreaknic 12 hacker con.

    10/12/2009 How to Cyberstalk Potential Employers Article Updated
    I've added some sections at the end with useful links, tools and further research. I also fixed some minor typos. If you have any ideas for additions please email me.
    10/11/2009

     

    Louisville InfoSec CTF 2009
    This video summarizes one possible way contestants could have completed the Capture The Flag event at the 2009 Louisville Infosec. Tools and concepts used in the video include: Backtrack 4, Kismet Newcore, Nmap, Metasploit, Meterpreter, Firefox, SQL Injection, Cain, Truecrypt and 7zip.

    The winning team was comprised of Rel1k (Dave Kennedy), Pure-Hate, Archangel, and Titan. Yes, Dave did compromise my personal laptop during the event, teaches me for not mitigating 0 days before the conference. :) When Archangel told me he was bringing Dave in for his team, I knew which way thing were going to go down. Rel1k and Purehate are Backtrack 4 developers, and Archangel and Titan are no slouches either. Congrats guys.

    10/10/2009

     

    Darknets: Fun and Games with Anonymizing Private Networks
    Here are the slides from my Darknets talk. It was first delivered at the 2009 Louisville Infosec, and I will be doing a more polished version at Phreaknic 2009. Networks covered include Tor, Freenet, AnoNet/DarkNET Conglomeration and I2P. I hope to have video up soon.

    09/29/2009

     

    File Carving and File Recovery with DiskDigger
    DiskDigger is a tool that allows you to recover deleted files off of a FAT or NTFS drive. It has two modes of operation: In the first it merely looks in the FAT/MFT to find files marked as deleted, in much the same way that the tool called Restoration does. In the 2nd mode it does a file carve down the drive looking at the raw bits and finding the know headers and footers of various file types, much like PhotoRec. While PhotoRec seems a little more powerful, DiskDigger is easier to use and its preview functionality is quite nice.  This video will cover the basics of recovering deleted files with DiskDigger.
    09/27/2009 Pin-hole Spy Video Camera Disguised as a Pen
    I thought some of you might find this an interesting gadget, so I decide to review it. It might be useful for reconnaissance before a pen-test, or as a covert place to store files.
    09/25/2009

     

    Phreaknic needs speakers
    As many of you know, I'm a regular at the Phreaknic conference in Nashville Tennessee. It's an awesome hacker con, my personal favorite. It's happening Oct 30rd through Nov 1st. They still have some speaker slots open, so please, if you have an interesting topic email phreaknic13@gmail.com and toss your name in the pot to be a speaker. More information about the conference can be found at  http://www.phreaknic.info/
    09/24/2009

     

    Forensically interesting spots in the Windows 7, Vista and XP file system and registry updated

    I worked on formatting and added entries for "Temp folder for Outlook attachments", "Flash Cookies Location" and "Printer spool folder". I also added a menu so you can quickly find the entry you are looking for:


    Windows Explorer

    Recently opened files from Windows Explorer
    Network Shortcuts
    Items recently ran from the "Run" bar
    ComDlg32 recently opened/saved files
    ComDlg32 recently opened/saved folders
    Recent Docs
    EXE to main window title cache
    User Assist

    Windows General
    Temp folder
    Recycle Bin
    Last logged on user   
    Event logs
    Last key edited by RegEdit
    List of Installed USB devices, both connected and unconnected
    List of installed USB storage devices
    SetupAPI Device Log
    Windows Prefetch Internet Explorer
    Internet Explorer Temp Folder (IE Cache)
    IE Cookies
    Internet Explorer History
    IE Typed URLs
    Internet Explorer Forms AutoComplete
    Internet Explorer Password AutoComplete
    Printer spool folder

    Firefox
    Firefox Cached Pages
    Firefox Form History File
    Firefox Passwords File
    Firefox Cookies

    Other Apps
    Recently Opened Office Docs
    Files recently accessed by Windows Media Player
    Offline Outlook Mailbox
    Temp folder for Outlook attachments
    Flash Cookies Location

    09/23/2009 Deliberately Insecure Web Applications Page Updated
    Added information on Vicnum and oldapps.com. More good stuff for setting up your hacklab.
    09/19/2009 Rohyt Belani - Bad Cocktail: Application Hacks + Spear Phishing    
    Mr. Rohyt Belani was kind enough to do a presentation on combining web application attacks with spear phishing at the Sept 2009 Louisville OWASP meeting (our chapter's LinkedIn page can be found here). If you are interested in finding out more about some of the topics Rohyt mentions in his presentation, check out these other videos on Footprinting/Network Recon and Exploiting Common Web App Vulnerabilities.
    09/09/2009

     

    Capture The Flag At Louisville Infosec Conference Details
    As many of you know, I've been busy setting up a hacker war game for the Louisville Infosec conference on Oct 8th. The Louisville Infosec website has information about the CTF event on their site, which should be updated shortly. If you would like to compete please email the Conference Chair. If you use the code "irongeek" you get $20 off the admission fee for the conference. I believe the time frame is 9am to 3:30pm, but the position of the event should allow you to watch the keynotes, eat the included lunch and still, compete.

    What are the prizes?

    First prize is a Wi-Spy 2.4x Wireless Scanner!
    The second prize is a WD 320GB USB Hard Drive
    Third Prize is a Pico Mini USB 4GB (small enough to carry in your wallet)

    Scenario (subject to some change):

    The admins try to run their network as a tight ship, but you have been brought in to do a pentest. You know the admins have a Truecrypt volume out there with Personally Identifiable Information (PII). Your goal is to find it, and decrypt its contents till you get a list of names and Social Security Numbers. Little hints will be given via a comment wall on one of the web servers. To win points bring proof to the judge that the particular flag task has be completed.These are the "flags", and their point values:

    0. Attach to the Wireless network (hint:CTF is in the name) and show the judge how you got the SSID. 15 points
    (Name will be given if you can't find it, but you won't be able to get points for it.)
    1. Find the IP of the of the Windows box named WinCTF owned by IronGCorp, and list 3 or more open ports. 5 points
    2. Find the IP of the x86 based Linux box ran by IronGCorp, and list 3 or more open ports. 5 points
    3. What box are the admins running their Intranet site on, and what is the web server type/version? 5 point
    4. What is the Windows box's (WinCTF) Administrator password? 10 points
    5. What is the x86 Linux box's Root password? 5 points
    6. Copy PII.tc (a true crypt volume) to your box. 10 points
    7. Password to the PII.tc file. 10 points
    8. Password to a non x86 based Linux box. 10 points
    9. Password to a 7zip archive. 10 points
    10 The decrypted PII.csv file. 25 points

    Highest point score at the end of the game wins. If two contestants have the same points at the end of the game, the first to accumulate their point total wins. Obviously, if you play as part of a team you have to figure out amongst yourselves how to split the prize. The winner will get up on stage and explain what he did when he picks up his prize.
     

    09/03/2009

     

    Mutillidae Venerable Web App Updated
    I found out that my little teaching app stopped working with new versions of XAMPP. It seems I have to use <?php to start my PHP tags, using just <? no longer worked. I've updated Mutillidae to 1.3 and made it work again.
    09/01/2009 WiGLE WiFi Database to Google Earth Client for Wardrive Mapping Tool Updated
    I've uploaded version 0.80 of my wardrive mapping app IGiGLE. I had to fix some things since Wigle.net added a field to their output, throwing off all of my code. I've also added information to each entry regarding its network type, either infrastructure or ad-hoc.
    08/24/2009

     

    Anti-Forensics: Occult Computing Class
    This is a class I gave for the Kentuckiana ISSA on the the subject of Anti-forensics. It's about 3 hours long, and sort of meandering, but I hope you find it handy. For the record, Podge was operating the camera :) Apparently it was not on me during the opening joke, but so be it, no one seemed to get it. I spend way to much time on the Internet it seems. Also, I'm in need of finding video host to take these large files. This class video is 3 hours, 7 min and 1.2GB as captured.

    Side Note: I still have about 7 free passes to the Louisville InfoSec to give away. If you want a free pass, just email me at irongeek at irongeek.com and agree to be in the CTF event. If you don't want to be in the CTF, you could instead use the code "irongeek" when you register and you will get $20 off the cost ($79 instead of $99).

    08/18/2009 Fear and loathing at the Riviera: A noobs guide to Defcon
    This is a write up of my experiences getting to, and being at, Defcon 17. Also, check out by comments on twitter.
    08/14/2009 Security and Forensics Podcasts Irongeek Listens To
    I got tired of going to a bunch of different sites to see if my favorite hacking podcasts had a new episode out, so I made a site that puts them all together on one page in chronological order. Let the XSS via RSS commence!
    08/13/2009 Forensically interesting spots in the Windows 7, Vista and XP file system and registry (prep work for my anti-forensics class)
    I've started work on a list of Windows registry keys and file systems spots that would be of interest to forensics, anti-forensics and pen-test folks. If you have additions, please email me.
    08/12/2009 Anti-Forensics Class Near Louisville, Aug 22nd 2009 1-4:30PM
    What: The ISSA Anti-Forensics Class
    When: Aug 22nd 2009 1-4:30PM
    Where: Jeffersonville Library
    http://jefferson.lib.in.us

    Details: This class will teach the basics of Anti-forensics, how people hide data and events on their computer for both legitimate and illegitimate reasons. We will cover data carving, disk wiping, encryption, steganography , timestamps, clearing logs and other ways people may attempt to cover their digital tracks. The subject matter should be of interest to many groups, it's "Not about just hiding your stash from the Fuzz". Some of the groups that may be interested include:

    Companies that want to know how to clear boxes before donating them
    Law/policy enforcement agents who want to know how folks hide computer activities
    Users who want to know how to hide their activities from invasive law/policy enforcement

    Things to bring if you want to be hands on, but not absolutely required:
    1. A Windows XP/Vista/7 laptop. Having an extra laptop to wipe may also be educationa.
    2. An external drive/thumb drive you don't mind wiping.
    3. Some software I'll be emailing a link to a few days before the class.
    4. Energy drinks for the teacher.

    As always, the class is free, even to non ISSA members. Please reserve a spot by RSVPing to programs -at- issa-kentuckiana.org.

    08/09/2009 Louisville InfoSec:Free passes, discounts and the CTF
    As many of you know, I attend the local Louisville Infosec conference. This year they have offered me some promotional stuff for the conference. If you use the code "irongeek" when you register you will get $20 off the cost. Also, they have given me 10 free passes to give out, but here are my conditions: 1. You must participate in are CTF event. 2. I want you to do a write up about the conference after you attend. If you want a free pass, just email me at irongeek at irongeek.com. For those that want more information about the con, check out the Louisville InfoSec website. Here are some of our speakers this year:

    John Strand
    Paul Asadoorian
    Scott Moulton
    Alex Lanstein
    Adrian Crenshaw
    Dr. Eugene Schultz
    John Pavone
    Rick Taylor
    Brian Long
    John Maynor
    Lee Kushner
    Jason Wessel
    Mark Maxey

    If you want to see videos from the 2008 conference check out these links:
    Adrian Crenshaw - "Intro to Sniffers" from Louisville Infosec 2008
    Kevin Beaver - "Staying Ahead of the Security Curve" from Louisville Infosec 2008
    Rohyt Belani - "State of the Hack" from Louisville Infosec 2008
    John Strand - "Advanced Hacking Techniques and Defenses" (and demos of evilgrade/passing the hash/msfpayload) from Louisville Infosec 2008

    and here is my write up from the even two years ago: http://www.irongeek.com/i.php?page=security/louisville-infosec-conference

    Also, the complimentary lunch is good. :)

    07/31/2009 Follow me and #defcon on Twitter
    I'm twittering my time at Defcon, for those that care:
    http://twitter.com/Irongeek_adc
    07/25/2009 DD-WRT v24-sp1: CSRF Example (Bugtraq ID: 35742 )
    I was interested in giving a real world example of using a CSRF attack, similar to the ones I mentioned in my OWASP Top 5 video, and maybe use it against a piece of internal equipment that is behind a NAT box. Then I heard about the Carlos Perez write-up on using Metasploit against a vulnerability in the DD-WRT v24-sp1 firmware. I thought this would be a great way to demo the concept of using CSRF/XSS against hardware behind a NAT, especially since I've done a video on installing DD-WRT before.
    07/25/2009 Phreaknic 12 Videos Posted
    After much encoding work, I've got all of the talks from Phreaknic 2008 up. I've posted some of the more security related videos in my RSS feed over the past day, but if you follow the link there's video of the other talks as well. Hope to see some of you at Phreaknic 2009, and if you see me at Defcon hit me up for some stickers.
    07/25/2009 Lee Baird/John Skinner - JAIL: Get your iPhone out, and try NOT to get yourself in!
    A guide on how to jailbreak your iPhone, install & backup unauthorized apps, and what to do with your iPhone once it's jailbroken.
    07/25/2009 Nathan Hamiel /Shawn Moyer - Satan is on my Friends List: Attacking Social Networks
    Social Networking is shaping up to be the perfect storm... An implicit trust of those in one's network or social circle, a willingness to share information, little or no validation of identity, the ability to run arbitrary code (in the case of user-created apps) with minimal review, and a tag soup of client-side user-generated HTML (Hello? MySpace? 1998 called. It wants its markup vulns back). Yikes. But enough about pwning the kid from homeroom who copied your calc homework. With the rise of business social networking sites, there are now thousands of public profiles with real names and titles of people working for major banks, the defense and aerospace industry, federal agencies, the US Senate... A target-rich and trusting environment for custom-tailored, laser-focused attacks. Our talk will show the results of a series of public experiments aimed at pointing out the security and privacy ramifications of everyone's increasingly open, increasingly connected online personae and the interesting new attack vectors they've created.
    07/24/2009 Handgrip/Buttstock - Open Source AK-47's
    Ensuring freedom through greater firepower. How to build yourself a legal, paperwork-free AK47 from salvage parts.
    07/24/2009 Darren Kitchen - Lessons Learned in Hacker Media
    From e-zine to podcast the world of hacking has been filled with media of all sorts. In this talk I will speak about my experiences and lessons learned in "new media". In particular how they relate to underground culture and our social responsibility to the next generation of security enthusiasts.
    07/24/2009 Daniel Hooper - An Introduction to Software Defined Radio by Cowboy Dan
    Software Defined Radio (SDR) is the latest (and possibly last) iteration of radio communication technology. Traditional radio technology is very hardware-oriented, and somewhat inaccessible to the software-hacking community. NO LONGER! With a fixed piece of hardware such as the Universal Software Radio Peripheral (USRP), we can emulate many different kinds of traditional hardware, from CW Morse-code type transmissions, all the way up to digital QAM, HDTV, and beyond. This presentation will demonstrate how to get set up with GNU Radio and the USRP hardware. We will perform a few simple tasks such as receiving radio and TV. The goal is to get most people in the audience comfortable with the setup process so that they can start experimenting.
    07/24/2009 SkyDog & Crew - Starting your own Hackerspace (Panel Talk)
    Got a bunch of hacker/maker friends and wanna do some projects? Start a hackerspace! We'll take you on an adventure as we look back over the last year and reflect on the progress we have made getting our hackerspace started, and share some pitfalls and triumphs along the way. Skydog will be joined by Seeblind, the VP of the HC, Mudflap, the Secretary, and Someninjamaster, a devoted, hardworking member.
    07/24/2009 Irongeek - Hardware Keyloggers: Use, Review, and Stealth (Phreaknic 12)
    This talk will cover hardware keyloggers and their use. About six will be presented in person for folks to try hands on, with a few others referenced in the slide show (mini-pci ones for example) . I'll cover the advantages and disadvantages of the current crop on the market and how they work. Also covered will be possible ways to detect hardware keyloggers via physical inspection an software.
    07/24/2009 TRiP - Discussion of the legality of wardriving (Phreaknic 12)
    This talk is to provide a "current" legal status of wardriving throughout the US. The talk will include an overview of wardriving and it's history (wardialing), the statues regulating all 50 states and how courts have interrupted such statutes, recent arrests for wardriving/related activities, and a brief overview of the international statues.
    07/24/2009 Scott Moulton - At Least TEN things you didn't know about your hard drive! (Phreaknic 12)
    This speech comprises at least 10 things that are 2+2=5 type situations people do not realize about hard drives. For Example, Data is written in Cylinders on hard drives, all partitions are created on Cylinder Boundaries and that leaves an offset from the end of one partition to the next which leaves a gap between partitions that is unusable or free space at the end of the disk. In addition to that, the point would be, since the outer edge of a drive starting at Track 0 is the fastest location on the drive, and the first partition is created on a cylinder boundary at the outside edge, then each and every partition you create on the disk has to be at a cylinder boundary into the disk. This means the second partition is on a slower part of the drive than the first. So for Mac Users that create a 32 gig Fat32 partition on their drive (actually the 6th/7th partition on the drive) is 32 gigs from the end of the drive on a Cylinder boundary and they just installed Windows on the slowest part of the drive. No it will not be animated!
    07/24/2009 Scott Milliken/Erin Shelton - Beer Hacking - Real World Examples (Phreaknic 12)
    You build your own computers from the bare parts. You'd die before paying someone else to actually write a basic HTML page for you. So why is it that you pay up to 10x the actual cost of making beer for something of lesser quality? This presentation will cover the various methods of making your own alcoholic beverages (beer, cider, wine), including the equipment required and approximate setup costs for each. Even if your skill in the kitchen is limited to the microwave, there is a method of brewing that will work for you. Some experimentation tricks will also be covered so that you can literally hack your beer to create a new flavor. Samples of various batches made by the presenters will be available during the presentation, assuming they haven't already drunk all of it.
    07/24/2009 Bruce Potter - Three Cool Security Technologies You've Never Heard Of (Phreaknic 12)
    This talk will introduce you to 3 cool security technologies that you've probably never been exposed to. There is still innovation going on, and much of the most useful tech isn't getting press time. So I'm going to try and rekindle some of that love you've lost over the years by giving you the 20 minute low-down on each one. Go get some wine, light the candles, sit back, and enjoy security again. What are the 3 technologies? Well, you'll just have to attend the talk to find out.
    07/24/2009

     

    Russell Butturini - Using the Hak5 U3 Switchblade as an Incident Response and Forensics Tool (Phreaknic 12)
    This talk will explain how to adapt the Hak5 switchblade, originally conceived as an attack/pen-testing tool into an incident response and forensics tool using different utilities. Adaptations of the original solution using a non-U3 drive and a more automated solution using U3 technology will be discussed.
    07/22/2009 Ncat Tutorial: A modern Netcat from the Nmap team
    For those not in the know, Netcat is a utility who's goal is to be like the Unix cat command, but for network connections. It has been referred to as a "Swiss-army knife for TCP/IP" for good reason, since it can do so many things.

    This is the biggest Flash tutorial I've done in awhile at 41.2MB, so I plan to relax some. See you at Defcon.

    07/18/2009 Compiling Nmap form source on Ubuntu
    Along the way to making a video on Ncat I needed to compile Nmap 5 from source, so I figured I might as well do a video on that as well. There are many reasons why you might want to compile Nmap from source instead of just using the package manager, so enjoy.
    07/17/2009 Windows 7: Copy A Modified User Profile Over The Default Profile
    While this is not directly security related, it should be helpful to those who are testing Windows 7. I'm posting it to help those who are searching the Internet for details on copying user profiles in Windows 7.
    07/16/2009 NDiff: Comparing two Nmap 5 scans to find changes in your network
    Fyodor gave me a heads up that Nmap 5 was coming out, so I figured I'd do a couple of videos on useful new features that come with Nmap 5 and later. For a better understanding of Nmap in general, check out my older videos which I will link to after the presentation. In this video I will cover the basics of using NDiff to compare two seperate Nmap scans. This is really useful for change management, where you want to know what new devices have appeared on your network or about ones that have disappeared for some reason. You could easily schedule Nmap to run on your network weekly, and then compare the differences with NDiff to see what has changed.

    As a side note, looks like I'm going to Defcon. Thanks to Haxorthematrix, Sereyna, Minoad, Mr. Bradshaw, George and anyone else who donated to my Paypal so I could go.

