FileMood

Download derbycon9

Derbycon9

Name

derbycon9

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

17.7 GB

Total Files

212

Hash

DE6DD9999F69956B5E6E1D392067BB27C3E174F1

/

1-00-Opening-Ceremony-Derbycon-Crew.mp4

101.2 MB

1-01-Opening-Keynote-Ed-Skoudis.mp4

312.8 MB

1-01a-Pre-Opening-Keynote-Ed-Skoudis.mp4

5.1 MB

1-02-DerbyCon-Story-Time-Panel-Dustin-Heywood-Evil-Mog-and-others.mp4

473.3 MB

1-03-Dynamic-Risk-Taking-and-Social-Engineering-Chris-Hadnagy.mp4

166.2 MB

1-04-Using-Next-Generation-Fuzzing-Tools-Fixing-Bugs-and-Writing-Memory-Corruption-Exploits-Dr-Jared-DeMott-John-Stigerwalt.mp4

219.0 MB

1-05-How-do-I-detect-technique-X-in-Windows-Applied-Methodology-to-Definitively-Answer-this-Question-Matt-Graeber.mp4

160.4 MB

1-06-To-CORS-The-cause-of-and-solution-to-your-SPA-problems-Tim-lanmaster53-Tomes-Kevin-Cody.mp4

213.1 MB

1-07-Not-A-Security-Boundary-Breaking-Forest-Trusts-Will-Schroeder-Lee-Christensen.mp4

206.3 MB

1-08-Enabling-The-Future-Panel-Dave-Kennedy-Jess-Walpole-Scott-Angelo-Kevin-Baker.mp4

850.1 MB

1-09-42-The-answer-to-life-the-universe-and-everything-offensive-security-Will-Pearce-Nick-Landers.mp4

180.7 MB

1-10-kubered-Recipes-for-C2-Operations-on-Kubernetes-Larry-Suto-Jeff-Holden.mp4

170.8 MB

1-11-Testing-Endpoint-Protection-How-Anyone-Can-Bypass-Next-Gen-AV-Kevin-Gennuso.mp4

160.9 MB

1-12-Adventures-in-Azure-Privilege-Escalation-Karl-Fosaaen.mp4

127.5 MB

1-13-Breaking-Entering-via-SDR-or-How-I-defeated-Wiegend-over-UHFVHF-or-your-apartment-isnt-safe-Tim-Shelton.mp4

156.8 MB

1-14-Assessing-IoT-Surveillance-Arlo-Jimi-Sebree.mp4

71.6 MB

1-15-Next-gen-IoT-botnets-leveraging-cloud-implementations-for-shells-on-500k-IoTs-Alex-Jay-Balan.mp4

131.3 MB

1-16-Attacking-with-Automation-How-Office-365-automation-provides-another-new-risk-to-the-cloud-Trent-Lo.mp4

88.8 MB

1-17-Red-Team-Level-over-9000-Fusing-the-powah-of-NET-with-a-scripting-language-of-your-choosing-introducing-BYOI-Bring-Your-own-Interpreter-payloads-Marcello-Salvati.mp4

203.5 MB

1-18-Active-Directory-Security-Beyond-the-Easy-Button-Sean-Metcalf.mp4

133.1 MB

1-19-Incident-response-on-macOS-Thomas-Reed.mp4

143.3 MB

1-20-I-simulate-therefore-i-catch-enhancing-detection-engineering-with-adversary-simulation-Mauricio-Velazco.mp4

153.1 MB

1-21-Adversarial-Emulation-Bryson-Bort.mp4

175.1 MB

2-02-Scientific-computing-for-information-security-forging-the-missing-link-Ryan-Elkins.mp4

108.1 MB

2-03-Defeating-Next-Gen-AV-and-EDR-Using-Old-And-New-Tricks-on-New-Dogs-Nick-Lehman-Graph-X-Steve-Eisen-Rum-Twinkies.mp4

116.2 MB

2-04-The-Hackers-Apprentice-Mark-Baggett.mp4

97.6 MB

2-05-How-to-Tell-the-C-Level-Their-Baby-is-Ugly-Heather-Smith.mp4

88.5 MB

2-06-Collect-All-the-Data-Pr.textClipping

0.4 KB

2-06-Collect-All-the-Data-Protect-All-the-Things-Aaron-Rosenmund.mp4

94.4 MB

2-07-Lying-in-Wait-Discovering-and-Exploiting-Weaknesses-in-Automated-Discovery-Actions-Timothy-Wright-Jacob-Griffith.mp4

96.3 MB

2-08-Inter-chip-communication-Testing-end-to-end-security-on-IoT-Deral-Heiland.mp4

132.8 MB

2-09-REST-in-Peace-Abusing-GraphQL-to-Attack-Underlying-Infrastructure-Matthew-Szymanski.mp4

