ShmooCon IX: Opening Remarks and Rants
Article Number: 0×01 Article Date: 04.07.2013 Source Date: 02.15.2013 Media: +video Title: Opening Remarks and Rants (Shmoocon 2013) — Researcher(s): Bruce Potter – Media: (Opening Remarks and Rants...
View ArticleShmooCon IX: How to Own a Building: Exploiting the Physical World with BacNET...
Article ID: 0×02 Article Date: 04.07.2013 Source Date: 02.15.2013 Media: +video Title: How to Own a Building: Exploiting the Physical World with BacNET and the BacNET Attack Framework — Abstract: The...
View ArticleShmooCon IX: Mainframed: The Secrets Inside That Black Box
Article: 0×03 Article Date: 04.07.2013 Source Date: 02.15.2013 Media: +video Title: Mainframed: The Secrets Inside That Black Box Abstract: The mainframe is not legacy, far from it. Not only is it not...
View ArticleShmooCon IX: Wipe The Drive!!! – Techniques For Malware Persistence
Article: 0×04 Article Date: 04.07.2013 Source Date: 02.15.2013 Media: +video Title: Wipe The Drive!!! – Techniques For Malware Persistence — Abstract: Let’s face it: sooner or later you will be owned....
View ArticleShmooCon IX: Apple iOS Certificate Tomfoolery
Article ID: 0×05 Article Date: 04.08.2013 Source Date: 02.15.2013 Media: +video Title: Apple iOS Certificate Tomfoolery — Abstract: Mobile devices rely on many complex systems for security,...
View ArticleShmooCon IX: Hide And Seek, Post-Exploitation Style
Article ID: 0×06 Article Date: 04.08.2013 Source Date: 02.15.2013 Media: +video Title: Hide And Seek, Post-Exploitation Style — Abstract: Geo-location allows us to translate the virtual location of an...
View ArticleShmooCon IX: Bringing The Sexy Back To…Defense In Depth
Article ID: 0×07 Article Date: 04.08.2013 Source Date: 02.15.2013 Media: None Title: Bringing The Sexy Back To…Defense In Depth — Abstract: “Defense In Depth” is considered by most to be a useless...
View ArticleShmooCon IX: Hackers get Schooled: Learning Lessons from Academia
Article ID: 0×08 Article Date: 04.08.2013 Source Date: 02.15.2013 Media: +video Title: Hackers get Schooled: Learning Lessons from Academia — Abstract: The contrast between the information security...
View ArticleShmooCon IX: Friday Fire Talks
Article ID: 0×09 Article Date: 04.08.2013 Source Date: 02.15.2013 Media: +video Title: Friday Fire Talks (Shmoocon 2013) — Researcher(s): Various — Media: (Fire Talks) — References: ShmooCon 2013,...
View ArticleShmooCon IX: Paparazzi over IP
Article ID: 0x0C Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: Paparazzi over IP — Abstract: Almost every recent higher class DSLR camera features multiple and complex access...
View ArticleShmooCon IX: DIY: Using Trust To Secure Embedded Projects
Article ID: 0x0D Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: DIY: Using Trust To Secure Embedded Projects — Abstract: This presentation and paper provides a DIY guide to using...
View ArticleShmooCon IX: Moloch: A New And Free Way To Index Your Packet Capture Repository
Article ID: 0x0E Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: Moloch: A New And Free Way To Index Your Packet Capture Repository — Abstract: Moloch is a highly scalable and...
View ArticleShmooCon IX: Openstack Security Brief
Article ID: 0x0F Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: Openstack Security Brief — Abstract: This talk is a break down of security concerns relating to the OpenStack...
View ArticleShmooCon IX: Generalized Single Packet Authorization For Cloud Computing...
Article ID: 0×10 Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: Generalized Single Packet Authorization For Cloud Computing Environments — Abstract: Cloud Computing environments...
View ArticleShmooCon IX: From “Shotgun Parsers” to Better Software Stacks
Article ID: 0×11 Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: From “Shotgun Parsers” to Better Software Stacks — Abstract: Everyone agrees that aggressive input checking and...
View ArticleShmooCon IX: The Computer Fraud and Abuse Act: Swartz, Auernheimer, and Beyond
Article ID: 0×12 Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: The Computer Fraud and Abuse Act: Swartz, Auernheimer, and Beyond — Abstract: The Computer Fraud and Abuse Act is...
View ArticleShmooCon IX: Ten Strategies of a World-Class Computer Security Incident...
Article ID: 0×13 Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: Ten Strategies of a World-Class Computer Security Incident Response Team — Abstract: Today’s Computer Security...
View ArticleShmooCon IX: Malware Analysis: Collaboration, Automation & Training
Article ID: 0×14 Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: Malware Analysis: Collaboration, Automation & Training — Abstract: Whether you’re a novice or a professional...
View ArticleShmooCon IX: Bright Shiny Things = Why We Need Intelligent Data Access Controls
Article ID: 0×15 Article Date: 04.09.2013 Source Date: 02.15.2013 Media: +video Title: Bright Shiny Things = Why We Need Intelligent Data Access Controls — Abstract: Establishing, monitoring and...
View ArticleShmooCon IX: Beyond Nymwars: An Analysis of the Online Identity Battleground
Article ID: 0×16 Article Date: 05.02.2013 Source Date: 02.15.2013 Media: +video Title: Beyond Nymwars: An Analysis of the Online Identity Battleground — Abstract: Originally inspired by getting...
View Article
More Pages to Explore .....