    07/11/2009 Exotic Liability Episode 25: Irongeek sits inNDiff: Comparing two Nmap 5 scans to find changes in your network
     Fyodor gave me a heads up that Nmap 5 was coming out, so I figured I'd do a couple of videos on useful new features that come with Nmap 5 and later. For a better understanding of Nmap in general, check out my older videos which I will link to after the presentation. In this video I will cover the basics of using NDiff to compare two seperate Nmap scans. This is really useful for change management, where you want to know what new devices have appeared on your network or about ones that have disappeared for some reason. You could easily schedule Nmap to run on your network weekly, and then compare the differences with NDiff to see what has changed.
    I came in as a guest of the Exotic Liability podcast, episode 25. I've not listened to it yet, hope I came off ok. Some of the things we discussed include: Incident response switchblade, Tiger Team: The Whole Story, Our neighborhood memories, Kon-boot, Cool tools for data collection, P/W cracker speed test challenge, Look at my thumb, Olympic games, Louisville Info Sec Conference, Anti-forensics and Legalities. Thanks for having me on.

    As a sidenote, I may be going to Defcon after all but nothing is confirmed yet. I'll need to find someone's floor to crash on Wednesday night as I think I'll be arriving a day before the person I'm staying with the rest of the con.

    07/09/2009 Incident Response U3 Switchblade From TCSTool
    In Russell's own words: "The U3 incident response switchblade is a tool designed to gather forensic data from a machine in an automated, self-contained fashion without user intervention for use in an investigation. The switchblade is designed to be very modular, allowing the investigator/IR team to add their own tools and modify the evidence collection process quickly." This video shows you how to setup u3ir, and modify it.
    07/08/2009 Using Kon-Boot from a USB Flash Drive: Bypass those pesky Windows and Linux login passwords completely
    Kon-Boot is a neat little tool that you can boot from a CD or a floppy, change memory before booting a full OS, and then login to Windows or Linux without knowing a proper password. The above link contains my notes and config files to get Kon-Boot to work from a bootable USB drive.
    07/07/2009

     

    PHPIDS Install Notes and Test Page
    I've been playing around with PHPIDS and have posted my notes on installing it as well as details on the kinds of attacks by web site gets. Interesting, I get a lot of attacks, mostly RFI.

    As a side note, GFI was kind enough to sponsor my site for two months, show our appreciation by trying out some of their log and vulnerability scanning software.

    06/29/2009

     

    How to change your MAC address article updated, added information on OS X 10.5.6 and latter
    Apparently there are some problems changing your MAC address in versions of OS X 10.5.6 and latter. Stefan Person sent me a note about it, so I added it to the article.

    Also, Mubix recently did a presentation for Dojo Sec on getting a job in information security. In it he mentions my article on how to cyber stalk potential employers. Thank much Rob!

    06/20/2009 OWASP Top 5 and Mutillidae: Intro to common web vulnerabilities like Cross Site Scripting (XSS), SQL/Command Injection Flaws, Malicious File Execution/RFI, Insecure Direct Object Reference and Cross Site Request Forgery (CSRF/XSRF)
    This is a recording of the presentation I gave to the Louisville Chapter of OWASP about the Mutillidae project. A while back I wanted to start covering more web application pen-testing tools and concepts in some of my videos and live classes. Of course, I needed vulnerable web apps to illustrate common web security problems. I like the WebGoat project, but sometimes it's a little hard to figure out exactly what they want you to do to exploit a given web application, and it's written in J2EE (not a layman friendly language). In an attempt to have something simple to use as a demo in my videos and in class, I started the Mutillidae project. This is a video covering the first 5 of the OWASP Top 10.
    06/12/2009 Louisville Infosec Conference Looking For Sponsors/Speakers
    As many of you know, I'm involved with the local ISSA group here in the Louisville area. They are looking for sponsors for the upcoming Louisville Infosec conference (Thursday, October 8, 2009 at Churchill Downs). We had about 250 attendees last year, so it could be a good spot for advertising your company via a booth.  One of our keynotes this year is Johnny Long. John Strand and Eugene Schultz should also be presenting. If you are interested in being a sponsor email marketing (at) issa-kentuckiana.org and let them know Adrian sent you. We also may have a few speaker slots open for the breakout sessions, contact chair (at) louisvilleinfosec.com if you have a proposal. For more information, check out the Louisville Infosec Conference site.
    06/10/2009 Speaking at the OWASP Louisville meeting, June 19th 2009
    Hi all, the local OWASP chapter has asked me to speak about the Mutillidae project. While I'd like to cover all of the OWASP Top 10 that it implements, I think there will only be time for the top 5. The description as posted on their site follows:

    The second OWASP meeting will feature a presentation from Adrian Crenshaw of Irongeek. Adrian is a Louisville based Security professional that has worked in the IT industry for the last twelve years.

    Adrian runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools. He's currently working on an MBA, but is interested in getting a network security/research/teaching job in academia. Please see the description from Adrian on his presentation on the 19th.

    Title: Mutillidae: Using a deliberately vulnerable set of PHP scripts to illustrate the OWASP Top 10 Description: A while back I wanted to start covering more web application pen-testing tools and concepts in some of my videos and live classes. Of course, I needed vulnerable web apps to illustrate common web security problems. I like the WebGoat project, but sometimes it's a little hard to figure out exactly what they want you to do to exploit a given web application, and it's written in J2EE (not a layman friendly language). In an attempt to have something simple to use as a demo in my videos and in class, I started the Mutillidae project.

    Mutillidae is a deliberately vulnerable set of PHP scripts meant to illustrate the OWASP Top 10. This talk will cover installing Mutillidae in a test environment, and how to use it to illustrate the OWASP Top 10 web vulnerabilities in easy to understand terms.

    Our meeting location will be at Memorial Auditorium, located at 970 S. 4th Street (Corner of 4th Street and Kentucky Street).

    06/07/2009 ARPFreeze: A tool for Windows to protect against ARP poisoning by setting up static ARP entries
    As many of you know, I've created quite a bit of content about ARP poisoning, such as:

    A Quick Intro to Sniffers
    Intro to ARP poisoning
    Using Cain to do a man in the middle attack by ARP poisoning

    I've even done some work on detection:

    Decaffeinatid: A Simple IDS/arpwatch for Windows
    Finding promiscuous and ARP poisoners and sniffers on your network with Ettercap

    This tool is for prevention. ARPFreeze lets you setup static ARP tables so that attackers (using Cain, Ettercap, Arpspoof or some other tool) can't pull off an ARP poisoning attack against you.

    06/03/2009 XSS, Command and SQL Injection vectors: Beyond the Form
    We are all familiar with XSS via a form field in a web application, but what about other vectors? The article talks about using User Agent strings, even logs, object properties and other odd alternative vectors for XSS, SQL and command injection. What other vectors can you think of?
    06/02/2009 Another book for the list
    Looks like my site has been mentioned in another book, Security+ Guide to Network Security Fundamentals by Mark Ciampa. Thanks Mark.

    In other news, Irongeek.com was a nominee for "Best Technical Blog' at the recent RSA Conference. Congratulations to PaulDotCom for winning the best security podcast award. And while I'm on the subject of great podcasts for infosec folks to listen to, check these out:
    http://securabit.com/
    http://securityjustice.com/
    http://www.exoticliability.com/

    05/24/2009

     

    802.11 Wireless Security Class for the Louisville ISSA Part 1
    Originally, this was going to be one 4hr class, but Jeff had something come up so he could not cover WEP/WPA cracking, and my section took so long that Brian never got a chance to present his material on DD-WRT. I'm hoping to get them back to do a part 2 of this video. In this section I cover the basics of WiFi, good chipsets, open file shares, monitor mode, war driving tools, testing injection, deauth attacks and the evil twin attack. Some of this comes out as kind of a stream of consciousness, but hopefully you can find some useful nuggets from my brain dump of what I've learned about 802.11a/b/g/n hacking. As far as classes goes this is the mostly complicated one I've set up, and for a wireless class Brian and I had to run a lot of wires. :)
    05/20/2009 Moth added to the Deliberately Insecure Web Applications list
    Mubix sent me another project for testing your web app security skills against, so I added it to my list. Check out Moth and let them know what you think. It's a VMWare image, so it should be easy to get up and running on your box.
    05/12/2009 Free WiFi Security Class Near Louisville
    You are cordially invited to a FREE WiFi Security Class.  The class will be delivered by three of our own: Adrian Crenshaw, Jeff Jarecki and Brian Blankenship.  This is a great opportunity to learn and network.  In addition, you can earn up to 4 CPE credits for attending!

     Please RSVP to programs (at) issa-kentuckiana.org no later than 5:00 PM May 20, 2009.  Please note that seating is limited!

    Class Information:

    Title: WiFi Security Class

    Place: Jeffersonville Library Small Conference Room (Seating for 27)
    Date:
    May 23rd
    Time:
    10am to 2pm.

    Detailed Information:
    Session 1: "Basics of WiFi"
    Instructor:
    Adrian Crenshaw

    Abstract: Scanning for networks, and sniffing. Tools we will be discussing include: Kismet, NetStumbler, IgIgle, Wireshark and others.

    About Adrian:  Adrian Crenshaw has worked in the IT industry for the last twelve years. He runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools. He did the cert paper chase for awhile (MCSE NT 4, CNE, A+, Network+. i-Net+) but stopped once he had to start paying for it himself. He's currently working on an MBA, but is interested in getting a network security/research/teaching job in academia.

     Session 2: "Cracking WEP and WPA"
    Instructor:
    Jeff Jarecki

    Abstract: What specific equipment do you need?  What software tools do you need?  What strategies exist to defend your own networks from these types of attacks?  How many attorneys and how much money you'll need for the legal defense team needed to defend you if you try this on a network other than your own.

    About Jeff:  Jeff Jarecki has worked in the IT field for over 12 years.  His previous positions include working as a Software Developer and Programming Analyst.  He is currently employed at a major healthcare corporation as an Information Security Analyst. His focus is in software automation. His hobbies include writing bio's and writing about his hobbies. 

    Session 3: "Making a cheap WiFi router better with DD-WRT"
    Instructor:
    Brian Blankenship

    Abstract: What is DD-WRT?  What hardware will it run on, and why would you want to use it?   Learn how to convert an inexpensive WiFi router into a full-featured wireless access point.  An overview of configuration options and security will be covered, as well as how to configure VPN access.

    About Brian:  Brian has worked in Information security for 9 years, is currently an internal security consultant for a major healthcare corporation, and is a founding member of the local ISSA and OWASP chapters.

    Warmest regards,
     
    Rod Kahl
    Director of Member Relations
    ISSA * Kentuckiana Chapter
    www.issa-kentuckiana.org
    www.issa.org

    05/10/2009 Outerz0ne and Notacon 2009 Hacker Cons Report
    I did some recording of the goings on at the Notacon and Outerz0ne 2009 hacker cons. If you want to get a feel for these cons, check out the video.
    05/09/2009 New video:Hacker Con WiFi Hijinx Video: Protecting Yourself On Potentially Hostile Networks
    This is a presentation I gave for the Kentuckiana ISSA on May 8th, 2009. It covers the basics of protecting yourself when using open WiFi on a potentially hostile networks, most notable Hacker cons, but also coffee shops, libraries, airports and so forth. Topics include: open file shares, unneeded services, sniffing and evil twin attacks. The talk is based on the Hacker Con HiJinx tri-fold I wrote awhile back.
    04/29/2009

    Speaking at the Louisville ISSA May 8th 2009
    I'm giving a presentation for the ISSA on May 8th, based on my Hacker Con HiJinx tri-fold. Details on location and how to RSVP can be found below:

    ISSA Kentuckiana Members,
    The next meeting will be Friday, May 8, 2009, from 11:30 am to 1:00 pm @  Innovative Productivity / McConnell Technology, 401 Industry Rd, Louisville, KY 40208
    Please RSVP to programs (-at-) issa-kentuckiana.org  no later than 5:00 PM May 5.

    Our speaker will be our own Adrian Crenshaw.  Adrian's topic will be "Hacker Con WiFi Hijinx: Protecting Yourself On Potentially Hostile Networks."

    Adrian's Bio:
    Adrian Crenshaw has worked in the IT industry for the last twelve years. He runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools. He did the cert paper chase for awhile (MCSE NT 4, CNE, A+, Network+. i-Net+) but stopped once he had to start paying for it himself. He's currently working on an MBA, but is interested in getting a network security/research/teaching job in academia.

    Please take time from your busy schedule to join us in hearing Adrian's perspective and for a networking opportunity with many of the area's dedicated security professionals.

    As always, lunch will be FREE and we will give away a few raffle prizes!  Hope to see you there!
     
    Warmest regards,
     
    Rod Kahl
    Director of Member Relations
    ISSA * Kentuckiana Chapter
     relations (-at-) issa-kentuckiana.org
    www.issa-kentuckiana.org

     

    04/29/2009 Mutillidae 1: Setup
    Mutillidae is a deliberately vulnerable set of PHP scripts I wrote to implement the OWASP Top 10 web vulnerabilities. I plan to use these scripts to illustrate common web app attacks in a series of future videos. The easiest way to get up and running with Mutillidae is to use XAMPP, an easy to install Apache distribution containing MySQL, PHP and Perl. This first video covers setting up Mutillidae, which can be downloaded from:
     http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10 
    04/20/2009 Making Hacking Videos: Irongeek's Presentation from Notacon 2009
    Over the years I've done a lot of video tutorials using screencasting software to teach folks new to hacking how various security tools work. I'd like to share the tips and tricks I've learned so that others can start to teach people about technology in the same way. Covered topics will include: Screencasting software, free tools, getting the best video for the least bandwidth, audio work, free hosting, animations and more. This is a presentation I did for Notacon 2009. Thanks to Ted and crew for recording it.
    04/15/2009

    New Video:Using SSLStrip to proxy an SSL connection and sniff it
    John Strand of Pauldotcom allowed me to post this video that shows how to use SSLStrip to proxy an SSL connection and sniff it, without those annoying warning messages about the cert that other tools give. From John's description:
    With SSLStrip we have the ability to strip SSL from a sessions. Using this tool we have the capability to capture in clear text user IDs and passwords.
    04/03/2009 Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 10 Updated
    Added the activity log section so I could show off stored user agent XSS, added information on cookie stealing with XSS to the tips section, added catch.php to show how to grab data after an XSS and did a few other minor little tweaks. Also, I changed some of the text around to include the "Ate up with suck" slogan.

    As a side note, I hope to see some of you at Notacon this year.

    03/30/2009 Presentation Recording Rig Setup
    I've been wanting to record some of my live classes, as well as the talks at the upcoming Louisville Infosec. This is the rig I plan to use to capture both the Power Point/computer screen and live video of the presenter at the same time. Let me know if you have any ideas for improvement.
    03/25/2009

    Footprinting, scoping and recon with DNS, Google Hacking and Metadata
    This class covers recon work, showing the student how a pen-tester/attacker can use public information to learn more about an organization before they compromise it's security. Covered topics will include DNS tools (like Whois, NSlookup/Dig, Nmap -sL), Google Hacking using advanced search terms and Metadata in images and documents. Recorded for the Kentuckiana ISSA on March 21, 2009. It's about 3hr 7min long.
    03/20/2009 Joe McCray "Advanced SQL Injection"
    Joe McCray of Learn Security Online sent me a video of a presentation he gave on Advanced SQL Injection. It's a great primer, and I love his presentation style. Someone buy the man a VGA to composite converter, or a HD camcorder so he can keep making these vids.
    03/19/2009 Robots.txt Honey-pot
    Here is a list of folks who in the last 60 days were silly enough to look at my robots.txt file. I set this up as sort of a honey pot to see who was researching my site, looking for private files I might try to hide from search engines. As a side effect I wanted to scar their psyche as punishment. :) Fun stuff. For the love of Cthulhu don't look in those directories. For more information on this sort of thing, check out my article on The Joys Of Skiddy Baiting.

    Also, I've been prepping up for mine and Brian's recon class this Saturday, which is one of the reasons I put up my new about page (EXIF data and all).

    As a final note, I'd like to thank Seth Misenar and the Pauldotcom guys for giving me the new tagline for my Mutillidae Project: "Ate up with suck".

    03/12/2009

     

    Free Class in Louisville, KY: Footprinting, scoping and recon with DNS, Google and Metadata
    I thought some of you might be interested in this free class the Louisville ISSA and I are doing in Louisville Kentucky on March 21 2009. You will need to RSVP to programs (at) issa-kentuckiana.org as seating is limited. Also, you don't have to be an ISSA member, it's free to the public:

    ISSA Member,

    I write to inform you that Adrian Crenshaw is offering a security class on March 21st. Please take advantage of this opportunity for free training, CPE Hours and a terrific learning opportunity. The class will be held from 9:00a until 12:00p in the training room of Mountjoy & Bressler, LLP.

    Class Information:
    Footprinting, scoping and recon with DNS, Google and Metadata
    This class will cover recon work, showing the student how a pen-tester/attacker can use public information to learn more about an organization before they compromise it's security. Covered topics will include DNS tools (like Whois, NSlookup/Dig, Nmap -sL), Google Hacking using advanced search terms and Metadata in images and documents.

    Bio:
    Adrian Crenshaw has worked in the IT industry for the last twelve years. He runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools. He did the cert paper chase for awhile (MCSE NT 4, CNE, A+, Network+. i-Net+) but stopped once he had to start paying for it himself. He's currently working on an MBA, but is interested in getting a network security/research/teaching job in acedamia.

    This is a hands on class; students need to bring their own laptops!

    Please find directions to Mountjoy & Bressler attached. The training room is on the 22nd floor and free street parking is available on the weekend.

    Let me know if any questions.

    Rod Kahl
    Director of Member Relations
    ISSA * Kentuckiana Chapter
    relations(at)issa-kentuckiana.org
    www.issa-kentuckiana.org
    www.issa.org

    Directions to Mountjoy & Bressler

    03/10/2009

     

    Event in India
    I get a fair number of readers from India, so Ravi wanted me to mention this upcoming event:

    "FYODOR YAROCHKIN, the former developer of SNORT IDS is coming to India.

    From March 16th - 21st 2009, Fyodor will be discussing/offering courses on the following topics at Fortune Katriya in Hyderabad, India:

    * Advanced techniques of Computer Digital Crime scene Analysis and Forensics

    * Advanced Hands-On Hacking techniques for a Penetration Tester

    * Web and Application Security Advanced Training: looking at your applications wearing the black and white hat. Looking at Application Security when the color of your hat matters.

    * Breaking networks with no wires: Attacking and securing WiFi networks, RFID and Bluetooth implementations and more.

    It's a great opportunity for beginners as well as advanced students to learn from these courses and also to meet other corporate clients

    he might be signing a MOU with E2-labs"

    Just so you know, this is the Fyodor from the snort project, not Nmap. Two different guys.

    03/09/2009 Video from Outerz0ne 5: Outerz0ne 5 Closing
    Prepare your liver for the apocalypse.
    03/09/2009 Video from Outerz0ne 5: Acidus (Billy Hoffman) - Offline Apps: The Future of The Web is the Client?
    Traditional web apps used the browser as a mere terminal to talk with the application running on the web server. Ajax and Web 2.0 shifted the application so that some was running on the client and some of the web server. Now, so-called offline application are web application that work when they aren't connected to the web! Confused? This talk will explore how to attack offline apps with live demos of new attack techniques like client-side SQL Injection and resource manifest hijacking.

    BIO: Acidus is a Atlanta hacker who is not really sure why you keep listening to him.
    03/09/2009 Video from Outerz0ne 5: Rob Ragan - Filter Evasion - Houdini on the Wire
    Today security filters can be found on our network perimeter, on our servers, in our frameworks and applications. As our network perimeter becomes more secure, applications become more of a target. Security filters such as IDS and WAF are relied upon to protect applications. Intrusion detection evasion techniques were pioneered over a decade ago. How are today's filters withstanding ever evolving evasion tactics? The presentation will examine how evasion techniques worked in the past and provide insight into how these techniques can still work today; with a focus on HTTP attacks. A practical new way to bypass Snort will be demonstrated. A tool to test other IDS for the vulnerability in Snort will be demonstrated.