120.6 MB

2-10-The-Art-of-The-BEC-What-Three-Years-of-Fighting-Has-Taught-Us-Ronnie-Tokazowski.mp4

177.4 MB

2-11-BloodHound-Head-to-Tail-Andy-Robbins-Rohan-Vazarkar.mp4

122.1 MB

2-12-Red-Team-Methodology-A-Naked-Look-Jason-Lang.mp4

108.3 MB

2-13-API-Keys-Now-WhatTaking-the-Pen-Test-Into-the-Amazon-Cloud-Jim-Shaver.mp4

64.9 MB

2-14-Rise-of-the-Machines-using-machine-learning-with-GRC-Justin-Leapline-Rick-Yocum.mp4

134.1 MB

2-15-How-to-Give-the-Gift-That-Keeps-on-Giving-Your-Knowledge-Jason-Blanchard.mp4

135.7 MB

2-16-The-Backup-Operators-Guide-to-the-Galaxy-Dave-Mayer.mp4

83.2 MB

2-17-SS7-for-INFOSEC-Paul-Coggin.mp4

87.2 MB

2-18-Empathy-as-a-Service-to-Create-a-Culture-of-Security-Tracy-Z-Maleeff.mp4

98.4 MB

2-19-Welcome-to-the-Jumble-Improving-RDP-Tooling-for-Malware-Analysis-and-Pentesting-milio-Gonzalez-Francis-Labelle.mp4

99.5 MB

3-00-Well-what-have-we-hereA-year-of-cyber-deception-attribution-and-making-attackers-rethink-their-life-choices-John-Strand.mp4

245.0 MB

3-01-BloodHound-From-Red-to-Blue-Mathieu-Saulnier.mp4

245.6 MB

3-02-Azure-Sentinel-A-first-look-at-Microsofts-SIEM-Solution-Carl-Hertz.mp4

240.6 MB

3-03-Behavioral-Security-and-Offensive-Psychology-at-Scale-Samantha-Davison-Josh-Schwartz.mp4

306.0 MB

3-04-PowerShell-Security-Looking-Back-from-the-Inside-Lee-Holmes.mp4

448.9 MB

3-05-Cyber-false-flags-and-adversarial-counterintelligence-oh-my-Jacob-Williams.mp4

254.6 MB

3-07-COM-Hijacking-Techniques-David-Tulis.mp4

172.9 MB

3-08-Assumed-Breach-A-Better-Model-for-Penetration-Testing-Mike-Saunders.mp4

171.8 MB

3-09-StringSifter-Learning-to-Rank-Strings-Output-for-Speedier-Malware-Analysis-Philip-Tully-Matthew-Haigh-Jay-Gibble-Michael-Sikorski.mp4

226.3 MB

3-10-Practical-Heuristic-Exploitation-Kelly-Villanueva.mp4

245.2 MB

3-11-Full-Steam-Ahead-Serverless-Hacking-101-Tal-Melamed.mp4

233.4 MB

3-12-Five-Mistakes-We-Wish-Users-Would-Stop-Making-Lesley-Carhart-Chelle-Clements-April-C-Wright-Amanda-Berlin-Lee-Neely-moderator.mp4

984.2 MB

3-13-Unix-the-Other-White-Meat-Adam-Compton-David-Boyd.mp4

173.9 MB

3-14-RFID-sniffing-under-your-nose-and-in-your-face-Rich-Rumble.mp4

150.2 MB

3-15-Product-Security-Shouldnt-be-Painful-Wim-Remes.mp4

171.5 MB

3-16-Hunting-Webshells-Tracking-TwoFace-Josh-Bryant-Robert-Falcone.mp4

257.2 MB

3-17-Improving-CACTUSTORCH-payloads-Ryan-Linn.mp4

226.3 MB

Almost-All-Noise-2-00-Metasploit-Town-Hall-Finale-Brent-Cook-Pearce-Barry-Jeffrey-Martin-Matthew-Kienow.mp4

98.2 MB

Bad-Audio-2-01-I-PWN-thee-I-PWN-thee-not-Jayson-E-Street.mp4

128.2 MB

DerbyCon-9-Closing.mp4

546.4 MB

Stable-00-Bypassing-MacOS-Detections-With-Swift-Cedric-Owens.mp4

168.0 MB

Stable-01-IPv6-Security-Considerations-For-When-Just-Turn-It-Off-Isnt-Good-Enough-Jason-Lewis.mp4

169.5 MB

Stable-02-Last-Minute-Offensive-Machine-Learning-James-Bower.mp4

86.3 MB

Stable-03-SCADA-What-the-next-Stuxnet-will-look-like-and-how-to-prevent-it-Joseph-Bingham.mp4

156.7 MB

Stable-04-Designing-building-a-stealth-C2-LDAP-channel-Rindert-Kramer.mp4

128.5 MB

Stable-05-Theres-No-Place-like-DUALHomed-David-E-Young-Jr.mp4

145.9 MB

Stable-06-Modlishka-Is-a-Mantis-Eating-2FAs-Lunch-Lance-Peterman.mp4

140.2 MB

Stable-07-Hacking-Humans-Addressing-Vulnerabilities-in-the-Advancing-Medical-Device-Landscape-Gabrielle-Hempel.mp4

