DerbyCon 6.0 Recharge
            took place Sept. 21, 2016 through Sept. 25, 2016 (9 years, 1 month ago) at Hyatt Regency Hotel in Louisville, Kentucky, USA.
          
          
          
          
          
          
          
            
              
Presentations
            
            
              
              
              
              Friday, Sept. 23, 2016
              
              
                - 
                  
                  09:15 - Opening Ceremonies
                
- 
                  
                  10:00 - Vulnerability disclosure, cloudy clouds, and million dollar shopping trips. This industry sucks. And is awesome.
                
- 
                  
                  12:00 - Go with the Flow: Get Started with Flow Analysis Quickly and Cheaply
                
- 
                  
                  12:00 - Data Obfuscation: How to hide data and payloads to make them “not exist” (in a mathematically optimal way)
                
- 
                  
                  12:00 - Metasploit Townhall
                
- 
                  
                  12:00 - Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S.
                
- 
                  
                  12:00 - Thinking Purple
                
- 
                  
                  12:30 - Abusing RTF: Exploitation, Evasion and Exfiltration
                
- 
                  
                  13:00 - Mind Reading for Fun and Profit using DISC
                
- 
                  
                  13:00 - Information Security Proposed Solutions Series - 1. Talent
                
- 
                  
                  13:00 - Top 10 2015-2016 compromise patterns observed & how to use non-traditional Internet datasets to detect & avoid them
                
- 
                  
                  13:00 - Writing malware while the blue team is staring at you
                
- 
                  
                  13:00 - Stagefright: An Android Exploitation Case Study
                
- 
                  
                  13:30 - DNSSUX: Why DNSSEC Makes Us Weaker
                
- 
                  
                  14:00 - +1,000,000 -0: Cloning a Game Using Game Hacking and Terabytes of Data
                
- 
                  
                  14:00 - Macs Get Sick Too
                
- 
                  
                  14:00 - Hunting for Exploit Kits
                
- 
                  
                  14:00 - Rotten Potato - Privilege Escalation from Service Accounts to SYSTEM
                
- 
                  
                  14:00 - Nose Breathing 101: A Guide to Infosec Interviewing
                
- 
                  
                  14:30 - Android Patchwork: Convincing Apps to Do What You Want Them To
                
- 
                  
                  15:00 - To Catch a Penetration Tester: Top SIEM Use Cases
                
- 
                  
                  15:00 - DevOops Redux
                
- 
                  
                  15:00 - Next Gen Web Pen Testing: Handling modern applications in a penetration test
                
- 
                  
                  15:00 - A Year in the Empire
                
- 
                  
                  15:00 - Is that a penguin in my Windows?
                
- 
                  
                  15:30 - Real World Attacks VS Check-box Security
                
- 
                  
                  16:00 - .... and bad mistakes I’ve made a few.....
                
- 
                  
                  16:00 - PowerShell Secrets and Tactics
                
- 
                  
                  16:00 - Beyond The ‘Cript: Practical iOS Reverse Engineering
                
- 
                  
                  16:00 - No Easy Breach: Challenges and Lessons from an Epic Investigation
                
- 
                  
                  16:00 - ARRR Maties! A map to the legal hack-back
                
- 
                  
                  16:30 - Project MVP - Hacking and Protecting SharePoint
                
- 
                  
                  17:00 - CrackMapExec - Owning Active Directory by using Active Directory
                
- 
                  
                  17:00 - Better Network Defense Through Threat Injection and Hunting
                
- 
                  
                  17:00 - Adaptation of the Security Sub-Culture
                
- 
                  
                  17:00 - Hacking Lync (or, ‘The Weakest Lync’)
                
- 
                  
                  17:00 - Responder for Purple Teams
                
- 
                  
                  17:30 - Metaprogramming in Ruby and doing it wrong.
                
- 
                  
                  18:00 - Outlook and Exchange for the Bad Guys
                
- 
                  
                  18:00 - It’s Never So Bad That It Can’t Get Worse
                
- 
                  
                  18:00 - Exploiting First Hop Protocols to Own the Network
                
- 
                  
                  18:00 - Evolving your Office’s Security Culture
                
- 
                  
                  18:00 - AWShit. Pay-as-you-go Mobile Penetration Testing
                
- 
                  
                  18:30 - Confronting Obesity in Infosec
                
- 
                  
                  19:00 - From Commodity to Advanced (APT) malware, are automated malware analysis sandboxes as useful as your own basic manual analysis?
                
- 
                  
                  19:00 - Defeating The Latest Advances in Script Obfuscation
                
- 
                  
                  19:00 - BurpSmartBuster - A smart way to find hidden treasures
                
- 
                  
                  19:30 - Advanced Persistent Thirst (APT)
                
              Saturday, Sept. 24, 2016
              
              Sunday, Sept. 25, 2016