    Bio: Background: While performing a pentest on a fortune 50 company I got caught. My IP address was subsequently blocked. It was apparent that I was causing way too much noise and they had triggered a network security filter that blocked me. I came up with this presentation idea after implementing the evasion techniques found here in a proxy application. I quickly realized none of them work anymore on modern IDS. After some experimentation I eventually found something that would let me sneak nearly any type of web attack past Snort. More details on the attack can be found in my outline. I'm currently working on a tool that will allow anyone to test their IDS/IPS for this vulnerability.
    03/09/2009 Video from Outerz0ne 5: Scott Moulton - Reassembling RAID by SIGHT and SOUND!
    RAID is a great technology and in many cases is suppose to keep our data safe. What happens when it fails? RAID Arrays are one of the most painful things to reassemble. RAID 0 and RAID 5 software reassemblies have problems with Slice Sizes, and Drive Orders and in many cases, the user has no idea what the settings are. What do you do when you don't know the Slice Size and Drive Orders and you need the data from damaged drives? Well here is a demonstration of a way to determine this using Sight and Sound. I crammed as much on the subject as I can into a 50 minute presentation with Demos.
    03/09/2009

     

    Video from Outerz0ne 5: Makers Local 256 - A primer on hackerspaces
    What they are, why they're important, where they are, and how you can start one yourself. You may already have one close by. The talk will illustrate how hackers are taking back the moniker and bringing the community back into the light.
    03/09/2009 Video from Outerz0ne 5: Presmike & Sippy - RETRI:Rapid Enterprise Triaging
    The first part of this presentation presents a new paradigm for the Incident Response process called Rapid Enterprise Triaging (RETRI), where the primary objective is to isolate the infected network segment for analysis without disrupting its availability. Part two of this presentation will introduce a new Enterprise Incident Response tool that complements the RETRI paradigm. The tool is a free, possibly open source, agent-based tool that is deployed to the compromised segment to perform the traditional incident response tasks (detect,
    diagnose, collect evidence, mitigate, prevent and report back). The tool will be released at Blackhat 2009 / Defcon 2009 if all goes well.For now you get screen shots.
    03/09/2009 Video from Outerz0ne 5: Nick Chapman - Embedded Malicious Javascript
    This talk will cover malicious JavaScript currently being used in the wild. It will start with the big daddy of embedded malicious JavaScript, Asprox, which last year gave rise to panicked headlines like "100,000s of websites compromised" and continuing through more recent samples such as the fake Yahoo Counter and the recent MS09-002 exploits. We will look at attack vectors, obfuscation techniques, and multi-stage delivery systems, and exploits used. This will feature the analysis of several samples harvest from the wilds of the Internet.

    Bio: My name is Nick Chapman. I'm a security researcher with the SecureWorks Counter-Threat Unit. Prior to focusing on security issues full time, I worked as both a System Administrator and Network Engineer in the ISP world.

    03/09/2009 Video from Outerz0ne 5: SlimJim100 - Live Demo of Cain & Able and the Man-in-the-middle-attack
    This talk will present a live demo of a man-in-the-middle-attack, using Cain & Able.

    SlimJim100, also known as Brian Wilson, has presented at ChicagoCon 3 times in the past. His resume is filled with 3, 4, and 5 letter certifications, and his reputation reflects his skills.SlimJim100 - Live Demo of Cain & Able and the Man-in-the-middle-attack.
    03/09/2009 Video from Outerz0ne 5: SkyDog - Screen Printing Primer - Make your own Con Shirt!
    A primer on silkscreening t-shirts and garments. This talk goes thru the process of single color silkscreening, showing the steps necessary to produce the artwork, burning a screen, and then screening a shirt. We'll be producing shirts on stage, showing the techniques learned from much trial and error. Want to make your own Outerz0ne 5 Con shirt? C'mon up and do it yourself. Want to see yours made? We can do that too! Meant to be an interactive talk, to also raise interest in graphic arts and a to try and bring back a bit of the old school stuff.

    Skydog currently works for a major university, while also holding down positions as President for two non-profits. One is Nashville 2600, which is the group responsible for Phreaknic, and the Hacker Consortium, a large non-profit hackerspace in Nashville, TN. When he isn't doing all of that happiness, he's trying to keep his son from cutting a finger off, and making sure he's not surfing pron.
    03/09/2009 Video from Outerz0ne 5: Tyler Pitchford - They took my laptop! - U.S. Search and Seizure Explained
    An overview of recent developments impacting the Fourth Amendment and privacy conscious computer professionals: including discussions on the United States Constitution, Federal Statutes, Administrative decisions, and, most importantly, the case laws that interpret and define the Fourth Amendment. Special attention is given to topics affecting computer professionals, including border crossings, foreign nationals, forced disclosures, and the October 2008, Crist decision.

    Tyler holds degrees in Software Architecture from New College of Florida and a Juris Doctor from the Stetson University College of Law. He co-founded the Azureus Bittorrent client in 2003 and currently works as CTO for Digome, LLC in Nashville, TN. His work experience includes Florida State Attorney's, Federal Magistrate Richardson, and Justice Anstead of the Florida Supreme Court. Tyler presented at PhreakNic 12 and has taught several courses on computer programming and security.
    03/09/2009

    Video from Outerz0ne 5: Morgellon - *Duino-Punk! Manifesting Open Source in Physical Space from Outerz0ne 5
    The goal is to promote the idea of open source hardware, and expand the community. We will begin with an intro into what an "arduino micro controller" is, how they work, and what you can do with them. You will see that you don't need to be an electronics wizard to create amazing projects that enhance your life! Whether a code ninja, hardware guru, enthusiast, a pro or total n00b, the arduino offers amazing potential, community, and empowerment to any who wish to grasp it.

    Website: http://dailyduino.com (blog for arduino projects and related electronics news.)

    03/05/2009 WiFiFoFum: Wardriving convenience in your pocket and uploading to Wigle
    As regular Irongeek readers know, I've covered wardriving (the act of physically moving around in meatspace looking for WiFi access point) before. In this video, I want to cover another tool for wardriving: WiFiFoFum for the Windows Mobile platform.
    03/04/2009 Hacker Con WiFi Hijinx: Protecting Yourself On Potentially Hostile Networks Hand Out Updated
    Since I was going to print some up for Outerz0ne this week, I decided to update it a little and do some spell/grammar checking (Thanks Nancy). I also plan to bring them to hand out at Notacon 2009. I've put up OpenOffice and PDF versions of the tri-fold, so feel free to modify it for your own conference as long as you leave the credit links intact.
    03/02/2009 Deliberately Insecure Web Applications List Updated With "Mutillidae" And "Damn Vulnerable Web App"
    When I first posted Mutillidae, Ryan Dewhurst emailed me and told be about a project he started a few months before mine called Damn Vulnerable Web App. His is also PHP/MySQL based, and we may be combining some of our code base in the future. I've added Ryan's app, as well as my OWASP Top 10 implementation "Mutillidae", to the Deliberately Insecure Web Applications List.
    03/01/2009

    Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 10
    As most of you know, I make infosec tutorial videos for my site. I want to start covering more web app pen-testing tools and concepts. Of course, I need a vulnerable web app or two to use in my demos. I dig WebGoat, but sometimes it's a little hard to figure out exactly what they want you to do to exploit a given web application. Also, WebGoat may be a little too complex to use when introducing a web programming newbie to web application security (it's easy to get lost in the code, especially J2EE). In an attempt to have something to use as a demo in my videos and in class, I started the Mutillidae project. What I'm attempting to do is implement the OWASP Top 10 Web App Vulnerabilities in PHP, and do it in such a way that it is easy to demonstrate common attacks to others during live classes or video form. Please let me know what you think of what I've implemented so far, and if you are interested in helping with the project.

    Also, as a side note: I hope to see some of you at Outerz0ne this week, remember it's a free conference (with donations gladly accepted) so if you live within a couple of hours of Atlanta GA you really should come by. Tell them Irongeek sent you. :)

    02/18/2009

     

    Hak5 mentions my tool OSfuscate and my site in episode 5x01
    Snubsie of Hak5 mentioned my tool OSFuscate in episode 5x01. Thanks Shannon! For those the don't know, OSFuscate is a tool I wrote to change the TCP/IP fingerprint of your Windows Box.
    02/17/2009 Louisville KY has an OWASP Chapter!
    Too bad I can't go to this first meeting since I'm going to Outerz0ne, but I plan to attend in the future. I'll paste the details below for those that want to attend.

    Louisville OWASP Chapter First Meeting Friday March 6, 2009

    Hello all,

    I am proud to announce that we will be starting an OWASP chapter in Louisville, with our first meeting coming on Friday March 6!

    For those not familiar with OWASP (or the Open Web Application Security Project), it is a worldwide free and open community focused on improving the security of application software. The OWASP mission is to make application security "visible," so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of the OWASP materials are available under a free and open software license.

    Around the world, OWASP sponsors local chapters that are FREE and OPEN to anyone interested in learning more about application security. The chapter groups encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. The chapters encourage vendor-agnostic presentations from both local and national application security professionals on various topics, pertaining to application security and more specifically the OWASP Top 10.

    The first Louisville OWASP meeting will coincide with the Kentuckiana ISSA March meeting, on Friday March 6, 2009.

    The Louisville OWASP chapter is closely associated with the Kentuckiana ISSA chapter and our first meeting will coincide with the ISSA March meeting on Friday March 6, 2009. This first meeting will provide a presentation that describes the OWASP community, as well as a technical presentation showing what SQL injection is and how it easily it can be accomplished. This demo will strive to serve as a reference and overview of the major vulnerability that can exist in a web application.  If you have never seen SQL injection in person this is a great chance to learn about it and come ask any questions you have.

    Curtis Koenig and Mitch Greenfield, both from Humana, will be our presenters.

     Following March's meeting, we will meet quarterly on a different day and time. The information on future meetings will be following soon. Please provide feedback to the board.

    • When: Friday, March 6, 2009, from 11:30 am to 1:00 pm @ Innovative Productivity / McConnell Technology, 401 Industry Rd, Louisville, KY 40208

    Our initial sponsor is Accuvant, and we are very interested in other interested parties that would be interested in sponsoring the chapter.

    If you plan to attend the meeting please RSVP by email to Kristen Sullivan.

    Everyone is welcome to join us at our chapter meetings. Please check out our website at http://www.owasp.org/index.php/Louisville

    Thanks and we hope to see you on March 6th!  

    Chris Parker
    Named Account Manager

    02/14/2009

    Outerz0ne: Hacker Con in Atlanta, March 6-7, 2009
    I and some of my friends will be attending Outerz0ne 5 next month in Atlanta Georgia. It's organized by SkyDog and crew, who also now organizes Phreaknic so it should be an awesome con. It's also inexpensive since the attendance fee is donation based and the hotel is reasonable. Hope to see some of you there.

     

    02/13/2009 Obfuscated 4chan.gif/Invasion.gif/SYS.JSE Decoded and Removal
    Those that follow me on the various forums/mailing lists I post on know I've be interested in how the 4chan.gif/jse was encoded. The above link is my write up on the subject. Thanks to Byte_Bucket for pointing me in the right direction.
     02/13/2009

     

    Bluetooth Wireless Hardware Keylogger Review
    The folks over at Wirelesskeylogger.com were kind enough to send me a review unit.  For more info on hardware keyloggers in general, check out some of my other articles and videos on the topic which I will link to at the end of this presentation. The core idea of a wireless hardwarekeylogger is that you only have to get physical access to the computer once to install it. From then on you just have to get close enough to the box with a bluetooth device to grab the logs, at least in theory.
    02/03/2009 Mobile Pen-testing/Hacking tools section created, along with some other updates
    Since it's been so long since I've updated my Zaurus section I decided to replace it in the top menu with a Mobile Device Hacking section that collects all of my work with the Nokia n810, Windows Mobile and Zaurus platforms. I'm getting an HTC Touch Pro, so if you have any pen-testing/network apps you think I should mention for the Windows Mobile platform please let me know. Eric over at http://www.isyougeekedup.com/  has already pointed some stuff out to me.

    In other news, I'm playing with using the robots.txt file for trolling/honey-potting people who recon my site (and damaging their psyche in the process). More details on what robots.txt is can be found at Wikipedia, I maw write an article about it later. Also, I've added a store section where folks can order Irongeek.com t-shirts if they want (with Bushibyte's buff penguin logo) , I only make a $2 commission but it's better than nothing and Printfection's stuff comes out pretty good. Also, ISSA Louisville is having their monthly meeting Feb 6th, don't forget to RSVP.

    02/01/2009 Tor or not Tor: How to tell if someone is coming from a Tor exit node, in PHP
    Awhile back I was thinking it would be cool to make my page look different for people that are using the Tor anonymizing network. Also, I though it might useful to some administrators to be able to block Tor users from certain functions on their sites. I'm not in favor of censorship, but for certain practical reasons it can be useful to detect Tor exit nodes and keep them from accessing certain resources. I found some example code in Python, but I wanted to code it in PHP for my site. I looked at the documentation on TorDNSEL and came up with the code available at the link above. The example output is in the image below.

     

    01/29/2009 New Video: Setting Up Tor Hidden Services
    In a previous video I covered using the Tor anonymity network to browse the web anonymously. In this one I'll cover the basics of setting up a Tor hidden service. With a Tor hidden service, the true host IP of the service is hidden by the Tor network. Instead of having to hand out the true IP of the server, a service creator can hand out a *.onion hostname that's not linked directly to them. By setting up a Tor hidden service it becomes much harder for an adversary to figure out where the service is really being hosted from, and thus much harder to shutdown. This is a great thing for people like whistle blowers and political dissidents that want to share information anonymously, unfortunately it's also useful to pedos so be careful what links you choose to click on the onion network.

    Also, I got Fed Watch to work again and added to the menu system. To all of the United State Goverment folks that use my site: I'm honored you use my resources, please let me know if there are any training videos you would like for me to create. And send me a NSA/FBI/DHS hat or t-shirt. :)

    01/24/2009 Irongeek's Signature Image and Logo updated
    I noticed that my Signature Image and the logo in the top left of my site was not loading correctly for users at certain ISPs. After contacting my hosting provider (see my Dreamhost review) I figured out my Whois query was failing for some ISP's IPs. Luckily I found some code from Andrew Pociu that showed me how to do the Whois in PHP without using the "whois" command at the shell. Now it should work fine:

     

    Complete source code for my Sig is included. I also updated my "What is my IP and user agent" page to use the new Whois function so you can find out who owns the IP range you are coming from. Now if I can just figure out why my FedWatch page is taking so long to load.

    As a side note, sorry I'm not posting as much as I use to. I'm taking one MBA class and two SANS @Home courses right now, which takes up a far bit of my time. I may also be prepping up some more live talks for the Tech Exchange and Louisville ISSA events. Hope to see some of you at the Louisville Geek Dinner, Jan 26th 2009.

    01/22/2009 DecaffeinatID Intrusion Detection System ver. 0.09
    I made a few minor changes to DecaffinatID: v0.09 I fixed reverse DNS name resolution so it actually works, compiled with the newest stable version of AutoIT3 and straightened up some inconsistent coding concerning the ini file.
    01/17/2009 1337 in the Library: Obtaining your information security education on the cheap
    People keep asking me "How do I get started in security". Well, if you're asking for career advice I'm not your man, but on the learning side of things I think I have a few tips I can give you. This article gives you tips on getting more out of your local public or academic library.
    01/05/2009

     

    Help Irongeek With Hacking Security Video Surveillance Cameras Research
    Ok, this comes down to me begging for donated or loaner hardware. I've developed an interest in testing out the security of IP surveillance cameras, but I lack the resources to do it. If you know anyone who would donate/loan me some hardware that would be great. Barring that, if someone could let me test at their facility in the Louisville KY area that would also work. I don't have money to offer for shipping, but the vendor will get free advertisement on a site with a high Alexa rank that makes about 6000 impressions per day (I can email you a link to the stats page). If you can help, please contact me.
    01/05/2009

     

    ISSA Kentuckiana Meeting, Friday January 9th, 2009, from 11:30 am to 1:00 pm
    Christmas break is over, so it's back to the monthly ISSA meetings in Louisville Kentucky. Details are below:

    ISSA Kentuckiana Members,
    The next meeting will be THIS FRIDAY, January 9th, 2009, from 11:30 am to 1:00 pm. Please RSVP to me no later than tomorrow 5 PM if you haven't already.
    At the meeting we will vote on the 2009 ISSA Kentuckiana Officers and our speaker will be Lee Booth from the US Mint Police. Lee will be speaking on "IT and Life". Lee will do a few minutes on current internet scams, a few minutes on new technologies and a few on "Deep Life Subjects".
    Here is Lee's Bio:
    Lee Booth currently serves as a Police Lieutenant with the U.S. Mint Police at Fort Knox. He retired from the U.S. Army in 1998 and joined the Department of the Treasury's Police unit. In his current position he serves as the Chief of Operations, responsible for Patrol, Investigations, Intelligence, Special Operations, Training and Administration Divisions. He serves as the principal agent for strategic planning, anti-terrorism operations, vulnerability assessment, threat mitigation, policy development, police operations, and staffing. Lee also serves on several Anti-Terrorism Advisory Councils for DoD and other agencies. Lee holds a Master's Degree in Criminology from the University of Louisville, and is currently pursuing a doctoral degree in Organizational Leadership. He is a graduate of the Southern Police Institute.
    As always, lunch will be FREE and we will give away a few raffle prizes! Hope to see you there!!
    Warmest regards,
    Randall Frietzsche

     

    If you are interested is showing up as a guest, RSVP via http://www.issa-kentuckiana.org/contactus.html
     

    12/29/2008 Hacker Con WiFi Hijinx: Protecting Yourself On Potentially Hostile Networks Hand Out
    I just finished updating a pamphlet on keeping your laptop secure at hacker and security conferences. Hopefully the information will be useful to some of you. I plan to bring them to hand out at Notacon 2009. I've put up OpenOffice and PDF versions of the tri-fold, so feel free to modify it for your own conference as long as you leave the credit links intact.
    12/29/2008 SANS @Home, Network Penetration Testing and Ethical Hacking
    The folks at SANS are offering the Irongeek.com community a 10% discount on the tuition fee for the new Ed Skoudis course taught via SANS @Home, Network Penetration Testing and Ethical Hacking, starting January 13.  For full course details and to register, visit http://www.sans.org/info/33899 and when registering, use the group discount code:  IGAH-10

    I'm actually planning on sitting in on this one. It should be fun.

     

    12/27/2008 Louisville Geek Dinner, Jan 26th 2009
    The 6th Louisville Geek dinner is coming up in about a month. I and a few of my information security buddies from the Louisville Kentucky area plan to attend. If you are interested in attending, go to their page to sign up. There's no cost (other than what you order to eat/drink) and it gives you a chance to network with locals. Tell them Irongeek sent you. :)
    12/22/2008 Deliberately Insecure Web Applications For Learning Web App Security (WebGoat, WebMaven, Hacme Series, etc.)
    I was looking to find some insecure web apps for a pen-testing class I hope to give. Let me know if there are more I should add to my list.
    12/20/2008 Paros Proxy Without Changed User Agent
    I recompiled the Paros proxy to remove the "Paros/3.2.13" string it adds to the end of your user agent. Now you can pen-test applications that blacklist user agents with Paros in them.
    12/17/2008 New Video: NetworkMiner for Network Forensics
    NetworkMiner is a cool little sniffer app by Erik Hjelmvik. Described as a Network Forensic Analysis Tool (NFAT), it allows you to parse libpcap files or to do a live capture of the network and find out various things passively. The main uses I like it for are file reconstruction of FTP, SMB, HTTP and TFTP streams as well as passive OS fingerprinting, but it can do a lot more. NetworkMinor uses the Satori, p0f and Ettercap OS fingerprints, and can be run from a thumb drive without having to install it. It's designed to run under Windows, but you can also use it under Linux with Wine.
    12/15/2008 Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
    As many of you know, I regularly use Nmap in my tutorials. A few examples are: Nmap video 1, Nmap video 2 and Nmap presentation for the ISSA in Louisville Kentucky. Gordon "Fyodor" Lyon was kind enough to send me a signed copy of his new Nmap book. I've been reading the drafts as they've come out and it's some good stuff if you want to know the details of how the TCP/IP stack works, and the hardcore details of using Nmap to scan your network. Good luck with the book Fyodor.