143.0 MB

Stable-08-It-Must-Be-Fancy-Bear-Xena-Olsen.mp4

181.6 MB

Stable-09-Getting-the-most-out-of-your-covert-physical-security-assessment-A-Clients-Guide-Brent-White-Tim-Roberts.mp4

181.5 MB

Stable-10-Getting-dirty-on-the-CANBUS-Justin-Herman.mp4

140.9 MB

Stable-11-Automated-Dylib-Hijacking-Jimi-Sebree.mp4

138.8 MB

Stable-12-Phishing-past-Mail-Protection-Controls-using-Azure-Information-Protection-AIP-Oddvar-Moe-Hans-Lakhan.mp4

239.3 MB

Stable-13-The-1995-anonymous-cyber-profile-Patrick-Matthews.mp4

136.0 MB

Stable-14-Prepare-to-Be-Boarded-A-Tale-of-Kubernetes-Plunder-and-Cryptobooty-James-Condon.mp4

134.9 MB

Stable-15-Build-your-own-multi-user-password-manager-using-open-source-software-Michael-Vieau-Kevin-Bong.mp4

111.6 MB

Stable-16-No-class-Low-Tech-High-damage-Tom-Ruff.mp4

137.7 MB

Stable-17-Early-Detection-Through-Deception-Jason-Nester.mp4

105.0 MB

Stable-18-The-quest-for-10g-IDS-Harold-Tabellion.mp4

145.1 MB

Stable-19-Swagger-Defense-Mick-Douglas-Pete-Petersen.mp4

182.2 MB

Stable-20-Kerberoasting-Revisited-Will-Schroeder.mp4

115.6 MB

Stable-21-Hacking-While-Blind-Joe-B-TheBlindHacker.mp4

145.9 MB

Stable-22-Choose-Your-Own-TTX-Redefining-the-Incident-Response-Table-Top-Exercise-Jamison-Budacki.mp4

104.4 MB

Stable-23-Hunting-Phish-Kits-Josh-Rickard.mp4

134.5 MB

Stable-24-One-womans-journey-to-CISO-leveraging-Social-Engineering-Kate-Mullin.mp4

151.2 MB

Stable-25-SharPersist-Windows-Persistence-Toolkit-in-C-Brett-Hawkins.mp4

108.4 MB

Stable-26-Are-you-ready-to-leverage-DevSecOps-Get-ready-and-use-it-for-good-Nicole-Schwartz-aka-CircuitSwan-formerly-AmazonV.mp4

95.5 MB

Stable-27-Shadow-IT-in-the-Cloud-Marisa-Dyer-Jessica-Hazelrigg.mp4

111.9 MB

Stable-28-NET-Manifesto-Win-Friends-and-Influence-the-Loader-Casey-Smith.mp4

127.7 MB

Stable-29-Confessions-of-an-IT-OT-Marriage-Counselor-Lesley-Carhart.mp4

130.8 MB

Stable-30-Python-Two-birds-with-one-stone-Andy-Cooper.mp4

121.0 MB

Stable-31-Invoke-GreatBirdOfCommonKnowledge-Gathering-what-is-scattered-with-ATTCK-an-Atomic-Bird-and-a-bit-of-homegrown-PowerShell-Walter-Legowski.mp4

121.8 MB

Stable-32-Adventures-in-systemd-injection-Stuart-McMurray.mp4

80.3 MB

Stable-33-Frag-Youre-It-Hacking-Laser-Tag-Eric-Escobar.mp4

108.1 MB

Stable-34-Waking-up-the-data-engineer-in-you-Jared-Atkinson.mp4

139.6 MB

Stable-35-Old-Tools-New-Tricks-Hacking-WebSockets-Michael-Fowl-Nick-Defoe.mp4

92.3 MB

Stable-36-Endpoint-Detection-Super-Powers-on-the-cheap-with-Sysmon-Olaf-Hartong.mp4

136.7 MB

Stable-37-Automating-Hashtopolis-EvilMog.mp4

88.3 MB

Stable-38-Social-Engineering-in-Non-Linear-Warfare-Bill-Gardner.mp4

118.7 MB

Stable-39-How-to-cook-a-five-star-meal-from-the-convenience-of-your-hotel-room-Micah-K-Brown.mp4

113.1 MB

Stable-40-Virtual-Smart-Cards-for-Lab-Environments-Eddie-David.mp4

160.0 MB

__ia_thumb.jpg

8.2 KB

derbycon9_meta.sqlite

244.7 KB

derbycon9_meta.xml

0.8 KB

 

Showing first 106 files of 212 total files


Copyright © 2025 FileMood.com