DerbyCon 6.0 Recharge
took place Sept. 21, 2016 through Sept. 25, 2016 (8 years, 9 months ago) at Hyatt Regency Hotel in Louisville, Kentucky, USA.
Presentations
Friday, Sept. 23, 2016
-
09:15 - Opening Ceremonies
-
10:00 - Vulnerability disclosure, cloudy clouds, and million dollar shopping trips. This industry sucks. And is awesome.
-
12:00 - Go with the Flow: Get Started with Flow Analysis Quickly and Cheaply
-
12:00 - Data Obfuscation: How to hide data and payloads to make them “not exist” (in a mathematically optimal way)
-
12:00 - Metasploit Townhall
-
12:00 - Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S.
-
12:00 - Thinking Purple
-
12:30 - Abusing RTF: Exploitation, Evasion and Exfiltration
-
13:00 - Mind Reading for Fun and Profit using DISC
-
13:00 - Information Security Proposed Solutions Series - 1. Talent
-
13:00 - Top 10 2015-2016 compromise patterns observed & how to use non-traditional Internet datasets to detect & avoid them
-
13:00 - Writing malware while the blue team is staring at you
-
13:00 - Stagefright: An Android Exploitation Case Study
-
13:30 - DNSSUX: Why DNSSEC Makes Us Weaker
-
14:00 - +1,000,000 -0: Cloning a Game Using Game Hacking and Terabytes of Data
-
14:00 - Macs Get Sick Too
-
14:00 - Hunting for Exploit Kits
-
14:00 - Rotten Potato - Privilege Escalation from Service Accounts to SYSTEM
-
14:00 - Nose Breathing 101: A Guide to Infosec Interviewing
-
14:30 - Android Patchwork: Convincing Apps to Do What You Want Them To
-
15:00 - To Catch a Penetration Tester: Top SIEM Use Cases
-
15:00 - DevOops Redux
-
15:00 - Next Gen Web Pen Testing: Handling modern applications in a penetration test
-
15:00 - A Year in the Empire
-
15:00 - Is that a penguin in my Windows?
-
15:30 - Real World Attacks VS Check-box Security
-
16:00 - .... and bad mistakes I’ve made a few.....
-
16:00 - PowerShell Secrets and Tactics
-
16:00 - Beyond The ‘Cript: Practical iOS Reverse Engineering
-
16:00 - No Easy Breach: Challenges and Lessons from an Epic Investigation
-
16:00 - ARRR Maties! A map to the legal hack-back
-
16:30 - Project MVP - Hacking and Protecting SharePoint
-
17:00 - CrackMapExec - Owning Active Directory by using Active Directory
-
17:00 - Better Network Defense Through Threat Injection and Hunting
-
17:00 - Adaptation of the Security Sub-Culture
-
17:00 - Hacking Lync (or, ‘The Weakest Lync’)
-
17:00 - Responder for Purple Teams
-
17:30 - Metaprogramming in Ruby and doing it wrong.
-
18:00 - Outlook and Exchange for the Bad Guys
-
18:00 - It’s Never So Bad That It Can’t Get Worse
-
18:00 - Exploiting First Hop Protocols to Own the Network
-
18:00 - Evolving your Office’s Security Culture
-
18:00 - AWShit. Pay-as-you-go Mobile Penetration Testing
-
18:30 - Confronting Obesity in Infosec
-
19:00 - From Commodity to Advanced (APT) malware, are automated malware analysis sandboxes as useful as your own basic manual analysis?
-
19:00 - Defeating The Latest Advances in Script Obfuscation
-
19:00 - BurpSmartBuster - A smart way to find hidden treasures
-
19:30 - Advanced Persistent Thirst (APT)
Saturday, Sept. 24, 2016
Sunday, Sept. 25, 2016