        

    12/14/2008 A note on modems and wardialing from a Zaurus
    I know it's been a long time since I did anything with my Zaurus pages, but Knightmare was kind enough to send me his notes on modems and wardialing from the Zaurus.
    12/05/2008

    New Video: Intro to Wireshark
    Wireshark is an awesome open source general purpose network analyzer (AKA: a Sniffer). Before you continue on with this video, I recommend that you check out my article A Quick Intro to Sniffers so you understand the background information. In this video I'll cover the following topics: Running Wireshark, starting a capture with options, drilling down the OSI model, capture filter options, popping out a single packet, sorting by columns, following TCP streams, exporting HTTP objects, simple display filters, the filter builder, applying filters from different panes , saving filters, opening a Wiki page, Edit-> Find packet, sniffing an HTTP Basic Authentication password, Analyzers ->Expert Info, Analyzers ->Firewall ACLs, stats, editing color rules and saving the capture.
    11/30/2008

    New Video: Hacking Your SOX Off: Sarbanes-Oxley, Fraud, and Fraudulent Financial Reporting
    I had to do a presentation for one of my MBA courses, and one of the topic choices was the Sarbanes-Oxley act. I chose it because I thought I could relate it to computer security, but as it turns out the connection is somewhat tenuous as you will see if you watch the presentation.
    11/22/2008 Bypassing Anti-Virus with Metasploit
    This video from John Strand shows how to bypass anti virus tools utilizing the new tricks in Metasploit 3.2
    11/22/2008 Deploying Metasploit's Meterpreter with MITM and an Ettercap filter
    In this video, Bigmac shows how to redirect web traffic and trick users into downloading Meterpreter and running it on their box.
    11/16/2008

    Sniffers Class for the Louisville ISSA
    The video quality of this lecture is not very good, but it should give you an idea of what my ISSA classes are like. Covered topics include Wireshark, Ettercap, Cain and the slightest bit of NetworkMiner before the camera cut out. Pardon the blue tint, it was the projectors fault and not the Aiptek Action HD's. I shrunk it down from the original 720p, so the screen is not all that readable. I also experimented in cleaning up the audio in Audacity. I hope to cover Wireshark and NetworkMiner again shortly in higher quality videos.

    Also, check out the Securabit podcast I was a part of.

    11/05/2008 Hak5 Episode 10: Phreaknic, and a short interview of me :)
    I met the Hak5 folks at Phreaknic this year, it was a great time. Check out their footage at the link above.
    11/04/2008

     

    Securabit security podcast guest appearance
    Securabit will be streaming somewhere around 7:30pm EST on Wed, November 5th and have tentatively scheduled me to come on the show. Join them on IRC or Skype:
    IRC: irc://irc.freenode.net/securabit
    Skype: (469) 277-2248

    Should be fun, and I hope not to embarrass myself live.

    10/29/2008 Extraordinary Journey from Fundamental Electronics to Fabulous Enchanted Systems with Arduino's and Magical Potions

    This is Morgellon and Droop's talks about hacking the Arduino micro controller platform from Phreaknic 12. Droops and Morgellon will take you from basic electronics to building embedded systems. Learn how to build a standalone RFID tag reader with a fancy LCD display or your own oscilloscope or children's toys that speak to you or how to solar power a geothermal heat pump. There may even be some giveaways and contests. Magical Potions will be consumed but not provided.

    Check out the following sites by Droops and Morgellon:
    http://dailyduino.com/
    http://www.hackermedia.org/

    I've done a little work to pull some noise out of the audio, but I may have made it worse in some spots. Thanks go out to the Phreaknic 12 A/V team SomeNinjaMaster, Night Carnage, Greg, Brimstone, Poiu Poiu, Mudflap, and Drunken Pirate for setting up the rigs and capturing the video.

    10/29/2008

    Phreaknic 12 (2008) Hacker Con

    This is a quick and dirty video documentary of the things that when on around the talks and event at Phreaknic 12 (2008). Don't watch if you get sick at shaky cam movies like Blair Witch or Cloverfield. A rough timeline of the content in the video is as follows:

            Intro and leaving Louisville with Brian. Morgellon talks about hacking the Arduino micro controller platform. Sorteal talks about the LiVes Open Source video editor. AT&T Batman building by night. Mojo-JoJo soldering some stuff for the shooting range. The patron gods of hackerdom. Registration. Con swag overview. Morgellon  gets his discreet logic on. AK-47 building with HandGrip and Buttstock. Froggy talks up Notacon, which I plan to go to next year. Skydog explains the Jware chair toss event, and then we compete. Rootwars hacker wargames. I ask Int80 about using his nerdcore music in some of my videos. NotLarry explains rootwars. Some iPhone hacking with Lee Baird and John Skinner. I do a little Bluecaseing/Warnibbling with the Bluetooth on my Nokia n810. John, Lee, Brian and I go to the German restaurant. I blind DOSman with the light from my camera and check out what folks are doing with the Arduinos Droops brought for folks to play with. I check back in on R00tW4rz. I blind Droops. I talk Ettercap filters with operat0r. USB door key fun with the Arduino. More breadboard fun. Nokia n810 + Ettercap Filter + Lemon-part = win. Int80 gets down with his own bad self, and the rest of Phreaknic. I find an energy drink with protein. Folks play with the hardware keyloggers I brought, and we have some epic fail with the IBM Model M + USB adapter + Mac OS 10.5. Winn Schwartau joins in on the keylogger fun. DOSman and Zack use a directional antenna from the 9th floor to search downtown Nashville for WiFi access points. Zoom in on Al. John and Lee eat jerky. Daren and Shannon from Hak5 blind me this time. :) Then they do a quick interview. I interview TRiP about the legalities of wardriving, sniffing and leaving your access point open so you have plausible deniability of copyright infringement (most likely it won't hold water in court if you are a computer geek). I give Hak5 Daren beef jerky. Ziplock had more con badges than God. I meet up with Iridium. I talk with Nightcarnage about the audio/video setup at Phreaknic. As I predicted, the Potters won the WiFi Race. I say why this was the best Phreaknic ever. Using green lasers on crack dealers. Techno in the dark, the Aiptek action HD does not do well in low light. Nicodemius shows off his Minority Report like multi-touch table. Hula hoop contest. I check back in with Jeff Cotton and his USB keyed door. I strap on my gear to leave the con. Brian and I do a wrap up of our thoughts on Phreaknic 2008.

    10/27/2008 Sniffers class for the ISSA Kentuckiana
    I'm teaching another free class for the ISSA, hope some of my readers can make it. Here are the details:
    Who: Presented by Adrian Crenshaw of IronGeek.com
    What: "Using Sniffers Effectively" - hands-on workshop with network analyzers such as Wireshark and Cain.
    When: Sat, November 8, 2008 9:00 AM - 12:30 PM
    Where: Louisville Technical Institute - Room 364, 3901 Atkinson Square Drive, Louisville KY 402018 (502) 456-6509
    Directions: From 264 East get off on 1st Newburg Rd exit, Turn RIGHT at Bishop Lane, Turn RIGHT at Atkinson Dr./Atkinson Square Dr., Go .2 miles, Turn right at LOUISVILLE TECHNICAL/INTERIOR DESIGN INSTITUTE. Park in front parking lot. Go in Main Lobby to sign in.
    Why: ISSA Kentuckiana's mission is to be the Louisville Leader in Information Security and Awareness. We want to provide relevant educational opportunities to members that enable learning, career growth, and should enable certification and technical advancement.
    Cost: FREE! - Bring your own laptop or use one of the classroom PC's
    How to sign up: send email to education (at) issa-kentuckiana (dot) org
    10/26/2008

     

    Hardware Keyloggers use detection and mitigation Phreaknic Presentation slides posted
    Phreaknic was a great time this year, as always. I've posted the slides from my hardware key loggers presentation at the above link.
    I'd like to thank the following people:

    Sky Dog and crew for making it happen.
    Droops/Morgellon for their presentation on Arduino, time for some hardware hacking.
    Sorteal for showing me the LiVes Open Source video editor.
    Marie for the dance and conversation.
    TRiP for an excellent talk on the legalities of wardriving.
    HandGrip/Buttstock for the Open Source AK-47 talk.
    All the folks who let me interview them.
    DOSman and Zack form being DOSman and Zack.
    Lee Baird and John Skinner for comparing mobile hacking notes with me (Yippy hacking with the iPhone / iPwn).
    Ziplock for the encouragement.
    Int 80 for the Nerdcore entertainment.
    Scott Moulton for the talk "At Least TEN things you didn't know about your hard drive!" Go check out his forensics and hard drive recovery videos.
    Nathan Hamiel/Shawn Moyer for "Satan is on my Friends List: Attacking Social Networks", looks like I need to get into some CSRF.
    Darren, Shannon and Mubix of Hak5 for the interview.
    operat0r for the Ettercap ideas.
    Brian for driving me down.

    And everyone else I'm forgetting. It was a great weekend.

    10/20/2008 Using Cain to sniff RDP/Remote Desktop/Terminal Server traffic via "Man in the Middle"
    In this video I'll be showing how Cain can pull off a "Man in the Middle" attack against the Remote Desktop Protocol. While RDP versions 6.0 and later are less susceptible to these attacks because of the verification schemes added, there is still a risk since so many users just click yes to all warning messages.
    10/18/2008

    Network Printer Hacking: Irongeek's Presentation at Notacon 2006 now on Vimeo
    This is a presentation I did for Notacon 2006 based on my Network Printer Hacking Article. I decided to make it an embedded Vimeo page since that's a lot easier to view than to have to download the AVI.

    I've got a presentation coming up for Phreaknic next weekend on "Hardware Keyloggers: Use, detection and mitigation". If you are in Nashville TN, come on by and play with the keyloggers I'm bringing. For more info on the subject check out these articles/videos of mine:

    Hardware Key Logging Part 1: An Overview Of USB Hardware Keyloggers, And A Review Of The KeyCarbon USB Home Mini

    Hardware Key Logging Part 2:A Review Of Products From KeeLog and KeyGhost

    Hardware Key Logging Part 3: A Review Of The KeyLlama USB and PS/2 Keyloggers

    Hardware Keyloggers In Action 1: The KeyLlama 2MB PS/2 Keylogger

    Hardware Keyloggers In Action 2: The KeyLlama 2GB USB Keylogger
     

    10/16/2008 Irongeek needs hats, black or white does not matter
    I know this seems like and odd request, but I'm in need of some hats to wear at the gym and to cons. If you are a vendor or owner of some security product or site please contact me and I can send you my snail mail address (not that it's hard to Google for it, I dropped my docs long ago).
    10/16/2008 BeEF: Browser Exploitation Framework XSS Fun
    John Strand of Black Hills Security sent me another awesome video on using BeEF, cross site scripting and other fun.
    10/15/2008 Using Metasploit to create a reverse Meterpreter payload EXE by John Strand
    John Strand of Black Hills Security sent me an awesome video on using Metasploit to create an EXE with the Meterpreter payload that creates a reverse TCP connection outbound, blowing through many NAT boxes and firewalls. This goes great with a previous video I did on EXE Binders/Joiners.
    10/14/2008 Using Cain to do a "Man in the Middle" attack by ARP poisoning
    I'm creating this video for three reasons: 1. While I've done a lot of videos on Cain, most of them are more advanced and assume you know the basics. 2. The last video I did on ARP poisoning with Cain was more than four years ago, Cain looks quite a bit different now. 3. I wanted a reference for the classes I'll be teaching for the Kentuckiana ISSA. Before you watch this video, read my article "The Basics of Arp spoofing/Arp poisoning" so you will have a better grasp of the concept.
    10/11/2008 John Strand - "Advanced Hacking Techniques and Defenses" (and demos of evilgrade/passing the hash/msfpayload) from Louisville Infosec 2008
    John Strand gave this presentation for the Kentuckiana ISSA at the Louisville Infosec 2008 conference. He gives a fascinating talk about why "security in depth" is dead, and lives again. John then goes on to demo Evilgrade, using msfpayload and obscuring it against signature based malware detection, dumping SAM hashes with the Metasploit Meterpreter and using a patched Samba client to pass the hash and compromise a system. I'd like to thank John for letting me record his talk.
    10/11/2008 Rohyt Belani - "State of the Hack" from Louisville Infosec 2008
    Rohyt Belani gave this presentation for the Kentuckiana ISSA at the Louisville Infosec 2008 conference. Rohyt shows new ways to think about hacking, going into how and why simple things work on the people element. Why hack a system when a quick Google search can reveal so much? Rohyt's talk was humorous and informative, and I'd like to thank him for letting me record his it.
    10/11/2008 Adrian Crenshaw - "Intro to Sniffers" from Louisville Infosec 2008
    I gave this presentation for the Kentuckiana ISSA at the Louisville Infosec 2008 conference. I cover the basics of how network sniffers work, and specifically talk about Wireshark, Cain, Ettercap and NetworkMiner. I came up with the presentation on short order, so please be forgiving of the stumbles. :) You can download the slides from here.
    10/11/2008 Kevin Beaver - "Staying Ahead of the Security Curve" from Louisville Infosec 2008
    Kevin Beaver gave this presentation for the Kentuckiana ISSA at the Louisville Infosec 2008 conference. There's a lot of great advice in this video on how to approach an infosec career in the right way. Kevin endorses being a security "renaissance man", expanding your knowledge outside of the tech side to understand the business, people and legal sides as well. At the same time he also points out that sometimes specialization is good, so focus on your strengths. I'd like to thank Kevin for letting me record his talk.
    10/09/2008

     

    Slides from my "Sniffers" presentation posted
    Well, LouisvilleInfosec is over and it was even better this year that last. I met a lot of good folks, and I hope to have the videos up shortly. For those that were there and want my slides, they can be found here. Hope some of you can make it to the free Louisville Tech class in November.
    10/08/2008 John Strand's videos on Evilgrade, Samurai, Hacker Defender and other topics (Blackhills Security)
    I had the pleasure to meet John Strand tonight at the pre-LouisvilleInfosec dinner. Great guy, and fun to talk to. Made me realize there's a lot of stuff I need to learn about. Check out  his videos at the link above. I hope to have his keynote from the conference up at my site shortly.
    10/08/2008 New Video:Finding listening ports on your Windows box using Netstat, Fport, Tcpview, IceSword and Current Ports
    Host based firewalls are fine and dandy, but I'd rather turn off services I don't need than to just block them. Host based firewalls are sort of a bandage, and while they can be useful for knowing what is connecting out (see egress filtering), it's better just not to have unneeded network services running in the first place. This video can be seen as a supplement to my article "What can you find out from an IP?"
    10/07/2008 Update:Sniffers presentation at 2008 Louisville Metro InfoSec Conference Thursday, October 9th, 2008
    Looks like I will be presenting at the upcoming Louisville InfoSec Conference put on by the ISSA, Thursday, October 9th, 2008 at Churchhill Downs. The person they had set do do the live hacking demo had to drop out, so they asked me to fill in on short notice.
    10/03/2008 OSfuscate: Change your Windows OS TCP/IP Fingerprint to confuse P0f, NetworkMiner, Ettercap, Nmap and other OS detection tools
    I was wondering awhile back how one could go about changing the OS fingerprint of a Windows box to confuse tools like Nmap, P0f, Ettercap and NetworkMiner. I knew there were registry setting you could change in Windows XP/Vista that would let you reconfigure how the TCP/IP stack works, thus changing how the above tools would detect the OS. I wasn't sure what all registry changes to make, but luckily I found Craig Heffner's work on the subject. In this post I cover the issue of passive/active OS fingerprint detection, as well as release my tool OSfuscate.
    10/01/2008 Weak Hashing Algorithms: Outlook PST file CRC32 password cracking example
    In a previous video I explained the basics of cryptographic hashes. Go watch "A Brief Intro To Cryptographic Hashes/MD5" before this video. In this tutorial, I'll be giving an example of why weak hashes are bad. The example I'll be using is the CRC32 hash that Outlook uses to store a PST archive's password with. The CRC32 algorithm as implemented by Microsoft Outlook is easy to generate hash collisions for, so even if you can't find the original password you can find an alternate one that works just as well.
    09/27/2008 2008 Louisville Metro InfoSec Conference Schedule Posted
    Cindy was kind enough to send me the schedule for the upcoming ISSA conference in Louisville. While I'm not speaking, I did receive permission to record the keynotes from Kevin Beaver, Rohyt Belani and John Strand which I will be posting to this page. While not recording expect to see me in the technical track. Maybe I'll be able to convince some of the local ISSA guys to come down to Phreaknic with me this year.
    09/25/2008

     

    I'll be speaking at Phreaknic this year
    My talk proposal has been accepted, so I'll be giving a presentation on hardware keyloggers and their detection at this year's Phreaknic. It runs from October 24th - 25th, 2008 in Nashville, TN. It's a great event if you can make it.
    09/24/2008 Irongeek's Hacking Lab and a review of the Aiptek Action HD 1080p
    An overview of how may lab is set up, as well as a review of the Aiptek Action HD 1080p
    09/23/2008 Teaching Hacking at College by Sam Bowne
     This was a DefCon 15 presentation (August 3-5, 2007) by Sam Bowne. Sam does a great job explaining how to teach ethical hacking at a university, and since he gave me a shout out in the video I figured I'd post it up here. Definitely a must watch if you are trying to convince your college's administration that it's a good idea to teach such a course. Check out Sam's site at http://www.samsclass.info/ if you want to use his teaching curriculum.
    09/20/2008

     

    DecaffeinatID Intrusion Detection System ver. 0.08
    I changed how DecaffeinatID checks for file changes in the firewall log. It seems the under Vista Autoit does not return the correct information about when the log file has changed its size or its time stamp, so I look for line count changes instead. This really is not the best way to do things, but it's a workaround for the moment. DecaffeinatID now also tries to detect if you are running Vista, and if so set's the default path to the firewall log in the ini to "<WindowsDir>\System32\LogFiles\Firewall\pfirewall.log" instead of "<WindowsDir>\pfirewall.log".
    09/17/2008 How Sarah Palin's Email got "Hacked"
    This is a quick video reconstruction I did of how Sarah Palin's Yahoo account got "hacked". You will see it's more about insecure design and easy to find information than anything really technical. I made a test account at Yahoo and this video traces the steps the attacker took. I'm hoping it will be useful to journalists who don't really seem to have a grasp on the story. Feel free to link it anyplace you like.
    09/13/2008 New Video: Intro to DD-WRT: Mod your wireless router to do more
    DD-WRT is a Linux firmware available for many Linksys, NetGear, Belkin, D-Link, Fon, Dell, Asus and other vendor's wireless routers. DD-WRT is far more feature rich than the stock firmware that comes with most routers. This video covers the basics of installing and configuring DD-WRT.

    Two side notes: My Nmap class will be held at Ivy Tech in Sellersburg Indiana at 1PM on Sat Sept 20th 2008 in room P5. If this one goes well the next presentation will be on sniffers. Also, thanks to all of the folks who have signed up for Dreamhost using my discount code, it's really helped support the site with extra revenue.

    09/13/2008 Books page updated with "Kismet Hacking"  from Syngress
    I did some surfing on Amazon yesterday and found out my IGiGLE tool was mentioned in Syngress publishing's new book "Kismet Hacking" (Page 227), so I added it to my bibliography page. Thanks for the mention guys.
    09/09/2008 2008 Louisville Metro InfoSec Conference Thursday, October 9th, 2008
    Looks like I will be attending the upcoming Louisville InfoSec Conference put on by the ISSA, Thursday, October 9th, 2008 at Churchhill Downs. Speakers include Kevin Beaver, Rohyt Belani and John Strand. Read my review of last year's Louisville InfoSec Conference. Hope to see some of you there.
    09/07/2008 IGiGLE: Irongeek's WiGLE WiFi Database to Google Earth Client for Wardrive Mapping Updated
    I've uploaded version IGiGLE 0.75. This fixes the "$WS_EX_CLIENTEDGE: undeclared global variable." error when you try to compile with the newer versions of Autoit3. Also, I've added a feature so IGiGLE saves your last used settings to an ini file so you don't have to keep entering them over and over again.
    09/06/2008

    Nmap presentation for the ISSA in Louisville Kentucky
    This is a presentation I gave for the Kentuckiana ISSA on the security tool Nmap. I've also posted the slides and other media so you can follow along if you like. Topics covered include: port scanning concepts, TCP three way handshake, stealth scans, idle scans, bounce scans, version detection, OS detection, NSE/LUA scripting and firewall logs. Hope some of you can make it to the free class we will be holding at Ivy Tech Sellersburg on Sept 20th, 2008 at 1pm. Contact me to RSVP. The video is about an hour long. Enjoy.
    09/04/2008 Louisville ISSA Nmap presentation slides and media posted
    I've posted the slides and related media for the Nmap presentation I'm giving Friday (Sept 5) for the Kentuckiana ISSA. You should be able to find the codec for the videos in the zip file.  If you plan to come to the free class at Ivy Tech (Sellersburg Indiana) on the 20th please contact me.
    09/03/2008

     

    Quick Notes On Getting Bart's PE/Ultimate Boot CD For Windows To Boot From A Thumb Drive
    Just what the title says, it's just a lot easier to carry around a UFD on you keychain than it is a CD. I use mine for password resets, removing spyware and other odds and ends.

    Also, on other security topics check out my buddy Lee's page on hacking apps for the iPhone / iPod Touch.

    08/31/2008

    MadMACs seems to have an issue with the Intel Wireless WiFi Link 4965AGN chipset
    I've added the following note to the MadMACs page: A patron of my website pointed out that MadMACs, and other similar tools, seem to have a problem randomizing the MAC address under Windows Vista if you are using the Intel Wireless WiFi Link 4965AGN chipset. It will work with the 4965AGN  if you randomize only the last two digits, and start it with the prefix 1234567890. It will also let you set the whole MAC address to DEADBEEFCAFE, or even let you randomize all 12 hex digits. However, if you take the default prefix of 00, MadMACs will make a random address up and put it in the NetworkAddress registry value, but the 4965AGN chipset drivers will not honor it. If anyone knows why, please contact me.
    08/28/2008 Nmap presentation and class in Louisville area
    Hi all, my GRE test went well and I'm back to working on the site. I've been invited by the Kentuckiana ISSA chapter to give a presentation on Nmap and its use.  The event happens Sept 5, 11:30AM at the following location:

    Innovative Productivity / McConnell Technology
    401 Industry Rd, Louisville, KY 40208


    The ISSA would like to have an RSVP. Also, I'll be giving a longer hands on demonstration and lab later on in September where people can bring their own laptops and use a private network to get some hands on experience with Nmap. We are not sure of all of the details yet, but it will likely be held Sept 20th at the Ivy Tech campus in Sellersburg, IN.

    Also, this month's Louisville 2600 meeting is coming up on Thursday, Sept 24th. More details can be found here: http://louisville2600.org/

    08/07/2008

     

    MadMACs Ver. 1.2: Update to my MAC address and host name changer / randomizer / spoofer  
    Q
    wasty let me know that if host name randomization is used with MacMACs, and the host name is over 15 characters (or has certain bad illegal characters) it can cause all sorts of lsass.exe errors on boot up. To fix this, I've updated the code to do some sanity checks on the possible hostnames given to it in dic.txt. Hopefully this fixes the problem. I also compiled it with the newer Autoit3 v3.2.12.1.
    08/04/2008 Cain RDP (Remote Desktop Protocol) Sniffing Log Parser
    This is a quick script I wrote to easy the process of interpreting the logs that Cain makes when you do a man in the middle against the RDP protocol. I hope to use it in a video tutorial shortly. My GRE studies are still ongoing, so please excuse the lack of updates to this site. As a side note, the Louisville 2600 group now has it's own site, and the ISSA Kentuckiana chapter's site is back up.
    07/23/2008 Baby Bubba Finds A New Mummy: A Zombie Children's Book
    Ok, this one is not security related, but those of you who know me know I have a thing for zombie movies. See my LAN Of The Dead article on computer zombies to see what I mean. Pascalle Ballard and I started to work on our own children's book, with a baby zombie as the lead character. Follow the link, I hope you will enjoy it.
    07/08/2008 Small amendment to my Ironkey Review
    Marc Luo from Ironkey emailed me his thoughts on my video, so I attached the text to the end of the page. Marc reveals some of Ironkey's future plans, why some design decisions were made and what he sees as some of the advantages of the Ironkey. I hope it clarifies some of the points I made in the video. 
    07/08/2008

    New 2600 Meet in Louisville, KY
    Announcing the forming of a new 2600 meeting in the Louisville, KY, New Albany/Jeffersonville/Clarksville, IN and the surrounding area. We are looking for old faces and new faces to come and join us in discussion and hopefully projects in all things hacking. From computer security, to programming, to penetration testing and exploiting. It has been far too long since Louisville and its surrounding area have seen a group of security talent and we want to change that. If you want to be a regular, have a general interest or just want to converse with fellow techies please join us for our inaugural meeting.

    When:  Thursday July 31, 2008 @ 6:30pm
    Where: Highland Coffee behind the Blockbuster near Bardstown road and Grindstead in Louisville, KY.
    Google Map Link

    Contact me if you think you can attend.

    07/07/2008 New Video:Ironkey High Security Flash Drive: Use and Review
    The Ironkey is a high security thumb drive designed to provide strong AES encryption, tamper resistance and other security services. I'd seen the Ironkey advertised quite a bit, and even read about its crypto systems and ruggedness, but was left wondering about how it works in operation. Since the hardcore tech side has been covered elsewhere, I'll concentrate on the Ironkey's usability and features. Some of the topics covered will include: How is the drive mounted without admin privileges in Windows? How is it mounted in Linux? How does the "Self Destruct" feature work? What is Secure Sessions? How is the Ironkey better than just using Truecrypt? I made this video to answer those sorts of questions for myself and others. If you want more details on the crypto involved, see the links section at the end of this video. The model I will be working with is the 1GB Ironkey Personal. I'll show its use and give my opinions on the device.

    By the way, you may notice that I'm making fewer posts over the next month or so. I'll be busy studying for the GRE, wish me luck.

    07/04/2008 Web Bug Article Updated With PHP/MySQL Source Code
    I've updated my very old article on web bugs/web beacons to straighten out some bad formatting and to add an example of a web bug that uses PHP and MySQL. For those that don't know, Web Bugs are images (Gifs, Jpegs, PNGs, etc.) that companies and organizations put into web pages, e-mails and other HTML supporting documents to track information about the viewer. These images are sometime know by other names such as tracking bugs, pixel tags, web beacons or clear gifs. What ever the name, their function is largely the same.
    07/04/2008 Dreamhost Review Updated
    It came to my attention that my Dreamhost review was a bit dated and had wrong information based on changes that Dreamhost has made over the last year. I've updated it to reflect some of Dreamhost's new polices, my experiences and how the discount codes differ from when I last updated it (1/31/2007). I've also have five limited discount codes to give away that grant the following: 2TB disk and 20TB bandwidth, gives $150 off a 5-year signup or $200 off a 10-year signup. Contact me if you want one of my five one time use codes.
    06/26/2008 New Video:Setting up a Tarpit (Teergrube) to slow worms and network scanners using LaBrea (The "Sticky" Honeypot and IDS)
    A network Tarpit, sometimes know by the German word Teergrube, is a service or set of hosts that deliberately try to slow malicious network connections down to a crawl. The idea is to put up unused hosts or services on the network that respond to an attacker, but do things to waste their time and greatly slow their scanning (or spreading in the case of Worms). For this video I'll be using a package called LaBrea by Tom Liston and tarpitting unused IP addresses on my home LAN.

    Also, DecaffeinatID Intrusion Detection System ver. 0.07 is out.

    06/24/2008 Ironkey at the Kentuckiana ISSA meeting on June 27th 2008
    Steve Tonkovich from Ironkey will be giving a talk at the ISSA-Kentuckiana Chapter Meeting on Friday June 27, from 11:30 am to 1:00 pm. Ironkey's discussion will be on securing mobile data. The meeting will be held at their new location: Innovative Productivity / McConnell Technology
    Hopefully I can convince Steve to give me a demo unit of the Ironkey thumb drive to test for a review on my website.

    As a side note, DecaffeinatID ver. 0.06 is out.
    06/23/2008

     

    DecaffeinatID Updated to ver. 0.05
    Several major improvements have been implemented. The various monitoring functions are now set off via a timer. This allows the event loop to be looser, the GUI more responsive and DecaffeinatID to be less of a hog on the CPU. This caused a change in the way that the sleep parameter in the INI file is interpreted. Now the sleep parameter specifies the amount of time in milliseconds between each monitor function (ARP cache, Firewall and Event Log). For example, with the new default of "sleep=1000", DecaffeinatID waits about one second between each monitor function, so to go through one cycle takes about three second  with the default setting (I've taken it down to "sleep=100" without major problems). The only downside to this is that some alerts may be skipped if several happen at nearly the same time, but since DecaffeinatID's main function is just to alert you of network shenanigans this is a worthwhile compromise (when DecaffeinatID warns you about something, you really should check your logs for more details anyway). I've also fixed a problem with ARP cache parsing that was caused by the word "invalid" in the output of the "arp -a" command.
    06/22/2008 New Video:Compiling and Configuring DHCPD from Source
    Devil2005 has created a video on compiling and configuring dhcpd from source. He's using the Fedora 9 distro of Linux for the video, but the lessons learned should be applicable to other distros. For that matter, even if you are not interested in installing dhcp in this way it's still a good lesson on how to download and compile various applications from source.
    06/21/2008 Doktor Kaboom's Smoke Ring Cannon
    Even though this is not computer security related, it was such a cool display I had to share it with my hacker buddies. I guess you could call it hardware hacking of sorts, with cool science principles. Make sure you re-watch the first few seconds a couple of times to get the full effect. I saw Doktor Kaboom's Smoke Ring Cannon at this years Kentucky Renaissance Faire. Now it's time to make one of these things for myself. Check out Doktor Kaboom's site at:
    http://www.doktorkaboom.com/ 
    06/20/2008 DecaffeinatID: Simple IDS/ ARPWatch For Windows Updated
    Jabzor was the first major contributor to the project. He did some major rewriting, making a better GUI, making my code prettier/easier to maintain and laying out the INI file better. I made further changes to Jabzor's GUI and made the ARP Watching function a little more efficient (Still needs much work).
    06/19/2008 DecaffeinatID: A Very Simple IDS / Log Watching App / ARPWatch For Windows
    DecaffeinatID started because I wanted a simple ARP Watch like application for Windows. In a short matter of time, feature creep set in. DecaffeinatID is a simple little app that acts as an Intrusion Detection System (more of a log watcher really) to notify the user whenever fellow users at their local WiFi hotspot/ LAN are up to the kind of "reindeer games" that often happen at coffee shops and hacker cons.
    06/11/2008 PEBKAC Attack Script: Finding passwords in event logs
    Ever wanted to quickly search a Windows Event Log to find passwords users inadvertently typed into the user name field? Well, this script should make it easy to do such audits. Read the rest of the article for details. Also, if you are interested in using BackTrack for pen-testing, check out my friend Lee Baird's collection of videos and documentation on BackTrack and other hacking topics.
    06/09/2008 New Video:Using Data Execution Prevention (DEP) in Windows XP and Vista: Fighting back against buffer overflows and memory corruption
     I've recently become interested in measures that modern CPUs can take to prevent various types of memory corruption attacks. One such feature is the NX bit (as AMD calls it, XD is Intel's term), which allows for memory pages to me marked as not executable. Microsoft Windows started using this ability with XP SP2 as part of their Data Execution Prevention (DEP) feature. Unfortunately, to get most out of DEP you have to configure it. This video will show how to configure DEP protection in Windows XP and Vista.
    06/07/2008 New Video: DNS Spoofing with Ettercap
    In my previous two videos I showed how to use Ettercap plugins for various pen-testing and security evaluation functions. In this video I'll show how to use the Ettercap plugin dns_spoof to set up DNS spoofing on the local area network.
    06/04/2008 A Review of "Building Secure Products and Solutions"
    This is a little article I wrote for the Operations Management class I'm in. Most Irongeek readers may not be interested in it, but I wrote it so I might as well post it.
    05/29/2008 New Video: More Useful Ettercap Plugins For Pen-testing
    In my previous video I showed how to use Ettercap plugins to find sniffers on the network. In this video I'll show three more useful Ettercap plugins: find_ip, gw_discover and isolate.
    05/26/2008 How To Cyber Stalk Potential Employers Article Updated
    I updated the "Social Networking Sites" section with information about RapLeaf. I also updated the "Mail Headers" section with information on the *nix command line whois and Nirsoft's Windows tools IPNetInfo and WhoIsThisDomain.
    05/24/2008 Fed Watch
    I was curious to see what government agencies might me using my site for training. I also wanted to learn PHP + MySQL a little better, so I wrote this project. It takes my logs and shows all of the hosts names ending in .mil or .gov, and what pages they visited. I obfuscated the first part of the host names, and the last two octets of the IPs so as to not "drop their docs" so to speak.
    05/20/2008 Detecting Sniffers Video Updated
    PurpleJesus from Binrev informed me that my last video was having weird audio issues with some versions of the Flash plugin. I did some Flash-VooDoo and it seems to be ok now. Let me know if there are any problems.
    05/20/2008 New Video:Finding Promiscuous Sniffers and ARP Poisoners on your Network with Ettercap
    Most of you are familiar with using Ettercap for attacking systems, but what about using it to find attackers? This tutorial will cover using Ettercap to find people sniffing on your network. The plug-ins we will be using are search_promisc, arp_cop and scan_poisoner.
    05/19/2008

     

    BackTrack Beta 3 Man Pages
    I've decide to covert the man pages that come with the BackTrack Beta 3 Live CD to HTML and post them to my site. I've just done the ones in /usr/local/man, so expect a few bad links. This will make it easier for me to link to the man pages from my other videos and articles. Tools include in the list are:
    aircrack-ng, airdecap-ng, airdriver-ng, aireplay-ng, airmon-ng, airodump-ng, airolib-ng, airpwn, airsev-ng, airsnort, airtun-ng, amap, ascii-xfr, atftp, bison, bsqldb, buddy-ng, cabextract, catdoc, catppt, datacopy, dcfldd, decrypt, defncopy, dhcpdump, dmitry, dos2unix, dupemap, easside-ng, etherape, flex, foremost, freebcp, gencases, getattach.pl, hexedit, httpcapture, ike-scan, ivstools, kstats, mac2unix, macchanger, magicrescue, magicsort, makeivs-ng, mboxgrep, minicom, nemesis-arp, nemesis-dns, nemesis-ethernet, nemesis-icmp, nemesis-igmp, nemesis-ip, nemesis-ospf, nemesis-rip, nemesis-tcp, nemesis-udp, nemesis, netcat, nmap, nmapfe, obexftp, obexftpd, p0f, packetforge-ng, psk-crack, rain, runscript, scrollkeeper-config, scrollkeeper-gen-seriesid, sipsak, socat, tcptraceroute, truecrypt, tsql, unicornscan, vomit, wesside-ng, wordview, xls2csv, xminicom, xnmap, gdbm, etter.conf, scrollkeeper.conf, sudoers, scrollkeeper80211debug, 80211stats, arpspoof, atftpd, athchans, athctrl, athdebug, athkey, athstats, ath_info, dnsspoof, dnstracer, dsniff, ettercap, ettercap_curses, ettercap_plugins, etterfilter, etterlog, filesnarf, fping, fragroute, fragtest, hping2, hping3, in.tftpd, macof, mailsnarf, msgsnarf, netdiscover, packit, scrollkeeper-preinstall, scrollkeeper-rebuilddb, scrollkeeper-update, sing, sshmitm, sshow, sudo, sudoedit, tcpick, tcpick_italian, tcpkill, tcpnice, tinyproxy, urlsnarf, visudo, webmitm, webspy, wlanconfig

    Enjoy.

    05/14/2008 Physical Security, Locking Picking,  and more: Bloomington Fraternal Order Of LockSport
    Normally I cover electronic security, but as we all know if someone has physical access to your box they OWN your box. One reason to look into high security locks and lock bypassing is to increase the physical security of your assets my knowing what works and what doesn't. My friend DOSMan gave a presentation recently at Notacon 5 called Lock Picking in the New Frontier - From Mechanical to Electrical Locks you should check out if you are interested in physical security. Also check out the Bloomington FOOL organization if you are interested in Locksport in general.
    05/10/2008

     

    New Video: A Brief Intro To Cryptographic Hashes/MD5
    A cryptographic hash function takes an input and returns a fixed size string that corresponds to it, called a hash. Cryptographic hashes have a lot of uses, some of which are: detecting data changes, storing or generating passwords, making unique keys in databases and ensuring message integrity. This video will mostly cover detecting file changes, but I hope it gets your mind going in the right direction for how hashes can be used. Specifically covered will be tools for creating MD5 hashes in Windows and Linux.
    05/04/2008 Irongeek In Print: Books that mention Irongeek.com
    I did some looking around and it seems my site is mentioned in a few books. I've decided so start this page to keep track of book references to Irongeek.com. If I'm missing any please let me know, I found these first few via Google Books.
    04/30/2008 I've updated my A Quick Intro To Sniffers article to fix a stupid error I made where I mistyped 801.11 instead of 802.11.
    04/24/2008

     

    New Video:Text to Speech to MP3 with the freeware program DSpeech
    This video is on Dspeech, a freeware tool that uses Microsoft's SAPI (Speech Application Programming Interface) to convert text to spoken word. What's special about it is it lets you make an MP3 of the text, so you can listen to it on your computer, in you car or on your MP3 player. It's great for listening to study notes.

    As an unrelated side note, a friend of mine want's me to mention his humor page on celebrities, politics and gadgets. Hope you enjoy it.
    04/18/2008

     

    IGiGLE: Irongeek's WiGLE WiFi Database to Google Earth Client for Wardrive Mapping Updated
    IGiGLE is a little app I wrote that lets you directly import data from the online WiGLE WiFi Wardrive database into a KML file, then view it in Google Earth.  I've made sure it works with the newest version of Google Earth 4.3, and recompiled it with the newest stable version of Autoit. If you want more details on how to use it, check out my video Wardrive Mapping With IGiGLE And WiGLE.
    04/10/2008 Getting Ubuntu Linux to connect to a PPTP Cisco VPN 3000 Concentrator
    Just a quick notes page to help others that have the same problems I did. By the way, I plan to be at Conglomeration April 18th-20th. While it's not a Hacker/Security con, it's still a fun little Sci-Fi/Fantasy convention with plenty of geeky types running around. Let me know if you're a reader of Irongeek.com and plan to be there.
    04/06/2008 Irongeek's Infosec Wargame Servers Explained
    I updated my post to explain that it was an April 1st joke, and link off to real ways to test your computer security skills. By the way, did anyone decode the QR Code I posted?
    04/01/2008

    Irongeek's Infosec Wargame Servers
    I'd like to announce the launch of my own wargame servers for testing out your computer security skills. The host names are:

    hackme1.irongeek.com
    hackme2.irongeek.com
    dosme1.irongeek.com

    Try out Nmap, Nessus, Metasploit and other tools on these boxes. Please let me know your findings. Thanks to my hosting provider Dreamhost. If you want to know more about Dreamhost check out my review (and coupon codes), they have been pretty good to me.

    03/18/2008 New Video:Hardware Keyloggers In Action 2: The KeyLlama 2GB USB Keylogger
    This video will demonstrate one of the KeyLlama brand of hardware keyloggers in action, specifically the 2GB USB model. I know some of you are getting sick of me talking about hardware keyloggers, so I plan on this being my last entry on them for awhile.
    03/14/2008 I've updated the Irongeek Campuses page with a few new schools, please contact me if your university uses my materials for teaching information security. Also, I've started to help out the The Mitzvah Group with their charity work. Check out and join their Myspace page, especially if you live in the Southern Indiana/Louisville Kentucky area.
    03/05/2008 Ghost 11 Plugin for Bart's PE Builder (BartPE)
    I took the on Ghost 8 plugin and modified it a bit to work with Ghost 11.
    03/04/2008 Hardware Key Logging Part 3: A Review Of The KeyLlama USB and PS/2 Keyloggers
    This article is about the KeyLlama brand of hardware keylogger, specifically the 2MB PS/2 model and the 2GB USB model.
    02/20/2008 Update:I made a small note at the top of my recent "Encrypting The Windows System Partition With Truecrypt 5.0" video. I used Photorec to do some file carving to see how secure Truecrypt's Windows system partition encryption was. Photorec was only able to recover two files, one ASP/TXT file and one PCX, but on closer examination both were false positives. They just contained seemingly random data, which Photorec mistook as real file headers. Truecrypt seems to do a very good job of securing the data on your system drive.

    As a side note, if anyone else is using LinkedIn please feel free to add me and give me a recommendation for the work I've done on this site. Who knows, it may help me find a good career opportunity in my area.

    02/11/2008 New Video: Encrypting The Windows System Partition With Truecrypt 5.0
    Truecrypt 5.0 adds many new features, most importantly Windows system partition encryption. To put it in slightly inaccurate layman's terms, this means encrypting your entire C: drive. Even if you already write your sensitive data to an encrypted space, files are sometimes squirreled away in unencrypted temp space or in the page file where they may be recovered. Using Truecrypt to encrypt your Windows XP system partition will help eliminate this problem.
    02/05/2008 New Video:Hardware Keyloggers In Action 1: The KeyLlama 2MB PS/2 Keylogger
    This video will demonstrate one of the KeyLlama brand of hardware keyloggers in action, specifically the 2MB PS/2 model. I hope this video will give the viewer a better grasp of how these hardware keyloggers work.
    01/28/2008

     

    New Video:Encrypting VoIP Traffic With Zfone To Protect Against Wiretapping
    Some people worry about the easy with which their voice communications may be spied upon. Laws like CALEA have made this simpler in some ways, and with roaming wiretaps even those not under direct investigation may lose their privacy. Phil Zimmermann , creator of PGP, has come up with a project called Zfone which aims to do for VoIP what PGP did for email. Thanks to DOSMan for his help with this video.
    01/16/2008 Hacking and Pen-Testing With The Nokia 770/800/810 Notes Updated
    I've updated my notes with a little more info on the n810 and links to new repositories (thanks to Andrew Lemay.)
    01/14/2008 New Video:Using GPG/PGP/FireGPG to Encrypt and Sign Email from Gmail
    This tutorial will show how to use GPG and the FireGPG plug-in to encrypt and decrypt messages in Gmail. GPG is an open source implementation of OpenPGP (Pretty Good Privacy) , a public-key-encryption system. With public key encryption you don't have to give away the secret key that decrypts data for people to be able to send you messages. All senders need is the public key which can only be used to encrypt, this way the secret key never has to be sent across unsecured channels.
    01/12/2008 Nuclear War Survival Myths
    I did not write this article, and while it's not about computer security it is about security. My interest in this subject was renewed after watching the TV series Jericho (watch it so it stays on the air). I thought this article was interesting enough to warrant mirroring, and it seems to jive pretty well with what I have read from other authors such as Duncan Long and Cresson H. Kearny on the subject. Please don't think I'm a paranoid, tin-foil-hat wearing freak, but I am a child of the 80's and a fan of post-apocalyptic fiction. Don't worry, my video on PGP/GPG is on its way.
    01/07/2008 Personal Privacy Programs
    Hi all. I've decided it's time to start focusing on software that helps users maintain their privacy. I've already done videos on DBAN, Eraser, CCleaner, TrueCRYPT and Tor. I hope to have one on PGP/GPG/FireGPG up soon. What other must have privacy software do you recommend I cover? Let me know via my contact page, to which I've recently added my OpenPGP key.
    12/29/2007 Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin and Wyoming added to the state hacking laws page
    That should be all 50 states, now I may add some federal stuff.
    12/26/2007

     

    New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina and South Dakota added to the state hacking laws page
    More to come.
    12/25/2007 Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire and New Jersey added to the state hacking laws page
    Happy Christmas.
    12/24/2007 Iowa, Kansas, Louisiana, Maine and Maryland added to the state hacking laws page
    12/23/2007 California, Colorado, Connecticut, Delaware, Florida, Georgia, Hawaii, Idaho and Illinois added to the state hacking laws page
    As the link says, I've expanded the page on computer trespass laws. Expect more tomorrow.
    12/23/2007

     

    State Hacking/Computer Security Laws
    I thought it would be a cool project to collect all of the state hacking/computer fraud laws I could find into one collapsible menu system. I plan to add around 5 states per day until I get them all. If anyone wants to help with the project drop me a line.  So far I've done Alabama, Alaska, Arizona, Arkansas and my home states of Indiana and Kentucky.
    12/18/2007 Hi all. Just posting to let you know I'm still around. I've be busy with school, Christmas and other personal matters. I did not want anyone to think the site was no longer active. It may be 2008 before the next update, but it's still an active project of mine.
    11/13/2007 New Video: WebGoat 1: SQL Injection Demonstration
    SQL injection is a common web application attack that focuses on the database backend. WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. I plan to use WebGoat for a few future videos. This first WebGoat video will show the basics of installing WebGoat and doing two of its SQL injection lessons.
    10/25/2007 New Video: XAMPP: an easy to install Apache daemon containing MySQL, PHP and Perl By devil2005
    10/23/2007 Louisville InfoSec Conference Write-up
    Just a quick write-up of my experiences at the event.
    10/22/2007 New Video:RFID Show and Tell with Kn1ghtl0rd and lowtek mystik
    While at PhreakNIC I got a chance to interview Kn1ghtl0rd and lowtek mystik about their research into RFID, its hackabilty and other information.
    10/21/2007 Well, I'm home from the Louisville InfoSec and PhreakNIC conferences, and there's two cool projects I want to tell you about. The first is WebGoat, a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. The other is De-Ice, a series of live CDs for presenting pen-testing scenarios. Each CD has a scenario you have to pen-test against, so you learn the process and not just the tools. I plan to do videos soon on each project. Thanks to all of my fans who encouraged me at the con, too bad none of you were female. :)
    10/17/2007 New Script: Thumbscrew: Software USB Write Blocker
    Thumbscrew is my attempt at a poor man's USB write blocker. When used it allows you to quickly enable or disable writing to all USB mass storage devices on your Windows system. It may be of use to some of you who are studying forensics.
    10/16/2007 New Script: Thumb Sucking: Automatically copying data off of USB flash drives
    Just a quick script I wrote for pen-testing. Think of it as the reverse of Dosk3n's tutorial. By the way, two days till the Louisville InfoSec 2007 Conference, and three till PhreakNIC.
    10/15/2007 New Video: Using Metagoofil to extract metadata from public documents found via Google
    As many of my viewers know, I have an interest in metadata and how it can be used in a pen-test. Thanks to PaulDotCom I found out about a tool called Metagoofil that makes it easy to search for metadata related to a domain name.
    10/12/2007

     

    New Video:Creating An Auto Hack USB Drive Using Autorun and Batch Files. By Dosk3n
    Dosk3n was kind enough to send me the video, text an narration for a new infosec video. All I had to do was plug it into my template. If anyone else wants to submit a video, read my page on How I Make The Hacking Illustrated Videos. My only stipulations are that it has to be narrated and can't have copyrighted music in it. I also plan on changing the InfoSec videos page around to be easier to search.
    10/10/2007

     

    Updated Article: What can you find out from an IP?
    I've done a few small updates to the article, see the change log. Thanks to PaulDotCom for telling me about "Moan My IP". I think this FAQ needs some expanding, so if you have any ideas email me.
    10/09/2007 New Video:How To Burn An ISO Image To A Bootable CD
    Ok, I know it does not seem a worth topic for the Hacking Illustrated series, but you have to admit the question gets asked a lot. Now we have something to point people to when they ask on forums how to burn an ISO using a free application. Feel free to link to this when the question is asked.
    10/06/2007 File Systems and thumb drives: Choosing between FAT16, FAT32 and NTFS to get a faster USB Flash Drive
    What file system should you choose to speed up your thumb drive? Read on.
    10/04/2007 Itinerary For Louisville InfoSec 2007 Conference Posted
    The schedule is up for the Metro Louisville InfoSec Conference happening Oct. 18th. If you are a reader of Irongeek.com please come by and say hello, you will most likely find me sitting in on the technical track presentations.
    10/04/2007 Irongeek on Campus
    It's come to my attention that some Universities and other educational institutions are using my videos in their InfoSec classes. I think this is great, but I'd like to compile a list of such campuses. If your campus uses my videos, please send me an email with the institutions name and a link to their web site. So far Jackson Community College is the only name on the list, but I know there's more to come.
    10/01/2007 New Video: Wardrive Mapping With IGiGLE And WiGLE
     For those that don't know, WiGLE is an online database of Wireless Access Points (802.11A/B/G/N) that is contributed to by folks using Netstumbler, Kismet and other wardriving tools. WiGLE has a web interface of its own, as well as Java desktop client called JiGLE, but I thought that I should make my own interface to the data to fit my needs. That's why I wrote a program called IGiGLE to query WiGLE and turn the data into a KML (Keyhole Markup Language) file that is easy to import into the Google Earth desktop application. With the generated KML file and Google Earth it's easy to view and parse the access points found by you and other WiGLE users.
    09/30/2007 Hacker Meets Hacker: Irongeek Meets Kane Hodder
    Of course, I mean a different kind of hacker. If you don't know who Kane is, then I guess you won't get the joke.

    Check out the inscription:

     

    09/26/2007 New Video: Nokia 770/800 Pen-Testing Setup (Nmap, Kismet, Dsniff and other fun stuff)
    This video introduces the viewer to using a Nokia Internet Tablet as a pen-testing device.
    09/25/2007 Metro Louisville InfoSec 2007 Conference

    It looks like there's going to be an information security conference in my neck of the woods next month. The  ISSA-Kentuckiana is holding the Fifth Annual Metro Louisville Information Security Conference Oct 18th at Churchill Downs. Considering the location, maybe they should have called it "Hackers and Horses". From the event site:

    The ISSA-Kentuckiana board of directors is proud to announce the 5th Annual Metro Louisville Information Security Conference. It is a full day event on October 18th, 2007 that will be held at Churchill Downs. Our keynote speaker is Marcus Ranum, a world-renowned expert on security system design and implementation. In addition to the keynote, multiple technical, business/compliance, and demonstration-oriented breakout sessions will be held. Up to 6-CPE credits may be earned by attendance.

    I'll be attending, hope to see some of you there.

    09/22/2007 Hacking and Pen-Testing With The Nokia 770/800 Notes
    I've put up the first draft of my Nokia 770/800 notes. Hope you enjoy it.
    09/21/2007 My buddies Kn1ghtl0rd and lowtek mystik will be doing a presentation at this years PhreakNIC about RFID. From the presentations page:

    Last year's presentation was high level functionality and basic knowledge of what RFID is. The year they will present the low level technical specs on different communication types, the physics behind RFID reading and transmitting, and the actual circuitry of an RFID tag and what it takes to make them operate more consistently. The presentation will also cover actual tag data and coding schemes with standardization including EPC Gen 2 and other ISO standards such as PayPass RFID enabled credit cards. There will be reader/writer demonstrations as well as other proof of concept demonstrations.

    Watch last years presentation

    09/20/2007

     

    New Video: Forensic Metadata in Word Docs and Jpegs supporting Exif
    Metadata is data about data. Different file formats store extra data about themselves in different ways. This video will cover metadata that can be used during a forensic investigation, namely MS Word doc metadata and the metadata stored in a Jpeg's Exif data. Also, if you are an educational institution that uses my videos in class, please let me know so I can add you to the Irongeek Campuses page.
    09/12/2007 WinZombies: Desktop of the Living Dead
    This is a little project I've been working on. It draws zombies that crawl around your desktop and interact with the windows. It's based on WinPenguins by Michael Vines (who did all of the hard work), with sprites from MSlugDB. I hope you find it to be a fun desktop toy.
    09/10/2007 WinPenguins Modified for Visual Studio 2005
    A cute little desktop toy, slightly updated.
    09/01/2007

     

    IGiGLE: Irongeek's WiGLE WiFi Database to Google Earth Client for Wardrive Mapping Updated
    IGiGLE is a little app I wrote that lets you directly import data from the online WiGLE WiFi Wardrive database into a KML file, then view it in Google Earth. Jim Forster emailed me to let me know that "Query by ZIP" was not working, it seems WiGLE changed their API on me. I've fixed it by using the US Census site to get the LAT/LONG by querying the ZIP. Let me know if there are any problems.
    08/28/2007 My New Horror Blog
    Sorry that it's been awhile since I've posted, I've been up to other things. If you've read my LAN Of The Dead article on computer zombies, you know I dig horror movies. One new project of mine, unrelated to security, is a horror blog. It's mostly a blog aggregator for now, but I do plan to post my own reviews there as well. This should give me a chance to play around with Wordpress, its plugins and  RSS/Atom feeds. Don't worry, more security videos and articles are to come.
    08/08/2007 New Video: Remote Password Auditing Using THC-Hydra: Or, why brute force/dictionary attacks don't work (often).
    07/30/2007 I've updated my A Quick Intro To Sniffers article to flesh it out, fix a few links (Ethereal to Wireshark) and of few other tweaks such as links to my videos. Let me know what else you think I should add.
    07/25/2007 Using Darik's Boot and Nuke (DBAN) to totally wipe a drive
    Another continuation of my file carving video and selective file shredding (DOD 5220.22-M) to thwart forensics tools video, this video shows how to use Darik's Boot and Nuke (DBAN) to totally wipe a drive. DBAN is a great tool to add to your anti-forensics tool box
    07/12/2007 New Video: Selective file shredding (DOD 5220.22-M) with Eraser and CCleaner to thwart forensics tools
    A continuation of my file carving video, this video shows how to use Eraser and CCleaner to help thwart forensics tools.
    07/04/2007 How To Cyberstalk Potential Employers
    This article is not nearly as deviant as it sounds. It gives basic tips on how to research an employer passively using social networks, DNS information, e-mail headers and other tactics before an interview.
    07/02/2007 IGiGLE WiGLE to Google Earth Wardrive Mapping App Updated
    I've updated my IGiGLE app so you can filter by the date that the WiFi access points were found. I figured this was needed since a lot of the data in WiGLE goes back a few years. This should make it easy to expunge old, no longer existing WAPs from your maps.
    06/26/2007 New Video: Setting up a simple web proxy with CGIProxy
    A quick guide to setting up James Marshall's CGIProxy Perl script and how proxies are used to get around web content restrictions and stay anonymous. This video also shows how to quickly find an open CGI proxy with a search engine.
    06/13/2007 New Video: Data Carving with PhotoRec to retrieve deleted files from formatted drives for forensics and disaster recovery
    This video introduces the concept of data carving/file carving for recovering deleted files, even after a drive has been formatted.
    06/11/2007 New Video: Using Cain and the AirPcap USB adapter to crack WPA/WPA2
    A follow up to the previous video, this one of course covers auditing the security of a WPA protected WiFi network.
    06/06/2007 New Video: Intro to the AirPcap USB adapter, Wireshark, and using Cain to crack WEP
    This video introduces the viewer to the AirPcap USB adapter, and auditing WiFi networks with it.
    06/04/2007 How I Make The Hacking Illustrated Videos
    Some people have contacted me about hosting their videos. I've updated my page on how I create my "Hacking Illustrated" videos so the people have a better idea how it's done. If you would like to submit a video please contact me. You will of course get full credit for your work an link off to your personal site. It might be a good way to throw some traffic at your own InfoSec page.
    05/30/2007 UPnP Port Forwarding and Security
    This video introduces the viewer to port forwarding with Universal Plug In Play, and some of the associated security problems.
    05/23/2007 New Article: Building an InfoSec lab, on the cheap
    05/21/2007 I've updated my Links section, and have added two new sections: Hire Me and Advertise on Irongeek.com.
    05/17/2007 I updated my review of the UT-41 GPS with some information from Jaku about getting it to work in Mac OS X.
    05/15/2007 Mineral Oil Submerged Computer aka "The 1337 Fleet"
    My friend Glj12 wrote an article on cooling a computer in mineral oil. Go check it out if you are into overclocking.
    05/03/2007

     

    Video: Notacon 2007
    Just some video I took while at Notacon 2007. Plenty of stuff for those with an interest in hacking and digital arts. Radar, full motion video on an 8088, a great Bluetooth discussion, shock sites, stun guns, Everclear, IPTV show hosts, Demoparty/Demoscene, hacker condoms, Ethernet alternatives, fire staffs, laser data links and more.
    04/26/2007 "Hardware Key Logging Part 2:A Review Of Products From KeeLog and KeyGhost" is up. If you see me at Notacon this weekend ask about them, I should have the keyloggers with me and I plan to demonstrate them in one of the exhibit rooms.
    04/10/2007 I've updated the Wall of Social Science Majors Page. It now has a link to my Slax based Live CD from which you can run the password logging wall. Thanks to Droops for introducing me to Slax. If you are at Notacon 4 you will hopefully see this code in action.
    03/27/2007 About a month from now Notacon 4 will be happening in Cleveland, OH, April 27th-29th. I'll be attending along with my friends from The Packetsniffers and Infonomicon.


    I hope that some of you will be able to make it as well. It's a fun little hacker/digital arts convention. We had a great time last year, and intend to do the same this year.

    03/26/2007 I have a new article out titled "Hardware Key Logging Part 1: An Overview Of USB Hardware Keyloggers, And A Review Of The KeyCarbon USB Home Mini". I cover when and where a hardware keylogger maybe be appropriate, along with ways it could be detected and defeated. This installment also reviews the KeyCarbon unit from BitForensics, future articles will cover the KeeLog and KeyGhost products.
    03/20/2007 ALT+NUMPAD ASCII Key Combos: The α and Ω of Creating Obscure Passwords
    I've been "character encoding hell" just trying to get this article up. I doubt even the title will render right in all of the RSS feeds/pages. Enjoy.
    03/19/2007 Updated Article:Fun with Ettercap Filters
    Jon.dmml emailed me to let me know about a technique Kev mentioned on the Ettercap forums. After implementing it, my web page image replacement filter works A LOT better. Try it out and have fun, but please be polite.
    03/18/2007 New Video:Remote Access And Configuration: Setting Up SSH and VNC On Ubuntu Linux (SOHO Server Series 3)
    03/16/2007 New Video:WEP Cracking with VMplayer, BackTrack, Aircrack and the DLink DWL-G122 USB Adapter
    This one is by Glj12, with a little intro by me. If you are wondering when I'm going to have some more solo project out, the answer is soon. I've got a USB hardware key logger review coming soon, and I'm working on a Live CD to run my "Wall Of Social Science Majors" from for the next Notacon. Hope to see some of you there, feel free to buy me an energy drink.
    03/12/2007 Glj12 from Leetupload.com has released his tutorial on using BackTrack 2 to crack WEP. Enjoy.
    03/10/2007 As a lot of you know, BackTrack 2 final came out a few days ago. For those wanting to run it in VMWare Player, but are too lazy to configure your own VMX, you can download my BackTrack2Final.vmx . Just put it in the same directory as bt2final.iso and open it up in your VMWare Player/Server/Workstation software.
    03/10/2007 Announcing: http://www.leetupload.com/
    Ever go searching for a security tool, only to find that the web page of its creator no longer exists? Or maybe your looking for an old pen-testing app that was free at one time, but has since gone closed sourced and the older, free version with all of the features has disappeared. That's where glj12's LeetUpload comes in. Search around for apps you can't find, or upload rare tools you have and make the collection better.
    03/08/2007 An Introduction to Tor : This video serves as a brief introduction to the use of the Tor anonymizing network in Windows.
    03/05/2007 I've made a single page with links to all of my tutorials on SAM/SYSKEY Cracking, visit it if you want more information on this topic. Now I hope not to get as many question on it.
    02/28/2007 IGiGLE: Irongeek's WiGLE WiFi Database to Google Earth Client for Wardrive Mapping
    A little app I wrote that lets you directly import data from the online WiGLE WiFi Wardrive database into a KML file, then view it in Google Earth.
    02/25/2007 It seems that Mao has followed suit, as of Cain & Abel v4.5 he has added Windows Vista compatibility in NTLM Hashes Dumper, LSA Hashes Dumper and Syskey Dumper for hive files. I updated my Vista Password Cracking Tutorial to reflect this.
    02/21/2007

     

    New Video: Cracking Windows Vista Passwords With Ophcrack And Cain
    This time, using all free tools.
    02/19/2007 Cedric from the Ophcrack project emailed me to let me know that starting with version 2.3.4, Ophcrack now supports Windows Vista. Download Ophcrack from http://ophcrack.sourceforge.net/ if you want a free tool for SAM cracking. I updated my Vista Password Cracking Tutorial to reflect this. I hope to but up a video of it soon.
    02/19/2007 I've made a lot of updates to the site's template. Hope it make the site more user-friendly.
    02/11/2007 New Video:Installing Updates And New Software In Ubuntu Linux (SOHO Server Series 2)
    02/09/2007 Kn1ghtl0rd from Infonomicon.org has started a grid computing project to crack MD5 hashes. He's using the Alchemi distributed client and will be giving a talk about it at Notacon 2007. If you want to help Kn1ghtl0rd out with some spare CPU cycles, or would like to try it with your own MD5 hash go to http://www.infonomicon.org/grid/ and read the details.
    02/06/2007 I've updated the Network Printer Hacking article once again, this time with more info on the fix for the Pharos cached print job vulnerability.
    02/05/2007 New Video:Installing Ubuntu Linux (SOHO Server Series 1)
    The first part of my setting up a small office/home office server with Linux series.
    01/31/2007 After listening to BinRev radio episode 184 I decided to write a review of my current hosting provider, DreamHost. It's covers both the good and the bad. Of all of the hosting providers I've had for Irongeek.com it's been the best, even with some of its bad points. I've also made a discount code for anyone who wants to use it: IRONGEEKCODE 
    It's gives between $40 and $80 off (and I get a small cut to support the site :) ).
    01/20/2007 I've updated the Printer DoSing section with information on the fix HP has released for the exploit I mentioned on 01/06/2007.
    01/14/2007 New Video: Using SysInternals' Process Monitor to Analyze Apps and Malware
    01/06/2007 I've updated the Printer DoSing section of my Network Printer Security article with information on the Joxean Koret attack. I've got to thank the Pauldotcom pod cast (episode 55) for pointing this flaw out to me.
    01/03/2007 Dirk Loss sent me a patch for the Bart PE Cain plugin that will make it work with Cain 4.2. Also, check out Dirk's list of apps that can be ran from a CD or USB drive without installing them: http://www.dirk-loss.de/win-tools.htm
    12/27/2006 I did an update to my MAC address spoofing article.
    12/20/2006 An interstitial ad running on my site for IOSCO (oicu-IOSCO.com) seems to be causing the web browser to ask to download a file from lawcons.info called c.wmf that contains malware. I fear this is trying to use the previously know Windows WMF vulnerabilities. I've contacted Adbrite to get the ad campaign paused. Just wanted to let you know that this malware is not from my site. My guess is someone defaced the "International Organization of Securities Commissions" website and inserted the malware.
    12/12/2006 I've updated MadMACs to give it beAn interstitial ad running on my site for IOSCO (oicu-IOSCO.com) seems to be causing the browser to ask to download a file from lawcons.info called c.wmf that contains malware. I fear this is trying to use the previously know Windows WMF vulnerabilities. I've contacted Adbrite to get the ad campaign paused.tter Windows Vista support.
    12/10/2006 MadMACs: MAC Address Spoofing And Host Name Randomizing App For Windows
    12/08/2006 Posted Glj12's VBScript to Randomize Host Name
    11/30/2006 New Video: Dual Booting BackTack Linux And BartPE From A Thumbdrive
    11/22/2006 I've been dragging my feet in getting a new video or article out. In the mean time, Yugal.ras has sent me a video on Ettercap to share, it can be found at the bottom of my "Videos By Others" page.
    11/11/2006

     

    Techcentric Episode 5
    Episode 5 of Techcentric has been released. In this episode: "Laptop Painting: Part 1, Steve reviews some freeware windows apps. Steve shows off a great font website, Nick builds a drawer in a space drive bay for lugging stuff to and from lan parties a breeze. A message from our friends at hte crappy asst podcast".

     I've got nothing directly to do with this IPTV show, but I watch it and feel that not enough people know about the show. Shouts to Linlin, keep the show going.

    11/09/2006 Today With A Techie 178: Model M Keyboard Lovefest
    11/06/2006 I just released a new article: Dual Booting Slax Linux and BartPE (Windows) from a USB Thumbdrive (UFD)
    Enjoy.
    10/25/2006 Hackers On Hackers Crow: A little "fan" commentary of the movie Hackers. Hack the Planet.
    10/25/2006 HackLouisville's Newest release: How Not To Brew Beer with Hagbot
    10/25/2006 I've added a few links to Slimjim100's sites:  http://www.anti-hacker.info http://www.middlegeorgia.org He's also part or the Plain-text.info project.
    10/17/2006 New Video: Creating a Windows Live CD for System Recovery and Pen-Testing with Bart's PE Builder
    I'm doing this presentation live at PhreakNIC X.
    10/16/2006 Two quick things, My Today With A Techie on using a cheap GPS for wardriving came out today.  Also, Yugal.ras sent me a video he wanted me to host on Alternative Data Streams in NTFS, it can be found at the bottom of my "Videos By Others" page. I have a text article called "Practical Guide to Alternative Data Streams in NTFS" on much the same subject.
    10/07/2006

     

    Updates to Wall Of Social Science Majors and other stuff
    Sorry it's been awhile since my last post, I've been busy studying for school and getting a presentation together for PhreakNIC. I've updated my Wall Of Social Science Majors site with some pics taken by UNHOLY at Notacon 3. I plan to put out a new video soon, most likely on Bart's Pe Builder which is what my PhreakNIC presentation is on. Also, you may have noticed a new "Printable version" link on the bottom of some pages, this should make printed versions of my articles more readable.  Enjoy.
    09/25/2006 Updated Cain 2.9 Plugin for Bart's Pe Builder. Added support for RunScanner, but it's very experimental.  If you get a chance, check out my presentation at PhreakNIC in about a month.
    09/20/2006 Review of the UT-41 GPS, and a little about getting it to work with Kismet in BackTrack Linux
    09/16/2006 Added DefCon 502 and Ubermafia to the Hoosier Hackers section. Both are out of Louisville Kentucky (Across the river from me here in Indiana).
    09/15/2006 Today With A Techie 151: Skiddy Baiting, the audio version of the article I put out a few weeks ago. Hope you enjoy it. Also, here is a quick video of my iGlock, a lovely point and click interface. By the way, I'd like to make a quick plug for PhreakNIC, hope to see some of you at the con this year.
    09/12/2006 New video: Making Windows Trojans with EXE Binders (AKA:Joiners), Splice and IExpress
    09/05/2006 A Collection Of Hacking Videos By Others
    Some of the sites that originally hosted them are gone. I'm just putting these up so they are not lost forever.
    09/03/2006 New video: Hosts File and Ad Blocking
    Pretty general knowledge, but it may be of use to some.
    08/27/2006 New article: The Joys of Skiddy Baiting
    Messing with those as they try to mess with you.
    08/16/2006 New Video: Passive OS Fingerprinting With P0f And Ettercap
    08/15/2006 Today With A Techie Episode 136: This time around I cover some basic Denial of Service techniques.
    08/15/2006 New Hacker Media: The updated Hacker Media site has been launched by Infonomicon. Now it uses RSS feeds for most of its content so it's self updating. Mater of fact, this should show up on the page because it pulls from my RSS feed as well.
    08/03/2006 PhreakNIC X: You may have noticed the new banner. PhreakNIC X is coming up, October 20-22, 2006 in Nashville, TN. I had a great time last year and I'm giving a presentation this year on Bart's PE Builder. My buddies from HackLouisville and Infonomicon are coming as well. Check out the schedule, my friends Kn1ghtl0rd and Lowtek Mystik will also be giving a presentation on RFID. If you want to see videos from last year's event visit http://phreaknic.wilpig.org/ . Hope to see you there.
    08/02/2006 New video: Cracking MD5 Password Hashes
    A little about cracking MD5 password hashes. In this tutorial we take the hashes from a phpbb2 database and crack them using online tools and Cain.
    07/31/2006 New video: Setting Firefox's User Agent To Googlebot so you can access sites that allow indexing by Google but require you to subscribe to view the content.
    07/30/2006 Ok, even more site changes are in effect. If you have comments leave them in the forums. Yeah, I know there are a lot of ads, I'm a whore what can I say. I push about 5 to 10 gigs per day and may have to switch to a co-located box, so money helps. I enjoy creating  free security articles and videos, it would be great if I could do it full time.
    07/29/2006 Two quick updates. First, I've put up a forum at http://irongeek.com/forum/index.php so I can show how to crack md5 hashes and why it's a bad idea to use the same password everyplace. Please feel free to sign up, but keep in mind I may use you as a test example for password cracking. :) Also, for those interested in DoSing my site or trying exploits on it, please feel free to attack the host name hackme.irongeek.com . Enjoy.
    07/24/2006 Posted a new article: Cracking Windows Vista Beta 2 Local Passwords (SAM and SYSKEY)
    07/19/2006 Posted a new video: Using TrueCrypt With NTFS Alternate Data Streams.
    07/11/2006 Today With A Techie released the audio version of my Bluecasing Article today: Bluecasing: War Nibbling, Bluetooth and Petty Theft  Enjoy. Also, they need more contributors, so make a show and send it in.
    06/26/2006 Just updated the Keymail Key Logger source code. Thanks to TheVoidedLine for his contribution. 
    06/19/2006 Just posted an Intro To TrueCrypt video. TrueCrypt is a useful encryption package with a lot of features, check it out if you want to keep your data private.
    06/15/2006 I've updated the Wigle Data to Google Earth script, and posted a KMZ file for the WiFi access points in the Louisville Kentucky area. Happy Wardriving.
    06/12/2006 I put out a new article: Bluecasing: War Nibbling, Bluetooth and Petty Theft
    06/10/2006 Hack Louisville: We are trying to get a bunch of local techies united in the Louisville Kentucky area. To aid in that my buddy Cory put up the forum at http://www.HackLouisville.com . If you are a Louisville area geek that has an interest in hacking, security, coding, electronics or related topics please stop by and join up. Besides our own meetings we will be posting about local area events that may be of interest to computer geeks, and it should serve as a great forum for getting local help with tech issues.
    06/06/2006 I added an Apps/Scripts section to the links in the header to make some of my coding projects easier to find. Also, I fixed a mistake I made in Williamc and Twinvega's last video (I put some sections out of order).
    06/05/2006 Intro To DD and Autopsy By Williamc and Twinvega
    Thanks to Williamc and Twinvega for submitting another video.
    05/25/2006 Intro To Bluesnarfing By Williamc and Twinvega
    Thanks to Williamc and Twinvega for submitting this cool Bluesnarfing (serepticiously grabbing data off of Bluetooth devices) video for me to host.
    05/23/2006 Today With A Techie needs your help!  Since its a community based podcast it relies on user submissions for new episodes. Feel like doing your own one-off podcast on a tech subject? Contact P0rtrill0 or use the submit form.
    05/22/2006 The Infonomicon crew and I were on TV in Canada. Droops had filmed a segment on hacking an Airsoft gun to rapid fire for Hack TV Underground Episode 1. Canada's G4TechTV broadcast the episode on their show Torrent which collect video podcasts from the Internet. Check out the 6th episode of Torrent. Pretty cool.
    05/11/2006 Riscphree and I came up with a Tri-fold pamphlet to hand out at hacker and security conferences. We first released it at Notacon 2006. Feel free to use it at your con as long as you don't change the credit information. Download the Hacker Con Wi-Fi Hijinx PDF here.
    05/05/2006 I did an episode of Today With A Techie recently, go check out episode 106 on the site. This time it was on Alternative Data Streams
    05/05/2006 Added a link to the Kentuckiana Chapter of the ISSA to the Hoosier Hackers page
    04/13/2006 I found out about Fiebig's show while up at Notacon 3. Basically, M0diphyd is about taking old techno junk and turning it into cool projects and gadgets. In episode 1 the projects are: Computer turntable, DeLorme Tripmate GPS review, Coilgun, and the Overhead Laptop.
    Check it out: M0diphyd
    Enjoy. Fiebig said more episodes will be out soon.
    04/10/2006 I've put up the video from my presentation at Notacon 2006 on Network Printer Hacking and have also updated the associated text article.
    04/10/2006 We noticed a flaw in the Wall of Shame code as it deals with refreshing. It should be fixed now.
    04/02/2006 Major updates to the Printer Hacking article in prep for Notacon.
    03/26/2006 Puzzlepants created a great article on taking CacheDump hashes and putting them into Cain. I've tacked his article on the end of my Cracking Cached Domain/Active Directory Passwords on Windows XP/2000/2003.
    03/25/2006 IPIterator: A quick little multithreaded program for Linux and Windows to quickly iterate through a set of IPs and execute a command. Source code is included.
    03/13/2006 Julien Goodwin made my Wall of Social Science Majors prettier and added some functionality.
    03/10/2006 The videos are back up. Seems my Wall of Social Science Majors was posted on http://hackaday.com which may have causes some of the problems. The folks at DreamHost said it was not the bandwidth but the number of connections (which is somewhat disingenuous since to suck up the 1TB pf bandwidth the number of connections is likely to be high). I took some measures to keep the connections down. If anyone else wants to mirror the videos let me know.
    03/09/2006

    The videos will be down for just a bit. I got this email from my hosting provider:

    Hello,
    Unfortunately, I was forced to temporarily disable your irongeek.com/videos folder by renaming it to videos_disabledByDH. The connections to the files inside were monopolizing the apache webservice, and other sites couldn't be loaded.

    Please don't re-enable it until you make check your code and restrict the connections to your files.

    Sorry about having to go this route, but we can't have this happen on our shared machines. Please note, that repeated temporary disablement may result in disabling your domain and your account, for violating our Terms of Service (dreamhost.com/tos.html).

    Let us know if you have any questions.

    Thanks!
    Andrea

    I'm paying for 1TB per-month transfer so I don't know what's up as I'm not hitting that limit. I'm waiting to hear back from them.
    03/08/2006 New live action video: Irongeek's Guide to Buying a Used Laptop
    03/03/2006 At the request of Riverside (the DefCON goon that runs the Wall of Sheep) I've changed my projects name to Irongeek's Wall of Social Science Majors.
    03/01/2006 Irongeek's Wall of Shame/Wall of Sheep Code You know those plain-text password walls at DefCON and PhreakNIC? Make your own.
    02/21/2006 New Video: Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text.info
    Title says it all.
    02/18/2006 Irongeek.com reader Tony submitted the following that might be of interest to some other readers: Tony's Ethernet Tap
    If anyone else feels like submitting anything send it on in.
    02/17/2006 I switched hosting providers to DreamHost because ChaosNetworks are cum belching felch monkeys. Read my ChaosNetworks Review . If you can read this you are already using my new host. Let me know if anything is missing from the site, or if you want discount codes for DreamHost.
    02/15/2006 New article: Caffeinated Computer Crackers: Coffee and Confidential Computer Communications
    02/08/2006 Indiana Higher Education Cybersecurity Summit 2006
    March 30-31, 2006
    For those in the Indianapolis area, some of you may be interested in this. Granted, most of it will be "Awareness" fluff, but the practitioners sessions from last year were ok and it gives you a chance to network a bit (in both meanings of the word). Last year I gave a talk on local password cracking, don't know about this year but since they have not contacted me and I'd only get 20mins I'd doubt it. If you plan to show give me a yell and can will meet up and talk shop.
    02/07/2006 Adding Modules to a Slax or Backtrack Live CD from Windows
    In this video I show how to add patches and extra modules to the Back|track pen-testing Live CD using MySlax. By the way, I'm planning on switching to a new hosting provider soon so hopefully I'll stop having bandwidth problems.
    01/30/2006 Anonym.OS: LiveCD with build in Tor Onion routing and Privoxy
    Just showing off this cool live CD recently released at ShmooCon 2006. Great for surfing anonymously.
    01/28/2006 Added a section to my Hacking Network Printers page with details from Mr. Hinton on how to fix an HP 4100 MFP with a busted hard drive using Ghost.
    01/26/2006 New video that continues the last one:
    Make your own VMs with hard drive for free: VMware Player + VMX Builder
    By the way, Irongeek.com has been up for almost 2 years, yippy!!!
    01/20/2006 Using VMware Player to run Live CDs (Bootable ISOs)
    In this video I show how to use the free VMware Player to run Live CDs like Knoppix, Auditor or Bart's PE Builder from an ISO.
    01/20/2006 TWAT Episode 64
    This one is on using the Cygwin environment in Windows to compile exploits meant for *nix Systems.
    01/13/2006 Notacon
    Looks like a bunch of my cohorts from Infonomicon and I will be giving talks at Notacon in Cleveland, Ohio April 7th-9th. Check out the speakers list. Mine will be on Hacking Network Printers. Should be a lot of BinRev folks there as well. Should be a fun time.
    01/11/2006 SSH Dynamic Port Forwarding
    I set up a quick video tutorial to show how to set up an encrypted tunnel using SSH's dynamic port forwarding (sort of a poor man's VPN) in both Linux and Windows. The tools used are OpenSSH, PuTTY and Firefox, but it should be enough info to allow you to figure out how to set up other clients.
    01/03/2006 Counter WMF Exploit with the WMF Exploit
    I used H D Moore's "Windows XP/2003/Vista Metafile Escape() SetAbortProc Code Execution" revision 1.12 Metasploit module to create a WMF file that automatically runs "regsvr32 -u shimgvw.dll" to counter the exploit. Clicking the link may run code on your computer or crash your browser if you are using IE so click with caution. More of a fun experiment than anything.
    01/02/2006 WMF File Code Execution Vulnerability With Metasploit
    This video covers the use of the recent (Jan 2006) WMF file code execution vulnerability with  Metasploit. It shows how to shovel a shell back to the attacker with the WMF vulnerability. See Microsoft Security Advisory 912840. Thanks to kn1ghtl0rd, AcidTonic, Electroman and livinded for their help.
    12-20-2005 Keymail the KeyLogger:
    An E-mailing Key Logger for Windows with C Source.
    12-20-2005 T.W.A.T Radio Episode 43  hosted by Irongeek
    SAM file love.
    12-15-2005 Using VirtualDub and a cheap webcam as a camcorder
    I thought this might be of use to those that would like to submit something to Infonomicon TV or Hack TV but lack the cash for a proper MiniDV camcorder.
    12-13-2005 T.W.A.T Radio Episode 39  hosted by Irongeek
    This one is on changing your MAC address.12
    11-16-2005 Firewalls with Sarah: Campus Computer Security Series Episode 2
    What the hell, I'll put both up today.
    11-16-2005 Updates and Patches with Anna: Campus Computer Security Series Episode 1
    I decide to lend my expertise to some young ladies at my campus and make some videos. This first one is on using Windows and Mac OS X's updating features. Granted, it's not as technical as most of the stuff on my site, but it seems quite a few of you work in higher education IT departments and these video might be useful to raise awareness in your campuses student population. Also, I think you would rather look at these ladies than me. Enjoy.
    11-16-2005 I've been having a lot of car and plumbing problems recently, that's why I've not posted in awhile. Don't worry, I've got new stuff coming soon.
    11-01-2005 I updated my Zaurus Dsniff instructions for OZ 3.5.3.
    10-26-2005 T.W.A.T Radio Episode 27 Hosted by Irongeek
    Securing your box for a hacker con. (Unsecure network) Mostly on SSH Dynamic port forwarding in Linux and Windows.
    download here: http://twatech.org/eps/twat027.mp3
    Show notes here: http://twatech.org/
    10-25-2005 I've added my PhreakNIC 9 Photos.
    10-19-2005 I blew up my Zaurus 5500 last night, so don't expect me to update my Zaurus section for awhile. Before it died, I did get the latest version of Dsniff to work and maybe Ettercap (I fried it while I was testing). I think I hooked power up to it backwards, be careful with those universal power supplies kiddies! Anyone know where I can get a good deal on a Zaurus clamshell model?
    10-18-2005 This is a little Droop/Irongeek collaboration. Infonomicon TV Ep 7: HP printer hacking, building an old school phone handset for your cell phone, collecting data in RF monitor mode and making cat5 cables.
    10-17-2005 Hope to see you all at PhreakNIC 9, Oct 21-23.
    10-17-2005 Updated Zaurus Nmap instructions to 3.93-1.
    10-12-2005 Metasploit Flash Tutorial: I created a new video that covers the use of Metasploit, launched from the Auditor Boot CD, to compromise an unpatched Windows XP box by using the RPC DCOM (MS03-026) vulnerability. It then sends back a VNC session to the attacker. This is just one example of the many things Metasploit can do. Check it out.
    10-06-2005 I just posted Nmap Video Tutorial 2: Port Scan Boogaloo. This video covers some intermediate and advanced Nmap options and is a follow-up to my "Basic Nmap Usage" presentation.
    10-03-2005 Network Sniffers Audio Presentation: I did an audio presentation on the basics of how sniffers (network analyzers) work for "Today with a Techie." Go to their download page and grab episode 10.
    09-26-2005 I added a link with information about Contacting Me.
    09-24-2005 I'm in the process of switching hosting providers so that I will have more monthly transfer bandwidth. If you see this message you are on the new host.
    09-13-2005 Added "Coding your own scripts with Perl and PJL" section to the Hacking Network Printers article.
    09-11-2005 Posted my article on Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins).
    09-02-2005 Posted my article and video on Finding Rogue SMB File Shares On Your Network.
    08-25-2005 NeuTron sent me a version of John compiled with Cygwin that includes the MSCACHE patches. I updated my Cracking Cached Domain/Active Directory Passwords on Windows XP/2000/2003 page to link to his version of John.
    08-22-2005 After attending Gencon 2005 I decide to start a ribbon awareness campaign for Con Funk. I present to you Ribbonthulhu.
    08-16-2005 I updated the Zaurus section of my site to show how to install Nmap 3.81-2 and Kismet 2005-06-R1 under OpenZaurus 3.5.3.
    08-15-2005 At Bruce Nelson's request I'm updating parts of the Zaurus section. I just added details on installing Wellenreiter_1.2.0-r1 with OZ 3.5.3.
    08-15-2005 Minion from the BinRev forums has been kind enough to host my videos. Thanks.
    08-11-2005 Information security in campus and open environments: I wrote this article a few months back for [IN]Secure magazine, but this time the article has detailed footnotes and links to the tools mentioned. It covers the basics of information security in environments like universities, schools and libraries. While it's meant to help organizations figure out how to lock down their computer systems it reads sort of like a "How to hack schools" booklet.  I plan to expand the article as time goes by, let me know of additions I should make.
    08-09-2005

    Need another video host: Droops has been kind enough to let me use his bandwidth for a few months now, but it's getting to the point where my videos are sucking up too much of his bandwidth. I'm looking for a new place to host the videos. Ideas? I'm more than willing to let the host put a small ad at the bottom of each video page.  I think it's too the point where the videos are taking a few 100 gigs of transfer per month (not sure of the exacts, but Droops will let me know soon).  Thanks to Droop for letting me host my videos for so long on his dime.

    08-08-2005 Put up the new mascot that BushiBytes made for me.
    08-02-2005 Added a new video: WiGLE, JiGLE and Google Earth: Mapping out your wardrive.
    08-01-2005 I updated my My Wigle-to-Google-Earth script to better handle characters that confuse the XML.
    08-01-2005 On 07-27-2005 I over ran by monthly bandwidth allotment (40GB on Irongeek.com, glad Droops helps with hosting the videos or I would be over every month). By the time you can read this the site should be back up. 
    07-26-2005 I wrote a PHP script to take WiGLE data and turn it into a KML file that can be imported into Google Earth. My Wigle-to-Google-Earth script is great for making pretty maps of WIFi Access Points, check it out.
    07-17-2005 New video: Droop's Box: Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools
    07-14-2005 Quick Tour of Irongeek's Office and Security Lab As filmed with my crappy digital camera.
    07-06-2005 Added my new article: LAN of the Dead: Putting computer zombies back in their grave, Ash style.
    06-20-2005 I've update the Kismet section of my Zaurus page with information from Jake, and the Zethereal section with info from M Delroy. 
    06-16-2005 New Flash Video: Fun with Ettercap Filters: The Movie The Flash version of  my Ettercap Filters tutorial.  Like Airpwn, but easier.
    06-16-2005 (IN)Secure Magazine published my article "Information security in campus and open environments". A pdf of it can be found at: http://www.insecuremagazine.com/INSECURE-Mag-2.pdf
    Looks like they took out the link section, but oh well.
    06-15-2005 Added the Flash video MAC Bridging with Windows XP and Sniffing (very useful with my Cain/VoIP tutorial).
    06-13-2005 I put up a new tutorial called Fun with Ettercap Filters that shows you how to make a filter that does much the same thing as the Airpwn application. What it does is filter web traffic though itself using ARP poisoning, then modifies the traffic to replace images in web pages with an arbitrary image that we select. Cool stuff.
    06-07-2005 Folks ask me from time to time how I make my Hacking Illustrated videos so here is a short page to give you the lowdown: How I Make The Hacking Illustrated Videos
    05-26-2005 Added the Flash video Sniffing VoIP Using Cain.
    05-25-2005 Added the Flash video Installing Knoppix 3.8 to Your Hard Drive. Hope it's useful to some of you.
    05-24-2005 Added the Flash video A Quick and Dirty Intro to Nessus to the Hacking Illustrated section. It shows the basics of using the Nessus Vulnerability Scanner from the Auditor Boot CD.
    05-13-2005 Added the Hoosier Hackers section for those looking for other computer geeks in Indiana or the Louisville Kentucky area.
    05-09-2005 Douglas Steele wrote in to point out some typos and some update links in the Zaurus tools section.
    05-06-2005 I decided to put up a review of Legend Micro.
    05-05-2005 Laptop Backpack Woes: I loved by buddy's Targus TSB215 and wanted a similar backpack for myself. I did some searching and found out that the TSB212 was almost the same pack, and I compared it on Targus' site (http://www.targus.com/us/product_details.asp?sku=TSB212) and Amazon (http://www.amazon.com/exec/obidos/tg/detail/-/B00005T3H5/102-5486756-5720110?v=glance ). When I did a Froogle search I found the cheapest price at Legend Micro (http://www.legendmicro.com/store/more_info.asp?product_ID=3059) but there was only a thumbnail of the backpack there. I figured it's the same part number so I ordered it. Well, what I got is labeled on the inside tag as a TSB212, but it's not the same as what's on Targus' site. Maybe they changed something about the model at some point and Legend Micro only has the old version. Next time I think I'll spend the extra $10 and go to Amazon. I did not care much for the attitude I got while I was on the phone with them about it so I figured I'd write this review. While I guess I technically got what I ordered, I'm not happy with it.
    05-03-2005 Posted a page for my network sniffing screensaver: PacketFountain.
    05-03-2005 As posted in the Anti-online Newsletter 13, here is my article on  Pen-testing Tools for the Pocket PC.
    05-02-2005 My Local Password Cracking Presentation last Friday seemed to go over will, feel free to mirror it now. Also, since Droops has been kind enough to let me use some of his bandwidth I've posted more links to his site: http://www.infonomicon.org/ . News you need, like it or not. Give him a visit and listen to his cool show.
    04-27-2005 I did a few more fixes in my Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005. Wish me luck.
    04-25-2005 Thanks to Droops from http://www.infonomicon.org/  for the mirror. Hopefully it will keep me up and running.
    04-25-2005 I've update many things in my Local Password Cracking Presentation, including adding a section on MSCache cracking with Cain v2.68 that was released on Friday (April 22nd). I'm also starting to use a mirror site more because I'm running out of bandwidth. 
    04-20-2005 I've put up the Flash version of my Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005 . It covers cracking the SAM/Syskey, Cached ADS/Domain Credentials, VNC stored passwords and Windows Protected Storage. Don't mirror it anywhere yet as I may change it some before I present it live on the 29th. If you have any feedback you would like to give me before the 29th email me.
    04-13-2005 Sorry it's be awhile since I posted new material. I've be writing an article for the next Antionline newsletter and preparing a presentation for the  Indiana Higher Education Cybersecurity Summit (I hope to have a Flash version of the presentation up on this site). More stuff will be coming shortly.
    04-04-2005 Nfotx was kind enough to let me host some of my files at his site. The Nmap video was chewing up some serious bandwidth.
    03-31-2005 My Basic Nmap Usage video tutorial is up. Let me know what you think. I'm having some problems with file size to memory foot print so if there are any good Flash MX developers out there please contact me.
    03-29-2005 I've moved the Hacking Illustrated videos to their own page. Soon I will be releasing my Nmap video so stay tuned.
    03-29-2005 I guest hosted an episode of Infonomicon (Episode 32). You can get it from http://www.infonomicon.org/episodes.html
    I need to learn to speak slower, enunciate and take less caffeine before talking on the radio.
    03-25-2005 Posted Auditor security collection boot CD notes compiled by Douglas Lancaster. Thanks Doug.
    03-24-2005 Added the Newscat section. It's a PHP script that shows my favorite RSS feeds.
    03-24-2005 I now have an RSS Feed, feel to use it. I'll be posting all of my news/articles/videos to it for other sites to link to.
    03-22-2005 Added a new Hacking Illustrated Video: Cracking Syskey and the SAM on Windows Using Samdump2 and John based on the article I wrote below.
    03-21-2005 Added Cracking Syskey and the SAM on Windows XP, 2000 and NT 4 using Open Source Tools to the security section. It's a continuation of an older article of mine.
    03-19-2005: Changed some of the menu and header system so that web pages like the Zaurus Security Tools section would render better in more browsers. I also changed some of the layout on that page to get rid of white space. Soon as I get my 256MB CF card I'll be updating more of the Zaurus instructions.
    03-18-2005: Added the "Your IP" webpage to the menu on the left. It also returns what information it can from Javascript. I changed the intro text as well.
    03-18-2005: Added some Kanoodle ads to help pay the bills. Let me know if the placement is annoying.
    03-16-2005: Added some more links to the bottom of the Links page. I also added a small addition to the footer.
    03-10-2005: I changed the last sentence of the first paragraph of Cracking Cached Domain/Active Directory Passwords on Windows XP/2000/2003 to be more accurate about how LM Hashes work.
    03-08-2005: Posted the tutorial Cracking Cached Domain/Active Directory Passwords on Windows XP/2000/2003.
    02-18-2005: Posted my Using Bart's PE Builder to Make an Anti-Spyware and Rescue CD tutorial.
    02-16-2005: I added my MSConfig plugin to the PE Builder plugins page.
    02-15-2005: I added my HiJackThis plugin to the PE Builder plugins page.
    02-15-2005: Changed my PE Builder plugins page to just have plugins I've contributed to. I also added my plugin for Softperfect's Netscan.
    02-01-2005: I posted up the article I wrote for the IOLUG: A Quick Intro to Sniffers
    02-01-2005: Updated the Bart's PE Builder page with a newer version of Registry Editor PE.
     

    01-18-2005: Mark Owen sent me his instructions for installing THC-Hydra on the Zaurus. Thanks Mark.

    01-10-2005: Sorry it's been awhile since I put up any new content. I've been moving to a new office. I'll try to get back to this site soon.

    11-19-2004: Added a PHP script I wrote to grab a list of Zombie film rankings from IMDB. It may take a bit of time to load, see it here: Irongeek's Zombie Film Ranking Using IMDB

    11-16-2004: Changed the Southern Indiana Deviant Computing Meetings page to reflect the new meeting time.

    11-06-2004: Added page Beverages the and amount of caffeine per ounce in milligrams, please contribute more information if you can.

    11-04-2004: Keith Scholl asked for the source code to Irongeek's JetDirect Hack so I posted it.

    11-04-2004: Updated Kismet instructions on my Zaurus page to work with OpenZaurus 3.5.1 and Kismet 2004-10-R1.

    11-03-2004: Updated my Zaurus instructions for Nmap 3.75-1 to work.

    11-03-2004: Changed the Southern Indiana Deviant Computing Meetings page a bit and added O'Reilly's Security Article Archive to my links section.  

    10-19-2004: Added section on getting DSniff to work on the Zaurus.

    10-15-2004: Added an article on web bugs called Web Buggery: Analyzing Tracking Images.

    10-08-2004: Updated Wellenreiter II instructions with a bit about the capture file. Added some info about the compatibility libraries and OpenSSH to the OpenZaurus 3.5.1 section.

    10-08-2004: Updated Wellenreiter II instructions on my Zaurus page to work with OpenZaurus 3.5.1.

    10-06-2004: I just found out about how to use ipkg-link so I updated the General OS Info, Nmap and Nemesis sections on the Zaurus pages. It should make my tutorials easier to follow. Soon I'll put up instructions for Wellenreiter.

    10-05-2004: Updated the Nemesis section on  Zaurus pages.

    10-04-2004: Just updated my Zaurus pages with info on OZ 3.5.1 and getting Nmap 3.70-1 to work on it. Keep checking back as I plan to update the information on the other Zaurus apps as well.

    10-01-2004: David Bishop pointed out how to get ADS detector to work so I updated my tutorial: Practical Guide to Alternative Data Streams in NTFS. 10-01-2004: Added Seattle Wireless to my links page.

    09-30-2004: Added links to a bunch of Hacker video and audio e-zines to the bottom of my Links page.

    09-28-2004: Added tutorial called: Practical Guide to Alternative Data Streams in NTFS.

    09-20-2004: Added Flash tutorial on Basic Tools for Wardriving.

    09-17-2004: Added Flash tutorial on Making The Default XP Interface Look More Like Windows 2000.

    09-16-2004: Added info on Irongeek's Signature Image and how it was coded.

    09-10-2004: Put a note on the Southern Indiana Deviant Computing Meetings about a change of location for the next meeting.

    09-10-2004: Added link to Mac Makeup on my How to Change Your MAC Address article.

    09-03-2004: Added update to What can you find out from an IP?

    09-01-2004: Added a banner for Shaun of the Dead. I love zombie films and this one kicks ass.

    08-20-2004: Kevin Milne has written a book about a hacker who creates the magic bullet and uses it on the Zaurus. Z4CK (Zaurus ACK) should be coming out in late September, surf to www.z4ck.org if you want to download the first half for free.

    08-11-2004: Shell access to a web server using PHP updated and now called Shoveling a Shell using PHP Insecurities

    08-09-2004: Updated Basics of Arpspoofing/Arppoisoning tutorial after some suggestions from the folks at Antionline.

    08-02-2004: Added tutorial Compiling Linux Exploit Code and Tools in Windows using Cygwin.

    07-30-2004: Added link to AntiOnline on the links page. Move some fron page items to Old News.

    07-22-2004: Added plugin for CHNTPW to the Bart's PE Builder page.

    07-21-2004: Added Cygwin binary of CHNTPW to the Bart's PE Builder page.

    07-19-2004: Added Look@Lan to the Bart's PE Builder page.

    07-16-2004: Added Angry IP Scanner and Brutus-AE2 to the Bart's PE Builder page.

    07-15-2004: Added page Security and Hacking Plugins for Bart's PE Builder

    05-08-2004: Fixed small problem in Basics of Arpspoofing/Arppoisoning.

    05-06-2004: Added Basics of Arpspoofing/Arppoisoning in security section.

    4-28-2004: Added http://www.greyhathackers.com/ to links page.

    4-13-2004: Change Southern Indiana Deviant Computing Meetings page to reflect modified date.

    4-08-2004:Added Linux and Logs article, a quick primer by my buddy Isaac

    4-06-2004: Added download for Pocket PC SSH Client. Changed some of the layout in the security section.

    4-03-2004: Added page about Southern Indiana Deviant Computing Meetings.

    4-02-2004: Added short article "Find out what devices have been getting an IP from the DHCP daemon that's running on your Linksys WRT54G Router".

    3-31-2004: New demo: Look for deleted data on the slack space of a disk.

    3-30-2004: Added Ron's Power Shake to the nutrition section.

    3-29-2004: Added a review of a Battery Extender for the Zaurus.

    3-25-2004: Added some info on our weightlifting routine in the workout section.

    3-24-2004: Added "Random out of context RPG Quote" to the bottom of the page.

    3-23-2004: Posted Benjamin E. Pratt notes on the end of my How to Change Your MAC Address article.

    3-23-2004: Added a small to on How to Change Your MAC Address in Linux and Windows.

    3-22-2004: I got a battery extender for my Zaurus and will be posting a review soon (hope it significantly increases the time I can spend wardriving with the Z). I also ordered some NiMh batteries for it but someone took them out of the package before it got to me, I wrote the company I ordered them from and if I don't get them soon I'll let you all know to never order from them. I also have a "Change your MAC address" article and more on workouts coming soon.

    3-19-2004: Added PayPal donation button.

    3-19-2004: I figured out how to install Kismet 3.1 on the Zaurus, check it out.

    3-18-2004: New demo on how to Recover deleted cookies or other files using Restoration.

    3-17-2004: Added a video of some of my gear.

    3-16-2004: Added demo Using NetworkActiv to sniff webpages on a Wi-Fi network.

    3-16-2004: ReadySetConnect finally got it set up so I can use SFTP and SSL so I don't have to pass my password in plain text across the Internet Yippy!

    3-16-2004: Moved old news items into Old News.

    3-16-2004: Added Daren's 2nd rant under humor.

    3-15-2004: I did some massive directory rearranging to make the site easier to maintain. Please let me know about broken links.

    3-15-2004: I updated the OpenZaurus page with some notes from Tim Ansell (aka Mithro) of the OZ-compat project.

    3-14-2004: Irongeek's JetDirect Hack Program has been uploaded.

    3-12-2004: HP Printer Display Hack has been added to the security section.

    3-12-2004: Added Links section and straightened out HTML tables so things would display better.

    3-11-2004: I've been getting a large increase in traffic since Fyodor sent his e-mail on the 9th (see here). Anyone know a good, noninvasive ad service I can use to offset the cost of bandwidth?

    3-11-2004:  Daniel Henage pointed out some typos and a bad link on the Trace Fake E-mails page.

    03-10-2004: A new tool that I wrote called ADSReaper has be released.

    03-10-2004: I got an E-mail from Fyodor, the main guy in charge of Nmap. He sent a link to my website out to the 17000 people on his mailing list and my site may get mentioned in a book he is writing. Kick Ass!!! Here is a link to what he sent to his mailing list: http://seclists.org/lists/nmap-hackers/2004/Jan-Mar/0003.html

    03-10-2004: Jeff Nathan of the Nemesis project asked for me to change the link on my Zaurus Nemesis how-to to http://nemesis.sourceforge.net

    03-07-2004: Looks like someone using an anonymous proxy at 200.252.72.9 is trying to crack the box my site runs on, it looks like they were trying to get the passwd file and maybe try a buffer overflow. So far it would appear that they have had no luck :)

    03-05-2004: Just opened a forum for users.

    03-05-2004: Updated Wellenreiter II entry with info from Mark Lachniet.

    03-04-2004: Added demo "Boot from Phlak and run Chkrootkit to detect a compromise" to the security section. This time I used Flash, let me know if you like this choice better than AVIs.

    03-03-2004: Added demo Use Brutus to crack a box running telnet.

    03-02-2004: Added a demo of using Cain to ARP poison and sniff passwords.

    03-01-2004: Modified the "Brute force Windows passwords from across the network" article and was recently given an old laptop to have my way with. Soon as the RAM I ordered gets here it should make a good wardrive/pen-test tool.

    02-28-2004: Fixed some broken links in security section.

    02-26-2004: Added info on a script I wrote to Brute force Windows passwords from across the network.

    02-23-2004: Added more details to Cracking Windows 2000 And XP Passwords With Only Physical Access.

    02-23-2004: Added Daren's first rant under humor.

    02-19-2004: Put up an article on Cracking Windows 2000 And XP Passwords With Only Physical Access.

    02-12-2004: Added some info on getting shell access to a web server using PHP, along with my own little script.

    02-11-2004: Added an article I wrote on Information Security in Campus and Open Environments.

    02-09-2004: Updated the supplement section with reviews of new bars and a little info about Ephedra. I'm trying to get my buddy Jaden to write a few things for this section.

    02-06-2004: Updated Ettercap entry an made the page look better in IE. Still looks best in Mozilla.

    02-05-2004: Fixing some link problems, email me if you find any.

    02-04-2004: Moved to ReadySetConnect.com.

    02-02-2004: Ok, I just combined all of the Irongeek pages, please email me if there are any broken links.

    02-02-2004: I need a good webhost, any suggestions?

    01-31-2004: New instructions on how to get nmap 3.50-1 working.

    01-31-2004: http://www.irongeek.com now forwards here, please book mark it as I plan to move this site.

    01-30-2004: I just bought a domain name, more to come soon.

    01-29-2004: Added TCPDump to Sniffers.

    01-29-2004: I'm getting hit a lot. Thanks to everyone who linked to me. Hope the T3 line can take it. Keep checking back, I plan to keep updating at least once per week.

    01-29-2004: Big change to page layout, let me know if you like it better or not.

    01-28-2004: Just got my 10/100 Ethernet card and it seems to work fine.

    01-28-2004: Another small change to Zethereal instructions (in case of IPK install problems)

    01-27-2004: small change to ettercap instructions and a few other minor changes.

    01-27-2004: Working on my own IPK (irongeek-pentest-dist) with all the security tools in one big package.

    01-27-2004: Changed Zethereal entry to make it easier.

    01-26-2004: Page is now up and getting some hits.

    

    If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

    Copyright 2020, IronGeek